Golden Dome for America (GDA) Cybersecurity Requirements
On May 20, 2025, the US Secretary of Defense (SECDEF) announced support for the Golden Dome for America (GDA), a next-generation missile defense shield formalized in Executive Order (EO) 14186. The proposed “Golden Dome” will include space-based interceptors and sensors.
Per the US Department of Defense’s (DoD’s) memorandum, “The GDA's success will rely upon bold vision, innovation, and cutting-edge technology provided by the Defense Industrial Base (DIB). DIB companies, both large and small, are the targets of malicious cyber actors' intent on theft of intellectual property, disruption of operations, or espionage. GDA is a system of systems, reliant on numerous technologies integrated into a holistic system. To that end, the DoD must ensure the security of the GDA program through the application of supply chain requirements for the entirety of the GDA DIB ecosystem.”
Golden Dome For America (GDA) Cybersecurity Requirements
Based on this recent DoD memorandum, GDA vendors must address the following cybersecurity requirements:
- From a cybersecurity controls perspective, GDA vendors must:
- Implement NIST SP 800-53 R5 controls in accordance with DoDI 8510.01 (Risk Management Framework for DoD Systems);
- Harden systems, applications and services according to the DoD’s Security Technical Implementation Guides (STIGs); and
- Implement a tamper protection program for the system, system components and/or system service(s) (e.g., logical and/or physical tampering).
- From a data protection perspective, GDA implementations with Controlled Unclassified Information (CUI) must conform to NIST SP 800-171 and possibly select NIST SP 800-172 controls, based on the type of CUI in the contract:
- At a minimum, CMMC Level 2 certification is required; and
- For components treated as a target for Advanced Persistent Threats (APTs) will require “enhanced protections” and a CMMC Level 3 certification will be required.
- From a Supply Chain Risk Management (SCRM) perspective, GDA vendors must:
- Adhere to NIST SP 800-161 R1 to implement an Information and Communications Technology Supply Chain Risk Management (ICT-SCRM) capability;
- Maintain a Supply Chain Risk Management Plan (SCRM Plan); and
- Perform supplier assessments and reviews.
- GDA vendors must subscribe to the National Security Agency Cybersecurity Collaboration Center (NSA CCC) threat intelligence sharing service.
- GDA vendors that develop or utilize custom software must:
- Utilize secure development practices that conform to:
- EO 14028; and
- NIST SP 800-218 for a Secure Software Development Framework (SSDF); and
- Provide attestation of secure development practices according to the Cybersecurity Infrastructure and Security Agency (CISA) Secure Software Development Attestation Form (SSDAF).
- Utilize secure development practices that conform to:
- For GDA vendors that handle classified information for US government agencies or foreign governments, the GDA must have an Insider Threat Program (ITP) that:
- Gathers, integrates and reports relevant and available information indicative of a potential or actual insider threat; and
- Conforms with:
- EO 13587; and
- Presidential Memorandum "National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs".
- GDA vendors must assess supply chain risks in accordance with:
- DFARS 252.239-7018; and
- Chapter 3 of the DoD Risk, Issue, and Opportunity Management Guide for Defense Acquisition Programs (referred to as the Risk Management Guide (RMG)).
- GDA vendors must provide applicable Bills of Materials (BOMs), based on their product/service:
- Hardware BOM (HBOM);
- Software BOM (SBOM);
- Firmware BOM (FBOM);
- Microelectronics BOM (MBOM);
- Chemical BOM (CBOM); and
- Raw Materials BOM (RBOM).
- GDA vendors must adhere to FAR clause 52.204-24 (Section 889 of FY 2019 NDAA) that prohibits certain telecommunications and video surveillance services or equipment (Huawei, ZTE, Hytera, Hikvision and Dahua).
- GDA vendors with National Security Systems (NSS) will be verified in Supplier Performance Risk System (SPRS) that none of the proposed products appear on the NSS Restricted list in accordance with 10 U.S.C. 3252.
- For Commercial Off-the-Shelf (COTS) products that are National Information Assurance Partnership (NIAP) certified, the GDA vendor must:
- Implement its Protection Profile (PP); and
- Address newly identified vulnerabilities.
- GDA vendors must generate and maintain the following evidence of due diligence and due care:
- Hardware and software inventory list;
- Hardware and device certifications and approvals;
- Incident Response Plan (IRP);
- Software Certification test results or attestations/memorandums;
- SCRM Policy; and
- List of all implemented Security Technical Implementation Guides (STIG).