Taking Additional Steps To Address the National Emergency With Respect to Significant Malicious Cyber- Enabled Activities, 6837-6842 [2021-01714]

Download as PDF Federal Register / Vol. 86, No. 14 / Monday, January 25, 2021 / Presidential Documents 6837 Presidential Documents Executive Order 13984 of January 19, 2021 Taking Additional Steps To Address the National Emergency With Respect to Significant Malicious Cyber-Enabled Activities By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.) (NEA), and section 301 of title 3, United States Code: I, DONALD J. TRUMP, President of the United States of America, find that additional steps must be taken to deal with the national emergency related to significant malicious cyber-enabled activities declared in Executive Order 13694 of April 1, 2015 (Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities), as amended, to address the use of United States Infrastructure as a Service (IaaS) products by foreign malicious cyber actors. IaaS products provide persons the ability to run software and store data on servers offered for rent or lease without responsibility for the maintenance and operating costs of those servers. Foreign malicious cyber actors aim to harm the United States economy through the theft of intellectual property and sensitive data and to threaten national security by targeting United States critical infrastructure for malicious cyber-enabled activities. Foreign actors use United States IaaS products for a variety of tasks in carrying out malicious cyber-enabled activities, which makes it extremely difficult for United States officials to track and obtain information through legal process before these foreign actors transition to replacement infrastructure and destroy evidence of their prior activities; foreign resellers of United States IaaS products make it easier for foreign actors to access these products and evade detection. This order provides authority to impose record-keeping obligations with respect to foreign transactions. To address these threats, to deter foreign malicious cyber actors’ use of United States IaaS products, and to assist in the investigation of transactions involving foreign malicious cyber actors, the United States must ensure that providers offering United States IaaS products verify the identity of persons obtaining an IaaS account (‘‘Account’’) for the provision of these products and maintain records of those transactions. In appropriate circumstances, to further protect against malicious cyber-enabled activities, the United States must also limit certain foreign actors’ access to United States IaaS products. Further, the United States must encourage more robust cooperation among United States IaaS providers, including by increasing voluntary information sharing, to bolster efforts to thwart the actions of foreign malicious cyber actors. jbell on DSKJLSW7X2PROD with EXECORD2 Accordingly, I hereby order: Section 1. Verification of Identity. Within 180 days of the date of this order, the Secretary of Commerce (Secretary) shall propose for notice and comment regulations that require United States IaaS providers to verify the identity of a foreign person that obtains an Account. These regulations shall, at a minimum: (a) set forth the minimum standards that United States IaaS providers must adopt to verify the identity of a foreign person in connection with the opening of an Account or the maintenance of an existing Account, including: VerDate Sep<11>2014 17:24 Jan 22, 2021 Jkt 253001 PO 00000 Frm 00001 Fmt 4790 Sfmt 4790 E:\FR\FM\25JAE2.SGM 25JAE2 6838 Federal Register / Vol. 86, No. 14 / Monday, January 25, 2021 / Presidential Documents (i) the types of documentation and procedures required to verify the identity of any foreign person acting as a lessee or sub-lessee of these products or services; (ii) records that United States IaaS providers must securely maintain regarding a foreign person that obtains an Account, including information establishing: (A) the identity of such foreign person and the person’s information, including name, national identification number, and address; (B) means and source of payment (including any associated financial institution and other identifiers such as credit card number, account number, customer identifier, transaction identifiers, or virtual currency wallet or wallet address identifier); (C) electronic mail address and telephonic contact information, used to verify a foreign person’s identity; and (D) internet Protocol addresses used for access or administration and the date and time of each such access or administrative action, related to ongoing verification of such foreign person’s ownership of such an Account; and (iii) methods for limiting all third-party access to the information described in this subsection, except insofar as such access is otherwise consistent with this order and allowed under applicable law; (b) take into consideration the type of Account maintained by United States IaaS providers, methods of opening an Account, and types of identifying information available to accomplish the objectives of identifying foreign malicious cyber actors using any such products and avoiding the imposition of an undue burden on such providers; and jbell on DSKJLSW7X2PROD with EXECORD2 (c) permit the Secretary, in accordance with such standards and procedures as the Secretary may delineate and in consultation with the Secretary of Defense, the Attorney General, the Secretary of Homeland Security, and the Director of National Intelligence, to exempt any United States IaaS provider, or any specific type of Account or lessee, from the requirements of any regulation issued pursuant to this section. Such standards and procedures may include a finding by the Secretary that a provider, Account, or lessee complies with security best practices to otherwise deter abuse of IaaS products. Sec. 2. Special Measures for Certain Foreign Jurisdictions or Foreign Persons. (a) Within 180 days of the date of this order, the Secretary shall propose for notice and comment regulations that require United States IaaS providers to take any of the special measures described in subsection (d) of this section if the Secretary, in consultation with the Secretary of State, the Secretary of the Treasury, the Secretary of Defense, the Attorney General, the Secretary of Homeland Security, the Director of National Intelligence and, as the Secretary deems appropriate, the heads of other executive departments and agencies (agencies), finds: (i) that reasonable grounds exist for concluding that a foreign jurisdiction has any significant number of foreign persons offering United States IaaS products that are used for malicious cyber-enabled activities or any significant number of foreign persons directly obtaining United States IaaS products for use in malicious cyber-enabled activities, in accordance with subsection (b) of this section; or (ii) that reasonable grounds exist for concluding that a foreign person has established a pattern of conduct of offering United States IaaS products that are used for malicious cyber-enabled activities or directly obtaining United States IaaS products for use in malicious cyber-enabled activities. (b) In making findings under subsection (a) of this section on the use of United States IaaS products in malicious cyber-enabled activities, the Secretary shall consider any information the Secretary determines to be relevant, as well as information pertaining to the following factors: VerDate Sep<11>2014 17:24 Jan 22, 2021 Jkt 253001 PO 00000 Frm 00002 Fmt 4790 Sfmt 4790 E:\FR\FM\25JAE2.SGM 25JAE2 Federal Register / Vol. 86, No. 14 / Monday, January 25, 2021 / Presidential Documents 6839 (i) Factors related to a particular foreign jurisdiction, including: (A) evidence that foreign malicious cyber actors have obtained United States IaaS products from persons offering United States IaaS products in that foreign jurisdiction, including whether such actors obtained such IaaS products through Reseller Accounts; (B) the extent to which that foreign jurisdiction is a source of malicious cyber-enabled activities; and (C) Whether the United States has a mutual legal assistance treaty with that foreign jurisdiction, and the experience of United States law enforcement officials and regulatory officials in obtaining information about activities involving United States IaaS products originating in or routed through such foreign jurisdiction; and (ii) Factors related to a particular foreign person, including: (A) the extent to which a foreign person uses United States IaaS products to conduct, facilitate, or promote malicious cyber-enabled activities; (B) the extent to which United States IaaS products offered by a foreign person are used to facilitate or promote malicious cyber-enabled activities; (C) the extent to which United States IaaS products offered by a foreign person are used for legitimate business purposes in the jurisdiction; and (D) the extent to which actions short of the imposition of special measures pursuant to subsection (d) of this section are sufficient, with respect to transactions involving the foreign person offering United States IaaS products, to guard against malicious cyber-enabled activities. (c) In selecting which special measure or measures to take under this section, the Secretary shall consider: (i) whether the imposition of any special measure would create a significant competitive disadvantage, including any undue cost or burden associated with compliance, for United States IaaS providers; (ii) the extent to which the imposition of any special measure or the timing of the special measure would have a significant adverse effect on legitimate business activities involving the particular foreign jurisdiction or foreign person; and jbell on DSKJLSW7X2PROD with EXECORD2 (iii) the effect of any special measure on United States national security, law enforcement investigations, or foreign policy. (d) The special measures referred to in subsections (a), (b), and (c) of this section are as follows: (i) Prohibitions or Conditions on Accounts within Certain Foreign Jurisdictions: The Secretary may prohibit or impose conditions on the opening or maintaining with any United States IaaS provider of an Account, including a Reseller Account, by any foreign person located in a foreign jurisdiction found to have any significant number of foreign persons offering United States IaaS products used for malicious cyber-enabled activities, or by any United States IaaS provider for or on behalf of a foreign person; and (ii) Prohibitions or Conditions on Certain Foreign Persons: The Secretary may prohibit or impose conditions on the opening or maintaining in the United States of an Account, including a Reseller Account, by any United States IaaS provider for or on behalf of a foreign person, if such an Account involves any such foreign person found to be offering United States IaaS products used in malicious cyber-enabled activities or directly obtaining United States IaaS products for use in malicious cyber-enabled activities. (e) The Secretary shall not impose requirements for United States IaaS providers to take any of the special measures described in subsection (d) of this section earlier than 180 days following the issuance of final regulations described in section 1 of this order. VerDate Sep<11>2014 17:24 Jan 22, 2021 Jkt 253001 PO 00000 Frm 00003 Fmt 4790 Sfmt 4790 E:\FR\FM\25JAE2.SGM 25JAE2 6840 Federal Register / Vol. 86, No. 14 / Monday, January 25, 2021 / Presidential Documents Sec. 3. Recommendations for Cooperative Efforts to Deter the Abuse of United States IaaS Products. (a) Within 120 days of the date of this order, the Attorney General and the Secretary of Homeland Security, in coordination with the Secretary and, as the Attorney General and the Secretary of Homeland Security deem appropriate, the heads of other agencies, shall engage and solicit feedback from industry on how to increase information sharing and collaboration among IaaS providers and between IaaS providers and the agencies to inform recommendations under subsection (b) of this section. (b) Within 240 days of the date of this order, the Attorney General and the Secretary of Homeland Security, in coordination with the Secretary, and, as the Attorney General and Secretary of Homeland Security deem appropriate, the heads of other agencies, shall develop and submit to the President a report containing recommendations to encourage: (i) voluntary information sharing and collaboration, among United States IaaS providers; and (ii) information sharing between United States IaaS providers and appropriate agencies, including the reporting of incidents, crimes, and other threats to national security, for the purpose of preventing further harm to the United States. (c) The report and recommendations provided under subsection (b) of this section shall consider existing mechanisms for such sharing and collaboration, including the Cybersecurity Information Sharing Act (6 U.S.C. 1503 et seq.), and shall identify any gaps in current law, policy, or procedures. The report shall also include: (i) information related to the operations of foreign malicious cyber actors, the means by which such actors use IaaS products within the United States, malicious capabilities and tradecraft, and the extent to which persons in the United States are compromised or unwittingly involved in such activity; (ii) recommendations for liability protections beyond those in existing law that may be needed to encourage United States IaaS providers to share information among each other and with the United States Government; and (iii) recommendations for facilitating the detection and identification of Accounts and activities that involve foreign malicious cyber actors. Sec. 4. Ensuring Sufficient Resources for Implementation. The Secretary, in consultation with the heads of such agencies as the Secretary deems appropriate, shall identify funding requirements to support the efforts described in this order and incorporate such requirements into its annual budget submissions to the Office of Management and Budget. Sec. 5. Definitions. For the purposes of this order, the following definitions apply: (a) The term ‘‘entity’’ means a partnership, association, trust, joint venture, corporation, group, subgroup, or other organization; jbell on DSKJLSW7X2PROD with EXECORD2 (b) The term ‘‘foreign jurisdiction’’ means any country, subnational territory, or region, other than those subject to the civil or military jurisdiction of the United States, in which any person or group of persons exercises sovereign de facto or de jure authority, including any such country, subnational territory, or region in which a person or group of persons is assuming to exercise governmental authority whether such a person or group of persons has or has not been recognized by the United States; (c) The term ‘‘foreign person’’ means a person that is not a United States person; (d) The term ‘‘Infrastructure as a Service Account’’ or ‘‘Account’’ means a formal business relationship established to provide IaaS products to a person in which details of such transactions are recorded. (e) The term ‘‘Infrastructure as a Service Product’’ means any product or service offered to a consumer, including complimentary or ‘‘trial’’ offerings, VerDate Sep<11>2014 17:24 Jan 22, 2021 Jkt 253001 PO 00000 Frm 00004 Fmt 4790 Sfmt 4790 E:\FR\FM\25JAE2.SGM 25JAE2 Federal Register / Vol. 86, No. 14 / Monday, January 25, 2021 / Presidential Documents 6841 that provides processing, storage, networks, or other fundamental computing resources, and with which the consumer is able to deploy and run software that is not predefined, including operating systems and applications. The consumer typically does not manage or control most of the underlying hardware but has control over the operating systems, storage, and any deployed applications. The term is inclusive of ‘‘managed’’ products or services, in which the provider is responsible for some aspects of system configuration or maintenance, and ‘‘unmanaged’’ products or services, in which the provider is only responsible for ensuring that the product is available to the consumer. The term is also inclusive of ‘‘virtualized’’ products and services, in which the computing resources of a physical machine are split between virtualized computers accessible over the internet (e.g., ‘‘virtual private servers’’), and ‘‘dedicated’’ products or services in which the total computing resources of a physical machine are provided to a single person (e.g., ‘‘baremetal’’ servers); (f) The term ‘‘malicious cyber-enabled activities’’ refers to activities, other than those authorized by or in accordance with United States law that seek to compromise or impair the confidentiality, integrity, or availability of computer, information, or communications systems, networks, physical or virtual infrastructure controlled by computers or information systems, or information resident thereon; (g) The term ‘‘person’’ means an individual or entity; (h) The term ‘‘Reseller Account’’ means an Infrastructure as a Service Account established to provide IaaS products to a person who will then offer those products subsequently, in whole or in part, to a third party. (i) The term ‘‘United States Infrastructure as a Service Product’’ means any Infrastructure as a Service Product owned by any United States person or operated within the territory of the United States of America; jbell on DSKJLSW7X2PROD with EXECORD2 (j) The term ‘‘United States Infrastructure as a Service Provider’’ means any United States Person that offers any Infrastructure as a Service Product; (k) The term ‘‘United States person’’ means any United States citizen, lawful permanent resident of the United States as defined by the Immigration and Nationality Act, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person located in the United States; Sec. 6. Amendment to Reporting Authorizations. Section (9) of Executive Order 13694, as amended, is further amended to read as follows: ‘‘Sec. 9. The Secretary of the Treasury, in consultation with the Secretary of State, the Attorney General, and the Secretary of Commerce, is hereby authorized to submit the recurring and final reports to the Congress on the national emergency declared in this order, consistent with section 401(c) of the NEA (50 U.S.C. 1641(c)) and section 204(c) of IEEPA (50 U.S.C. 1703(c)).’’ Sec. 7. General Provisions. (a) The Secretary, in consultation with the heads of such other agencies as the Secretary deems appropriate, is hereby authorized to take such actions, including the promulgation of rules and regulations, and employ all powers granted to the President by IEEPA as may be necessary to carry out the purposes of this order. The Secretary may redelegate any of these functions to other officers within the Department of Commerce, consistent with applicable law. All departments and agencies of the United States Government are hereby directed to take all appropriate measures within their authority to carry out the provisions of this order. (b) Nothing in this order shall be construed to impair or otherwise affect: (i) the authority granted by law to an executive department or agency, or the head thereof; or (ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals. (c) This order shall be implemented consistent with applicable law and subject to the availability of appropriations. VerDate Sep<11>2014 17:24 Jan 22, 2021 Jkt 253001 PO 00000 Frm 00005 Fmt 4790 Sfmt 4790 E:\FR\FM\25JAE2.SGM 25JAE2 6842 Federal Register / Vol. 86, No. 14 / Monday, January 25, 2021 / Presidential Documents (d) Nothing in this order prohibits or otherwise restricts authorized intelligence, military, law enforcement, or other activities in furtherance of national security or public safety activities. (e) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person. THE WHITE HOUSE, January 19, 2021. [FR Doc. 2021–01714 Filed 1–22–21; 8:45 am] VerDate Sep<11>2014 17:24 Jan 22, 2021 Jkt 253001 PO 00000 Frm 00006 Fmt 4790 Sfmt 4790 E:\FR\FM\25JAE2.SGM 25JAE2 Trump.EPS</GPH> jbell on DSKJLSW7X2PROD with EXECORD2 Billing code 3295–F1–P

Agencies

[Federal Register Volume 86, Number 14 (Monday, January 25, 2021)]
[Presidential Documents]
[Pages 6837-6842]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2021-01714]




                        Presidential Documents 



Federal Register / Vol. 86, No. 14 / Monday, January 25, 2021 / 
Presidential Documents

[[Page 6837]]


                Executive Order 13984 of January 19, 2021

                
Taking Additional Steps To Address the National 
                Emergency With Respect to Significant Malicious Cyber-
                Enabled Activities

                By the authority vested in me as President by the 
                Constitution and the laws of the United States of 
                America, including the International Emergency Economic 
                Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the 
                National Emergencies Act (50 U.S.C. 1601 et seq.) 
                (NEA), and section 301 of title 3, United States Code:

                I, DONALD J. TRUMP, President of the United States of 
                America, find that additional steps must be taken to 
                deal with the national emergency related to significant 
                malicious cyber-enabled activities declared in 
                Executive Order 13694 of April 1, 2015 (Blocking the 
                Property of Certain Persons Engaging in Significant 
                Malicious Cyber-Enabled Activities), as amended, to 
                address the use of United States Infrastructure as a 
                Service (IaaS) products by foreign malicious cyber 
                actors. IaaS products provide persons the ability to 
                run software and store data on servers offered for rent 
                or lease without responsibility for the maintenance and 
                operating costs of those servers. Foreign malicious 
                cyber actors aim to harm the United States economy 
                through the theft of intellectual property and 
                sensitive data and to threaten national security by 
                targeting United States critical infrastructure for 
                malicious cyber-enabled activities. Foreign actors use 
                United States IaaS products for a variety of tasks in 
                carrying out malicious cyber-enabled activities, which 
                makes it extremely difficult for United States 
                officials to track and obtain information through legal 
                process before these foreign actors transition to 
                replacement infrastructure and destroy evidence of 
                their prior activities; foreign resellers of United 
                States IaaS products make it easier for foreign actors 
                to access these products and evade detection. This 
                order provides authority to impose record-keeping 
                obligations with respect to foreign transactions. To 
                address these threats, to deter foreign malicious cyber 
                actors' use of United States IaaS products, and to 
                assist in the investigation of transactions involving 
                foreign malicious cyber actors, the United States must 
                ensure that providers offering United States IaaS 
                products verify the identity of persons obtaining an 
                IaaS account (``Account'') for the provision of these 
                products and maintain records of those transactions. In 
                appropriate circumstances, to further protect against 
                malicious cyber-enabled activities, the United States 
                must also limit certain foreign actors' access to 
                United States IaaS products. Further, the United States 
                must encourage more robust cooperation among United 
                States IaaS providers, including by increasing 
                voluntary information sharing, to bolster efforts to 
                thwart the actions of foreign malicious cyber actors.

                Accordingly, I hereby order:

                Section 1. Verification of Identity. Within 180 days of 
                the date of this order, the Secretary of Commerce 
                (Secretary) shall propose for notice and comment 
                regulations that require United States IaaS providers 
                to verify the identity of a foreign person that obtains 
                an Account. These regulations shall, at a minimum:

                    (a) set forth the minimum standards that United 
                States IaaS providers must adopt to verify the identity 
                of a foreign person in connection with the opening of 
                an Account or the maintenance of an existing Account, 
                including:

[[Page 6838]]

(i) the types of documentation and procedures required to verify the 
identity of any foreign person acting as a lessee or sub-lessee of these 
products or services;

(ii) records that United States IaaS providers must securely maintain 
regarding a foreign person that obtains an Account, including information 
establishing:

  (A) the identity of such foreign person and the person's information, 
including name, national identification number, and address;

  (B) means and source of payment (including any associated financial 
institution and other identifiers such as credit card number, account 
number, customer identifier, transaction identifiers, or virtual currency 
wallet or wallet address identifier);

  (C) electronic mail address and telephonic contact information, used to 
verify a foreign person's identity; and

  (D) internet Protocol addresses used for access or administration and the 
date and time of each such access or administrative action, related to 
ongoing verification of such foreign person's ownership of such an Account; 
and

(iii) methods for limiting all third-party access to the information 
described in this subsection, except insofar as such access is otherwise 
consistent with this order and allowed under applicable law;

                    (b) take into consideration the type of Account 
                maintained by United States IaaS providers, methods of 
                opening an Account, and types of identifying 
                information available to accomplish the objectives of 
                identifying foreign malicious cyber actors using any 
                such products and avoiding the imposition of an undue 
                burden on such providers; and
                    (c) permit the Secretary, in accordance with such 
                standards and procedures as the Secretary may delineate 
                and in consultation with the Secretary of Defense, the 
                Attorney General, the Secretary of Homeland Security, 
                and the Director of National Intelligence, to exempt 
                any United States IaaS provider, or any specific type 
                of Account or lessee, from the requirements of any 
                regulation issued pursuant to this section. Such 
                standards and procedures may include a finding by the 
                Secretary that a provider, Account, or lessee complies 
                with security best practices to otherwise deter abuse 
                of IaaS products.

                Sec. 2. Special Measures for Certain Foreign 
                Jurisdictions or Foreign Persons. (a) Within 180 days 
                of the date of this order, the Secretary shall propose 
                for notice and comment regulations that require United 
                States IaaS providers to take any of the special 
                measures described in subsection (d) of this section if 
                the Secretary, in consultation with the Secretary of 
                State, the Secretary of the Treasury, the Secretary of 
                Defense, the Attorney General, the Secretary of 
                Homeland Security, the Director of National 
                Intelligence and, as the Secretary deems appropriate, 
                the heads of other executive departments and agencies 
                (agencies), finds:

(i) that reasonable grounds exist for concluding that a foreign 
jurisdiction has any significant number of foreign persons offering United 
States IaaS products that are used for malicious cyber-enabled activities 
or any significant number of foreign persons directly obtaining United 
States IaaS products for use in malicious cyber-enabled activities, in 
accordance with subsection (b) of this section; or

(ii) that reasonable grounds exist for concluding that a foreign person has 
established a pattern of conduct of offering United States IaaS products 
that are used for malicious cyber-enabled activities or directly obtaining 
United States IaaS products for use in malicious cyber-enabled activities.

                    (b) In making findings under subsection (a) of this 
                section on the use of United States IaaS products in 
                malicious cyber-enabled activities, the Secretary shall 
                consider any information the Secretary determines to be 
                relevant, as well as information pertaining to the 
                following factors:

[[Page 6839]]

(i) Factors related to a particular foreign jurisdiction, including:

  (A) evidence that foreign malicious cyber actors have obtained United 
States IaaS products from persons offering United States IaaS products in 
that foreign jurisdiction, including whether such actors obtained such IaaS 
products through Reseller Accounts;

  (B) the extent to which that foreign jurisdiction is a source of 
malicious cyber-enabled activities; and

  (C) Whether the United States has a mutual legal assistance treaty with 
that foreign jurisdiction, and the experience of United States law 
enforcement officials and regulatory officials in obtaining information 
about activities involving United States IaaS products originating in or 
routed through such foreign jurisdiction; and

(ii) Factors related to a particular foreign person, including:

  (A) the extent to which a foreign person uses United States IaaS products 
to conduct, facilitate, or promote malicious cyber-enabled activities;

  (B) the extent to which United States IaaS products offered by a foreign 
person are used to facilitate or promote malicious cyber-enabled 
activities;

  (C) the extent to which United States IaaS products offered by a foreign 
person are used for legitimate business purposes in the jurisdiction; and

  (D) the extent to which actions short of the imposition of special 
measures pursuant to subsection (d) of this section are sufficient, with 
respect to transactions involving the foreign person offering United States 
IaaS products, to guard against malicious cyber-enabled activities.

                    (c) In selecting which special measure or measures 
                to take under this section, the Secretary shall 
                consider:

(i) whether the imposition of any special measure would create a 
significant competitive disadvantage, including any undue cost or burden 
associated with compliance, for United States IaaS providers;

(ii) the extent to which the imposition of any special measure or the 
timing of the special measure would have a significant adverse effect on 
legitimate business activities involving the particular foreign 
jurisdiction or foreign person; and

(iii) the effect of any special measure on United States national security, 
law enforcement investigations, or foreign policy.

                    (d) The special measures referred to in subsections 
                (a), (b), and (c) of this section are as follows:

(i) Prohibitions or Conditions on Accounts within Certain Foreign 
Jurisdictions: The Secretary may prohibit or impose conditions on the 
opening or maintaining with any United States IaaS provider of an Account, 
including a Reseller Account, by any foreign person located in a foreign 
jurisdiction found to have any significant number of foreign persons 
offering United States IaaS products used for malicious cyber-enabled 
activities, or by any United States IaaS provider for or on behalf of a 
foreign person; and

(ii) Prohibitions or Conditions on Certain Foreign Persons: The Secretary 
may prohibit or impose conditions on the opening or maintaining in the 
United States of an Account, including a Reseller Account, by any United 
States IaaS provider for or on behalf of a foreign person, if such an 
Account involves any such foreign person found to be offering United States 
IaaS products used in malicious cyber-enabled activities or directly 
obtaining United States IaaS products for use in malicious cyber-enabled 
activities.

                    (e) The Secretary shall not impose requirements for 
                United States IaaS providers to take any of the special 
                measures described in subsection (d) of this section 
                earlier than 180 days following the issuance of final 
                regulations described in section 1 of this order.

[[Page 6840]]

                Sec. 3. Recommendations for Cooperative Efforts to 
                Deter the Abuse of United States IaaS Products. (a) 
                Within 120 days of the date of this order, the Attorney 
                General and the Secretary of Homeland Security, in 
                coordination with the Secretary and, as the Attorney 
                General and the Secretary of Homeland Security deem 
                appropriate, the heads of other agencies, shall engage 
                and solicit feedback from industry on how to increase 
                information sharing and collaboration among IaaS 
                providers and between IaaS providers and the agencies 
                to inform recommendations under subsection (b) of this 
                section.

                    (b) Within 240 days of the date of this order, the 
                Attorney General and the Secretary of Homeland 
                Security, in coordination with the Secretary, and, as 
                the Attorney General and Secretary of Homeland Security 
                deem appropriate, the heads of other agencies, shall 
                develop and submit to the President a report containing 
                recommendations to encourage:

(i) voluntary information sharing and collaboration, among United States 
IaaS providers; and

(ii) information sharing between United States IaaS providers and 
appropriate agencies, including the reporting of incidents, crimes, and 
other threats to national security, for the purpose of preventing further 
harm to the United States.

                    (c) The report and recommendations provided under 
                subsection (b) of this section shall consider existing 
                mechanisms for such sharing and collaboration, 
                including the Cybersecurity Information Sharing Act (6 
                U.S.C. 1503 et seq.), and shall identify any gaps in 
                current law, policy, or procedures. The report shall 
                also include:

(i) information related to the operations of foreign malicious cyber 
actors, the means by which such actors use IaaS products within the United 
States, malicious capabilities and tradecraft, and the extent to which 
persons in the United States are compromised or unwittingly involved in 
such activity;

(ii) recommendations for liability protections beyond those in existing law 
that may be needed to encourage United States IaaS providers to share 
information among each other and with the United States Government; and

(iii) recommendations for facilitating the detection and identification of 
Accounts and activities that involve foreign malicious cyber actors.

                Sec. 4. Ensuring Sufficient Resources for 
                Implementation. The Secretary, in consultation with the 
                heads of such agencies as the Secretary deems 
                appropriate, shall identify funding requirements to 
                support the efforts described in this order and 
                incorporate such requirements into its annual budget 
                submissions to the Office of Management and Budget.

                Sec. 5. Definitions. For the purposes of this order, 
                the following definitions apply:

                    (a) The term ``entity'' means a partnership, 
                association, trust, joint venture, corporation, group, 
                subgroup, or other organization;
                    (b) The term ``foreign jurisdiction'' means any 
                country, subnational territory, or region, other than 
                those subject to the civil or military jurisdiction of 
                the United States, in which any person or group of 
                persons exercises sovereign de facto or de jure 
                authority, including any such country, subnational 
                territory, or region in which a person or group of 
                persons is assuming to exercise governmental authority 
                whether such a person or group of persons has or has 
                not been recognized by the United States;
                    (c) The term ``foreign person'' means a person that 
                is not a United States person;
                    (d) The term ``Infrastructure as a Service 
                Account'' or ``Account'' means a formal business 
                relationship established to provide IaaS products to a 
                person in which details of such transactions are 
                recorded.
                    (e) The term ``Infrastructure as a Service 
                Product'' means any product or service offered to a 
                consumer, including complimentary or ``trial'' 
                offerings,

[[Page 6841]]

                that provides processing, storage, networks, or other 
                fundamental computing resources, and with which the 
                consumer is able to deploy and run software that is not 
                predefined, including operating systems and 
                applications. The consumer typically does not manage or 
                control most of the underlying hardware but has control 
                over the operating systems, storage, and any deployed 
                applications. The term is inclusive of ``managed'' 
                products or services, in which the provider is 
                responsible for some aspects of system configuration or 
                maintenance, and ``unmanaged'' products or services, in 
                which the provider is only responsible for ensuring 
                that the product is available to the consumer. The term 
                is also inclusive of ``virtualized'' products and 
                services, in which the computing resources of a 
                physical machine are split between virtualized 
                computers accessible over the internet (e.g., ``virtual 
                private servers''), and ``dedicated'' products or 
                services in which the total computing resources of a 
                physical machine are provided to a single person (e.g., 
                ``bare-metal'' servers);
                    (f) The term ``malicious cyber-enabled activities'' 
                refers to activities, other than those authorized by or 
                in accordance with United States law that seek to 
                compromise or impair the confidentiality, integrity, or 
                availability of computer, information, or 
                communications systems, networks, physical or virtual 
                infrastructure controlled by computers or information 
                systems, or information resident thereon;
                    (g) The term ``person'' means an individual or 
                entity;
                    (h) The term ``Reseller Account'' means an 
                Infrastructure as a Service Account established to 
                provide IaaS products to a person who will then offer 
                those products subsequently, in whole or in part, to a 
                third party.
                    (i) The term ``United States Infrastructure as a 
                Service Product'' means any Infrastructure as a Service 
                Product owned by any United States person or operated 
                within the territory of the United States of America;
                    (j) The term ``United States Infrastructure as a 
                Service Provider'' means any United States Person that 
                offers any Infrastructure as a Service Product;
                    (k) The term ``United States person'' means any 
                United States citizen, lawful permanent resident of the 
                United States as defined by the Immigration and 
                Nationality Act, entity organized under the laws of the 
                United States or any jurisdiction within the United 
                States (including foreign branches), or any person 
                located in the United States;

                Sec. 6. Amendment to Reporting Authorizations. Section 
                (9) of Executive Order 13694, as amended, is further 
                amended to read as follows:

                    ``Sec. 9. The Secretary of the Treasury, in 
                consultation with the Secretary of State, the Attorney 
                General, and the Secretary of Commerce, is hereby 
                authorized to submit the recurring and final reports to 
                the Congress on the national emergency declared in this 
                order, consistent with section 401(c) of the NEA (50 
                U.S.C. 1641(c)) and section 204(c) of IEEPA (50 U.S.C. 
                1703(c)).''

                Sec. 7. General Provisions. (a) The Secretary, in 
                consultation with the heads of such other agencies as 
                the Secretary deems appropriate, is hereby authorized 
                to take such actions, including the promulgation of 
                rules and regulations, and employ all powers granted to 
                the President by IEEPA as may be necessary to carry out 
                the purposes of this order. The Secretary may 
                redelegate any of these functions to other officers 
                within the Department of Commerce, consistent with 
                applicable law. All departments and agencies of the 
                United States Government are hereby directed to take 
                all appropriate measures within their authority to 
                carry out the provisions of this order.

                    (b) Nothing in this order shall be construed to 
                impair or otherwise affect:

(i) the authority granted by law to an executive department or agency, or 
the head thereof; or

(ii) the functions of the Director of the Office of Management and Budget 
relating to budgetary, administrative, or legislative proposals.

                    (c) This order shall be implemented consistent with 
                applicable law and subject to the availability of 
                appropriations.

[[Page 6842]]

                    (d) Nothing in this order prohibits or otherwise 
                restricts authorized intelligence, military, law 
                enforcement, or other activities in furtherance of 
                national security or public safety activities.
                    (e) This order is not intended to, and does not, 
                create any right or benefit, substantive or procedural, 
                enforceable at law or in equity by any party against 
                the United States, its departments, agencies, or 
                entities, its officers, employees, or agents, or any 
                other person.
                
                
                    (Presidential Sig.)

                THE WHITE HOUSE,

                    January 19, 2021.

[FR Doc. 2021-01714
Filed 1-22-21; 8:45 am]
Billing code 3295-F1-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.