<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-type="olc" bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-MIR22239-1N8-JW-0K1"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>117 S3894 IS: Advancing Cybersecurity Through Continuous Diagnostics and Mitigation Act</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2022-03-22</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>117th CONGRESS</congress><session>2d Session</session><legis-num>S. 3894</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20220322">March 22, 2022</action-date><action-desc><sponsor name-id="S287">Mr. Cornyn</sponsor> (for himself and <cosponsor name-id="S388">Ms. Hassan</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSGA00">Committee on Homeland Security and Governmental Affairs</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To amend the Homeland Security Act of 2002 to authorize the Secretary of Homeland Security to establish a continuous diagnostics and mitigation program in the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security, and for other purposes.</official-title></form><legis-body style="OLC" display-enacting-clause="yes-display-enacting-clause" id="HD791114738BB4BB689D55D041FB224D1"><section section-type="section-one" id="H4F75FB30E66D411CA62D3D23020E34EE"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Advancing Cybersecurity Through Continuous Diagnostics and Mitigation Act</short-title></quote>.</text></section><section id="H6B03AA9AF5614FC9AA325F24A9B6D490"><enum>2.</enum><header>Establishment of Federal intrusion detection and prevention system and continuous diagnostics and mitigation program in the Cybersecurity and Infrastructure Security Agency</header><subsection id="H148697BE64AF4D7299A816FF35617AFF"><enum>(a)</enum><header>In general</header><text>Section 2213 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/663">6 U.S.C. 663</external-xref>) is amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="H3ED843C300BC406FB1355CDF8ACF9D14"><subsection id="H9E4B0A58CB02418E868784AFDE158664"><enum>(g)</enum><header>Continuous diagnostics and mitigation</header><paragraph id="HA748C789B45140848E7A4ADB7151D23C"><enum>(1)</enum><header>Program</header><subparagraph id="H01B36098DDBA4E5A95EA529AE7C1CB13"><enum>(A)</enum><header>In general</header><text>The Secretary, acting through the Director, shall, with or without reimbursement, deploy, operate, and maintain a continuous diagnostics and mitigation program for agencies under which the Secretary shall—</text><clause id="id6c3f3511055847b28e9c74b41cc21637"><enum>(i)</enum><text>assist agencies to continuously diagnose and mitigate cyber threats and vulnerabilities;</text></clause><clause id="HFE7EDF29D8444C0B9CEC63B9E6BFDEC6"><enum>(ii)</enum><text>develop and provide the capability to collect, analyze, and visualize information relating to security data and cybersecurity risks at agencies;</text></clause><clause id="HE86B0C5B74D84236B9BEBAEE54C3D88A"><enum>(iii)</enum><text display-inline="yes-display-inline">employ shared services, collective purchasing, blanket purchase agreements, and any other economic or procurement models the Secretary determines appropriate to maximize the costs savings associated with implementing the program;</text></clause><clause id="H8FED7F66B1A7474295946B1BC18EFC8B"><enum>(iv)</enum><text>assist agencies in setting information security priorities and assessing and managing cybersecurity risks;</text></clause><clause id="H7AA91D95D59B48D5B352DF229E119593"><enum>(v)</enum><text>develop policies and procedures for reporting systemic cybersecurity risks and potential incidents based upon data collected under the program; and</text></clause><clause id="id841B06F0DDD74F94B26E36FA61657C66"><enum>(vi)</enum><text>promote the adoption of a zero trust security model in improving agency cybersecurity readiness.</text></clause></subparagraph><subparagraph id="H99F6ABC03D9D4343964ECE29CC78F81B"><enum>(B)</enum><header>Regular improvement</header><text>The Secretary shall regularly—</text><clause id="id7750432533124EBFB91D112F126A9A3E"><enum>(i)</enum><text>deploy new technologies and modify existing technologies to the continuous diagnostics and mitigation program required under subparagraph (A), as appropriate, to improve the program; and</text></clause><clause id="idabfa1068032f48daa2ce031a5093f226"><enum>(ii)</enum><text>update the technical requirements documentation of the continuous diagnostics and mitigation program required under subparagraph (A) to account for emerging technology capabilities such as cloud computing and comprehensive cloud security controls.</text></clause></subparagraph></paragraph><paragraph id="id57D60609C5B740E08ED9366D306CC69E"><enum>(2)</enum><header>Agency responsibilities</header><text>Notwithstanding any other provision of law, each agency that uses the continuous diagnostics and mitigation program under paragraph (1) shall, continuously and in real time, provide to and allow access for the Secretary to collect all information, assessments, analyses, and raw data collected by the program, in a manner specified by the Secretary.</text></paragraph><paragraph id="idfb9acfdfc1544901b7958e26314b2a7d"><enum>(3)</enum><header>Responsibilities of the Secretary</header><text>In carrying out the continuous diagnostics and mitigation program under paragraph (1), the Secretary, acting through the Director, shall—</text><subparagraph id="id30c91f503ac549ddbafe7b83082f8885"><enum>(A)</enum><text>share with agencies relevant analysis and products developed under the program;</text></subparagraph><subparagraph id="ided151be9e94b4388bffa6dcd115603eb"><enum>(B)</enum><text>provide regular reports on cybersecurity risks to agencies; </text></subparagraph><subparagraph id="idd574201951fa4d829808b971faa196d7"><enum>(C)</enum><text>provide comparative assessments of cybersecurity risks for agencies; </text></subparagraph><subparagraph id="ida9b1456064ef4b7db90e55b6d7370273"><enum>(D)</enum><text>oversee the integration of continuous diagnostics and mitigation products and services into agency systems;</text></subparagraph><subparagraph id="id01EB2DB9E53346F7AB803F5E9D3B8837"><enum>(E)</enum><text>establish performance requirements for product integrators;</text></subparagraph><subparagraph id="idd530a6d708cc48dcbb20e61d714df663"><enum>(F)</enum><text>at the request of an agency, provide technical assistance in selecting, procuring, and integrating continuous diagnostics and mitigation products and services; </text></subparagraph><subparagraph id="id26abcde5e801464996c5397b0c5ec316"><enum>(G)</enum><text>not less than once each fiscal year, submit to the appropriate committees of Congress a report that includes—</text><clause id="idCA95064219604060A3A8BBFB877A63CE"><enum>(i)</enum><text>the progress made by each agency to meet continuous diagnostics and mitigation benchmarks from the beginning of the implementation through the date of the report; and</text></clause><clause id="id6EC1FF23CB384A9F8EC6E2028924EBF6"><enum>(ii)</enum><text>a summary of the efforts of each agency to account for emerging technology capabilities; and</text></clause></subparagraph><subparagraph id="id5297f2400d4e4317bb8eabe6812551a6"><enum>(H)</enum><text>take steps to ensure that the security data collected through the program is aggregated with other Government-wide cybersecurity programs to better automate defensive capabilities. </text></subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="H4B2E2A66603942DD8DD6134BFF4011AD"><enum>(b)</enum><header>Continuous diagnostics and mitigation strategy</header><paragraph id="HA81A20F475C04F04AED674B3ED6A316A"><enum>(1)</enum><header>In general</header><text>Not later than 180 days after the date of the enactment of this Act, the Secretary of Homeland Security shall develop a comprehensive continuous diagnostics and mitigation strategy to carry out the continuous diagnostics and mitigation program required under subsection (g) of section 2213 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/663">6 U.S.C. 663</external-xref>), as added by subsection (a).</text></paragraph><paragraph id="H50BBC342ABEF402D91F612DBEA614AAB"><enum>(2)</enum><header>Scope</header><text>The strategy required under paragraph (1) shall include the following:</text><subparagraph id="H5430A3781ADC47888E457E8806C4E9CC"><enum>(A)</enum><text>A description of the coordination and funding required to deploy, install, and maintain the tools, capabilities, and services that the Secretary of Homeland Security determines to be necessary to satisfy the requirements of such program.</text></subparagraph><subparagraph id="HD79F8D8E809D4DDC8A92BB0AF10BAC9D"><enum>(B)</enum><text>A description of any obstacles facing the deployment, installation, and maintenance of tools, capabilities, and services under such program.</text></subparagraph><subparagraph id="H2683A2CD554A48C2881C841A9852A023"><enum>(C)</enum><text>Guidelines to help maintain and continuously upgrade tools, capabilities, and services provided under such program.</text></subparagraph><subparagraph id="HE417EAADEF914D5F8AF7637C9B28FF4D"><enum>(D)</enum><text display-inline="yes-display-inline">A plan for using the data collected by such program for creating a common framework for data analytics, visualization of enterprise-wide risks, and real-time reporting, and comparative assessments for cybersecurity risks.</text></subparagraph><subparagraph id="id934C2D8A1FD94E11AD54ABB0A92FA964"><enum>(E)</enum><text>Recommendations for using the data to enable the Cybersecurity and Infrastructure Security Agency to engage in cyber hunt and detection and response activities.</text></subparagraph><subparagraph id="idC826B77BE6BB4F4A98AD556E14FD1116"><enum>(F)</enum><text>Recommendations for future efforts and activities, including for the rollout of new and emerging tools, capabilities and services, proposed timelines for delivery, and whether to continue the use of phased rollout plans, related to securing networks, devices, data, and information and operational technology assets through the use of such program.</text></subparagraph><subparagraph id="id828C9540BFFC49E582A2D6B8B39CDBAB"><enum>(G)</enum><text>Recommendations for improving the integration process of continuous diagnostics and mitigation products and capabilities within agency systems. </text></subparagraph></paragraph><paragraph id="H01CBB2A8803B4D0A98547AC730FF30C9"><enum>(3)</enum><header>Form</header><text>The strategy required under paragraph (1) shall be submitted in an unclassified form, but may contain a classified annex.</text></paragraph></subsection></section><section id="id199d81c4430c492bbaae537fe6b3acac"><enum>3.</enum><header>Federal intrusion detection and prevention system and continuous diagnostics and mitigation pilot program for State, local, Tribal, and territorial governments</header><subsection id="idb9e3143d932542358ef647411911b2fd"><enum>(a)</enum><header>Definitions</header><text>In this section—</text><paragraph id="id6FE14BC1E6BB494A8F5CC7BCB7743C1B"><enum>(1)</enum><text>the terms <term>local government</term> and <term>State</term> have the meanings given those terms in section 3 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/101">6 U.S.C. 101</external-xref>);</text></paragraph><paragraph id="id93C8B48BEE4648B5B7E467E3A9E565E2"><enum>(2)</enum><text>the term <term>Secretary</term> means the Secretary of Homeland Security; and</text></paragraph><paragraph id="id827ABEBEBF6A4BB8A396556C66AB8A25"><enum>(3)</enum><text>the term <term>Tribal government</term> means the recognized governing body of any Indian or Alaska Native Tribe, band, nation, pueblo, village, community, component band, or component reservation, that is individually identified (including parenthetically) in the most recent list published pursuant to section 104 of the Federally Recognized Indian Tribe List Act of 1994 (<external-xref legal-doc="usc" parsable-cite="usc/25/5131">25 U.S.C. 5131</external-xref>). </text></paragraph></subsection><subsection id="id961157B5ED974E40B514790C57714CB1"><enum>(b)</enum><header>Establishment</header><text>The Secretary shall conduct a Continuous Diagnostics and Mitigation Pilot Program with not less than 5 State, local, Tribal, or territorial governments to—</text><paragraph id="id957f8e8b7b184379be6d7dc164ffdf83"><enum>(1)</enum><text>promote the use of technologies and services in the continuous diagnostics and mitigation program described in subsection (g) of section 2213 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/663">6 U.S.C. 663</external-xref>), as added by section 2 of this Act, at the State, local, Tribal, and territorial government level;</text></paragraph><paragraph id="idfedab7bb60ad4c58925442748e2f1463"><enum>(2)</enum><text>with or without reimbursement, make accessing the technologies and services described in paragraph (1) by State, local, Tribal, and territorial governments as affordable and simple as possible; </text></paragraph><paragraph id="id22852d2ae17846c7bef0fc1b12f623e2"><enum>(3)</enum><text>promote the adoption of a zero trust security model in improving cybersecurity readiness at the State, local, Tribal, and territorial government level; and</text></paragraph><paragraph id="idCD60659B612B4503BDA216D8836932F6"><enum>(4)</enum><text>provide technical assistance in integrating continuous diagnostics and mitigation technologies and products into State, local, Tribal, and territorial government systems.</text></paragraph></subsection><subsection id="id89eb9a21f7ca44688e54d20e0e42474c"><enum>(c)</enum><header>Considerations</header><text>In selecting a State, local, or Tribal government for participation in the pilot program established under subsection (b), the Secretary shall consider—</text><paragraph id="id0e84ffb55a6e4e538239d5362c1178fd"><enum>(1)</enum><text>the extent to which the State, local, Tribal, or territorial government aligns its cybersecurity policies with the Center for Internet Security Critical Security Controls, the National Institute of Standards and Technology Cybersecurity Framework, or other widely accepted cybersecurity frameworks; and</text></paragraph><paragraph id="idce1387ac02864e27ba80a8d9e7ed0f7d"><enum>(2)</enum><text>the capability of the State, local, Tribal, or territorial government to deploy and maintain over time continuous diagnostics and mitigation products and services.</text></paragraph></subsection><subsection id="idd98b2c116bfa46a0b3b6807bc500a424"><enum>(d)</enum><header>Program requirements</header><text>The pilot program established under this section—</text><paragraph id="idB118B2BA8C5A4180898912D912DB7018"><enum>(1)</enum><text>may not require participants to utilize certain strategies or tools, and shall allow participants to select and integrate tools for meeting the objectives of the pilot program; and</text></paragraph><paragraph id="idc6a5e75b2c21426eb729a13a8181d18b"><enum>(2)</enum><text>shall include comprehensive training curriculum and integration assistance to close the technical expertise gap between employees of State, local, Tribal, and territorial governments and employees of the Cybersecurity and Infrastructure Security Agency.</text></paragraph></subsection><subsection id="id75a795cc507146a6977a403bad6e463a"><enum>(e)</enum><header>Report</header><text>Not later than 180 days after the date on which the pilot program terminates under this section, the Secretary shall submit to Congress a report that includes—</text><paragraph id="id8B115CB787FD48F9861DBAF771DC5E88"><enum>(1)</enum><text>an assessment of the replicability and the costs and benefits of conducting a permanent State, local, Tribal, and territorial government continuous diagnostics and mitigation program as described in subsection (g) of section 2213 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/663">6 U.S.C. 663</external-xref>), as added by section 2 of this Act;</text></paragraph><paragraph id="id87d69369f711486291904e98e8aac7d5"><enum>(2)</enum><text>the extent to which State, local, Tribal, and territorial governments in the pilot program adhere to widely accepted cybersecurity standards and frameworks and the impact that those policies have on potential widespread sub-Federal continuous diagnostics and mitigation integration; and</text></paragraph><paragraph id="id94687bc220d243d1ac3ddc96894cf5cb"><enum>(3)</enum><text>an assessment of the cybersecurity readiness of participants in the pilot program established under this section prior to participation in the pilot program as compared to after completion of the pilot program.</text></paragraph></subsection><subsection id="idadb6bad3e24949e68bf8254f926af975"><enum>(f)</enum><header>Termination</header><text>The authority to conduct the pilot program under subsections (a) through (d) shall terminate on the date that is 3 years after the date of enactment of this Act. </text></subsection></section></legis-body></bill> 

