<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="H0211A2A5A9CA4BF4B4C1D4F439567E3C" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 HR 3608 IH: Improving Contractor Cybersecurity Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2021-05-28</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">117th CONGRESS</congress><session display="yes">1st Session</session><legis-num display="yes">H. R. 3608</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20210528">May 28, 2021</action-date><action-desc><sponsor name-id="L000582">Mr. Lieu</sponsor> introduced the following bill; which was referred to the <committee-name committee-id="HGO00">Committee on Oversight and Reform</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To amend title 41, United States Code, to require information technology contractors to maintain a vulnerability disclosure policy and program, and for other purposes.</official-title></form><legis-body id="H4F1BB365891E46FD9389F7ACD7B661E6" style="OLC"><section id="H3C3ED503F65D4626977187BE756B2858" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Improving Contractor Cybersecurity Act</short-title></quote>.</text></section><section id="H7F8C28DA072C4FE39E8D4A0F8509BF4E"><enum>2.</enum><header>Vulnerability disclosure policy and program required for information technology contractors</header><subsection id="HF03EE95055784886BBDED2FB0FE23DF9"><enum>(a)</enum><header>Amendment</header><text display-inline="yes-display-inline">Chapter 47 of division C of subtitle I of title 41, United States Code, is amended by adding at the end the following new section:</text><quoted-block style="USC" id="H3C1F980F787E4434BC4A16D032E464A4" display-inline="no-display-inline"><section id="H2DAD654270D444D889D46FEA0CF69AD2"><enum>4715.</enum><header>Vulnerability disclosure policy and program required</header><subsection id="HAEE2C1C781E6462CA9F36631B5F3C008"><enum>(a)</enum><header>Requirements for information technology contractors</header><text display-inline="yes-display-inline">The head of an executive agency may not enter into a contract for information technology unless the contractor maintains or does the following:</text><paragraph id="HB7EB15024C614442BC271DABA46CAC9C"><enum>(1)</enum><text display-inline="yes-display-inline">A vulnerability disclosure policy for information technology that—</text><subparagraph id="H751DF54D4A7D4C7AA2BAEF35089407D5" commented="no"><enum>(A)</enum><text> includes—</text><clause id="H162F5D1E1BEE411595D14AACD2B67DFE" commented="no"><enum>(i)</enum><text>a description of which systems are in scope;</text></clause><clause id="HF5E01472E6A843C0AC85E81971684FF3" commented="no"><enum>(ii)</enum><text display-inline="yes-display-inline">the type of information technology testing for each system that is allowed (or specifically not authorized);</text></clause><clause id="HCDED1F41D74C4E15876D9110B56E764C" commented="no"><enum>(iii)</enum><text>if a contractor includes systems that host sensitive information in the vulnerability disclosure policy, the contractor shall determine whether to impose restrictions on accessing, copying, transferring, storing, using, and retaining such information, including by—</text><subclause id="H5CC4A74BC717469B9BDD37B0C9E8C789" commented="no"><enum>(I)</enum><text display-inline="yes-display-inline">prohibiting sensitive information from being saved, stored, transferred, or otherwise accessed after initial discovery;</text></subclause><subclause id="H41E254742E2F445AB861C336EB932E4E" commented="no"><enum>(II)</enum><text>directing that sensitive information be viewed only to the extent required to identify a vulnerability and that the information not be retained; or </text></subclause><subclause id="HC975C67AF7A1437DAEB952693C58E96B" commented="no"><enum>(III)</enum><text>limiting use of information obtained from interacting with the systems or services to be explored by the researcher to activities directly related to reporting security vulnerabilities;</text></subclause></clause><clause id="H47B0BC66CDC34C5C82B258ED242BFBF1" commented="no"><enum>(iv)</enum><text>a description of how an individual may submit a vulnerability report that includes—</text><subclause id="H48980C3564CF41A6BB0A01ECA88706A1" commented="no"><enum>(I)</enum><text>the location of where to send the report, such as a web form or email address;</text></subclause><subclause id="H23AD4B3983DE49BBBD028C895EC686FF" commented="no"><enum>(II)</enum><text display-inline="yes-display-inline">a description of the type of information necessary to find and analyze the vulnerability (such as a description, the location, and potential impact of the vulnerability, the technical information needed to reproduce the vulnerability, and any proof of concept); and</text></subclause><subclause id="H45808E3EFDE64AADBE5A6B0A06D9D8B6" commented="no"><enum>(III)</enum><text display-inline="yes-display-inline">a clear statement—</text><item id="H74C88A6234374E5AA274CDF54628E522"><enum>(aa)</enum><text>that any individual that submits a vulnerability report may do so anonymously; and</text></item><item id="H765AC1E4BF2145B6A8DE8CF3D9109474"><enum>(bb)</enum><text>on how and whether any incomplete submission is evaluated;</text></item></subclause></clause><clause id="HE02BBAB5879F4B9FB104EB9891BD5FF4" commented="no"><enum>(v)</enum><text display-inline="yes-display-inline">a commitment from the contractor that the contractor will not pursue civil action for any accidental, good faith violation of the vulnerability disclosure policy;</text></clause><clause id="HFEE650DC3D804B61840A5245D9AB8165" commented="no"><enum>(vi)</enum><text display-inline="yes-display-inline">a commitment from the contractor that if an individual acting in accordance with the vulnerability disclosure policy of the contractor is sued by a third party, the contractor will inform the public or the court that the individual was acting in compliance with the vulnerability disclosure policy; </text></clause><clause id="HA7DFA57213354530945E0918D1E6CE43" commented="no"><enum>(vii)</enum><text>a statement that describes the time frame in which the individual that submits a report, if known, will receive a notification of receipt of the report and a description of what steps will be taken by the contractor during the remediation process; and</text></clause><clause id="H56B907FD08F0487A8D50D1E721194242"><enum>(viii)</enum><text display-inline="yes-display-inline">a set of guidelines that establishes what type of activity by a researcher are acceptable and unacceptable; and</text></clause></subparagraph><subparagraph id="H8AA6D77FA5564CBDBC461CF4583DA7FB" commented="no"><enum>(B)</enum><text>does not—</text><clause id="HFB2F9276A171437AAF130B49132666EB" commented="no"><enum>(i)</enum><text display-inline="yes-display-inline">require the submission of personally identifiable information of a researcher; and</text></clause><clause id="H9472728ED1AD451A9A6A494930654623" commented="no"><enum>(ii)</enum><text>limit testing solely to entities approved by the contractor but rather authorizes the public to search for and report any vulnerability.</text></clause></subparagraph></paragraph><paragraph id="HE1F17323BE2F4D50A235810C3D2613DE" commented="no"><enum>(2)</enum><text display-inline="yes-display-inline">A description of additional procedures that describe how the contractor will communicate with the researcher, and how and when any communication occurs.</text></paragraph><paragraph id="HEEAF5DAA0DBB499393662D54EA7F1304" commented="no"><enum>(3)</enum><text>A description of the target timelines for and tracking of the following:</text><subparagraph id="H2135E6E736B34910A1CC7F8A1B522F72" commented="no"><enum>(A)</enum><text> Notification of receipt to the individual that submits the report, if known.</text></subparagraph><subparagraph id="H9E2CD81EB3974B66B0B005CE7C507485" commented="no"><enum>(B)</enum><text>An initial assessment, such as determining whether any disclosed vulnerability is valid.</text></subparagraph><subparagraph id="H334ABCB921B4403AB1DD2C561159C447" commented="no"><enum>(C)</enum><text>Resolution of a vulnerability, including notification of the outcome to the researcher.</text></subparagraph></paragraph><paragraph id="H4DA6392215BA4773A298CEFF751BAED6" commented="no"><enum>(4)</enum><text>A page on the website of the contractor that—</text><subparagraph id="H3779B4C9B4814119B57F5B3705EDFA57" commented="no"><enum>(A)</enum><text display-inline="yes-display-inline">allows for the submission of vulnerabilities by anyone relating to the information technology;</text></subparagraph><subparagraph id="HF945A49C529F4E278C21DD354F97F22C" commented="no"><enum>(B)</enum><text display-inline="yes-display-inline">lists the contact information, such as a phone number or email address for an individual or team responsible for reviewing any such submission under subparagraph (A); and</text></subparagraph><subparagraph id="H8A4E71B85B60460FBA3A43360A3975D9" commented="no"><enum>(C)</enum><text>describes the process by which a review is conducted, including how long it will take for the contractor to respond to researcher and whether or not monetary rewards will be paid to the reporter for identifying a vulnerability.</text></subparagraph></paragraph><paragraph id="HE438ACAA6F6A4F3898DF412C413A5FB4"><enum>(5)</enum><text display-inline="yes-display-inline">In the case of a discovered vulnerability that the contractor is not responsible for patching, the contractor shall submit the vulnerability to the responsible party or direct the researcher to the appropriate party.</text></paragraph></subsection><subsection id="HAAC2FBCD7C9546DFB9CE50EDA7A93970" commented="no" display-inline="no-display-inline"><enum>(b)</enum><header>Reporting requirements and metrics</header><text display-inline="yes-display-inline">Not later than 7 days after the date on which the vulnerability disclosure policy described in subsection (a) is published, and on an ongoing basis as vulnerability reports are received, an information technology contractor shall report to the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security the following information:</text><paragraph id="HB58F7F1764D3485E97888C86497A2413" commented="no"><enum>(1)</enum><text display-inline="yes-display-inline">Any valid or credible report of a not previously known public vulnerability (including any misconfiguration) on a system that uses commercial software or services that affect or are likely to affect other parties in government or industry once a patch or viable mitigation is available. </text></paragraph><paragraph id="H2F990ABBEF074B5D8A5F9139D910DFA1" commented="no"><enum>(2)</enum><text display-inline="yes-display-inline">Any other situation where the contractor determines it would be helpful or necessary to involve the Cybersecurity and Infrastructure Security Agency.</text></paragraph></subsection><subsection id="HCA387C10A56E4108A13D5AF33F9E23AC"><enum>(c)</enum><header>CISA submission of vulnerabilities</header><text display-inline="yes-display-inline">The Cybersecurity and Infrastructure Security Agency shall communicate with and submit, as necessary, vulnerabilities to the MITRE Common Vulnerabilities and Exposures database and the National Institute of Standards and Technology National Vulnerability Database. </text></subsection><subsection id="HE426C0602CC4426DA0CC632C8E2B895A"><enum>(d)</enum><header>Definitions</header><text display-inline="yes-display-inline">In this section:</text><paragraph id="H8D931B205D154D18AE18527F0FE2A7CC"><enum>(1)</enum><header>Executive agency</header><text>The term <term>executive agency</term> has the meaning given that term in section 133.</text></paragraph><paragraph id="H4746101DC5EF4F2C809C88A4E8376E05" commented="no"><enum>(2)</enum><header>Researcher</header><text>The term <term>researcher</term> means the individual who submits a vulnerability report. </text></paragraph><paragraph id="HC84B4F7D0AF74E3EA61B786F8B17F70A" commented="no"><enum>(3)</enum><header>Information technology</header><text>The term <term>information technology</term> has the meaning given that term in section 11101 of title 40.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="H363E27727DEB4221B3D5BD63B49E166F"><enum>(b)</enum><header>Technical and conforming amendment</header><text display-inline="yes-display-inline">The table of sections for chapter 47 of division C of subtitle I of title 41, United States Code, is amended by adding at the end the following new item:</text><quoted-block style="USC" id="H5996F8837F3A492D95CDF9EDF37D4B5A" display-inline="no-display-inline"><toc regeneration="no-regeneration"><toc-entry level="item">4715. Vulnerability disclosure policy and program required.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="H56F27F72DABB48859DDB7C1BD98946C9"><enum>(c)</enum><header>Applicability</header><text>The amendments made by this section shall take effect on the date of the enactment of this section and shall apply to any contract entered into on or after such effective date.</text></subsection></section></legis-body></bill> 

