CISA Proposes Five-Step Process to Become 5G Operational

June 14, 2022

Takeaway: Federal agencies will need to consider the five-step assessment process to get authorization from CISA before operating with 5G technology.

As the adoption of 5G technology by many private and public organizations approaches, assessments are being put in place to evaluate whether federal agencies can operate with 5G technology. Regulation agencies in cybersecurity teamed up to create a security assessment that grants authorization to agencies in order to use 5G technology.

Specifically, CISA – with the Department of Homeland Security’s Science and Technology Directorate and the Department of Defense’s Office of the Under Secretary Defense for Research and Engineering (OUSD R&E) – proposed a five-step assessment process.  This process was derived from scientific research and security analyses.

So, what are the five steps of assessment an agency must meet to acquire authorization?

Step 1: Define the Federal 5G Use Case – this step involves describing what the intended use for the 5G technology is and whether there is a federal use component as well as providing details about the proposed 5G model.

Step 2: Identify the Assessment Boundary – this step involves defining the boundary to identify the security requirements that will be implemented to protect networks.

Step 3: Identify Security Requirements – this is a multi-step that includes conducting a high-level threat analysis of each 5G subsystem and identifying cybersecurity requirements.

Step 4: Map Security Requirements to Federal Guidance – this step involves the creation of a catalog of federal security guidance that corresponds to the technologies included in the assessment boundary and implied security capabilities from Step 3.

Step 5: Assess Security Guidance Gaps & Alternatives – this is an evaluation step that tests the effectiveness of implementation.

The purpose of this five-step assessment is to provide federal agencies with a standardized and comprehensive process to evaluate and address security assessment gaps.  CISA views this assessment process as essential for new federal 5G implementations.  In accordance with this process, the networks of federal agencies reliant on 5G technology will be protected from cybersecurity attacks.

To read CISA’s 5G Security Evaluation Process Investigation in full, visit:

News & Events

Related News

Douglas K. Rosenblum Appointed as a Hearing Committee Member Serving the Disciplinary Board of the Supreme Court of Pennsylvania
July 1, 2024
Partner Douglas K. Rosenblum of Pietragallo Gordon Alfano Bosick & Raspanti, LLP has been appointed as a Hearing Committee Member serving the Disciplinary Board of the Supreme Court of Pennsylvania effective July 1, 2024. Read More
Chambers USA Recognizes Pietragallo as a 2024 Leading Law Firm in Pennsylvania
June 6, 2024
Pietragallo Gordon Alfano Bosick & Raspanti, LLP has been recognized by Chambers and Partners USA in its 2024 Guide in the areas of False Claims Act (Band 2) in USA-Nationwide, White Collar Crime & Government Investigations (Band 2) in Pennsylvania, and General Commercial (Band 3) in Pennsylvania: Pittsburgh & Surrounds. Read More
View More News & Events