<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" bill-type="olc" dms-id="A1" public-private="public"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>116 S734 IS: Internet of Things Cybersecurity Improvement Act of 2019</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2019-03-11</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>116th CONGRESS</congress><session>1st Session</session><legis-num>S. 734</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20190311">March 11, 2019</action-date><action-desc><sponsor name-id="S327">Mr. Warner</sponsor> (for himself, <cosponsor name-id="S377">Mr. Gardner</cosponsor>, <cosponsor name-id="S388">Ms. Hassan</cosponsor>, and <cosponsor name-id="S375">Mr. Daines</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSGA00">Committee on Homeland Security and Governmental Affairs</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To leverage Federal Government procurement power to encourage increased cybersecurity for Internet
			 of Things devices, and for other purposes.
</official-title></form>
	<legis-body display-enacting-clause="yes-display-enacting-clause" id="HE9CE1CF8F10B48038671CA843121C21B" style="OLC">
 <section id="HD20BF0D04778468BAC3993546CC8142A" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Internet of Things Cybersecurity Improvement Act of 2019</short-title></quote> or the <quote><short-title>IoT Cybersecurity Improvement Act of 2019</short-title></quote>.</text> </section><section id="H73F98E811EB0479A965A23B686C47889"><enum>2.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text>
 <paragraph id="HE52A7774B86848978F1577A087213D14"><enum>(1)</enum><header>Agency</header><text>The term <term>agency</term> has the meaning given such term in section 3502 of title 44, United States Code.</text> </paragraph><paragraph id="H57A224B338E24972B666653890D69477"><enum>(2)</enum><header>Covered device</header> <subparagraph id="H88A31C1545CC4BD384BC1CC825A077BA"><enum>(A)</enum><header>In general</header><text>The term <term>covered device</term> means a physical object that—</text>
 <clause id="H39063AA8B29041A988AD79844FB654AA"><enum>(i)</enum><text>is capable of connecting to and is in regular connection with the Internet;</text> </clause><clause id="H645C0CE4F2D44407BAB02FD5DAAC946B"><enum>(ii)</enum><text>has computer processing capabilities that can collect, send, or receive data; and</text>
 </clause><clause id="HFD8D836CA9DE43D0A6EDF252812F4A63"><enum>(iii)</enum><text>is not a general-purpose computing device, including personal computing systems, smart mobile communications devices, programmable logic controls, and mainframe computing systems.</text>
 </clause></subparagraph><subparagraph id="H83F833F6B5384074BEDCC75EBD8D797C"><enum>(B)</enum><header>Modification of definition</header><text>The Director of the Office of Management and Budget shall establish a process by which—</text> <clause id="H13A3012DFC304507810385617C7FE12A"><enum>(i)</enum><text>interested parties may petition for a device that is not described in subparagraph (A) to be considered a device that is not a covered device; and</text>
 </clause><clause id="HDBFFA22FA7F14E008E604DF30C681385"><enum>(ii)</enum><text>the Director acts upon any petition submitted under clause (i) in a timely manner.</text> </clause></subparagraph></paragraph><paragraph id="H34D17D2BDFCD43C787412705CE5F448E"><enum>(3)</enum><header>Security vulnerability</header><text display-inline="yes-display-inline">The term <term>security vulnerability</term> means any attribute of hardware, firmware, software, or combination of 2 or more of these factors that could enable the compromise of the confidentiality, integrity, or availability of an information system or its information or physical devices to which it is connected.</text>
			</paragraph></section><section id="H4E2950B2D8AE4915B7CF25F50EE11775"><enum>3.</enum><header>National Institute of Standards and Technology considerations and recommendations regarding
			 managing Internet of Things cybersecurity risks</header>
			<subsection id="H446AB0FDE0CD44C78003D4EECF322CB1"><enum>(a)</enum><header>Completion of ongoing efforts relating to considerations for managing internet of things
			 cybersecurity risks</header>
 <paragraph id="H522CFDE9B70E4CE999A6976B811744D9"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">The Director of the National Institute of Standards and Technology shall ensure that the efforts of the Institute in effect on the date of the enactment of this Act regarding considerations for managing Internet of Things cybersecurity risks, especially regarding examples of possible cybersecurity capabilities of Internet of Things devices, are completed no later than September 30, 2019.</text>
 </paragraph><paragraph id="H699DEFF0D90B4AC2AC2F07B4F443BF23"><enum>(2)</enum><header>Matters addressed</header><text>In ensuring efforts are completed under paragraph (1), the Director shall also ensure that such efforts address, at a minimum, the following considerations for covered devices:</text>
 <subparagraph id="H46A132ECD4F245B3B7B556CDA5B48CB1"><enum>(A)</enum><text display-inline="yes-display-inline">Secure Development.</text> </subparagraph><subparagraph id="H24EBC809A7F746828B728D86C0BC5370"><enum>(B)</enum><text display-inline="yes-display-inline">Identity management.</text>
 </subparagraph><subparagraph id="HE7B7BA34A5774129BB1289D20FD08C9D"><enum>(C)</enum><text display-inline="yes-display-inline">Patching.</text> </subparagraph><subparagraph id="HF91B5EBFE5F441CFBD19FA2CCE97DB1D"><enum>(D)</enum><text display-inline="yes-display-inline">Configuration management.</text>
					</subparagraph></paragraph></subsection><subsection id="HDFDC8B43B20D4AEF9DEC1F60ACCA01E3"><enum>(b)</enum><header>Development of recommended standards for use of internet of things devices by Federal Government</header>
 <paragraph id="H7669A6A6CBAB4117856D21BACC014E69"><enum>(1)</enum><header>In general</header><text>Not later than March 31, 2020, the Director of the Institute shall develop recommendations for the Federal Government on the appropriate use and management by the Federal Government of Internet of Things devices owned or controlled by the Federal Government, including minimum information security requirements for managing cybersecurity risks associated with such devices.</text>
 </paragraph><paragraph id="H66826937752E4BA7AA2F5F0229E87788"><enum>(2)</enum><header>Consistency with ongoing efforts</header><text>The Director of the Institute shall ensure that the recommendations and standards developed under paragraph (1) are consistent with the efforts referred to in subsection (a), especially with respect to the examples of possible cybersecurity capabilities referred to in such subsection.</text>
				</paragraph></subsection><subsection id="H9E33D15A3989444C8FBE64427C4128D4"><enum>(c)</enum><header> Institute Report on cybersecurity considerations stemming from the convergence of Information
			 Technology, Internet of Things, and Operational Technology devices,
 networks and systems</header><text display-inline="yes-display-inline">Not later than 180 days following the enactment of this Act, the Director of the Institute shall publish a draft report related to the increasing convergence of traditional Information Technology devices, networks, and systems with Internet of Things devices, networks and systems and Operational Technology devices, networks and systems, including considerations for managing cybersecurity risks associated with such trends.</text>
			</subsection></section><section id="HF2492B6A2CF44F608C6704B2A2ACC5DE"><enum>4.</enum><header>Policies for Federal agencies on use and management of Internet of Things devices</header>
 <subsection id="HABB96FDF68D6458E8563A4234806771C"><enum>(a)</enum><header>Revisions to the federal acquisition regulation</header><text>Not later than 180 days after the date on which the Director of the National Institute of Standards and Technology completes the development of the recommendations required under section 3(b), the Director of the Office of Management and Budget shall issue guidelines for each agency that are consistent with such recommendations.</text>
 </subsection><subsection id="H13BEC4C940404259AD30FA0C2A847CE4"><enum>(b)</enum><header>Requirement</header><text>In issuing the guidelines required under subsection (a), the Director of the Office of Management and Budget shall ensure that the guidelines are consistent with the information security requirements in subchapter II of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code.</text>
 </subsection><subsection id="H22E3BCDC2C6E4FFB82CB5C5C689E44AD"><enum>(c)</enum><header>Quinquennial reviews and revisions</header><text>Not less frequently than once every 5 years—</text> <paragraph id="H9DFEA9C8499B4462BA8F33E3D22EF30C"><enum>(1)</enum><text>the Director of the Office of Management and Budget and the Director of the National Institute of Standards and Technology shall review the policies issued under subsection (a); and</text>
 </paragraph><paragraph id="HD0B9299CECFE41068EF6DFE54465918E"><enum>(2)</enum><text>the Director of the Office of Management and Budget shall, in consultation with the Director of the National Institute of Standards and Technology, revise such policies.</text>
				</paragraph></subsection></section><section id="HC2C2F151BBED44FA960BFB92B2A0DE2E"><enum>5.</enum><header>National Institute of Standards and Technology guidance on coordinated disclosure of security
			 vulnerabilities relating to Internet of Things devices</header>
 <subsection id="H9403BC84D717488E8EEDAC5224DC04F2"><enum>(a)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this Act, the Director of the National Institute of Standards and Technology shall, in consultation with such cybersecurity researchers and private-sector industry experts as the Director considers appropriate, publish guidance on policies and procedures for the reporting, coordinating, publishing, and receiving of information about—</text>
 <paragraph id="H268E6501A0AC4870884A43652DDF7A8C"><enum>(1)</enum><text>a security vulnerability relating to a covered device used by the Federal Government; and</text> </paragraph><paragraph id="H0F381452FD064F9681D181648FAAAAB1"><enum>(2)</enum><text>the resolution of such security vulnerability.</text>
 </paragraph></subsection><subsection id="H79870A83BA8141BF944CB680B94A2B52"><enum>(b)</enum><header>Elements</header><text>The guidance published under subsection (a) shall include the following:</text> <paragraph id="HF85F0ED7ECC34D618449A9241FEBED9C"><enum>(1)</enum><text>Policies and procedures described in subsection (a) that, to the maximum extent practicable, are aligned with Standards 29147 and 30111 of the International Standards Organization, or any successor standards. Such policies and procedures shall include policies and procedures for a contractor or vendor providing a covered device to the Federal Government on—</text>
 <subparagraph id="H51772B8374A7478C8F8231454AEA3FB1"><enum>(A)</enum><text>receiving information about a potential security vulnerability relating to the covered device; and</text> </subparagraph><subparagraph id="H78D02C3D50514280AB9A8AEA44DA27AC"><enum>(B)</enum><text>disseminating information about the resolution of a security vulnerability relating to the covered device.</text>
 </subparagraph></paragraph><paragraph id="HCE980AF616B3467891EF7B3D5E151D7E"><enum>(2)</enum><text>Guidance, including example content, on the information items that should be produced through the implementation of the security vulnerability disclosure process of the contractor.</text>
				</paragraph></subsection></section><section id="H7E32CBC613474BA788A7E33F2C0C6B0C"><enum>6.</enum><header>Guidelines for Federal agencies on coordinated disclosure of security vulnerabilities relating to
			 Internet of Things devices</header>
 <subsection id="HF81DB15336BD4896AE053422703C26C3"><enum>(a)</enum><header>Agency guidelines required</header><text>Not later than 180 days after the date on which the guidance required under section 4 is published, the Director of the Office of Management and Budget shall, in consultation with the Administrator of the General Services Administration, issue guidelines for each agency on reporting, coordinating, publishing, and receiving information about—</text>
 <paragraph id="HE78409C3685D408DA8C577B22AD76E08"><enum>(1)</enum><text>a security vulnerability relating to a covered device used by the agency; and</text> </paragraph><paragraph id="H46D440AFC4084D9AB3CDC1B8469D6C43"><enum>(2)</enum><text>the resolution of such security vulnerability.</text>
 </paragraph></subsection><subsection id="H2ACBD778573F48F5B43AD5D80EF19C51"><enum>(b)</enum><header>Contractor and vendor compliance with National Institute of Standards and Technology guidance</header><text>The guidelines required by subsection (a) shall include a limitation that prohibits an agency from acquiring or using any covered device from a contractor or vendor if the contractor or vendor fails to comply with the guidance published under section 5(a).</text>
 </subsection><subsection id="HEBFD135247504E729588C3B090A7B59E"><enum>(c)</enum><header>Consistency with guidance from National Institute of Standards and Technology</header><text>The Director shall ensure that the guidelines issued under subsection (a) are consistent with the guidance published under section 5(a).</text></subsection></section></legis-body></bill>


