Us Congress 2023-2024 Regular Session

Us Congress House Bill HB285 Compare Versions

Only one version of the bill is available at this time.
OldNewDifferences
11 I
22 118THCONGRESS
33 1
44 STSESSION H. R. 285
55 To amend the Homeland Security Act of 2002 to provide for the remediation
66 of cybersecurity vulnerabilities, and for other purposes.
77 IN THE HOUSE OF REPRESENTATIVES
88 JANUARY11, 2023
99 Ms. J
1010 ACKSONLEEintroduced the following bill; which was referred to the
1111 Committee on Homeland Security
1212 A BILL
1313 To amend the Homeland Security Act of 2002 to provide
1414 for the remediation of cybersecurity vulnerabilities, and
1515 for other purposes.
1616 Be it enacted by the Senate and House of Representa-1
1717 tives of the United States of America in Congress assembled, 2
1818 SECTION 1. SHORT TITLE. 3
1919 This Act may be cited as the ‘‘Cybersecurity Vulner-4
2020 ability Remediation Act’’. 5
2121 SEC. 2. CYBERSECURITY VULNERABILITIES. 6
2222 Section 2209 of the Homeland Security Act of 2002 7
2323 (6 U.S.C. 659) is amended— 8
2424 (1) in subsection (a)— 9
2525 VerDate Sep 11 2014 04:45 Jan 21, 2023 Jkt 039200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:\BILLS\H285.IH H285
2626 pbinns on DSKJLVW7X2PROD with $$_JOB 2
2727 •HR 285 IH
2828 (A) by redesignating paragraphs (6) 1
2929 through (9) as paragraphs (7) through (10), re-2
3030 spectively; and 3
3131 (B) by inserting after paragraph (5) the 4
3232 following new paragraph: 5
3333 ‘‘(6) the term ‘cybersecurity vulnerability’ has 6
3434 the meaning given the term ‘security vulnerability’ 7
3535 in section 102 of the Cybersecurity Information 8
3636 Sharing Act of 2015 (6 U.S.C. 1501); and’’; 9
3737 (2) in subsection (c)— 10
3838 (A) in paragraph (5)— 11
3939 (i) in subparagraph (A), by striking 12
4040 ‘‘and’’ after the semicolon at the end; 13
4141 (ii) by redesignating subparagraphs 14
4242 (B) and (C) as subparagraphs (C) and 15
4343 (D), respectively; 16
4444 (iii) by inserting after subparagraph 17
4545 (A) the following new subparagraph: 18
4646 ‘‘(B) sharing mitigation protocols to counter cy-19
4747 bersecurity vulnerabilities pursuant to subsection 20
4848 (n); and’’; and 21
4949 (iv) in subparagraph (C), as so redes-22
5050 ignated, by inserting ‘‘and mitigation pro-23
5151 tocols to counter cybersecurity 24
5252 VerDate Sep 11 2014 04:45 Jan 21, 2023 Jkt 039200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:\BILLS\H285.IH H285
5353 pbinns on DSKJLVW7X2PROD with $$_JOB 3
5454 •HR 285 IH
5555 vulnerabilities in accordance with subpara-1
5656 graph (B)’’ before ‘‘with Federal’’; and 2
5757 (B) in paragraph (9), by inserting ‘‘mitiga-3
5858 tion protocols to counter cybersecurity 4
5959 vulnerabilities,’’ after ‘‘measures,’’; 5
6060 (3) by redesignating the second subsections (p) 6
6161 and (q) (relating to coordination on cybersecurity for 7
6262 SLITT entities and a report, respectively) as sub-8
6363 sections (r) and (s), respectively; and 9
6464 (4) by adding at the end the following new sub-10
6565 section: 11
6666 ‘‘(t) P
6767 ROTOCOLSTOCOUNTERCERTAINCYBERSE-12
6868 CURITYVULNERABILITIES.—The Director may, as appro-13
6969 priate, identify, develop, and disseminate actionable proto-14
7070 cols to mitigate cybersecurity vulnerabilities to informa-15
7171 tion systems and industrial control systems, including in 16
7272 circumstances in which such vulnerabilities exist because 17
7373 software or hardware is no longer supported by a ven-18
7474 dor.’’. 19
7575 SEC. 3. REPORT ON CYBERSECURITY VULNERABILITIES. 20
7676 (a) R
7777 EPORT.—Not later than one year after the date 21
7878 of the enactment of this Act, the Director of the Cyberse-22
7979 curity and Infrastructure Security Agency of the Depart-23
8080 ment of Homeland Security shall submit to the Committee 24
8181 on Homeland Security of the House of Representatives 25
8282 VerDate Sep 11 2014 04:45 Jan 21, 2023 Jkt 039200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6201 E:\BILLS\H285.IH H285
8383 pbinns on DSKJLVW7X2PROD with $$_JOB 4
8484 •HR 285 IH
8585 and the Committee on Homeland Security and Govern-1
8686 mental Affairs of the Senate a report on how the Agency 2
8787 carries out subsection (n) of section 2209 of the Homeland 3
8888 Security Act of 2002 to coordinate vulnerability disclo-4
8989 sures, including disclosures of cybersecurity vulnerabilities 5
9090 (as such term is defined in such section), and subsection 6
9191 (t) of such section (as added by section 2) to disseminate 7
9292 actionable protocols to mitigate cybersecurity 8
9393 vulnerabilities to information systems and industrial con-9
9494 trol systems, that includes the following: 10
9595 (1) A description of the policies and procedures 11
9696 relating to the coordination of vulnerability disclo-12
9797 sures. 13
9898 (2) A description of the levels of activity in fur-14
9999 therance of such subsections (n) and (t) of such sec-15
100100 tion 2209. 16
101101 (3) Any plans to make further improvements to 17
102102 how information provided pursuant to such sub-18
103103 sections can be shared (as such term is defined in 19
104104 such section 2209) between the Department and in-20
105105 dustry and other stakeholders. 21
106106 (4) Any available information on the degree to 22
107107 which such information was acted upon by industry 23
108108 and other stakeholders. 24
109109 VerDate Sep 11 2014 04:45 Jan 21, 2023 Jkt 039200 PO 00000 Frm 00004 Fmt 6652 Sfmt 6201 E:\BILLS\H285.IH H285
110110 pbinns on DSKJLVW7X2PROD with $$_JOB 5
111111 •HR 285 IH
112112 (5) A description of how privacy and civil lib-1
113113 erties are preserved in the collection, retention, use, 2
114114 and sharing of vulnerability disclosures. 3
115115 (b) F
116116 ORM.—The report required under subsection (b) 4
117117 shall be submitted in unclassified form but may contain 5
118118 a classified annex. 6
119119 SEC. 4. COMPETITION RELATING TO CYBERSECURITY 7
120120 VULNERABILITIES. 8
121121 The Under Secretary for Science and Technology of 9
122122 the Department of Homeland Security, in consultation 10
123123 with the Director of the Cybersecurity and Infrastructure 11
124124 Security Agency of the Department, may establish an in-12
125125 centive-based program that allows industry, individuals, 13
126126 academia, and others to compete in identifying remedi-14
127127 ation solutions for cybersecurity vulnerabilities (as such 15
128128 term is defined in section 2209 of the Homeland Security 16
129129 Act of 2002, as amended by section 2) to information sys-17
130130 tems (as such term is defined in such section 2209) and 18
131131 industrial control systems, including supervisory control 19
132132 and data acquisition systems. 20
133133 Æ
134134 VerDate Sep 11 2014 04:45 Jan 21, 2023 Jkt 039200 PO 00000 Frm 00005 Fmt 6652 Sfmt 6301 E:\BILLS\H285.IH H285
135135 pbinns on DSKJLVW7X2PROD with $$_JOB