<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="HFE5AE383B3BC4EA7A5A0C56255A4B2EF" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>119 HR 8710 IH: National Defense Data Resilience Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2026-05-07</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">119th CONGRESS</congress><session display="yes">2d Session</session><legis-num display="yes">H. R. 8710</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20260507">May 7, 2026</action-date><action-desc><sponsor name-id="S001230">Mr. Subramanyam</sponsor> (for himself and <cosponsor name-id="M001218">Mr. McCormick</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HAS00">Committee on Armed Services</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To amend title 10, United States Code, to require the Secretary of Defense to implement resilient capabilities to recover critical Department of Defense data in the event such data is lost, degraded, or destroyed, and for other purposes.</official-title></form><legis-body id="H04C1B3F29EE74DD4A87418CA6F5ACF30" style="OLC"> 
<section id="HE8559548E7D74B4DAB4DD868C8240E70" section-type="section-one"><enum>1.</enum><header>Short title</header>
 <text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>National Defense Data Resilience Act</short-title></quote>.</text></section>
<section id="H2824B02528F7491280479891931409F5"><enum>2.</enum><header>Data recovery requirements and strategy</header> 
<subsection id="HC3CE87691F6B4D218CFE7BA8813AA52C"><enum>(a)</enum><header>Data recovery requirements</header><text><external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/10/19">Chapter 19</external-xref> of title 10, United States Code, is amended by inserting after <external-xref legal-doc="usc" parsable-cite="usc/10/391b">section 391b</external-xref> the following new section:</text> <quoted-block style="USC" id="HE65CACE76C184EF59BAE9C5A7DAE27FB" display-inline="no-display-inline"> <section id="HA89AF1B2DEA54C1DB7EE0A076C94FCE9"><enum>391c.</enum><header>Data recovery requirements</header> <subsection id="HD802C3232E19407D911C0B16BD586D9E"><enum>(a)</enum><header>Mandatory recovery time objectives</header> <paragraph id="H4170373A0D3445D9BF5F6B574F37BE50"><enum>(1)</enum><text display-inline="yes-display-inline">The Secretary of Defense shall, with respect to each element of the Department of Defense, carry out the following:</text> 
<subparagraph id="H007A68F848044E8F92F3A7D2AC257B38"><enum>(A)</enum><text>Designate data as one of the following types, as applicable:</text> <clause id="HF1BF01445D114F27BE23BE20D4D27B5A" commented="no"><enum>(i)</enum><text>Critical data.</text></clause> 
<clause id="H600FA688A17742C7A2DF18C841C478B2" commented="no"><enum>(ii)</enum><text display-inline="yes-display-inline">Important data.</text></clause> <clause id="H72E5FCABAF78483A8D6A8C4229C08A6C" commented="no"><enum>(iii)</enum><text>Necessary data.</text></clause></subparagraph> 
<subparagraph id="H60B624C20C8E4103A2221DBF5B30BE9E"><enum>(B)</enum><text display-inline="yes-display-inline">Not later than 180 days after the date of the enactment of this section, establish mandatory recovery time objectives for data so designated as critical data.</text></subparagraph> <subparagraph id="H231F6095764641BEA16F8A900FCBF8F4"><enum>(C)</enum><text>Not later than 270 days after the date of the enactment of this section, establish mandatory recovery time objectives for data so designated as important data or necessary data.</text></subparagraph></paragraph> 
<paragraph id="H2E0DE48393EB462EB3349C7521DC1E3F"><enum>(2)</enum><text>Each recovery time objective established under paragraph (1) shall satisfy the following requirements:</text> <subparagraph id="HCA94BCC39FC5450CA80A2F25AC3722F2"><enum>(A)</enum><text>Be based upon the type of data to which such objective applies, including with respect to threat exposure.</text></subparagraph> 
<subparagraph id="HF44577C273F64FC087ACF1F37B6E5EBB"><enum>(B)</enum><text>Be updated in response to intelligence on evolving threats from state and non-state actors, including the People’s Republic of China.</text></subparagraph></paragraph> <paragraph id="HBE78C791005543439754E43A4C6648EB"><enum>(3)</enum><text>Not later than one year after the date of the enactment of this section and annually thereafter, the Secretary of Defense shall, for each element of the Department of Defense, submit to the congressional defense committees an auditable recovery certification report that includes information relating to the following:</text> 
<subparagraph id="H187C69D236CC4000A81C851519B7C84E"><enum>(A)</enum><text>Each recovery time objective that is established under paragraph (1) and applies to such element.</text></subparagraph> <subparagraph id="H8CC02A08E8C3412588EF43C028D4FED8"><enum>(B)</enum><text>Whether such objective satisfies the requirements listed in paragraph (2).</text></subparagraph></paragraph></subsection> 
<subsection id="H4E1E9207BCF643C7A2CF9BA3AA8314D7"><enum>(b)</enum><header>Data recovery capability requirements</header> 
<paragraph id="H9DDF9C6673BA453AB2AB4E873A2F463E"><enum>(1)</enum><text>Not later than 180 days after the date of the enactment of this section, the Secretary of Defense shall, for data designated as critical data pursuant to subparagraph (A) of subsection (a)(1), field data recovery capabilities that satisfy the following requirements:</text> <subparagraph id="HD1F90A4F14B24455B7F84D4CE9A90D7D"><enum>(A)</enum><text>Prioritize providing critical services in support of national defense.</text></subparagraph> 
<subparagraph id="HB071B42159FD4E1A99C79F59E72FB68E"><enum>(B)</enum><text>Include the following:</text> <clause id="HE85BB49874CD4784BA049824C6A2AFBF"><enum>(i)</enum><text>Immutable backups that satisfy the following requirements:</text> 
<subclause id="HDFFF1C244E044BECADB1384B65A5D61C"><enum>(I)</enum><text>Preserve logically separated copies of data.</text></subclause> <subclause id="H518C27EB1B174F088408F72A1605B145"><enum>(II)</enum><text>Are selectively segmented or isolated from external networks by means of software, firewalls, or other controls.</text></subclause></clause> 
<clause id="H7F2A25CA629D453D91411BDECD53459D"><enum>(ii)</enum><text>Continuous monitoring of backup environments to detect tampering, insider threats, and malicious corruption.</text></clause> <clause id="H8C41C393A0F446E1B7E0C650DA61C8D0"><enum>(iii)</enum><text>Annual recovery exercises that simulate sophisticated nation-state cyberattacks designed to cripple data systems.</text></clause> 
<clause id="H313526F0069F4D729F793D18E681D335"><enum>(iv)</enum><text>Audits in which external or internal independent groups mimic tactics, techniques, and procedures of cyberattacks to assess and validate the ability of each element of the Department of Defense to carry out the objectives established under such subsection with respect to realistic threat conditions.</text></clause></subparagraph></paragraph> <paragraph id="HF3DB6274657E4DD89C491287F8542EBB"><enum>(2)</enum><text>Not later than 270 days after the date of the enactment of this section, the Secretary of Defense shall, for data designated as important data or necessary data pursuant to subsection (a)(1)(A), field data recovery capabilities described in paragraph (1).</text></paragraph> </subsection> 
<subsection id="HDFFAAE5D0FB943D58FD8BD84553A9F79"><enum>(c)</enum><header>Approved technology standards</header><text>In fielding a data recovery capability under subsection (b), the Secretary of Defense may not adopt technology unless the following requirements are satisfied:</text> <paragraph id="HF6A8A65D60C24D4B8321F45211B2310F"><enum>(1)</enum><text>Such technology is listed in an inventory of the Department of Defense for certified cybersecurity and data protection technology.</text></paragraph> 
<paragraph id="H6DC004620D404C7A9649F1735D4B251E"><enum>(2)</enum><text>If such technology is technology for recovering or repairing damaged or lost data, such technology provides for the following:</text> <subparagraph id="H3932FD0ADDD64AB48D77C21BB00BC07B"><enum>(A)</enum><text>Immutable storage.</text></subparagraph> 
<subparagraph id="HFC29C689D10E4B0C9423FBB3D4D94B8A"><enum>(B)</enum><text>Robust recovery capabilities.</text></subparagraph> <subparagraph id="H5FD599373D834AA3A05B5C070D9A2380"><enum>(C)</enum><text>Full audit trails.</text></subparagraph> 
<subparagraph id="H4FD7181E3EA54ADCA42DE4E835EFDC4A"><enum>(D)</enum><text>Continuous monitoring for data integrity and anomalous activity.</text></subparagraph></paragraph></subsection> <subsection id="HD77B2C2D5E38472189DEFC4AE62EBF0F"><enum>(d)</enum><header>Definitions</header><text>In this section:</text> 
<paragraph id="HCF975981ADCC409BBE7F85A95C3EEF6D"><enum>(1)</enum><text display-inline="yes-display-inline">The term <term>critical data</term> means data, so vital to the United States, that the incapacity or destruction of such data would have a debilitating impact on security, national economic security, national public health or safety, or any combination thereof.</text></paragraph> <paragraph id="HC2F4ECA0DD134D15A56836DAF2DCBED9"><enum>(2)</enum><text>The term <term>data recovery capability</term> means a technology, process, or governance framework to ensure rapid, secure, and verifiable recovery after a destructive cyberattack.</text></paragraph> 
<paragraph id="HA98ED8930EE347EBBF5642B435921A2C"><enum>(3)</enum><text display-inline="yes-display-inline">The term <term>important data</term> means data that is important to the United States and the incapacity or destruction of such data would have a significant impact on security, national economic security, national public health or safety, or any combination thereof.</text> </paragraph> <paragraph id="H2E996233DFCE421C970905CFF8B241C5"><enum>(4)</enum><text display-inline="yes-display-inline">The term <term>necessary data</term> means data, the incapacity or destruction of which would have a measurable impact on security, national economic security, national public health or safety, or any combination thereof.</text></paragraph> 
<paragraph id="HCA7EFE83BAFF4BF589B96ECF997F1086"><enum>(5)</enum><text>The term <term>recovery time objective</term> means the maximum allowable time the Secretary of Defense determines necessary to restore critical functions and data following a cyberattack.</text></paragraph></subsection></section><after-quoted-block>.</after-quoted-block></quoted-block></subsection> <subsection id="HF6D11518ED6444C5AFFD280095FC728E"><enum>(b)</enum><header>Clerical amendment</header><text display-inline="yes-display-inline">The table of sections for <external-xref legal-doc="usc-chapter" parsable-cite="usc-chapter/10/19">chapter 19</external-xref> of title 10, United States Code, is amended by inserting after the item relating to <external-xref legal-doc="usc" parsable-cite="usc/10/391b">section 391b</external-xref> the following new item:</text> 
<quoted-block style="USC" id="HA63BFF6A4C2F4A74BA1BB4B3FF44C36D" display-inline="no-display-inline"> 
<toc regeneration="no-regeneration"> 
<toc-entry level="section">391c. Data recovery requirements.</toc-entry></toc><after-quoted-block>.</after-quoted-block></quoted-block></subsection> 
<subsection id="H86ACFAD73A2248DCB0FB08C02C0D15CE"><enum>(c)</enum><header>Data recovery strategy</header> 
<paragraph id="HCAB45C02A9084898A50C57A6950E977F"><enum>(1)</enum><text>Not later than 90 days after the date of the enactment of this Act, the Secretary of Defense shall submit to the congressional defense committees a data recovery strategy for the Department of Defense that includes information relating to the following:</text> <subparagraph id="HB714DA6E27354DAF89643595DB41AE24"><enum>(A)</enum><text>Recovery time objectives for such strategy.</text></subparagraph> 
<subparagraph id="HE131039D77FB4229B8B5C821BA1CBCEB"><enum>(B)</enum><text>The technology necessary for such objectives.</text></subparagraph> <subparagraph id="H48A29E1C7FEB41919F37E2DFC3AAF7B9"><enum>(C)</enum><text>Oversight processes with respect to such strategy.</text></subparagraph> 
<subparagraph id="H9D685E899C124CC09C56A70D41B6E7DA"><enum>(D)</enum><text>The funds necessary to carry out such strategy.</text></subparagraph></paragraph> <paragraph id="HB9BE2B0A2AC84F6793B97EF473A9F479"><enum>(2)</enum><text>The strategy under paragraph (1) shall be submitted in unclassified form, but may contain a classified annex.</text></paragraph> 
<paragraph id="H3EA98D22DE584DFF93601DFDC64B95B2"><enum>(3)</enum><text display-inline="yes-display-inline">In this subsection, the term <term>recovery time objective</term> means the maximum allowable time the Secretary of Defense determines necessary to restore critical functions and data following a cyberattack.</text></paragraph></subsection> </section> </legis-body></bill>

