<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Engrossed-in-House" dms-id="HCD04A20E5B164F18B9628C15FDF99830" public-private="public" key="H" bill-type="olc" stage-count="1"> 
<metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 HR 7299 EH: Strengthening VA Cybersecurity Act of 2022</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date></dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="no">I</distribution-code> 
<congress display="yes">117th CONGRESS</congress><session display="yes">2d Session</session> 
<legis-num display="yes">H. R. 7299</legis-num> 
<current-chamber display="no">IN THE HOUSE OF REPRESENTATIVES</current-chamber> 
<legis-type>AN ACT</legis-type> 
<official-title display="yes">To require the Secretary of Veterans Affairs to obtain an independent cybersecurity assessment of information systems of the Department of Veterans Affairs, and for other purposes.</official-title> 
</form> 
<legis-body id="HBE0F052B00264C5CAE95BF2DFDE8C9CA" style="OLC"> 
<section id="HF18866A6A0D24CEA934D2557D2FFDC61" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Strengthening VA Cybersecurity Act of 2022</short-title></quote> or the <quote><short-title>SVAC Act of 2022</short-title></quote>.</text></section> <section id="H49BCA8B447184065BCA4F3BF931E7821" section-type="subsequent-section"><enum>2.</enum><header>Independent cybersecurity assessment of information systems of Department of Veterans Affairs</header> <subsection id="H502BD178DA364DEFA84610300A99DA3F"><enum>(a)</enum><header>Independent assessment required</header> <paragraph id="H77BE22C9A89E4DCFA608E978098ABF5C"><enum>(1)</enum><header>In general</header><text>Not later than 60 days after the date of the enactment of this Act, the Secretary of Veterans Affairs shall seek to enter into an agreement with a federally funded research and development center to provide to the Secretary an independent cybersecurity assessment of—</text> 
<subparagraph id="HEA8693639C6A459EA3F09C4136709CDA"><enum>(A)</enum><text>five high-impact information systems of the Department of Veterans Affairs; and</text></subparagraph> <subparagraph id="H7D6738E673AD41EAB7A62D8B50F23B35"><enum>(B)</enum><text>the effectiveness of the information security program and information security management system of the Department.</text></subparagraph></paragraph> 
<paragraph id="H312656B723C4407E8062A2859459009C"><enum>(2)</enum><header>Detailed analysis</header><text>The independent cybersecurity assessment provided under paragraph (1) shall include a detailed analysis of the ability of the Department—</text> <subparagraph id="HD1EC957D53B04EB4939B147ED3C77041"><enum>(A)</enum><text>to ensure the confidentiality, integrity, and availability of the information, information systems, and devices of the Department; and</text></subparagraph> 
<subparagraph id="H0ADB0D9438A1413F80F77BD5A55F39F5"><enum>(B)</enum><text>to protect against—</text> <clause id="HFA89D6D07ED2470785657FB11CBA96D6"><enum>(i)</enum><text>advanced persistent cybersecurity threats;</text></clause> 
<clause id="H2EC45755704445A3BD9E13F5D35C7A0D"><enum>(ii)</enum><text>ransomware;</text></clause> <clause id="HAC8C5DBEE24D4221987DB989AE028F04"><enum>(iii)</enum><text>denial of service attacks;</text></clause> 
<clause id="HE29D365EE72C48FA86A6D4DAF75319A2"><enum>(iv)</enum><text>insider threats;</text></clause> <clause id="H0D277ADEC2CF4CFFA69C17E1971CA816"><enum>(v)</enum><text>threats from foreign actors, including state sponsored criminals and other foreign based criminals;</text></clause> 
<clause id="H9F45865A4A1C40F0A17E4A095C0DF60D"><enum>(vi)</enum><text>phishing;</text></clause> <clause id="H08D366C13F6444C2B7568C159D1DE530"><enum>(vii)</enum><text>credential theft;</text></clause> 
<clause id="HCF70F3447C874622817103E1E5DD3640"><enum>(viii)</enum><text>cybersecurity attacks that target the supply chain of the Department;</text></clause> <clause id="HA07636BCDC8F465FACF8613A000D7DCA"><enum>(ix)</enum><text>threats due to remote access and telework activity; and</text></clause> 
<clause id="H8A23125849374A32A01511A73E7A4B0D"><enum>(x)</enum><text>other cyber threats.</text></clause></subparagraph></paragraph> <paragraph id="HD7C1F35CD17D4A379BD027E8421800A0"><enum>(3)</enum><header>Types of systems</header><text>The independent cybersecurity assessment provided under paragraph (1) shall cover on-premises, remote, cloud-based, and mobile information systems and devices used by, or in support of, Department activities. </text></paragraph> 
<paragraph id="HA3FC3AD11CC44CBC959E6016F8F88550"><enum>(4)</enum><header>Shadow information technology</header><text>The independent cybersecurity assessment provided under paragraph (1) shall include an evaluation of the use of information technology systems, devices, and services by employees and contractors of the Department who do so without the heads of the elements of the Department that are responsible for information technology at the Department knowing or approving of such use.</text></paragraph> <paragraph id="H21D2CBFEEE7E4C65BC7D31E7618988C3"><enum>(5)</enum><header>Methodology</header><text>In conducting the cybersecurity assessment to be provided under paragraph (1), the federally funded research and development center shall take into account industry best practices and the current state-of-the-art in cybersecurity evaluation and review. </text></paragraph></subsection> 
<subsection id="H2C1AC81E01F9411B923210564C03DBC5"><enum>(b)</enum><header>Plan</header> 
<paragraph id="HDE055BA5BD534F5A9692E3B94DD293E0"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Not later than 120 days after the date on which an independent assessment is provided to the Secretary by a federally funded research and development center pursuant to an agreement entered into under subsection (a), the Secretary shall submit to the Committees on Veterans’ Affairs of the House of Representatives and the Senate a plan to address the findings of the federally funded research and development center set forth in such assessment.</text></paragraph> <paragraph id="H38DA541A9C6C40F4BD10B3DC3291DF53"><enum>(2)</enum><header>Elements</header><text>The plan submitted under paragraph (1) shall include the following:</text> 
<subparagraph id="H8CF2BC6D5B7B4E93A40BCF8CEEE4C4EA"><enum>(A)</enum><text display-inline="yes-display-inline">Improvements to the security controls of the information systems of the Department assessed under subsection (a) to—</text> <clause id="H005552400D8B4CE1B2103C1FB5E62ABA"><enum>(i)</enum><text>achieve the goals specified in subparagraph (A) of paragraph (2) of such subsection; and</text></clause> 
<clause id="HEEE2F4C26C9046B6829641393CB0FC74"><enum>(ii)</enum><text>protect against the threats specified in subparagraph (B) of such paragraph.</text></clause></subparagraph> <subparagraph id="H66105BD30017437F82273CB0A313EB65"><enum>(B)</enum><text display-inline="yes-display-inline">Improvements to the information security program and information security management system of the Department to achieve such goals and protect against such threats.</text></subparagraph> 
<subparagraph id="HFCB8DF39628F40C08009900384AFA82E"><enum>(C)</enum><text>A cost estimate for implementing the plan.</text></subparagraph> <subparagraph id="H0901482CA8AD41EF8C169E70F1E35961"><enum>(D)</enum><text>A timeline for implementing the plan.</text></subparagraph> 
<subparagraph id="H274828ECFA41484FB3434139B83BF213"><enum>(E)</enum><text>Such other elements as the Secretary considers appropriate. </text></subparagraph></paragraph></subsection> <subsection id="H5B39FEF585324EB98D795DC808B63BD7"><enum>(c)</enum><header>Comptroller General of the United States evaluation and review</header><text>Not later than 180 days after the date of the submission of the plan under subsection (b)(1), the Comptroller General of the United States shall—</text> 
<paragraph id="H6DF108143F0943AE970839086AB35D7F"><enum>(1)</enum><text>commence an evaluation and review of—</text> <subparagraph id="H6AC2ACE2848B40DE87379046DC60C43C"><enum>(A)</enum><text>the independent cybersecurity assessment provided under subsection (a); and</text></subparagraph> 
<subparagraph id="H0606DFC5ED0D4F01AC81446209669762"><enum>(B)</enum><text>the response of the Department to such assessment; and </text></subparagraph></paragraph> <paragraph id="HBD0A4F281E624F468EDDFCBB12C36BCD"><enum>(2)</enum><text>provide to the Committees on Veterans’ Affairs of the House of Representatives and the Senate a briefing on the results of the evaluation and review, including any recommendations made to the Secretary regarding the matters covered by the briefing.</text></paragraph></subsection></section> 
</legis-body> <attestation><attestation-group><attestation-date date="20221115" chamber="House">Passed the House of Representatives November 17, 2022.</attestation-date><attestor display="no">Cheryl L. Johnson,</attestor><role>Clerk.</role></attestation-group></attestation> 
<endorsement display="yes"></endorsement> 
</bill> 


