Intent To Request an Extension From OMB of One Current Public Collection of Information: Pipeline Corporate Security Review Program, 59816-59818 [2022-21400]

Download as PDF lotter on DSK11XQN23PROD with NOTICES1 59816 Federal Register / Vol. 87, No. 190 / Monday, October 3, 2022 / Notices minutes to complete. The feedback survey will be administered via Survey Monkey and settings will be updated to opt out of collecting participants’ IP addresses. There are no recordkeeping, capital, start-up, or maintenance costs associated with this information collection. There is no submission or filing fee associated with this collection. As all forms are completed via the LogicManager platform and SurveyMonkey, there are no associated collection, printing, or mailing costs. This is a renewal for an existing information collection not a new collection. OMB is particularly interested in comments that: 1. Evaluate whether the proposed collection of information is necessary for the proper performance of the functions of the agency, including whether the information will have practical utility. 2. Evaluate the accuracy of the agency’s estimate of the burden of the proposed collection of information, including the validity of the methodology and assumptions used. 3. Enhance the quality, utility, and clarity of the information to be collected. 4. Minimize the burden of the collection of information on those who are to respond, including through the use of appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of information technology, e.g., permitting electronic submissions of responses. Title of Collection: Nationwide Cyber Security Review Assessment. OMB Control Number: CISA–1670– 0040. Frequency: Annually. Affected Public: State, Local, Tribal, and Territorial entities. Number of Respondents for NCSR Assessment: 3,112. Estimated Time per Respondent Respondents for NCSR Assessment: 2 hours. Number of Respondents for NCSR End User Survey: 215. Estimated Time per Respondent for NCSR End User Survey: 0.17 hours (10 minutes). Total Burden Hours: 6,260. Total Burden Cost (Capital/Startup): $0. Total Recordkeeping Burden: $0. Total Burden Cost (Operating/ Maintaining): $0 VerDate Sep<11>2014 19:00 Sep 30, 2022 Jkt 259001 Total Hourly Burden Cost: $389,427. Robert Costello, Chief Information Officer, Cybersecurity and Infrastructure Security Agency, Department of Homeland Security. [FR Doc. 2022–21407 Filed 9–30–22; 8:45 am] BILLING CODE 9110–9P–P DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request an Extension From OMB of One Current Public Collection of Information: Pipeline Corporate Security Review Program Transportation Security Administration, DHS. ACTION: 60-day notice. AGENCY: The Transportation Security Administration (TSA) invites public comment on one currently-approved Information Collection Request (ICR), Office of Management and Budget (OMB) control number 1652–0056, abstracted below, that we will submit to OMB for an extension in compliance with the Paperwork Reduction Act (PRA). On July 29, 2022, OMB approved TSA’s request for an emergency revision of this collection to address the ongoing cybersecurity threat to pipeline systems and associated infrastructure. TSA is now seeking to renew the collection, which expires on January 31, 2023, with incorporation of the subject of the emergency revision. The ICR describes the nature of the information collection and its expected burden. The collection allows TSA to assess the current security practices in the pipeline industry through TSA’s Pipeline Corporate Security Review (PCSR) program and allows for the continued institution of mandatory cybersecurity requirements under the TSA Security Directive (SD) Pipeline 2021–02 series. The PCSR program is part of the larger domain awareness, prevention, and protection program supporting TSA’s and the Department of Homeland Security’s missions. The updated ICR reflects changes to collection requirements based on TSA’s update to the TSA SD 2021–02 series, released on July 21, 2022. DATES: Send your comments by December 2, 2022. ADDRESSES: Comments may be emailed to TSAPRA@tsa.dhs.gov or delivered to the TSA PRA Officer, Information Technology (IT), TSA–11, Transportation Security Administration, 6595 Springfield Center Drive, Springfield, VA 20598–6011. SUMMARY: PO 00000 Frm 00047 Fmt 4703 Sfmt 4703 FOR FURTHER INFORMATION CONTACT: Christina A. Walsh at the above address, or by telephone (571) 227–2062. SUPPLEMENTARY INFORMATION: Comments Invited In accordance with the Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et seq.), an agency may not conduct or sponsor, and a person is not required to respond to, a collection of information unless it displays a valid OMB control number. The ICR documentation will be available at https://www.reginfo.gov upon its submission to OMB. Therefore, in preparation for OMB review and approval of the following information collection, TSA is soliciting comments to— (1) Evaluate whether the proposed information requirement is necessary for the proper performance of the functions of the agency, including whether the information will have practical utility; (2) Evaluate the accuracy of the agency’s estimate of the burden; (3) Enhance the quality, utility, and clarity of the information to be collected; and (4) Minimize the burden of the collection of information on those who are to respond, including using appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of information technology. Information Collection Requirement OMB Control Number 1652–0056; Pipeline Corporate Security Review (PCSR) Program. Under the Aviation and Transportation Security Act 1 and delegated authority from the Secretary of Homeland Security, TSA has broad responsibility and authority for ‘‘security in all modes of transportation . . . including security responsibilities . . . over modes of transportation that are exercised by the Department of Transportation.’’ 2 TSA is specifically empowered to assess threats to transportation; 3 develop policies, strategies, and plans for dealing with 1 Public Law 107–71 (115 Stat. 597; Nov. 19, 2001), codified at 49 U.S.C. 114. 2 See 49 U.S.C. 114(d). The TSA Administrator’s current authorities under the Aviation and Transportation Security Act have been delegated to him by the Secretary of Homeland Security. Section 403(2) of the Homeland Security Act (HSA) of 2002, Public Law 107–296 (116 Stat. 2135, Nov. 25, 2002), transferred all functions of TSA, including those of the Secretary of Transportation and the Under Secretary of Transportation of Security related to TSA, to the Secretary of Homeland Security. Pursuant to DHS Delegation Number 7060.2, the Secretary delegated to the Administrator of TSA, subject to the Secretary’s guidance and control, the authority vested in the Secretary with respect to TSA, including that in section 403(2) of the HSA. 3 49 U.S.C. 114(f)(2). E:\FR\FM\03OCN1.SGM 03OCN1 Federal Register / Vol. 87, No. 190 / Monday, October 3, 2022 / Notices threats to transportation; 4 oversee the implementation and adequacy of security measures at transportation facilities; 5 and carry out other appropriate duties relating to transportation security.6 The Implementing Recommendations of the 9/11 Commission Act of 2007 (9/11 Act) included a specific requirement for TSA to conduct assessments of critical pipeline facilities.7 Pursuant to its authority, TSA may, at the discretion of the Administrator, assist another Federal agency, such as the Cybersecurity and Infrastructure Security Agency, in carrying out its authority in order to address a threat to transportation.8 As noted above, TSA issued the SD Pipeline 2021–02 series in order to protect transportation security and critical infrastructure. See 49 U.S.C. 114(l)(2). Consistent with these authorities and requirements, TSA developed the PCSR program to assess the current security practices in the pipeline industry, with a focus on the physical and cyber security of pipelines and the crude oil and petroleum products, such as gasoline, diesel, jet fuel, home heating oil, and natural gas, moving through the system infrastructure. In addition, TSA issued SD 2021–02 in July 2021 and revised the information collection requirements based on the mandatory requirements in SD 2021–02. This ICR was approved by OMB on July 15, 2021. See ICR Reference Number: 202107– 1652–002. lotter on DSK11XQN23PROD with NOTICES1 Establishing Compliance With Voluntary Pipeline Corporate Security Review (PCSR) Program Information Collection Requirements PCSRs are voluntary, face-to-face visits, usually at the headquarters facility of the pipeline Owner/Operator. TSA has developed a Question Set to aid in the conducting of PCSRs. The PCSR Question Set structures the TSAOwner/Operator discussion and is the central data source for the security information TSA collects. TSA developed the PCSR Question Set based on input from government and industry stakeholders on how best to obtain relevant information from a pipeline Owner/Operator about its security plan and processes. This PCSR information collection provides TSA with real-time 4 49 U.S.C. 114(f)(3). U.S.C. 114(f)(11). 6 49 U.S.C. 114(f)(15). 7 See section 1557 of Public Law 110–53 (121 Stat. 266; Aug. 3, 2007) as codified at 6 U.S.C. 1207. 8 Id. § 114(m), granting the TSA Administrator the same authority as the FAA Administrator under 49 U.S.C. 106(m). 5 49 VerDate Sep<11>2014 19:00 Sep 30, 2022 Jkt 259001 information on a company’s security posture. The relationships these face-toface contacts foster are critical to the Federal government’s ability to reach out to the pipeline stakeholders affected by the PCSRs. In addition, TSA follows up via email with Owner/Operators on specific recommendations made by TSA during the PCSR. While the PCSR collection supports security plans and processes, TSA has issued the SDs with mandatory requirements in order to mitigate specific security concerns posed by current threats to national security. Establishing Compliance With Mandatory TSA Security Directive 2021–02 Information Collection Requirements (Emergency Revision) On July 15, 2021, OMB approved TSA’s requests for an emergency revision of this information collection, allowing for the institution of mandatory requirements issued within TSA’s SD 2021–02, on July 19, 2021. See ICR Reference Number: 202107– 1652–002. SD 2021–02 mandated regulated entities to (1) implement critically important mitigation measures to reduce the risk of compromise from a cyberattack; (2) develop and maintain an up-to-date Cybersecurity Contingency/Response Plan; and (3) test the effectiveness of the operator’s cybersecurity practices through an annual cybersecurity architecture design review. In the renewal process of the ICR, TSA published two Federal Register notices on August 27, 2021 and November 15, 2021, respectively, requesting public comment on the information collection requirements for SD 2021–02. Subsequently, on July 26, 2022, OMB approved TSA’s request to extend the information collection. See ICR Reference Number: 202111–1652– 001. On July 21, 2022, TSA issued SD 2021–02C, amending the SD 2021–02 series. This revision was necessary to address the ongoing cybersecurity threat to pipeline systems and associated infrastructure. SD 2021–02C provides Owner/Operators with more flexibility to meet the intended security outcomes while ensuring sustainment of the cybersecurity enhancements accomplished through this SD series. Overall, SD 2021–02C changed the cybersecurity requirements from a prescriptive approach to a security outcome approach. SD 2021–02C also changed the scope of requirements to Critical Cyber Systems, as defined in the SD, and changed cybersecurity assessment requirements. There was no change to the applicability of the SD to Owner/Operators of hazardous liquid PO 00000 Frm 00048 Fmt 4703 Sfmt 4703 59817 and natural gas pipelines or a liquefied natural gas facility notified by TSA that their pipeline system or facility is critical. On July 29, 2022, OMB approved TSA’s request for the emergency revision of this information collection, allowing for the institution of mandatory requirements issued within TSA SD 2021–02C. See ICR Reference Number: 202207–1652–001. SD 2021–02C requires identified Owner/Operators to meet three requirements: 1. Establish and implement a TSAapproved Cybersecurity Implementation Plan that describes the specific cybersecurity measures employed and the schedule for achieving the outcomes described in the SD; and provide to TSA upon request. 2. Develop and maintain a record of an up-to-date Cybersecurity Incident Response Plan to reduce the risk of operational disruption, or the risk of other significant impacts on necessary capacity, as defined in this SD, should the Information and/or Operational Technology systems of a gas or liquid pipeline be affected by a cybersecurity incident; and provide to TSA upon request. 3. Establish a Cybersecurity Assessment Program and submit an annual plan that describes how the Owner/Operator will proactively and regularly assess the effectiveness of cybersecurity measures and identify and resolve device, network, and/or system vulnerabilities; and provide to TSA upon request. The following is a summary of the information collection requirements: 1. Voluntary PCSR information collection requirements: Owner/ Operators complete PCSR Question Set and follow-up requests. 2. Mandatory TSA SD information collection requirements: a. Owner/Operators must submit a Cybersecurity Implementation Plan to TSA for approval, no later than October 25, 2022 (90 days after the effective date of the SD). Once approved by TSA, the Owner/Operator must implement and maintain all measures in the TSAapproved Cybersecurity Implementation Plan within the schedule as stipulated in the plan. b. Consistent with the previous requirement in the SD 2021–02 series, Owner/Operators must have an up-todate Cybersecurity Incident Response Plan. Owner/Operators must submit this Plan to TSA, upon request. c. The Owner/Operator must submit an annual plan for their Cybersecurity Assessment Program to TSA, no later than 60 days after TSA’s approval of the E:\FR\FM\03OCN1.SGM 03OCN1 59818 Federal Register / Vol. 87, No. 190 / Monday, October 3, 2022 / Notices lotter on DSK11XQN23PROD with NOTICES1 Owner/Operator’s Cybersecurity Implementation Plan. The plan must describe the Cybersecurity Assessment Program required by the SD, including the schedule for specific actions. d. Owner/Operators must make records to establish compliance with SD 2021–02C available to TSA upon request for inspection and/or copying. Submissions by pipeline Owner/ Operators in compliance with the voluntary PCSR or the mandatory SD 2021–02C requirements are deemed Sensitive Security Information (SSI) and are protected in accordance with procedures meeting the transmission, handling, and storage requirements of SSI set forth in part 1520 of title 49, Code of Federal Regulations. Annual Burden Discussion For the voluntary PCSR program, the annual hour burden is estimated to be 220 hours based upon 20 PCSR visits per year, each lasting a total of eight hours, and the follow-up regarding security recommendations, lasting up to three hours ((20 × 8 = 160 hours) + (20 × 3 = 60 hours) = 220 hours). For the mandatory information collections required by SD 2021–02C, TSA estimates a total of 100 Owner/ Operators will provide TSA with their Cybersecurity Implementation Plan, their annual plan for their Cybersecurity Assessment Program and, upon request, documentation to establish compliance to include their Cybersecurity Incident Response Plans. TSA estimates 100 entities will develop a Cybersecurity Implementation Plan, and the plan will be developed by a team consisting of a cybersecurity manager and four cybersecurity analysts/specialists. TSA assumes the team will spend two weeks developing the implementation plan; therefore, the time burden for this task will be 40,000 hours (5 individuals × 40 hours × 2 weeks.) TSA estimates 100 entities will establish and update their Cybersecurity Incident Response Plans annually, and the time burden to produce this update is 80 hours (total—8,000 hours).9 TSA estimates 100 entities will submit an annual plan for their Cybersecurity Assessment Program, and the time burden for submitting an annual audit plan to TSA is 40 hours (total—4,000 hours). TSA estimates 100 entities will develop compliance documentation and 9 There is no requirement for Owner/Operators to submit Cybersecurity Incident Response Plans unless requested by TSA. In February 2022, under the provisions of the SD 2021–02 series and at TSA’s request, pipeline Owner/Operators provided their Cybersecurity Incident Response Plan to TSA. VerDate Sep<11>2014 19:00 Sep 30, 2022 Jkt 259001 the time burden for this requirement is 80 hours (total 8,000 hours). TSA estimates the total annual burden hours for the mandatory collection to be 20,220 hours (PCSR–220, Cybersecurity Incident Response Plan-8,000, Annual Plan for Cybersecurity Assessment4,000, Compliance Documentation8,000). In addition, the one-time burden for the development and submission to TSA of the Owner/Operator’s Cybersecurity Implementation Plan is 40,000 hours. TSA is seeking renewal of this information collection for the maximum three-year approval period. Dated: September 28, 2022. Christina A. Walsh, TSA Paperwork Reduction Act Officer, Information Technology. [FR Doc. 2022–21400 Filed 9–30–22; 8:45 am] BILLING CODE 9110–05–P DEPARTMENT OF THE INTERIOR Bureau of Land Management [LLWY920000 L1320000 PP0000 223] Notice of Intent To Amend the Resource Management Plans for the Buffalo Field Office, Wyoming, and Miles City Field Office, Montana, and Prepare Associated Supplemental Environmental Impact Statements Bureau of Land Management, Interior. ACTION: Notice of intent. AGENCY: In compliance with the National Environmental Policy Act of 1969, as amended (NEPA), and the Federal Land Policy and Management Act of 1976, as amended, the Bureau of Land Management (BLM) Wyoming and Montana/Dakotas State Directors each intend to prepare Resource Management Plan (RMP) amendments with associated Supplemental Environmental Impact Statements (EIS) for the Supplemental EIS and Potential RMP for the Buffalo Approved RMP and the Supplemental EIS and Potential RMP Amendment for the Miles City Approved RMP and by this notice are announcing the beginning of the scoping periods to solicit public comments and identify issues, and are providing the planning criteria for public review. DATES: The BLM requests the public submit comments concerning the scope of these analyses, potential alternatives, and identification of relevant information and studies by November 2, 2022. To afford the BLM the opportunity to consider issues raised by SUMMARY: PO 00000 Frm 00049 Fmt 4703 Sfmt 4703 commenters in the Draft RMP amendments/Supplemental EISs, please ensure your comments are received prior to the close of the 30-day scoping period or 15 days after the last public meeting, whichever is later. The Buffalo Field Office will host a public meeting at the Campbell County Public Library, 2101 S 4J Road, Gillette, WY, from 5 p.m. to 7 p.m. on October 17, 2022. The Miles City Field Office will host a public meeting at the Miles City Field Office, 111 Garryowen Road, Miles City, Montana, from 5 p.m. to 7 p.m. on Oct 18, 2022. ADDRESSES: You may submit comments on issues and planning criteria related to the Buffalo Field Office RMP amendment/Supplemental EIS by any of the following methods: • Website: https://eplanning.blm.gov/ eplanning-ui/project/2021239/510. • Mail: Buffalo RMP Amendment/ Supplemental EIS, Attn: Thomas Bills, Project Manager, BLM Buffalo Field Office, 1425 Fort Street, Buffalo, WY 82834. Documents pertinent to this proposal may be examined online at https:// eplanning.blm.gov/eplanning-ui/ project/2021239/510 and at the Buffalo Field Office. You may submit comments on issues and planning criteria related to the Miles City Field Office RMP Amendment/Supplemental EIS by any of the following methods: • Website: https://eplanning.blm.gov (search for DOI–BLM–MT–2022–0086– RMP–EIS). • Mail: Miles City RMP Amendment/ Supplemental EIS, Attn: Irma Nansel, Project Manager, BLM Miles City Field Office, 111 Garryowen Road, Miles City, MT 59301. Documents pertinent to this proposal may be examined online at https:// eplanning.blm.gov (search for DOI– BLM–MT–2022–0086–RMP–EIS) and at the Miles City Field Office. FOR FURTHER INFORMATION CONTACT: The Buffalo Field Office RMP amendment/ Supplemental EIS contact is Thomas Bills, Project Manager, telephone 307– 684–1131; address BLM Buffalo Field Office, 1425 Fort Street Buffalo, WY 82834; email tbills@blm.gov. Contact Mr. Bills to have your name added to the Buffalo RMP amendment/ Supplemental EIS mailing list. The Miles City Field Office RMP amendment/Supplemental EIS contact is Irma Nansel, Project Manager, telephone (406) 233–3653; address BLM Miles City Field Office, 111 Garryowen Road, Miles City, MT, 59301; email inansel@blm.gov. Contact Ms. Nansel to have your name added to the Miles City E:\FR\FM\03OCN1.SGM 03OCN1

Agencies

[Federal Register Volume 87, Number 190 (Monday, October 3, 2022)]
[Notices]
[Pages 59816-59818]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2022-21400]


-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Transportation Security Administration


Intent To Request an Extension From OMB of One Current Public 
Collection of Information: Pipeline Corporate Security Review Program

AGENCY: Transportation Security Administration, DHS.

ACTION: 60-day notice.

-----------------------------------------------------------------------

SUMMARY: The Transportation Security Administration (TSA) invites 
public comment on one currently-approved Information Collection Request 
(ICR), Office of Management and Budget (OMB) control number 1652-0056, 
abstracted below, that we will submit to OMB for an extension in 
compliance with the Paperwork Reduction Act (PRA). On July 29, 2022, 
OMB approved TSA's request for an emergency revision of this collection 
to address the ongoing cybersecurity threat to pipeline systems and 
associated infrastructure. TSA is now seeking to renew the collection, 
which expires on January 31, 2023, with incorporation of the subject of 
the emergency revision. The ICR describes the nature of the information 
collection and its expected burden. The collection allows TSA to assess 
the current security practices in the pipeline industry through TSA's 
Pipeline Corporate Security Review (PCSR) program and allows for the 
continued institution of mandatory cybersecurity requirements under the 
TSA Security Directive (SD) Pipeline 2021-02 series. The PCSR program 
is part of the larger domain awareness, prevention, and protection 
program supporting TSA's and the Department of Homeland Security's 
missions. The updated ICR reflects changes to collection requirements 
based on TSA's update to the TSA SD 2021-02 series, released on July 
21, 2022.

DATES: Send your comments by December 2, 2022.

ADDRESSES: Comments may be emailed to [email protected] or delivered 
to the TSA PRA Officer, Information Technology (IT), TSA-11, 
Transportation Security Administration, 6595 Springfield Center Drive, 
Springfield, VA 20598-6011.

FOR FURTHER INFORMATION CONTACT:  Christina A. Walsh at the above 
address, or by telephone (571) 227-2062.

SUPPLEMENTARY INFORMATION:

Comments Invited

    In accordance with the Paperwork Reduction Act of 1995 (44 U.S.C. 
3501 et seq.), an agency may not conduct or sponsor, and a person is 
not required to respond to, a collection of information unless it 
displays a valid OMB control number. The ICR documentation will be 
available at https://www.reginfo.gov upon its submission to OMB. 
Therefore, in preparation for OMB review and approval of the following 
information collection, TSA is soliciting comments to--
    (1) Evaluate whether the proposed information requirement is 
necessary for the proper performance of the functions of the agency, 
including whether the information will have practical utility;
    (2) Evaluate the accuracy of the agency's estimate of the burden;
    (3) Enhance the quality, utility, and clarity of the information to 
be collected; and
    (4) Minimize the burden of the collection of information on those 
who are to respond, including using appropriate automated, electronic, 
mechanical, or other technological collection techniques or other forms 
of information technology.

Information Collection Requirement

    OMB Control Number 1652-0056; Pipeline Corporate Security Review 
(PCSR) Program. Under the Aviation and Transportation Security Act \1\ 
and delegated authority from the Secretary of Homeland Security, TSA 
has broad responsibility and authority for ``security in all modes of 
transportation . . . including security responsibilities . . . over 
modes of transportation that are exercised by the Department of 
Transportation.'' \2\ TSA is specifically empowered to assess threats 
to transportation; \3\ develop policies, strategies, and plans for 
dealing with

[[Page 59817]]

threats to transportation; \4\ oversee the implementation and adequacy 
of security measures at transportation facilities; \5\ and carry out 
other appropriate duties relating to transportation security.\6\ The 
Implementing Recommendations of the 9/11 Commission Act of 2007 (9/11 
Act) included a specific requirement for TSA to conduct assessments of 
critical pipeline facilities.\7\
---------------------------------------------------------------------------

    \1\ Public Law 107-71 (115 Stat. 597; Nov. 19, 2001), codified 
at 49 U.S.C. 114.
    \2\ See 49 U.S.C. 114(d). The TSA Administrator's current 
authorities under the Aviation and Transportation Security Act have 
been delegated to him by the Secretary of Homeland Security. Section 
403(2) of the Homeland Security Act (HSA) of 2002, Public Law 107-
296 (116 Stat. 2135, Nov. 25, 2002), transferred all functions of 
TSA, including those of the Secretary of Transportation and the 
Under Secretary of Transportation of Security related to TSA, to the 
Secretary of Homeland Security. Pursuant to DHS Delegation Number 
7060.2, the Secretary delegated to the Administrator of TSA, subject 
to the Secretary's guidance and control, the authority vested in the 
Secretary with respect to TSA, including that in section 403(2) of 
the HSA.
    \3\ 49 U.S.C. 114(f)(2).
    \4\ 49 U.S.C. 114(f)(3).
    \5\ 49 U.S.C. 114(f)(11).
    \6\ 49 U.S.C. 114(f)(15).
    \7\ See section 1557 of Public Law 110-53 (121 Stat. 266; Aug. 
3, 2007) as codified at 6 U.S.C. 1207.
---------------------------------------------------------------------------

    Pursuant to its authority, TSA may, at the discretion of the 
Administrator, assist another Federal agency, such as the Cybersecurity 
and Infrastructure Security Agency, in carrying out its authority in 
order to address a threat to transportation.\8\ As noted above, TSA 
issued the SD Pipeline 2021-02 series in order to protect 
transportation security and critical infrastructure. See 49 U.S.C. 
114(l)(2).
---------------------------------------------------------------------------

    \8\ Id. Sec.  114(m), granting the TSA Administrator the same 
authority as the FAA Administrator under 49 U.S.C. 106(m).
---------------------------------------------------------------------------

    Consistent with these authorities and requirements, TSA developed 
the PCSR program to assess the current security practices in the 
pipeline industry, with a focus on the physical and cyber security of 
pipelines and the crude oil and petroleum products, such as gasoline, 
diesel, jet fuel, home heating oil, and natural gas, moving through the 
system infrastructure. In addition, TSA issued SD 2021-02 in July 2021 
and revised the information collection requirements based on the 
mandatory requirements in SD 2021-02. This ICR was approved by OMB on 
July 15, 2021. See ICR Reference Number: 202107-1652-002.

Establishing Compliance With Voluntary Pipeline Corporate Security 
Review (PCSR) Program Information Collection Requirements

    PCSRs are voluntary, face-to-face visits, usually at the 
headquarters facility of the pipeline Owner/Operator. TSA has developed 
a Question Set to aid in the conducting of PCSRs. The PCSR Question Set 
structures the TSA-Owner/Operator discussion and is the central data 
source for the security information TSA collects. TSA developed the 
PCSR Question Set based on input from government and industry 
stakeholders on how best to obtain relevant information from a pipeline 
Owner/Operator about its security plan and processes.
    This PCSR information collection provides TSA with real-time 
information on a company's security posture. The relationships these 
face-to-face contacts foster are critical to the Federal government's 
ability to reach out to the pipeline stakeholders affected by the 
PCSRs. In addition, TSA follows up via email with Owner/Operators on 
specific recommendations made by TSA during the PCSR.
    While the PCSR collection supports security plans and processes, 
TSA has issued the SDs with mandatory requirements in order to mitigate 
specific security concerns posed by current threats to national 
security.

Establishing Compliance With Mandatory TSA Security Directive 2021-02 
Information Collection Requirements (Emergency Revision)

    On July 15, 2021, OMB approved TSA's requests for an emergency 
revision of this information collection, allowing for the institution 
of mandatory requirements issued within TSA's SD 2021-02, on July 19, 
2021. See ICR Reference Number: 202107-1652-002. SD 2021-02 mandated 
regulated entities to (1) implement critically important mitigation 
measures to reduce the risk of compromise from a cyberattack; (2) 
develop and maintain an up-to-date Cybersecurity Contingency/Response 
Plan; and (3) test the effectiveness of the operator's cybersecurity 
practices through an annual cybersecurity architecture design review. 
In the renewal process of the ICR, TSA published two Federal Register 
notices on August 27, 2021 and November 15, 2021, respectively, 
requesting public comment on the information collection requirements 
for SD 2021-02. Subsequently, on July 26, 2022, OMB approved TSA's 
request to extend the information collection. See ICR Reference Number: 
202111-1652-001.
    On July 21, 2022, TSA issued SD 2021-02C, amending the SD 2021-02 
series. This revision was necessary to address the ongoing 
cybersecurity threat to pipeline systems and associated infrastructure. 
SD 2021-02C provides Owner/Operators with more flexibility to meet the 
intended security outcomes while ensuring sustainment of the 
cybersecurity enhancements accomplished through this SD series.
    Overall, SD 2021-02C changed the cybersecurity requirements from a 
prescriptive approach to a security outcome approach. SD 2021-02C also 
changed the scope of requirements to Critical Cyber Systems, as defined 
in the SD, and changed cybersecurity assessment requirements. There was 
no change to the applicability of the SD to Owner/Operators of 
hazardous liquid and natural gas pipelines or a liquefied natural gas 
facility notified by TSA that their pipeline system or facility is 
critical.
    On July 29, 2022, OMB approved TSA's request for the emergency 
revision of this information collection, allowing for the institution 
of mandatory requirements issued within TSA SD 2021-02C. See ICR 
Reference Number: 202207-1652-001.
    SD 2021-02C requires identified Owner/Operators to meet three 
requirements:
    1. Establish and implement a TSA-approved Cybersecurity 
Implementation Plan that describes the specific cybersecurity measures 
employed and the schedule for achieving the outcomes described in the 
SD; and provide to TSA upon request.
    2. Develop and maintain a record of an up-to-date Cybersecurity 
Incident Response Plan to reduce the risk of operational disruption, or 
the risk of other significant impacts on necessary capacity, as defined 
in this SD, should the Information and/or Operational Technology 
systems of a gas or liquid pipeline be affected by a cybersecurity 
incident; and provide to TSA upon request.
    3. Establish a Cybersecurity Assessment Program and submit an 
annual plan that describes how the Owner/Operator will proactively and 
regularly assess the effectiveness of cybersecurity measures and 
identify and resolve device, network, and/or system vulnerabilities; 
and provide to TSA upon request.
    The following is a summary of the information collection 
requirements:
    1. Voluntary PCSR information collection requirements: Owner/
Operators complete PCSR Question Set and follow-up requests.
    2. Mandatory TSA SD information collection requirements:
    a. Owner/Operators must submit a Cybersecurity Implementation Plan 
to TSA for approval, no later than October 25, 2022 (90 days after the 
effective date of the SD). Once approved by TSA, the Owner/Operator 
must implement and maintain all measures in the TSA-approved 
Cybersecurity Implementation Plan within the schedule as stipulated in 
the plan.
    b. Consistent with the previous requirement in the SD 2021-02 
series, Owner/Operators must have an up-to-date Cybersecurity Incident 
Response Plan. Owner/Operators must submit this Plan to TSA, upon 
request.
    c. The Owner/Operator must submit an annual plan for their 
Cybersecurity Assessment Program to TSA, no later than 60 days after 
TSA's approval of the

[[Page 59818]]

Owner/Operator's Cybersecurity Implementation Plan. The plan must 
describe the Cybersecurity Assessment Program required by the SD, 
including the schedule for specific actions.
    d. Owner/Operators must make records to establish compliance with 
SD 2021-02C available to TSA upon request for inspection and/or 
copying.
    Submissions by pipeline Owner/Operators in compliance with the 
voluntary PCSR or the mandatory SD 2021-02C requirements are deemed 
Sensitive Security Information (SSI) and are protected in accordance 
with procedures meeting the transmission, handling, and storage 
requirements of SSI set forth in part 1520 of title 49, Code of Federal 
Regulations.

Annual Burden Discussion

    For the voluntary PCSR program, the annual hour burden is estimated 
to be 220 hours based upon 20 PCSR visits per year, each lasting a 
total of eight hours, and the follow-up regarding security 
recommendations, lasting up to three hours ((20 x 8 = 160 hours) + (20 
x 3 = 60 hours) = 220 hours).
    For the mandatory information collections required by SD 2021-02C, 
TSA estimates a total of 100 Owner/Operators will provide TSA with 
their Cybersecurity Implementation Plan, their annual plan for their 
Cybersecurity Assessment Program and, upon request, documentation to 
establish compliance to include their Cybersecurity Incident Response 
Plans.
    TSA estimates 100 entities will develop a Cybersecurity 
Implementation Plan, and the plan will be developed by a team 
consisting of a cybersecurity manager and four cybersecurity analysts/
specialists. TSA assumes the team will spend two weeks developing the 
implementation plan; therefore, the time burden for this task will be 
40,000 hours (5 individuals x 40 hours x 2 weeks.)
    TSA estimates 100 entities will establish and update their 
Cybersecurity Incident Response Plans annually, and the time burden to 
produce this update is 80 hours (total--8,000 hours).\9\
---------------------------------------------------------------------------

    \9\ There is no requirement for Owner/Operators to submit 
Cybersecurity Incident Response Plans unless requested by TSA. In 
February 2022, under the provisions of the SD 2021-02 series and at 
TSA's request, pipeline Owner/Operators provided their Cybersecurity 
Incident Response Plan to TSA.
---------------------------------------------------------------------------

    TSA estimates 100 entities will submit an annual plan for their 
Cybersecurity Assessment Program, and the time burden for submitting an 
annual audit plan to TSA is 40 hours (total--4,000 hours).
    TSA estimates 100 entities will develop compliance documentation 
and the time burden for this requirement is 80 hours (total 8,000 
hours).
    TSA estimates the total annual burden hours for the mandatory 
collection to be 20,220 hours (PCSR-220, Cybersecurity Incident 
Response Plan-8,000, Annual Plan for Cybersecurity Assessment-4,000, 
Compliance Documentation-8,000). In addition, the one-time burden for 
the development and submission to TSA of the Owner/Operator's 
Cybersecurity Implementation Plan is 40,000 hours.
    TSA is seeking renewal of this information collection for the 
maximum three-year approval period.

    Dated: September 28, 2022.
Christina A. Walsh,
TSA Paperwork Reduction Act Officer, Information Technology.
[FR Doc. 2022-21400 Filed 9-30-22; 8:45 am]
BILLING CODE 9110-05-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.