[Congressional Bills 118th Congress] [From the U.S. Government Publishing Office] [S. 5028 Reported in Senate (RS)] <DOC> Calendar No. 740 118th CONGRESS 2d Session S. 5028 [Report No. 118-320] To require Federal contractors to implement a vulnerability disclosure policy consistent with NIST guidelines, and for other purposes. _______________________________________________________________________ IN THE SENATE OF THE UNITED STATES September 11, 2024 Mr. Warner (for himself and Mr. Lankford) introduced the following bill; which was read twice and referred to the Committee on Homeland Security and Governmental Affairs December 19 (legislative day, December 16), 2024 Reported by Mr. Peters, with an amendment [Strike out all after the enacting clause and insert the part printed in italic] _______________________________________________________________________ A BILL To require Federal contractors to implement a vulnerability disclosure policy consistent with NIST guidelines, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, <DELETED>SECTION 1. SHORT TITLE.</DELETED> <DELETED> This Act may be cited as the ``Federal Contractor Cybersecurity Vulnerability Reduction Act of 2024''.</DELETED> <DELETED>SEC. 2. FEDERAL CONTRACTOR VULNERABILITY DISCLOSURE POLICY.</DELETED> <DELETED> (a) Recommendations.--</DELETED> <DELETED> (1) In general.--Not later than 180 days after the date of the enactment of this Act, the Director of the Office of Management and Budget, in consultation with the Director of the Cybersecurity and Infrastructure Security Agency, the National Cyber Director, the Director of the National Institute of Standards and Technology, and any other appropriate head of an Executive department, shall--</DELETED> <DELETED> (A) review the Federal Acquisition Regulation (FAR) contract requirements and language for contractor vulnerability disclosure programs; and</DELETED> <DELETED> (B) recommend updates to such requirements and language to the Federal Acquisition Regulation Council.</DELETED> <DELETED> (2) Contents.--The recommendations required by paragraph (1) shall include updates to such requirements designed to ensure that covered contractors implement a vulnerability disclosure policy consistent with National Institute of Standards and Technology (NIST) guidelines for contractors as required under section 5 of the IoT Cybersecurity Improvement Act of 2020 (15 U.S.C. 278g- 3c).</DELETED> <DELETED> (b) Procurement Requirements.--Not later than 180 days after the date on which the recommended contract language developed pursuant to subsection (a) is received, the Federal Acquisition Regulation Council shall review the recommended contract language and amend the FAR as necessary to incorporate requirements for covered contractors to solicit and address information about potential security vulnerabilities relating to an information system owned or controlled by the contractor that is used in performance of a Federal contract.</DELETED> <DELETED> (c) Elements.--The update to the FAR pursuant to subsection (b) shall--</DELETED> <DELETED> (1) to the maximum extent practicable, align with the security vulnerability disclosure process and coordinated disclosure requirements relating to Federal information systems under sections 5 and 6 of the IoT Cybersecurity Improvement Act of 2020 (15 U.S.C. 278g-3c, 278g-3d); and</DELETED> <DELETED> (2) to the maximum extent practicable, be aligned with industry best practices and Standards 29147 and 30111 of the International Standards Organization (or any successor standard) or any other appropriate, relevant, and widely used standard.</DELETED> <DELETED> (d) Waiver.--The head of an agency may waive the security vulnerability disclosure policy requirement under subsection (b) if the agency Chief Information Officer--</DELETED> <DELETED> (1) determines that the waiver is necessary in the interest of national security or research purposes; and</DELETED> <DELETED> (2) not later than 30 days after granting the waiver, submits a notification and justification, including information about the duration of the waiver, to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Oversight and Accountability of the House of Representatives.</DELETED> <DELETED> (e) Department of Defense Supplement to the Federal Acquisition Regulation.--</DELETED> <DELETED> (1) Review.--Not later than 180 days after the date of the enactment of this Act, the Secretary of Defense shall review the Department of Defense Supplement to the Federal Acquisition Regulation (DFARS) contract requirements and language for contractor vulnerability disclosure programs and develop updates to such requirements designed to ensure that covered contractors, to the maximum extent practicable, align with the security vulnerability disclosure process and coordinated disclosure requirements relating to Federal information systems under sections 5 and 6 of the IoT Cybersecurity Improvement Act of 2020 (15 U.S.C. 278g-3c, 278g- 3d).</DELETED> <DELETED> (2) Revisions.--Not later than 180 days after the date on which the review required under subsection (a) is completed, the Secretary shall revise the DFARS as necessary to incorporate requirements for covered contractors to receive information about a potential security vulnerability relating to an information system owned or controlled by a contractor, in performance of the contract.</DELETED> <DELETED> (3) Elements.--The Secretary shall ensure that the revision to the DFARS described in this subsection is carried out in accordance with the requirements of paragraphs (1) and (2) of subsection (c).</DELETED> <DELETED> (4) Waiver.--The Chief Information Officer of the Department of Defense may waive the security vulnerability disclosure policy requirements under paragraph (2) if the Chief Information Officer--</DELETED> <DELETED> (A) determines that the waiver is necessary in the interest of national security or research purposes; and</DELETED> <DELETED> (B) not later than 30 days after granting the waiver, submits a notification and justification, including information about the duration of the waiver, to the Committee on Armed Services of the Senate and the Committee on Armed Services of the House of Representatives.</DELETED> <DELETED> (f) Definitions.--In this section:</DELETED> <DELETED> (1) Agency.--The term ``agency'' has the meaning given the term in section 3502 of title 44, United States Code.</DELETED> <DELETED> (2) Covered contractor.--The term ``covered contractor'' means a contractor (as defined in section 7101 of title 41, United States Code)--</DELETED> <DELETED> (A) whose contract is in an amount the same as or greater than the simplified acquisition threshold; or</DELETED> <DELETED> (B) that uses, operates, manages, or maintains a Federal information system (as defined by section 11331 of title 40, United Stated Code) on behalf of an agency.</DELETED> <DELETED> (3) Executive department.--The term ``Executive department'' has the meaning given that term in section 101 of title 5, United States Code.</DELETED> <DELETED> (4) Security vulnerability.--The term ``security vulnerability'' has the meaning given that term in section 2200 of the Homeland Security Act of 2002 (6 U.S.C. 650).</DELETED> <DELETED> (5) Simplified acquisition threshold.--The term ``simplified acquisition threshold'' has the meaning given that term in section 134 of title 41, United States Code.</DELETED> SECTION 1. SHORT TITLE. This Act may be cited as the ``Federal Contractor Cybersecurity Vulnerability Reduction Act of 2024''. SEC. 2. FEDERAL CONTRACTOR VULNERABILITY DISCLOSURE POLICY. (a) Recommendations.-- (1) In general.--Not later than 180 days after the date of the enactment of this Act, the Director of the Office of Management and Budget, in consultation with the Director of the Cybersecurity and Infrastructure Security Agency, the National Cyber Director, the Director of the National Institute of Standards and Technology, and any other appropriate head of an Executive department, shall-- (A) review the Federal Acquisition Regulation (FAR) contract requirements and language for contractor vulnerability disclosure programs; and (B) recommend updates to such requirements and language to the Federal Acquisition Regulation Council. (2) Contents.--The recommendations required by paragraph (1) shall include updates to such requirements designed to ensure that covered contractors implement a vulnerability disclosure policy consistent with National Institute of Standards and Technology (NIST) guidelines for contractors as required under section 5 of the IoT Cybersecurity Improvement Act of 2020 (15 U.S.C. 278g-3c). (b) Procurement Requirements.--Not later than 180 days after the date on which the recommended contract language developed pursuant to subsection (a) is received, the Federal Acquisition Regulation Council shall review the recommended contract language and amend the FAR as necessary to incorporate requirements for covered contractors to solicit and address information about potential security vulnerabilities relating to an information system owned or controlled by the contractor that is used in performance of a Federal contract. (c) Elements.--The update to the FAR pursuant to subsection (b) shall-- (1) to the maximum extent practicable, align with the security vulnerability disclosure process and coordinated disclosure requirements relating to Federal information systems under sections 5 and 6 of the IoT Cybersecurity Improvement Act of 2020 (15 U.S.C. 278g-3c, 278g-3d); and (2) to the maximum extent practicable, be aligned with industry best practices and Standards 29147 and 30111 of the International Standards Organization (or any successor standard) or any other appropriate, relevant, and widely used standard. (d) Waiver.--The head of an agency may waive the security vulnerability disclosure policy requirement under subsection (b) if the agency Chief Information Officer-- (1) determines that the waiver is necessary in the interest of national security or research purposes; and (2) not later than 30 days after granting the waiver, submits a notification and justification, including information about the duration of the waiver, to the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Oversight and Accountability of the House of Representatives. (e) Definitions.--In this section: (1) Agency.--The term ``agency'' has the meaning given the term in section 3502 of title 44, United States Code. (2) Covered contractor.--The term ``covered contractor'' means a contractor (as defined in section 7101 of title 41, United States Code)-- (A) whose contract is in an amount the same as or greater than the simplified acquisition threshold; or (B) that uses, operates, manages, or maintains a Federal information system (as defined by section 11331 of title 40, United Stated Code) on behalf of an agency. (3) Executive department.--The term ``Executive department'' has the meaning given that term in section 101 of title 5, United States Code. (4) Security vulnerability.--The term ``security vulnerability'' has the meaning given that term in section 2200 of the Homeland Security Act of 2002 (6 U.S.C. 650). (5) Simplified acquisition threshold.--The term ``simplified acquisition threshold'' has the meaning given that term in section 134 of title 41, United States Code. SEC. 3. NO ADDITIONAL FUNDING. No additional funds are authorized to be appropriated for the purpose of carrying out this Act. Calendar No. 740 118th CONGRESS 2d Session S. 5028 [Report No. 118-320] _______________________________________________________________________ A BILL To require Federal contractors to implement a vulnerability disclosure policy consistent with NIST guidelines, and for other purposes. _______________________________________________________________________ December 19 (legislative day, December 16), 2024 Reported with an amendment