Summary: National Cybersecurity Strategy Implementation Plan July 2023
National Cybersecurity Strategy Implementation Plan July 2023 PDF
Executive Summary
The document is the National Cybersecurity Strategy Implementation Plan. It is structured by pillar and strategic objective, aligning with the National Cybersecurity Strategy, which has five pillars and 27 strategic objectives. Each initiative under a pillar is associated with a strategic objective and has a unique number, title, description, reference to the National Cybersecurity Strategy, responsible agency, contributing entities, and an estimated completion date.
Pillar One: Defend Critical Infrastructure
Develop a National Cybersecurity Strategy Implementation Plan
Establish a National Cybersecurity Safety Board
Develop a Cybersecurity Framework Profile for the Defense Industrial Base
Develop a Cybersecurity Framework Profile for the Energy Sector
Develop a Cybersecurity Framework Profile for the Financial Services Sector
Develop a Cybersecurity Framework Profile for the Healthcare and Public Health Sector
Develop a Cybersecurity Framework Profile for the Transportation Systems Sector
Pillar Two: Disrupt and Dismantle Threat Actors
Publish an updated DOD Cyber Strategy
Strengthen the National Cyber Investigative Joint Task Force (NCIJTF) capacity.
Pillar Three: Shape Market Forces to Drive Security and Resilience
Drive the Development of Secure IoT Devices
Implement Federal Acquisition Regulation (FAR) requirements per the Internet of Things (IoT) Cybersecurity Improvement Act of 2020
Initiate a U.S. Government IoT security labeling program
Shift Liability for Insecure Software Products and Services
Explore approaches to develop a long-term, flexible, and enduring software liability framework
Advance software bill of materials (SBOM) and mitigate the risk of unsupported software
Coordinated vulnerability disclosure
Use Federal Grants and Other Incentives to Build in Security
Leverage Federal grants to improve infrastructure cybersecurity
Prioritize funding for cybersecurity research
Prioritize cybersecurity research, development, and demonstration of social, behavioral, and economic research in cybersecurity.
Leverage Federal Procurement to Improve Accountability
Implement Federal Acquisition Regulation (FAR) changes required under EO 14028
Leverage the False Claims Act to improve vendor cybersecurity
Explore a Federal Cyber Insurance Backstop
Assess the need for a Federal insurance response to a catastrophic cyber event.
Pillar Four: Invest in A Resilient Future
Secure the Technical Foundation of the Internet
Lead the adoption of network security best practices
Promote open-source software security and the adoption of memory-safe programming languages
Accelerate the development, standardization, and adoption of foundational Internet infrastructure capabilities and technologies
Collaborate with key stakeholders to drive secure Internet routing
Reinvigorate Federal Research and Development for Cybersecurity
Accelerate maturity, adoption, and security of memory-safe programming languages
Prepare for Our Post-Quantum Future
Implement National Security Memorandum-10
Implement NSM-10 for National Security Systems (NSS)
Standardize, and support the transition to post-quantum cryptographic algorithms
Secure Our Clean Energy Future
Drive adoption of cyber secure-by-design principles by incorporating them into Federal projects.
Develop a plan to ensure the digital ecosystem can support and deliver the U.S. Government’s decarbonization goals.
Build and refine training, tools, and support for engineers and technicians using cyber-informed engineering principles.
Develop a National Strategy to Strengthen Our Cyber Workforce
Publish a National Cyber Workforce and Education Strategy and track its implementation.
Pillar Five: Forge International Partnerships to Pursue Shared Goals
Build Coalitions to Counter Threats to Our Digital Ecosystem
Create interagency teams for regional cyber collaboration and coordination
Publish an International Cyberspace and Digital Policy Strategy
Strengthen Federal law enforcement collaboration mechanisms with allies and partners
Regional cyber hubs study
Strengthen International Partner Capacity
Strengthen international partners' cyber capacity
Expand international partners' cyber capacity through operational law enforcement collaboration.
Expand U.S. Ability to Assist Allies and Partners
Establish flexible foreign assistance mechanisms to provide cyber incident response support quickly.
Build Coalitions to Reinforce Global Norms of Responsible State Behavior
Hold irresponsible states accountable when they fail to uphold their commitments
Secure Global Supply Chains for Information, Communications, and Operational Technology Products and Services
Promote the development of secure and trustworthy information and communication technology (ICT) networks and services
Promote a more diverse and resilient supply chain of trustworthy information and communication (ICT) vendors
Begin administering the Public Wireless Supply Chain Innovation Fund (PWSCIF)
Promulgate and amplify Cybersecurity Supply Chain Risk Management (C-SCRM) key practices across and within critical infrastructure sectors
Comments
Post a Comment