The Information Technology Sector is central to the nation's security, economy, and public health and safety. Businesses, governments, academia, and private citizens are increasingly dependent upon Information Technology Sector functions. These virtual and distributed functions produce and provide hardware, software, and information technology systems and services, and - in collaboration with the Communications Sector - the Internet. The sector's complex and dynamic environment makes identifying threats and assessing vulnerabilities difficult and requires that these tasks be addressed in a collaborative and creative fashion.
Information Technology Sector functions are operated by a combination of entities - often owners and operators and their respective associations - that maintain and reconstitute the network, including the Internet. Although information technology infrastructure has a certain level of inherent resilience, its interdependent and interconnected structure presents challenges as well as opportunities for coordinating public and private sector preparedness and protection activities.
The Information Technology Sector-Specific Plan details how the National Infrastructure Protection Plan risk management framework is implemented within the context of the unique characteristics and risk landscape of the sector. Each Sector-Specific Agency develops a sector-specific plan through a coordinated effort involving its public and private sector partners. The Department of Homeland Security is designated as the Sector-Specific Agency for the Information Technology Sector.
For resources available to Information Technology Sector partners, check out the links on the right hand sidebar.
DRAFT Security Tenets for Life Critical Embedded Systems
The Draft Security Tenets for Life Critical Embedded Systems provides core technical principles that serve as a starting point for industry-specific consortia and government groups to consider in developing standards and norms and for system developers to use in building or updating life critical embedded systems.
Comments are welcome and should focus on the completeness and correctness of the proposed security tenets, as well as how the document should be used to have the greatest impact in raising the security benchmark of life critical embedded systems.
Please submit any comments on Draft Security Tenets for Life Critical Embedded Systems by October 16, 2015.