Read more about: DHS partners with DoD to draft 5G security evaluation methodology

Read more about: DHS partners with DoD to draft 5G security evaluation methodology

The Department of Homeland Security is developing a new security evaluation methodology for fifth-generation wireless technologies, partnering with the Defense Department and the National Institute of Standards and Technology on a process officials say can readily apply to a broad range of federal use cases.


The Cybersecurity and Infrastructure Security Agency along with DoD’s 5G Initiative program are spearheading the effort. CISA is charged with leading 5G risk management efforts for the federal government. Meanwhile, DoD has been deploying 5G networks and testing various use cases at military bases across the country.


“This partnership really looks to address that demand, the need to assess 5G technologies and incorporate it into our operational environment,” Vincent Sritapan, section chief of CISA’s Cybersecurity Quality Services Management Office, said during a conference hosted by Palo Alto Networks last week.


The project has yielded a five-step process agencies and other organizations can use to determine their security requirements for a given project:

  • Step One: Define the Federal 5G Use Case

  • Step Two: Identify the Assessment Boundary

  • Step Three: Identify Security Requirements

  • Step Four: Map Security Requirements to Federal Policies in Assessment and Authorization

  • Step Five: Assess Assessment and Authorization Policy Gaps and Alternatives

  • Sritapan conceded it won’t be simple to put a boundary around use cases given the complexities of 5G technologies and their interdependencies.


    “Who owns what? Is it on the base? Do we own it? Is it the federal government, state, local, tribal, territorial government?” he said. “Or is this something where the carrier owns this? So you have to be cognizant of the actual deployment environment, and that really matters. CONUS or OCONUS? All those are really good aspects to consi ..

    Support the originator by clicking the read the rest link below.