Us Congress 2025-2026 Regular Session

Us Congress House Bill HB1258 Compare Versions

Only one version of the bill is available at this time.
OldNewDifferences
11 I
22 119THCONGRESS
33 1
44 STSESSION H. R. 1258
55 To amend title 41, United States Code, to require information technology
66 contractors to maintain a vulnerability disclosure policy and program,
77 and for other purposes.
88 IN THE HOUSE OF REPRESENTATIVES
99 FEBRUARY12, 2025
1010 Mr. L
1111 IEUintroduced the following bill; which was referred to the Committee
1212 on Oversight and Government Reform
1313 A BILL
1414 To amend title 41, United States Code, to require informa-
1515 tion technology contractors to maintain a vulnerability
1616 disclosure policy and program, and for other purposes.
1717 Be it enacted by the Senate and House of Representa-1
1818 tives of the United States of America in Congress assembled, 2
1919 SECTION 1. SHORT TITLE. 3
2020 This Act may be cited as the ‘‘Improving Contractor 4
2121 Cybersecurity Act’’. 5
2222 VerDate Sep 11 2014 22:25 Mar 10, 2025 Jkt 059200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:\BILLS\H1258.IH H1258
2323 kjohnson on DSK7ZCZBW3PROD with $$_JOB 2
2424 •HR 1258 IH
2525 SEC. 2. VULNERABILITY DISCLOSURE POLICY AND PRO-1
2626 GRAM REQUIRED FOR INFORMATION TECH-2
2727 NOLOGY CONTRACTORS. 3
2828 (a) A
2929 MENDMENT.—Chapter 47 of division C of sub-4
3030 title I of title 41, United States Code, is amended by add-5
3131 ing at the end the following new section: 6
3232 ‘‘§ 4715. Vulnerability disclosure policy and program 7
3333 required 8
3434 ‘‘(a) R
3535 EQUIREMENTS FOR INFORMATION TECH-9
3636 NOLOGYCONTRACTORS.—The head of an executive agen-10
3737 cy may not enter into a contract for information tech-11
3838 nology unless the contractor maintains or does the fol-12
3939 lowing: 13
4040 ‘‘(1) A vulnerability disclosure policy for infor-14
4141 mation technology that— 15
4242 ‘‘(A) includes— 16
4343 ‘‘(i) a description of which systems 17
4444 are in scope; 18
4545 ‘‘(ii) the type of information tech-19
4646 nology testing for each system that is al-20
4747 lowed (or specifically not authorized); 21
4848 ‘‘(iii) if a contractor includes systems 22
4949 that host sensitive information in the vul-23
5050 nerability disclosure policy, the contractor 24
5151 shall determine whether to impose restric-25
5252 tions on accessing, copying, transferring, 26
5353 VerDate Sep 11 2014 22:25 Mar 10, 2025 Jkt 059200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:\BILLS\H1258.IH H1258
5454 kjohnson on DSK7ZCZBW3PROD with $$_JOB 3
5555 •HR 1258 IH
5656 storing, using, and retaining such informa-1
5757 tion, including by— 2
5858 ‘‘(I) prohibiting sensitive infor-3
5959 mation from being saved, stored, 4
6060 transferred, or otherwise accessed 5
6161 after initial discovery; 6
6262 ‘‘(II) directing that sensitive in-7
6363 formation be viewed only to the extent 8
6464 required to identify a vulnerability 9
6565 and that the information not be re-10
6666 tained; or 11
6767 ‘‘(III) limiting use of information 12
6868 obtained from interacting with the 13
6969 systems or services to be explored by 14
7070 the researcher to activities directly re-15
7171 lated to reporting security 16
7272 vulnerabilities; 17
7373 ‘‘(iv) a description of how an indi-18
7474 vidual may submit a vulnerability report 19
7575 that includes— 20
7676 ‘‘(I) the location of where to send 21
7777 the report, such as a web form or 22
7878 email address; 23
7979 ‘‘(II) a description of the type of 24
8080 information necessary to find and 25
8181 VerDate Sep 11 2014 22:25 Mar 10, 2025 Jkt 059200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6201 E:\BILLS\H1258.IH H1258
8282 kjohnson on DSK7ZCZBW3PROD with $$_JOB 4
8383 •HR 1258 IH
8484 analyze the vulnerability (such as a 1
8585 description, the location, and potential 2
8686 impact of the vulnerability, the tech-3
8787 nical information needed to reproduce 4
8888 the vulnerability, and any proof of 5
8989 concept); and 6
9090 ‘‘(III) a clear statement— 7
9191 ‘‘(aa) that any individual 8
9292 that submits a vulnerability re-9
9393 port may do so anonymously; and 10
9494 ‘‘(bb) on how and whether 11
9595 any incomplete submission is 12
9696 evaluated; 13
9797 ‘‘(v) a commitment from the con-14
9898 tractor that the contractor will not pursue 15
9999 civil action for any accidental, good faith 16
100100 violation of the vulnerability disclosure pol-17
101101 icy; 18
102102 ‘‘(vi) a commitment from the con-19
103103 tractor that if an individual acting in ac-20
104104 cordance with the vulnerability disclosure 21
105105 policy of the contractor is sued by a third 22
106106 party, the contractor will inform the public 23
107107 or the court that the individual was acting 24
108108 VerDate Sep 11 2014 22:25 Mar 10, 2025 Jkt 059200 PO 00000 Frm 00004 Fmt 6652 Sfmt 6201 E:\BILLS\H1258.IH H1258
109109 kjohnson on DSK7ZCZBW3PROD with $$_JOB 5
110110 •HR 1258 IH
111111 in compliance with the vulnerability disclo-1
112112 sure policy; 2
113113 ‘‘(vii) a statement that describes the 3
114114 time frame in which the individual that 4
115115 submits a report, if known, will receive a 5
116116 notification of receipt of the report and a 6
117117 description of what steps will be taken by 7
118118 the contractor during the remediation 8
119119 process; and 9
120120 ‘‘(viii) a set of guidelines that estab-10
121121 lishes what type of activity by a researcher 11
122122 are acceptable and unacceptable; and 12
123123 ‘‘(B) does not— 13
124124 ‘‘(i) require the submission of person-14
125125 ally identifiable information of a re-15
126126 searcher; and 16
127127 ‘‘(ii) limit testing solely to entities ap-17
128128 proved by the contractor but rather au-18
129129 thorizes the public to search for and report 19
130130 any vulnerability. 20
131131 ‘‘(2) A description of additional procedures that 21
132132 describe how the contractor will communicate with 22
133133 the researcher, and how and when any communica-23
134134 tion occurs. 24
135135 VerDate Sep 11 2014 22:25 Mar 10, 2025 Jkt 059200 PO 00000 Frm 00005 Fmt 6652 Sfmt 6201 E:\BILLS\H1258.IH H1258
136136 kjohnson on DSK7ZCZBW3PROD with $$_JOB 6
137137 •HR 1258 IH
138138 ‘‘(3) A description of the target timelines for 1
139139 and tracking of the following: 2
140140 ‘‘(A) Notification of receipt to the indi-3
141141 vidual that submits the report, if known. 4
142142 ‘‘(B) An initial assessment, such as deter-5
143143 mining whether any disclosed vulnerability is 6
144144 valid. 7
145145 ‘‘(C) Resolution of a vulnerability, includ-8
146146 ing notification of the outcome to the re-9
147147 searcher. 10
148148 ‘‘(4) A page on the website of the contractor 11
149149 that— 12
150150 ‘‘(A) allows for the submission of 13
151151 vulnerabilities by anyone relating to the infor-14
152152 mation technology; 15
153153 ‘‘(B) lists the contact information, such as 16
154154 a phone number or email address for an indi-17
155155 vidual or team responsible for reviewing any 18
156156 such submission under subparagraph (A); and 19
157157 ‘‘(C) describes the process by which a re-20
158158 view is conducted, including how long it will 21
159159 take for the contractor to respond to the re-22
160160 searcher and whether or not monetary rewards 23
161161 will be paid to the reporter for identifying a vul-24
162162 nerability. 25
163163 VerDate Sep 11 2014 05:50 Mar 14, 2025 Jkt 059200 PO 00000 Frm 00006 Fmt 6652 Sfmt 6201 E:\BILLS\H1258.IH H1258
164164 kjohnson on DSK7ZCZBW3PROD with $$_JOB 7
165165 •HR 1258 IH
166166 ‘‘(5) In the case of a discovered vulnerability 1
167167 that the contractor is not responsible for patching, 2
168168 the contractor shall submit the vulnerability to the 3
169169 responsible party or direct the researcher to the ap-4
170170 propriate party. 5
171171 ‘‘(b) R
172172 EPORTINGREQUIREMENTS AND METRICS.— 6
173173 Not later than 7 days after the date on which the vulner-7
174174 ability disclosure policy described in subsection (a) is pub-8
175175 lished, and on an ongoing basis as vulnerability reports 9
176176 are received, an information technology contractor shall 10
177177 report to the Cybersecurity and Infrastructure Security 11
178178 Agency of the Department of Homeland Security the fol-12
179179 lowing information: 13
180180 ‘‘(1) Any valid or credible report of a not pre-14
181181 viously known public vulnerability (including any 15
182182 misconfiguration) on a system that uses commercial 16
183183 software or services that affect or are likely to affect 17
184184 other parties in government or industry once a patch 18
185185 or viable mitigation is available. 19
186186 ‘‘(2) Any other situation where the contractor 20
187187 determines it would be helpful or necessary to in-21
188188 volve the Cybersecurity and Infrastructure Security 22
189189 Agency. 23
190190 ‘‘(c) CISA S
191191 UBMISSION OFVULNERABILITIES.—The 24
192192 Cybersecurity and Infrastructure Security Agency shall 25
193193 VerDate Sep 11 2014 22:25 Mar 10, 2025 Jkt 059200 PO 00000 Frm 00007 Fmt 6652 Sfmt 6201 E:\BILLS\H1258.IH H1258
194194 kjohnson on DSK7ZCZBW3PROD with $$_JOB 8
195195 •HR 1258 IH
196196 communicate with and submit, as necessary, 1
197197 vulnerabilities to the MITRE Common Vulnerabilities and 2
198198 Exposures database and the National Institute of Stand-3
199199 ards and Technology National Vulnerability Database. 4
200200 ‘‘(d) D
201201 EFINITIONS.—In this section: 5
202202 ‘‘(1) E
203203 XECUTIVE AGENCY.—The term ‘executive 6
204204 agency’ has the meaning given that term in section 7
205205 133. 8
206206 ‘‘(2) R
207207 ESEARCHER.—The term ‘researcher’ 9
208208 means the individual who submits a vulnerability re-10
209209 port. 11
210210 ‘‘(3) I
211211 NFORMATION TECHNOLOGY .—The term 12
212212 ‘information technology’ has the meaning given that 13
213213 term in section 11101 of title 40.’’. 14
214214 (b) T
215215 ECHNICAL AND CONFORMINGAMENDMENT.— 15
216216 The table of sections for chapter 47 of division C of sub-16
217217 title I of title 41, United States Code, is amended by add-17
218218 ing at the end the following new item: 18
219219 ‘‘4715. Vulnerability disclosure policy and program required.’’.
220220 (c) APPLICABILITY.—The amendments made by this 19
221221 section shall take effect on the date of the enactment of 20
222222 this section and shall apply to any contract entered into 21
223223 on or after such effective date. 22
224224 Æ
225225 VerDate Sep 11 2014 22:25 Mar 10, 2025 Jkt 059200 PO 00000 Frm 00008 Fmt 6652 Sfmt 6301 E:\BILLS\H1258.IH H1258
226226 kjohnson on DSK7ZCZBW3PROD with $$_JOB