<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="HCD04A20E5B164F18B9628C15FDF99830" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 HR 7299 IH: Strengthening VA Cybersecurity Act of 2022</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2022-03-30</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">117th CONGRESS</congress><session display="yes">2d Session</session><legis-num display="yes">H. R. 7299</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20220330">March 30, 2022</action-date><action-desc><sponsor name-id="M001214">Mr. Mrvan</sponsor> (for himself, <cosponsor name-id="L000590">Mrs. Lee of Nevada</cosponsor>, <cosponsor name-id="M000194">Ms. Mace</cosponsor>, and <cosponsor name-id="G000597">Mr. Garbarino</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HVR00">Committee on Veterans' Affairs</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To require the Secretary of Veterans Affairs to obtain an independent cybersecurity assessment of information systems of the Department of Veterans Affairs, and for other purposes.</official-title></form><legis-body id="HBE0F052B00264C5CAE95BF2DFDE8C9CA" style="OLC"><section id="H3457A0DAF04B483EB0E21D500C469A73" section-type="section-one"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Strengthening VA Cybersecurity Act of 2022</short-title></quote> or the <quote><short-title>SVAC Act of 2022</short-title></quote>.</text></section><section id="HA61EF61057AF4A759994D7FC9BC8C489" section-type="subsequent-section"><enum>2.</enum><header>Independent cybersecurity assessment of information systems of Department of Veterans Affairs</header><subsection id="H76E5BDE01B9C466A896A3C6D5F2641F8"><enum>(a)</enum><header>Independent assessment required</header><paragraph id="H6C879683D15E4A3C909F99D36E197FB6"><enum>(1)</enum><header>In general</header><text>Not later than 60 days after the date of the enactment of this Act, the Secretary of Veterans Affairs shall enter into an agreement with a federally funded research and development center to provide the Secretary with an independent cybersecurity assessment of—</text><subparagraph id="HA51A6E7A76504EFFB28D453AB3D1D2F9"><enum>(A)</enum><text>not more than 10 and not fewer than three high-impact information systems of the Department of Veterans Affairs; and</text></subparagraph><subparagraph id="H3AE88CCA74E14C278BA802771E7308A7"><enum>(B)</enum><text>the effectiveness of the information security program and information security management system of the Department.</text></subparagraph></paragraph><paragraph id="H03FFCEA1FAB849E3808BA58F98DBA332"><enum>(2)</enum><header>Detailed analysis</header><text>The independent cybersecurity assessment provided under paragraph (1) shall include a detailed analysis of the ability of the Department—</text><subparagraph id="HB6DDD212E5E4447F9F79C67239E02665"><enum>(A)</enum><text>to ensure the confidentiality, integrity, and availability of the information, information systems, and devices of the Department; and</text></subparagraph><subparagraph id="H66A93AD192494C09B2129A706332EAA6"><enum>(B)</enum><text>to protect against—</text><clause id="H2E010C74BC254458A6CA9EFBB3A76BBA"><enum>(i)</enum><text>advanced persistent cybersecurity threats;</text></clause><clause id="HCD3153560C614D0C91B15C79F9A41837"><enum>(ii)</enum><text>ransomware;</text></clause><clause id="HD36B3128994A4799841C56A60CEE6041"><enum>(iii)</enum><text>denial of service attacks;</text></clause><clause id="HF46B018867494AC6A88DFB789A0AC8ED"><enum>(iv)</enum><text>insider threats;</text></clause><clause id="H3BA6EE7DE5CA4A908F7D9E5A07F52921"><enum>(v)</enum><text>threats from foreign actors, including state-sponsored criminals and other foreign based criminals;</text></clause><clause id="H86361879E9C3400AB88662131BD9ED77"><enum>(vi)</enum><text>phishing;</text></clause><clause id="HB82D9F2DBD3046668DDCE0645EF127FC"><enum>(vii)</enum><text>credential theft;</text></clause><clause id="HE5A690CDE8B24CF2BEA1BB3981BC2EE9"><enum>(viii)</enum><text>cybersecurity attacks that target the supply chain of the Department;</text></clause><clause id="H521337B8EABA46018FE56D84BFB91549"><enum>(ix)</enum><text>threats due to remote access and telework activity; and</text></clause><clause id="H9524ABE7EAF2456D80134FA77DE2628A"><enum>(x)</enum><text>other cyber threats.</text></clause></subparagraph></paragraph><paragraph id="H1538C1E710264A42B4A59BF2F7EDEBF1"><enum>(3)</enum><header>Types of systems</header><text>The independent cybersecurity assessment provided under paragraph (1) shall cover on-premises, remote, cloud-based, and mobile information systems and devices used by, or in support of, Department activities. </text></paragraph><paragraph id="H39A53B0CCB5C44D79FB9EA1018652336"><enum>(4)</enum><header>Shadow information technology</header><text>The independent cybersecurity assessment provided under paragraph (1) shall include an evaluation of the use of information technology systems, devices, and services by employees and contractors of the Department who do so without the elements of the Department that are responsible for information technology at the Department knowing or approving of such use.</text></paragraph><paragraph id="H47F3A945A7EF40F7857C34267315F4D3"><enum>(5)</enum><header>Methodology</header><text>In conducting the cybersecurity assessment provided under paragraph (1), the federally funded research and development center shall take into account industry best practices and the current state-of-the-art in cybersecurity evaluation and review. </text></paragraph></subsection><subsection id="HF1280AF750514A62B2726770B359DB6D"><enum>(b)</enum><header>Plan</header><paragraph id="H0EA2341E92A9471387EF089CB4B496F4"><enum>(1)</enum><header>In general</header><text>Not later than 120 days after the date on which an independent assessment is provided to the Secretary pursuant to an agreement entered into under subsection (a) with a federally funded research and development center, the Secretary shall submit to Congress a plan to address the findings of the federally funded research and development center set forth in such assessment.</text></paragraph><paragraph id="H99B9B475DD884D56AB4BEF78B53FCB07"><enum>(2)</enum><header>Elements</header><text>The plan submitted under paragraph (1) shall include the following:</text><subparagraph id="H89014B489D924D64B78ECFA8CD86E09A"><enum>(A)</enum><text>A cost estimate for implementing the plan.</text></subparagraph><subparagraph id="HE3770B920C304525AAE2764C32604172"><enum>(B)</enum><text>A timeline for implementing the plan.</text></subparagraph><subparagraph id="H408034321B2D45DE861553E28BC8FDB4"><enum>(C)</enum><text>Such other elements as the Secretary considers appropriate. </text></subparagraph></paragraph></subsection><subsection id="H111E2E2611704D75ABD61AFD4315D655"><enum>(c)</enum><header>Comptroller General of the United States review</header><text>Not later than 180 days after the date of the submission of the plan under subsection (b)(1), the Comptroller General of the United States shall—</text><paragraph id="H5132B09469B3480188D6280154D15366"><enum>(1)</enum><text>commence a review of—</text><subparagraph id="HDB1B5221A2E045C6925BDFB6F7DAAF96"><enum>(A)</enum><text>the independent cybersecurity assessment provided under subsection (a); and</text></subparagraph><subparagraph id="H6527767BBDF3483D8AFA6CF672D94142"><enum>(B)</enum><text>the response of the Department to such assessment; and </text></subparagraph></paragraph><paragraph id="HFD3F88B7233E4ED2BF592429BBEDE9AE"><enum>(2)</enum><text>submit to Congress a report of the results of that review commenced under paragraph (1), including any recommendations made to the Secretary regarding the matters covered by the report. </text></paragraph></subsection></section></legis-body></bill> 

