Agency Information Collection Activities: Incident Reporting Form and Associated Submission Tools (ICR 1670-0037)

Download PDF
Federal RegisterOct 21, 2024
89 Fed. Reg. 84183 (Oct. 21, 2024)
Document Headings

Document headings vary by document type but may contain the following:

  • the agency or agencies that issued and signed a document
  • the number of the CFR title and the number of each part the document amends, proposes to amend, or is directly related to
  • the agency docket number / agency internal file number
  • the RIN which identifies each regulatory action listed in the Unified Agenda of Federal Regulatory and Deregulatory Actions
  • See the Document Drafting Handbook for more details.

    Department of Homeland Security
  • [Docket No. CISA-2024-0013]
  • AGENCY:

    Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS).

    ACTION:

    30-Day notice and request for comments.

    SUMMARY:

    The Cybersecurity Division (CSD) within the Cybersecurity and Infrastructure Security Agency (CISA) submits the following information collection request (ICR) to the Office of Management and Budget (OMB) for review and clearance. CISA previously published this information collection request (ICR) in the Federal Register on June 26, 2024, for a 60-day public comment period. CISA received no comments related to this information collection during the comment period. The purpose of this notice is to allow additional 30-days for public comments.

    DATES:

    Comments are encouraged and will be accepted until November 20, 2024. Submissions received after the deadline for receiving comments may not be considered.

    ADDRESSES:

    Written comments and recommendations for the proposed information collection should be sent within 30 days of publication of this notice to www.reginfo.gov/public/do/PRAMain . Find this particular information collection by selecting “Currently under 30-day Review—Open for Public Comments” or by using the search function.

    The Office of Management and Budget is particularly interested in comments which:

    1. Evaluate whether the proposed collection of information is necessary for the proper performance of the functions of the agency, including whether the information will have practical utility;

    2. Evaluate the accuracy of the agency's estimate of the burden of the proposed collection of information, including the validity of the methodology and assumptions used;

    3. Enhance the quality, utility, and clarity of the information to be collected; and

    4. Minimize the burden of the collection of information on those who are to respond, including through the use of appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of information technology, e.g., permitting electronic submissions of responses.

    FOR FURTHER INFORMATION CONTACT:

    Brian DeWyngaert; 202-657-1360; Brian.dewyngaert@cisa.dhs.gov.

    SUPPLEMENTARY INFORMATION:

    CISA serves as “a Federal civilian interface for the multi-directional and cross-sector sharing of information related to cyber threat indicators, defensive measures, cybersecurity risks, incidents, analysis, and warnings for Federal and non-Federal entities.” 6 U.S.C. 659(c)(1).

    CISA is responsible for performing, coordinating, and supporting response to information security incidents, which may originate outside the Federal community and affect users within it, or originate within the Federal community and affect users outside of it. CISA uses the information from incident reports to develop timely and actionable information for distribution to federal departments and agencies; state, local, tribal and territorial (SLTT) governments; critical infrastructure owners and operators; private industry; and international organizations. Often, the effective handling of security incidents relies on information sharing among individual users, industry, and the Federal Government, which may be facilitated by and through CISA.

    Pursuant to the Federal Information Security Modernization Act of 2014 (FISMA), 44 U.S.C. 3552 et seq., CISA operates the federal information security incident center for the United States Federal Government. 44 U.S.C. 3556. Federal agencies notify and consult with CISA regarding information security incidents involving federal information systems. CISA provides federal agencies with technical assistance and guidance on detecting and handling security incidents, compile and analyze incident information that threatens information security, inform agencies of current and potential threats and vulnerabilities, and provide intelligence or other information about cyber threats, vulnerabilities, and incidents to agencies. 44 U.S.C. 3556(a). CISA also receives voluntary incident reports from non-federal entities.

    CISA's website (at https://www.cisa.gov/ ) is a primary tool used by constituents to report incident information, access information sharing products and services, and interact with CISA. Constituents, which may include anyone or any entity in the public, use forms located on the website to complete these activities. Incident reports are primarily submitted using CISA's internet reporting system, available at https://www.cisa.gov/forms/report . CISA collects cyber threat indicators and defensive measures in accordance with the requirements of the Cybersecurity Information Sharing Act of 2015 through CISA's Cyber Threat Indicator and Defensive Measure Submission System, https://www.cisa.gov/forms/share-indicators . CISA shares cyber threat indicators and defensive measures it receives with certain federal entities in an automated and real-time manner. 6 U.S.C. 1504(c).

    By accepting incident reports and feedback, and interacting among federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cybersecurity information to the public, CISA has provided a way for citizens, businesses, and other institutions to communicate and coordinate directly with the Federal Government about cybersecurity. The information is collected via the following forms:

    1. The Incident Reporting Form, DHS Cyber Threat Indicator and Defensive Measure Submission System , and Malware Analysis Submission Form enable end users to report incidents and indicators as well as submit malware artifacts associated with incidents to CISA. This information is used by DHS to conduct analyses and provide warnings of system threats and vulnerabilities, and to develop mitigation strategies as appropriate. These forms also request the user's name, email address, organization, and infrastructure sector. The primary purpose for the collection of this information is to allow DHS to contact requestors regarding their request.

    2. The Mail Lists Form enables end users to subscribe to the National Cyber Awareness System's mailing lists, which deliver the content of and links to CISA's information sharing products. The user must provide an email address in order to subscribe or unsubscribe, though subscribing or unsubscribing are optional. The primary purpose for the collection of this information is to allow DHS to contact requestors regarding their request.

    3. The Cyber Security Evaluation Tool (CSET) Download Form, which requests the name, email address, organization, infrastructure sector, country, and intended use of those seeking to download the CSET. All requested fields are optional. The primary purpose for the collection of this information is to allow DHS to contact requestors regarding their request.

    Web form submission is also used as the collection method for the other forms listed. In addition to web-based electronic forms, information may be collected through email or telephone. These methods enable individuals, private sector entities, personnel working at other federal or state agencies, and international entities, including individuals, companies and other nations' governments to submit information.

    This information collection request is a renewal of an existing collection of information. There are minor changes to the forms, questions, or other collection instruments. These changes reflect the addition of questions for reporting purposes. With this renewal, CISA is replacing the current Advanced Malware Analysis Capability (AMAC) submission form with the Malware Analysis Submission Form (“Malware Next-Gen”), but that form's questions will not change. CISA is also updating the Incident Reporting Form by removing one question, modifying some of the existing questions, and adding questions in order to both improve user experience and help the agency efficiently categorize incident reporting data. To review the developmental digital copy of this updated information collection, please contact the POC listed above in this notice request.

    This collection of information will not have a significant economic impact on a substantial number of small entities. Due to increases in wage rates, the changes to the collection since the previous OMB approval include updated burden and cost estimates. The annual burden cost increased by $42,540, from $543,401 to $585,941. The annual government cost increased by $610,548, from $1,886,112 to $2,496,660.

    Analysis

    Agency: Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS).

    Title: Agency Information Collection Activities: Incident Reporting Form and Associated Submission Tools.

    OMB Number: 1670-0037.

    Frequency: Annually.

    Affected Public: State, Local, Tribal, and Territorial Governments, Private Sector, and Academia.

    Number of Respondents: 139,125.

    Estimated Time per Respondent: 0.3333 hours, 0.1667 hours, or 0.0167 hours.

    Total Burden Hours: 13,852 hours.

    Total Annual Burden Cost: $585,941.

    Total Government Burden Cost: $2,496,660.

    Robert J. Costello,

    Chief Information Officer, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency.

    [FR Doc. 2024-24312 Filed 10-18-24; 8:45 am]

    BILLING CODE 9111-LF-P