Showing posts with label S 1316. Show all posts
Showing posts with label S 1316. Show all posts

Tuesday, November 9, 2021

Review - HR 3684 Passed in House – FY 2022 Infrastructure Bill

Last Friday the House finally got around to passing HR 3684, the Infrastructure Investment and Jobs Act, by a slightly bipartisan vote of 228 to 206. With the complexity of the bill and the large amounts of money involved, this is a good time to re-look at the cybersecurity provisions in the bill.

The bill includes language from six separate pieces of cybersecurity legislation.

S 914, the Drinking Water and Wastewater Infrastructure Act of 2021, in §50113,

S 1316, the Cyber Response and Recovery Act of 2021, in §70601,

S 1400, the PROTECT Act of 2021, in §40123,

S 2199, the Cyber Sense Act of 2020, in §40122,

S 2585, the State and Local Cybersecurity Improvement Act, in §70611, and

HR 2931, the Enhancing Grid Security through Public-Private Partnerships Act, in §40121.

It also contains two new standalone cybersecurity provisions in the Energy Division of the bill. Additional (over the current annual spending) cybersecurity spending is authorized for four agencies of the federal government. Finally, there are 23 separate instances where cybersecurity mentions are made in other provisions of the bill

For more details about those provisions, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/hr-3684-passed-in-house - subscription required.

 

Thursday, June 17, 2021

Review - S 1260 and Cybersecurity

With the recent publication of the engrossed version (passed in the Senate) of S 1260, the United States Innovation and Competition Act of 2021, I have now had a chance to go back and look at the cybersecurity related provisions that were included in the massive, 2375 pages, bill. In addition to the new sections added in the substitute language that I briefly mentioned earlier, there were a number of provisions added in passing that are worthy of mention.

Protecting research from cyber theft

Section 2305 amends 15 USC 272(e)(1)(A) by adding ‘institutions of higher education’ to the list of considerations NIST has to address in developing consensus-based cybersecurity standards. Additionally, §2305(b) requires NIST to “disseminate and make publicly available resources to help research institutions and institutions of higher education identify, protect the institution involved from, detect, respond to, and recover to manage the cybersecurity risk of the institution involved related to conducting research.”

NASA Cybersecurity

Section 2676 (pg 690) would amend 51 USC 20301 by adding a requirement for the NASA Administrator to “up-date and improve the cybersecurity of NASA space assets and supporting infrastructure” {new §20301(c)}. NASA would also be required to establish a Cyber Security Operations Center. Finally, it would authorize NASA to “implement a cyber threat hunt capability to proactively search NASA information systems for advanced cyber threats that otherwise evade existing security tools” {§2676(c)(1)}.

Cyber Response and Recovery

Section 4252 (pg 1238) is the Cyber Response and Recovery Act. It is essentially the language of S 1316, which I have previously described in detail.

Federal Rotational Cyber Workforce Program

Division D of the bill includes Title II, Cyber and Artificial Intelligence. Subtitle B (pg 1257) of that Title is the Federal Rotational Cyber Workforce Program Act of 2021. It is essentially the language of S 1097 which the Senate Homeland Security and Governmental Affairs Committee ordered reported favorably last month.

Commentary

Almost all of the cybersecurity provisions in this bill are limited to information technology because of the language or definitions involved. It is not clear that that was the intention of the crafters of this bill, but it is certainly the effect.

For a more detailed look at the cyber provisions of S 1260, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/s-1260-and-cybersecurity (subscription required).

Thursday, May 13, 2021

S 1316 Introduced - Cyber Response and Recovery Act

Last month Sen Peters (D,MI) introduced S 1316, the Cyber Response and Recovery Act of 2021. The bill would add a new subchapter to Title XXII of the Homeland Security Act of 2002. It would allow DHS to declare a ‘a significant incident’. It would also provide for the establishment of a Cyber Response and Recovery Fund.

Definitions

Section 2231 provides definitions for unique terms to be used in the new subchapter. The eight definitions include two new significant terms: ‘asset response activity’ and ‘significant incident’.

The term ‘asset response activity’ is defined as an activity to support an entity impacted by an incident with the response to, remediation of, or recovery from, the incident, including {§2231(2)}:

• Furnishing technical and advisory assistance to the entity to protect the assets of the entity, mitigate vulnerabilities, and reduce the related impacts,

• Assessing potential risks to the critical infrastructure sector or geographic region impacted by the incident, including potential cascading effects of the incident on other critical infrastructure sectors or geographic regions,

• Developing courses of action to mitigate the risks assessed above,

• Facilitating information sharing and operational coordination with entities performing threat response activities, and

• Providing guidance on how best to use Federal resources and capabilities in a timely, effective manner to speed recovery from the incident.

The term ‘significant incident’ is defined as an incident or a group of related incidents that results, or is likely to result, in demonstrable harm to {§2231(8)}:

• The national security interests, foreign relations, or economy of the United States, or

• The public confidence, civil liberties, or public health and safety of the people of the United States.

A significant incident does not include an incident that takes place on a national security systems {44 USC 3552(6)} or on a DOD or intelligence community information systems {44 USC 3353(e)}.

Neither of the two definitions above mentions anything to do with computer systems, cyber systems or information systems. This is because the term ‘incident’ is defined by reference to 44 USC 3552(2). There it is defined as an occurrence that:

• Actually or imminently jeopardizes, without lawful authority, the integrity, confidentiality, or availability of information or an information system; or

• Constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies.

Significant Incident Declaration

Section 2232 authorizes the Secretary of DHS (not to be delegated), in consultation with the National Cyber Director, to make a declaration of a significant incident if such incident occurs or is imminently expected to occur if it is determined that available resources “are likely insufficient to respond effectively to, or to mitigate effectively, the specific significant incident” {§2232(a)(1)(B)}.

Section 2232(b) requires CISA to coordinate “the asset response activities of each Federal agency in response to the specific significant incident associated with the declaration” {§2232(b)(1)}. CISA will also coordinate with {§2232(b)(2)}:

• Public and private entities and State and local governments with respect to the asset response activities of those entities and governments; and

• Federal, State, local, and Tribal law enforcement agencies with respect to investigations and threat response activities of those law enforcement agencies

The section provides that a declaration will last up to 120-days and the Secretary may extend the declaration as required. Declarations will be published in the Federal Register.

Section 2232(f) authorizes the Secretary to take preparatory actions before an incident in declared including “entering into standby contracts with private entities for cybersecurity services or incident responders in the event of a declaration” {§2232(f)(2)}.

Cyber Response and Recovery Fund

Section 2233 establishes the Cyber Response and Recovery Fund. The funds could be used for coordination activities. They could also be used for response and recovery support for “Federal, State, local, and Tribal, entities and public and private entities on a reimbursable or non-reimbursable basis”. That support would be for asset response activities and technical assistance, such as {§2233(a)(2)}:

• Vulnerability assessments and mitigation,

• Technical incident mitigation,

• Malware analysis,

• Analytic support,

• Threat detection and hunting, and

• Network protections.

Section 2236 authorizes $20 million for the Fund.

Moving Forward

As I mentioned yesterday, this bill was adopted by the Senate Homeland Security and Governmental Affairs Committee after it was amended with substitute language. The unanimous consent adoption of the substitute language indicates that the bill has strong bipartisan support. This is not unexpected in the face of the recent cybersecurity incidents to which the country has been responding. We will not be able to see the substitute language until the Committee publishes their report.

After the Colonial Pipeline incident, I suspect that this bill could be brought to the floor of the Senate. That would provide Senators with a chance to demonstrate their active support for cybersecurity response activities by CISA. This would also allow for significant amendment activities that could provide a vessel for other cybersecurity bills that might not be able to be able to justify full floor proceedings and might face limited objections that could prevent the use of the Senate’s unanimous consent process.

While this bill could be considered under that unanimous consent process, I suspect that there are Senators that would use their potential objection as a threat to get their own cybersecurity language considered.

Commentary

Definition RANT: The incident definition upon which this legislation relies is based upon the IT restrictive definition of ‘information system’ found in 44 USC 3352. This means that an incident that is primarily affecting an operational system rather than an IT system could not properly be eligible for a definition of a significant incident.

There is currently no definition of ‘incident’ that relies on a more ICS inclusive definition of ‘information system’. That could be remedied by adding a definition of ‘information system’ in §2331 with a reference to the definition in 6 USC 1501(9).

I think that this would be a good vessel for making definitional changes to 6 USC 659 that could be made applicable to this proposed legislation. I have written about these proposed changes on a number of occasions (see here for example). I would suggest adding a new §3 to the bill, entitled ‘Cybersecurity Definitions:

Sec. 3. Cybersecurity Definitions.

(a) The following term and definition will be added to 6 USC 659(a):

“(1) the term ‘control system’ means a discrete set of information resources, sensors, communications interfaces and physical devices organized to monitor, control and/or report on physical processes, including manufacturing, transportation, access control, and facility environmental controls;”

(b) The definition of the term “incident” will be revised to read:

“(4) the term "incident" means an occurrence that actually or imminently jeopardizes, without lawful authority:

“(A) the integrity, confidentiality, or availability of information on an information system,

“(B) the timely availability of accurate process information, the predictable control of the designed process or the confidentiality of process information, or

“(C) an information system or a control system;”

This would then allow the definition in §2231 for the term ‘incident’ to be changed to refer to the revised definition in 6 USC 659(a).

Finally, for clarity’s sake, I would change the term ‘significant incident’ to ‘significant cyber incident’.

Wednesday, May 12, 2021

HSGA Business Meeting – 5-12-21

Today the Senate Homeland Security and Governmental Affairs Committee met and considered 14 bills. This included four cybersecurity related pieces of legislation. Three of the four cybersecurity bills were ordered reported favorably by voice votes, two after substitute language was adopted. The fourth was held over pending additional work on amendments.

The approved bills were:

• S. 1097, Federal Rotational Cyber Workforce Program Act,

• S 1316, Cyber Response and Recovery Act, as amended,

• S 1350, National Risk Management Act of 2021, as amended.

The bill that was held over was S. 1324, Civilian Cyber Security Reserve Act.

The GPO printed official versions of all four bills this morning. I will be reviewing the introduced language in the coming days. The substitute language approved today will not be available for some time.

Monday, May 10, 2021

Update for Senate HSGA Markup – 5-12-21

The Senate.gov website now lists the bills that will be marked up by the Senate Homeland Security and Governmental Affairs Committee on Wednesday. The thirteen bills scheduled include four cybersecurity related measures:

S 1097, to establish a Federal rotational cyber workforce program for the Federal cyber workforce {Sen. Peters, (D,MI)}

S 1316, to amend the Homeland Security Act of 2002 to authorize the Secretary of Homeland Security to make a declaration of a significant incident {Sen. Peters, (D,MI)},

S 1324, to establish a Civilian Cyber Security Reserve as a pilot project to address the cyber security needs for the United States with respect to national security {Sen Rosen (D,NV)}, and

S 1350, to require the Secretary of Homeland Security to establish a national risk management cycle {Sen Hassan (D,NH)},

The GPO has not yet published official versions of any of these bills, nor can I find them posted to the HSGA web site. Hassan’s web site does have a submission draft copy posted for S 1350, the ‘National Risk Management Act of 2021. I will have a detailed review of that bill, based upon that draft available later this evening. We may see S 1097 published this evening, but I doubt the GPO will get to S 1316 or S 1324 before Wednesday morning.

Friday, April 23, 2021

Bills Introduced – 4-22-21

Yesterday, with both the House and the Senate preparing to depart Washington for the weekend, there were 168 bills introduced. Three of those bills may receive additional coverage in this blog:

S 1316 A bill to amend the Homeland Security Act of 2002 to authorize the Secretary of Homeland Security to make a declaration of a significant incident, and for other purposes. Sen. Peters, Gary C. [D-MI] 

S 1324 A bill to establish a Civilian Cyber Security Reserve as a pilot project to address the cyber security needs for the United States with respect to national security, and for other purposes. Sen. Rosen, Jacky [D-NV]

S 1359 A bill to establish the Foundation for Energy Security and Innovation, and for other purposes. Sen. Coons, Christopher A. [D-DE] 

I will be watching S 1316 for language and definitions that specifically include cybersecurity incidents in potential ‘significant incident’ declaration authority.

I will be watching S 1324 for language and definitions that would specifically include industrial control systems in the ‘cybersecurity needs’ of the United States.

I suspect that S 1359 is a green-energy bill with ‘energy security’ equating to energy supply needs. I will be watching for anything that addresses cybersecurity issues.

 
/* Use this with templates/template-twocol.html */