Securing funding from the four major broadband funding programs can provide significant resources to broadband service providers. These programs include complex requirements that providers must follow to access funds, particularly in relation to cybersecurity and supply chain risk management.
Below is a roadmap to help develop and maintain a functioning cybersecurity program for your organization, including steps that could help streamline the process by gathering data, devising policies and plans, and continuing remediation.
Several federal broadband and other funding programs contain cybersecurity and supply chain risk (SCRM) management requirements, including:
In general, these requirements relate to acknowledging cybersecurity and supply chain risk management standards, adopting plans within certain time frames, and updating those plans as necessary.
The Federal Communications Commission (FCC) has acknowledged the importance of cybersecurity and recognized the authority to address these issues by reclassifying broadband internet access service (BIAS) as a Title II service.
Federal broadband funding programs administered by the National Telecommunications and Information Administration (NTIA) and the Rural Utilities Service (RUS) also require prospective awardees to address certain cybersecurity and SCRM requirements. Within each of these requirements, there are themes that stand out and consistent across each of the rule sets.
Carriers need to have cybersecurity and supply chain risk management plans in place, and they need to be operational or able to be operational when service is provided.
Each of the rules point to the NIST Cybersecurity Framework (CSF), and in most cases the Cybersecurity and Infrastructure Security Agency (CISA) cross-sector cybersecurity performance goals (CPGs). The CPGs were specifically developed as a subset of cybersecurity practices for small- and medium-sized organizations.
The CPGs are being updated to reflect the latest version of the CSF and both cybersecurity and supply chain risk requirements are included.
So, where should carriers start? A few simple steps are noted below.
The first step in any project is data gathering—understanding where you are relative to where you need to get.
A gap assessment will provide this data, and highlight areas of compliance, noncompliance, and provide recommendations to remediate any areas that are weak.
Once the gaps are known and understood, policies and plans should be developed. A cybersecurity plan is more than just aspirations and forward-looking ideas. It’s more akin to a policy that asks what you’re going to do as part of cybersecurity and supply chain risk management.
The plan should include both things that are already in place and things you plan to put in place in the future. Any items in these documents that are still in the works should then be captured in a corrective action plan (CAP).
The CAP should identify:
The CAP is a living document. Update it on a regular basis so at any given point in time it’s an accurate reflection of your corrective actions.
Once you’ve checked something off the list, add it to a separate portion of the document to memorialize completed corrective actions. This way, any future outside parties, such as assessors or regulators, will know that you’ve followed through on resolving issues.
Once plans are documented, and corrective action plans are in place, cybersecurity programs have two parallel paths. Items in the CAP must be remediated over time, but there are also items that must be continuously executed to ensure the plans stay operational. Regular vulnerability scanning, annual penetration tests, and an annual third-party control assessment are required.
In the end, you have a functioning cybersecurity program, with built-in feedback loops and processes to continuously correct and improve the program.
Following are summaries of the cybersecurity and supply chain risk management plan requirements for federal broadband funding and universal service support programs.
Applicants were required to include a certification regarding compliance with cybersecurity and supply chain management requirements with the other application materials. Then, awardees (including prospective subgrantees) are required to complete certain actions within 12 months of accepting the funding award.
Steps to be taken include:
The BEAD program allocates funding to eligible entities, which are then responsible for awarding funds to subgrantees and ensuring all requirements are met. BEAD subgrantees are required to meet certain cybersecurity and SCRM requirements, the baseline for which is contained in the BEAD notice of funding opportunity (NOFO).
States can propose additional measures on subgrantees, and therefore the final requirements will be contained in each eligible entity’s BEAD program rules, typically in the Initial Proposal Volume II.
The baseline requirements adopted by NTIA in the NOFO include:
For the latest round of ReConnect broadband grant and loan funding, rural utilities service (RUS) requires that applicants:
“Demonstrate, prior to the signing of the award agreement, a concerted effort to consider and address cybersecurity risks consistent with the cybersecurity performance goals for critical infrastructure and control systems directed by the National Security Presidential Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems, or the current draft of these goals.”
The FCC adopted the E-ACAM program under its overall federal universal service fund (USF) rules to provide for additional support for broadband deployment and service sustainability.
As part of this program, electing providers were required to implement operational cybersecurity and SCRM plans by January 1, 2024, and consistent with the BEAD program, the plans are to reflect the latest version of the NIST Framework for Improving Critical Infrastructure Cybersecurity, and SCRM plans must incorporate key practices in NIST Report 8276. Any updates must be filed with USAC within 30 days.
To develop strategies to maintain compliance with cybersecurity and supply chain risk management requirements for federal broadband funding programs, please contact your Moss Adams professional.