Cybersecurity: Deterrence Policy
January 18, 2022
Many policymakers have embraced
deterrence as a driving policy position for addressing attacks
in cyberspace. However, deterring attacks remains elusive as nations disagree on acceptable
Chris Jaikaran
behavior and criminal groups proliferate. This CRS report examines the policy of deterrence,
Analyst in Cybersecurity
how it may be implemented, and options for Congress.
Policy
Deterrence policy relies on established rule of behavior, the ability to detect violations of those
rules, and capabilities to reliably employ against perpetrators. Efforts have been made to address
some of these policies, such as with establishing norms and improving attribution; however, work
remains for others.
Generally, cyberspace deterrence strategies seek to influence an adversary’s behavior, discouraging them from engaging in
unwanted activities. In contrast, denial strategies endeavor to improve a technology, process, or practice so that despite
adversarial ventures, a cyberattack might have a low rate of success. Congress and the President have a history and practice
in examining and implementing denial strategies, which may account for why many of these policy proposals have seen
progress. Conversely, deterrence strategies have been implemented at a lower rate, despite broad recommendations for their
use.
Cyberspace presents challenges for established deterrence strategy. Traditionally, deterrence relies on a few, known actors
having the resources to develop and maintain a capability (as well as the intent to use it), and a history of known
consequences being applied if norms are violated. Arguably, the inverse of these conditions exists in cyberspace. It is
relatively cheap for malicious actors to acquire the knowledge and tools necessary to conduct cyberattacks so there are many
potential adversaries, and there is ambiguity around retaliatory consequences for cyberattacks.
The Cyberspace Solarium Commission promoted a “layered cyber deterrence” strategic approach to addressing threats in
cyberspace. The concept was introduced in their final report and reiterated across subsequent white papers, where 109
recommendations for Congress and the President were made. As the second anniversary of the Commission’s final report
nears, their recommendations can be tracked by their implementation status and analyzed by how those recommendations
affect the strategic environment. Using taxonomies developed by the Department of Defense, the few recommendations that
would have a deterrence effect have not been implemented. Most of the Commission’s recommendations would deny an
adversary’s ability to conduct cyberattacks, and this may arguably create a secondary deterring effect. The deterrence
recommendations include working on norms, establishing responses to attacks, and improving government organization.
With regard to norms, two United Nations working groups have agreed to 11 norms of responsible state behaviors in
cyberspace. However, these norms are nascent and it remains to be seen how nations will adhere to and follow the norms.
The United States could lead in this space by directing agencies to actively participate in norms maturation and engage
international standards-setting bodies on information and communication technologies.
To bolster response capabilities to attacks, some have proposed declaring predictable response options. The European Union
developed a “Cyber Diplomacy Toolbox” describing the actions perpetrators may expect if they conduct cyberattacks against
member states. The United States has not publicly disclosed a menu of response options, but has used some in the past, such
as public attribution and sanctions. Policymakers may choose to direct the development of such an options list. But to be
effective as a deterrent, it would need to be consistently followed.
Lastly, to better structure federal governance of cyber deterrence, Congress and the executive branch have pursued the
creation of a bureau within the Department of State responsible for cyberspace diplomacy. Such a bureau could lead efforts
related to norms setting, foreign assistance, and confidence-building measures. However, outstanding questions for
policymakers exist, including how the bureau would coordinate with other federal agencies—many of which have significant
technical capabilities and already engage in international fora—and to what extent the bureau would be responsible for
representing the United States in multilateral and civil society fora addressing cybersecurity issues.
Congressional Research Service
link to page 4 link to page 4 link to page 6 link to page 8 link to page 9 link to page 12 link to page 15 link to page 15 link to page 17 link to page 18 link to page 18 link to page 10 link to page 14 link to page 5 link to page 19 link to page 19 link to page 29
Cybersecurity: Deterrence Policy
Contents
Introduction ................................................................................................................... 1
The Cyberspace Solarium Commission ......................................................................... 1
Deterrence Factors .......................................................................................................... 3
Limits Related to Cyber-Only Responses to Cyberattacks ................................................ 5
Norms ........................................................................................................................... 6
Response Options ........................................................................................................... 9
Options for Congress ..................................................................................................... 12
New State Bureau .................................................................................................... 12
International Norms and Standard Setting.................................................................... 14
Options to Mature Response Capabilities .................................................................... 15
Conclusion................................................................................................................... 15
Figures
Figure 1. Spectrum of Conflict .......................................................................................... 7
Figure 2. European Union Cyber Diplomacy Toolbox Actions.............................................. 11
Tables
Table 1. Count of Cyberspace Solarium Commission Recommendations ................................. 2
Table A-1. Cyberspace Solarium Commission Recommendations ......................................... 16
Appendixes
Appendix. Cyberspace Solarium Commission Recommendations ......................................... 16
Contacts
Author Information ....................................................................................................... 26
Congressional Research Service
Cybersecurity: Deterrence Policy
Introduction
The United States government has long sought to effectively deter (or stop) cyberattacks and to
respond to attacks in a manner that prevents future ones. Both goals have appeared elusive as the
frequency of cyberattacks, from petty to significant, have increased over time.1 These attacks
show that deterrence is difficult to achieve in cyberspace. There are nuances surrounding
cyberattacks that invert previous notions of deterrence policy. Despite chal enges, many regard
deterrence as a necessary step to establishing order for cyberspace operations, and as a building
block for future actions, and policymakers continue to pursue a strategy of deterrence for
cyberspace and cyberattack. This report analyzes the strategy of deterrence in relation to
cyberattacks and discusses options Congress may pursue in advancing deterrence policy.
In March 2020 the Cyberspace Solarium Commission (Commission) launched its report
advocating for a “layered cyber deterrence” strategic approach for cybersecurity.2 As the second
anniversary of the Commission’s report approaches, policymakers may seek to examine a
deterrence strategy in light of recent advancements in cybersecurity policy and recently evolved
cyberattacks.
While this report discusses deterrence policy strategical y, it does not discuss in depth potential
capabilities related to deterring cyberattack. Policies surrounding the use of instruments of
national power (e.g., diplomacy, intel igence activities, armed forces, and sanctions) are not
significantly discussed in this report.3 Types of attacks also are not discussed in this report, as
deterrence policy is intended to apply broadly to al types of attacks.4
The Cyberspace Solarium Commission
The John. S. McCain National Defense Authorization Act for Fiscal Year 2019 (FY2019 NDAA,
P.L. 115-232) established the Cyberspace Solarium Commission (Section 1652) to develop
approaches to defend the United States against significant cyberattacks. The FY2019 NDAA
expressly directed the Commission to examine policies around norms, denial, and deterrence. The
statute directed the Commission:
To review and make determinations on the difficult choices present within such options,
among them what norms-based regimes the United States should seek to establish, how the
United States should enforce such norms, how much damage the United States should be
willing to incur in a deterrence or persistent denial strategy, what attacks warrant response
in a deterrence or persistent denial strategy, and how the United States can best execute
these strategies.
In its final report, the Commission advocated for a strategic approach of
layered cyber
deterrence and promoted three ways to achieve this end state.
1 Embroker, “2021 Must -Know Cyber Attack Statistics and T rends,” webpage,
December 10, 2021, at
https://www.embroker.com/blog/cyber-attack-statistics/.
2 Cyberspace Solarium Commission, final report, March 2020, at https://drive.google.com/file/d/
1ryMCIL_dZ30QyjFqFkkf10MxIXJGT 4yv/view. Also, see CRS In Focus IF11469,
The Cyberspace Solarium
Com m ission: Illum inating Options for Layered Deterrence, by Chris Jaikaran.
3 A discussion of the use of military force in cyberspace may be found in CRS In Focus IF11995,
Use of Force in
Cyberspace, by Catherine A. T heohary.
4 Cyberattacks and a discussion of them may be found in CRS Report R46974,
Cybersecurity: Selected Cyberattacks,
2012-2021, by Chris Jaikaran.
Congressional Research Service
1
link to page 19 link to page 6 link to page 5 link to page 12
Cybersecurity: Deterrence Policy
Shape Behavior—working with partners to influence how parties act in
cyberspace.
Deny Benefits—securing critical networks (e.g., infrastructures and
governments) and working to create systemic security and resiliency in
cyberspace.
Impose Costs—retaliating against malicious actors who use cyberspace to harm
the United States.
The Commission viewed “deterrence [as] an enduring American strategy.”5 In the Commission’s
view, deterrence is about imposing costs on adversaries. Within the confines of the report, the
Commission saw deterrence incorporating two concepts. First, the Commission acknowledges
that many of their recommendations are designed to achieve deterrence through denial—that is,
improving defense so to make it more expensive for adversaries to carry out attacks. Second, the
strategy promotes defending forward—that is, continual y detecting, hunting, and opposing
adverse behavior in cyberspace to increase their costs of operating.
Since the report’s release, the Commission has published additional white papers, legislative
proposals, and a progress report. The Commission recommended 109 actions in those documents
that Congress and the President could take to implement this strategic approach. A list of the
recommendations and their status can be found in t
he Appendix. Using descriptions of denial and
deterrence (found in
“Deterrence Factors” section) the recommendations are analyzed and
arranged according to their ability to enable strategies of denial, deterrence, or bot
h. Table 1 provides a count of the recommendations by their implementation status (i.e., some action taken
by the President or Congress) and strategy categorization.
Table 1. Count of Cyberspace Solarium Commission Recommendations
By Recommendation Status and Strategy Categorization
Recommendation Status
Deny
Deter
Both
Implemented
11
0
10
Nearing Implementation
10
1
6
On Track
28
4
15
Delayed
8
2
0
Significant Barriers
3
0
1
TOTAL
60
7
42
Source: CRS analysis of Cyberspace Solarium Commission, “2021 Annual Report on Implementation,” report,
August 2021, at https://drive.google.com/file/d/19V7Yfc5fvEE6dGIoU_7bidLRf5OvV2__/view.
Examining the distribution and status of recommendations, the lower number of deterrence-
related recommendations and their comparative lack of implementation stands out. This may be
because of the relative difficulty of implementing deterrence policy, which is discussed in the
“Response Options” section of this report. It may also be because denial strategies are more direct
and Congress has experience addressing those types of activities.
For instance, some denial activities that have been implemented through recently enacted
legislation seek to strengthen the authorities of the Cybersecurity and Infrastructure Security
5 Cyberspace Solarium Commission, “Report,” webpage, February 12, 2021, at https://www.solarium.gov/report.
Congressional Research Service
2
Cybersecurity: Deterrence Policy
Agency (CISA)6 and address a perceived gap in national cybersecurity resiliency by improving
kindergarten to high school cybersecurity capabilities.7 In addition, the Fiscal Year 2022 National
Defense Authorization Act included provisions pertaining to vulnerability identification (Section
1544) and information sharing (Section 1548).8 In these examples, Congress passed legislation
implementing one or more of the Commission’s recommendations, and in both sets of examples
the recommendations affected domestic actors for which legislation or executive action is directly
effective.
Some recommendations—such as those related to exercises—may enable both strategies.
Exercises may promote denial (i.e., hindering or preventing an adversary from launching
successful attacks) by building partner confidence in capabilities and use of those capabilities so
that further coordinated actions are possible. Exercises may also promote deterrence (i.e.,
influencing adversaries’ behaviors) by showing cyber operation capabilities in an effort to
highlight that the capabilities wil outmatch an opponent’s.9
Deterrence Factors
While Congress and the President have pursued policies of deterrence in cyberspace, their actions
to date have primarily focused on denying adversarial actions. At times, this focus is intentional;
the Department of Defense’s (DOD) strategy of “persistent engagement” seeks to occupy
adversaries and deny them the time and resources to carry out attacks.10 At times, it is
consequential, such as pursuing strategies to impose costs on adversaries, thus denying gains of
attacks or resources for future attacks. Because of this historical prominence of implementing
denial strategies, it may be helpful to consider deterrence policy contrasted against denial policy
for context and comparison.
Denial and deterrence cybersecurity strategies are different approaches to achieve the same goal:
a safer digital environment. These strategies are not mutual y exclusive. As seen by the
Commission’s recommendations, particular activities can serve both strategies, and combining
activities can have a multiplier effect on the actions.
General y, for cybersecurity, denial strategies seek to improve technology, processes, and
practices over something in one’s own control so that despite an adversary’s efforts, their success
rate is low. Deterrence strategies seek to affect the behavior of other individuals or entities—
stopping them from engaging in an unwanted activity. The DOD developed descriptions of
“denial” and “deterrence,” which are used in this report in the context of cybersecurity to
categorize activities and provide a framework for discussing policy options.
6 P.L. 116-283, §1716.
7 P.L. 117-47.
8 P.L. 117-81.
9 An example of an information sharing-related recommendation is 3.3.4 on expanding coordinated cyber exercises. For
further information on the utility of cyber exercises, see National Security Archive, “ BALT IC GHOST :
Supporting
NAT O in Cyberspace,” webpage, December 6, 2021, at https://nsarchive.gwu.edu/briefing-book/cyber-vault/2021-12-
06/baltic-ghost -supporting-nato-cyberspace.
10 Department of Defense, “Summary, Department of Defense Cyber Strategy,” 2018, at https://media.defense.gov/
2018/Sep/18/2002041658/-1/-1/1/CYBER_ST RAT EGY_SUMMARY_FINAL.PDF.
Congressional Research Service
3
Cybersecurity: Deterrence Policy
Glossary
Denial
A denial measure is an action to hinder or deny the enemy the use of territory, personn el, or
facilities. It may include destruction, removal, contamination, or erection of obstructions.11
Deterrence
Deterrence prevents adversary action through the presentation of a credible threat of
unacceptable counteraction and belief that the cost of the action outweighs the perceived
benefits.12
The definition of denial can be interpreted as stopping the adversary from using something. For
this interpretation, many potential cybersecurity activities satisfy the definition. For example,
disrupting an adversary’s internet infrastructure (e.g., a botnet13) inhibits their malicious use of
cyberspace as a domain, and proper configuration and maintenance of one’s own information and
communications technology (ICT) denies an adversary the opportunity to exploit it. Unique to
this interpretation is the focus not on the adversaries themselves, but instead on the things they
seek to exploit (e.g., unpatched ICT).
The definition of deterrence can be interpreted as influencing the adversary in such a way as to
prevent their engaging in malicious behavior. In this model, deterrence relies on norms and
demonstrated capabilities. Nations wil need to understand what other nations consider acceptable
versus unacceptable (violating) behaviors, a government wil need capabilities to influence the
behavior of other governments as wel as non-state actors, other nations wil need to believe that
the capabilities wil be used, and the government’s intentions wil need to be messaged to
potential adversaries. It is arguable that for cyberspace, these conditions are nascent or do not
exist.
Conventional deterrence policy relies on a few conditions: there is a high cost to develop,
maintain, and use certain offensive capabilities; there are a limited set of actors with those
capabilities; if actors choose to use the capabilities, then they wil incur known consequences; and
there is a history of norms compliance upon which to rely.14
Cyberspace arguable is characterized by the inverse of those conditions: the cost of entry for
potential malicious actors is low; there are many potential malicious actors to address (both state
and non-state); the retaliatory consequences for successful cyberattacks are ambiguous or
unknown; and there is not a long history of norms compliance.
It is for this reason that some suggest that deterrence in cyberspace is not a viable strategy.15 The
Commission recognized that Cold War-era analogies of deterrence are likely not applicable in
cyberspace, yet considered that some form of deterrence may be achievable, especial y through
improved security measures and behavior shaping.16
11 Joint Chiefs of Staff,
Joint Operations, Joint Publication 3-0, October 22, 2018, at https://www.jcs.mil/Portals/36/
Documents/Doctrine/pubs/jp3_0ch1.pdf.
12 Joint Chiefs of Staff,
Barriers, Obstacles, and Mine Warfare for Joint Operations, Joint Publication 3-15,
Washington, DC, March 5, 2018, pp. II-7, https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_15.pdf.
13 “T he word ‘
botnet’ is formed from the words ‘robot’ and ‘network.’ Cyber criminals use special T rojan viruses to
breach the security of several users’ computers, take control of each computer, and organize all the infected machines
into a network of “bots” that the criminal can remotely manage.” National Institute of Standards and T echnology,
“Botnet” glossary entry, at https://csrc.nist.gov/glossary/term/botnet.
14 Director of National Intelligence,
Global Trends 2040: A More Contested World, March 2021, at
https://www.dni.gov/files/ODNI/documents/assessments/GlobalT rends_2040.pdf.
15 Michael Fischerkeller and Richard Harknett, “Deterrence Is Not a Credible Strategy for Cyberspace,”
Foreign Policy
Research Institute, Summer 2017, pp. 381-393.
16 “T he Process of the U.S. Cyberspace Solarium Commission—CyCon 2021,” NAT O Cooperative Cyber Defence
Congressional Research Service
4
Cybersecurity: Deterrence Policy
For deterrence activities, it is important to consider non-cyberspace-based responses to
cyberspace-based incidents. Cybersecurity experts can help identify and frame issues to consider
when examining deterrence strategies, but the range of activities available to government
agencies to influence adversaries is far greater than those within the cybersecurity field. Experts
across fields wil be necessary to provide multidisciplinary solutions for effective deterrence
strategies. Experts to consider consulting when drafting deterrence actions include those for
specific countries (e.g., Russia, China, North Korea and Iran)17 and experts in the capabilities
policymakers are seeking to employ (e.g., diplomatic, intel igence, military, or economic). This
position is reinforced by cybersecurity experts who view cyberattacks as a chal enge for the
computer science community, but for which solutions cannot be purely technical.18
It has long been the policy of the United States government that responses to cyberattacks wil be
proportional, but may not be limited to cyberspace operations only.19 Experts believe that the U.S.
government has not fully embraced this posture, but doing so may be necessary to deter future
cyberattacks.20
Limits Related to Cyber-Only Responses to Cyberattacks
Some Members of Congress have expressed frustration with the lack of public discourse
surrounding cyberattacks and the U.S. government’s response capabilities.21 Such discussions are
frequently held in classified venues, thereby excluding public scrutiny. While this practice may
limit debate, offensive cyber response capabilities are a fragile resource, and publicizing them
may reduce their effectiveness.
For a government, it takes research and operational security to discover, develop, and deploy
offensive cyber capabilities in a manner that al ows for repeated use and covert or clandestine
action. This is especial y true for attacks on systems that have regimented security procedures,
such as those of a foreign government agency.
The moment an attack is discovered, access to the breached systems may start to disappear,
evidence may be collected that attributes the attack to those behind it, and additional operations
they have may become vulnerable, especial y if they shared operational infrastructure or
techniques, tactics or procedures. In the event that the United States were to have its capabilities
disclosed as part of public discourse, it too may lose the ability to use those capabilities.
For the public debate on capabilities, it is also important to consider the difference between
conventional weapons and offensive cyber capabilities. Conventional weapons are developed for
Center of Excellence, May 25-28, 2021, at https://www.youtube.com/watch?v=OBUy7aGNiCQ.
17 For more information on attacks from these countries, see CRS Report R46974,
Cybersecurity: Selected
Cyberattacks, 2012-2021, by Chris Jaikaran.
18 Dmitri Alperovitch, “The Case for Cyber-Realism: Geopolitical Problems Don’t Have T echnical Solutions,”
Foreign
Affairs, January/February 2022, at https://www.foreignaffairs.com/articles/united-states/2021-12-14/case-cyber-
realism.
19 Intelligence Matters Podcast, “National Cyber Director Chris Inglis on Deterring Cyber T hreats,”
CBS News,
November 24, 2021, at https://www.cbsnews.com/news/national-cyber-director-chris-inglis-cyber-threats-intelligence-
matters-podcast/.
20 Sue Gordon and Eric Rosenbach, “America’s Cyber-Reckoning: How to Fix a Failing Strategy,”
Foreign Affairs,
January/February 2022, at https://www.foreignaffairs.com/articles/united-states/2021-12-14/americas-cyber-reckoning.
21 For an example, see U.S. Congress, House Committee on Oversight and Reform,
Cracking Down on Ransomware:
Strategies for Disrupting Crim inal Hackers and Building Resilience Against Cyber Thre ats, 117th Cong., 1st sess.,
November 16, 2021.
Congressional Research Service
5
link to page 10
Cybersecurity: Deterrence Policy
use
in a domain. Defending against those weapons may also use some other tool applied
in that
domain. For example, a bal istic missile may be intercepted by an anti-bal istic missile system in
the air before it hits the intended target.22 However, an offensive cyber capability usual y exploits
a weakness
against the domain—or a weakness against a system or network itself in cyberspace.
Thus, defending against a cyberattack may include the development and use of a new tool, or
patching an existing system to mitigate the effect of an offensive cyber tool.
Norms
“Norms,” some experts assert, “can be understood as rules for behaving that forbid or encourage
certain activities.”23 A chal enge to normative behavior in cyberspace is that cyberspace is a
domain where behaviors occur, and cyberspace operations are tools of national power that nations
may choose to employ. As Congress examines cyberattacks and responses to them, it may be
helpful to consider the duality that cyberspace is both a domain and a capability. For example,
cyberattacks can occur within cyberspace (e.g., data and identity theft attacks) and can occur
against cyberspace itself (e.g., attacks against cloud service providers). In both types of attacks
information and communications technology (ICT) is used and harmed, and it is that harm that
nations may seek to curtail with norms.
The development of norms in the context of deterring cyberattacks is further complicated by the
fact that cyber operations can occur across the entire spectrum of conflict ranging from localized,
non-violent incidents to far more consequential events with potential y national consequences. As
shown i
n Figure 1, the Office of the Director of National Intel igence sees cyber operations as
spanning the full range of such incidents.
22 For information on ballistic missile defense, see CRS In Focus IF10541,
Defense Primer: Ballistic Missile Defense,
by Stephen M. McCall.
23 Dr. Martin C. Libicki, “Norms and Normalization,”
The Cyber Defense Review, Summer 2020, at
https://cyberdefensereview.army.mil/Portals/6/CDR%20V5N1%20-%2004_Libicki_WEB.pdf.
Congressional Research Service
6
Cybersecurity: Deterrence Policy
Figure 1. Spectrum of Conflict
Source: Adapted from Director of National Intel igence,
Global Trends 2040: A More Contested World, March
2021, at https://www.dni.gov/files/ODNI/documents/assessments/GlobalTrends_2040.pdf.
Notes: WMD=Weapons of Mass Destruction.
Aggressive nations may explore the use of limited cyberspace operations as an alternative to other
types of attacks and opt to use cyberattacks as a tool to reduce other forms of conflict. Cyberspace
operations may be adopted by adversarial nations if they believe that victim nations wil adhere to
a norm that responses to aggression be proportional. If aggressive nations pursue this strategy, it
is likely that cyberattacks wil increase in frequency as a tool in the lower spectrum of attacks.24
This strategy would seek to force proportional (i.e., cyber) response from victim nations and seek
to inhibit the use of other instruments of national power.
For example, it is not normative for military capabilities to be used in response to criminal
activity. However, repeated cyberattacks have led policymakers to explore novel uses of
capabilities as adversaries have escalated attacks and the impacts of those attacks have become
more severe. One such case is the combatting of ransomware, which has the effect of degrading
U.S. infrastructure in a way that may result in the endangerment of civilian populations (e.g., a
ransomware attack against a hospital).25 In response, decisionmakers have employed military
capabilities to learn about ransomware gangs and move against them.26
24 Director of National Intelligence,
Global Trends 2040: A More Contested World, March 2021, at
https://www.dni.gov/files/ODNI/documents/assessments/GlobalT rends_2040.pdf.
25 Ransomware-as-a-Service (Raas) operators are able to replicate and deploy potentially destructive attacks across a
variety of potential victims, many times over, without regard for the business or services that the victims provide.
26 Julian E. Barnes, “U.S. Military Has Acted Against Ransomware Group, General Acknowledges,”
New York Times,
December 5, 2021, at https://www.nytimes.com/2021/12/05/us/politics/us-military-ransomware-cyber-command.html.
Congressional Research Service
7
Cybersecurity: Deterrence Policy
Cyberattacks may increase because nations view cyberspace as a novel operational domain
without established rules of engagement. In such a lax environment, opportunities to test
techniques, tactics, and procedures are plentiful both for attacks and responses. The National
Intel igence Council assessed the outlook for international norms.27 That assessment placed
norms on a spectrum:
Norms least likely to be contested are those that are broadly accepted by nations
and for which violations are widely condemned (e.g., national sovereignty).
Norms likely to experience regional variations are those where their acceptance
is not broad (e.g., environmental protections).
Norms at risk of weakening are those for which a major national power has
already breached it or for which implementation has been curtailed (e.g., open
commerce).
Norms in early development are those not fully agreed to, not widely accepted, or
for which a future is unclear (e.g., cybersecurity).28
Concurrently, two United Nations working groups have developed a common set of norms for
responsible state behavior in cyberspace. The first is the Group of Governmental Experts on the
Developments in the Field of Information and Telecommunications in the Context of
International Security (GGE). It is the older and smal er of the two with 25 member nations. The
second group is the Open-Ended Working Group (OEWG), which is newer and larger and
includes any interested nation. Russia was an original sponsor of this group, despite the existence
of the GGE. The United States was an original supporter of the GGE and participated in the
OEWG discussions.
In 2015, the GGE published a note where the group agreed to 11 norms.29 In 2021, the OEWG
released their final substantive report reinforcing those same 11 norms.30 These norms for
responsible state behavior in cyberspace are:
1. Nations agree to cooperate;
2. Nations wil consider al source information when making claims of attribution;
3. Nations wil not knowingly al ow their territory to be used to conduct
cyberattacks;
4. Nations wil share information;
5. Nations wil respect human rights and secure ICTs to do so;
6. Nations wil not knowingly use ICT to damage critical infrastructure;
7. Nations wil appropriately protect their own critical infrastructure;
8. Nations wil respond to requests for assistance from other nations;
9. Nations wil take steps to secure supply chains;
27 Director of National Intelligence,
Global Trends 2040: A More Contested World, March 2021, at
https://www.dni.gov/files/ODNI/documents/assessments/GlobalT rends_2040.pdf.
28 Ibid.
29 Note by the Secretary General, “Report of the Group of Governmental Experts on Developments in the Field of
Information and T elecommunications in the Context of International Security,” A/70/174, July 22, 2015, at
https://undocs.org/pdf?symbol=en/A/70/174.
30 Open-Ended Working Group on Developments in the Field of Information and T elecommunication s in the Context
of International Security, “Final Substantive Report,” A/AC.290/2021/CRP.2, March 10, 2021, at https://front.un-
arm.org/wp-content/uploads/2021/03/Final-report-A-AC.290-2021-CRP.2.pdf.
Congressional Research Service
8
Cybersecurity: Deterrence Policy
10. Nations wil support the reporting of vulnerabilities; and
11. Nations wil not attack computer emergency response teams.
Relative to other international norms—such as those related to national sovereignty and
defense—cybersecurity norms are in early development and adoption. It remains to be seen how
nations wil operate within those norms.31
The U.S. government has already taken overt actions in support of some of these norms. For
example, the U.S. Intel igence Community published a white paper on attributing cyberattacks
that takes into consideration open-source information.32 Federal agencies have launched efforts
for supply chain security and vulnerability disclosure.33 Congress has directed federal agencies to
engage partner nations for cybersecurity and increase information sharing activities.34
The U.N.’s ICT security efforts have been following a dual path of security fields. The first field
addresses demilitarization, de-escalation, and prevention as they relate to nation-state actors. That
is the field under which these 11 norms were developed. The second field is on cybercrime and
non-state actors. Russia proposed a U.N. resolution to establish an ad-hoc group to address
cybercrime and state sovereignty, which was agreed to by the General Assembly.35 Some
observers believe this is an effort to replace the existing order on international cybercrime and
internet freedoms.36
Regardless of a nation’s intentions behind engaging in norms-setting activities, many nations
agree that norms development is a worthy pursuit. While development is occurring, it is important
to consider that these efforts are the beginning of a lengthy process. It takes time for norms to be
developed and agreed to. It takes even more time for states to change their behavior and the
norms to become common practice. Despite the far-off potential for return on investment, experts
believe that norms are a vital pursuit, necessary for peaceful operations in cyberspace.37
Response Options
Certainly, having the ability to determine perpetrators is a key element to deterrence. If
perpetrators believed that they would never be identified, then they would not have to fear
retaliatory action. Historical y, barriers to effective response have included the difficulty in
adequately attributing cyberattacks, the time it takes to do so, and the availability of information
for public discussion related to attribution. However, the U.S. government has recently released
31 Director of National Intelligence,
Global Trends 2040: A More Contested World, March 2021, at
https://www.dni.gov/files/ODNI/documents/assessments/GlobalT rends_2040.pdf.
32 Office of the Director of National Intelligence, “A Guide to Cyber Attribution,” memo, September 14, 2018, at
https://www.dni.gov/files/CT IIC/documents/ODNI_A_Guide_to_Cyber_Attribution.pdf.
33 Cybersecurity & Infrastructure Security Agency, “Information and Communications T echnology (ICT ) Supply Chain
Risk Management (SCRM) T ask Force,” website, at https://www.cisa.gov/ict-scrm-task-force. Cybersecurity &
Infrastructure Security Agency, “Develop and Publish a Vulnerability Disclosure Policy,”
Binding Operational
Directive 20-01, September 2, 2020, at https://cyber.dhs.gov/bod/20-01/.
34 United States-Israel Advanced Research Partnership Act of 2016 (P.L. 114-304).
35 United Nations, “ General Assembly Adopts Resolution Outlining T erms for Negotiating Cybercrime T reaty amid
Concerns over ‘Rushed’ Vote at Expense of Further Consultations,” press release, May 26, 2021, at
https://www.un.org/press/en/2021/ga12328.doc.htm.
36 Joyce Hakmeh and Allison Peters, “ A New UN Cybercrime T reaty? T he Way Forward for Supporters of an Open,
Free, and Secure Internet ,”
Council on Foreign Relations Blog, January 13, 2020, at https://www.cfr.org/blog/new-un-
cybercrime-treaty-way-forward-supporters-open-free-and-secure-internet.
37 Joseph S. Nye, Jr., “T he End of Cyber-Anarchy? How to Build a New Digital Order,”
Foreign Affairs,
January/February 2022, at https://www.foreignaffairs.com/articles/world/2021-12-14/end-cyber-anarchy.
Congressional Research Service
9
Cybersecurity: Deterrence Policy
information on a slew of cyberattacks, attributing them not just to nations or criminal
organizations, but to individuals. The government has decreased the time it takes to make these
attributions and has also made public the information agencies used to determine potential y
guilty parties. A further discussion of attribution can be found in CRS Report R46974,
Cybersecurity: Selected Cyberattacks, 2012-2021, by Chris Jaikaran. While work remains to
improve confidence in attribution and decrease the time it takes to attribute attacks, it appears that
attribution is no longer the barrier it used to be.
Having a level of attribution is a key step in responding to cyberattacks. But once a nation has
confidence in potential perpetrators, the nation wil need to decide if tools wil be employed
against those perpetrators, which tools against which perpetrators, and for how long.
Identifying a slate of options that nations intend to use in response to cyberattacks serves two
potential purposes: (1) it signals to adversaries the actions victim nations are prepared to engage
in to retaliate for attacks; and (2) it publicizes the options for its citizens so that they may debate
with their elected leaders the appropriateness and suitability of those options. A long standing
criticism of cyberattack response in the United States is that the federal government has not
revealed its menu of options. This is despite both congressional38 and executive39 direction to the
U.S. Department of State to report on cyberspace policy.
The State Department has issued papers discussing elements of the policies but has general y not
discussed specific retaliatory options publicly.40 Some have argued that limiting public
information about exact plans al ows the United States to remain agile in its response.41 While
discussing specific and technical responses to cyberattacks with offensive cyber capabilities may
be chal enging, a general discussion of tools available to the U.S. government and conditions
under which certain tools may be deployed is not. The National Cyber Director, Chris Inglis,
acknowledged the importance of al instruments of national power when bringing accountability
to cyberspace, as wel as the utility of the National Security Council in coordinating those tools:42
The role of the national security council, which outside of cyberspace is accountable to use
all the instruments of power that this nation can bring to bear—diplomacy, intelligence,
military resources, financial resources, sanctions that might be applied—to bring about the
proper conditions in all domains, not least of which [is] cyberspace.
Other governments have general y shown a wil ingness to more openly discuss options to respond
to cyberattacks. The European Union (EU) developed the “Cyber Diplomacy Toolbox” to list and
describe actions the EU may take in response to cyberattacks, depending on the level of
confidence in attribution a victim member state has in the perpetrator, and the level of
38 P.L. 114-113, Division N, §402.
39 Executive Office of the President, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,”
82
Federal Register 22391-22397, May 11, 2017.
40 For examples, see the following: Department of State, “Department of State International Cyberspace Policy
Strategy,” March 2016, at https://2009-2017.state.gov/documents/organization/255732.pdf; Department of State,
“Recommendations to the President on Deterring Adversaries and Better Protecting the American People from Cyber
T hreats,” May 31, 2018, at https://www.state.gov/wp-content/uploads/2019/04/Recommendations-to-the-President-on-
Deterring-Adversaries-and-Better-Protecting-the-American-People-From-Cyber-Threats.pdf; and Department of State,
Recommendations to the President on Protecting American Cyber Interests through International Engagement,” May
31, 2018, at https://www.state.gov/wp-content/uploads/2019/04/Recommendations-to-the-President -on-Protecting-
American-Cyber-Interests-Through-International-Engagement.pdf.
41 CSIS, “Discussing the UN OEWG with the Mother of Norms,” Inside Cyber Diplomacy podcast, March 26, 2021, at
https://www.csis.org/podcasts/inside-cyber-diplomacy.
42 U.S. Congress, House Committee on Oversight and Reform,
Cracking Down on Ransomware: Strategies for
Disrupting Crim inal Hackers and Building Resilience Against Cyber Threats, 117th Cong., 1st sess., November 16,
2021.
Congressional Research Service
10
link to page 14
Cybersecurity: Deterrence Policy
coordination necessary to effectively implement the action.
Figure 2 list the actions in the Cyber
Diplomacy Toolbox. The policy is stil relatively new and how the EU chooses to adhere to it in
the future remains to be seen. Key elements to response certainty include having stated
consequences to cyberattacks and reliably executing the actions that deliver those consequences.
Figure 2. European Union Cyber Diplomacy Toolbox Actions
By Attribution Confidence
Source: Erica Moret and Patryk Pawlak, “The EU Cyber Diplomacy Toolbox: Towards a Cyber Sanctions
Regime?”
European Union Institute for Security Studies, July 2017, at https://www.iss.europa.eu/sites/default/files/
EUISSFiles/Brief%2024%20Cyber%20sanctions.pdf.
Notes: European Union (EU). High Representative for the Union for Foreign Affairs and Security Policy
(HR/VP).
Congressional Research Service
11
link to page 6
Cybersecurity: Deterrence Policy
The existence of potential response options a nation may employ against cyberattack perpetrators
need not bind that nation only to those options. As a deterrence tool, stated options can create
potential fear of reprisal on the part of the attacker. Discussions on which tools may be publicly
disclosed as possible responses presents an opportunity to engage the international community in
norms-setting activities and developing normative behavior. Both may provide paths for increased
stability in cyberspace.43
Options for Congress
Over the past two years, the number of denial recommendations made by the Commission and
acted upon by Congress or the President has outpaced those for dedicated deterrence activities. As
discussed in
“Deterrence Factors,” Congress and the President have a history of pursuing and
implementing strategies of denial to achieve cybersecurity.
Outstanding policy recommendations related to deterrence include:
Creating a bureau in the U.S. Department of State (nearing implementation);
Strengthening norms of responsible state behavior in cyberspace (on track);
Engaging in international standards setting fora (on track);
Improving capability building and foreign assistance financing (on track);
Developing confidence building measures (delayed);
Leveraging sanctions and trade enforcement actions (on track); and
Improving attribution (delayed).
These recommendations are further discussed below. Policymakers may choose to examine
options to deter cyberattacks by creating government agencies to specifical y address deterrence
policy with al ies and adversaries, advocating for the development and adoption of international
norms and standards, and maturing certainty of response options.
New State Bureau
The Commission identified a chal enge with addressing cyberattacks in the U.S. government;
namely, that government activities are federated.44 That is to say that agencies are independently
authorized and it is at the Executive Office of the President where agency activities are regularly
coordinated. The Commission recommended the creation of a National Cyber Director within the
Executive Office of the President to oversee interagency activities related to national
cybersecurity, which was enacted through the Wil iam M. (Mac) Thornberry National Defense
Authorization Act for Fiscal Year 2021.45
Another Commission recommendation relates to the creation of a bureau within the State
Department to address cyberspace issues. Such a bureau was initiated during the Trump
43 International Security Advisory Board, “A Framework for International Cyber Stability,” report, July 2, 2014, at
https://2009-2017.state.gov/documents/organization/229235.pdf.
44 For examples, see the following: U.S. Government Accountability Office,
Cybersecurity: Clarity of Leadership
Urgently Needed to Fully Im plem ent the National Strategy, GAO-20-629, September 22, 2020, pp. 42-56,
https://www.gao.gov/assets/gao-20-629.pdf; and Cyberspace Solarium Commission,
Final Report, Washington, DC,
March 2020, pp. 142-143.
45 P.L. 116-283, §1752. 6 U.S.C. §1500.
Congressional Research Service
12
Cybersecurity: Deterrence Policy
Administration—the Cyberspace Security and Emerging Technologies Bureau46—to lead U.S.
government diplomatic efforts on cybersecurity. The Government Accountability Office (GAO)
found that its establishment was hasty and its responsibilities and relationships were il -defined.47
The Biden Administration halted progress on the bureau until October 2021. Secretary Blinken
has since announced the creation of two new positions at the State Department to address cyber
and digital concerns.48 The first would be an ambassador-at-large heading the Bureau of
Cyberspace and Digital Policy, and would focus on cybersecurity deterrence, policy, and
negotiations. The second would be a Special Envoy for Critical and Emerging Technology, and
would be responsible for coordinating policy with partner nations on artificial intel igence,
quantum computing, and other technology-related fields. These developments came after the
House of Representatives passed the Cyber Diplomacy Act of 2021 (H.R. 1251) authorizing a
Bureau of International Cyberspace Policy.49
As Congress and the Administration advance plans to create a unit within the State Department
focused on cyber issues, there remain outstanding concerns that policymakers may choose to
address and conduct oversight on. GAO found that the State Department did not coordinate with
other federal agencies during their first effort to create a bureau, and recommended it do so going
forward.50 Other agencies play a substantial role in international discussions on cyber norms and
standards, engage in operations with partner nations, and house expertise on technical matters
related to cyberspace. Should the State Department proceed with independently forming and
empowering a bureau, the potential for policy fragmentation and duplication of efforts may
compound.51
Largely unaddressed in previous efforts to create a new bureau in State is how it would engage
with partner nations (e.g., EU member states), multinational bodies researching cybersecurity
(e.g., NATO’s Cooperative Cyber Defence Centre of Excel ence),52 or civil society efforts related
to cybersecurity norm building (e.g., the Paris Cal ).53 Engaging in these types of international
fora provides opportunities for the United States to lead policy development and model desirable
behaviors for cyberspace engagement and operations.
46 U.S. Department of State, “Secretary Pompeo Approves New Cyberspace Security and Emerging T echnologies
Bureau,” press release, January 7, 2021, at https://2017-2021.state.gov/secretary-pompeo-approves-new-cyberspace-
security-and-emerging-technologies-bureau/index.html.
47 U.S. Government Accountability Office,
Cyber Diplomacy; State Should Use Data and Evidence to Justify Its
Proposal for a New Bureau of Cyberspace Security and Em erging Technologies, GAO-21-266R, January 28, 2021,
https://www.gao.gov/products/gao-21-266r.
48 Dustin Volz, “State Department to Form New Cyber Office to Face Proliferat ing Global Challenges,”
Wall Street
Journal, October 25, 2021, at https://www.wsj.com/articles/state-department -to-form-new-cyber-office-to-face-
proliferating-global-challenges-11635176700.
49 Passed the U.S. House of Representatives on April 20, 2021.
50 CRS In Focus IF10541,
Defense Primer: Ballistic Missile Defense, by Stephen M. McCall; U.S. Government
Accountability Office,
Priority Open Recom m endations: Departm ent of State, GAO-21-457pr, May 19, 2021, pp. 3-4,
https://www.gao.gov/assets/gao-21-457pr.pdf.
51 Ibid.
52 North Atlantic T reaty Organization, “The NAT O Cooperative Cyber Defence Centre of Excellence Is a Multinational
and Interdisciplinary Hub of Cyber Defence Expertise,” webpage, at https://ccdoe.org.
53 Paris Call for T rust and Security in Cyberspace, “Paris Call” webpage, at https://pariscall.international/en.
Congressional Research Service
13
Cybersecurity: Deterrence Policy
International Norms and Standard Setting
Two Commission recommendations address cybersecurity norms: one discusses advancing norms
and the other makes suggestions around engaging international bodies on ICT standards
development. These activities have the potential for the United States to model behaviors and
lead the development of international order and ICT operations.
To some extent, the United States engages in these activities today. The State Department’s Office
of the Coordinator for Cyber Issues (S/CCI)54 worked on developing the 11 norms of responsible
state behavior in cyberspace and many federal agencies participate in international standards
development activities.55
Should policymakers choose to pursue options to advance international norms and/or the
strengthening of the United States’ role in norms setting, there are both existing and new
opportunities to do so. Congress may choose to direct an agency to coordinate federal activities
on norms setting, or provide expertise to another agency to inform norms development and
advancement activities. This is commonly done for other cybersecurity activities today. For
example, the Cybersecurity Act of 2015 (P.L. 114-113, Division N)56 directed the Secretary of
Homeland Security to establish a voluntary information sharing program with the private sector,
but also directed the Secretary to work with the Attorney General on the procedures for
participating in the information sharing program.
Congress may also choose to direct an agency to engage in norms setting fora. Despite the
existence of 11 norms of responsible state behavior in cyberspace, opportunities exist to advance
these principles, advance scholarship on norms, and engage non-governmental groups on the
norms. For example, two civil society groups are working on achieving peace in cyberspace—the
Global Commission on the Stability of Cyberspace57 and the Paris Cal for Trust and Security in
Cyberspace (Paris Cal ).58 The North Atlantic Treaty Organization’s (NATO) Cooperative Cyber
Defence Centre of Excel ence,59 develops scholarship on cyberspace operations. Among private
sector stakeholders, the Microsoft Corporation has cal ed for government and the private sector to
work together to build new norms for cyber operations, akin to the Geneva Convention.60 U.S.
agency participation in these efforts provides an opportunity for the United States to drive norm-
setting activities and influence the debate.
Policymakers may also choose to have agencies engage in new activities. For example, CISA has
a strategy for engaging with national governments on securing the cyberspace.61 Congress may
54 For more information, see https://www.state.gov/bureaus-offices/secretary-of-state/office-of-the-coordinator-for-
cyber-issues/.
55 National Institute of Standards and T echnology, “NIST Summary of the Responses to the National Scienc e and
T echnology Council’s Sub-Committee on Standards Request -for-Information, issued December 8, 2010: Effectiveness
of Federal Agency Participation in Standardization in Select T echnology Sectors,” document, May 13, 2011, at
https://www.nist.gov/system/files/documents/standardsgov/RFI-Summary-5-13-final2.pdf.
56 6 U.S.C. §§1501-1510.
57 Global Commission on the Stability of Cyberspace, at https://cyberstability.org/.
58 Paris Call for T rust and Security in Cyberspace, at https://pariscall.international/en/.
59 North Atlantic T reaty Organization, “The NAT O Cooperative Cyber Defence Centre of Excellence Is a Multinational
and Interdisciplinary Hub of Cyber Defence Expertise,” webpage, at https://ccdoe.org.
60 Brad Smith, “T he Need for a Digital Geneva Convention,” blog post, February 14, 2017, at
https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention/.
61 Cybersecurity & Infrastructure Security Agency, “CISA Global,” document, February 17, 2021, at
https://www.cisa.gov/sites/default/files/publications/CISA_Glo bal_Print -021721_508.pdf.
Congressional Research Service
14
Cybersecurity: Deterrence Policy
choose to codify in law these activities and further direct CISA, or another agency like the
National Institute of Standards and Technology (NIST) or the National Telecommunications and
Information Administration (NTIA), to assist in ongoing norms and standards setting activities by
providing technical expertise.
Options to Mature Response Capabilities
U.S. policymakers may choose to pursue a strategy of declaratory actions to deny or deter
cyberattacks. The Commission made recommendations concerning attribution and use of
sanctions, which may be additions to a matured response. If Congress chooses to pursue a
strategy of stated and certain actions, there are existing options for activities to be outlined and
described.
Congress may request that a declaratory policy be included as part of the National Security
Strategy.62 Congress may also request this information as part of the National Cyber Strategy.63
Additional y, Congress may choose to make this request independent of existing strategy
documents and task an agency or the National Cyber Director with producing the federal
government’s list of response actions to cyberattacks. In doing so, Congress may create an
additional opportunity to conduct oversight of these activities and inquire as to how often they are
being used and how effective they are at deterring cyberattacks. Congress recently requested that
the Secretary of Defense provide a taxonomy of cyber capabilities.64 Such a taxonomy may serve
as a model for a fuller report on broader deterrence capabilities.
Conclusion
Deterring adversarial actions in cyberspace remains chal enging. There are nuances to cyberspace
that complicate the ability to apply current deterrence concepts to cyberattacks. Regardless of
these chal enges, many regard efforts to deter cyberattacks as a necessary step to achieve stable
cyberspace operations. Establishing norms, having a way to detect violations, and developing
reputable options to respond to attacks al contribute to a strategy of deterrence.
62 P.L. 99-433, §603; 50 U.S.C. §3043. T he National Security Strategy is released and sent to Congress annua lly.
63 P.L. 116-283, §1752; 6 U.S.C. §1500. Statute is silent on the frequency that the National Cyber Strategy shall be sent
to Congress, but the National Cyber Director is to report annually to Congress on the implementation of the strategy
and the nation’s cybersecurity posture.
64 S. 1605, §1501.
Congressional Research Service
15
link to page 19
Cybersecurity: Deterrence Policy
Appendix. Cyberspace Solarium Commission
Recommendations
Table A-1 contains the 109 recommendations from the Commission and their status.65 Each
recommendation in the table is categorized as either a deterrence or denial (or both) activity based
on the definitions set forth in this report. There are five options for the assessed status of a
recommendation:
Implemented recommendations have been enacted by legislation, executive
action, or agency activity;
Nearing Implementation recommendations are in legislation or executive action
that have a clear path to approval;
On Track recommendations are partial y implemented or are being considered. In
many cases, the Commission has drafted an Executive Order or bil to address
these recommendations, but the recommendation has not been formal y
considered;
Delayed recommendations have not been rejected but do not have a policy action
or vehicle for implementation; and
Significant Barriers recommendations have received significant pushback from
policymakers or have been outright rejected.
Table A-1. Cyberspace Solarium Commission Recommendations
Ascending by Pil ar and Recommendation Identifier
Deter or
Pillar
Rec. #
Recommendation
Status
Assessment
Deny
Reform the U.S.
1.1
Issue and Update
In Process
Nearing
Both
Government’s
National Cyber Strategy
Implementation
Structure and
Organization for
1.1.1
Develop a Multitiered
Executive Action On Track
Deny
Cyberspace
Signaling Strategy
Needed
1.1.2
Promulgate a New
Executive Action Delayed
Deny
Declaratory Policy
Needed
1.2
Create House
Faces Significant
Significant
Both
Permanent Select and
Barriers to
Barriers
Senate Select
Implementation
Committees on
Cybersecurity
1.2.1
Reestablish the Office of Appropriations
On Track
Both
Technology Assessment
Needed
1.3
Establish National Cyber Legislation
Implemented
Both
Director (NCD)
Passed in
FY2021 NDAA,
NCD
Confirmed,
Related E.O.
Issued,
Appropriated
65 Statuses are as of December 20, 2021.
Congressional Research Service
16
Cybersecurity: Deterrence Policy
Deter or
Pillar
Rec. #
Recommendation
Status
Assessment
Deny
1.4
Strengthen the
Legislation
Implemented
Deny
Cybersecurity and
Passed in
Infrastructure Security
FY2021 NDAA,
Agency
Related E.O.
Issued
1.4.1
Codify and Strengthen
Legislation
Delayed
Both
the Cyber Threat
Proposed,
Intel igence Integration
Appropriations
Center
Needed
1.4.2
Strengthen the FBI’s
Appropriations
On Track
Both
Cyber Mission and
Needed
National Cyber
Investigative Joint Task
Force
1.5
Diversify and Strengthen Partial
On Track
Both
the Federal Cyberspace
Implementation
Workforce
via Legislation
Passed in the
FY2021 NDAA,
Further
Legislation and
Appropriations
Needed
1.5.1
Improve Cyber-
Appropriations
Implemented
Deny
Oriented Education
Needed
Strengthen
2.1
Create a Cyber Bureau
Legislation
Nearing
Deter
Norms and
and Assistant Secretary
Engrossed
Implementation
Nonmilitary
at the U.S. Department
Tools
of State
2.1.1
Strengthen Norms of
Executive
On Track
Deter
Responsible State
Actions Taken,
Behavior in Cyberspace
E.O. Proposed
2.1.2
Engage Actively and
Legislation
On Track
Deter
Effectively in Forums
Engrossed,
Setting International ICT Appropriations
Standards
Needed
2.1.3
Improve Cyber Capacity Legislation
On Track
Deter
Building and
Proposed,
Consolidate the Funding Appropriations
of Cyber Foreign
Needed
Assistance
2.1.4
Improve International
Legislation
Nearing
Both
Tools for Law
Proposed,
Implementation
Enforcement Activities
Appropriations
in Cyberspace
Needed
2.1.5
Leverage Sanctions and
Legislation
On Track
Deter
Trade Enforcement
Proposed
Actions
Congressional Research Service
17
Cybersecurity: Deterrence Policy
Deter or
Pillar
Rec. #
Recommendation
Status
Assessment
Deny
2.1.6
Improve Attribution
E.O. Proposed
Delayed
Deter
Analysis and the
Attribution-Decision
Rubric
2.1.7
Reinvigorate Efforts to
E.O. Proposed
Delayed
Deter
Develop Cyber
Confidence-Building
Measures
Promote
3.1
Codify Sector-Specific
Legislation
Implemented
Deny
National
Agencies and Sector
Passed in the
Resilience
Risk Management
FY2021 NDAA
Agencies and Strengthen
their Ability to Manage
Critical Infrastructure
Risk
3.1.1
Establish a National Risk
E.O. Proposed,
Nearing
Deny
Management Cycle
Legislation
Implementation
Culminating in a Critical
Engrossed
Infrastructure Resilience
Strategy
3.1.2
Establish a National
Legislation
On Track
Deny
Cybersecurity
Proposed
Assistance Fund
3.2
Develop and Maintain
Legislation
Implemented
Deny
Continuity of the
Passed in the
Economy Planning
FY2021 NDAA;
Appropriations
Needed
3.3
Codify a “Cyber State of Legislation
Implemented
Deny
Distress” Tied to a
Passed in the
“Cyber Response and
IIJA
Recover Fund”
3.3.1
Designation
Faces Significant
Significant
Deny
Responsibility for
Barriers to
Barriers
Cybersecurity Services
Implementation
Under the Defense
Production Act
3.3.2
Clarify Liability for
Legislation
Delayed
Deny
Federal y Directed
Proposed
Mitigation, Response,
and Recovery Efforts
3.3.3
Improve and Expand
E.O. Proposed
On Track
Deny
Planning Capacity and
Readiness for Cyber
Incidence Response and
Recovery Efforts
3.3.4
Expand Coordinated
Appropriated
Implemented
Both
Cyber Exercises,
Gaming, and Simulation
Congressional Research Service
18
Cybersecurity: Deterrence Policy
Deter or
Pillar
Rec. #
Recommendation
Status
Assessment
Deny
3.3.5
Establish a Biennial
Legislation
Implemented
Deny
National Cyber
Passed in the
Tabletop Exercise
FY2021 NDAA
3.3.6
Clarify the Cyber
Legislation
Implemented
Both
Capabilities and the
Passed in the
Interoperability of the
FY2021 NDAA
National Guard
3.4
Improve the Structure
Legislation
On Track
Deny
and Enhance Funding of
Engrossed
the Election Assistance
Commission
3.4.1
Modernize Campaign
Legislation
On Track
Deny
Regulations to Promote
Proposed
Cybersecurity
3.5
Build Societal Resilience
Legislation
Delayed
Deny
to Foreign Malign
Proposed
Cyber-Enabled
Information Operations
3.5.1
Reform Online Political
Legislation
On Track
Deny
Advertising to Defend
Proposed
Against Foreign
Influence in Elections
Reshape the
4.1
Establish and Fund a
Legislation
On Track
Deny
Cyber
National Cybersecurity
Proposed,
Ecosystem
Certification and
Related E.O.
Towards
Labeling Authority
Issued
Greater Security
4.1.1
Create or Design
Appropriations
On Track
Deny
Critical Technology
Needed,
Security Centers
Legislation
Proposed
4.1.2
Expand and Support
Legislation
Delayed
Deny
NIST’s Security Work
Proposed,
Appropriations
Needed
4.2
Establish Liability for
Faces Significant
Significant
Deny
Final Good Assemblers
Barriers to
Barriers
Implementation
4.2.1
Incentivize Timely Patch Appropriations
On Track
Deny
Implementation
Needed
4.3
Establish a Bureau of
Legislation
On Track
Both
Cyber Statistics
Proposed
4.4
Resource a Federal y
Partial
On Track
Deny
Funded Research and
Implementation
Development Center to via Legislation
Develop Cybersecurity
Passed in the
Insurance Certifications
FY2021 NDAA
4.4.1
Establish a Public-Private E.O. Proposed
On Track
Both
Partnership on Modeling
Cyber Risk
Congressional Research Service
19
Cybersecurity: Deterrence Policy
Deter or
Pillar
Rec. #
Recommendation
Status
Assessment
Deny
4.4.2
Explore the Need for a
Partial
On Track
Both
Government
Implementation
Reinsurance Program to via Legislation
Cover Catastrophic
Passed in the
Cyber Events
FY2021 NDAA
4.4.3
Incentivize IT Security
Implemented via
Implemented
Deny
Through Federal
E.O.
Acquisition Regulations
and Federal Information
Security Management
Act Authorities
4.4.4
Amend the Sarbanes-
Legislation
On Track
Deny
Oxley Act to Include
Proposed
Cybersecurity Reporting
Requirements
4.5
Develop a Cloud
Executive or
On Track
Deny
Security Certification
Legislative
Action Needed
4.5.1
Incentivize the Uptake
Legislation
On Track
Deny
of Secure Cloud
Introduced
Services for SMB and
SLTT Governments
4.5.2
Develop a Strategy to
Partial y
Nearing
Deny
Secure Foundational
Implemented in
Implementation
Internet Protocols and
the FY2021
Email
NDAA
4.5.3
Strengthen the U.S.
Legislation
On Track
Both
Government’s Ability to Introduced
Take Down Botnets
4.6
Develop and Implement
In Process
Nearing
Deny
an ICT Industrial Base
Implementation
Strategy
4.6.1
Increase Support to
Partial
On Track
Both
Supply Chain Risk
Implementation
Management Efforts
4.6.2
Commit Significant and
Partial
On Track
Deny
Consistent Funding
Implementation
toward R&D in
Emerging Technologies
4.6.3
Strengthen the Capacity Appropriations
Delayed
Both
of the Committee on
Needed
Foreign Investment in
the United States
4.6.4
Invest in the National
Appropriations
On Track
Deny
Cyber Moonshot
Needed
Initiative
4.7
Pass a National Data
Faces Significant
Significant
Deny
Security and Privacy
Barriers to
Barriers
Protection Law
Implementation
Congressional Research Service
20
Cybersecurity: Deterrence Policy
Deter or
Pillar
Rec. #
Recommendation
Status
Assessment
Deny
4.7.1
Pass a National Breach
Legislation
On Track
Both
Notification Law
Proposed
Operationalize
5.1
Codify the Concept of
Legislation
On Track
Both
Cybersecurity
“Systemical y Important
Introduced
with the Private
Critical Infrastructure”
Sector
5.1.1
Review and Update
Legislation
On Track
Deny
Intel igence Authorities
Proposed
to Increase Intel igence
Support to the Broader
Private Sector
5.1.2
Strengthen and Codify
Legislation
On Track
Deny
Processes for Identifying Proposed
Broader Private-Sector
Cybersecurity
Intel igence Needs and
Priorities
5.1.3
Empower Departments
Legislation
Implemented
Both
and Agencies to Serve
Passed in the
Administrative
FY2021 NDAA
Subpoenas in Support of
Threat and Asset
Response Activities
5.2
Establish and Fund a
Legislation
On Track
Both
Joint Col aborative
Proposed, E.O.
Environment for Sharing Issued
and Fusing Threat
Information
5.2.1
Expand and Standardize
E.O. Proposed
On Track
Deny
Voluntary Threat
Detection Programs
5.2.2
Pass a National Cyber
Legislation
Nearing
Both
Incident Reporting Law
Introduced
Implementation
5.2.3
Amend the Pen Register
Legislation
On Track
Deny
Trap and Trace Statute
Proposed
to Enable Better
Identification of
Malicious Actors
5.3
Strengthen an
Legislation
Implemented
Both
Integrated Cyber
Passed in the
Center within CISA and
FY2021 NDAA
Promote the Integration
of Federal Cyber
Centers
5.4
Establish a Joint Cyber
Legislation
Implemented
Deny
Planning Cel in CISA
Passed in the
FY2021 NDAA
5.4.1
Institutionalize
Legislation
Implemented
Both
Department of Defense
Passed in the
Participation in Public-
FY2021 NDAA
Private Cybersecurity
Initiatives
Congressional Research Service
21
Cybersecurity: Deterrence Policy
Deter or
Pillar
Rec. #
Recommendation
Status
Assessment
Deny
5.4.2
Expand Cyber Defense
Executive Action On Track
Deny
Col aboration with ICT
Required
Enablers
Preserve and
6.1
Direct DOD to
Legislation
Implemented
Both
Employ Military
Conduct a Force
Passed in the
Instruments of
Structure Assessment of FY2021 NDAA
Power
the Cyber Mission
Force
6.1.1
Direct DOD to Create
Partial y
Nearing
Both
a Major Force Program
Implemented via
Implementation
Funding Category for
FY2021 NDAA
U.S. Cyber Command
6.1.2
Expand Current
Executive Action Delayed
Deny
Malware Inoculation
Required
Initiatives
6.1.3
Review Delegation of
Legislation
Implemented
Both
Authorities for Cyber
Passed in the
Operations
FY2021 NDAA
6.1.4
Reassess and Amend
E.O. Proposed
Delayed
Both
Standing Rules of
Engagement and
Standing Rules for Use
of Force for U.S. Forces
6.1.5
Cooperate with Al ies
E.O. Proposed
Nearing
Both
and Partners to Defend
Implementation
Forward
6.1.6
Require DOD to Define
Legislation
On Track
Deny
Reporting Metrics
Required
6.1.7
Assess the
Legislation
Implemented
Both
Establishment of a
Passed in the
Military Cyber Reserve
FY2021 NDAA
6.1.8
Establish Title 10
Executive Action Delayed
Both
Professors in Cyber
or Legislation
Security and Information Required
Operations
6.2
Conduct Cybersecurity
Legislation
Implemented
Deny
Vulnerability
Passed in the
Assessment of Al
FY2021 NDAA
Segments of the NC3
and NLCC Systems and
Continual y Assess
Weapon Systems’
Cyber Vulnerabilities
6.2.1
Require DIB
Partial y
Nearing
Deny
Participation in a Threat
Implemented via
Implementation
Intel igence Sharing
FY2021 NDAA
Program
6.2.2
Require Threat Hunting
Partial y
Nearing
Deny
on DIB Networks
Implemented via
Implementation
FY2021 NDAA
Congressional Research Service
22
Cybersecurity: Deterrence Policy
Deter or
Pillar
Rec. #
Recommendation
Status
Assessment
Deny
6.2.3
Designate a Threat-
Executive Action Delayed
Deny
Hunting Capability
Required
Across the DODIN
6.2.4
Assess and Address the
Legislation
Implemented
Deny
Risk to National
Passed in the
Security Systems Posed
FY2021 NDAA
by Quantum Computing
Cybersecurity
PAN1.1
Provide SLTT
Partial y
Nearing
Deny
Lessons from the
Government and SMB
Implemented in
Implementation
Pandemic
IT Modernization
the IIJA
Grants
PAN1.2
Pass an Internet of
Partial y
On Track
Deny
Things Security Law
Implemented in
the FY2021
NDAA
PAN1.3
Support Nonprofits that Legislation
Delayed
Deny
Assist Law
Proposed
Enforcement’s
Cybercrime and Victim
Support Efforts
PAN1.4
Increase NGO Capacity
Legislation
Delayed
Both
to Identify and Counter
Proposed
Foreign Disinformation
and Influence Campaigns
PAN1.4.1
Establish the Social
Authorized
Nearing
Both
Media Data and Threat
Implementation
Analysis Center
National Cyber
NCD1
Establish and National
Legislation
Implemented
Both
Director
Cyber Director
Passed in the
FY2021 NDAA
Growing a
WF1
Establish Leadership and E.O. Proposed
Delayed
Both
Stronger Federal
Coordination Structures
Cyber
Workforce
WF2
Properly Identify and
E.O. Proposed
Delayed
Both
Utilize Cyber-Specific
Occupational
Classifications
WF3
Develop
Legislation
On Track
Both
Apprenticeships
Introduced
WF4
Improve Cybersecurity
Legislation
Implemented
Deny
for K-12 Schools
Passed
WF5
Provide Work-Based
E.O. Proposed
Delayed
Deny
Learning via Volunteer
Clinics
WF6
Improve Pay
E.O. Proposed
Delayed
Both
Flexibility/Hiring
Authority
WF7
Incentivize Cyber
Legislation
On Track
Both
Workforce Research
Proposed
Congressional Research Service
23
Cybersecurity: Deterrence Policy
Deter or
Pillar
Rec. #
Recommendation
Status
Assessment
Deny
WF8
Mitigate Retention
Legislation
Delayed
Both
Barriers and Invest in
Proposed
DEI in Recruiting
Congressional Research Service
24
Cybersecurity: Deterrence Policy
Building a
SC1
Develop and Implement
In Process
Nearing
Deny
Trusted ICT
an ICT Industrial Base
Implementation
Supply Chain
Strategy
SC2
Identify Key ICT
In Process
Nearing
Deny
technologies and
Implementation
materials
SC3
Conduct a Study on the
Legislation
Nearing
Deny
Viability of and
Engrossed
Implementation
Designate Critical
Technology Clusters
SC3.1
Provide R&D Funding
Appropriations
On Track
Deny
for Critical
Needed
Technologies
SC3.2
Incentivize the
Legislation
On Track
Both
Movement of Critical
Proposed
Chip and Technology
Manufacturing out of
China
SC3.3
Conduct a Study on a
Legislation
On Track
Deny
National Security
Proposed
Investment Corporation
SC4
Designate a Lead
In Process
Nearing
Deny
Agency for ICT Supply
Implementation
Chain Risk
SC4.1
Establish a National
Legislation
On Track
Both
Supply Chain
Proposed
Intel igence Center
SC4.2
Fund Critical
Legislation
On Track
Deny
Technology Security
Proposed
Centers
SC5
Incentivize Open and
Executive Action Delayed
Both
Interoperable Standards
Needed
and Release More Mid-
Band Spectrum
SC5.1
Develop a Digital Risk
Executive Action On Track
Deny
Impact Assessment for
Needed
International Partners
for Telecommunications
Infrastructure Projects
SC5.2
Ensure That the EXIM,
Legislation
On Track
Deny
DFC, and USTDA Can
Proposed
Compete with Chinese
State-Owned and State-
Backed Enterprises
SC5.3
Develop a List of
Legislation
On Track
Deny
Contractors and
Proposed
Vendors Prohibited
from Implementing
Development Projects
Source: CRS analysis of Cyberspace Solarium Commission, “2021 Annual Report on Implementation,” report,
August 2021, at https://drive.google.com/file/d/19V7Yfc5fvEE6dGIoU_7bidLRf5OvV2__/view.
Congressional Research Service
R47011
· VERSION 1 · NEW
25
Cybersecurity: Deterrence Policy
Notes: The fol owing abbreviations are used in the table: National Cyber Director (NCD); Fiscal Year (FY);
National Defense Authorization Act (NDAA); Executive Order (E.O.); Infrastructure Investment and Jobs Act
(IIJA, P.L. 117-58); National Institute of Standards and Technology (NIST); Information Technology (IT); Smal
and Medium-Sized Businesses (SMB); State, Local, Tribal, and Territorial (SLTT); Information and
Communications Technology (ICT); Research and Development (R&D); Cybersecurity and Infrastructure
Security Agency (CISA); Department of Defense (DOD); Nuclear Command, Control, and Communications
(NC3); National Leadership Command Capabilities (NLCC); Defense Industrial Base (DIB); DOD Information
Network (DODIN); Nongovernmental Organization (NGO); Diversity, Equity, and Inclusion (DEI); Export-
Import Bank of the United States (EXIM); U.S. International Development Finance Corporation (DFC); and
United States Trade and Development Agency (USTDA).
Author Information
Chris Jaikaran
Analyst in Cybersecurity Policy
Disclaimer
This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan
shared staff to congressional committees and Members of Congress. It operates solely at the behest of and
under the direction of Congress. Information in a CRS Report should n ot be relied upon for purposes other
than public understanding of information that has been provided by CRS to Members of Congress in
connection with CRS’s institutional role. CRS Reports, as a work of the United States Government, are not
subject to copyright protection in the United States. Any CRS Report may be reproduced and distributed in
its entirety without permission from CRS. However, as a CRS Report may include copyrighted images or
material from a third party, you may need to obtain the permission of the copyright holder if you wish to
copy or otherwise use copyrighted material.
Congressional Research Service
R47011
· VERSION 1 · NEW
26