The American public has been given 21 days to comment on the way security will be handled for the US 5G network, following a request posted by The National Telecommunications and Information Administration (NTIA).
As NextGov reports, the request concerns how 5G networks can work with the security strategy — the Secure 5G and Beyond Act of 2020 — proposed by the White House at the end of March and signed into law by the President that same day.
“In accordance with the Secure 5G and Beyond Act of 2020, the National Telecommunications and Information Administration, on behalf of the Executive Branch, is requesting comments to inform the development of an Implementation Plan for the National Strategy to Secure 5G,” reads the request posted by the NTIA.
A major part of the White House plan, as well as the Defense Department (DOD) security plan which was released on May 2nd, revolves around removing untrustworthy elements from the 5G supply chain.
Over the past year, the U.S. government has made no secret of its feelings toward Chinese tech giant Huawei and has tried to keep other countries around the world from allowing it access to their 5G networks in any capacity.
Part of the White House strategy would look to develop an incentives-based system that would encourage and drive allies away from using any sort of equipment associated with companies they consider adversarial, such as Huawei.
“The U.S. Government also encourages allies and partners to prioritize security considerations by avoiding untrusted and unreliable suppliers for their 5G networks, even as DoD seeks to be prepared to operate in all network environments,” reads the DOD’s strategic report.
For its part, the White House has pointed to the Federal Acquisition Security Council to play a big role in “preventing the use and procurement of sources or covered articles, which may include 5G equipment, in executive agency information systems.”
The DOD report also notes that operating on a “zero-trust” approach will allow it to manage risk and develop a develop a more secure network by adopting the strongest security practices like encryption and the “fine-grained management of authorities and information access.”