Utah 2023 Regular Session

Utah House Bill HB0545 Compare Versions

OldNewDifferences
1-Enrolled Copy H.B. 545
1+H.B. 545
2+LEGISLATIVE GENERAL COUNSEL
3+6 Approved for Filing: D.M. Cheung 6
4+6 02-22-23 11:33 AM 6
5+H.B. 545
26 1 CYBERSECURITY INFRASTRUCTURE MODI FICATIONS
37 2 2023 GENERAL SESSION
48 3 STATE OF UTAH
59 4 Chief Sponsor: Jon Hawkins
610 5 Senate Sponsor: Daniel McCay
711 6
812 7LONG TITLE
913 8General Description:
1014 9 This bill enacts certain cybersecurity requirements for state information architecture.
1115 10Highlighted Provisions:
1216 11 This bill:
1317 12 <defines terms;
1418 13 <specifies the applicability of the provisions enacted in this bill;
1519 14 <enacts requirements regarding the adoption of zero trust architecture and
1620 15multi-factor authentication for executive branch agencies; and
1721 16 <creates a reporting requirement.
1822 17Money Appropriated in this Bill:
1923 18 None
2024 19Other Special Clauses:
2125 20 None
2226 21Utah Code Sections Affected:
2327 22ENACTS:
2428 23 63A-16-214, Utah Code Annotated 1953
2529 24
2630 25Be it enacted by the Legislature of the state of Utah:
2731 26 Section 1. Section 63A-16-214 is enacted to read:
2832 27 63A-16-214. Zero trust architectures -- Implementation -- Requirements --
33+*HB0545* H.B. 545 02-22-23 11:33 AM
34+- 2 -
2935 28Reporting.
30-29 (1) As used in this section: H.B. 545 Enrolled Copy
31-- 2 -
36+29 (1) As used in this section:
3237 30 (a) "Endpoint detection and response" means a cybersecurity solution that continuously
3338 31monitors end-user devices to detect and respond to cyber threats.
3439 32 (b) "Governmental entity" means:
3540 33 (i) the state;
3641 34 (ii) a political subdivision of the state; and
3742 35 (iii) an entity created by the state or a political subdivision of the state, including an
3843 36agency, board, bureau, commission, committee, department, division, institution,
3944 37instrumentality, or office.
4045 38 (c) "Multi-factor authentication" means using two or more different types of
4146 39identification factors to authenticate a user's identity for the purpose of accessing systems and
4247 40data, which may include:
4348 41 (i) knowledge-based factors, which require the user to provide information that only
4449 42the user knows, such as a password or personal identification number;
4550 43 (ii) possession-based factors, which require the user to have a physical item that only
46-44the user possesses, such as a security token, key fob, subscriber identity module card, or smart
51+44the user possesses, such as a security token, key fob, subscriber identity module card or smart
4752 45phone application; or
4853 46 (iii) inherence-based credentials, which require the user to demonstrate specific known
4954 47biological traits attributable only to the user, such as fingerprints or facial recognition.
5055 48 (d) "Zero trust architecture" means a security model, a set of system design principles,
5156 49and a coordinated cybersecurity and system management strategy that employs continuous
5257 50monitoring, risk-based access controls, secure identity and access management practices, and
5358 51system security automation techniques to address the cybersecurity risk from threats inside and
5459 52outside traditional network boundaries.
5560 53 (2) This section applies to:
5661 54 (a) all systems and data owned, managed, maintained, or utilized by or on behalf of an
5762 55executive branch agency to access state systems or data; and
5863 56 (b) all hardware, software, internal systems, and essential third-party software,
59-57including for on-premises, cloud, and hybrid environments. Enrolled Copy H.B. 545
60-- 3 -
61-58 (3) (a) On or before November 1, 2023, the chief information officer shall develop
64+57including for on-premises, cloud, and hybrid environments.
65+58 (3) (a) On or before November 1, 2023, the chief information officer shall develop 02-22-23 11:33 AM H.B. 545
66+- 3 - Senate 3rd Reading Amendments 3-3-2023 lp/dc
6267 59uniform technology policies, standards, and procedures for use by executive branch agencies in
6368 60implementing zero trust architecture and multi-factor authentication on all systems in
6469 61accordance with this section.
65-62 (b) On or before July 1, 2024, the division shall consider adopting the enterprise
66-63security practices described in this section and consider implementing zero trust architecture
67-64and robust identity management practices, including:
70+62 (b) On or before July 1, 2024, the division shall Öº [adopt] consider adopting »Ö the
71+62aenterprise security practices
72+63described in this section and Öº [implement] consider implementing »Ö zero trust architecture
73+63aand robust identity management
74+64practices, including:
6875 65 (i) multi-factor authentication;
6976 66 (ii) cloud-based enterprise endpoint detection and response solutions to promote
7077 67real-time detection, and rapid investigation and remediation capabilities; and
7178 68 (iii) robust logging practices to provide adequate data to support security investigations
7279 69and proactive threat hunting.
73-70 (4) (a) If implementing a zero trust architecture and multi-factor authentication, the
74-71division shall consider prioritizing the use of third-party cloud computing solutions that meet
75-72or exceed industry standards.
76-73 (b) The division shall consider giving preference to zero trust architecture solutions
77-74that comply with, are authorized by, or align to applicable federal guidelines, programs, and
78-75frameworks, including:
80+70 (4) (a) Öº [In] If »Ö implementing a zero trust architecture and multi-factor
81+70aauthentication, the
82+71division shall Öº [prioritize] consider prioritizing »Ö the use of third-party cloud computing
83+71asolutions that meet or exceed
84+72industry standards.
85+73 (b) The division shall Öº [give] consider giving »Ö preference to zero trust architecture
86+73asolutions that comply
87+74with, are authorized by, or align to applicable federal guidelines, programs, and frameworks,
88+75including:
7989 76 (i) the Federal Risk and Authorization Management Program;
8090 77 (ii) the Continuous Diagnostics and Mitigation Program; and
8191 78 (iii) guidance and frameworks from the National Institute of Standards and
8292 79Technology.
8393 80 (5) (a) In procuring third-party cloud computing solutions, the division may utilize
8494 81established purchasing vehicles, including cooperative purchasing contracts and federal supply
8595 82contracts, to facilitate efficient purchasing.
8696 83 (b) The chief information officer shall establish a list of approved vendors that are
8797 84authorized to provide zero trust architecture to governmental entities in the state.
88-85 (c) If an executive branch agency determines that procurement of a third-party cloud H.B. 545 Enrolled Copy
89-- 4 -
98+85 (c) If an executive branch agency determines that procurement of a third-party cloud
9099 86computing solution is not feasible, the executive branch agency shall provide a written
91100 87explanation to the division of the reasons that a cloud computing solution is not feasible,
92101 88including:
93-89 (i) the reasons why the executive branch agency determined that a third-party cloud
102+89 (i) the reasons why the executive branch agency determined that a third-party cloud H.B. 545 02-22-23 11:33 AM
103+- 4 - Senate 3rd Reading Amendments 3-3-2023 lp/dc
94104 90computing solution is not feasible;
95105 91 (ii) specific challenges or difficulties of migrating existing solutions to a cloud
96106 92environment; and
97107 93 (iii) the total expected cost of ownership of existing or alternative solutions compared
98108 94to a cloud computing solution.
99109 95 (6) (a) On or before November 30 of each year, the chief information officer shall
100110 96report on the progress of implementing zero trust architecture and multi-factor authentication
101111 97to:
102-98 (i) the Public Utilities, Energy, and Technology Interim Committee; and
112+98 (i) the Öº [Government Operations] Public Utilities, Energy, and Technology »Ö
113+98a Interim Committee; and
103114 99 (ii) the Cybersecurity Commission created in Section 63C-25-201.
104115 100 (b) The report described in Subsection (6)(a) may include information on:
105116 101 (i) applicable guidance issued by the United States Cybersecurity and Infrastructure
106117 102Security Agency; and
107118 103 (ii) the progress of the division, executive branch agencies, and governmental entities
108119 104with respect to:
109120 105 (A) shifting away from a paradigm of trusted networks toward implementation of
110121 106security controls based on a presumption of compromise;
111122 107 (B) implementing principles of least privilege in administering information security
112123 108programs;
113124 109 (C) limiting the ability of entities that cause incidents to move laterally through or
114125 110between agency systems;
115126 111 (D) identifying incidents quickly; and
116127 112 (E) isolating and removing unauthorized entities from agency systems as quickly as
117-113practicable, accounting for cyber threat intelligence or law enforcement purposes. Enrolled Copy H.B. 545
118-- 5 -
119-114
128+113practicable, accounting for cyber threat intelligence or law enforcement purposes.