Department of Defense (DoD) Defense Industrial Base (DIB) Cybersecurity (CS) Activities, 27832-27839 [2023-09021]
Download as PDF
27832
Federal Register / Vol. 88, No. 85 / Wednesday, May 3, 2023 / Proposed Rules
§ 1.6038B–1T Reporting of certain
transactions to foreign corporations
(temporary).
*
*
*
*
*
(d) * * *
(2) * * *
(iii) Subsequent transfer. For further
guidance, see § 1.6038B–1(d)(2)(iii)
introductory text:
*
*
*
*
*
Douglas W. O’Donnell,
Deputy Commissioner for Services and
Enforcement.
[FR Doc. 2023–08843 Filed 5–2–23; 8:45 am]
BILLING CODE 4830–01–P
The Defense Industrial Base (DIB)
means the Department of Defense,
Government, and private sector
worldwide industrial complex with
capabilities to perform research and
development, design, produce, and
maintain military weapon systems,
subsystems, components, or parts to
satisfy military requirements. The DIB
Cybersecurity Program is a voluntary
program to enhance and supplement
participants’ capabilities to safeguard
DoD information that resides on, or
transits, DIB unclassified information
systems. The program encourages
greater threat information sharing to
complement mandatory aspects of
DoD’s DIB cybersecurity activities
which are contractually mandated
through Defense Federal Acquisition
Regulation Supplement (DFARS)
252.204–7012, Safeguarding Covered
Defense Information and Cyber Incident
Reporting.1 This program supports and
complements DoD-specific authorities at
10 U.S.C. 2224 and the Federal
Information Security Management Act
(FISMA) (44 U.S.C. 3541 et seq.). Cyber
threat information sharing activities
under this proposed rule also fulfill
important elements of DoD’s critical
infrastructure protection
responsibilities, as the sector risk
management agency for the DIB (see
Presidential Policy Directive 21 (PPD–
21),2 ‘‘Critical Infrastructure Security
and Resilience’’). Expanding eligibility
requirements for the DIB CS Program
will augment DoD’s information sharing
activities with the DIB.
Currently, the DIB CS Program has the
following objectives:
• Establish a voluntary, mutually
acceptable framework to protect
information from unauthorized access.
• Protect the confidentiality of
information exchanged to the maximum
extent authorized by law.
• Create a trusted environment to
maximize network defense and
remediation efforts by:
1. Sharing cyber threat information
and incident reports.
2. Providing mitigation/remediation
strategies and malware analysis.
This program is part of DoD’s larger
portfolio of work to protect DoD
information handled by the DIB by
understanding and sharing information,
building security partnerships,
implementing long-term risk
management programs, and maximizing
efficient use of resources. It supports
two-way information sharing and
maintains meaningful relationships and
frequent dialogue across the diverse
array of eligible defense contractors. For
eligible defense contractors, the program
maintains a capability for companies to
access classified government cyber
threat information providing additional
context to better understand the cyber
threats targeting their networks and
information systems.
In May 2012, DoD published an
interim final rule establishing the
voluntary DIB CS Program and the
bilateral information sharing model still
used today.3 The 2012 rule established
a voluntary cyber threat information
sharing program for cleared defense
contractors (CDC) with the ability to
safeguard classified information,
estimated at 2,650 in 2012. Under the
rule cleared defense contractor is
defined as a private entity granted
clearance by DoD to access, receive, or
store classified information for the
purpose of bidding for a contract or
conducting activities in support of any
program of DoD. The 2012 rule stated
DoD would maintain a website to
facilitate the following aspects of
program participation: (1) sharing
information regarding eligibility and
participation in the program with
potential participants, (2) applying to
the program online, and (3) executing
the necessary agreements with the
Government. DoD has established this
capability as an online portal referred to
as ‘‘DIBNet,’’ located at https://
dibnet.dod.mil. A final rule responding
to public comments was published in
October 2013.4 In October 2015,
responding to new statutory
requirements for cyber incident
reporting for DoD contractors,
1 https://www.ecfr.gov/current/title-48/chapter-2/
subchapter-H/part-252/subpart-252.2/section252.204-7012.
2 https://obamawhitehouse.archives.gov/thepress-office/2013/02/12/presidential-policydirective-critical-infrastructure-security-and-resil.
3 77 FR 27615, May 11, 2012 (https://
www.govinfo.gov/content/pkg/FR-2012-05-11/pdf/
2012-10651.pdf).
4 78 FR 62430, October 22, 2013 (https://
www.govinfo.gov/content/pkg/FR-2013-10-22/pdf/
2013-24256.pdf).
available for public viewing as they are
received without change, including any
personal identifiers or contact
information provided by the
commenter.
FOR FURTHER INFORMATION CONTACT:
• Stacy Bostjanick, Chief Defense
Industrial Base Cybersecurity, Office:
703–604–3167.
• DIB CS Program Management
Office: OSD.DIBCSIA@mail.mil.
Instructions: DO NOT submit
comments to this email address.
SUPPLEMENTARY INFORMATION:
Background and Authority
DEPARTMENT OF DEFENSE
Office of the Secretary
32 CFR Part 236
[Docket ID: DOD–2019–OS–0112]
RIN 0790–AK86
Department of Defense (DoD) Defense
Industrial Base (DIB) Cybersecurity
(CS) Activities
Office of the DoD Chief
Information Officer, Department of
Defense (DoD).
ACTION: Proposed rule.
AGENCY:
The DoD is proposing
revisions to the eligibility criteria for the
voluntary Defense Industrial Base (DIB)
Cybersecurity (CS) Program. These
revisions will allow a broader
community of defense contractors to
benefit from bilateral information
sharing as when this proposed rule is
finalized all defense contractors who are
subject to mandatory cyber incident
reporting will be able to participate.
DoD is also proposing changes to
definitions and some technical
corrections for readability.
DATES: Comments must be received by
June 20, 2023.
ADDRESSES: Please submit comments on
this proposed rule, identified by 32 CFR
part 236, Docket ID: DOD–2019–OS–
0112 and/or by Regulatory Information
Number (RIN) 0790–AK86, by any of the
following methods:
• Federal Rulemaking Portal: https://
www.regulations.gov. Follow the
instructions for submitting comments.
• Mail: Department of Defense, Office
of the Assistant to the Secretary of
Defense for Privacy, Civil Liberties, and
Transparency, Regulatory Directorate,
4800 Mark Center Drive, Mailbox #24,
Suite 08D09, Alexandria, VA 22350–
1700.
Instructions: The general policy for
comments is to make these submissions
lotter on DSK11XQN23PROD with PROPOSALS1
SUMMARY:
VerDate Sep<11>2014
18:28 May 02, 2023
Jkt 259001
PO 00000
Frm 00121
Fmt 4702
Sfmt 4702
E:\FR\FM\03MYP1.SGM
03MYP1
Federal Register / Vol. 88, No. 85 / Wednesday, May 3, 2023 / Proposed Rules
subcontractors, and those providing
operationally critical support, DoD
published another interim final rule 5 to
expand eligibility to all cleared defense
contractors (estimated at 8,500 in 2015
and 12,000 in 2022), subject to program
eligibility requirements. The 2015 rule
removed the safeguarding requirement
to participate in the program. The rule
also removed the mandatory program
eligibility requirement to have or
acquire a Communications Security
(COMSEC) account 6 and obtain access
to DoD’s secure voice and data
transmission systems, although
participants still have to fulfill these
requirements to receive classified cyber
threat information electronically. A final
rule responding to public comments
was published in October 2016.7
lotter on DSK11XQN23PROD with PROPOSALS1
Discussion of the Proposed Rule
With this rule, the Department
proposes to expand eligibility
requirements to allow greater program
participation and increase the benefits
of bilateral information sharing, which
helps protect DoD controlled
unclassified information from
cyberattack, as well as to better align the
voluntary DIB CS Program with DoD’s
mandatory cyber incident reporting
requirements. The current eligibility
requirements, based on the October
2016 rule, requires a company to be a
cleared defense contractor 8 who:
• Has DoD-approved medium
assurance certificates; 9
• Has an existing facility clearance 10
to at least the Secret level;
• Can execute the standardized
Framework Agreement 11 provided to
5 80 FR 59581, October 2, 2015 (https://
www.govinfo.gov/content/pkg/FR-2015-10-02/pdf/
2015-24296.pdf).
6 The National Security Agency administers
COMSEC accounts.
7 81 FR 68312, October 4, 2016 (https://
www.govinfo.gov/content/pkg/FR-2016-10-04/pdf/
2016-23968.pdf).
8 32 CFR 236.2 defines cleared defense contractor
to mean a subset of contractors cleared under the
National Industrial Security Program (NISP) who
have classified contracts with the DoD.
9 The DoD has established the External
Certification Authority (ECA) program to support
the issuance of DoD-approved certificates to
industry partners and other external entities and
organizations. The ECA program is designed to
provide the mechanism for these entities to securely
communicate with the DoD and authenticate to
DoD Information Systems. [https://public.cyber.mil/
eca/].
10 Entities (including companies and academic
institutions) engaged in providing goods or services
to the U.S. Government involving access to or
creation of classified information may be granted a
Facility Clearance (FCL). The Defense
Counterintelligence and Security Agency (DCSA)
processes, issues, and monitors the continued
eligibility of entities for an FCL. [https://
www.dcsa.mil/mc/isd/fc/].
11 Applicants to the DIB CS Program submit an
application from https://dibnet.dod.mil. Once a
VerDate Sep<11>2014
18:28 May 02, 2023
Jkt 259001
interested contractors after the
Department has verified the DIB
company is eligible.
The program has experienced steady
growth, with the annual number of
applications tripling since 2016 (80 total
applications received in 2016, 266 total
applications received in 2022). It has
also seen a steady increase in the
percentage of defense contractors who
are interested in participating but do not
meet current eligibility requirements.
The percentage of applications received
from ineligible defense contractors has
risen at an average rate of 5% per year
since 2016; 10% of applications
received in 2016 were from ineligible
defense contractors, while 45% of
applicants in 2022 were ineligible. This
steady increase in ineligible applicants
indicates an increasing desire amongst
defense contractors to participate in a
cyber threat information sharing
program.
In addition, the Department has
actively engaged defense associations,
universities, and companies in the DIB,
as well as participated in many public
forums discussing cyber threats and the
way forward. The overwhelming
feedback was for the Department to
facilitate engagement with the broader
community of defense contractors
beyond just the cleared defense
community. In general, smaller defense
contractors have fewer resources to
devote to cybersecurity, which may
provide a vector for adversaries to
access information critical to national
security. In addition, the Department is
working on providing more tailored
threat information to support the needs
of a broader community of defense
contractors with varying cybersecurity
capabilities. The gap in eligibility in the
current program, feedback from
interested but ineligible contractors, a
vulnerable DoD supply chain, and a
pervasive cyber threat have prompted
DoD to propose revising the eligibility
requirements of the DIB CS Program to
allow participation by non-cleared
defense contractors.
The maximum number of defense
contractors estimated to be subject to
mandatory cyber incident reporting
under DFARS clause 252.204–7012 is
80,000. The presence of the clause in a
contract does not establish that covered
defense information is shared. DoD is
working on reporting mechanisms to
better assess contractors managing
covered defense information. The
population of defense contractors in
possession of covered defense
information and subject to mandatory
company has been verified, the Framework
Agreement is made available for review.
PO 00000
Frm 00122
Fmt 4702
Sfmt 4702
27833
incident reporting requirements far
exceeds the population of defense
contractors currently eligible to
participate in the voluntary DIB CS
Program. With the proposed changes to
the eligibility criteria, an estimated
additional 68,000 defense contractors
will be eligible to participate in the
voluntary DIB CS Program. Based on
prior participation statistics, it is
estimated that about 10% of the eligible
contractors (12,000 + 68,000 = 80,000)
will actually apply to join the voluntary
DIB CS Program (80,000 × 0.10 = 8,000).
Currently, the DIB CS Program has
approximately 1,000 cleared defense
contractors participating in the program.
Program participants have access to
technical exchange meetings, a
collaborative web platform (DIBNet-U),
and threat products and services
through the DoD Cyber Crime Center
(DC3). DC3 implements the program’s
operations by sharing cyber threat
information and intelligence with the
DIB, and offering a variety of products,
tools, services, and events. DC3 serves
as the single clearinghouse for
unclassified Mandatory Incident
Reports (MIRs) and voluntary threat
information sharing reports.
Changes to Definitions
In addition to the program eligibility
changes described above, DoD is also
proposing the following changes.
§ 236.2 Definitions
1. Access to media—This definition is
being removed as it is no longer used in
the rule text.
3. DIB CS Program participant—This
definition has been revised to align with
the revised eligibility requirements set
forth in this proposed rule.
4. Government furnished information
(GFI)—This definition was revised to
adopt the convention of referring to the
DIB CS Program with a capital ‘P’.
Other Proposed Changes
DoD is amending § 236.5 (DoD’s DIB
CS program) in order to align the
program description with the revised
eligibility requirements. As a result,
references to cleared defense contractors
have been replaced with contractors that
own or operate a covered contractor
information system. Security clearance
information is only collected, when
applicable, if a company elects to
participate in classified information
sharing. In addition, the language
stating participation is typically three to
ten company-designated points of
contact (POC) has been removed, to
avoid confusion regarding the number
of POCs, as some larger companies may
wish to nominate a larger number of
E:\FR\FM\03MYP1.SGM
03MYP1
27834
Federal Register / Vol. 88, No. 85 / Wednesday, May 3, 2023 / Proposed Rules
POCs and smaller companies may wish
to nominate fewer.
DoD is amending § 236.7 (DoD’s DIB
CS program requirements) to remove the
requirement that a company have an
existing active facility clearance (FCL)
to at least the Secret level granted under
32 CFR part 117, National Industrial
Security Program Operating Manual
(NISPOM),12 to be eligible to participate
in the DIB CS Program. In addition,
references to cleared defense contractors
have been replaced with contractors that
own or operate a covered contractor
information system.
A foundational element of the
activities described in this part is the
recognition that the information shared
between DoD and DIB CS Program
participants pursuant to the DIB CS
Program includes extremely sensitive
information that requires protection. For
additional information regarding the
Government’s safeguarding of
information received from contractors
that requires protection, see the Privacy
Impact Assessment (PIA) for the DIB
Cybersecurity Activities located at:
https://dodcio.defense.gov/Portals/0/
Documents/DIB_PIA.pdf. The PIA
provides detailed procedures for
handling personally identifiable
information (PII), attributional
information about the strengths or
vulnerabilities of specific covered
contractor information systems,
information providing a perceived or
real competitive advantage on future
procurement action, and contractor
information marked as proprietary or
commercial or financial information. In
addition, personnel information is
covered by Office of the Secretary of
Defense (OSD) System of Records Notice
(SORN) DCIO 01 (https://
dpcld.defense.gov/Portals/49/
Documents/Privacy/SORNs/OSDJS/
DCIO-01.pdf). No changes to the PIA or
SORN are being proposed in
conjunction with this proposed rule.
Year 1
lotter on DSK11XQN23PROD with PROPOSALS1
DIB CS Participants ..................
Voluntary Reports Received .....
Annual Cost ...............................
1,780
8,900
$1,938,776
Expected Impact of the Proposed Rule
Costs
DoD believes the cost impact of the
proposed changes to this proposed rule
is not significant, as the changes
primarily expand the availability of the
established DIB CS Program to
additional defense contractors. The
newly eligible population of defense
contractors may incur costs to
familiarize themselves with the rule and
those who elect to participate in the
program will incur costs related to
program participation. The Government
will continue to incur costs related to
operating the program. The DIB CS
Program conducts outreach activities to
defense contractors through press
releases, participation in defenseoriented conferences, speaking
engagements, and through digital media.
The program will leverage preestablished channels to message
changes to the program and engage with
the eligible population of defense
contractors. Based on the program
growth experienced that during the last
phase of program expansion the
program is forecasting annual growth at
just over 1% of the eligible population.
At a growth rate of 1% per year it will
take the program approximately 10
years to achieve the estimated 10%
participation rate of the eligible DIB.
Costs to DIB Participants
In order to join the DIB CS Program
there is an initial labor burden for a
defense contractor to familiarize
themselves with the rule and
subsequently apply to the program and
provide POC information. In total, if it
takes each contractor 30 minutes to read
and familiarize him/herself with the
rule, it will take contractors 4,000 hours
to familiarize themselves with the rule
(8,000 participants × .5 = 4,000 hours).
At an hourly wage of $108.92, the total
cost incurred by contractors for rule
familiarization will amount to $108,920
dollars ($108.92 × .5 hours = $54.46 ×
4,000 hours = $217,840). The hourly
labor cost is based on the mean wage
Year 2
Year 3
2,580
12,900
$2,810,136
In addition, DIB CS Program
participants may choose to attend
meetings in conjunction with the DIB
CS Program. All new participants are
Year 4
3,380
16,900
$3,681,496
4,180
20,900
$4,552,856
Year 5
4,980
24,900
$5,424,216
invited to attend an orientation session
and all existing participants are invited
to attend meetings on a quarterly basis.
If a defense contractor chooses to send
estimate from the Bureau of Labor
Statistics for an Information Security
Analysts, Occupational Employment
and Wages, May 2021 and is covered
under information collection 0704–
0490. This hourly wage is adjusted
upward by 100% to account for
overhead and benefits, which implies a
value of $108.92 per hour.
The estimated annual burden for a
company to apply to the program or for
a participating company to update POC
information is $36.31, with a total
annual cost to all participants of
$319,498.67 at peak program
participation. This calculation is based
on 8,000 participants submitting an
average of one application per year and
10% of the population (800
participants) submitting an update each
year, with 20 minutes of labor per
submission, at a cost of $108.92 per
hour ($36.31 ($108.92 × 1⁄3 hours) ×
8,800 events = $319,498.67).
There is an estimated annual burden
projected at $544.60 for defense
contractors voluntarily sharing cyber
threat information. This is based on a
defense contractor electing to submit an
average of five informational reports per
year with two hours of labor per
voluntary submission, at a cost of
$108.92 per hour ($108.92 × 2 hours
each = $217.84 × 5 reports = $1,089.20).
It is estimated that 1% of the newly
eligible population will elect to join the
DIB CS Program annually, which
currently has approximately 1,000
participants, with program growth
plateauing at 10% of the population by
Year 9. The table below shows the costs
to industry to voluntarily sharing cyber
threat information over a 9-year period.
If, in the first year of the program
expanding there are 980 participants
and 800 new participants join the
program, there will be a total of 1,780
participants. Assuming each participant
responds five times, this totals 8,900
annual responses times $217.84 per
response and will equal $1,938,776 in
total annual cost to participants, which
is covered in information collection
0704–0489.
Year 6
5,780
28,900
$6,295,576
Year 7
6,580
32,900
$7,166,936
18:28 May 02, 2023
Jkt 259001
PO 00000
Frm 00123
Fmt 4702
Sfmt 4702
7,380
36,900
$8,038,296
Year 9
8,000
40,000
$8,713,600
an employee to a day-long meeting each
quarter, the defense contractor would
incur a cost of $1,742 ($108.92 × 8 hours
= $871.36 × 4 meetings = $3,485.44).
12 https://www.ecfr.gov/current/title-32/subtitleA/chapter-I/subchapter-D/part-117.
VerDate Sep<11>2014
Year 8
E:\FR\FM\03MYP1.SGM
03MYP1
Federal Register / Vol. 88, No. 85 / Wednesday, May 3, 2023 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS1
Costs to the Government
The DoD has identified general areas
of costs related to the operation of this
program. First, DoD incurs costs to
implement this program operationally
by responding to inquiries, processing
application submissions and collecting,
sharing, and managing POC information
for program administration and
management purposes. Second, DoD
incurs costs to collect, analyze, and
disseminate threat information.
DoD responds to an average of 2,000
questions each year and these responses
are estimated to take 20 minutes per
response. If it takes 20 minutes to
respond to each question, it will take
667 hours to respond to questions. At an
hourly wage of $51.16,13 it will cost the
DoD $34,107 dollars to respond to
questions ($51.16 × (.333 × 2,000) =
$34,107). Costs to the government are
incurred when a company applies to the
DIB CS Program to validate and store
POC information and to perform followup activities with a company when the
information is outdated. The processing
time for these activities is estimated to
be one hour per company. If 8,000
companies participate in the program
and 10% of the companies update
information with the program annually
the labor cost to the government is
expected to be $450,208 = (8,800 ×
$51.16).
In addition, there is a cost incurred by
the DoD to receive cyber threat
information submitted by defense
contractors to have it analyzed by cyber
threat experts at DC3. By year 9 of the
expanded program, it is estimated DC3
will receive 40,000 responses per year,
based on the estimate that each
participating company elects to submit
5 informational reports (8,000
participants × 5 reports). Each product
takes approximately two hours to create
and incurs an hourly labor cost of
$51.16 per hour. This equals $102.32 (2
hours × 51.16) per response. The labor
cost to the government is forecasted to
be $4,092,800 annually after 9 years of
growth. In addition to processing cyber
threat information, the DoD incurs
operational and maintenance costs for
the system receiving and storing cyber
threat information. This system costs
the DoD $5,100,000 annually to
maintain (covered under information
collection 0704–0489).
Benefits
This program benefits the Department
by increasing awareness and improving
13 This
is based upon the 2022 General Schedule
(GS) pay scale for a GS–9 Step 5 and is adjusted
upward by 100% to adjust for overhead and
benefits.
VerDate Sep<11>2014
18:28 May 02, 2023
Jkt 259001
assessments of cyber incidents that may
affect mission critical capabilities and
services. It continues to be an important
element of the Department’s
comprehensive effort to defend DoD
information, protect U.S. national
interests against cyber-attacks, and
support military operations and
contingency plans worldwide. Once a
defense contractor joins the program,
they are encouraged to share
information, including cyber threat
indicators, that they believe may be of
value in alerting the Government and
others, as appropriate, of adversary
activity to enable the development of
mitigation strategies and proactively
counter threat actor activity. DC3
develops written products that include
analysis of the threat, mitigations, and
indicators of adversary activity. Even
cyber incidents that are not
compromises of covered defense
information may be of interest to DoD
for situational awareness purposes. This
information is disseminated as
anonymized threat products that are
shared with authorized DoD personnel,
other Federal agencies, and companydesignated POCs participating in the
DIB CS Program. With the revisions to
the eligibility criteria, the Department
will be able to reduce the impact of
cyber threat activity on DIB networks
and information systems and, in turn,
preserve its technological advantage and
protect DoD information and
warfighting capabilities. The mitigation
of the cyber threat targeting defense
contractors reinforces the nation’s
national security and economic vitality.
For DIB participants, this program
provides valuable cyber threat
information they cannot obtain from
anywhere else and technical assistance
through analyst-to-analyst exchanges,
mitigation and remediation strategies,
and cybersecurity best practices in a
collaborative environment. The shared
unclassified and classified cyber threat
information is used to bolster a
company’s cybersecurity posture and
mitigate the growing cyber threat. The
program’s tailored support for small,
mid-size, and large companies with
varying cybersecurity maturity levels is
an asset for participants. The program
remains a key element of DoD’s
cybersecurity efforts by providing
services to help protect DIB CS Program
participants and the sensitive DoD
information they handle.
Alternatives
Alternative #1
Maintain status quo with the ongoing
voluntary cybersecurity program for
cleared defense contractors.
PO 00000
Frm 00124
Fmt 4702
Sfmt 4702
27835
Reason for Not Selecting Alternative #1
This option is not selected as it does
not allow DoD to increase bilateral
information sharing to bolster DIB
cybersecurity and safeguard DoD
information transiting on DIB networks.
In addition, the population of defense
contractors with mandatory reporting
requirements would continue to exceed
those eligible to participate in the DIB
CS Program. Companies that submit
mandatory reports but are not eligible
for the DIB CS Program would continue
to be excluded from receiving cyber
threat information and technical
assistance.
Alternative #2
DoD posts generic cyber threat
information and cybersecurity best
practices on a publicly accessible
website without directly engaging
participating companies.
Reason for Not Selecting Alternative #2
This alternative was not selected as
companies already have access to opensource cyber threat information and best
practices from multiple sources in the
public sector. This alternative does not
afford access by defense contractors to
government-furnished cyber threat
information, specifically tailored for the
DIB. In addition, this alternative does
not enable defense contractor
interaction with DC3.
Alternative #3
Revise eligibility requirements to
permit all defense contractors who own
or operate a covered contractor
information system (approximately
80,000 defense contractors) to
participate in the DIB CS Program.
Using the 10% estimation used for past
program participation, the program is
forecasted to grow to approximately
8,000 defense contractors.
Reason for Selecting Alternative #3
The revised eligibility criteria allow
DoD to perform outreach to a broader
DIB community. Being able to share
pertinent cyber threat information with
the DIB will increase both the DoD and
defense contractors’ knowledge of the
cyber threat landscape. Giving DoD the
ability to have greater visibility over
issues affecting unclassified networks
will allow DoD to share pertinent alerts
and threat information with a larger
number of DIB organizations. DoD
believes that revising the eligibility
criteria to apply to contractors that own
or operate covered contractor
information systems is an important
step in managing DoD’s operational risk
because it will allow additional
companies to begin receiving cyber
E:\FR\FM\03MYP1.SGM
03MYP1
27836
Federal Register / Vol. 88, No. 85 / Wednesday, May 3, 2023 / Proposed Rules
threat information to inform and harden
their cybersecurity posture. DIB
organizations that do not meet the
current eligibility requirements to be in
a DoD-sponsored cyber threat
information sharing program have
expressed interest in this change as
noted previously by the growing
percentage of ineligible applicants.
Regulatory Compliance Analysis
A. Executive Order 12866, ‘‘Regulatory
Planning and Review’’ and Executive
Order 13563, ‘‘Improving Regulation
and Regulatory Review’’
Executive Order 12866 direct agencies
to assess all costs, benefits, and
available regulatory alternatives and, if
regulation is necessary, to select
regulatory approaches that maximize
net benefits (including potential
economic, environmental, public health,
safety effects, distributive impacts, and
equity). Executive Order 13563
emphasizes the importance of
quantifying both costs and benefits, of
reducing costs, of harmonizing rules,
and of promoting flexibility. This
proposed rule has been designated
‘‘significant,’’ under Executive Order
12866.
lotter on DSK11XQN23PROD with PROPOSALS1
B. Congressional Review Act (5 U.S.C.
801 et seq.)
Pursuant to the Congressional Review
Act, this proposed rule has not been
designated a major rule, as defined by
5 U.S.C. 804(2). This proposed rule will
not have an economic effect above the
$100 million threshold defined in 5
U.S.C. 804(2) or spur a major increase in
costs or prices for consumers,
individual industries, Federal, State, or
local government agencies, or
geographic regions; or have significant
adverse effects on competition,
employment, investment, productivity,
innovation, or on the ability of United
States-based enterprises to compete
with foreign-based enterprises in
domestic and export markets.
C. Public Law 96–354, ‘‘Regulatory
Flexibility Act’’ (5 U.S.C. 601)
The Office of the DoD Chief
Information Officer certifies that this
proposed rule is not subject to the
Regulatory Flexibility Act (5 U.S.C. 601)
because it would not, if promulgated,
have a significant economic impact on
a substantial number of small entities.
This proposed rule will have a
significant positive impact on small
entities that will become eligible to
participate in and receive benefits
through the DIB CS Program. For DIB
participants, this program provides
cyber threat information and technical
assistance through analyst-to-analyst
VerDate Sep<11>2014
18:28 May 02, 2023
Jkt 259001
exchanges, mitigation and remediation
strategies, and cybersecurity best
practices in a collaborative
environment. The shared threat
information is used to bolster a
company’s cybersecurity posture and
mitigate the growing cyber threat. The
program’s tailored support for small,
mid-size, and large companies with
varying cybersecurity maturity levels is
an asset for participants.
Participation in the DIB CS Program is
voluntary. Program application and
participation costs are described in the
cost analysis section of this proposed
rule. These costs are voluntarily
incurred and associated with the labor
and resource costs to complete the
required program paperwork, including
execution of the Framework Agreement,
to submit information to the
Government, and to receive information
from the Government. The costs
associated with applying to the DIB CS
Program are associated exclusively with
labor costs and estimated to be $18.15
per company. None of the program’s
offering come at an additional fee to DIB
participants and additional costs related
to participation are estimated based on
the time investment (labor hours)
required to obtain the benefits as
described in the cost analysis of this
preamble. Therefore, the Regulatory
Flexibility Act, as amended, does not
require us to prepare a regulatory
flexibility analysis.
D. Sec. 202, Public Law 104–4,
‘‘Unfunded Mandates Reform Act’’
Section 202 of the Unfunded
Mandates Reform Act of 1995 (2 U.S.C.
1532) requires agencies to assess
anticipated costs and benefits before
issuing any rule whose mandates
require spending in any one year of
$100 million in 1995 dollars, updated
annually for inflation. When the Federal
Government passes legislation requiring
a State, local, or tribal government to
perform certain actions or offer certain
programs but does not include any
funds for the actions or programs in the
law, an unfunded mandate results. This
proposed rule will not mandate any
requirements for State, local, or tribal
governments, and will not mandate
private sector incurred costs above the
$100 million threshold defined in 2
U.S.C. 1532.
E. Public Law 96–511, ‘‘Paperwork
Reduction Act’’ (44 U.S.C. Chapter 35)
This proposed rule contains the
following information collection
requirements under the Paperwork
Reduction Act (PRA) of 1995.
PO 00000
Frm 00125
Fmt 4702
Sfmt 4702
• 0704–0489, ‘‘DoD’s Defense
Industrial Base (DIB) Cybersecurity (CS)
Activities Cyber Incident Reporting,’’
• 0704–0490, ‘‘DoD’s Defense
Industrial Base (DIB) Cybersecurity (CS)
Points of Contact (POC) Information.’’
With the revisions in eligibility
criteria, DoD expects the burden
associated with both collections to
increase as additional defense
contractors join the DIB CS Program and
additional cyber threat information is
reported. DOD is requesting comments
on both collections as part of this
proposed rule. Additional information
regarding these collections of
information—including all background
materials—can be found at https://
www.reginfo.gov/public/do/PRAMain by
using the search function to enter either
the title of the collection or the Office
of Management and Budget (OMB)
Control Number.
Comments are invited on: (a) whether
the proposed collections of information
are necessary for the proper
performance of the functions of DoD,
including whether the information will
have practical utility; (b) the accuracy of
the estimate of the burden for both
information collections; (c) ways to
enhance the quality, utility, and clarity
of the information to be collected; and
(d) ways to minimize the burden on
respondents, including the use of
automated collection techniques or
other forms of information technology.
Specific information on both collections
is below.
DoD’s Defense Industrial Base (DIB)
Cybersecurity (CS) Activities Cyber
Incident Reporting—OMB Control
Number 0704–0489
Title: DoD’s Defense Industrial Base
(DIB) Cybersecurity (CS) Activities
Cyber Incident Reporting.
Type of Request: Revision.
Number of Participants: Number of
DoD contractors eligible to participate in
the voluntary program is 80,000. DoD
estimates that approximately 1% of the
newly eligible population will elect to
join the program each year with
program growth plateauing at
approximately 10% of the population by
Year 9. Based on this estimate, after the
first three years of the program
expansion, 2,400 defense contractors
will join the existing 980 participating
companies resulting in 3,380 defense
contractors submitting voluntary cyber
threat information reports.
Projected Responses per Participant:
Five reports per participant.
Annual Total Responses: 16,900.
Average Burden per Response: Two
hours.
E:\FR\FM\03MYP1.SGM
03MYP1
Federal Register / Vol. 88, No. 85 / Wednesday, May 3, 2023 / Proposed Rules
Annual Total Burden Hours: 33,800
hours for all voluntary submissions.
Needs and Uses: DoD designated DC3
as the single focal point for receiving all
cyber incident reporting affecting the
unclassified networks of DoD
contractors from industry and other
government agencies. DoD collects
cyber incident and threat reports using
the Defense Industrial Base Network
(DIBNet) portal (https://dibnet.dod.mil).
Cyber threat reports are analyzed by
experts at DC3 and they, in turn,
develop written products that include
analysis of the threat, mitigations, and
indicators of adversary activity. These
anonymized products are shared with
authorized DoD personnel, authorized
personnel from other Federal agencies,
and authorized POCs from the DIB CS
Program.
Affected Public: Business or other forprofit and not-for-profit institutions.
Frequency: On occasion.
Respondent’s Obligation: Voluntary.
lotter on DSK11XQN23PROD with PROPOSALS1
DoD’s Defense Industrial Base (DIB)
Cybersecurity (CS) Points of Contact
(POC) Information—OMB Control
Number 0704–0490
Title: DoD’s Defense Industrial Base
(DIB) Cybersecurity (CS) Activities
Points of Contact (POC) Information.
Type of Request: Revision.
Number of Participants: DoD
contractors impacted is 80,000. DoD
estimates that approximately 1% of the
newly eligible population (800 defense
contractors) will elect to join the
program each year with program growth
plateauing at approximately 10% of the
population by Year 9. Each year,
approximately 10% of participating
companies will report changes to
company contacts. If 10% of the preexisting companies (2,580 in year 2)
submit updates to the POC information
and 800 new companies join, by year 3
this would result in 1,058 annual
updates.
Projected Responses per Participant:
Initial collection is one per company
with updates on a case-by-case basis.
Annual Total Responses: 1,058.
Average Burden per Response: 20
minutes.
Annual Total Burden Hours: 353
hours for all participants.
Needs and Uses: Defense contractors
complete a program application and
sign the DIB CS Program Framework to
initiate participation. The Government
will collect business POC information
from all DIB CS Program participants on
a one-time basis, with updates as
necessary, to facilitate communications
and the sharing of share unclassified
and classified cyber threat information.
VerDate Sep<11>2014
18:28 May 02, 2023
Jkt 259001
Affected Public: Business or other forprofit and not-for-profit institutions.
Frequency: On occasion.
Respondent’s Obligation: Voluntary.
F. Executive Order 13132, ‘‘Federalism’’
Executive Order 13132 establishes
certain requirements that an agency
must meet when it promulgates a
proposed rule (and subsequent final
rule) that imposes substantial direct
requirement costs on State and local
governments, preempts State law, or
otherwise has federalism implications.
This proposed rule will not have a
substantial effect on State and local
governments.
G. Executive Order 13175,
‘‘Consultation and Coordination With
Indian Tribal Governments’’
Executive Order 13175 establishes
certain requirements that an agency
must meet when it promulgates a
proposed rule (and subsequent final
rule) that imposes substantial direct
compliance costs on one or more Indian
tribes, preempts tribal law, or effects the
distribution of power and
responsibilities between the Federal
Government and Indian tribes. This
proposed rule will not have a
substantial effect on Indian tribal
governments.
List of Subjects in 32 CFR Part 236
Government contracts, Security
measures.
Accordingly, DoD proposes to amend
32 CFR part 236 as follows:
PART 236—DEPARTMENT OF
DEFENSE (DoD) DEFENSE
INDUSTRIAL BASE (DIB)
CYBERSECURITY (CS) ACTIVITIES
1. The authority citation for 32 CFR
part 236 continues to read as follows:
■
Authority: 10 U.S.C. 391, 393, and 2224;
44 U.S.C. 3506 and 3544; 50 U.S.C. 3330.
2. Revise the heading of 32 CFR part
236 to read as set forth above.
■
§ 236.1
[Amended]
3. Amend § 236.1 by:
a. Removing ‘‘eligible DIB
participants’’ and adding in its place
‘‘eligible DoD contractors’’.
■ b. Removing ‘‘DIB CS program’’ and
adding in its place ‘‘DIB CS Program’’
wherever it appears.
■ c. Removing ‘‘DIB CS participants’’
and adding in its place ‘‘DIB CS
Program participants’’.
■ d. Removing ‘‘DIB participants’
capabilities’’ and adding in its place
‘‘DIB CS Program participants’
capabilities’’.
■
■
PO 00000
Frm 00126
Fmt 4702
Sfmt 4702
§ 236.2
27837
[Amended]
4. Amend § 236.2 by:
a. Removing the definition of ‘‘Access
to media’’.
■ b. In the definition of ‘‘DIB
participant’’:
■ i. Removing ‘‘DIB participant’’ and
adding in its place ‘‘DIB CS Program
participant’’.
■ ii. Removing ‘‘DIB CS program’’ and
adding in its place ‘‘DIB CS Program’’.
■ c. Removing ‘‘DIB CS program’’ in the
definition of ‘‘Government furnished
information (GFI)’’ and adding in its
place ‘‘DIB CS Program’’.
■
■
§ 236.3
[Amended]
5. Amend § 236.3 by:
a. Removing ‘‘program’’ and adding in
its place ‘‘Program participants’’ in
paragraph (b)(1).
■ b. Removing ‘‘DIB CS program’’ and
adding in its place ‘‘DIB CS Program’’ in
paragraph (c).
■ 6. Amend § 236.4 by:
■ a. Removing ‘‘http’’ and adding in its
place ‘‘https’’ in paragraphs (b)(2), (c),
and (d).
■ b. Removing ‘‘https://iase.disa.mil/pki/
eca/Pages/index.aspx’’ and adding in its
place ‘‘https://public.cyber.mil/eca/’’ in
paragraph (e).
■ c. Revising paragraph (f).
■ d. Adding a comma after ‘‘as
appropriate’’ in the first sentence in
paragraph (g).
■ e. Removing ‘‘paragraph (e)’’ and
adding in its place ‘‘paragraph (i)’’ in
paragraph (k).
■ f. In paragraph (m)(4):
■ i. Removing ‘‘DIB contractors’’ and
adding in its place ‘‘defense
contractors’’.
■ ii. Removing ‘‘DIB CS program’’ and
adding in its place ‘‘DIB CS Program’’.
■ g. Revising paragraph (p).
The revisions read as follows:
■
■
§ 236.4 Mandatory cyber incident reporting
procedures.
*
*
*
*
*
(f) Third-party service provider
support. If the contractor utilizes a
third-party service provider (SP) for
information system security services,
the contractor may authorize the SP to
report cyber incidents on behalf of the
contractor.
*
*
*
*
*
(p) Freedom of Information Act
(FOIA). Agency records, which may
include qualifying information received
from non-Federal entities, are subject to
request under the Freedom of
Information Act (5 U.S.C. 552). The
Government will notify the nonGovernment source or submitter (e.g.,
contractor or DIB CS Program
participant) of the information in
E:\FR\FM\03MYP1.SGM
03MYP1
lotter on DSK11XQN23PROD with PROPOSALS1
27838
Federal Register / Vol. 88, No. 85 / Wednesday, May 3, 2023 / Proposed Rules
accordance with the procedures in 32
CFR 286.10.
*
*
*
*
*
■ 7. Amend § 236.5 by:
■ a. Revising section heading and
paragraph (a).
■ b. In paragraph (b):
■ i. Removing ‘‘DIB CS program’’ and
adding in its place ‘‘DIB CS Program’’.
■ ii. Removing ‘‘DIB participant’’ and
adding in its place ‘‘DIB CS Program
participant’’.
■ c. In paragraph (c):
■ i. Removing ‘‘DIB participant’’ and
adding in its place ‘‘DIB CS Program
participant’’.
■ ii. Removing ‘‘individual DIB
participants’’ and adding in its place
‘‘individual DIB CS Program
participants.’’
■ d. In paragraph (d):
■ i. Removing ‘‘DoD’s DIB CS Program
Office’’ and adding in its place ‘‘DoD’s
DIB CS Program Management Office’’.
■ ii. Removing ‘‘DoD DIB’’ and adding
in its place ‘‘DoD–DIB’’.
■ iii. Removing ‘‘DIB CS program’’ and
adding in its place ‘‘DIB CS Program’’.
■ e. Removing ‘‘DIB participants’’ and
adding in its place ‘‘DIB CS Program
participants’’ in paragraph (e).
■ f. Redesignating paragraphs (f)
through (n) as paragraphs (g) through
(o).
■ g. Adding new paragraph (f).
■ h. In newly redesignated paragraph
(g):
■ i. Removing the heading.
■ ii. Removing ‘‘DIB participants’’ and
adding in its place ‘‘DIB CS Program
participants’’.
■ i. Revising newly redesignated
paragraphs (h) and (i).
■ j. Removing ‘‘DIB participants’’ and
adding in its place ‘‘DIB CS Program
participants’’ in newly redesignated
paragraph (j) introductory text.
■ k. In newly redesignated paragraph
(k):
■ i. Removing ‘‘DIB participants’’ and
adding in its place ‘‘DIB CS Program
participants’’.
■ ii. Removing ‘‘DIB participant’’ and
adding in its place ‘‘DIB CS Program
participant’’.
■ l. Removing ‘‘DIB participants’’ and
adding in its place ‘‘DIB CS Program
participants’’ in newly redesignated
paragraph (l).
■ m. Removing ‘‘DIB participants’’ and
adding in its place ‘‘DIB CS Program
participants’’ in newly redesignated
paragraph (m).
■ n. In newly redesignated paragraph
(n):
■ i. Removing ‘‘DIB participant’’ and
adding in its place ‘‘DIB CS Program
participant’’ wherever it appears.
VerDate Sep<11>2014
18:28 May 02, 2023
Jkt 259001
ii. Removing ‘‘DIB participant’s FA’’
and adding in its place ‘‘DIB CS
Program participant’s FA’’.
■ o. In newly redesignated paragraph
(o):
■ i. Removing ‘‘DIB participant’’ and
adding in its place ‘‘DIB CS Program
participant’’ wherever it appears.
■ ii. Removing ‘‘paragraph (m) of this
section’’ and adding in its place
‘‘paragraph (n) of this section.’’
The revisions and addition read as
follows:
■
§ 236.5
DoD’s DIB CS Program.
(a) All defense contractors that meet
the requirements set forth in § 236.7 are
eligible to join the DIB CS Program as
a DIB CS Program participant. Defense
contractors meeting the additional
eligibility requirements in § 236.7 can
elect to access and receive classified
information electronically.
*
*
*
*
*
(f) As participants of the DIB CS
Program, defense contractors are
encouraged to share cyber threat
indicators and information that they
believe are valuable in alerting the
Government and other DIB CS Program
participants to better counter threat
actor activity. Cyber activity that is not
covered under § 236.4 may be of interest
to DIB CS Program participants and
DoD.
*
*
*
*
*
(h) Prior to receiving GFI, each DIB CS
Program participant shall provide the
requisite points of contact information,
to include U.S. citizenship and security
clearance information, as applicable, for
the designated personnel within their
company in order to facilitate the DoD–
DIB interaction in the DIB CS Program.
The Government will confirm the
accuracy of the information provided as
a condition of that point of contact
being authorized to act on behalf of the
DIB CS Program participant for this
program.
(i) GFI will be issued via both
unclassified and classified means. DIB
CS Program participants handling and
safeguarding of classified information
shall be in compliance with 32 CFR part
117. The Government shall specify
transmission and distribution
procedures for all GFI, and shall inform
DIB CS Program participants of any
revisions to previously specified
transmission or procedures.
*
*
*
*
*
§ 236.6
[Amended]
8. Amend § 236.6 by:
a. Removing ‘‘program’’ and adding in
its place ‘‘Program’’ in the section
heading.
■
■
PO 00000
Frm 00127
Fmt 4702
Sfmt 4702
b. In paragraph (a):
i. Removing ‘‘DIB CS program’’ and
adding in its place ‘‘DIB CS Program’’
wherever it appears.
■ ii. Removing ‘‘DIB participants’’ and
adding in its place ‘‘DIB CS Program
participants’’.
■ c. In paragraph (b):
■ i. Removing ‘‘DIB CS participants’’
and adding in its place ‘‘DIB CS
Program participants’’.
■ ii. Removing ‘‘https://www.dhs.gov/
enhanced-cybersecurity-services’’ and
adding in its place ‘‘https://
www.cisa.gov/enhanced-cybersecurityservices-ecs’’.
■ d. In paragraph (c):
■ i. Removing ‘‘DIB CS program’’ and
adding in its place ‘‘DIB CS Program’’.
■ ii. Removing ‘‘obligate the DIB
participant’’ and adding in its place
‘‘obligate the DIB CS Program
participant’’.
■ iii. Removing ‘‘taken by the DIB
participant’’ and adding in its place
‘‘taken by the DIB CS Program
participant’’.
■ iv. Removing ‘‘taken on the DIB
participant’s’’ and adding in its place
‘‘taken on the DIB CS Program
participant’s’’.
■ e. In paragraph (d):
■ i. Removing ‘‘DIB participant’s
participation’’ and adding in its place
‘‘DIB CS Program participant’s
participation’’.
■ ii. Removing ‘‘DIB CS program’’ and
adding in its place ‘‘DIB CS Program’’.
■ iii. Removing ‘‘approval of the DIB
participant’’ and adding in its place
‘‘approval of the DIB CS Program
participant’’.
■ f. In paragraph (e):
■ i. Removing ‘‘DIB participant’’ and
adding in its place ‘‘DIB CS Program
participant’’ wherever it appears.
■ ii. Removing ‘‘DIB CS program’’ and
adding in its place ‘‘DIB CS Program’’.
■ g. Adding ‘‘change of status as a
defense contractor,’’ after ‘‘Upon
termination of the FA,’’ in paragraph (f).
■ h. In paragraph (g):
■ i. Removing ‘‘DIB participants’ rights’’
and adding in its place ‘‘DIB CS
Program participants’ rights’’.
■ ii. Removing ‘‘DIB CS program’’ and
adding in its place ‘‘DIB CS Program’’.
■ iii. Removing ‘‘the requirement for
DIB participants’’ and adding in its
place ‘‘the requirement for DIB CS
Program participants’’.
■ 9. Revise § 236.7 to read as follows:
■
■
§ 236.7 DoD’s DIB CS Program
requirements.
(a) To participate in the DIB CS
Program, a contractor must own or
operate a covered contractor
information system and shall execute
E:\FR\FM\03MYP1.SGM
03MYP1
Federal Register / Vol. 88, No. 85 / Wednesday, May 3, 2023 / Proposed Rules
the standardized FA with the
Government (available during the
application process), which implements
the requirements set forth in §§ 236.5
and 236.6 and this section.
(b) In order for DIB CS Program
participants to receive classified cyber
threat information electronically, the
company must be a cleared defense
contractor and must:
(1) Have an existing active facility
clearance level (FCL) to at least the
Secret level in accordance with 32 CFR
part 117;
(2) Have or acquire a Communication
Security (COMSEC) account in
accordance with 32 CFR part 117, which
provides procedures and requirements
for COMSEC activities;
(3) Have or acquire approved
safeguarding for at least Secret
information, and continue to qualify
under 32 CFR part 117 for retention of
its FCL and approved safeguarding; and
(4) Obtain access to DoD’s secure
voice and data transmission systems
supporting the voluntary DIB CS
Program.
Dated: April 25, 2023.
Aaron T. Siegel,
Alternate OSD Federal Register Liaison
Officer, Department of Defense.
If
you have questions about this proposed
rulemaking, call or email Mr. Craig
Lapiejko, Waterways Management, at
Coast Guard First District, telephone
617–603–8592, email craig.d.lapiejko@
uscg.mil.
FOR FURTHER INFORMATION CONTACT:
[FR Doc. 2023–09021 Filed 5–2–23; 8:45 am]
BILLING CODE 5001–06–P
DEPARTMENT OF HOMELAND
SECURITY
SUPPLEMENTARY INFORMATION:
I. Table of Abbreviations
Coast Guard
33 CFR Part 147
[Docket Number USCG–2023–0277]
RIN 1625–AA00
Safety Zone; Vineyard Wind 1 Wind
Farm Project Area, Outer Continental
Shelf, Lease OCS–A 0501, Offshore
Massachusetts, Atlantic Ocean
Coast Guard, DHS.
Notice of proposed rulemaking.
AGENCY:
ACTION:
The Coast Guard is proposing
to establish 63 temporary 500-meter
safety zones around the construction of
62 wind turbine generators (WTGs) and
one electrical service platform (ESP)
located in the Vineyard Wind 1 Wind
Farm (VW1WF) project area within
federal waters on the Outer Continental
Shelf (OCS), specifically in the northern
portion of Bureau of Ocean Energy
Management (BOEM) Renewable Energy
Lease Area OCS–A 0501, approximately
12 nautical miles (NM) offshore of
Martha’s Vineyard, Massachusetts and
12 NM offshore Nantucket,
lotter on DSK11XQN23PROD with PROPOSALS1
SUMMARY:
VerDate Sep<11>2014
18:28 May 02, 2023
Jkt 259001
Massachusetts. This action is necessary
to provide for the safety of life, property,
and the environment during the
planned construction of each facility’s
monopile type foundation and
subsequent installation of the WTGs
turbines and ESP platform from June 15,
2023, to May 31, 2024. When enforced,
only attending vessels and those vessels
specifically authorized by the First
Coast Guard District Commander, or a
designated representative, are permitted
to enter or remain in the temporary
safety zones. We invite your comments
on this proposed rulemaking.
DATES: Comments and related material
must be received by the Coast Guard on
or before June 2, 2023.
ADDRESSES: You may submit comments
identified by docket number USCG–
2023–0277 using the Federal DecisionMaking Portal at https://
www.regulations.gov. See the ‘‘Public
Participation and Request for
Comments’’ portion of the
SUPPLEMENTARY INFORMATION section for
further instructions on submitting
comments.
BOEM Bureau of Ocean Energy
Management
CFR Code of Federal Regulations
DD Degrees Decimal
DHS Department of Homeland Security
FR Federal Register
NPRM Notice of Proposed Rulemaking
OCS Outer Continental Shelf
OSS Offshore Substation
NAD 83 North American Datum of 1983
NM Nautical Mile
§ Section
U.S.C. United States Code
WTG Wind Turbine Generator
VW1WF Vineyard Wind 1 Wind Farm
II. Background, Purpose, and Legal
Basis
On March 15, 2023, Vineyard Wind,
LLC, an offshore wind farm developer,
notified the Coast Guard that they plan
to begin construction of facilities in the
VW1WF project area within federal
waters on the OCS, specifically in the
northern portion of BOEM Renewable
Energy Lease Area OCS–A 0501,
approximately 12 NM offshore Martha’s
Vineyard, Massachusetts and 12 NM
offshore Nantucket, Massachusetts in
June 2023.
PO 00000
Frm 00128
Fmt 4702
Sfmt 4702
27839
The extremely complex offshore
construction of these OCS facilities
presents many unusually hazardous
conditions including hydraulic pile
driving hammer operations, heavy lift
operations, overhead cutting operations,
potential falling debris, increased vessel
traffic, and stationary barges in close
proximity to the facilities and each
other.
Based on these circumstances, the
First Coast Guard District Commander
has determined that establishment of 63
temporary safety zones through
rulemaking is warranted to ensure the
safety of life, property, and the
environment within a 500-meter radius
of each of the 63 facilities during their
construction.
The Coast Guard is proposing this
rule under the authorities provided in
14 U.S.C. 544, 43 U.S.C. 1333, and
Department of Homeland Security
(DHS) Delegation No. 00170.1, Revision
No. 01.3. As an implementing regulation
of this authority, 33 CFR part 147
permits the establishment of safety
zones for non-mineral energy resource
permanent or temporary structures
located on the OCS for the purpose of
protecting life and property on the
facilities, appurtenances and attending
vessels, and on the adjacent waters
within the safety zone (see 33 CFR
147.10). Accordingly, a safety zone
established under 33 CFR part 147 may
also include provisions to restrict,
prevent, or control certain activities,
including access by vessels or persons
to maintain safety of life, property, and
the environment. If, as we anticipate, we
issue a temporary final rule and make it
effective less than 30 days after
publication in the Federal Register, we
will explain in that publication, as
required by 5 U.S.C. (d)(3), our good
cause for doing so.
III. Discussion of Proposed Rule
The District Commander is proposing
to establish 63 temporary 500-meter
safety zones around the construction of
62 WTGs and one ESP on the OCS from
June 15, 2023, through 11:59 p.m. on
May 31, 2024.
The construction of these facilities is
expected to take place in mixed phases
alternating between the installation of
several monopile type foundations
followed by the installation of the upper
structures then repeating this process
throughout the project area until all 63
facilities have been completed. The 63
temporary safety zones would be
enforced individually as construction
progresses from one structure location
to the next throughout the entire process
for a period lasting approximately 48
hours. The Coast Guard would make
E:\FR\FM\03MYP1.SGM
03MYP1
Agencies
[Federal Register Volume 88, Number 85 (Wednesday, May 3, 2023)]
[Proposed Rules]
[Pages 27832-27839]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-09021]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF DEFENSE
Office of the Secretary
32 CFR Part 236
[Docket ID: DOD-2019-OS-0112]
RIN 0790-AK86
Department of Defense (DoD) Defense Industrial Base (DIB)
Cybersecurity (CS) Activities
AGENCY: Office of the DoD Chief Information Officer, Department of
Defense (DoD).
ACTION: Proposed rule.
-----------------------------------------------------------------------
SUMMARY: The DoD is proposing revisions to the eligibility criteria for
the voluntary Defense Industrial Base (DIB) Cybersecurity (CS) Program.
These revisions will allow a broader community of defense contractors
to benefit from bilateral information sharing as when this proposed
rule is finalized all defense contractors who are subject to mandatory
cyber incident reporting will be able to participate. DoD is also
proposing changes to definitions and some technical corrections for
readability.
DATES: Comments must be received by June 20, 2023.
ADDRESSES: Please submit comments on this proposed rule, identified by
32 CFR part 236, Docket ID: DOD-2019-OS-0112 and/or by Regulatory
Information Number (RIN) 0790-AK86, by any of the following methods:
Federal Rulemaking Portal: https://www.regulations.gov.
Follow the instructions for submitting comments.
Mail: Department of Defense, Office of the Assistant to
the Secretary of Defense for Privacy, Civil Liberties, and
Transparency, Regulatory Directorate, 4800 Mark Center Drive, Mailbox
#24, Suite 08D09, Alexandria, VA 22350-1700.
Instructions: The general policy for comments is to make these
submissions available for public viewing as they are received without
change, including any personal identifiers or contact information
provided by the commenter.
FOR FURTHER INFORMATION CONTACT:
Stacy Bostjanick, Chief Defense Industrial Base
Cybersecurity, Office: 703-604-3167.
DIB CS Program Management Office: [email protected].
Instructions: DO NOT submit comments to this email address.
SUPPLEMENTARY INFORMATION:
Background and Authority
The Defense Industrial Base (DIB) means the Department of Defense,
Government, and private sector worldwide industrial complex with
capabilities to perform research and development, design, produce, and
maintain military weapon systems, subsystems, components, or parts to
satisfy military requirements. The DIB Cybersecurity Program is a
voluntary program to enhance and supplement participants' capabilities
to safeguard DoD information that resides on, or transits, DIB
unclassified information systems. The program encourages greater threat
information sharing to complement mandatory aspects of DoD's DIB
cybersecurity activities which are contractually mandated through
Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012,
Safeguarding Covered Defense Information and Cyber Incident
Reporting.\1\ This program supports and complements DoD-specific
authorities at 10 U.S.C. 2224 and the Federal Information Security
Management Act (FISMA) (44 U.S.C. 3541 et seq.). Cyber threat
information sharing activities under this proposed rule also fulfill
important elements of DoD's critical infrastructure protection
responsibilities, as the sector risk management agency for the DIB (see
Presidential Policy Directive 21 (PPD-21),\2\ ``Critical Infrastructure
Security and Resilience''). Expanding eligibility requirements for the
DIB CS Program will augment DoD's information sharing activities with
the DIB.
---------------------------------------------------------------------------
\1\ https://www.ecfr.gov/current/title-48/chapter-2/subchapter-H/part-252/subpart-252.2/section-252.204-7012.
\2\ https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil.
---------------------------------------------------------------------------
Currently, the DIB CS Program has the following objectives:
Establish a voluntary, mutually acceptable framework to
protect information from unauthorized access.
Protect the confidentiality of information exchanged to
the maximum extent authorized by law.
Create a trusted environment to maximize network defense
and remediation efforts by:
1. Sharing cyber threat information and incident reports.
2. Providing mitigation/remediation strategies and malware
analysis.
This program is part of DoD's larger portfolio of work to protect
DoD information handled by the DIB by understanding and sharing
information, building security partnerships, implementing long-term
risk management programs, and maximizing efficient use of resources. It
supports two-way information sharing and maintains meaningful
relationships and frequent dialogue across the diverse array of
eligible defense contractors. For eligible defense contractors, the
program maintains a capability for companies to access classified
government cyber threat information providing additional context to
better understand the cyber threats targeting their networks and
information systems.
In May 2012, DoD published an interim final rule establishing the
voluntary DIB CS Program and the bilateral information sharing model
still used today.\3\ The 2012 rule established a voluntary cyber threat
information sharing program for cleared defense contractors (CDC) with
the ability to safeguard classified information, estimated at 2,650 in
2012. Under the rule cleared defense contractor is defined as a private
entity granted clearance by DoD to access, receive, or store classified
information for the purpose of bidding for a contract or conducting
activities in support of any program of DoD. The 2012 rule stated DoD
would maintain a website to facilitate the following aspects of program
participation: (1) sharing information regarding eligibility and
participation in the program with potential participants, (2) applying
to the program online, and (3) executing the necessary agreements with
the Government. DoD has established this capability as an online portal
referred to as ``DIBNet,'' located at https://dibnet.dod.mil. A final
rule responding to public comments was published in October 2013.\4\ In
October 2015, responding to new statutory requirements for cyber
incident reporting for DoD contractors,
[[Page 27833]]
subcontractors, and those providing operationally critical support, DoD
published another interim final rule \5\ to expand eligibility to all
cleared defense contractors (estimated at 8,500 in 2015 and 12,000 in
2022), subject to program eligibility requirements. The 2015 rule
removed the safeguarding requirement to participate in the program. The
rule also removed the mandatory program eligibility requirement to have
or acquire a Communications Security (COMSEC) account \6\ and obtain
access to DoD's secure voice and data transmission systems, although
participants still have to fulfill these requirements to receive
classified cyber threat information electronically. A final rule
responding to public comments was published in October 2016.\7\
---------------------------------------------------------------------------
\3\ 77 FR 27615, May 11, 2012 (https://www.govinfo.gov/content/pkg/FR-2012-05-11/pdf/2012-10651.pdf).
\4\ 78 FR 62430, October 22, 2013 (https://www.govinfo.gov/content/pkg/FR-2013-10-22/pdf/2013-24256.pdf).
\5\ 80 FR 59581, October 2, 2015 (https://www.govinfo.gov/content/pkg/FR-2015-10-02/pdf/2015-24296.pdf).
\6\ The National Security Agency administers COMSEC accounts.
\7\ 81 FR 68312, October 4, 2016 (https://www.govinfo.gov/content/pkg/FR-2016-10-04/pdf/2016-23968.pdf).
---------------------------------------------------------------------------
Discussion of the Proposed Rule
With this rule, the Department proposes to expand eligibility
requirements to allow greater program participation and increase the
benefits of bilateral information sharing, which helps protect DoD
controlled unclassified information from cyberattack, as well as to
better align the voluntary DIB CS Program with DoD's mandatory cyber
incident reporting requirements. The current eligibility requirements,
based on the October 2016 rule, requires a company to be a cleared
defense contractor \8\ who:
---------------------------------------------------------------------------
\8\ 32 CFR 236.2 defines cleared defense contractor to mean a
subset of contractors cleared under the National Industrial Security
Program (NISP) who have classified contracts with the DoD.
---------------------------------------------------------------------------
Has DoD-approved medium assurance certificates; \9\
---------------------------------------------------------------------------
\9\ The DoD has established the External Certification Authority
(ECA) program to support the issuance of DoD-approved certificates
to industry partners and other external entities and organizations.
The ECA program is designed to provide the mechanism for these
entities to securely communicate with the DoD and authenticate to
DoD Information Systems. [https://public.cyber.mil/eca/].
---------------------------------------------------------------------------
Has an existing facility clearance \10\ to at least the
Secret level;
---------------------------------------------------------------------------
\10\ Entities (including companies and academic institutions)
engaged in providing goods or services to the U.S. Government
involving access to or creation of classified information may be
granted a Facility Clearance (FCL). The Defense Counterintelligence
and Security Agency (DCSA) processes, issues, and monitors the
continued eligibility of entities for an FCL. [https://www.dcsa.mil/mc/isd/fc/].
---------------------------------------------------------------------------
Can execute the standardized Framework Agreement \11\
provided to interested contractors after the Department has verified
the DIB company is eligible.
---------------------------------------------------------------------------
\11\ Applicants to the DIB CS Program submit an application from
https://dibnet.dod.mil. Once a company has been verified, the
Framework Agreement is made available for review.
---------------------------------------------------------------------------
The program has experienced steady growth, with the annual number
of applications tripling since 2016 (80 total applications received in
2016, 266 total applications received in 2022). It has also seen a
steady increase in the percentage of defense contractors who are
interested in participating but do not meet current eligibility
requirements. The percentage of applications received from ineligible
defense contractors has risen at an average rate of 5% per year since
2016; 10% of applications received in 2016 were from ineligible defense
contractors, while 45% of applicants in 2022 were ineligible. This
steady increase in ineligible applicants indicates an increasing desire
amongst defense contractors to participate in a cyber threat
information sharing program.
In addition, the Department has actively engaged defense
associations, universities, and companies in the DIB, as well as
participated in many public forums discussing cyber threats and the way
forward. The overwhelming feedback was for the Department to facilitate
engagement with the broader community of defense contractors beyond
just the cleared defense community. In general, smaller defense
contractors have fewer resources to devote to cybersecurity, which may
provide a vector for adversaries to access information critical to
national security. In addition, the Department is working on providing
more tailored threat information to support the needs of a broader
community of defense contractors with varying cybersecurity
capabilities. The gap in eligibility in the current program, feedback
from interested but ineligible contractors, a vulnerable DoD supply
chain, and a pervasive cyber threat have prompted DoD to propose
revising the eligibility requirements of the DIB CS Program to allow
participation by non-cleared defense contractors.
The maximum number of defense contractors estimated to be subject
to mandatory cyber incident reporting under DFARS clause 252.204-7012
is 80,000. The presence of the clause in a contract does not establish
that covered defense information is shared. DoD is working on reporting
mechanisms to better assess contractors managing covered defense
information. The population of defense contractors in possession of
covered defense information and subject to mandatory incident reporting
requirements far exceeds the population of defense contractors
currently eligible to participate in the voluntary DIB CS Program. With
the proposed changes to the eligibility criteria, an estimated
additional 68,000 defense contractors will be eligible to participate
in the voluntary DIB CS Program. Based on prior participation
statistics, it is estimated that about 10% of the eligible contractors
(12,000 + 68,000 = 80,000) will actually apply to join the voluntary
DIB CS Program (80,000 x 0.10 = 8,000).
Currently, the DIB CS Program has approximately 1,000 cleared
defense contractors participating in the program. Program participants
have access to technical exchange meetings, a collaborative web
platform (DIBNet-U), and threat products and services through the DoD
Cyber Crime Center (DC3). DC3 implements the program's operations by
sharing cyber threat information and intelligence with the DIB, and
offering a variety of products, tools, services, and events. DC3 serves
as the single clearinghouse for unclassified Mandatory Incident Reports
(MIRs) and voluntary threat information sharing reports.
Changes to Definitions
In addition to the program eligibility changes described above, DoD
is also proposing the following changes.
Sec. 236.2 Definitions
1. Access to media--This definition is being removed as it is no
longer used in the rule text.
3. DIB CS Program participant--This definition has been revised to
align with the revised eligibility requirements set forth in this
proposed rule.
4. Government furnished information (GFI)--This definition was
revised to adopt the convention of referring to the DIB CS Program with
a capital `P'.
Other Proposed Changes
DoD is amending Sec. 236.5 (DoD's DIB CS program) in order to
align the program description with the revised eligibility
requirements. As a result, references to cleared defense contractors
have been replaced with contractors that own or operate a covered
contractor information system. Security clearance information is only
collected, when applicable, if a company elects to participate in
classified information sharing. In addition, the language stating
participation is typically three to ten company-designated points of
contact (POC) has been removed, to avoid confusion regarding the number
of POCs, as some larger companies may wish to nominate a larger number
of
[[Page 27834]]
POCs and smaller companies may wish to nominate fewer.
DoD is amending Sec. 236.7 (DoD's DIB CS program requirements) to
remove the requirement that a company have an existing active facility
clearance (FCL) to at least the Secret level granted under 32 CFR part
117, National Industrial Security Program Operating Manual
(NISPOM),\12\ to be eligible to participate in the DIB CS Program. In
addition, references to cleared defense contractors have been replaced
with contractors that own or operate a covered contractor information
system.
---------------------------------------------------------------------------
\12\ https://www.ecfr.gov/current/title-32/subtitle-A/chapter-I/subchapter-D/part-117.
---------------------------------------------------------------------------
A foundational element of the activities described in this part is
the recognition that the information shared between DoD and DIB CS
Program participants pursuant to the DIB CS Program includes extremely
sensitive information that requires protection. For additional
information regarding the Government's safeguarding of information
received from contractors that requires protection, see the Privacy
Impact Assessment (PIA) for the DIB Cybersecurity Activities located
at: https://dodcio.defense.gov/Portals/0/Documents/DIB_PIA.pdf. The PIA
provides detailed procedures for handling personally identifiable
information (PII), attributional information about the strengths or
vulnerabilities of specific covered contractor information systems,
information providing a perceived or real competitive advantage on
future procurement action, and contractor information marked as
proprietary or commercial or financial information. In addition,
personnel information is covered by Office of the Secretary of Defense
(OSD) System of Records Notice (SORN) DCIO 01 (https://dpcld.defense.gov/Portals/49/Documents/Privacy/SORNs/OSDJS/DCIO-01.pdf). No changes to the PIA or SORN are being proposed in
conjunction with this proposed rule.
Expected Impact of the Proposed Rule
Costs
DoD believes the cost impact of the proposed changes to this
proposed rule is not significant, as the changes primarily expand the
availability of the established DIB CS Program to additional defense
contractors. The newly eligible population of defense contractors may
incur costs to familiarize themselves with the rule and those who elect
to participate in the program will incur costs related to program
participation. The Government will continue to incur costs related to
operating the program. The DIB CS Program conducts outreach activities
to defense contractors through press releases, participation in
defense-oriented conferences, speaking engagements, and through digital
media. The program will leverage pre-established channels to message
changes to the program and engage with the eligible population of
defense contractors. Based on the program growth experienced that
during the last phase of program expansion the program is forecasting
annual growth at just over 1% of the eligible population. At a growth
rate of 1% per year it will take the program approximately 10 years to
achieve the estimated 10% participation rate of the eligible DIB.
Costs to DIB Participants
In order to join the DIB CS Program there is an initial labor
burden for a defense contractor to familiarize themselves with the rule
and subsequently apply to the program and provide POC information. In
total, if it takes each contractor 30 minutes to read and familiarize
him/herself with the rule, it will take contractors 4,000 hours to
familiarize themselves with the rule (8,000 participants x .5 = 4,000
hours). At an hourly wage of $108.92, the total cost incurred by
contractors for rule familiarization will amount to $108,920 dollars
($108.92 x .5 hours = $54.46 x 4,000 hours = $217,840). The hourly
labor cost is based on the mean wage estimate from the Bureau of Labor
Statistics for an Information Security Analysts, Occupational
Employment and Wages, May 2021 and is covered under information
collection 0704-0490. This hourly wage is adjusted upward by 100% to
account for overhead and benefits, which implies a value of $108.92 per
hour.
The estimated annual burden for a company to apply to the program
or for a participating company to update POC information is $36.31,
with a total annual cost to all participants of $319,498.67 at peak
program participation. This calculation is based on 8,000 participants
submitting an average of one application per year and 10% of the
population (800 participants) submitting an update each year, with 20
minutes of labor per submission, at a cost of $108.92 per hour ($36.31
($108.92 x \1/3\ hours) x 8,800 events = $319,498.67).
There is an estimated annual burden projected at $544.60 for
defense contractors voluntarily sharing cyber threat information. This
is based on a defense contractor electing to submit an average of five
informational reports per year with two hours of labor per voluntary
submission, at a cost of $108.92 per hour ($108.92 x 2 hours each =
$217.84 x 5 reports = $1,089.20). It is estimated that 1% of the newly
eligible population will elect to join the DIB CS Program annually,
which currently has approximately 1,000 participants, with program
growth plateauing at 10% of the population by Year 9. The table below
shows the costs to industry to voluntarily sharing cyber threat
information over a 9-year period. If, in the first year of the program
expanding there are 980 participants and 800 new participants join the
program, there will be a total of 1,780 participants. Assuming each
participant responds five times, this totals 8,900 annual responses
times $217.84 per response and will equal $1,938,776 in total annual
cost to participants, which is covered in information collection 0704-
0489.
--------------------------------------------------------------------------------------------------------------------------------------------------------
Year 1 Year 2 Year 3 Year 4 Year 5 Year 6 Year 7 Year 8 Year 9
--------------------------------------------------------------------------------------------------------------------------------------------------------
DIB CS Participants................ 1,780 2,580 3,380 4,180 4,980 5,780 6,580 7,380 8,000
Voluntary Reports Received......... 8,900 12,900 16,900 20,900 24,900 28,900 32,900 36,900 40,000
Annual Cost........................ $1,938,776 $2,810,136 $3,681,496 $4,552,856 $5,424,216 $6,295,576 $7,166,936 $8,038,296 $8,713,600
--------------------------------------------------------------------------------------------------------------------------------------------------------
In addition, DIB CS Program participants may choose to attend
meetings in conjunction with the DIB CS Program. All new participants
are invited to attend an orientation session and all existing
participants are invited to attend meetings on a quarterly basis. If a
defense contractor chooses to send an employee to a day-long meeting
each quarter, the defense contractor would incur a cost of $1,742
($108.92 x 8 hours = $871.36 x 4 meetings = $3,485.44).
[[Page 27835]]
Costs to the Government
The DoD has identified general areas of costs related to the
operation of this program. First, DoD incurs costs to implement this
program operationally by responding to inquiries, processing
application submissions and collecting, sharing, and managing POC
information for program administration and management purposes. Second,
DoD incurs costs to collect, analyze, and disseminate threat
information.
DoD responds to an average of 2,000 questions each year and these
responses are estimated to take 20 minutes per response. If it takes 20
minutes to respond to each question, it will take 667 hours to respond
to questions. At an hourly wage of $51.16,\13\ it will cost the DoD
$34,107 dollars to respond to questions ($51.16 x (.333 x 2,000) =
$34,107). Costs to the government are incurred when a company applies
to the DIB CS Program to validate and store POC information and to
perform follow-up activities with a company when the information is
outdated. The processing time for these activities is estimated to be
one hour per company. If 8,000 companies participate in the program and
10% of the companies update information with the program annually the
labor cost to the government is expected to be $450,208 = (8,800 x
$51.16).
---------------------------------------------------------------------------
\13\ This is based upon the 2022 General Schedule (GS) pay scale
for a GS-9 Step 5 and is adjusted upward by 100% to adjust for
overhead and benefits.
---------------------------------------------------------------------------
In addition, there is a cost incurred by the DoD to receive cyber
threat information submitted by defense contractors to have it analyzed
by cyber threat experts at DC3. By year 9 of the expanded program, it
is estimated DC3 will receive 40,000 responses per year, based on the
estimate that each participating company elects to submit 5
informational reports (8,000 participants x 5 reports). Each product
takes approximately two hours to create and incurs an hourly labor cost
of $51.16 per hour. This equals $102.32 (2 hours x 51.16) per response.
The labor cost to the government is forecasted to be $4,092,800
annually after 9 years of growth. In addition to processing cyber
threat information, the DoD incurs operational and maintenance costs
for the system receiving and storing cyber threat information. This
system costs the DoD $5,100,000 annually to maintain (covered under
information collection 0704-0489).
Benefits
This program benefits the Department by increasing awareness and
improving assessments of cyber incidents that may affect mission
critical capabilities and services. It continues to be an important
element of the Department's comprehensive effort to defend DoD
information, protect U.S. national interests against cyber-attacks, and
support military operations and contingency plans worldwide. Once a
defense contractor joins the program, they are encouraged to share
information, including cyber threat indicators, that they believe may
be of value in alerting the Government and others, as appropriate, of
adversary activity to enable the development of mitigation strategies
and proactively counter threat actor activity. DC3 develops written
products that include analysis of the threat, mitigations, and
indicators of adversary activity. Even cyber incidents that are not
compromises of covered defense information may be of interest to DoD
for situational awareness purposes. This information is disseminated as
anonymized threat products that are shared with authorized DoD
personnel, other Federal agencies, and company-designated POCs
participating in the DIB CS Program. With the revisions to the
eligibility criteria, the Department will be able to reduce the impact
of cyber threat activity on DIB networks and information systems and,
in turn, preserve its technological advantage and protect DoD
information and warfighting capabilities. The mitigation of the cyber
threat targeting defense contractors reinforces the nation's national
security and economic vitality.
For DIB participants, this program provides valuable cyber threat
information they cannot obtain from anywhere else and technical
assistance through analyst-to-analyst exchanges, mitigation and
remediation strategies, and cybersecurity best practices in a
collaborative environment. The shared unclassified and classified cyber
threat information is used to bolster a company's cybersecurity posture
and mitigate the growing cyber threat. The program's tailored support
for small, mid-size, and large companies with varying cybersecurity
maturity levels is an asset for participants. The program remains a key
element of DoD's cybersecurity efforts by providing services to help
protect DIB CS Program participants and the sensitive DoD information
they handle.
Alternatives
Alternative #1
Maintain status quo with the ongoing voluntary cybersecurity
program for cleared defense contractors.
Reason for Not Selecting Alternative #1
This option is not selected as it does not allow DoD to increase
bilateral information sharing to bolster DIB cybersecurity and
safeguard DoD information transiting on DIB networks. In addition, the
population of defense contractors with mandatory reporting requirements
would continue to exceed those eligible to participate in the DIB CS
Program. Companies that submit mandatory reports but are not eligible
for the DIB CS Program would continue to be excluded from receiving
cyber threat information and technical assistance.
Alternative #2
DoD posts generic cyber threat information and cybersecurity best
practices on a publicly accessible website without directly engaging
participating companies.
Reason for Not Selecting Alternative #2
This alternative was not selected as companies already have access
to open-source cyber threat information and best practices from
multiple sources in the public sector. This alternative does not afford
access by defense contractors to government-furnished cyber threat
information, specifically tailored for the DIB. In addition, this
alternative does not enable defense contractor interaction with DC3.
Alternative #3
Revise eligibility requirements to permit all defense contractors
who own or operate a covered contractor information system
(approximately 80,000 defense contractors) to participate in the DIB CS
Program. Using the 10% estimation used for past program participation,
the program is forecasted to grow to approximately 8,000 defense
contractors.
Reason for Selecting Alternative #3
The revised eligibility criteria allow DoD to perform outreach to a
broader DIB community. Being able to share pertinent cyber threat
information with the DIB will increase both the DoD and defense
contractors' knowledge of the cyber threat landscape. Giving DoD the
ability to have greater visibility over issues affecting unclassified
networks will allow DoD to share pertinent alerts and threat
information with a larger number of DIB organizations. DoD believes
that revising the eligibility criteria to apply to contractors that own
or operate covered contractor information systems is an important step
in managing DoD's operational risk because it will allow additional
companies to begin receiving cyber
[[Page 27836]]
threat information to inform and harden their cybersecurity posture.
DIB organizations that do not meet the current eligibility requirements
to be in a DoD-sponsored cyber threat information sharing program have
expressed interest in this change as noted previously by the growing
percentage of ineligible applicants.
Regulatory Compliance Analysis
A. Executive Order 12866, ``Regulatory Planning and Review'' and
Executive Order 13563, ``Improving Regulation and Regulatory Review''
Executive Order 12866 direct agencies to assess all costs,
benefits, and available regulatory alternatives and, if regulation is
necessary, to select regulatory approaches that maximize net benefits
(including potential economic, environmental, public health, safety
effects, distributive impacts, and equity). Executive Order 13563
emphasizes the importance of quantifying both costs and benefits, of
reducing costs, of harmonizing rules, and of promoting flexibility.
This proposed rule has been designated ``significant,'' under Executive
Order 12866.
B. Congressional Review Act (5 U.S.C. 801 et seq.)
Pursuant to the Congressional Review Act, this proposed rule has
not been designated a major rule, as defined by 5 U.S.C. 804(2). This
proposed rule will not have an economic effect above the $100 million
threshold defined in 5 U.S.C. 804(2) or spur a major increase in costs
or prices for consumers, individual industries, Federal, State, or
local government agencies, or geographic regions; or have significant
adverse effects on competition, employment, investment, productivity,
innovation, or on the ability of United States-based enterprises to
compete with foreign-based enterprises in domestic and export markets.
C. Public Law 96-354, ``Regulatory Flexibility Act'' (5 U.S.C. 601)
The Office of the DoD Chief Information Officer certifies that this
proposed rule is not subject to the Regulatory Flexibility Act (5
U.S.C. 601) because it would not, if promulgated, have a significant
economic impact on a substantial number of small entities. This
proposed rule will have a significant positive impact on small entities
that will become eligible to participate in and receive benefits
through the DIB CS Program. For DIB participants, this program provides
cyber threat information and technical assistance through analyst-to-
analyst exchanges, mitigation and remediation strategies, and
cybersecurity best practices in a collaborative environment. The shared
threat information is used to bolster a company's cybersecurity posture
and mitigate the growing cyber threat. The program's tailored support
for small, mid-size, and large companies with varying cybersecurity
maturity levels is an asset for participants.
Participation in the DIB CS Program is voluntary. Program
application and participation costs are described in the cost analysis
section of this proposed rule. These costs are voluntarily incurred and
associated with the labor and resource costs to complete the required
program paperwork, including execution of the Framework Agreement, to
submit information to the Government, and to receive information from
the Government. The costs associated with applying to the DIB CS
Program are associated exclusively with labor costs and estimated to be
$18.15 per company. None of the program's offering come at an
additional fee to DIB participants and additional costs related to
participation are estimated based on the time investment (labor hours)
required to obtain the benefits as described in the cost analysis of
this preamble. Therefore, the Regulatory Flexibility Act, as amended,
does not require us to prepare a regulatory flexibility analysis.
D. Sec. 202, Public Law 104-4, ``Unfunded Mandates Reform Act''
Section 202 of the Unfunded Mandates Reform Act of 1995 (2 U.S.C.
1532) requires agencies to assess anticipated costs and benefits before
issuing any rule whose mandates require spending in any one year of
$100 million in 1995 dollars, updated annually for inflation. When the
Federal Government passes legislation requiring a State, local, or
tribal government to perform certain actions or offer certain programs
but does not include any funds for the actions or programs in the law,
an unfunded mandate results. This proposed rule will not mandate any
requirements for State, local, or tribal governments, and will not
mandate private sector incurred costs above the $100 million threshold
defined in 2 U.S.C. 1532.
E. Public Law 96-511, ``Paperwork Reduction Act'' (44 U.S.C. Chapter
35)
This proposed rule contains the following information collection
requirements under the Paperwork Reduction Act (PRA) of 1995.
0704-0489, ``DoD's Defense Industrial Base (DIB)
Cybersecurity (CS) Activities Cyber Incident Reporting,''
0704-0490, ``DoD's Defense Industrial Base (DIB)
Cybersecurity (CS) Points of Contact (POC) Information.''
With the revisions in eligibility criteria, DoD expects the burden
associated with both collections to increase as additional defense
contractors join the DIB CS Program and additional cyber threat
information is reported. DOD is requesting comments on both collections
as part of this proposed rule. Additional information regarding these
collections of information--including all background materials--can be
found at https://www.reginfo.gov/public/do/PRAMain by using the search
function to enter either the title of the collection or the Office of
Management and Budget (OMB) Control Number.
Comments are invited on: (a) whether the proposed collections of
information are necessary for the proper performance of the functions
of DoD, including whether the information will have practical utility;
(b) the accuracy of the estimate of the burden for both information
collections; (c) ways to enhance the quality, utility, and clarity of
the information to be collected; and (d) ways to minimize the burden on
respondents, including the use of automated collection techniques or
other forms of information technology. Specific information on both
collections is below.
DoD's Defense Industrial Base (DIB) Cybersecurity (CS) Activities Cyber
Incident Reporting--OMB Control Number 0704-0489
Title: DoD's Defense Industrial Base (DIB) Cybersecurity (CS)
Activities Cyber Incident Reporting.
Type of Request: Revision.
Number of Participants: Number of DoD contractors eligible to
participate in the voluntary program is 80,000. DoD estimates that
approximately 1% of the newly eligible population will elect to join
the program each year with program growth plateauing at approximately
10% of the population by Year 9. Based on this estimate, after the
first three years of the program expansion, 2,400 defense contractors
will join the existing 980 participating companies resulting in 3,380
defense contractors submitting voluntary cyber threat information
reports.
Projected Responses per Participant: Five reports per participant.
Annual Total Responses: 16,900.
Average Burden per Response: Two hours.
[[Page 27837]]
Annual Total Burden Hours: 33,800 hours for all voluntary
submissions.
Needs and Uses: DoD designated DC3 as the single focal point for
receiving all cyber incident reporting affecting the unclassified
networks of DoD contractors from industry and other government
agencies. DoD collects cyber incident and threat reports using the
Defense Industrial Base Network (DIBNet) portal (https://dibnet.dod.mil). Cyber threat reports are analyzed by experts at DC3
and they, in turn, develop written products that include analysis of
the threat, mitigations, and indicators of adversary activity. These
anonymized products are shared with authorized DoD personnel,
authorized personnel from other Federal agencies, and authorized POCs
from the DIB CS Program.
Affected Public: Business or other for-profit and not-for-profit
institutions.
Frequency: On occasion.
Respondent's Obligation: Voluntary.
DoD's Defense Industrial Base (DIB) Cybersecurity (CS) Points of
Contact (POC) Information--OMB Control Number 0704-0490
Title: DoD's Defense Industrial Base (DIB) Cybersecurity (CS)
Activities Points of Contact (POC) Information.
Type of Request: Revision.
Number of Participants: DoD contractors impacted is 80,000. DoD
estimates that approximately 1% of the newly eligible population (800
defense contractors) will elect to join the program each year with
program growth plateauing at approximately 10% of the population by
Year 9. Each year, approximately 10% of participating companies will
report changes to company contacts. If 10% of the pre-existing
companies (2,580 in year 2) submit updates to the POC information and
800 new companies join, by year 3 this would result in 1,058 annual
updates.
Projected Responses per Participant: Initial collection is one per
company with updates on a case-by-case basis.
Annual Total Responses: 1,058.
Average Burden per Response: 20 minutes.
Annual Total Burden Hours: 353 hours for all participants.
Needs and Uses: Defense contractors complete a program application
and sign the DIB CS Program Framework to initiate participation. The
Government will collect business POC information from all DIB CS
Program participants on a one-time basis, with updates as necessary, to
facilitate communications and the sharing of share unclassified and
classified cyber threat information.
Affected Public: Business or other for-profit and not-for-profit
institutions.
Frequency: On occasion.
Respondent's Obligation: Voluntary.
F. Executive Order 13132, ``Federalism''
Executive Order 13132 establishes certain requirements that an
agency must meet when it promulgates a proposed rule (and subsequent
final rule) that imposes substantial direct requirement costs on State
and local governments, preempts State law, or otherwise has federalism
implications. This proposed rule will not have a substantial effect on
State and local governments.
G. Executive Order 13175, ``Consultation and Coordination With Indian
Tribal Governments''
Executive Order 13175 establishes certain requirements that an
agency must meet when it promulgates a proposed rule (and subsequent
final rule) that imposes substantial direct compliance costs on one or
more Indian tribes, preempts tribal law, or effects the distribution of
power and responsibilities between the Federal Government and Indian
tribes. This proposed rule will not have a substantial effect on Indian
tribal governments.
List of Subjects in 32 CFR Part 236
Government contracts, Security measures.
Accordingly, DoD proposes to amend 32 CFR part 236 as follows:
PART 236--DEPARTMENT OF DEFENSE (DoD) DEFENSE INDUSTRIAL BASE (DIB)
CYBERSECURITY (CS) ACTIVITIES
0
1. The authority citation for 32 CFR part 236 continues to read as
follows:
Authority: 10 U.S.C. 391, 393, and 2224; 44 U.S.C. 3506 and
3544; 50 U.S.C. 3330.
0
2. Revise the heading of 32 CFR part 236 to read as set forth above.
Sec. 236.1 [Amended]
0
3. Amend Sec. 236.1 by:
0
a. Removing ``eligible DIB participants'' and adding in its place
``eligible DoD contractors''.
0
b. Removing ``DIB CS program'' and adding in its place ``DIB CS
Program'' wherever it appears.
0
c. Removing ``DIB CS participants'' and adding in its place ``DIB CS
Program participants''.
0
d. Removing ``DIB participants' capabilities'' and adding in its place
``DIB CS Program participants' capabilities''.
Sec. 236.2 [Amended]
0
4. Amend Sec. 236.2 by:
0
a. Removing the definition of ``Access to media''.
0
b. In the definition of ``DIB participant'':
0
i. Removing ``DIB participant'' and adding in its place ``DIB CS
Program participant''.
0
ii. Removing ``DIB CS program'' and adding in its place ``DIB CS
Program''.
0
c. Removing ``DIB CS program'' in the definition of ``Government
furnished information (GFI)'' and adding in its place ``DIB CS
Program''.
Sec. 236.3 [Amended]
0
5. Amend Sec. 236.3 by:
0
a. Removing ``program'' and adding in its place ``Program
participants'' in paragraph (b)(1).
0
b. Removing ``DIB CS program'' and adding in its place ``DIB CS
Program'' in paragraph (c).
0
6. Amend Sec. 236.4 by:
0
a. Removing ``http'' and adding in its place ``https'' in paragraphs
(b)(2), (c), and (d).
0
b. Removing ``https://iase.disa.mil/pki/eca/Pages/index.aspx'' and
adding in its place ``https://public.cyber.mil/eca/'' in paragraph (e).
0
c. Revising paragraph (f).
0
d. Adding a comma after ``as appropriate'' in the first sentence in
paragraph (g).
0
e. Removing ``paragraph (e)'' and adding in its place ``paragraph (i)''
in paragraph (k).
0
f. In paragraph (m)(4):
0
i. Removing ``DIB contractors'' and adding in its place ``defense
contractors''.
0
ii. Removing ``DIB CS program'' and adding in its place ``DIB CS
Program''.
0
g. Revising paragraph (p).
The revisions read as follows:
Sec. 236.4 Mandatory cyber incident reporting procedures.
* * * * *
(f) Third-party service provider support. If the contractor
utilizes a third-party service provider (SP) for information system
security services, the contractor may authorize the SP to report cyber
incidents on behalf of the contractor.
* * * * *
(p) Freedom of Information Act (FOIA). Agency records, which may
include qualifying information received from non-Federal entities, are
subject to request under the Freedom of Information Act (5 U.S.C. 552).
The Government will notify the non-Government source or submitter
(e.g., contractor or DIB CS Program participant) of the information in
[[Page 27838]]
accordance with the procedures in 32 CFR 286.10.
* * * * *
0
7. Amend Sec. 236.5 by:
0
a. Revising section heading and paragraph (a).
0
b. In paragraph (b):
0
i. Removing ``DIB CS program'' and adding in its place ``DIB CS
Program''.
0
ii. Removing ``DIB participant'' and adding in its place ``DIB CS
Program participant''.
0
c. In paragraph (c):
0
i. Removing ``DIB participant'' and adding in its place ``DIB CS
Program participant''.
0
ii. Removing ``individual DIB participants'' and adding in its place
``individual DIB CS Program participants.''
0
d. In paragraph (d):
0
i. Removing ``DoD's DIB CS Program Office'' and adding in its place
``DoD's DIB CS Program Management Office''.
0
ii. Removing ``DoD DIB'' and adding in its place ``DoD-DIB''.
0
iii. Removing ``DIB CS program'' and adding in its place ``DIB CS
Program''.
0
e. Removing ``DIB participants'' and adding in its place ``DIB CS
Program participants'' in paragraph (e).
0
f. Redesignating paragraphs (f) through (n) as paragraphs (g) through
(o).
0
g. Adding new paragraph (f).
0
h. In newly redesignated paragraph (g):
0
i. Removing the heading.
0
ii. Removing ``DIB participants'' and adding in its place ``DIB CS
Program participants''.
0
i. Revising newly redesignated paragraphs (h) and (i).
0
j. Removing ``DIB participants'' and adding in its place ``DIB CS
Program participants'' in newly redesignated paragraph (j) introductory
text.
0
k. In newly redesignated paragraph (k):
0
i. Removing ``DIB participants'' and adding in its place ``DIB CS
Program participants''.
0
ii. Removing ``DIB participant'' and adding in its place ``DIB CS
Program participant''.
0
l. Removing ``DIB participants'' and adding in its place ``DIB CS
Program participants'' in newly redesignated paragraph (l).
0
m. Removing ``DIB participants'' and adding in its place ``DIB CS
Program participants'' in newly redesignated paragraph (m).
0
n. In newly redesignated paragraph (n):
0
i. Removing ``DIB participant'' and adding in its place ``DIB CS
Program participant'' wherever it appears.
0
ii. Removing ``DIB participant's FA'' and adding in its place ``DIB CS
Program participant's FA''.
0
o. In newly redesignated paragraph (o):
0
i. Removing ``DIB participant'' and adding in its place ``DIB CS
Program participant'' wherever it appears.
0
ii. Removing ``paragraph (m) of this section'' and adding in its place
``paragraph (n) of this section.''
The revisions and addition read as follows:
Sec. 236.5 DoD's DIB CS Program.
(a) All defense contractors that meet the requirements set forth in
Sec. 236.7 are eligible to join the DIB CS Program as a DIB CS Program
participant. Defense contractors meeting the additional eligibility
requirements in Sec. 236.7 can elect to access and receive classified
information electronically.
* * * * *
(f) As participants of the DIB CS Program, defense contractors are
encouraged to share cyber threat indicators and information that they
believe are valuable in alerting the Government and other DIB CS
Program participants to better counter threat actor activity. Cyber
activity that is not covered under Sec. 236.4 may be of interest to
DIB CS Program participants and DoD.
* * * * *
(h) Prior to receiving GFI, each DIB CS Program participant shall
provide the requisite points of contact information, to include U.S.
citizenship and security clearance information, as applicable, for the
designated personnel within their company in order to facilitate the
DoD-DIB interaction in the DIB CS Program. The Government will confirm
the accuracy of the information provided as a condition of that point
of contact being authorized to act on behalf of the DIB CS Program
participant for this program.
(i) GFI will be issued via both unclassified and classified means.
DIB CS Program participants handling and safeguarding of classified
information shall be in compliance with 32 CFR part 117. The Government
shall specify transmission and distribution procedures for all GFI, and
shall inform DIB CS Program participants of any revisions to previously
specified transmission or procedures.
* * * * *
Sec. 236.6 [Amended]
0
8. Amend Sec. 236.6 by:
0
a. Removing ``program'' and adding in its place ``Program'' in the
section heading.
0
b. In paragraph (a):
0
i. Removing ``DIB CS program'' and adding in its place ``DIB CS
Program'' wherever it appears.
0
ii. Removing ``DIB participants'' and adding in its place ``DIB CS
Program participants''.
0
c. In paragraph (b):
0
i. Removing ``DIB CS participants'' and adding in its place ``DIB CS
Program participants''.
0
ii. Removing ``https://www.dhs.gov/enhanced-cybersecurity-services'' and
adding in its place ``https://www.cisa.gov/enhanced-cybersecurity-services-ecs''.
0
d. In paragraph (c):
0
i. Removing ``DIB CS program'' and adding in its place ``DIB CS
Program''.
0
ii. Removing ``obligate the DIB participant'' and adding in its place
``obligate the DIB CS Program participant''.
0
iii. Removing ``taken by the DIB participant'' and adding in its place
``taken by the DIB CS Program participant''.
0
iv. Removing ``taken on the DIB participant's'' and adding in its place
``taken on the DIB CS Program participant's''.
0
e. In paragraph (d):
0
i. Removing ``DIB participant's participation'' and adding in its place
``DIB CS Program participant's participation''.
0
ii. Removing ``DIB CS program'' and adding in its place ``DIB CS
Program''.
0
iii. Removing ``approval of the DIB participant'' and adding in its
place ``approval of the DIB CS Program participant''.
0
f. In paragraph (e):
0
i. Removing ``DIB participant'' and adding in its place ``DIB CS
Program participant'' wherever it appears.
0
ii. Removing ``DIB CS program'' and adding in its place ``DIB CS
Program''.
0
g. Adding ``change of status as a defense contractor,'' after ``Upon
termination of the FA,'' in paragraph (f).
0
h. In paragraph (g):
0
i. Removing ``DIB participants' rights'' and adding in its place ``DIB
CS Program participants' rights''.
0
ii. Removing ``DIB CS program'' and adding in its place ``DIB CS
Program''.
0
iii. Removing ``the requirement for DIB participants'' and adding in
its place ``the requirement for DIB CS Program participants''.
0
9. Revise Sec. 236.7 to read as follows:
Sec. 236.7 DoD's DIB CS Program requirements.
(a) To participate in the DIB CS Program, a contractor must own or
operate a covered contractor information system and shall execute
[[Page 27839]]
the standardized FA with the Government (available during the
application process), which implements the requirements set forth in
Sec. Sec. 236.5 and 236.6 and this section.
(b) In order for DIB CS Program participants to receive classified
cyber threat information electronically, the company must be a cleared
defense contractor and must:
(1) Have an existing active facility clearance level (FCL) to at
least the Secret level in accordance with 32 CFR part 117;
(2) Have or acquire a Communication Security (COMSEC) account in
accordance with 32 CFR part 117, which provides procedures and
requirements for COMSEC activities;
(3) Have or acquire approved safeguarding for at least Secret
information, and continue to qualify under 32 CFR part 117 for
retention of its FCL and approved safeguarding; and
(4) Obtain access to DoD's secure voice and data transmission
systems supporting the voluntary DIB CS Program.
Dated: April 25, 2023.
Aaron T. Siegel,
Alternate OSD Federal Register Liaison Officer, Department of Defense.
[FR Doc. 2023-09021 Filed 5-2-23; 8:45 am]
BILLING CODE 5001-06-P