34 | 27 | | |
---|
35 | 28 | | ENGROSSED SENATE |
---|
36 | 29 | | BILL NO. 570 By: Newhouse of the Senate |
---|
37 | 30 | | |
---|
38 | 31 | | and |
---|
39 | 32 | | |
---|
40 | 33 | | Steagall of the House |
---|
41 | 34 | | |
---|
42 | 35 | | |
---|
43 | 36 | | |
---|
44 | 37 | | |
---|
45 | 38 | | An Act relating to public finance; amending 62 O.S. |
---|
46 | 39 | | 2011, Section 34.32, as last ame nded by Section 1, |
---|
47 | 40 | | Chapter 331, O.S.L. 2019 (62 O.S. Supp. 20 20, Section |
---|
48 | 41 | | 34.32), which relates to state agency information |
---|
49 | 42 | | technology systems; making certain provisions |
---|
50 | 43 | | inapplicable to the Military Department of the State |
---|
51 | 44 | | of Oklahoma; providing an effective date; and |
---|
52 | 45 | | declaring an emergency. |
---|
53 | 46 | | |
---|
54 | 47 | | |
---|
55 | 48 | | |
---|
56 | 49 | | |
---|
57 | 50 | | BE IT ENACTED BY THE PEOPLE OF THE STATE OF OKLAHOMA: |
---|
58 | 51 | | SECTION 1. AMENDATORY 62 O.S. 2011, Section 34.32, as |
---|
59 | 52 | | last amended by Section 1, Chapter 331, O.S.L. 2019 (62 O.S. Sup p. |
---|
60 | 53 | | 2020, Section 34.32), is amended to read as follows: |
---|
61 | 54 | | Section 34.32. A. The Information Services Division of the |
---|
62 | 55 | | Office of Management and Enterprise Services shall create a standard |
---|
63 | 56 | | security risk assessment for state agency information technology |
---|
64 | 57 | | systems that complies with the International Organization for |
---|
65 | 58 | | Standardization (ISO) and the International Electrotechnical |
---|
97 | 89 | | vulnerabilities associated with the information system. The |
---|
98 | 90 | | Information Services Division of the Office of Management and |
---|
99 | 91 | | Enterprise Services shall approve not less than two firms which |
---|
100 | 92 | | state agencies may choose from to conduct the information security |
---|
101 | 93 | | risk assessment. |
---|
102 | 94 | | C. A state agency with an information technology system that is |
---|
103 | 95 | | not consolidated under the Information Technology Consolidation and |
---|
104 | 96 | | Coordination Act or that is otherwise retained by the agency shall |
---|
105 | 97 | | additionally be required to h ave an information security audit |
---|
106 | 98 | | conducted by a firm approved by the Information Services Division |
---|
107 | 99 | | that is based upon the most current version of the NIST Cyber - |
---|
108 | 100 | | Security Framework, and shall submit a final report of the |
---|
109 | 101 | | information security risk assessmen t and information security audit |
---|
110 | 102 | | findings to the Information Services Division each year on a |
---|
111 | 103 | | schedule set by the Information Services Division. Agencies shall |
---|
112 | 104 | | also submit a list of remedies and a timeline for the repair of any |
---|
113 | 105 | | deficiencies to the Informa tion Services Division within ten (10) |
---|
114 | 106 | | days of the completion of the audit. The final information security |
---|
115 | 107 | | risk assessment report shall identify, prioritize, and document |
---|
116 | 108 | | information security vulnerabilities for each of the state agencies |
---|
147 | 138 | | D. Subject to the provisions of subsection C of Secti on 34.12 |
---|
148 | 139 | | of this title, the Information Services Division shall report the |
---|
149 | 140 | | results of the state agency assessments and information security |
---|
150 | 141 | | audit findings required pursuant to this section to the Governor, |
---|
151 | 142 | | the Speaker of the House of Representatives, and t he President Pro |
---|
152 | 143 | | Tempore of the Senate by the first day of January of each year . Any |
---|
153 | 144 | | state agency with an information technology system that is not |
---|
154 | 145 | | consolidated under the Information Technology Consolidation and |
---|
155 | 146 | | Coordination Act that cannot comply with th e provisions of this |
---|
156 | 147 | | section shall consolidate under the Information Technology |
---|
157 | 148 | | Consolidation and Coordination Act. |
---|
158 | 149 | | E. This act shall not apply to state agencies subject to |
---|
159 | 150 | | mandatory North American Electric Reliability Corporation (NERC) |
---|
160 | 151 | | cybersecurity standards and institutions within The Oklahoma State |
---|
161 | 152 | | System of Higher Education, t he Oklahoma State Regents for Higher |
---|
162 | 153 | | Education and the telecommunications network known as OneNet that |
---|
163 | 154 | | follow the International Organization for Standardization (ISO) , the |
---|
164 | 155 | | Military Department of the State of Oklahoma (OMD) and the |
---|
165 | 156 | | International Electrotech nical Commission (IEC)-Security techniques- |
---|
166 | 157 | | Code of Practice for Information Security Controls or National |
---|
167 | 158 | | Institute of Standards and Technology. |
---|