Intent To Request an Extension From OMB of One Current Public Collection of Information: Cybersecurity Measures for Surface Modes, 72988-72990 [2021-27886]

Download as PDF 72988 Federal Register / Vol. 86, No. 244 / Thursday, December 23, 2021 / Notices Toxicology Program (NTP) prepares the RoC on behalf of the Secretary of Health and Human Services. For the 15th RoC, NTP followed an established, multi-step process with multiple opportunities for public input, and used established criteria to evaluate the scientific evidence on each candidate substance under review (https://ntp.niehs.nih.gov/ go/rocprocess). DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Announcement of Availability of the Fifteenth Report on Carcinogens AGENCY: National Institutes of Health, HHS. ACTION: Notice. The Department of Health and Human Services released the 15th Report on Carcinogens (RoC) to the public on December 21, 2021. The report is available on the RoC website at: https://ntp.niehs.nih.gov/go/roc or from the Office of the RoC (see ADDRESSES below). DATES: The 15th RoC is available to the public on December 21, 2021. ADDRESSES: Dr. Ruth Lunn, Integrated Health Effects Branch, Division of the NTP, NIEHS, P.O. Box 12233, MD K2– 14, Research Triangle Park, NC 27709; telephone: (919) 316–4637; FAX: (301) 480–2970; lunn@niehs.nih.gov. FOR FURTHER INFORMATION CONTACT: Questions or comments concerning the 15th RoC should be directed to Dr. Ruth Lunn (telephone: 919–316–4637 or lunn@niehs.nih.gov). SUPPLEMENTARY INFORMATION: jspears on DSK121TN23PROD with NOTICES1 SUMMARY: Background Information on the RoC This notice is in accordance with the Public Health Service Act Section 301(b)(4). The Report on Carcinogens (RoC) is a Congressionally mandated document that identifies and discusses agents, substances, mixtures, or exposure circumstances (collectively referred to as ‘‘substances’’) that may pose a hazard to human health because of their carcinogenicity. Substances are listed in the report as either known or reasonably anticipated to be human carcinogens. The listing of a substance in the RoC indicates a potential hazard; it does not establish the exposure conditions that pose a cancer hazard to individuals in their daily lives. For each listed substance, the RoC provides information from cancer studies that support the listing, as well as information about potential sources of exposure and current federal regulations to limit exposures. Each edition of the RoC is cumulative, that is, it lists newly reviewed substances in addition to substances listed in the previous edition. Information about the RoC is available on the RoC website (https:// ntp.niehs.nih.gov/go/roc) or by contacting Dr. Lunn (see ADDRESSES above). The National Institute of Environmental Health Science, National VerDate Sep<11>2014 20:50 Dec 22, 2021 Jkt 256001 New Listings in the 15th RoC The 15th RoC contains 256 listings, some of which consist of a class of structurally related chemicals or agents. There are eight new listings in this edition. The new listing in the category of known to be a human carcinogen is Helicobacter pylori (chronic infection). Seven of the new listings are in the category of reasonably anticipated to be a human carcinogen: Antimony trioxide and six haloacetic acids found as water disinfection by-products, including bromochloroacetic acid, bromodichloroacetic acid, chlorodibromoacetic acid, dibromoacetic acid, dichloroacetic acid, and tribromoacetic acid. Dated: December 20, 2021. Richard P. Woychik, Director, National Institute of Environmental Health Science and National Toxicology Program. [FR Doc. 2021–27910 Filed 12–22–21; 8:45 am] BILLING CODE 4140–01–P DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request an Extension From OMB of One Current Public Collection of Information: Cybersecurity Measures for Surface Modes Transportation Security Administration, DHS. ACTION: 60-Day notice. AGENCY: The Transportation Security Administration (TSA) invites public comment on one currently-approved Information Collection Request (ICR), Office of Management and Budget (OMB) control number 1652–0074, abstracted below, that we will submit to OMB for an extension in compliance with the Paperwork Reduction Act (PRA). On November 30, 2021, OMB approved TSA’s request for an emergency approval of this collection to address the ongoing cybersecurity threat to surface transportation and associated infrastructure. TSA is now seeking to renew the collection, which expires on May 31, 2022, with incorporation of the SUMMARY: PO 00000 Frm 00072 Fmt 4703 Sfmt 4703 subject of the emergency request. The ICR describes the nature of the information collection and its expected burden. The collection allows TSA to address the ongoing cybersecurity threat using a risk-based approach to transportation security. DATES: Send your comments by February 22, 2022. ADDRESSES: Comments may be emailed to TSAPRA@tsa.dhs.gov or delivered to the TSA PRA Officer, Information Technology (IT), TSA–11, Transportation Security Administration, 6595 Springfield Center Drive, Springfield, VA 20598–6011. FOR FURTHER INFORMATION CONTACT: Christina A. Walsh at the above address, or by telephone (571) 227–2062. SUPPLEMENTARY INFORMATION: Comments Invited In accordance with the Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et seq.), an agency may not conduct or sponsor, and a person is not required to respond to, a collection of information unless it displays a valid OMB control number. The ICR documentation will be available at https://www.reginfo.gov upon its submission to OMB. Therefore, in preparation for OMB review and approval of the following information collection, TSA is soliciting comments to— (1) Evaluate whether the proposed information requirement is necessary for the proper performance of the functions of the agency, including whether the information will have practical utility; (2) Evaluate the accuracy of the agency’s estimate of the burden; (3) Enhance the quality, utility, and clarity of the information to be collected; and (4) Minimize the burden of the collection of information on those who are to respond, including using appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of information technology. Information Collection Requirement OMB Control Number 1652–0074; Cybersecurity Measures for Surface Modes. Under the Aviation and Transportation Security Act 1 and delegated authority from the Secretary of Homeland Security, TSA has broad responsibility and authority for ‘‘security in all modes of transportation . . . including security responsibilities . . . over modes of transportation that are exercised by the Department of 1 Public Law 107–71 (115 Stat. 597; Nov. 19, 2001), codified at 49 U.S.C. 114. E:\FR\FM\23DEN1.SGM 23DEN1 Federal Register / Vol. 86, No. 244 / Thursday, December 23, 2021 / Notices Transportation.’’ 2 TSA is specifically empowered to assess threats to transportation; 3 develop policies, strategies, and plans for dealing with threats to transportation; 4 oversee the implementation and adequacy of security measures at transportation facilities; 5 and carry out other appropriate duties relating to transportation security.6 On November 30, 2021, OMB approved TSA’s request for an emergency approval of this information collection that covers both mandatory reporting and voluntary reporting of information. The OMB approval allowed for the institution of mandatory reporting requirements and collection of information voluntarily submitted. See ICR Reference Number: 202111–1652– 003. TSA is now seeking renewal of this information collection for the maximum three-year approval period. The request for a new collection was necessary as a result of actions TSA took to address the ongoing and escalating cybersecurity threat to surface transportation and associated infrastructure. On December 2, 2021, TSA issued Security Directive (SD) 1580–2021–01 or SD1582–2021–02 mandating TSA-specified owner/ operators of ‘‘higher risk’’ railroads and rail transit systems, respectively, to implement an array of cybersecurity measures to prevent disruption and degradation to their infrastructure.7 The scope of these SDs align with the railroads and rail transit systems required to report significant security incidents to TSA under 49 CFR 1570.203. On that same date, TSA also issued an ‘‘information circular’’ (IC), which contains non-binding recommendations with the same measures for railroad owner/operators, public transportation agencies, rail transit system owner/ operators, and certain over-the-road bus owner/operators not specifically covered under SDs 1580–2021–01 or 1582–2021–02. The requirements in the SDs and the recommendations in the IC allow TSA to execute its security responsibilities within the surface transportation industry, through awareness of potential security incidents and suspicious activities. The SDs require, and the IC recommends, the following security measures: 1. Designate a Cybersecurity Coordinator who is available to TSA 24/ 7 to coordinate cybersecurity practices and address any incidents that arise; 2. Report cybersecurity incidents to the Cybersecurity and Infrastructure Security Agency (CISA); 72989 3. Develop a cybersecurity incident response plan; and 4. Complete a cybersecurity vulnerability assessment to address cybersecurity gaps using the form provided by TSA. TSA, in conjunction with federal partners such as CISA, will use the reports of cybersecurity incidents to evaluate and respond to imminent and evolving cybersecurity incidents and threats as they occur, and as a basis for creating new cybersecurity policy moving forward. This monitoring will allow TSA and federal partners to take action to contain threats, take mitigating action, and issue timely warnings to similarly-situated entities against further spread of the threat. TSA and its federal partners will also use the information to inform timely modifications to cybersecurity requirements to improve transportation security and national economic security. TSA will use the collection of information to ensure compliance with TSA’s cybersecurity measures required by the SDs and the recommendations under the IC. Table 1 provides more detail on the measures included in the SDs and IC. TABLE 1—SUMMARY OF SECURITY MEASURES IN THE SECURITY DIRECTIVE AND INFORMATION CIRCULAR Title Designate a Cybersecurity Coordinator. Cybersecurity Incident Reporting. jspears on DSK121TN23PROD with NOTICES1 Cybersecurity Incident Response Plan. Security measure Owner/Operators are required or recommended, as applicable, to appoint a U.S. Citizen Cybersecurity Primary and Alternate Coordinator who must or should, as applicable, submit contact information. The Cybersecurity Coordinator serves as the primary contact for cyber-related intelligence information and cybersecurity-related activities and communications with TSA and CISA; must/should be accessible to TSA and CISA 24 hours a day, seven days a week; must/should coordinate cyber and related security practices and procedures internally; and must/should work with appropriate law enforcement and emergency response agencies. Owner/Operators Cybersecurity Coordinators are required or recommended, as applicable, to report actual and potential cybersecurity incidents to CISA within 24 hours of identification of a cybersecurity incident. The information provided to CISA pursuant to the SD is shared with TSA and may also be shared with the National Response Center and other agencies as appropriate. Conversely, information provided to TSA pursuant to this directive is shared with CISA and may also be shared with the National Response Center and other agencies as appropriate. Cybersecurity incident reports are submitted using the CISA Reporting System form at: https://uscert.cisa.gov/forms/report. Incident reports can also be reported by calling (888) 282–0870. CISA has an approved information collection for cybersecurity incident reporting. See OMB control number 1670–0037. Owner/Operators are required or recommended, as applicable, to develop and adopt a Cybersecurity Incident Response Plan to reduce the risk of operational disruption should their Information Technology and/or Operational Technology systems be affected by a cybersecurity incident. Owner/operators must provide or are recommended to provide, as applicable, evidence of compliance to TSA upon request. 2 See 49 U.S.C. 114(d). The TSA Administrator’s current authorities under the Aviation and Transportation Security Act have been delegated to him by the Secretary of Homeland Security. Section 403(2) of the Homeland Security Act (HSA) of 2002, Public Law 107–296 (116 Stat. 2135, Nov. 25, 2002), transferred all functions of TSA, including those of the Secretary of Transportation and the Under Secretary of Transportation of Security related to TSA, to the Secretary of Homeland Security. VerDate Sep<11>2014 20:50 Dec 22, 2021 Jkt 256001 Pursuant to DHS Delegation Number 7060.2, the Secretary delegated to the Administrator of TSA, subject to the Secretary’s guidance and control, the authority vested in the Secretary with respect to TSA, including that in section 403(2) of the HSA. 3 49 U.S.C. 114(f)(2). 4 49 U.S.C. 114(f)(3). 5 49 U.S.C. 114(f)(11). 6 49 U.S.C. 114(f)(15). PO 00000 Frm 00073 Fmt 4703 Sfmt 4703 7 Companies and agencies that are identified as higher-risk service the regions with the highest surface transportation-specific risk. Risk ranking is based on considerations related to ridership, location of services provided (use of the same stations and stops), and relationship between feeder and primary systems. See https://www.tsa.gov/sites/ default/files/guidance-docs/high_threat_urban_ area_htua_group_designations_0.pdf. E:\FR\FM\23DEN1.SGM 23DEN1 72990 Federal Register / Vol. 86, No. 244 / Thursday, December 23, 2021 / Notices TABLE 1—SUMMARY OF SECURITY MEASURES IN THE SECURITY DIRECTIVE AND INFORMATION CIRCULAR—Continued Title jspears on DSK121TN23PROD with NOTICES1 Cybersecurity Vulnerability Assessment. Security measure Owner/Operators are required or recommended, as applicable, to assess their current cybersecurity posture consistent with the functions and categories found in the National Institute of Standards and Technology Cybersecurity Guidance Framework. The assessment and identification of cybersecurity gaps must or should, as applicable, be completed using a using a form provided by TSA. As part of this assessment, the owners and operators must/may identify remediation measures to address the vulnerabilities and cybersecurity gaps identified during the assessment and a plan for implementing the identified measures if necessary, and report the results to TSA. TSA will use the results of the assessments to make a global assessment of the cyber risk posture of the industry and possibly impose additional security measures as appropriate or necessary. TSA may also use the information, with company-specific data redacted, for TSA’s intelligence-derived reports. TSA and CISA may also use information submitted for vulnerability identification, trend analysis, or to generate anonymized indicators of compromise or other cybersecurity products to prevent other cybersecurity incidents. All reported information will be protected in a manner appropriate for the sensitivity and criticality of the information. Certification of Completion of SD Requirements DEPARTMENT OF HOMELAND SECURITY The SDs and IC took effect on December 31, 2021. Within 7 days of the effective date of the SDs, owner/ operators must provide their designated Cybersecurity Coordinator information; within 90 days of the effective date of the SDs owner/operators must complete the Vulnerability Assessment (TSA form); within 180 days of the effective date of the SDs, owner/operators must adopt a Cybersecurity Incident Response Plan; within 7 days of completing the Cybersecurity Incident Response Plan requirement, owner/ operators must submit a statement to TSA via email certifying that the owner/ operator has completed this requirement of the SD. Owner/Operators can complete and submit the required information via email or other electronic options provided by TSA. Documentation of compliance must be provided upon request. As the measures in the IC are voluntary, the IC does not require owner/operators to report on their compliance. Portions of the responses that are deemed Sensitive Security Information (SSI) are protected in accordance with procedures meeting the transmission, handling, and storage requirements of SSI set forth in 49 CFR part 15 and 1520. TSA estimates this collection applies to 457 railroad owner/operators, 115 public transportation agencies and rail transit system owner/operators, and 209 over-the-road bus owner/operators, for a total of 781 respondents. TSA estimates the total hour burden for this collection to be 96,163 hours. Transportation Security Administration Dated: December 20, 2021. Christina A. Walsh, TSA Paperwork Reduction Act Officer, Information Technology. [FR Doc. 2021–27886 Filed 12–22–21; 8:45 am] BILLING CODE 9110–05–P VerDate Sep<11>2014 20:50 Dec 22, 2021 Jkt 256001 [Docket No. TSA–2006–26514] Intent To Request Extension From OMB of One Current Public Collection of Information: Rail Transportation Security Transportation Security Administration, DHS. ACTION: 60-Day notice. AGENCY: The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), Office of Management and Budget (OMB) control number 1652–0051, abstracted below that we will submit to OMB for an extension in compliance with the Paperwork Reduction Act (PRA). The ICR describes the nature of the information collection and its expected burden. The collection involves the submission of contact information of security coordinators (SCs) and alternate SCs from certain freight rail and passenger rail entities; reporting of significant security concerns; documenting the transfer of custody and control of certain hazardous materials rail cars; and providing location and shipping information for certain hazardous materials rail cars. DATES: Send your comments by February 22, 2022. ADDRESSES: Comments may be emailed to TSAPRA@dhs.gov or delivered to the TSA PRA Officer Information Technology (IT), TSA–11, Transportation Security Administration, 6595 Springfield Center Drive, Springfield, VA 20598–6011. FOR FURTHER INFORMATION CONTACT: Christina A. Walsh at the above address, or by telephone (571) 227–2062. SUMMARY: PO 00000 Frm 00074 Fmt 4703 Sfmt 4703 SUPPLEMENTARY INFORMATION: Comments Invited In accordance with the Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et seq.), an agency may not conduct or sponsor, and a person is not required to respond to, a collection of information unless it displays a valid OMB control number. The ICR documentation is available at https://www.reginfo.gov. Therefore, in preparation for OMB review and approval of the following information collection, TSA is soliciting comments to— (1) Evaluate whether the proposed information requirement is necessary for the proper performance of the functions of the agency, including whether the information will have practical utility; (2) Evaluate the accuracy of the agency’s estimate of the burden; (3) Enhance the quality, utility, and clarity of the information to be collected; and (4) Minimize the burden of the collection of information on those who are to respond, including using appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of information technology. Information Collection Requirement OMB Control Number 1652–0051; Rail Transportation Security. TSA collects and uses information collected under 49 CFR parts 1570 and 1580 to enhance the security of the Nation’s rail systems. Sections 1570.201 and 1570.203 require freight railroad carriers, certain rail hazardous materials shipper and receiver facilities, passenger railroad carriers, and rail mass transit systems to designate and submit contact information for a SC and at least one alternate SC to TSA. Sections 1570.203 require freight railroad carriers, certain rail hazardous materials shipper and receiver facilities, passenger railroad carriers, and rail E:\FR\FM\23DEN1.SGM 23DEN1

Agencies

[Federal Register Volume 86, Number 244 (Thursday, December 23, 2021)]
[Notices]
[Pages 72988-72990]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2021-27886]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Transportation Security Administration


Intent To Request an Extension From OMB of One Current Public 
Collection of Information: Cybersecurity Measures for Surface Modes

AGENCY: Transportation Security Administration, DHS.

ACTION: 60-Day notice.

-----------------------------------------------------------------------

SUMMARY: The Transportation Security Administration (TSA) invites 
public comment on one currently-approved Information Collection Request 
(ICR), Office of Management and Budget (OMB) control number 1652-0074, 
abstracted below, that we will submit to OMB for an extension in 
compliance with the Paperwork Reduction Act (PRA). On November 30, 
2021, OMB approved TSA's request for an emergency approval of this 
collection to address the ongoing cybersecurity threat to surface 
transportation and associated infrastructure. TSA is now seeking to 
renew the collection, which expires on May 31, 2022, with incorporation 
of the subject of the emergency request. The ICR describes the nature 
of the information collection and its expected burden. The collection 
allows TSA to address the ongoing cybersecurity threat using a risk-
based approach to transportation security.

DATES: Send your comments by February 22, 2022.

ADDRESSES: Comments may be emailed to [email protected] or delivered 
to the TSA PRA Officer, Information Technology (IT), TSA-11, 
Transportation Security Administration, 6595 Springfield Center Drive, 
Springfield, VA 20598-6011.

FOR FURTHER INFORMATION CONTACT: Christina A. Walsh at the above 
address, or by telephone (571) 227-2062.

SUPPLEMENTARY INFORMATION:

Comments Invited

    In accordance with the Paperwork Reduction Act of 1995 (44 U.S.C. 
3501 et seq.), an agency may not conduct or sponsor, and a person is 
not required to respond to, a collection of information unless it 
displays a valid OMB control number. The ICR documentation will be 
available at https://www.reginfo.gov upon its submission to OMB. 
Therefore, in preparation for OMB review and approval of the following 
information collection, TSA is soliciting comments to--
    (1) Evaluate whether the proposed information requirement is 
necessary for the proper performance of the functions of the agency, 
including whether the information will have practical utility;
    (2) Evaluate the accuracy of the agency's estimate of the burden;
    (3) Enhance the quality, utility, and clarity of the information to 
be collected; and
    (4) Minimize the burden of the collection of information on those 
who are to respond, including using appropriate automated, electronic, 
mechanical, or other technological collection techniques or other forms 
of information technology.

Information Collection Requirement

    OMB Control Number 1652-0074; Cybersecurity Measures for Surface 
Modes. Under the Aviation and Transportation Security Act \1\ and 
delegated authority from the Secretary of Homeland Security, TSA has 
broad responsibility and authority for ``security in all modes of 
transportation . . . including security responsibilities . . . over 
modes of transportation that are exercised by the Department of

[[Page 72989]]

Transportation.'' \2\ TSA is specifically empowered to assess threats 
to transportation; \3\ develop policies, strategies, and plans for 
dealing with threats to transportation; \4\ oversee the implementation 
and adequacy of security measures at transportation facilities; \5\ and 
carry out other appropriate duties relating to transportation 
security.\6\
---------------------------------------------------------------------------

    \1\ Public Law 107-71 (115 Stat. 597; Nov. 19, 2001), codified 
at 49 U.S.C. 114.
    \2\ See 49 U.S.C. 114(d). The TSA Administrator's current 
authorities under the Aviation and Transportation Security Act have 
been delegated to him by the Secretary of Homeland Security. Section 
403(2) of the Homeland Security Act (HSA) of 2002, Public Law 107-
296 (116 Stat. 2135, Nov. 25, 2002), transferred all functions of 
TSA, including those of the Secretary of Transportation and the 
Under Secretary of Transportation of Security related to TSA, to the 
Secretary of Homeland Security. Pursuant to DHS Delegation Number 
7060.2, the Secretary delegated to the Administrator of TSA, subject 
to the Secretary's guidance and control, the authority vested in the 
Secretary with respect to TSA, including that in section 403(2) of 
the HSA.
    \3\ 49 U.S.C. 114(f)(2).
    \4\ 49 U.S.C. 114(f)(3).
    \5\ 49 U.S.C. 114(f)(11).
    \6\ 49 U.S.C. 114(f)(15).
---------------------------------------------------------------------------

    On November 30, 2021, OMB approved TSA's request for an emergency 
approval of this information collection that covers both mandatory 
reporting and voluntary reporting of information. The OMB approval 
allowed for the institution of mandatory reporting requirements and 
collection of information voluntarily submitted. See ICR Reference 
Number: 202111-1652-003. TSA is now seeking renewal of this information 
collection for the maximum three-year approval period.
    The request for a new collection was necessary as a result of 
actions TSA took to address the ongoing and escalating cybersecurity 
threat to surface transportation and associated infrastructure. On 
December 2, 2021, TSA issued Security Directive (SD) 1580-2021-01 or 
SD1582-2021-02 mandating TSA-specified owner/operators of ``higher 
risk'' railroads and rail transit systems, respectively, to implement 
an array of cybersecurity measures to prevent disruption and 
degradation to their infrastructure.\7\ The scope of these SDs align 
with the railroads and rail transit systems required to report 
significant security incidents to TSA under 49 CFR 1570.203.
---------------------------------------------------------------------------

    \7\ Companies and agencies that are identified as higher-risk 
service the regions with the highest surface transportation-specific 
risk. Risk ranking is based on considerations related to ridership, 
location of services provided (use of the same stations and stops), 
and relationship between feeder and primary systems. See https://www.tsa.gov/sites/default/files/guidance-docs/high_threat_urban_area_htua_group_designations_0.pdf.
---------------------------------------------------------------------------

    On that same date, TSA also issued an ``information circular'' 
(IC), which contains non-binding recommendations with the same measures 
for railroad owner/operators, public transportation agencies, rail 
transit system owner/operators, and certain over-the-road bus owner/
operators not specifically covered under SDs 1580-2021-01 or 1582-2021-
02. The requirements in the SDs and the recommendations in the IC allow 
TSA to execute its security responsibilities within the surface 
transportation industry, through awareness of potential security 
incidents and suspicious activities. The SDs require, and the IC 
recommends, the following security measures:
    1. Designate a Cybersecurity Coordinator who is available to TSA 
24/7 to coordinate cybersecurity practices and address any incidents 
that arise;
    2. Report cybersecurity incidents to the Cybersecurity and 
Infrastructure Security Agency (CISA);
    3. Develop a cybersecurity incident response plan; and
    4. Complete a cybersecurity vulnerability assessment to address 
cybersecurity gaps using the form provided by TSA.
    TSA, in conjunction with federal partners such as CISA, will use 
the reports of cybersecurity incidents to evaluate and respond to 
imminent and evolving cybersecurity incidents and threats as they 
occur, and as a basis for creating new cybersecurity policy moving 
forward. This monitoring will allow TSA and federal partners to take 
action to contain threats, take mitigating action, and issue timely 
warnings to similarly-situated entities against further spread of the 
threat. TSA and its federal partners will also use the information to 
inform timely modifications to cybersecurity requirements to improve 
transportation security and national economic security. TSA will use 
the collection of information to ensure compliance with TSA's 
cybersecurity measures required by the SDs and the recommendations 
under the IC.
    Table 1 provides more detail on the measures included in the SDs 
and IC.

   Table 1--Summary of Security Measures in the Security Directive and
                          Information Circular
------------------------------------------------------------------------
            Title                           Security measure
------------------------------------------------------------------------
Designate a Cybersecurity      Owner/Operators are required or
 Coordinator.                   recommended, as applicable, to appoint a
                                U.S. Citizen Cybersecurity Primary and
                                Alternate Coordinator who must or
                                should, as applicable, submit contact
                                information. The Cybersecurity
                                Coordinator serves as the primary
                                contact for cyber-related intelligence
                                information and cybersecurity-related
                                activities and communications with TSA
                                and CISA; must/should be accessible to
                                TSA and CISA 24 hours a day, seven days
                                a week; must/should coordinate cyber and
                                related security practices and
                                procedures internally; and must/should
                                work with appropriate law enforcement
                                and emergency response agencies.
Cybersecurity Incident         Owner/Operators Cybersecurity
 Reporting.                     Coordinators are required or
                                recommended, as applicable, to report
                                actual and potential cybersecurity
                                incidents to CISA within 24 hours of
                                identification of a cybersecurity
                                incident. The information provided to
                                CISA pursuant to the SD is shared with
                                TSA and may also be shared with the
                                National Response Center and other
                                agencies as appropriate. Conversely,
                                information provided to TSA pursuant to
                                this directive is shared with CISA and
                                may also be shared with the National
                                Response Center and other agencies as
                                appropriate. Cybersecurity incident
                                reports are submitted using the CISA
                                Reporting System form at: https://us-cert.cisa.gov/forms/report. Incident
                                reports can also be reported by calling
                                (888) 282-0870. CISA has an approved
                                information collection for cybersecurity
                                incident reporting. See OMB control
                                number 1670-0037.
Cybersecurity Incident         Owner/Operators are required or
 Response Plan.                 recommended, as applicable, to develop
                                and adopt a Cybersecurity Incident
                                Response Plan to reduce the risk of
                                operational disruption should their
                                Information Technology and/or
                                Operational Technology systems be
                                affected by a cybersecurity incident.
                                Owner/operators must provide or are
                                recommended to provide, as applicable,
                                evidence of compliance to TSA upon
                                request.

[[Page 72990]]

 
Cybersecurity Vulnerability    Owner/Operators are required or
 Assessment.                    recommended, as applicable, to assess
                                their current cybersecurity posture
                                consistent with the functions and
                                categories found in the National
                                Institute of Standards and Technology
                                Cybersecurity Guidance Framework. The
                                assessment and identification of
                                cybersecurity gaps must or should, as
                                applicable, be completed using a using a
                                form provided by TSA. As part of this
                                assessment, the owners and operators
                                must/may identify remediation measures
                                to address the vulnerabilities and
                                cybersecurity gaps identified during the
                                assessment and a plan for implementing
                                the identified measures if necessary,
                                and report the results to TSA.
                               TSA will use the results of the
                                assessments to make a global assessment
                                of the cyber risk posture of the
                                industry and possibly impose additional
                                security measures as appropriate or
                                necessary. TSA may also use the
                                information, with company-specific data
                                redacted, for TSA's intelligence-derived
                                reports. TSA and CISA may also use
                                information submitted for vulnerability
                                identification, trend analysis, or to
                                generate anonymized indicators of
                                compromise or other cybersecurity
                                products to prevent other cybersecurity
                                incidents. All reported information will
                                be protected in a manner appropriate for
                                the sensitivity and criticality of the
                                information.
------------------------------------------------------------------------

Certification of Completion of SD Requirements

    The SDs and IC took effect on December 31, 2021. Within 7 days of 
the effective date of the SDs, owner/operators must provide their 
designated Cybersecurity Coordinator information; within 90 days of the 
effective date of the SDs owner/operators must complete the 
Vulnerability Assessment (TSA form); within 180 days of the effective 
date of the SDs, owner/operators must adopt a Cybersecurity Incident 
Response Plan; within 7 days of completing the Cybersecurity Incident 
Response Plan requirement, owner/operators must submit a statement to 
TSA via email certifying that the owner/operator has completed this 
requirement of the SD. Owner/Operators can complete and submit the 
required information via email or other electronic options provided by 
TSA. Documentation of compliance must be provided upon request. As the 
measures in the IC are voluntary, the IC does not require owner/
operators to report on their compliance.
    Portions of the responses that are deemed Sensitive Security 
Information (SSI) are protected in accordance with procedures meeting 
the transmission, handling, and storage requirements of SSI set forth 
in 49 CFR part 15 and 1520.
    TSA estimates this collection applies to 457 railroad owner/
operators, 115 public transportation agencies and rail transit system 
owner/operators, and 209 over-the-road bus owner/operators, for a total 
of 781 respondents. TSA estimates the total hour burden for this 
collection to be 96,163 hours.

    Dated: December 20, 2021.
Christina A. Walsh,
TSA Paperwork Reduction Act Officer, Information Technology.
[FR Doc. 2021-27886 Filed 12-22-21; 8:45 am]
BILLING CODE 9110-05-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.