Definition
section 650 of this titleThe term “cybersecurity vulnerability” has the meaning given the term “security vulnerability” in .
Center
There is in the Department a national cybersecurity and communications integration center (referred to in this section as the “Center”) to carry out certain responsibilities of the Director. The Center shall be located in the Cybersecurity and Infrastructure Security Agency. The head of the Center shall report to the Executive Assistant Director for Cybersecurity.
Functions
Composition
In general
Incidents
In the event of an incident, during exigent circumstances the Secretary may grant a Federal or non-Federal entity immediate temporary access to the Center.
Principles
Cyber hunt and incident response teams
In general
Associated metrics
Cybersecurity specialists
After notice to, and with the approval of, the entity requesting action by or technical assistance from the Center, the Secretary may include cybersecurity specialists from the private sector on a cyber hunt and incident response team.
No right or benefit
In general
The provision of assistance or information to, and inclusion in the Center, or any team or activity of the Center, of, governmental or private entities under this section shall be at the sole and unreviewable discretion of the Director.
Certain assistance or information
The provision of certain assistance or information to, or inclusion in the Center, or any team or activity of the Center, of, one governmental or private entity pursuant to this section shall not create a right or benefit, substantive or procedural, to similar assistance or information for any other governmental or private entity.
Automated information sharing
In general
6 U.S.C. 1501The Director, in coordination with industry and other stakeholders, shall develop capabilities making use of existing information technology industry standards and best practices, as appropriate, that support and rapidly advance the development, adoption, and implementation of automated mechanisms for the sharing of cyber threat indicators and defensive measures in accordance with title I of the Cybersecurity Act of 2015 [ et seq.].
Annual report
The Director shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives an annual report on the status and progress of the development of the capabilities described in paragraph (1). Such reports shall be required until such capabilities are fully implemented.
Voluntary information sharing procedures
Procedures
In general
The Center may enter into a voluntary information sharing relationship with any consenting non-Federal entity for the sharing of cyber threat indicators and defensive measures for cybersecurity purposes in accordance with this section. Nothing in this subsection may be construed to require any non-Federal entity to enter into any such information sharing relationship with the Center or any other entity. The Center may terminate a voluntary information sharing relationship under this subsection, at the sole and unreviewable discretion of the Secretary, acting through the Director, for any reason, including if the Center determines that the non-Federal entity with which the Center has entered into such a relationship has violated the terms of this subsection.
National security
The Secretary may decline to enter into a voluntary information sharing relationship under this subsection, at the sole and unreviewable discretion of the Secretary, acting through the Director, for any reason, including if the Secretary determines that such is appropriate for national security.
Voluntary information sharing relationships
Standard agreement
For the use of a non-Federal entity, the Center shall make available a standard agreement, consistent with this section, on the Department’s website.
Negotiated agreement
At the request of a non-Federal entity, and if determined appropriate by the Center, at the sole and unreviewable discretion of the Secretary, acting through the Director, the Department shall negotiate a non-standard agreement, consistent with this section.
Existing agreements
An agreement between the Center and a non-Federal entity that is entered into before , or such an agreement that is in effect before such date, shall be deemed in compliance with the requirements of this subsection, notwithstanding any other provision or requirement of this subsection. An agreement under this subsection shall include the relevant privacy protections as in effect under the Cooperative Research and Development Agreement for Cybersecurity Information Sharing and Collaboration, as of . Nothing in this subsection may be construed to require a non-Federal entity to enter into either a standard or negotiated agreement to be in compliance with this subsection.
Direct reporting
The Secretary shall develop policies and procedures for direct reporting to the Secretary by the Director of the Center regarding significant cybersecurity risks and incidents.
Reports on international cooperation
Not later than 180 days after , and periodically thereafter, the Secretary of Homeland Security shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report on the range of efforts underway to bolster cybersecurity collaboration with relevant international partners in accordance with subsection (c)(8).
Outreach
Cybersecurity outreach
In general
The Secretary may leverage small business development centers to provide assistance to small business concerns by disseminating information on cyber threat indicators, defense measures, cybersecurity risks, incidents, analyses, and warnings to help small business concerns in developing or enhancing cybersecurity infrastructure, awareness of cyber threat indicators, and cyber training programs for employees.
Definitions
section 632 of title 15For purposes of this subsection, the terms “small business concern” and “small business development center” have the meaning given such terms, respectively, under .
Coordinated vulnerability disclosure
The Secretary, in coordination with industry and other stakeholders, may develop and adhere to Department policies and procedures for coordinating vulnerability disclosures.
Protocols to counter certain cybersecurity vulnerabilities
The Director may, as appropriate, identify, develop, and disseminate actionable protocols to mitigate cybersecurity vulnerabilities to information systems and industrial control systems, including in circumstances in which such vulnerabilities exist because software or hardware is no longer supported by a vendor.
Subpoena authority
Definition
Authority
In general
If the Director identifies a system connected to the internet with a specific security vulnerability and has reason to believe such security vulnerability relates to critical infrastructure and affects a covered device or system, and the Director is unable to identify the entity at risk that owns or operates such covered device or system, the Director may issue a subpoena for the production of information necessary to identify and notify such entity at risk, in order to carry out a function authorized under subsection (c)(12).
Limit on information
Liability protections for disclosing providers
section 2703(e) of title 18The provisions of , shall apply to any subpoena issued pursuant to subparagraph (A).
Coordination
In general
If the Director exercises the subpoena authority under this subsection, and in the interest of avoiding interference with ongoing law enforcement investigations, the Director shall coordinate the issuance of any such subpoena with the Department of Justice, including the Federal Bureau of Investigation, pursuant to interagency procedures which the Director, in coordination with the Attorney General, shall develop not later than 60 days after .
Contents
Noncompliance
If any person, partnership, corporation, association, or entity fails to comply with any duly served subpoena issued pursuant to this subsection, the Director may request that the Attorney General seek enforcement of such subpoena in any judicial district in which such person, partnership, corporation, association, or entity resides, is found, or transacts business.
Notice
Not later than seven days after the date on which the Director receives information obtained through a subpoena issued pursuant to this subsection, the Director shall notify any entity identified by information obtained pursuant to such subpoena regarding such subpoena and the identified vulnerability.
Authentication
In general
Any subpoena issued pursuant to this subsection shall be authenticated with a cryptographic digital signature of an authorized representative of the Agency, or other comparable successor technology, that allows the Agency to demonstrate that such subpoena was issued by the Agency and has not been altered or modified since such issuance.
Invalid if not authenticated
Any subpoena issued pursuant to this subsection that is not authenticated in accordance with subparagraph (A) shall not be considered to be valid by the recipient of such subpoena.
Procedures
Limitation on procedures
The internal procedures established pursuant to paragraph (7) may not require an owner or operator of critical infrastructure to take any action as a result of a notice of vulnerability made pursuant to this chapter.
Review of procedures
Publication of information
Annual reports
Publication of the annual reports
The Director shall publish a version of the annual report required under paragraph (11) on the website of the Agency, which shall, at a minimum, include the findings described in clauses (iii), (iv), and (v) of subparagraph (A) of such paragraph.
Prohibition on use of information for unauthorized purposes
Any information obtained pursuant to a subpoena issued under this subsection may not be provided to any other Federal department or agency for any purpose other than a cybersecurity purpose or for the purpose of enforcing a subpoena issued pursuant to this subsection.
Industrial control systems
Coordination on cybersecurity for SLTT entities
11 So in original. There is no par. (2). Coordination
Report
Not later than 1 year after , and every 2 years thereafter, the Secretary shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report on the services and capabilities that the Agency directly and indirectly provides to SLTT entities.
Pub. L. 107–296, title XXII, § 2209Pub. L. 113–282, § 3(a)128 Stat. 3066Pub. L. 114–113, div. N, title II129 Stat. 2957Pub. L. 114–328, div. A, title XVIII, § 1841(b)130 Stat. 2663Pub. L. 115–278, § 2(g)(2)(I)132 Stat. 4178Pub. L. 116–94, div. L, § 102(a)133 Stat. 3089Pub. L. 116–283, div. A, title XVII, § 1716(a)134 Stat. 4094Pub. L. 117–81, div. A, title XV135 Stat. 2054Pub. L. 117–103, div. Y, § 103(a)(1)136 Stat. 1038Pub. L. 117–150, § 2(2)136 Stat. 1295Pub. L. 117–263, div. G, title LXXI, § 7143(b)(2)(D)136 Stat. 3659(, formerly title II, § 227, formerly § 226, as added , , ; renumbered § 227 and amended , §§ 203, 223(a)(3), , , 2963; , , ; renumbered title XXII, § 2209, and amended , (9)(A)(iii), , , 4180; , , ; , , ; , §§ 1541(a), 1542, 1548(c), , , 2056, 2063; , , ; , , ; , , .)
Editorial Notes
References in Text
Pub. L. 114–113, div. N129 Stat. 2936section 1501 of this titleTitle I of the Cybersecurity Act of 2015, referred to in subsecs. (c)(1) and (h)(1), is title I of , , , also known as the Cybersecurity Information Sharing Act of 2015, which is classified generally to subchapter I of chapter 6 of this title. For complete classification of title I to the Code, see Short Title note set out under and Tables.
Pub. L. 107–296116 Stat. 2135This chapter, referred to in subsec. (p)(8), was in the original “this Act”, meaning , , , known as the Homeland Security Act of 2002, which is classified principally to this chapter. For complete classification of this Act to the Code, see Short Title note set out below and Tables.
Codification
section 148 of this titlePub. L. 115–278Section was formerly classified to prior to renumbering by .
Amendments
Pub. L. 117–263, § 7143(b)(2)(D)(i)2022—Subsec. (a). , added subsec. (a) and struck out former subsec. (a) which defined cybersecurity purpose, cybersecurity risk, cyber threat indicator, defensive measure, cybersecurity vulnerability, incident, information sharing and analysis organization, information system, security vulnerability, and sharing.
Pub. L. 117–263, § 7143(b)(2)(D)(ii)Subsec. (b). , inserted “Executive” before “Assistant Director for Cybersecurity”.
Pub. L. 117–150, § 2(2)(A)Subsec. (c)(6). , inserted “operational and” before “timely”.
Pub. L. 117–103Subsec. (c)(13). added par. (13).
Pub. L. 117–263, § 7143(b)(2)(D)(iii)(I)section 3003(4) of title 50Subsec. (d)(1)(A)(iii). , struck out “, as that term is defined under ” after “intelligence community”.
Pub. L. 117–263, § 7143(b)(2)(D)(iii)(II)Subsec. (d)(1)(B)(ii). , substituted “Information Sharing and Analysis Organizations” for “information sharing and analysis organizations”.
Pub. L. 117–150, § 2(2)(B)Subsec. (d)(1)(E). , inserted “, including an entity that collaborates with election officials,” after “governments”.
Pub. L. 117–263, § 7143(b)(2)(D)(iv)Subsec. (e)(1)(E)(ii)(II). , substituted “Information Sharing and Analysis Organizations” for “information sharing and analysis organizations”.
Pub. L. 117–263, § 7143(b)(2)(D)(v)Subsec. (p). , redesignated subsec. (p) relating to coordination on cybersecurity for SLTT entities as (r).
Pub. L. 117–150, § 2(2)(C), added subsec. (p) relating to coordination on cybersecurity for SLTT entities.
Pub. L. 117–263, § 7143(b)(2)(D)(vi)Subsec. (q). , redesignated subsec. (q) relating to report as (s).
Pub. L. 117–150, § 2(2)(C), added subsec. (q) relating to report.
Pub. L. 117–263, § 7143(b)(2)(D)(v)Subsec. (r). , redesignated subsec. (p) relating to coordination on cybersecurity for SLTT entities as (r).
Pub. L. 117–263, § 7143(b)(2)(D)(vi)Subsec. (s). , redesignated subsec. (q) relating to report as (s).
Pub. L. 117–81, § 1542(1)Pub. L. 116–2832021—Subsec. (a). , added par. (4) and redesignated former pars. (4) to (8) (as previously added or redesignated by ) as (5) to (9), respectively.
Pub. L. 116–283, § 1716(a)(1), added pars. (1) and (7) and redesignated former pars. (1) to (5) as (2) to (6), respectively, and former par. (6) as (8).
Pub. L. 117–81, § 1542(2)(A)Subsec. (c)(5)(B), (C). , added subpar. (B), redesignated former subpar. (B) as (C), and inserted in subpar. (C) as redesignated “and mitigation protocols to counter cybersecurity vulnerabilities in accordance with subparagraph (B), as appropriate,” before “with Federal”.
Pub. L. 117–81, § 1548(c)Subsec. (c)(6). , inserted “, which may take the form of continuous monitoring and detection of cybersecurity risks to critical infrastructure entities that own or operate industrial control systems that support national critical functions” after “mitigation, and remediation”.
Pub. L. 117–81, § 1542(2)(B)Subsec. (c)(7)(C). , substituted “share” for “sharing”.
Pub. L. 117–81, § 1542(2)(C)Subsec. (c)(9). , inserted “mitigation protocols to counter cybersecurity vulnerabilities, as appropriate,” after “measures,”.
Pub. L. 116–283, § 1716(a)(2)Subsec. (c)(12). , added par. (12).
Pub. L. 117–81, § 1541(a)(1)Subsec. (e)(1)(I). , added subpar. (I).
oPub. L. 117–81, § 1542(4)ooSubsec. (). , added subsec. (). Former subsec. () redesignated (p) relating to subpoena authority.
Pub. L. 116–283, § 1716(a)(3)o, added subsec. ().
Pub. L. 117–81, § 1542(3)oSubsec. (p). , redesignated subsec. () as (p) relating to subpoena authority.
Pub. L. 117–81, § 1541(a)(2)Subsec. (q). , added subsec. (q) relating to industrial control systems.
Pub. L. 116–94, § 102(a)(1)2019—Subsec. (d)(1)(B)(iv). , inserted “, including cybersecurity specialists” after “entities”.
Pub. L. 116–94, § 102(a)(3)Subsec. (f). , added subsec. (f). Former subsec. (f) redesignated (g).
Pub. L. 116–94, § 102(a)(2)Subsec. (g). , redesignated subsec. (f) as (g). Former subsec. (g) redesignated (h).
Pub. L. 116–94, § 102(a)(4)Subsec. (g)(1), (2). , inserted “, or any team or activity of the Center,” after “Center”.
Pub. L. 116–94, § 102(a)(2)Subsecs. (h) to (n). , redesignated subsecs. (g) to (m) as (h) to (n), respectively.
Pub. L. 115–278, § 2(g)(9)(A)(iii)(I)section 113(a)(1)(H) of this title2018—, substituted “Director” for “Under Secretary appointed under ” wherever appearing.
Pub. L. 115–278, § 2(g)(9)(A)(iii)(II)section 671(5) of this titlesection 131(5) of this titleSubsec. (a)(4). , substituted “” for “”.
Pub. L. 115–278, § 2(g)(9)(A)(iii)(III)Subsec. (b). , inserted at end “The Center shall be located in the Cybersecurity and Infrastructure Security Agency. The head of the Center shall report to the Assistant Director for Cybersecurity.”
Pub. L. 115–278, § 2(g)(9)(A)(iii)(IV)Subsec. (c)(11). , substituted “Emergency Communications Division” for “Office of Emergency Communications”.
lPub. L. 114–328ll2016—Subsecs. (), (m). added subsec. () and redesignated former subsec. () as (m).
Pub. L. 114–113, § 203(1)(A)2015—Subsec. (a)(1) to (5). , (B), added pars. (1) to (3), redesignated former pars. (3) and (4) as (4) and (5), respectively, and struck out former pars. (1) and (2), which defined “cybersecurity risk” and “incident”, respectively.
Pub. L. 114–113, § 203(1)(C)Subsec. (a)(6). –(E), added par. (6).
Pub. L. 114–113, § 203(2)(A)Subsec. (c)(1). , inserted “cyber threat indicators, defensive measures,” before “cybersecurity risks” and “, including the implementation of title I of the Cybersecurity Act of 2015” before semicolon at end.
Pub. L. 114–113, § 203(2)(B)Subsec. (c)(3). , substituted “cyber threat indicators, defensive measures, cybersecurity risks,” for “cybersecurity risks”.
Pub. L. 114–113, § 203(2)(C)Subsec. (c)(5)(A). , substituted “cyber threat indicators, defensive measures, cybersecurity risks,” for “cybersecurity risks”.
Pub. L. 114–113, § 203(2)(D)Subsec. (c)(6). , substituted “cyber threat indicators, defensive measures, cybersecurity risks,” for “cybersecurity risks” and struck out “and” at end.
Pub. L. 114–113, § 203(2)(E)Subsec. (c)(7)(C). , added subpar. (C).
Pub. L. 114–113, § 203(2)(F)Subsec. (c)(8) to (11). , added pars. (8) to (11).
Pub. L. 114–113, § 203(3)(A)(i)Subsec. (d)(1)(B)(i). , substituted “, local, and tribal” for “and local”.
Pub. L. 114–113, § 203(3)(A)(ii)Subsec. (d)(1)(B)(ii). , substituted “, including information sharing and analysis centers;” for “; and”.
Pub. L. 114–113, § 203(3)(A)(iii)Subsec. (d)(1)(B)(iv). , (iv), added cl. (iv).
Pub. L. 114–113, § 203(3)(B)Subsec. (d)(1)(E), (F). –(D), added subpar. (E) and redesignated former subpar. (E) as (F).
Pub. L. 114–113, § 203(4)(A)(i)Subsec. (e)(1)(A). , inserted “cyber threat indicators, defensive measures, and” before “information”.
Pub. L. 114–113, § 203(4)(A)(ii)Subsec. (e)(1)(B). , inserted “cyber threat indicators, defensive measures, and” before “information related”.
Pub. L. 114–113, § 203(4)(A)(iii)Subsec. (e)(1)(F). , substituted “cyber threat indicators, defensive measures, cybersecurity risks,” for “cybersecurity risks” and struck out “and” at end.
Pub. L. 114–113, § 203(4)(A)(iv)Subsec. (e)(1)(G). , substituted “cyber threat indicators, defensive measures, cybersecurity risks, and incidents; and” for “cybersecurity risks and incidents”.
Pub. L. 114–113, § 203(4)(A)(v)Subsec. (e)(1)(H). , added subpar. (H).
Pub. L. 114–113, § 203(4)(B)Subsec. (e)(2). , substituted “cyber threat indicators, defensive measures, cybersecurity risks,” for “cybersecurity risks” and inserted “or disclosure” after “access”.
Pub. L. 114–113, § 203(4)(C)section 142 of this titleSubsec. (e)(3). , inserted “, including by working with the Privacy Officer appointed under to ensure that the Center follows the policies and procedures specified in subsections (b) and (d)(5)(C) of section 105 of the Cybersecurity Act of 2015” before period at end.
lPub. L. 114–113, § 203(5)lSubsecs. (g) to (). , added subsecs. (g) to ().
Statutory Notes and Related Subsidiaries
Rules of Construction
Pub. L. 117–26344 U.S.C. 3502section 7143(f)(1) of Pub. L. 117–263section 650 of this titleNothing in amendment made by to be construed to alter the authorities, responsibilities, functions, or activities of any agency (as such term is defined in ) or officer or employee of the United States on or before , see , set out as a note under .
Pub. L. 116–283, div. A, title XVII, § 1716(b)134 Stat. 4098
Prohibition on new regulatory authority .—
Private entities .—
Pub. L. 113–282, § 8128 Stat. 3072
Prohibition on New Regulatory Authority .—
Private Entities .—
Definitions
Pub. L. 113–282, § 2128 Stat. 3066