<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public">
	<metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>116 S315 IS: DHS Cyber Hunt and Incident Response Teams Act of 2019</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2019-01-31</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
		<distribution-code display="yes">II</distribution-code>
		<congress>116th CONGRESS</congress><session>1st Session</session>
		<legis-num>S. 315</legis-num>
		<current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber>
		<action>
			<action-date date="20190131">January 31, 2019</action-date>
			<action-desc><sponsor name-id="S388">Ms. Hassan</sponsor> (for herself and <cosponsor name-id="S349">Mr. Portman</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSGA00">Committee on Homeland Security and Governmental Affairs</committee-name></action-desc>
		</action>
		<legis-type>A BILL</legis-type>
		<official-title>To authorize cyber hunt and incident response teams at the Department of Homeland Security, and for
			 other
			 purposes.</official-title>
	</form>
	<legis-body display-enacting-clause="yes-display-enacting-clause">
		<section id="S1" section-type="section-one"><enum>1.</enum><header>Short title</header>
 <text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>DHS Cyber Hunt and Incident Response Teams Act of 2019</short-title></quote>.</text>
		</section><section id="id10d32b1c-295f-42c9-ab01-f98d5d8b81a3"><enum>2.</enum><header>Department of Homeland Security cyber hunt and incident response teams</header>
 <subsection id="id48ebcff3-df8f-4761-8868-e34540862ca0"><enum>(a)</enum><header>In general</header><text display-inline="yes-display-inline">Section 2209 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/659">6 U.S.C. 659</external-xref>) is amended—</text> <paragraph id="id7aea465a-d2aa-41b4-b96f-81354c7beab2"><enum>(1)</enum><text>in subsection (d)(1)(B)(iv), by inserting <quote>, including cybersecurity specialists</quote> after <quote>entities</quote>;</text>
 </paragraph><paragraph id="id91b198f0-1e51-44fb-be49-7fc5726ec76d"><enum>(2)</enum><text>by redesignating subsections (f) through (m) as subsections (g) through (n), respectively;</text> </paragraph><paragraph id="id8014880d-feb3-48c9-882e-f38803b0f7a6"><enum>(3)</enum><text>by inserting after subsection (e) the following:</text>
					<quoted-block display-inline="no-display-inline" id="idbaa4e705-c51e-429e-a194-700bdab3f533" style="OLC">
						<subsection id="id3cfe3934-f907-491a-9417-feb3df57dc52"><enum>(f)</enum><header>Cyber hunt and incident response teams</header>
 <paragraph id="idb069af24-15d4-45a8-8ced-d64b1eb41e68"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">The Center shall maintain cyber hunt and incident response teams for the purpose of leading Federal asset response activities and providing timely technical assistance to Federal and non-Federal entities, including across all critical infrastructure sectors, regarding actual or potential security incidents, as appropriate and upon request, including—</text>
 <subparagraph id="id9d06994b-2619-43b5-b3ad-aebd05ba186e"><enum>(A)</enum><text>assistance to asset owners and operators in restoring services following a cyber incident;</text> </subparagraph><subparagraph id="id6dd5a13f-1ee8-497e-ac6c-85d13e8676e3"><enum>(B)</enum><text>identification and analysis of cybersecurity risk and unauthorized cyber activity;</text>
 </subparagraph><subparagraph id="id4498e088-d1da-48cf-bad0-2e47ae83a41d"><enum>(C)</enum><text>mitigation strategies to prevent, deter, and protect against cybersecurity risks;</text> </subparagraph><subparagraph id="id00202610-9989-4841-af6e-6c2b54aca2f0"><enum>(D)</enum><text>recommendations to asset owners and operators for improving overall network and control systems security to lower cybersecurity risks, and other recommendations, as appropriate; and</text>
 </subparagraph><subparagraph id="id4037577a-14c5-4826-b56f-6fe05eaa2dc7"><enum>(E)</enum><text>such other capabilities as the Secretary determines appropriate.</text>
 </subparagraph></paragraph><paragraph id="id5ce08258-f693-4468-bfb8-f91c2972555a"><enum>(2)</enum><header>Associated metrics</header><text display-inline="yes-display-inline">The Center shall continually assess and evaluate the cyber hunt and incident response teams and the operations of those cyber hunt and incident response teams using robust metrics.</text>
 </paragraph><paragraph id="id3ae116ef-0f02-43fb-acd2-d966b1bcf93c"><enum>(3)</enum><header>Report</header><text display-inline="yes-display-inline">At the conclusion of each of the first 4 fiscal years after the date of enactment of the <short-title>DHS Cyber Hunt and Incident Response Teams Act of 2019</short-title>, the Center shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report that includes—</text>
 <subparagraph id="idec78920f-ad48-43c9-b5dd-b543a53ac369"><enum>(A)</enum><text display-inline="yes-display-inline">information relating to the metrics used for evaluation and assessment of the cyber hunt and incident response teams and operations under paragraph (2), including the resources and staffing of those cyber hunt and incident response teams; and</text>
 </subparagraph><subparagraph id="id57bd97e0-41ae-4c53-8101-a5da1a983486"><enum>(B)</enum><text display-inline="yes-display-inline">for the period covered by the report—</text> <clause id="id4b32a32b-2a30-4bc4-b7c5-16b84e5cf3f4"><enum>(i)</enum><text>the total number of incident response requests received;</text>
 </clause><clause id="id307ef1dd-539d-4026-b15b-87d7e791b507"><enum>(ii)</enum><text>the number of incident response tickets opened; and</text> </clause><clause id="idd2fa8da6-f05c-4a83-b831-d0f3c021040d"><enum>(iii)</enum><text>a statement of—</text>
 <subclause id="id9f97b887-14bf-4b00-ac78-8b9f4335ad7a"><enum>(I)</enum><text>all interagency staffing of cyber hunt and incident response teams; and</text> </subclause><subclause id="idc38b9613-6a89-4076-bebf-6e548e3bc5ec"><enum>(II)</enum><text>the interagency collaborations established to support cyber hunt and incident response teams.</text>
 </subclause></clause></subparagraph></paragraph><paragraph id="id9CDCDFAA5A8B4BFE9A7520F8B7735CA8"><enum>(4)</enum><header>Cybersecurity specialists</header><text>After notice to, and with the approval of, the entity requesting action by or technical assistance from the Center, the Secretary may include cybersecurity specialists from the private sector on a cyber hunt and incident response team.</text></paragraph></subsection><after-quoted-block>; and</after-quoted-block></quoted-block>
 </paragraph><paragraph id="id5aa34e09-83f7-4e14-a895-9063965d3216"><enum>(4)</enum><text>in subsection (g), as so redesignated—</text> <subparagraph id="id6632c4cc-9765-4902-8b59-1cc885054a9e"><enum>(A)</enum><text>in paragraph (1), by inserting <quote>, or any team or activity of the Center,</quote> after <quote>Center</quote>; and</text>
 </subparagraph><subparagraph id="idb88d9d53-a259-4747-b705-73f03282dd8c"><enum>(B)</enum><text>in paragraph (2), by inserting <quote>, or any team or activity of the Center,</quote> after <quote>Center</quote>.</text> </subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="idc121dc2f-5518-4d0d-bcb0-c20bb561e419"><enum>(b)</enum><header>No additional funds authorized</header><text display-inline="yes-display-inline">No additional funds are authorized to be appropriated to carry out the requirements of this Act and the amendments made by this Act. Such requirements shall be carried out using amounts otherwise authorized to be appropriated.</text>
			</subsection></section></legis-body>
</bill>


