Cybersecurity Policy Framework
Cybersecurity Policy Framework
Policy
Framework
A practical guide to the
development of national
cybersecurity policy
Author:
Kaja Ciglic, Microsoft
Contributors:
Angela McKay, Microsoft
John Hering, Wimmer Solutions
Theo Moore, APCO Worldwide
Contents
Introduction:
The need for a national cybersecurity policy framework 2
Chapter 1
Microsoft’s commitment to cybersecurity 6
Chapter 2
Introducing key concepts in cybersecurity policy 9
Chapter 3
Overview of the cybersecurity policy framework 11
Conclusion 39
Recommended resources 41
1
Introduction:
The need for
a national
cybersecurity
policy
framework
2
We live in a period of dramatic change powered by technology. The “Fourth
Introduction: The Industrial Revolution” brings enormous economic and social opportunities for
need for a national
people, organizations, and governments. The substantial increase in internet
cybersecurity policy
framework
connectivity, the explosion of the number of connected devices, and the rapid
take-up of technologies such as cloud computing, advanced robotics, and artificial
intelligence (AI) are fundamentally changing people’s lives. They are also changing
the way organizations do business and the way governments provide public
services and engage with citizens.
At the same time, with every new system or device that is connected to the
internet the scope for cyber-attacks grows, as do the consequences of successful
attacks. As cyber-attackers become ever more sophisticated in their operations
and cyber-criminals ever more ambitious, policy-
makers have to respond.
Today’s cybersecurity
The world is poised, therefore, on the threshold
of a new era of possibility and risk due to these decisions shape
new technologies and their increasing ubiquity in tomorrow’s success
our families, businesses and governments. As we
The value of good cybersecurity law is not
embrace a generation of possibilities emerging abstract. Research on a number of potential
from cloud and edge computing, we must also configurations of cyberspace in 2025 shows
acknowledge that we have to take up fresh that policy decisions, notably in areas broadly
defined as ‘cybersecurity policy’, can have
responsibilities. The price for a world where the
significant ‘real world’ effects.
only limits on individual and national opportunity
For developed economies the variance in R&D
are imagination and application of effort cannot be
growth between best-case and worst-case
ignored. We must be vigilant, we must understand scenarios could be as much as 18%, whilst for
and foster trust, and we must put cybersecurity at emerging economies it could be a difference
the heart not just of technology but also policy. of over 30%. Debt as a percentage of GDP
could also be materially affected by the public
The state has traditionally assumed responsibility and private sectors’ ability to absorb and
for national security, citizen welfare, economic capitalize on new technologies.
growth, public health and a range of aspects that Furthermore, in a hyper-connected, device-
are fundamental to the prosperity and well-being of rich world (which describes ‘emerging’ and
‘developing’ states just as much as ‘developed’
a country. The internet has become such a pervasive
ones), Internet stability and security will
part of public and private life that it is now a vital be critical. Equally important will be the
component in almost all of these areas of state structures and systems that enable effective
responsibility. But what are the responsibilities of cyber-risk management, as well as resilience
and recovery in the face of cyber-attacks.
the modern state in providing cybersecurity for
individuals, organizations and its own operations? The cybersecurity policy framework that states
adopt will, therefore, have a critical bearing on
How can governments think about using
their prospects for growth, governance, and
cybersecurity to help enable their country to benefit good practice.
from the full potential of the internet?
3
In their responses policy-makers are compelled to balance competing priorities,
Introduction: The e.g. the need for measures to tackle cyber-threats with the requirement to protect
need for a national
fundamental principles like privacy and civil liberties. In the same way, they must
cybersecurity policy
framework
balance the need for regulations to enhance cybersecurity with the risk that those
regulations, if not structured correctly, could stifle the innovation and progress
being driven by technology.
It is against this backdrop that Microsoft has developed this Cybersecurity Policy
Framework. As a global technology company, Microsoft has been at the heart of
discussions about cybersecurity between industry and governments around the
world for many years. We have observed and been involved in the development of
best practices in cybersecurity regulation, from outcomes-focused approaches to
cybercrime laws to implementation of security baselines for critical infrastructures.
We believe that now is a critical moment for policy-makers. They must aim to craft
a regulatory framework for cybersecurity that is fit for the changing landscape of
the Fourth Industrial Revolution. We hope that the Cybersecurity Policy Framework
helps to support this objective and look forward to continuing our work with
4
industry and governments around the world to develop an appropriate regulatory
Introduction: The framework for cybersecurity.
need for a national
cybersecurity policy
framework
How to use the Cybersecurity Policy Framework
The Cybersecurity Policy Framework is designed for policy-makers involved in
the development of cybersecurity regulations. It is not intended to exhaustively
address all of the key parts of a country’s national or international cybersecurity
strategy but, rather, to provide a practical guide to the specific areas of
cybersecurity regulation that policy-makers are currently most focused on.
5
Chapter 1
Microsoft’s
commitment to
cybersecurity
6
In today’s complex and regulated environment, businesses need to focus on
Microsoft’s building more secure solutions that deliver value to their customers, partners, and
commitment to
shareholders—both in the cloud and on-premises. Microsoft has decades-long
cybersecurity
experience building enterprise software and running some of the largest online
services in the world. We use this experience to implement and continuously
improve security-aware software development, operational management, and
threat-mitigation practices that are essential to the strong protection of services
and data.
At any point in time on any day of the week, Microsoft’s cloud computing
operations are under attack: The company detects a substantial number of
attempts a day to compromise its systems. Microsoft has an unrivaled vantage
point on digital security because our products are in use by billions of people
around the world, which means we often serve as the first line of defense against
bad actors seeking to cause harm to personal information and business networks.
However, Microsoft isn’t just fending off those attacks. It’s also learning from
them. All those foiled attacks, along with data about the hundreds of pieces of raw
data that we see such as anonymous, signature-free signals from our products,
450 billion authentications per month across all our cloud services, 400 billion
emails analyzed for malware and malicious sites, – can be combined to help us, for
example, to connect the dots between an email phishing scam out of Nigeria and
a denial-of-service attack out of Eastern Europe. That means we can thwart one
attack for one customer and then apply that knowledge to every other customer
using our products, from our Azure computing platform, to Windows 10 operating
system or the Office 365 productivity service. In other words, every incident
becomes a learning opportunity that makes us stronger, faster and more agile in
providing security and protecting trust.
7
• The Digital Crimes Unit is where the company works directly with law
Microsoft’s enforcement organizations around the world to pursue legal recourse against
commitment to
cybercriminals by referring criminal cases to authorities or bringing civil cases
cybersecurity
ourselves.
However, Microsoft also realizes that security cannot be proprietary and that trust
cannot be commoditized. Security is a fundamental right, and delivering it must
be a mission we all share. Indeed, providing for the common defense has been a
part of our global culture for generations. We know that the industry must come
together to create as strong a shield as possible against the invisible threat if cyber-
attackers and their cyber-weapons; as a result we have convened and enabled a
number of alliances, such as the Cybersecurity Tech Accord, to protect citizens
around the world.
8
Chapter 2
Introducing
key concepts in
cybersecurity
policy
9
There are many terms associated with cybersecurity and these can be interpreted
Introducing differently by stakeholders. However, having a common understanding of the
key concepts in
terms and how they relate to one another is essential. In this section, we briefly
cybersecurity policy
introduce some of the key underlying terms. These definitions are not intended
to be comprehensive, nor are they intended to form the basis of any legal or
regulatory definition. Instead, they provide high-level assistance in understanding
the key concepts as they are now widely understood, ahead of them being
explored in more detail later in this Cybersecurity Policy Framework.
10
Chapter 3
Overview
of the
Cybersecurity
Policy
Framework
11
This Cybersecurity Policy Framework focuses on three key regulatory aspects of
Overview of the cybersecurity policy, framed by a wider national strategy as well as an international
Cybersecurity Policy
strategy for cybersecurity.
Framework
12
Overview
Overview ofof the
the
Cybersecurity
Cybersecurity Policy
Policy
Framework
Framework
A national
strategy for
cybersecurity
13
Overview of the
A national strategy for cybersecurity
Cybersecurity Policy
Framework
What is a national strategy for cybersecurity?
A national cybersecurity strategy outlines a country’s cybersecurity vision and sets
out the priorities, principles, and approaches to understanding and managing
cybersecurity risks at a national level.
14
principles that reflect societal values, traditions, and legal principles. Programs
Overview of the created by government in the name of security can potentially infringe on
Cybersecurity Policy
these rights and values if not articulated and integrated as guiding principles.
Framework
• Third, the strategies are based on a risk-management approach where
governments and private sector partners agree on the risks that must be
managed or mitigated, and even those that must be accepted.
3. Prioritized. Not all threats are equal. Cybersecurity policy should adopt a
graduated approach to criticality, prioritizing critical infrastructure risks.
15
cannot come at a cost of sacrificing privacy, civil liberties, and rule of law.
Overview of the For example, broad rights for government and law enforcement to access
Cybersecurity Policy
data without following appropriate processes (such as obtaining necessary
Framework
warrants) can cut across these fundamental principles. This in turn can
damage the country’s reputation for rule of law and ultimately disincentivize
organizations from storing their data within the country. Instead, a balanced
approach is needed that is respectful of these fundamental principles.
Further information
To assist policy-makers in the development of a national cybersecurity strategy,
Microsoft has published a guide, based on its experience of emerging best
practices around the world. The guide, “Developing a National Cybersecurity
Strategy”, is available at microsoft.com/en-us/cybersecurity/.
16
Overview of the
Cybersecurity Policy
Framework
Establishing and
empowering
a national
cybersecurity
agency
17
Overview of the
Establishing and empowering a national
Cybersecurity Policy
Framework
cybersecurity agency
1
The legal and administrative structure of the bodies of government responsible for cybersecurity will
inevitably differ from one country to the next. Nonetheless, for convenience, we refer to these bodies in
general terms as “national cybersecurity agencies”.
18
MAP: Countries with established or developing a national cybersecurity agencies13
Overview of the
Cybersecurity Policy
Framework
Allowing for many different forms that a national cybersecurity agency can take,
our experiences of working with governments around the world indicate that there
are some particularly effective approaches to structuring them. These include
approaches to how they are structured operationally, how their roles are viewed,
and which responsibilities they are assigned. The five recommendations for
structuring an effective national cybersecurity agency are:
19
baseline of cybersecurity best practices which the different sector-specific
Overview of the verticals can build off.
Cybersecurity Policy
Framework 2. Provide the national cybersecurity agency with a clear mandate: Any
national cybersecurity agency will be expected to navigate a complex
environment that spans other government
departments, national legislatures, established
regulatory authorities, civil society groups, Many possible types of
the general public, public and private sector
agency but all with one
organizations, and international partners. It is
therefore important that all stakeholders have
essential purpose
a clear expectation of what the mandate of the A national cybersecurity agency, if
national cybersecurity agency is, so they know appropriately structured, can substantially
increase the readiness of a country’s
what to expect and who to talk to. It is also
cybersecurity ecosystem, with many of the
critical that the responsibilities of the national economic and developmental benefits
cybersecurity agency are distinct from those already outlined.
of other governmental groups touching on The creation of such an agency can follow
cybersecurity. One such example are regulators many paths, e.g. by delegation of existing
in critical infrastructure sectors, such as financial powers from other parts of government to a
standalone body or by creation of multiple
services, power generation or transport, which
agencies with clear briefs focused on distinct
can set security policies for their industry in aspects of cybersecurity.
some contexts.
In all cases, however, public-private
3. Ensure the national cybersecurity agency partnership and cooperation will be key
because much of “cyberspace” is built,
has appropriate statutory powers: Currently,
owned and operated by the private sector.
most national cybersecurity agencies Obstructive dynamics between a national
are established not by statute but by the cybersecurity agency and businesses, not to
delegation of existing powers by other parts of mention with peer agencies in other states,
will be counterproductive.
government. We anticipate that this approach
will need to change in some countries as they
pass comprehensive cybersecurity laws. In
the same way as the passage of comprehensive data protection laws led to
the establishment of specific bodies to enforce the relevant laws, e.g. the
Australian Information Commissioner Act, so too is this likely to be required
for the enforcement of comprehensive cybersecurity laws. The delegation of
existing powers, which may be subject to multiple underlying regulations, may
not be sufficient to provide the National Cybersecurity Agency with all of the
powers it requires to effectively carry out its new functions.
20
government and regulatory stakeholders and external stakeholders from the
Overview of the public and private sectors, as well as the international arena. In particular it
Cybersecurity Policy
addresses one of the core challenges governments have faced in establishing
Framework
national cybersecurity agencies: how to reconcile mandatory reporting of
cyber-incidents, as handled by the Regulatory unit, with the voluntary and
bi-directional exchange of information about cyber-threats and -incidents, as
handled by the CERT:
a) Policy and planning unit: This unit should lead the nation’s development,
coordination, alignment, and integration of cybersecurity policies, strategies
and plans. It should define near-, mid-, and long-term strategic priorities,
develop plans to implement those priorities, and it should track and monitor
progress against the plans.
b) Outreach and partnership unit: This unit should lead and manage
relationships and interfaces across the government and with other nations,
institutions, and the private sector. The Outreach and partnership unit should
create and manage intra- and inter-governmental advisory councils and public
private partnerships (PPP) to enable collaboration.
21
Overview of the
Cybersecurity Policy Further information
Framework
To learn more about the existing cybersecurity agency models, see:
22
Overview of the
Cybersecurity Policy
Framework
Developing
and updating
cybercrime laws
23
Overview of the
Developing and updating cybercrime laws
Cybersecurity Policy
Framework
What are cybercrime laws?
A country’s approach to cybercrime laws will largely be dependent on the
country’s existing laws, legal structures and traditions. While some countries have
elected to introduce stand-alone cybercrime laws, others have incorporated
them into legal frameworks that deal with the overall online environment, such as
broader electronic commerce laws. In Microsoft’s experience, however, all effective
frameworks incorporate the following six objectives:
Enabling cooperation
Enabling law between countries
enforcement in criminal
Deterring investigations mattersinvolving
perpetrators and while protecting cybercrime and
protecting citizens individual privacy electronic evidence
1. 2. 3.
4. 5. 6.
24
Why are modern legal frameworks to fighting
Overview of the
Cybersecurity Policy
cybercrime needed?
Framework
Governments are struggling to respond to the growing threat, sophistication and
prevalence of cybercrime, as both the pace of technological development and
frequency of activity by cybercriminals and other
malicious actors, far outstrips the development of
legal frameworks. Microsoft therefore believes that Cybercrime laws benefit
governments must adopt new approaches and put
the economy
forward legal frameworks that are flexible enough
to allow rapid responses to new challenges and are Cybercrime laws are one of the foundations
designed so that they do not become obsolete. that are needed to protect the society from
online attacks. They perform an important
Furthermore, we believe that the global challenge
deterrent role, helping reduce the level of
of cybercrime will only be addressed through crime in a given country.
harmonization of cybercrime laws, combined with Given the global nature of cybercrime activity
initiatives to facilitate faster and more effective they are not only essential for ensuring that
coordination between law enforcement agencies. a particular country does not become a safe
haven for criminals, but they also enable
prosecutors to cooperate with other countries
in bringing those criminals to justice.
What makes a successful
Cybercrime laws also play a critical role in
cybercrime policy? attracting foreign investment. With much of
intellectual property online today, companies
An effective legal framework for cybercrime should
want to know that they will be able to protect
be based on six broadly-applicable best practices: their investment should it come under attack.
25
inadvertently criminalize researchers and appropriately-regulated private
Overview of the investigators; ii) enable information and data sharing between the public
Cybersecurity Policy
and private sectors, and within the private sector; and, iii) permit limited and
Framework
appropriately-regulated private enforcement and/or active defense, provided
that appropriate controls are in place to ensure that this does not extend to
‘vigilante’ or ‘hack back’ behaviors.
26
5. Rely on accepted definitions: As cybercrime often crosses borders, it is
Overview of the important that the law enforcement agencies involved in investigating it have
Cybersecurity Policy
a broadly similar understanding of what crime has taken place. The solution to
Framework
this challenge lies in the adoption of cybercrime laws that are consistent with
broadly-accepted international standards. For example, the Council of Europe’s
Budapest Convention provides a good model for cybercrime legislation that
harmonizes laws and facilitates cooperation across borders.
Further information
For more information:
27
Overview of the
Cybersecurity Policy
Framework
Developing and
updating critical
infrastructure
protection laws
28
Overview of the
Developing and updating critical
Cybersecurity Policy
Framework
infrastructure protection laws
“’Critical Infrastructure’ means systems and assets, whether physical or virtual, so vital to the
country that the incapacity or destruction of such systems and assets would have a debilitating
impact on security, national economic security, national public health or safety, or any
combination of those matters.”
The essential nature of the critical infrastructures’ function and services renders
their protection an important national policy concern. However, unlike traditional,
offline, security approaches, which could often be mitigated through regulatory
action alone, understanding and managing risk to infrastructures connected to
29
digital environments requires a new approach. The complexities involved can
Overview of the only be navigated through unprecedented coordination and collaboration across
Cybersecurity Policy
government, critical infrastructure owners and operators, as well as technology
Framework
vendors.
30
specific risk assessments and identifying categories of critical infrastructure;
Overview of the ii) coordinating the adoption of outcome-based cybersecurity practices; iii)
Cybersecurity Policy
establishing an incentives-based cybersecurity
Framework
program to encourage outcome-based practices;
iv) developing procedures to inform owners and Adjusting risk
operators of cyber-threats, vulnerabilities and management and
consequences; and v) providing technical guidance catalyzing economic
and support. growth
4. Clarify the respective responsibilities of owners
Globally aligned security baselines ensure that
and operators of critical infrastructure: There sufficient resources are applied to security and
should be a clear distinction between an “owner” risk management rather than diverted toward
and an “operator” of critical infrastructure. Owners compliance. Throughout the ecosystem, the
impact of this is multiplied, as third party
of critical infrastructure may own the infrastructure
suppliers are also able to devote sufficient
but they are not always able or best placed to resources to security and risk management
comply with the statutory obligations because they rather than diverting those resources toward
usually do not operate the computer systems that compliance.
process the data on a day-to-day basis. Operators, Moreover, they can ensure that organizations
meanwhile, are the entities that manage or operate continue to invest in security innovation, as
organizations have confidence that policies
the critical infrastructure. The relevant obligations
provide sufficient flexibility to develop new
may include: implementation of regular system techniques, capabilities, and architectures.
audits by approved third-party auditors or
Finally, security baselines can help ensure
performing regular risk assessments on critical that organizations continue to invest in
infrastructure. and leverage resources across borders,
maintaining the global manufacturing
5. Introduce minimum security baselines and outsourcing relationships that have
for critical infrastructure: The national helped to not only increase global economic
cybersecurity agency should establish minimum opportunity but also drive down the costs
of developing and popularizing advanced
security baselines for critical infrastructure. These
technologies.
can take form of voluntary guidance, coupled
with incentives, e.g. procurement requirements
or tax subsidies; or be implemented through a
mandatory regulatory requirement, in particular where an elevated need for
assurance arises from the risk environment. The measures that apply should
be proportionate to the criticality of the infrastructure, based on international
good practice standards, such as those set out under the NIST Cybersecurity
Framework. It is important that these security standards are developed in close
collaboration with the industry to ensure that they are realistic and practicable.
31
6. Encourage information sharing: Sharing threat-based information such
Overview of the as vulnerabilities, hacking trend data, new threat identification, or even
Cybersecurity Policy
unexplained anomalies impacting a product or service can enable the IT sector
Framework
and government to better protect critical systems and respond to emerging
issues. Not only is it the case that when information about attackers and
methods of attack is shared, organizations are better prepared to thwart them,
it can also help lead to new protections or mitigations, sometimes even before
any impact. Microsoft believes that a sustainable information sharing program
needs to be event-driven and to focus on several key areas that should be
precisely defined: the actors involved, the type of information exchanged,
whether sharing is voluntary or required, the methods and mechanisms for
transmitting information, and the grouping of actors in a program.
The NIST Framework began life as Executive Order 13636 on Improving Critical Infrastructure
Cybersecurity. Its development took place over many months through official consultations,
workshops, and informal conversations. The Framework continues to evolve and be updated, as
through implementation stakeholders discover challenges or areas to which it could expand to help
them manage their cybersecurity risk environment.
Critically, the United States is not the only geography looking to utilize the Framework. In Europe,
the Italian government in 2015 adopted their own cybersecurity framework, which focuses on small
and medium sized enterprises. The Italian document is largely grounded in the NIST Framework.
Similarly, the Australian Securities and Investments Commission (ASIC) in 2015 issued Report 429
Cyber resilience: Health check (REP 429), which encouraged businesses to consider using the NIST
Cybersecurity Framework to assess and mitigate their cyber risks or to stocktake their cyber risk
management practices.
The uptake of the Cybersecurity Framework is likely to continue. The recent Presidential Executive
Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure mandates
the use of the Framework across the agencies of the United States government. Moreover, the
International Standards Organization (ISO) has recently approved work on a technical report on
“Cybersecurity and ISO and IEC Standards”, which seeks to take the NIST Cybersecurity Framework
and adapt it to the international environment.
32
7. Create public private partnerships: Public-private partnerships are a
Overview of the cornerstone of effectively protecting critical infrastructure and managing
Cybersecurity Policy
security risks in both the short- and long-term. They are essential for boosting
Framework
trust amongst and between the operators and the government. Their focus
areas could include: coming to an agreement on common cybersecurity
baselines, establishing effective coordinating structures and information-
sharing processes and protocols, identifying and exchanging ideas,
approaches, and best practices for improving security, as well as improving
international coordination.
Further information
For more information, see:
• http://download.microsoft.com/download/4/6/0/46041159-48FB-464A-B92A-
80A2E30B78F3/MS-riskmanagement-securitybaselines-WEB.pdf
33
Overview of the
Cybersecurity Policy
Framework
An international
strategy for
cybersecurity
34
Overview of the
An international strategy for cybersecurity
Cybersecurity Policy
Framework
Why is an international strategy for cybersecurity needed?
Cybersecurity is a challenge that transcends territorial boundaries. At the
same time, governments continue to invest in greater offensive capabilities in
cyberspace, and nation-state attacks on civilians are on the rise. It is therefore
more important than ever that states work together to address the growing range
of cybersecurity threats. Any national strategy for cybersecurity must therefore
have the international in mind too.
why are they important? If the conflict is severe enough it can even
negatively affect uninvolved states, for
Norms are shared expectations of what behaviors example by disrupting regional or global
trade.
are appropriate and inappropriate among members
of a society. Common societal expectations about Conflict in cyberspace can be equally
detrimental to states’ growth and
use of seat belts in cars and when or where to cross
development. That being said, with the
streets are norms from the physical world. In the internet facilitating anonymity, it can be hard
context of international security, norms are intended to attribute responsibility for state-supported
to increase predictability and confidence between cyberattacks during “peace time”.
states in times of uncertainty. Norms are intended Contributing to international norms processes
to deter actions by defining what behaviors are that reduce the risks of such attacks, let
alone all-out conflict, should therefore be
acceptable and unacceptable, and imposing
seen as a positive step for any country’s
consequences when states actions don’t adhere to future prosperity and stability. Indeed, for
the defined behaviors. external investors and businesses, a market’s
clear commitment to minimize the risks of
To be clear, norms are not hard law. Norms are cyberconflict with neighbors and global
most often voluntary and/or politically binding partners will be regarded as a net positive.
agreements, and are an initial step in a cadence of
35
progress that can eventually evolve into customary international law and also pave
Overview of the the way for codification.
Cybersecurity Policy
Framework Microsoft believes that cybersecurity norms are essential if countries are to
increase the security of cyberspace and to preserve the utility of a globally
connected society. They should define acceptable and unacceptable state
behaviors, with the aim of reducing risks, fostering greater predictability, and
limiting the potential for the most problematic impacts.
We believe that to make significant progress in this space, we have to lay bare the
fact that there is, unfortunately, little specificity in the government agreements
reached so far. This situation allows states to continue to act in violation of
established norms, without the international community having any recourse to
respond. For example, international law prohibits the use of force by states except
in self-defense in response to an armed attack, and the UNGGE norms call for
states to refrain from international malicious activity. The questions are how these
statements should apply to cyberspace, how concepts such as malicious activity
are defined. This is where the work so far falls short. To move forward, these gaps
will need to be identified and addressed.
Moreover, the current list of norms does not fully address the core drivers of
instability in cyberspace. A limited set of additional cybersecurity norms in areas
where existing rules are either unclear or may fall short in protecting civilians
in cyberspace need to be developed. This could include norms which explicitly
articulate protections for civilians, even if they are implicitly contained elsewhere in
international law. The development of these norms should be informed not just by
governments, but also by civil society and the private sector.
While there is a need for urgency and even high ambition, steps can also be taken
incrementally. There are important opportunities to progress towards a legally
binding agreement through initial voluntary or politically binding efforts, such
as those underway within the United Nations or the Group of Twenty Countries
36
(G20). Ultimately, whatever the route, arriving at a legally binding framework
Overview of the would establish new rules for governments and help protect cyberspace in both
Cybersecurity Policy
peacetime and prevent conflict
Framework
1. 2. 3.
No targeting of tech Assist private sector Report
companies, private efforts to detect, vulnerabilities to
sector, or critical contain, respond to, vendors rather than
infrastructure and recover from to stockpile, sell or
events exploit them
4. 5. 6.
Microsoft’s proposal for a Digital Geneva Convention: Overview
37
Further information
Overview of the Overview of the
Cybersecurity Policy Microsoft has long advocated for international norms to govern government Cybersecurity Policy
Framework behavior in cyberspace. To this end a series of white papers have been developed, Framework
putting forward suggestion for what form international cybersecurity norms could
take. The white papers also examine the respective roles of public and private
organizations. For more information, see:
38
Conclusion
39
At this time of unprecedented technological change, it is more important than
Conclusion ever that policy-makers rise to the challenge of developing cybersecurity policies
that balance the new risk environment with the almost unlimited potential of
technology to enhance the national and global good.
Decisions made by policy-makers over the next few years concerning matters
such as cybercrime, protection of critical infrastructure, law enforcement and
international cooperation will shape trust in computing and economic growth for
decades to come.
We hope that this Cybersecurity Policy Framework is a useful starting point for
policy-makers as they look to find solutions to the problems of this challenging
new environment. We look forward to continuing both our collaboration with
policy-makers around the world and our support for global efforts to make the
future of computing more secure.
40
Recommended
resources
41
Microsoft cybersecurity policy: www.microsoft.com/en-us/cybersecurity
Recommended
resources
A Cloud for Global Good: news.microsoft.com/cloudforgood/
42