Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security (CENS)
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
Outreach
Global Networks
About Global Networks
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
Public Education
About Public Education
RSIS Alumni
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
Video Channel
Podcasts
News Releases
Speeches
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School RSIS30th
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National Security (CENS)Institute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other events
  • Outreach
      Global NetworksAbout Global Networks
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      Public EducationAbout Public Education
  • RSIS Alumni
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      Video ChannelPodcastsNews ReleasesSpeeches
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS
Connect
Search
  • RSIS
  • Publication
  • RSIS Publications
  • IP26054 | Doubling Down: The US Cybersecurity Strategy 2026
  • Annual Reviews
  • Books
  • Bulletins and Newsletters
  • RSIS Commentary Series
  • Counter Terrorist Trends and Analyses
  • Commemorative / Event Reports
  • Future Issues
  • IDSS Papers
  • Interreligious Relations
  • Monographs
  • NTS Insight
  • Policy Reports
  • Working Papers

IP26054 | Doubling Down: The US Cybersecurity Strategy 2026
Kevin Chen Xian An

27 March 2026

download pdf

KEY TAKEAWAYS

• US cyber strategies were largely defensive and driven by risk management considerations until 2018, when they started taking on a more aggressive posture.

• The 2026 Cyber Strategy goes further to expand the scope of retaliation against cyberattacks while calling for the use of private firm capabilities in cyberattack campaigns.

• This offensive posture is paired with stronger defensive moves such as bans on foreign-made hardware like routers and drones.

COMMENTARY

On the surface, the recent ban by the US Federal Communications Commission (FCC) on consumer routers produced in foreign countries has little in common with US cyber operations in Venezuela under Operation Absolute Resolve. Yet they are both manifestations of the US National Cybersecurity Strategy 2026 that was released in March.

In five pages of concise prose, US President Donald Trump’s government expressed a vision for American cybersecurity with both a stronger offensive posture and a broader domestic shield against cyberattacks.

Understanding this strategy requires tracing the evolution of American cyber strategies since the National Strategy to Secure Cyberspace of 2003. It may appear as a sequel to Trump’s 2018 cyber strategy and a departure from his predecessor Joe Biden’s cyber strategy of 2023. Yet it arguably takes ideas that were present in both documents and develops them further.

The Evolution of US Cyber Strategies

The core of every US cyber strategy has remained unchanged since 2003: to prevent cyberattacks against American critical infrastructure; reduce national vulnerability to cyberattacks; and minimise the damage and recovery time from cyberattacks.

To fulfil these objectives, successive US governments sought to work with private firms to address cyberthreats instead of pushing for legislative solutions. Indeed, prior to 2018, the US cyber posture could be described as defensive and driven by risk management.

The concept of deterring cyberattacks had been present since the 2003 strategy, which called for stronger counter-intelligence efforts to name and shame “malicious actors”. However, this push for deterrence first gained real teeth under the first Trump administration, which saw cyberspace as a key element of geopolitical competition.

Under the 2018 strategy, the best defence was seen as a fierce offence. National Security Presidential Memorandum 13 authorised offensive cyber operations to create what then-National Security Advisor John Bolton called “structures of deterrence” against malicious digital actors. Even Biden retained this focus on offensive capabilities, including methods to “disrupt and dismantle threat actors” as a strategic pillar of his cyber strategy.

Biden’s 2023 strategy tried to leave its own mark on US cyber policy by prioritising clean energy to improve the resilience of the US electric grid and establish secure supply chains for telecommunications products. It sought to “shape market forces” by introducing liability for cybersecurity errors, taking a more interventionist stance towards the private sector. It also pledged to “forge international partnerships”, going into detail about working through mechanisms such as the Quad, the quadrilateral security partnership between the United States, Australia, India and Japan, to advance shared goals for cyberspace.

This strategic direction, however, did not last. Trump’s 2026 strategy retains some of the prognoses of its predecessor’s strategy but offers more aggressive solutions.

IP26054
Trump’s 2026 cybersecurity strategy takes a more aggressive approach than previous administrations. Image source: Unsplash

A Greater Offensive Arsenal

The cyber strategies adopted by the Biden and first Trump administrations as well as the Obama administration all began with an enunciation of how the digital economy and cyberspace are important for Americans. The 2026 iteration eschews this for a blunt promise to act “swiftly, deliberately, and proactively to disable cyber threats”, setting the tone for the rest of the document.

There are two key elements that make the 2026 strategy more aggressive than its predecessors. First, it declares that America “will not confine [its] responses to the “cyber” realm”. This threat goes beyond the normal use of sanctions and could include diplomatic, intelligence, or even military solutions, raising the prospect of kinetic responses or even pre-emptive strikes against ostensible adversaries.

Second, the 2026 strategy calls on private companies to take on a bigger role in national cyber efforts. While liability for errors by private firms is mentioned, its inclusion in a section on “streamlin[ing]” cyber regulations hints at intentions more in line with market-driven approaches than Biden’s. The ominous promise to “unleash the private sector” to “shape adversary behaviour” points to a posture of employing private companies to attack foreign parties.

Granted, the idea of private firms “hacking back” against digital adversaries is currently illegal. Yet we can already see private firms, particularly artificial intelligence firms such as Anthropic and Palantir, working with the US military in operations in Venezuela and Iran. The inescapable conclusion is that the US government no longer sees private firms just as partners for defence, but as offensive tools as well.

Fortress America

The 2026 strategy may have de-emphasised its 2023 predecessor’s call for forging international partnerships, but it did zero in on one aspect: banning equipment from adversaries.

Since 2019, US federal agencies have been barred from using equipment or services by five Chinese companies, including Huawei and ZTE. In 2021, the FCC went further to include these companies in its Covered List, which restricts the sale or import of new equipment from these companies altogether for posing an “unacceptable risk” to US national security. This list was gradually expanded in 2022 and 2024, with the addition of service providers such as China Mobile.

Seen in this light, the FCC’s 23 March ban on new foreign-made consumer routers was a drastic development, but not completely unexpected. The FCC announcement noted that foreign-made routers were “directly implicated” in recent attacks against American infrastructure by “advanced persistent threat (APT) actors” such as Volt, Flax and Salt Typhoon.

One can also draw links between this ban and the 2025 National Security Strategy, which argues that “the United States must never be dependent on any outside power for core components … necessary to the nation’s defence or economy.”

The bigger question is whether this sweeping ban will remain unchanged. While the FCC announced a similar ban on all foreign-made drones and components in December 2025, it subsequently exempted four non-Chinese models in March. In a similar fashion, the router ban may be a temporary measure while investigations continue behind the scenes. Alternatively, the ban could be an effort to gain leverage over foreign router companies and compel them to invest in American manufacturing.

Nonetheless, the 2026 strategy clearly shifts the US cyber posture towards a far more aggressive and isolationist direction. Subsequent governments may choose to limit hardware bans, emphasise cooperation with partners, or even place guardrails on the utilisation of private firms. However, the defensive, risk management-based approach firmly appears to be a thing of the past.


Kevin Chen Xian An
 is an Associate Research Fellow in the US Programme at the Institute of Defence and Strategic Studies (IDSS), S. Rajaratnam School of International Studies (RSIS).

Categories: IDSS Papers / Country and Region Studies / International Politics and Security / East Asia and Asia Pacific / South Asia / Southeast Asia and ASEAN / Global

KEY TAKEAWAYS

• US cyber strategies were largely defensive and driven by risk management considerations until 2018, when they started taking on a more aggressive posture.

• The 2026 Cyber Strategy goes further to expand the scope of retaliation against cyberattacks while calling for the use of private firm capabilities in cyberattack campaigns.

• This offensive posture is paired with stronger defensive moves such as bans on foreign-made hardware like routers and drones.

COMMENTARY

On the surface, the recent ban by the US Federal Communications Commission (FCC) on consumer routers produced in foreign countries has little in common with US cyber operations in Venezuela under Operation Absolute Resolve. Yet they are both manifestations of the US National Cybersecurity Strategy 2026 that was released in March.

In five pages of concise prose, US President Donald Trump’s government expressed a vision for American cybersecurity with both a stronger offensive posture and a broader domestic shield against cyberattacks.

Understanding this strategy requires tracing the evolution of American cyber strategies since the National Strategy to Secure Cyberspace of 2003. It may appear as a sequel to Trump’s 2018 cyber strategy and a departure from his predecessor Joe Biden’s cyber strategy of 2023. Yet it arguably takes ideas that were present in both documents and develops them further.

The Evolution of US Cyber Strategies

The core of every US cyber strategy has remained unchanged since 2003: to prevent cyberattacks against American critical infrastructure; reduce national vulnerability to cyberattacks; and minimise the damage and recovery time from cyberattacks.

To fulfil these objectives, successive US governments sought to work with private firms to address cyberthreats instead of pushing for legislative solutions. Indeed, prior to 2018, the US cyber posture could be described as defensive and driven by risk management.

The concept of deterring cyberattacks had been present since the 2003 strategy, which called for stronger counter-intelligence efforts to name and shame “malicious actors”. However, this push for deterrence first gained real teeth under the first Trump administration, which saw cyberspace as a key element of geopolitical competition.

Under the 2018 strategy, the best defence was seen as a fierce offence. National Security Presidential Memorandum 13 authorised offensive cyber operations to create what then-National Security Advisor John Bolton called “structures of deterrence” against malicious digital actors. Even Biden retained this focus on offensive capabilities, including methods to “disrupt and dismantle threat actors” as a strategic pillar of his cyber strategy.

Biden’s 2023 strategy tried to leave its own mark on US cyber policy by prioritising clean energy to improve the resilience of the US electric grid and establish secure supply chains for telecommunications products. It sought to “shape market forces” by introducing liability for cybersecurity errors, taking a more interventionist stance towards the private sector. It also pledged to “forge international partnerships”, going into detail about working through mechanisms such as the Quad, the quadrilateral security partnership between the United States, Australia, India and Japan, to advance shared goals for cyberspace.

This strategic direction, however, did not last. Trump’s 2026 strategy retains some of the prognoses of its predecessor’s strategy but offers more aggressive solutions.

IP26054
Trump’s 2026 cybersecurity strategy takes a more aggressive approach than previous administrations. Image source: Unsplash

A Greater Offensive Arsenal

The cyber strategies adopted by the Biden and first Trump administrations as well as the Obama administration all began with an enunciation of how the digital economy and cyberspace are important for Americans. The 2026 iteration eschews this for a blunt promise to act “swiftly, deliberately, and proactively to disable cyber threats”, setting the tone for the rest of the document.

There are two key elements that make the 2026 strategy more aggressive than its predecessors. First, it declares that America “will not confine [its] responses to the “cyber” realm”. This threat goes beyond the normal use of sanctions and could include diplomatic, intelligence, or even military solutions, raising the prospect of kinetic responses or even pre-emptive strikes against ostensible adversaries.

Second, the 2026 strategy calls on private companies to take on a bigger role in national cyber efforts. While liability for errors by private firms is mentioned, its inclusion in a section on “streamlin[ing]” cyber regulations hints at intentions more in line with market-driven approaches than Biden’s. The ominous promise to “unleash the private sector” to “shape adversary behaviour” points to a posture of employing private companies to attack foreign parties.

Granted, the idea of private firms “hacking back” against digital adversaries is currently illegal. Yet we can already see private firms, particularly artificial intelligence firms such as Anthropic and Palantir, working with the US military in operations in Venezuela and Iran. The inescapable conclusion is that the US government no longer sees private firms just as partners for defence, but as offensive tools as well.

Fortress America

The 2026 strategy may have de-emphasised its 2023 predecessor’s call for forging international partnerships, but it did zero in on one aspect: banning equipment from adversaries.

Since 2019, US federal agencies have been barred from using equipment or services by five Chinese companies, including Huawei and ZTE. In 2021, the FCC went further to include these companies in its Covered List, which restricts the sale or import of new equipment from these companies altogether for posing an “unacceptable risk” to US national security. This list was gradually expanded in 2022 and 2024, with the addition of service providers such as China Mobile.

Seen in this light, the FCC’s 23 March ban on new foreign-made consumer routers was a drastic development, but not completely unexpected. The FCC announcement noted that foreign-made routers were “directly implicated” in recent attacks against American infrastructure by “advanced persistent threat (APT) actors” such as Volt, Flax and Salt Typhoon.

One can also draw links between this ban and the 2025 National Security Strategy, which argues that “the United States must never be dependent on any outside power for core components … necessary to the nation’s defence or economy.”

The bigger question is whether this sweeping ban will remain unchanged. While the FCC announced a similar ban on all foreign-made drones and components in December 2025, it subsequently exempted four non-Chinese models in March. In a similar fashion, the router ban may be a temporary measure while investigations continue behind the scenes. Alternatively, the ban could be an effort to gain leverage over foreign router companies and compel them to invest in American manufacturing.

Nonetheless, the 2026 strategy clearly shifts the US cyber posture towards a far more aggressive and isolationist direction. Subsequent governments may choose to limit hardware bans, emphasise cooperation with partners, or even place guardrails on the utilisation of private firms. However, the defensive, risk management-based approach firmly appears to be a thing of the past.


Kevin Chen Xian An
 is an Associate Research Fellow in the US Programme at the Institute of Defence and Strategic Studies (IDSS), S. Rajaratnam School of International Studies (RSIS).

Categories: IDSS Papers / Country and Region Studies / International Politics and Security

Popular Links

About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersRSIS Intranet

Connect with Us

rsis.ntu
rsis_ntu
rsisntu
rsisvideocast
school/rsis-ntu
rsis.sg
rsissg
RSIS
RSS
Subscribe to RSIS Publications
Subscribe to RSIS Events

Getting to RSIS

Nanyang Technological University
Block S4, Level B3,
50 Nanyang Avenue,
Singapore 639798

Click here for direction to RSIS

Get in Touch

    Copyright © S. Rajaratnam School of International Studies. All rights reserved.
    Last updated on
    Privacy Statement / Terms of Use
    Help us improve

      Rate your experience with this website
      123456
      Not satisfiedVery satisfied
      What did you like?
      0/255 characters
      What can be improved?
      0/255 characters
      Your email
      Please enter a valid email.
      Thank you for your feedback.
      This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
      OK
      Latest Book
      more info