Hawaii 2024 Regular Session

Hawaii Senate Bill SB1478 Compare Versions

OldNewDifferences
1-THE SENATE S.B. NO. 1478 THIRTY-SECOND LEGISLATURE, 2023 S.D. 1 STATE OF HAWAII H.D. 1 A BILL FOR AN ACT RELATING TO OFFENSIVE CYBERSECURITY. BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII:
1+THE SENATE S.B. NO. 1478 THIRTY-SECOND LEGISLATURE, 2023 S.D. 1 STATE OF HAWAII A BILL FOR AN ACT RELATING TO OFFENSIVE CYBERSECURITY. BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII:
22
33 THE SENATE S.B. NO. 1478
44 THIRTY-SECOND LEGISLATURE, 2023 S.D. 1
5-STATE OF HAWAII H.D. 1
5+STATE OF HAWAII
66
77 THE SENATE
88
99 S.B. NO.
1010
1111 1478
1212
1313 THIRTY-SECOND LEGISLATURE, 2023
1414
1515 S.D. 1
1616
1717 STATE OF HAWAII
1818
19-H.D. 1
19+
2020
2121
2222
2323
2424
2525
2626
2727
2828
2929
3030
3131 A BILL FOR AN ACT
3232
3333
3434
3535
3636
3737 RELATING TO OFFENSIVE CYBERSECURITY.
3838
3939
4040
4141
4242
4343 BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII:
4444
4545
4646
47- SECTION 1. Section 27-41.1, Hawaii Revised Statutes, is amended by adding a new definition to be appropriately inserted and to read as follows: ""Office" means the office of enterprise technology services established pursuant to section 27-43." SECTION 2. Section 27-43.5, Hawaii Revised Statutes, is amended to read as follows: "[[]§27-43.5[]] Additional duties of the chief information officer relating to security of government information[.]; offensive cybersecurity program; establishment; reporting. (a) The chief information officer shall provide for periodic security audits of all executive branch departments and agencies regarding the protection of government information and data communication infrastructure. (b) Security audits may include on-site audits as well as reviews of all written security procedures and documented practices. The chief information officer may contract with a private firm or firms that specialize in conducting security audits; provided that information protected from disclosure by federal or state law, including confidential tax information, shall not be disclosed. All executive branch departments, agencies, boards, or commissions subject to the security audits authorized by this section shall fully cooperate with the entity designated to perform the audit. The chief information officer may direct specific remedial actions to mitigate findings of insufficient administrative, technical, and physical controls necessary to protect state government information or data communication infrastructure. (c) There is established within the office an offensive cybersecurity program, which shall: (1) Analyze cybersecurity threats; (2) Evaluate and provide intelligence regarding cybersecurity; (3) Promote cybersecurity awareness, including awareness of social engineering threats; (4) Conduct penetration testing among state and county agencies to evaluate the security of state and county information technology systems; (5) Conduct agent-based security and ensure that assets are being inventoried and managed according to best practices; (6) Use the common vulnerability scoring system to evaluate the severity of vulnerabilities in information technology systems across state and county agencies and prioritize remediation; and (7) Take other proactive measures to ensure increased cybersecurity for state and county agencies. (d) State and county agencies shall disclose to the office an identified or suspected cybersecurity incident that affects the confidentiality, integrity, or availability of information systems, data, or services. Disclosure shall be made expeditiously and without unreasonable delay. Cybersecurity incidents required to be reported include suspected breaches; malware incidents that cause significant damage; denial of service attacks that affect the availability of services; demands for ransom related to a cybersecurity incident or unauthorized disclosure of digital records; instances of identity theft or identity fraud occurring on a state or county agency's information technology system; incidents that require response and remediation efforts that will cost more than $10,000 in equipment, software, and labor; and other incidents the state or county agency deems worthy of communication to the office; provided that: (1) Until a cybersecurity incident is resolved, a state or county agency shall continue to disclose details regarding a cybersecurity incident to the office, including: (A) The number of potentially exposed records; (B) The type of records potentially exposed, including health insurance information, medical information, criminal justice information, regulated information, financial information, and personal information; (C) Efforts the state or county agency is undertaking to mitigate and remediate the damage of the incident to the agency and other affected agencies; and (D) The expected impact of the incident, including: (i) The disruption of the state or county agency's services; (ii) The effect on customers and employees that experienced data or service losses; and (iii) Other concerns that could potentially disrupt or degrade the confidentiality, integrity, or availability of information systems, data, or services that may affect the State or a county; and (2) The legislative and judicial branches may disclose to the office cybersecurity incidents that affect the confidentiality, integrity, or availability of information systems, data, or services. (e) The office shall adopt rules pursuant to chapter 91 regarding the procedures and form in which state and county agencies shall disclose cybersecurity incidents to the office. (f) The office, to the extent possible, shall provide consultation services and other resources to assist state and county agencies and the legislative and judicial branches in responding to and remediating cybersecurity incidents. (g) No later than twenty days prior to the convening of each regular session, the chief information officer shall submit a report to the legislature that includes: (1) All disclosed cybersecurity incidents required pursuant to this section; (2) The status of those cybersecurity incidents; and (3) Any response or remediation taken to mitigate the cybersecurity incidents. The office shall ensure that all reports of disclosed cybersecurity incidents are communicated in a manner that protects victims of cybersecurity incidents, prevents unauthorized disclosure of cybersecurity plans and strategies, and adheres to federal and state laws regarding protection of cybersecurity information. [(c)](h) This section shall not infringe upon responsibilities assigned to the comptroller or the auditor by any state or federal law." SECTION 3. (a) No later than January 1, 2026, the office of enterprise technology services shall: (1) Complete an initial round of penetration testing on the information technology systems of each state and county agency; (2) Assess vulnerabilities within those systems using the common vulnerability scoring system; and (3) Work with state and county agencies to identify and address any vulnerability threats identified having a benchmark score exceeding 3.9 on the common vulnerability scoring system. (b) No later than twenty days prior to the convening of the regular session of 2026, the office of enterprise technology services shall submit a report to the legislature describing the office's progress in meeting the requirements of this section. SECTION 4. There is appropriated out of the general revenues of the State of Hawaii the sum of $ or so much thereof as may be necessary for fiscal year 2023-2024 and the sum of $ or so much thereof as may be necessary for fiscal year 2024-2025 for the software, services, and full-time equivalent ( FTE) permanent positions necessary to establish an offensive cybersecurity program. The sums appropriated shall be expended by the office of enterprise technology services for the purposes of this Act. SECTION 5. Statutory material to be repealed is bracketed and stricken. New statutory material is underscored. SECTION 6. This Act shall take effect on June 30, 3000.
47+ SECTION 1. Section 27-41.1, Hawaii Revised Statutes, is amended by adding a new definition to be appropriately inserted and to read as follows: ""Office" means the office of enterprise technology services established pursuant to section 27-43." SECTION 2. Section 27-43.5, Hawaii Revised Statutes, is amended to read as follows: "[[]§27-43.5[]] Additional duties of the chief information officer relating to security of government information[.]; offensive cybersecurity program; establishment; reporting. (a) The chief information officer shall provide for periodic security audits of all executive branch departments and agencies regarding the protection of government information and data communication infrastructure. (b) Security audits may include on-site audits as well as reviews of all written security procedures and documented practices. The chief information officer may contract with a private firm or firms that specialize in conducting security audits; provided that information protected from disclosure by federal or state law, including confidential tax information, shall not be disclosed. All executive branch departments, agencies, boards, or commissions subject to the security audits authorized by this section shall fully cooperate with the entity designated to perform the audit. The chief information officer may direct specific remedial actions to mitigate findings of insufficient administrative, technical, and physical controls necessary to protect state government information or data communication infrastructure. (c) There is established within the office an offensive cybersecurity program, which shall: (1) Analyze cybersecurity threats; (2) Evaluate and provide intelligence regarding cybersecurity; (3) Promote cybersecurity awareness, including awareness of social engineering threats; (4) Conduct penetration testing among state and county agencies to evaluate the security of state and county information technology systems; (5) Conduct agent-based security and ensure that assets are being inventoried and managed according to best practices; (6) Use the common vulnerability scoring system to evaluate the severity of vulnerabilities in information technology systems across state and county agencies and prioritize remediation; and (7) Take other proactive measures to ensure increased cybersecurity for agencies. (d) State and county agencies shall disclose to the office an identified or suspected cybersecurity incident that affects the confidentiality, integrity, or availability of information systems, data, or services. Disclosure shall be made expediently and without unreasonable delay. Cybersecurity incidents required to be reported include suspected breaches; malware incidents that cause significant damage; denial of service attacks that affect the availability of services; demands for ransom related to a cybersecurity incident or unauthorized disclosure of digital records; instances of identity theft or identity fraud occurring on an agency's information technology system; incidents that require response and remediation efforts that will cost more than $10,000 in equipment, software, and labor; and other incidents the agency deems worthy of communication to the office; provided that: (1) Until a cybersecurity incident is resolved, an agency shall continue to disclose details regarding a cybersecurity incident to the office, including: (A) The number of potentially exposed records; (B) The type of records potentially exposed, including health insurance information, medical information, criminal justice information, regulated information, financial information, and personal information; (C) Efforts the agency is undertaking to mitigate and remediate the damage of the incident to the agency and other affected agencies; and (D) The expected impact of the incident, including: (i) The disruption of the agency's services; (ii) The effect on customers and employees that experienced data or service losses; and (iii) Other concerns that could potentially disrupt or degrade the confidentiality, integrity, or availability of information systems, data, or services that may affect the State or a county; and (2) The legislative and judicial branches may disclose to the office cybersecurity incidents that affect the confidentiality, integrity, or availability of information systems, data, or services. (e) The office shall adopt rules pursuant to chapter 91 regarding the procedures and form in which an agency shall disclose cybersecurity incidents to the office. (f) The office, to the extent possible, shall provide consultation services and other resources to assist agencies and the legislative and judicial branches in responding to and remediating cybersecurity incidents. (g) No later than twenty days prior to the convening of each regular session, the chief information officer shall submit a report to the legislature that includes: (1) All disclosed cybersecurity incidents required pursuant to this section; (2) The status of those cybersecurity incidents; and (3) Any response or remediation to mitigate the cybersecurity incidents. The office shall ensure that all reports of disclosed cybersecurity incidents are communicated in a manner that protects victims of cybersecurity incidents, prevents unauthorized disclosure of cybersecurity plans and strategies, and adheres to federal and state laws regarding protection of cybersecurity information. [(c)](h) This section shall not infringe upon responsibilities assigned to the comptroller or the auditor by any state or federal law." SECTION 3. (a) No later than January 1, 2026, the office of enterprise technology services shall: (1) Complete an initial round of penetration testing on the information technology systems of each agency; (2) Assess vulnerabilities within those systems using the common vulnerability scoring system; and (3) Work with agencies to identify and address any vulnerability threats identified having a benchmark score exceeding 3.9 on the common vulnerability scoring system. (b) No later than twenty days prior to the convening of the regular session of 2026, the office of enterprise technology services shall submit a report to the legislature describing the office's progress in meeting the requirements of this section. SECTION 4. There is appropriated out of the general revenues of the State of Hawaii the sum of $ or so much thereof as may be necessary for fiscal year 2023-2024 and the sum of $ or so much thereof as may be necessary for fiscal year 2024-2025 for the software, services, and full-time equivalent ( FTE) permanent positions necessary to establish an offensive cybersecurity program. The sums appropriated shall be expended by the office of enterprise technology services for the purposes of this Act. SECTION 5. Statutory material to be repealed is bracketed and stricken. New statutory material is underscored. SECTION 6. This Act shall take effect on January 1, 2050.
4848
4949 SECTION 1. Section 27-41.1, Hawaii Revised Statutes, is amended by adding a new definition to be appropriately inserted and to read as follows:
5050
5151 ""Office" means the office of enterprise technology services established pursuant to section 27-43."
5252
5353 SECTION 2. Section 27-43.5, Hawaii Revised Statutes, is amended to read as follows:
5454
5555 "[[]§27-43.5[]] Additional duties of the chief information officer relating to security of government information[.]; offensive cybersecurity program; establishment; reporting. (a) The chief information officer shall provide for periodic security audits of all executive branch departments and agencies regarding the protection of government information and data communication infrastructure.
5656
5757 (b) Security audits may include on-site audits as well as reviews of all written security procedures and documented practices. The chief information officer may contract with a private firm or firms that specialize in conducting security audits; provided that information protected from disclosure by federal or state law, including confidential tax information, shall not be disclosed. All executive branch departments, agencies, boards, or commissions subject to the security audits authorized by this section shall fully cooperate with the entity designated to perform the audit. The chief information officer may direct specific remedial actions to mitigate findings of insufficient administrative, technical, and physical controls necessary to protect state government information or data communication infrastructure.
5858
5959 (c) There is established within the office an offensive cybersecurity program, which shall:
6060
6161 (1) Analyze cybersecurity threats;
6262
6363 (2) Evaluate and provide intelligence regarding cybersecurity;
6464
6565 (3) Promote cybersecurity awareness, including awareness of social engineering threats;
6666
6767 (4) Conduct penetration testing among state and county agencies to evaluate the security of state and county information technology systems;
6868
6969 (5) Conduct agent-based security and ensure that assets are being inventoried and managed according to best practices;
7070
7171 (6) Use the common vulnerability scoring system to evaluate the severity of vulnerabilities in information technology systems across state and county agencies and prioritize remediation; and
7272
73- (7) Take other proactive measures to ensure increased cybersecurity for state and county agencies.
73+ (7) Take other proactive measures to ensure increased cybersecurity for agencies.
7474
75- (d) State and county agencies shall disclose to the office an identified or suspected cybersecurity incident that affects the confidentiality, integrity, or availability of information systems, data, or services. Disclosure shall be made expeditiously and without unreasonable delay. Cybersecurity incidents required to be reported include suspected breaches; malware incidents that cause significant damage; denial of service attacks that affect the availability of services; demands for ransom related to a cybersecurity incident or unauthorized disclosure of digital records; instances of identity theft or identity fraud occurring on a state or county agency's information technology system; incidents that require response and remediation efforts that will cost more than $10,000 in equipment, software, and labor; and other incidents the state or county agency deems worthy of communication to the office; provided that:
75+ (d) State and county agencies shall disclose to the office an identified or suspected cybersecurity incident that affects the confidentiality, integrity, or availability of information systems, data, or services. Disclosure shall be made expediently and without unreasonable delay. Cybersecurity incidents required to be reported include suspected breaches; malware incidents that cause significant damage; denial of service attacks that affect the availability of services; demands for ransom related to a cybersecurity incident or unauthorized disclosure of digital records; instances of identity theft or identity fraud occurring on an agency's information technology system; incidents that require response and remediation efforts that will cost more than $10,000 in equipment, software, and labor; and other incidents the agency deems worthy of communication to the office; provided that:
7676
77- (1) Until a cybersecurity incident is resolved, a state or county agency shall continue to disclose details regarding a cybersecurity incident to the office, including:
77+ (1) Until a cybersecurity incident is resolved, an agency shall continue to disclose details regarding a cybersecurity incident to the office, including:
7878
7979 (A) The number of potentially exposed records;
8080
8181 (B) The type of records potentially exposed, including health insurance information, medical information, criminal justice information, regulated information, financial information, and personal information;
8282
83- (C) Efforts the state or county agency is undertaking to mitigate and remediate the damage of the incident to the agency and other affected agencies; and
83+ (C) Efforts the agency is undertaking to mitigate and remediate the damage of the incident to the agency and other affected agencies; and
8484
8585 (D) The expected impact of the incident, including:
8686
87- (i) The disruption of the state or county agency's services;
87+ (i) The disruption of the agency's services;
8888
8989 (ii) The effect on customers and employees that experienced data or service losses; and
9090
9191 (iii) Other concerns that could potentially disrupt or degrade the confidentiality, integrity, or availability of information systems, data, or services that may affect the State or a county; and
9292
9393 (2) The legislative and judicial branches may disclose to the office cybersecurity incidents that affect the confidentiality, integrity, or availability of information systems, data, or services.
9494
95- (e) The office shall adopt rules pursuant to chapter 91 regarding the procedures and form in which state and county agencies shall disclose cybersecurity incidents to the office.
95+ (e) The office shall adopt rules pursuant to chapter 91 regarding the procedures and form in which an agency shall disclose cybersecurity incidents to the office.
9696
97- (f) The office, to the extent possible, shall provide consultation services and other resources to assist state and county agencies and the legislative and judicial branches in responding to and remediating cybersecurity incidents.
97+ (f) The office, to the extent possible, shall provide consultation services and other resources to assist agencies and the legislative and judicial branches in responding to and remediating cybersecurity incidents.
9898
9999 (g) No later than twenty days prior to the convening of each regular session, the chief information officer shall submit a report to the legislature that includes:
100100
101101 (1) All disclosed cybersecurity incidents required pursuant to this section;
102102
103103 (2) The status of those cybersecurity incidents; and
104104
105- (3) Any response or remediation taken to mitigate the cybersecurity incidents.
105+ (3) Any response or remediation to mitigate the cybersecurity incidents.
106106
107107 The office shall ensure that all reports of disclosed cybersecurity incidents are communicated in a manner that protects victims of cybersecurity incidents, prevents unauthorized disclosure of cybersecurity plans and strategies, and adheres to federal and state laws regarding protection of cybersecurity information.
108108
109109 [(c)](h) This section shall not infringe upon responsibilities assigned to the comptroller or the auditor by any state or federal law."
110110
111111 SECTION 3. (a) No later than January 1, 2026, the office of enterprise technology services shall:
112112
113- (1) Complete an initial round of penetration testing on the information technology systems of each state and county agency;
113+ (1) Complete an initial round of penetration testing on the information technology systems of each agency;
114114
115115 (2) Assess vulnerabilities within those systems using the common vulnerability scoring system; and
116116
117- (3) Work with state and county agencies to identify and address any vulnerability threats identified having a benchmark score exceeding 3.9 on the common vulnerability scoring system.
117+ (3) Work with agencies to identify and address any vulnerability threats identified having a benchmark score exceeding 3.9 on the common vulnerability scoring system.
118118
119119 (b) No later than twenty days prior to the convening of the regular session of 2026, the office of enterprise technology services shall submit a report to the legislature describing the office's progress in meeting the requirements of this section.
120120
121121 SECTION 4. There is appropriated out of the general revenues of the State of Hawaii the sum of $ or so much thereof as may be necessary for fiscal year 2023-2024 and the sum of $ or so much thereof as may be necessary for fiscal year 2024-2025 for the software, services, and full-time equivalent ( FTE) permanent positions necessary to establish an offensive cybersecurity program.
122122
123123 The sums appropriated shall be expended by the office of enterprise technology services for the purposes of this Act.
124124
125125 SECTION 5. Statutory material to be repealed is bracketed and stricken. New statutory material is underscored.
126126
127- SECTION 6. This Act shall take effect on June 30, 3000.
127+ SECTION 6. This Act shall take effect on January 1, 2050.
128128
129- Report Title: Offensive Cybersecurity Program; Office of Enterprise Technology Services; Report; Positions; Appropriation Description: Establishes an offensive cybersecurity program within the office of enterprise technology services to analyze and evaluate cybersecurity threats and increase cybersecurity awareness and education. Establishes a goal for all state and county agencies to identify and address vulnerabilities having a benchmark score exceeding 3.9 on the common vulnerability scoring system by 1/1/2026. Makes appropriations and authorizes the establishment of positions. Requires reports. Effective 6/30/3000. (HD1) The summary description of legislation appearing on this page is for informational purposes only and is not legislation or evidence of legislative intent.
129+
130+
131+ Report Title: Offensive Cybersecurity Program; Office of Enterprise Technology Services; Report; Positions; Appropriation Description: Establishes an offensive cybersecurity program within the Office of Enterprise Technology Services to analyze an evaluate cybersecurity threats and increase cybersecurity awareness and education. Establishes a goal for all state and county agencies to identify and address vulnerabilities having a benchmark score exceeding 3.9 on the Common Vulnerability Scoring System by January 1, 2026. Makes appropriations and authorizes the establishment of positions. Effective 1/1/2050. (SD1) The summary description of legislation appearing on this page is for informational purposes only and is not legislation or evidence of legislative intent.
132+
133+
130134
131135
132136
133137 Report Title:
134138
135139 Offensive Cybersecurity Program; Office of Enterprise Technology Services; Report; Positions; Appropriation
136140
137141
138142
139143 Description:
140144
141-Establishes an offensive cybersecurity program within the office of enterprise technology services to analyze and evaluate cybersecurity threats and increase cybersecurity awareness and education. Establishes a goal for all state and county agencies to identify and address vulnerabilities having a benchmark score exceeding 3.9 on the common vulnerability scoring system by 1/1/2026. Makes appropriations and authorizes the establishment of positions. Requires reports. Effective 6/30/3000. (HD1)
145+Establishes an offensive cybersecurity program within the Office of Enterprise Technology Services to analyze an evaluate cybersecurity threats and increase cybersecurity awareness and education. Establishes a goal for all state and county agencies to identify and address vulnerabilities having a benchmark score exceeding 3.9 on the Common Vulnerability Scoring System by January 1, 2026. Makes appropriations and authorizes the establishment of positions. Effective 1/1/2050. (SD1)
142146
143147
144148
145149
146150
147151
148152
149153 The summary description of legislation appearing on this page is for informational purposes only and is not legislation or evidence of legislative intent.