<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet type="text/css" href="uslm.css"?><pLaw xmlns="http://schemas.gpo.gov/xml/uslm" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="en" xsi:schemaLocation="http://schemas.gpo.gov/xml/uslm https://www.govinfo.gov/schemas/xml/uslm/uslm-2.0.17.xsd">

<?I97 ??>
<?I50 PUBLIC LAW 117–302—DEC. 27, 2022?>


<?I97 136 STAT. ?>
<?I98 136 STAT. ?>
<?I99 136 STAT. ?>
<?I50 PUBLIC LAW 117–302—DEC. 27, 2022?>
<?I51 PUBLIC LAW 117–302—DEC. 27, 2022?>
<?I52 PUBLIC LAW 117–302—DEC. 27, 2022?>


<!--Disclaimer: Legislative measures that include compacts or other non-standard data structures will require additional modeling and may contain inconsistencies in the converted USLM XML.-->
<meta><dc:title>Public Law 117–302: To require the Secretary of Veterans Affairs to obtain an independent cybersecurity assessment of information systems of the Department of Veterans Affairs, and for other purposes.</dc:title>
<dc:type>Public Law</dc:type><docNumber>302</docNumber>
<citableAs>Public Law 117–302</citableAs><citableAs>136 Stat. 4384</citableAs>
<approvedDate>2022-12-27</approvedDate>
<dc:date>2022-12-27</dc:date>
<dc:publisher>United States Government Publishing Office</dc:publisher><dc:creator>National Archives and Records Administration</dc:creator><dc:creator>Office of the Federal Register</dc:creator><dc:format>text/xml</dc:format><dc:language>EN</dc:language><dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
<processedBy>GPO Locator to USLM Converter 4.15.31;Stage2.20250702</processedBy><processedDate>2026-01-02</processedDate>
<congress>117</congress><publicPrivate>public</publicPrivate>
</meta>
<preface><page display="no">?4383</page><note role="coverPage"><centerRunningHead>PUBLIC LAW 117–302—DEC. 27, 2022</centerRunningHead>
<coverTitle>STRENGTHENING VA CYBERSECURITY ACT OF 2022</coverTitle>
</note>
<page identifier="/us/stat/136/4384">136 STAT. 4384</page>
<dc:type>Public Law</dc:type><docNumber>117–302</docNumber>
<congress value="117">117th Congress</congress>
</preface>
<main>
<longTitle>
<docTitle class="centered fontsize12" style="-uslm-lc:I658005">An Act</docTitle>
<officialTitle class="indentUp0 firstIndent1 fontsize8" style="-uslm-lc:I658011">To require the Secretary of Veterans Affairs to obtain an independent cybersecurity assessment of information systems of the Department of Veterans Affairs, and for other purposes.<sidenote><p class="centered fontsize8" id="x1ffd8c7d-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076"><approvedDate date="2022-12-27">Dec. 27, 2022</approvedDate></p><p class="centered fontsize8" id="x1ffd8c7e-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658076">[<ref href="/us/bill/117/hr/7299">H.R. 7299</ref>]<?GPOvSpace 08?></p></sidenote></officialTitle>
</longTitle>
<enactingFormula style="-uslm-lc:I658120"><i>  Be it enacted by the Senate and House of Representa­tives of the United States of America in Congress assembled,</i></enactingFormula><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1ffd8c7f-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Strengthening VA Cybersecurity Act of 2022.</p></sidenote>
<section id="d52957e98" identifier="/us/pl/117/302/s1" style="-uslm-lc:I658146"><num class="bold" value="1">SECTION 1. </num><heading>SHORT TITLE.</heading><content style="-uslm-lc:I658120">  This Act may be cited as the “<shortTitle role="act">Strengthening VA Cybersecurity Act of 2022</shortTitle>” or the “<shortTitle role="act">SVAC Act of 2022</shortTitle>”.</content></section>
<section id="d52957e111" identifier="/us/pl/117/302/s2" style="-uslm-lc:I658141"><num class="fontsize12" value="2">SEC. 2. </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1ffd8c80-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Deadlines.</p></sidenote><heading>INDEPENDENT CYBERSECURITY ASSESSMENT OF INFORMATION SYSTEMS OF DEPARTMENT OF VETERANS AFFAIRS.</heading><subsection class="firstIndent0 fontsize10" id="y1ffe9df1-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="a">(a) </num><heading class="fontsize10"><inline class="smallCaps">Independent Assessment Required</inline>.—</heading><paragraph class="fontsize10" id="y1ffe9df2-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><chapeau><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1ffe9df3-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Contracts.</p></sidenote>Not later than 60 days after the date of the enactment of this Act, the Secretary of Veterans Affairs shall seek to enter into an agreement with a federally funded research and development center to provide to the Secretary an independent cybersecurity assessment of—</chapeau><subparagraph class="fontsize10" id="y1ffe9df4-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>five high-impact information systems of the Department of Veterans Affairs; and</content></subparagraph>
<subparagraph class="fontsize10" id="y1ffe9df5-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the effectiveness of the information security program and information security management system of the Department.</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y1ffe9df6-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Detailed analysis</inline>.—</heading><chapeau>The independent cybersecurity assessment provided under paragraph (1) shall include a detailed analysis of the ability of the Department—</chapeau><subparagraph class="fontsize10" id="y1ffe9df7-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>to ensure the confidentiality, integrity, and availability of the information, information systems, and devices of the Department; and</content></subparagraph>
<subparagraph class="fontsize10" id="y1ffec508-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><chapeau>to protect against—</chapeau><clause class="fontsize10" id="y1ffec509-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/2/B/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>advanced persistent cybersecurity threats;</content></clause>
<clause class="fontsize10" id="y1ffec50a-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/2/B/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>ransomware;</content></clause>
<clause class="fontsize10" id="y1ffec50b-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/2/B/iii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iii">(iii) </num><content>denial of service attacks;</content></clause>
<clause class="fontsize10" id="y1ffec50c-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/2/B/iv" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="iv">(iv) </num><content>insider threats;</content></clause>
<clause class="fontsize10" id="y1ffec50d-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/2/B/v" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="v">(v) </num><content>threats from foreign actors, including state sponsored criminals and other foreign based criminals;</content></clause>
<clause class="fontsize10" id="y1ffec50e-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/2/B/vi" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vi">(vi) </num><content>phishing;</content></clause>
<clause class="fontsize10" id="y1ffec50f-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/2/B/vii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="vii">(vii) </num><content>credential theft;</content></clause>
<clause class="fontsize10" id="y1ffec510-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/2/B/viii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="viii">(viii) </num><content>cybersecurity attacks that target the supply chain of the Department;</content></clause>
<clause class="fontsize10" id="y1ffec511-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/2/B/ix" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ix">(ix) </num><content>threats due to remote access and telework activity; and</content></clause>
<clause class="fontsize10" id="y1ffec512-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/2/B/x" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="x">(x) </num><content>other cyber threats.<page identifier="/us/stat/136/4385">136 STAT. 4385</page></content></clause>
</subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y1ffec513-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/3" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="3">(3) </num><heading class="fontsize10"><inline class="smallCaps">Types of systems</inline>.—</heading><content>The independent cybersecurity assessment provided under paragraph (1) shall cover on-premises, remote, cloud-based, and mobile information systems and devices used by, or in support of, Department activities.</content></paragraph>
<paragraph class="fontsize10" id="y1ffec514-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/4" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="4">(4) </num><heading class="fontsize10"><inline class="smallCaps">Shadow information technology</inline>.—</heading><content><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1ffec515-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Evaluation.</p></sidenote>The independent cybersecurity assessment provided under paragraph (1) shall include an evaluation of the use of information technology systems, devices, and services by employees and contractors of the Department who do so without the heads of the elements of the Department that are responsible for information technology at the Department knowing or approving of such use.</content></paragraph>
<paragraph class="fontsize10" id="y1ffec516-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/a/5" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="5">(5) </num><heading class="fontsize10"><inline class="smallCaps">Methodology</inline>.—</heading><content>In conducting the cybersecurity assessment to be provided under paragraph (1), the federally funded research and development center shall take into account industry best practices and the current state-of-the-art in cybersecurity evaluation and review.</content></paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1ffec517-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/b" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="b">(b) </num><heading class="fontsize10"><inline class="smallCaps">Plan</inline>.—</heading><paragraph class="fontsize10" id="y1ffec518-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/b/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><heading class="fontsize10"><inline class="smallCaps">In general</inline>.—</heading><content>Not later than 120 days after the date on which an independent assessment is provided to the Secretary by a federally funded research and development center pursuant to an agreement entered into under subsection (a), the Secretary shall submit to the Committees on Veterans’ Affairs of the House of Representatives and the Senate a plan to address the findings of the federally funded research and development center set forth in such assessment.</content></paragraph>
<paragraph class="fontsize10" id="y1ffec519-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/b/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><heading class="fontsize10"><inline class="smallCaps">Elements</inline>.—</heading><chapeau>The plan submitted under paragraph (1) shall include the following:</chapeau><subparagraph class="fontsize10" id="y1ffec51a-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/b/2/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><chapeau>Improvements to the security controls of the information systems of the Department assessed under subsection (a) to—</chapeau><clause class="fontsize10" id="y1ffec51b-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/b/2/A/i" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="i">(i) </num><content>achieve the goals specified in subparagraph (A) of paragraph (2) of such subsection; and</content></clause>
<clause class="fontsize10" id="y1ffec51c-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/b/2/A/ii" style="-uslm-lc:I658126"><num class="fontsize10" style="-uslm-lc:emspace2" value="ii">(ii) </num><content>protect against the threats specified in subparagraph (B) of such paragraph.</content></clause>
</subparagraph>
<subparagraph class="fontsize10" id="y1ffec51d-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/b/2/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>Improvements to the information security program and information security management system of the Department to achieve such goals and protect against such threats.</content></subparagraph>
<subparagraph class="fontsize10" id="y1ffec51e-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/b/2/C" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="C">(C) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1ffec51f-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Cost estimate.</p></sidenote><content>A cost estimate for implementing the plan.</content></subparagraph>
<subparagraph class="fontsize10" id="y1ffec520-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/b/2/D" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="D">(D) </num><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1ffec521-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Timeline.</p></sidenote><content>A timeline for implementing the plan.</content></subparagraph>
<subparagraph class="fontsize10" id="y1ffec522-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/b/2/E" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="E">(E) </num><content>Such other elements as the Secretary considers appropriate.</content></subparagraph>
</paragraph>
</subsection>
<subsection class="firstIndent0 fontsize10" id="y1ffec523-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/c" style="-uslm-lc:I658120"><num class="fontsize10" style="-uslm-lc:emspace2" value="c">(c) </num><heading class="fontsize10"><inline class="smallCaps">Comptroller General of the United States Evaluation and Review</inline>.—</heading><chapeau>Not later than 180 days after the date of the submission of the plan under subsection (b)(1), the Comptroller General of the United States shall—</chapeau><paragraph class="fontsize10" id="y1ffec524-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/c/1" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="1">(1) </num><chapeau>commence an evaluation and review of—</chapeau><subparagraph class="fontsize10" id="y1ffec525-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/c/1/A" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="A">(A) </num><content>the independent cybersecurity assessment provided under subsection (a); and</content></subparagraph>
<subparagraph class="fontsize10" id="y1ffec526-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/c/1/B" style="-uslm-lc:I658124"><num class="fontsize10" style="-uslm-lc:emspace2" value="B">(B) </num><content>the response of the Department to such assessment; and</content></subparagraph>
</paragraph>
<paragraph class="fontsize10" id="y1ffec527-e816-11f0-a1e4-69761a48a15a" identifier="/us/pl/117/302/s2/c/2" style="-uslm-lc:I658122"><num class="fontsize10" style="-uslm-lc:emspace2" value="2">(2) </num><content><sidenote><p class="leftAlign firstIndent0 fontsize8" id="x1ffec528-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Briefing.</p><p class="leftAlign firstIndent0 fontsize8" id="x1ffec529-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">Recommenda-</p><p class="leftAlign firstIndent0 fontsize8" id="x1ffec52a-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658180">tions.</p></sidenote>provide to the Committees on Veterans’ Affairs of the House of Representatives and the Senate a briefing on the <page identifier="/us/stat/136/4386">136 STAT. 4386</page>
results of the evaluation and review, including any recommendations made to the Secretary regarding the matters covered by the briefing.</content></paragraph>
</subsection>
</section>
<action>
<actionDescription style="-uslm-lc:I658030">Approved</actionDescription> <date date="2022-12-27">December 27, 2022</date>.</action>
</main>
<legislativeHistory>
<heading style="-uslm-lc:I658031"><inline class="underline">LEGISLATIVE HISTORY</inline>—<ref href="/us/bill/117/hr/7299">H.R. 7299</ref>:</heading>
<note>
<heading style="-uslm-lc:I658032">CONGRESSIONAL RECORD, Vol. 168 (2022):</heading>
<p class="indentUp4 firstIndent-1" id="x1ffec52b-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">Nov. 14, considered in House.</p><p class="indentUp4 firstIndent-1" id="x1ffec52c-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">Nov. 17, prior proceedings vacated; considered and passed House.</p><p class="indentUp4 firstIndent-1" id="x1ffec52d-e816-11f0-a1e4-69761a48a15a" style="-uslm-lc:I658035">Dec. 19, considered and passed Senate.</p></note>
</legislativeHistory>
<endMarker>○</endMarker>
</pLaw>