Generated by GPT-5-mini| U.S. National Cyber Strategy | |
|---|---|
| Name | U.S. National Cyber Strategy |
| Adopted | 2018; 2023 (updated) |
| Author | Donald Trump administration; Joe Biden administration |
| Jurisdiction | United States |
| Document type | Strategic policy |
U.S. National Cyber Strategy The U.S. National Cyber Strategy is a federal strategic framework articulating United States priorities for cyberspace defense, resilience, and competition, coordinating actions across executive agencies including the Department of Defense, Department of Homeland Security, and Federal Bureau of Investigation. The Strategy connects to statutes such as the Cybersecurity Information Sharing Act of 2015, directives like Presidential Policy Directive 41, and interagency efforts involving the Office of the Director of National Intelligence and the National Security Council.
The Strategy frames national posture toward threats posed by state actors such as the People's Republic of China, Russian Federation, Islamic State of Iraq and the Levant, and North Korea, as well as nonstate actors like Anonymous (hacker group), Lazarus Group, and Fancy Bear. It outlines roles for agencies including the National Institute of Standards and Technology, Cybersecurity and Infrastructure Security Agency, Central Intelligence Agency, and National Security Agency while referencing international partners such as North Atlantic Treaty Organization and multinational institutions including the United Nations. The Strategy emphasizes alignment with legal instruments including the Computer Fraud and Abuse Act and doctrines shaped by leaders such as James Mattis, Michael Flynn, and R. James Woolsey.
Origins are traceable to early policy efforts such as the Presidential Decision Directive 63 era and the Bush administration's cybersecurity initiatives during the tenure of George W. Bush, later refined under the Obama administration with the 2015 Cybersecurity Framework developed by NIST, and further formalized with strategy papers from the Trump administration and updates under the Biden administration. Key events influencing development include the Sony Pictures hack, the Equifax data breach, the Office of Personnel Management data breach, and election interference investigations involving Special Counsel Robert Mueller. Legislative and institutional responses intersected with actions by Congress members such as Senator Marco Rubio and Representative Nancy Pelosi and hearings before the Senate Select Committee on Intelligence.
The Strategy sets principles of deterrence drawn from doctrines articulated by policymakers like Thomas Schelling and Henry Kissinger, advocating offensive and defensive cyber operations by U.S. Cyber Command and cooperative resilience via CISA. Objectives include protection of critical infrastructure sectors listed by Department of Homeland Security such as energy, finance, and transportation, coordination with private sector entities like Microsoft Corporation, Amazon (company), and Google LLC, and promotion of cyber norms alongside allies including Japan and United Kingdom. It references law enforcement priorities conducted by the FBI and legal standards shaped by the Department of Justice and judicial rulings such as those from the United States Supreme Court.
Implementation assigns responsibilities across agencies including DHS, DoD, NSA, ODNI, and civilian regulators like Federal Communications Commission and Securities and Exchange Commission. Governance mechanisms invoke interagency processes driven by the National Security Council and coordination with Congress committees such as the House Permanent Select Committee on Intelligence and the Senate Committee on Homeland Security and Governmental Affairs. Funding and acquisition involve agencies such as the General Services Administration and oversight by offices including the Office of Management and Budget and the Government Accountability Office.
Programs referenced include deployment of the NIST Cybersecurity Framework, grants and exercises such as those by DHS's National Cybersecurity Awareness Month efforts, public-private information sharing platforms influenced by the Cybersecurity Information Sharing Act of 2015, and workforce initiatives tied to National Initiative for Cybersecurity Education run by NIST. Incident response coordination includes partnerships with FIRST (organization) and multinational exercises such as CyCon. Standards and procurement draw on vendors and partners including Cisco Systems, Palo Alto Networks, and research institutions such as Massachusetts Institute of Technology and Stanford University.
The Strategy frames diplomacy with entities like European Union, NATO Cooperative Cyber Defence Centre of Excellence, Australia, and regional partners including India and South Korea. It supports development of international norms at forums like the United Nations Group of Governmental Experts and multilateral initiatives such as the Tallinn Manual discussions and the Budapest Convention on Cybercrime. Responses to state-sponsored actions reference attribution practices used by U.S. Cyber Command and public indictments by the Department of Justice against actors linked to China's Ministry of State Security and GRU (Russian military intelligence).
Critics from think tanks such as the Brookings Institution, Center for Strategic and International Studies, and advocacy groups like the Electronic Frontier Foundation have raised concerns about civil liberties, potential overreach by agencies such as the NSA and FBI, and transparency in offensive cyber operations advocated by the Strategy. Privacy and Fourth Amendment debates reference court cases such as Carpenter v. United States and disputes over surveillance authorities invoked under statutes like the Foreign Intelligence Surveillance Act. International critics including scholars from Harvard Kennedy School and Chatham House have questioned escalation risks and the clarity of norms governing cyber warfare and peacetime coercion.
Category:United States cybersecurity