The term "cybersecurity vulnerability" has the meaning given the term "security vulnerability" in section 650 of this title.
There is in the Department a national cybersecurity and communications integration center (referred to in this section as the "Center") to carry out certain responsibilities of the Director. The Center shall be located in the Cybersecurity and Infrastructure Security Agency. The head of the Center shall report to the Executive Assistant Director for Cybersecurity.
The cybersecurity functions of the Center shall include-
The Center shall be composed of-
In the event of an incident, during exigent circumstances the Secretary may grant a Federal or non-Federal entity immediate temporary access to the Center.
In carrying out the functions under subsection (c), the Center shall ensure-
The Center shall maintain cyber hunt and incident response teams for the purpose of leading Federal asset response activities and providing timely technical assistance to Federal and non-Federal entities, including across all critical infrastructure sectors, regarding actual or potential security incidents, as appropriate and upon request, including-
The Center shall-
After notice to, and with the approval of, the entity requesting action by or technical assistance from the Center, the Secretary may include cybersecurity specialists from the private sector on a cyber hunt and incident response team.
The provision of assistance or information to, and inclusion in the Center, or any team or activity of the Center, of, governmental or private entities under this section shall be at the sole and unreviewable discretion of the Director.
The provision of certain assistance or information to, or inclusion in the Center, or any team or activity of the Center, of, one governmental or private entity pursuant to this section shall not create a right or benefit, substantive or procedural, to similar assistance or information for any other governmental or private entity.
The Director, in coordination with industry and other stakeholders, shall develop capabilities making use of existing information technology industry standards and best practices, as appropriate, that support and rapidly advance the development, adoption, and implementation of automated mechanisms for the sharing of cyber threat indicators and defensive measures in accordance with title I of the Cybersecurity Act of 2015 [6 U.S.C. 1501 et seq.].
The Director shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives an annual report on the status and progress of the development of the capabilities described in paragraph (1). Such reports shall be required until such capabilities are fully implemented.
The Center may enter into a voluntary information sharing relationship with any consenting non-Federal entity for the sharing of cyber threat indicators and defensive measures for cybersecurity purposes in accordance with this section. Nothing in this subsection may be construed to require any non-Federal entity to enter into any such information sharing relationship with the Center or any other entity. The Center may terminate a voluntary information sharing relationship under this subsection, at the sole and unreviewable discretion of the Secretary, acting through the Director, for any reason, including if the Center determines that the non-Federal entity with which the Center has entered into such a relationship has violated the terms of this subsection.
The Secretary may decline to enter into a voluntary information sharing relationship under this subsection, at the sole and unreviewable discretion of the Secretary, acting through the Director, for any reason, including if the Secretary determines that such is appropriate for national security.
A voluntary information sharing relationship under this subsection may be characterized as an agreement described in this paragraph.
For the use of a non-Federal entity, the Center shall make available a standard agreement, consistent with this section, on the Department's website.
At the request of a non-Federal entity, and if determined appropriate by the Center, at the sole and unreviewable discretion of the Secretary, acting through the Director, the Department shall negotiate a non-standard agreement, consistent with this section.
An agreement between the Center and a non-Federal entity that is entered into before December 18, 2015, or such an agreement that is in effect before such date, shall be deemed in compliance with the requirements of this subsection, notwithstanding any other provision or requirement of this subsection. An agreement under this subsection shall include the relevant privacy protections as in effect under the Cooperative Research and Development Agreement for Cybersecurity Information Sharing and Collaboration, as of December 31, 2014. Nothing in this subsection may be construed to require a non-Federal entity to enter into either a standard or negotiated agreement to be in compliance with this subsection.
The Secretary shall develop policies and procedures for direct reporting to the Secretary by the Director of the Center regarding significant cybersecurity risks and incidents.
Not later than 180 days after December 18, 2015, and periodically thereafter, the Secretary of Homeland Security shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report on the range of efforts underway to bolster cybersecurity collaboration with relevant international partners in accordance with subsection (c)(8).
Not later than 60 days after December 18, 2015, the Secretary, acting through the Director, shall-
The Secretary may leverage small business development centers to provide assistance to small business concerns by disseminating information on cyber threat indicators, defense measures, cybersecurity risks, incidents, analyses, and warnings to help small business concerns in developing or enhancing cybersecurity infrastructure, awareness of cyber threat indicators, and cyber training programs for employees.
For purposes of this subsection, the terms "small business concern" and "small business development center" have the meaning given such terms, respectively, under section 632 of title 15.
The Secretary, in coordination with industry and other stakeholders, may develop and adhere to Department policies and procedures for coordinating vulnerability disclosures.
The Director may, as appropriate, identify, develop, and disseminate actionable protocols to mitigate cybersecurity vulnerabilities to information systems and industrial control systems, including in circumstances in which such vulnerabilities exist because software or hardware is no longer supported by a vendor.
In this subsection, the term "covered device or system"-
If the Director identifies a system connected to the internet with a specific security vulnerability and has reason to believe such security vulnerability relates to critical infrastructure and affects a covered device or system, and the Director is unable to identify the entity at risk that owns or operates such covered device or system, the Director may issue a subpoena for the production of information necessary to identify and notify such entity at risk, in order to carry out a function authorized under subsection (c)(12).
A subpoena issued pursuant to subparagraph (A) may seek information-
The provisions of section 2703(e) of title 18, shall apply to any subpoena issued pursuant to subparagraph (A).
If the Director exercises the subpoena authority under this subsection, and in the interest of avoiding interference with ongoing law enforcement investigations, the Director shall coordinate the issuance of any such subpoena with the Department of Justice, including the Federal Bureau of Investigation, pursuant to interagency procedures which the Director, in coordination with the Attorney General, shall develop not later than 60 days after January 1, 2021.
The inter-agency procedures developed under this paragraph shall provide that a subpoena issued by the Director under this subsection shall be-
If any person, partnership, corporation, association, or entity fails to comply with any duly served subpoena issued pursuant to this subsection, the Director may request that the Attorney General seek enforcement of such subpoena in any judicial district in which such person, partnership, corporation, association, or entity resides, is found, or transacts business.
Not later than seven days after the date on which the Director receives information obtained through a subpoena issued pursuant to this subsection, the Director shall notify any entity identified by information obtained pursuant to such subpoena regarding such subpoena and the identified vulnerability.
Any subpoena issued pursuant to this subsection shall be authenticated with a cryptographic digital signature of an authorized representative of the Agency, or other comparable successor technology, that allows the Agency to demonstrate that such subpoena was issued by the Agency and has not been altered or modified since such issuance.
Any subpoena issued pursuant to this subsection that is not authenticated in accordance with subparagraph (A) shall not be considered to be valid by the recipient of such subpoena.
Not later than 90 days after January 1, 2021, the Director shall establish internal procedures and associated training, applicable to employees and operations of the Agency, regarding subpoenas issued pursuant to this subsection, which shall address the following:
The internal procedures established pursuant to paragraph (7) may not require an owner or operator of critical infrastructure to take any action as a result of a notice of vulnerability made pursuant to this chapter.
Not later than 1 year after January 1, 2021, the Privacy Officer of the Agency shall-
Not later than 120 days after establishing the internal procedures under paragraph (7), the Director shall publish information on the website of the Agency regarding the subpoena process under this subsection, including information regarding the following:
The Director shall annually submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report (which may include a classified annex but with the presumption of declassification) on the use of subpoenas issued pursuant to this subsection, which shall include the following:
The Director shall publish a version of the annual report required under paragraph (11) on the website of the Agency, which shall, at a minimum, include the findings described in clauses (iii), (iv), and (v) of subparagraph (A) of such paragraph.
Any information obtained pursuant to a subpoena issued under this subsection may not be provided to any other Federal department or agency for any purpose other than a cybersecurity purpose or for the purpose of enforcing a subpoena issued pursuant to this subsection.
The Director shall maintain capabilities to identify and address threats and vulnerabilities to products and technologies intended for use in the automated control of critical infrastructure processes. In carrying out this subsection, the Director shall-
The Center shall, upon request and to the extent practicable, and in coordination as appropriate with Federal and non-Federal entities, such as the Multi-State Information Sharing and Analysis Center-
Not later than 1 year after June 21, 2022, and every 2 years thereafter, the Secretary shall submit to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Homeland Security of the House of Representatives a report on the services and capabilities that the Agency directly and indirectly provides to SLTT entities.
1 So in original. There is no par. (2).
6 U.S.C. § 659
EDITORIAL NOTES
REFERENCES IN TEXTTitle I of the Cybersecurity Act of 2015, referred to in subsecs. (c)(1) and (h)(1), is title I of Pub. L. 114-113, 129 Stat. 2936, also known as the Cybersecurity Information Sharing Act of 2015, which is classified generally to subchapter I of chapter 6 of this title. For complete classification of title I to the Code, see Short Title note set out under section 1501 of this title and Tables.This chapter, referred to in subsec. (p)(8), was in the original "this Act", meaning Pub. L. 107-296, 116 Stat. 2135, known as the Homeland Security Act of 2002, which is classified principally to this chapter. For complete classification of this Act to the Code, see Short Title note set out below and Tables.
CODIFICATIONSection was formerly classified to section 148 of this title prior to renumbering by Pub. L. 115-278.
AMENDMENTS2022-Subsec. (a). Pub. L. 117-263, §7143(b)(2)(D)(i), added subsec. (a) and struck out former subsec. (a) which defined cybersecurity purpose, cybersecurity risk, cyber threat indicator, defensive measure, cybersecurity vulnerability, incident, information sharing and analysis organization, information system, security vulnerability, and sharing.Subsec. (b). Pub. L. 117-263, §7143(b)(2)(D)(ii), inserted "Executive" before "Assistant Director for Cybersecurity".Subsec. (c)(6). Pub. L. 117-150, §2(2)(A), inserted "operational and" before "timely".Subsec. (c)(13). Pub. L. 117-103 added par. (13).Subsec. (d)(1)(A)(iii). Pub. L. 117-263, §7143(b)(2)(D)(iii)(I), struck out ", as that term is defined under section 3003(4) of title 50" after "intelligence community".Subsec. (d)(1)(B)(ii). Pub. L. 117-263, §7143(b)(2)(D)(iii)(II), substituted "Information Sharing and Analysis Organizations" for "information sharing and analysis organizations".Subsec. (d)(1)(E). Pub. L. 117-150, §2(2)(B), inserted ", including an entity that collaborates with election officials," after "governments".Subsec. (e)(1)(E)(ii)(II). Pub. L. 117-263, §7143(b)(2)(D)(iv), substituted "Information Sharing and Analysis Organizations" for "information sharing and analysis organizations".Subsec. (p). Pub. L. 117-263, §7143(b)(2)(D)(v), redesignated subsec. (p) relating to coordination on cybersecurity for SLTT entities as (r). Pub. L. 117-150, §2(2)(C), added subsec. (p) relating to coordination on cybersecurity for SLTT entities.Subsec. (q). Pub. L. 117-263, §7143(b)(2)(D)(vi), redesignated subsec. (q) relating to report as (s). Pub. L. 117-150, §2(2)(C), added subsec. (q) relating to report.Subsec. (r). Pub. L. 117-263, §7143(b)(2)(D)(v), redesignated subsec. (p) relating to coordination on cybersecurity for SLTT entities as (r).Subsec. (s). Pub. L. 117-263, §7143(b)(2)(D)(vi), redesignated subsec. (q) relating to report as (s).2021-Subsec. (a). Pub. L. 117-81, §1542(1), added par. (4) and redesignated former pars. (4) to (8) (as previously added or redesignated by Pub. L. 116-283) as (5) to (9), respectively. Pub. L. 116-283, §1716(a)(1), added pars. (1) and (7) and redesignated former pars. (1) to (5) as (2) to (6), respectively, and former par. (6) as (8).Subsec. (c)(5)(B), (C). Pub. L. 117-81, §1542(2)(A), added subpar. (B), redesignated former subpar. (B) as (C), and inserted in subpar. (C) as redesignated "and mitigation protocols to counter cybersecurity vulnerabilities in accordance with subparagraph (B), as appropriate," before "with Federal".Subsec. (c)(6). Pub. L. 117-81, §1548(c), inserted ", which may take the form of continuous monitoring and detection of cybersecurity risks to critical infrastructure entities that own or operate industrial control systems that support national critical functions" after "mitigation, and remediation".Subsec. (c)(7)(C). Pub. L. 117-81, §1542(2)(B), substituted "share" for "sharing".Subsec. (c)(9). Pub. L. 117-81, §1542(2)(C), inserted "mitigation protocols to counter cybersecurity vulnerabilities, as appropriate," after "measures,".Subsec. (c)(12). Pub. L. 116-283, §1716(a)(2), added par. (12).Subsec. (e)(1)(I). Pub. L. 117-81, §1541(a)(1), added subpar. (I).Subsec. (o). Pub. L. 117-81, §1542(4), added subsec. (o). Former subsec. (o) redesignated (p) relating to subpoena authority. Pub. L. 116-283, §1716(a)(3), added subsec. (o).Subsec. (p). Pub. L. 117-81, §1542(3), redesignated subsec. (o) as (p) relating to subpoena authority.Subsec. (q). Pub. L. 117-81, §1541(a)(2), added subsec. (q) relating to industrial control systems.2019-Subsec. (d)(1)(B)(iv). Pub. L. 116-94, §102(a)(1), inserted ", including cybersecurity specialists" after "entities".Subsec. (f). Pub. L. 116-94, §102(a)(3), added subsec. (f). Former subsec. (f) redesignated (g).Subsec. (g). Pub. L. 116-94, §102(a)(2), redesignated subsec. (f) as (g). Former subsec. (g) redesignated (h).Subsec. (g)(1), (2). Pub. L. 116-94, §102(a)(4), inserted ", or any team or activity of the Center," after "Center".Subsecs. (h) to (n). Pub. L. 116-94, §102(a)(2), redesignated subsecs. (g) to (m) as (h) to (n), respectively.2018- Pub. L. 115-278, §2(g)(9)(A)(iii)(I), substituted "Director" for "Under Secretary appointed under section 113(a)(1)(H) of this title" wherever appearing.Subsec. (a)(4). Pub. L. 115-278, §2(g)(9)(A)(iii)(II), substituted "section 671(5) of this title" for "section 131(5) of this title".Subsec. (b). Pub. L. 115-278, §2(g)(9)(A)(iii)(III), inserted at end "The Center shall be located in the Cybersecurity and Infrastructure Security Agency. The head of the Center shall report to the Assistant Director for Cybersecurity."Subsec. (c)(11). Pub. L. 115-278, §2(g)(9)(A)(iii)(IV), substituted "Emergency Communications Division" for "Office of Emergency Communications".2016-Subsecs. (l), (m). Pub. L. 114-328 added subsec. (l) and redesignated former subsec. (l) as (m).2015-Subsec. (a)(1) to (5). Pub. L. 114-113, §203(1)(A), (B), added pars. (1) to (3), redesignated former pars. (3) and (4) as (4) and (5), respectively, and struck out former pars. (1) and (2), which defined "cybersecurity risk" and "incident", respectively.Subsec. (a)(6). Pub. L. 114-113, §203(1)(C)-(E), added par. (6).Subsec. (c)(1). Pub. L. 114-113, §203(2)(A), inserted "cyber threat indicators, defensive measures," before "cybersecurity risks" and ", including the implementation of title I of the Cybersecurity Act of 2015" before semicolon at end.Subsec. (c)(3). Pub. L. 114-113, §203(2)(B), substituted "cyber threat indicators, defensive measures, cybersecurity risks," for "cybersecurity risks".Subsec. (c)(5)(A). Pub. L. 114-113, §203(2)(C), substituted "cyber threat indicators, defensive measures, cybersecurity risks," for "cybersecurity risks".Subsec. (c)(6). Pub. L. 114-113, §203(2)(D), substituted "cyber threat indicators, defensive measures, cybersecurity risks," for "cybersecurity risks" and struck out "and" at end.Subsec. (c)(7)(C). Pub. L. 114-113, §203(2)(E), added subpar. (C).Subsec. (c)(8) to (11). Pub. L. 114-113, §203(2)(F), added pars. (8) to (11).Subsec. (d)(1)(B)(i). Pub. L. 114-113, §203(3)(A)(i), substituted ", local, and tribal" for "and local".Subsec. (d)(1)(B)(ii). Pub. L. 114-113, §203(3)(A)(ii), substituted ", including information sharing and analysis centers;" for "; and".Subsec. (d)(1)(B)(iv). Pub. L. 114-113, §203(3)(A)(iii), (iv), added cl. (iv).Subsec. (d)(1)(E), (F). Pub. L. 114-113, §203(3)(B)-(D), added subpar. (E) and redesignated former subpar. (E) as (F).Subsec. (e)(1)(A). Pub. L. 114-113, §203(4)(A)(i), inserted "cyber threat indicators, defensive measures, and" before "information".Subsec. (e)(1)(B). Pub. L. 114-113, §203(4)(A)(ii), inserted "cyber threat indicators, defensive measures, and" before "information related".Subsec. (e)(1)(F). Pub. L. 114-113, §203(4)(A)(iii), substituted "cyber threat indicators, defensive measures, cybersecurity risks," for "cybersecurity risks" and struck out "and" at end.Subsec. (e)(1)(G). Pub. L. 114-113, §203(4)(A)(iv), substituted "cyber threat indicators, defensive measures, cybersecurity risks, and incidents; and" for "cybersecurity risks and incidents".Subsec. (e)(1)(H). Pub. L. 114-113, §203(4)(A)(v), added subpar. (H).Subsec. (e)(2). Pub. L. 114-113, §203(4)(B), substituted "cyber threat indicators, defensive measures, cybersecurity risks," for "cybersecurity risks" and inserted "or disclosure" after "access".Subsec. (e)(3). Pub. L. 114-113, §203(4)(C), inserted ", including by working with the Privacy Officer appointed under section 142 of this title to ensure that the Center follows the policies and procedures specified in subsections (b) and (d)(5)(C) of section 105 of the Cybersecurity Act of 2015" before period at end.Subsecs. (g) to (l). Pub. L. 114-113, §203(5), added subsecs. (g) to (l).
STATUTORY NOTES AND RELATED SUBSIDIARIES
RULES OF CONSTRUCTIONNothing in amendment made by Pub. L. 117-263 to be construed to alter the authorities, responsibilities, functions, or activities of any agency (as such term is defined in 44 U.S.C. 3502) or officer or employee of the United States on or before Dec. 23, 2022, see section 7143(f)(1) of Pub. L. 117-263 set out as a note under section 650 of this title. Pub. L. 116-283, div. A, title XVII, §1716(b), Jan. 1, 2021, 134 Stat. 4098, provided that:"(1) PROHIBITION ON NEW REGULATORY AUTHORITY.-Nothing in this section or the amendments made by this section [amending this section] may be construed to grant the Secretary of Homeland Security, or the head of any another Federal agency or department, any authority to promulgate regulations or set standards relating to the cybersecurity of private sector critical infrastructure that was not in effect on the day before the date of the enactment of this Act [Jan. 1, 2021]."(2) PRIVATE ENTITIES.-Nothing in this section or the amendments made by this section [amending this section] may be construed to require any private entity to-"(A) request assistance from the Director of the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security; or"(B) implement any measure or recommendation suggested by the Director." Pub. L. 113-282, §8, Dec. 18, 2014, 128 Stat. 3072, provided that:"(a) PROHIBITION ON NEW REGULATORY AUTHORITY.-Nothing in this Act [see section 1 of Pub. L. 113-282 set out as a Short Title of 2014 Amendment note under section 101 of this title] or the amendments made by this Act shall be construed to grant the Secretary [of Homeland Security] any authority to promulgate regulations or set standards relating to the cybersecurity of private sector critical infrastructure that was not in effect on the day before the date of enactment of this Act [Dec. 18, 2014]."(b) PRIVATE ENTITIES.-Nothing in this Act or the amendments made by this Act shall be construed to require any private entity-"(1) to request assistance from the Secretary; or"(2) that requested such assistance from the Secretary to implement any measure or recommendation suggested by the Secretary."
DEFINITIONS Pub. L. 113-282, §2, Dec. 18, 2014, 128 Stat. 3066, provided that: "In this Act [see section 1 of Pub. L. 113-282 set out as a Short Title of 2014 Amendment note under section 101 of this title]-"(1) the term 'Center' means the national cybersecurity and communications integration center under section 226 [renumbered 227 by section 223(a)(3) of Pub. L. 114-113 and renumbered 2209 by section 2(g)(2)(I) of Pub. L. 115-278] of the Homeland Security Act of 2002 [6 U.S.C. 659], as added by section 3;"(2) the term 'critical infrastructure' has the meaning given that term in section 2 of the Homeland Security Act of 2002 (6 U.S.C. 101);"(3) the term 'cybersecurity risk' has the meaning given that term in section 226 [2209] of the Homeland Security Act of 2002, as added by section 3;"(4) the term 'information sharing and analysis organization' has the meaning given that term in section 212(5) [renumbered 2222(5) by section 2(g)(2)(H) of Pub. L. 115-278] of the Homeland Security Act of 2002 ([former] 6 U.S.C. 131(5)) [now 6 U.S.C. 671(5); see 6 U.S.C. 650(13)] ;"(5) the term 'information system' has the meaning given that term in section 3502(8) of title 44, United States Code; and"(6) the term 'Secretary' means the Secretary of Homeland Security."
- Department
- The term "Department" means the Department of Homeland Security.
- Secretary
- The term "Secretary" means the Secretary of Homeland Security.
- State
- The term "State" means any State of the United States, the District of Columbia, the Commonwealth of Puerto Rico, the Virgin Islands, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and any possession of the United States.
- functions
- The term "functions" includes authorities, powers, rights, privileges, immunities, programs, projects, activities, duties, and responsibilities.
- Agency
- the term "Agency" means the Federal Emergency Management Agency;