Department of Defense (DoD)-Defense Industrial Base (DIB) Voluntary Cyber Security and Information Assurance (CS/IA) Activities, 62430-62438 [2013-24256]

Download as PDF 62430 Federal Register / Vol. 78, No. 204 / Tuesday, October 22, 2013 / Rules and Regulations requires that an analysis be performed to determine whether any federal mandate may result in the expenditure by State, local and tribal governments, in the aggregate, or by the private sector of $100 million in any one year. It has been certified that this rule does not contain a Federal mandate that may result in the expenditure by State, local and tribal governments, in aggregate, or by the private sector, of $100 million or more in any one year, and thus this rule is not subject to this requirement. Public Law 96–354, ‘‘Regulatory Flexibility Act’’ (RFA) (5 U.S.C. 601) Public Law 96–354, ‘‘Regulatory Flexibility Act’’ (RFA) (5 U.S.C. 601), requires that each Federal agency prepare a regulatory flexibility analysis when the agency issues a regulation which would have a significant impact on a substantial number of small entities. This rule is not an economically significant regulatory action, and it has been certified that it will not have a significant impact on a substantial number of small entities. Therefore, this rule is not subject to the requirements of the RFA. Public Law 96–511, ‘‘Paperwork Reduction Act’’ (44 U.S.C. Chapter 35) This rule does not contain a ‘‘collection of information’’ requirement, and will not impose additional information collection requirements on the public under Public Law 96–511, ‘‘Paperwork Reduction Act’’ (44 U.S.C. Chapter 35). emcdonald on DSK67QTVN1PROD with RULES Executive Order 13132, ‘‘Federalism’’ E.O. 13132, ‘‘Federalism,’’ requires that an impact analysis be performed to determine whether the rule has federalism implications that would have substantial direct effects on the States, on the relationship between the national government and the States, or on the distribution of power and responsibilities among the various levels of government. It has been certified that this rule does not have federalism implications, as set forth in E.O. 13132. List of Subjects in 32 CFR Part 199 Claims, Dental health, Health care, Health insurance, Individuals with disabilities, Military personnel. Accordingly, 32 CFR Part 199 is amended as follows: PART 199—[AMENDED] 1. The authority citation for Part 199 continues to read as follows: ■ Authority: 5 U.S.C. 301; 10 U.S.C. chapter 55. VerDate Mar<15>2010 16:26 Oct 21, 2013 Jkt 232001 2. Section 199.4 is amended by revising paragraphs (e)(4)(ii) introductory text and (e)(11) introductory text, and removing and reserving paragraph (e)(11)(ii), to read as follows: ■ § 199.4 Basic program benefits. * * * * * (e) * * * (4) * * * (ii) Authorized substance use disorder treatment. Only those services provided by TRICARE-authorized institutional providers are covered. Such a provider must be either an authorized hospital, or an organized substance use disorder treatment program in an authorized freestanding or hospital-based substance use disorder rehabilitation facility. Covered services consist of any or all of the services listed below, including the substitution of a therapeutic drug, with addictive potential, for a drug addiction when medically or psychologically necessary and appropriate medical care for a beneficiary undergoing medically supervised treatment for a substance use disorder. A qualified mental health provider (physicians, clinical psychologists, clinical social workers, psychiatric nurse specialists) (see paragraph (c)(3)(ix) of this section) shall prescribe the particular level of treatment. Each TRICARE beneficiary is entitled to three substance use disorder treatment benefit periods in his or her lifetime, unless this limit is waived pursuant to paragraph (e)(4)(v) of this section. (A benefit period begins with the first date of covered treatment and ends 365 days later, regardless of the total services actually used within the benefit period. Unused benefits cannot be carried over to subsequent benefit periods. Emergency and inpatient hospital services (as described in paragraph (e)(4)(i) of this section) do not constitute substance abuse treatment for purposes of establishing the beginning of a benefit period.) * * * * * (11) Drug abuse. Under the Basic Program, benefits may be extended for medically necessary prescription drugs required in the treatment of an illness or injury or in connection with maternity care (refer to paragraph (d) of this section). However, TRICARE benefits cannot be authorized to support or maintain an existing or potential drug abuse situation whether or not the drugs (under other circumstances) are eligible for benefit consideration and whether or not obtained by legal means. Drugs, including the substitution of a therapeutic drug with addictive potential for a drug of addiction, prescribed to beneficiaries undergoing PO 00000 Frm 00014 Fmt 4700 Sfmt 4700 medically supervised treatment for a substance use disorder as authorized under paragraph (e)(4)(ii) of this section are not considered to be in support of, or to maintain, an existing or potential drug abuse situation and are allowed. The Director, TRICARE Management Activity, may prescribe appropriate policies to implement this prescription drug benefit for those undergoing medically supervised treatment for a substance use disorder. * * * * * (ii) [Reserved] * * * * * Dated: September 26, 2013. Patricia L. Toppings, OSD Federal Register Liaison Officer, Department of Defense. [FR Doc. 2013–24232 Filed 10–21–13; 8:45 am] BILLING CODE 5001–06–P DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 236 [DOD–2009–OS–0183] RIN 0790–AI60 Department of Defense (DoD)— Defense Industrial Base (DIB) Voluntary Cyber Security and Information Assurance (CS/IA) Activities Office of the DoD Chief Information Officer, DoD. ACTION: Final rule. AGENCY: This final rule responds to public comments regarding the establishment of the DIB CS/IA program, a voluntary cyber security information sharing program between DoD and eligible DIB companies. The program enhances and supplements DIB participants’ capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems. SUMMARY: Effective Date: This rule is effective November 21, 2013. DATES: Mr. Dan Prieto at 703–571–5911, or the DIB Cyber Security and Information Assurance Program Office: (703) 604– 3167, toll free (855) 363–4227, email osd.ncr.dod-cio.mbx.dib-cs-ia-programregistration@mail.mil. SUPPLEMENTARY INFORMATION: FOR FURTHER INFORMATION CONTACT: Executive Summary This final rule responds to public comments regarding the establishment of the DIB CS/IA program, a voluntary E:\FR\FM\22OCR1.SGM 22OCR1 emcdonald on DSK67QTVN1PROD with RULES Federal Register / Vol. 78, No. 204 / Tuesday, October 22, 2013 / Rules and Regulations cyber security information sharing activity between DoD and eligible DIB companies to enhance and supplement DIB participants’ capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems. The program is codified at 32 CFR Part 236 and implements DoD statutory authorities to establish programs and activities to protect DoD information and DoD information systems, including information and information systems operated and maintained by contractors or others in support of DoD activities (see 10 U.S.C. 2224 and the Federal Information Security Management Act (FISMA), codified at 44 U.S.C. 3541 et seq.). It also fulfills important elements of DoD’s critical infrastructure protection responsibilities, as the sector specific agency for the DIB sector see (Presidential Policy Directive 21 (PPD– 21), ‘‘Critical Infrastructure Security and Resilience’’). This program allows eligible DIB companies to receive U.S. Government (USG) threat information and to share information about network intrusions that could compromise DoD programs and missions. In addition, the program permits DIB companies and DoD to assess and reduce damage to DoD programs and missions when DoD information is potentially compromised. Furthermore, the information sharing arrangements between the DoD and each participating DIB company that implement the requirements of this are memorialized in a standardized bilateral agreement, known as a Framework Agreement (FA), signed by the participating DIB company and the Government. The rule also provides the eligibility requirements for a company to participate in the DIB CS/IA program. Costs for DIB participants include obtaining access to DoD’s secure voice and data transmission systems supporting the DIB CS/IA program and acquiring DoD approved medium assurance certificates. There also are costs associated with the collection requirements for providing point of contact information and cyber incident reporting. Government costs include onboarding new companies and collecting and analyzing cyber incidents from DIB participants. A foundational element of this bilateral information sharing model is the recognition that the information being shared between the parties includes extremely sensitive nonpublic information, which must be protected against unauthorized uses and disclosures in order to preserve the integrity of the program. VerDate Mar<15>2010 16:26 Oct 21, 2013 Jkt 232001 For additional information regarding the Government’s safeguarding of information received from the DIB companies, with specific focus on PII, see the Privacy Impact Assessment (PIA) for the DIB CS/IA Program (https:// dodcio.defense.gov/Portals/0/ Documents/DIB%20CS-IA%20PIA_ FINAL_signed_30jun2011_VMSS_ GGMR_RC.pdf). In addition, this rule and program are intended to be consistent and coordinated with, and updated as necessary to ensure consistency with and support for, other federal activities related to the handling and safeguarding of controlled unclassified information, such as those that are being led by the National Archives and Records Administration pursuant to Executive Order 13556 ‘‘Controlled Unclassified Information’’ (November 4, 2010) (see https://www.archives.gov/cui/). This rule is not intended to implement the new requirements from section 941 of the National Defense Authorization Act for Fiscal Year 2013. Comments DoD published an interim final rule on May 11, 2012 (77 FR 27615). Fifty comments from twelve respondents were received and reviewed by the USG. Comment: Four comments questioned the eligibility and scope of the program, to include recommending that the program remain voluntary, and questioning whether the program was ‘‘under inclusive or overly restrictive because the program is only available to companies that have a Facility Security Clearance and a Communications Security account.’’ Response: The DIB CS/IA program will remain a voluntary program to enhance and supplement DIB participants’ capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems. The eligibility requirements for the program (§ 236.7) are based on security requirements to ensure the protection of Government furnished information (GFI) at DIB companies in possession of DoD information, as described in the definition for ‘‘covered defense information,’’ (§ 236.2(c)). No change is made to the rule. Comment: One comment asserted that the rule should not have been published as an interim rule. Response: In light of the growing cyber threat activity against DoD information and DIB information systems and the associated risk to U.S. national security, the Government determined it appropriate to issue an interim rule. This allowed eligible DIB companies to receive cyber threat PO 00000 Frm 00015 Fmt 4700 Sfmt 4700 62431 information, without delay in order to enhance their capability to defend against ongoing and continuous cyber threats and to safeguard DoD information. No change is made to the rule. Comment: One comment asserted that the Framework Agreement (FA) should be available for public review to evaluate the estimates of projected paperwork for participants. Response: The Framework Agreement is a representation of the federal rule converted into an agreement format for implementation of the program. In addition, all information required to evaluate the projected cost and time for the information collection requirements is available in the rule. No change is made to the rule. Comment: One comment asserted that transparency into public-private cyber security programs is crucial to ensure that federal agencies respect privacy rights and comply with their obligations. Response: Extensive coordination across the Government has ensured that the privacy rights of U.S. citizens are protected under the DIB CS/IA voluntary program, including developing a comprehensive Privacy Impact Assessment (PIA) for the DIB CS/IA program. The PIA is publically available at: https://dodcio.defense.gov/ Portals/0/Documents/DIB%20CSIA%20PIA_FINAL_signed_30jun2011_ VMSS_GGMR_RC.pdf. No change is made to the rule. Comment: One comment asserted that the Defense Department opted to issue a rule even though no law has been passed by Congress regarding Government-industry cyber security activities and that rulemaking should come after Congress concludes its legislative efforts. Response: The rule implements DoD statutory authorities and responsibilities to establish a program to protect DoD information and information systems, including information systems operated and maintained by contractors or others in support of DoD activities (see 10 U.S.C. 2224; and the Federal Information Security Management Act (FISMA), codified at 44 U.S.C. 3541 et seq.). No change is made to the rule. Comment: Three comments asserted the rule should create an oversight and accountability structure that includes public, congressional, and executive branch reporting. One comment recommended using DHS oversight procedures as a model to ensure the program’s compliance with regulations and relevant guidelines. Response: The DIB CS/IA program is subject to numerous procedures, E:\FR\FM\22OCR1.SGM 22OCR1 emcdonald on DSK67QTVN1PROD with RULES 62432 Federal Register / Vol. 78, No. 204 / Tuesday, October 22, 2013 / Rules and Regulations requirements, and oversight to ensure compliance with DoD and national policies for collecting, handling, safeguarding, and sharing sensitive information with non-Government organizations in accordance with DoD Directive 5500.1, DoD Privacy Program and 5400.11—Regulation, Department of Defense Privacy Program, which proscribes uniform procedures for the DoD Privacy Program. For additional information regarding the Government’s safeguarding of information received from the DIB companies, with specific focus on PII, see the Privacy Impact Assessment (PIA) for the DIB CS/IA Program (https://DoDcio.defense.gov/ Portals/0/Documents/DIB%20CSIA%20PIA_FINAL_signed_30jun2011_ VMSS_GGMR_RC.pdf). In addition, DoD annually reports to Congress on the progress of DoD in defending the DoD and the Defense Industrial Base from cyber events. No additional oversight is warranted at this time. No change is made to the rule. Comment: One comment recommended distinguishing between classified and unclassified GFI, and that classified GFI should be handled per the NISPOM. Response: As stated in § 236.4(f) of the rule, GFI will be issued via both unclassified and classified means, and that handling and safeguarding of classified GFI shall be in compliance with the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22–M). No change is made to the rule. Comment: One comment recommended not to apply sharing limitations under the rule to nonsensitive GFI. Response: As defined in the rule at § 236.2(j), Government Furnished Information (GFI) means ‘‘information provided by the Government under the voluntary DIB CS/IA program, including but not limited to cyber threat information and information assurance practices.’’ GFI is typically nonpublic information that is sensitive based either on the content of the information itself or the context in which the information is relevant (e.g., cyber threat information). Accordingly, the handling requirements applicable to GFI are designed to protect sensitive information. No change is made to the rule. Comment: Three comments requested a narrow interpretation of the Freedom of Information Act (FOIA) exemptions, and one asked that the records not be exempted under Privacy Act provisions. Response: As recognized in the Background section of the Interim Rule (77 FR 27615, at 27616), a foundational VerDate Mar<15>2010 16:26 Oct 21, 2013 Jkt 232001 element of this program is the recognition that the information being shared includes extremely sensitive nonpublic information. This includes the GFI shared by the Government, as well as the information regarding cyber incidents that is shared by the DIB participants, which they typically treat as extremely sensitive proprietary, commercial, or operational information for which release and dissemination is tightly controlled. Accordingly, as stated in § 236.6 of the rule, confidentiality of such sensitive information exchanged under this program will be protected to the maximum extent authorized by law, regulation, and policy. This includes taking appropriate measures, including the use of any applicable exemptions under FOIA or the Privacy Act, to safeguard against unauthorized public disclosure and in full compliance with applicable laws, regulations, policies, and procedures (see § 236.2(c)(2)(vii) and § 236.5(h)). No change is made to the rule. Comment: Four comments addressed DoD working with private contractors without appropriate safeguards for privacy rights, maintaining a database on law abiding Americans and subverting due process and gathering information about an unsuspecting populace. Response: The DIB CS/IA program focuses on sharing cyber security related information and minimizes the collection of information from participating DIB companies, seeking only the information that is necessary to support this cyber security program. The PIA for the DIB CS/IA program details the comprehensive processes to safeguard PII. The operational implementation of the DIB CS/IA program receives PII from DIB Companies in two ways: (i) For program administration and management purposes, the DIB companies share with DoD the typical business contact information for its personnel that are serving as company points of contact for the program activities or specific cyber incidents; and (ii) for cyber incident response and analysis purposes, DIB companies may share PII as a necessary part of the information that they have determined is relevant to cyber incident response, analysis, or damage assessment. In addition, DIB companies are prohibited from sharing any information unless they have determined that the information has been lawfully collected and is authorized to be shared with DoD. The DIB CS/IA Program restricts access to such PII and attribution information only to those authorized personnel who PO 00000 Frm 00016 Fmt 4700 Sfmt 4700 have a need-to-know such information for duties in support of the DIB CS/IA Program and are subject to strict nondisclosure obligations. The PII is only maintained as long as necessary for DIB CS/IA Program activities, and is managed and disposed of in accordance with applicable records management requirements. No change is made to the rule. Comment: One comment stated that the rule allows a number of private companies to sell and share private citizens’ data including to other Governments, including ‘‘any data that ‘transits’ any government system.’’ Response: The voluntary DIB CS/IA program does not authorize participating companies to sell any information, to anyone, in any context whatsoever. The program also does not authorize DIB companies to share any information with anyone other than program participants. The program does not permit the sharing of information with any governments other than authorized U.S. Government participants. No change is made to the rule. Comment: One comment stated that the rule does not properly ensure implementation of the new Controlled Unclassified Information (CUI) framework from Executive Order 13556 into its treatment of covered defense information. Response: As stated in the Background Section above, the program is designed to ensure consistency with and support for, federal activities related to the handling and safeguarding of controlled unclassified information that are being led by the National Archives and Records Administration pursuant to Executive Order 13556. As CUI implementation evolves in the Government, the rule will be modified as necessary to ensure compliance. No change is made to the rule. Comment: Two comments stated that the interim final rule lacks sufficient safeguards to limit the sharing and use of personally identifiable information and content of private communications. Response: The program utilizes significant handling and sharing restrictions to ensure appropriate protections for any and all sensitive information managed by the program, including but not limited to PII. These safeguards are addressed in more detail in the PIA, which will be updated appropriately as the program evolves. No change is made to the rule. Comment: Three comments recommended that the rule should require companies to remove sensitive information (e.g., PII), and to anonymize as much information as possible E:\FR\FM\22OCR1.SGM 22OCR1 emcdonald on DSK67QTVN1PROD with RULES Federal Register / Vol. 78, No. 204 / Tuesday, October 22, 2013 / Rules and Regulations without hindering cyber security efforts, and that the Government should immediately dispose of inadvertently collected PII that is not directly relevant to the ‘‘cyber incident.’’ Response: DoD agrees with the underlying premise of the comment, and the DIB CS/IA program uses procedures to minimize the collection and sharing of PII. The DIB participants remove unnecessary sensitive information (e.g., PII), and only share information if it is relevant to a cyber incident (e.g., for forensics or cyber intrusion damage assessment). All PII received by DoD is provided voluntarily by authorized DIB company representatives and is subject to mutually agreed upon restrictions for cyber security purposes. In addition, the DIB participants are required, prior to sharing any information with the Government under this program, to review and determine that their activities under the program are in compliance with all applicable laws and regulations, including restrictions on the interception, monitoring, access, use, and disclosure of electronic communications (see § 236.6(b) and (c)). Information determined to be relevant is maintained, controlled, and disposed of when no longer reasonably necessary for forensics analysis, and damage assessment activities (or other legal, audit or operational purposes). Companies are required to abide by all sharing restrictions. The PIA for the DIB CS/IA program addresses the handling safeguards in more detail. No change is made to the rule. Comment: Two comments stated that the PII the Government obtains through the DIB CS/IA program should be used only for cyber security operations and not general law enforcement or intelligence fact gathering. The rule should also limit Government use of information shared for cyber security purposes. Response: The primary purpose of the DIB CS/IA program is to share cyber security information to promote more effective cyber security, not only for the DIB, but also for the DoD and U.S. Government. The program contains numerous information handling and sharing restrictions, applicable to both the Government and DIB participants, to safeguard against any unauthorized collection, use, or dissemination of such information. However, the program does not limit the Government’s ability to conduct lawful activities, including law enforcement, counterintelligence activities, or other activities in the interest of U.S. national security (§ 236.6(d)). No change is made to the rule. VerDate Mar<15>2010 16:26 Oct 21, 2013 Jkt 232001 Comment: One comment recommended that the rule incorporate privacy protections of the National Cyber Security Division’s Joint Cybersecurity Services Pilot (JCSP). Response: The detailed processes summarized in the PIA for the DIB CS/ IA program are comprehensive and ensure appropriate safeguards for PII provided by DIB participants in a similar manner as described in the PIA prepared for the Department of Homeland Security’s JSCP. No change is made to the rule. Comment: One comment stated the interim rule should be amended to impose fines on private companies that intentionally or negligently disclose ‘‘excessive PII.’’ Response: It is not clear what the commenter meant by the term ‘‘excessive PII.’’ As discussed above, the DIB CS/IA program only receives PII in two ways: (i) For program administration and management purposes; and (ii) for cyber incident response and analysis purposes. In both cases, DIB companies share information only when it is relevant for those authorized purposes. In addition, DIB companies are prohibited from sharing any information, including PII, unless they have determined that it has been lawfully collected and is authorized to be shared with the Government. If it were to appear that a company is reporting excessive information not relevant to the program, the Government would seek to work with the company to clarify the sharing guidelines and support the company’s efforts to refine its processes to implement more effective limits on sharing unnecessary information. If, despite these efforts, a company continued to share information that the Government deemed inappropriate within the scope of the program, the Government would take appropriate actions on a case by case basis, including potentially terminating the information sharing relationship with that participant. This is a voluntary program and fines are not part of the program. No change is made to the rule. Comment: Two comments recommended changes to the definitions of cyber incident, compromise and threat. Response: The rule leverages established definitions to the maximum extent possible. The source for the definition of ‘‘compromise’’, ‘‘cyber incident’’ and ‘‘threat’’ are from the Committee on National Security Systems Instruction No. 4009, ‘‘National Information Assurance Glossary,’’ (https://www.cnss.gov/Assets/pdf/cnssi_ 4009.pdf). These definitions are PO 00000 Frm 00017 Fmt 4700 Sfmt 4700 62433 established and widely accepted Government definitions. No change is made to the rule. Comment: One comment stated that U.S. based systems are not adequately defined. Response: To further clarify terms, the term ‘‘U.S. based’’ has been added to the definitions section (§ 236.2(n)). Comment: One comment recommended changing the definition of U.S. citizen to eliminate the phrase ‘‘holding a U.S. passport,’’ and adding text on ‘‘Green Cards.’’ Response: The recommendation to add ‘‘U.S. citizen’’ to the definitions section is accepted and is added to § 236.2(o). For the purpose of the rule, a U.S. citizen includes a person born in the U.S. or naturalized. The recommendation to eliminate ‘‘holding a U.S. passport’’ as part of the U.S. citizen definition is also accepted in the definition of ‘‘U.S. citizen,’’ (see § 236.2(o)). Comment: One comment recommended changing the definition of GFI to a more descriptive term so as not to tie it to Government procurement. Response: The definition of GFI in the rule is applicable only to the DIB CS/IA program (see § 236.2(j)), and does not relate to any specific procurement activities. There is no indication that the use of this term has led to any confusion amongst the DIB participants. No change is made to the rule. Comment: Two comments dealt with aspects of sharing information that could ward against threats and improve Operational Security (OPSEC). Response: The purpose of the DIB CS/ IA program is to enable cyber threat information sharing with DIB participants to improve operational security of DIB networks and information systems. No change is made to the rule. Comment: One comment suggested replacing the phrase ‘‘to use the GFI on non-U.S. based covered DIB systems,’’ with ‘‘to reside on non-U.S. based covered DIB’’ in § 236.4(g). Response: After evaluation, the recommended change in terminology from ‘‘use’’ to ‘‘reside’’ does not provide additional technical clarity. No change is made to the rule. Comment: Two comments recommended the language be amended to include the words ‘‘or as soon as practicable thereafter’’ following the word ‘‘discovery’’ and expressed caution that less knowledgeable participants will be prone to over report which consumes scarce Government and industry resources and obscures the significant incidents (§ 236.5(b)). E:\FR\FM\22OCR1.SGM 22OCR1 emcdonald on DSK67QTVN1PROD with RULES 62434 Federal Register / Vol. 78, No. 204 / Tuesday, October 22, 2013 / Rules and Regulations Response: Timeliness in reporting cyber incidents involving covered defense information is an integral component of the DIB CS/IA program. The rule makes provisions for initial and follow-up reporting (§ 236.5(b) and (c)). While the DIB CS/IA program is voluntary, cyber security encourages sharing information as quickly as possible to provide the clearest understanding of the cyber threat targeting DoD program information. This enables cyber threat information provided by DIB participants to be shared with other DIB participants and Government stakeholders on a timely basis. No change is made to the rule. Comment: Two comments recommended the draft ‘‘DFARS regulatory initiative on Safeguarding Unclassified DoD Information (Safeguarding Rule) being addressed under DFARS Case 2011–D039’’ be written to avoid conflicting and duplicative requirements for participants in the DIB CS/IA program. Response: The DoD is committed to using both internal coordination processes, and public review and comment procedures such as those used in rulemaking for this program and for proposed DFARS revisions, to ensure that its cyber security activities are evaluated to avoid conflicting or duplicative elements. No change is made to the rule. Comment: Two comments recommended specific word changes to the program requirements relating to each party conducting a legal review of its policies and practices that support the program, including deletion of the requirement for a ‘‘determination’’ of compliance with law because it may be interpreted as requiring the company to retain outside counsel for such a determination, limiting the compliance only to ‘‘U.S’’ law, and deleting the second sentence of § 236.6(c) to avoid threatening the attorney-client privilege. Response: The requirement at § 236.6(c) for a determination of legal compliance is expressly stated as a requirement that ‘‘the DIB participant shall perform a legal review . . . and shall make a determination’’ that it is compliant. There is neither an express nor implied requirement that the DIB participant retain outside counsel for such a determination, and thus no change to that language is warranted. In § 236.6, the rule retains ‘‘applicable laws and regulations’’ as an accurate description of the requirement. Finally, the second sentence of § 236.6(c) was intended merely to provide notice that the Government may request additional information from the DIB company, and was not intended to imply that there VerDate Mar<15>2010 16:26 Oct 21, 2013 Jkt 232001 was a requirement to provide such information as a condition of the program, regardless of whether such information were protected by the attorney-client privilege. To avoid any unnecessary confusion or unintended implications, the second sentence is deleted. Comment: One comment expressed full support for the Defense Industrial Base Voluntary Cyber Security and Information Assurance Activities. Response: Government evaluation of the program concurs that the voluntary DIB CS/IA program contributes to the safeguarding of DoD information. No change is made to the rule. Comment: One comment urged a renewed look at how classification schemes are balanced with disclosure schemes. Response: In accordance with the rule (§ 236.4(f)), handling and safeguarding of classified GFI shall be in compliance with the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22–M). No change is made to the rule. Comment: One comment recommended that the DIB CS/IA program have a more robust role in industry engagement. Response: The DIB CS/IA program will continue to evaluate outreach opportunities to enhance engagement with industry, to include industry associations. No change is made to the rule. Comment: Two comments recommended that the infrastructure of the internet be upgraded and that the rule should incorporate ‘‘technology neutral terms.’’ Response: Other activities within the Government are examining the infrastructure of the internet. The rule focuses on cyber threat sharing and the risk of compromise of DoD information that resides on, or transits, DIB unclassified information systems. No change is made to the rule. (b) Create a serious inconsistency, or otherwise interfere with, an action taken or planned by another Agency; (c) Materially alter the budgetary impact of entitlements, grants, user fees, or loan programs, or the rights and obligations of recipients thereof; or (d) Raise novel legal or policy issues arising out of legal mandates, the President’s priorities, or the principles as set forth in these Executive Orders. Regulatory Procedures Public Law 96–511, ‘‘Paperwork Reduction Act’’ (44 U.S.C. Chapter 35) Executive Orders 12866, ‘‘Regulatory Planning and Review’’ and 13563, ‘‘Improving Regulation and Regulatory Review’’ It has been certified that 32 CFR part 236 does not: (a) Have an annual effect on the economy of $100 million or more, or adversely affect in a material way, the economy; a section of the economy; productivity; competition; jobs; the environment; public health or safety; or State, local, or tribal Governments or communities; PO 00000 Frm 00018 Fmt 4700 Sfmt 4700 Public Law 104–121, ‘‘Congressional Review Act’’ (5 U.S.C. 801) It has been determined that 32 CFR part 236 is not a ‘‘major’’ rule under 5 U.S.C. 801, enacted by Public Law 104– 121, because it will not result in an annual effect on the economy of $100 million or more; a major increase in costs or prices for consumers, individual industries, Federal, State, or local Government agencies, or geographic regions; or significant adverse effects on competition, employment, investment, productivity, innovation, or on the ability of United States-based enterprises to compete with foreign-based enterprises in domestic and export markets. Sec. 202, Public Law 104–4, ‘‘Unfunded Mandates Reform Act’’ It has been certified that 32 CFR part 236 does not contain a Federal mandate that may result in expenditure by State, local and tribal Governments, in aggregate, or by the private sector, of $100 million or more in any one year. Public Law 96–354, ‘‘Regulatory Flexibility Act’’ (5 U.S.C. 601) It has been certified that 32 CFR part 236 is not subject to the Regulatory Flexibility Act (5 U.S.C. 601) because it would not, if promulgated, have a significant economic impact on a substantial number of small entities. DIB participation in the DIB CS/IA Program is voluntary. Sections 236.4 and 236.5 and 236.7 of this final rule contain information collection requirements. These collection requirements were published in the preamble of the interim final rule that published on May 11, 2012 (77 FR 27617) for public comment. No comments were received on the collection requirements. OMB preapproved the collection requirements and assigned them OMB Controls Numbers 0704–0489 and 0704–0490. E:\FR\FM\22OCR1.SGM 22OCR1 Federal Register / Vol. 78, No. 204 / Tuesday, October 22, 2013 / Rules and Regulations Executive Order 13132, ‘‘Federalism’’ It has been certified that 32 CFR part 236 does not have federalism implications, as set forth in Executive Order 13132. This rule does not have substantial direct effects on: (a) The States; (b) The relationship between the National Government and the States; or (c) The distribution of power and responsibilities among the various levels of Government. List of Subjects in 32 CFR Part 236 Contracts, Security measures. Accordingly 32 CFR part 236 is revised to read as follows: PART 236—DEPARTMENT OF DEFENSE (DoD)—DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) ACTIVITIES Sec. 236.1 Purpose. 236.2 Definitions. 236.3 Policy. 236.4 Procedures. 236.5 Cyber security information sharing. 236.6 General provisions. 236.7 DIB participant eligibility requirements. Authority: 10 U.S.C. 2224; 44 U.S.C. 3506; 44 U.S.C. 3544. § 236.1 Purpose. Cyber threats to DIB unclassified information systems represent an unacceptable risk of compromise of DoD information and pose an imminent threat to U.S. national security and economic security interests. DoD’s voluntary DIB CS/IA program enhances and supplements DIB participants’ capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems. emcdonald on DSK67QTVN1PROD with RULES § 236.2 Definitions. As used in this part: (a) Attribution information means information that identifies the DIB participant, whether directly or indirectly, by the grouping of information that can be traced back to the DIB participant (e.g., program description, facility locations). (b) Compromise means disclosure of information to unauthorized persons or a violation of the security policy of a system in which unauthorized intentional, or unintentional, disclosure, modification, destruction, loss of an object, or the copying of information to unauthorized media may have occurred. (c) Covered defense information means unclassified information that: (1) Is: (i) Provided by or on behalf of the DoD to the DIB participant in VerDate Mar<15>2010 16:26 Oct 21, 2013 Jkt 232001 connection with an official DoD activity; or (ii) Collected, developed, received, transmitted, used, or stored by the DIB participant in support of an official DoD activity; and (2) Is: (i) Controlled Technical Information means technical information with military or space application (see 10 U.S.C. 130(c)) that is subject to controls on the access, use, reproduction, modification, performance, display, release, disclosure, or dissemination. Controlled technical information is to be marked with one of the distribution statements B through F, in accordance with Department of Defense Instruction 5230.24, ‘‘Distribution Statements of Technical Documents.’’ The term does not include information that is lawfully publicly available without restrictions. ‘‘Technical Information’’ means technical data or computer software, as those terms are defined in Defense Federal Acquisition Regulation Supplement clause 252.227–7013, ‘‘Rights in Technical Data— Noncommercial Items’’ (48 CFR 252.227–7013). Examples of technical information include research and engineering data, engineering drawings, and associated lists, specifications, standards, process sheets, manuals, technical reports, technical orders, catalog-item identifications, data sets, studies and analyses and related information, and computer software executable code and source code; (ii) Information subject to export control under the International Traffic in Arms Regulations (ITAR) (https:// pmddtc.state.gov/regulations_laws/itar_ official.html), or the Export Administration Regulations (EAR). (15 CFR part 730); (iii) Information designated as Critical Program Information (CPI) in accordance with DoD Instruction 5200.39, ‘‘Critical Program Information (CPI) Protection within the Department of Defense’’; (iv) Critical Information (Operations Security) includes specific facts identified through the Operations Security process about friendly intentions, capabilities, and activities vitally needed by adversaries for them to plan and act effectively so as to guarantee failure or unacceptable consequences for friendly mission accomplishment (part of Operations Security process as described in 5205.02–M, ‘‘DoD Operations Security (OPSEC Program Manual)’’; (v) Personally Identifiable Information (PII) that can be used to distinguish or trace an individual’s identity in PO 00000 Frm 00019 Fmt 4700 Sfmt 4700 62435 accordance with DoD Directive 5400.11, ‘‘DoD Privacy Program’’; (vi) Information bearing current and prior designations indicating controlled unclassified information (e.g., For Official Use Only, Sensitive But Unclassified, and Limited Official Use, DoD Unclassified Controlled Nuclear Information, Sensitive Information) that has not been cleared for public release in accordance with DoD Directive 5230.29, ‘‘Clearance of DoD Information for Public Release’’ (see also DoD 5200.01 M Volume 4, ‘‘DoD Information Security Program: Controlled Unclassified Information (CUI)’’), ; or (vii) Any other information that is exempt from mandatory public disclosure under DoD Directive 5400.07, ‘‘DoD Freedom of Information Act (FOIA) Program’’, and DoD Regulation 5400.7–R, ‘‘DoD Freedom of Information Program’’. (d) Covered DIB systems means an information system that is owned or operated by or for a DIB participant and that processes, stores, or transmits covered defense information. (e) Cyber incident means actions taken through the use of computer networks that result in an actual or potentially adverse effect on an information system and/or the information residing therein. (f) Cyber intrusion damage assessment means a managed, coordinated process to determine the effect on defense programs, defense scientific and research projects, or defense warfighting capabilities resulting from compromise of a DIB participant’s unclassified computer system or network. (g) Defense Industrial Base (DIB) means the Department of Defense, Government, and private sector worldwide industrial complex with capabilities to perform research and development, design, produce, and maintain military weapon systems, subsystems, components, or parts to satisfy military requirements. (h) DIB participant means a DIB company that has met all of the eligibility requirements to participate in the voluntary DIB CS/IA information sharing program as set forth in this part (see § 236.7). (i) Government means the United States Government. (j) Government Furnished Information (GFI) means information provided by the Government under the voluntary DIB CS/IA program, including but not limited to cyber threat information and information assurance practices. (k) Information means any communication or representation of knowledge such as facts, data, or E:\FR\FM\22OCR1.SGM 22OCR1 62436 Federal Register / Vol. 78, No. 204 / Tuesday, October 22, 2013 / Rules and Regulations opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual. (l) Information system means a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. (m) Threat means any circumstance or event with the potential to adversely impact organization operations (including mission, functions, image, or reputation), organization assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information and/or denial of service. (n) U.S. based means provisioned, maintained, or operated within the physical boundaries of the United States. (o) U.S. citizen means a person born in the United States or naturalized. § 236.3 Policy. It is DoD policy to: (a) Establish a comprehensive approach for enhancing and supplementing DIB information assurance capabilities to safeguard covered defense information on covered DIB systems. (b) Increase the Government and DIB situational awareness of the extent and severity of cyber threats to DoD information. emcdonald on DSK67QTVN1PROD with RULES § 236.4 Procedures. (a) The Government and each DIB participant will execute a voluntary standardized agreement, referred to as a Framework Agreement (FA), to share, in a timely and secure manner, on a recurring basis, and to the greatest extent possible, cyber security information relating to information assurance for covered defense information on covered DIB systems. (b) Each such FA between the Government and a DIB participant must comply with and implement the requirements of this part, and will include additional terms and conditions as necessary to effectively implement the voluntary information sharing activities described in this part with individual DIB participants. (c) DoD’s DIB CS/IA Program Office is the overall point of contact for the program. The DoD Cyber Crime Center’s DoD-DIB Collaborative Information Sharing Environment (DC3/DCISE) is the operational focal point for cyber threat information sharing and incident reporting under the DIB CS/IA program. (d) The Government will maintain a Web site or other Internet-based VerDate Mar<15>2010 16:26 Oct 21, 2013 Jkt 232001 capability to provide potential DIB participants with information about eligibility and participation in the program, to enable the online application or registration for participation, and to support the execution of necessary agreements with the Government. https://dibnet.dod.mil/. (e) Prior to receiving GFI from the Government, each DIB participant shall provide the requisite points of contact information, to include security clearance and citizenship information, for the designated personnel within their company (e.g., typically 3–10 company designated points of contact) in order to facilitate the DoD–DIB interaction in the DIB CS/IA program. The Government will confirm the accuracy of the information provided as a condition of that point of contact being authorized to act on behalf of the DIB participant for this program. (f) GFI will be issued via both unclassified and classified means. DIB participant handling and safeguarding of classified information shall be in compliance with the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22–M). The Government shall specify transmission and distribution procedures for all GFI, and shall inform DIB participants of any revisions to previously specified transmission or procedures. (g) Except as authorized in this part or in writing by the Government, DIB participants may use GFI to safeguard covered defense information only on covered DIB systems that are U.S. based; and share GFI only within their company or organization, on a need to know basis, with distribution restricted to U.S. citizens. However, in individual cases, upon request of a DIB participant that has determined that it requires the ability to share the information with a non U.S. citizen, or to use the GFI on a non-U.S. based covered DIB system, and can demonstrate that appropriate information handling and protection mechanisms are in place, the Government may authorize such disclosure or use under appropriate terms and conditions. (h) DIB participants shall maintain the capability to electronically disseminate GFI within the Company in an encrypted fashion (e.g., using Secure/ Multipurpose Internet Mail Extensions (S/MIME), secure socket layer (SSL), Transport Layer Security (TLS) protocol version 1.2, DoD-approved medium assurance certificates). (i) The DIB participants shall not share GFI outside of their company or organization, regardless of personnel clearance level, except as authorized in PO 00000 Frm 00020 Fmt 4700 Sfmt 4700 this part or otherwise authorized in writing by the Government. (j) If the DIB participant utilizes a third-party service provider (SP) for information system security services, the DIB participant may share GFI with that SP under the following conditions and as authorized in writing by the Government: (1) The DIB participant must identify the SP to the Government and request permission to share or disclose any GFI with that SP (which may include a request that the Government share information directly with the SP on behalf of the DIB participant) solely for the authorized purposes of this program; (2) The SP must provide the Government with sufficient information to enable the Government to determine whether the SP is eligible to receive such information, and possesses the capability to provide appropriate protections for the GFI; (3) Upon approval by the Government, the SP must enter into a legally binding agreement with the DIB participant (and also an appropriate agreement with the Government in any case in which the SP will receive or share information directly with the Government on behalf of the DIB participant) under which the SP is subject to all applicable requirements of this part and of any supplemental terms and conditions in the DIB participant’s FA with the Government, and which authorizes the SP to use the GFI only as authorized by the Government. (k) The DIB participant may not sell, lease, license, or otherwise incorporate the GFI into its products or services, except that this does not prohibit a DIB participant from being appropriately designated an SP in accordance with paragraph (j) of this section. § 236.5 Cyber security information sharing. (a) GFI. The Government shall share GFI with DIB participants or designated SPs in accordance with this part. (b) Initial incident reporting. The DIB participant shall report to DC3/DCISE cyber incidents involving covered defense information on a covered DIB system. These initial reports will be provided within 72 hours of discovery. DIB participants also may report other cyber incidents to the Government if the DIB participant determines the incident may be relevant to information assurance for covered defense information or covered DIB systems or other information assurance activities of the Government. (c) Follow-up reporting. After an initial incident report, the Government and the DIB participant may voluntarily E:\FR\FM\22OCR1.SGM 22OCR1 emcdonald on DSK67QTVN1PROD with RULES Federal Register / Vol. 78, No. 204 / Tuesday, October 22, 2013 / Rules and Regulations share additional information that is determined to be relevant to a reported incident, including information regarding forensic analyses, mitigation and remediation, and cyber intrusion damage assessments. (d) Cyber intrusion damage assessment. Following analysis of a cyber incident, DC3/DCISE may provide information relevant to the potential or known compromise of DoD acquisition program information to the Office of the Secretary of Defense’s Damage Assessment Management Office (OSD DAMO) for a cyber intrusion damage assessment. The Government may provide DIB participants with information regarding the damage assessment. (e) DIB participant attribution information. The Government acknowledges that information shared by the DIB participants under this program may include extremely sensitive proprietary, commercial, or operational information that is not customarily shared outside of the company, and that the unauthorized use or disclosure of such information could cause substantial competitive harm to the DIB participant that reported that information. The Government shall take reasonable steps to protect against the unauthorized use or release of such information (e.g., attribution information and other nonpublic information) received from a DIB participant or derived from such information provided by a DIB participant, including applicable procedures (see § 236.5(h)). The Government will restrict its internal use and disclosure of attribution information to only Government personnel and Government support contractors that are bound by appropriate confidentiality obligations and restrictions relating to the handling of this sensitive information and are engaged in lawfully authorized activities. (f) Non-attribution information. The Government may share non-attribution information that was provided by a DIB participant (or derived from information provided by a DIB participant) with other DIB participants in the DIB CS/IA program, and may share such information throughout the Government (including with Government support contractors that are bound by appropriate confidentiality obligations) for cyber security and information assurance purposes for the protection of Government information or information systems. (g) Electronic media. Electronic media/files provided by DIB participants to DC3 under paragraphs VerDate Mar<15>2010 16:26 Oct 21, 2013 Jkt 232001 (b), (c) and (d) of this section are maintained by the digital and multimedia forensics laboratory at DC3, which implements specialized handling procedures to maintain its accreditation as a digital and multimedia forensics laboratory. DC3 will maintain, control, and dispose of all electronic media/files provided by DIB participants to DC3 in accordance with established DoD policies and procedures. (h) Freedom of Information Act (FOIA). Agency records, which may include qualifying information received from non-federal entities, are subject to request under the Freedom of Information Act (5 U.S.C. 552) (FOIA), which is implemented in the Department of Defense by DoD Directive 5400.07 and DoD Regulation 5400.7–R (see 32 CFR Parts 285 and 286, respectively). Pursuant to established procedures and applicable regulations, the Government will protect sensitive nonpublic information under this Program against unauthorized public disclosure by asserting applicable FOIA exemptions, and will inform the nonGovernment source or submitter (e.g., DIB participants) of any such information that may be subject to release in response to a FOIA request, to permit the source or submitter to support the withholding of such information or pursue any other available legal remedies. § 236.6 General provisions. (a) Confidentiality of information that is exchanged under this program will be protected to the maximum extent authorized by law, regulation, and policy. (b) The Government and DIB participants will conduct their respective activities under this program in accordance with applicable laws and regulations, including restrictions on the interception, monitoring, access, use, and disclosure of electronic communications or data. The Government and the DIB participant each bear responsibility for their own actions under this program. (c) Prior to sharing any information with the Government under this program pursuant to the FA, the DIB participant shall perform a legal review of its policies and practices that support its activities under this program, and shall make a determination that such policies, practices, and activities comply with applicable legal requirements. (d) This voluntary DIB CS/IA program is intended to safeguard covered defense information. None of the restrictions on the Government’s use or sharing of information under the DIB CS/IA PO 00000 Frm 00021 Fmt 4700 Sfmt 4700 62437 program shall limit the Government’s ability to conduct law enforcement, counterintelligence activities, or other activities in the interest of national security; and participation does not supersede other regulatory or statutory requirements. (e) Participation in the DIB CS/IA program is voluntary and does not obligate the DIB participant to utilize the GFI in, or otherwise to implement any changes to, its information systems. Any action taken by the DIB participant based on the GFI or other participation in this program is taken on the DIB participant’s own volition and at its own risk and expense. (f) A DIB participant’s voluntary participation in this program is not intended to create any unfair competitive advantage or disadvantage in DoD source selections or competitions, or to provide any other form of unfair preferential treatment, and shall not in any way be represented or interpreted as a Government endorsement or approval of the DIB participant, its information systems, or its products or services. (g) The DIB participant and the Government may each unilaterally limit or discontinue participation in this program at any time. Termination shall not relieve the DIB participant or the Government from obligations to continue to protect against the unauthorized use or disclosure of GFI, attribution information, contractor proprietary information, third-party proprietary information, or any other information exchanged under this program, as required by law, regulation, contract, or the FA. (h) Upon termination of the FA, and/ or change of Facility Security Clearance status below Secret, GFI must be returned to the Government or destroyed pursuant to direction of, and at the discretion of, the Government. (i) Participation in this program does not abrogate the Government’s or the DIB participants’ rights or obligations regarding the handling, safeguarding, sharing, or reporting of information, or regarding any physical, personnel, or other security requirements, as required by law, regulation, policy, or a valid legal contractual obligation. § 236.7 DIB participant eligibility requirements. To be eligible to participate in this program, a DIB company must: (a) Have or acquire DoD-approved medium assurance certificates to enable encrypted unclassified information sharing between the Government and DIB participants; E:\FR\FM\22OCR1.SGM 22OCR1 62438 Federal Register / Vol. 78, No. 204 / Tuesday, October 22, 2013 / Rules and Regulations (b) Have an existing active Facility Security Clearance (FCL) granted under the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22–M) with approved safeguarding for at least Secret information, and continue to qualify under the NISPOM for retention of its FCL and approved safeguarding (https://www.dtic.mil/whs/ directives/corres/pdf/522022m.pdf); (c) Have or acquire a Communication Security (COMSEC) account in accordance with the NISPOM Chapter 9, Section 4 (DoD 5220.22–M), which provides procedures and requirements for COMSEC activities; (d) Obtain access to DoD’s secure voice and data transmission systems supporting the DIB CS/IA program, (e) Own or operate covered DIB system(s), and (f) Execute the standardized FA with the Government (available during the application process), which implements the requirements set forth in §§ 236.4 through 236.6. Dated: September 30, 2013. Patricia L. Toppings, OSD Federal Register Liaison Officer, Department of Defense. [FR Doc. 2013–24256 Filed 10–21–13; 8:45 am] BILLING CODE 5001–06–P DEPARTMENT OF DEFENSE Department of the Navy 32 CFR Part 706 Certifications and Exemptions Under the International Regulations for Preventing Collisions at Sea, 1972 Department of the Navy, DoD. Final rule. AGENCY: ACTION: The Department of the Navy (DoN) is amending its certifications and emcdonald on DSK67QTVN1PROD with RULES SUMMARY: VerDate Mar<15>2010 16:26 Oct 21, 2013 Jkt 232001 exemptions under the International Regulations for Preventing Collisions at Sea, 1972 (72 COLREGS), to reflect that the Deputy Assistant Judge Advocate General (DAJAG) (Admiralty and Maritime Law) has determined that USS AMERICA (LHA 6) is a vessel of the Navy which, due to its special construction and purpose, cannot fully comply with certain provisions of the 72 COLREGS without interfering with its special function as a naval ship. The intended effect of this rule is to warn mariners in waters where 72 COLREGS apply. DATES: This rule is effective October 22, 2013 and is applicable beginning September 19, 2013. FOR FURTHER INFORMATION CONTACT: Lieutenant Jocelyn Loftus-Williams, JAGC, U.S. Navy, Admiralty Attorney, (Admiralty and Maritime Law), Office of the Judge Advocate General, Department of the Navy, 1322 Patterson Ave. SE., Suite 3000, Washington Navy Yard, DC 20374–5066, telephone 202–685–5040. SUPPLEMENTARY INFORMATION: Pursuant to the authority granted in 33 U.S.C. 1605, the DoN amends 32 CFR Part 706. This amendment provides notice that the DAJAG (Admiralty and Maritime Law), under authority delegated by the Secretary of the Navy, has certified that USS AMERICA (LHA 6) is a vessel of the Navy which, due to its special construction and purpose, cannot fully comply with the following specific provisions of 72 COLREGS without interfering with its special function as a naval ship: Annex I, paragraph 3(a) pertaining to the horizontal distance between the forward and aft masthead lights; Rule 21(a) pertaining to placement of masthead lights over the fore and aft centerline of the vessel; Annex I, paragraph 2(g) pertaining to the placement of sidelights above the hull of the vessel; and Annex I PO 00000 Frm 00022 Fmt 4700 Sfmt 4700 paragraph 3(b) pertaining to the location of fixture of side lights. The DAJAG (Admiralty and Maritime Law) has also certified that the lights involved are located in closest possible compliance with the applicable 72 COLREGS requirements. Moreover, it has been determined, in accordance with 32 CFR Parts 296 and 701, that publication of this amendment for public comment prior to adoption is impracticable, unnecessary, and contrary to public interest since it is based on technical findings that the placement of lights on this vessel in a manner differently from that prescribed herein will adversely affect the vessel’s ability to perform its military functions. List of Subjects in 32 CFR Part 706 Marine safety, Navigation (water), and Vessels. For the reasons set forth in the preamble, amend part 706 of title 32 of the CFR as follows: PART 706—CERTIFICATIONS AND EXEMPTIONS UNDER THE INTERNATIONAL REGULATIONS FOR PREVENTING COLLISIONS AT SEA, 1972 1. The authority citation for part 706 continues to read as follows: ■ Authority: 33 U.S.C. 1605. 2. Section 706.2 is amended as follows: ■ A. In Table Two by adding, in alpha numerical order, by vessel number, an entry for USS AMERICA (LHA 6); and ■ B. In Table Five by adding, in alpha numerical order, by vessel number, an entry for USS AMERICA (LHA 6). ■ § 706.2 Certifications of the Secretary of the Navy under Executive Order 11964 and 33 U.S.C. 1605. E:\FR\FM\22OCR1.SGM 22OCR1

Agencies

[Federal Register Volume 78, Number 204 (Tuesday, October 22, 2013)]
[Rules and Regulations]
[Pages 62430-62438]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2013-24256]


-----------------------------------------------------------------------

DEPARTMENT OF DEFENSE

Office of the Secretary

32 CFR Part 236

[DOD-2009-OS-0183]
RIN 0790-AI60


Department of Defense (DoD)--Defense Industrial Base (DIB) 
Voluntary Cyber Security and Information Assurance (CS/IA) Activities

AGENCY: Office of the DoD Chief Information Officer, DoD.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: This final rule responds to public comments regarding the 
establishment of the DIB CS/IA program, a voluntary cyber security 
information sharing program between DoD and eligible DIB companies. The 
program enhances and supplements DIB participants' capabilities to 
safeguard DoD information that resides on, or transits, DIB 
unclassified information systems.

DATES: Effective Date: This rule is effective November 21, 2013.

FOR FURTHER INFORMATION CONTACT: Mr. Dan Prieto at 703-571-5911, or the 
DIB Cyber Security and Information Assurance Program Office: (703) 604-
3167, toll free (855) 363-4227, email osd.ncr.dod-cio.mbx.dib-cs-ia-program-registration@mail.mil.

SUPPLEMENTARY INFORMATION: 

Executive Summary

    This final rule responds to public comments regarding the 
establishment of the DIB CS/IA program, a voluntary

[[Page 62431]]

cyber security information sharing activity between DoD and eligible 
DIB companies to enhance and supplement DIB participants' capabilities 
to safeguard DoD information that resides on, or transits, DIB 
unclassified information systems. The program is codified at 32 CFR 
Part 236 and implements DoD statutory authorities to establish programs 
and activities to protect DoD information and DoD information systems, 
including information and information systems operated and maintained 
by contractors or others in support of DoD activities (see 10 U.S.C. 
2224 and the Federal Information Security Management Act (FISMA), 
codified at 44 U.S.C. 3541 et seq.). It also fulfills important 
elements of DoD's critical infrastructure protection responsibilities, 
as the sector specific agency for the DIB sector see (Presidential 
Policy Directive 21 (PPD-21), ``Critical Infrastructure Security and 
Resilience''). This program allows eligible DIB companies to receive 
U.S. Government (USG) threat information and to share information about 
network intrusions that could compromise DoD programs and missions. In 
addition, the program permits DIB companies and DoD to assess and 
reduce damage to DoD programs and missions when DoD information is 
potentially compromised. Furthermore, the information sharing 
arrangements between the DoD and each participating DIB company that 
implement the requirements of this are memorialized in a standardized 
bilateral agreement, known as a Framework Agreement (FA), signed by the 
participating DIB company and the Government.
    The rule also provides the eligibility requirements for a company 
to participate in the DIB CS/IA program.
    Costs for DIB participants include obtaining access to DoD's secure 
voice and data transmission systems supporting the DIB CS/IA program 
and acquiring DoD approved medium assurance certificates. There also 
are costs associated with the collection requirements for providing 
point of contact information and cyber incident reporting. Government 
costs include onboarding new companies and collecting and analyzing 
cyber incidents from DIB participants.
    A foundational element of this bilateral information sharing model 
is the recognition that the information being shared between the 
parties includes extremely sensitive nonpublic information, which must 
be protected against unauthorized uses and disclosures in order to 
preserve the integrity of the program.
    For additional information regarding the Government's safeguarding 
of information received from the DIB companies, with specific focus on 
PII, see the Privacy Impact Assessment (PIA) for the DIB CS/IA Program 
(https://dodcio.defense.gov/Portals/0/Documents/DIB%20CS-IA%20PIA_FINAL_signed_30jun2011_VMSS_GGMR_RC.pdf).
    In addition, this rule and program are intended to be consistent 
and coordinated with, and updated as necessary to ensure consistency 
with and support for, other federal activities related to the handling 
and safeguarding of controlled unclassified information, such as those 
that are being led by the National Archives and Records Administration 
pursuant to Executive Order 13556 ``Controlled Unclassified 
Information'' (November 4, 2010) (see https://www.archives.gov/cui/).
    This rule is not intended to implement the new requirements from 
section 941 of the National Defense Authorization Act for Fiscal Year 
2013.

Comments

    DoD published an interim final rule on May 11, 2012 (77 FR 27615). 
Fifty comments from twelve respondents were received and reviewed by 
the USG.
    Comment: Four comments questioned the eligibility and scope of the 
program, to include recommending that the program remain voluntary, and 
questioning whether the program was ``under inclusive or overly 
restrictive because the program is only available to companies that 
have a Facility Security Clearance and a Communications Security 
account.''
    Response: The DIB CS/IA program will remain a voluntary program to 
enhance and supplement DIB participants' capabilities to safeguard DoD 
information that resides on, or transits, DIB unclassified information 
systems. The eligibility requirements for the program (Sec.  236.7) are 
based on security requirements to ensure the protection of Government 
furnished information (GFI) at DIB companies in possession of DoD 
information, as described in the definition for ``covered defense 
information,'' (Sec.  236.2(c)). No change is made to the rule.
    Comment: One comment asserted that the rule should not have been 
published as an interim rule.
    Response: In light of the growing cyber threat activity against DoD 
information and DIB information systems and the associated risk to U.S. 
national security, the Government determined it appropriate to issue an 
interim rule. This allowed eligible DIB companies to receive cyber 
threat information, without delay in order to enhance their capability 
to defend against ongoing and continuous cyber threats and to safeguard 
DoD information. No change is made to the rule.
    Comment: One comment asserted that the Framework Agreement (FA) 
should be available for public review to evaluate the estimates of 
projected paperwork for participants.
    Response: The Framework Agreement is a representation of the 
federal rule converted into an agreement format for implementation of 
the program. In addition, all information required to evaluate the 
projected cost and time for the information collection requirements is 
available in the rule. No change is made to the rule.
    Comment: One comment asserted that transparency into public-private 
cyber security programs is crucial to ensure that federal agencies 
respect privacy rights and comply with their obligations.
    Response: Extensive coordination across the Government has ensured 
that the privacy rights of U.S. citizens are protected under the DIB 
CS/IA voluntary program, including developing a comprehensive Privacy 
Impact Assessment (PIA) for the DIB CS/IA program. The PIA is 
publically available at: https://dodcio.defense.gov/Portals/0/Documents/DIB%20CS-IA%20PIA_FINAL_signed_30jun2011_VMSS_GGMR_RC.pdf. No 
change is made to the rule.
    Comment: One comment asserted that the Defense Department opted to 
issue a rule even though no law has been passed by Congress regarding 
Government-industry cyber security activities and that rulemaking 
should come after Congress concludes its legislative efforts.
    Response: The rule implements DoD statutory authorities and 
responsibilities to establish a program to protect DoD information and 
information systems, including information systems operated and 
maintained by contractors or others in support of DoD activities (see 
10 U.S.C. 2224; and the Federal Information Security Management Act 
(FISMA), codified at 44 U.S.C. 3541 et seq.). No change is made to the 
rule.
    Comment: Three comments asserted the rule should create an 
oversight and accountability structure that includes public, 
congressional, and executive branch reporting. One comment recommended 
using DHS oversight procedures as a model to ensure the program's 
compliance with regulations and relevant guidelines.
    Response: The DIB CS/IA program is subject to numerous procedures,

[[Page 62432]]

requirements, and oversight to ensure compliance with DoD and national 
policies for collecting, handling, safeguarding, and sharing sensitive 
information with non-Government organizations in accordance with DoD 
Directive 5500.1, DoD Privacy Program and 5400.11--Regulation, 
Department of Defense Privacy Program, which proscribes uniform 
procedures for the DoD Privacy Program. For additional information 
regarding the Government's safeguarding of information received from 
the DIB companies, with specific focus on PII, see the Privacy Impact 
Assessment (PIA) for the DIB CS/IA Program (https://DoDcio.defense.gov/
Portals/0/Documents/DIB%20CS-IA%20PIA--FINAL--signed--30jun2011--VMSS--
GGMR--RC.pdf). In addition, DoD annually reports to Congress on the 
progress of DoD in defending the DoD and the Defense Industrial Base 
from cyber events. No additional oversight is warranted at this time. 
No change is made to the rule.
    Comment: One comment recommended distinguishing between classified 
and unclassified GFI, and that classified GFI should be handled per the 
NISPOM.
    Response: As stated in Sec.  236.4(f) of the rule, GFI will be 
issued via both unclassified and classified means, and that handling 
and safeguarding of classified GFI shall be in compliance with the 
National Industrial Security Program Operating Manual (NISPOM) (DoD 
5220.22-M). No change is made to the rule.
    Comment: One comment recommended not to apply sharing limitations 
under the rule to non-sensitive GFI.
    Response: As defined in the rule at Sec.  236.2(j), Government 
Furnished Information (GFI) means ``information provided by the 
Government under the voluntary DIB CS/IA program, including but not 
limited to cyber threat information and information assurance 
practices.'' GFI is typically nonpublic information that is sensitive 
based either on the content of the information itself or the context in 
which the information is relevant (e.g., cyber threat information). 
Accordingly, the handling requirements applicable to GFI are designed 
to protect sensitive information. No change is made to the rule.
    Comment: Three comments requested a narrow interpretation of the 
Freedom of Information Act (FOIA) exemptions, and one asked that the 
records not be exempted under Privacy Act provisions.
    Response: As recognized in the Background section of the Interim 
Rule (77 FR 27615, at 27616), a foundational element of this program is 
the recognition that the information being shared includes extremely 
sensitive nonpublic information. This includes the GFI shared by the 
Government, as well as the information regarding cyber incidents that 
is shared by the DIB participants, which they typically treat as 
extremely sensitive proprietary, commercial, or operational information 
for which release and dissemination is tightly controlled. Accordingly, 
as stated in Sec.  236.6 of the rule, confidentiality of such sensitive 
information exchanged under this program will be protected to the 
maximum extent authorized by law, regulation, and policy. This includes 
taking appropriate measures, including the use of any applicable 
exemptions under FOIA or the Privacy Act, to safeguard against 
unauthorized public disclosure and in full compliance with applicable 
laws, regulations, policies, and procedures (see Sec.  236.2(c)(2)(vii) 
and Sec.  236.5(h)). No change is made to the rule.
    Comment: Four comments addressed DoD working with private 
contractors without appropriate safeguards for privacy rights, 
maintaining a database on law abiding Americans and subverting due 
process and gathering information about an unsuspecting populace.
    Response: The DIB CS/IA program focuses on sharing cyber security 
related information and minimizes the collection of information from 
participating DIB companies, seeking only the information that is 
necessary to support this cyber security program. The PIA for the DIB 
CS/IA program details the comprehensive processes to safeguard PII. The 
operational implementation of the DIB CS/IA program receives PII from 
DIB Companies in two ways: (i) For program administration and 
management purposes, the DIB companies share with DoD the typical 
business contact information for its personnel that are serving as 
company points of contact for the program activities or specific cyber 
incidents; and (ii) for cyber incident response and analysis purposes, 
DIB companies may share PII as a necessary part of the information that 
they have determined is relevant to cyber incident response, analysis, 
or damage assessment. In addition, DIB companies are prohibited from 
sharing any information unless they have determined that the 
information has been lawfully collected and is authorized to be shared 
with DoD. The DIB CS/IA Program restricts access to such PII and 
attribution information only to those authorized personnel who have a 
need-to-know such information for duties in support of the DIB CS/IA 
Program and are subject to strict nondisclosure obligations. The PII is 
only maintained as long as necessary for DIB CS/IA Program activities, 
and is managed and disposed of in accordance with applicable records 
management requirements. No change is made to the rule.
    Comment: One comment stated that the rule allows a number of 
private companies to sell and share private citizens' data including to 
other Governments, including ``any data that `transits' any government 
system.''
    Response: The voluntary DIB CS/IA program does not authorize 
participating companies to sell any information, to anyone, in any 
context whatsoever. The program also does not authorize DIB companies 
to share any information with anyone other than program participants. 
The program does not permit the sharing of information with any 
governments other than authorized U.S. Government participants. No 
change is made to the rule.
    Comment: One comment stated that the rule does not properly ensure 
implementation of the new Controlled Unclassified Information (CUI) 
framework from Executive Order 13556 into its treatment of covered 
defense information.
    Response: As stated in the Background Section above, the program is 
designed to ensure consistency with and support for, federal activities 
related to the handling and safeguarding of controlled unclassified 
information that are being led by the National Archives and Records 
Administration pursuant to Executive Order 13556. As CUI implementation 
evolves in the Government, the rule will be modified as necessary to 
ensure compliance. No change is made to the rule.
    Comment: Two comments stated that the interim final rule lacks 
sufficient safeguards to limit the sharing and use of personally 
identifiable information and content of private communications.
    Response: The program utilizes significant handling and sharing 
restrictions to ensure appropriate protections for any and all 
sensitive information managed by the program, including but not limited 
to PII. These safeguards are addressed in more detail in the PIA, which 
will be updated appropriately as the program evolves. No change is made 
to the rule.
    Comment: Three comments recommended that the rule should require 
companies to remove sensitive information (e.g., PII), and to anonymize 
as much information as possible

[[Page 62433]]

without hindering cyber security efforts, and that the Government 
should immediately dispose of inadvertently collected PII that is not 
directly relevant to the ``cyber incident.''
    Response: DoD agrees with the underlying premise of the comment, 
and the DIB CS/IA program uses procedures to minimize the collection 
and sharing of PII. The DIB participants remove unnecessary sensitive 
information (e.g., PII), and only share information if it is relevant 
to a cyber incident (e.g., for forensics or cyber intrusion damage 
assessment). All PII received by DoD is provided voluntarily by 
authorized DIB company representatives and is subject to mutually 
agreed upon restrictions for cyber security purposes. In addition, the 
DIB participants are required, prior to sharing any information with 
the Government under this program, to review and determine that their 
activities under the program are in compliance with all applicable laws 
and regulations, including restrictions on the interception, 
monitoring, access, use, and disclosure of electronic communications 
(see Sec.  236.6(b) and (c)). Information determined to be relevant is 
maintained, controlled, and disposed of when no longer reasonably 
necessary for forensics analysis, and damage assessment activities (or 
other legal, audit or operational purposes). Companies are required to 
abide by all sharing restrictions. The PIA for the DIB CS/IA program 
addresses the handling safeguards in more detail. No change is made to 
the rule.
    Comment: Two comments stated that the PII the Government obtains 
through the DIB CS/IA program should be used only for cyber security 
operations and not general law enforcement or intelligence fact 
gathering. The rule should also limit Government use of information 
shared for cyber security purposes.
    Response: The primary purpose of the DIB CS/IA program is to share 
cyber security information to promote more effective cyber security, 
not only for the DIB, but also for the DoD and U.S. Government. The 
program contains numerous information handling and sharing 
restrictions, applicable to both the Government and DIB participants, 
to safeguard against any unauthorized collection, use, or dissemination 
of such information. However, the program does not limit the 
Government's ability to conduct lawful activities, including law 
enforcement, counterintelligence activities, or other activities in the 
interest of U.S. national security (Sec.  236.6(d)). No change is made 
to the rule.
    Comment: One comment recommended that the rule incorporate privacy 
protections of the National Cyber Security Division's Joint 
Cybersecurity Services Pilot (JCSP).
    Response: The detailed processes summarized in the PIA for the DIB 
CS/IA program are comprehensive and ensure appropriate safeguards for 
PII provided by DIB participants in a similar manner as described in 
the PIA prepared for the Department of Homeland Security's JSCP. No 
change is made to the rule.
    Comment: One comment stated the interim rule should be amended to 
impose fines on private companies that intentionally or negligently 
disclose ``excessive PII.''
    Response: It is not clear what the commenter meant by the term 
``excessive PII.'' As discussed above, the DIB CS/IA program only 
receives PII in two ways: (i) For program administration and management 
purposes; and (ii) for cyber incident response and analysis purposes. 
In both cases, DIB companies share information only when it is relevant 
for those authorized purposes. In addition, DIB companies are 
prohibited from sharing any information, including PII, unless they 
have determined that it has been lawfully collected and is authorized 
to be shared with the Government. If it were to appear that a company 
is reporting excessive information not relevant to the program, the 
Government would seek to work with the company to clarify the sharing 
guidelines and support the company's efforts to refine its processes to 
implement more effective limits on sharing unnecessary information. If, 
despite these efforts, a company continued to share information that 
the Government deemed inappropriate within the scope of the program, 
the Government would take appropriate actions on a case by case basis, 
including potentially terminating the information sharing relationship 
with that participant. This is a voluntary program and fines are not 
part of the program. No change is made to the rule.
    Comment: Two comments recommended changes to the definitions of 
cyber incident, compromise and threat.
    Response: The rule leverages established definitions to the maximum 
extent possible. The source for the definition of ``compromise'', 
``cyber incident'' and ``threat'' are from the Committee on National 
Security Systems Instruction No. 4009, ``National Information Assurance 
Glossary,'' (https://www.cnss.gov/Assets/pdf/cnssi_4009.pdf). These 
definitions are established and widely accepted Government definitions. 
No change is made to the rule.
    Comment: One comment stated that U.S. based systems are not 
adequately defined.
    Response: To further clarify terms, the term ``U.S. based'' has 
been added to the definitions section (Sec.  236.2(n)).
    Comment: One comment recommended changing the definition of U.S. 
citizen to eliminate the phrase ``holding a U.S. passport,'' and adding 
text on ``Green Cards.''
    Response: The recommendation to add ``U.S. citizen'' to the 
definitions section is accepted and is added to Sec.  236.2(o). For the 
purpose of the rule, a U.S. citizen includes a person born in the U.S. 
or naturalized. The recommendation to eliminate ``holding a U.S. 
passport'' as part of the U.S. citizen definition is also accepted in 
the definition of ``U.S. citizen,'' (see Sec.  236.2(o)).
    Comment: One comment recommended changing the definition of GFI to 
a more descriptive term so as not to tie it to Government procurement.
    Response: The definition of GFI in the rule is applicable only to 
the DIB CS/IA program (see Sec.  236.2(j)), and does not relate to any 
specific procurement activities. There is no indication that the use of 
this term has led to any confusion amongst the DIB participants. No 
change is made to the rule.
    Comment: Two comments dealt with aspects of sharing information 
that could ward against threats and improve Operational Security 
(OPSEC).
    Response: The purpose of the DIB CS/IA program is to enable cyber 
threat information sharing with DIB participants to improve operational 
security of DIB networks and information systems. No change is made to 
the rule.
    Comment: One comment suggested replacing the phrase ``to use the 
GFI on non-U.S. based covered DIB systems,'' with ``to reside on non-
U.S. based covered DIB'' in Sec.  236.4(g).
    Response: After evaluation, the recommended change in terminology 
from ``use'' to ``reside'' does not provide additional technical 
clarity. No change is made to the rule.
    Comment: Two comments recommended the language be amended to 
include the words ``or as soon as practicable thereafter'' following 
the word ``discovery'' and expressed caution that less knowledgeable 
participants will be prone to over report which consumes scarce 
Government and industry resources and obscures the significant 
incidents (Sec.  236.5(b)).

[[Page 62434]]

    Response: Timeliness in reporting cyber incidents involving covered 
defense information is an integral component of the DIB CS/IA program. 
The rule makes provisions for initial and follow-up reporting (Sec.  
236.5(b) and (c)). While the DIB CS/IA program is voluntary, cyber 
security encourages sharing information as quickly as possible to 
provide the clearest understanding of the cyber threat targeting DoD 
program information. This enables cyber threat information provided by 
DIB participants to be shared with other DIB participants and 
Government stakeholders on a timely basis. No change is made to the 
rule.
    Comment: Two comments recommended the draft ``DFARS regulatory 
initiative on Safeguarding Unclassified DoD Information (Safeguarding 
Rule) being addressed under DFARS Case 2011-D039'' be written to avoid 
conflicting and duplicative requirements for participants in the DIB 
CS/IA program.
    Response: The DoD is committed to using both internal coordination 
processes, and public review and comment procedures such as those used 
in rulemaking for this program and for proposed DFARS revisions, to 
ensure that its cyber security activities are evaluated to avoid 
conflicting or duplicative elements. No change is made to the rule.
    Comment: Two comments recommended specific word changes to the 
program requirements relating to each party conducting a legal review 
of its policies and practices that support the program, including 
deletion of the requirement for a ``determination'' of compliance with 
law because it may be interpreted as requiring the company to retain 
outside counsel for such a determination, limiting the compliance only 
to ``U.S'' law, and deleting the second sentence of Sec.  236.6(c) to 
avoid threatening the attorney-client privilege.
    Response: The requirement at Sec.  236.6(c) for a determination of 
legal compliance is expressly stated as a requirement that ``the DIB 
participant shall perform a legal review . . . and shall make a 
determination'' that it is compliant. There is neither an express nor 
implied requirement that the DIB participant retain outside counsel for 
such a determination, and thus no change to that language is warranted. 
In Sec.  236.6, the rule retains ``applicable laws and regulations'' as 
an accurate description of the requirement. Finally, the second 
sentence of Sec.  236.6(c) was intended merely to provide notice that 
the Government may request additional information from the DIB company, 
and was not intended to imply that there was a requirement to provide 
such information as a condition of the program, regardless of whether 
such information were protected by the attorney-client privilege. To 
avoid any unnecessary confusion or unintended implications, the second 
sentence is deleted.
    Comment: One comment expressed full support for the Defense 
Industrial Base Voluntary Cyber Security and Information Assurance 
Activities.
    Response: Government evaluation of the program concurs that the 
voluntary DIB CS/IA program contributes to the safeguarding of DoD 
information. No change is made to the rule.
    Comment: One comment urged a renewed look at how classification 
schemes are balanced with disclosure schemes.
    Response: In accordance with the rule (Sec.  236.4(f)), handling 
and safeguarding of classified GFI shall be in compliance with the 
National Industrial Security Program Operating Manual (NISPOM) (DoD 
5220.22-M). No change is made to the rule.
    Comment: One comment recommended that the DIB CS/IA program have a 
more robust role in industry engagement.
    Response: The DIB CS/IA program will continue to evaluate outreach 
opportunities to enhance engagement with industry, to include industry 
associations. No change is made to the rule.
    Comment: Two comments recommended that the infrastructure of the 
internet be upgraded and that the rule should incorporate ``technology 
neutral terms.''
    Response: Other activities within the Government are examining the 
infrastructure of the internet. The rule focuses on cyber threat 
sharing and the risk of compromise of DoD information that resides on, 
or transits, DIB unclassified information systems. No change is made to 
the rule.

Regulatory Procedures

 Executive Orders 12866, ``Regulatory Planning and Review'' and 13563, 
``Improving Regulation and Regulatory Review''

    It has been certified that 32 CFR part 236 does not:
    (a) Have an annual effect on the economy of $100 million or more, 
or adversely affect in a material way, the economy; a section of the 
economy; productivity; competition; jobs; the environment; public 
health or safety; or State, local, or tribal Governments or 
communities;
    (b) Create a serious inconsistency, or otherwise interfere with, an 
action taken or planned by another Agency;
    (c) Materially alter the budgetary impact of entitlements, grants, 
user fees, or loan programs, or the rights and obligations of 
recipients thereof; or
    (d) Raise novel legal or policy issues arising out of legal 
mandates, the President's priorities, or the principles as set forth in 
these Executive Orders.

Public Law 104-121, ``Congressional Review Act'' (5 U.S.C. 801)

    It has been determined that 32 CFR part 236 is not a ``major'' rule 
under 5 U.S.C. 801, enacted by Public Law 104-121, because it will not 
result in an annual effect on the economy of $100 million or more; a 
major increase in costs or prices for consumers, individual industries, 
Federal, State, or local Government agencies, or geographic regions; or 
significant adverse effects on competition, employment, investment, 
productivity, innovation, or on the ability of United States-based 
enterprises to compete with foreign-based enterprises in domestic and 
export markets.

Sec. 202, Public Law 104-4, ``Unfunded Mandates Reform Act''

    It has been certified that 32 CFR part 236 does not contain a 
Federal mandate that may result in expenditure by State, local and 
tribal Governments, in aggregate, or by the private sector, of $100 
million or more in any one year.

Public Law 96-354, ``Regulatory Flexibility Act'' (5 U.S.C. 601)

    It has been certified that 32 CFR part 236 is not subject to the 
Regulatory Flexibility Act (5 U.S.C. 601) because it would not, if 
promulgated, have a significant economic impact on a substantial number 
of small entities. DIB participation in the DIB CS/IA Program is 
voluntary.

Public Law 96-511, ``Paperwork Reduction Act'' (44 U.S.C. Chapter 35)

    Sections 236.4 and 236.5 and 236.7 of this final rule contain 
information collection requirements. These collection requirements were 
published in the preamble of the interim final rule that published on 
May 11, 2012 (77 FR 27617) for public comment. No comments were 
received on the collection requirements. OMB preapproved the collection 
requirements and assigned them OMB Controls Numbers 0704-0489 and 0704-
0490.

[[Page 62435]]

Executive Order 13132, ``Federalism''

    It has been certified that 32 CFR part 236 does not have federalism 
implications, as set forth in Executive Order 13132. This rule does not 
have substantial direct effects on:
    (a) The States;
    (b) The relationship between the National Government and the 
States; or
    (c) The distribution of power and responsibilities among the 
various levels of Government.

List of Subjects in 32 CFR Part 236

    Contracts, Security measures.

    Accordingly 32 CFR part 236 is revised to read as follows:

PART 236--DEPARTMENT OF DEFENSE (DoD)--DEFENSE INDUSTRIAL BASE 
(DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA) 
ACTIVITIES

Sec.
236.1 Purpose.
236.2 Definitions.
236.3 Policy.
236.4 Procedures.
236.5 Cyber security information sharing.
236.6 General provisions.
236.7 DIB participant eligibility requirements.

    Authority:  10 U.S.C. 2224; 44 U.S.C. 3506; 44 U.S.C. 3544.


Sec.  236.1  Purpose.

    Cyber threats to DIB unclassified information systems represent an 
unacceptable risk of compromise of DoD information and pose an imminent 
threat to U.S. national security and economic security interests. DoD's 
voluntary DIB CS/IA program enhances and supplements DIB participants' 
capabilities to safeguard DoD information that resides on, or transits, 
DIB unclassified information systems.


Sec.  236.2  Definitions.

    As used in this part:
    (a) Attribution information means information that identifies the 
DIB participant, whether directly or indirectly, by the grouping of 
information that can be traced back to the DIB participant (e.g., 
program description, facility locations).
    (b) Compromise means disclosure of information to unauthorized 
persons or a violation of the security policy of a system in which 
unauthorized intentional, or unintentional, disclosure, modification, 
destruction, loss of an object, or the copying of information to 
unauthorized media may have occurred.
    (c) Covered defense information means unclassified information 
that:
    (1) Is:
    (i) Provided by or on behalf of the DoD to the DIB participant in 
connection with an official DoD activity; or
    (ii) Collected, developed, received, transmitted, used, or stored 
by the DIB participant in support of an official DoD activity; and
    (2) Is:
    (i) Controlled Technical Information means technical information 
with military or space application (see 10 U.S.C. 130(c)) that is 
subject to controls on the access, use, reproduction, modification, 
performance, display, release, disclosure, or dissemination. Controlled 
technical information is to be marked with one of the distribution 
statements B through F, in accordance with Department of Defense 
Instruction 5230.24, ``Distribution Statements of Technical 
Documents.'' The term does not include information that is lawfully 
publicly available without restrictions. ``Technical Information'' 
means technical data or computer software, as those terms are defined 
in Defense Federal Acquisition Regulation Supplement clause 252.227-
7013, ``Rights in Technical Data--Noncommercial Items'' (48 CFR 
252.227-7013). Examples of technical information include research and 
engineering data, engineering drawings, and associated lists, 
specifications, standards, process sheets, manuals, technical reports, 
technical orders, catalog-item identifications, data sets, studies and 
analyses and related information, and computer software executable code 
and source code;
    (ii) Information subject to export control under the International 
Traffic in Arms Regulations (ITAR) (https://pmddtc.state.gov/regulations_laws/itar_official.html), or the Export Administration 
Regulations (EAR). (15 CFR part 730);
    (iii) Information designated as Critical Program Information (CPI) 
in accordance with DoD Instruction 5200.39, ``Critical Program 
Information (CPI) Protection within the Department of Defense'';
    (iv) Critical Information (Operations Security) includes specific 
facts identified through the Operations Security process about friendly 
intentions, capabilities, and activities vitally needed by adversaries 
for them to plan and act effectively so as to guarantee failure or 
unacceptable consequences for friendly mission accomplishment (part of 
Operations Security process as described in 5205.02-M, ``DoD Operations 
Security (OPSEC Program Manual)'';
    (v) Personally Identifiable Information (PII) that can be used to 
distinguish or trace an individual's identity in accordance with DoD 
Directive 5400.11, ``DoD Privacy Program'';
    (vi) Information bearing current and prior designations indicating 
controlled unclassified information (e.g., For Official Use Only, 
Sensitive But Unclassified, and Limited Official Use, DoD Unclassified 
Controlled Nuclear Information, Sensitive Information) that has not 
been cleared for public release in accordance with DoD Directive 
5230.29, ``Clearance of DoD Information for Public Release'' (see also 
DoD 5200.01 M Volume 4, ``DoD Information Security Program: Controlled 
Unclassified Information (CUI)''), ; or
    (vii) Any other information that is exempt from mandatory public 
disclosure under DoD Directive 5400.07, ``DoD Freedom of Information 
Act (FOIA) Program'', and DoD Regulation 5400.7-R, ``DoD Freedom of 
Information Program''.
    (d) Covered DIB systems means an information system that is owned 
or operated by or for a DIB participant and that processes, stores, or 
transmits covered defense information.
    (e) Cyber incident means actions taken through the use of computer 
networks that result in an actual or potentially adverse effect on an 
information system and/or the information residing therein.
    (f) Cyber intrusion damage assessment means a managed, coordinated 
process to determine the effect on defense programs, defense scientific 
and research projects, or defense warfighting capabilities resulting 
from compromise of a DIB participant's unclassified computer system or 
network.
    (g) Defense Industrial Base (DIB) means the Department of Defense, 
Government, and private sector worldwide industrial complex with 
capabilities to perform research and development, design, produce, and 
maintain military weapon systems, subsystems, components, or parts to 
satisfy military requirements.
    (h) DIB participant means a DIB company that has met all of the 
eligibility requirements to participate in the voluntary DIB CS/IA 
information sharing program as set forth in this part (see Sec.  
236.7).
    (i) Government means the United States Government.
    (j) Government Furnished Information (GFI) means information 
provided by the Government under the voluntary DIB CS/IA program, 
including but not limited to cyber threat information and information 
assurance practices.
    (k) Information means any communication or representation of 
knowledge such as facts, data, or

[[Page 62436]]

opinions in any medium or form, including textual, numerical, graphic, 
cartographic, narrative, or audiovisual.
    (l) Information system means a discrete set of information 
resources organized for the collection, processing, maintenance, use, 
sharing, dissemination, or disposition of information.
    (m) Threat means any circumstance or event with the potential to 
adversely impact organization operations (including mission, functions, 
image, or reputation), organization assets, individuals, other 
organizations, or the Nation through an information system via 
unauthorized access, destruction, disclosure, modification of 
information and/or denial of service.
    (n) U.S. based means provisioned, maintained, or operated within 
the physical boundaries of the United States.
    (o) U.S. citizen means a person born in the United States or 
naturalized.


Sec.  236.3  Policy.

    It is DoD policy to:
    (a) Establish a comprehensive approach for enhancing and 
supplementing DIB information assurance capabilities to safeguard 
covered defense information on covered DIB systems.
    (b) Increase the Government and DIB situational awareness of the 
extent and severity of cyber threats to DoD information.


Sec.  236.4  Procedures.

    (a) The Government and each DIB participant will execute a 
voluntary standardized agreement, referred to as a Framework Agreement 
(FA), to share, in a timely and secure manner, on a recurring basis, 
and to the greatest extent possible, cyber security information 
relating to information assurance for covered defense information on 
covered DIB systems.
    (b) Each such FA between the Government and a DIB participant must 
comply with and implement the requirements of this part, and will 
include additional terms and conditions as necessary to effectively 
implement the voluntary information sharing activities described in 
this part with individual DIB participants.
    (c) DoD's DIB CS/IA Program Office is the overall point of contact 
for the program. The DoD Cyber Crime Center's DoD-DIB Collaborative 
Information Sharing Environment (DC3/DCISE) is the operational focal 
point for cyber threat information sharing and incident reporting under 
the DIB CS/IA program.
    (d) The Government will maintain a Web site or other Internet-based 
capability to provide potential DIB participants with information about 
eligibility and participation in the program, to enable the online 
application or registration for participation, and to support the 
execution of necessary agreements with the Government. https://dibnet.dod.mil/.
    (e) Prior to receiving GFI from the Government, each DIB 
participant shall provide the requisite points of contact information, 
to include security clearance and citizenship information, for the 
designated personnel within their company (e.g., typically 3-10 company 
designated points of contact) in order to facilitate the DoD-DIB 
interaction in the DIB CS/IA program. The Government will confirm the 
accuracy of the information provided as a condition of that point of 
contact being authorized to act on behalf of the DIB participant for 
this program.
    (f) GFI will be issued via both unclassified and classified means. 
DIB participant handling and safeguarding of classified information 
shall be in compliance with the National Industrial Security Program 
Operating Manual (NISPOM) (DoD 5220.22-M). The Government shall specify 
transmission and distribution procedures for all GFI, and shall inform 
DIB participants of any revisions to previously specified transmission 
or procedures.
    (g) Except as authorized in this part or in writing by the 
Government, DIB participants may use GFI to safeguard covered defense 
information only on covered DIB systems that are U.S. based; and share 
GFI only within their company or organization, on a need to know basis, 
with distribution restricted to U.S. citizens. However, in individual 
cases, upon request of a DIB participant that has determined that it 
requires the ability to share the information with a non U.S. citizen, 
or to use the GFI on a non-U.S. based covered DIB system, and can 
demonstrate that appropriate information handling and protection 
mechanisms are in place, the Government may authorize such disclosure 
or use under appropriate terms and conditions.
    (h) DIB participants shall maintain the capability to 
electronically disseminate GFI within the Company in an encrypted 
fashion (e.g., using Secure/Multipurpose Internet Mail Extensions (S/
MIME), secure socket layer (SSL), Transport Layer Security (TLS) 
protocol version 1.2, DoD-approved medium assurance certificates).
    (i) The DIB participants shall not share GFI outside of their 
company or organization, regardless of personnel clearance level, 
except as authorized in this part or otherwise authorized in writing by 
the Government.
    (j) If the DIB participant utilizes a third-party service provider 
(SP) for information system security services, the DIB participant may 
share GFI with that SP under the following conditions and as authorized 
in writing by the Government:
    (1) The DIB participant must identify the SP to the Government and 
request permission to share or disclose any GFI with that SP (which may 
include a request that the Government share information directly with 
the SP on behalf of the DIB participant) solely for the authorized 
purposes of this program;
    (2) The SP must provide the Government with sufficient information 
to enable the Government to determine whether the SP is eligible to 
receive such information, and possesses the capability to provide 
appropriate protections for the GFI;
    (3) Upon approval by the Government, the SP must enter into a 
legally binding agreement with the DIB participant (and also an 
appropriate agreement with the Government in any case in which the SP 
will receive or share information directly with the Government on 
behalf of the DIB participant) under which the SP is subject to all 
applicable requirements of this part and of any supplemental terms and 
conditions in the DIB participant's FA with the Government, and which 
authorizes the SP to use the GFI only as authorized by the Government.
    (k) The DIB participant may not sell, lease, license, or otherwise 
incorporate the GFI into its products or services, except that this 
does not prohibit a DIB participant from being appropriately designated 
an SP in accordance with paragraph (j) of this section.


Sec.  236.5  Cyber security information sharing.

    (a) GFI. The Government shall share GFI with DIB participants or 
designated SPs in accordance with this part.
    (b) Initial incident reporting. The DIB participant shall report to 
DC3/DCISE cyber incidents involving covered defense information on a 
covered DIB system. These initial reports will be provided within 72 
hours of discovery. DIB participants also may report other cyber 
incidents to the Government if the DIB participant determines the 
incident may be relevant to information assurance for covered defense 
information or covered DIB systems or other information assurance 
activities of the Government.
    (c) Follow-up reporting. After an initial incident report, the 
Government and the DIB participant may voluntarily

[[Page 62437]]

share additional information that is determined to be relevant to a 
reported incident, including information regarding forensic analyses, 
mitigation and remediation, and cyber intrusion damage assessments.
    (d) Cyber intrusion damage assessment. Following analysis of a 
cyber incident, DC3/DCISE may provide information relevant to the 
potential or known compromise of DoD acquisition program information to 
the Office of the Secretary of Defense's Damage Assessment Management 
Office (OSD DAMO) for a cyber intrusion damage assessment. The 
Government may provide DIB participants with information regarding the 
damage assessment.
    (e) DIB participant attribution information. The Government 
acknowledges that information shared by the DIB participants under this 
program may include extremely sensitive proprietary, commercial, or 
operational information that is not customarily shared outside of the 
company, and that the unauthorized use or disclosure of such 
information could cause substantial competitive harm to the DIB 
participant that reported that information. The Government shall take 
reasonable steps to protect against the unauthorized use or release of 
such information (e.g., attribution information and other nonpublic 
information) received from a DIB participant or derived from such 
information provided by a DIB participant, including applicable 
procedures (see Sec.  236.5(h)). The Government will restrict its 
internal use and disclosure of attribution information to only 
Government personnel and Government support contractors that are bound 
by appropriate confidentiality obligations and restrictions relating to 
the handling of this sensitive information and are engaged in lawfully 
authorized activities.
    (f) Non-attribution information. The Government may share non-
attribution information that was provided by a DIB participant (or 
derived from information provided by a DIB participant) with other DIB 
participants in the DIB CS/IA program, and may share such information 
throughout the Government (including with Government support 
contractors that are bound by appropriate confidentiality obligations) 
for cyber security and information assurance purposes for the 
protection of Government information or information systems.
    (g) Electronic media. Electronic media/files provided by DIB 
participants to DC3 under paragraphs (b), (c) and (d) of this section 
are maintained by the digital and multimedia forensics laboratory at 
DC3, which implements specialized handling procedures to maintain its 
accreditation as a digital and multimedia forensics laboratory. DC3 
will maintain, control, and dispose of all electronic media/files 
provided by DIB participants to DC3 in accordance with established DoD 
policies and procedures.
    (h) Freedom of Information Act (FOIA). Agency records, which may 
include qualifying information received from non-federal entities, are 
subject to request under the Freedom of Information Act (5 U.S.C. 552) 
(FOIA), which is implemented in the Department of Defense by DoD 
Directive 5400.07 and DoD Regulation 5400.7-R (see 32 CFR Parts 285 and 
286, respectively). Pursuant to established procedures and applicable 
regulations, the Government will protect sensitive nonpublic 
information under this Program against unauthorized public disclosure 
by asserting applicable FOIA exemptions, and will inform the non-
Government source or submitter (e.g., DIB participants) of any such 
information that may be subject to release in response to a FOIA 
request, to permit the source or submitter to support the withholding 
of such information or pursue any other available legal remedies.


Sec.  236.6  General provisions.

    (a) Confidentiality of information that is exchanged under this 
program will be protected to the maximum extent authorized by law, 
regulation, and policy.
    (b) The Government and DIB participants will conduct their 
respective activities under this program in accordance with applicable 
laws and regulations, including restrictions on the interception, 
monitoring, access, use, and disclosure of electronic communications or 
data. The Government and the DIB participant each bear responsibility 
for their own actions under this program.
    (c) Prior to sharing any information with the Government under this 
program pursuant to the FA, the DIB participant shall perform a legal 
review of its policies and practices that support its activities under 
this program, and shall make a determination that such policies, 
practices, and activities comply with applicable legal requirements.
    (d) This voluntary DIB CS/IA program is intended to safeguard 
covered defense information. None of the restrictions on the 
Government's use or sharing of information under the DIB CS/IA program 
shall limit the Government's ability to conduct law enforcement, 
counterintelligence activities, or other activities in the interest of 
national security; and participation does not supersede other 
regulatory or statutory requirements.
    (e) Participation in the DIB CS/IA program is voluntary and does 
not obligate the DIB participant to utilize the GFI in, or otherwise to 
implement any changes to, its information systems. Any action taken by 
the DIB participant based on the GFI or other participation in this 
program is taken on the DIB participant's own volition and at its own 
risk and expense.
    (f) A DIB participant's voluntary participation in this program is 
not intended to create any unfair competitive advantage or disadvantage 
in DoD source selections or competitions, or to provide any other form 
of unfair preferential treatment, and shall not in any way be 
represented or interpreted as a Government endorsement or approval of 
the DIB participant, its information systems, or its products or 
services.
    (g) The DIB participant and the Government may each unilaterally 
limit or discontinue participation in this program at any time. 
Termination shall not relieve the DIB participant or the Government 
from obligations to continue to protect against the unauthorized use or 
disclosure of GFI, attribution information, contractor proprietary 
information, third-party proprietary information, or any other 
information exchanged under this program, as required by law, 
regulation, contract, or the FA.
    (h) Upon termination of the FA, and/or change of Facility Security 
Clearance status below Secret, GFI must be returned to the Government 
or destroyed pursuant to direction of, and at the discretion of, the 
Government.
    (i) Participation in this program does not abrogate the 
Government's or the DIB participants' rights or obligations regarding 
the handling, safeguarding, sharing, or reporting of information, or 
regarding any physical, personnel, or other security requirements, as 
required by law, regulation, policy, or a valid legal contractual 
obligation.


Sec.  236.7  DIB participant eligibility requirements.

    To be eligible to participate in this program, a DIB company must:
    (a) Have or acquire DoD-approved medium assurance certificates to 
enable encrypted unclassified information sharing between the 
Government and DIB participants;

[[Page 62438]]

    (b) Have an existing active Facility Security Clearance (FCL) 
granted under the National Industrial Security Program Operating Manual 
(NISPOM) (DoD 5220.22-M) with approved safeguarding for at least Secret 
information, and continue to qualify under the NISPOM for retention of 
its FCL and approved safeguarding (https://www.dtic.mil/whs/directives/corres/pdf/522022m.pdf);
    (c) Have or acquire a Communication Security (COMSEC) account in 
accordance with the NISPOM Chapter 9, Section 4 (DoD 5220.22-M), which 
provides procedures and requirements for COMSEC activities;
    (d) Obtain access to DoD's secure voice and data transmission 
systems supporting the DIB CS/IA program,
    (e) Own or operate covered DIB system(s), and
    (f) Execute the standardized FA with the Government (available 
during the application process), which implements the requirements set 
forth in Sec. Sec.  236.4 through 236.6.

    Dated: September 30, 2013.
Patricia L. Toppings,
OSD Federal Register Liaison Officer, Department of Defense.
[FR Doc. 2013-24256 Filed 10-21-13; 8:45 am]
BILLING CODE 5001-06-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.