Sorry, you need to enable JavaScript to visit this website.
Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Secure 5G

Fifth generation wireless technologies are essential to the future prosperity and security of the United States, but malicious actors seeking to exploit these technologies pose significant risks and vulnerabilities. NTIA is engaged in a number of efforts to help ensure that 5G networks and the broader telecommunications supply chain are secure. These efforts include:

Related content


NTIA Comments on Promoting the Deployment of 5G Open Radio Access Networks

July 16, 2021
GN-Docket No. 21-63

NTIA, on behalf of the Executive Branch of the U.S. Government (Executive Branch), submits these comments in response to the Federal Communications Commission’s (Commission) Notice of Inquiry in the above-captioned proceeding on open radio access networks (Open RAN). These comments serve as an integrated, cohesive response from numerous agencies within the Executive Branch.

NTIA Releases Minimum Elements for a Software Bill of Materials

July 12, 2021

In his Executive Order (EO) on Improving the Nation’s Cybersecurity, President Biden identified the prevention, detection, assessment and remediation of cyber incidents as a top priority of his Administration. The Commerce Department and NTIA were directed by the EO to publish the minimum elements for a Software Bill of Materials (SBOM), a key tool to help create a more transparent and secure software supply chain. As the President notes, “the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is.”

An SBOM provides those who produce, purchase, and operate software with information that enhances their understanding of the supply chain. Though an SBOM won’t solve all software security problems, it offers the potential to track known newly emerged vulnerabilities and risks, and it can form a foundational data layer on which further security tools, practices, and assurances can be built.

Subscribe to Secure 5G RSS feed