[Congressional Bills 118th Congress]
[From the U.S. Government Publishing Office]
[H.R. 285 Introduced in House (IH)]

<DOC>






118th CONGRESS
  1st Session
                                H. R. 285

     To amend the Homeland Security Act of 2002 to provide for the 
 remediation of cybersecurity vulnerabilities, and for other purposes.


_______________________________________________________________________


                    IN THE HOUSE OF REPRESENTATIVES

                            January 11, 2023

 Ms. Jackson Lee introduced the following bill; which was referred to 
                   the Committee on Homeland Security

_______________________________________________________________________

                                 A BILL


 
     To amend the Homeland Security Act of 2002 to provide for the 
 remediation of cybersecurity vulnerabilities, and for other purposes.

    Be it enacted by the Senate and House of Representatives of the 
United States of America in Congress assembled,

SECTION 1. SHORT TITLE.

    This Act may be cited as the ``Cybersecurity Vulnerability 
Remediation Act''.

SEC. 2. CYBERSECURITY VULNERABILITIES.

    Section 2209 of the Homeland Security Act of 2002 (6 U.S.C. 659) is 
amended--
            (1) in subsection (a)--
                    (A) by redesignating paragraphs (6) through (9) as 
                paragraphs (7) through (10), respectively; and
                    (B) by inserting after paragraph (5) the following 
                new paragraph:
            ``(6) the term `cybersecurity vulnerability' has the 
        meaning given the term `security vulnerability' in section 102 
        of the Cybersecurity Information Sharing Act of 2015 (6 U.S.C. 
        1501); and'';
            (2) in subsection (c)--
                    (A) in paragraph (5)--
                            (i) in subparagraph (A), by striking 
                        ``and'' after the semicolon at the end;
                            (ii) by redesignating subparagraphs (B) and 
                        (C) as subparagraphs (C) and (D), respectively;
                            (iii) by inserting after subparagraph (A) 
                        the following new subparagraph:
            ``(B) sharing mitigation protocols to counter cybersecurity 
        vulnerabilities pursuant to subsection (n); and''; and
                            (iv) in subparagraph (C), as so 
                        redesignated, by inserting ``and mitigation 
                        protocols to counter cybersecurity 
                        vulnerabilities in accordance with subparagraph 
                        (B)'' before ``with Federal''; and
                    (B) in paragraph (9), by inserting ``mitigation 
                protocols to counter cybersecurity vulnerabilities,'' 
                after ``measures,'';
            (3) by redesignating the second subsections (p) and (q) 
        (relating to coordination on cybersecurity for SLITT entities 
        and a report, respectively) as subsections (r) and (s), 
        respectively; and
            (4) by adding at the end the following new subsection:
    ``(t) Protocols To Counter Certain Cybersecurity Vulnerabilities.--
The Director may, as appropriate, identify, develop, and disseminate 
actionable protocols to mitigate cybersecurity vulnerabilities to 
information systems and industrial control systems, including in 
circumstances in which such vulnerabilities exist because software or 
hardware is no longer supported by a vendor.''.

SEC. 3. REPORT ON CYBERSECURITY VULNERABILITIES.

    (a) Report.--Not later than one year after the date of the 
enactment of this Act, the Director of the Cybersecurity and 
Infrastructure Security Agency of the Department of Homeland Security 
shall submit to the Committee on Homeland Security of the House of 
Representatives and the Committee on Homeland Security and Governmental 
Affairs of the Senate a report on how the Agency carries out subsection 
(n) of section 2209 of the Homeland Security Act of 2002 to coordinate 
vulnerability disclosures, including disclosures of cybersecurity 
vulnerabilities (as such term is defined in such section), and 
subsection (t) of such section (as added by section 2) to disseminate 
actionable protocols to mitigate cybersecurity vulnerabilities to 
information systems and industrial control systems, that includes the 
following:
            (1) A description of the policies and procedures relating 
        to the coordination of vulnerability disclosures.
            (2) A description of the levels of activity in furtherance 
        of such subsections (n) and (t) of such section 2209.
            (3) Any plans to make further improvements to how 
        information provided pursuant to such subsections can be shared 
        (as such term is defined in such section 2209) between the 
        Department and industry and other stakeholders.
            (4) Any available information on the degree to which such 
        information was acted upon by industry and other stakeholders.
            (5) A description of how privacy and civil liberties are 
        preserved in the collection, retention, use, and sharing of 
        vulnerability disclosures.
    (b) Form.--The report required under subsection (b) shall be 
submitted in unclassified form but may contain a classified annex.

SEC. 4. COMPETITION RELATING TO CYBERSECURITY VULNERABILITIES.

    The Under Secretary for Science and Technology of the Department of 
Homeland Security, in consultation with the Director of the 
Cybersecurity and Infrastructure Security Agency of the Department, may 
establish an incentive-based program that allows industry, individuals, 
academia, and others to compete in identifying remediation solutions 
for cybersecurity vulnerabilities (as such term is defined in section 
2209 of the Homeland Security Act of 2002, as amended by section 2) to 
information systems (as such term is defined in such section 2209) and 
industrial control systems, including supervisory control and data 
acquisition systems.
                                 <all>