CISA (DHS) Communications Sector-Specific Plan
CISA (DHS) Communications Sector-Specific Plan
Sector-Specific Plan
An Annex to the NIPP 2013
2015
Table of Contents
Letter from the Council Chairs ................................................................................................................................. iii
Executive Summary...................................................................................................................................................iv
1. Introduction ............................................................................................................................................................ 1
2. Sector Overview ..................................................................................................................................................... 3
2.1 Sector Risks ............................................................................................................................................7
2.2 Critical Infrastructure Partners ..............................................................................................................10
3. Vision, Goals, and Priorities ................................................................................................................................. 13
4. Achieving Sector Goals ........................................................................................................................................ 16
4.1 Risk Management .................................................................................................................................16
4.2 Research & Development .....................................................................................................................22
4.3 Critical Infrastructure and National Preparedness ................................................................................22
5. Measuring Effectiveness ...................................................................................................................................... 25
5.1 Sector Objectives ......................................................................................................................................25
5.2 Measurement Approach ............................................................................................................................26
Appendix A: List of Acronyms and Abbreviations .................................................................................................. 30
Figures
2-1: Communications Sector Architecture Model ..........................................................................................5
2-2: Communications Sector Partnership Model .........................................................................................11
4-1: Communications Sector’s Risk Assessment History ............................................................................17
4-2: Communications Sector Approach to Risk Reduction .........................................................................18
4-3: NIPP 2013 Critical Infrastructure Risk Management Framework ........................................................19
Tables
3-1: Communications Sector Goals and Priorities .......................................................................................14
3-2: Communications Joint Sector Priorities Aligned to Joint National Priorities and NIPP 2013 Goals ...15
4-1: Communications Sector Critical Dependencies and Mitigations for Dependencies .............................21
5-1: Communications Sector Priorities and Objectives................................................................................26
5-2: Communications Sector Priorities and Objectives aligned to the NIPP 2013 Calls to Action .............29
This 2015 release of the CSSP serves as an update to the original plan issued in 2010. As with the previous plan,
this CSSP represents a collaborative effort among the private sector; State, local, tribal, and territorial
governments; nongovernmental organizations; and Federal departments and agencies to identify and work toward
shared goals and priorities to reduce critical infrastructure risk.
The Communications Sector Coordinating Council (CSCC) and Communications Sector Government
Coordinating Council (CGCC) jointly developed the Communications Sector goals, objectives, and activities in
this CSSP, which collectively reflect the overall strategic direction for the sector as a whole.
This CSSP also reflects the maturation of the Communications Sector partnership and the progress made to
address the evolving risk, operating, and policy environments. Since 2010, Communications Sector partners in the
public and private sectors have taken significant steps to reduce sector risk, improve coordination, and strengthen
security and resilience capabilities.
In the same shared purpose that guided these actions and their support for the framework, concepts, and processes
outlined in the NIPP 2013 and EO 13636, Communications Sector partners look forward to continuing their
efforts to enhance the security and resilience of our Nation's critical infras
Caitlin Durkovich
Assistant Secretary, Office of Infrastructure Protection
U.S. Department of Homeland Security
As such, the Communications Sector Coordinating Council (CSCC) and Communications Sector Government
Coordinating Council (CGCC) worked collaboratively to develop an update to the 2010 Communications Sector-
Specific Plan (CSSP) in accordance with the National Infrastructure Protection Plan 2013: Partnering for
Critical Infrastructure Security and Resilience (NIPP 2013). In this 2015 CSSP, the CSCC and CGCC developed
joint goals that the sector will pursue to guide the mission over the next four years: (1) Protect and enhance the
overall physical and logical health of communications; (2) Rapidly reconstitute critical communications services
in the event of disruption and mitigate cascading effects; and (3) Improve the sector’s national security and
emergency preparedness (NS/EP) posture with Federal, State, local, tribal, international, and private sector
entities to reduce risk. To achieve these goals, the sector developed associated priorities to focus their efforts. The
graphic below shows how the sector goals align to the joint sector priorities.
The vision, goals, and joint sector priorities contained in the 2015 CSSP demonstrate how the sector is
contributing towards the advancement of the NIPP 2013 Goals and the Joint National Priorities established by the
NIPP Call to Action (CtA) #1, which advocated for the development of joint national priorities to inform resource
allocation and decision-making on the part of critical infrastructure partners.
In order to implement this CSSP, the Communications Sector partners developed a set of broad objectives aligned
to the four sector priorities that will contribute to sector goals and priorities. Details on the sector’s objectives are
in Chapter Five, Measuring Effectiveness, which includes both voluntary partnership activities and tasks the
sector may pursue on its own volition.
The Communications Sector will leverage the NIPP 2013 CtA categories to track and report, on a quarterly basis,
the progress of sector activities to DHS’s Office of Infrastructure Protection. The NIPP 2013’s CtA guides efforts
to achieve national goals and, therefore, to enhance national critical infrastructure security and resilience. The
NIPP 2013 CtA will serve as a roadmap to ensure continuous improvement of security and resilience through the
Communications Sector’s efforts.
This update also reflects the maturation of the Communications Sector partnerships and the progress made to
address the evolving risk, operating, and policy environments.
Since 2010, the Communications Sector has evolved rapidly in multiple areas, including mobile broadband, cloud
computing, the Internet of Things (IoT), and software-defined networks (SDNs). Voice and data networks have
continued to converge, and mobile devices, such as smartphones and tablet computers, have been widely adopted,
creating enormous demand for mobile broadband communications. These changes increase the requirement for
improved sector security and resilience, which the CSSP seeks to address by setting the strategic direction for
voluntary, collaborative efforts to improve sector security and resilience over the next four years. It describes how
the Communications Sector manages risks and contributes to national critical infrastructure security and
resilience, as set forth in Presidential Policy Directive 21: Critical Infrastructure Security and Resilience. As such,
the sector strategy supports the NIPP 2013 national goals and strategy, the 2014 Joint National Priorities,
implementation of Executive Order 13636: Improving Critical Infrastructure Cybersecurity, and the NIPP 2013
Call to Action (CtA) #2.2
This update also answers NIPP 2013 CtA #2, which calls upon each sector to update its SSP every four years to
reflect joint priorities, address sector reliance on lifeline functions, describe national preparedness efforts, outline
cybersecurity efforts, and develop metrics to measure progress. The Vision, Goals, and Priorities Section of this
document illustrates how the Communications Sector’s priorities support both the NIPP 2013 national goals and
Joint National Priorities. Public and private-sector representatives have identified shared goals and priorities, and
a supporting set of collaborative activities they plan to pursue during the next four years.
Sector Overview—Provides a concise profile of the sector’s evolution since 2010, characteristics, risk
profile, and key public and private-sector partners and venues.
Vision, Goals, and Priorities—Presents the sector’s mission and updates goals and priorities for
communications security and resilience over the next four years.
Achieving Sector Goals—Describes mechanisms to achieve sector goals, including ongoing and planned
partnership programs, activities, and resources that support the sector’s current risk management
1
Communications Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan, 2010 is available at the
following URL: http://www.dhs.gov/publication/nipp-ssp-communications-2010. Accessed December 2, 2015.
2
The NIPP 2013’s CtA guides the private sector and Federal, State, local, tribal, territorial, and regional government efforts
in implementing the NIPP, which has 12 actions assigned to three categories.
The CSSP provides targets for Communications Sector public and private partner collaboration, specifically
among government agencies, private industry, and DHS’s Office of Cybersecurity and Communications (CS&C),
which serves as the Sector-Specific Agency (SSA) for the Communications Sector. Partners have a clear and
shared interest in ensuring the security and resilience of critical sector assets, and this plan represents the
voluntary, collaborative activities that have the greatest effect on reducing sector risk and building resilience.
Virtually every element of modern life is now dependent on cyber infrastructure. As a result, our Nation’s
economic and national security relies on the security of the assets and operations of critical communications
infrastructure. Past terrorist attacks and catastrophic natural disasters emphasized the need to focus our national
attention on protecting the Nation’s critical infrastructure and making it more resilient. Moving forward, it is
essential that public and private sector partners adopt a coordinated approach to achieve joint goals for our
communications infrastructure.
The public sector—Federal, State, and local governments—and the private sector share the responsibility for
securing the Nation’s critical communications infrastructure. Sector partners benefit from complementary skill
sets, expertise, and individual resources to meet their shared responsibility for addressing all-hazard threats.
The individuals and organizations that contribute to the planning of initiatives to keep the Nation’s
communication networks resilient enough to withstand natural and manmade disasters, as well as those
responsible for responding and restoring those networks post-event, have partnered to update this CSSP from its
2010 version. These include representatives from the five segments of the Communications Sector: broadcasting,
cable, satellite, wireless, and wireline.
3
U.S. Department of Commerce Bureau of Economic Analysis is available at the following URL:
http://bea.gov/iTable/iTable.cfm?ReqID=51&step=1#reqid=51&step=2&isuri=1. Accessed December 2, 2015.
4
Telecommunications Industry Association’s TIA2014 Playbook is available at the following URL:
http://www.tiaonline.org/PDF/9603_FinalProof_LoRes.pdf. Accessed December 2, 2015.
Today, using more means than ever before, enormous volumes of information move at ever-faster speeds among
an ever-increasing number of users and machines. Over the past 25 years, the public switched telephone network
(PSTN) in the United States has evolved from a largely mechanical, circuit-switched network carrying voice
telephone calls, which a few U.S. companies owned and operated, to a highly complex and integrated system of
computer-controlled, packet-based networks carrying voice, data, and video, which thousands of domestic and
international organizations own. Reliance on established circuit-based switching for communication is rapidly
waning, and most of the traffic running over the public communication networks in 2014 was transmitted as data
packets. The Internet is not the only part of the public network (PN) experiencing rapid growth. According to
Cisco Systems, Inc., traffic from mobile data in 2013 was nearly 18 times the size of the entire Internet in 2000.5
5
The Cisco® Visual Networking Index Global Mobile Data Traffic Forecast Update is available at the following URL:
http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11-
520862.html. Accessed December 2, 2015.
As more devices connect to public communication networks, service firms can provide more types of device-
specific services over those networks. The Communications Sector architecture model in Figure 2-1 serves as a
representation of the collective infrastructure, which illustrates at least five major ways to access the numerous
voice, video, and data services on the core network: broadcasting, cable, satellite, wireless, and wireline networks.
Since 2010, the Communications Sector has continued to make rapid, technological advances in multiple areas,
including network infrastructure, mobile broadband, cloud computing, IoT, Internet Protocol (IP) networks, Over-
the-Top services (e.g., Voice over IP (VoIP)), and even SDNs. Network convergence has evolved alongside
technology, with all forms of broadband infrastructure investments occurring across the United States as service
providers have worked to meet individual and enterprise requirements for faster communication services.
Smartphones, tablet computers, and their associated mobile applications emerged as rapidly adopted key user
technologies in the Communications Sector, and their explosive growth has generated enormous demand for
mobile broadband. Enterprises have since embraced cloud computing with Platform as a Service, Infrastructure as
a Service, and Software as a Service enjoying widespread adoption.7 Concurrently, the national policy
environment has also evolved with the addition of Executive Order (EO) 13618, Assignment of National Security
6
This architecture model depicts examples of network access methods and services provided. It is not intended to be
comprehensive, exact or authoritative (Source: 2012 National Sector Risk Assessment for Communications (NSRA)).
7
National Security Telecommunications Advisory Committee (NSTAC) Report to the President on Cloud Computing, May
15, 2012
Broadcast
Broadcasting systems consist of free and subscription based, over-the-air radio and
television (TV) stations that offer analog and digital audio and video programming
services and data services. Broadcasting has been the principal means of providing
emergency alert services to the public for six decades. Broadcasting systems operate in
three frequency bands: medium frequency (MF (AM radio)), very high frequency (VHF
(FM radio and TV)), and ultra-high frequency (UHF (TV)). The full transition to digital
TV and ongoing transition to digital radio provide broadcast stations with enhanced
capabilities, including the ability to multicast multiple programs on a single channel.
Radio and TV stations also stream broadcast and additional programming content over
the Internet.
Cable
The cable industry is composed of more than 7,700 cable systems that offer analog and
digital video programming services, digital telephone service, and high-speed broadband
services. The cable systems use a mixture of fiber and coaxial cable to provide
bidirectional signal paths to the customer. This hybrid fiber/coaxial (HFC) network
architecture effectively segments the cable system into a number of parallel distribution
networks. The HFC architecture is beneficial to business and residential customers
because it improves signal performance and increases available bandwidth and overall
network reliability. Although network designs vary, the HFC architecture in any
particular community is typically based on a three-level topology, which includes a
headend, one or more distribution hub(s), and multiple fiber nodes.
Satellite
This is a platform launched into orbit to relay voice, video, or data signals as part of a
telecommunications network. Earth station antennas transmit signals to the satellite,
which are amplified and sent back to Earth for reception by other earth station antennas.
Satellites use a combination of terrestrial and space components to perform many types
of functions, such as the bidirectional transmission of voice, video, and data services;
data collection; event detection; timing; and navigation.
Wireline
Consists of circuit- and packet-switched networks via copper, fiber, and coaxial transport
media. It includes private enterprise data and telephony networks, the core backbone of
the Internet, and the PSTN.
8
These risks were assessed in the 2012 NSRA.
9
Information about the July 2012 solar super storm is available at the following URL: http://science.nasa.gov/science-
news/science-at-nasa/2014/23jul_superstorm/. Accessed December 2, 2015.
10
2014 Quadrennial Homeland Security Review, June 18, 2014, pgs. 22-23
11
U.S. Government Accountability Office Report, GPS Disruptions: Efforts to Assess Risks to Critical Infrastructure and
Coordinate Agency Actions Should Be Enhanced, November 2013
12
NSTAC Report to the President on Information and Communications Technology Mobilization, November 19, 2014
13
NSTAC Report to the President on the Internet of Things, November 19, 2014
14
NIPP 2013, Partnering for Critical Infrastructure Security and Resilience, page 17
The Communications Sector generally relies on diesel fuel to power its backup generators and the
Transportation Sector to deliver those fuels.
In some cases, water sources are also necessary for cooling and other processes. Service providers
generally have alternate sources of water available for short-term service interruptions; an LTO
could result in a significant shutdown.
Other Communications Sector Dependencies: Supply Chain, Information Technology (IT), GPS
The Communications Sector also has second-tier dependencies in the Information Technology Sector and
Defense Industrial Base (DIB) Sector.
The Communications Sector relies on the IT Sector to deliver reliable products (e.g., routers,
switches, software, operating systems, etc.) and services (such as domain name resolution) in order
to provide end-to-end communication services for customers.
The primary use of GPS, as part of the DIB sector, in the commercial communications industry is
in support of precision timing and network synchronization functions. The Communications Sector
does leverage alternate precision timing capabilities for core functions, but the ubiquitous coverage
of GPS permits greater flexibility for end users.
While the Communications Sector has few significant dependencies, other critical infrastructure sectors are
dependent on the Communications Sector. As such, the Communications Sector is one of the few sectors that can
affect all other sectors. At a minimum, each sector depends on services from the Communications Sector to
support its operations and associated day-to-day communication needs for corporate and organizational networks
and services (e.g., Internet connectivity, voice services, and video teleconferencing capabilities). Some sectors
have even more significant dependencies on the Communications Sector beyond these routine operations. Table
2-1 provides a high-level overview of how other sectors are critically dependent on the Communications Sector.
The Communications Sector recognizes the importance of addressing the dependencies of other sectors on its
services. In terms of the responsibility for risk, the Communications Sector typically considers other critical
infrastructure sectors to be customers. As customers, these other sectors need to be aware of their responsibility to
ensure the resiliency of their operations through redundancy and diversity of service. To this end,
Communications Sector industry and government partners are committed to working with other critical
infrastructure sectors to address cross-sector dependencies through customer relationships as well as through other
SSAs and sector partnerships.
The NIPP Partnership Model employs public and private sector councils and uses the Critical Infrastructure
Partnership Advisory Council (CIPAC) framework to facilitate collaboration between government and private
sector partners. The succeeding paragraphs below describe the key partnerships that support the implementation
of the Communications Sector critical infrastructure partnership model.
Partnership councils meet to exchange ideas and lessons learned; facilitate sector-level planning and resource
allocation; establish effective coordinating structures; and develop security and resilience tools, guidelines,
products, and programs. Functioning as the SSA, DHS’s CS&C leads sector coordination, serves as the primary
federal interface for sector-specific security and resilience efforts, promotes sector-wide information sharing, and
supports implementation of the NIPP 2013 within the Communications Sector.
The CSCC is a self-organized, self-run, and self-governed private sector council consisting of owners and
operators and their representatives from each of the five industry segments. The CSCC provides a forum for
members of the private sector to discuss infrastructure security and resilience issues among themselves or to
communicate directly with the CGCC and SSA. The CSCC enables communication system and infrastructure
The CGCC consists of representatives from across the Federal, State, and local governments. These public sector
participants represent departments and agencies involved in various aspects of ICT policy, protection, and
implementation. The CGCC helps to coordinate the implementation of the NIPP and corresponding CSSP across
government and between government and the private sector. The CGCC works closely with the CSCC to plan,
implement, and execute sector-wide resilience and security programs for the Nation’s Communications Sector. A
current list of CGCC members is available on the Communications Sector CIPAC Charters and Membership
Webpage.
In addition to NIPP-related activities associated with the CSCC and CGCC, the Communications Sector
participates in a number of public-private advisory and operational forums, ranging from chief executive officer
(CEO)-level engagement on policy issues to incident response activities associated with operational activities.
Figure 2-2 outlines the segmentation of these NIPP-related activities.
Through the President’s National Security Telecommunications Advisory Committee (NSTAC), industry helps to
inform government decisions about NS/EP communications. NSTAC comprises up to 30 CEOs from major
telecommunication companies, network service providers, IT firms, financial firms, and aerospace companies.
Through a deliberative process, NSTAC provides the President with recommendations intended to ensure vital
telecommunication connections are operational during any event or crisis and to help the Federal Government
maintain a reliable, secure, and resilient national communications posture. Key areas of NSTAC focus include
strengthening national security, enhancing cybersecurity, maintaining the global communications infrastructure,
ensuring communications for disaster response, and addressing critical infrastructure interdependencies.
In January 2000, the White House designated the National Coordinating Center for Communications (NCC) as
the Information Sharing and Analysis Center (ISAC) for telecommunications in accordance with Presidential
Established in 1991, the Government and NSTAC Network Security Information Exchanges (NSIE) meet
bimonthly to share information and views on threats and incidents affecting the PN’s software elements,
vulnerabilities, and possible remedies. In addition, NSIE members periodically assess the risk to the PN from
electronic intrusion. The U.S. NSIE holds multilateral exchange meetings with its counterparts from the United
Kingdom, Canada, Australia, and New Zealand.
The Communications Sector actively engages in the Federal Communications Commission’s (FCC)
Communications Security, Reliability and Interoperability Committee (CSRIC). Through this advisory
committee, industry can recommend actions for the FCC to take to promote reliable, secure, and resilient
communication services and networks. Industry also uses this venue to identify best practices that may be useful
to support these same objectives. Individual communication enterprises can look to these and other industry best
practices as guides to improving the security of their network and facilities.16
Communication networks are global in scope, and the Nation’s communications infrastructure is linked with and
dependent on infrastructure owned and operated by foreign states and organizations. As the SSA for the
Communications Sector, CS&C engages bilaterally and internationally on both cybersecurity and communication
issues. CS&C’s Office of Emergency Communications (OEC) addresses emergency communications,
interoperability, and critical infrastructure security and resilience issues. In striving to fulfill its mission, OEC has
developed a strong, working relationship with Canada on NS/EP communications.
15
EO 13691:Promoting Private Sector Cybersecurity Information Sharing, February 13, 2015, is available at the following
URL: https://www.whitehouse.gov/the-press-office/2015/02/13/executive-order-promoting-private-sector-cybersecurity-
information-shari. Accessed December 2, 2015.
16
Multiple industry best practices are available, including Carnegie Mellon University’s Capability Maturity Model
Integration CMMI®22 Measurement and Analysis Process; ISO/IEC 15939; ISO/IEC 27004; NIST SP800-55 Rev1, Draft
Practical Measurement Framework for Software Assurance and Information Security; and the FCC Website, which is
available at the following URL: https://www.fcc.gov/search/#q=best%20practices. Accessed December 2, 2015.
The Communications Sector developed priorities associated with these goals and identified a future state for each
priority towards which the sector will work over the next four years. These goals and priorities are shown in Table
3-1, while Table 3-2 shows their direct alignment to the Joint National Priorities and the NIPP 2013 Goals.
The Cyber and Physical Security priority involves the identification of communications assets, the
implementation of protection measures for those assets, the detection of threats and attacks against the assets,
appropriate and effective response to attacks, and the recovery of damaged communications functionality.
The Resilience priority involves the appropriate development, implementation, and ongoing enhancements of
processes and technologies that improve the survivability performance of communications networks, applications,
and services.
The Dependencies and Interdependencies priority involves the ongoing mapping of the Communications
Sector ecosystem; identifying intertwined vulnerabilities; and developing, implementing, and enhancing the
practical strategies to mitigate cascading consequences of attacks.
The Partnership and Engagement priority involves the challenging but rewarding work of ensuring that public
and private components, driven by differing motivating primary principles, cooperate effectively to their mutual
benefit and the overall benefit of the Communications Sector as a whole.
The CSSP provides a strategic framework for the sector’s partners to collaboratively protect the Nation’s
communications infrastructure. The basic goals of the CSSP risk management framework are:
Resilient Infrastructure: Critical infrastructure and their communication capabilities should be able to
withstand natural or manmade hazards—with the exception of extreme events, such as an LTO—with
minimal interruption or failure.17
Diversity: Facilities should have physically and logically diverse primary and backup communications
capabilities that do not share common points of failure.
Redundancy: Facilities should use multiple communication capability types to sustain business
operations and eliminate single points of failure that could disrupt primary services.
Recoverability: Plans and processes should be in place to restore operations quickly if an interruption or
failure occurs.
The Communications Sector’s goals and priorities are directly rooted in the NIPP 2013 Critical Infrastructure
Risk Management Framework. Updated goals and priorities reflect the maturation of the partnership and the
significant progress made since the 2010 CSSP. This section presents the sector’s ongoing efforts and the planned
approaches that support risk management and national preparedness, response, and recovery following an incident
that affects Communications Sector operations.
17
For the 2012 NSRA, the Sector defined an LTO as an interruption of electrical power within a large enough geographical
area and for a period of time beyond the capability of backup power systems currently in use to provide for the continuing
operation of communications systems and networks (Source: National Communications System Committee of Principals,
Communications Dependency on Electric Power Working Group Report: Long-Term Outage Study, 2009).
In the face of this dynamic environment, risk avoidance is simply not possible—no organization can prevent all
threats or attacks or eliminate all of its vulnerabilities. Therefore, consistent with the NIPP 2013 Critical
Infrastructure Risk Management Framework, the Communications Sector’s approach to network defense
prioritizes assets, assesses threats and vulnerabilities, and then uses such criteria to focus resources on those
defenses that can yield optimal protection. The Communications Sector regularly undertakes risk assessments to
address evolving issues by topic, segment, or threat. Across the Communications Sector, industry and government
partners (including CSCC, CGCC, NSTAC, NCC, and NSIE) collaborate to execute risk assessments as an
ongoing activity with the intent to maintain a national communications infrastructure that is resilient, diverse,
redundant, and recoverable. Figure 4-1 highlights some of the risk assessment activities undertaken by the
Communications Sector over the past decade.
Under the NIPP 2013 Critical Infrastructure Risk Management Framework, risk is defined as the potential for an
adverse outcome from an event, determined by the event’s likelihood—a function of the specific threats and
vulnerabilities—and associated consequences if the event occurs. While individual owners and operators are
responsible for managing risk to their individual assets, the Communications Sector has undertaken the risk
assessments highlighted above to improve understanding of threats, vulnerabilities, and consequences, as well as
The Communications Sector separately and collectively, regularly and routinely undertakes risk assessments to
address evolving issues by topic, by segment, or by threat. Figure 4-2 outlines the Communications Sector’s
approach to risk reduction.
At the implementation level, the sector’s critical infrastructure risk management approach aligns to the NIPP 2013
Critical Infrastructure Risk Management Framework (Figure 4-3).
Identify Infrastructure: Identify assets, systems, and networks that contribute to critical functionality
and collect information pertinent to risk management, including analysis of dependencies and
interdependencies.
Assess and Analyze Risks: Evaluate the risk, taking into consideration the potential direct and indirect
consequences of an incident, known vulnerabilities to various potential threats or hazards, and general or
specific threat information.
Identify Infrastructure
After the Communications Sector has jointly determined its shared vision and mission and then established its
priorities and goals to achieve them, the Communications Sector works with owner and operators of other critical
services to identify which assets or operations are the most crucial for national security and resilience. The
Communications Sector ensures that response and restoration activities for these assets are included in State,
local, and regional response plans. Communications owners and operators also work with their critical customers
to develop emergency operations plans. As the SSA for the Communications Sector, DHS’s CS&C helps to
identify and obtain appropriate data for assets, systems, and networks that play a vital role in the Nation’s security
or economy.
Risk assessment results inform the selection and implementation of mitigation activities and the establishment of
risk management priorities for Communications Sector owners and operators. Owners and operators prioritize and
The Communications Sector implements risk reduction activities, as appropriate, with multiple mitigation options
relevant to specific identified risks. Physical risks require different mitigations than cybersecurity risks; for
example, installation methods to protect GPS antennas or communication facilities in earthquake-prone areas will
differ from methods to mitigate cybersecurity vulnerabilities pertaining to data integrity and confidentiality. The
sector actively engages in the FCC’s CSRIC to identify best practices that are applicable to the five industry
segments: broadcasting, cable, satellite, wireless, and wireline.
Cybersecurity risks and trends, when assessed collectively, can reach levels that fall beyond the ability of
individual industry and government organizations to manage, such as when multiple organizations in an industry
use the same software platform and become vulnerable to the same exploits. While organizations typically
manage these types of issues on an individual basis or with a few key partners, examining risks from a sector level
provides major long-term benefits. The Communications Sector takes a collaborative approach to cyber risk by
working with DHS to evaluate the cybersecurity threats, vulnerabilities, and consequences to these critical
functions and establish the sector’s cyber-risk priorities. Through CSRIC Working Group #4, the sector has
successfully mapped the National Institute of Standards and Technology (NIST) Cyber Security Framework
(CSF) to the five segments as a means to further enhance the cybersecurity of its networks and facilities.18
Once risks are validated, the Communications Sector has a function-by-function view of cyber risk that informs
sector-specific risk management strategies and decision-making. This unified strategy provides the key linkage
between national- and organization-level cyber risk management efforts, thereby enabling the Communications
Sector to take a risk-informed approach to sector cybersecurity planning and stakeholder outreach over the
coming years and make the most of limited government and industry resources.
Information sharing can also help to reduce risk and inform mitigation strategies. As the operational arm of the
Communications Sector, and the communications operational arm of the National Communications and
Cybersecurity Integration Center, the Comm-ISAC is first and foremost a response group. The Comm-ISAC also
actively promotes and engages in information sharing regarding vulnerabilities, threats, intrusions, and anomalies
from multiple sources with the intent of averting or mitigating effects on the communications infrastructure.
18
The NIST CSF is available at the following URL: http://www.nist.gov/cyberframework/upload/cybersecurity-framework-
021214.pdf. Accessed December 3, 2015.
As the nature of the threat environment changes, risk identification is cyclical. Communication entities must
continually engage in prevention, protection, mitigation, response, and recovery to effectively manage and reduce
risks. The Communications Sector continues to work with the Federal Government to identify opportunities for
the CSCC, CGCC, and the State, Local, Tribal, and Territorial Government Coordinating Council to establish
new and enhance existing programs that identify and mitigate communication response and recovery issues.
Communications Sector owners and operators develop contingency plans, backup generation supplies, and
alternate communication methods and transportation routes as part of their emergency operation and business
continuity plans. In particular, owners and operators draw upon lessons learned from cross-sector partners during
State and local emergency exercises to form more accurate expectations of lifeline function availability during a
major disaster. Additionally, owners and operators also develop mitigations to address the effects of secondary
dependencies, such as GPS loss and transportation. Examples of dependency mitigation actions are listed in Table
4-1.
Table 4-1: Communications Sector Critical Dependencies and Mitigations for Dependencies
Develop the foundational understanding of critical infrastructure systems and systems dynamics;
Develop integrated and scalable risk assessment and management approaches;
Develop integrated and proactive capabilities, technologies, and methods to support secure and resilient
infrastructure;
Harness the power of data sciences to create unified, integrated situational awareness and to understand
consequences of action; and
Build a crosscutting culture of critical infrastructure security and resilience R&D collaboration.
The Communications Sector will consider these five Priority Areas as inputs in its planning and coordination
efforts to align its R&D activities and support implementation of the CISR National R&D Plan. The
Communications Sector will continue to use the R&D process outlined in the 2010 CSSP for identifying,
managing, and planning new and existing R&D initiatives.
Many of the new challenges facing the Communications Sector call for innovations in science and technology,
making R&D initiatives essential to sector critical infrastructure security and resilience. The Communications
Sector will continue to work collaboratively to identify criteria used to select new and existing R&D initiatives.
The Communications Sector will use the R&D Planning Process outlined in the 2010 CSSP.19
19
The Communications R&D planning strategy is available within the Communications Sector-Specific Plan on pages 63-68,
available at URL: http://www.dhs.gov/publication/nipp-ssp-communications-2010. Accessed December 3, 2015.
EO 13618 highlights the Federal Government’s need to communicate at all times and under all circumstances to
carry out its most critical and time sensitive functions.20 The Communications Sector plays an essential role by
working closely with DHS’s OEC to establish and maintain NS/EP communication services and programs,
including the Government Emergency Telecommunications Service (GETS), Wireless Priority Service (WPS),
and Telecommunications Service Priority (TSP) Program. GETS and WPS provide priority completion of
wireline and wireless calls when the PSTN is congested in an emergency, while the TSP program provides for
priority restoration and provisioning of telecommunication circuits following a disruption of service.
Government and industry help to guide the formulation of policy considerations for communications that support
the Executive Office of the President. EO 13618 also established the NS/EP Executive Committee to address
NS/EP communication matters and to make recommendations to the President on NS/EP communications,
thereby enhancing the survivability, resilience, and future architecture of NS/EP communications, including what
should constitute NS/EP communication requirements. The NSTAC provides industry-based advice and expertise
to the President on issues and problems related to implementing NS/EP communications policy.
At the operational or response level, the Comm-ISAC facilitates voluntary collaboration and information sharing
among government and industry in support of EO 13618 and the national critical infrastructure protection goals of
Presidential Decision Directive 63, Critical Infrastructure Protection. This operational partnership has been in
place since 1984 and is the only public/private ISAC.21 Over 60 private sector ICT companies and 24 Federal
Government departments and agencies are participants in the Comm-ISAC. Industry members include
communications equipment and software vendors; wireline communication providers; and wireless
communication providers, including satellite providers, broadcast, public safety, and Internet Service Provider
backbone networks.
The Comm-ISAC or NCC continuously monitors national and international incidents and events that may impact
emergency communications. Incidents include not only acts of terrorism, but also natural events such as
tornadoes, floods, hurricanes, and earthquakes. In cases of emergency, the NCC Watch leads emergency
communications response and recovery efforts under Emergency Support Function #2 of the National Response
Framework. With much of the Nation’s cyber infrastructure tied into communications, the NCC works with both
the U.S. Computer Emergency Readiness Team (US-CERT) and the Industrial Control Systems Cyber
20
EO 13618, Assignment of National Security and Emergency Preparedness Communications Functions, July 6, 2012, is
available at the following URL: https://www.whitehouse.gov/the-press-office/2012/07/06/executive-order-assignment-
national-security-and-emergency-preparedness-. Accessed December 3, 2015.
21
As a direct result of an NSTAC recommendation, President Ronald Reagan established the NCC in 1984 to facilitate the
coordination of NS/EP telecommunications restoration and provisioning (https://www.hsdl.org/?view&did=16010). Accessed
December 3, 2015.
The Communications Sector also works closely with CS&C to support the Critical Infrastructure Cyber
Community (C³) Voluntary Program, which is the coordination point within the Federal Government for critical
infrastructure owners and operators interested in improving their cyber risk management processes. The Program
aims to help industry increase its cyber resilience and awareness, improve its use of the NIST Cybersecurity
Framework, and encourage organizations to manage cybersecurity as part of an all-hazards approach to enterprise
risk management.
In support of DHS reporting requirements, the CSCC independently develops an Annual Report outlining sector
activities undertaken the previous year to ensure the Nation’s communication networks and systems are secure,
resilient, and rapidly restored after a natural or manmade disaster. Given the diversity of fora and venues in which
the Communications Sector collaborates with government (at all levels) or other sectors, this Annual Report
intends to highlight the breadth of work and where that work is ongoing. This Annual Report is also consistent
with the CSCC’s role to provide visibility across the sector in areas of ongoing risk management activities.
To this end, the sector’s goals and objectives would be consistent with the language in Table 5-1 above.
Additionally, the CSCC is planning to develop and incorporate macro-level assurances in the form of aggregated,
quantitative metrics associated initially with the availability of communications critical infrastructure as part of
the industry-developed Sector Annual Report (SAR). The sector-developed SAR will then be provided to DHS, as
the Communications Sector SSA, as well as the CGCC, which includes the FCC and other government agencies.
Doing so ensures that (1) the various agencies that participate in the CGCC have visibility into efforts, initiatives,
and progress within the Communications Sector and (2) any information provided to support this initiative is
afforded the protections of CIPAC and Protected Critical Infrastructure Information (PCII).
In addition to the aggregated quantitative metrics, the sector anticipates that the SAR will also incorporate
qualitative or anecdotal examples, such as actions Communications Sector members have taken over the past year
to mitigate or recover from specific cyberattacks and/or incidents.
22
NIPP 2013: Partnering for Critical Infrastructure Security and Resilience
Table 5-2 shows how the sector’s priorities and objectives align to the NIPP 2013 CtA, which is how the sector
plans to report out on progress and measure effectiveness.