SlideShare a Scribd company logo
W A S H I N G T O N, D C
My fellow Americans:
Fifth generation wireless technology, or 5G, will be a primary driver of our Nation’s prosperity
and security in the 21st century. This new technology will provide consumers, businesses, and
governments with remarkably fast network connections that will enable tens of billions of new
devices to harness the power of the Internet, transforming the way we live, work, learn, and
communicate.
This advancement, however, also ushers new risks and vulnerabilities.
Malicious actors are already seeking to exploit 5G technology. This is a target-rich
environment for those with nefarious motives due to the number and types of devices it will
connect and the large volume of data that those devices will transmit.
This National Strategy to Secure 5G articulates my vision for America to lead the development,
deployment, and management of secure and reliable 5G communications infrastructure
worldwide, arm-in-arm with our closest partners and allies, including:
 Facilitating domestic 5G rollout;
 Assessing the risks and identifying core security principles for 5G infrastructure;
 Managing the risks to our economic and national security from the use of 5G infrastructure;
and
 Promoting responsible global development and deployment of 5G infrastructure.
My Administration is committed to protecting America’s national security, promoting our
prosperity, and preserving our civil liberties and democratic ideals. Ensuring the security,
reliability, and trustworthiness of our 5G infrastructure is essential to these endeavors. This
strategy explains how we will do just that.
Sincerely,
President Donald J. Trump
The White House
March 2020
Table of Contents
Introduction 1
Line of Effort 1: Facilitate Domestic 5G Rollout 2
Line of Effort 2: Assess Risks to & Identify Core Security Principles of 5G Infrastructure 3
Assess the Risks Posed by Cyber Threats to and Vulnerabilities in 5G Infrastructure 3
Develop Security Principles for 5G Infrastructure in the United States 3
Line of Effort 3: Address Risks to United States Economic and National Security 4
During Development and Deployment of 5G Infrastructure Worldwide
Manage the Supply Chain Risks in United States Government Infrastructure, Including 5G 4
Address the Risk of ‘High-Risk’ Vendors in United States 5G Infrastructure 4
Line of Effort 4: Promote Responsible Global Development and Deployment of 5G 6
Develop and Promote Implementation of International 5G Security Principles 6
Promote United States Leadership in International Standards Development and Adoption 6
Incentivize Market Competitiveness and Diversity of Secure 5G Infrastructure Options 6
– 1 –
Introduction
The United States and like-minded countries will lead global development, deployment,
and management of secure and reliable fifth-generation (5G) communications
infrastructure, which includes hardware, software, and services used to provide 5G. The
United States will work with our like-minded partners to establish policies and
structures to leap ahead of global industry competitors as 5G standards, 5G technology,
and applications that ride on 5G technology evolve.
The United States National Cyber Strategy states that:
The Administration will facilitate the accelerated development and rollout of next-
generation telecommunications and information communications infrastructure
here in the United States, while using the buying power of the Federal Government
to incentivize the move towards more secure supply chains. The United States
Government will work with the private sector to facilitate the evolution and security
of 5G, examine technological and spectrum-based solutions, and lay the
groundwork for innovation beyond next-generation advancements.
This National Strategy to Secure 5G expands on how the United States Government will
secure 5G infrastructure domestically and abroad. 5G infrastructure will be an attractive
target for criminals and foreign adversaries due to the large volume of data it transmits
and processes as well as the support that 5G will provide to critical infrastructure.
Criminals and foreign adversaries will seek to steal information transiting the networks
for monetary gain and exploit these systems and devices for intelligence collection and
surveillance. Adversaries may also disrupt or maliciously modify the public and private
services that rely on communications infrastructure. Given these threats, 5G
infrastructure must be secure and reliable to maintain information security and address
risks to critical infrastructure, public health and safety, and economic and national
security.
This National Strategy to Secure 5G will fulfill the goals of the National Cyber Strategy
with four lines of effort: (1) facilitating the rollout of 5G domestically; (2) assessing the
cybersecurity risks to and identifying core security principles of 5G capabilities and
infrastructure; (3) addressing risks to United States economic and national security
during development and deployment of 5G infrastructure worldwide; and (4) promoting
responsible global development and deployment of secure and reliable 5G
infrastructure.
– 2 –
Line of Effort 1:
Facilitate Domestic 5G Rollout
The Administration is facilitating the private sector-led domestic rollout of 5G, primarily
coordinated by the National Economic Council. The Federal Communication
Commission’s (FCC) strategy to Facilitate America’s Superiority in 5G Technology (the
5G FAST Plan): (1) makes more spectrum available for commercial use; (2) streamlines
government processes for approving 5G infrastructure deployment; and (3) modernizes
regulations to promote deployment of 5G backhaul.1
In addition, the October 25, 2018
Presidential Memorandum on Developing a Sustainable Spectrum Strategy for
America’s Future directed the Secretary of Commerce to issue a National Spectrum
Strategy, which will lay out a long-term plan for spectrum management for 5G and
future generations of advanced wireless networks, to include both space and terrestrial
systems.
The Administration will also continue to work aggressively with the private sector, as
well as like-minded partners and allies to foster and promote the research,
development, testing, and evaluation of new technologies and architectures that
advance the state-of-the-art technology for 5G and beyond.
1
https://www.fcc.gov/5G
– 3 –
Line of Effort 2:
Assess Risks to & Identify Core Security
Principles of 5G Infrastructure
The United States Government will promote secure and reliable 5G infrastructure by
regularly assessing the economic and national security and other risks to this
infrastructure, including defining and maintaining the relevant core security principles
for this infrastructure.
Assess the Risks Posed by Cyber Threats to and Vulnerabilities in 5G Infrastructure
The United States Government, in partnership with State, local, and tribal governments
as well as private sector partners, will seek to continuously identify and characterize
economic, national security, and other risks posed by cyber threats to and
vulnerabilities in 5G infrastructure. This effort will include maintaining an
understanding of the global 5G market and 5G capabilities and infrastructure, including
both space and terrestrial components. This activity will be done with appropriate
intergovernmental, interagency, and private-sector engagement.
Develop Security Principles for 5G Infrastructure in the United States
The United States Government will work with the private sector to identify, develop, and
apply core security principles - best practices in cybersecurity, supply chain risk
management, and public safety - to United States 5G infrastructure. The principles will
be synchronized with other security principles endorsed by the United States
Government, such as the “Prague Proposals” from the Prague 5G Security Conference
in May 2019.
– 4 –
Line of Effort 3:
Address Risks to United States Economic and
National Security During Development and
Deployment of 5G Infrastructure Worldwide
The United States Government will address the risks presented by the use of 5G to its
economic and national security by analyzing the risks of 5G infrastructure and ensuring
national critical functions and national essential functions are structured in such a way
that they are resilient to these risks.
Manage the Supply Chain Risks in United States Government Infrastructure, Including
5G
The Federal Acquisition Supply Chain Security Act of 2018 creates a unified, whole-of-
government approach to protecting Federal systems from supply chain risks in covered
articles, including but not limited to telecommunications equipment and services.
Through the Federal Acquisition Security Council created by the Act, the United States
Government will identify or develop supply chain risk management standards,
guidelines, and practices for executive agencies to use when assessing and mitigating
supply chain risks. The Act includes a structure for preventing the use and procurement
of sources or covered articles, which may include 5G equipment, in executive agency
information systems.
Address the Risk of ‘High-Risk’ Vendors in United States 5G Infrastructure
The UnitedStates Government will ensure that 5G and future generations of information
and communications technology and services will be deployed in a manner that
protects the national security interests of the United States. Executive Order (E.O.)
13873, issued on May 15, 2019, on “Securing the Information and Communications
Technology and Services Supply Chain” establishes the authorities to prohibit certain
transactions that involve information and communications technology or services
designed, developed, manufactured, or supplied by persons owned by, controlled by,
or subject to the jurisdiction or direction of a foreign adversary that pose an undue or
unacceptable risk to the national security of the United States. The United States
Government’s implementation of E.O. 13873 is designed to integrate and synchronize
with activities by the Committee on Foreign Investment in the United States, the Federal
– 5 –
Acquisition Security Council, and United States Government reviews of certain Federal
Communication Commission licenses involving foreign ownership. The United States
Government will leverage these robust activities to address the risk of high-risk vendors
in the 5G infrastructure.
– 6 –
Line of Effort 4:
Promote Responsible Global Development and
Deployment of 5G
The United States will work with like-minded countries to lead the responsible
international development and deployment of 5G technology and will work to promote
the availability of secure and reliable equipment and services in the market.
Develop and Promote Implementation of International 5G Security Principles
The United States Government will participate in the development of international 5G
security principles through frameworks, such as the Prague 5G Security Conference.
The United States Government will work bilaterally and multilaterally with foreign
partners and allies to promote implementation of the 5G security principles within the
“Prague Proposals” document that came out of this conference in May 2019.
Promote United States Leadership in International Standards Development and
Adoption
The United States Government will work to preserve and enhance United States
leadership on 5G in relevant organizations that set standards in concert with the private
sector, including but not limited to commercial, academic, and like-minded
international partners. This will include efforts such as expanding Federal interagency
coordination, participation, and influence in standards-setting organizations. The
United States will emphasize the need for open and transparent processes to develop
timely, technically robust, and appropriate standards. The United States will promote
and support increased participation by the private sector and ensure that such
participation is informed by appropriate public-private coordination.
Incentivize Market Competitiveness and Diversity of Secure 5G Infrastructure Options
The United States Government will work with the private sector, academia, and
international government partners to adopt policies, standards, guidelines, and
procurement strategies that reinforce 5G vendor diversity to foster market competition.
The United States Government will join private sector and international partners in
designing market-base incentives, accountability mechanisms, and evaluation schemas
to assess diversity, component transparency, fair financing, and competition across the
– 7 –
5G technology landscape as a means to better secure the global network and protect
American values of openness, security, and interoperability.

More Related Content

What's hot

Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Francis Amaning
 
Developments in the field of information and telecommunications in the contex...
Developments in the field of information and telecommunications in the contex...Developments in the field of information and telecommunications in the contex...
Developments in the field of information and telecommunications in the contex...
Yahya CyberCloud
 
Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet Infrastructure
Francis Amaning
 
Manage the Complexity
Manage the ComplexityManage the Complexity
Manage the Complexity
Motorola Solutions
 
Case study 13
Case study 13Case study 13
Case study 13
khaled alsaeh
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Benjamin Ang
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
Department of Defense
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
Charles Mok
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
Adriana Dvorsak
 
NCSC Speaker
NCSC Speaker NCSC Speaker
Gifec
GifecGifec
Leone ct#3 presentation 1
Leone ct#3 presentation 1Leone ct#3 presentation 1
Leone ct#3 presentation 1
vincentleone
 
WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan Crawford
Creative Commons Korea
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
Tughral Yamin
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
Khalizan Halid
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Tughral Yamin
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
at MicroFocus Italy ❖✔
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
svito
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
Fahmi Albaheth
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong Countries
Arthit Suriyawongkul
 

What's hot (20)

Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
 
Developments in the field of information and telecommunications in the contex...
Developments in the field of information and telecommunications in the contex...Developments in the field of information and telecommunications in the contex...
Developments in the field of information and telecommunications in the contex...
 
Strenthening Critical Internet Infrastructure
Strenthening Critical Internet InfrastructureStrenthening Critical Internet Infrastructure
Strenthening Critical Internet Infrastructure
 
Manage the Complexity
Manage the ComplexityManage the Complexity
Manage the Complexity
 
Case study 13
Case study 13Case study 13
Case study 13
 
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020Cyber threats and cooperation in Indo Pacific   for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
 
NCSC Speaker
NCSC Speaker NCSC Speaker
NCSC Speaker
 
Gifec
GifecGifec
Gifec
 
Leone ct#3 presentation 1
Leone ct#3 presentation 1Leone ct#3 presentation 1
Leone ct#3 presentation 1
 
WCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan CrawfordWCIT-12 What Happens Next by Susan Crawford
WCIT-12 What Happens Next by Susan Crawford
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong Countries
 

Similar to National Strategy to Secure 5G of the United States of America

DoD 5G Strategy 2020
DoD 5G Strategy 2020DoD 5G Strategy 2020
DoD 5G Strategy 2020
Neil McDonnell
 
Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
Errol Hewitt. MSCP, BA
 
DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020
Neil McDonnell
 
CIO Council's White Paper: Networks of the Future
CIO Council's White Paper: Networks of the FutureCIO Council's White Paper: Networks of the Future
CIO Council's White Paper: Networks of the Future
Neil McDonnell
 
How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...
How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...
How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...
TeabeAmet
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdf
Alexandre Pinheiro
 
Cyber Security Education Materials.pptx
Cyber Security Education Materials.pptxCyber Security Education Materials.pptx
Cyber Security Education Materials.pptx
bentidiane21
 
Ccdcoe huawei-2019-03-28-final
Ccdcoe huawei-2019-03-28-finalCcdcoe huawei-2019-03-28-final
Ccdcoe huawei-2019-03-28-final
rothayato
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
bagotjesusa
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
Asad Zaman
 
Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
Digital Policy and Law Consulting
 
FED GOV CON - Cybersecurity Compliance Under The FAR
FED GOV CON - Cybersecurity Compliance Under The FARFED GOV CON - Cybersecurity Compliance Under The FAR
FED GOV CON - Cybersecurity Compliance Under The FAR
JSchaus & Associates
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
ssuser454af01
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
mecklenburgstrelitzh
 
Public Safety in-Building Wireless Distributed Antenna System (DAS) Market F...
 Public Safety in-Building Wireless Distributed Antenna System (DAS) Market F... Public Safety in-Building Wireless Distributed Antenna System (DAS) Market F...
Public Safety in-Building Wireless Distributed Antenna System (DAS) Market F...
Chaitali Gawande
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
sabrangsabrang
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
Yury Chemerkin
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
Allan Cytryn
 
The Term Project is designed to offer you an opportunity to analyz.docx
The Term Project is designed to offer you an opportunity to analyz.docxThe Term Project is designed to offer you an opportunity to analyz.docx
The Term Project is designed to offer you an opportunity to analyz.docx
arnoldmeredith47041
 
DoD Cyber Strategy
DoD Cyber StrategyDoD Cyber Strategy
DoD Cyber Strategy
Department of Defense
 

Similar to National Strategy to Secure 5G of the United States of America (20)

DoD 5G Strategy 2020
DoD 5G Strategy 2020DoD 5G Strategy 2020
DoD 5G Strategy 2020
 
Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
 
DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020
 
CIO Council's White Paper: Networks of the Future
CIO Council's White Paper: Networks of the FutureCIO Council's White Paper: Networks of the Future
CIO Council's White Paper: Networks of the Future
 
How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...
How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...
How-Can-the-Baltic-States-Support-5G-Security-through-Transatlantic-Cooperati...
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdf
 
Cyber Security Education Materials.pptx
Cyber Security Education Materials.pptxCyber Security Education Materials.pptx
Cyber Security Education Materials.pptx
 
Ccdcoe huawei-2019-03-28-final
Ccdcoe huawei-2019-03-28-finalCcdcoe huawei-2019-03-28-final
Ccdcoe huawei-2019-03-28-final
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
 
FED GOV CON - Cybersecurity Compliance Under The FAR
FED GOV CON - Cybersecurity Compliance Under The FARFED GOV CON - Cybersecurity Compliance Under The FAR
FED GOV CON - Cybersecurity Compliance Under The FAR
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
 
Public Safety in-Building Wireless Distributed Antenna System (DAS) Market F...
 Public Safety in-Building Wireless Distributed Antenna System (DAS) Market F... Public Safety in-Building Wireless Distributed Antenna System (DAS) Market F...
Public Safety in-Building Wireless Distributed Antenna System (DAS) Market F...
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
 
The Term Project is designed to offer you an opportunity to analyz.docx
The Term Project is designed to offer you an opportunity to analyz.docxThe Term Project is designed to offer you an opportunity to analyz.docx
The Term Project is designed to offer you an opportunity to analyz.docx
 
DoD Cyber Strategy
DoD Cyber StrategyDoD Cyber Strategy
DoD Cyber Strategy
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 

National Strategy to Secure 5G of the United States of America

  • 1.
  • 2. W A S H I N G T O N, D C My fellow Americans: Fifth generation wireless technology, or 5G, will be a primary driver of our Nation’s prosperity and security in the 21st century. This new technology will provide consumers, businesses, and governments with remarkably fast network connections that will enable tens of billions of new devices to harness the power of the Internet, transforming the way we live, work, learn, and communicate. This advancement, however, also ushers new risks and vulnerabilities. Malicious actors are already seeking to exploit 5G technology. This is a target-rich environment for those with nefarious motives due to the number and types of devices it will connect and the large volume of data that those devices will transmit. This National Strategy to Secure 5G articulates my vision for America to lead the development, deployment, and management of secure and reliable 5G communications infrastructure worldwide, arm-in-arm with our closest partners and allies, including:  Facilitating domestic 5G rollout;  Assessing the risks and identifying core security principles for 5G infrastructure;  Managing the risks to our economic and national security from the use of 5G infrastructure; and  Promoting responsible global development and deployment of 5G infrastructure. My Administration is committed to protecting America’s national security, promoting our prosperity, and preserving our civil liberties and democratic ideals. Ensuring the security, reliability, and trustworthiness of our 5G infrastructure is essential to these endeavors. This strategy explains how we will do just that.
  • 3. Sincerely, President Donald J. Trump The White House March 2020
  • 4. Table of Contents Introduction 1 Line of Effort 1: Facilitate Domestic 5G Rollout 2 Line of Effort 2: Assess Risks to & Identify Core Security Principles of 5G Infrastructure 3 Assess the Risks Posed by Cyber Threats to and Vulnerabilities in 5G Infrastructure 3 Develop Security Principles for 5G Infrastructure in the United States 3 Line of Effort 3: Address Risks to United States Economic and National Security 4 During Development and Deployment of 5G Infrastructure Worldwide Manage the Supply Chain Risks in United States Government Infrastructure, Including 5G 4 Address the Risk of ‘High-Risk’ Vendors in United States 5G Infrastructure 4 Line of Effort 4: Promote Responsible Global Development and Deployment of 5G 6 Develop and Promote Implementation of International 5G Security Principles 6 Promote United States Leadership in International Standards Development and Adoption 6 Incentivize Market Competitiveness and Diversity of Secure 5G Infrastructure Options 6
  • 5. – 1 – Introduction The United States and like-minded countries will lead global development, deployment, and management of secure and reliable fifth-generation (5G) communications infrastructure, which includes hardware, software, and services used to provide 5G. The United States will work with our like-minded partners to establish policies and structures to leap ahead of global industry competitors as 5G standards, 5G technology, and applications that ride on 5G technology evolve. The United States National Cyber Strategy states that: The Administration will facilitate the accelerated development and rollout of next- generation telecommunications and information communications infrastructure here in the United States, while using the buying power of the Federal Government to incentivize the move towards more secure supply chains. The United States Government will work with the private sector to facilitate the evolution and security of 5G, examine technological and spectrum-based solutions, and lay the groundwork for innovation beyond next-generation advancements. This National Strategy to Secure 5G expands on how the United States Government will secure 5G infrastructure domestically and abroad. 5G infrastructure will be an attractive target for criminals and foreign adversaries due to the large volume of data it transmits and processes as well as the support that 5G will provide to critical infrastructure. Criminals and foreign adversaries will seek to steal information transiting the networks for monetary gain and exploit these systems and devices for intelligence collection and surveillance. Adversaries may also disrupt or maliciously modify the public and private services that rely on communications infrastructure. Given these threats, 5G infrastructure must be secure and reliable to maintain information security and address risks to critical infrastructure, public health and safety, and economic and national security. This National Strategy to Secure 5G will fulfill the goals of the National Cyber Strategy with four lines of effort: (1) facilitating the rollout of 5G domestically; (2) assessing the cybersecurity risks to and identifying core security principles of 5G capabilities and infrastructure; (3) addressing risks to United States economic and national security during development and deployment of 5G infrastructure worldwide; and (4) promoting responsible global development and deployment of secure and reliable 5G infrastructure.
  • 6. – 2 – Line of Effort 1: Facilitate Domestic 5G Rollout The Administration is facilitating the private sector-led domestic rollout of 5G, primarily coordinated by the National Economic Council. The Federal Communication Commission’s (FCC) strategy to Facilitate America’s Superiority in 5G Technology (the 5G FAST Plan): (1) makes more spectrum available for commercial use; (2) streamlines government processes for approving 5G infrastructure deployment; and (3) modernizes regulations to promote deployment of 5G backhaul.1 In addition, the October 25, 2018 Presidential Memorandum on Developing a Sustainable Spectrum Strategy for America’s Future directed the Secretary of Commerce to issue a National Spectrum Strategy, which will lay out a long-term plan for spectrum management for 5G and future generations of advanced wireless networks, to include both space and terrestrial systems. The Administration will also continue to work aggressively with the private sector, as well as like-minded partners and allies to foster and promote the research, development, testing, and evaluation of new technologies and architectures that advance the state-of-the-art technology for 5G and beyond. 1 https://www.fcc.gov/5G
  • 7. – 3 – Line of Effort 2: Assess Risks to & Identify Core Security Principles of 5G Infrastructure The United States Government will promote secure and reliable 5G infrastructure by regularly assessing the economic and national security and other risks to this infrastructure, including defining and maintaining the relevant core security principles for this infrastructure. Assess the Risks Posed by Cyber Threats to and Vulnerabilities in 5G Infrastructure The United States Government, in partnership with State, local, and tribal governments as well as private sector partners, will seek to continuously identify and characterize economic, national security, and other risks posed by cyber threats to and vulnerabilities in 5G infrastructure. This effort will include maintaining an understanding of the global 5G market and 5G capabilities and infrastructure, including both space and terrestrial components. This activity will be done with appropriate intergovernmental, interagency, and private-sector engagement. Develop Security Principles for 5G Infrastructure in the United States The United States Government will work with the private sector to identify, develop, and apply core security principles - best practices in cybersecurity, supply chain risk management, and public safety - to United States 5G infrastructure. The principles will be synchronized with other security principles endorsed by the United States Government, such as the “Prague Proposals” from the Prague 5G Security Conference in May 2019.
  • 8. – 4 – Line of Effort 3: Address Risks to United States Economic and National Security During Development and Deployment of 5G Infrastructure Worldwide The United States Government will address the risks presented by the use of 5G to its economic and national security by analyzing the risks of 5G infrastructure and ensuring national critical functions and national essential functions are structured in such a way that they are resilient to these risks. Manage the Supply Chain Risks in United States Government Infrastructure, Including 5G The Federal Acquisition Supply Chain Security Act of 2018 creates a unified, whole-of- government approach to protecting Federal systems from supply chain risks in covered articles, including but not limited to telecommunications equipment and services. Through the Federal Acquisition Security Council created by the Act, the United States Government will identify or develop supply chain risk management standards, guidelines, and practices for executive agencies to use when assessing and mitigating supply chain risks. The Act includes a structure for preventing the use and procurement of sources or covered articles, which may include 5G equipment, in executive agency information systems. Address the Risk of ‘High-Risk’ Vendors in United States 5G Infrastructure The UnitedStates Government will ensure that 5G and future generations of information and communications technology and services will be deployed in a manner that protects the national security interests of the United States. Executive Order (E.O.) 13873, issued on May 15, 2019, on “Securing the Information and Communications Technology and Services Supply Chain” establishes the authorities to prohibit certain transactions that involve information and communications technology or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary that pose an undue or unacceptable risk to the national security of the United States. The United States Government’s implementation of E.O. 13873 is designed to integrate and synchronize with activities by the Committee on Foreign Investment in the United States, the Federal
  • 9. – 5 – Acquisition Security Council, and United States Government reviews of certain Federal Communication Commission licenses involving foreign ownership. The United States Government will leverage these robust activities to address the risk of high-risk vendors in the 5G infrastructure.
  • 10. – 6 – Line of Effort 4: Promote Responsible Global Development and Deployment of 5G The United States will work with like-minded countries to lead the responsible international development and deployment of 5G technology and will work to promote the availability of secure and reliable equipment and services in the market. Develop and Promote Implementation of International 5G Security Principles The United States Government will participate in the development of international 5G security principles through frameworks, such as the Prague 5G Security Conference. The United States Government will work bilaterally and multilaterally with foreign partners and allies to promote implementation of the 5G security principles within the “Prague Proposals” document that came out of this conference in May 2019. Promote United States Leadership in International Standards Development and Adoption The United States Government will work to preserve and enhance United States leadership on 5G in relevant organizations that set standards in concert with the private sector, including but not limited to commercial, academic, and like-minded international partners. This will include efforts such as expanding Federal interagency coordination, participation, and influence in standards-setting organizations. The United States will emphasize the need for open and transparent processes to develop timely, technically robust, and appropriate standards. The United States will promote and support increased participation by the private sector and ensure that such participation is informed by appropriate public-private coordination. Incentivize Market Competitiveness and Diversity of Secure 5G Infrastructure Options The United States Government will work with the private sector, academia, and international government partners to adopt policies, standards, guidelines, and procurement strategies that reinforce 5G vendor diversity to foster market competition. The United States Government will join private sector and international partners in designing market-base incentives, accountability mechanisms, and evaluation schemas to assess diversity, component transparency, fair financing, and competition across the
  • 11. – 7 – 5G technology landscape as a means to better secure the global network and protect American values of openness, security, and interoperability.