UN Global Mechanism on ICT security

The UN plays a crucial role in global cybersecurity negotiations, with the issue of information security being on the UN agenda since 1998 when the Russian Federation introduced a draft resolution on the subject in the First Committee of the UN General Assembly.

This page provides comprehensive coverage of ongoing and past First Committee processes related to cybersecurity, peace, and security at the UN, including the Groups of Governmental Experts (GGEs), the Open-ended Working Group (OEWG), and the permanent UN Global Mechanism on ICT security.

Our chatbot offers an accessible overview of the history of UN negotiations on responsible state behaviour in cyberspace, as well as the core elements that shape this global framework.

Global Mechanism

The Final report of the OEWG 2021-2025 sets up a new single-track permanent mechanism called ‘Global Mechanism on developments in the field of ICTs in the context of international security and advancing responsible State behaviour in the use of ICTs’ that will continue discussions about the five pillars of the framework for responsible state behaviour in the use of ICTs. The Global Mechanism, a subsidiary body of the UN General Assembly reporting to the First Committee, will hold its organisational session in March 2026.

The Global Mechanism will convene in different formats. 

After its organisational session in March 2026, it will hold substantive plenary sessions once a year during each biennial cycle. The first substantive session is scheduled for July 2026.

It will hold two dedicated thematic groups—one addressing general substantive issues and one focused on capacity building—intended to enable more in-depth discussions, building on the outcomes of the plenary. In 2026, the dedicated thematic groups are scheduled to take place from 7 to 11 December.

In addition, the mechanism will convene a review conference every five years to assess progress and guide its future direction.

The process may also set up intersessional meetings if needed.

The Final report also sets up modalities for stakeholder participation in the Global Mechanism. Relevant non-governmental organisations with ECOSOC status can be accredited to participate in the substantive plenary sessions and review conferences of the Global Mechanism, while other stakeholders would have to undergo an accreditation on a non-objection basis.

 Text, Page, Symbol

The elements laid out in the Final report build on Annex C of the third Annual Progress report of the OEWG. During negotiations in July 2024, delegations agreed on the elements for the future mechanism, enshrined in Annex C of the third Annual Progress Report of the UN OEWG. The Annex C laid out the guiding principles, functions and scope, structure, modalities, and decision-making approach of the future mechanism, and was subsequently referenced by the Final Report of the OEWG as well. 

Body of existing agreements

The body of existing agreements refers to the framework of responsible behaviour of states in cyberspace. This framework is sometimes also called ‘acquis’, a term borrowed from the EU for the body of common rights and obligations that is binding on all the EU member states. While it has quickly been adopted for informal discussions, there is still no clear understanding of everything it encompasses.

It encompasses the GGE 2010 report, the GGE 2013 report, the GGE 2015 report, the GGE 2021 report and the OEWG 2025 report.  All reports were adopted by respective resolutions of the UNGA by consensus of all states (the 2025 report is expected to be adopted as well). Additionally, other resolutions, such as those that established the GGEs and OEWGs on cybersecurity,  as well as the three Annual Progress Reports (APR) of the second OEWG, also play a role, as states refer to some of them throughout negotiations. This particularly refers to the UNGA resolutions that established the OEWG in 2018 and 2020, since they do not entirely match GGE's reports, but rather reflect on other issues such as propaganda, and have procedural implications.

 

Unresolved issues

Despite long-running discussions and several consensus reports, there are a number of issues that remain open.

Existing and potential threats

 Text, Device, Grass, Lawn, Lawn Mower, Plant, Tool, Gun, Weapon

  • Are ransomware and cryptocurrency theft threats to international security?

Some countries claim that ransomware, cryptocurrency theft, and financing of malicious ICT activity using cryptocurrency cannot be linked to international peace and security because they are criminal activities and are financially motivated. Consequently, these issues are outside the OEWG’s mandate. However, the most recent annual progress report does contain references to these issues.

  • Are misinformation and disinformation threats to international security?

Some states recognise misinformation and disinformation as significant threats to the ICT environment. Concerns are also rising about the role of generative AI in these campaigns, especially its use in creating deepfakes that erode public trust and pose a risk to democracy, particularly during elections. However, the most recent annual progress report recognises ‘covert information operations’ as threats and does not reference misinformation and disinformation driven by advanced technologies, such as deepfakes.

Rules, norms and principles

 Body Part, Hand, Person, Aircraft, Airplane, Transportation, Vehicle, Handshake

  • Are new norms needed?

Are more norms needed at the moment? Or should the focus be placed on implementing existing ones? The 2015 GGE report, the resolution establishing the OEWG, and the final OEWG reports from 2021 and 2025 provide opportunities for developing additional norms over time.

 States have differing views on this issue: Some insist that new norms should be developed, some insist that existing norms should be implemented first, and some hold that the implementation of norms can be complementary to the gradual development of additional norms; these two processes are not mutually exclusive. 

The final OEWG report from 2025 retained the idea that additional norms could emerge, but excluded it from its recommendations. It does, however, recommend that states continue discussions on rules, norms and principles in the Global mechanism.

  • Should the Voluntary Checklist be universal?

The checklist, initially proposed for adoption as an annexe to the Final Report, was not adopted in July 2025. Several states raised concerns about the applicability of a universal checklist, emphasising that implementation should consider regional, national, and culturally specificities. The checklist has been reworded and is now open for continued discussion.

Applicability of international law

 Accessories, Bag, Handbag, Scale

  • Does international law apply to cyberspace?

The UN GGE reports, the final OEWG reports of 2021 and 2025, and the related UN General Assembly (GA) resolutions affirm that international law, including the UN Charter, applies to cyberspace. However, some states believe that existing international law does not apply to cyberspace. They do, however, note that principles of international law apply – sovereign equality of states, non-use of force and threat of force, settlement of international disputes by peaceful means, and non-interference in the internal affairs of states.

The OEWG report for 2025 recommends that the states continue discussions on how international law applies in the Global Mechanism, pushing the divides in this area into the future.

  • Which UN Charter principles apply to cyberspace?

Most states stated that the principle of sovereignty and sovereign equality, enshrined in Art. 2.1. of the UN Charter, applies in cyberspace. Most countries have also recognised the principle of due diligence in cyberspace.

Many states have reaffirmed the obligation of states to settle disputes peacefully in accordance with Art. 2.3 and Art. 33 of the UN Charter. This means states must use negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice. The customary international law obligation not to intervene in the internal or external affairs of another state, enshrined in Art. 2.7 of the UN Charter, applies to cyberspace, just as it applies to the physical realm All states agree that they should refrain from the threat or use of force against other states’ territorial integrity or political independence, which also applies in cyberspace. However, there is no consensus on whether misuse of ICTs/cyberattacks can be qualified as armed attacks, per Art. 51 of the UN Charter which permits the right to self-defence in case of armed attack). The states agree that the principles of due diligence, attribution, invoking the right of self-defence, and assessing whether an internationally wrongful act has been committed require additional work to understand how they apply in cyberspace.

  • Is there a need for a new legally binding instrument?

The need for a new legally binding instrument regulating the use of ICT by states remains an important question in the discussions. Most countries do not see the need to develop a new legally binding instrument, opposing such a proposal and saying it would mean a significant setback in advancing international security and stability, which would lead to confusion and misunderstanding. On the other hand, some countries are calling for the development a new, single, legally binding international instrument. These countries think that cyberspace is unique and cannot be addressed by applying existing international law, that gaps in existing international law require new legally binding regulation, or that how international law applies in cyberspace needs to be clarified.

The OEWG report for 2025 keeps the door open for discussions on the possibility of future elaboration of additional binding obligations, if appropriate, and the development of additional legally-binding obligations.

  • Does international humanitarian law (IHL) apply to cyberspace?

The GGE 2021 report recognised that international humanitarian law (IHL) applies only in

situations of armed conflict. Most delegations confirmed this in the discussions at the OEWG. These delegations see adherence to the IHL as of paramount importance as it offers fundamental protections and reduces the risks and potential harm to both civilians and civilian objects (IT infrastructure of hospitals or schools) and to combatants from cyber operations in the context of armed conflict. These states see it as a priority to clarify how IHL applies to cyber operations in armed conflicts.

Another group of states holds that the OEWG should not even discuss the applicability of IHL to the use of ICTs in the context of international security since it would imply that the states tacitly accept the possibility of an armed conflict in cyberspace, which would contribute to militarisation in cyberspace and would be the first step towards an armed cyberattack.

While the 2025 OEWG report states that discussions on international law deepened, it does not mention IHL in the text. The issue will likely resurface in discussions at the Global Mechanism.

Capacity building

 Art, Drawing, Doodle

  • How should the UN ensure adequate and sufficient financing for capacity-building initiatives?

The proposal for a permanent UN-administered fund to support cybersecurity capacity building in developing countries generated significant debate among delegations. The supporters, including several developing nations and the Arab Group, advocate for the fund as a means to ensure equitable and sustainable access to financial resources, arguing that it would help bridge the digital divide and strengthen global cybersecurity. They pointed out that such a fund would provide consistent financing necessary for long-term initiatives, particularly in countries lacking robust cybersecurity infrastructure. However, other delegations expressed concerns about the management and oversight of the fund, fearing it could lead to duplication of existing funding mechanisms and questioning how the fund would be administered to avoid inefficiencies. For example, some European nations stressed the importance of leveraging existing structures like the World Bank’s cybersecurity initiatives, cautioning against the creation of parallel systems that might fragment international efforts.

  • What should be the scope and structure of the Global Cybersecurity Cooperation Portal, and how can it be streamlined with existing initiatives?

The proposal for a Global Cyber Security Cooperation Portal sparked a detailed debate on how this new platform should be integrated or synergised with existing cybersecurity portals to avoid duplication and enhance global cooperation. Delegations expressed concerns about the potential for overlap with established platforms like the Global Forum on Cyber Expertise (GFCE) Cyber Portal and the EU CyberNet, emphasising the need for careful coordination to ensure the new portal adds value rather than creating redundancy. On the other hand, some delegations, including those from developing countries, emphasised the portal’s potential to address gaps in current systems, particularly in terms of accessibility and tailored support for countries with limited cybersecurity resources.

  • How should the proposed UN Voluntary Trust Fund be operationalised, and how should it be integrated with existing funding mechanisms?

Delegations broadly supported the idea of establishing a UN Voluntary Trust Fund on security and ICT use; however, concerns emerged regarding its operationalisation. There was a need for more discussion on how the fund would be structured to avoid duplication with existing mechanisms, such as the World Bank Cybersecurity Multi-Donor Trust Fund and ITU funds. Additionally, delegations, including Australia, sought clarity on the eligibility criteria for accessing the fund, emphasising the importance of ensuring that it adds value without creating overlap or confusion within the current funding landscape.

  • How should foundational cybersecurity capacities be implemented globally: through standardised approaches or by tailoring them to the countries? 

The implementation of foundational cybersecurity capacities sparked a debate between adopting a universal, standardised approach and the need for customisation to fit national contexts. While many delegations agreed on the importance of key elements such as legal frameworks, CERTs, and incident response mechanisms, there was a clear division on whether these should be uniformly applied across all countries or adapted to each nation’s specific circumstances. The concern is that imposing a one-size-fits-all solution may not be effective in diverse environments.

  • Should gender and inclusivity be integrated into cybersecurity capacity building efforts?

The emphasis on gender-sensitive approaches in cybersecurity capacity building, was met with mixed reactions. While some delegations praised the development of gender-sensitive toolkits and their application in capacity building programs, others criticised the inclusion of gender and youth topics in the capacity-building agenda, arguing that these issues were unrelated to the core mandate of the OEWG.

  • What is the appropriate role of nongovernmental stakeholders in cybersecurity capacity-building efforts?

The inclusion of a multistakeholder approach in capacity-building efforts sparked a debate among delegations. While most countries support the involvement of businesses, NGOs, and academia, there is strong opposition to portraying non-governmental stakeholders as equal participants in negotiations alongside states, as that could undermine state sovereignty in cybersecurity discussions.

Confidence building measures (CBMs)

 Stencil, Text

  • Should additional CBMs be formulated? 

The list of the eight CBMs has been largely settled for some time. However, since session 9, Iran has consistently proposed adding a ninth CBM to ensure unhindered access to a secure ICT market for all states. It circulated a working paper during session 10, but the proposal was ultimately not included in the final list. Although it is referenced in the final report as a possible element for discussion within the future mechanism, several states have suggested that it would be more appropriately addressed under norms or capacity-building.

 

  • How can states’ communication be facilitated?

The development of a common terminology was a contentious issue at the start of the OEWG, but the discussion largely concluded after states agreed to share national ICT terms and terminologies in the second APR. Given the significance of this issue, it may resurface in the permanent mechanism, potentially informed by the experiences of regional organisations with such taxonomies.

The POC directory has been operational for some time, with the Secretariat continuing to conduct ‘ping’ tests. An open question remains as to whether its current design is appropriate, given highly mixed feedback from states on its use.

Discussions on the development and use of standardised templates have naturally emerged alongside the operationalisation of the POC directory since session 8. The Secretariat’s proposed template, made public in April 2025, was ultimately not adopted and is instead referenced as a topic for further discussion. The specific scope and focus of these future discussions remain unclear.

  • How should CBMs be discussed in the permanent mechanism?

The final report of the OEW 2021-2025 does not designate a dedicated thematic group (DTG) specifically for CBMs, and the wording of the two agreed-upon DTGs reflects a cross-cutting approach – even in the DTG focused on capacity-building, given the acknowledged overlap between the two agenda items. Nonetheless, the possibility to addressing CBMs separately remains open through ad hoc groups.

The Global Mechanism on ICT security

 Accessories, Sunglasses, Text, Handwriting, Glasses

  • What will DTG1 look like?

Formally ‘An integrated, policy-oriented and cross-cutting dedicated thematic group drawing on the five pillars of the framework to address specific challenges in the sphere of ICT security in the context of international security in order to promote an open, secure, stable, accessible, peaceful, and interoperable ICT environment, with the participation of, inter alia, technical experts and other stakeholders (DTG 1)’, this group’s substantive focus and the organisational setup of DTG1 will certainly invite much discussion. Uncertainty remains over how discussions will be managed in practice, including whether key issues will be carried forward or risk being sidelined through procedural delays or filibustering.

 

  • Will additional ad-hoc DTGs be organised?

The final report acknowledges the possibility of establishing additional ad-hoc dedicated thematic groups (DTGs). However, the number of thematic groups has always been a contentious issue – while it would enable the mechanism to dive deep into very detailed discussions, the reality is that majority of countries cannot attend a large number of groups, much less engage effectively in them. Therefore, some states support the idea of ad hoc groups, as this would enable the new permanent mechanism to remain responsive to emerging challenges and evolving priorities. Others underline that additional ad hoc groups create additional uncertainties and potential burdens on delegations, and suggest waiting for the review conference, when the states will have an opportunity to review DTGs and potentially add new ones.

 

  • What will happen beyond 2030?

Attention is already shifting to what comes next once the current arrangement expires, particularly the configuration of future dedicated thematic groups (DTGs). Questions are emerging around how these groups will be structured and prioritised, and whether continuity will be maintained or reshaped in subsequent phases.

Past processes: the GGEs and the OEWGs

2004-2021: Six UN Groups of Governmental Experts (GGE)

The UN Group of Governmental Experts (GGE) on Advancing responsible State behaviour in cyberspace in the context of international security (formerly: on Developments in the Field of Information and Telecommunications in the Context of International Security) have convened from 2004 until 2021. 

2019-2021: UN OEWG and sixth GGE in parallel

In 2018, the UNGA adopted two resolutions (one sponsored by the USA (A/RES/73/266), the other by Russia (A/RES/73/27)), which set up the continuation of the GGE in 2019–21 and the UN OEWG.

2019-2021: The Open-Ended Working Group (OEWG) 2019/2020

The OEWG 2019/2020 was established by the UN General Assembly in December 2018 (A/RES/73/27).

2021-2025: The Open-Ended Working Group (OEWG) 2021-2025

The UN Open-Ended Working Group (OEWG) on the security of and in the use of information and communications technologies in 2021–2025, was established in 2021 by UNGA resolution UN A/RES/75/240.  

The group's work was completed in July 2025 by the adoption of the Final Report and the set-up of the permanent UN Global Mechanism on developments in the field of ICTs in the context of international security and advancing responsible state behaviour in the use of ICTs.

Drawing shows standing observers studying a bar chart on the wall. The chart shows the relationship of threats, norms, international law, confidence-building measures, capacity building and regular institutional dialogue from 2019 through 2024 with a red bar. A UN logo is shown on the wall to the left of the chart.

After the first three substantive sessions held in December 2021, April and July 2022, the main stumbling stone was the participation of non-state stakeholders in the OEWG process. Despite tensions due to the war in Ukraine, some progress in confidence-building measures and capacity building was made. However, states disagreed on whether existing international law applies to ICTs and whether new norms are needed.

In 2020, a Programme of Action (PoA) for advancing responsible state behaviour in cyberspace was co-proposed by 40 states, which would establish ‘a permanent UN forum to consider the use of ICTs by states in the context of international security’. The proposal suggested the PoA to be in a single, long-term, inclusive, and progress-oriented format. In November 2022, the First Committee of the UNGA adopted resolution A/RES/78/16 on the programme of action (PoA) on cybersecurity. This means the UNGA welcomed the proposal for a PoA as a permanent, inclusive, action-oriented mechanism.

In July 2022, delegations adopted stakeholder modalities, agreed to establish a Points of Contact (POC) directory, and reached a compromise on the group's first Annual Progress Report. Annual Progress Reports serve as a roadmap for further negotiations. 

In 2023, discussions on the applicability of international law on ICTs and on norms of responsible behaviour have not advanced. However, the work on the operationalisation of the POC Directory started. In July of 2023, delegations reached a compromise on the second Annual Progress Report

In 2024, delegations remained divided on the applicability of international law on ICTs and on norms of responsible behaviour. States also continued to discuss the scope, structure and content of the future mechanism during 2023 and 2024.  A significant breakthrough occurred in June and July 2024, when the Chair published elements for the establishment of an open-ended action-oriented permanent mechanism on ICT security, building upon the resolution A/RES/78/16 on the PoA. But two major successes were achieved: The POC Directory was officially launched in May 2024, and the delegations agreed on the basic elements of the mechanism that will follow the OEWG. In July 2024, delegations reached a compromise on the third Annual Progress Report at its eighth substantive session in New York. An issue that was ultimately deferred to late 2024 and 2025  was the modalities of stakeholder engagement with the mechanism. The future mechanism was to be established as a First Committee process and, therefore, a state-led process. However, there was an acknowledgement that there is room - and a need - for stakeholder participation. Some states consider the ad-hoc committee on cybercrime modalities for stakeholder engagement to be the gold standard, where stakeholders attend any open formal sessions of the ad hoc committee, make oral statements, time permitting, after member states’ discussions, and submit written statements. Other countries cautioned that the OEWG’s own much-discussed modalities should be applied because they are the hard-won result of a delicate compromise. 

Assessing the OEWG’s Legacy

Ahead of the group's final substantive session, we asked experts to grade the OEWG’s impact. Here’s our verdict on its legacy—and the unfinished work.

Final report 

The OEWG met for its eleventh and final substantive session on 7-11 July 2025. The group adopted the Final report by consensus.