Joint Working Group on Improving Cybersecurity and Resilience Through Acquisition, 27966-27968 [2013-11239]
Download as PDF
27966
Federal Register / Vol. 78, No. 92 / Monday, May 13, 2013 / Notices
Hours per
response
FDIC Document
Declaration
Declaration
Declaration
Declaration
Declaration
Declaration
Declaration
Declaration
Declaration
Declaration
Declaration
Declaration
Declaration
Number of
respondents
Burden
hours
for Government Deposit, Form 7200/04 ..................................................................
for Revocable Trust, Form 7200/05 .........................................................................
of Independent Activity, Form 7200/06 ....................................................................
of Independent Activity for Unincorporated Association, Form 7200/07 .................
for Joint Ownership Deposit, Form 7200/08 ............................................................
for Testamentary Deposit, Form 7200/09 ................................................................
for Defined Contribution Plan, Form 7200/10 ..........................................................
for IRA/KEOGH Deposit, Form 7200/11 ..................................................................
for Defined Benefit Plan, Form 7200/12 ..................................................................
of Custodian Deposit, Form 7200/13 .......................................................................
for Health and Welfare Plan, Form 7200/14 ............................................................
for Plan and Trust, Form 7200/15 ............................................................................
for Irrevocable Trust, Form 7200/18 ........................................................................
0.50
0.50
0.50
0.50
0.50
0.50
1.0
0.50
1.0
0.50
1.0
0.50
0.50
30
150
5
5
5
50
10
5
10
5
20
20
10
15
75
2.5
2.5
2.5
25
10
2.5
10
2.5
20
10
5
Sub-total ...............................................................................................................................
........................
5025
182.5
Additional Burden for Deposit Brokers Only ...............................................................................
........................
70
Total ...............................................................................................................................
........................
5095
General Description of Collection: The
collection involves forms used by the
FDIC to obtain information from
individual depositors and deposit
brokers necessary to supplement the
records of failed depository institutions
to make determinations regarding
deposit insurance coverage for
depositors of failed institutions. The
information provided allows the FDIC to
identify the actual owners of an account
and each owner’s interest in the
account.
Request for Comment
tkelley on DSK3SPTVN1PROD with NOTICES
Comments are invited on: (a) Whether
these collections of information are
necessary for the proper performance of
the FDIC’s functions, including whether
the information has practical utility; (b)
the accuracy of the estimate of the
burden of the information collection,
including the validity of the
methodology and assumptions used; (c)
ways to enhance the quality, utility, and
clarity of the information to be
collected; and (d) ways to minimize the
burden of the information collection on
respondents, including through the use
of automated collection techniques or
other forms of information technology.
All comments will become a matter of
public record.
Dated at Washington, DC, this 7th day of
May, 2013.
Federal Deposit Insurance Corporation.
Robert E. Feldman,
Executive Secretary.
[FR Doc. 2013–11205 Filed 5–10–13; 8:45 am]
BILLING CODE 6714–01–P
VerDate Mar<15>2010
16:13 May 10, 2013
Jkt 229001
FEDERAL RESERVE SYSTEM
Formations of, Acquisitions by, and
Mergers of Bank Holding Companies
The companies listed in this notice
have applied to the Board for approval,
pursuant to the Bank Holding Company
Act of 1956 (12 U.S.C. 1841 et seq.)
(BHC Act), Regulation Y (12 CFR part
225), and all other applicable statutes
and regulations to become a bank
holding company and/or to acquire the
assets or the ownership of, control of, or
the power to vote shares of a bank or
bank holding company and all of the
banks and nonbanking companies
owned by the bank holding company,
including the companies listed below.
The applications listed below, as well
as other related filings required by the
Board, are available for immediate
inspection at the Federal Reserve Bank
indicated. The applications will also be
available for inspection at the offices of
the Board of Governors. Interested
persons may express their views in
writing on the standards enumerated in
the BHC Act (12 U.S.C. 1842(c)). If the
proposal also involves the acquisition of
a nonbanking company, the review also
includes whether the acquisition of the
nonbanking company complies with the
standards in section 4 of the BHC Act
(12 U.S.C. 1843). Unless otherwise
noted, nonbanking activities will be
conducted throughout the United States.
Unless otherwise noted, comments
regarding each of these applications
must be received at the Reserve Bank
indicated or the offices of the Board of
Governors not later than June 7, 2013.
A. Federal Reserve Bank of St. Louis
(Yvonne Sparks, Community
Development Officer) P.O. Box 442, St.
Louis, Missouri 63166–2034:
PO 00000
Frm 00032
Fmt 4703
Sfmt 4703
137
319.5
1. Wildcat Bancshares, Inc.,
Springfield, Missouri; to become a bank
holding company by acquiring 100
percent of the voting shares of CBR
Bancshares, Corporation, and thereby
acquire Citizens Bank of Rogersville,
both in Rogersville, Missouri.
Board of Governors of the Federal Reserve
System, May 8, 2013.
Michael J. Lewandowski,
Assistant Secretary of the Board.
[FR Doc. 2013–11248 Filed 5–10–13; 8:45 am]
BILLING CODE 6210–01–P
GENERAL SERVICES
ADMINISTRATION
[Notice–OERR–2013–01; Docket No. 2013–
0002; Sequence 10]
Joint Working Group on Improving
Cybersecurity and Resilience Through
Acquisition
Office of Emergency Response
and Recovery, U.S. General Services
Administration (GSA).
ACTION: Request for information.
AGENCY:
SUMMARY: On February 12th, 2013, the
President issued the Executive Order for
Improving Critical Infrastructure
Cybersecurity (Executive Order 13636).
In accordance with Section 8(e) of
Executive Order 13636, within 120
days, the General Services
Administration and the Department of
Defense, in consultation with the
Department of Homeland Security and
the Federal Acquisition Regulation
Council, are required to make
recommendations on the feasibility,
security benefits, and relative merits of
incorporating security standards into
acquisition planning and contract
administration and address what steps
E:\FR\FM\13MYN1.SGM
13MYN1
Federal Register / Vol. 78, No. 92 / Monday, May 13, 2013 / Notices
tkelley on DSK3SPTVN1PROD with NOTICES
can be taken to harmonize, and make
consistent, existing procurement
requirements related to cybersecurity.
Public outreach is a critically
important activity for implementation of
the Executive Order. In an effort to
obtain broad stakeholder involvement,
the General Services Administration
and the Department of Defense are
publishing this Request for Information
(RFI) seeking information that can be
used in the Section 8(e) report.
DATES: Effective date: Submit comments
on or before June 12, 2013.
ADDRESSES: Submit comments in
response to Notice–OERR–2013–01 by
any of the following methods:
• Regulations.gov: https://
www.regulations.gov. Submit comments
via the Federal eRulemaking portal by
searching for ‘‘Notice–OERR–2013–01’’.
Select the link ‘‘Submit a Comment’’
that corresponds with ‘‘Notice–OERR–
2013–01’’. Follow the instructions
provided at the ‘‘Submit a Comment’’
screen. Please include your name,
company name (if any), and ‘‘Notice–
OERR–2013–01’’ on your attached
document.
• Mail: General Services
Administration, Regulatory Secretariat
(MVCB), ATTN: Hada Flowers, 1275
First Street NE., 7th Floor, Washington,
DC 20417.
Instructions: Please submit comments
only and cite ‘‘Notice-OERR–2013–01’’,
in all correspondence related to this
case. All comments received will be
posted without change to https://
www.regulations.gov, including any
personal and/or business confidential
information provided.
FOR FURTHER INFORMATION CONTACT: Mr.
Emile Monette, U.S. General Services
Administration, at
emile.monette@gsa.gov or 703–605–
5470.
SUPPLEMENTARY INFORMATION:
A. Background
On February 12th, 2013, the President
issued the Executive Order for
Improving Critical Infrastructure
Cybersecurity (E.O. 13636) and the
Presidential Policy Directive on Critical
Infrastructure Security and Resilience
(PPD–21). In accordance with Section
8(e) of Executive Order 13636 (EO),
within 120 days, the General Services
Administration and the Department of
Defense, in consultation with the
Department of Homeland Security and
the Federal Acquisition Regulation
Council, are required to make
recommendations on the feasibility,
security benefits, and relative merits of
incorporating security standards into
acquisition planning and contract
VerDate Mar<15>2010
16:13 May 10, 2013
Jkt 229001
administration and address what steps
can be taken to harmonize, and make
consistent, existing procurement
requirements related to cybersecurity.
Among other things, PPD–21 requires
the General Services Administration, in
consultation with the Department of
Defense and the Department of
Homeland Security, to jointly provide
and support government-wide contracts
for critical infrastructure systems and
ensure that such contracts include audit
rights for the security and resilience of
critical infrastructure.
In order to accomplish the task
required by EO Section 8(e), the General
Services Administration (GSA) and the
Department of Defense (DoD) have
formed the ‘‘Joint Working Group on
Improving Cybersecurity and Resilience
through Acquisition,’’ (Working Group)
with GSA as the lead agency. The
Working Group is comprised of topicknowledgeable members selected from
the DoD, GSA, the Department of
Homeland Security (DHS), the Office of
Federal Procurement Policy (OFPP), and
the National Institute of Standards and
Technology (NIST). The Working Group
is coordinating its efforts to obtain input
from the stakeholder community,
including industry, academia, and
federal, state, and local government.
Public outreach is a critically
important activity for implementation of
the EO and PPD. In an effort to obtain
broad stakeholder involvement, the
Working Group is publishing this
Request for Information (RFI) seeking
information that can be used in the
Section 8(e) report. To the extent
applicable, the Section 8(e)
recommendations will also lay the
foundation for establishment or
identification of the government-wide
cybersecurity contracts required by
PPD–21.
The Working Group is also directly
engaged with the DHS Interagency Task
Force (ITF). The ITF has been
established to lead implementation of
the EO and PPD–21, including, among
other things, stakeholder engagement.
The ITF has established working groups
to accomplish the major deliverables
and action items required by the EO and
PPD, and this RFI for the Section 8(e)
report is one element of the larger
outreach efforts underway to address
the requirements of the EO and PPD.
The importance of common language
cannot be overstated. It is apparent that
a common lexicon is one of the critical
gaps in harmonizing federal acquisition
requirements related to cybersecurity.
Given the limitations of the unsettled
definition of the word, for purposes of
this RFI, the term ‘‘cybersecurity’’ is
given a broad meaning that includes
PO 00000
Frm 00033
Fmt 4703
Sfmt 4703
27967
information security and related areas,
like supply chain risk management,
information assurance, and software
assurance, as well as other efforts to
address threats or vulnerabilities
flowing from or enabled by connection
to digital infrastructure.
In responding to the questions below,
please highlight any applicable
distinctions in responses related to
classified and unclassified acquisitions.
Feasibility and Federal Acquisition: In
general, DoD and GSA seek input about
the feasibility of incorporating
cybersecurity standards into federal
acquisitions.
For example:
1. What is the most feasible method
to incorporate cybersecurity-relevant
standards in acquisition planning and
contract administration? What are the
cost and other resource implications for
the federal acquisition system
stakeholders?
2. How can the federal acquisition
system, given its inherent constraints
and the current fiscal realities, best use
incentives to increase cybersecurity
amongst federal contractors and
suppliers at all tiers? How can this be
accomplished while minimizing barriers
to entry to the federal market?
3. What are the implications of
imposing a set of cybersecurity baseline
standards and implementing an
associated accreditation program?
4. How can cybersecurity be improved
using standards in acquisition planning
and contract administration?
5. What are the greatest challenges in
developing a cross-sector standardsbased approach cybersecurity risk
analysis and mitigation process for the
federal acquisition system?
6. What is the appropriate balance
between the effectiveness and feasibility
of implementing baseline security
requirements for all businesses?
7. How can the government increase
cybersecurity in federal acquisitions
while minimizing barriers to entry?
8. Are there specific categories of
acquisitions to which federal
cybersecurity standards should (or
should not) apply?
9. Beyond the general duty to protect
government information in federal
contracts, what greater levels of security
should be applied to which categories of
federal acquisition or sectors of
commerce?
10. How can the Federal government
change its acquisition practices to
ensure the risk owner (typically the end
user) makes the critical decisions about
that risk throughout the acquisition
lifecycle?
11. How do contract type (e.g., firm
fixed price, time and materials, cost-
E:\FR\FM\13MYN1.SGM
13MYN1
tkelley on DSK3SPTVN1PROD with NOTICES
27968
Federal Register / Vol. 78, No. 92 / Monday, May 13, 2013 / Notices
plus, etc.) and source selection method
(e.g., lowest price technically
acceptable, best value, etc.) affect your
organization’s cybersecurity risk
definition and assessment in federal
acquisitions?
12. How would you recommend the
government evaluate the risk from
companies, products, or services that do
not comply with cybersecurity
standards?
Commercial Practices: In general, DoD
and GSA seek information about
commercial procurement practices
related to cybersecurity.
For example:
13. To what extent do any commonly
used commercial standards fulfill
federal requirements for your sector?
14. Is there a widely accepted risk
analysis framework that is used within
your sector that the federal acquisition
community could adapt to help
determine which acquisitions should
include the requirement to apply
cybersecurity standards?
15. Describe your organization’s
policies and procedures for governing
cybersecurity risk. How does senior
management communicate and oversee
these policies and procedures? How has
this affected your organization’s
procurement activities?
16. Does your organization use
‘‘preferred’’ or ‘‘authorized’’ suppliers or
resellers to address cybersecurity risk?
How are the suppliers identified and
utilized?
17. What tools are you using to brief
cybersecurity risks in procurement to
your organization’s management?
18. What performance metrics and
goals do organizations adopt to ensure
their ability to manage cybersecurity
risk in procurement and maintain the
ability to provide essential services?
19. Is your organization a preferred
supplier to any customers that require
adherence to cybersecurity standards for
procurement? What are the
requirements to obtain preferred
supplier status with this customer?
20. What procedures or assessments
does your organization have in place to
vet and approve vendors from the
perspective of cybersecurity risk?
21. How does your organization
handle and address cybersecurity
incidents that occur in procurements?
Do you aggregate this information for
future use? How do you use it?
22. What mechanisms does your
organization have in place for the secure
exchange of information and data in
procurements?
23. Does your organization have a
procurement policy for the disposal for
hardware and software?
VerDate Mar<15>2010
16:13 May 10, 2013
Jkt 229001
24. How does your organization
address new and emerging threats or
risks in procurement for private sector
commercial transactions? Is this process
the same or different when performing
a federal contract? Explain.
25. Within your organization’s
corporate governance structure, where is
cyber risk management located (e.g.,
CIO, CFO, Risk Executive)?
26. If applicable, does your Corporate
Audit/Risk Committee examine retained
risks from cyber and implement special
controls to mitigate those retained risks?
27. Are losses from cyber risks and
breaches treated as a cost of doing
business?
28. Does your organization have
evidence of a common set of
information security standards (e.g.,
written guidelines, operating manuals,
etc)?
29. Does your organization disclose
vulnerabilities in your product/services
to your customers as soon as they
become known? Why or why not?
30. Does your organization have trackand-trace capabilities and/or the means
to establish the provenance of products/
services throughout your supply chain?
31. What testing and validation
practices does your organization
currently use to ensure security and
reliability of products it purchases?
Harmonization: In general, DoD and
GSA seek information about any
conflicts in statutes, regulations,
policies, practices, contractual terms
and conditions, or acquisition processes
affecting federal acquisition
requirements related to cybersecurity
and how the federal government might
address those conflicts.
For example:
32. What cybersecurity requirements
that affect procurement in the United
States (e.g., local, state, federal, and
other) has your organization
encountered? What are the conflicts in
these requirements, if any? How can any
such conflicts best be harmonized or deconflicted?
33. What role, in your organization’s
view, should national/international
standards organizations play in
cybersecurity in federal acquisitions?
34. What cybersecurity requirements
that affect your organization’s
procurement activities outside of the
United States (e.g., local, state, national,
and other) has your organization
encountered? What are the conflicts in
these requirements, if any? How can any
such conflicts best be harmonized or deconflicted with current or new
requirements in the United States?
35. Are you required by the terms of
contracts with federal agencies to
comply with unnecessarily duplicative
PO 00000
Frm 00034
Fmt 4703
Sfmt 4703
or conflicting cybersecurity
requirements? Please provide details.
36. What policies, practices, or other
acquisition processes should the federal
government change in order to achieve
cybersecurity in federal acquisitions?
37. Has your organization recognized
competing interests amongst
procurement security standards in the
private sector? How has your company
reconciled these competing or
conflicting standards?
Dated: May 7, 2013.
Darren Blue,
Associate Administrator for the GSA, Office
of Emergency Response and Recovery.
[FR Doc. 2013–11239 Filed 5–10–13; 8:45 am]
BILLING CODE 6820–89–P
GENERAL SERVICES
ADMINISTRATION
[FMR Bulletin–PBS–2013–01; Docket 2013–
0002; Sequence 5]
Federal Management Regulation;
Redesignations of Federal Buildings
Public Buildings Service (PBS),
General Services Administration (GSA).
ACTION: Notice of a bulletin.
AGENCY:
SUMMARY: The attached bulletin
announces the designation and
redesignation of six Federal buildings.
DATES: Expiration Date: This bulletin
announcement expires July 30, 2013.
The building designations and
redesignations remains in effect until
canceled or superseded by another
bulletin.
U.S.
General Services Administration, Public
Buildings Service (PBS), 1800 F Street
NW., Washington, DC 20405, telephone
number: 202–501–1100.
FOR FURTHER INFORMATION CONTACT:
Dan Tangherlini,
Acting Administrator of General Services.
U.S. GENERAL SERVICES
ADMINISTRATION
DESIGNATIONS AND
REDESIGNATION OF FEDERAL
BUILDINGS
TO: Heads of Federal Agencies
SUBJECT: Redesignations of Federal
Buildings
1. What is the purpose of this
bulletin? This bulletin announces the
designation and redesignation of six
Federal buildings.
2. When does this bulletin expire?
This bulletin announcement expires
July 30, 2013. The building designations
and redesignations remain in effect until
E:\FR\FM\13MYN1.SGM
13MYN1
Agencies
[Federal Register Volume 78, Number 92 (Monday, May 13, 2013)]
[Notices]
[Pages 27966-27968]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2013-11239]
=======================================================================
-----------------------------------------------------------------------
GENERAL SERVICES ADMINISTRATION
[Notice-OERR-2013-01; Docket No. 2013-0002; Sequence 10]
Joint Working Group on Improving Cybersecurity and Resilience
Through Acquisition
AGENCY: Office of Emergency Response and Recovery, U.S. General
Services Administration (GSA).
ACTION: Request for information.
-----------------------------------------------------------------------
SUMMARY: On February 12th, 2013, the President issued the Executive
Order for Improving Critical Infrastructure Cybersecurity (Executive
Order 13636). In accordance with Section 8(e) of Executive Order 13636,
within 120 days, the General Services Administration and the Department
of Defense, in consultation with the Department of Homeland Security
and the Federal Acquisition Regulation Council, are required to make
recommendations on the feasibility, security benefits, and relative
merits of incorporating security standards into acquisition planning
and contract administration and address what steps
[[Page 27967]]
can be taken to harmonize, and make consistent, existing procurement
requirements related to cybersecurity.
Public outreach is a critically important activity for
implementation of the Executive Order. In an effort to obtain broad
stakeholder involvement, the General Services Administration and the
Department of Defense are publishing this Request for Information (RFI)
seeking information that can be used in the Section 8(e) report.
DATES: Effective date: Submit comments on or before June 12, 2013.
ADDRESSES: Submit comments in response to Notice-OERR-2013-01 by any of
the following methods:
Regulations.gov: https://www.regulations.gov. Submit
comments via the Federal eRulemaking portal by searching for ``Notice-
OERR-2013-01''. Select the link ``Submit a Comment'' that corresponds
with ``Notice-OERR-2013-01''. Follow the instructions provided at the
``Submit a Comment'' screen. Please include your name, company name (if
any), and ``Notice-OERR-2013-01'' on your attached document.
Mail: General Services Administration, Regulatory
Secretariat (MVCB), ATTN: Hada Flowers, 1275 First Street NE., 7th
Floor, Washington, DC 20417.
Instructions: Please submit comments only and cite ``Notice-OERR-
2013-01'', in all correspondence related to this case. All comments
received will be posted without change to https://www.regulations.gov,
including any personal and/or business confidential information
provided.
FOR FURTHER INFORMATION CONTACT: Mr. Emile Monette, U.S. General
Services Administration, at emile.monette@gsa.gov or 703-605-5470.
SUPPLEMENTARY INFORMATION:
A. Background
On February 12th, 2013, the President issued the Executive Order
for Improving Critical Infrastructure Cybersecurity (E.O. 13636) and
the Presidential Policy Directive on Critical Infrastructure Security
and Resilience (PPD-21). In accordance with Section 8(e) of Executive
Order 13636 (EO), within 120 days, the General Services Administration
and the Department of Defense, in consultation with the Department of
Homeland Security and the Federal Acquisition Regulation Council, are
required to make recommendations on the feasibility, security benefits,
and relative merits of incorporating security standards into
acquisition planning and contract administration and address what steps
can be taken to harmonize, and make consistent, existing procurement
requirements related to cybersecurity. Among other things, PPD-21
requires the General Services Administration, in consultation with the
Department of Defense and the Department of Homeland Security, to
jointly provide and support government-wide contracts for critical
infrastructure systems and ensure that such contracts include audit
rights for the security and resilience of critical infrastructure.
In order to accomplish the task required by EO Section 8(e), the
General Services Administration (GSA) and the Department of Defense
(DoD) have formed the ``Joint Working Group on Improving Cybersecurity
and Resilience through Acquisition,'' (Working Group) with GSA as the
lead agency. The Working Group is comprised of topic-knowledgeable
members selected from the DoD, GSA, the Department of Homeland Security
(DHS), the Office of Federal Procurement Policy (OFPP), and the
National Institute of Standards and Technology (NIST). The Working
Group is coordinating its efforts to obtain input from the stakeholder
community, including industry, academia, and federal, state, and local
government.
Public outreach is a critically important activity for
implementation of the EO and PPD. In an effort to obtain broad
stakeholder involvement, the Working Group is publishing this Request
for Information (RFI) seeking information that can be used in the
Section 8(e) report. To the extent applicable, the Section 8(e)
recommendations will also lay the foundation for establishment or
identification of the government-wide cybersecurity contracts required
by PPD-21.
The Working Group is also directly engaged with the DHS Interagency
Task Force (ITF). The ITF has been established to lead implementation
of the EO and PPD-21, including, among other things, stakeholder
engagement. The ITF has established working groups to accomplish the
major deliverables and action items required by the EO and PPD, and
this RFI for the Section 8(e) report is one element of the larger
outreach efforts underway to address the requirements of the EO and
PPD.
The importance of common language cannot be overstated. It is
apparent that a common lexicon is one of the critical gaps in
harmonizing federal acquisition requirements related to cybersecurity.
Given the limitations of the unsettled definition of the word, for
purposes of this RFI, the term ``cybersecurity'' is given a broad
meaning that includes information security and related areas, like
supply chain risk management, information assurance, and software
assurance, as well as other efforts to address threats or
vulnerabilities flowing from or enabled by connection to digital
infrastructure.
In responding to the questions below, please highlight any
applicable distinctions in responses related to classified and
unclassified acquisitions.
Feasibility and Federal Acquisition: In general, DoD and GSA seek
input about the feasibility of incorporating cybersecurity standards
into federal acquisitions.
For example:
1. What is the most feasible method to incorporate cybersecurity-
relevant standards in acquisition planning and contract administration?
What are the cost and other resource implications for the federal
acquisition system stakeholders?
2. How can the federal acquisition system, given its inherent
constraints and the current fiscal realities, best use incentives to
increase cybersecurity amongst federal contractors and suppliers at all
tiers? How can this be accomplished while minimizing barriers to entry
to the federal market?
3. What are the implications of imposing a set of cybersecurity
baseline standards and implementing an associated accreditation
program?
4. How can cybersecurity be improved using standards in acquisition
planning and contract administration?
5. What are the greatest challenges in developing a cross-sector
standards-based approach cybersecurity risk analysis and mitigation
process for the federal acquisition system?
6. What is the appropriate balance between the effectiveness and
feasibility of implementing baseline security requirements for all
businesses?
7. How can the government increase cybersecurity in federal
acquisitions while minimizing barriers to entry?
8. Are there specific categories of acquisitions to which federal
cybersecurity standards should (or should not) apply?
9. Beyond the general duty to protect government information in
federal contracts, what greater levels of security should be applied to
which categories of federal acquisition or sectors of commerce?
10. How can the Federal government change its acquisition practices
to ensure the risk owner (typically the end user) makes the critical
decisions about that risk throughout the acquisition lifecycle?
11. How do contract type (e.g., firm fixed price, time and
materials, cost-
[[Page 27968]]
plus, etc.) and source selection method (e.g., lowest price technically
acceptable, best value, etc.) affect your organization's cybersecurity
risk definition and assessment in federal acquisitions?
12. How would you recommend the government evaluate the risk from
companies, products, or services that do not comply with cybersecurity
standards?
Commercial Practices: In general, DoD and GSA seek information
about commercial procurement practices related to cybersecurity.
For example:
13. To what extent do any commonly used commercial standards
fulfill federal requirements for your sector?
14. Is there a widely accepted risk analysis framework that is used
within your sector that the federal acquisition community could adapt
to help determine which acquisitions should include the requirement to
apply cybersecurity standards?
15. Describe your organization's policies and procedures for
governing cybersecurity risk. How does senior management communicate
and oversee these policies and procedures? How has this affected your
organization's procurement activities?
16. Does your organization use ``preferred'' or ``authorized''
suppliers or resellers to address cybersecurity risk? How are the
suppliers identified and utilized?
17. What tools are you using to brief cybersecurity risks in
procurement to your organization's management?
18. What performance metrics and goals do organizations adopt to
ensure their ability to manage cybersecurity risk in procurement and
maintain the ability to provide essential services?
19. Is your organization a preferred supplier to any customers that
require adherence to cybersecurity standards for procurement? What are
the requirements to obtain preferred supplier status with this
customer?
20. What procedures or assessments does your organization have in
place to vet and approve vendors from the perspective of cybersecurity
risk?
21. How does your organization handle and address cybersecurity
incidents that occur in procurements? Do you aggregate this information
for future use? How do you use it?
22. What mechanisms does your organization have in place for the
secure exchange of information and data in procurements?
23. Does your organization have a procurement policy for the
disposal for hardware and software?
24. How does your organization address new and emerging threats or
risks in procurement for private sector commercial transactions? Is
this process the same or different when performing a federal contract?
Explain.
25. Within your organization's corporate governance structure,
where is cyber risk management located (e.g., CIO, CFO, Risk
Executive)?
26. If applicable, does your Corporate Audit/Risk Committee examine
retained risks from cyber and implement special controls to mitigate
those retained risks?
27. Are losses from cyber risks and breaches treated as a cost of
doing business?
28. Does your organization have evidence of a common set of
information security standards (e.g., written guidelines, operating
manuals, etc)?
29. Does your organization disclose vulnerabilities in your
product/services to your customers as soon as they become known? Why or
why not?
30. Does your organization have track-and-trace capabilities and/or
the means to establish the provenance of products/services throughout
your supply chain?
31. What testing and validation practices does your organization
currently use to ensure security and reliability of products it
purchases?
Harmonization: In general, DoD and GSA seek information about any
conflicts in statutes, regulations, policies, practices, contractual
terms and conditions, or acquisition processes affecting federal
acquisition requirements related to cybersecurity and how the federal
government might address those conflicts.
For example:
32. What cybersecurity requirements that affect procurement in the
United States (e.g., local, state, federal, and other) has your
organization encountered? What are the conflicts in these requirements,
if any? How can any such conflicts best be harmonized or de-conflicted?
33. What role, in your organization's view, should national/
international standards organizations play in cybersecurity in federal
acquisitions?
34. What cybersecurity requirements that affect your organization's
procurement activities outside of the United States (e.g., local,
state, national, and other) has your organization encountered? What are
the conflicts in these requirements, if any? How can any such conflicts
best be harmonized or de-conflicted with current or new requirements in
the United States?
35. Are you required by the terms of contracts with federal
agencies to comply with unnecessarily duplicative or conflicting
cybersecurity requirements? Please provide details.
36. What policies, practices, or other acquisition processes should
the federal government change in order to achieve cybersecurity in
federal acquisitions?
37. Has your organization recognized competing interests amongst
procurement security standards in the private sector? How has your
company reconciled these competing or conflicting standards?
Dated: May 7, 2013.
Darren Blue,
Associate Administrator for the GSA, Office of Emergency Response and
Recovery.
[FR Doc. 2013-11239 Filed 5-10-13; 8:45 am]
BILLING CODE 6820-89-P