<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-Senate" dms-id="A1" public-private="public" slc-id="S1-ALL23534-85R-L9-TVD"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>107 S2251 IS: Federal Information Security Modernization Act of 2023</dc:title>
<dc:publisher>U.S. Senate</dc:publisher>
<dc:date>2023-07-11</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">II</distribution-code><congress>118th CONGRESS</congress><session>1st Session</session><legis-num>S. 2251</legis-num><current-chamber>IN THE SENATE OF THE UNITED STATES</current-chamber><action><action-date date="20230711">July 11, 2023</action-date><action-desc><sponsor name-id="S380">Mr. Peters</sponsor> (for himself and <cosponsor name-id="S399">Mr. Hawley</cosponsor>) introduced the following bill; which was read twice and referred to the <committee-name committee-id="SSGA00">Committee on Homeland Security and Governmental Affairs</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title>To improve the cybersecurity of the Federal Government, and for other purposes.</official-title></form><legis-body><section id="idBFD9DC6E9430482082CB4EB8C418DD73" section-type="section-one"><enum>1.</enum><header>Short title; table of contents</header><subsection id="idA61D59480A474292BA52AACE42867C5F"><enum>(a)</enum><header>Short title</header><text display-inline="yes-display-inline">This Act may be cited as the <quote><short-title>Federal Information Security Modernization Act of 2023</short-title><short-title></short-title></quote>.</text></subsection><subsection id="idD1BD8F281E9B46CE932A523273D9AE5A"><enum>(b)</enum><header>Table of contents</header><text>The table of contents for this Act is as follows:</text><toc><toc-entry level="section" idref="idBFD9DC6E9430482082CB4EB8C418DD73">Sec. 1. Short title; table of contents.</toc-entry><toc-entry level="section" idref="id3af7e09f637e4aabb7d982ff53563f55">Sec. 2. Definitions.</toc-entry><toc-entry level="section" idref="id75d870a3ffd54523837c51196da4c78f">Sec. 3. Amendments to title 44.</toc-entry><toc-entry level="section" idref="id6429caf467604bea9a5123c15a47a0b6">Sec. 4. Amendments to subtitle III of title 40.</toc-entry><toc-entry level="section" idref="id3a27feac84774cd2acecacab028ad01f">Sec. 5. Actions to enhance Federal incident transparency.</toc-entry><toc-entry level="section" idref="id4C7741EA4407478CB5D433B21BE6AAC2">Sec. 6. Additional guidance to agencies on FISMA updates.</toc-entry><toc-entry level="section" idref="id07d3f9e639fb48cb9a60cf2a6fb2a655">Sec. 7. Agency requirements to notify private sector entities impacted by incidents.</toc-entry><toc-entry level="section" idref="id3fd5df35ee9a4ae495564be21d9d2f49">Sec. 8. Mobile security briefings.</toc-entry><toc-entry level="section" idref="id28e9a8873da348e99e841c11fc4091d7">Sec. 9. Data and logging retention for incident response.</toc-entry><toc-entry level="section" idref="ida8bf50b946114cde8410b0160cf866f4">Sec. 10. CISA agency liaisons.</toc-entry><toc-entry level="section" idref="id91445a8b439a4155affaf8b78bd7c8b2">Sec. 11. Federal penetration testing policy.</toc-entry><toc-entry level="section" idref="id41b7dcee70354bde911884f2fe7fffe2">Sec. 12. Vulnerability disclosure policies.</toc-entry><toc-entry level="section" idref="id63b9287711684950bb202d184763278f">Sec. 13. Implementing zero trust architecture.</toc-entry><toc-entry level="section" idref="idbe8f7d937d1e4c7eb74a0874ce06d1ca">Sec. 14. Automation and artificial intelligence.</toc-entry><toc-entry level="section" idref="id86e5c048064242f3b06b68aee6b55a65">Sec. 15. Extension of chief data officer council.</toc-entry><toc-entry level="section" idref="id0f2565479cfb4993813f30b7ff779668">Sec. 16. Council of the inspectors general on integrity and efficiency dashboard.</toc-entry><toc-entry level="section" idref="id5a6067e83def4ea5a88f533e3d27a219">Sec. 17. Security operations center shared service.</toc-entry><toc-entry level="section" idref="id48c3cf73f97e4bd4934721c2f258d3eb">Sec. 18. Federal cybersecurity requirements.</toc-entry><toc-entry level="section" idref="id9ea635e528614fae968129911f71c8eb">Sec. 19. Federal chief information security officer.</toc-entry><toc-entry level="section" idref="idb7978e50b88147c1866b12b73005fa4f">Sec. 20. Renaming office of the Federal Chief Information Officer.</toc-entry><toc-entry level="section" idref="ide8b06eab778a467eace212631f530b4f">Sec. 21. Rules of construction.</toc-entry></toc></subsection></section><section id="id3af7e09f637e4aabb7d982ff53563f55"><enum>2.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act, unless otherwise specified:</text><paragraph id="idc0eb11682f7647fb8b6bcf0d75e9f413"><enum>(1)</enum><header>Agency</header><text>The term <term>agency</term> has the meaning given the term in section 3502 of title 44, United States Code.</text></paragraph><paragraph id="id13e176deb42647a5815d2974f3b90e96"><enum>(2)</enum><header>Appropriate congressional committees</header><text>The term <term>appropriate congressional committees</term> means—</text><subparagraph id="id583e697146134817ae136e16f9ef02de"><enum>(A)</enum><text>the Committee on Homeland Security and Governmental Affairs of the Senate;</text></subparagraph><subparagraph id="idad1c55c7e87c410195913acefdc2e75a"><enum>(B)</enum><text>the Committee on Oversight and Accountability of the House of Representatives; and</text></subparagraph><subparagraph id="id24cbf56af34e47fe989edd44cdd30aa9"><enum>(C)</enum><text>the Committee on Homeland Security of the House of Representatives.</text></subparagraph></paragraph><paragraph id="id9dc6ed1e9fbe44f59618fe4d749076ed"><enum>(3)</enum><header>Awardee</header><text>The term <term>awardee</term> has the meaning given the term in section 3591 of title 44, United States Code, as added by this Act.</text></paragraph><paragraph id="id0d2d8e38f9014956a40f10e766577f8d"><enum>(4)</enum><header>Contractor</header><text>The term <term>contractor</term> has the meaning given the term in section 3591 of title 44, United States Code, as added by this Act. </text></paragraph><paragraph id="id8d1597d67b184d718b15f950e1c6bc64"><enum>(5)</enum><header>Director</header><text>The term <term>Director</term> means the Director of the Office of Management and Budget.</text></paragraph><paragraph id="idcf8699ca4ec740f8ab887db666068da7"><enum>(6)</enum><header>Federal information system</header><text>The term <term>Federal information system</term> has the meaning give the term in section 3591 of title 44, United States Code, as added by this Act. </text></paragraph><paragraph id="ide26fd257188d46ffa545c3a7dae88608"><enum>(7)</enum><header>Incident</header><text>The term <term>incident</term> has the meaning given the term in section 3552(b) of title 44, United States Code.</text></paragraph><paragraph id="idc700363e434b479a8a62deff5382fab7"><enum>(8)</enum><header>National security system</header><text>The term <term>national security system</term> has the meaning given the term in section 3552(b) of title 44, United States Code.</text></paragraph><paragraph id="id20e5ed117c95443b9f0bd307a1c9fb75"><enum>(9)</enum><header>Penetration test</header><text>The term <term>penetration test</term> has the meaning given the term in section 3552(b) of title 44, United States Code, as amended by this Act.</text></paragraph><paragraph id="id3bc56aed1ba543e88440cad06ccf6e05"><enum>(10)</enum><header>Threat hunting</header><text>The term <term>threat hunting</term> means proactively and iteratively searching systems for threats and vulnerabilities, including threats or vulnerabilities that may evade detection by automated threat detection systems.</text></paragraph><paragraph id="idf9b33c38109e4f78a3225cdd37aab58a"><enum>(11)</enum><header>Zero trust architecture</header><text>The term <term>zero trust architecture</term> has the meaning given the term in Special Publication 800–207 of the National Institute of Standards and Technology, or any successor document.</text></paragraph></section><section id="id75d870a3ffd54523837c51196da4c78f"><enum>3.</enum><header>Amendments to title 44</header><subsection id="idfc5e5234156d4673ba303061325d4222"><enum>(a)</enum><header>Subchapter I amendments</header><text>Subchapter I of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, is amended—</text><paragraph id="id67ace468cd8a4959a389d39be8ca516e"><enum>(1)</enum><text>in section 3504—</text><subparagraph id="idf319da709eb94189b20cb0cb6391f59e"><enum>(A)</enum><text>in subsection (a)(1)(B)—</text><clause id="ide93b08050387468a900c596394b401d5"><enum>(i)</enum><text>by striking clause (v) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id908db5d1c3d4454da53e2ff51f2bb7bf"><clause id="id2bdf178df1a84e0cb2d9d67819e16e8c"><enum>(v)</enum><text>privacy, confidentiality, disclosure, and sharing of information;</text></clause><after-quoted-block>;</after-quoted-block></quoted-block></clause><clause id="idda9d7834c80a4f589eae2fd62756a0b5"><enum>(ii)</enum><text>by redesignating clause (vi) as clause (vii); and</text></clause><clause id="id2027271e56604fad943a62e8673cd14f"><enum>(iii)</enum><text>by inserting after clause (v) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id539e6a27f3b94a2caf9ad152c41d81a5"><clause id="id98c87f730bcf4c289d2520e236d2650e"><enum>(vi)</enum><text>in consultation with the National Cyber Director, security of information; and</text></clause><after-quoted-block>; and</after-quoted-block></quoted-block></clause></subparagraph><subparagraph id="idbaa724f3f81946aea2e7a7f4e63fcd0c"><enum>(B)</enum><text>in subsection (g)—</text><clause commented="no" display-inline="no-display-inline" id="id1b8d91ad815a4d08ad7073e856d4c1e7"><enum>(i)</enum><text display-inline="yes-display-inline">by redesignating paragraph (2) as paragraph (3); and</text></clause><clause commented="no" display-inline="no-display-inline" id="id2a417c64312441749af38cb5aa3d87c6"><enum>(ii)</enum><text display-inline="yes-display-inline">by striking paragraph (1) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id5ddec48e88644fe98e3a62a90f5026ec"><paragraph id="ida8a6e5b631134df2b6864c8d8840c121"><enum>(1)</enum><text>develop and oversee the implementation of policies, principles, standards, and guidelines on privacy, confidentiality, disclosure, and sharing of information collected or maintained by or for agencies;</text></paragraph><paragraph id="id528CE02B71E34D8187C6FB7D0E4162D0"><enum>(2)</enum><text>in consultation with the National Cyber Director, oversee the implementation of policies, principles, standards, and guidelines on security, of information collected or maintained by or for agencies; and</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></clause></subparagraph></paragraph><paragraph id="idfc3de4d0858842eabec7162f5303f786"><enum>(2)</enum><text>in section 3505—</text><subparagraph id="id8d5cc9fc925b4456852d7a777622d66e"><enum>(A)</enum><text>by striking the first subsection designated as subsection (c);</text></subparagraph><subparagraph id="id70a8a48c79784864a666928e47aa34ad"><enum>(B)</enum><text>in paragraph (2) of the second subsection designated as subsection (c), by inserting <quote>an identification of internet accessible information systems and</quote> after <quote>an inventory under this subsection shall include</quote>;</text></subparagraph><subparagraph id="idff73c0b786c84a7ba73a1f9a783a3cfc"><enum>(C)</enum><text>in paragraph (3) of the second subsection designated as subsection (c)—</text><clause id="idbe086118d6314ac68068e5abea491b0c"><enum>(i)</enum><text>in subparagraph (B)—</text><subclause id="id25027d0293464d8197a57ec0d0541024"><enum>(I)</enum><text>by inserting <quote>the Director of the Cybersecurity and Infrastructure Security Agency, the National Cyber Director, and</quote> before <quote>the Comptroller General</quote>; and</text></subclause><subclause id="idbe235a6bad704a819592c1c2115276b5"><enum>(II)</enum><text>by striking <quote>and</quote> at the end;</text></subclause></clause><clause id="id9cfa7ed18ab240b18104d02f079508a4"><enum>(ii)</enum><text>in subparagraph (C)(v), by striking the period at the end and inserting <quote>; and</quote>; and</text></clause><clause id="id769013c6e2644a10a5768ea525495092"><enum>(iii)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idc470af548ec244c8a1213a8b0236afe9"><subparagraph id="id176241c71e4d4b6f9e6a66ab9aaa6e7f"><enum>(D)</enum><text>maintained on a continual basis through the use of automation, machine-readable data, and scanning, wherever practicable.</text></subparagraph><after-quoted-block>;</after-quoted-block></quoted-block></clause></subparagraph></paragraph><paragraph id="idc2795623e2c646d79a863c9941dc6f64"><enum>(3)</enum><text>in section 3506—</text><subparagraph id="idd0daa70148714ddbaae42b25ad8379a7"><enum>(A)</enum><text>in subsection (a)(3), by inserting <quote>In carrying out these duties, the Chief Information Officer shall consult, as appropriate, with the Chief Data Officer in accordance with the designated functions under section 3520(c).</quote> after <quote>reduction of information collection burdens on the public.</quote>;</text></subparagraph><subparagraph id="id3d4e417c0f3647fba6207e7ffc253a14"><enum>(B)</enum><text>in subsection (b)(1)(C), by inserting <quote>availability,</quote> after <quote>integrity,</quote>; </text></subparagraph><subparagraph id="id278ea87759914f0c8ca29b2b781fcaa1"><enum>(C)</enum><text>in subsection (h)(3), by inserting <quote>security,</quote> after <quote>efficiency,</quote>; and</text></subparagraph><subparagraph id="id54A2CE42AFE9404BB2BF127D60F86C8B"><enum>(D)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id8686A26F98864A178772E1D17ADB14C5"><subsection id="idD56892284D6348EAB098D2F1A84D938A"><enum>(j)</enum><paragraph commented="no" display-inline="yes-display-inline" id="idA93F12C2C3AC42B987CC3209077C0A44"><enum>(1)</enum><text>Nothwithstanding paragraphs (2) and (3) of subsection (a), the head of each agency shall designate a Chief Privacy Officer with the necessary skills, knowledge, and expertise, who shall have the authority and responsibility to—</text><subparagraph id="idD3E055FBFBBE4EAE8595545F5668FD11" indent="up1"><enum>(A)</enum><text>lead the privacy program of the agency; and</text></subparagraph><subparagraph indent="up1" commented="no" display-inline="no-display-inline" id="id1c563820e8d444e9a0e6ff0edff4b7f7"><enum>(B)</enum><text>carry out the privacy responsibilities of the agency under this chapter, section 552a of title 5, and guidance issued by the Director.</text></subparagraph></paragraph><paragraph indent="up1" id="idC54799734F9144218B4650E9911DD100"><enum>(2)</enum><text>The Chief Privacy Officer of each agency shall—</text><subparagraph id="idFE17ABB20B9B49C3870F23070889E275"><enum>(A)</enum><text>serve in a central leadership position within the agency;</text></subparagraph><subparagraph id="id68B17AA3994D4BDD8CD5402F027A5842"><enum>(B)</enum><text>have visibility into relevant agency operations; and</text></subparagraph><subparagraph id="id09F73BBDD25D4DEBA609D187CA915F30"><enum>(C)</enum><text>be positioned highly enough within the agency to regularly engage with other agency leaders and officials, including the head of the agency.</text></subparagraph></paragraph><paragraph indent="up1" id="id22289AE952434EAAB9E0852465A42654"><enum>(3)</enum><text>A privacy officer of an agency established under a statute enacted before the date of enactment of the <short-title>Federal Information Security Modernization Act of 2023</short-title> may carry out the responsibilities under this subsection for the agency.</text></paragraph></subsection><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="id4d83ad49d7e0476991bd3be6169b5099"><enum>(4)</enum><text>in section 3513—</text><subparagraph id="id5490bc4133ca4a88b02e27a011918ed3"><enum>(A)</enum><text>by redesignating subsection (c) as subsection (d); and</text></subparagraph><subparagraph id="id49ffbcdf626a42759208c4d2f06f6862"><enum>(B)</enum><text>by inserting after subsection (b) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id90b056c0f7554773bc64caf10b418aaf"><subsection id="id183f0a2d75164742a2847499496024db"><enum>(c)</enum><text>Each agency providing a written plan under subsection (b) shall provide any portion of the written plan addressing information security to the Secretary of Homeland Security and the National Cyber Director.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph></subsection><subsection id="ida287dc656391428988e7c8e77861e876"><enum>(b)</enum><header>Subchapter II definitions</header><paragraph id="id6bfe8bc2896e43dba5fe320fc46c240d"><enum>(1)</enum><header>In general</header><text>Section 3552(b) of title 44, United States Code, is amended—</text><subparagraph id="ideb7baa1e892140dd9759eea6cc3f4ab9"><enum>(A)</enum><text>by redesignating paragraphs (2), (3), (4), (5), (6), and (7) as paragraphs (3), (4), (5), (6), (8), and (10), respectively;</text></subparagraph><subparagraph id="id89b1297067a74cbb8e3029f321286912"><enum>(B)</enum><text>by inserting after paragraph (1) the following: </text><quoted-block style="OLC" display-inline="no-display-inline" id="id2ff8af52150d4d21a31b835120848535"><paragraph id="idc11df7046abe4772b6d01682b98a1894"><enum>(2)</enum><text>The term <term>high value asset</term> means information or an information system that the head of an agency, using policies, principles, standards, or guidelines issued by the Director under section 3553(a), determines to be so critical to the agency that the loss or degradation of the confidentiality, integrity, or availability of such information or information system would have a serious impact on the ability of the agency to perform the mission of the agency or conduct business.</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph><subparagraph id="id26681dff274a4d1ba751e6d1f4416cf2"><enum>(C)</enum><text>by inserting after paragraph (6), as so redesignated, the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id235c08d9548f489f9c33b394a82bd6ab"><paragraph id="ide3570941e4c0404aa404b7a56377a3d8"><enum>(7)</enum><text>The term <term>major incident</term> has the meaning given the term in guidance issued by the Director under section 3598(a).</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph><subparagraph id="ida79569218b404cf38a31298c57cf9c99"><enum>(D)</enum><text>in paragraph (8)(A), as so redesignated, by striking <quote>used</quote> and inserting <quote>owned, managed,</quote>;</text></subparagraph><subparagraph id="idaaf01836fb6041528d03c586c146dfd8"><enum>(E)</enum><text>by inserting after paragraph (8), as so redesignated, the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id5976d56181ee467ea715a5e059ffe068"><paragraph id="ide1cbbfe26cf44235b82c890a1b8fe246"><enum>(9)</enum><text>The term <term>penetration test</term>—</text><subparagraph id="id05ff6477a99a4094ad453c0609c2a92b"><enum>(A)</enum><text>means an authorized assessment that emulates attempts to gain unauthorized access to, or disrupt the operations of, an information system or component of an information system; and</text></subparagraph><subparagraph id="id2fe7c73e39f24837a592e0b417133345"><enum>(B)</enum><text>includes any additional meaning given the term in policies, principles, standards, or guidelines issued by the Director under section 3553(a).</text></subparagraph></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph><subparagraph id="id75aa13b185904a6ca2bd37686a1d5349"><enum>(F)</enum><text>by inserting after paragraph (10), as so redesignated, the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idad498e3376bf43d7bb4d2ab7c3928b79"><paragraph id="idd9679510e23e40fe8fc684e0086e3dc3"><enum>(11)</enum><text>The term <term>shared service</term> means a centralized mission capability or consolidated business function that is provided to multiple organizations within an agency or to multiple agencies.</text></paragraph><paragraph id="id60E41A8A0C0F43D4B70F8A065F1E3FBA"><enum>(12)</enum><text>The term <term>zero trust architecture</term> has the meaning given the term in Special Publication 800–207 of the National Institute of Standards and Technology, or any successor document.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="idc44a8a97f32747318611af1ee43428de"><enum>(2)</enum><header>Conforming amendments</header><subparagraph id="id1b5a702eba7c4e76bcea3270978faecc"><enum>(A)</enum><header>Homeland Security Act of 2002</header><text>Section 1001(c)(1)(A) of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/511">6 U.S.C. 511(c)(1)(A)</external-xref>) is amended by striking <quote>section 3552(b)(5)</quote> and inserting <quote>section 3552(b)</quote>.</text></subparagraph><subparagraph id="id585f6e227e2d4fb08ed21d7f6d873607"><enum>(B)</enum><header>Title 10</header><clause id="ide0453539b9cb4b52be8f138157925a4b"><enum>(i)</enum><header>Section 2222</header><text>Section 2222(i)(8) of title 10, United States Code, is amended by striking <quote>section 3552(b)(6)(A)</quote> and inserting <quote>section 3552(b)(8)(A)</quote>.</text></clause><clause id="idf619048ce22b4b978855f116e51ea93a"><enum>(ii)</enum><header>Section 2223</header><text>Section 2223(c)(3) of title 10, United States Code, is amended by striking <quote>section 3552(b)(6)</quote> and inserting <quote>section 3552(b)</quote>.</text></clause><clause id="id0cab3fdbbf4340d3954f00ec4b9a3cbc"><enum>(iii)</enum><header>Section 2315</header><text>Section 2315 of title 10, United States Code, is amended by striking <quote>section 3552(b)(6)</quote> and inserting <quote>section 3552(b)</quote>.</text></clause><clause id="id33a7fc67d387483ca83aa9db37ee6152"><enum>(iv)</enum><header>Section 2339a</header><text>Section 2339a(e)(5) of title 10, United States Code, is amended by striking <quote>section 3552(b)(6)</quote> and inserting <quote>section 3552(b)</quote>.</text></clause></subparagraph><subparagraph id="id3ad6398607d84539a4044fd6c155a732"><enum>(C)</enum><header>High-Performance Computing Act of 1991</header><text>Section 207(a) of the High-Performance Computing Act of 1991 (<external-xref legal-doc="usc" parsable-cite="usc/15/5527">15 U.S.C. 5527(a)</external-xref>) is amended by striking <quote>section 3552(b)(6)(A)(i)</quote> and inserting <quote>section 3552(b)(8)(A)(i)</quote>.</text></subparagraph><subparagraph id="idd8cd2db250b34b3191b5160b1be2dfdd"><enum>(D)</enum><header>Internet of Things Cybersecurity Improvement Act of 2020</header><text>Section 3(5) of the Internet of Things Cybersecurity Improvement Act of 2020 (15 U.S.C. 278g–3a(5)) is amended by striking <quote>section 3552(b)(6)</quote> and inserting <quote>section 3552(b)</quote>.</text></subparagraph><subparagraph id="ide2144272edf04216ae82072f79a166d4"><enum>(E)</enum><header>National Defense Authorization Act for fiscal Year 2013</header><text>Section 933(e)(1)(B) of the National Defense Authorization Act for Fiscal Year 2013 (<external-xref legal-doc="usc" parsable-cite="usc/10/2224">10 U.S.C. 2224</external-xref> note) is amended by striking <quote>section 3542(b)(2)</quote> and inserting <quote>section 3552(b)</quote>.</text></subparagraph><subparagraph id="idb4bb6af4ee884a7c982ad2fb400d37aa"><enum>(F)</enum><header>Ike Skelton National Defense Authorization Act for Fiscal Year 2011</header><text>The Ike Skelton National Defense Authorization Act for Fiscal Year 2011 (<external-xref legal-doc="public-law" parsable-cite="pl/111/383">Public Law 111–383</external-xref>) is amended—</text><clause id="id486e37785d554bca8fb5a55e926e8514"><enum>(i)</enum><text>in section 806(e)(5) (<external-xref legal-doc="usc" parsable-cite="usc/10/2304">10 U.S.C. 2304</external-xref> note), by striking <quote>section 3542(b)</quote> and inserting <quote>section 3552(b)</quote>;</text></clause><clause id="id34c482e8042441b49367b2fe5192583c"><enum>(ii)</enum><text>in section 931(b)(3) (<external-xref legal-doc="usc" parsable-cite="usc/10/2223">10 U.S.C. 2223</external-xref> note), by striking <quote>section 3542(b)(2)</quote> and inserting <quote>section 3552(b)</quote>; and</text></clause><clause id="idcbbed9921028473b8e8c29d729b3ab66"><enum>(iii)</enum><text>in section 932(b)(2) (<external-xref legal-doc="usc" parsable-cite="usc/10/2224">10 U.S.C. 2224</external-xref> note), by striking <quote>section 3542(b)(2)</quote> and inserting <quote>section 3552(b)</quote>.</text></clause></subparagraph><subparagraph id="id53ef9aad90a54888928c45b23dbd9988"><enum>(G)</enum><header>E-Government Act of 2002</header><text>Section 301(c)(1)(A) of the E-Government Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/44/3501">44 U.S.C. 3501</external-xref> note) is amended by striking <quote>section 3542(b)(2)</quote> and inserting <quote>section 3552(b)</quote>.</text></subparagraph><subparagraph id="idb5180c6451224ce4a27a53ee29586f3c"><enum>(H)</enum><header>National Institute of Standards and Technology Act</header><text>Section 20 of the National Institute of Standards and Technology Act (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-3">15 U.S.C. 278g–3</external-xref>) is amended—</text><clause id="id53979bfe0bab4d7c9ab5b50ed939bff3"><enum>(i)</enum><text>in subsection (a)(2), by striking <quote>section 3552(b)(5)</quote> and inserting <quote>section 3552(b)</quote>; and</text></clause><clause id="id34bf98c61db445a48c15a3d6905e2a3c"><enum>(ii)</enum><text>in subsection (f)—</text><subclause id="id568d4e9883c342cf91323308019d0e81"><enum>(I)</enum><text>in paragraph (3), by striking <quote>section 3532(1)</quote> and inserting <quote>section 3552(b)</quote>; and</text></subclause><subclause id="idf16d932014844da0a43994fe265c4a89"><enum>(II)</enum><text>in paragraph (5), by striking <quote>section 3532(b)(2)</quote> and inserting <quote>section 3552(b)</quote>.</text></subclause></clause></subparagraph></paragraph></subsection><subsection id="id3c2ed93b10d549959d39863f06ea6207"><enum>(c)</enum><header>Subchapter II amendments</header><text>Subchapter II of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, is amended—</text><paragraph id="idb824a17dbe05424f826cd674f9e3d6e5"><enum>(1)</enum><text>in section 3551—</text><subparagraph id="id83358204b11c409db1658ba802ac9fbd"><enum>(A)</enum><text>in paragraph (4), by striking <quote>diagnose and improve</quote> and inserting <quote>integrate, deliver, diagnose, and improve</quote>;</text></subparagraph><subparagraph id="id0fb9e76127a3407ab4f16c070a188c0e"><enum>(B)</enum><text>in paragraph (5), by striking <quote>and</quote> at the end;</text></subparagraph><subparagraph id="idef3b43a8a7d34c098de410c97e940379"><enum>(C)</enum><text>in paragraph (6), by striking the period at the end and inserting a semicolon; and</text></subparagraph><subparagraph id="id13f985e0106c46cfb287d9d26f32769a"><enum>(D)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id8f6a5a28bc554dd8b4d45829e39e45f8"><paragraph id="id37bfc4e07660435ca9909c3984e0ace8"><enum>(7)</enum><text>recognize that each agency has specific mission requirements and, at times, unique cybersecurity requirements to meet the mission of the agency;</text></paragraph><paragraph id="id9f05e20ba8984ba1b9344babada5dc60"><enum>(8)</enum><text>recognize that each agency does not have the same resources to secure agency systems, and an agency should not be expected to have the capability to secure the systems of the agency from advanced adversaries alone; and</text></paragraph><paragraph id="id184da7988a3144f1899e08a40e2e2870"><enum>(9)</enum><text>recognize that a holistic Federal cybersecurity model is necessary to account for differences between the missions and capabilities of agencies.</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="id6362E40F200A4685880FB560F5A36769"><enum>(2)</enum><text>in section 3553—</text><subparagraph id="id6501b87ff4fa4068848d24bb9371dde0"><enum>(A)</enum><text>in subsection (a)—</text><clause id="idea389b3ffbb04c2da6e7e5398c0cf93d"><enum>(i)</enum><text>in paragraph (5), by striking <quote>and</quote> at the end; </text></clause><clause id="id7FA1819FDD9C4267A9C5AF18B8A6A7F6"><enum>(ii)</enum><text>in paragraph (6), by striking the period at the end and inserting <quote>; and</quote>; and</text></clause><clause id="id71ab459173094485b250ddbafc8510bd"><enum>(iii)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id9e6c3f6087a043feac7fd13a7c7edcf1"><paragraph id="idc9d3a32287c24b4e8a62b1edbac30146"><enum>(7)</enum><text>promoting, in consultation with the Director of the Cybersecurity and Infrastructure Security Agency, the National Cyber Director, and the Director of the National Institute of Standards and Technology—</text><subparagraph id="id36056d2855b44594b4de10f803779f22"><enum>(A)</enum><text>the use of automation to improve Federal cybersecurity and visibility with respect to the implementation of Federal cybersecurity; and</text></subparagraph><subparagraph id="id83592a5c19544b7bb059a782130cacf6"><enum>(B)</enum><text>the use of presumption of compromise and least privilege principles, such as zero trust architecture, to improve resiliency and timely response actions to incidents on Federal systems.</text></subparagraph></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></clause></subparagraph><subparagraph id="idf1052626081b407fbb5a7feba6a07a1b" commented="no"><enum>(B)</enum><text>in subsection (b)—</text><clause id="id25c3ec0d0f724ab99b88f3ac9cd9cb8b"><enum>(i)</enum><text>in the matter preceding paragraph (1), by inserting <quote>and the National Cyber Director</quote> after <quote>Director</quote>; </text></clause><clause id="id6a481faa7e5840b5b894b5ec80d0623d"><enum>(ii)</enum><text>in paragraph (2)(A), by inserting <quote>and reporting requirements under subchapter IV of this chapter</quote> after <quote>section 3556</quote>; </text></clause><clause id="id2e3face40d0840be9b1590de39a0a874" commented="no"><enum>(iii)</enum><text>by redesignating paragraphs (8) and (9) as paragraphs (10) and (11), respectively; and</text></clause><clause id="id55bbe661857f4ef482aaf5267ebd085f"><enum>(iv)</enum><text>by inserting after paragraph (7) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id2e20329f8d8c4731a9e27507fa863b0b"><paragraph id="id7c1682935b8c4aaf92af806303743312"><enum>(8)</enum><text>expeditiously seeking opportunities to reduce costs, administrative burdens, and other barriers to information technology security and modernization for agencies, including through shared services for cybersecurity capabilities identified as appropriate by the Director, in coordination with the Director of the Cybersecurity and Infrastructure Security Agency and other agencies as appropriate;</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></clause></subparagraph><subparagraph id="id00879707dcc14d2c80dcaf02c7923bc6"><enum>(C)</enum><text>in subsection (c)—</text><clause id="id85117573b5874c258e6f1b4d94fc9303"><enum>(i)</enum><text>in the matter preceding paragraph (1)—</text><subclause id="id32d4eb2e75e84a8f840470a64a293ea1"><enum>(I)</enum><text>by striking <quote>each year</quote> and inserting <quote>each year during which agencies are required to submit reports under section 3554(c)</quote>;</text></subclause><subclause id="id86BB44CCB5F34FB09498DDEB360E13E1"><enum>(II)</enum><text>by inserting <quote>, which shall be unclassified but may include 1 or more annexes that contain classified or other sensitive information, as appropriate</quote> after <quote>a report</quote>; and</text></subclause><subclause id="idd42918d8de40456798c74aaf1323e393"><enum>(III)</enum><text>by striking <quote>preceding year</quote> and inserting <quote>preceding 2 years</quote>;</text></subclause></clause><clause id="id29e4fc3b0b334811ab40d4076d9126c0"><enum>(ii)</enum><text>by striking paragraph (1);</text></clause><clause id="id519dd562694d4b248d3044830b27bbb8"><enum>(iii)</enum><text>by redesignating paragraphs (2), (3), and (4) as paragraphs (1), (2), and (3), respectively;</text></clause><clause id="id9bcdf1b9e60e4d2fa2e26cac0152a67f"><enum>(iv)</enum><text>in paragraph (3), as so redesignated, by striking <quote>and</quote> at the end; and</text></clause><clause id="idbc2b84911ebd4432b8108bc9f724e4d5"><enum>(v)</enum><text>by inserting after paragraph (3), as so redesignated, the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id6cc156831783494f8481cfab0d48666f"><paragraph id="idc43180c1dce84eb8a8dc6a27ee5556bb"><enum>(4)</enum><text>a summary of the risks and trends identified in the Federal risk assessment required under subsection (i); and</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></clause></subparagraph><subparagraph id="id311E10ABC2D14054AF56F09D6E860E4F"><enum>(D)</enum><text>in subsection (h)—</text><clause id="idEA41BFE0A5AA4AF0AE499533F20A7B0A"><enum>(i)</enum><text>in paragraph (2)—</text><subclause id="id4E3EAB36E1014A7BB70F62ECC5CC8A00"><enum>(I)</enum><text>in subparagraph (A), by inserting <quote>and the National Cyber Director</quote> after <quote>in coordination with the Director</quote>; and</text></subclause><subclause id="id805898B1337A430BBC3D94E4E5E3D7D1"><enum>(II)</enum><text>in subparagraph (D), by inserting <quote>, the National Cyber Director,</quote> after <quote>notify the Director</quote>; and</text></subclause></clause><clause id="id7A8DD2B60A3C4D0BAF09B0A0970B0F34"><enum>(ii)</enum><text>in paragraph (3)(A)(iv), by inserting <quote>, the National Cyber Director,</quote> after <quote>the Secretary provides prior notice to the Director</quote>; </text></clause></subparagraph><subparagraph id="ida83028a9536749099c17c59b5445a7e1"><enum>(E)</enum><text>by amending subsection (i) to read as follows:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idd377bc0bde074ce48f2a7195bad2c5a2"><subsection id="id1144e9e989c74559b1bad223b20d1213"><enum>(i)</enum><header>Federal risk assessment</header><text>On an ongoing and continuous basis, the Director of the Cybersecurity and Infrastructure Security Agency shall assess the Federal risk posture using any available information on the cybersecurity posture of agencies, and brief the Director and National Cyber Director on the findings of such assessment, including—</text><paragraph id="id86b337570ccd4b6e886a9806324c3615"><enum>(1)</enum><text>the status of agency cybersecurity remedial actions for high value assets described in section 3554(b)(7);</text></paragraph><paragraph id="idcbb48689cc994debac364cf4d823050e"><enum>(2)</enum><text>any vulnerability information relating to the systems of an agency that is known by the agency;</text></paragraph><paragraph id="id91196347ba4647eea1af56e75e59698a"><enum>(3)</enum><text>analysis of incident information under section 3597;</text></paragraph><paragraph id="id0c671ef471b7491e8297502b0081b534"><enum>(4)</enum><text>evaluation of penetration testing performed under section 3559A;</text></paragraph><paragraph id="id5f33cfb2e0f44d66ab0415502a88c851"><enum>(5)</enum><text>evaluation of vulnerability disclosure program information under section 3559B;</text></paragraph><paragraph id="id69c9adbcbf7e4bd2b27af8541bfcc808"><enum>(6)</enum><text>evaluation of agency threat hunting results;</text></paragraph><paragraph id="id34a6c195a116460798cad1702a7e4768"><enum>(7)</enum><text>evaluation of Federal and non-Federal cyber threat intelligence;</text></paragraph><paragraph id="id8dff54faf75b4ff792190364ef5d1810"><enum>(8)</enum><text>data on agency compliance with standards issued under section 11331 of title 40;</text></paragraph><paragraph id="id35ae6edb2d2e4660ab807e4219760851"><enum>(9)</enum><text>agency system risk assessments required under section 3554(a)(1)(A); </text></paragraph><paragraph id="id807f3db39d8748f98bb043fa4e4667d6"><enum>(10)</enum><text>relevant reports from inspectors general of agencies and the Government Accountability Office; and </text></paragraph><paragraph id="idba8467ce20b94c599316bd58dd60525f"><enum>(11)</enum><text>any other information the Director of the Cybersecurity and Infrastructure Security Agency determines relevant.</text></paragraph></subsection><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph><subparagraph id="id48a13798648a4457bbfc85d6aca9390a"><enum>(F)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idfe528840d9344e79af64ec36eecc667c"><subsection id="id53e03a6632494d48ba99913442cca952"><enum>(m)</enum><header>Directives</header><paragraph id="id66bc785fa97b4ed29711574b2e5bb927"><enum>(1)</enum><header>Emergency directive updates</header><text>If the Secretary issues an emergency directive under this section, the Director of the Cybersecurity and Infrastructure Security Agency shall submit to the Director, the National Cyber Director, the Committee on Homeland Security and Governmental Affairs of the Senate, and the Committees on Oversight and Accountability and Homeland Security of the House of Representatives an update on the status of the implementation of the emergency directive at agencies not later than 7 days after the date on which the emergency directive requires an agency to complete a requirement specified by the emergency directive, and every 30 days thereafter until—</text><subparagraph id="id8285974d749946a2bc7c38c69ec5e9d5"><enum>(A)</enum><text>the date on which every agency has fully implemented the emergency directive;</text></subparagraph><subparagraph id="id00fae04fd6dd4c228976d1097b46dce2"><enum>(B)</enum><text>the Secretary determines that an emergency directive no longer requires active reporting from agencies or additional implementation; or</text></subparagraph><subparagraph id="idcf8407a9544340489266f3ef20b4e95d"><enum>(C)</enum><text>the date that is 1 year after the issuance of the directive.</text></subparagraph></paragraph><paragraph id="id534ca4bec5134b868910ab7dfdc30d97"><enum>(2)</enum><header>Binding operational directive updates</header><text>If the Secretary issues a binding operational directive under this section, the Director of the Cybersecurity and Infrastructure Security Agency shall submit to the Director, the National Cyber Director, the Committee on Homeland Security and Governmental Affairs of the Senate, and the Committees on Oversight and Accountability and Homeland Security of the House of Representatives an update on the status of the implementation of the binding operational directive at agencies not later than 30 days after the issuance of the binding operational directive, and every 90 days thereafter until—</text><subparagraph id="id2110a877a32f4b0db08ba62eff9cf752"><enum>(A)</enum><text>the date on which every agency has fully implemented the binding operational directive;</text></subparagraph><subparagraph id="id07909e3e0f994cffa0b9e20ed1212fa7"><enum>(B)</enum><text>the Secretary determines that a binding operational directive no longer requires active reporting from agencies or additional implementation; or</text></subparagraph><subparagraph id="id8cc509eb4a0744a6ac3f7fe3b2dd01d9"><enum>(C)</enum><text>the date that is 1 year after the issuance or substantive update of the directive.</text></subparagraph></paragraph><paragraph id="id6ceb676afe8545a9950467623731a0aa"><enum>(3)</enum><header>Report</header><text>If the Director of the Cybersecurity and Infrastructure Security Agency ceases submitting updates required under paragraphs (1) or (2) on the date described in paragraph (1)(C) or (2)(C), the Director of the Cybersecurity and Infrastructure Security Agency shall submit to the Director, the National Cyber Director, the Committee on Homeland Security and Governmental Affairs of the Senate, and the Committees on Oversight and Accountability and Homeland Security of the House of Representatives a list of every agency that, at the time of the report—</text><subparagraph commented="no" display-inline="no-display-inline" id="id1409fc13d4294f97b1deaa3d6684d645"><enum>(A)</enum><text display-inline="yes-display-inline">has not completed a requirement specified by an emergency directive; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="iddecd43523a784fa4ba1fd36b81603802"><enum>(B)</enum><text display-inline="yes-display-inline">has not implemented a binding operational directive.</text></subparagraph></paragraph></subsection><subsection id="id0265b6a160e142fba503b979a5f8fd31"><enum>(n)</enum><header>Review of Office of Management and Budget guidance and policy</header><paragraph id="id0da2cadf03af4b1a8e6c19de0200e4a4"><enum>(1)</enum><header>Conduct of review</header><text>Not less frequently than once every 3 years, the Director of the Office of Management and Budget shall review the efficacy of the guidance and policy promulgated by the Director in reducing cybersecurity risks, including a consideration of reporting and compliance burden on agencies.</text></paragraph><paragraph id="iddc74392c832341668b3267e2e852a002"><enum>(2)</enum><header>Congressional notification</header><text>The Director of the Office of Management and Budget shall notify the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Oversight and Accountability of the House of Representatives of changes to guidance or policy resulting from the review under paragraph (1).</text></paragraph><paragraph id="idc83e9ab203b14c71ad5c5a60c397b1ac"><enum>(3)</enum><header>GAO review</header><text>The Government Accountability Office shall review guidance and policy promulgated by the Director to assess its efficacy in risk reduction and burden on agencies.</text></paragraph></subsection><subsection id="ide0768eeee13c49eb82948b6efff945ac"><enum>(o)</enum><header>Automated standard implementation verification</header><text>When the Director of the National Institute of Standards and Technology issues a proposed standard or guideline pursuant to paragraphs (2) or (3) of section 20(a) of the National Institute of Standards and Technology Act (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-3">15 U.S.C. 278g–3(a)</external-xref>), the Director of the National Institute of Standards and Technology shall consider developing and, if appropriate and practical, develop specifications to enable the automated verification of the implementation of the controls.</text></subsection><subsection id="id0fd35f34eed44721912f4bcbdc3c422f"><enum>(p)</enum><header>Inspectors general access to federal risk assessments</header><text>The Director of the Cybersecurity and Infrastructure Security Agency shall, upon request, make available Federal risk assessment information under subsection (i) to the Inspector General of the Department of Homeland Security and the inspector general of any agency that was included in the Federal risk assessment.</text></subsection><after-quoted-block>;</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="idaf6e614a508444cf9014154bf21fc6ec"><enum>(3)</enum><text>in section 3554—</text><subparagraph id="id032ed5ee512d416ebf48191255b881e2"><enum>(A)</enum><text>in subsection (a)—</text><clause id="id0dbbd3c16e5c4025a9bace0082343074"><enum>(i)</enum><text>in paragraph (1)—</text><subclause id="idf91e7019c3b84bb8b75a479f61d6ca54"><enum>(I)</enum><text>by redesignating subparagraphs (A), (B), and (C) as subparagraphs (B), (C), and (D), respectively;</text></subclause><subclause id="id7aa8a6844cb740a89c413ed5398f932e"><enum>(II)</enum><text>by inserting before subparagraph (B), as so redesignated, the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id42229f451bca41b78f300a1e95a2d58a"><subparagraph id="id36ba05762d4e4fceaddd4befeaf2fe15"><enum>(A)</enum><text>on an ongoing and continuous basis, assessing agency system risk, as applicable, by—</text><clause id="iddf5c962672e441f99f69e76686c1344e"><enum>(i)</enum><text>identifying and documenting the high value assets of the agency using guidance from the Director;</text></clause><clause id="id13146268932c4de0b646ca38a2fb90b4"><enum>(ii)</enum><text>evaluating the data assets inventoried under section 3511 for sensitivity to compromises in confidentiality, integrity, and availability;</text></clause><clause id="id1c4a82e292264010b691a87d9dce2242"><enum>(iii)</enum><text>identifying whether the agency is participating in federally offered cybersecurity shared services programs;</text></clause><clause id="id3d960487e863437097eea812566b82b9"><enum>(iv)</enum><text>identifying agency systems that have access to or hold the data assets inventoried under section 3511;</text></clause><clause id="idd4c002b53b86417d8b3281a3d84f9209"><enum>(v)</enum><text>evaluating the threats facing agency systems and data, including high value assets, based on Federal and non-Federal cyber threat intelligence products, where available;</text></clause><clause id="id7b0e677070ec497f877aafe3bec9278e"><enum>(vi)</enum><text>evaluating the vulnerability of agency systems and data, including high value assets, including by analyzing—</text><subclause id="id80f994ad305548cf97faf558e7dae1d9"><enum>(I)</enum><text>the results of penetration testing performed by the Department of Homeland Security under section 3553(b)(9);</text></subclause><subclause id="idd5fde7a4ab784e039de4726dab5aac60"><enum>(II)</enum><text>the results of penetration testing performed under section 3559A;</text></subclause><subclause id="idb0592e9481fd441896ecb4959e6bbd51"><enum>(III)</enum><text>information provided to the agency through the vulnerability disclosure program of the agency under section 3559B;</text></subclause><subclause id="id11014e2930d8498895d5d63f5b429c61"><enum>(IV)</enum><text>incidents; and</text></subclause><subclause id="idfc2aa50d39e8479f8da9fb245a001164"><enum>(V)</enum><text>any other vulnerability information relating to agency systems that is known to the agency;</text></subclause></clause><clause id="ide5f969062d28468abe78a6e0fdc72f11"><enum>(vii)</enum><text>assessing the impacts of potential agency incidents to agency systems, data, and operations based on the evaluations described in clauses (ii) and (v) and the agency systems identified under clause (iv); and</text></clause><clause id="ide431c43710474371938c1779ab1cbba4"><enum>(viii)</enum><text>assessing the consequences of potential incidents occurring on agency systems that would impact systems at other agencies, including due to interconnectivity between different agency systems or operational reliance on the operations of the system or data in the system;</text></clause></subparagraph><after-quoted-block>;</after-quoted-block></quoted-block></subclause><subclause id="id6aa83cb7b47941f1b88dc158840a25f1"><enum>(III)</enum><text>in subparagraph (B), as so redesignated, in the matter preceding clause (i), by striking <quote>providing information</quote> and inserting <quote>using information from the assessment required under subparagraph (A), providing information</quote>;</text></subclause><subclause id="id6e5b7a2ebe5d4cf0991333ec5ab21f03"><enum>(IV)</enum><text>in subparagraph (C), as so redesignated—</text><item id="id000546758e164b0ca8c20ec7717e29fb"><enum>(aa)</enum><text>in clause (ii) by inserting <quote>binding</quote> before <quote>operational</quote>; and</text></item><item id="id7a99c7fecb1444fcb0b5bb3eab25ef1e"><enum>(bb)</enum><text>in clause (vi), by striking <quote>and</quote> at the end; and</text></item></subclause><subclause id="id610f07a39b87463cbbb8185e367f47b8"><enum>(V)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="ida91b92e8209f4b42aaf4e41401dfd41d"><subparagraph id="id8d97583e7a08441e912509ecf4621ef1"><enum>(E)</enum><text>providing an update on the ongoing and continuous assessment required under subparagraph (A)—</text><clause id="idae43bad9e3c04b3e9cbc517fdf3d8e39"><enum>(i)</enum><text>upon request, to the inspector general of the agency or the Comptroller General of the United States; and</text></clause><clause id="id1ae5170e741c4fcfa1bbf47a0924311f"><enum>(ii)</enum><text>at intervals determined by guidance issued by the Director, and to the extent appropriate and practicable using automation, to—</text><subclause id="id932a0692cc904070b4330f7d14aee99f"><enum>(I)</enum><text>the Director;</text></subclause><subclause id="iddc9719702d65455c9e31c40998ef5af3"><enum>(II)</enum><text>the Director of the Cybersecurity and Infrastructure Security Agency; and</text></subclause><subclause id="id7ae77462095b4847b87ac870c281e5b1"><enum>(III)</enum><text>the National Cyber Director;</text></subclause></clause></subparagraph><after-quoted-block>;</after-quoted-block></quoted-block></subclause></clause><clause id="ide34aa08739204b8896fecf30327fb0ba"><enum>(ii)</enum><text>in paragraph (2)—</text><subclause id="idab3db900ec124cf58b0a947275261eca"><enum>(I)</enum><text>in subparagraph (A), by inserting <quote>in accordance with the agency system risk assessment required under paragraph (1)(A)</quote> after <quote>information systems</quote>;</text></subclause><subclause id="id4c809e1df7044783a9cd671629bbe23d"><enum>(II)</enum><text>in subparagraph (D), by inserting <quote>, through the use of penetration testing, the vulnerability disclosure program established under section 3559B, and other means,</quote> after <quote>periodically</quote>; </text></subclause></clause><clause id="id9ab844318ce141f28396b55b5a43ae35" commented="no"><enum>(iii)</enum><text>in paragraph (3)(A)—</text><subclause id="idd3028d7ad2394b9b9a8f5f0061c26dc1" commented="no"><enum>(I)</enum><text>in the matter preceding clause (i), by striking <quote>senior agency information security officer</quote> and inserting <quote>Chief Information Security Officer</quote>;</text></subclause><subclause id="idcd5184b4253b4ebf97cd5ed338ee92cd" commented="no"><enum>(II)</enum><text>in clause (i), by striking <quote>this section</quote> and inserting <quote>subsections (a) through (c)</quote>;</text></subclause><subclause id="idd2b447df7e414e70b362f3bd6fd14b0b" commented="no"><enum>(III)</enum><text>in clause (ii), by striking <quote>training and</quote> and inserting <quote>skills, training, and</quote>;</text></subclause><subclause id="idced0296c24ae464b960d505538b90b55" commented="no"><enum>(IV)</enum><text>by redesignating clauses (iii) and (iv) as (iv) and (v), respectively;</text></subclause><subclause commented="no" display-inline="no-display-inline" id="idbd59f2a287024c93aaeb650774fceb69"><enum>(V)</enum><text display-inline="yes-display-inline">by inserting after clause (ii) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id24b136faf7e64f26bdf1c30808c67165"><clause id="id008083b37b3a4588a7c88e30784dd948" commented="no"><enum>(iii)</enum><text>manage information security, cybersecurity budgets, and risk and compliance activities and explain those concepts to the head of the agency and the executive team of the agency;</text></clause><after-quoted-block>; and</after-quoted-block></quoted-block></subclause><subclause id="id776bf7eea9c4485fa2f03df74daed47f" commented="no"><enum>(VI)</enum><text>in clause (iv), as so redesignated, by striking <quote>information security duties as that official's primary duty</quote> and inserting <quote>information, computer network, and technology security duties as the Chief Information Security Officers' primary duty</quote>;</text></subclause></clause><clause id="ida0316088b7e84b909397a64efc73964c" commented="no"><enum>(iv)</enum><text>in paragraph (5), by striking <quote>annually</quote> and inserting <quote>not less frequently than quarterly</quote>; and</text></clause><clause id="id181cf13b7b08476d9df7a1dcef946cf7" commented="no"><enum>(v)</enum><text>in paragraph (6), by striking <quote>official delegated</quote> and inserting <quote>Chief Information Security Officer delegated</quote>; and</text></clause></subparagraph><subparagraph id="id0281c536feb74c138f809ad197efe2db"><enum>(B)</enum><text>in subsection (b)—</text><clause id="id5ca64f5e833146beba63cad8d4f3231c"><enum>(i)</enum><text>by striking paragraph (1) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="ideee4802f73d84ac1b20bf9582fe16382"><paragraph id="ida5bee8f2bad04811b131113c8fdf4ea6"><enum>(1)</enum><text>the ongoing and continuous assessment of agency system risk required under subsection (a)(1)(A), which may include using guidance and automated tools consistent with standards and guidelines promulgated under section 11331 of title 40, as applicable;</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></clause><clause id="ida4758de08ad44e6e91f57eaeb195a465"><enum>(ii)</enum><text>in paragraph (2)—</text><subclause id="id7624eba5e8bc41659c8bc7a519b058df"><enum>(I)</enum><text>by striking subparagraph (B); </text></subclause><subclause id="idB0E1E25BAAF74A1887311B581DD1E0A1"><enum>(II)</enum><text>by redesignating subparagraphs (C) and (D) as subparagraphs (B) and (C), respectively; </text></subclause><subclause id="id36514DF8EB9C4DF2A5827EBF61D41A6C"><enum>(III)</enum><text>in subparagraph (B), as so redesignated, by striking <quote>and</quote> at the end; and</text></subclause><subclause id="id7f9ec97010334ac3be9ac7e123d13636"><enum>(IV)</enum><text>in subparagraph (C), as so redesignated—</text><item id="id832f1e1b44c6456dbbb73ef50c392a1f"><enum>(aa)</enum><text>by redesignating clauses (iii) and (iv) as clauses (iv) and (v), respectively;</text></item><item id="id5a71414f126e4c3487ac86d675bc824b"><enum>(bb)</enum><text>by inserting after clause (ii) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idefabc7c45401484cb5a9d01101c97972"><clause id="id9cb63bd7d80d4dc7930e9c1308b47edb"><enum>(iii)</enum><text>binding operational directives and emergency directives issued by the Secretary under section 3553;</text></clause><after-quoted-block>; and</after-quoted-block></quoted-block></item><item id="id6c083552d9fe40e99a992c53a924fdcd"><enum>(cc)</enum><text>in clause (iv), as so redesignated, by striking <quote>as determined by the agency; and</quote> and inserting “as determined by the agency, considering the agency risk assessment required under subsection (a)(1)(A); </text></item></subclause></clause><clause id="id48e224b5824447c38b69fb57a8cbde02"><enum>(iii)</enum><text>in paragraph (5)(A), by inserting <quote>, including penetration testing, as appropriate,</quote> after <quote>shall include testing</quote>;</text></clause><clause id="idea8634959a944782b98066efe979a118"><enum>(iv)</enum><text>by redesignating paragraphs (7) and (8) as paragraphs (8) and (9), respectively;</text></clause><clause id="id17648c3570744bd0810a2f01c142e09b"><enum>(v)</enum><text>by inserting after paragraph (6) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id4c4f0a0bd220479dba8e20f30a1819cb"><paragraph id="id6d58e945fb1f42be8422448147b1e2c6"><enum>(7)</enum><text>a secure process for providing the status of every remedial action and unremediated identified system vulnerability of a high value asset to the Director and the Director of the Cybersecurity and Infrastructure Security Agency, using automation and machine-readable data to the greatest extent practicable;</text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></clause><clause id="ida787eda1a68a4cbda6683daff333c9cf"><enum>(vi)</enum><text>in paragraph (8)(C), as so redesignated—</text><subclause id="idf7a35a8342054e9eafbc3ba7da13ce42"><enum>(I)</enum><text>by striking clause (ii) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id4c03d1f9f6b941c28415f97a0e8abba0"><clause id="ida00840462faf4a47964d62bec9484356"><enum>(ii)</enum><text>notifying and consulting with the Federal information security incident center established under section 3556 pursuant to the requirements of section 3594;</text></clause><after-quoted-block>;</after-quoted-block></quoted-block></subclause><subclause id="id2aeb32bfbfef4df5875a94ff1548f09e"><enum>(II)</enum><text>by redesignating clause (iii) as clause (iv);</text></subclause><subclause id="idcea314bfa89941988d88f06748e3778f"><enum>(III)</enum><text>by inserting after clause (ii) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id6e17d5a093b34e998bf0faddb1722774"><clause id="id2609e403f89a4be8adc028644b2f7473"><enum>(iii)</enum><text>performing the notifications and other activities required under subchapter IV of this chapter; and</text></clause><after-quoted-block>; and</after-quoted-block></quoted-block></subclause><subclause id="id9be2d9d308f04a3892fe938a1da2aa17"><enum>(IV)</enum><text>in clause (iv), as so redesignated—</text><item id="ida163eb81340248d188b2e9d5fd182fcf"><enum>(aa)</enum><text>in subclause (II), by adding <quote>and</quote> at the end;</text></item><item id="idb1dca4606caa4a608f6815d9cc1a9cf4"><enum>(bb)</enum><text>by striking subclause (III); and</text></item><item id="ida09a089a8bb240bcb38c194b84bae6a5"><enum>(cc)</enum><text>by redesignating subclause (IV) as subclause (III); and</text></item></subclause></clause></subparagraph><subparagraph id="idb5b0b89759394da0af2cab61a79fa9b9"><enum>(C)</enum><text>in subsection (c)—</text><clause id="idfa1d0add60594efe80b2b60bde820390"><enum>(i)</enum><text>by redesignating paragraph (2) as paragraph (5);</text></clause><clause id="idcda9be384dc7462fb42ccfcd82862f59"><enum>(ii)</enum><text>by striking paragraph (1) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idac1f3db7df714614a5e97167cc25c1e1"><paragraph id="idc4b0eb7b0aab41c4a46bbabd210a2719"><enum>(1)</enum><header>Biennial report</header><text>Not later than 2 years after the date of enactment of the <short-title>Federal Information Security Modernization Act of 2023</short-title> and not less frequently than once every 2 years thereafter, using the continuous and ongoing agency system risk assessment required under subsection (a)(1)(A), the head of each agency shall submit to the Director, the National Cyber Director, the Director of the Cybersecurity and Infrastructure Security Agency, the Comptroller General of the United States, the majority and minority leaders of the Senate, the Speaker and minority leader of the House of Representatives, the Committee on Homeland Security and Governmental Affairs of the Senate, the Committee on Oversight and Accountability of the House of Representatives, the Committee on Homeland Security of the House of Representatives, the Committee on Commerce, Science, and Transportation of the Senate, the Committee on Science, Space, and Technology of the House of Representatives, and the appropriate authorization and appropriations committees of Congress a report that—</text><subparagraph id="id2dae2f42237c463a894f3bc689672888"><enum>(A)</enum><text>summarizes the agency system risk assessment required under subsection (a)(1)(A);</text></subparagraph><subparagraph id="id508ced6de971482c9fb35dde951596c8"><enum>(B)</enum><text>evaluates the adequacy and effectiveness of information security policies, procedures, and practices of the agency to address the risks identified in the agency system risk assessment required under subsection (a)(1)(A), including an analysis of the agency’s cybersecurity and incident response capabilities using the metrics established under section 224(c) of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1522">6 U.S.C. 1522(c)</external-xref>); and</text></subparagraph><subparagraph id="id23cfee31ee474e54849b6ff45b8f66e5"><enum>(C)</enum><text>summarizes the status of remedial actions identified by inspector general of the agency, the Comptroller General of the United States, and any other source determined appropriate by the head of the agency.</text></subparagraph></paragraph><paragraph id="id79b5cbfe630049229d5be8f5f3ea1344"><enum>(2)</enum><header>Unclassified reports</header><text>Each report submitted under paragraph (1)—</text><subparagraph id="idf8f822a2e2a4499194f8ace1d091bb28"><enum>(A)</enum><text>shall be, to the greatest extent practicable, in an unclassified and otherwise uncontrolled form; and</text></subparagraph><subparagraph id="id62c329f698ee475ea2ae940f4eee4c82"><enum>(B)</enum><text>may include 1 or more annexes that contain classified or other sensitive information, as appropriate.</text></subparagraph></paragraph><paragraph id="id8c17ef441a9247459742ead790ee1c06"><enum>(3)</enum><header>Briefings</header><text>During each year during which a report is not required to be submitted under paragraph (1), the Director shall provide to the congressional committees described in paragraph (1) a briefing summarizing current agency and Federal risk postures.</text></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></clause><clause id="id81bdae6e81df40b68a33a81cc4dcd62a"><enum>(iii)</enum><text>in paragraph (5), as so redesignated, by striking the period at the end and inserting <quote>, including the reporting procedures established under section 11315(d) of title 40 and subsection (a)(3)(A)(v) of this section</quote>;</text></clause></subparagraph></paragraph><paragraph id="idf70f4ca494204602a178223e9f0dd419"><enum>(4)</enum><text>in section 3555—</text><subparagraph id="id28497e15a37e4b659f8f8dcb8c455d4e"><enum>(A)</enum><text>in the section heading, by striking <quote><header-in-text style="OLC" level="section">Annual independent</header-in-text></quote> and inserting <quote><header-in-text style="OLC" level="section">Independent</header-in-text></quote>;</text></subparagraph><subparagraph id="idb1e35d969e364d57be5b3f8fd3fbe41f"><enum>(B)</enum><text>in subsection (a)—</text><clause id="id8a20abae7b354940afe4a025f6bbe34b"><enum>(i)</enum><text>in paragraph (1), by inserting <quote>during which a report is required to be submitted under section 3553(c),</quote> after <quote>Each year</quote>;</text></clause><clause id="id99bc241eb4c14d91a4837443bc6bff40"><enum>(ii)</enum><text>in paragraph (2)(A), by inserting <quote>, including by performing, or reviewing the results of, agency penetration testing and analyzing the vulnerability disclosure program of the agency</quote> after <quote>information systems</quote>; and</text></clause><clause id="id048f5a1ff19d47bda25876c46c9612f1"><enum>(iii)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id13435d8a1b5241ed8441d65c06a5e9fc"><paragraph id="idbe4d8756affa46abbc885c56ab5d73bc"><enum>(3)</enum><text>An evaluation under this section may include recommendations for improving the cybersecurity posture of the agency.</text></paragraph><after-quoted-block>;</after-quoted-block></quoted-block></clause></subparagraph><subparagraph id="id1c2df7ed1aa9437f98d246272845ad61"><enum>(C)</enum><text>in subsection (b)(1), by striking <quote>annual</quote>;</text></subparagraph><subparagraph id="id4e6c6e4bc8f848398b217c40be34db1f"><enum>(D)</enum><text>in subsection (e)(1), by inserting <quote>during which a report is required to be submitted under section 3553(c)</quote> after <quote>Each year</quote>;</text></subparagraph><subparagraph id="id572fa737993545f88fc0a69620031dc8"><enum>(E)</enum><text>in subsection (g)(2)—</text><clause id="id0bc0a34baf09492bb6169f63cf7d32de"><enum>(i)</enum><text>by striking <quote>this subsection shall</quote> and inserting “this subsection—</text><quoted-block style="OLC" display-inline="no-display-inline" id="idc57beeec674d42658c8a2f9c6eb46ebd"><subparagraph id="id51555592895c45e1a65fcdaa8d0d2a30"><enum>(A)</enum><text>shall</text></subparagraph><after-quoted-block>;</after-quoted-block></quoted-block></clause><clause id="id82f0e7996a69415d8a866d6af2baec3b"><enum>(ii)</enum><text>in subparagraph (A), as so designated, by striking the period at the end and inserting <quote>; and</quote>; and</text></clause><clause id="id1ccf4797a13943a3888a0c8a72406bf3"><enum>(iii)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id89a797ea024e4e6ea09b949f47dd85d8"><subparagraph id="ida2bc4cfc00054a4b85f18781605b0f50"><enum>(B)</enum><text>identify any entity that performs an independent evaluation under subsection (b).</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></clause></subparagraph><subparagraph id="id418ca40d2def418a9b46ee2e7399011a"><enum>(F)</enum><text>by striking subsection (j) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id54cec28772354bfd9540b7c1f03530da"><subsection id="id925b25ab96f04875979ad9fbad7152e6"><enum>(j)</enum><header>Guidance</header><paragraph id="ida5a171e3a81f435f90e44bfefe5cd0f2"><enum>(1)</enum><header>In general</header><text>The Director, in consultation with the Director of the Cybersecurity and Infrastructure Security Agency, the Chief Information Officers Council, the Council of the Inspectors General on Integrity and Efficiency, and other interested parties as appropriate, shall ensure the development of risk-based guidance for evaluating the effectiveness of an information security program and practices.</text></paragraph><paragraph id="idadce5aff110249a5a906286b56547368"><enum>(2)</enum><header>Priorities</header><text>The risk-based guidance developed under paragraph (1) shall include—</text><subparagraph id="id49fbbe6c7aab44c68d952899d2f94e71"><enum>(A)</enum><text>the identification of the most common successful threat patterns;</text></subparagraph><subparagraph id="id48c126d5b948488abae38bd977908347"><enum>(B)</enum><text>the identification of security controls that address the threat patterns described in subparagraph (A);</text></subparagraph><subparagraph id="id736090fe238b49baa90819383b4c4c0c"><enum>(C)</enum><text>any other security risks unique to Federal systems; and</text></subparagraph><subparagraph id="id997255b8a9f748d9af08cac4bc7e29a5"><enum>(D)</enum><text>any other element the Director determines appropriate.</text></subparagraph></paragraph></subsection><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="iddbb87b8710054517b90d5d710ca6fcd7"><enum>(5)</enum><text>in section 3556(a)—</text><subparagraph id="ida3fd190c57b84e5b9d94759f1631efc7"><enum>(A)</enum><text>in the matter preceding paragraph (1), by inserting <quote>within the Cybersecurity and Infrastructure Security Agency</quote> after <quote>incident center</quote>; and</text></subparagraph><subparagraph id="idf2f42ad2863c4a748e9ae5b0243822c7"><enum>(B)</enum><text>in paragraph (4), by striking <quote>3554(b)</quote> and inserting <quote>3554(a)(1)(A)</quote>. </text></subparagraph></paragraph></subsection><subsection id="id785ce659d97d4b9796ee5174234e7a98"><enum>(d)</enum><header>Conforming amendments</header><paragraph id="idf4a8acf190c64c80a028a533f6a2375d"><enum>(1)</enum><header>Table of sections</header><text>The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, is amended by striking the item relating to section 3555 and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id16D6729861944F9CBE7C32245690E3EA"><toc><toc-entry level="section" bold="off">3555. Independent evaluation.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></paragraph><paragraph id="id17105a96cc854e1ab0670e60d91b46b6"><enum>(2)</enum><header>OMB reports</header><text>Section 226(c) of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1524">6 U.S.C. 1524(c)</external-xref>) is amended—</text><subparagraph id="idbf46c634ae7843caa6406b5259b7a6db"><enum>(A)</enum><text>in paragraph (1)(B), in the matter preceding clause (i), by striking <quote>annually thereafter</quote> and inserting <quote>thereafter during the years during which a report is required to be submitted under section 3553(c) of title 44, United States Code</quote>; and</text></subparagraph><subparagraph id="idf6540866f02249d68e425f8772ba9569"><enum>(B)</enum><text>in paragraph (2)(B), in the matter preceding clause (i)—</text><clause id="id484c373dd87d42498b91a68448fe2d18"><enum>(i)</enum><text>by striking <quote>annually thereafter</quote> and inserting <quote>thereafter during the years during which a report is required to be submitted under section 3553(c) of title 44, United States Code</quote>; and</text></clause><clause id="ida956a89bc75e45d89aa7c62bd8bc08a8"><enum>(ii)</enum><text>by striking <quote>the report required under section 3553(c) of title 44, United States Code</quote> and inserting <quote>that report</quote>.</text></clause></subparagraph></paragraph><paragraph id="idaeff4d5ddf9b4dc09af2826868cae251"><enum>(3)</enum><header>NIST responsibilities</header><text>Section 20(d)(3)(B) of the National Institute of Standards and Technology Act (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-3">15 U.S.C. 278g–3(d)(3)(B)</external-xref>) is amended by striking <quote>annual</quote>.</text></paragraph></subsection><subsection id="id575d5aae73c34cafaa0ca35823cf86e6"><enum>(e)</enum><header>Federal system incident response</header><paragraph id="id208966eea5174ee1854586f68ab17a02"><enum>(1)</enum><header>In general</header><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">Chapter 35</external-xref> of title 44, United States Code, is amended by adding at the end the following:</text><quoted-block style="USC" display-inline="no-display-inline" id="id58D9677991DA47F4AA993DC8977503C3"><subchapter id="iddd4cc0d0a46946b7a9c31bf9808973bd"><enum>IV</enum><header>Federal system incident response</header><section id="id97741c148d3445e7a63932484e84d90f"><enum>3591.</enum><header>Definitions</header><subsection id="id329da948c669442a9008ad56cdaddd96"><enum>(a)</enum><header>In general</header><text>Except as provided in subsection (b), the definitions under sections 3502 and 3552 shall apply to this subchapter.</text></subsection><subsection id="id377d4572a53a41d79fa0bc788625177e"><enum>(b)</enum><header>Additional definitions</header><text>As used in this subchapter:</text><paragraph id="ided8de868dbc249f7beea57d19d512c77"><enum>(1)</enum><header>Appropriate reporting entities</header><text>The term <term>appropriate reporting entities</term> means—</text><subparagraph id="id240b3042642541fcadda498cc4ef2cea"><enum>(A)</enum><text>the majority and minority leaders of the Senate;</text></subparagraph><subparagraph id="id1fd4aa6811094c8d93615e5f24f715d9"><enum>(B)</enum><text>the Speaker and minority leader of the House of Representatives;</text></subparagraph><subparagraph id="id90b2691896f9476093fc61e4e574bc44"><enum>(C)</enum><text>the Committee on Homeland Security and Governmental Affairs of the Senate;</text></subparagraph><subparagraph id="id43e1c5df3c03439b95f61f6b213c2a4e"><enum>(D)</enum><text>the Committee on Commerce, Science, and Transportation of the Senate;</text></subparagraph><subparagraph id="ide6f20d53f3bb42fbbf0cfcb610870ba0"><enum>(E)</enum><text>the Committee on Oversight and Accountability of the House of Representatives;</text></subparagraph><subparagraph id="idcb242c74dade496a97702da7fc42a649"><enum>(F)</enum><text>the Committee on Homeland Security of the House of Representatives;</text></subparagraph><subparagraph id="id8a3660f2a39d42a1b2614bff2fea2ff7"><enum>(G)</enum><text>the Committee on Science, Space, and Technology of the House of Representatives;</text></subparagraph><subparagraph id="idb0e5919d473542a98aaa23563233ad11"><enum>(H)</enum><text>the appropriate authorization and appropriations committees of Congress;</text></subparagraph><subparagraph id="id962bbb6a71f34bccab73936b72ec05fc"><enum>(I)</enum><text>the Director;</text></subparagraph><subparagraph id="id1dd30cfa3c24465497b7fe59a70239f8"><enum>(J)</enum><text>the Director of the Cybersecurity and Infrastructure Security Agency;</text></subparagraph><subparagraph id="id4fea4dfdf6fa473a9140ecbd3ca67fde"><enum>(K)</enum><text>the National Cyber Director;</text></subparagraph><subparagraph id="id702e4e03f881441d937fac636654e47f"><enum>(L)</enum><text>the Comptroller General of the United States; and</text></subparagraph><subparagraph id="ida845d2000a3b4b64a6ce39f0aed38fed"><enum>(M)</enum><text>the inspector general of any impacted agency.</text></subparagraph></paragraph><paragraph id="id3b562c09486345f8b6f9307a55bb7c8c"><enum>(2)</enum><header>Awardee</header><text>The term <term>awardee</term>, with respect to an agency—</text><subparagraph id="id625ED68E6B2D4821979B92059FFF0DC7"><enum>(A)</enum><text>means—</text><clause id="idEEFEDFA1AFE04478842872537937C632"><enum>(i)</enum><text>the recipient of a grant from an agency;</text></clause><clause id="idE7D63C23F2944DBFB410C000979BEED2"><enum>(ii)</enum><text>a party to a cooperative agreement with an agency; and</text></clause><clause id="idFD91BA6B67BB4559B27E80922C1E6D69"><enum>(iii)</enum><text>a party to an other transaction agreement with an agency; and</text></clause></subparagraph><subparagraph id="id85B343E72EEB4FB1BE25BFE291A7C325"><enum>(B)</enum><text>includes a subawardee of an entity described in subparagraph (A).</text></subparagraph></paragraph><paragraph id="idfbb80c25d0e54232a47acbe7c237c08b"><enum>(3)</enum><header>Breach</header><text>The term <term>breach</term>—</text><subparagraph id="id0c184ff08e4145a6b5822db8efe00b1e"><enum>(A)</enum><text>means the compromise, unauthorized disclosure, unauthorized acquisition, or loss of control of personally identifiable information or any similar occurrence; and</text></subparagraph><subparagraph id="id8fe15175405c41199a46884bb114b3bb"><enum>(B)</enum><text>includes any additional meaning given the term in policies, principles, standards, or guidelines issued by the Director.</text></subparagraph></paragraph><paragraph id="idcfd9bcf262ff46229b4f2aa2bb32a198"><enum>(4)</enum><header>Contractor</header><text>The term <term>contractor</term> means a prime contractor of an agency or a subcontractor of a prime contractor of an agency that creates, collects, stores, processes, maintains, or transmits Federal information on behalf of an agency.</text></paragraph><paragraph id="iddaa36a52ec6b487fa07aed68dd4b1c49"><enum>(5)</enum><header>Federal information</header><text>The term <term>Federal information</term> means information created, collected, processed, maintained, disseminated, disclosed, or disposed of by or for the Federal Government in any medium or form.</text></paragraph><paragraph id="id51f5754aef564931af49f65da746c8f8"><enum>(6)</enum><header>Federal information system</header><text>The term <term>Federal information system</term> means an information system owned, managed, or operated by an agency, or on behalf of an agency by a contractor, an awardee, or another organization. </text></paragraph><paragraph id="id14c6d6cdc82c465a9faddd4616bc6568"><enum>(7)</enum><header>Intelligence community</header><text>The term <term>intelligence community</term> has the meaning given the term in section 3 of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3003">50 U.S.C. 3003</external-xref>).</text></paragraph><paragraph id="id42943101604a4ff0afc60a4f3376fd6c"><enum>(8)</enum><header>Nationwide consumer reporting agency</header><text>The term <term>nationwide consumer reporting agency</term> means a consumer reporting agency described in section 603(p) of the Fair Credit Reporting Act (<external-xref legal-doc="usc" parsable-cite="usc/15/1681a">15 U.S.C. 1681a(p)</external-xref>).</text></paragraph><paragraph id="idfa380485cdfb4641a2014fd0696c6fda"><enum>(9)</enum><header>Vulnerability disclosure</header><text>The term <term>vulnerability disclosure</term> means a vulnerability identified under section 3559B.</text></paragraph></subsection></section><section id="id78ca636c765140579889407acb629b95"><enum>3592.</enum><header>Notification of breach</header><subsection commented="no" display-inline="no-display-inline" id="id694748cac9b145d399c88c598fe758b6"><enum>(a)</enum><header>Definition</header><text>In this section, the term <term>covered breach</term> means a breach—</text><paragraph id="id132C579EE4E44D9DB5D3287E46A94F7A"><enum>(1)</enum><text>involving not less than 50,000 potentially affected individuals; or</text></paragraph><paragraph id="idE7121488B05244DC92828D6E546A57CC"><enum>(2)</enum><text>the result of which the head of an agency determines that notifying potentially affected individuals is necessary pursuant to subsection (b)(1), regardless of whether—</text><subparagraph id="id46DBF0035CC54EE99CA73D75A39C9970"><enum>(A)</enum><text>the number of potentially affected individuals is less than 50,000; or</text></subparagraph><subparagraph id="idECC9CF42A98C40AC9B59764D39C3DCF2"><enum>(B)</enum><text>the notification is delayed under subsection (d). </text></subparagraph></paragraph></subsection><subsection id="id0b2d0ab1fd78448f88a09422c29e0796"><enum>(b)</enum><header>Notification</header><text>As expeditiously as practicable and without unreasonable delay, and in any case not later than 45 days after an agency has a reasonable basis to conclude that a breach has occurred, the head of the agency, in consultation with the Chief Information Officer and Chief Privacy Officer of the agency, shall—</text><paragraph id="id66fa0c754d37426f979f0194ad917c9d"><enum>(1)</enum><text>determine whether notice to any individual potentially affected by the breach is appropriate, including by conducting an assessment of the risk of harm to the individual that considers—</text><subparagraph id="id190872cc8a2249dfb35cef2c32394a83"><enum>(A)</enum><text>the nature and sensitivity of the personally identifiable information affected by the breach;</text></subparagraph><subparagraph id="id96f40bccb05c4025bb31213505e49219"><enum>(B)</enum><text>the likelihood of access to and use of the personally identifiable information affected by the breach;</text></subparagraph><subparagraph id="id867a4af3fd4943bd87e9da68c281d2b5"><enum>(C)</enum><text>the type of breach; and</text></subparagraph><subparagraph id="idfd3dbd4e6b14436ea5d5bf1d41de99f5"><enum>(D)</enum><text>any other factors determined by the Director; and</text></subparagraph></paragraph><paragraph id="id8afcad5a817045c7ab47ee1c5d61048a"><enum>(2)</enum><text>if the head of the agency determines notification is necessary pursuant to paragraph (1), provide written notification in accordance with subsection (c) to each individual potentially affected by the breach—</text><subparagraph id="id4032c6928e624683a71636048c74ad5d"><enum>(A)</enum><text>to the last known mailing address of the individual; or</text></subparagraph><subparagraph id="ide3edd430adaa47d2b9a948072da22afb"><enum>(B)</enum><text>through an appropriate alternative method of notification.</text></subparagraph></paragraph></subsection><subsection id="idd47f4ff64c2a443abff01f97799a3121"><enum>(c)</enum><header>Contents of notification</header><text>Each notification of a breach provided to an individual under subsection (b)(2) shall include, to the maximum extent practicable—</text><paragraph id="id18d14fdec965453ea8ec9088408769dd"><enum>(1)</enum><text>a brief description of the breach;</text></paragraph><paragraph id="id9ef78f6edff24cdd89c8501ca0113700"><enum>(2)</enum><text>if possible, a description of the types of personally identifiable information affected by the breach;</text></paragraph><paragraph id="id99f46d807d594b5fbfd01f175f6b95ef"><enum>(3)</enum><text>contact information of the agency that may be used to ask questions of the agency, which—</text><subparagraph id="ida070a8078d724a44a03f8dcab126ac4e"><enum>(A)</enum><text>shall include an e-mail address or another digital contact mechanism; and</text></subparagraph><subparagraph id="idbafdb51b786f41fd819ccb7b5a6a84cd"><enum>(B)</enum><text>may include a telephone number, mailing address, or a website;</text></subparagraph></paragraph><paragraph id="idb6d0d3d5090a46c997ded795821aa97f"><enum>(4)</enum><text>information on any remedy being offered by the agency;</text></paragraph><paragraph id="id5380660fe67f4e9aafda65e60ac54d8e"><enum>(5)</enum><text>any applicable educational materials relating to what individuals can do in response to a breach that potentially affects their personally identifiable information, including relevant contact information for the appropriate Federal law enforcement agencies and each nationwide consumer reporting agency; and</text></paragraph><paragraph id="ida3894d05293e4202b6a3a85ec2db67b5"><enum>(6)</enum><text>any other appropriate information, as determined by the head of the agency or established in guidance by the Director.</text></paragraph></subsection><subsection id="id5220446e8bcf43feb125dacdb5376045"><enum>(d)</enum><header>Delay of notification</header><paragraph id="idf2c80d031f1340f3883613ae724d6fb6"><enum>(1)</enum><header>In general</header><text>The head of an agency, in coordination with the Director and the National Cyber Director, and as appropriate, the Attorney General, the Director of National Intelligence, or the Secretary of Homeland Security, may delay a notification required under subsection (b) or (e) if the notification would—</text><subparagraph id="id6e9bcd5f76134ea4939a426cc8d4a842"><enum>(A)</enum><text>impede a criminal investigation or a national security activity;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id9ab365404ec3448f82ddca58fd4891db"><enum>(B)</enum><text display-inline="yes-display-inline">cause an adverse result (as described in section 2705(a)(2) of title 18);</text></subparagraph><subparagraph id="idc5eb1fe69c8c46d2bdaa0cac49e25b77"><enum>(C)</enum><text>reveal sensitive sources and methods;</text></subparagraph><subparagraph id="id04c96947a2b74636906dc23222b98055"><enum>(D)</enum><text>cause damage to national security; or</text></subparagraph><subparagraph id="idc1ee1df5f9f84a9ea370b5ada50807ec"><enum>(E)</enum><text>hamper security remediation actions.</text></subparagraph></paragraph><paragraph id="idd25d1170cf4942bf89ad178aa9c5e7bd"><enum>(2)</enum><header>Renewal</header><text>A delay under paragraph (1) shall be for a period of 60 days and may be renewed.</text></paragraph><paragraph id="id493e02c426114b7ba9897e43aa5111b1"><enum>(3)</enum><header>National security systems</header><text>The head of an agency delaying notification under this subsection with respect to a breach exclusively of a national security system shall coordinate such delay with the Secretary of Defense.</text></paragraph></subsection><subsection id="id42ef8020344f4379a1af91eaab8feef9"><enum>(e)</enum><header>Update notification</header><text>If an agency determines there is a significant change in the reasonable basis to conclude that a breach occurred, a significant change to the determination made under subsection (b)(1), or that it is necessary to update the details of the information provided to potentially affected individuals as described in subsection (c), the agency shall as expeditiously as practicable and without unreasonable delay, and in any case not later than 30 days after such a determination, notify each individual who received a notification pursuant to subsection (b) of those changes.</text></subsection><subsection id="id7c26774686d841daa83bc4f447e5b534"><enum>(f)</enum><header>Delay of notification report</header><paragraph id="idb7e4d4daeede4ae3ae5f7c9815427139"><enum>(1)</enum><header>In general</header><text>Not later than 1 year after the date of enactment of the <short-title>Federal Information Security Modernization Act of 2023</short-title>, and annually thereafter, the head of an agency, in coordination with any official who delays a notification under subsection (d), shall submit to the appropriate reporting entities a report on each delay that occurred during the previous 2 years.</text></paragraph><paragraph id="id9636a007f1e84dc584ae43bc5cc048db"><enum>(2)</enum><header>Component of other report</header><text>The head of an agency may submit the report required under paragraph (1) as a component of the report submitted under section 3554(c). </text></paragraph></subsection><subsection id="id75016646628f4671a4e87c805e9ef761"><enum>(g)</enum><header>Congressional reporting requirements</header><paragraph id="id8db0a356fb0e4eda86f98fe510efad71"><enum>(1)</enum><header>Review and update</header><text>On a periodic basis, the Director of the Office of Management and Budget shall review, and update as appropriate, breach notification policies and guidelines for agencies.</text></paragraph><paragraph id="id2430ecbb561d4f6f9545b294e84ce17d"><enum>(2)</enum><header>Required notice from agencies</header><text>Subject to paragraph (4), the Director of the Office of Management and Budget shall require the head of an agency affected by a covered breach to expeditiously and not later than 30 days after the date on which the agency discovers the covered breach give notice of the breach, which may be provided electronically, to— </text><subparagraph id="idA888B3E1B8F0462194278B6FE3439E3D"><enum>(A)</enum><text>each congressional committee described in section 3554(c)(1); and</text></subparagraph><subparagraph id="idAAF0E40985AE4F0883AB9E6FB64F0714"><enum>(B)</enum><text>the Committee on the Judiciary of the Senate and the Committee on the Judiciary of the House of Representatives.</text></subparagraph></paragraph><paragraph id="idB705CC3313334100A3132942E098C63B"><enum>(3)</enum><header>Contents of notice</header><text>Notice of a covered breach provided by the head of an agency pursuant to paragraph (2) shall include, to the extent practicable—</text><subparagraph id="id666aded82e114e1daedfc9d04d5f4afd"><enum>(A)</enum><text>information about the covered breach, including a summary of any information about how the covered breach occurred known by the agency as of the date of the notice;</text></subparagraph><subparagraph id="idb5b4f246a28e4ff4ae4d855821c13411"><enum>(B)</enum><text>an estimate of the number of individuals affected by covered the breach based on information known by the agency as of the date of the notice, including an assessment of the risk of harm to affected individuals;</text></subparagraph><subparagraph id="id2ff2fd542b224538acfb2bfe7e9cf600"><enum>(C)</enum><text>a description of any circumstances necessitating a delay in providing notice to individuals affected by the covered breach in accordance with subsection (d); and </text></subparagraph><subparagraph id="idd02caed4e6724f12bf88a26893ce5614"><enum>(D)</enum><text>an estimate of when the agency will provide notice to individuals affected by the covered breach, if applicable.</text></subparagraph></paragraph><paragraph id="id28fa0d44e670496eb2ae69dba85aab27"><enum>(4)</enum><header>Exception</header><text>Any agency that is required to provide notice to Congress pursuant to paragraph (2) due to a covered breach exclusively on a national security system shall only provide such notice to—</text><subparagraph id="id5bf62d0620e9452c9168e6369086d5c4"><enum>(A)</enum><text>the majority and minority leaders of the Senate;</text></subparagraph><subparagraph id="id76276e021f8944fb8b5f6447f47234f3"><enum>(B)</enum><text>the Speaker and minority leader of the House of Representatives;</text></subparagraph><subparagraph id="id1ea109c7bd3d4056ae7729f11c4d6398"><enum>(C)</enum><text>the appropriations committees of Congress;</text></subparagraph><subparagraph id="idf74f3e923c844ab6a1f5dbf72b2043fa"><enum>(D)</enum><text>the Committee on Homeland Security and Governmental Affairs of the Senate;</text></subparagraph><subparagraph id="idf34802a7ae1a4658859061b719969258"><enum>(E)</enum><text>the Select Committee on Intelligence of the Senate;</text></subparagraph><subparagraph id="id2eb9819bdd1f49f99c57b848710a603d"><enum>(F)</enum><text>the Committee on Oversight and Accountability of the House of Representatives; and</text></subparagraph><subparagraph id="id598d2fa641074adaa59cbf548f7a7196"><enum>(G)</enum><text>the Permanent Select Committee on Intelligence of the House of Representatives.</text></subparagraph></paragraph><paragraph id="id28ee113005394eae984058621227b4c6"><enum>(5)</enum><header>Rule of construction</header><text>Nothing in paragraphs (1) through (3) shall be construed to alter any authority of an agency.</text></paragraph></subsection><subsection id="idc3bcd615b0be42239d460263f1a0f7b7"><enum>(h)</enum><header>Rule of construction</header><text>Nothing in this section shall be construed to—</text><paragraph commented="no" display-inline="no-display-inline" id="id0f5d1a7bf43e46698ff6653fdb1a690d"><enum>(1)</enum><text display-inline="yes-display-inline">limit—</text><subparagraph id="idc57da025d1ea424eb6940040718dd143"><enum>(A)</enum><text>the authority of the Director to issue guidance relating to notifications of, or the head of an agency to notify individuals potentially affected by, breaches that are not determined to be covered breaches or major incidents;</text></subparagraph><subparagraph id="id1bcdb59496f24f69b3740d103243cb82"><enum>(B)</enum><text>the authority of the Director to issue guidance relating to notifications and reporting of breaches, covered breaches, or major incidents;</text></subparagraph><subparagraph id="idfc58d37f13264620a648c58aea66d78b"><enum>(C)</enum><text>the authority of the head of an agency to provide more information than required under subsection (b) when notifying individuals potentially affected by a breach; </text></subparagraph><subparagraph id="id0ee39c6907da493b927b3a32e8d35f73"><enum>(D)</enum><text>the timing of incident reporting or the types of information included in incident reports provided, pursuant to this subchapter, to—</text><clause id="id35B84F5A0A6A418C82014442D5FF79C8"><enum>(i)</enum><text>the Director;</text></clause><clause id="idE5E7590C53624241B1742F1D6A6F6301"><enum>(ii)</enum><text>the National Cyber Director;</text></clause><clause id="id3AF5FCA248074AA2A87A74FA728E8A57"><enum>(iii)</enum><text>the Director of the Cybersecurity and Infrastructure Security Agency; or</text></clause><clause id="id6886D203B17246D7B665822B9F704274"><enum>(iv)</enum><text>any other agency; </text></clause></subparagraph><subparagraph id="id5d3340db34764be78b217dc5fdf5a2e7"><enum>(E)</enum><text>the authority of the head of an agency to provide information to Congress about agency breaches, including—</text><clause id="id1308bf59b1884d2aaec2e1a4e10138b5"><enum>(i)</enum><text>breaches that are not covered breaches; and</text></clause><clause id="id80a8eb1a24ad424a9e3d86c657d68131"><enum>(ii)</enum><text>additional information beyond the information described in subsection (g)(3); or</text></clause></subparagraph><subparagraph id="idff2a21419556405e80e352e21c1c6a8f"><enum>(F)</enum><text>any Congressional reporting requirements of agencies under any other law; or</text></subparagraph></paragraph><paragraph id="idd5874d82371843108790b094e806b6ce"><enum>(2)</enum><text>limit or supersede any existing privacy protections in existing law. </text></paragraph></subsection></section><section id="id8b0338014eac48528696d14241eea1cf"><enum>3593.</enum><header>Congressional and Executive Branch reports on major incidents</header><subsection commented="no" display-inline="no-display-inline" id="id63dc78d15fbb4671b30548d31e478840"><enum>(a)</enum><header>Appropriate congressional entities</header><text>In this section, the term <term>appropriate congressional entities</term> means—</text><paragraph commented="no" display-inline="no-display-inline" id="idee8d6871233e496ca9e81e29f2b158e3"><enum>(1)</enum><text display-inline="yes-display-inline">the majority and minority leaders of the Senate;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id11fd487df77244d8b75f6e038f456ae8"><enum>(2)</enum><text display-inline="yes-display-inline">the Speaker and minority leader of the House of Representatives;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id9a481ca33656401e86772d0cd00d993f"><enum>(3)</enum><text display-inline="yes-display-inline">the Committee on Homeland Security and Governmental Affairs of the Senate;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id686641d49db541fa97715542bfe29d4a"><enum>(4)</enum><text display-inline="yes-display-inline">the Committee on Commerce, Science, and Transportation of the Senate;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idcbab169e94504be9a25e5b9a3b685700"><enum>(5)</enum><text display-inline="yes-display-inline">the Committee on Oversight and Accountability of the House of Representatives;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="iddb11f7a644c54bb8a0c26d9caa9f1068"><enum>(6)</enum><text display-inline="yes-display-inline">the Committee on Homeland Security of the House of Representatives;</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id0a9e5f0efc63407a915702b8ba142eb5"><enum>(7)</enum><text display-inline="yes-display-inline">the Committee on Science, Space, and Technology of the House of Representatives; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8b855ae112774189967506704ca9c39f"><enum>(8)</enum><text display-inline="yes-display-inline">the appropriate authorization and appropriations committees of Congress</text></paragraph></subsection><subsection id="id0fa0a9a2cf1941a084fcdca5dd45a7ca"><enum>(b)</enum><header>Initial notification</header><paragraph id="id653f2a9ec397449fbf6a86620700382e"><enum>(1)</enum><header>In general</header><text>Not later than 72 hours after an agency has a reasonable basis to conclude that a major incident occurred, the head of the agency impacted by the major incident shall submit to the appropriate reporting entities a written notification, which may be submitted electronically and include 1 or more annexes that contain classified or other sensitive information, as appropriate.</text></paragraph><paragraph id="ida52c10f6f72440d38dd908b1682c6f84"><enum>(2)</enum><header>Contents</header><text>A notification required under paragraph (1) with respect to a major incident shall include the following, based on information available to agency officials as of the date on which the agency submits the notification:</text><subparagraph id="id91b0d5dcfae24f7eaef233d52584a53d"><enum>(A)</enum><text>A summary of the information available about the major incident, including how the major incident occurred and the threat causing the major incident.</text></subparagraph><subparagraph id="ide165172df0e54860844907fcf22116f4"><enum>(B)</enum><text>If applicable, information relating to any breach associated with the major incident, regardless of whether—</text><clause commented="no" display-inline="no-display-inline" id="id706f650d3f604dd58e7c7e27b847e0d8"><enum>(i)</enum><text display-inline="yes-display-inline">the breach was the reason the incident was determined to be a major incident; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idbca05ff569434e2e8ae8f8a8b94b5d2c"><enum>(ii)</enum><text display-inline="yes-display-inline">head of the agency determined it was appropriate to provide notification to potentially impacted individuals pursuant to section 3592(b)(1).</text></clause></subparagraph><subparagraph id="iddc4124b735dc4c69a6bbb0ff93d29929"><enum>(C)</enum><text>A preliminary assessment of the impacts to—</text><clause commented="no" display-inline="no-display-inline" id="id1b33517cea66401db74a5afc10b9edea"><enum>(i)</enum><text display-inline="yes-display-inline">the agency;</text></clause><clause commented="no" display-inline="no-display-inline" id="id0f429e4642a646cd96b96d347c375255"><enum>(ii)</enum><text display-inline="yes-display-inline">the Federal Government;</text></clause><clause commented="no" display-inline="no-display-inline" id="id51d2c7cddbc44eafbb7724200e90458a"><enum>(iii)</enum><text display-inline="yes-display-inline">the national security, foreign relations, homeland security, and economic security of the United States; and</text></clause><clause commented="no" display-inline="no-display-inline" id="ide1d1aa6c72e94641a871e074fa6e18cc"><enum>(iv)</enum><text display-inline="yes-display-inline">the civil liberties, public confidence, privacy, and public health and safety of the people of the United States.</text></clause></subparagraph><subparagraph id="idff81fcb5b68e45dea4507cb35985b606"><enum>(D)</enum><text>If applicable, whether any ransom has been demanded or paid, or is expected to be paid, by any entity operating a Federal information system or with access to Federal information or a Federal information system, including, as available, the name of the entity demanding ransom, the date of the demand, and the amount and type of currency demanded, unless disclosure of such information will disrupt an active Federal law enforcement or national security operation.</text></subparagraph></paragraph></subsection><subsection id="idefeb7f10c7d0402fb36e71527bab1068"><enum>(c)</enum><header>Supplemental update</header><text>Within a reasonable amount of time, but not later than 30 days after the date on which the head of an agency submits a written notification under subsection (a), the head of the agency shall provide to the appropriate congressional entities an unclassified and written update, which may include 1 or more annexes that contain classified or other sensitive information, as appropriate, on the major incident, based on information available to agency officials as of the date on which the agency provides the update, on— </text><paragraph id="id7253c8af929848b3847bf37c5902edf8"><enum>(1)</enum><text>system vulnerabilities relating to the major incident, where applicable, means by which the major incident occurred, the threat causing the major incident, where applicable, and impacts of the major incident to—</text><subparagraph id="id076210c8a1a54d3faa1af2d251116d45"><enum>(A)</enum><text>the agency;</text></subparagraph><subparagraph id="iddd16a9b2e5db468fa5eac6e5abe706bf"><enum>(B)</enum><text>other Federal agencies, Congress, or the judicial branch;</text></subparagraph><subparagraph id="id426e7eea02e54d68838ead8582daa349"><enum>(C)</enum><text>the national security, foreign relations, homeland security, or economic security of the United States; or</text></subparagraph><subparagraph id="id069c20e7901d4b2888301e54fe5cd70c"><enum>(D)</enum><text>the civil liberties, public confidence, privacy, or public health and safety of the people of the United States;</text></subparagraph></paragraph><paragraph id="ida93ed34802fe439796218f07a8fc8ea7"><enum>(2)</enum><text>the status of compliance of the affected Federal information system with applicable security requirements at the time of the major incident; </text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc23ccc43d256460fa6bc595d0da00f19"><enum>(3)</enum><text display-inline="yes-display-inline">if the major incident involved a breach, a description of the affected information, an estimate of the number of individuals potentially impacted, and any assessment to the risk of harm to such individuals;</text></paragraph><paragraph id="ide9bfab3fad474f458167df9c08d805b0"><enum>(4)</enum><text>an update to the assessment of the risk to agency operations, or to impacts on other agency or non-Federal entity operations, affected by the major incident; and</text></paragraph><paragraph id="id3ad1207251654c14abf62af429443c7a"><enum>(5)</enum><text>the detection, response, and remediation actions of the agency, including any support provided by the Cybersecurity and Infrastructure Security Agency under section 3594(d), if applicable.</text></paragraph></subsection><subsection id="idcfc74ae6cefd4c4a8ced18e7fa957ff2"><enum>(d)</enum><header>Additional update</header><text>If the head of an agency, the Director, or the National Cyber Director determines that there is any significant change in the understanding of the scope, scale, or consequence of a major incident for which the head of the agency submitted a written notification and update under subsections (b) and (c), the head of the agency shall submit to the appropriate congressional entities a written update that includes information relating to the change in understanding.</text></subsection><subsection id="id94ba2a8462294bcab0e61dfe0293b0dc"><enum>(e)</enum><header>Biennial report</header><text>Each agency shall submit as part of the biennial report required under section 3554(c)(1) a description of each major incident that occurred during the 2-year period preceding the date on which the biennial report is submitted.</text></subsection><subsection id="id2bc2759cb705498aa07f4f321f275dfd"><enum>(f)</enum><header>Report delivery</header><paragraph id="id14b2885d3c8a4b63851faad558ab6865"><enum>(1)</enum><header>In general</header><text>Any written notification or update required to be submitted under this section—</text><subparagraph commented="no" display-inline="no-display-inline" id="id4698eaf71b764c08b03b22998012c8df"><enum>(A)</enum><text display-inline="yes-display-inline">shall be submitted in an electronic format; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="ide2901950354f4c50aaeec616a67f4cc6"><enum>(B)</enum><text display-inline="yes-display-inline">may be submitted in a paper format.</text></subparagraph></paragraph><paragraph id="id2c171b469e4944fc938cbfe220ed06c3"><enum>(2)</enum><header>Classification status</header><text>Any written notification or update required to be submitted under this section—</text><subparagraph commented="no" display-inline="no-display-inline" id="id200b3717a40d4068b46b98b91ada4e58"><enum>(A)</enum><text display-inline="yes-display-inline">shall be—</text><clause commented="no" display-inline="no-display-inline" id="id2f17ebe4220f4ac8bba52375179aa658"><enum>(i)</enum><text display-inline="yes-display-inline">unclassified; and</text></clause><clause commented="no" display-inline="no-display-inline" id="idb3fa2eb4d38e443badf7ef3f52a14c27"><enum>(ii)</enum><text display-inline="yes-display-inline">submitted through unclassified electronic means pursuant to paragraph (1)(A); and</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="iddf9bbcd189d148d1afad5bc84dfd89f0"><enum>(B)</enum><text display-inline="yes-display-inline">may include classified annexes, as appropriate.</text></subparagraph></paragraph></subsection><subsection id="idcf92f1364bc54e8095d0f897a968bd6d"><enum>(g)</enum><header>Report consistency</header><text>To achieve consistent and coherent agency reporting to Congress, the National Cyber Director, in coordination with the Director, shall—</text><paragraph id="idf970475bb59648e380cdd58fdf23e81a"><enum>(1)</enum><text>provide recommendations to agencies on formatting and the contents of information to be included in the reports required under this section, including recommendations for consistent formats for presenting any associated metrics; and</text></paragraph><paragraph id="ida99a9ece412f4c06a621fac47c9dcf6f"><enum>(2)</enum><text>maintain a comprehensive record of each major incident notification, update, and briefing provided under this section, which shall—</text><subparagraph id="ideb4982844bfe4235b79236ca52302d12"><enum>(A)</enum><text>include, at a minimum—</text><clause id="id8d81536763f7402daf38e9c057ecfbaf"><enum>(i)</enum><text>the full contents of the written notification or update;</text></clause><clause id="id98bdfa711d9f436bbe072af51e41c123"><enum>(ii)</enum><text>the identity of the reporting agency; and</text></clause><clause id="id1d44180b108b4d5da3e6ba67def8cd6e"><enum>(iii)</enum><text>the date of submission; and</text></clause><clause commented="no" display-inline="no-display-inline" id="id693a88a26b9a42b5bd9c3769938333f3"><enum>(iv)</enum><text display-inline="yes-display-inline">a list of the recipient congressional entities; and</text></clause></subparagraph><subparagraph id="id22497d34bd3142e9aa6ce7dccf2524de"><enum>(B)</enum><text>be made available upon request to the majority and minority leaders of the Senate, the Speaker and minority leader of the House of Representatives, the Committee on Homeland Security and Governmental Affairs of the Senate, and the Committee on Oversight and Accountability of the House of Representatives.</text></subparagraph></paragraph></subsection><subsection id="id01DD8D6E20794531AE9861AC28FA5DEA"><enum>(h)</enum><header>National security systems congressional reporting exemption</header><text>With respect to a major incident that occurs exclusively on a national security system, the head of the affected agency shall submit the notifications and reports required to be submitted to Congress under this section only to— </text><paragraph id="id4008074916DE45F8A925E6D7464FFC50"><enum>(1)</enum><text>the majority and minority leaders of the Senate;</text></paragraph><paragraph id="id13C19474276F40B7BB019AB2113BBF32"><enum>(2)</enum><text>the Speaker and minority leader of the House of Representatives;</text></paragraph><paragraph id="idD00C30AE9DE745308A65D5515BDD6ABD"><enum>(3)</enum><text>the appropriations committees of Congress;</text></paragraph><paragraph id="id04D0817FB53B4896997D29D948F0A7DD"><enum>(4)</enum><text>the appropriate authorization committees of Congress;</text></paragraph><paragraph id="id346538C8460F42E6BC7B1E41B56D89B2"><enum>(5)</enum><text>the Committee on Homeland Security and Governmental Affairs of the Senate;</text></paragraph><paragraph id="idA9CD20D8E7784622B01566907F56C263"><enum>(6)</enum><text>the Select Committee on Intelligence of the Senate;</text></paragraph><paragraph id="idA75F480571B44E16A1E9078AA1481FDB"><enum>(7)</enum><text>the Committee on Oversight and Accountability of the House of Representatives; and</text></paragraph><paragraph id="idCBCE1A0776FE49A0BDBC2D0D71CE5F83"><enum>(8)</enum><text>the Permanent Select Committee on Intelligence of the House of Representatives.</text></paragraph></subsection><subsection id="id6c1feadcdc704c0daff9bb361e341d62"><enum>(i)</enum><header>Major incidents including breaches</header><text>If a major incident constitutes a covered breach, as defined in section 3592(a), information on the covered breach required to be submitted to Congress pursuant to section 3592(g) may— </text><paragraph commented="no" display-inline="no-display-inline" id="ida50a72f3aa4c4bedb9cfc5ff5d66cffa"><enum>(1)</enum><text display-inline="yes-display-inline">be included in the notifications required under subsection (b) or (c); or</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id9bd6de1bc9204b7b8ce3217c8cbc68b6"><enum>(2)</enum><text display-inline="yes-display-inline">be reported to Congress under the process established under section 3592(g). </text></paragraph></subsection><subsection id="ide8225c685c054ae4832cbf5e65c46f37"><enum>(j)</enum><header>Rule of construction</header><text>Nothing in this section shall be construed to—</text><paragraph commented="no" display-inline="no-display-inline" id="id2c2316e4a2104642ba847a87de432bd8"><enum>(1)</enum><text display-inline="yes-display-inline">limit—</text><subparagraph id="idc74a6cf7a0e74659aeae24f6518f8087"><enum>(A)</enum><text>the ability of an agency to provide additional reports or briefings to Congress;</text></subparagraph><subparagraph id="id284f24916fc7486d933193a08cf4ea55"><enum>(B)</enum><text>Congress from requesting additional information from agencies through reports, briefings, or other means; </text></subparagraph><subparagraph id="idea2bdd998a7242bfa45633628322e5a7"><enum>(C)</enum><text>any congressional reporting requirements of agencies under any other law; or</text></subparagraph></paragraph><paragraph id="ida4212fe9a7fa46ed8c354c9480603a4d"><enum>(2)</enum><text>limit or supersede any privacy protections under any other law.</text></paragraph></subsection></section><section id="id29fa3808368444b7b156c3d869859b5b"><enum>3594.</enum><header>Government information sharing and incident response</header><subsection id="id31d32413c2b247afb25c477a88eadb12"><enum>(a)</enum><header>In general</header><paragraph id="id058d6a865fc84500b1196662096ed44c"><enum>(1)</enum><header>Incident sharing</header><text>Subject to paragraph (4) and subsection (b), and in accordance with the applicable requirements pursuant to section 3553(b)(2)(A) for reporting to the Federal information security incident center established under section 3556, the head of each agency shall provide to the Cybersecurity and Infrastructure Security Agency information relating to any incident affecting the agency, whether the information is obtained by the Federal Government directly or indirectly.</text></paragraph><paragraph id="ide300a148103c4545b556d85cff796463"><enum>(2)</enum><header>Contents</header><text>A provision of information relating to an incident made by the head of an agency under paragraph (1) shall include, at a minimum—</text><subparagraph id="idF724AFE0CD2941EF9B35FDA3F753E104"><enum>(A)</enum><text>a full description of the incident, including—</text><clause id="id5F0D0FDC089742209D02CA448EFF3A18"><enum>(i)</enum><text>all indicators of compromise and tactics, techniques, and procedures;</text></clause><clause id="idB3C4940EFF864779B9EA38140CCB4EA3"><enum>(ii)</enum><text>an indicator of how the intruder gained initial access, accessed agency data or systems, and undertook additional actions on the network of the agency; and</text></clause><clause id="id125f944fcd4d4b40b17ff164f4b59596"><enum>(iii)</enum><text>information that would support enabling defensive measures; and</text></clause><clause id="id380102b94d0d4ac8835916be58ab1822"><enum>(iv)</enum><text>other information that may assist in identifying other victims; </text></clause></subparagraph><subparagraph id="idc1dc263138c04b17ab140f1aceb6a55f"><enum>(B)</enum><text>information to help prevent similar incidents, such as information about relevant safeguards in place when the incident occurred and the effectiveness of those safeguards; and</text></subparagraph><subparagraph id="id7d1f3dbbca53435789085a390b640f67"><enum>(C)</enum><text>information to aid in incident response, such as—</text><clause id="ideb2070ad7bfc43b2aaa85eccd99513d8"><enum>(i)</enum><text>a description of the affected systems or networks;</text></clause><clause id="id7fa4d81d0c624b35be37f85e7bd75ac4"><enum>(ii)</enum><text>the estimated dates of when the incident occurred; and</text></clause><clause id="id3f493bcc0e474fc788e85d9658236ae7"><enum>(iii)</enum><text>information that could reasonably help identify any malicious actor that may have conducted or caused the incident, subject to appropriate privacy protections. </text></clause></subparagraph></paragraph><paragraph id="idc45154421f8c48329cbb2f18618f9cda"><enum>(3)</enum><header>Information sharing</header><text>The Director of the Cybersecurity and Infrastructure Security Agency shall—</text><subparagraph id="idb9c1a7b9808843cb9999dc2a19d7db70"><enum>(A)</enum><text>make incident information provided under paragraph (1) available to the Director and the National Cyber Director;</text></subparagraph><subparagraph id="id03be37711d9c444795c4294be50c5203"><enum>(B)</enum><text>to the greatest extent practicable, share information relating to an incident with—</text><clause id="idbca76294a43c4513b1af9202608e7f4c"><enum>(i)</enum><text>the head of any agency that may be—</text><subclause id="id75b3267ae499497fae0dc5f9d6216402"><enum>(I)</enum><text>impacted by the incident;</text></subclause><subclause id="id9bea68969eee4dcc97ea5cab06feb436"><enum>(II)</enum><text>particularly susceptible to the incident; or</text></subclause><subclause id="idd292bc1c8fcf49e783ba0addbcb096b1"><enum>(III)</enum><text>similarly targeted by the incident; and</text></subclause></clause><clause id="id444fb692a3784e0b88a26783226d203e"><enum>(ii)</enum><text>appropriate Federal law enforcement agencies to facilitate any necessary threat response activities, as requested;</text></clause></subparagraph><subparagraph id="idec42848506d44f989083180f403a576d"><enum>(C)</enum><text>coordinate any necessary information sharing efforts relating to a major incident with the private sector; and</text></subparagraph><subparagraph id="id2EAA3F34E90A44BA91021D7124127FCB"><enum>(D)</enum><text>notify the National Cyber Director of any efforts described in subparagraph (C).</text></subparagraph></paragraph><paragraph id="id9a7543ac9b9e4b238a1235060cf613a2"><enum>(4)</enum><header>National security systems exemption</header><subparagraph id="id31df21d68f5d48dd951fc9ca2a8810db"><enum>(A)</enum><header>In general</header><text>Notwithstanding paragraphs (1) and (3), each agency operating or exercising control of a national security system shall share information about an incident that occurs exclusively on a national security system with the Secretary of Defense, the Director, the National Cyber Director, and the Director of the Cybersecurity and Infrastructure Security Agency to the extent consistent with standards and guidelines for national security systems issued in accordance with law and as directed by the President.</text></subparagraph><subparagraph id="id095E83464F7F4B2CACE243942A6131A6"><enum>(B)</enum><header>Protections</header><text>Any information sharing and handling of information under this paragraph shall be appropriately protected consistent with procedures authorized for the protection of sensitive sources and methods or by procedures established for information that have been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept classified in the interest of national defense or foreign policy.</text></subparagraph></paragraph></subsection><subsection id="id3fc77d8e42914b2ba332f3684a7c5db1"><enum>(b)</enum><header>Automation</header><text>In providing information and selecting a method to provide information under subsection (a), the head of each agency shall implement subsection (a)(1) in a manner that provides such information to the Cybersecurity and Infrastructure Security Agency in an automated and machine-readable format, to the greatest extent practicable.</text></subsection><subsection id="id58bc93923f234dd4a2667d65d34296a5"><enum>(c)</enum><header>Incident response</header><text>Each agency that has a reasonable basis to suspect or conclude that a major incident occurred involving Federal information in electronic medium or form that does not exclusively involve a national security system shall coordinate with—</text><paragraph id="idD39F6C80549C4A0CA6FF96350CB2E1E8"><enum>(1)</enum><text>the Cybersecurity and Infrastructure Security Agency to facilitate asset response activities and provide recommendations for mitigating future incidents; and</text></paragraph><paragraph id="id27058E8A2FC84EDF8B45912B6331FAB6"><enum>(2)</enum><text>consistent with relevant policies, appropriate Federal law enforcement agencies to facilitate threat response activities.</text></paragraph></subsection></section><section id="id2dc5d496cdd24446be3b7493a039b27a"><enum>3595.</enum><header>Responsibilities of contractors and awardees</header><subsection id="id7e54d03c47144005bfd330f3bf7da872"><enum>(a)</enum><header>Reporting</header><paragraph id="idc9d0e87fa56e4f54bdc16d2433291ade"><enum>(1)</enum><header>In general</header><text>Any contractor or awardee of an agency shall report to the agency if the contractor or awardee has a reasonable basis to conclude that—</text><subparagraph id="id018e2f1853f8498192c6ad6a704e0ec1"><enum>(A)</enum><text>an incident or breach has occurred with respect to Federal information the contractor or awardee collected, used, or maintained on behalf of an agency;</text></subparagraph><subparagraph id="ida18951331a984cff81d6a9a0e129d798"><enum>(B)</enum><text>an incident or breach has occurred with respect to a Federal information system used, operated, managed, or maintained on behalf of an agency by the contractor or awardee;</text></subparagraph><subparagraph id="id7b2dc456080f4bf4a53e98f528817dc9"><enum>(C)</enum><text>a component of any Federal information system operated, managed, or maintained by a contractor or awardee contains a security vulnerability, including a supply chain compromise or an identified software or hardware vulnerability, for which there is reliable evidence of attempted or successful exploitation of the vulnerability by an actor without authorization of the Federal information system owner; or</text></subparagraph><subparagraph id="idbc9c6e9af18248beb3224e8cb5f6e98e"><enum>(D)</enum><text>the contractor or awardee has received personally identifiable information, personal health information, or other clearly sensitive information that is beyond the scope of the contract or agreement with the agency from the agency that the contractor or awardee is not authorized to receive.</text></subparagraph></paragraph><paragraph id="id6157256cdabe42e2bd456bff6e0e61ac"><enum>(2)</enum><header>Third-party reports of vulnerabilities</header><text>Subject to the guidance issued by the Director pursuant to paragraph (4), any contractor or awardee of an agency shall report to the agency and the Cybersecurity and Infrastructure Security Agency if the contractor or awardee has a reasonable basis to suspect or conclude that a component of any Federal information system operated, managed, or maintained on behalf of an agency by the contractor or awardee on behalf of the agency contains a security vulnerability, including a supply chain compromise or an identified software or hardware vulnerability, that has been reported to the contractor or awardee by a third party, including through a vulnerability disclosure program. </text></paragraph><paragraph id="ida3f085fbfa7a49ca921b9aff9855b35c"><enum>(3)</enum><header>Procedures</header><subparagraph commented="no" display-inline="no-display-inline" id="idf1b964c0b8664219abfc224dc2438e50"><enum>(A)</enum><header display-inline="yes-display-inline">Sharing with CISA</header><text>As soon as practicable following a report of an incident to an agency by a contractor or awardee under paragraph (1), the head of the agency shall provide, pursuant to section 3594, information about the incident to the Director of the Cybersecurity and Infrastructure Security Agency.</text></subparagraph><subparagraph id="id53ba7ac0959c4f81acdf4f701a2e0b8b"><enum>(B)</enum><header>Time for reporting</header><text>Unless a different time for reporting is specified in a contract, grant, cooperative agreement, or other transaction agreement, a contractor or awardee shall—</text><clause id="id01b76ba391734e588f3e85a218c113f4"><enum>(i)</enum><text>make a report required under paragraph (1) not later than 1 day after the date on which the contractor or awardee has reasonable basis to suspect or conclude that the criteria under paragraph (1) have been met; and</text></clause><clause id="ida1c64fd63f0a435f8b779cbc21887e00"><enum>(ii)</enum><text>make a report required under paragraph (2) within a reasonable time, but not later than 90 days after the date on which the contractor or awardee has reasonable basis to suspect or conclude that the criteria under paragraph (2) have been met.</text></clause></subparagraph><subparagraph id="id46e6e7ee12a8440ca7e966bb399c52ce"><enum>(C)</enum><header>Procedures</header><text>Following a report of a breach or incident to an agency by a contractor or awardee under paragraph (1), the head of the agency, in consultation with the contractor or awardee, shall carry out the applicable requirements under sections 3592, 3593, and 3594 with respect to the breach or incident.</text></subparagraph><subparagraph id="id9eaa198fa8754e2d9c2b825accfda6c9"><enum>(D)</enum><header>Rule of construction</header><text>Nothing in subparagraph (B) shall be construed to allow the negation of the requirements to report vulnerabilities under paragraph (1) or (2) through a contract, grant, cooperative agreement, or other transaction agreement. </text></subparagraph></paragraph><paragraph id="idf5bba978bd6448889932d4ef742eccdd"><enum>(4)</enum><header>Guidance</header><text>The Director shall issue guidance to agencies relating to the scope of vulnerabilities to be reported under paragraph (2), such as the minimum severity of a vulnerability required to be reported or whether vulnerabilities that are already publicly disclosed must be reported.</text></paragraph></subsection><subsection id="id357add9395b34a3ab5a1217d5e156f17"><enum>(b)</enum><header>Regulations; modifications</header><paragraph id="idcb0bdd842b9c4041bb862d38c63ae7f2"><enum>(1)</enum><header>In general</header><text>Not later than 1 year after the date of enactment of the <short-title>Federal Information Security Modernization Act of 2023</short-title>—</text><subparagraph id="id1f499baa6371459e853e7a3852372b3c"><enum>(A)</enum><text>the Federal Acquisition Regulatory Council shall promulgate regulations, as appropriate, relating to the responsibilities of contractors and recipients of other transaction agreements and cooperative agreements to comply with this section; and</text></subparagraph><subparagraph id="id21482e329f224108b45d6b4c207a94c3"><enum>(B)</enum><text>the Office of Federal Financial Management shall promulgate regulations under title 2, Code Federal Regulations, as appropriate, relating to the responsibilities of grantees to comply with this section.</text></subparagraph></paragraph><paragraph id="id34b7705ca1be489987208577c4b57b66"><enum>(2)</enum><header>Implementation</header><text>Not later than 1 year after the date on which the Federal Acquisition Regulatory Council and the Office of Federal Financial Management promulgates regulations under paragraph (1), the head of each agency shall implement policies and procedures, as appropriate, necessary to implement those regulations.</text></paragraph><paragraph id="idc5b08eb7b4974cafa4bd8c0ada100b46"><enum>(3)</enum><header>Congressional notification</header><subparagraph id="id09c1ff6fff8348e5834ac2ce9dae3fa7"><enum>(A)</enum><header>In general</header><text>The head of each agency head shall notify the Director upon implementation of policies and procedures necessary to implement the regulations promulgated under paragraph (1).</text></subparagraph><subparagraph id="idcfb527d8b52b4156aa3a6ae29001cb70"><enum>(B)</enum><header>OMB notification</header><text> Not later than 30 days after the date described in paragraph (2), the Director shall notify the Committee on Homeland Security and Governmental Affairs of the Senate and the Committees on Oversight and Accountability and Homeland Security of the House of Representatives on the status of the implementation by each agency of the regulations promulgated under paragraph (1). </text></subparagraph></paragraph></subsection><subsection id="idd664b57519314cb8bcb21eaba38d920d"><enum>(c)</enum><header>National security systems exemption</header><text>Notwithstanding any other provision of this section, a contractor or awardee of an agency that would be required to report an incident or vulnerability pursuant to this section that occurs exclusively on a national security system shall—</text><paragraph id="id8d9e7e89a1274a82b2807840b0e42ead"><enum>(1)</enum><text>report the incident or vulnerability to the head of the agency and the Secretary of Defense; and </text></paragraph><paragraph id="id770BE4A8073C4AF982075A072CE4C60C"><enum>(2)</enum><text>comply with applicable laws and policies relating to national security systems. </text></paragraph></subsection></section><section id="ida07c3740a43c4fdfb11c2c4832bcab6e"><enum>3596.</enum><header>Training</header><subsection id="id36c44422272e419ab092077f98269905"><enum>(a)</enum><header>Covered individual defined</header><text>In this section, the term <term>covered individual</term> means an individual who obtains access to a Federal information system because of the status of the individual as—</text><paragraph id="id28fb7ad1a18840e789acb14d84799c3b"><enum>(1)</enum><text>an employee, contractor, awardee, volunteer, or intern of an agency; or</text></paragraph><paragraph id="idd35cc99c904047e28fa49c26a71331d6"><enum>(2)</enum><text>an employee of a contractor or awardee of an agency.</text></paragraph></subsection><subsection id="id9898bd0c372f483095c2587887c5bf6d"><enum>(b)</enum><header>Best practices and consistency</header><text>The Director of the Cybersecurity and Infrastructure Security Agency, in consultation with the Director, the National Cyber Director, and the Director of the National Institute of Standards and Technology, shall develop best practices to support consistency across agencies in cybersecurity incident response training, including— </text><paragraph id="id486d0f50c93c4999ae55e750c5788e9f"><enum>(1)</enum><text>information to be collected and shared with the Cybersecurity and Infrastructure Security Agency pursuant to section 3594(a) and processes for sharing such information; and</text></paragraph><paragraph id="idef48ee54075d40c08a742783cd4a5ac9"><enum>(2)</enum><text>appropriate training and qualifications for cyber incident responders.</text></paragraph></subsection><subsection id="id8b0bfe88a6244e70b5a074535af2fd31"><enum>(c)</enum><header>Agency training</header><text>The head of each agency shall develop training for covered individuals on how to identify and respond to an incident, including—</text><paragraph id="id7c614945192c45a69d41fa9d4bf31b30"><enum>(1)</enum><text>the internal process of the agency for reporting an incident; and</text></paragraph><paragraph id="idfc4956c4265f449c9683757b9001ff38"><enum>(2)</enum><text>the obligation of a covered individual to report to the agency any suspected or confirmed incident involving Federal information in any medium or form, including paper, oral, and electronic.</text></paragraph></subsection><subsection id="id1606b00db55d447c9778b58ccb6e12c4"><enum>(d)</enum><header>Inclusion in annual training</header><text>The training developed under subsection (c) may be included as part of an annual privacy, security awareness, or other appropriate training of an agency. </text></subsection></section><section id="id056b78a284f64023859468f7de52ef31"><enum>3597.</enum><header>Analysis and report on Federal incidents</header><subsection id="id4928c86e1deb48388d998cf454f72ac6"><enum>(a)</enum><header>Analysis of Federal incidents</header><paragraph id="id919a0affa8f848bf8667dcb3ff8a4655"><enum>(1)</enum><header>Quantitative and qualitative analyses</header><text>The Director of the Cybersecurity and Infrastructure Security Agency shall perform and, in coordination with the Director and the National Cyber Director, develop, continuous monitoring and quantitative and qualitative analyses of incidents at agencies, including major incidents, including—</text><subparagraph id="id16e22aeac6724f2387bf80783b58673c"><enum>(A)</enum><text>the causes of incidents, including—</text><clause id="id8f42369fe2d44e08a3259f8bda144ee5"><enum>(i)</enum><text>attacker tactics, techniques, and procedures; and</text></clause><clause id="id5faffd091f9645f299ccb72879ed01fc"><enum>(ii)</enum><text>system vulnerabilities, including zero days, unpatched systems, and information system misconfigurations;</text></clause></subparagraph><subparagraph id="idd3d65c399ea145b8af38d04861c9ee96"><enum>(B)</enum><text>the scope and scale of incidents at agencies;</text></subparagraph><subparagraph id="id972f3478c5da4eabbe515774eaf88d61"><enum>(C)</enum><text>common root causes of incidents across multiple agencies;</text></subparagraph><subparagraph id="id92a99e5281884798a4e772e08f1402b3"><enum>(D)</enum><text>agency incident response, recovery, and remediation actions and the effectiveness of those actions, as applicable;</text></subparagraph><subparagraph id="id6ee12597d4894e68a5e5ccdeb7077bea"><enum>(E)</enum><text>lessons learned and recommendations in responding to, recovering from, remediating, and mitigating future incidents; and</text></subparagraph><subparagraph id="id89082e63e46c49de818977aae03deda5"><enum>(F)</enum><text>trends across multiple agencies to address intrusion detection and incident response capabilities using the metrics established under section 224(c) of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1522">6 U.S.C. 1522(c)</external-xref>).</text></subparagraph></paragraph><paragraph id="id3e2268674c59431fa9566549fc79d363"><enum>(2)</enum><header>Automated analysis</header><text>The analyses developed under paragraph (1) shall, to the greatest extent practicable, use machine readable data, automation, and machine learning processes.</text></paragraph><paragraph id="idf0d3b0422a884582b981ee711e86841c"><enum>(3)</enum><header>Sharing of data and analysis</header><subparagraph id="id8a55c5c6d9d0466ca46e0a1e2e97eacb"><enum>(A)</enum><header>In general</header><text>The Director of the Cybersecurity and Infrastructure Security Agency shall share on an ongoing basis the analyses and underlying data required under this subsection with agencies, the Director, and the National Cyber Director to—</text><clause id="id53533383ba0a42d99dbba95734e14e3a"><enum>(i)</enum><text>improve the understanding of cybersecurity risk of agencies; and</text></clause><clause id="id04dc73d27195468da3850221185aa0cf"><enum>(ii)</enum><text>support the cybersecurity improvement efforts of agencies.</text></clause></subparagraph><subparagraph id="id7338ae3f17134b599015414a3c7ff7cb"><enum>(B)</enum><header>Format</header><text>In carrying out subparagraph (A), the Director of the Cybersecurity and Infrastructure Security Agency shall share the analyses—</text><clause id="id976f67dfe75c458dbf38735bd5ecda93"><enum>(i)</enum><text>in human-readable written products; and</text></clause><clause id="id2cf5caf83aea4683b9d30794d4fe2b5b"><enum>(ii)</enum><text>to the greatest extent practicable, in machine-readable formats in order to enable automated intake and use by agencies.</text></clause></subparagraph><subparagraph id="id04c16c9487744a62bff7c393f1db6cfb"><enum>(C)</enum><header>Exemption</header><text>This subsection shall not apply to incidents that occur exclusively on national security systems. </text></subparagraph></paragraph></subsection><subsection id="ide3389738fee3467d83f85ccbc3a5884c"><enum>(b)</enum><header>Annual report on Federal incidents</header><text>Not later than 2 years after the date of enactment of this section, and not less frequently than annually thereafter, the Director of the Cybersecurity and Infrastructure Security Agency, in consultation with the Director, the National Cyber Director and the heads of other agencies, as appropriate, shall submit to the appropriate reporting entities a report that includes—</text><paragraph id="id650141408bc64a569a2f333a6f914840"><enum>(1)</enum><text>a summary of causes of incidents from across the Federal Government that categorizes those incidents as incidents or major incidents;</text></paragraph><paragraph id="idfa71d0d665524dbb9cd77e4356fd96e5"><enum>(2)</enum><text>the quantitative and qualitative analyses of incidents developed under subsection (a)(1) on an agency-by-agency basis and comprehensively across the Federal Government, including—</text><subparagraph id="idd39e98f6089a49658d4c3094b90e9d8f"><enum>(A)</enum><text>a specific analysis of breaches; and</text></subparagraph><subparagraph id="idfffa4e3a130e4a748536e158ea22edab"><enum>(B)</enum><text>an analysis of the Federal Government’s performance against the metrics established under section 224(c) of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1522">6 U.S.C. 1522(c)</external-xref>); and</text></subparagraph></paragraph><paragraph id="id53db1f8f74b7427da0ddc1345db277c3"><enum>(3)</enum><text>an annex for each agency that includes—</text><subparagraph id="idc3f1c38e89cf49ccb3ddafe49f52a81b"><enum>(A)</enum><text>a description of each major incident;</text></subparagraph><subparagraph id="id220de9bcbfe3450896dcbaa00a80a2d0"><enum>(B)</enum><text>the total number of incidents of the agency; and</text></subparagraph><subparagraph id="id6311823fa6e64acda7b8e714c90a71f8"><enum>(C)</enum><text>an analysis of the agency’s performance against the metrics established under section 224(c) of the Cybersecurity Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1522">6 U.S.C. 1522(c)</external-xref>).</text></subparagraph></paragraph></subsection><subsection id="idacf800987c864f6f8beb09bf390b0e06"><enum>(c)</enum><header>Publication</header><paragraph id="id57f22426ee4444af937b7163f6be5a0f"><enum>(1)</enum><header>In general</header><text>The Director of the Cybersecurity and Infrastructure Security Agency shall make a version of each report submitted under subsection (b) publicly available on the website of the Cybersecurity and Infrastructure Security Agency during the year during which the report is submitted.</text></paragraph><paragraph id="id5860cd2a7c0e4dcd89a76fe5c5251bbe"><enum>(2)</enum><header>Exemption</header><text>The publication requirement under paragraph (1) shall not apply to a portion of a report that contains content that should be protected in the interest of national security, as determined by the Director, the Director of the Cybersecurity and Infrastructure Security Agency, or the National Cyber Director. </text></paragraph><paragraph id="id1ddeb52051e54856aa58e58fe453e0b1"><enum>(3)</enum><header>Limitation on exemption</header><text>The exemption under paragraph (2) shall not apply to any version of a report submitted to the appropriate reporting entities under subsection (b).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idf4cd8e7e24a64489b567d707052f24fa"><enum>(4)</enum><header>Requirement for compiling information</header><subparagraph commented="no" display-inline="no-display-inline" id="id6394de799e9a4daf94d8f25c37cc8b9f"><enum>(A)</enum><header>Compilation</header><text display-inline="yes-display-inline">Subject to subparagraph (B), in making a report publicly available under paragraph (1), the Director of the Cybersecurity and Infrastructure Security Agency shall sufficiently compile information so that no specific incident of an agency can be identified.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="iddfc44f135028464c8126c77c3080a909"><enum>(B)</enum><header>Exception</header><text display-inline="yes-display-inline">The Director of the Cybersecurity and Infrastructure Security Agency may include information that enables a specific incident of an agency to be identified in a publicly available report—</text><clause commented="no" display-inline="no-display-inline" id="idb9456ec2c8554873a825a95e4422275e"><enum>(i)</enum><text display-inline="yes-display-inline">with the concurrence of the Director and the National Cyber Director; </text></clause><clause commented="no" display-inline="no-display-inline" id="id4269c2db85374845b8ab1e148a51abb1"><enum>(ii)</enum><text display-inline="yes-display-inline">in consultation with the impacted agency; and</text></clause><clause id="ide50be9ec804948c39e310ddac7fec195"><enum>(iii)</enum><text>in consultation with the inspector general of the impacted agency. </text></clause></subparagraph></paragraph></subsection><subsection id="id7f0634c93fec4f2d83b76f42d856ce6a"><enum>(d)</enum><header>Information provided by agencies</header><paragraph id="id89e677ead2bd41ccbe39447e42592357"><enum>(1)</enum><header>In general</header><text>The analysis required under subsection (a) and each report submitted under subsection (b) shall use information provided by agencies under section 3594(a).</text></paragraph><paragraph id="id5251963ba2284ee18801f5137ce2a9cf"><enum>(2)</enum><header>Noncompliance reports</header><text>During any year during which the head of an agency does not provide data for an incident to the Cybersecurity and Infrastructure Security Agency in accordance with section 3594(a), the head of the agency, in coordination with the Director of the Cybersecurity and Infrastructure Security Agency and the Director, shall submit to the appropriate reporting entities a report that includes the information described in subsection (b) with respect to the agency.</text></paragraph></subsection><subsection id="idc94ce89a3d144a5696247ad5aa2efa5e"><enum>(e)</enum><header>National security system reports</header><paragraph id="id499ceafb849e4181a22c703233a00be9"><enum>(1)</enum><header>In general</header><text>Notwithstanding any other provision of this section, the Secretary of Defense, in consultation with the Director, the National Cyber Director, the Director of National Intelligence, and the Director of Cybersecurity and Infrastructure Security shall annually submit a report that includes the information described in subsection (b) with respect to national security systems, to the extent that the submission is consistent with standards and guidelines for national security systems issued in accordance with law and as directed by the President, to—</text><subparagraph id="idc977026f9aab45a3a4562e4e5b7dfae5"><enum>(A)</enum><text>the majority and minority leaders of the Senate,</text></subparagraph><subparagraph id="id098192a9cd1944f59010fad9c56284b5"><enum>(B)</enum><text>the Speaker and minority leader of the House of Representatives;</text></subparagraph><subparagraph id="id9a766413ac94447e84eb8c5d45169d32"><enum>(C)</enum><text>the Committee on Homeland Security and Governmental Affairs of the Senate;</text></subparagraph><subparagraph id="id385214cfc6f14a1eaa45f00a7ce752fc"><enum>(D)</enum><text>the Select Committee on Intelligence of the Senate;</text></subparagraph><subparagraph id="id804290f6661b4177b3d3e22d5d41266a"><enum>(E)</enum><text>the Committee on Armed Services of the Senate;</text></subparagraph><subparagraph id="idb311cd93126e40038e1270d32e991bd5"><enum>(F)</enum><text>the Committee on Appropriations of the Senate;</text></subparagraph><subparagraph id="idc9a3b395a1ea405c880cf8a9d2633e8b"><enum>(G)</enum><text>the Committee on Oversight and Accountability of the House of Representatives;</text></subparagraph><subparagraph id="id9c44980790284fceb3d6113896ac3928"><enum>(H)</enum><text>the Committee on Homeland Security of the House of Representatives;</text></subparagraph><subparagraph id="id627b87ed7e8f492cb23845ebd0eac8a7"><enum>(I)</enum><text>the Permanent Select Committee on Intelligence of the House of Representatives;</text></subparagraph><subparagraph id="idfd8ee0b65e44491eb0addcdfd42c4bbb"><enum>(J)</enum><text>the Committee on Armed Services of the House of Representatives; and</text></subparagraph><subparagraph id="idf45de3d15eaa43b4862aca3f55ac924c"><enum>(K)</enum><text>the Committee on Appropriations of the House of Representatives.</text></subparagraph></paragraph><paragraph id="id0da830dcf6954a82ad620abb6264dee4"><enum>(2)</enum><header>Classified form</header><text>A report required under paragraph (1) may be submitted in a classified form.</text></paragraph></subsection></section><section id="ida2b1c90af5d84dfaa2e78c8ec08faeeb"><enum>3598.</enum><header>Major incident definition</header><subsection id="id3ed1b5674777437fad981f7b9bc10e05"><enum>(a)</enum><header>In general</header><text>Not later than 1 year after the later of the date of enactment of the <short-title>Federal Information Security Modernization Act of 2023</short-title> and the most recent publication by the Director of guidance to agencies regarding major incidents as of the date of enactment of the <short-title>Federal Information Security Modernization Act of 2023</short-title>, the Director shall develop, in coordination with the National Cyber Director, and promulgate guidance on the definition of the term <term>major incident</term> for the purposes of subchapter II and this subchapter.</text></subsection><subsection id="id213c032d617140ecb7d8f92c4d522ba5"><enum>(b)</enum><header>Requirements</header><text>With respect to the guidance issued under subsection (a), the definition of the term <term>major incident</term> shall—</text><paragraph id="id96d5f99341c84501b72c78a89b8aa253"><enum>(1)</enum><text>include, with respect to any information collected or maintained by or on behalf of an agency or a Federal information system—</text><subparagraph id="id34066687f3264c7cb44e7a3f2c4af682"><enum>(A)</enum><text>any incident the head of the agency determines is likely to result in demonstrable harm to—</text><clause id="id27c747156db748a4b61f6e3d736dc392"><enum>(i)</enum><text>the national security interests, foreign relations, homeland security, or economic security of the United States; or</text></clause><clause id="id97de657a6ca847af9571f020cc0cf718"><enum>(ii)</enum><text>the civil liberties, public confidence, privacy, or public health and safety of the people of the United States;</text></clause></subparagraph><subparagraph id="id82f51642ba4a4097a3c6bc22e53d5a5e"><enum>(B)</enum><text>any incident the head of the agency determines likely to result in an inability or substantial disruption for the agency, a component of the agency, or the Federal Government, to provide 1 or more critical services;</text></subparagraph><subparagraph id="idd89d283925774d90871fcac568fc97f4"><enum>(C)</enum><text>any incident the head of the agency determines substantially disrupts or substantially degrades the operations of a high value asset owned or operated by the agency;</text></subparagraph><subparagraph id="idd9a5170a090a4407ad90e306b6ce4e3c"><enum>(D)</enum><text>any incident involving the exposure to a foreign entity of sensitive agency information, such as the communications of the head of the agency, the head of a component of the agency, or the direct reports of the head of the agency or the head of a component of the agency; and</text></subparagraph><subparagraph id="id9b567807ec0a48e3a23ee2677076ffc2"><enum>(E)</enum><text>any other type of incident determined appropriate by the Director;</text></subparagraph></paragraph><paragraph id="idbb2543a4a64c452587284dd2a9763718"><enum>(2)</enum><text>stipulate that the National Cyber Director, in consultation with the Director and the Director of the Cybersecurity and Infrastructure Security Agency, may declare a major incident at any agency, and such a declaration shall be considered if it is determined that an incident— </text><subparagraph id="idc97906adbbda427bb9ded18d4902c47c"><enum>(A)</enum><text>occurs at not less than 2 agencies; and</text></subparagraph><subparagraph id="id743208d0d7b54cafa3125489a599e23b"><enum>(B)</enum><text>is enabled by—</text><clause id="id7379769a20754ba5b6f43d0ab62eb948"><enum>(i)</enum><text>a common technical root cause, such as a supply chain compromise, or a common software or hardware vulnerability; or</text></clause><clause id="idc1355adaadb842c6ab442f0681c34f2d"><enum>(ii)</enum><text>the related activities of a common threat actor;</text></clause></subparagraph></paragraph><paragraph id="id2bcb124eb10248b7aeee51b1823389a8"><enum>(3)</enum><text>stipulate that, in determining whether an incident constitutes a major incident under the standards described in paragraph (1), the head of the agency shall consult with the National Cyber Director; and </text></paragraph><paragraph id="iddc931bf2fe794609885a816608515afe"><enum>(4)</enum><text>stipulate that the mere report of a vulnerability discovered or disclosed without a loss of confidentiality, integrity, or availability shall not on its own constitute a major incident.</text></paragraph></subsection><subsection id="id6fea03ca3c454000bdc3701d75fa3f2d"><enum>(c)</enum><header>Evaluation and updates</header><text>Not later than 60 days after the date on which the Director first promulgates the guidance required under subsection (a), and not less frequently than once during the first 90 days of each evenly numbered Congress thereafter, the Director shall provide to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committees on Oversight and Accountability and Homeland Security of the House of Representatives a briefing that includes— </text><paragraph id="id53a5b23db1c5470bb732101ae12d4919"><enum>(1)</enum><text>an evaluation of any necessary updates to the guidance;</text></paragraph><paragraph id="id368020c07f7943f4b96733be2cf84abd"><enum>(2)</enum><text>an evaluation of any necessary updates to the definition of the term <term>major incident</term> included in the guidance; and </text></paragraph><paragraph id="id0efabf8cc30c4536ae79da41f657d6c4"><enum>(3)</enum><text>an explanation of, and the analysis that led to, the definition described in paragraph (2).</text></paragraph></subsection></section></subchapter><after-quoted-block>.</after-quoted-block></quoted-block></paragraph><paragraph id="id19018facef2d419888629175f7122359"><enum>(2)</enum><header>Clerical amendment</header><text>The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, is amended by adding at the end the following:</text><quoted-block style="USC" id="id9dc90515-8fd6-4889-8285-a8c4528288e6"><toc><toc-entry level="subchapter" idref="iddd4cc0d0a46946b7a9c31bf9808973bd">SUBCHAPTER IV—Federal system incident response </toc-entry><toc-entry level="section" idref="id97741c148d3445e7a63932484e84d90f">3591. Definitions. </toc-entry><toc-entry level="section" idref="id78ca636c765140579889407acb629b95">3592. Notification of breach. </toc-entry><toc-entry level="section" idref="id8b0338014eac48528696d14241eea1cf">3593. Congressional and Executive Branch reports. </toc-entry><toc-entry level="section" idref="id29fa3808368444b7b156c3d869859b5b">3594. Government information sharing and incident response. </toc-entry><toc-entry level="section" idref="id2dc5d496cdd24446be3b7493a039b27a">3595. Responsibilities of contractors and awardees. </toc-entry><toc-entry level="section" idref="ida07c3740a43c4fdfb11c2c4832bcab6e">3596. Training. </toc-entry><toc-entry level="section" idref="id056b78a284f64023859468f7de52ef31">3597. Analysis and report on Federal incidents. </toc-entry><toc-entry level="section" idref="ida2b1c90af5d84dfaa2e78c8ec08faeeb">3598. Major incident definition.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section><section id="id6429caf467604bea9a5123c15a47a0b6"><enum>4.</enum><header>Amendments to subtitle III of title 40</header><subsection id="id634f0d97a4b344bbbc93cc794e8791b0"><enum>(a)</enum><header>Modernizing government technology</header><text>Subtitle G of title X of division A of the National Defense Authorization Act for Fiscal Year 2018 (<external-xref legal-doc="usc" parsable-cite="usc/40/11301">40 U.S.C. 11301</external-xref> note) is amended in section 1078—</text><paragraph id="idad42cd3f3fb749e79e936c712e478584"><enum>(1)</enum><text>by striking subsection (a) and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idda1df9b04b3f43c59cdefbdf65c0f236"><subsection id="idb390dfe3410a469eb68bbc8f4ae51076"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="id89fdb7b213eb4b6ba0d359fb873bdf3e"><enum>(1)</enum><header>Agency</header><text>The term <term>agency</term> has the meaning given the term in section 551 of title 5, United States Code.</text></paragraph><paragraph id="id6eb527194f0d4f70ad30b9af2ad930d4"><enum>(2)</enum><header>High value asset</header><text>The term <term>high value asset</term> has the meaning given the term in section 3552 of title 44, United States Code.</text></paragraph></subsection><after-quoted-block>;</after-quoted-block></quoted-block></paragraph><paragraph id="id0ea5f0cf25594938a6e32908d8141549"><enum>(2)</enum><text>in subsection (b), by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id8542da37ee9a49408e3f7433d90869b5"><paragraph id="id2023650c9ef647449a51aa6af2742d91"><enum>(8)</enum><header>Proposal evaluation</header><text>The Director shall—</text><subparagraph id="id063f24f5bce14ed282763f3ae2310577"><enum>(A)</enum><text>give consideration for the use of amounts in the Fund to improve the security of high value assets; and</text></subparagraph><subparagraph id="idfbc41d3bd754429e8099718b34ac1537"><enum>(B)</enum><text>require that any proposal for the use of amounts in the Fund includes, as appropriate—</text><clause id="idafa91318d1df4e67a08b77d11c914752"><enum>(i)</enum><text>a cybersecurity risk management plan; and</text></clause><clause id="id168cdad2d8874e1b8ee986e78561d7d2"><enum>(ii)</enum><text>a supply chain risk assessment in accordance with section 1326 of title 41.</text></clause></subparagraph></paragraph><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph id="id544c2aa6b96841df881fb69f7aa10a1a"><enum>(3)</enum><text>in subsection (c)—</text><subparagraph id="id647cbae29d504a29a756b01c8bfc9fb4"><enum>(A)</enum><text>in paragraph (2)(A)(i), by inserting <quote>, including a consideration of the impact on high value assets</quote> after <quote>operational risks</quote>;</text></subparagraph><subparagraph id="ide01e5c2655ad409c9d4bcd926724fbfa"><enum>(B)</enum><text>in paragraph (5)—</text><clause id="id8d94aa04aa03491693f828f324dc21be"><enum>(i)</enum><text>in subparagraph (A), by striking <quote>and</quote> at the end;</text></clause><clause id="idaea5b95e8302495784c2decc7fd0e2a2"><enum>(ii)</enum><text>in subparagraph (B), by striking the period at the end and inserting <quote>and</quote>; and</text></clause><clause id="idd53c238aae614a66996849286a94c845"><enum>(iii)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idb008a5a358594b33985b525422e764ab"><subparagraph id="id80d90e012f6f49dea2fa6155d0342ae3"><enum>(C)</enum><text>a senior official from the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security, appointed by the Director.</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></clause></subparagraph><subparagraph id="idb97fac6c5a2d4495a10d00f46c1f917d"><enum>(C)</enum><text>in paragraph (6)(A), by striking <quote>shall be—</quote> and all that follows through <quote>4 employees</quote> and inserting <quote>shall be 4 employees</quote>.</text></subparagraph></paragraph></subsection><subsection id="idcb49344f9163486d980719c1acb0c58d"><enum>(b)</enum><header>Subchapter I</header><text>Subchapter I of chapter 113 of subtitle III of title 40, United States Code, is amended—</text><paragraph id="id3e77d0e68a0742abb5c5227438043997"><enum>(1)</enum><text>in section 11302—</text><subparagraph id="idf83b7c4ce2d3479c928c695cf7332bff"><enum>(A)</enum><text>in subsection (b), by striking <quote>use, security, and disposal of</quote> and inserting <quote>use, and disposal of, and, in consultation with the Director of the Cybersecurity and Infrastructure Security Agency and the National Cyber Director, promote and improve the security of,</quote>; and</text></subparagraph><subparagraph id="id4f129657bb564b5586ee6972daebb004"><enum>(B)</enum><text>in subsection (h), by inserting <quote>, including cybersecurity performances,</quote> after <quote>the performances</quote>; and</text></subparagraph></paragraph><paragraph id="id09695225389648fa912285f7f47afe42"><enum>(2)</enum><text>in section 11303(b)(2)(B)—</text><subparagraph id="id93c4f69ba8b44566aecf183e3fd8fbcf"><enum>(A)</enum><text>in clause (i), by striking <quote>or</quote> at the end;</text></subparagraph><subparagraph id="ideb948947186846578e95b1c394903b21"><enum>(B)</enum><text>in clause (ii), by adding <quote>or</quote> at the end; and</text></subparagraph><subparagraph id="idb9375395f54a4057b3a994daf433fc4a"><enum>(C)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id1cd70b8234a0439686ad075646d8c274"><clause id="id5f7bb2fbbf714c54b07060baf3f3e901"><enum>(iii)</enum><text>whether the function should be performed by a shared service offered by another executive agency;</text></clause><after-quoted-block>.</after-quoted-block></quoted-block></subparagraph></paragraph></subsection><subsection id="idcae40a2d20d2474b8acecc61480c5264"><enum>(c)</enum><header>Subchapter II</header><text>Subchapter II of chapter 113 of subtitle III of title 40, United States Code, is amended—</text><paragraph id="idc2a48d3334e9489c94c0eae8c263cc10"><enum>(1)</enum><text>in section 11312(a), by inserting <quote>, including security risks</quote> after <quote>managing the risks</quote>;</text></paragraph><paragraph id="idc3ee04b061234ce3b97afaa6de802f81"><enum>(2)</enum><text>in section 11313(1), by striking <quote>efficiency and effectiveness</quote> and inserting <quote>efficiency, security, and effectiveness</quote>;</text></paragraph><paragraph id="idd3f4650ca0f44deca6a6e9b4c5bffe74"><enum>(3)</enum><text>in section 11317, by inserting <quote>security,</quote> before <quote>or schedule</quote>; and</text></paragraph><paragraph id="ida952d430366c47fcb785ca2e9f02c77c"><enum>(4)</enum><text>in section 11319(b)(1), in the paragraph heading, by striking <quote><header-in-text style="OLC" level="paragraph">CIOS</header-in-text></quote> and inserting <quote><header-in-text style="OLC" level="paragraph">Chief Information Officers</header-in-text></quote>.</text></paragraph></subsection></section><section id="id3a27feac84774cd2acecacab028ad01f"><enum>5.</enum><header>Actions to enhance Federal incident transparency</header><subsection id="id766099b6d31246d0b662b07dd598650b"><enum>(a)</enum><header>Responsibilities of the Cybersecurity and Infrastructure Security Agency</header><paragraph id="id41291ec8ec1a4d8f950ea6ab921160b6"><enum>(1)</enum><header>In general</header><text>Not later than 180 days after the date of enactment of this Act, the Director of the Cybersecurity and Infrastructure Security Agency shall—</text><subparagraph id="idc23faee4e5b24b37a465cbd4520e1a66"><enum>(A)</enum><text>develop a plan for the development of the analysis required under section 3597(a) of title 44, United States Code, as added by this Act, and the report required under subsection (b) of that section that includes—</text><clause id="id0cf0963df3254604b8c076312a364c19"><enum>(i)</enum><text>a description of any challenges the Director of the Cybersecurity and Infrastructure Security Agency anticipates encountering; and</text></clause><clause id="idb3b158951d5040c1b1ad5a2988397b37"><enum>(ii)</enum><text>the use of automation and machine-readable formats for collecting, compiling, monitoring, and analyzing data; and</text></clause></subparagraph><subparagraph id="idc0423faa0f1c45df8a862d937a44475d"><enum>(B)</enum><text>provide to the appropriate congressional committees a briefing on the plan developed under subparagraph (A).</text></subparagraph></paragraph><paragraph id="id095946265c7c4570b2ba2077cf967488"><enum>(2)</enum><header>Briefing</header><text>Not later than 1 year after the date of enactment of this Act, the Director of the Cybersecurity and Infrastructure Security Agency shall provide to the appropriate congressional committees a briefing on—</text><subparagraph id="ideea86957100347b898fc16c9af078ce6"><enum>(A)</enum><text>the execution of the plan required under paragraph (1)(A); and</text></subparagraph><subparagraph id="id5cb85f577e1d4c9190842691caf71c8d"><enum>(B)</enum><text>the development of the report required under section 3597(b) of title 44, United States Code, as added by this Act.</text></subparagraph></paragraph></subsection><subsection id="id29d18faab3154a6081f3149d7d1648e0"><enum>(b)</enum><header>Responsibilities of the director of the office of management and budget</header><paragraph id="id47571c4fc4e740658a2ac620f7196452"><enum>(1)</enum><header>Updating FISMA 2014</header><text>Section 2 of the Federal Information Security Modernization Act of 2014 (<external-xref legal-doc="public-law" parsable-cite="pl/113/283">Public Law 113–283</external-xref>; 128 Stat. 3073) is amended—</text><subparagraph id="idfea19a1b0d8a4178b2e58a8ad8d20b80"><enum>(A)</enum><text>by striking subsections (b) and (d); and</text></subparagraph><subparagraph id="id500c5a0ca2ce4cd28d16a6ec9dc423bd"><enum>(B)</enum><text>by redesignating subsections (c), (e), and (f) as subsections (b), (c), and (d), respectively.</text></subparagraph></paragraph><paragraph id="id932ce80d94934acf9756bd3bd60541a4"><enum>(2)</enum><header>Incident data sharing</header><subparagraph id="ide5bc3b6df8d945cfacbee0f70add469f"><enum>(A)</enum><header>In general</header><text>The Director, in coordination with the Director of the Cybersecurity and Infrastructure Security Agency, shall develop, and as appropriate update, guidance, on the content, timeliness, and format of the information provided by agencies under section 3594(a) of title 44, United States Code, as added by this Act.</text></subparagraph><subparagraph id="id6a6644319c1d406cafdbde2e9aaf540f"><enum>(B)</enum><header>Requirements</header><text>The guidance developed under subparagraph (A) shall—</text><clause id="idedd2d4a02b594163bd1d450b281f3cbc"><enum>(i)</enum><text>enable the efficient development of—</text><subclause id="ided44cecefcb14fe1a46153a397f7921b"><enum>(I)</enum><text>lessons learned and recommendations in responding to, recovering from, remediating, and mitigating future incidents; and</text></subclause><subclause id="id30371c486bbd4c628aa4fcd2a7faeb34"><enum>(II)</enum><text>the report on Federal incidents required under section 3597(b) of title 44, United States Code, as added by this Act; and</text></subclause></clause><clause id="id820cfb08dcc140beb0e07f4c4890543c"><enum>(ii)</enum><text>include requirements for the timeliness of data production.</text></clause></subparagraph><subparagraph id="idc1099c4f82e448e397096e4582c64e81"><enum>(C)</enum><header>Automation</header><text>The Director, in coordination with the Director of the Cybersecurity and Infrastructure Security Agency, shall promote, as feasible, the use of automation and machine-readable data for data sharing under section 3594(a) of title 44, United States Code, as added by this Act. </text></subparagraph></paragraph><paragraph id="id3ac864233ba44a838056bc0a8f66216c"><enum>(3)</enum><header>Contractor and awardee guidance</header><subparagraph id="id274cbc4aff51471da44452c85e09e775"><enum>(A)</enum><header>In general</header><text>Not later than 1 year after the date of enactment of this Act, the Director shall issue guidance to agencies on how to deconflict, to the greatest extent practicable, existing regulations, policies, and procedures relating to the responsibilities of contractors and awardees established under section 3595 of title 44, United States Code, as added by this Act.</text></subparagraph><subparagraph id="id81e8902eed514f5aa7d87d6d95cc8671"><enum>(B)</enum><header>Existing processes</header><text>To the greatest extent practicable, the guidance issued under subparagraph (A) shall allow contractors and awardees to use existing processes for notifying agencies of incidents involving information of the Federal Government.</text></subparagraph></paragraph></subsection><subsection id="id698abfaae75d43bcb859516fd6761074"><enum>(c)</enum><header>Update to the Privacy act of 1974</header><text>Section 552a(b) of title 5, United States Code (commonly known as the <quote>Privacy Act of 1974</quote>) is amended—</text><paragraph id="ida9df43ea6ba34d9490ccd0ebad3b11a8"><enum>(1)</enum><text>in paragraph (11), by striking <quote>or</quote> at the end;</text></paragraph><paragraph id="idc855e8047feb49dcb5de70ad64ec04a7"><enum>(2)</enum><text>in paragraph (12), by striking the period at the end and inserting <quote>; or</quote>; and</text></paragraph><paragraph id="id40485c2d78ef471abac10b53dcc88931"><enum>(3)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idd0deca559c9c4cd689a594c2f721836f"><paragraph id="id7ce7ed050689431086a570c20e65340f"><enum>(13)</enum><text>to another agency, to the extent necessary, to assist the recipient agency in responding to an incident (as defined in section 3552 of title 44) or breach (as defined in section 3591 of title 44) or to fulfill the information sharing requirements under section 3594 of title 44.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section><section id="id4C7741EA4407478CB5D433B21BE6AAC2"><enum>6.</enum><header>Additional guidance to agencies on FISMA updates</header><subsection id="id507c271cbeab4382a34602753bc3a77b"><enum>(a)</enum><header>In general</header><text>Not later than 1 year after the date of enactment of this Act, the Director shall issue guidance for agencies on—</text><paragraph id="id15c00617061b46ad9e4659adf21681c9"><enum>(1)</enum><text>performing the ongoing and continuous agency system risk assessment required under section 3554(a)(1)(A) of title 44, United States Code, as amended by this Act; and</text></paragraph><paragraph id="idf07ee539c8c24806b1173b505c56453c"><enum>(2)</enum><text>establishing a process for securely providing the status of each remedial action for high value assets under section 3554(b)(7) of title 44, United States Code, as amended by this Act, to the Director and the Director of the Cybersecurity and Infrastructure Security Agency using automation and machine-readable data, as practicable, which shall include—</text><subparagraph id="id61adc6f8cd634cfe95a4c6f7c94cbaa5"><enum>(A)</enum><text>specific guidance for the use of automation and machine-readable data; and</text></subparagraph><subparagraph id="id44a8a85a380b43c2aed160e2f691959b"><enum>(B)</enum><text>templates for providing the status of the remedial action.</text></subparagraph></paragraph></subsection><subsection id="id369548557fbe447ca7251183d7a4e1e0"><enum>(b)</enum><header>Coordination</header><text>The head of each agency shall coordinate with the inspector general of the agency, as applicable, to ensure consistent understanding of agency policies for the purpose of evaluations conducted by the inspector general. </text></subsection></section><section id="id07d3f9e639fb48cb9a60cf2a6fb2a655"><enum>7.</enum><header>Agency requirements to notify private sector entities impacted by incidents</header><subsection id="id43eb207ae74d438bb1f1c3ef631ce633"><enum>(a)</enum><header>Definitions</header><text>In this section:</text><paragraph id="ida99ec443a65342d6ab3e936e1b67590e"><enum>(1)</enum><header>Reporting entity</header><text>The term <term>reporting entity</term> means private organization or governmental unit that is required by statute or regulation to submit sensitive information to an agency.</text></paragraph><paragraph id="id3214ea652c0949e6a61ff8c39a877c9f"><enum>(2)</enum><header>Sensitive information</header><text>The term <term>sensitive information</term> has the meaning given the term by the Director in guidance issued under subsection (b).</text></paragraph></subsection><subsection id="ideba6bf6c6a2d433e8d7f8a388a35f371"><enum>(b)</enum><header>Guidance on notification of reporting entities</header><text>Not later than 1 year after the date of enactment of this Act, the Director shall develop, in consultation with the National Cyber Director, and issue guidance requiring the head of each agency to notify a reporting entity, and take into consideration the need to coordinate with Sector Risk Management Agencies (as defined in section 2200 of the Homeland Security Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/6/650">6 U.S.C. 650</external-xref>)), as appropriate, of an incident at the agency that is likely to substantially affect— </text><paragraph id="id1ecdd303e3114175abe4f3d42c0063c0"><enum>(1)</enum><text>the confidentiality or integrity of sensitive information submitted by the reporting entity to the agency pursuant to a statutory or regulatory requirement; or</text></paragraph><paragraph id="id3a137d7310a14ad097f761d024726f67"><enum>(2)</enum><text>any information system (as defined in section 3502 of title 44, United States Code) used in the transmission or storage of the sensitive information described in paragraph (1).</text></paragraph></subsection></section><section id="id3fd5df35ee9a4ae495564be21d9d2f49"><enum>8.</enum><header>Mobile security briefings</header><subsection id="idea3ddf998f6946f5951c03b596b888f1"><enum>(a)</enum><header>In general</header><text>Not later than 180 days after the date of enactment of this Act, the Director shall provide to the appropriate congressional committees—</text><paragraph commented="no" display-inline="no-display-inline" id="ide8cc87739249478ba2c208e0cfa63530"><enum>(1)</enum><text display-inline="yes-display-inline">a briefing on the compliance of agencies with the No TikTok on Government Devices Act (<external-xref legal-doc="usc" parsable-cite="usc/44/3553">44 U.S.C. 3553</external-xref> note; <external-xref legal-doc="public-law" parsable-cite="pl/117/328">Public Law 117–328</external-xref>); and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id6176e8819a544f82aef84e0cf856d218"><enum>(2)</enum><text display-inline="yes-display-inline">as a component of the briefing required under paragraph (1), a list of each exception of an agency from the No TikTok on Government Devices Act (<external-xref legal-doc="usc" parsable-cite="usc/44/3553">44 U.S.C. 3553</external-xref> note; <external-xref legal-doc="public-law" parsable-cite="pl/117/328">Public Law 117–328</external-xref>), which may include a classified annex.</text></paragraph></subsection><subsection id="idd2e3d5fe5a6c4d08aa3a26084acf9fe1"><enum>(b)</enum><header>Additional briefing</header><text>Not later than 1 year after the date of the briefing required under subsection (a)(1), the Director shall provide to the appropriate congressional committees—</text><paragraph id="id859d79ab6ece4552ac397643df5a5650"><enum>(1)</enum><text>a briefing on the compliance of any agency that was not compliant with the No TikTok on Government Devices Act (<external-xref legal-doc="usc" parsable-cite="usc/44/3553">44 U.S.C. 3553</external-xref> note; <external-xref legal-doc="public-law" parsable-cite="pl/117/328">Public Law 117–328</external-xref>) at the time of the briefing required under subsection (a)(1); and</text></paragraph><paragraph id="id4c5df3f649634659887ce82857c0f608"><enum>(2)</enum><text>as a component of the briefing required under paragraph (1), an update to the list required under subsection (a)(2).</text></paragraph></subsection></section><section id="id28e9a8873da348e99e841c11fc4091d7"><enum>9.</enum><header>Data and logging retention for incident response</header><subsection id="idbb79bf99808d4e2eb82b513fef3cebe6"><enum>(a)</enum><header>Guidance</header><text>Not later than 2 years after the date of enactment of this Act the Director, in consultation with the National Cyber Director and the Director of the Cybersecurity and Infrastructure Security Agency, shall update guidance to agencies regarding requirements for logging, log retention, log management, sharing of log data with other appropriate agencies, or any other logging activity determined to be appropriate by the Director.</text></subsection><subsection id="id2a9e1802cf4d48c7967eebe9f064cb19"><enum>(b)</enum><header>National security systems</header><text>The Secretary of Defense shall issue guidance that meets or exceeds the standards required in guidance issued under subsection (a) for National Security Systems.</text></subsection></section><section id="ida8bf50b946114cde8410b0160cf866f4"><enum>10.</enum><header>CISA agency liaisons</header><subsection id="ideaacc908c9f14376994a2eec377f00bb"><enum>(a)</enum><header>In general</header><text>Not later than 120 days after the date of enactment of this Act, the Director of the Cybersecurity and Infrastructure Security Agency shall assign not less than 1 cybersecurity professional employed by the Cybersecurity and Infrastructure Security Agency to be the Cybersecurity and Infrastructure Security Agency liaison to the Chief Information Security Officer of each agency.</text></subsection><subsection id="id46f53a0193ad4777b45d2b59329a65f6"><enum>(b)</enum><header>Qualifications</header><text>Each liaison assigned under subsection (a) shall have knowledge of—</text><paragraph id="id06707296a9ab4f1d96a7b4102f81c5c1"><enum>(1)</enum><text>cybersecurity threats facing agencies, including any specific threats to the assigned agency;</text></paragraph><paragraph id="id6944cb822c264f2e84b423344ca422fa"><enum>(2)</enum><text>risk assessments of agency systems; and</text></paragraph><paragraph id="id0946267927134ab7a8d288f5c361e0af"><enum>(3)</enum><text>other Federal cybersecurity initiatives.</text></paragraph></subsection><subsection id="idf822d7ada0144c7ca3eb267130ee9b0f"><enum>(c)</enum><header>Duties</header><text>The duties of each liaison assigned under subsection (a) shall include—</text><paragraph id="idb21441bdb4d14e0c8af1bff9f191c50e"><enum>(1)</enum><text>providing, as requested, assistance and advice to the agency Chief Information Security Officer;</text></paragraph><paragraph id="ida28a196d24e24675b22de4668c02873d"><enum>(2)</enum><text>supporting, as requested, incident response coordination between the assigned agency and the Cybersecurity and Infrastructure Security Agency;</text></paragraph><paragraph id="id3ae985e3f8f84b7da2a2082459ec32ba"><enum>(3)</enum><text>becoming familiar with assigned agency systems, processes, and procedures to better facilitate support to the agency; and</text></paragraph><paragraph id="id384d0975ff4e46548e7c3deb220cc4bb"><enum>(4)</enum><text>other liaison duties to the assigned agency solely in furtherance of Federal cybersecurity or support to the assigned agency as a Sector Risk Management Agency, as assigned by the Director of the Cybersecurity and Infrastructure Security Agency in consultation with the head of the assigned agency.</text></paragraph></subsection><subsection id="id33d2e9199ae24aeca9fd1f9ea6cc8215"><enum>(d)</enum><header>Limitation</header><text>A liaison assigned under subsection (a) shall not be a contractor.</text></subsection><subsection id="idd545de0556b94527875dade46d2a8055"><enum>(e)</enum><header>Multiple assignments</header><text>One individual liaison may be assigned to multiple agency Chief Information Security Officers under subsection (a).</text></subsection><subsection id="id85a5c3d473d44f57bef58ebfcd6bb4f2"><enum>(f)</enum><header>Coordination of activities</header><text>The Director of the Cybersecurity and Infrastructure Security Agency shall consult with the Director on the execution of the duties of the Cybersecurity and Infrastructure Security Agency liaisons to ensure that there is no inappropriate duplication of activities among—</text><paragraph id="idc294a51155d345ada9e8e8a84d336768"><enum>(1)</enum><text>Federal cybersecurity support to agencies of the Office of Management and Budget; and</text></paragraph><paragraph id="id2c324945b799438288f0527931958344"><enum>(2)</enum><text>the Cybersecurity and Infrastructure Security Agency liaison.</text></paragraph></subsection><subsection id="id17e3b31d47a64495ab69a67706068841"><enum>(g)</enum><header>Rule of construction</header><text>Nothing in this section shall be construed impact the ability of the Director to support agency implementation of Federal cybersecurity requirements pursuant to subchapter II of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, as amended by this Act.</text></subsection></section><section id="id91445a8b439a4155affaf8b78bd7c8b2"><enum>11.</enum><header>Federal penetration testing policy</header><subsection id="idf1d5ae60d2264d46a801ba144155567f"><enum>(a)</enum><header>In general</header><text>Subchapter II of <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, is amended by adding at the end the following:</text><quoted-block style="USC" display-inline="no-display-inline" id="id4D12C96A05AC417886A5A3A12F77D2F1"><section id="id07b9f8e7cccf4b5688cdb9c387277644"><enum>3559A.</enum><header>Federal penetration testing</header><subsection id="id8f019921d0e64e56911eda7de12d73f6"><enum>(a)</enum><header>Guidance</header><text>The Director, in consultation with the Director of the Cybersecurity and Infrastructure Security Agency, shall issue guidance to agencies that—</text><paragraph id="idd2193611d30347cc827d472c1b3e1235"><enum>(1)</enum><text>requires agencies to perform penetration testing on information systems, as appropriate, including on high value assets;</text></paragraph><paragraph id="id1d5ec959842441d39f1e254e1b4d9642"><enum>(2)</enum><text>provides policies governing the development of—</text><subparagraph id="id7a24af2bf182430da922e3b62f8e23dc"><enum>(A)</enum><text>rules of engagement for using penetration testing; and</text></subparagraph><subparagraph id="id2348b794739b469b99dd4d7e6df14afa"><enum>(B)</enum><text>procedures to use the results of penetration testing to improve the cybersecurity and risk management of the agency;</text></subparagraph></paragraph><paragraph id="idb40bfab4f2a443aa86549ee78c7979a7"><enum>(3)</enum><text>ensures that operational support or a shared service is available; and </text></paragraph><paragraph id="id01507c75fe67447dbac98c5bdec551fe"><enum>(4)</enum><text>in no manner restricts the authority of the Secretary of Homeland Security or the Director of the Cybersecurity and Infrastructure Agency to conduct threat hunting pursuant to section 3553 of title 44, United States Code, or penetration testing under this chapter.</text></paragraph></subsection><subsection id="id1e1d224c73994e2bb38b7cd6aef9c549"><enum>(b)</enum><header>Exception for national security systems</header><text>The guidance issued under subsection (a) shall not apply to national security systems.</text></subsection><subsection id="id56c0f8bdb74a4eb28a6b1b14a6c22184"><enum>(c)</enum><header>Delegation of authority for certain systems</header><text>The authorities of the Director described in subsection (a) shall be delegated to—</text><paragraph id="id93a7f355e5014fba9227443073bbc95f"><enum>(1)</enum><text>the Secretary of Defense in the case of a system described in section 3553(e)(2); and</text></paragraph><paragraph id="ida48ddfcde28f43d988f515311b6bc269"><enum>(2)</enum><text>the Director of National Intelligence in the case of a system described in section 3553(e)(3).</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="id5163465869494d05b4feee8bbf629f30"><enum>(b)</enum><header>Existing guidance</header><paragraph id="ida9b6dba7d2c34b0bbe1c2a788f9d11d1"><enum>(1)</enum><header>In general</header><text>Compliance with guidance issued by the Director relating to penetration testing before the date of enactment of this Act shall be deemed to be compliance with section 3559A of title 44, United States Code, as added by this Act.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id03f9ecdf24cf4a1d9b67aaf84c8b20f8"><enum>(2)</enum><header>Immediate new guidance not required</header><text display-inline="yes-display-inline">Nothing in section 3559A of title 44, United States Code, as added by this Act, shall be construed to require the Director to issue new guidance to agencies relating to penetration testing before the date described in paragraph (3).</text></paragraph><paragraph id="id5f0d5b1d8c9945918d532788934833d9"><enum>(3)</enum><header>Guidance updates</header><text>Notwithstanding paragraphs (1) and (2), not later than 2 years after the date of enactment of this Act, the Director shall review and, as appropriate, update existing guidance requiring penetration testing by agencies.</text></paragraph></subsection><subsection id="id283869144bad4b7cb83ac24e249f1c18"><enum>(c)</enum><header>Clerical amendment</header><text>The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, is amended by adding after the item relating to section 3559 the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id8310453AB272446ABCDA9EEAAFEA4FEF"><toc><toc-entry level="section" bold="off">3559A. Federal penetration testing.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="idf04dd7e943814bd1a3c5086510accb4c"><enum>(d)</enum><header>Penetration testing by the Secretary of Homeland Security</header><text display-inline="yes-display-inline">Section 3553(b) of title 44, United States Code, as amended by this Act, is further amended by inserting after paragraph (8) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id5b0a156be3324a88841cf36db9763aa0"><paragraph id="id1f5b80909f4744e1b6199ed59176fd0e"><enum>(9)</enum><text>performing penetration testing that may leverage manual expert analysis to identify threats and vulnerabilities within information systems—</text><subparagraph id="id401dfcd727294da099ac291abf570448"><enum>(A)</enum><text>without consent or authorization from agencies; and</text></subparagraph><subparagraph id="id5327af077c0e4ccfb090e1f96d6f6ddf"><enum>(B)</enum><text>with prior notification to the head of the agency;</text></subparagraph></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="id41b7dcee70354bde911884f2fe7fffe2"><enum>12.</enum><header>Vulnerability disclosure policies</header><subsection id="idb53cfeccd4b04552864a8f0357283c73"><enum>(a)</enum><header>In general</header><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">Chapter 35</external-xref> of title 44, United States Code, is amended by inserting after <external-xref legal-doc="usc" parsable-cite="usc/44/3559A">section 3559A,</external-xref> as added by this Act, the following:</text><quoted-block style="USC" display-inline="no-display-inline" id="id16353247c8074f4582df50ce3e103a00"><section id="id0de688be43e04c3283f106397373d841"><enum>3559B.</enum><header>Federal vulnerability disclosure policies</header><subsection id="id1644d6c93f3e48d6b55c0dbe9589ebd3"><enum>(a)</enum><header>Purpose; sense of Congress</header><paragraph id="id752773f090484a4eb0b41fffb098309b"><enum>(1)</enum><header>Purpose</header><text>The purpose of Federal vulnerability disclosure policies is to create a mechanism to enable the public to inform agencies of vulnerabilities in Federal information systems.</text></paragraph><paragraph id="id9898546acf8e43efb84a40139b56f57f"><enum>(2)</enum><header>Sense of Congress</header><text>It is the sense of Congress that, in implementing the requirements of this section, the Federal Government should take appropriate steps to reduce real and perceived burdens in communications between agencies and security researchers.</text></paragraph></subsection><subsection id="idcc5e61224d6f4be3a166c65e35c465e3"><enum>(b)</enum><header>Definitions</header><text>In this section:</text><paragraph id="idbf6106356ffe4793bb97f12f641e56af"><enum>(1)</enum><header>Contractor</header><text>The term <term>contractor</term> has the meaning given the term in section 3591.</text></paragraph><paragraph id="id01d2575220c8452fb4cb2bad2f78cb60"><enum>(2)</enum><header>Internet of things</header><text>The term <term>internet of things</term> has the meaning given the term in Special Publication 800–213 of the National Institute of Standards and Technology, entitled <quote>IoT Device Cybersecurity Guidance for the Federal Government: Establishing IoT Device Cybersecurity Requirements</quote>, or any successor document. </text></paragraph><paragraph id="id20B81E9DAF784165B937895B0311BDD0"><enum>(3)</enum><header>Security vulnerability</header><text>The term <term>security vulnerability</term> has the meaning given the term in section 102 of the Cybersecurity Information Sharing Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1501">6 U.S.C. 1501</external-xref>).</text></paragraph><paragraph id="id4BB8089BD72B4B4391E733C046FD1A75"><enum>(4)</enum><header>Submitter</header><text>The term <term>submitter</term> means an individual that submits a vulnerability disclosure report pursuant to the vulnerability disclosure process of an agency. </text></paragraph><paragraph id="id54caaaeb260841f981508861ff6c76e1"><enum>(5)</enum><header>Vulnerability disclosure report</header><text>The term <term>vulnerability disclosure report</term> means a disclosure of a security vulnerability made to an agency by a submitter.</text></paragraph></subsection><subsection id="idac1ed4a24c524ab4a89a6bdb84df602c"><enum>(c)</enum><header>Guidance</header><text>The Director shall issue guidance to agencies that includes—</text><paragraph id="idd0c773c286454acf862be39dc9ac7926"><enum>(1)</enum><text>use of the information system security vulnerabilities disclosure process guidelines established under section 4(a)(1) of the IoT Cybersecurity Improvement Act of 2020 (15 U.S.C. 278g–3b(a)(1));</text></paragraph><paragraph id="id03f9c7fb3fff4984a459c5b19121685a"><enum>(2)</enum><text>direction to not recommend or pursue legal action against a submitter or an individual that conducts a security research activity that—</text><subparagraph id="id90974710ed454ecb99bb66ccd238741f"><enum>(A)</enum><text>represents a good faith effort to identify and report security vulnerabilities in information systems; or</text></subparagraph><subparagraph id="idd19fb41a9acd4736be0de07d5ca5b6ba"><enum>(B)</enum><text>otherwise represents a good faith effort to follow the vulnerability disclosure policy of the agency developed under subsection (f)(2);</text></subparagraph></paragraph><paragraph id="idca2e0db07274430982ff27115a4620ce"><enum>(3)</enum><text>direction on sharing relevant information in a consistent, automated, and machine readable manner with the Director of the Cybersecurity and Infrastructure Security Agency;</text></paragraph><paragraph id="idcbe0ee0893e94b0696c1295fc4b8feef"><enum>(4)</enum><text>the minimum scope of agency systems required to be covered by the vulnerability disclosure policy of an agency required under subsection (f)(2), including exemptions under subsection (g);</text></paragraph><paragraph id="id5e31207e80114b24b96e0a27cfed00fa"><enum>(5)</enum><text>requirements for providing information to the submitter of a vulnerability disclosure report on the resolution of the vulnerability disclosure report;</text></paragraph><paragraph id="idc96509a6388c43bea24500e0c7e9a849"><enum>(6)</enum><text>a stipulation that the mere identification by a submitter of a security vulnerability, without a significant compromise of confidentiality, integrity, or availability, does not constitute a major incident; and</text></paragraph><paragraph id="id950965f5e61e447f94789e36c6efcc0b"><enum>(7)</enum><text>the applicability of the guidance to Internet of things devices owned or controlled by an agency.</text></paragraph></subsection><subsection id="ide99ac026819a4596a241ac485e8946a7"><enum>(d)</enum><header>Consultation</header><text>In developing the guidance required under subsection (c)(3), the Director shall consult with the Director of the Cybersecurity and Infrastructure Security Agency.</text></subsection><subsection id="idf752854db06242cbacb0c7c53d79ce36"><enum>(e)</enum><header>Responsibilities of CISA</header><text display-inline="yes-display-inline">The Director of the Cybersecurity and Infrastructure Security Agency shall—</text><paragraph id="id72c1e90451534eec818a0ab2cfc6f0e1"><enum>(1)</enum><text>provide support to agencies with respect to the implementation of the requirements of this section;</text></paragraph><paragraph id="id4398f1a5164640a991aa7e6312215000"><enum>(2)</enum><text>develop tools, processes, and other mechanisms determined appropriate to offer agencies capabilities to implement the requirements of this section;</text></paragraph><paragraph id="id7062d348e20c4ea58ebf026a6b900d56"><enum>(3)</enum><text>upon a request by an agency, assist the agency in the disclosure to vendors of newly identified security vulnerabilities in vendor products and services; and</text></paragraph><paragraph id="idd03ed91ba6ce43e1be947720639480d7"><enum>(4)</enum><text>as appropriate, implement the requirements of this section, in accordance with the authority under section 3553(b)(8), as a shared service available to agencies.</text></paragraph></subsection><subsection id="id90f51725a3a4404e807d82c329190c04"><enum>(f)</enum><header>Responsibilities of agencies</header><paragraph id="id6938cf64bdc9416e8c7eaba84bfb7a1e"><enum>(1)</enum><header>Public information</header><text>The head of each agency shall make publicly available, with respect to each internet domain under the control of the agency that is not a national security system and to the extent consistent with the security of information systems but with the presumption of disclosure—</text><subparagraph id="id1272fc0c937c4432ac3b459f0197d01e"><enum>(A)</enum><text>an appropriate security contact; and</text></subparagraph><subparagraph id="idf3df6b4863304e9abf33c66e8d32ee51"><enum>(B)</enum><text>the component of the agency that is responsible for the internet accessible services offered at the domain.</text></subparagraph></paragraph><paragraph id="id34348e3e4e524ab4ad7b4ef41c8d21f4"><enum>(2)</enum><header>Vulnerability disclosure policy</header><text>The head of each agency shall develop and make publicly available a vulnerability disclosure policy for the agency, which shall—</text><subparagraph id="id4380dc3ab5974ce58540ea7d681ef87d"><enum>(A)</enum><text>describe—</text><clause id="idd40b0e7bd352461bb05d5593b3d1d446"><enum>(i)</enum><text>the scope of the systems of the agency included in the vulnerability disclosure policy, including for Internet of things devices owned or controlled by the agency; </text></clause><clause id="id69191d0ca97e4f77919d626a876e55d9"><enum>(ii)</enum><text>the type of information system testing that is authorized by the agency;</text></clause><clause id="id9fb4ab0702f3428d8a53992e85ff0e15"><enum>(iii)</enum><text>the type of information system testing that is not authorized by the agency; </text></clause><clause id="idbfa5a6d924d846469d2ad4e565e98367"><enum>(iv)</enum><text>the disclosure policy for a contractor; and </text></clause><clause id="id5283ec3172ad40f3917815b322dbb30e"><enum>(v)</enum><text>the disclosure policy of the agency for sensitive information;</text></clause></subparagraph><subparagraph id="id7e835b37cdee45968bfea3ea22d8ab7c"><enum>(B)</enum><text>with respect to a vulnerability disclosure report to an agency, describe—</text><clause id="id1550eddc16d54caa87033adad9cd3267"><enum>(i)</enum><text>how the submitter should submit the vulnerability disclosure report; and</text></clause><clause id="id8b40e0cbc62c4833ad2a0334f4cdbb1b"><enum>(ii)</enum><text>if the report is not anonymous, when the reporter should anticipate an acknowledgment of receipt of the report by the agency;</text></clause></subparagraph><subparagraph id="id4383e4a1e8064da58599502aeb7e29e9"><enum>(C)</enum><text>include any other relevant information; and</text></subparagraph><subparagraph id="ide460d28b82c84791bb1dda5e6e093854"><enum>(D)</enum><text>be mature in scope and cover every internet accessible information system used or operated by that agency or on behalf of that agency.</text></subparagraph></paragraph><paragraph id="id95580020ac4a4592b38e1cda97d25cfa"><enum>(3)</enum><header>Identified security vulnerabilities</header><text>The head of each agency shall—</text><subparagraph id="idB9417771AC2F4DD08C7584DBDC8200D1"><enum>(A)</enum><text>consider security vulnerabilities reported in accordance with paragraph (2); </text></subparagraph><subparagraph id="id6F129E76396349599214265D3719041E"><enum>(B)</enum><text>commensurate with the risk posed by the security vulnerability, address such security vulnerability using the security vulnerability management process of the agency; and</text></subparagraph><subparagraph id="idff4486a0c2544665bed3645b14c4dbde"><enum>(C)</enum><text>in accordance with subsection (c)(5), provide information to the submitter of a vulnerability disclosure report. </text></subparagraph></paragraph></subsection><subsection id="id0c94eeb5471d4cb1a3b0d9399788c075"><enum>(g)</enum><header>Exemptions</header><paragraph id="id73846fdcae2849baa2f5579d96a59899"><enum>(1)</enum><header>In general</header><text>The Director and the head of each agency shall carry out this section in a manner consistent with the protection of national security information.</text></paragraph><paragraph id="id6d5d4bcddba24ac5a0662c3a072360aa"><enum>(2)</enum><header>Limitation</header><text>The Director and the head of each agency may not publish under subsection (f)(1) or include in a vulnerability disclosure policy under subsection (f)(2) host names, services, information systems, or other information that the Director or the head of an agency, in coordination with the Director and other appropriate heads of agencies, determines would—</text><subparagraph id="id8441578ec6e74e128f7ab4ea1e48897f"><enum>(A)</enum><text>disrupt a law enforcement investigation;</text></subparagraph><subparagraph id="idd182838e7e614b6294a7ec7e057c60c3"><enum>(B)</enum><text>endanger national security or intelligence activities; or</text></subparagraph><subparagraph id="id4ec9b04d2a514ca7a955d6cf1566cc01"><enum>(C)</enum><text>impede national defense activities or military operations.</text></subparagraph></paragraph><paragraph id="ida75c61f4da074bef8699d69828c46525"><enum>(3)</enum><header>National security systems</header><text>This section shall not apply to national security systems.</text></paragraph></subsection><subsection id="id14342a4270ca49d49950a3aaa67ec44e"><enum>(h)</enum><header>Delegation of authority for certain systems</header><text>The authorities of the Director and the Director of the Cybersecurity and Infrastructure Security Agency described in this section shall be delegated—</text><paragraph id="id4e04f4f72d8c49d3b450989f6dc97185"><enum>(1)</enum><text>to the Secretary of Defense in the case of systems described in section 3553(e)(2); and</text></paragraph><paragraph id="ideec7453ccf634b738361be411d44a344"><enum>(2)</enum><text>to the Director of National Intelligence in the case of systems described in section 3553(e)(3).</text></paragraph></subsection><subsection id="idb8163eb8ab2e46f880d5d1ae5b0d564d"><enum>(i)</enum><header>Revision of Federal acquisition regulation</header><text>The Federal Acquisition Regulation shall be revised as necessary to implement the provisions under this section.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="ide47436cee53948f4a42880bfc14216d7"><enum>(b)</enum><header>Clerical amendment</header><text>The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/35">chapter 35</external-xref> of title 44, United States Code, is amended by adding after the item relating to section 3559A, as added by this Act, the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id47ECAFA23F964642B6A80467788A0958"><toc><toc-entry level="section" bold="off">3559B. Federal vulnerability disclosure policies.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="id99a6efa491bc43ed986128cbcb516a32"><enum>(c)</enum><header>Conforming update and repeal</header><paragraph commented="no" display-inline="no-display-inline" id="ida742555edbf145ed83399f4acc0c1360"><enum>(1)</enum><header display-inline="yes-display-inline">Guidelines on the disclosure process for security vulnerabilities relating to information systems, including internet of things devices</header><text>Section 5 of the IoT Cybersecurity Improvement Act of 2020 (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-3c">15 U.S.C. 278g–3c</external-xref>) is amended by striking subsections (d) and (e).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idc2345f42620f4ba6959f01652c954491"><enum>(2)</enum><header>Implementation and contractor compliance</header><text display-inline="yes-display-inline">The IoT Cybersecurity Improvement Act of 2020 (15 U.S.C. 278g–3a et seq.) is amended—</text><subparagraph commented="no" display-inline="no-display-inline" id="id2f9933c71e2a494d84b1ba77fb85ec08"><enum>(A)</enum><text display-inline="yes-display-inline">by striking section 6 (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-3d">15 U.S.C. 278g–3d</external-xref>); and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idb539d4d5243d49d99c509c93be7d0b8a"><enum>(B)</enum><text>by striking section 7 (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-3e">15 U.S.C. 278g–3e</external-xref>).</text></subparagraph></paragraph></subsection></section><section id="id63b9287711684950bb202d184763278f"><enum>13.</enum><header>Implementing zero trust architecture</header><subsection id="id6538146601f849d79584f29e90dcb49a"><enum>(a)</enum><header>Briefings</header><text>Not later than 1 year after the date of enactment of this Act, the Director shall provide to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committees on Oversight and Accountability and Homeland Security of the House of Representatives a briefing on progress in increasing the internal defenses of agency systems, including—</text><paragraph id="id4dbc9d2c03044455b3e7ab580279ba49"><enum>(1)</enum><text>shifting away from trusted networks to implement security controls based on a presumption of compromise, including through the transition to zero trust architecture;</text></paragraph><paragraph id="idaa92ee8b14fb4561bfef1d9583365ae4"><enum>(2)</enum><text>implementing principles of least privilege in administering information security programs;</text></paragraph><paragraph id="id52c0df2999a04604bf2df6b4fa438f0a"><enum>(3)</enum><text>limiting the ability of entities that cause incidents to move laterally through or between agency systems;</text></paragraph><paragraph id="iddc024da76a664ec4841088b9a8094713"><enum>(4)</enum><text>identifying incidents quickly;</text></paragraph><paragraph id="id393ed53410194dfa80a5e7521e37b7ff"><enum>(5)</enum><text>isolating and removing unauthorized entities from agency systems as quickly as practicable, accounting for intelligence or law enforcement purposes; and</text></paragraph><paragraph id="id98c0e66fdd464294b16c741c5fe83927"><enum>(6)</enum><text>otherwise increasing the resource costs for entities that cause incidents to be successful.</text></paragraph></subsection><subsection id="idf944f9c5952d4f19a7445e983a52b49c"><enum>(b)</enum><header>Progress report</header><text>As a part of each report required to be submitted under section 3553(c) of title 44, United States Code, during the period beginning on the date that is 4 years after the date of enactment of this Act and ending on the date that is 10 years after the date of enactment of this Act, the Director shall include an update on agency implementation of zero trust architecture, which shall include—</text><paragraph id="id55bc0ef9851e4f099ed5b595c3d12667"><enum>(1)</enum><text>a description of steps agencies have completed, including progress toward achieving any requirements issued by the Director, including the adoption of any models or reference architecture;</text></paragraph><paragraph id="id8e71833e8a114e52a565816240151fb2"><enum>(2)</enum><text>an identification of activities that have not yet been completed and that would have the most immediate security impact; and</text></paragraph><paragraph id="idec67d0fe25ce46c9a4c69a62ca601205"><enum>(3)</enum><text>a schedule to implement any planned activities.</text></paragraph></subsection><subsection id="id48855a65b9a043c6b59b8a6e113fc8b9"><enum>(c)</enum><header>Classified annex</header><text>Each update required under subsection (b) may include 1 or more annexes that contain classified or other sensitive information, as appropriate. </text></subsection><subsection id="idcae73b534ecd48b6b69e1cd89780b143"><enum>(d)</enum><header>National security systems</header><paragraph commented="no" display-inline="no-display-inline" id="id75166b1a2f124766810b3581041dce67"><enum>(1)</enum><header>Briefing</header><text display-inline="yes-display-inline">Not later than 1 year after the date of enactment of this Act, the Secretary of Defense shall provide to the Committee on Homeland Security and Governmental Affairs of the Senate, the Committee on Oversight and Accountability of the House of Representatives, the Committee on Armed Services of the Senate, the Committee on Armed Services of the House of Representatives, the Select Committee on Intelligence of the Senate, and the Permanent Select Committee on Intelligence of the House of Representatives a briefing on the implementation of zero trust architecture with respect to national security systems.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id38241aead7c547478e34ff7528587cfc"><enum>(2)</enum><header>Progress report</header><text>Not later than the date on which each update is required to be submitted under subsection (b), the Secretary of Defense shall submit to the congressional committees described in paragraph (1) a progress report on the implementation of zero trust architecture with respect to national security systems.</text></paragraph></subsection></section><section id="idbe8f7d937d1e4c7eb74a0874ce06d1ca"><enum>14.</enum><header>Automation and artificial intelligence</header><subsection id="id0a9f667436f1426889d9e81f4ff6069a"><enum>(a)</enum><header>Definition</header><text>In this section, the term <term>information system</term> has the meaning given the term in section 3502 of title 44, United States Code.</text></subsection><subsection id="id29ab87319b444239a66b72b50b11499d"><enum>(b)</enum><header>Use of artificial intelligence</header><paragraph id="ida558527491c54e36946f12c32330561a"><enum>(1)</enum><header>In general</header><text>As appropriate, the Director shall issue guidance on the use of artificial intelligence by agencies to improve the cybersecurity of information systems.</text></paragraph><paragraph id="id9dc2a07f062342178bb404400338cacf"><enum>(2)</enum><header>Considerations</header><text>The Director and head of each agency shall consider the use and capabilities of artificial intelligence systems wherever automation is used in furtherance of the cybersecurity of information systems.</text></paragraph><paragraph id="id1712901169794149998dd216f0496ff6"><enum>(3)</enum><header>Report</header><text>Not later than 1 year after the date of enactment of this Act, and annually thereafter until the date that is 5 years after the date of enactment of this Act, the Director shall submit to the appropriate congressional committees a report on the use of artificial intelligence to further the cybersecurity of information systems.</text></paragraph></subsection><subsection id="id74fc9ac05fc2440abe9883c34bae460e"><enum>(c)</enum><header>Comptroller general reports</header><paragraph id="ide061c1aacea9416d8384118b14c11bd8"><enum>(1)</enum><header>In general</header><text>Not later than 2 years after the date of enactment of this Act, the Comptroller General of the United States shall submit to the appropriate congressional committees a report on the risks to the privacy of individuals and the cybersecurity of information systems associated with the use by Federal agencies of artificial intelligence systems or capabilities.</text></paragraph><paragraph id="id4f8f2d5622b34991af03f66ac96a0d74"><enum>(2)</enum><header>Study</header><text>Not later than 2 years after the date of enactment of this Act, the Comptroller General of the United States shall perform a study, and submit to the Committees on Homeland Security and Governmental Affairs and Commerce, Science, and Transportation of the Senate and the Committees on Oversight and Accountability, Homeland Security, and Science, Space, and Technology of the House of Representatives a report, on the use of automation, including artificial intelligence, and machine-readable data across the Federal Government for cybersecurity purposes, including the automated updating of cybersecurity tools, sensors, or processes employed by agencies under paragraphs (1), (5)(C), and (8)(B) of section 3554(b) of title 44, United States Code, as amended by this Act. </text></paragraph></subsection></section><section id="id86e5c048064242f3b06b68aee6b55a65"><enum>15.</enum><header>Extension of chief data officer council</header><text display-inline="no-display-inline">Section 3520A(e)(2) of title 44, United States Code, is amended by striking <quote>upon the expiration of the 2-year period that begins on the date the Comptroller General submits the report under paragraph (1) to Congress</quote> and inserting <quote>December 31, 2031</quote>.</text></section><section id="id0f2565479cfb4993813f30b7ff779668"><enum>16.</enum><header>Council of the inspectors general on integrity and efficiency dashboard</header><subsection id="ida413832085ea498a80df76c99d3d02e7"><enum>(a)</enum><header>Dashboard required</header><text>Section 424(e) of title 5, United States Code, is amended—</text><paragraph id="id4574317d08194d15ade13e5a85f5a5f9"><enum>(1)</enum><text>in paragraph (2)—</text><subparagraph id="idc476dbb67d88491f9079023e60bc8ec0"><enum>(A)</enum><text>in subparagraph (A), by striking <quote>and</quote> at the end;</text></subparagraph><subparagraph id="idf0a1af38b5b94db2afbb551f83df5369"><enum>(B)</enum><text>by redesignating subparagraph (B) as subparagraph (C);</text></subparagraph><subparagraph id="idb7b2dfed6bba43c7ac03cba29fda84f8"><enum>(C)</enum><text>by inserting after subparagraph (A) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="ide76c5875fa47458ea376ecf2394b5c34"><subparagraph id="idf30425b046b04934bf2919f488637dcc"><enum>(B)</enum><text>that shall include a dashboard of open information security recommendations identified in the independent evaluations required by section 3555(a) of title 44; and</text></subparagraph><after-quoted-block>; and</after-quoted-block></quoted-block></subparagraph></paragraph><paragraph id="idcbb94b0ac633497c985488849dcc7f2e"><enum>(2)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id9365829517b34b3aaf0e11af252a595c"><paragraph id="idca901046ad55456790a47cefd010c8ad"><enum>(5)</enum><header>Rule of construction</header><text>Nothing in this subsection shall be construed to require the publication of information that is exempted from disclosure under section 552 of this title.</text></paragraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection></section><section id="id5a6067e83def4ea5a88f533e3d27a219"><enum>17.</enum><header>Security operations center shared service</header><subsection id="idc5f4ec2c3b5f4ed1b9607476e6eff712"><enum>(a)</enum><header>Briefing</header><text>Not later than 180 days after the date of enactment of this Act, the Director of the Cybersecurity and Infrastructure Security Agency shall provide to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security and the Committee on Oversight and Accountability of the House of Representatives a briefing on—</text><paragraph id="id1d8b2c6d42104044ab9294d3dbfa52ad"><enum>(1)</enum><text>existing security operations center shared services;</text></paragraph><paragraph id="id80a8dc98cb354f57a0de8e16890f60ea"><enum>(2)</enum><text>the capability for such shared service to offer centralized and simultaneous support to multiple agencies;</text></paragraph><paragraph id="ida158e9ea7482433c838074546a799ac4"><enum>(3)</enum><text>the capability for such shared service to integrate with or support agency threat hunting activities authorized under section 3553 of title 44, United States Code, as amended by this Act;</text></paragraph><paragraph id="id5c15b31eb9cb4dcc95526bcedd20bee1"><enum>(4)</enum><text>the capability for such shared service to integrate with or support Federal vulnerability management activities; and</text></paragraph><paragraph id="id84d7b0247a4b439f9ad19eb6ad18f55e"><enum>(5)</enum><text>future plans for expansion and maturation of such shared service.</text></paragraph></subsection><subsection id="idff5904780b554a25a35d9551294e4103"><enum>(b)</enum><header>GAO Report</header><text>Not less than 540 days after the date of enactment of this Act, the Comptroller General of the United States shall submit to the appropriate congressional committees a report on Federal cybersecurity security operations centers that—</text><paragraph id="id0bd7c38e6f644b178363bae5b927d1e4"><enum>(1)</enum><text>identifies Federal agency best practices for efficiency and effectiveness;</text></paragraph><paragraph id="id152c5a17c9d244e59e15e04238a01c19"><enum>(2)</enum><text>identifies non-Federal best practices used by large entity operations centers and entities providing operation centers as a service; and</text></paragraph><paragraph id="id0b4b14c68c3e47fea41bc28ff9168c59"><enum>(3)</enum><text>includes recommendations for the Cybersecurity and Infrastructure Security Agency and any other relevant agency to improve the efficiency and effectiveness of security operations centers shared service offerings.</text></paragraph></subsection></section><section id="id48c3cf73f97e4bd4934721c2f258d3eb"><enum>18.</enum><header>Federal cybersecurity requirements</header><subsection id="idc776c2f22c0844e6b2e9d55ca94012c6"><enum>(a)</enum><header>Codifying Federal cybersecurity requirements in title 44</header><paragraph id="id12a2df2ba2c84961813c5cfa3cec704f"><enum>(1)</enum><header>Amendment to Federal Cybersecurity Enhancement Act of 2015</header><text>Section 225 of the Federal Cybersecurity Enhancement Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1523">6 U.S.C. 1523</external-xref>) is amended by striking subsections (b) and (c).</text></paragraph><paragraph id="id1b9ec9b607344133bd2ff0f6be6fb1f5"><enum>(2)</enum><header>Title 44</header><text>Section 3554 of title 44, United States Code, as amended by this Act, is further amended by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idbcbec4bdf26f45c18d781949bf3de5d8"><subsection id="id4f182094d6374d38b9b730e0ba9a3a6a"><enum>(f)</enum><header>Specific cybersecurity requirements at agencies</header><paragraph id="id58dea9a9616143149857c0dbc13afac8"><enum>(1)</enum><header>In general</header><text>Consistent with policies, standards, guidelines, and directives on information security under this subchapter, and except as provided under paragraph (3), the head of each agency shall— </text><subparagraph id="id24635aadaf394e969b1ad201db8de1a0"><enum>(A)</enum><text>identify sensitive and mission critical data stored by the agency consistent with the inventory required under section 3505(c); </text></subparagraph><subparagraph id="ide05b931a6fb049d48713265d729cb54b"><enum>(B)</enum><text>assess access controls to the data described in subparagraph (A), the need for readily accessible storage of the data, and the need of individuals to access the data; </text></subparagraph><subparagraph id="idd9728b3988344c04921e477fb3514f3b"><enum>(C)</enum><text>encrypt or otherwise render indecipherable to unauthorized users the data described in subparagraph (A) that is stored on or transiting agency information systems;</text></subparagraph><subparagraph id="id4a8a3a917ba64cf28aa1624671b7bef5"><enum>(D)</enum><text>implement a single sign-on trusted identity platform for individuals accessing each public website of the agency that requires user authentication, as developed by the Administrator of General Services in collaboration with the Secretary; and</text></subparagraph><subparagraph id="id104e91868bb5444cb628e816764489cd"><enum>(E)</enum><text>implement identity management consistent with section 504 of the Cybersecurity Enhancement Act of 2014 (<external-xref legal-doc="usc" parsable-cite="usc/15/7464">15 U.S.C. 7464</external-xref>), including multi-factor authentication, for— </text><clause id="idf0e789e2ba474795af3acec493c8af99"><enum>(i)</enum><text>remote access to a information system; and </text></clause><clause id="id47590c79a02a4b03a4dcf24b1e8afd7e"><enum>(ii)</enum><text>each user account with elevated privileges on a information system.</text></clause></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idd72ca5e774464d2382319fbc5fb45737"><enum>(2)</enum><header>Prohibition</header><subparagraph commented="no" display-inline="no-display-inline" id="ide35f45d086a5449bb2a69df3afe86e13"><enum>(A)</enum><header>Definition</header><text display-inline="yes-display-inline">In this paragraph, the term <term>Internet of things</term> has the meaning given the term in section 3559B.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id6f2e7b93b3904e3eb4d55bedc61cf4cc"><enum>(B)</enum><header>Prohibition</header><text display-inline="yes-display-inline">Consistent with policies, standards, guidelines, and directives on information security under this subchapter, and except as provided under paragraph (3), the head of an agency may not procure, obtain, renew a contract to procure or obtain in any amount, notwithstanding section 1905 of title 41, United States Code, or use an Internet of things device if the Chief Information Officer of the agency determines during a review required under section 11319(b)(1)(C) of title 40 of a contract for an Internet of things device that the use of the device prevents compliance with the standards and guidelines developed under section 4 of the IoT Cybersecurity Improvement Act (<external-xref legal-doc="usc" parsable-cite="usc/15/278g-3b">15 U.S.C. 278g–3b</external-xref>) with respect to the device. </text></subparagraph></paragraph><paragraph id="id8f5218c87a164641818ef210ed45e882"><enum>(3)</enum><header>Exception</header><text>The requirements under paragraph (1) shall not apply to a information system for which—</text><subparagraph id="id51699755dbb54305b57fd1baeee7d763"><enum>(A)</enum><text>the head of the agency, without delegation, has certified to the Director with particularity that—</text><clause id="idbea16082eafd4d55baba346799d37596"><enum>(i)</enum><text>operational requirements articulated in the certification and related to the information system would make it excessively burdensome to implement the cybersecurity requirement; </text></clause><clause id="id5587684b99ea4f459f154e3b464ff43a"><enum>(ii)</enum><text>the cybersecurity requirement is not necessary to secure the information system or agency information stored on or transiting it; and </text></clause><clause id="id9377aec764ae43be87f796654b3e7fe4"><enum>(iii)</enum><text>the agency has taken all necessary steps to secure the information system and agency information stored on or transiting it; and </text></clause></subparagraph><subparagraph id="idd7a657b3e12e47b8a3fc8f9e72ec284f"><enum>(B)</enum><text>the head of the agency has submitted the certification described in subparagraph (A) to the appropriate congressional committees and the authorizing committees of the agency. </text></subparagraph></paragraph><paragraph id="id215eabef85014f72b82e7ab2c2698a7d"><enum>(4)</enum><header>Duration of certification</header><subparagraph id="idb04d9f956ce240329e0b2aa1508f0d14"><enum>(A)</enum><header>In general</header><text>A certification and corresponding exemption of an agency under paragraph (3) shall expire on the date that is 4 years after the date on which the head of the agency submits the certification under paragraph (3)(A).</text></subparagraph><subparagraph id="id07a95d1834ae448883985d024a1ffa18"><enum>(B)</enum><header>Renewal</header><text>Upon the expiration of a certification of an agency under paragraph (3), the head of the agency may submit an additional certification in accordance with that paragraph.</text></subparagraph></paragraph><paragraph id="id1c2f36d2736a46bd90c85ecaf376bcff"><enum>(5)</enum><header>Rules of construction</header><text>Nothing in this subsection shall be construed—</text><subparagraph id="id814B3E4DCFDC408CA3C6950C3CCF997A"><enum>(A)</enum><text>to alter the authority of the Secretary, the Director, or the Director of the National Institute of Standards and Technology in implementing subchapter II of this title;</text></subparagraph><subparagraph id="id4101B7870BE94F0E898001EA03ED3E33"><enum>(B)</enum><text>to affect the standards or process of the National Institute of Standards and Technology;</text></subparagraph><subparagraph id="id33ED277FB06846D982E826E98CAF832F"><enum>(C)</enum><text>to affect the requirement under section 3553(a)(4); or</text></subparagraph><subparagraph id="id9F3B237859E746CFA07CB33AD975F94E"><enum>(D)</enum><text>to discourage continued improvements and advancements in the technology, standards, policies, and guidelines used to promote Federal information security. </text></subparagraph></paragraph></subsection><subsection id="id22bda55f2ab64f20910900e9839e3c09"><enum>(g)</enum><header>Exception</header><paragraph commented="no" display-inline="no-display-inline" id="id31afee8da0f141c79845f71529a71e2d"><enum>(1)</enum><header>Requirements</header><text display-inline="yes-display-inline">The requirements under subsection (f)(1) shall not apply to—</text><subparagraph commented="no" display-inline="no-display-inline" id="ide9b02b4f250d4514a85ac598bb8a71a9"><enum>(A)</enum><text display-inline="yes-display-inline">the Department of Defense;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id91c72b058b0d4f4690bf3b502b1a9d8d"><enum>(B)</enum><text display-inline="yes-display-inline">a national security system; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id2a8a1ac168ae45ada1f6b56244863776"><enum>(C)</enum><text display-inline="yes-display-inline">an element of the intelligence community.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id7e08b36477e2491286cd2168c6f30b8b"><enum>(2)</enum><header>Prohibition</header><text display-inline="yes-display-inline">The prohibition under subsection (f)(2) shall not apply to—</text><subparagraph commented="no" display-inline="no-display-inline" id="idea150796313840158b219ea62e81f875"><enum>(A)</enum><text>Internet of things devices that are or comprise a national security system;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idfd9b025860d049d2bcdc7be81342def8"><enum>(B)</enum><text>national security systems; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="id68dd8ed6d70349b1913ca775f0b99589"><enum>(C)</enum><text display-inline="yes-display-inline">a procured Internet of things device described in subsection (f)(2)(B) that the Chief Information Officer of an agency determines is—</text><clause commented="no" display-inline="no-display-inline" id="idfbe07c03b7554a088e286c886c9a7ded"><enum>(i)</enum><text display-inline="yes-display-inline">necessary for research purposes; or</text></clause><clause commented="no" display-inline="no-display-inline" id="idc394a8438de64177a68623d2e19dc9c9"><enum>(ii)</enum><text display-inline="yes-display-inline">secured using alternative and effective methods appropriate to the function of the Internet of things device.</text></clause></subparagraph></paragraph></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="id253c867430734197a5d38af2e197b46f"><enum>(b)</enum><header>Report on exemptions</header><text>Section 3554(c)(1) of title 44, United States Code, as amended by this Act, is further amended—</text><paragraph id="id5aaab02f7c8a4e2b97eaa75408ec8803"><enum>(1)</enum><text>in subparagraph (C), by striking <quote>and</quote> at the end;</text></paragraph><paragraph id="id3e0ed96b1708446caaff958b8b60acb9"><enum>(2)</enum><text>in subparagraph (D), by striking the period at the end and inserting <quote>; and</quote>; and</text></paragraph><paragraph id="ida2d111174b2f42f9ad15f56e04a2638d"><enum>(3)</enum><text>by adding at the end the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id7d3bd7622cea4a5ca341eb33f4c7a938"><subparagraph id="id618ea87f2b424f2e87d148a40315caa5"><enum>(E)</enum><text>with respect to any exemption from the requirements of subsection (f)(3) that is effective on the date of submission of the report, the number of information systems that have received an exemption from those requirements.</text></subparagraph><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="id5698dbe00a8345d18a38328dc90cc620"><enum>(c)</enum><header>Duration of certification effective date</header><text>Paragraph (3) of section 3554(f) of title 44, United States Code, as added by this Act, shall take effect on the date that is 1 year after the date of enactment of this Act.</text></subsection><subsection id="idd31cd30f4ba949d48b0f77d0472cb6dc"><enum>(d)</enum><header>Federal Cybersecurity Enhancement Act of 2015 update</header><text display-inline="yes-display-inline">Section 222(3)(B) of the Federal Cybersecurity Enhancement Act of 2015 (<external-xref legal-doc="usc" parsable-cite="usc/6/1521">6 U.S.C. 1521(3)(B)</external-xref>) is amended by inserting <quote>and the Committee on Oversight and Accountability</quote> before <quote>of the House of Representatives.</quote></text></subsection></section><section id="id9ea635e528614fae968129911f71c8eb"><enum>19.</enum><header>Federal chief information security officer</header><subsection id="id93410571c822487c9337cef8ab6b81ca"><enum>(a)</enum><header>Amendment</header><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/36">Chapter 36</external-xref> of title 44, United States Code, is amended by adding at the end the following:</text><quoted-block style="USC" display-inline="no-display-inline" id="id73f57afdac114c5ab364168562c0ef4f"><section id="id633b1770bc42414094b7bcdf441db62e"><enum>3617.</enum><header>Federal chief information security officer</header><subsection id="id307d0af93bcd4949ba9946701af62f26"><enum>(a)</enum><header>Establishment</header><text>There is established a Federal Chief Information Security Officer, who shall serve in—</text><paragraph commented="no" display-inline="no-display-inline" id="id0739cd9bd2c6438e852f32c0c6e62c88"><enum>(1)</enum><text display-inline="yes-display-inline">the Office of the Federal Chief Information Officer of the Office of Management and Budget; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="idfead2e6be2d143f6a24d87de63a4b8b3"><enum>(2)</enum><text display-inline="yes-display-inline">the Office of the National Cyber Director.</text></paragraph></subsection><subsection id="idba6067fd655e43ff95844a5f2196c0e6"><enum>(b)</enum><header>Appointment</header><text>The Federal Chief Information Security Officer shall be appointed by the President.</text></subsection><subsection id="id83437e5220264bc9a503f64656917a0c"><enum>(c)</enum><header>OMB duties</header><text>The Federal Chief Information Security Officer shall report to the Federal Chief Information Officer and assist the Federal Chief Information Officer in carrying out—</text><paragraph id="idc14f9bf2140941289583946d261e8afb"><enum>(1)</enum><text>every function under this chapter;</text></paragraph><paragraph id="id16e7fe4d4f4845968714645ac4c2eea5"><enum>(2)</enum><text>every function assigned to the Director under title II of the E–Government Act of 2002 (<external-xref legal-doc="usc" parsable-cite="usc/44/3501">44 U.S.C. 3501</external-xref> note; <external-xref legal-doc="public-law" parsable-cite="pl/107/347">Public Law 107–347</external-xref>);</text></paragraph><paragraph id="id523c7ab819fd4db6aa29dd8368bdf746"><enum>(3)</enum><text>other electronic government initiatives consistent with other statutes; and</text></paragraph><paragraph id="id270480046ba849459243506b127e08fd"><enum>(4)</enum><text>other Federal cybersecurity initiatives determined by the Federal Chief Information Officer.</text></paragraph></subsection><subsection id="id5399ec581a1948dda197d0d6c0c800bf"><enum>(d)</enum><header>Additional duties</header><text>The Federal Chief Information Security Officer shall—</text><paragraph id="idd6a0b0a4f4274fd4929d8abf666f674f"><enum>(1)</enum><text>support the Federal Chief Information Officer in overseeing and implementing Federal cybersecurity under the E–Government Act of 2002 (<external-xref legal-doc="public-law" parsable-cite="pl/107/347">Public Law 107–347</external-xref>; 116 Stat. 2899) and other relevant statutes in a manner consistent with law; and</text></paragraph><paragraph id="id166b993dc6334d498c97ddfe8b01fff1"><enum>(2)</enum><text>perform every function assigned to the Director under sections 1321 through 1328 of title 41, United States Code.</text></paragraph></subsection><subsection id="idf27bef0708d24ec39aa2df1bef77de70"><enum>(e)</enum><header>Coordination with ONCD</header><text>The Federal Chief Information Security Officer shall support initiatives determined by the Federal Chief Information Officer necessary to coordinate with the Office of the National Cyber Director.</text></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection><subsection id="ide5d82d999fe34071a160a4f038a30acd"><enum>(b)</enum><header>National cyber director duties</header><text>Section 1752 of the William M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021 (<external-xref legal-doc="usc" parsable-cite="usc/6/1500">6 U.S.C. 1500</external-xref>) is amended—</text><paragraph commented="no" display-inline="no-display-inline" id="id86144cc8965f44e4bed920a2cd3581de"><enum>(1)</enum><text display-inline="yes-display-inline">by redesignating subsection (g) as subsection (h); and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id8b0bd2941a4f45eab104a3669c4d1558"><enum>(2)</enum><text display-inline="yes-display-inline">by inserting after subsection (f) the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="id0d5b835acd5f40b88b1213c48d868b9e"><subsection id="id4257b472c8c945d8a068e7ab587fb647"><enum>(g)</enum><header>Senior Federal Cybersecurity Officer</header><text>The Federal Chief Information Security Officer appointed by the President under section 3617 of title 44, United States Code, shall be a senior official within the Office and carry out duties applicable to the protection of information technology (as defined in section 11101 of title 40, United States Code), including initiatives determined by the Director necessary to coordinate with the Office of the Federal Chief Information Officer.</text></subsection><after-quoted-block>.</after-quoted-block></quoted-block></paragraph></subsection><subsection id="id8460f3bb31be40e78c30aa62a07bfc5b"><enum>(c)</enum><header>Treatment of incumbent</header><text>The individual serving as the Federal Chief Information Security Officer appointed by the President as of the date of the enactment of this Act may serve as the Federal Chief Information Security Officer under section 3617 of title 44, United States Code, as added by this Act, beginning on the date of enactment of this Act, without need for a further or additional appointment under such section.</text></subsection><subsection id="idfd3a325d479445ad8ba22b71037a87cf"><enum>(d)</enum><header>Clerical amendment</header><text display-inline="yes-display-inline">The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/36">chapter 36</external-xref> of title 44, United States Code, is amended by adding at the end the following:</text><quoted-block style="USC" id="idc4e54f06-fa2d-413c-ad54-60c6c0c22f1e"><toc><toc-entry level="section" idref="id633b1770bc42414094b7bcdf441db62e">Sec. 3617. Federal chief information security officer</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection></section><section id="idb7978e50b88147c1866b12b73005fa4f"><enum>20.</enum><header>Renaming office of the Federal Chief Information Officer</header><subsection id="id53de8f8cf39b4c188c994a1b875ca9e3"><enum>(a)</enum><header>Definitions</header><paragraph commented="no" display-inline="no-display-inline" id="idb853238d7a544fba881b0a9472132c0d"><enum>(1)</enum><header>In general</header><text display-inline="yes-display-inline">Section 3601 of title 44, United States Code, is amended—</text><subparagraph id="id9da65cdd54e34296a3c7f9ad6a5b452f"><enum>(A)</enum><text>by striking paragraph (1); and</text></subparagraph><subparagraph id="id5fb6913d1bfa4066b583b4f93cbce598"><enum>(B)</enum><text>by redesignating paragraphs (2) through (8) as paragraphs (1) through (7), respectively.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="id7213d716bbd74621a96086f77fc93cdc"><enum>(2)</enum><header>Conforming amendments</header><subparagraph commented="no" display-inline="no-display-inline" id="idceefe9883a4f4b92aca79551a7a56324"><enum>(A)</enum><header>Title 10</header><text>Section 2222(i)(6) of title 10, United States Code, is amended by striking <quote>section 3601(4)</quote> and inserting <quote>section 3601</quote>.</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="idba592a5e049d44009313131ad26449b2"><enum>(B)</enum><header>National Security Act of 1947</header><text>Section 506D(k)(1) of the National Security Act of 1947 (<external-xref legal-doc="usc" parsable-cite="usc/50/3100">50 U.S.C. 3100(k)(1)</external-xref>) is amended by striking <quote>section 3601(4)</quote> and inserting <quote>section 3601</quote>.</text></subparagraph></paragraph></subsection><subsection id="id4293e083658844549dec2c50aa778202"><enum>(b)</enum><header>Office of electronic government</header><text>Section 3602 of title 44, United States Code, is amended—</text><paragraph id="idde9ef74e8d8949a0a8145c2e135bddf4"><enum>(1)</enum><text>in the heading, by striking <quote><header-in-text style="OLC" level="section">Office of Electronic Government</header-in-text></quote> and inserting <quote><header-in-text style="OLC" level="section">Office of the Federal Chief Information Officer</header-in-text></quote>;</text></paragraph><paragraph id="id9fccd6ecde1d437f8e492aa19a4daef5"><enum>(2)</enum><text>in subsection (a), by striking <quote>Office of Electronic Government</quote> and inserting <quote>Office of the Federal Chief Information Officer</quote>;</text></paragraph><paragraph id="id6d3f99457b254861ad32782f550e5fa1"><enum>(3)</enum><text>in subsection (b), by striking <quote>an Administrator</quote> and inserting <quote>a Federal Chief Information Officer</quote>;</text></paragraph><paragraph id="id4ab08f57d1a14dc5a6e269739346007e"><enum>(4)</enum><text>in subsection (c), in the matter preceding paragraph (1), by striking <quote>The Administrator</quote> and inserting <quote>The Federal Chief Information Officer</quote>;</text></paragraph><paragraph id="id8ea9b33932fc440f8ca304ad47a1e4fd"><enum>(5)</enum><text>in subsection (d), in the matter preceding paragraph (1), by striking <quote>The Administrator</quote> and inserting <quote>The Federal Chief Information Officer</quote>;</text></paragraph><paragraph id="idbe2da095b2a14a12b7a26bdf6a7267c9"><enum>(6)</enum><text>in subsection (e), in the matter preceding paragraph (1), by striking <quote>The Administrator</quote> and inserting <quote>The Federal Chief Information Officer</quote>;</text></paragraph><paragraph id="id2adcc9ac79d14a12a18d248d9b5f9273"><enum>(7)</enum><text>in subsection (f)—</text><subparagraph id="idf936f0e45e804b72993247a7e87de161"><enum>(A)</enum><text>in the matter preceding paragraph (1), by striking <quote>the Administrator</quote> and inserting <quote>the Federal Chief Information Officer</quote>;</text></subparagraph><subparagraph id="id8dd69adf9a26402da4cdaa8a3810e867"><enum>(B)</enum><text>in paragraph (16), by striking <quote>the Office of Electronic Government</quote> and inserting <quote>the Office of the Federal Chief Information Officer</quote>; and</text></subparagraph></paragraph><paragraph id="ide500744f06824d758e472fd8248074da"><enum>(8)</enum><text>in subsection (g), by striking <quote>the Office of Electronic Government</quote> and inserting <quote>the Office of the Federal Chief Information Officer</quote>.</text></paragraph></subsection><subsection id="id14083d2ca2744980be3f3364eece2543"><enum>(c)</enum><header>Chief information officers council</header><text>Section 3603 of title 44, United States Code, is amended—</text><paragraph id="id54b1099631df4ae2b1aa014ba8756983"><enum>(1)</enum><text>in subsection (b)(2), by striking <quote>The Administrator of the Office of Electronic Government</quote> and inserting <quote>The Federal Chief Information Officer</quote>;</text></paragraph><paragraph id="id428bbdfaf5854afeb21bb0e13bcb8d67"><enum>(2)</enum><text>in subsection (c)(1), by striking <quote>The Administrator of the Office of Electronic Government</quote> and inserting <quote>The Federal Chief Information Officer</quote>; and</text></paragraph><paragraph id="id231508e976b7433da7a86346be80e64c"><enum>(3)</enum><text>in subsection (f)—</text><subparagraph id="id3f243704d3f441cf8d9e3e0515045c63"><enum>(A)</enum><text>in paragraph (3), by striking <quote>the Administrator</quote> and inserting <quote>the Federal Chief Information Officer</quote>; and</text></subparagraph><subparagraph id="id1c9370d6e7014100a1acc1bda7ef77ec"><enum>(B)</enum><text>in paragraph (5), by striking <quote>the Administrator</quote> and inserting <quote>the Federal Chief Information Officer</quote>.</text></subparagraph></paragraph></subsection><subsection id="idd989cfa3a7b647279bfa990b40267e59"><enum>(d)</enum><header>E-Government fund</header><text>Section 3604 of title 44, United States Code, is amended—</text><paragraph id="id6af3c57c6a90499da6835406fa2eb004"><enum>(1)</enum><text>in subsection (a)(2), by striking <quote>the Administrator of the Office of Electronic Government</quote> and inserting <quote>the Federal Chief Information Officer</quote>;</text></paragraph><paragraph id="id76cda47f2f894e4f96c270523ede32bc"><enum>(2)</enum><text>in subsection (b), by striking <quote>Administrator</quote> each place it appears and inserting <quote>Federal Chief Information Officer</quote>; and</text></paragraph><paragraph id="idf46ad5c9cd814458b498c52a752f772b"><enum>(3)</enum><text>in subsection (c), in the matter preceding paragraph (1), by striking <quote>the Administrator</quote> and inserting <quote>the Federal Chief Information Officer</quote>.</text></paragraph></subsection><subsection id="idb7928fd4848c4e1996f878569efd6a17"><enum>(e)</enum><header>Program To encourage innovative solutions To enhance electronic government services and processes</header><text>Section 3605 of title 44, United States Code, is amended—</text><paragraph id="id088305f1a541468c81066758905bb3c3"><enum>(1)</enum><text>in subsection (a), by striking <quote>The Administrator</quote> and inserting <quote>The Federal Chief Information Officer</quote>;</text></paragraph><paragraph id="id5e2824fbc937474bad20abb70da095b9"><enum>(2)</enum><text>in subsection (b), by striking <quote>, the Administrator,</quote> and inserting <quote>, the Federal Chief Information Officer,</quote>; and</text></paragraph><paragraph id="id9cf98ab8c9f04a63a6d76e68a903b28d"><enum>(3)</enum><text>in subsection (c)—</text><subparagraph id="id1036c4ecbfb647f0938b3c076b9f125d"><enum>(A)</enum><text>in paragraph (1)—</text><clause id="idb3c7f931fbcc4cba94a90a828745c8d3"><enum>(i)</enum><text>by striking <quote>The Administrator</quote> and inserting <quote>The Federal Chief Information Officer</quote>; and</text></clause><clause id="id4e258683dac343818844ef555c2425cb"><enum>(ii)</enum><text>by striking <quote>proposals submitted to the Administrator</quote> and inserting <quote>proposals submitted to the Federal Chief Information Officer</quote>;</text></clause></subparagraph><subparagraph id="id1450ed90fd164f07bd5d354fd2b9cb48"><enum>(B)</enum><text>in paragraph (2)(B), by striking <quote>the Administrator</quote> and inserting <quote>the Federal Chief Information Officer</quote>; and</text></subparagraph><subparagraph id="id9cb57eec7f70423f823638790cc84a10"><enum>(C)</enum><text>in paragraph (4), by striking <quote>the Administrator</quote> and inserting <quote>the Federal Chief Information Officer</quote>.</text></subparagraph></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="ida5ec09024e7d4b749361e49aafcfa33d"><enum>(f)</enum><header>E-Government report</header><text>Section 3606 of title 44, United States Code, is amended in the section heading by striking <quote><header-in-text style="USC" level="section">E-Government</header-in-text></quote> and inserting <quote><header-in-text style="USC" level="section">Annual</header-in-text></quote>.</text></subsection><subsection id="id9950267f0a714e378919ad05290b77ec"><enum>(g)</enum><header>Treatment of incumbent</header><text display-inline="yes-display-inline">The individual serving as the Administrator of the Office of Electronic Government under section 3602 of title 44, United States Code, as of the date of the enactment of this Act, may continue to serve as the Federal Chief Information Officer commencing as of that date, without need for a further or additional appointment under such section.</text></subsection><subsection id="id38da9f367a8a4a78a95e8465fccca712"><enum>(h)</enum><header>Technical and conforming amendments</header><text display-inline="yes-display-inline">The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/44/36">chapter 36</external-xref> of title 44, United States Code, is amended—</text><paragraph id="id482469d612034c94ab6561d01741ea27"><enum>(1)</enum><text>by striking the item relating to section 3602 and inserting the following:</text><quoted-block style="OLC" display-inline="no-display-inline" id="idDFE267394FD743ABBE8DA626C8C74B24"><toc><toc-entry level="section" bold="off">3602. Office of the Federal Chief Information Officer.</toc-entry></toc><after-quoted-block>; and</after-quoted-block></quoted-block></paragraph><paragraph id="id1dae7a113fd74fe0afbb71039e90e0d1"><enum>(2)</enum><text>in the item relating to section 3606, by striking <quote>E–Government</quote> and inserting <quote>Annual</quote>.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="id2d07c3fddc5c4a19a992fd3184c68658"><enum>(i)</enum><header>References</header><paragraph commented="no" display-inline="no-display-inline" id="id3ee88a6a0b6e4400b3aba5918bf4e5b7"><enum>(1)</enum><header>Administrator</header><text display-inline="yes-display-inline">Any reference to the Administrator of the Office of Electronic Government in any law, regulation, map, document, record, or other paper of the United States shall be deemed to be a reference to the Federal Chief Information Officer.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="ida01e4f51dce9479b93fdd5700d4c5792"><enum>(2)</enum><header>Office of Electronic Government</header><text>Any reference to the Office of Electronic Government in any law, regulation, map, document, record, or other paper of the United States shall be deemed to be a reference to the Office of the Federal Chief Information Officer.</text></paragraph></subsection></section><section id="ide8b06eab778a467eace212631f530b4f"><enum>21.</enum><header>Rules of construction</header><subsection id="id11092f632a2a4133a2e1e0052b158abb"><enum>(a)</enum><header>Agency actions</header><text>Nothing in this Act, or an amendment made by this Act, shall be construed to authorize the head of an agency to take an action that is not authorized by this Act, an amendment made by this Act, or existing law.</text></subsection><subsection id="id126cf4024f4c444daf8622e587c49ef8"><enum>(b)</enum><header>Protection of rights</header><text>Nothing in this Act, or an amendment made by this Act, shall be construed to permit the violation of the rights of any individual protected by the Constitution of the United States, including through censorship of speech protected by the Constitution of the United States or unauthorized surveillance.</text></subsection></section></legis-body></bill> 

