Request for Comments on the Preliminary Cybersecurity Framework, 64478-64480 [2013-25566]
Download as PDF
mstockstill on DSK4VPTVN1PROD with NOTICES
64478
Federal Register / Vol. 78, No. 209 / Tuesday, October 29, 2013 / Notices
convenience and customs purposes, the
written description of the scope is
dispositive. Specifically not included
within the scope of this investigation is
American Water Works Association
(AWWA) specification water and
sewage pipe and the following size/
grade combinations; of line pipe:
Having an outside diameter greater
than or equal to 18 inches and less than
or equal to 22 inches, with a wall
thickness measuring 0.750 inch or
greater, regardless of grade.
Having an outside diameter greater
than or equal to 24 inches and less than
30 inches, with wall thickness
measuring greater than 0.875 inches in
grades A, B, and X42, with wall
thickness measuring greater than 0.750
inches in grades X52 through X56, and
with wall thickness measuring greater
than 0.688 inches in grades X60 or
greater.
Having an outside diameter greater
than or equal to 30 inches and less than
36 inches, with wall thickness
measuring greater than 1.250 inches in
grades A, B, and X42, with wall
thickness measuring greater than 1.000
inches in grades X52 through X56, and
with wall thickness measuring greater
than 0.875 inches in grades X60 or
greater.
Having an outside diameter greater
than or equal to 36 inches and less than
42 inches, with wall thickness
measuring greater than 1.375 inches in
grades A, B, and X42, with wall
thickness measuring greater than 1.250
inches in grades X52 through X56, and
with wall thickness measuring greater
than 1.125 inches in grades X60 or
greater.
Having an outside diameter greater
than or equal to 42 inches and less than
64 inches, with a wall thickness
measuring greater than 1.500 inches in
grades A, B, and X42, with wall
thickness measuring greater than 1.375
inches in grades X52 through X56, and
with wall thickness measuring greater
than 1.250 inches in grades X60 or
greater.
Having an outside diameter equal to
48 inches, with a wall thickness
measuring 1.0 inch or greater, in grades
X–80 or greater.
In API grades X80 or above, having an
outside diameter of 48 inches to and
including 52 inches, and with a wall
thickness of 0.90 inch or more.
In API grades X100 or above, having
an outside diameter of 48 inches to and
including 52 inches, and with a wall
thickness of 0.54 inch or more.
An API grade X–80 having an outside
diameter of 21 inches and wall
thickness of 0.625 inch or more.
VerDate Mar<15>2010
18:15 Oct 28, 2013
Jkt 232001
Continuation of the Order
As a result of the determinations by
the Department and the USITC that
revocation of the antidumping duty
order on LDLP from Japan would be
likely to lead to continuation or
recurrence of dumping and material
injury to an industry in the United
States, pursuant to section 751(d)(2) of
the Act, the Department hereby orders
the continuation of the antidumping
duty order on LDLP from Japan.
U.S. Customs and Border Protection
will continue to collect antidumping
duty cash deposits at the rates in effect
at the time of entry for all imports of
subject merchandise. The effective date
of the continuation of this order will be
the date of publication in the Federal
Register of this notice of continuation.
Pursuant to section 751(c)(2) of the Act,
the Department intends to initiate the
next sunset review of this order not later
than 30 days prior to the fifth
anniversary of the effective date of
continuation.
This five-year (sunset) review and this
notice are in accordance with section
751(c) of the Act and published
pursuant to section 777(i)(1) of the Act.
Dated: October 23, 2013.
Paul Piquado,
Assistant Secretary for Enforcement and
Compliance.
[FR Doc. 2013–25607 Filed 10–28–13; 8:45 am]
BILLING CODE 3510–DS–P
DEPARTMENT OF COMMERCE
National Institute of Standards and
Technology
[Docket No.: 130909789–3789–01]
Request for Comments on the
Preliminary Cybersecurity Framework
National Institute of Standards
and Technology (NIST), Department of
Commerce.
ACTION: Notice; request for comments.
AGENCY:
The National Institute of
Standards and Technology (NIST) seeks
comments on the preliminary version of
the Cybersecurity Framework
(‘‘preliminary Framework’’). The
preliminary Framework was developed
by NIST using information collected
through the Request for Information
(RFI) that was published in the Federal
Register on February 26, 2013, and a
series of open public workshops. The
preliminary Framework was developed
in response to NIST responsibilities
directed in Executive Order 13636,
‘‘Improving Critical Infrastructure
Cybersecurity’’ (‘‘Executive Order’’).
SUMMARY:
PO 00000
Frm 00012
Fmt 4703
Sfmt 4703
Under the Executive Order, the
Secretary of Commerce is tasked to
direct the Director of NIST to lead the
development of a framework to reduce
cyber risks to critical infrastructure (the
‘‘Cybersecurity Framework’’ or
‘‘Framework’’). The Framework will
consist of standards, methodologies,
procedures and processes that align
policy, business, and technological
approaches to address cyber risks. The
preliminary Framework is available
electronically from the NIST Web site
at: https://www.nist.gov/itl/
cyberframework.cfm.
DATES: Comments must be received by
5:00 p.m. Eastern Time December 13,
2013.
ADDRESSES: Both written and electronic
comments should be submitted using
the comment template form available
electronically from the NIST Web site
at: https://www.nist.gov/itl/
cyberframework.cfm. Written comments
concerning the preliminary Framework
may be sent to: Information Technology
Laboratory, ATTN: Adam Sedgewick,
National Institute of Standards and
Technology, 100 Bureau Drive, Stop
8930, Gaithersburg, MD 20899–8930.
Electronic comments concerning the
preliminary Framework should be
submitted in Microsoft Word or Excel
formats to: csfcomments@nist.gov, with
the Subject line: Preliminary
Cybersecurity Framework Comments.
The preliminary Cybersecurity
Framework is available electronically
from the NIST Web site at: https://
www.nist.gov/itl/cyberframework.cfm.
FOR FURTHER INFORMATION CONTACT:
Diane Honeycutt, telephone: 301–975–
8443, National Institute of Standards
and Technology, 100 Bureau Drive, Stop
8930, Gaithersburg, MD 20899–8930 or
via email: dhoneycutt@nist.gov. Please
direct media inquiries to NIST’s Public
Affairs Office at (301) 975–NIST.
SUPPLEMENTARY INFORMATION: The
national and economic security of the
United States depends on the reliable
functioning of critical infrastructure,1
which has become increasingly
dependent on information technology.
Recent trends demonstrate the need for
improved capabilities for defending
against malicious cyber activity. Such
activity is increasing, and its
consequences can range from theft
through disruption to destruction. Steps
1 For the purposes of this notice the term ‘‘critical
infrastructure’’ has the meaning given the term in
42 U.S.C 5195c(e), ‘‘systems and assets, whether
physical or virtual, so vital to the United States that
the incapacity or destruction of such systems and
assets would have a debilitating impact on security,
national economic security, national public health
or safety, or any combination of those matters.’’
E:\FR\FM\29OCN1.SGM
29OCN1
mstockstill on DSK4VPTVN1PROD with NOTICES
Federal Register / Vol. 78, No. 209 / Tuesday, October 29, 2013 / Notices
must be taken to enhance existing
efforts to increase the protection and
resilience of this infrastructure, while
maintaining a cyber environment that
encourages efficiency, innovation, and
economic prosperity, while protecting
privacy and civil liberties.
Under the Executive Order,2 the
Secretary of Commerce is tasked to
direct the Director of NIST to lead the
development of a framework to reduce
cyber risks to critical infrastructure (the
‘‘Cybersecurity Framework’’ or
‘‘Framework’’). The Cybersecurity
Framework will consist of standards,
methodologies, procedures and
processes that align policy, business,
and technological approaches to address
cyber risks. Given the diversity of
sectors in critical infrastructure, the
Framework development process was
designed to initially identify crosssector security standards and guidelines
that are immediately applicable or likely
to be applicable to critical
infrastructure, to increase visibility and
adoption of those standards and
guidelines, and to find potential areas
for improvement (i.e., where standards/
guidelines are nonexistent or where
existing standards/guidelines are
inadequate) that need to be addressed
through future collaboration with
industry and industry-led standards
bodies. The Cybersecurity Framework
will incorporate voluntary consensus
standards and industry best practices to
the fullest extent possible and will be
consistent with voluntary international
consensus-based standards when such
international standards advance the
objectives of the Executive Order. The
Cybersecurity Framework will be
designed for compatibility with existing
regulatory authorities and regulations.
The Cybersecurity Framework will
provide a prioritized, flexible,
repeatable, performance-based, and
cost-effective approach, including
information security measures and
controls to help owners and operators of
critical infrastructure and other
interested entities to identify, assess,
and manage cybersecurity-related risk
while protecting business
confidentiality, individual privacy and
civil liberties. To enable technical
innovation and account for
organizational differences, the
Cybersecurity Framework will not
prescribe particular technological
solutions or specifications. It will
include guidance for measuring the
performance of an entity in
implementing the Cybersecurity
2 Exec. Order No. 13636, Improving Critical
Infrastructure Cybersecurity, 78 FR 11739 (February
19, 2013).
VerDate Mar<15>2010
18:15 Oct 28, 2013
Jkt 232001
Framework and will include
methodologies to identify and mitigate
impacts of the Framework and
associated information security
measures and controls on business
confidentiality and to protect individual
privacy and civil liberties.
As a non-regulatory Federal agency,
NIST developed the preliminary
Framework in a manner that is
consistent with its mission to promote
U.S. innovation and industrial
competitiveness through the
development of standards and
guidelines in consultation with
stakeholders in both government and
industry. The preliminary Framework
seeks to provide owners and operators
of critical infrastructure the ability to
implement security practices in the
most effective manner while allowing
organizations to express requirements to
multiple authorities and regulators.
Issues relating to harmonization of
existing relevant standards and
integration with existing frameworks
were also considered. While the focus is
on the Nation’s critical infrastructure,
the preliminary Framework was
developed in a manner to promote wide
adoption of practices to increase
cybersecurity across all sectors and
industry types.
The preliminary Framework was
developed through an open public
review and comment process that
included information collected through
Request for Information (RFI), 78 FR
13024 (February 26, 2013), and a series
of public workshops. Comments
received in response to the RFI are
available at https://csrc.nist.gov/
cyberframework/rfi_comments.html.
NIST held four open public
workshops to provide the public with
additional opportunities to provide
input. The first workshop was
conducted on April 3, 2013, at the
Department of Commerce in
Washington, DC The second workshop
was conducted on May 29–31, 2013, at
Carnegie Mellon University in
Pittsburgh, Pennsylvania. The third
workshop was conducted on July 10–12,
2013, at the University of California,
San Diego. The fourth workshop was
conducted on September 11–13, 2013, at
the University of Texas at Dallas.
Agenda, discussion materials, and
presentation slides for each of these
workshops are available at https://
www.nist.gov/itl/cyberframework.cfm.
Throughout the process, NIST issued
public updates on the development of
the Cybersecurity Framework. NIST
issued the first update on June 18, 2013,
and it is available at https://
www.nist.gov/itl/upload/nist_
cybersecurity_framework_
PO 00000
Frm 00013
Fmt 4703
Sfmt 4703
64479
update_061813.pdf. NIST issued the
second update on July 24, 2013, and it
is available at https://www.nist.gov/itl/
upload/NIST-Cybersecurity-FrameworkUpdate-072413.pdf.
The preliminary Framework
incorporates existing consensus-based
standards to the fullest extent possible,
consistent with requirements of the
National Technology Transfer and
Advancement Act of 1995,3 and
guidance provided by Office of
Management and Budget Circular A–
119, ‘‘Federal Participation in the
Development and Use of Voluntary
Consensus Standards and in Conformity
Assessment Activities.’’ 4 Principles
articulated in the Executive Office of the
President memorandum M–12–08
‘‘Principles for Federal Engagement in
Standards Activities to Address
National Priorities’’ 5 are followed. The
preliminary Framework is also
consistent with, and supported by the
broad policy goals of, the
Administration’s 2010 ‘‘National
Security Strategy,’’ 6 2011 ‘‘Cyberspace
Policy Review,’’ 7 ‘‘International
Strategy for Cyberspace’’ 8 of May 2011
and HSPD–7 ‘‘Critical Infrastructure
Identification, Prioritization, and
Protection.’’ 9
Request for Comments:
NIST seeks public comments on the
preliminary Cybersecurity Framework.
The draft report is available
electronically from the NIST Web site
at: https://www.nist.gov/itl/
cyberframework.cfm. The comment
templates are available at the same
address, and are required for both
written and electronic comments.
Interested parties should submit
comments in accordance with the DATES
and ADDRESSES sections of this notice.
All comments will be posted at https://
csrc.nist.gov/cyberframework/
preliminary_framework_comments.html
without change or redaction, so
commenters should not include
information they do not wish to be
posted (e.g., personal or business
information).
3 Public Law 104–113 (1996), codified in relevant
part at 15 U.S.C. 272(b).
4 https://www.whitehouse.gov/omb/circulars_a119.
5 https://www.whitehouse.gov/sites/default/files/
omb/memoranda/2012/m-12-08.pdf.
6 https://www.whitehouse.gov/sites/default/files/
rss_viewer/national_security_strategy.pdf.
7 https://www.whitehouse.gov/assets/documents/
Cyberspace_Policy_Review_final.pdf.
8 https://www.whitehouse.gov/sites/default/files/
rss_viewer/international_strategy_
for_cyberspace.pdf.
9 https://www.whitehouse.gov/sites/default/files/
omb/memoranda/fy04/m-04-15.pdf.
E:\FR\FM\29OCN1.SGM
29OCN1
64480
Federal Register / Vol. 78, No. 209 / Tuesday, October 29, 2013 / Notices
Dated: October 23, 2013.
Patrick Gallagher,
Under Secretary of Commerce for Standards
and Technology.
[FR Doc. 2013–25566 Filed 10–28–13; 8:45 am]
BILLING CODE 3510–13–P
Fishery Management Council has been
notified of the results of SAW 55 and
has taken action to end overfishing and
rebuild these two stocks through
Framework 48.
Dated: October 18, 2013.
Emily H. Menashes,
Deputy Director, Office of Sustainable
Fisheries, National Marine Fisheries Service.
DEPARTMENT OF COMMERCE
[FR Doc. 2013–25605 Filed 10–28–13; 8:45 am]
National Oceanic and Atmospheric
Administration
BILLING CODE 3510–22–P
RIN 0648–XC866
DEPARTMENT OF COMMERCE
Fisheries of the Northeast Region
National Marine Fisheries
Service (NMFS), National Oceanic and
Atmospheric Administration (NOAA),
Commerce.
ACTION: Notification of a determination
of overfishing or an overfished
condition.
AGENCY:
This action serves as a notice
that NMFS, on behalf of the Secretary of
Commerce (Secretary), has determined
that Georges Bank (GB) cod and Gulf of
Maine (GOM) cod are subject to
overfishing and continue to be in an
overfished condition.
NMFS, on behalf of the Secretary,
notifies the appropriate fishery
management council (Council)
whenever it determines that overfishing
is occurring, a stock is in an overfished
condition, a stock is approaching an
overfished condition, or when a
rebuilding plan has not resulted in
adequate progress toward ending
overfishing and rebuilding affected fish
stocks.
FOR FURTHER INFORMATION CONTACT:
Mark Nelson, (301) 427–8565.
SUPPLEMENTARY INFORMATION: Pursuant
to sections 304(e)(2) and (e)(7) of the
Magnuson-Stevens Fishery
Conservation and Management Act
(Magnuson-Stevens Act), 16 U.S.C.
1854(e)(2) and (e)(7), and implementing
regulations at 50 CFR 600.310(e)(2),
NMFS, on behalf of the Secretary, must
notify Councils whenever it determines
that a stock or stock complex is:
overfished; approaching an overfished
condition; or an existing rebuilding plan
has not ended overfishing or resulted in
adequate rebuilding progress. NMFS
also notifies Councils when it
determines a stock or stock complex is
subject to overfishing. Section 304(e)(2)
further requires NMFS to publish these
notices in the Federal Register.
The 2013 Stock Assessment
Workshop (SAW) 55, showed that
overfishing was occurring on both
Georges Bank cod and Gulf of Maine
cod, and that both stocks remain in an
overfished condition. The New England
mstockstill on DSK4VPTVN1PROD with NOTICES
SUMMARY:
VerDate Mar<15>2010
18:15 Oct 28, 2013
Jkt 232001
National Oceanic and Atmospheric
Administration
RIN 0648–XC938
New England Fishery Management
Council (NEFMC); Public Meeting
National Marine Fisheries
Service (NMFS), National Oceanic and
Atmospheric Administration (NOAA),
Commerce.
ACTION: Notice; public meeting.
AGENCY:
The New England Fishery
Management Council (Council) is
scheduling a public meeting of its
Scientific and Statistical Committee
(SSC) on November 15, 2013 to consider
actions affecting New England fisheries
in the exclusive economic zone (EEZ).
Recommendations from this group will
be brought to the full Council for formal
consideration and action, if appropriate.
DATES: This meeting will be held on
Friday, November 15, 2013 at 8:30 a.m.
ADDRESSES: Meeting address: The
meeting will be held at the Omni Hotel,
1 West Exchange Street, Providence, RI
02903; telephone: (401) 598–8000; fax:
(401) 598–8200.
Council address: New England
Fishery Management Council, 50 Water
Street, Mill 2, Newburyport, MA 01950.
FOR FURTHER INFORMATION CONTACT:
Thomas A. Nies, Executive Director,
New England Fishery Management
Council; telephone: (978) 465–0492.
SUPPLEMENTARY INFORMATION: The
NEFMC’s Scientific and Statistical
Committee (SSC) will meet to specify
overfishing levels (OFLs) and develop
Acceptable Biological Catch (ABC)
recommendations for Atlantic sea
scallops for fishing years 2014 and 2015
(default) and for the Northeast Skate
Complex for fishing years 2014 through
2016. The Committee will consider
information provided to it by the
Council’s Scallop Plan Development
Team (PDT) and by the Skate PDT. The
Committee will also review the 2012
update assessment for Gulf of Maine
(GOM) haddock and the work of the
SUMMARY:
PO 00000
Frm 00014
Fmt 4703
Sfmt 4703
Groundfish PDT in order to reconsider
ABC and OFL for GOM haddock for
fishing years 2013–15.
Although non-emergency issues not
contained in this agenda may come
before this group for discussion, those
issues may not be the subject of formal
action during this meeting. Action will
be restricted to those issues specifically
listed in this notice and any issues
arising after publication of this notice
that require emergency action under
section 305(c) of the Magnuson-Stevens
Act, provided the public has been
notified of the Council’s intent to take
final action to address the emergency.
Special Accommodations
This meeting is physically accessible
to people with disabilities. Requests for
sign language interpretation or other
auxiliary aids should be directed to
Thomas A. Nies, Executive Director, at
(978) 465–0492, at least 5 days prior to
the meeting date.
Authority: 16 U.S.C. 1801 et seq.
Dated: October 24, 2013.
Tracey L. Thompson,
Acting Deputy Director, Office of Sustainable
Fisheries, National Marine Fisheries Service.
[FR Doc. 2013–25569 Filed 10–28–13; 8:45 am]
BILLING CODE 3510–22–P
DEPARTMENT OF COMMERCE
National Oceanic and Atmospheric
Administration
RIN 0648–XC939
New England Fishery Management
Council; Public Meeting
National Marine Fisheries
Service (NMFS), National Oceanic and
Atmospheric Administration (NOAA),
Commerce.
ACTION: Notice; public meeting.
AGENCY:
The New England Fishery
Management Council (Council) is
scheduling a public meeting of its
Scallop Committee on November 14,
2013 to consider actions affecting New
England fisheries in the exclusive
economic zone (EEZ).
Recommendations from this group will
be brought to the full Council for formal
consideration and action, if appropriate.
DATES: This meeting will be held on
Thursday, November 14, 2013 at 9 a.m.
ADDRESSES: Meeting address: The
meeting will be held at the Omni
Providence Hotel, 1 West Exchange
Street, Providence, RI 02048; telephone:
(401) 598–8000; fax: (401) 598–8200.
SUMMARY:
E:\FR\FM\29OCN1.SGM
29OCN1
Agencies
[Federal Register Volume 78, Number 209 (Tuesday, October 29, 2013)]
[Notices]
[Pages 64478-64480]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2013-25566]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
National Institute of Standards and Technology
[Docket No.: 130909789-3789-01]
Request for Comments on the Preliminary Cybersecurity Framework
AGENCY: National Institute of Standards and Technology (NIST),
Department of Commerce.
ACTION: Notice; request for comments.
-----------------------------------------------------------------------
SUMMARY: The National Institute of Standards and Technology (NIST)
seeks comments on the preliminary version of the Cybersecurity
Framework (``preliminary Framework''). The preliminary Framework was
developed by NIST using information collected through the Request for
Information (RFI) that was published in the Federal Register on
February 26, 2013, and a series of open public workshops. The
preliminary Framework was developed in response to NIST
responsibilities directed in Executive Order 13636, ``Improving
Critical Infrastructure Cybersecurity'' (``Executive Order''). Under
the Executive Order, the Secretary of Commerce is tasked to direct the
Director of NIST to lead the development of a framework to reduce cyber
risks to critical infrastructure (the ``Cybersecurity Framework'' or
``Framework''). The Framework will consist of standards, methodologies,
procedures and processes that align policy, business, and technological
approaches to address cyber risks. The preliminary Framework is
available electronically from the NIST Web site at: https://www.nist.gov/itl/cyberframework.cfm.
DATES: Comments must be received by 5:00 p.m. Eastern Time December 13,
2013.
ADDRESSES: Both written and electronic comments should be submitted
using the comment template form available electronically from the NIST
Web site at: https://www.nist.gov/itl/cyberframework.cfm. Written
comments concerning the preliminary Framework may be sent to:
Information Technology Laboratory, ATTN: Adam Sedgewick, National
Institute of Standards and Technology, 100 Bureau Drive, Stop 8930,
Gaithersburg, MD 20899-8930. Electronic comments concerning the
preliminary Framework should be submitted in Microsoft Word or Excel
formats to: csfcomments@nist.gov, with the Subject line: Preliminary
Cybersecurity Framework Comments.
The preliminary Cybersecurity Framework is available electronically
from the NIST Web site at: https://www.nist.gov/itl/cyberframework.cfm.
FOR FURTHER INFORMATION CONTACT: Diane Honeycutt, telephone: 301-975-
8443, National Institute of Standards and Technology, 100 Bureau Drive,
Stop 8930, Gaithersburg, MD 20899-8930 or via email:
dhoneycutt@nist.gov. Please direct media inquiries to NIST's Public
Affairs Office at (301) 975-NIST.
SUPPLEMENTARY INFORMATION: The national and economic security of the
United States depends on the reliable functioning of critical
infrastructure,\1\ which has become increasingly dependent on
information technology. Recent trends demonstrate the need for improved
capabilities for defending against malicious cyber activity. Such
activity is increasing, and its consequences can range from theft
through disruption to destruction. Steps
[[Page 64479]]
must be taken to enhance existing efforts to increase the protection
and resilience of this infrastructure, while maintaining a cyber
environment that encourages efficiency, innovation, and economic
prosperity, while protecting privacy and civil liberties.
---------------------------------------------------------------------------
\1\ For the purposes of this notice the term ``critical
infrastructure'' has the meaning given the term in 42 U.S.C
5195c(e), ``systems and assets, whether physical or virtual, so
vital to the United States that the incapacity or destruction of
such systems and assets would have a debilitating impact on
security, national economic security, national public health or
safety, or any combination of those matters.''
---------------------------------------------------------------------------
Under the Executive Order,\2\ the Secretary of Commerce is tasked
to direct the Director of NIST to lead the development of a framework
to reduce cyber risks to critical infrastructure (the ``Cybersecurity
Framework'' or ``Framework''). The Cybersecurity Framework will consist
of standards, methodologies, procedures and processes that align
policy, business, and technological approaches to address cyber risks.
Given the diversity of sectors in critical infrastructure, the
Framework development process was designed to initially identify cross-
sector security standards and guidelines that are immediately
applicable or likely to be applicable to critical infrastructure, to
increase visibility and adoption of those standards and guidelines, and
to find potential areas for improvement (i.e., where standards/
guidelines are nonexistent or where existing standards/guidelines are
inadequate) that need to be addressed through future collaboration with
industry and industry-led standards bodies. The Cybersecurity Framework
will incorporate voluntary consensus standards and industry best
practices to the fullest extent possible and will be consistent with
voluntary international consensus-based standards when such
international standards advance the objectives of the Executive Order.
The Cybersecurity Framework will be designed for compatibility with
existing regulatory authorities and regulations.
---------------------------------------------------------------------------
\2\ Exec. Order No. 13636, Improving Critical Infrastructure
Cybersecurity, 78 FR 11739 (February 19, 2013).
---------------------------------------------------------------------------
The Cybersecurity Framework will provide a prioritized, flexible,
repeatable, performance-based, and cost-effective approach, including
information security measures and controls to help owners and operators
of critical infrastructure and other interested entities to identify,
assess, and manage cybersecurity-related risk while protecting business
confidentiality, individual privacy and civil liberties. To enable
technical innovation and account for organizational differences, the
Cybersecurity Framework will not prescribe particular technological
solutions or specifications. It will include guidance for measuring the
performance of an entity in implementing the Cybersecurity Framework
and will include methodologies to identify and mitigate impacts of the
Framework and associated information security measures and controls on
business confidentiality and to protect individual privacy and civil
liberties.
As a non-regulatory Federal agency, NIST developed the preliminary
Framework in a manner that is consistent with its mission to promote
U.S. innovation and industrial competitiveness through the development
of standards and guidelines in consultation with stakeholders in both
government and industry. The preliminary Framework seeks to provide
owners and operators of critical infrastructure the ability to
implement security practices in the most effective manner while
allowing organizations to express requirements to multiple authorities
and regulators. Issues relating to harmonization of existing relevant
standards and integration with existing frameworks were also
considered. While the focus is on the Nation's critical infrastructure,
the preliminary Framework was developed in a manner to promote wide
adoption of practices to increase cybersecurity across all sectors and
industry types.
The preliminary Framework was developed through an open public
review and comment process that included information collected through
Request for Information (RFI), 78 FR 13024 (February 26, 2013), and a
series of public workshops. Comments received in response to the RFI
are available at https://csrc.nist.gov/cyberframework/rfi_comments.html.
NIST held four open public workshops to provide the public with
additional opportunities to provide input. The first workshop was
conducted on April 3, 2013, at the Department of Commerce in
Washington, DC The second workshop was conducted on May 29-31, 2013, at
Carnegie Mellon University in Pittsburgh, Pennsylvania. The third
workshop was conducted on July 10-12, 2013, at the University of
California, San Diego. The fourth workshop was conducted on September
11-13, 2013, at the University of Texas at Dallas. Agenda, discussion
materials, and presentation slides for each of these workshops are
available at https://www.nist.gov/itl/cyberframework.cfm.
Throughout the process, NIST issued public updates on the
development of the Cybersecurity Framework. NIST issued the first
update on June 18, 2013, and it is available at https://www.nist.gov/itl/upload/nist_cybersecurity_framework_update_061813.pdf. NIST
issued the second update on July 24, 2013, and it is available at
https://www.nist.gov/itl/upload/NIST-Cybersecurity-Framework-Update-072413.pdf.
The preliminary Framework incorporates existing consensus-based
standards to the fullest extent possible, consistent with requirements
of the National Technology Transfer and Advancement Act of 1995,\3\ and
guidance provided by Office of Management and Budget Circular A-119,
``Federal Participation in the Development and Use of Voluntary
Consensus Standards and in Conformity Assessment Activities.'' \4\
Principles articulated in the Executive Office of the President
memorandum M-12-08 ``Principles for Federal Engagement in Standards
Activities to Address National Priorities'' \5\ are followed. The
preliminary Framework is also consistent with, and supported by the
broad policy goals of, the Administration's 2010 ``National Security
Strategy,'' \6\ 2011 ``Cyberspace Policy Review,'' \7\ ``International
Strategy for Cyberspace'' \8\ of May 2011 and HSPD-7 ``Critical
Infrastructure Identification, Prioritization, and Protection.'' \9\
---------------------------------------------------------------------------
\3\ Public Law 104-113 (1996), codified in relevant part at 15
U.S.C. 272(b).
\4\ https://www.whitehouse.gov/omb/circulars_a119.
\5\ https://www.whitehouse.gov/sites/default/files/omb/memoranda/2012/m-12-08.pdf.
\6\ https://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf.
\7\ https://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf.
\8\ https://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.
\9\ https://www.whitehouse.gov/sites/default/files/omb/memoranda/fy04/m-04-15.pdf.
---------------------------------------------------------------------------
Request for Comments:
NIST seeks public comments on the preliminary Cybersecurity
Framework. The draft report is available electronically from the NIST
Web site at: https://www.nist.gov/itl/cyberframework.cfm. The comment
templates are available at the same address, and are required for both
written and electronic comments. Interested parties should submit
comments in accordance with the DATES and ADDRESSES sections of this
notice. All comments will be posted at https://csrc.nist.gov/cyberframework/preliminary_framework_comments.html without change or
redaction, so commenters should not include information they do not
wish to be posted (e.g., personal or business information).
[[Page 64480]]
Dated: October 23, 2013.
Patrick Gallagher,
Under Secretary of Commerce for Standards and Technology.
[FR Doc. 2013-25566 Filed 10-28-13; 8:45 am]
BILLING CODE 3510-13-P