Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Podcasts
    • Photo Galleries
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityPhysical SecurityCybersecurity News

Upcoming guidance from DHS S&T will improve critical infrastructure resilience

energy critical infrastructure
December 3, 2020

It is easy to understand the importance of our “critical infrastructure,” such as telecommunications, energy, transportation, and emergency services, but what’s often overlooked are the underlying technologies that enable them, says the Department of Homeland Security (DHS) Science and Technology Directorate (S&T). One such technology is Position, Navigation, and Timing (PNT) services, a national critical function powering many of the critical infrastructure sectors that enable modern society.

PNT is primarily provided through the Global Positioning System (GPS) and other Global Navigation Satellite Systems (GNSS). PNT is not just used for navigation, though. It also provides precision timing information that enables critical functions within telecommunication networks and the power grid. However, these PNT services are susceptible to interference such as GPS jamming and spoofing, which pose a risk to critical infrastructure. What was once an emerging risk is quickly becoming a pressing issue, with industry reporting a growing trend in the past two years of prominent PNT disruption events around the world. As the technological barriers to conducting these activities continue to fall, it becomes even more important to ensure our critical infrastructure is resilient to PNT disruptions.

New document provides roadmap to threat mitigation

One of the key activities for addressing this at the DHS S&T is the Resilient PNT Conformance Framework, which is planned for public release by the end of the year. The conformance framework was developed with input from industry stakeholders and is focused on outcome-based behaviors of resilience to encourage industry innovation and creativity in technical solutions. Industry has made significant progress in improving PNT equipment, with some manufacturers citing the DHS Best Practices for GPS (PDF, 21 pgs., 512 KB). The conformance framework is the next step forward and provides a common reference point defining what to expect from resilient PNT equipment. This will help critical infrastructure owners and operators make risk-informed decisions when deciding what PNT equipment to deploy. It provides distinct levels of resilience so end users can choose equipment that’s appropriate for their needs, based on criticality and risk tolerance.

The conformance framework also will be able to complement federal activities required under Executive Order 13905, “Strengthening National Resilience through Responsible Use of PNT Services,” which was signed in February 2020.

“In order to do effective risk management, it’s important to understand your vulnerabilities, your risk posture, and select appropriate mitigations,” says Jim Platt, director of the DHS PNT Program Management Office, housed within the Cybersecurity and Infrastructure Security Agency (CISA). “Combined with the National Institute of Standards and Technology’s PNT Profiles from the PNT Executive Order, the conformance framework will be a valuable risk management tool.”

Outlining important resilience concepts

Prevent, Respond and Recover.Industry equipment manufacturers have made great progress in making their PNT systems more resistant to disruptions by adding in capabilities such as spoofing detectors, additional PNT sources, and holdover devices (e.g., atomic clocks and inertial measurement units). While these are all important, resilience also requires considering how a system is structured and how internal components interact. Additionally, the conformance framework views PNT systems more like computers rather than radios and incorporates concepts from cybersecurity practices.

Presidential Policy Directive (PPD)-21 defines resilience as the ability to withstand and rapidly recovery from disruptions. Based on this, “A key concept in the conformance framework is recognition that one-hundred percent perfect security does not exist,” says S&T technical manager Ernest Wong. “Therefore, while it’s important to prevent threats from entering our systems, it’s just as important to understand what happens when systems fail and how to recover from them.” The levels in the framework are cumulative, and this concept of recoverability is foundational to the framework; it is a requirement starting at level 1.

As PNT systems begin to have more PNT sources, each new source is also an additional attack surface. To mitigate these attack surfaces, level 3 of the framework requires isolation between the PNT sources. This is similar to the concept of sandboxing in cybersecurity applications, which prevent errors and exploited vulnerabilities in one application from spilling over into other parts of the system.

There is also a distinction between resilience and performance. In some cases, resilience measures may not result in direct impacts to performance; examples include security measures such as component isolation and sandboxing. In other cases, systems can be structured in ways to allow trading performance for greater resilience.

New PNT framework in practice

The conformance framework lays out four levels of resilience to allow flexibility in meeting different user needs. The levels are cumulative, with requirements in each level carrying over into the next. This results in higher levels corresponding with greater resilience.

The framework levels are also designed so that levels 1 and 2 should be feasible in the near-term. This is done by prioritizing the most impactful and easily attainable capabilities. While vulnerabilities may still exist, this will significantly reduce the possible exploitation chains available to attackers and also increases the difficulty for them to achieve their intended effect on target systems. Levels 3 and 4 are expected to involve more architectural changes and are targeted toward the next generation of PNT systems.

The Resilient PNT Conformance Framework is planned for public release in December 2020. A preview of the levels is available in S&T’s presentation (PDF, 8 pgs., 531 KB) at the Civil GPS Service Interface Committee from September 2020.

Over the past few years, S&T’s PNT program has worked to improve resilience against threats and disruptions by engaging with industry, developing mitigation technologies, and publishing best practices. “The Resilient PNT Conformance Framework is the culmination of our work from the past five years,” said Brannan Villee, S&T PNT program manager. “It will create the foundation for industry to develop resilient PNT standards and ultimately improve critical infrastructure’s ability to prevent, respond, and recover from GPS disruptions.”

Additional information about the S&T PNT program can be found on this website. 

*This article was featured on the DHS S&T site and can be found here. 

KEYWORDS: critical infrastructure power grid risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • location GPS

    DHS S&T publishes the Resilient PNT Conformance Framework

    See More
  • night-enews

    DHS S&T requests night vision technologies for market survey

    See More
  • CISA-infrastructure-Security.png

    Kicking off National Critical Infrastructure Security and Resilience Month

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Optimizing Social Media from a B2B Perspective

  • Physical Layer Security in Wireless Communications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing