S. ll. To enhance the security and resiliency of the cyber and communications infrastructure of the United States. IN THE SENATE OF THE UNITED STATES



Similar documents
S. ll IN THE SENATE OF THE UNITED STATES A BILL

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

S. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

S AN ACT. To codify an existing operations center for cybersecurity.

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

S. ll IN THE SENATE OF THE UNITED STATES

H. R. ll IN THE HOUSE OF REPRESENTATIVES A BILL

DIVISION N CYBERSECURITY ACT OF 2015

S. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

Legislative Language

DIVISION N CYBERSECURITY ACT OF 2015

H. R. 624 IN THE SENATE OF THE UNITED STATES. APRIL 22, 2013 Received; read twice and referred to the Select Committee on Intelligence AN ACT

TITLE III INFORMATION SECURITY

S To enhance the security and resiliency of the cyber and communications infrastructure of the United States.

Legislative Language

S. 754 AN ACT. Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

H. R IN THE HOUSE OF REPRESENTATIVES

Public Law th Congress An Act

S. ll [Report No. 114 lll]

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

H. R. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

One Hundred Thirteenth Congress of the United States of America

To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

S. ll. To amend the Public Health Service Act with respect to health information technology. IN THE SENATE OF THE UNITED STATES A BILL

S IN THE SENATE OF THE UNITED STATES

[STAFF WORKING DRAFT]

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

How To Clarify The Disclosure Of Information From Prohibited Personnel Practices

S. ll. To improve Federal requirements relating to the development and use of electronic health records technology.

S. ll. To amend the Homeland Security Act of 2002 to secure critical infrastructure against electromagnetic threats, and for other purposes.

No. 33 February 19, The President

S. ll. To protect surface water from contamination by chemical storage facilities, and for other purposes. IN THE SENATE OF THE UNITED STATES

TITLE I STANDARDS DEVELOPMENT ORGANIZATION ADVANCEMENT ACT OF 2004

S [Report No. 113 lll] To improve the provisions relating to the privacy of electronic communications. IN THE SENATE OF THE UNITED STATES

H. R IN THE SENATE OF THE UNITED STATES

S. ll. To improve enforcement efforts related to prescription drug diversion and abuse, and for other purposes. IN THE SENATE OF THE UNITED STATES

1st Session NATIONAL CYBERSECURITY PROTECTION ADVANCEMENT ACT OF 2015

H. R IN THE HOUSE OF REPRESENTATIVES

S. ll IN THE SENATE OF THE UNITED STATES A BILL

SECTION 1. SHORT TITLE.

H. R IN THE HOUSE OF REPRESENTATIVES

H. R To require data brokers to establish procedures to ensure the accuracy of collected personal information, and for other purposes.

One Hundred Twelfth Congress of the United States of America

Securities Whistleblower Incentives and Protection

Internal Revenue Code Amending Bill Introduced

S To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.

H. R [Report No ]

Subtitle B Increasing Regulatory Enforcement and Remedies

Security and Privacy Bill Introduced To Protect Motor Vehicles

How To Codify A Cybersecurity Operations Center

Page 705 TITLE 38 VETERANS BENEFITS 4301 CHAPTER 43 EMPLOYMENT AND REEM- PLOYMENT RIGHTS OF MEMBERS OF THE UNIFORMED SERVICES

H. R IN THE SENATE OF THE UNITED STATES

EXHIBIT C BUSINESS ASSOCIATE AGREEMENT

S. ll. To provide appropriate protection to attorney-client privileged communications and attorney work product. IN THE SENATE OF THE UNITED STATES

Commodity Futures Trading Commission Commodity Whistleblower Incentives and Protection

TITLE I GENERAL PROVISIONS

H. R IN THE SENATE OF THE UNITED STATES

Public Law th Congress An Act

S. ll. To amend the Internal Revenue Code of 1986 to prevent identity theft related tax refund fraud, and for other purposes.

PATIENT SAFETY AND QUALITY IMPROVEMENT ACT OF 2005

S To address voluntary location tracking of electronic communications devices, and for other purposes. IN THE SENATE OF THE UNITED STATES

BUSINESS ASSOCIATE AGREEMENT

In the Senate of the United States, AMENDMENTS:

BUSINESS ASSOCIATE AGREEMENT

S. ll. To prevent online threats to economic creativity and theft of intellectual property, and for other purposes.

S. ll IN THE SENATE OF THE UNITED STATES A BILL

[Discussion Draft] [DISCUSSION DRAFT] MARCH 12, H. R. ll

October 10, Protecting Whistleblowers with Access to Classified Information

September 28, MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

S. ll IN THE SENATE OF THE UNITED STATES A BILL

S. ll. To provide anti-retaliation protections for antitrust whistleblowers. IN THE SENATE OF THE UNITED STATES

AN ACT IN THE COUNCIL OF THE DISTRICT OF COLUMBIA

TITLE XVII GOVERNMENT PAPERWORK ELIMINATION ACT SEC SHORT TITLE. This title may be cited as the Government Paperwork Elimination Act.

H. R. 219 AN ACT. To improve and streamline disaster assistance for Hurricane Sandy, and for other purposes.

1851 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to (1) require a State to report data under subsection

SAMPLE BUSINESS ASSOCIATE AGREEMENT

S AN ACT. Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

One Hundred Thirteenth Congress of the United States of America

H. R AN ACT. Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

BUSINESS ASSOCIATE AGREEMENT

Internal Revenue Code - Section 1.1

BUSINESS ASSOCIATE AGREEMENT

S IN THE SENATE OF THE UNITED STATES

H. R. To amend titles 17 and 18, United States Code, to strengthen the protection of intellectual property, and for other purposes.

S To improve the efficiency, management, and interagency coordination

INSPECTOR GENERAL ACT OF 1978, AS AMENDED

Preservation of longstanding, roles and missions of civilian and intelligence agencies

S. ll. To prevent the proliferation of weapons of mass destruction, to prepare for attacks using weapons of mass destruction, and for other purposes.

TITLE III CROWDFUNDING

47 USC 228. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

SaaS. Business Associate Agreement

H. R [Report No ]

H. R IN THE SENATE OF THE UNITED STATES. JUNE 5, 2012 Received; read twice and referred to the Select Committee on Intelligence AN ACT

TITLE VIII PAYMENT, CLEARING AND SETTLEMENT SUPERVISION

CYBERCRIME LAWS OF THE UNITED STATES

S. 74 IN THE SENATE OF THE UNITED STATES

PUBLIC LAW NOV. 2, 1998 CONSUMER REPORTING EMPLOYMENT CLARIFICATION ACT OF 1998

Contract Work Hours and, Safety Standards Act, as Amended

Business Associate and Data Use Agreement

S To amend the Truth in Lending Act and the Higher Education

Transcription:

1TH CONGRESS 2D SESSION S. ll To enhance the security and resiliency of the cyber and communications infrastructure of the United States. IN THE SENATE OF THE UNITED STATES llllllllll Mr. LIEBERMAN (for himself, Ms. COLLINS, Mr. ROCKEFELLER, and Mrs. FEINSTEIN) introduced the following bill; which was read twice and referred to the Committee on llllllllll A BILL To enhance the security and resiliency of the cyber and communications infrastructure of the United States. 1 2 3 4 5 6 7 Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This Act may be cited as the Cybersecurity Act of. (b) TABLE OF CONTENTS. The table of contents for this Act is as follows: Sec. 1. Short title; table of contents. Sec. 2. Definitions. TITLE I PROTECTING CRITICAL INFRASTRUCTURE Sec. 1. Definitions and responsibilities.

2 Sec. 2. Sector-by-sector cyber risk assessments. Sec. 3. Procedure for designation of covered critical infrastructure. Sec. 4. Sector-by-sector risk-based cybersecurity performance requirements. Sec. 5. Security of covered critical infrastructure. Sec. 6. Sector-specific agencies. Sec. 7. Protection of information. Sec.. Voluntary technical assistance. Sec.. Emergency planning. Sec. 0. International cooperation. Sec. 1. Effect on other laws. TITLE II PROTECTING GOVERNMENT NETWORKS Sec. 1. FISMA Reform. Sec. 2. Management of information technology. Sec. 3. Savings provisions. TITLE III CLARIFYING AND STRENGTHENING EXISTING ROLES AND AUTHORITIES Sec. 301. Consolidation of existing departmental cyber resources and authorities. TITLE IV EDUCATION, RECRUITMENT, AND WORKFORCE DEVELOPMENT Sec. 401. Definitions. Sec. 402. National education and awareness campaign. Sec. 403. National cybersecurity competition and challenge. Sec. 404. Federal cyber scholarship-for-service program. Sec. 405. Assessment of cybersecurity Federal workforce. Sec. 406. Federal cybersecurity occupation classifications. Sec. 407. Training and education. Sec. 40. Cybersecurity incentives. TITLE V RESEARCH AND DEVELOPMENT Sec. 501. Federal cybersecurity research and development. Sec. 502. Homeland security cybersecurity research and development. TITLE VI FEDERAL ACQUISITION RISK MANAGEMENT STRATEGY Sec. 601. Federal acquisition risk management strategy. Sec. 602. Amendments to Clinger-Cohen provisions to enhance agency planning for information security needs. TITLE VII INFORMATION SHARING Sec. 701. Affirmative authority to monitor and defend against cybersecurity threats. Sec. 702. Voluntary disclosure of cybersecurity threat indicators among private entities. Sec. 703. Cybersecurity exchanges. Sec. 704. Voluntary disclosure of cybersecurity threat indicators to a cybersecurity exchange. Sec. 705. Sharing of classified cybersecurity threat indicators. Sec. 706. Limitation on liability and good faith defense for cybersecurity activities.

3 Sec. 707. Construction; Federal preemption. Sec. 70. Definitions. TITLE VIII PUBLIC AWARENESS REPORTS Sec. 01. Findings. Sec. 02. Report on cyber incidents against Government networks. Sec. 03. Reports on prosecution for cybercrime. Sec. 04. Report on research relating to secure domain. Sec. 05. Report on preparedness of Federal courts to promote cybersecurity. Sec. 06. Report on impediments to public awareness. Sec. 07. Report on protecting the electrical grid of the United States. TITLE IX INTERNATIONAL COOPERATION Sec. 01. Definitions. Sec. 02. Findings. Sec. 03. Sense of Congress. Sec. 04. Coordination of international cyber issues within the United States Government. Sec. 05. Consideration of cybercrime in foreign policy and foreign assistance programs. 1 2 3 4 5 6 7 SEC. 2. DEFINITIONS. In this Act: (1) COMMERCIAL INFORMATION TECHNOLOGY PRODUCT. The term commercial information technology product means a commercial item that organizes or communicates information electronically. (2) COMMERCIAL ITEM. The term commercial item has the meaning given the term in section 3 of title 41, United States Code. (3) COVERED CRITICAL INFRASTRUCTURE. The term covered critical infrastructure means a system or asset designated by the Secretary as covered critical infrastructure in accordance with the procedure established under section 3.

4 1 (4) COVERED SYSTEM OR ASSET. The term 2 covered system or asset means a system or asset 3 of covered critical infrastructure. 4 (5) CRITICAL INFRASTRUCTURE. The term 5 critical infrastructure has the meaning given that 6 term in section (e) of the USA PATRIOT Act 7 (42 U.S.C. 55c(e)). (6) DEPARTMENT. The term Department means the Department of Homeland Security. (7) FEDERAL AGENCY. The term Federal agency has the meaning given the term agency in section 3502 of title 44, United States Code. () FEDERAL INFORMATION INFRASTRUC- TURE. The term Federal information infrastructure (A) means information and information systems that are owned, operated, controlled, or licensed for use by, or on behalf of, any Federal agency, including information systems used or operated by another entity on behalf of a Federal agency; and (B) does not include (i) a national security system; or (ii) information and information systems that are owned, operated, controlled,

5 1 or licensed for use by, or on behalf of, the 2 Department of Defense, a military depart- 3 ment, or another element of the intel- 4 ligence community. 5 () INCIDENT. The term incident has the 6 meaning given that term in section 3552 of title 44, 7 United States Code, as added by section 1 of this Act. () INFORMATION INFRASTRUCTURE. The term information infrastructure means the underlying framework that information systems and assets rely on to process, transmit, receive, or store information electronically, including programmable electronic devices and communications networks and any associated hardware, software, or data. () INFORMATION SHARING AND ANALYSIS OR- GANIZATION. The term Information Sharing and Analysis Organization has the meaning given that term in section 2 of the Homeland Security Act of 02 (6 U.S.C. 1). () INFORMATION SYSTEM. The term information system has the meaning given that term in section 3502 of title 44, United States Code. () INSTITUTION OF HIGHER EDUCATION. The term institution of higher education has the

6 1 meaning given that term in section 2 of the High- 2 er Education Act of 65 ( U.S.C. 02). 3 () INTELLIGENCE COMMUNITY. The term 4 intelligence community has the meaning given 5 that term under section 3(4) of the National Secu- 6 rity Act of 47 (50 U.S.C. 401a(4)). 7 () NATIONAL INFORMATION INFRASTRUC- TURE. The term national information infrastructure means information and information systems (A) that are owned, operated, or controlled, in whole or in part, within or from the United States; and (B) that are not owned, operated, controlled, or licensed for use by a Federal agency. () NATIONAL SECURITY SYSTEM. The term national security system has the meaning given that term in section 3552 of title 44, United States Code, as added by section 1 of this Act. () OWNER. The term owner (A) means an entity that owns a covered system or asset; and (B) does not include a company contracted by the owner to manage, run, or operate a covered system or asset, or to provide a specific information technology product or service that is

7 1 2 3 4 5 6 7 used or incorporated into a covered system or asset. () OPERATOR. The term operator (A) means an entity that manages, runs, or operates, in whole or in part, the day-to-day operations of a covered system or asset; and (B) may include the owner of a covered system or asset. () SECRETARY. The term Secretary means the Secretary of Homeland Security. TITLE I PROTECTING CRITICAL INFRASTRUCTURE SEC. 1. DEFINITIONS AND RESPONSIBILITIES. (a) DEFINITIONS. In this title: (1) CYBER RISK. The term cyber risk means any risk to information infrastructure, including physical or personnel risks and security vulnerabilities, that, if exploited or not mitigated, could pose a significant risk of disruption to the operation of information infrastructure essential to the reliable operation of covered critical infrastructure. (2) SECTOR-SPECIFIC AGENCY. The term sector-specific agency means the relevant Federal agency responsible for infrastructure protection activities in a designated critical infrastructure sector

1 or key resources category under the National Infra- 2 structure Protection Plan, or any other appropriate 3 Federal agency identified by the President after the 4 date of enactment of this Act. 5 (b) RESPONSIBILITY OF OWNER. It shall be the re- 6 sponsibility of an owner to comply with the requirements 7 of this Act. SEC. 2. SECTOR-BY-SECTOR CYBER RISK ASSESSMENTS. (a) IN GENERAL. The Secretary, in consultation with entities that own or operate critical infrastructure, the Critical Infrastructure Partnership Advisory Council, and appropriate Information Sharing and Analysis Organizations, and in coordination with the intelligence community, the Department of Defense, the Department of Commerce, sector-specific agencies and other Federal agencies with responsibilities for regulating the security of entities that own or operate critical infrastructure shall (1) not later than 0 days after the date of enactment of this Act, conduct a top-level assessment of the cybersecurity threats, vulnerabilities, risks, and probability of a catastrophic incident across all critical infrastructure sectors to determine which sectors pose the greatest immediate risk, in order to

1 guide the allocation of resources for the implementa- 2 tion of this Act; and 3 (2) beginning with the highest priority sectors 4 identified under paragraph (1), conduct, on an ongo- 5 ing, sector-by-sector basis, cyber risk assessments of 6 the critical infrastructure in a manner that 7 (A) uses state-of-the art threat modeling, simulation, and analysis techniques; (B) incorporates, as appropriate, any exist- ing similar risk assessments; and (C) considers (i) the actual or assessed threat, in- cluding consideration of adversary capabili- ties and intent, intrusion techniques, pre- paredness, target attractiveness, and deter- rence capabilities; (ii) the extent and likelihood of death, injury, or serious adverse effects to human health and safety caused by damage or un- authorized access to critical infrastructure; (iii) the threat to or impact on na- tional security caused by damage or unau- thorized access to critical infrastructure; (iv) the extent to which damage or unauthorized access to critical infrastruc-

1 ture will disrupt the reliable operation of 2 other critical infrastructure; 3 (v) the harm to the economy that 4 would result from damage or unauthorized 5 access to critical infrastructure; 6 (vi) the risk of national or regional 7 catastrophic damage within the United States caused by damage or unauthorized access to information infrastructure lo- cated outside the United States; (vii) the overall preparedness and re- silience of each sector against damage or unauthorized access to critical infrastruc- ture, including the effectiveness of market forces at driving security innovation and secure practices; and (viii) any other risk-based security factors appropriate and necessary to pro- tect public health and safety, critical infra- structure, or national and economic secu- rity. (b) INPUT OF OWNERS AND OPERATORS. (1) IN GENERAL. The Secretary shall (A) establish a process under which entities that own or operate critical infrastructure

1 and other relevant private sector experts pro- 2 vide input into the risk assessments conducted 3 under this section; and 4 (B) seek and incorporate private sector ex- 5 pertise available through established public-pri- 6 vate partnerships, including the Critical Infra- 7 structure Partnership Advisory Council and ap- propriate Information Sharing and Analysis Or- ganizations. (2) PROTECTION OF INFORMATION. Any infor- mation submitted as part of the process established under paragraph (1) shall be protected in accord- ance with section 7. (c) METHODOLOGIES FOR ASSESSING INFORMATION SECURITY RISK. The Secretary and the Director of the National Institute of Standards and Technology, in consultation with entities that own or operate critical infrastructure and relevant private sector and academic experts, shall (1) develop repeatable, qualitative, and quantitative methodologies for assessing information security risk; or (2) use methodologies described in paragraph (1) that are in existence on the date of enactment

1 of this Act and make the methodologies publicly 2 available. 3 (d) SUBMISSION OF RISK ASSESSMENTS. The Sec- 4 retary shall submit each risk assessment conducted under 5 this section, in a classified or unclassified form as nec- 6 essary, to 7 (1) the President; (2) appropriate Federal agencies; and (3) appropriate congressional committees. SEC. 3. PROCEDURE FOR DESIGNATION OF COVERED CRITICAL INFRASTRUCTURE. (a) RESPONSIBILITY FOR DESIGNATION OF COVERED CRITICAL INFRASTRUCTURE. (1) IN GENERAL. The Secretary, in consultation with entities that own or operate critical infrastructure, the Critical Infrastructure Partnership Advisory Council, appropriate Information Sharing and Analysis Organizations, and other appropriate representatives of State and local governments, shall establish a procedure for the designation of critical infrastructure, on a sector-by-sector basis, as covered critical infrastructure for the purposes of this Act. (2) DUTIES. In establishing the procedure under paragraph (1), the Secretary shall

1 (A) prioritize the efforts of the Depart- 2 ment based on the prioritization established 3 under section 2(a)(1); 4 (B) incorporate, to the extent practicable, 5 the input of entities that own or operate critical 6 infrastructure, the Critical Infrastructure Part- 7 nership Advisory Council, appropriate Informa- tion Sharing and Analysis Organizations, and other appropriate representatives of the private sector and State and local governments; (C) coordinate with the head of the sector- specific agency with responsibility for critical infrastructure and the head of any Federal agency with responsibilities for regulating the security of critical infrastructure; (D) develop a mechanism for owners to submit information to assist the Secretary in making determinations under this section; and (E) periodically, but not less often than annually, review and update designations under this section. (b) DESIGNATION OF COVERED CRITICAL INFRA- STRUCTURE.

1 (1) GUIDELINES FOR DESIGNATION. In desig- 2 nating covered critical infrastructure for the pur- 3 poses of this Act, the Secretary shall 4 (A) designate covered critical infrastruc- 5 ture on a sector-by-sector basis and at the sys- 6 tem or asset level; 7 (B) inform owners of the criteria used to identify covered critical infrastructure; (C) only designate a system or asset as covered critical infrastructure if damage or un- authorized access to that system or asset could reasonably result in (i) the interruption of life-sustaining services, including energy, water, transpor- tation, emergency services, or food, suffi- cient to cause (I) a mass casualty event that in- cludes an extraordinary number of fa- talities; or (II) mass evacuations with a pro- longed absence; (ii) catastrophic economic damage to the United States including

1 (I) failure or substantial disrup- 2 tion of a United States financial mar- 3 ket; 4 (II) incapacitation or sustained 5 disruption of a transportation system; 6 or 7 (III) other systemic, long-term damage to the United States economy; or (iii) severe degradation of national se- curity or national security capabilities, in- cluding intelligence and defense functions; and (D) consider the sector-by-sector risk as- sessments developed in accordance with section 2. (2) LIMITATIONS. The Secretary may not des- ignate as covered critical infrastructure under this section (A) a system or asset based solely on ac- tivities protected by the first amendment to the Constitution of the United States; (B) an information technology product or service based solely on a finding that the prod-

1 uct or service is capable of, or is actually, being 2 used in covered critical infrastructure; 3 (C) a commercial information technology 4 product, including hardware and software; or 5 (D) any service provided in support of a 6 product specified in subparagraph (C), includ- 7 ing installation services, maintenance services, repair services, training services, and any other services provided in support of the product. (3) NOTIFICATION OF IDENTIFICATION OF SYS- TEM OR ASSET. Not later than 30 days after the Secretary designates a system or asset as covered critical infrastructure under this section, the Secretary shall notify the owner of the system or asset that was designated and the basis for the designation. (4) SELF-DESIGNATION OF SYSTEM OR ASSET AS COVERED CRITICAL INFRASTRUCTURE. The owner of a system or asset may request that the system or asset be designated as covered critical infrastructure under this section if the owner determines that the system or asset meets the criteria for designation. (5) SYSTEM OR ASSET NO LONGER COVERED CRITICAL INFRASTRUCTURE.

1 (A) IN GENERAL. If the Secretary deter- 2 mines that any system or asset that was des- 3 ignated as covered critical infrastructure under 4 this section no longer constitutes covered crit- 5 ical infrastructure, the Secretary shall promptly 6 notify the owner of that system or asset of that 7 determination. (B) SELF-DESIGNATION. If an owner de- termines that an asset or system previously self-designated as covered critical infrastructure under paragraph (4) no longer meets the cri- teria for designation, the owner shall notify the Secretary of this determination and submit to the redress process under subsection (c). (6) DEFINITION. In this subsection, the term damage has the meaning given that term in sec- tion 30(e) of title, United States Code. (c) REDRESS. (1) IN GENERAL. Subject to paragraphs (2) and (3), the Secretary shall develop a mechanism, consistent with subchapter II of chapter 5 of title 5, United States Code, for an owner notified under subsection (b)(3) or for an owner that self-designates under subsection (b)(4) to request that the Secretary review

1 (A) the designation of a system or asset as 2 covered critical infrastructure; 3 (B) the rejection of the self-designation of 4 an owner of a system or asset as covered crit- 5 ical infrastructure; or 6 (C) a determination under subsection 7 (b)(5)(b). (2) APPEAL TO FEDERAL COURT. A civil ac- tion seeking judicial review of a final agency action taken under the mechanism developed under para- graph (1) shall be filed in the United States District Court for the District of Columbia. (3) COMPLIANCE. An owner shall comply with this title relating to covered critical infrastructure until such time as the critical infrastructure is no longer designated as covered critical infrastructure, based on (A) an appeal under paragraph (1); (B) a determination of the Secretary unre- lated to an appeal; or (C) a final judgment entered in a civil ac- tion seeking judicial review brought in accord- ance with paragraph (2).

1 2 3 4 5 6 7 SEC. 4. SECTOR-BY-SECTOR RISK-BASED CYBERSECURITY PERFORMANCE REQUIREMENTS. (a) PURPOSE. The purpose of this section is to secure the critical infrastructure of the Nation while promoting and protecting private sector innovation in design and development of technology for the global market for commercial information technology products, including hardware and software and related products and services. (b) PERFORMANCE REQUIREMENTS. The Secretary, in consultation with owners and operators, the Critical Infrastructure Partnership Advisory Council, and appropriate Information Sharing and Analysis Organizations, and in coordination with the National Institute of Standards and Technology, the Director of the National Security Agency, sector-specific agencies, appropriate representatives from State and local governments, and other Federal agencies with responsibilities for regulating the security of covered critical infrastructure, shall identify or develop, on a sector-by-sector basis, risk-based cybersecurity performance requirements (referred to in this section as performance requirements ) that (1) require owners to remediate or mitigate identified cyber risks and any associated consequences identified under section 2(a) or otherwise; and

1 (2) do not permit any Federal employee or 2 agency to 3 (A) regulate commercial information tech- 4 nology products, including hardware and soft- 5 ware and related services, including installation 6 services, maintenance services, repair services, 7 training services, and any other services pro- vided in support of the product; (B) require commercial information tech- nology products, including hardware and soft- ware and related services, for use or non-use in covered critical infrastructure; or (C) regulate the design, development, man- ufacturing, or attributes of commercial informa- tion technology products, including hardware and software and related services, for use or non-use in covered critical infrastructure. (c) LIMITATION. If the Secretary determines that there are regulations in effect on the date of enactment of this Act that apply to covered critical infrastructure and that address some or all of the risks identified under sec- tion 2, the Secretary shall identify or develop perform- ance requirements under this section only if the regula- tions do not require an appropriate level of security.

1 2 3 4 5 6 7 (d) IDENTIFICATION AND DEVELOPMENT OF PER- FORMANCE REQUIREMENTS. In establishing the per- formance requirements under this section, the Secretary shall (1) establish a process for entities that own or operate critical infrastructure, voluntary consensus standards development organizations, representatives of State and local government, and the private sector, including sector coordinating councils and appropriate Information Sharing and Analysis Organizations to propose performance requirements; (2) identify existing industry practices, standards, and guidelines; and (3) select and adopt performance requirements submitted under paragraph (1) or identified under paragraph (2) that satisfy other provisions of this section. (e) REQUIREMENT. If the Secretary determines that none of the performance requirements submitted or identified under paragraphs (1) and (2) of subsection (d) satisfy the other provisions of this section, the Secretary shall, in consultation with owners and operators, the Critical Infrastructure Partnership Advisory Council, and appropriate Information Sharing and Analysis Organizations, and in coordination with the National Institute of Stand-

1 ards and Technology, the Director of the National Secu- 2 rity Agency, sector-specific agencies, and other Federal 3 agencies with responsibilities for regulating the security 4 of covered critical infrastructure, develop satisfactory per- 5 formance requirements. 6 7 (f) EXEMPTION AUTHORITY. (1) IN GENERAL. The President, in consultation with the Director of the Office of Management and Budget, may exempt an appropriate part of covered critical infrastructure from the requirements of this title if the President determines that a sectorspecific regulatory agency has sufficient specific requirements and enforcement mechanisms to effectively mitigate the risks identified under section 2. (2) RECONSIDERATION. The President may reconsider any exemption under paragraph (1) as appropriate. (g) CONSIDERATION. The Secretary, in establishing performance requirements under this section, shall take into consideration available resources and anticipated consequences of a cyber attack. SEC. 5. SECURITY OF COVERED CRITICAL INFRASTRUC- TURE. (a) IN GENERAL. Not later than 1 year after the date of enactment of this Act, the Secretary, in consulta-

1 tion with owners and operators, and the Critical Infra- 2 structure Partnership Advisory Council, and in coordina- 3 tion with sector-specific agencies and other Federal agen- 4 cies with responsibilities for regulating the security of cov- 5 ered critical infrastructure, shall promulgate regulations 6 to enhance the security of covered critical infrastructure 7 against cyber risks. (b) RESPONSIBILITIES. The regulations promul- gated under this section shall establish procedures under which (1) each owner (A) is regularly informed of cyber risk as- sessments, identified cybersecurity threats, and the risk-based security performance require- ments appropriate to the sector of the owner es- tablished under section 4; (B) selects and implements the cybersecu- rity measures the owner determines to be best suited to satisfy the risk-based cybersecurity performance requirements established under section 4; (C) develop or update continuity of oper- ations and incident response plans; and

1 (D) shall report, consistent with the pro- 2 tections in section 7, significant cyber inci- 3 dents affecting covered critical infrastructure; 4 (2) the Secretary and each Federal agency with 5 responsibilities for regulating the security of covered 6 critical infrastructure, is notified of the security 7 measure or measures selected by an owner in accord- ance with paragraph (1)(B); and (3) the Secretary (A) identifies, in consultation with owners and operators, cyber risks that are not capable of effective remediation or mitigation using available standards, industry practices or other available security measures; (B) provides owners the opportunity to de- velop practices or security measures to reme- diate or mitigate the cyber risks identified in section 2 without the prior approval of the Secretary and without affecting the compliance of the covered critical infrastructure with the requirements under this section; (C) in accordance with applicable law relat- ing to the protection of trade secrets, permits owners and operators to report to the Secretary the development of effective practices or secu-

1 rity measures to remediate or mitigate the 2 cyber risks identified under section 2; and 3 (D) shall develop, in conjunction with the 4 Secretary of Defense and the Director of Na- 5 tional Intelligence and in coordination with 6 owners and operators, a procedure for ensuring 7 that owners and operators are, to the maximum extent practicable and consistent with the pro- tection of sources and methods, informed of rel- evant real-time threat information. (c) ENFORCEMENT. (1) REQUIREMENTS. The regulations promulgated under this section shall establish procedures that (A) require each owner (i) to certify, on an annual basis, in writing to the Secretary and the head of the Federal agency with responsibilities for regulating the security of the covered critical infrastructure whether the owner has developed and effectively implemented security measures sufficient to satisfy the risk-based security performance requirements established under section 4; or

26 1 (ii) to submit a third-party assess- 2 ment in accordance with subsection (d), on 3 an annual basis; 4 (B) provide for civil penalties for any per- 5 son who 6 (i) violates this section; and 7 (ii) fails to remediate such violation in an appropriate timeframe; and (C) do not confer upon any person, except the Federal agency with responsibilities for reg- ulating the security of the covered critical infra- structure and the Secretary, a right of action against an owner or operator to enforce any provision of this section. (2) PROPOSED SECURITY MEASURES. An owner may select any security measures that satisfy the risk-based security performance requirements established under section 4. (3) RECOMMENDED SECURITY MEASURES. Upon request from an owner or operator, the Secretary may recommend a specific security measure that the Secretary believes will satisfy the risk-based security performance requirements established under section 4.

1 2 3 4 5 6 7 27 (4) SECURITY AND PERFORMANCE-BASED EX- EMPTIONS. (A) IN GENERAL. The Secretary shall develop a process for an owner to demonstrate that (i) a covered system or asset is sufficiently secured against the risks identified in section 2; or (ii) compliance with risk-based performance requirements developed under section 4 would not substantially improve the security of the covered system or asset. (B) EXEMPTION AUTHORITY. Upon a determination by the Secretary that a covered system or asset is sufficiently secured against the risks identified in section 2, or that compliance with risk based performance requirements developed under section 4 would not substantially improve the security of the system or asset, the Secretary may not require the owner to select or implement cybersecurity measures or submit an annual certification or third party assessment as required under this Act.

2 1 (C) REQUIREMENT. The Secretary shall 2 require an owner that was exempted under sub- 3 paragraph (B) to demonstrate that the covered 4 system or asset of the owner is sufficiently se- 5 cured against the risks identified in section 6 2, or that compliance with risk based per- 7 formance requirements developed under section 4 would not substantially improve the secu- rity of the system or asset (i) not less than once every 3 years; or (ii) if the Secretary has reason to be- lieve that the covered system or asset no longer meets the exemption qualifications under subparagraph (B). (5) ENFORCEMENT ACTIONS. An action to en- force any regulation promulgated pursuant to this section shall be initiated by (A) the Federal agency with responsibil- ities for regulating the security of the covered critical infrastructure, in consultation with the Secretary; or (B) the Secretary, when (i) the covered critical infrastructure is not subject to regulation by another Federal agency;

2 1 (ii) the head of the Federal agency 2 with responsibilities for regulating the se- 3 curity of the covered critical infrastructure 4 requests the Secretary take such action; or 5 (iii) the Federal agency with respon- 6 sibilities for regulating the security of the 7 covered critical infrastructure fails to ini- tiate such action after a request by the Secretary. (d) ASSESSMENTS. (1) THIRD-PARTY ASSESSMENTS. The regulations promulgated under this section shall establish procedures for third-party private entities to conduct assessments that use reliable, repeatable, performance-based evaluations and metrics to (A) assess the implementation of the selected security measures; (B) assess the effectiveness of the security measure or measures implemented by the owner in satisfying the risk-based security performance requirements established under section 4; (C) require that third party assessors (i) be certified by the Secretary, in consultation with the head of any Federal

30 1 agency with responsibilities for regulating 2 the security of covered critical infrastruc- 3 ture, after completing a proficiency pro- 4 gram established by the Secretary in con- 5 sultation with owners and operators, the 6 Critical Infrastructure Partnership Advi- 7 sory Council, appropriate Information Sharing and Analysis Organizations, and in coordination with the Director of the National Institute of Standards and Tech- nology, and relevant Federal agencies; (ii) undergo regular retraining and certification; (iii) provide the findings of the third party assessors to the owners and opera- tors; and (iv) submit each independent assess- ment to the owner, the Secretary, and to the Federal agency with responsibilities for regulating the security of the covered crit- ical infrastructure. (2) OTHER ASSESSMENTS. The regulations promulgated under this section shall establish proce- dures under which the Secretary

1 2 3 4 5 6 7 31 (A) may perform cybersecurity assessments of selected covered critical infrastructure, in consultation with relevant agencies, based on (i) the specific cyber risks affecting or potentially affecting the information infrastructure of the specific system or asset constituting covered critical infrastructure; (ii) any reliable intelligence or other information indicating a cyber risk to the information infrastructure of the specific system or asset constituting covered critical infrastructure; (iii) actual knowledge or reasonable suspicion that an owner is not in compliance with risk-based security performance requirements established under section 4; or (iv) such other risk-based factors as identified by the Secretary; and (B) may use the resources of any relevant Federal agency with the concurrence of the head of such agency; (C) to the extent practicable uses government and private sector information security assessment programs that were in existence on

32 1 the date of enactment of this Act to conduct as- 2 sessments; and 3 (D) provides copies of any Federal Govern- 4 ment assessments to the owner of the covered 5 system or asset. 6 7 (3) ACCESS TO INFORMATION. (A) IN GENERAL. For the purposes of an assessment conducted under paragraph (1) or (2), an owner or operator shall provide an assessor any reasonable access necessary to complete the assessment. (B) PROTECTION OF INFORMATION. In- formation provided to the Secretary, the Secretary s designee, or any assessor during the course of an assessment under this section shall be protected from disclosure in accordance with section 7. (e) LIMITATIONS ON CIVIL LIABILITY. (1) IN GENERAL. Except as provided in paragraph (2), in any civil action for damages directly caused by an incident related to a cyber risk identified under section 2, an owner or operator shall not be liable for any punitive damages intended to punish or deter if the owner or operator

33 1 (A) has implemented security measures, or 2 a combination thereof, that satisfy the security 3 performance requirements established under 4 section 4; 5 (B) has undergone successful assessments, 6 submitted an annual certification or third party 7 assessment required by subsection (c)(1), or been granted an exemption in accordance with subsection (c)(4); and (C) is in substantial compliance with the appropriate risk based cybersecurity perform- ance requirements at the time of the incident related to that cyber risk. (2) LIMITATION. Paragraph (1) shall only apply to harm directly caused by the incident related to the cyber risk and shall not apply to damages caused by any additional or intervening acts or omis- sions by the owner or operator. SEC. 6. SECTOR-SPECIFIC AGENCIES. (a) IN GENERAL. The head of each sector-specific agency and the head of any Federal agency that is not a sector-specific agency with responsibilities for regulating the security of covered critical infrastructure shall coordinate with the Secretary on any activities of the sectorspecific agency or Federal agency that relate to the efforts

34 1 of the agency regarding the cybersecurity and resiliency 2 to cyber attack of critical infrastructure and covered crit- 3 ical infrastructure, within or under the supervision of the 4 agency. 5 6 7 (b) DUPLICATIVE REPORTING REQUIREMENTS. (1) IN GENERAL. The Secretary shall coordinate with the head of each sector-specific agency and the head of any Federal agency that is not a sectorspecific agency with responsibilities for regulating the security of covered critical infrastructure to determine whether reporting requirements in effect on the date of enactment of this Act substantially fulfill any reporting requirements described in this title. (2) PRIOR REQUIRED REPORTS. If the Secretary determines that a report that was required under a regulatory regime in existence on the date of enactment of this Act substantially satisfies a reporting requirement under this title, the Secretary shall use such report and may not require an owner or operator to submit an additional report. (3) COORDINATION. The Secretary shall coordinate with the head of each sector-specific agency and the head of any Federal agency that is not a sector-specific agency with responsibilities for regulating the security of covered critical infrastructure

35 1 to eliminate any duplicate reporting or compliance 2 requirements relating to the security or resiliency of 3 critical infrastructure and covered critical infrastruc- 4 ture, within or under the supervision of the agency. 5 6 7 (c) REQUIREMENTS. (1) IN GENERAL. To the extent that the head of each sector-specific agency and the head of any Federal agency that is not a sector-specific agency with responsibilities for regulating the security of covered critical infrastructure has the authority to establish regulations, rules, or requirements or other required actions that are applicable to the security of critical infrastructure and covered critical infrastructure, the head of the agency shall (A) notify the Secretary in a timely fashion of the intent to establish the regulations, rules, requirements, or other required actions; (B) coordinate with the Secretary to ensure that the regulations, rules, requirements, or other required actions are consistent with, and do not conflict or impede, the activities of the Secretary under this title; and (C) in coordination with the Secretary, ensure that the regulations, rules, requirements, or other required actions are implemented, as

36 1 they relate to covered critical infrastructure, in 2 accordance with subsection (a). 3 (2) RULE OF CONSTRUCTION. Nothing in this 4 section shall be construed to provide additional au- 5 thority for any sector-specific agency or any Federal 6 agency that is not a sector-specific agency with re- 7 sponsibilities for regulating the security of critical infrastructure or covered critical infrastructure to establish standards or other measures that are appli- cable to the security of critical infrastructure not otherwise authorized by law. SEC. 7. PROTECTION OF INFORMATION. (a) DEFINITION. In this section, the term covered information (1) means (A) any information that constitutes a privileged or confidential trade secret or commercial or financial transaction that is appropriately marked at the time it is provided by entities that own or operate critical infrastructure in sector-by-sector risk assessments conducted under section 2; (B) any information required to be submitted by owners and operators under section 5; and

37 1 (C) any information submitted by State 2 and local governments, private entities, and 3 international partners of the United States re- 4 garding threats, vulnerabilities, risks, and inci- 5 dents affecting 6 (i) the Federal information infrastruc- 7 ture; (ii) information infrastructure that is owned, operated, controlled, or licensed for use by, or on behalf of, the Department of Defense, a military department, or another element of the intelligence community; or (iii) critical infrastructure; and (2) does not include any information described under paragraph (1), if that information is sub- mitted to (A) conceal violations of law, inefficiency, or administrative error; (B) prevent embarrassment to a person, organization, or agency; or (C) interfere with competition in the pri- vate sector. (b) VOLUNTARILY SHARED CRITICAL INFRASTRUC- TURE INFORMATION. Covered information submitted in accordance with this section shall be treated as voluntarily

3 1 shared critical infrastructure information under section 2 4 of the Homeland Security Act (6 U.S.C. 3), except 3 that the requirement of such section 4 that the informa- 4 tion be voluntarily submitted, including the requirement 5 for an express statement, shall not be required for protec- 6 tion of information under this section to apply. 7 (c) GUIDELINES. (1) IN GENERAL. Subject to paragraph (2), the Secretary shall develop and issue guidelines, in consultation with the Attorney General and the Critical Infrastructure Partnership Advisory Council, appropriate Information Sharing and Analysis Organizations, as necessary to implement this section. (2) REQUIREMENTS. The guidelines developed under this section shall (A) include provisions for the sharing of information among governmental and nongovernmental officials and entities in furtherance of carrying out the authorities and responsibilities of the Secretary; (B) be consistent, to the maximum extent possible, with policy guidance and implementation standards developed by the National Archives and Records Administration for controlled unclassified information, including with

3 1 respect to marking, safeguarding, dissemina- 2 tion, and dispute resolution; and 3 (C) describe, with as much detail as pos- 4 sible, the categories and type of information en- 5 tities should voluntarily submit. 6 7 (d) PROCESS FOR REPORTING SECURITY THREATS, VULNERABILITIES, RISKS, AND INCIDENTS. (1) ESTABLISHMENT OF PROCESS. The Secretary shall establish through regulation, and provide information to the public regarding, a process by which any person may submit a report to the Secretary regarding cybersecurity threats, vulnerabilities, risks, and incidents affecting (A) the Federal information infrastructure; (B) information infrastructure that is owned, operated, controlled, or licensed for use by, or on behalf of, the Department of Defense, a military department, or another element of the intelligence community; or (C) critical infrastructure. (2) ACKNOWLEDGMENT OF RECEIPT. If a report submitted under paragraph (1) includes the identity of the person making the report, the Secretary shall respond promptly to the person and acknowledge receipt of the report.

40 1 (3) STEPS TO ADDRESS PROBLEM. Consistent 2 with existing authority, the Secretary shall review 3 and consider the information provided in any report 4 submitted under paragraph (1) and, at the sole, 5 unreviewable discretion of the Secretary, determine 6 what, if any, steps are necessary or appropriate to 7 address any threats, vulnerabilities, risks, and inci- dents identified. (4) DISCLOSURE OF IDENTITY. (A) IN GENERAL. Except as provided in subparagraph (B), or with the written consent of the person, the Secretary may not disclose the identity of a person who has provided information described in paragraph (1). (B) REFERRAL TO THE ATTORNEY GEN- ERAL. (i) IN GENERAL. The Secretary shall disclose to the Attorney General the identity of a person who has provided information described in paragraph (1) if the matter is referred to the Attorney General for enforcement. (ii) NOTICE. The Secretary shall provide reasonable advance notice to the person described in clause (i) if disclosure

41 1 of that person s identity is to occur, unless 2 such notice would risk compromising a 3 criminal or civil enforcement investigation 4 or proceeding. 5 (e) RULES OF CONSTRUCTION. Nothing in this sec- 6 tion shall be construed to 7 (1) limit or otherwise affect the right, ability, duty, or obligation of any entity to use or disclose any information of that entity, including in the con- duct of any judicial or other proceeding; (2) prevent the classification of information submitted under this section if that information meets the standards for classification under Execu- tive Order 5, or any successor thereto, or affect measures and controls relating to the protection of classified information as prescribed by Federal stat- ute or under Executive Order 5, or any suc- cessor thereto; (3) limit the right of an individual to make any disclosure (A) protected or authorized under section 02(b)() or 71 of title 5, United States Code; (B) to an appropriate official of informa- tion that the individual reasonably believes evi-

42 1 dences a violation of any law, rule, or regula- 2 tion, gross mismanagement, or substantial and 3 specific danger to public health, safety, or secu- 4 rity, and that is protected under any Federal or 5 State law (other than those referenced in sub- 6 paragraph (A)) that shields the disclosing indi- 7 vidual against retaliation or discrimination for having made the disclosure if such disclosure is not specifically prohibited by law and if such in- formation is not specifically required by Execu- tive order to be kept secret in the interest of national defense or the conduct of foreign af- fairs; or (C) to the Special Counsel, the Inspector General of an agency, or any other employee designated by the head of an agency to receive similar disclosures; (4) prevent the Secretary from using informa- tion required to be submitted under this Act for en- forcement of this title, including enforcement pro- ceedings subject to appropriate safeguards; (5) authorize information to be withheld from Congress, the Comptroller General, or the Inspector General of the Department;

43 1 (6) affect protections afforded to trade secrets 2 under any other provision of law; or 3 (7) create a private right of action for enforce- 4 ment of any provision of this section. 5 6 7 (f) AUDIT. (1) IN GENERAL. Not later than 1 year after the date of enactment of this Act, the Inspector General of the Department shall conduct an audit of the management of information submitted under this section and report the findings to appropriate committees of Congress. (2) CONTENTS. The audit under paragraph (1) shall include assessments of (A) whether the information is adequately safeguarded against inappropriate disclosure; (B) the processes for marking and disseminating the information and resolving any disputes; (C) how the information is used for the purposes of this section, and whether that use is effective; (D) whether information sharing has been effective to fulfill the purposes of this section;

44 1 (E) whether the kinds of information sub- 2 mitted have been appropriate and useful, or 3 overbroad or overnarrow; 4 (F) whether the information protections 5 allow for adequate accountability and trans- 6 parency of the regulatory, enforcement, and 7 other aspects of implementing this title; and (G) any other factors at the discretion of the Inspector General. SEC.. VOLUNTARY TECHNICAL ASSISTANCE. Subject to the availability of resources, in accordance with applicable law relating to the protection of trade secrets, and at the discretion of the Secretary, the Secretary shall provide voluntary technical assistance at the request of an owner or operator of covered critical infrastructure, to assist the owner or operator in meeting the requirements of section 5, including implementing required security or emergency measures, restoring the critical infrastructure in the event of destruction or serious disruption, and developing emergency response plans. SEC.. EMERGENCY PLANNING. (a) EMERGENCY PLANNING. In partnership with owners and operators, the Secretary, in coordination with the heads of sector-specific agencies and the heads of other Federal agencies with responsibilities for regulating the

45 1 security of covered critical infrastructure, shall exercise re- 2 sponse and restoration plans, including plans required 3 under section 5(b) to 4 (1) assess performance and improve the capa- 5 bilities and procedures of government and private 6 sector entities to respond to a major cyber incident; 7 and (2) clarify specific roles, responsibilities, and authorities of government and private sector entities when responding to a major cyber incident. SEC. 0. INTERNATIONAL COOPERATION. (a) IN GENERAL. The Secretary, in coordination with the Secretary of State or the head of the sector-specific agencies and the head of any Federal agency with responsibilities for regulating the security of covered critical infrastructure, shall (1) consistent with the protection of intelligence sources and methods and other sensitive matters, inform the owner or operator of information infrastructure located outside the United States the disruption of which could result in national or regional catastrophic damage within the United States and the government of the country in which the information infrastructure is located of any cyber risks to such information infrastructure; and

46 1 (2) coordinate with the government of the coun- 2 try in which such information infrastructure is lo- 3 cated and, as appropriate, the owner or operator of 4 the information infrastructure regarding the imple- 5 mentation of security measures or other measures to 6 the information infrastructure to mitigate or reme- 7 diate cyber risks. (b) INTERNATIONAL AGREEMENTS. The Secretary, in coordination with the Secretary of State, including in particular with the interpretation of international agree- ments, shall perform the functions prescribed by this sec- tion consistent with applicable international agreements. SEC. 1. EFFECT ON OTHER LAWS. (a) PREEMPTION OF STATE CYBERSECURITY LAWS. This Act shall supersede any statute, provision of a statute, regulation, or rule of a State or political subdivision of a State that expressly requires comparable cybersecurity practices to protect covered critical infrastructure. (b) PRESERVATION OF OTHER STATE LAW. Except as expressly provided in subsection (a) and section 5(e), nothing in this Act shall be construed to preempt the applicability of any other State law or requirement.

47 1 2 3 4 5 6 7 TITLE II PROTECTING GOVERNMENT NETWORKS SEC. 1. FISMA REFORM. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting the following: SUBCHAPTER II INFORMATION SECURITY 3551. Purposes The purposes of this subchapter are to (1) provide a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support Federal operations and assets; (2) recognize the highly networked nature of the Federal computing environment and provide effective governmentwide management of policies, directives, standards, and guidelines, as well as effective and nimble oversight of and response to information security risks, including coordination of information security efforts throughout the Federal civilian, national security, and law enforcement communities; (3) provide for development and maintenance of controls required to protect agency information and information systems and contribute to the over-