Agency
The term “Agency” means the Cybersecurity and Infrastructure Security Agency.
Appropriate congressional committees
Cloud service provider
The term “cloud service provider” means an entity offering products or services related to cloud computing, as defined by the National Institute of Standards and Technology in NIST Special Publication 800–145 and any amendatory or superseding document relating thereto.
Critical infrastructure information
Cyber threat indicator
Cybersecurity purpose
The term “cybersecurity purpose” means the purpose of protecting an information system or information that is stored on, processed by, or transiting an information system from a cybersecurity threat or security vulnerability.
Cybersecurity risk
Cybersecurity threat
In general
Except as provided in subparagraph (B), the term “cybersecurity threat” means an action, not protected by the First Amendment to the Constitution of the United States, on or through an information system that may result in an unauthorized effort to adversely impact the security, availability, confidentiality, or integrity of an information system or information that is stored on, processed by, or transiting an information system.
Exclusion
The term “cybersecurity threat” does not include any action that solely involves a violation of a consumer term of service or a consumer licensing agreement.
Defensive measure
In general
Except as provided in subparagraph (B), the term “defensive measure” means an action, device, procedure, signature, technique, or other measure applied to an information system or information that is stored on, processed by, or transiting an information system that detects, prevents, or mitigates a known or suspected cybersecurity threat or security vulnerability.
Exclusion
Director
The term “Director” means the Director of the Cybersecurity and Infrastructure Security Agency.
Homeland Security Enterprise
The term “Homeland Security Enterprise” means relevant governmental and nongovernmental entities involved in homeland security, including Federal, State, local, and Tribal government officials, private sector representatives, academics, and other policy experts.
Incident
The term “incident” means an occurrence that actually or imminently jeopardizes, without lawful authority, the integrity, confidentiality, or availability of information on an information system, or actually or imminently jeopardizes, without lawful authority, an information system.
Information Sharing and Analysis Organization
Information system
Intelligence community
section 3003(4) of title 50The term “intelligence community” has the meaning given the term in .
Malicious cyber command and control
The term “malicious cyber command and control” means a method for unauthorized remote identification of, access to, or use of, an information system or information that is stored on, processed by, or transiting an information system.
Malicious reconnaissance
1
Managed service provider
The term “managed service provider” means an entity that delivers services, such as network, application, infrastructure, or security services, via ongoing and regular support and active administration on the premises of a customer, in the data center of the entity (such as hosting), or in a third party data center.
Monitor
The term “monitor” means to acquire, identify, or scan, or to possess, information that is stored on, processed by, or transiting an information system.
National cybersecurity asset response activities
National security system
section 11103 of title 40The term “national security system” has the meaning given the term in .
Ransomware attack
Sector Risk Management Agency
The term “Sector Risk Management Agency” means a Federal department or agency, designated by law or Presidential directive, with responsibility for providing institutional knowledge and specialized expertise of a sector, as well as leading, facilitating, or supporting programs and associated activities of its designated critical infrastructure sector in the all hazards environment in coordination with the Department.
Security control
The term “security control” means the management, operational, and technical controls used to protect against an unauthorized effort to adversely affect the confidentiality, integrity, and availability of an information system or its information.
Security vulnerability
The term “security vulnerability” means any attribute of hardware, software, process, or procedure that could enable or facilitate the defeat of a security control.
Sharing
The term “sharing” (including all conjugations thereof) means providing, receiving, and disseminating (including all conjugations of each such terms).
SLTT entity
The term “SLTT entity” means a domestic government entity that is a State government, local government, Tribal government, territorial government, or any subdivision thereof.
Supply chain compromise
The term “supply chain compromise” means an incident within the supply chain of an information system that an adversary can leverage, or does leverage, to jeopardize the confidentiality, integrity, or availability of the information system or the information the system processes, stores, or transmits, and can occur at any point during the life cycle.
Pub. L. 107–296, title XXII, § 2200Pub. L. 117–263, div. G, title LXXI, § 7143(b)(1)136 Stat. 3654(, as added , , .)
Statutory Notes and Related Subsidiaries
Rule of Construction
Pub. L. 117–263, div. G, title LXXI, § 7143(f)136 Stat. 3664