44 | | - | BY repealing and reenacting, without amendments, 18 |
---|
45 | | - | Article – Public Utilities 19 |
---|
46 | | - | Section 2–203(a)(1) and 7–213(d) 20 |
---|
47 | | - | Annotated Code of Maryland 21 |
---|
48 | | - | (2020 Replacement Volume and 2023 Supplement) 22 2 HOUSE BILL 1420 |
---|
| 36 | + | BY repealing and reenacting, with amendments, 17 |
---|
| 37 | + | Article – Public Utilities 18 |
---|
| 38 | + | Section 2–203(a)(2), 5–306, and 7–213(a) and (e)(1) 19 |
---|
| 39 | + | Annotated Code of Maryland 20 |
---|
| 40 | + | (2020 Replacement Volume and 2023 Supplement) 21 |
---|
| 41 | + | |
---|
| 42 | + | BY repealing and reenacting, with amendments, 22 |
---|
| 43 | + | Article – State Government 23 |
---|
| 44 | + | Section 9–2901(a) 24 |
---|
| 45 | + | Annotated Code of Maryland 25 |
---|
| 46 | + | (2021 Replacement Volume and 2023 Supplement) 26 |
---|
| 47 | + | |
---|
| 48 | + | BY repealing and reenacting, without amendments, 27 2 HOUSE BILL 1420 |
---|
| 49 | + | |
---|
| 50 | + | |
---|
| 51 | + | Article – State Government 1 |
---|
| 52 | + | Section 9–2901(b) and (j) 2 |
---|
| 53 | + | Annotated Code of Maryland 3 |
---|
| 54 | + | (2021 Replacement Volume and 2023 Supplement) 4 |
---|
| 55 | + | |
---|
| 56 | + | SECTION 1. BE IT ENACTED BY THE GENERAL ASSEMBLY OF MARYLAND, 5 |
---|
| 57 | + | That the Laws of Maryland read as follows: 6 |
---|
| 58 | + | |
---|
| 59 | + | Article – Public Utilities 7 |
---|
| 60 | + | |
---|
| 61 | + | 2–203. 8 |
---|
| 62 | + | |
---|
| 63 | + | (a) (1) The State budget shall provide sufficient money for the Office of 9 |
---|
| 64 | + | People’s Counsel to hire necessary staff in addition to the staff assistance that is provided 10 |
---|
| 65 | + | under § 2–205(c)(2) of this subtitle. 11 |
---|
| 66 | + | |
---|
| 67 | + | (2) The Office of People’s Counsel shall hire: 12 |
---|
| 68 | + | |
---|
| 69 | + | (I) at least one assistant people’s counsel who will focus on 13 |
---|
| 70 | + | environmental issues; AND 14 |
---|
| 71 | + | |
---|
| 72 | + | (II) AT LEAST ONE ASSISTA NT PEOPLE ’S COUNSEL WITH 15 |
---|
| 73 | + | CYBERSECURITY EXPERTISE TO: 16 |
---|
| 74 | + | |
---|
| 75 | + | 1. ADVISE THE PEOPLE’S COUNSEL ON MEASURES TO 17 |
---|
| 76 | + | IMPROVE OVERSIGHT OF THE CYBERSECURITY PRACTICES OF PUBLIC SERVICE 18 |
---|
| 77 | + | COMPANIES; 19 |
---|
| 78 | + | |
---|
| 79 | + | 2. CONSULT WITH THE OFFICE OF SECURITY 20 |
---|
| 80 | + | MANAGEMENT ON CYBERSE CURITY ISSUES RELATE D TO UTILITY REGULAT ION; 21 |
---|
| 81 | + | |
---|
| 82 | + | 3. ASSIST THE OFFICE OF PEOPLE’S COUNSEL IN 22 |
---|
| 83 | + | MONITORING THE MINIM UM SECURITY STANDARD S DEVELOPED UNDER § 5–306 OF 23 |
---|
| 84 | + | THIS ARTICLE; 24 |
---|
| 85 | + | |
---|
| 86 | + | 4. PARTICIPATE IN BRIEF INGS TO DISCUSS 25 |
---|
| 87 | + | CYBERSECURITY PRACTI CES BASED ON: 26 |
---|
| 88 | + | |
---|
| 89 | + | A. APPLICABLE NATIONAL ASSOCIATION OF 27 |
---|
| 90 | + | REGULATORY UTILITY COMMISSIONERS GUIDANCE ; AND 28 |
---|
| 91 | + | |
---|
| 92 | + | B. IMPROVEMENTS TO CYBE RSECURITY PRACTICES 29 |
---|
| 93 | + | RECOMMENDED IN THE C YBERSECURITY ASSESSM ENTS REQUIRED UNDER § 5–306 30 |
---|
| 94 | + | OF THIS ARTICLE; AND 31 |
---|
| 95 | + | HOUSE BILL 1420 3 |
---|
| 96 | + | |
---|
| 97 | + | |
---|
| 98 | + | 5. SUPPORT PUBLIC SERVI CE COMPANIES THAT DO NOT 1 |
---|
| 99 | + | MEET MINIMUM SECURIT Y STANDARDS WITH REM EDIATING VULNERABILI TIES OR 2 |
---|
| 100 | + | ADDRESSING CYBERSECURITY A SSESSMENT FINDINGS . 3 |
---|
| 101 | + | |
---|
| 102 | + | 5–306. 4 |
---|
| 103 | + | |
---|
| 104 | + | (a) (1) In this section[, “zero–trust” means a cybersecurity approach: 5 |
---|
| 105 | + | |
---|
| 106 | + | (1) focused on cybersecurity resource protection; and 6 |
---|
| 107 | + | |
---|
| 108 | + | (2) based on the premise that trust is never granted implicitly but must be 7 |
---|
| 109 | + | continually evaluated.] THE FOLLOWING WORDS HAVE THE MEANINGS IN DICATED. 8 |
---|
| 110 | + | |
---|
| 111 | + | (2) “CRITICAL SOFTWARE ” MEANS ANY SOFTWARE THAT HA S, OR HAS 9 |
---|
| 112 | + | DIRECT SOFTWARE DEPE NDENCIES ON, ONE OR MORE COMPONEN TS WITH AT LEAST 10 |
---|
| 113 | + | ONE OF THE FOLLOWING ATTRIBUTES: 11 |
---|
| 114 | + | |
---|
| 115 | + | (I) THE ABILITY TO RUN WITH ELEVATED PRIVILEGE OR TO 12 |
---|
| 116 | + | MANAGE PRIVILEGES ; 13 |
---|
| 117 | + | |
---|
| 118 | + | (II) DIRECT OR PRIVILEGED ACCESS TO NETWORKING OR 14 |
---|
| 119 | + | COMPUTING RESOURCES ; 15 |
---|
| 120 | + | |
---|
| 121 | + | (III) THE ABILITY TO CONTROL ACCESS TO DATA OR 16 |
---|
| 122 | + | OPERATIONAL TECHNOLO GY; 17 |
---|
| 123 | + | |
---|
| 124 | + | (IV) THE ABILITY TO PERFORM A FUNCTION CRITICAL TO TRUST ; 18 |
---|
| 125 | + | OR 19 |
---|
| 126 | + | |
---|
| 127 | + | (V) THE ABILITY TO OPERA TE OUTSIDE NORMAL TR UST 20 |
---|
| 128 | + | BOUNDARIES WITH PRIV ILEGED ACCESS . 21 |
---|
| 129 | + | |
---|
| 130 | + | (3) “SUPPLY CHAIN RISK ” MEANS A RISK THAT AN ADVERSARY MAY 22 |
---|
| 131 | + | SABOTAGE, MALICIOUSLY INTRODUC E UNWANTED FUNCTION TO, EXTRACT DATA 23 |
---|
| 132 | + | FROM, OR OTHERWISE SUBVERT TH E DESIGN, INTEGRITY, MANUFACTURING , 24 |
---|
| 133 | + | PRODUCTION , DISTRIBUTION, INSTALLATION, OPERATION, MAINTENANCE , 25 |
---|
| 134 | + | DISPOSITION, OR RETIREMENT OF A S YSTEM OR ITEM OF SUP PLY SO AS TO SURVEIL , 26 |
---|
| 135 | + | DENY, DISRUPT, OR OTHERWISE MANIPUL ATE THE FUNCTION , USE, OR OPERATION 27 |
---|
| 136 | + | OF THE SYSTEM OR ITE M OF SUPPLY OR INFOR MATION STORED OR TRA NSMITTED 28 |
---|
| 137 | + | BY OR THROUGH THE SY STEM OR ITEM OF SUPP LY. 29 |
---|
| 138 | + | |
---|
| 139 | + | (4) “ZERO–TRUST” MEANS A CYBERSECURIT Y APPROACH: 30 |
---|
| 140 | + | 4 HOUSE BILL 1420 |
---|
| 141 | + | |
---|
| 142 | + | |
---|
| 143 | + | (I) FOCUSED ON CYBERSECU RITY RESOURCE PROTEC TION; 1 |
---|
| 144 | + | AND 2 |
---|
| 145 | + | |
---|
| 146 | + | (II) BASED ON THE P REMISE THAT TRUST IS NEVER GRANTED 3 |
---|
| 147 | + | IMPLICITLY BUT MUST BE CONTINUALLY EVALU ATED. 4 |
---|
| 148 | + | |
---|
| 149 | + | (b) This section does not apply to a public service company that is: 5 |
---|
| 150 | + | |
---|
| 151 | + | (1) a common carrier; or 6 |
---|
| 152 | + | |
---|
| 153 | + | (2) a telephone company. 7 |
---|
| 154 | + | |
---|
| 155 | + | (c) A public service company shall: 8 |
---|
| 156 | + | |
---|
| 157 | + | (1) adopt and implement cybersecurity standards that are equal to or 9 |
---|
| 158 | + | exceed standards adopted by the Commission; 10 |
---|
| 159 | + | |
---|
| 160 | + | (2) adopt a zero–trust cybersecurity approach for on–premises services and 11 |
---|
| 161 | + | cloud–based services; 12 |
---|
| 162 | + | |
---|
| 163 | + | (3) establish minimum security standards for each operational technology 13 |
---|
| 164 | + | and information technology device based on the level of security risk for each device, 14 |
---|
| 165 | + | including [security risks associated with supply chains] SUPPLY CHAIN RISKS ; and 15 |
---|
| 166 | + | |
---|
| 167 | + | (4) (i) on or before July 1, 2024, and on or before July 1 every other year 16 |
---|
| 168 | + | thereafter, engage a third party to conduct an assessment of operational technology and 17 |
---|
| 169 | + | information technology devices THAT: 18 |
---|
| 170 | + | |
---|
| 171 | + | 1. IS based on: 19 |
---|
| 172 | + | |
---|
| 173 | + | [1.] A. the Cybersecurity and Infrastructure Security 20 |
---|
| 174 | + | Agency’s Cross–Sector Cybersecurity Performance Goals; or 21 |
---|
| 175 | + | |
---|
| 176 | + | [2.] B. a more stringent standard that is based on the 22 |
---|
| 177 | + | National Institute of Standards and Technology security frameworks; and 23 |
---|
| 178 | + | |
---|
| 179 | + | 2. ANALYZES CRITICAL SO FTWARE USED IN THE 24 |
---|
| 180 | + | OPERATIONAL TECHNOLO GY AND INFORMATION T ECHNOLOGY DEVICES ; AND 25 |
---|
| 181 | + | |
---|
| 182 | + | (ii) submit to the Commission AND THE OFFICE OF PEOPLE’S 26 |
---|
| 183 | + | COUNSEL certification of the public service company’s compliance with standards used in 27 |
---|
| 184 | + | the assessments under item (i) of this item. 28 |
---|
| 185 | + | |
---|
| 186 | + | (d) (1) Each public service company shall report, in accordance with the 29 |
---|
| 187 | + | process established under paragraph (2) of this subsection, a cybersecurity incident, 30 HOUSE BILL 1420 5 |
---|
| 188 | + | |
---|
| 189 | + | |
---|
| 190 | + | including an attack on a system being used by the public service company, to the State 1 |
---|
| 191 | + | Security Operations Center in the Department of Information Technology. 2 |
---|
| 192 | + | |
---|
| 193 | + | (2) The State Chief Information Security Officer, in consultation with the 3 |
---|
| 194 | + | Commission, shall establish a process for a public service company to report cybersecurity 4 |
---|
| 195 | + | incidents under paragraph (1) of this subsection, including establishing: 5 |
---|
| 196 | + | |
---|
| 197 | + | (i) the criteria for determining the circumstances under which a 6 |
---|
| 198 | + | cybersecurity incident must be reported; 7 |
---|
| 199 | + | |
---|
| 200 | + | (ii) the manner in which a cybersecurity incident must be reported; 8 |
---|
| 201 | + | and 9 |
---|
| 202 | + | |
---|
| 203 | + | (iii) the time period within which a cybersecurity incident must be 10 |
---|
| 204 | + | reported. 11 |
---|
| 205 | + | |
---|
| 206 | + | (3) The State Security Operations Center shall immediately notify 12 |
---|
| 207 | + | appropriate State and local agencies of a cybersecurity incident reported under this 13 |
---|
| 208 | + | subsection. 14 |
---|
| 209 | + | |
---|
| 210 | + | 7–213. 15 |
---|
| 211 | + | |
---|
| 212 | + | (a) (1) In this section the following words have the meanings indicated. 16 |
---|
| 213 | + | |
---|
| 214 | + | (2) “CYBER RESILIENCE ” MEANS THE ABILITY TO ANTICIPATE, 17 |
---|
| 215 | + | WITHSTAND, RECOVER FROM , AND ADAPT TO ADVERSE CONDITIONS, STRESSES, 18 |
---|
| 216 | + | ATTACKS, OR COMPROMISES ON SY STEMS THAT USE OR AR E ENABLED BY CYB ER 19 |
---|
| 217 | + | RESOURCES. 20 |
---|
| 218 | + | |
---|
| 219 | + | [(2)] (3) (i) “Eligible reliability measure” means a replacement of or 21 |
---|
| 220 | + | an improvement in existing infrastructure of an electric company that: 22 |
---|
| 221 | + | |
---|
| 222 | + | 1. is made on or after June 1, 2014; 23 |
---|
| 223 | + | |
---|
| 224 | + | 2. is designed to improve public safety or infrastructure 24 |
---|
| 225 | + | reliability; 25 |
---|
| 226 | + | |
---|
| 227 | + | 3. does not increase the revenue of an electric company by 26 |
---|
| 228 | + | connecting an improvement directly to new customers; and 27 |
---|
| 229 | + | |
---|
| 230 | + | 4. is not included in the current rate base of the electric 28 |
---|
| 231 | + | company as determined in the electric company’s most recent base rate proceeding. 29 |
---|
| 232 | + | |
---|
| 233 | + | (ii) “Eligible reliability measure” includes vegetation management 30 |
---|
| 234 | + | measures that are necessary to meet applicable service quality and reliability standards 31 |
---|
| 235 | + | under this section. 32 |
---|
| 236 | + | 6 HOUSE BILL 1420 |
---|
| 237 | + | |
---|
| 238 | + | |
---|
| 239 | + | [(3)] (4) “Fund” means the Electric Reliability Remediation Fund 1 |
---|
| 240 | + | established under subsection (j) of this section. 2 |
---|
| 241 | + | |
---|
| 242 | + | [(4)] (5) “System–average interruption duration index” or “SAIDI” means 3 |
---|
| 243 | + | the sum of the customer interruption hours divided by the total number of customers 4 |
---|
| 244 | + | served. 5 |
---|
| 245 | + | |
---|
| 246 | + | [(5)] (6) “System–average interruption frequency index” or “SAIFI” 6 |
---|
| 247 | + | means the sum of the number of customer interruptions divided by the total number of 7 |
---|
| 248 | + | customers served. 8 |
---|
| 249 | + | |
---|
| 250 | + | (d) On or before July 1, 2012, the Commission shall adopt regulations that 9 |
---|
| 251 | + | implement service quality and reliability standards relating to the delivery of electricity to 10 |
---|
| 252 | + | retail customers by electric companies through their distribution systems, using: 11 |
---|
| 253 | + | |
---|
| 254 | + | (1) SAIFI; 12 |
---|
| 255 | + | |
---|
| 256 | + | (2) SAIDI; and 13 |
---|
| 257 | + | |
---|
| 258 | + | (3) any other performance measurement that the Commission determines 14 |
---|
| 259 | + | to be reasonable. 15 |
---|
| 260 | + | |
---|
| 261 | + | (e) (1) The regulations adopted under subsection (d) of this section shall: 16 |
---|
| 262 | + | |
---|
| 263 | + | (i) include service quality and reliability standards, including 17 |
---|
| 264 | + | standards relating to: 18 |
---|
| 265 | + | |
---|
| 266 | + | 1. service interruption; 19 |
---|
| 267 | + | |
---|
| 268 | + | 2. downed wire response; 20 |
---|
| 269 | + | |
---|
| 270 | + | 3. customer communications; 21 |
---|
| 271 | + | |
---|
| 272 | + | 4. vegetation management; 22 |
---|
| 273 | + | |
---|
| 274 | + | 5. periodic equipment inspections; 23 |
---|
| 275 | + | |
---|
| 276 | + | 6. annual reliability reporting; [and] 24 |
---|
| 277 | + | |
---|
| 278 | + | 7. CYBER RESILIENCE ; AND 25 |
---|
| 279 | + | |
---|
| 280 | + | [7.] 8. any other standards established by the 26 |
---|
| 281 | + | Commission; 27 |
---|
| 282 | + | |
---|
| 283 | + | (ii) account for major outages caused by events outside the control of 28 |
---|
| 284 | + | an electric company; and 29 HOUSE BILL 1420 7 |
---|
98 | | - | |
---|
99 | | - | |
---|
100 | | - | (II) AT LEAST ONE ASSISTANT PEOPLE’S COUNSEL WITH 1 |
---|
101 | | - | CYBERSECURITY EXPERT ISE TO: 2 |
---|
102 | | - | |
---|
103 | | - | 1. ADVISE THE PEOPLE’S COUNSEL ON MEASURES T O 3 |
---|
104 | | - | IMPROVE OVERSIGHT OF THE CYBERSECURITY PR ACTICES OF PUBLIC SE RVICE 4 |
---|
105 | | - | COMPANIES; 5 |
---|
106 | | - | |
---|
107 | | - | 2. CONSULT WITH THE OFFICE OF SECURITY 6 |
---|
108 | | - | MANAGEMENT ON CYBERSECURITY ISSUES RELATED TO UTILITY R EGULATION; 7 |
---|
109 | | - | |
---|
110 | | - | 3. ASSIST THE OFFICE OF PEOPLE’S COUNSEL IN 8 |
---|
111 | | - | MONITORING THE MINIM UM SECURITY STANDARD S DEVELOPED UNDER § 5–306 OF 9 |
---|
112 | | - | THIS ARTICLE; 10 |
---|
113 | | - | |
---|
114 | | - | 4. PARTICIPATE IN BRIEF INGS TO DISCUSS 11 |
---|
115 | | - | CYBERSECURITY PRACTI CES BASED ON: 12 |
---|
116 | | - | |
---|
117 | | - | A. APPLICABLE NATIONAL ASSOCIATION OF 13 |
---|
118 | | - | REGULATORY UTILITY COMMISSIONERS GUIDANC E; AND 14 |
---|
119 | | - | |
---|
120 | | - | B. IMPROVEMENTS TO CYBE RSECURITY PRACTICES 15 |
---|
121 | | - | RECOMMENDED IN THE C YBERSECURITY ASSESSM ENTS REQUIRED UNDER § 5–306 16 |
---|
122 | | - | OF THIS ARTICLE; AND 17 |
---|
123 | | - | |
---|
124 | | - | 5. SUPPORT PUBLIC SERVICE COMPANIES TH AT DO NOT 18 |
---|
125 | | - | MEET MINIMUM SECURIT Y STANDARDS WITH REM EDIATING VULNERABILI TIES OR 19 |
---|
126 | | - | ADDRESSING CYBERSECU RITY ASSESSMENT FIND INGS. 20 |
---|
127 | | - | |
---|
128 | | - | 5–306. 21 |
---|
129 | | - | |
---|
130 | | - | (a) (1) In this section[, “zero–trust” means a cybersecurity approach: 22 |
---|
131 | | - | |
---|
132 | | - | (1) focused on cybersecurity resource protection; and 23 |
---|
133 | | - | |
---|
134 | | - | (2) based on the premise that trust is never granted implicitly but must be 24 |
---|
135 | | - | continually evaluated.] THE FOLLOWING WORDS HAVE THE MEANINGS IN DICATED. 25 |
---|
136 | | - | |
---|
137 | | - | (2) “CRITICAL SOFTWARE ” MEANS ANY SOFTWARE T HAT HAS, OR HAS 26 |
---|
138 | | - | DIRECT SOFTWAR E DEPENDENCIES ON , ONE OR MORE COMPONEN TS WITH AT LEAST 27 |
---|
139 | | - | ONE OF THE FOLLOWING ATTRIBUTES: 28 |
---|
140 | | - | |
---|
141 | | - | (I) THE ABILITY TO RUN W ITH ELEVATED PRIVILE GE OR TO 29 |
---|
142 | | - | MANAGE PRIVILEGES ; 30 |
---|
143 | | - | 4 HOUSE BILL 1420 |
---|
144 | | - | |
---|
145 | | - | |
---|
146 | | - | (II) DIRECT OR PRIVILEGED ACCESS TO NETWORKING OR 1 |
---|
147 | | - | COMPUTING RESOURCES ; 2 |
---|
148 | | - | |
---|
149 | | - | (III) THE ABILITY TO CONTROL A CCESS TO DATA OR 3 |
---|
150 | | - | OPERATIONAL TECHNOLO GY; 4 |
---|
151 | | - | |
---|
152 | | - | (IV) THE ABILITY TO PERFO RM A FUNCTION CRITIC AL TO TRUST; 5 |
---|
153 | | - | OR 6 |
---|
154 | | - | |
---|
155 | | - | (V) THE ABILITY TO OPERA TE OUTSIDE NORMAL TR UST 7 |
---|
156 | | - | BOUNDARIES WITH PRIV ILEGED ACCESS . 8 |
---|
157 | | - | |
---|
158 | | - | (3) “SUPPLY CHAIN RISK ” MEANS A RISK THA T AN ADVERSARY MAY 9 |
---|
159 | | - | SABOTAGE, MALICIOUSLY INTRODUC E UNWANTED FUNCTION TO, EXTRACT DATA 10 |
---|
160 | | - | FROM, OR OTHERWISE SUBVERT THE DESIGN , INTEGRITY, MANUFACTURING , 11 |
---|
161 | | - | PRODUCTION , DISTRIBUTION, INSTALLATION, OPERATION, MAINTENANCE , 12 |
---|
162 | | - | DISPOSITION, OR RETIREMENT OF A S YSTEM OR ITEM OF SUPPLY SO AS TO SURVEIL, 13 |
---|
163 | | - | DENY, DISRUPT, OR OTHERWISE MANIPUL ATE THE FUNCTION , USE, OR OPERATION 14 |
---|
164 | | - | OF THE SYSTEM OR ITE M OF SUPPLY OR INFOR MATION STORED OR TRA NSMITTED 15 |
---|
165 | | - | BY OR THROUGH THE SY STEM OR ITEM OF SUPP LY. 16 |
---|
166 | | - | |
---|
167 | | - | (4) “ZERO–TRUST” MEANS A CYBERSECUR ITY APPROACH : 17 |
---|
168 | | - | |
---|
169 | | - | (I) FOCUSED ON CYBERSECU RITY RESOURCE PROTEC TION; 18 |
---|
170 | | - | AND 19 |
---|
171 | | - | |
---|
172 | | - | (II) BASED ON THE PREMISE THAT TRUST IS NEVER GRANTED 20 |
---|
173 | | - | IMPLICITLY BUT MUST BE CONTINUALLY EVALU ATED. 21 |
---|
174 | | - | |
---|
175 | | - | (b) This section does not apply to a public service company that is: 22 |
---|
176 | | - | |
---|
177 | | - | (1) a common carrier; or 23 |
---|
178 | | - | |
---|
179 | | - | (2) a telephone company. 24 |
---|
180 | | - | |
---|
181 | | - | (c) A public service company shall: 25 |
---|
182 | | - | |
---|
183 | | - | (1) adopt and implement cybersecurity standards that are equal to or 26 |
---|
184 | | - | exceed standards adopted by the Commission; 27 |
---|
185 | | - | |
---|
186 | | - | (2) adopt a zero–trust cybersecurity approach for on–premises services and 28 |
---|
187 | | - | cloud–based services; 29 |
---|
188 | | - | HOUSE BILL 1420 5 |
---|
189 | | - | |
---|
190 | | - | |
---|
191 | | - | (3) establish minimum security standards for each operational technology 1 |
---|
192 | | - | and information technology device based on the level of security risk for each device, 2 |
---|
193 | | - | including [security risks associated with supply chains] SUPPLY CHAIN RISKS ; and 3 |
---|
194 | | - | |
---|
195 | | - | (4) (i) on or before July 1, 2024, and on or before July 1 every other year 4 |
---|
196 | | - | thereafter, engage a third party to conduct an assessment of operational technology and 5 |
---|
197 | | - | information technology devices THAT: 6 |
---|
198 | | - | |
---|
199 | | - | 1. IS based on: 7 |
---|
200 | | - | |
---|
201 | | - | [1.] A. the Cybersecurity and Infrastructure Security 8 |
---|
202 | | - | Agency’s Cross–Sector Cybersecurity Performance Goals; or 9 |
---|
203 | | - | |
---|
204 | | - | [2.] B. a more stringent standard that is based on the 10 |
---|
205 | | - | National Institute of Standards and Technology security frameworks; and 11 |
---|
206 | | - | |
---|
207 | | - | 2. ANALYZES CRITICAL SO FTWARE USED IN THE 12 |
---|
208 | | - | OPERATIONAL TECHNOLO GY AND INFORMATION T ECHNOLOGY DEVICES ; AND 13 |
---|
209 | | - | |
---|
210 | | - | (ii) submit to the Commission AND THE OFFICE OF PEOPLE’S 14 |
---|
211 | | - | COUNSEL certification of the public service company’s compliance with standards used in 15 |
---|
212 | | - | the assessments under item (i) of this item. 16 |
---|
213 | | - | |
---|
214 | | - | (d) (1) Each public service company shall report, in accordance with the 17 |
---|
215 | | - | process established under paragraph (2) of this subsection, a cybersecurity incident, 18 |
---|
216 | | - | including an attack on a system being used by the public service company, to the State 19 |
---|
217 | | - | Security Operations Center in the Department of Information Technology. 20 |
---|
218 | | - | |
---|
219 | | - | (2) The State Chief Information Security Officer, in consultation with the 21 |
---|
220 | | - | Commission, shall establish a process for a public service company to report cybersecurity 22 |
---|
221 | | - | incidents under paragraph (1) of this subsection, including establishing: 23 |
---|
222 | | - | |
---|
223 | | - | (i) the criteria for determining the circumstances under which a 24 |
---|
224 | | - | cybersecurity incident must be reported; 25 |
---|
225 | | - | |
---|
226 | | - | (ii) the manner in which a cybersecurity incident must be reported; 26 |
---|
227 | | - | and 27 |
---|
228 | | - | |
---|
229 | | - | (iii) the time period within which a cybersecurity incident must be 28 |
---|
230 | | - | reported. 29 |
---|
231 | | - | |
---|
232 | | - | (3) The State Security Operations Center shall immediately notify 30 |
---|
233 | | - | appropriate State and local agencies of a cybersecurity incident reported under this 31 |
---|
234 | | - | subsection. 32 |
---|
235 | | - | |
---|
236 | | - | 7–213. 33 6 HOUSE BILL 1420 |
---|
237 | | - | |
---|
238 | | - | |
---|
239 | | - | |
---|
240 | | - | (a) (1) In this section the following words have the meanings indicated. 1 |
---|
241 | | - | |
---|
242 | | - | (2) “CYBER RESILIENCE ” MEANS THE ABILITY TO ANTICIPATE, 2 |
---|
243 | | - | WITHSTAND, RECOVER FROM , AND ADAPT TO ADVERSE CONDITIONS, STRESSES, 3 |
---|
244 | | - | ATTACKS, OR COMPROMISES ON S YSTEMS THAT USE OR A RE ENABLED BY CYBER 4 |
---|
245 | | - | RESOURCES. 5 |
---|
246 | | - | |
---|
247 | | - | [(2)] (3) (i) “Eligible reliability measure” means a replacement of or 6 |
---|
248 | | - | an improvement in existing infrastructure of an electric company that: 7 |
---|
249 | | - | |
---|
250 | | - | 1. is made on or after June 1, 2014; 8 |
---|
251 | | - | |
---|
252 | | - | 2. is designed to improve public safety or infrastructure 9 |
---|
253 | | - | reliability; 10 |
---|
254 | | - | |
---|
255 | | - | 3. does not increase the revenue of an electric company by 11 |
---|
256 | | - | connecting an improvement directly to new customers; and 12 |
---|
257 | | - | |
---|
258 | | - | 4. is not included in the current rate base of the electric 13 |
---|
259 | | - | company as determined in the electric company’s most recent base rate proceeding. 14 |
---|
260 | | - | |
---|
261 | | - | (ii) “Eligible reliability measure” includes vegetation management 15 |
---|
262 | | - | measures that are necessary to meet applicable service quality and reliability standards 16 |
---|
263 | | - | under this section. 17 |
---|
264 | | - | |
---|
265 | | - | [(3)] (4) “Fund” means the Electric Reliability Remediation Fund 18 |
---|
266 | | - | established under subsection (j) of this section. 19 |
---|
267 | | - | |
---|
268 | | - | [(4)] (5) “System–average interruption duration index” or “SAIDI” means 20 |
---|
269 | | - | the sum of the customer interruption hours divided by the total number of customers 21 |
---|
270 | | - | served. 22 |
---|
271 | | - | |
---|
272 | | - | [(5)] (6) “System–average interruption frequency index” or “SAIFI” 23 |
---|
273 | | - | means the sum of the number of customer interruptions divided by the total number of 24 |
---|
274 | | - | customers served. 25 |
---|
275 | | - | |
---|
276 | | - | (d) On or before July 1, 2012, the Commission shall adopt regulations that 26 |
---|
277 | | - | implement service quality and reliability standards relating to the delivery of electricity to 27 |
---|
278 | | - | retail customers by electric companies through their distribution systems, using: 28 |
---|
279 | | - | |
---|
280 | | - | (1) SAIFI; 29 |
---|
281 | | - | |
---|
282 | | - | (2) SAIDI; and 30 |
---|
283 | | - | HOUSE BILL 1420 7 |
---|
284 | | - | |
---|
285 | | - | |
---|
286 | | - | (3) any other performance measurement that the Commission determines 1 |
---|
287 | | - | to be reasonable. 2 |
---|
288 | | - | |
---|
289 | | - | (e) (1) The regulations adopted under subsection (d) of this section shall: 3 |
---|
290 | | - | |
---|
291 | | - | (i) include service quality and reliability standards, including 4 |
---|
292 | | - | standards relating to: 5 |
---|
293 | | - | |
---|
294 | | - | 1. service interruption; 6 |
---|
295 | | - | |
---|
296 | | - | 2. downed wire response; 7 |
---|
297 | | - | |
---|
298 | | - | 3. customer communications; 8 |
---|
299 | | - | |
---|
300 | | - | 4. vegetation management; 9 |
---|
301 | | - | |
---|
302 | | - | 5. periodic equipment inspections; 10 |
---|
303 | | - | |
---|
304 | | - | 6. annual reliability reporting; [and] 11 |
---|
305 | | - | |
---|
306 | | - | 7. CYBER RESILIENCE ; AND 12 |
---|
307 | | - | |
---|
308 | | - | [7.] 8. any other standards established by the Commission; 13 |
---|
309 | | - | |
---|
310 | | - | (ii) account for major outages caused by events outside the control of 14 |
---|
311 | | - | an electric company; and 15 |
---|
312 | | - | |
---|
313 | | - | (iii) for an electric company that fails to meet the applicable service 16 |
---|
314 | | - | quality and reliability standards, require the electric company to file a corrective action 17 |
---|
315 | | - | plan that details specific actions the company will take to meet the standards. 18 |
---|
316 | | - | |
---|
317 | | - | Article – State Government 19 |
---|
318 | | - | |
---|
319 | | - | 9–2901. 20 |
---|
320 | | - | |
---|
321 | | - | (a) (1) In this subtitle the following words have the meanings indicated. 21 |
---|
322 | | - | |
---|
323 | | - | (2) “Council” means the Maryland Cybersecurity Council. 22 |
---|
324 | | - | |
---|
325 | | - | (3) “CRITICAL INFRASTRUCTU RE” MEANS SYSTEMS AND AS SETS, 23 |
---|
326 | | - | WHETHER PHYSICAL OR VIRTUAL, SO VITAL TO THE STATE THAT THE INCAPA CITY 24 |
---|
327 | | - | OR DESTRUCTION OF SU CH SYSTEMS AND ASSET S WOULD HAVE A DEBIL ITATING 25 |
---|
328 | | - | IMPACT ON SECURI TY, ECONOMIC SECURITY , PUBLIC HEALTH OR SAF ETY, OR ANY 26 |
---|
329 | | - | COMBINATION OF THOSE MATTERS. 27 |
---|
| 330 | + | (iii) severe degradation of State or national security; 30 |
---|