Enrolled Copy H.B. 545 1 CYBERSECURITY INFRASTRUCTURE MODI FICATIONS 2 2023 GENERAL SESSION 3 STATE OF UTAH 4 Chief Sponsor: Jon Hawkins 5 Senate Sponsor: Daniel McCay 6 7LONG TITLE 8General Description: 9 This bill enacts certain cybersecurity requirements for state information architecture. 10Highlighted Provisions: 11 This bill: 12 <defines terms; 13 <specifies the applicability of the provisions enacted in this bill; 14 <enacts requirements regarding the adoption of zero trust architecture and 15multi-factor authentication for executive branch agencies; and 16 <creates a reporting requirement. 17Money Appropriated in this Bill: 18 None 19Other Special Clauses: 20 None 21Utah Code Sections Affected: 22ENACTS: 23 63A-16-214, Utah Code Annotated 1953 24 25Be it enacted by the Legislature of the state of Utah: 26 Section 1. Section 63A-16-214 is enacted to read: 27 63A-16-214. Zero trust architectures -- Implementation -- Requirements -- 28Reporting. 29 (1) As used in this section: H.B. 545 Enrolled Copy - 2 - 30 (a) "Endpoint detection and response" means a cybersecurity solution that continuously 31monitors end-user devices to detect and respond to cyber threats. 32 (b) "Governmental entity" means: 33 (i) the state; 34 (ii) a political subdivision of the state; and 35 (iii) an entity created by the state or a political subdivision of the state, including an 36agency, board, bureau, commission, committee, department, division, institution, 37instrumentality, or office. 38 (c) "Multi-factor authentication" means using two or more different types of 39identification factors to authenticate a user's identity for the purpose of accessing systems and 40data, which may include: 41 (i) knowledge-based factors, which require the user to provide information that only 42the user knows, such as a password or personal identification number; 43 (ii) possession-based factors, which require the user to have a physical item that only 44the user possesses, such as a security token, key fob, subscriber identity module card, or smart 45phone application; or 46 (iii) inherence-based credentials, which require the user to demonstrate specific known 47biological traits attributable only to the user, such as fingerprints or facial recognition. 48 (d) "Zero trust architecture" means a security model, a set of system design principles, 49and a coordinated cybersecurity and system management strategy that employs continuous 50monitoring, risk-based access controls, secure identity and access management practices, and 51system security automation techniques to address the cybersecurity risk from threats inside and 52outside traditional network boundaries. 53 (2) This section applies to: 54 (a) all systems and data owned, managed, maintained, or utilized by or on behalf of an 55executive branch agency to access state systems or data; and 56 (b) all hardware, software, internal systems, and essential third-party software, 57including for on-premises, cloud, and hybrid environments. Enrolled Copy H.B. 545 - 3 - 58 (3) (a) On or before November 1, 2023, the chief information officer shall develop 59uniform technology policies, standards, and procedures for use by executive branch agencies in 60implementing zero trust architecture and multi-factor authentication on all systems in 61accordance with this section. 62 (b) On or before July 1, 2024, the division shall consider adopting the enterprise 63security practices described in this section and consider implementing zero trust architecture 64and robust identity management practices, including: 65 (i) multi-factor authentication; 66 (ii) cloud-based enterprise endpoint detection and response solutions to promote 67real-time detection, and rapid investigation and remediation capabilities; and 68 (iii) robust logging practices to provide adequate data to support security investigations 69and proactive threat hunting. 70 (4) (a) If implementing a zero trust architecture and multi-factor authentication, the 71division shall consider prioritizing the use of third-party cloud computing solutions that meet 72or exceed industry standards. 73 (b) The division shall consider giving preference to zero trust architecture solutions 74that comply with, are authorized by, or align to applicable federal guidelines, programs, and 75frameworks, including: 76 (i) the Federal Risk and Authorization Management Program; 77 (ii) the Continuous Diagnostics and Mitigation Program; and 78 (iii) guidance and frameworks from the National Institute of Standards and 79Technology. 80 (5) (a) In procuring third-party cloud computing solutions, the division may utilize 81established purchasing vehicles, including cooperative purchasing contracts and federal supply 82contracts, to facilitate efficient purchasing. 83 (b) The chief information officer shall establish a list of approved vendors that are 84authorized to provide zero trust architecture to governmental entities in the state. 85 (c) If an executive branch agency determines that procurement of a third-party cloud H.B. 545 Enrolled Copy - 4 - 86computing solution is not feasible, the executive branch agency shall provide a written 87explanation to the division of the reasons that a cloud computing solution is not feasible, 88including: 89 (i) the reasons why the executive branch agency determined that a third-party cloud 90computing solution is not feasible; 91 (ii) specific challenges or difficulties of migrating existing solutions to a cloud 92environment; and 93 (iii) the total expected cost of ownership of existing or alternative solutions compared 94to a cloud computing solution. 95 (6) (a) On or before November 30 of each year, the chief information officer shall 96report on the progress of implementing zero trust architecture and multi-factor authentication 97to: 98 (i) the Public Utilities, Energy, and Technology Interim Committee; and 99 (ii) the Cybersecurity Commission created in Section 63C-25-201. 100 (b) The report described in Subsection (6)(a) may include information on: 101 (i) applicable guidance issued by the United States Cybersecurity and Infrastructure 102Security Agency; and 103 (ii) the progress of the division, executive branch agencies, and governmental entities 104with respect to: 105 (A) shifting away from a paradigm of trusted networks toward implementation of 106security controls based on a presumption of compromise; 107 (B) implementing principles of least privilege in administering information security 108programs; 109 (C) limiting the ability of entities that cause incidents to move laterally through or 110between agency systems; 111 (D) identifying incidents quickly; and 112 (E) isolating and removing unauthorized entities from agency systems as quickly as 113practicable, accounting for cyber threat intelligence or law enforcement purposes. Enrolled Copy H.B. 545 - 5 - 114