, (b) Omitted
Security automation and checklists for Government systems
In general
The Director of the National Institute of Standards and Technology shall, as necessary, develop and revise security automation standards, associated reference materials (including protocols), and checklists providing settings and option selections that minimize the security risks associated with each information technology hardware or software system and security tool that is, or is likely to become, widely used within the Federal Government, thereby enabling standardized and interoperable technologies, architectures, and frameworks for continuous monitoring of information security within the Federal Government.
Priorities for development
Excluded systems
The Director of the National Institute of Standards and Technology may exclude from the application of paragraph (1) any information technology hardware or software system or security tool for which such Director determines that the development of a standard, reference material, or checklist is inappropriate because of the infrequency of use of the system, the obsolescence of the system, or the lack of utility or impracticability of developing a standard, reference material, or checklist for the system.
Dissemination of standards and related materials
The Director of the National Institute of Standards and Technology shall ensure that Federal agencies are informed of the availability of any standard, reference material, checklist, or other item developed under this subsection.
Agency use requirements
Federal agency information security programs
In general
Limitation
section 278g–3(a)(3) of this titleParagraph (1) does not apply to any computer hardware or software system for which the National Institute of Standards and Technology does not have responsibility under .
Pub. L. 107–305, § 8116 Stat. 2375Pub. L. 113–274, title II, § 203128 Stat. 2979Pub. L. 113–283, § 2(e)(2)128 Stat. 3086(, , ; , , ; , , .)
Editorial Notes
Codification
section 8 of Pub. L. 107–305section 8 of Pub. L. 107–305section 278h of this titlesection 278h of this titlesection 278q of this titlesection 8 of Pub. L. 107–305section 278g–3 of this titleSection is comprised of . Subsec. (a) of enacted and renumbered former as . Subsec. (b) of amended .
Amendments
Pub. L. 113–2742014—Subsec. (c). amended subsec. (c) generally. Prior to amendment, text related to checklists setting forth settings and option selections that minimize the security risks associated with computer hardware or software systems likely to become widely used within the Federal Government.
Pub. L. 113–283Subsec. (d)(1). , which directed amendment of section 8 of the Cybersecurity Research and Development Act by substituting “section 3554” for “section 3534” in subsec. (d)(1), was executed to this section, which is section 8 of the Cyber Security Research and Development Act, to reflect the probable intent of Congress.