Homeland Security Acquisition Regulation; Safeguarding of Controlled Unclassified Information, 40560-40603 [2023-11270]
Download as PDF
40560
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
DEPARTMENT OF HOMELAND
SECURITY
48 CFR Parts 3001, 3002, 3004 and
3052
[HSAR Case 2015–001; DHS Docket No.
DHS–2017–0006]
RIN 1601–AA76
Homeland Security Acquisition
Regulation; Safeguarding of Controlled
Unclassified Information
Office of the Chief Procurement
Officer, Department of Homeland
Security (DHS).
ACTION: Final rule.
AGENCY:
DHS is issuing a final rule to
amend the Homeland Security
Acquisition Regulation (HSAR) to
modify a subpart, remove an existing
clause and reserve the clause number,
update an existing clause, and add two
new contract clauses to address
requirements for the safeguarding of
Controlled Unclassified Information
(CUI). This final rule implements
security and privacy measures to
safeguard CUI and facilitate improved
incident reporting to DHS. These
measures are necessary because of the
urgent need to protect CUI and respond
appropriately when DHS contractors
experience incidents with DHS
information.
DATES: This final rule is effective July
21, 2023.
FOR FURTHER INFORMATION CONTACT:
Shaundra Ford, Procurement Analyst,
DHS, Office of the Chief Procurement
Officer, Acquisition Policy and
Legislation, (202) 447–0056, or email
HSAR@hq.dhs.gov. When using email,
include HSAR Case 2015–001 in the
subject line.
SUPPLEMENTARY INFORMATION:
SUMMARY:
lotter on DSK11XQN23PROD with RULES3
Table of Contents
I. Executive Summary
A. Purpose of the Regulatory Action
B. Legal Authority
C. Costs and Benefits
II. Background
III. Discussion and Analysis
A. Significant Changes From Proposed
Rule
B. Discussion of Public Comments and
Responses
1. General
2. Alignment With FISMA, E.O. 13556
(Controlled Unclassified Information),
and Its Implementing Regulation at 32
CFR Part 2002 (Controlled Unclassified
Information)
3. Applicability of NIST SP 800–171
4. ATO Requirements
5. CUI Registry
6. DHS Internal Policies and Procedures
7. Definitions
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
8. Reciprocity in Interagency Regulations
and Information Security Requirements
9. Incident Reporting and Response
10. Privacy Requirements
11. Sanitization of Government and
Government-Activity-Related Files and
Information
12. Subcontractor Flow-Down
Requirements
13. Requirements Applicable to
Educational Institutions
14. Self-Deleting Requirements
15. Applicability to Service Contracts
16. Costs
IV. Statutory and Regulatory Requirements
A. Executive Orders 12866 and 13563
1. Outline of the Analysis
2. Summary of the Analysis
3. Subject-by-Subject Analysis
4. Summary
5. Regulatory Alternatives
B. Regulatory Flexibility Act
1. A Statement of the Need for, and
Objectives of, the Rule
2. A Statement of the Significant Issues
Raised by the Public Comments in Response
to the IRFA, a Statement of the Assessment
of the Agency of Such Issues, and a
Statement of Any Changes Made to the
Proposed Rule as a Result of Such Comments
3. The Response of the Agency to Any
Comments Filed by the Chief Counsel for
Advocacy of the SBA in Response to the
Proposed Rule, and a Detailed Statement of
Any Change Made to the Proposed Rule as
a Result of the Comments
4. A Description of and an Estimate of the
Number of Small Entities to Which the Rule
Will Apply or an Explanation of Why No
Such Estimate is Available
5. A Description of the Projected Reporting,
Recordkeeping, and Other Compliance
Requirements of the Rule, Including an
Estimate of the Classes of Small Entities That
Will Be Subject to the Requirement and the
Type of Professional Skills Necessary for
Preparation of the Report or Record
6. A Description of the Steps the Agency
Has Taken To Minimize the Significant
Economic Impact on Small Entities
Consistent With the Stated Objectives of
Applicable Statutes, Including a Statement of
the Factual, Policy, and Legal Reasons for
Selecting the Alternative Adopted in the
Final Rule and Why Each of the Other
Significant Alternatives to the Rule
Considered by the Agency That Affects the
Impact on Small Entities Was Rejected
C. Paperwork Reduction Act
Table of Abbreviations
ATO Authority to Operate
BAA Buy American Act
CAGE Commercial and Government Entity
CIO Chief Information Officer
COR Contracting Officer’s Representative
CSO Chief Security Officer
CUI Controlled Unclassified Information
CVI chemical-terrorism vulnerability
information
DHS Department of Homeland Security
DoD Department of Defense
EA Executive Agent
E.O. Executive Order
FAR Federal Acquisition Regulation
FedRAMP Federal Risk and Authorization
Management Program
PO 00000
Frm 00002
Fmt 4701
Sfmt 4700
FIPS Federal Information Processing
Standards
FISMA Federal Information Security
Modernization Act of 2014
FPDS Federal Procurement Data System
FR Federal Register
FRFA final regulatory flexibility analysis
FTE full-time equivalent
FY Fiscal Year
GFE government-furnished equipment
GSA General Services Administration
HIPAA Health Insurance Portability and
Accountability Act
HSAR Homeland Security Acquisition
Regulation
IRFA initial regulatory flexibility analysis
ISAC Information Sharing and Analysis
Center
ISAO Information Sharing and Analysis
Organization
IT information technology
NAICS North American Industry
Classification System
NARA National Archives and Records
Administration
NIST National Institute of Standards and
Technology
NPRM notice of proposed rulemaking
OIRA Office of Information and Regulatory
Affairs
OMB Office of Management and Budget
PCII protected critical infrastructure
information
PII Personally Identifiable Information
POA&M Plans of Action and Milestones
POC Point of Contact
PSC Product and Service Code
RFA Regulatory Flexibility Act of 1980, as
amended by the Small Business Regulatory
Enforcement Fairness Act of 1996
SA Security Authorization
SBA Small Business Administration
SME subject-matter expert
SOC Security Operations Center
SP Special Publication
SPII Sensitive Personally Identifiable
Information
SRTM Security Requirements Traceability
Matrix
SSI Sensitive Security Information
TAA Trade Agreements Act
TSA Transportation Security
Administration
UEI Unique Entity Identifier
US–CERT United States Computer
Emergency Readiness Team
I. Executive Summary
A. Purpose of the Regulatory Action
The purpose of this final rule is to
implement security and privacy
measures to safeguard CUI and facilitate
improved incident reporting to DHS.
This final rule does not apply to
classified information. These measures
are necessary because of the urgent need
to protect CUI and respond
appropriately when DHS contractors
experience incidents with DHS
information. Persistent and pervasive
high-profile breaches of Federal
information continue to demonstrate the
need to ensure that information security
protections are clearly, effectively, and
E:\FR\FM\21JNR3.SGM
21JNR3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
consistently addressed in contracts.
This final rule strengthens and expands
existing HSAR language to ensure
adequate security when: (1) contractor
and/or subcontractor employees will
have access to CUI; (2) CUI will be
collected or maintained on behalf of the
agency; or (3) Federal information
systems, which include contractor
information systems operated on behalf
of the agency, are used to collect,
process, store, or transmit CUI.
Specifically, the final rule:
• Identifies CUI handling
requirements and security processes and
procedures applicable to Federal
information systems, which include
contractor information systems operated
on behalf of the agency;
• Identifies incident reporting
requirements, including timelines and
required data elements, inspection
provisions, and post-incident activities;
• Requires certification of sanitization
of government and government-activityrelated files and information; and
• Requires contractors to have in
place procedures and the capability to
notify and provide credit monitoring
services to any individual whose
Personally Identifiable Information (PII)
or Sensitive PII (SPII) was under the
control of the contractor or resided in
the information system at the time of the
incident.
lotter on DSK11XQN23PROD with RULES3
B. Legal Authority
This rule addresses the safeguarding
requirements specified in the Federal
Information Security Modernization Act
of 2014 (FISMA) (44 U.S.C. 3551, et
seq.); Office of Management and Budget
(OMB) Circular A–130, Managing
Information as a Strategic Resource;
relevant National Institute of Standards
and Technology (NIST) guidance;
Executive Order (E.O.) 13556,
Controlled Unclassified Information (75
FR 68675, Nov. 9, 2010), and its
implementing regulation at 32 CFR part
2002; and the following OMB
memoranda: M–17–12, Preparing for
and Responding to a Breach of
Personally Identifiable Information; M–
14–03, Enhancing the Security of
Federal Information and Information
Systems; and Reporting Instructions for
FISMA and Agency Privacy
Management as identified in various
OMB memoranda.
C. Costs and Benefits
The final rule will apply to DHS
contractors that require access to CUI,
collect or maintain CUI on behalf of the
Government, or operate Federal
information systems, which include
contractor information systems
operating on behalf of the agency, that
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
collect, process, store, or transmit CUI.
DHS estimates the final rule will have
an annualized cost that ranges from
$15.32 million to $17.28 million at a
discount rate of 7 percent and a total 10year cost that ranges from $107.62
million to $121.37 million at a discount
rate of 7 percent. The primary
contributors to these costs are the
independent assessment requirement
and reporting and recordkeeping
requirements. There are additional
small, quantified costs from rule
familiarization and security review
processes. DHS was unable to quantify
costs associated with incident reporting
requirements, PII and SPII notification
requirements, credit monitoring
requirements and they are therefore
discussed qualitatively. DHS was unable
to quantify the cost savings or benefits
associated with the rule. However, the
final rule is expected to produce cost
savings by reducing the time required to
grant an ATO, reducing DHS time
reviewing and reissuing proposals
because contractors are better qualified,
and reducing the time to identify a data
breach. The final rule also produces
benefits by better notifying the public
when their data are compromised,
requiring the provision of credit
monitoring services so that the public
can better monitor and avoid costly
consequences of data breaches, and
reducing the severity of incidents
through timely incident reporting.
II. Background
DHS published a notice of proposed
rulemaking (NPRM) in the Federal
Register at 82 FR 6429 on January 19,
2017, to implement adequate security
and privacy measures to safeguard CUI
from unauthorized access and
disclosure and facilitate improved
incident reporting to DHS. Fourteen
respondents submitted public
comments in response to the proposed
rule. This final rule incorporates the
reasoning of the proposed rule except as
reflected elsewhere in this preamble.
III. Discussion and Analysis
DHS reviewed the public comments
in the development of the final rule. A
certain number of the comments
received were outside the scope of the
rule. A discussion of the comments
within the scope of the rule and the
changes made to the rule as a result of
those comments is provided, as follows:
A. Significant Changes From Proposed
Rule
1. HSAR 3052.204–71, Contractor
Employee Access, is revised as follows:
• Revised paragraph (a) to remove the
definition of ‘‘sensitive information’’
PO 00000
Frm 00003
Fmt 4701
Sfmt 4700
40561
and replace it with the definition of
‘‘CUI’’;
• Revised paragraph (b) to remove the
definition of ‘‘information technology
resources’’ and replace it with the
definition of ‘‘information resources’’;
• Replaced all references to ‘‘sensitive
information’’ with ‘‘CUI’’ and all
references to ‘‘information technology
resources’’ with ‘‘information
resources’’;
• Revised paragraph (e) to clarify that
both initial and refresher training
concerning the protection and
disclosure of CUI is required;
• Revised paragraph (g) of Alternate I
to make clear that additional training on
certain CUI categories may be required
if identified in the contract; and
• Replaced the reference to
‘‘statement of work’’ in paragraph (h) of
Alternate I with ‘‘contract.’’
2. Restructured clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, as follows:
• Made the requirements of paragraph
(c), Authority to Operate, into Alternate
I to the basic clause; and
• Made the requirements of
paragraphs (f), PII and SPII Notification
Requirements, and (g), Credit
Monitoring Requirements, into a
separate clause at 3052.204–7Y,
Notification and Credit Monitoring
Requirements for Personally Identifiable
Information Incidents. This includes
clarifying updates to the PII and SPII
Notification Requirements section.
3. Revised requirements of
restructured clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, as follows:
• Made clear that both contractors
and subcontractors are responsible for
reporting known or suspected incidents
to the Department;
• Made clear that subcontractors are
required to notify the prime contractor
that they have reported a known or
suspected incident to the Department;
• Increased the amount of time a
vendor must retain monitoring/packet
capture data from 90 days to 180 days;
and
• Revised the requirements for when
prime contractors must include clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information, in
subcontracts.
4. Made clarifying edits to the
definitions of the following terms:
Controlled Unclassified Information,
Sensitive Security Information,
Homeland Security Agreement
Information, Information Systems
Vulnerability Information, Personnel
Security Information, Privacy
Information, and Sensitive Personally
Identifiable Information.
E:\FR\FM\21JNR3.SGM
21JNR3
40562
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
5. Made additional amendments to
paragraph (b) of clause 3052.212–70 to
add clause 3052.204–7Y, Notification
and Credit Monitoring Requirements for
Personally Identifiable Information
Incidents.
lotter on DSK11XQN23PROD with RULES3
B. Discussion of Public Comments and
Responses
1. General
Comment: Two comments requested
that the Department withdraw the
proposed rule. One of the comments
requested that DHS grant an extension
of the comment period if the rule was
not going to be withdrawn. The other
comment stated that the rule was illconsidered and was not properly
coordinated with other agencies that
follow and support the principles in 32
CFR part 2002. The comment also stated
the rulemaking adds burdens to DHS
and its contractors that differ from what
is required or expected by others and
requested that DHS delay
implementation of the entire rule or
suspend the rulemaking process
altogether pending further progress with
the expected general Federal
Acquisition Regulation (FAR) CUI rule.1
Response: Given the nature of this
rule, and the prevalent and persistent
nature of cyber-attacks impacting both
public and private networks, DHS
declines the respondents’ request to
withdraw this rule. Failure to proceed
with this rule places at risk both the
Department’s CUI and the information
systems where CUI resides, which
would be in contravention to the
Department’s mission and to the public
interest. In addition, DHS will neither
delay nor suspend this rulemaking
pending progress on the FAR CUI rule.
A 30-day extension of the comment
period from March 20, 2017, to April 19,
2017, was granted. Additionally, DHS
conducted extensive interagency
coordination while developing this rule,
including coordination with NARA.
Also, the FAR CUI rule does not
eliminate the need for DHS to proceed
with this rulemaking. DHS is a
participant on the FAR team responsible
for drafting the FAR language that will
implement the CUI Program and has
determined that the issuance of a FAR
CUI rule does not eliminate the need for
DHS to identify its agency-specific
requirements for CUI and the
methodology it uses to ensure that
Federal information systems, which
includes contractor information systems
operated on behalf of the agency, that
collect, process, store, or transmit CUI
1 Rulemaking to implement the National Archives
and Records Administration (NARA) CUI program
(see E.O. 13556 and 32 CFR part 2002).
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
are adequately protected. Also, DHS
does not agree that this rulemaking adds
burdens to DHS and its contractors that
differ substantively from what is
required or expected by other agencies
as the requirements for Federal
information systems are largely based in
statute, i.e., FISMA (44 U.S.C. 3551, et
seq.), and implementing policies
promulgated by OMB and NIST. Agency
specific requirements such as an
independent assessment and security
review are not in conflict with these
requirements. They are at the discretion
of the agency, considered industry best
practices, and are actually becoming
more pervasive Governmentwide.
Notwithstanding this, DHS has
determined that information security is
of paramount importance and is
prepared to accept the cost impacts
stemming from vendor compliance with
these requirements.
Comment: One respondent stated that
the rule does not clearly articulate how
requirements would be applied to
professional service providers, what
safeguards they would be obligated to
provide, or how they would be assessed
by DHS.
Response: Clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, clearly identifies the
requirements applicable to contractors
that access or develop CUI under DHS
contracts, as well as the information
security requirements applicable to
Federal information systems, which
include contractor information systems
operated on behalf of the agency. The
applicability of these requirements does
not change depending on the type of
contractor. As such, there is no need to
identify requirements applicable to the
subset of contractors that fall within the
professional services community.
Comment: One respondent proposed
that DHS use a server that requires
verification from a higher ranking
official so that the information does not
enter the wrong hands, such as an
extremist group. The respondent also
recommended that there should be
logins for each official that could be
listed on public servers, as long as the
server was American, and that citizens
trying to access the information should
pass a background check to make sure
they are not a threat.
Response: The commenter has
oversimplified the process by which
DHS should ensure CUI is adequately
protected, and DHS has made no
corresponding changes to the rule.
While DHS and its contractors routinely
use servers, logins, and passwords to
control access on networks and
information systems, this is only a
subset of the actions required to ensure
PO 00000
Frm 00004
Fmt 4701
Sfmt 4700
CUI and the information systems where
CUI resides are adequately protected.
Making login information publicly
available is a violation of information
security policy. Also, limiting servers
used by the Department and its
contractors to those manufactured only
in the United States does not ensure the
security of the server and violates
statutory requirements that govern
Federal procurements. DHS, like other
Departments and agencies, adheres to
FAR part 25, Foreign Acquisition, when
purchasing supplies. FAR part 25
details the application of the Buy
American Act (BAA) and the Trade
Agreements Act (TAA), including the
dollar thresholds at which the TAA
supersedes the BAA and nondomestic
trading partners receive equal treatment
with domestic sources. Additionally,
the Department already has in place
background investigation requirements
for Federal employees and contractors
that have access to CUI. Where the
Department has determined access to
CUI must be limited to U.S. citizens and
lawful permanent residents, DHS
policies and regulations already reflect
those requirements.
Comment: One respondent stated that
the proposed rule is very important
considering how open information is in
this day and age, adding that this rule
will help secure important information
about the U.S. Government.
Response: DHS agrees that this rule is
important and that its requirements will
help ensure the security of important
government information.
Comment: One respondent stated that
small businesses should be concerned
by this rule, citing that DHS
acknowledged that the rule is a
‘‘significant’’ regulatory action that will
impact small business. The respondent
stated that there is nothing specific in
the rule to assure the small business
community that it will be able to
comply.
Response: This rule is a ‘‘significant’’
regulatory action that will have an
impact on small business; however, this
comment implies that all small
businesses will be impacted equally,
which is not the case. Small businesses
that routinely provide services to the
Government that rely on Federal
information systems, which include
contractor information systems operated
on behalf of an agency, already are
positioned to implement these
requirements and always have been
required to do so under DHS contracts.
Information security and information
security requirements applicable to
Federal information systems are not
based on the size of a particular
business but rather on the sensitivity of
E:\FR\FM\21JNR3.SGM
21JNR3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
lotter on DSK11XQN23PROD with RULES3
the information and the impact(s) of
unauthorized access to such
information. Applying a lesser standard
because a business voluntarily operating
in this space is considered small would
be untenable and in contravention to the
mission of the Department.
Additionally, it is important to note that
DHS’s commitment to small business
participation is unparalleled, as
evidenced by the Department’s 12
consecutive ratings of ‘‘A’’ or higher on
the Small Business Administration’s
(SBA) Small Business Procurement
Scorecard (see https://www.sba.gov/
document/support-departmenthomeland-security-contractingscorecard). The Department expressed
in the proposed rule its interest in
receiving comments from small business
concerns related to this rule and has
thoroughly considered and adjudicated
all comments received.
Comment: One respondent stated that
guidance on DHS CUI requirements for
cleared facilities should be consistent
with Department of Defense (DoD)
cleared facility requirements.
Response: The protection of classified
information at contractor locations,
whether cleared by DoD or another
government agency, is outside the scope
of this regulation. CUI is protected
according to the underlying law,
regulation, or Governmentwide policy.
DHS does not have the broad authority
to waive CUI safeguarding or
dissemination requirements that differ
from those of classified information.
Comment: One respondent questioned
if the proposed rule covers sharing of
information on software vulnerabilities
with Information Sharing and Analysis
Organizations (ISAOs) or Information
Sharing and Analysis Centers (ISACs).
The respondent also questioned if the
ISAOs or ISACs require flow-down of
the clauses to ensure that their members
provide adequate protection in
accordance with the DHS proposed rule.
The respondent stated such a
requirement would impose a significant
barrier for private sector entities to
participate in information sharing.
Response: DHS shares information
with ISAOs and ISACs through
information sharing agreements between
the Government and the ISAO/ISAC,
not through contracts. Generally,
information sharing agreements do not
include the clauses.
2. Alignment With FISMA, E.O. 13556
(Controlled Unclassified Information),
and Its Implementing Regulation at 32
CFR Part 2002 (Controlled Unclassified
Information)
Comment: Several respondents stated
that the proposed rule is not consistent
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
with FISMA, E.O. 13356, and 32 CFR
part 2002.
Response: (a) Alignment with FISMA:
The rule is fully consistent with FISMA.
FISMA and its predecessor, the Federal
Information Security Management Act
of 2002, require that agency heads
provide ‘‘information security
protections commensurate with the risk
and magnitude of the harm resulting
from unauthorized access, use,
disclosure, disruption, modification, or
destruction of—(i) information collected
or maintained by or on behalf of the
agency; and (ii) information systems
used or operated by an agency or by a
contractor of an agency or other
organization on behalf of an agency
. . . .’’ See, e.g., 44 U.S.C.
3554(a)(1)(A). The rule is consistent
with these requirements by requiring
that information collected or maintained
on behalf of the Department and
information systems used or operated by
an agency or by a contractor of an
agency or other organization on behalf
of an agency are adequately protected.
The rule does this in two ways by
identifying: (1) requirements and DHS
policies and procedures for handling
and protecting CUI collected and
maintained on behalf of the Department;
and (2) security requirements and
procedures for information systems
used or operated by a contractor on
behalf of an agency.
(b) Alignment with E.O. 13556 and 32
CFR part 2002: The rule is fully
consistent with E.O. 13556 and 32 CFR
part 2002 (81 FR 63324, Sept. 14, 2016).
The NARA CUI rule requires
Departments and agencies to develop
internal policies and procedures to
implement the requirements of the CUI
Program.2 These policies and
procedures are subject to review and
approval by the CUI Executive Agent
(EA) before they are finalized. In
addition, the NARA CUI rule establishes
baseline information security
requirements necessary to protect CUI
Basic 3 on nonfederal information
2 The NARA CUI rule is implemented at 32 CFR
part 2002 (81 FR 63324). That regulation describes
the executive branch’s CUI Program and establishes
policy for designating, handling, and decontrolling
information that qualifies as CUI. The CUI Program
standardizes the way the executive branch handles
information that requires protection under laws,
regulations, or Governmentwide policies but that
does not qualify as classified under E.O. 13526,
Classified National Security Information (Dec. 29,
2009), or any predecessor or successor order, or the
Atomic Energy Act of 1954 (42 U.S.C. 2011, et seq.),
as amended.
3 CUI Basic is the subset of CUI for which the
authorizing law, regulation, or Governmentwide
policy does not set out specific handling or
dissemination controls. Agencies handle CUI Basic
according to the uniform set of controls set forth in
32 CFR part 2002 and the CUI Registry. CUI Basic
PO 00000
Frm 00005
Fmt 4701
Sfmt 4700
40563
systems by mandating the use of NIST
Special Publication (SP) 800–171,
Protecting Controlled Unclassified
Information in Nonfederal Information
Systems and Organizations, when
establishing security requirements to
protect CUI’s confidentiality on
nonfederal information systems.
However, consistent with 32 CFR
2002.14(a)(3) and (g), ‘‘[a]gencies may
increase CUI Basic’s confidentiality
impact level above moderate only
internally, or by means of agreements
with agencies or non-executive branch
entities (including agreements for the
operation of an information system on
behalf of the agencies).’’ Relatedly, 32
CFR 2002.4(c) states that agreements
‘‘include, but are not limited to,
contracts, grants, licenses, certificates,
memoranda of agreement/arrangement
or understanding, and informationsharing agreements or arrangements.’’
Therefore, DHS can require a
confidentiality impact level above
moderate through agreements with nonexecutive branch entities. Nonetheless,
the information system security
requirements of this rule are focused on
those applicable to Federal information
systems.
Comment: One respondent stated that
the revisions to the HSAR must be
coordinated as part of the DHS
implementation of the CUI Program, per
the milestones established by CUI
Notice 2016–01, Implementation
Guidance for the Controlled
Unclassified Information Program.
Response: CUI Notice 2016–01,
Implementation Guidance for the
Controlled Unclassified Information
Program, was superseded by CUI Notice
2020–01, CUI Program Implementation
Guidelines, issued May 14, 2020.
Neither of the CUI Notices provide
guidance on coordination of
rulemakings. Nonetheless, DHS
conducted extensive interagency
coordination while developing this rule,
including coordination with NARA.
Comment: One respondent stated that
the proposed rule federalizes contractor
systems that are not used in an
controls apply whenever CUI Specified ones do not
cover the involved CUI. CUI Specified is the subset
of CUI in which the authorizing law, regulation, or
Governmentwide policy contains specific handling
controls that it requires or permits agencies to use
that differ from those for CUI Basic. The CUI
Registry indicates which laws, regulations, and
Governmentwide policies include such specific
requirements. CUI Specified controls may be more
stringent than, or may simply differ from, those
required by CUI Basic; the distinction is that the
underlying authority spells out specific controls for
CUI Specified information and does not for CUI
Basic information. CUI Basic controls apply to those
aspects of CUI Specified where the authorizing
laws, regulations, and Governmentwide policies do
not provide specific guidance.
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
40564
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
operational capacity on behalf of the
Government.
Response: The rule does not
federalize contractor systems that are
not used in an operational capacity on
behalf of the Government. Conversely, it
recognizes that there are circumstances
when contractor information systems
are operated on behalf of an agency.
When this is the case, the contractor
information system is considered a
Federal information system and is
subject to the same information system
security requirements required for
Federal information systems. The rule
identifies the security requirements and
processes such systems must meet
before they are able to operate on behalf
of the agency. These requirements are
now provided as Alternate I to the basic
clause. The rulemaking does not
identify any information system security
requirements or processes for
information systems that are not
categorized as Federal information
systems. The applicability of the basic
clause is not predicated on the type of
information system, i.e., Federal or
nonfederal. The basic clause is limited
to definitions, DHS CUI handling
requirements, incident reporting and
response requirements, and sanitization
requirements. These requirements exist
whenever CUI will be accessed or
developed under a contract regardless of
the type of information system involved
in contract performance. This is the
reason why the basic clause is more
broadly applicable. DHS was
intentionally silent in this rule on the
requirements applicable to nonfederal
information systems as that was never
the purpose of this rulemaking, and the
FAR CUI rule is intended to address the
requirements for these information
systems.
Comment: One respondent requested
that DHS revise the scope of its rule to
clarify or remove the language related to
accessing CUI.
Response: Contractors and
subcontractors that have access to CUI
are responsible for ensuring the
information is handled and safeguarded
appropriately and reporting any known
or suspected incidents regarding the
information for which they have access.
As such, DHS declines to revise the
scope of the rule to clarify or remove
language related to accessing CUI.
Comment: One respondent expressed
concern that clause 3004.470–3 requires
that ‘‘CUI be safeguarded wherever such
information resides,’’ including on both
‘‘contractor-owned and/or operated
information systems operating on behalf
of the agency’’ as well as ‘‘any situation
where contractor and/or subcontractor
employees may have access to CUI.’’
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
The respondent also expressed concern
that contracting officers are required to
insert clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, in all solicitations and
contracts where contractor and/or
subcontractor employees will have
access to CUI and that the clause
requires contractors provide ‘‘adequate
security to protect CUI,’’ which
‘‘includes compliance with DHS
policies and procedures in effect at the
time of contract award. These policies
and procedures are accessible at https://
www.dhs.gov/dhs-security-and-trainingrequirements-contractors.’’ Another
respondent similarly stated that
inclusion of these statements
improperly subjects all contractors and
all contractor information systems to
DHS agency-specific standards.
Response: Some of the policies and
procedures currently posted to the DHS
publicly facing website predate the CUI
E.O. and the NARA CUI rule. DHS, like
many other Departments and agencies,
is still in the process of implementing
the CUI Program. This process includes
an update to internal policies and
procedures related to CUI. Once these
policies and procedures have been
drafted and finalized, they will replace
the policies and procedures currently
listed on the publicly facing website.
These policies and procedures are
required to address all elements of the
CUI Program and extend beyond the
protection of CUI in information
systems. For example, the new policies
and procedures also will address
training, handling, transmission,
marking requirements, incident
reporting, etc. The current DHS-specific
policies and procedures on the publicly
facing website address these
requirements and the new policies and
procedures will as well. As such,
compliance with these policies and
procedures is mandatory.
It appears that the respondents have
focused on the information system
security policies that are incorporated
into the rule without also considering
the other policies and procedures
identified, all of which have varying
applicability depending on the specifics
of the contract. For example, one of the
policies referenced governs the
Department’s background investigation
process and security requirements
applicable to individuals who have
access to the Department’s sensitive but
unclassified information, now known as
CUI. It is both necessary and
appropriate that DHS mandate that its
contractors comply with these
requirements. Anything less is
inconsistent with the mission of the
Department, has the potential to place
PO 00000
Frm 00006
Fmt 4701
Sfmt 4700
important government information at
risk, and is contrary to the public
interest. Like many of the other DHS
policies referenced, the need to comply
with this requirement is based on access
to the information, not whether a
Federal information system or
nonfederal information system will
process, store, or transmit the data.
Also, the applicability of the
information system security policies is
specifically defined in the text of clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information.
Specifically, Alternate I, Authority to
Operate, documents the applicability of
DHS Sensitive Systems Policy Directive
4300A and DHS 4300A Sensitive
Systems Handbook. The prescription for
Alternate I is clear that these
requirements are applicable when
Federal information systems, which
include contractor information systems
operated on behalf of the agency, are
used to collect, process, store, or
transmit CUI. In addition, the first
sentence of proposed paragraph (c),
Authority to Operate, of clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information,
specifically stated that its requirements
are ‘‘applicable only to Federal
information systems, which include[ ]
contractor information systems
operating on behalf of the agency.’’ As
such, it is clear that it is not the intent
of the Department to levy the
requirements in these policies and
procedures on contractor information
systems that are not operated on its
behalf. Lastly, the basic clause is limited
to definitions, DHS CUI handling
requirements, incident reporting and
response requirements, and sanitization
requirements. These requirements exist
whenever CUI will be accessed or
developed under a contract regardless of
the type of information system involved
in contract performance. This is the
reason why the basic clause is more
broadly applicable.
Also, the statements in paragraph (a)
of clause 3004.470–3, Policy, are levied
on DHS contractors through the
inclusion of clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, in the solicitation and
resultant contract. Absent inclusion of
the clause in the contract, the
requirements are not applicable.
Comment: One respondent stated that
the proposed rule fails to reflect the
information systems safeguarding
requirements of the CUI Federal
regulation (32 CFR part 2002) and
allows DHS full discretion on what
electronic safeguarding controls to
apply to contractors for any category of
CUI. The respondent asserted that the
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
rule makes no distinction operationally
in the way nonfederal contractor
information systems and DHS agency
information systems are treated, a
distinction made in the CUI regulation
(32 CFR part 2002) and in FISMA.
Response: The respondent is incorrect
that the rule: (1) allows DHS full
discretion on what electronic
safeguarding controls to apply to
contractors for any category of CUI; and
(2) makes no distinction between
nonfederal contractor information
systems and the Federal information
systems. DHS understands that the
information security requirements
applicable to Federal information
systems differ from the requirements
applicable to nonfederal information
systems, as referenced in footnote 5 of
the proposed rule, which advised that
DHS is aware NIST Special Publication
800–171, Protecting Controlled
Unclassified Information in Nonfederal
Information Systems and Organizations,
was released in June 2015 to provide
federal agencies with recommended
requirements for protecting the
confidentiality of Controlled
Unclassified Information on nonFederal information systems. However,
the information system security
requirements in this proposed
rulemaking are focused on Federal
information systems, which include
contractor information systems
operating on behalf of an agency, and
consistent with 32 CFR part 2002, these
information systems are not subject to
the requirements of NIST Special
Publication 800–171.
DHS also makes this distinction in the
prescription for Alternate I, Authority to
Operate, to clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information. It specifies that these
requirements are applicable when
Federal information systems, which
include contractor information systems
operated on behalf of the agency, are
used to collect, process, store, or
transmit CUI. Additionally, the first
sentence of paragraph (c), Authority to
Operate, of clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, in the proposed rule stated
‘‘[t]his subsection is applicable only to
Federal information systems, which
include[ ] contractor information
systems operating on behalf of the
agency.’’ As such, the Department has
made clear it understands there are
differing requirements for nonfederal
information systems and has not,
through the rule, retained full discretion
on what electronic safeguarding controls
to apply to contractors for any category
of CUI.
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
Comment: One respondent expressed
concerns regarding clause 3004.470–
4(a), which states ‘‘subcontractor
employee access to CUI or government
facilities must be limited to U.S. citizens
and lawful permanent residents.’’ The
respondent stated that this limitation is
not a legal requirement and
recommended that access to government
facilities be treated as a separate and
distinct issue from the issue of access to
CUI and that access limitations for CUI
be based on the associated legal
requirement as outlined in the NARA
CUI rule.
Response: This recommendation is
outside the scope of this regulation.
DHS notes that although CUI Basic does
not inherently convey citizenship or
residency requirements, some of the
limited dissemination caveats that can
be appended to CUI Basic do. While 32
CFR part 2002 does standardize the
safeguarding and dissemination
requirements that can be imposed on
those with whom CUI is shared, the
determination and decision to share CUI
information remains subject to agency
policy and discretion.
3. Applicability of NIST SP 800–171
Comment: Several respondents raised
concerns regarding the applicability of
NIST SP 800–171. Some of the
respondents correctly recognized that
the information system security
requirements in the proposed rule are
specific to Federal information systems,
which include contractor information
systems operated on behalf of the
Government. These respondents
expressed concern that the rule did not
address the information system security
requirements applicable to nonfederal
information systems and requested that
DHS identify the information system
security requirements applicable to
nonfederal information systems either
through this rulemaking or another one.
Response: DHS does not accept the
suggestion to identify the information
system security requirements applicable
to nonfederal information systems. The
rule is intentionally silent on the
security requirements applicable to
nonfederal information systems because
NARA is working with the FAR
Councils, in which DHS is a participant,
to develop a FAR CUI rule that
addresses the requirements nonfederal
information systems must meet before
processing, storing, or transmitting CUI.
As such, there is no need for the
Department to identify requirements
applicable to nonfederal information
systems in this rulemaking, as inclusion
would be duplicative and redundant to
the work of the FAR Councils.
PO 00000
Frm 00007
Fmt 4701
Sfmt 4700
40565
Comment: Several respondents did
not recognize that the scope of the
information system security
requirements in the proposed rule were
specific to Federal information systems
and believed that the Department either
conflated the two different categories of
information systems (i.e., Federal and
nonfederal) or was incorrectly applying
requirements for Federal information
systems to nonfederal information
systems (i.e., contractor information
systems that are not operated on behalf
of the Department). These respondents
either requested that DHS refine the
scope of the rule to exclude contractor
information systems or explicitly
identify NIST SP 800–171 as the
applicable security standard for
contractor information systems. One
respondent stated that the proposed rule
requires contracting officers to insert
proposed clause 305.204–7X,
Safeguarding of Controlled Unclassified
Information, too often (i.e., any time the
contractor or subcontractor will have
access to CUI regardless of the type of
information system being used).
Response: DHS does not accept the
recommendation to modify the scope of
the rule to exclude contractor
information systems or explicitly
identify NIST SP 800–171 as the
applicable security standard for such
systems. There is a misconception
among industry actors that NIST SP
800–171 is the only policy that must be
followed when CUI is provided or
accessed under a contract. This is not
correct. As discussed in the preamble of
the proposed rule, OMB Circular A–130,
Managing Information as a Strategic
Resource, makes clear that a contractor
information system can be considered a
Federal information system if it operates
on behalf of an agency. Specifically,
Circular A–130 defines a Federal
information system as an information
system used or operated by an agency or
by a contractor of an agency or by
another organization on behalf of an
agency. In accordance with FISMA,
Departments and agencies are
responsible for determining when a
contractor information system is
operated on its behalf. As such, a
blanket exclusion of contractor
information systems absent a
determination of the type of system (i.e.,
Federal or nonfederal) is not
appropriate.
When the Government determines
that a contractor information system is
being operated on its behalf, that
information system is considered a
Federal information system and subject
to the requirements of NIST SP 800–53,
Security and Privacy Controls for
Information Systems and Organizations.
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
40566
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
Alternatively, NIST SP 800–171 is
applicable ‘‘(1) when the CUI is resident
in a nonfederal system and organization;
(2) when the nonfederal organization is
not collecting or maintaining
information on behalf of a federal
agency or using or operating a system on
behalf of an agency; and (3) where there
are no specific safeguarding
requirements for protecting the
confidentiality of CUI prescribed by the
authorizing law, regulation, or
governmentwide policy for the CUI
category listed in the CUI Registry’’
(emphasis original; footnote omitted).
Generally speaking, should the
Government determine that a contractor
information system is not operated on
its behalf, NIST SP 800–171 is
applicable. However, consistent with 32
CFR 2002.14(a)(3) and (g), ‘‘[a]gencies
may increase CUI Basic’s confidentiality
impact level above moderate only
internally, or by means of agreements
with agencies or non-executive branch
entities (including agreements for the
operation of an information system on
behalf of the agencies).’’ Relatedly, 32
CFR 2002.4(c) states that agreements
‘‘include, but are not limited to,
contracts, grants, licenses, certificates,
memoranda of agreement/arrangement
or understanding, and informationsharing agreements or arrangements.’’
Therefore, Departments and agencies
can require a confidentiality impact
level above moderate for nonfederal
information systems through agreements
with non-executive branch entities.
Nonetheless, the information system
security requirements of this rule,
including those in DHS Sensitive
Systems Policy Directive 4300A and
DHS 4300A Sensitive Systems
Handbook, are specific to Federal
information systems.
As stated in the preamble of the
proposed rule, the Government believed
that requirements of proposed clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information,
were written in such a way that they
would be self-deleting when they are
not applicable to a solicitation or
contract. For example, the first sentence
of paragraph (c), Authority to Operate,
of the proposed clause stated ‘‘[t]his
subsection is applicable only to Federal
information systems, which include[ ]
contractor information systems
operating on behalf of the agency.’’ This
section of the clause also defined the
applicability of DHS Sensitive Systems
Policy Directive 4300A and DHS 4300A
Sensitive Systems Handbook, making
clear these policies are applicable only
to Federal information systems.
Additional examples include language
for the notification and credit
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
monitoring requirements stating that the
applicability is limited to incidents
involving PII or SPII. The remaining
requirements of the proposed clause did
not include any caveats on their
applicability because compliance with
them is mandatory regardless of the type
of information system (i.e., Federal
information system or nonfederal
information system).
However, DHS believes the concerns
raised regarding proper understanding
of the applicability of the requirements
of proposed clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, are legitimate. In response,
DHS has: (1) made the requirements of
paragraph (c), Authority to Operate,
Alternate I to the basic clause 3052.204–
7X, Safeguarding of Controlled
Unclassified Information; and (2) made
the requirements of paragraphs (f), PII
and SPII Notification Requirements, and
(g), Credit Monitoring Requirements, a
separate clause at 3052.204–7Y titled
Notification and Credit Monitoring
Requirements for Personally Identifiable
Information Incidents. As a result of
these changes, basic clause 3052.204–
7X, Safeguarding of Controlled
Unclassified Information, is limited to
the following provisions: paragraphs (a),
Definitions; (b), Handling of Controlled
Unclassified Information; (c), Incident
Reporting Requirements; (d), Incident
Response Requirements; (e),
Certification of Sanitization of
Government and Government-ActivityRelated Files and Information; (f), Other
Reporting Requirements; and (g),
Subcontracts. Compliance with these
requirements is mandatory regardless of
the information system type (i.e.,
Federal information system or
nonfederal information system).
Alternate I to the basic clause is
applicable when Federal information
systems, which include contractor
information systems operated on behalf
of the agency, are used to collect,
process, store, or transmit CUI. New
clause 3052.204–7Y, Notification and
Credit Monitoring Requirements for
Personally Identifiable Information
Incidents, is applicable to solicitations
and contracts where a contractor will
have access to PII. These changes were
made to: (1) ensure that DHS contractors
clearly understand the scope and
applicability of the various
requirements contained in proposed
clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information; (2)
make clear that the Authority to Operate
(ATO) requirements of the clause are
only applicable to Federal information
systems, which include contractor
information systems operated on behalf
PO 00000
Frm 00008
Fmt 4701
Sfmt 4700
of the agency; and (3) ensure that DHS
contractors understand credit
monitoring and notification
requirements are only applicable when
the solicitation and contract require
contractor access to PII.
Comment: Several respondents raised
concerns about footnote 5 in the
proposed rule. The footnote advised that
DHS is aware NIST Special Publication
800–171, Protecting Controlled
Unclassified Information in Nonfederal
Information Systems and Organizations,
was released in June 2015 to provide
federal agencies with recommended
requirements for protecting the
confidentiality of Controlled
Unclassified Information on nonFederal information systems. However,
the information system security
requirements in this proposed
rulemaking are focused on Federal
information systems, which include
contractor information systems
operating on behalf of an agency, and
consistent with 32 CFR part 2002, these
information systems are not subject to
the requirements of NIST Special
Publication 800–171.
One respondent interpreted the
footnote to mean that DHS believes
NIST SP 800–171 is applicable to
nonfederal entities that handle, process,
use, share, or receive CUI. One
respondent raised concerns that the
proposed rule was not consistent with
the footnote because the rule requires in
clause 3004.470–3(a) that CUI be
safeguarded in ‘‘any situation where
contractor and/or subcontractor
employees may have access to CUI.’’
Another respondent stated that the
footnote downplays the applicability of
NIST SP 800–171 and implies that the
guidance is for the more limited set of
systems covered by NIST SP 800–53.
The same respondent advised that in
other parts of the rule, contractors’
internal business systems that do fall
under the provisions of NIST SP 800–
171 are specifically called out. Specific
actions requested include:
• Moving the content of footnote 5 to
the Background section to improve the
clarity of the scope of the rule and avoid
unnecessary misinterpretations and
misunderstandings;
• Making clear that the proposed rule
does not apply to contractor information
systems;
• Clarifying that the ‘‘adequate
security’’ requirements of the rule do
not apply to internal contractor
information systems that are not
operated on behalf of an agency, and
stressing that the use of sanitization
procedures for CUI spills onto internal
contractor information systems, instead
of requiring ‘‘adequate security’’
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
implementation on systems ‘‘regardless
of where’’ the CUI may reside; and
• Clarifying that contractors are not
responsible for implementing the
‘‘adequate security’’ requirements on
government-furnished equipment (GFE)
that contractors operate in their own
internal contractor environment, unless
specifically agreed between the DHS
procuring activity (i.e., contracting
office) and the contractor.
Response: There appears to be a
misunderstanding within industry
regarding the applicability of NIST SP
800–171. Categorization as a nonfederal
entity does not mean the security
requirements for information systems
used by a nonfederal entity default to
those provided for in NIST SP 800–171.
The Government must first determine if
the contactor information system is
operated on its behalf, thus making the
information a Federal information
system. If the Government determines
the contractor information system is
operated on its behalf, then the system
is required to comply with NIST SP
800–53. Generally speaking, if the
Government determines that the
contractor information system is not
operated on its behalf, NIST SP 800–171
is applicable. The Government’s
determination of the type of system,
Federal versus nonfederal, must be
made before any decision can be made
on the security requirements applicable
to the information system.
Commenters are incorrect in stating
that the proposed rule is not consistent
with the footnote by requiring that CUI
be safeguarded in ‘‘any situation where
contractor and/or subcontractor
employees may have access to CUI.’’
CUI is required to be handled properly
and adequately safeguarded at all times.
As previously stated, it appears that the
respondents have focused on the
information system security policies
that are incorporated into the rule with
no regard for the other policies and
procedures identified, all of which have
varying applicability depending on the
specifics of the contract. The only
requirement in proposed clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information,
applicable to information systems was
paragraph (c), Authority to Operate. The
remaining requirements of the proposed
clause, namely paragraphs (b), Handling
of Controlled Unclassified Information,
(d), Incident Reporting Requirements,
(e), Incident Response Requirements, (f),
PII and SPII Notification Requirements,
(g), Credit Monitoring Requirements, (h),
Certificate of Sanitization of
Government and Government-ActivityRelated Files and Information, (i), Other
Reporting Requirements, and (j),
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
Subcontracts, are applicable regardless
of the type of information system (i.e.,
Federal or nonfederal), as well as when
information systems are not used and
only paper documents are available
under the contract. DHS Sensitive
Systems Policy Directive 4300A and
DHS 4300A Sensitive Systems
Handbook are only applicable to
Federal information systems. The
prescription for Alternate I is clear that
the ATO requirements are applicable
only when Federal information systems,
which include contractor information
systems operated on behalf of the
agency, are used to collect, process,
store, or transmit CUI. Additionally, the
proposed rule made clear this point by
specifically stating in the first sentence
of paragraph (c), Authority to Operate,
of clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information,
that the ‘‘subsection is applicable only
to Federal information systems, which
include[ ] contractor information
systems operating on behalf of the
agency.’’
The footnote is no longer included in
the rule and DHS has provided
significant information regarding the
applicability of NIST SP 800–171
throughout the Discussion and Analysis
section of the rule. These statements not
only address the applicability of the
publication to nonfederal information
systems, but they also address the
ability of Departments and agencies to
increase CUI Basic’s confidentiality
impact level above moderate on
nonfederal systems (i.e., beyond the
requirements of NIST SP 800–171),
pursuant to the terms of an agreement
as provided for in 32 CFR part 2002.
DHS declines the recommendation to
clarify that the rule is not applicable to
contractor information systems. As
previously stated, the only requirement
in the proposed rule specific to
information systems was paragraph (c),
Authority to Operate, in clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information; in
this final rule, the requirements of that
paragraph have been made into
Alternate I to the basic clause. All the
other requirements are applicable
regardless of the type of information
system (i.e., Federal or nonfederal), as
well as when information systems are
not used, making the requirements
applicable to contractors that access or
develop CUI under DHS contracts. Also,
absent a determination of the status of
the contractor information system as
Federal or nonfederal, it would be
inappropriate for DHS to state that the
rule is not applicable to contractor
information systems.
PO 00000
Frm 00009
Fmt 4701
Sfmt 4700
40567
DHS declines the recommendation to
clarify that the ‘‘adequate security’’
requirements of the rule do not apply to
internal contractor information systems
that are not operated on behalf of an
agency, and stress that the use of
sanitization procedures for CUI spills
onto internal contractor information
systems, instead of requiring ‘‘adequate
security’’ implementation on systems
‘‘regardless of where’’ the CUI may
reside. The requirement for adequate
security is not solely specific to
information systems. Adequate security
includes ensuring security protections
are applied commensurate with the risk
resulting from unauthorized access, use,
disclosure, disruption, modification or
destruction of the information. It also
includes ensuring information
contractors and subcontractors host on
information systems on behalf of the
agency, as well as information systems
and applications used by the agency,
operate effectively and provide
appropriate protections related to
confidentiality, integrity, and
availability.
Additionally, paragraph (b)(1) of
clause 305.204–7X, Safeguarding of
Controlled Unclassified Information,
requires contractors and subcontractors
to provide adequate security to protect
CUI from unauthorized access and
disclosure. This includes complying
with DHS policies and procedures,
accessible at https://www.dhs.gov/dhssecurity-and-training-requirementscontractors, in effect when the contract
is awarded.
A review of the policies and
procedures on the referenced website
would demonstrate that the
applicability of the various policies and
procedures depends on the
requirements of each contract, including
the type(s) of CUI accessed or developed
under the contract. In addition, the
clause makes clear that the information
system security policies and procedures
on the website are only applicable to
Federal information systems. Also, the
respondent is incorrect that internal
contractor information systems that are
not operated on behalf of the agency
should not be required to have adequate
security. If such a system includes the
Department’s CUI, it is imperative that
adequate security of the system be
maintained. Nonetheless, the
information system security
requirements of this rule are limited to
Federal information systems. The
purpose of this rule is the safeguarding
of CUI, so it would be inappropriate to
assert that DHS was attempting to apply
security standards to contractor
information systems that do not contain
CUI. Also, ‘‘CUI spills onto internal
E:\FR\FM\21JNR3.SGM
21JNR3
40568
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
lotter on DSK11XQN23PROD with RULES3
contractor information systems’’ are
considered incidents and are subject to
the incident reporting and response
requirements of clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information.
DHS declines the recommendation to
clarify that contractors are not
responsible for implementing the
‘‘adequate security’’ requirements on
GFE that contractors operate in their
own internal contractor environment,
unless specifically agreed between the
DHS procuring activity and the
contractor. Clause 3052.204–7X
Safeguarding of Controlled Unclassified
Information, is clear on the applicability
of the information system security
requirements and, as such, there is no
need to state within the text of the
clause that the requirements are not
applicable to GFE.
4. ATO Requirements
Comment: One respondent stated that
it appears as if the requirements of
paragraph (c)(1)(i) of proposed clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information,
would apply only to an information
system that is in development and the
security authorization (SA) package
must be submitted before the system
goes operational.
Response: The respondent is partially
correct. The SA package must be
submitted and ATO granted before a
Federal information system, which
includes a contractor information
system operated on behalf of the agency,
can be used to collect, process, store, or
transmit CUI. However, the requirement
for submission of a SA package is not
limited to information systems that are
under development. Whether the
Federal information system is under
development or already in existence,
before it can be used to collect, process,
store, or transmit CUI it must receive an
ATO from DHS and the requirements for
submission of the SA package must be
met.
Comment: The same respondent
questioned if the ATO requirements are
applicable to nonfederal information
systems. If so, the respondent stated that
the clause should state when the SA
package for these systems must be
submitted as well as clarify the
applicability of the independent
assessment and which standard (i.e.,
NIST SP 800–53 or NIST SP 800–171)
will be used to determine compliance.
Response: The prescription for
Alternate I identifies that these
requirements are applicable when
Federal information systems, which
include contractor information systems
operated on behalf of the agency, are
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
used to collect, process, store, or
transmit CUI. Additionally, the first
sentence of paragraph (c), Authority to
Operate, in proposed clause 3052.204–
7X, Safeguarding Controlled
Unclassified Information, stated ‘‘[t]his
subsection is applicable only to Federal
information systems, which include[ ]
contractor information systems
operating on behalf of the agency.’’ As
such, the information system security
requirements of the clause are
applicable only to Federal information
systems. As previously stated, DHS is
intentionally silent on the requirements
applicable to nonfederal information
systems as the FAR CUI rule is intended
to address the requirements for these
information systems. Inclusion of such
requirements in this rule would be
duplicative and redundant to the work
of the FAR Councils.
Comment: One respondent stated that
the proposed clause could be
interpreted to require that contractors
meet the security requirements of NIST
SP 800–53 when safeguarding CUI at
DHS prior to collecting, processing,
storing, or transmitting CUI. The
respondent also stated that a contractor
will need to have gone through the DHS
ATO process and demonstrated its
capabilities to meet the requirements of
the proposed clause. The respondent
raised concerns that such a process
thwarts the ‘‘do once, use many’’
efficiencies established under the
Federal Risk and Authorization
Management Program (FedRAMP).
Additionally, the respondent stated that
absent definitive guidance on the timing
of the ATO, unnecessary expenses may
be incurred by potential offerors, or
competition may be needlessly stifled,
precluding access to best commercial
solutions and innovative new
technology.
Response: Consistent with FISMA and
its implementing Governmentwide
policies, Federal information systems,
which include contractor information
systems operated on behalf of the
Government, are required to receive an
ATO before they can collect, process,
store, or transmit Federal information.
This requirement does not mean that a
contractor’s information system must
have received an ATO from the
Department before a contractor responds
to a DHS solicitation. To require a
contractor to obtain an ATO before
contract award is costly and
unnecessarily burdensome, and it could
potentially place contractors in the
position to incur costs that they would
have no possibility to recoup. Clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information,
documents the timeline and process
PO 00000
Frm 00010
Fmt 4701
Sfmt 4700
contractors must comply with to receive
an ATO from the Department and it is
clear that this process takes place after
a contract award is made.
Comment: One respondent asserted
that DHS should tie new regulatory
requirements on cybersecurity controls
to FedRAMP. Another respondent stated
that the rule does not recognize or
accommodate the use of cloud services.
Response: FedRAMP addresses
requirements for cloud computing. To
the extent a contractor is proposing a
cloud solution to the Department, DHS
would comply with FedRAMP policies
and procedures. This includes the
expectation that contractors would rely
on the documents the cloud service
provider used to obtain its provisional
ATO under FedRAMP and modify them
to reflect any additional requirements
necessary to provide the specific
services required by the Department.
Comment: One respondent stated that
the proposed process will impose
significant responsibilities on DHS, will
require a great expense to the contractor,
and will end up limiting competition.
Response: DHS recognizes there are
significant costs associated with these
requirements; however, the persistent
and prevalent nature of cyber-attacks on
both government and private sector
networks has shown that this is a
necessary expense. DHS fully expects its
contractors to reflect these costs in the
price and cost proposals they submit to
the Department.
Comment: Two respondents raised
concerns regarding the applicability of
the rule to contracts awarded using the
procedures of FAR part 12, Acquisition
of Commercial Items. The respondents
stated that applying the requirements of
the rule to contracts awarded under the
procedures of this FAR part impact the
Department’s access to innovative
technology and increase the number of
obstacles to market entry to the DHS
supply chain for these companies as
well as new start-ups with innovative
technical ideas. The respondents
recommended that DHS exclude
commercial items from the requirements
of the rule.
Response: DHS relies extensively on
commercial contractors to provide
services that include access to and the
processing, storing, and transmitting of
CUI. Eliminating this large pool of
contractors from compliance with these
requirements is untenable. It is not only
inconsistent with the mission of the
Department, but it is also contrary to the
public interest. DHS has determined
that the costs associated with
compliance with the security
requirements of this rule are a necessary
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
expense to ensure DHS CUI is
adequately protected.
Comment: One respondent
recommended that DHS specify if the
Department will be the arbiter of
compliance or if contractor selfassessments will suffice, the latter of
which is the preference of the
respondent.
Response: Clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, is clear that a contractor
operating a Federal information system,
which includes a contractor information
system operated on behalf of the agency,
must receive an independent
assessment. Specifically, the clause
requires contractors have an
independent third party validate the
security and privacy controls in place
for the information system(s). Validation
includes reviewing and analyzing the
SA package and reporting on technical,
operational and other deficiencies as
outlined in NIST Special Publication
800–53, Security and Privacy Controls
for Information Systems and
Organizations. Deficiencies must be
addressed before the SA package is
submitted to the COR for review. DHS
will review the independent assessment
and, in conjunction with its own
analysis, determine if an ATO should be
granted.
Comment: One respondent
recommended if DHS will be
responsible for determining if a
contractor has implemented adequate
security that the rule clarify how any
determination of adequacy will be
made. The respondent requested that
the authority be placed at a level higher
than the contracting officer, such as the
Chief Information Officer (CIO), to
ensure a more uniform application
across DHS. The respondent also
recommended that DHS include further
guidance on this subject on the cited
website to explain to contractors how
this standard will be applied.
Response: Clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, consistently has identified
that the Component or Headquarters
CIO, or designee, is responsible.
Alternate I, which incorporates
paragraph (c) of the proposed clause,
states that ‘‘[t]he Contractor shall not
collect, process, store, or transmit CUI
within a Federal information system
until an ATO has been granted by the
Component or Headquarters CIO, or
designee.’’ Alternate I makes clear that
these requirements are only applicable
to Federal information systems and the
Component or Headquarters CIO, or
designee, is responsible for determining
if a contractor has implemented
adequate security.
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
DHS declines the recommendation to
add further guidance on this topic on
the publicly facing website. Adequate
security means ensuring security
protections are applied commensurate
with the risk resulting from
unauthorized access, use, disclosure,
disruption, modification or destruction
of the information. It also includes
ensuring information contractors and
subcontractors host on information
systems on behalf of the agency, as well
as information systems and applications
used by the agency, operate effectively
and provide appropriate protections
related to confidentiality, integrity, and
availability.
Additionally, paragraph (b)(1) of
clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information,
requires contractors and subcontractors
to provide adequate security to protect
CUI from unauthorized access and
disclosure. This includes complying
with DHS policies and procedures,
accessible at https://www.dhs.gov/dhssecurity-and-training-requirementscontractors, in effect when the contract
is awarded.
As it relates to the information system
security portion of the adequate security
requirements, the process to obtain an
ATO is clearly described in the text of
clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information.
The remaining adequate security
requirements are documented in the
policies and procedures on the publicly
facing website. As such, no additional
guidance on adequate security is
required.
Comment: One respondent
recommended that DHS establish
mechanisms through which contractors
can obtain sufficient clarity during the
proposal stage both to determine
whether CUI will be processed under
the contract and, if yes, to assess
whether they can comply with such
safeguarding obligations.
Response: DHS shared this concern
when developing the proposed rule and
indicated as such in the preamble of the
proposed rule by stating that feedback
from industry consistently has indicated
the need for transparency and clear and
concise requirements as it relates to
information security. This concern led
DHS to establish in the proposed rule a
process by which DHS contractors will
be aware of the security requirements
they must meet when responding to
DHS solicitations that require a
contractor to collect, process, store, or
transmit CUI. Previously, information
security requirements were either
embedded in a requirements document
(i.e., Statement of Work, Statement of
Objectives, or Performance Work
PO 00000
Frm 00011
Fmt 4701
Sfmt 4700
40569
Statement) or identified through
existing clause 3052.204–70, Security
Requirements for Unclassified
Information Technology Requirements.
This approach: (1) created
inconsistencies in the identification of
information security requirements for
applicable contracts; (2) required the
identification and communication of
security controls for which compliance
was necessary after contract award had
been made; and (3) resulted in delays in
contract performance. Clause 3052.204–
7X, Safeguarding of Controlled
Unclassified Information, substantially
mitigates the concerns with DHS’s
previous approach. Through the
government-provided Security
Requirements Traceability Matrix
(SRTM), contractors will know at the
solicitation level the security
requirements with which they must
comply. The SRTM identifies the
security controls that must be
implemented on an information system
that collects, processes, stores, or
transmits CUI and that are necessary for
the contractor to prepare its SA package.
Clear identification of these
requirements at the solicitation level
affords contractors the ability to: (1)
assess their qualifications and ability to
fully meet the Government’s
requirements; (2) make informed
business decisions when deciding to
compete on the Government’s
requirements; and (3) engage
subcontractors, if needed, early in the
process to enable them to be fully
responsive to the Government’s
requirements. The rule states that ‘‘[t]he
SA package shall be developed using
the government-provided Security
Requirements Traceability Matrix and
SA templates.’’ Any concerns regarding
the SRTM can be raised and resolved
using traditional solicitation processes.
Comment: One respondent
recommended that DHS consider
implementing a review process for
ensuring that contractors can propose
alternative, but equally effective,
controls, an approach used by DoD in its
information safeguarding rulemaking.
The respondent recommended that the
process also include a procedure
through which contractors can obtain
confirmation that a particular control is
unnecessary. The respondent also
recommended that DHS clarify the
process for making such determinations
and that contractors be permitted to
make such determinations on an
individual basis.
Response: DHS declines these
recommendations given that the ability
for a contractor to engage on security
measures included in the SRTM, which
includes the applicability of the control
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
40570
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
and implementation method, is inherent
in the Department’s SA process. In
addition, because the SRTM will be
included in all applicable solicitations,
any concerns regarding the SRTM can
be raised and resolved using traditional
solicitation processes. As such, there is
no need to add language to the clause
to identify this capability.
Comment: One respondent stated that
the government-supplied SRTM has the
potential to be a useful tool to help
ensure its members’ ability to be
responsive to the Government’s security
requirements. The respondent was
unclear whether an SRTM will be
provided with each solicitation or only
in cases where a contractor will be
operating an information technology
(IT) system on behalf of the
Government. The respondent requested
that all DHS solicitations include: (1) a
description of whether CUI Basic and/
or CUI Specified information will be
collected, processed, stored, or
transmitted by the contractor on behalf
of DHS during the course of the project;
and (2) a list of applicable security
requirements, including any
requirements for CUI Specified
information that must be protected on
nonfederal information systems at
higher than the CUI Basic ‘‘moderate’’
confidentiality level of the NIST SP
800–171 standards.
Response: The information system
security requirements in this rule are
focused on those applicable to Federal
information systems, which include
contractor information systems operated
on behalf of the agency. As previously
stated, the requirements applicable to
nonfederal information systems will be
addressed in the FAR CUI rule, and as
such, they are not addressed in this
rulemaking. For the purposes of the
information systems subject to this
rulemaking, an SRTM will be included
in all applicable solicitations using the
controls from NIST SP 800–53. The
type(s) of CUI provided and/or
developed under the contract also will
be identified in the solicitation. Apart
from using NIST SP 800–171 as a
baseline for the security controls, DHS
does not anticipate a change to the
process of providing an SRTM and
identifying the type(s) of CUI provided
or developed under a contract where
nonfederal information systems are
used. However, this process cannot be
fully defined until the FAR CUI rule is
finalized.
Comment: One respondent raised
concerns regarding the security review
requirements of paragraph (c)(3) of
clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information.
The respondent stated that proper
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
control of information is already
outlined in the applicable law,
regulation, and Governmentwide policy
that applies to that information and that
compliance with contract terms is
already included in agreement terms.
The commenter requested that DHS take
an approach similar to DoD and either
use existing FAR processes and
procedures to facilitate these
requirements or identify them at the
contract level in lieu of specifying the
requirements in the clause.
Response: The ability to perform
periodic security reviews is an
important mechanism for the
Department to consistently ensure
contractors are and remain compliant
with the security requirements
contained in their contracts. This is
borne out by the prevalent and
persistent nature of cyber-attacks against
both public and private networks and
information systems. Although the
Department is reserving the right to
perform random security reviews, the
Department will be judicious in its use
and will coordinate appropriately with
contractors to ensure operations are not
unduly impacted. It is also important to
note that reciprocity among agency
regulations is outside the scope of this
rule.
5. CUI Registry
Comment: Several respondents raised
concerns that the rule proposed
included categories of CUI that are not
included in the CUI Registry maintained
by NARA. In support of these concerns,
respondents cited various sections of 32
CFR part 2002, such as ‘‘[a]gencies may
use only those categories or
subcategories approved by the CUI EA
[established by E.O. 13556 as NARA]
and published in the CUI Registry to
designate information as CUI.’’ 32 CFR
2002.12(b).
Response: Based on the number of
comments related to DHS’s inclusion of
new categories and subcategories of CUI
in the proposed rule, it appears there is:
(1) a misperception among our industry
partners that the CUI Registry cannot
change; and (2) a misunderstanding of
the process by which agencies can add
new categories to the CUI Registry. The
categories and subcategories of
information in the CUI Registry are not
static. E.O. 13556, Controlled
Unclassified Information, establishes a
process to add new categories and
subcategories of CUI. DHS’s addition of
new CUI categories and subcategories is
in line with the procedures established
by E.O. that require that the category or
subcategory of information be in a law,
regulation, or Governmentwide policy.
DHS proposed the new categories and
PO 00000
Frm 00012
Fmt 4701
Sfmt 4700
subcategories of CUI through the
regulatory process (i.e., its NPRM) and
received provisional approval from
NARA for the proposed categories. As a
result of this approval, these categories
now appear in the CUI registry.
Comment: One respondent advised
that restating CUI categories increases
administrative burdens. The same
respondent also raised concerns that
paragraph (b), Handling of Controlled
Unclassified Information, of clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information,
refers contractors back to DHS policies
and procedures and advised that DHS
should instead refer contractors to the
CUI Registry and avoid duplicative
descriptions of CUI. The respondent
also stated that DHS defined Operations
Security Information too broadly and
that it could be interpreted to include
almost any information. Multiple
respondents raised the same concern
about the Department’s definition of
Homeland Security Agreement
Information. One respondent stated that
the definition is vague and overly broad
and does not comport with either the
definition of CUI set forth in 32 CFR
part 2002 or the categories or
subcategories of CUI included in the
CUI Registry, while other respondents
stated that the definition allows DHS to
determine what Homeland Security
Agreement Information is on a case-bycase basis in individual contracts.
Another stated that the parameters for
Homeland Security Agreement
Information are very uncertain and
seemingly could apply to any
information included in such
agreements.
Response: The CUI Registry does not
describe safeguarding and
dissemination requirements in sufficient
detail to allow for general users to
properly protect information without
supplemental guidance. In most
instances, it is only a citation of a law,
regulation, or Governmentwide policy.
With regard to Operations Security
Information, the definition used in this
regulation has been updated and is
derived from the definition ‘‘Operations
Security (OPSEC)’’ from National
Security Presidential Memorandum 28,
which was issued in January 2021.
While agreeing that the category is
broad, DHS also believes it necessary,
much like other similarly broad
categories, such as privacy and law
enforcement information. DHS is unable
to address it solely in specific contracts
or project guidance as such a practice
would by definition be an ad-hoc
agency practice existing outside of a
law, regulation, or Governmentwide
policy and, thus, contrary to E.O. 13556.
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
Instead, DHS opted to define this
protection within the scope of this
regulation.
With regard to Homeland Security
Agreement Information, in furtherance
of the Department’s core missions of (1)
preventing terrorism and enhancing
security, (2) securing and managing the
borders, (3) Homeland Security Agreement
Information enforcing and administering
immigration laws, (4) safeguarding and
securing cyberspace, and (5) ensuring
resilience to disasters, DHS enters into
thousands of information sharing
agreements with State, local, and private
sector entities. The information being
shared is often sensitive, thus requiring
protections from public disclosure, but
does not easily fall into one of the other
CUI categories. DHS has historically
protected this information as For
Official Use Only, the DHS precursor to
the CUI regime. While the definition of
Homeland Security Agreement
Information is admittedly broad,
fulfilling core DHS missions while
protecting sensitive information shared
with DHS by our nonfederal partners
requires such flexibility. DHS finalizes
the CUI categories as proposed and
declines to make changes in response to
public comments.
Comment: One respondent stated the
rule does not discuss who has the
responsibility to identify or designate
DHS CUI; whether any safeguarding
obligations also apply to other
categories or subcategories of CUI as
listed in the CUI Registry; what
relationship must exist between the
presence of information that could be
CUI and a contractual obligation to
DHS; or how the agency will respond,
advise, or adjudicate any questions as to
application, administration,
implementation, or enforcement of the
safeguarding obligation.
Response: The purpose of this
rulemaking is to clearly identify
contractor responsibilities with respect
to safeguarding CUI and identify
security requirements and processes
applicable to Federal information
systems, which include contractor
information systems operated on behalf
of the Government. Identification of
individuals/organizations within the
Department responsible for designating
CUI and safeguards applicable to CUI
does not achieve this end. Also, a
specific process on how the agency will
respond, advise, or adjudicate any
questions as to application,
administration, implementation, or
enforcement of the safeguarding
obligation is also unnecessary. Should
an issue or concern arise, it can be
handled through traditional contract
administration practices.
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
40571
Response: DHS does not accept the
recommendation to add language to
clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information,
documenting how and when updates to
the Department’s policies and
procedures will be handled after a
contract has been awarded. DHS
employs version control on all internal
policies and procedures. Contractors are
not afforded the opportunity to
comment on internal policies and
procedures of Federal agencies when
they are developed or when they are
updated. Any impacts to DHS
contractors as a result of updates to
policies and procedures will be handled
through the normal contract
administration process, which already
allows a contractor to assess the impact
of the change and request consideration
from the Government prior to
implementation of the change. As such,
there is no need to add specific language
in the clause allowing a contractor to
review and assess impacts to contract
schedules and costs.
storing or handling CUI only incidental
to providing a service or product to the
Government, nor does it apply ‘‘on
behalf of an agency’’ in a manner
consistent with 32 CFR part 2002.
Response: DHS intentionally
excluded the ‘‘on behalf of an agency’’
definition provided in the NARA CUI
rule from this rulemaking. The phrase
‘‘on behalf of an agency’’ is already
rooted in statute and is used extensively
in FISMA. FISMA designates the
Director of the OMB as being
responsible for ‘‘developing and
overseeing the implementation of
policies, principles, standards, and
guidelines on information
security. . . .’’ 44 U.S.C. 3553(a)(1). As
such, any definition of the phrase ‘‘on
behalf of an agency’’ must be provided
in FISMA policy and guidance issued
by OMB after going through the
appropriate interagency coordination
process to assess the wide-ranging
implications of defining this term. In the
case of the NARA CUI rule, that has not
happened. In addition, the NARA CUI
rule addresses a small subset of the
issues covered by FISMA. For example,
FISMA applies to all information, not
just CUI. In addition, FISMA requires
agencies to provide information security
protections related to the integrity,
confidentiality, and availability of all
information (including CUI). The NARA
CUI rule relates only to a subset of these
concerns, specifically confidentiality of
CUI.
The rule defines a Federal
information system as ‘‘an information
system used or operated by an agency or
by a Contractor of an agency or by
another organization on behalf of an
agency.’’ This definition was taken
directly from OMB Circular A–130.
Defining a Federal information system is
sufficient for the purposes of this
rulemaking as an information system, in
the context of this rule, is either Federal
or nonfederal. Including a definition of
a nonfederal information system is not
necessary as it logically follows that a
nonfederal information system is the
opposite of a Federal information
system. Also, ‘‘nonfederal information
system’’ is not defined in
Governmentwide policy. Lastly, the
information system security
requirements of this rule are limited to
Federal information systems.
7. Definitions
Comment: Multiple respondents
requested that DHS include the
definition of ‘‘on behalf of an agency’’
consistent with 32 CFR part 2002.
Another respondent stated that the rule
does not clearly define the term
‘‘nonfederal information system’’ as
8. Reciprocity in Interagency
Regulations and Information Security
Requirements
Comment: Multiple respondents
raised concerns that the requirements of
the rule are not the same as other rules
related to CUI issued by other
Departments and agencies, such as DoD,
6. DHS Internal Policies and Procedures
Comment: One respondent expressed
concern that the ‘‘adequate security’’
requirements in paragraph (b), Handling
of Controlled Unclassified Information,
in clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information,
refer to security standards in DHSspecific documents (as opposed to
security standards designed for use
across the executive branch) that are
hosted on a DHS website. The
respondent expressed concern that DHS
may unilaterally change these security
standards from time to time, causing
significant adverse effects to contractors
without giving them a meaningful
opportunity to comment on these
changes. Based on this concern, the
respondent proposed the following
revision (revision in bold type):
Adequate security includes compliance
with DHS policies and procedures in effect
at the time of contract award. These policies
and procedures are accessible at https://
www.dhs.gov/dhs-security-and-trainingrequirements-contractors. Changes to
policies and procedures will be identified by
version controls and implementations of
these new versions will only occur after the
contractors affected by the change are
allowed time to comment on changes that
will affect a contract’s cost and/or schedule.
PO 00000
Frm 00013
Fmt 4701
Sfmt 4700
E:\FR\FM\21JNR3.SGM
21JNR3
40572
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
lotter on DSK11XQN23PROD with RULES3
and requested that DHS revise this rule
to be consistent with those rules.
Respondents also stated that there is a
lack of consistency between DHS and
DoD incident reporting requirements on
what constitutes timely reporting of
breaches. Because companies often do
work for multiple Federal agencies, the
respondent stated that it is important to
have a consistent approach
Governmentwide so that companies can
set up a single compliant system and
process.
Response: Reciprocity in information
security policies and regulations and
incident reporting requirements among
Departments and agencies is outside the
scope of this regulation. The purpose of
this rulemaking is to ensure that DHS
contractors adequately protect CUI
received under DHS contracts. As such,
the focus of this rule is properly limited
to the interests and mission needs of the
Department. Additionally, this rule is
fully consistent with all applicable
statutes, regulations, and
Governmentwide policies applicable to
CUI and information systems. With
regard to reciprocity in information
security policies, DHS finalizes the rule
as proposed and declines to make
changes in response to public
comments.
Comment: One respondent expressed
concern that the rule fails to emphasize
the need for reciprocity across Federal
agencies and the requirement to rely
upon provisional authorizations and
ATOs already obtained through other
Federal agencies.
Response: The focus of this rule is
properly limited to the interests and
requirements of DHS. As such,
reciprocity across the Federal
government and the requirement to rely
upon provisional authorizations and
ATOs obtained from other Departments
and agencies is beyond the scope of this
rule. However, nothing in the rule
prevents a contractor from submitting a
SA package that was previously
approved by another Department,
agency, or DHS Component. DHS will
consider existing SA packages and test
results, as appropriate. It is quite
possible that such a submission would
expedite the approval process to obtain
an ATO from DHS.
9. Incident Reporting and Response
Comment: Several respondents stated
that the DHS requirement to report
incidents involving PII or SPII within 1
hour of discovery, and all other
incidents within 8 hours of discovery, is
unreasonably short and inconsistent
with other government requirements.
One respondent stated that it is
important to have a consistent approach
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
Governmentwide so that companies can
set up a single compliant system and
process. One respondent recommended
DHS extend the reporting timeframes to
8 hours for known incidents and 72
hours for suspected incidents involving
contractors’ internal information
systems. One respondent suggested DHS
extend the timeframe for reporting
known or suspected incidents on
contractor information systems not
operated on behalf of the Department to
72 hours. Another respondent requested
that DHS revise its incident reporting
requirement to exclude reporting when
the contractor information system is not
operated on behalf of the Department.
Response: The requirement to report
incidents impacting PII within 1 hour of
discovery is documented in OMB
memorandum M–18–02, Fiscal Year
2017–2018 Guidance on Federal
Information Security and Privacy
Management Requirements, and in
United States Computer Emergency
Readiness Team (US–CERT) Federal
Incident Notification Guidelines. The 8hour reporting timeline for incidents
impacting all other categories of CUI
came from the Department’s review of
its internal policies and procedures for
other categories of CUI. Specifically, the
Department reviewed its policies for
chemical-terrorism vulnerability
information (CVI), protected critical
infrastructure information (PCII), and
sensitive security information (SSI)
(categories of information for which the
Department is statutorily responsible)
and determined that the existing
reporting timeline for incidents
impacting these information categories
is 8 hours. The Department considered
creating a separate reporting timeline for
PII, CVI, PCII, and SSI and establishing
a different reporting timeline for the
remaining categories of CUI and
determined that having multiple
reporting timelines would create
confusion and could potentially result
in incidents not being timely reported to
the Department. It is also important to
note that Departments and agencies
must report information security
incidents where the confidentiality,
integrity, or availability of a Federal
information system is potentially
compromised to US–CERT within 1
hour of being identified by the agency’s
top-level Computer Security Incident
Response Team, Security Operations
Center (SOC), or IT department. As it
relates to the incident reporting
timelines required by DoD, reciprocity
among agency regulations is outside the
scope of this rule.
DHS does not accept the
recommendation to extend the reporting
requirement for known or suspected
PO 00000
Frm 00014
Fmt 4701
Sfmt 4700
incidents on contractor information
systems that are not operated on behalf
of the Department (i.e., a nonfederal
information system). The importance of
CUI is not changed by being on a
nonfederal information system. As such,
DHS will not hold nonfederal
information systems that contain the
Department’s CUI to a lower standard
than Federal information systems that
contain the same information.
DHS also does not accept the
recommendation that incidents
impacting CUI on a contractor’s internal
information systems should not be
reported to the Department. A suspected
or known incident impacting the
Department’s CUI should always be
reported. To require anything less
would be contrary to the public interest
and the mission of the Department.
Comment: One respondent asked DHS
to clarify that if a subcontractor
experiences an incident, the
subcontractor is required to submit the
incident report to DHS, but the
subcontractor also must notify the prime
contractor (or next higher tier
contractor) that it submitted the report.
Response: DHS accepts this
recommendation. DHS included
paragraph (j), Subcontracts, in proposed
clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information, to
make clear that the requirements of the
clause must be included in the terms
and conditions of subcontract
agreements, making subcontractors
responsible for complying with the
requirements of the clause. However, to
make clear the Department’s intent to
require that subcontractors report
incidents that occur in their facilities
and information systems, DHS has
revised proposed paragraph (d) (now
paragraph (c)), Incident Reporting
Requirements, to add subcontractor
reporting responsibilities.
Comment: One respondent raised
concerns that the incident response
requirements in paragraphs (e)(3) and
(5) of proposed clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, state the following: ‘‘(3)
Incident response activities determined
to be required by the Government may
include, but are not limited to, the
following: (i) Inspections, (ii)
Investigations . . .’’ and ‘‘(5) The
Government, at its sole discretion, may
obtain assistance from other Federal
agencies and/or third-party firms to aid
in incident response activities.’’ The
respondent recommended that the
clause clarify how a contractor’s
confidential and privileged information
will be protected in a case where the
Government elects to conduct such
inspections and investigations,
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
particularly with the assistance of thirdparty firms.
Response: DHS does not accept the
recommendation to identify in the text
of the clause how a contractor’s
confidential and privileged information
will be protected when third-party firms
assist with the Department’s incident
response activities. However, DHS’s
current processes account for the
protection of this information when
third-party firms are used. DHS will
continue to protect against the
unauthorized use or disclosure of
information received or obtained from
contractors under clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information. Contractors from thirdparty firms that assist in the
Government’s incident response
activities are required to sign
nondisclosure agreements. Additionally,
both DHS and its contractors that report
suspected or known incidents are
required to complete a formal Rules of
Engagement before incident response
activities begin. The Rules of
Engagement documents the security
mechanisms that will be used to ensure
the protection of information received
during the Department’s incident
response activities.
Comment: One respondent stated that
the incident reporting obligation does
not limit the scope of reportable
incidents to Federal information
systems or even contractor information
systems that contain Federal
information. Because this distinction is
not made, the respondent asserted that
the rule could be read to require a
contractor to report to DHS any incident
impacting its own internal information
systems, regardless of whether the
incident has any likelihood of impacting
the DHS CUI resident on that
information system. The respondent
recommended that DHS harmonize its
reporting obligations with any reporting
obligations currently under
consideration by the FAR Councils in
conjunction with its work on the FAR
CUI rule.
Response: DHS disagrees that
incidents should be reported to the
Department only after the contractor
determines it is likely the incident will
impact/has impacted the DHS CUI
resident on the information system. If
DHS CUI is resident on an information
system where a suspected or known
incident occurs, contractors are required
to report that incident to the
Department. Additionally, it is clear
from the title and substance of this rule
that the focus is ensuring the adequate
security of CUI, in general and when
resident on an information system. To
imply that this rule is requiring that
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
suspected or known incidents must be
reported on any and all information
systems, including those that do not
include the Department’s CUI, is
unreasonable and false. DHS is a
participant on the FAR team responsible
for drafting the FAR CUI rule and has
not identified any conflicts between this
rule and the work taking place with the
FAR team.
Comment: One respondent stated that
the requirement to report all known and
suspected incidents may result in a
substantial number of false positives
that would be unduly burdensome for
both DHS and its contractors.
Response: The respondent is correct
that the incident reporting requirements
of the clause may result in a number of
‘‘false positives’’ being reported to the
Department. DHS expects that this may
be the case and is structured to receive
and resolve the anticipated number of
incidents to be reported under this
clause. Given the persistent and
prevalent nature of cyber-attacks against
both public and private networks and
information systems, it is increasingly
imperative that the Department is timely
notified of any suspected or known
incidents impacting information
systems where the Department’s CUI
resides.
Comment: One respondent stated that
paragraphs (e), Incident Response
Requirements, and (f), PII and SPII
Notification Requirements, of proposed
clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information,
should be revised to be consistent with
the current OMB directive. The
Discussion and Analysis section of the
proposed rule stated that ‘‘[t]he timing
for reporting incidents involving PII or
SPII is consistent with OMB
Memorandum M–07–16, Safeguarding
Against and Responding to the Breach
of Personally Identifiable Information.’’
The respondent advised that the OMB
memorandum cited was superseded on
January 3, 2017, by OMB Memorandum
M–17–12, Preparing for and Responding
to a Breach of Personally Identifiable
Information. The respondent
recommended that DHS update the rule
and proposed clause to reflect the
current OMB memorandum.
Response: DHS accepts the
recommendation and has updated the
relevant portions of the rule to ensure
consistency with OMB M–17–12,
Preparing for and Responding to a
Breach of Personally Identifiable
Information.
10. Privacy Requirements
Comment: One respondent raised a
concern regarding paragraph (b)(3) of
proposed clause 3052.204–7X,
PO 00000
Frm 00015
Fmt 4701
Sfmt 4700
40573
Safeguarding of Controlled Unclassified
Information, which prohibits a
contractor from maintaining SPII in its
invoicing, billing, and other
recordkeeping systems. The respondent
stated that some recordkeeping systems
may have appropriate protections in
place for safeguarding SPII while other
systems may not. Because of this gap,
the respondent recommended that
contractors be required to protect SPII as
required by law and be permitted to
choose how best to meet that obligation
given the nature of their information
systems. The contractor also stated that
the requirement would be prohibitive
for an institution of higher education
accepting a contract.
Response: DHS does not accept the
respondent’s recommendation. DHS has
made a business decision based on
previous incident response activities
that DHS contractors are not authorized
to maintain the Department’s SPII in
their invoicing, billing, and other
recordkeeping systems.
Comment: One respondent raised
concerns with paragraph (f)(1) of
proposed clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, which states that ‘‘[t]he
Contractor shall not proceed with
notification unless directed in writing
by the Contracting Officer.’’ The
respondent expressed concern that the
SPII or PII also might fall under the
Health Insurance Portability and
Accountability Act (HIPAA) or other
Federal breach reporting requirements.
If so, the respondent said, the language
may present a conflict as to when and
how to notify someone of the breach of
their personal information. The
respondent also stated that while it is
unlikely that an institution would be
notifying individuals of breaches within
5 days of the incident, an institution
may choose to notify another
government official, such as the
Secretary of Health and Human
Services, if the incident also constitutes
a breach under HIPAA. Because there is
no other section of the clause clearly
delineating the process to notify other
governmental bodies, as may be
required by State or Federal law, the
respondent recommends revising the
language as follows (revision in bold
type):
The Contractor may notify other state or
federal government agencies as required by
law, but must copy the Contracting Officer
on any reports made to other federal or state
agencies. The Contractor shall not proceed
with notification to individuals or entities
outside of the government unless directed in
writing by the Contracting Officer.
Response: DHS partially accepts the
recommendation. Proposed clause
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
40574
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
3052.204–7X, Safeguarding of
Controlled Unclassified Information,
identifies requirements for reporting
suspected or confirmed PII incidents as
required by internal DHS policy and
OMB memorandum M–17–12,
Preparing for and Responding to a
Breach of Personally Identifiable
Information. Such requirements are
identified in the DHS Incident Handling
Guidance and are implemented in
proposed clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information. Nonetheless, this clause
was not intended to preempt contractors
from reporting PII incidents under any
applicable law. To ensure this point is
clear, the statement was amended to add
language allowing for compliance with
applicable laws. Also, it is important to
note the Department’s timeline for
notifying individuals pertains to when a
contractor receives a notification request
from the contracting officer; it is not
related to the date the incident is
reported.
Comment: One respondent
recommended DHS consider extending
the 5-day notification requirement to
affected individuals to enable
contractors to dedicate resources to
remediation and investigation activities
in the initial days after a breach. The
respondent stated that the 5-day
notification period is substantially
shorter than most State reporting
obligations (30–45 days in many States).
The respondent asserted that many
companies reflect these State time
periods for providing notifications to
affected individuals and raised concerns
that the notification timeline will
detract from a contractor’s ability to
meaningfully respond to the incident.
Response: DHS does not accept the
recommendation. The Department is
requiring that contractors notify the
individual whose PII and/or SPII was
under the control of the contractor or
resided in its systems at the time of the
incident not later than 5 business days
after being directed to notify
individuals, unless otherwise approved
by the Contracting Officer (emphasis
added). The 5-business day notification
period is only to address the time period
in which the contractor must prepare
and mail the notification to the
individual, after being directed to do so
by the Contracting Officer. It is
completely unrelated to the timing of
incident notification.
Comment: One respondent raised
concerns with paragraph (g), Credit
Monitoring Requirements, of proposed
clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information.
The section requires the contractor to
provide credit monitoring services,
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
including call center services, if
directed by the Contracting Officer, to
any individual whose PII or SPII was
under the control of the contractor, or
resided in the information system, at the
time of the incident for a period
beginning the date of the incident and
extending not less than 18 months from
the date the individual is notified. The
respondent recommends that
contractor’s internal information
systems be excepted from this
requirement.
Response: DHS does not accept the
recommendation to exclude contractor
information systems from the credit
monitoring requirements in clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information.
The respondent is attempting to draw a
distinction where there is none.
Unauthorized access to or disclosure of
the Department’s PII on a contractor’s
internal information system has the
same level of importance and potential
impact as it would on a Federal
information system. To the extent a
contractor’s internal information system
contains PII provided by the
Government or generates PII on behalf
of the Government and is subject to a
known or suspected incident that
impacts the PII, the contractor is
responsible for providing notification
and credit monitoring if the Government
determines it is appropriate to do so.
Any stance to the contrary is
inconsistent with the public interest and
the mission of the Department.
Comment: One respondent stated that
the HSAR should include a requirement
that the DHS procuring activity and the
contractor explicitly agree on whether
and to what extent the contractor has
credit monitoring and call center
obligations as part of a specific contract.
The respondent stated that the
agreement should specifically clarify
whether these obligations extend to the
contractor in relation to GFE that the
contractor operates in its own internal
contractor environment.
Response: Paragraphs (f), PII and SPII
Notification Requirements, and (g),
Credit Monitoring Requirements, of
proposed clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, state that those
requirements are only applicable when
an incident involves PII or SPII. To
ensure that contractors understand
when these requirements are applicable,
DHS is making these requirements a
separate clause at 3052.204–7Y titled
Notification and Credit Monitoring
Requirements for Personally Identifiable
Information Incidents. The applicability
of new clause 3052.204–7Y, Notification
and Credit Monitoring Requirements for
PO 00000
Frm 00016
Fmt 4701
Sfmt 4700
Personally Identifiable Information
Incidents, is limited to solicitations and
contracts where a contractor will have
access to PII. This change ensures DHS
contractors understand credit
monitoring and notification
requirements are only applicable when
the solicitation and contract require
contractor access to PII.
The decision to provide notification
and credit monitoring services is
specific to each incident. As such, a
blanket determination cannot be made
that these services will be required each
time a known or suspected incident is
reported that impacts PII. The intent of
the clause is to ensure that the
Government can timely notify
individuals impacted by an incident
and provide them with credit
monitoring services if and when the
Government determines it is appropriate
to do so. Paragraph (b)(2) of clause
3052.204–7Y, Notification and Credit
Monitoring Requirements for Personally
Identifiable Information Incidents, states
that ‘‘[a]ll determinations by the
Department related to notifications to
affected individuals and/or Federal
agencies and related services (e.g., credit
monitoring) will be made in writing by
the Contracting Officer.’’ Therefore, the
Contracting Officer will advise
contractors of their requirements
depending on the incident on a case-bycase basis. Depending on the severity of
the incident, credit monitoring may not
be necessary in one instance, but may be
in another.
11. Sanitization of Government and
Government-Activity-Related Files and
Information
Comment: One respondent questioned
the implementation of paragraph (h),
Certificate of Sanitization of
Government and Government-ActivityRelated Files and Information, of
proposed clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information. The clause states ‘‘the
Contractor shall return all CUI to DHS
and/or destroy it physically and/or
logically as identified in the contract.’’
The respondent asked where such
information would be identified in the
contract, specifically whether the
information would be identified in the
clause, the Statement of Work, or some
other attachment. The respondent also
stated that it would be helpful to see the
DHS language that identifies how a
contractor is to destroy CUI physically
and/or logically.
Response: DHS will identify in the
Statement of Work, Statement of
Objectives, Performance Work
Statement, or specification if and when
CUI is required to be returned,
E:\FR\FM\21JNR3.SGM
21JNR3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
lotter on DSK11XQN23PROD with RULES3
physically and/or logically destroyed, or
both. Clause 3052.204–7X, Safeguarding
of Controlled Unclassified Information,
states that destruction of the CUI ‘‘shall
conform to the guidelines for media
sanitization contained in NIST SP 800–
88, Guidelines for Media Sanitization.’’
As such, no additional instruction on
how to physically or logically destroy
CUI is necessary.
Comment: One respondent noted that
the sanitization requirement is contrary
to data use rights typical for an
institution of higher education
environment. The respondent stated
that it is very common for higher
education institutions to maintain files
and data associated with research under
U.S. Government contracts and grants
that will be used for follow-on research
and that CUI may be resident on
contractor information systems. The
respondent recommended that the
language be revised to indicate that the
contractor must return or destroy the
CUI when it is specified by the
individual contract. The respondent
also recommended DHS use the
requirements under NIST SP 800–171,
which includes a media sanitization
protocol.
Response: Proposed paragraph (h),
Certificate of Sanitization of
Government and Government-ActivityRelated Files and Information, requires
contractors to return all CUI to DHS
and/or destroy it physically and/or
logically using the guidelines in NIST
SP 800–88, Guidelines for Media
Sanitization. Contractors must also
certify and confirm sanitization and
submit the certification to the COR and
contracting officer.
However, to ensure that media is
returned and destroyed only when the
Government has determined it to be
appropriate to do so, the language is
revised to state that CUI must be
returned and/or destroyed unless the
contract states that return or destruction
of CUI is not required. Also, the media
sanitization requirements in the clause
do not conflict with the media
sanitization protocols in NIST SP 800–
171 as the sanitization requirements in
this publication are taken from NIST SP
800–88.
12. Subcontractor Flow-Down
Requirements
Comment: Multiple respondents
expressed concern that paragraph (j),
Subcontracts, of proposed clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information,
requires contractors to ‘‘insert this
clause in all subcontracts and require
subcontractors to include this clause in
all lower-tier subcontracts.’’ The
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
respondent stated that this language
appears to require contractors to flow
down the clause to subcontractors that
have no role in receiving or creating CUI
in performance of the contract. The
respondent stated that this is
inconsistent with the applicability
described in the preamble to the
proposed rule and recommended that
the language be updated accordingly.
Response: DHS agrees with the
recommendation. Proposed paragraph
(j) (now paragraph (g)), Subcontracts,
has been revised to require contractors
flow down the clause only to
subcontracts involving CUI.
13. Requirements Applicable to
Educational Institutions
Comment: One respondent noted that
paragraph (a) of proposed clause
3004.470–4 states that ‘‘[n]either the
basic clause nor its alternates should
ordinarily be used in contracts with
educational institutions.’’ The
respondent stated that it would be
helpful for DHS to indicate what
specific contract clauses they expect to
use with educational institutions, and
what controls (such as, for example,
those described in NIST SP 800–171)
would be required to be in place to
protect CUI information received
pursuant to those clauses. The
respondent recommended that, in the
case of contracts requiring an institution
of higher education to have access to
CUI, or to collect or maintain CUI on
behalf of the agency, DHS use the
baseline requirement of ‘‘moderate’’
security controls for CUI Basic
information, as described in NIST SP
800–171. The respondent stated that
protections required in addition to those
present under CUI Basic should be
implemented through the CUI Registry’s
CUI Specified mechanisms to reflect the
requirements of applicable law,
regulations, or Governmentwide policy
requiring supplemental controls, and
should be specifically identified in the
governing contract. The respondent also
requested that information that does not
meet the definition of CUI, such as
vendor proprietary information, be
specifically identified in the contract,
along with the level of protection that
must be afforded to such information.
The respondent stated that this
approach would reduce the substantial
administrative and financial burdens to
the institutions, funding agencies, and
their external partners and will allow
institutions of higher education to adopt
the compliance solutions that work best
with their existing information systems
and practices.
Response: The statement that
‘‘[n]either the basic clause nor its
PO 00000
Frm 00017
Fmt 4701
Sfmt 4700
40575
alternates should ordinarily be used in
contracts with educational institutions’’
is only applicable to clause 3052.204–
71, Contractor Employee Access. It is
also important to note that this
statement does not prohibit the
Department from including the clause or
its alternates in contracts with
educational institutions when it is
determined to be necessary. The
recommendation that DHS should
indicate what specific contract clauses it
expects to use and security controls
required to be in place to protect CUI
when contracting with educational
institutions implies the Department
should use a lesser information security
standard when contracting with these
organizations. This is not the case. The
security requirements required are those
discussed in this rule. Additionally,
information that is neither CUI nor
classified is not required to be
protected.
As previously stated, Federal
information systems, which include
contractor information systems operated
on behalf of the agency, are subject to
the requirements of NIST SP 800–53.
Generally speaking, should the
Government determine that a contractor
information system is not operated on
its behalf, NIST SP 800–171 is
applicable instead of NIST SP 800–53.
However, consistent with 32 CFR
2002.14(a)(3) and (g), ‘‘[a]gencies may
increase CUI Basic’s confidentiality
impact level above moderate only
internally, or by means of agreements
with agencies or non-executive branch
entities (including agreements for the
operation of an information system on
behalf of the agencies).’’ Relatedly, 32
CFR 2002.4(c) states that agreements
‘‘include, but are not limited to,
contracts, grants, licenses, certificates,
memoranda of agreement/arrangement
or understanding, and informationsharing agreements or arrangements.’’
Therefore, DHS can require a
confidentiality impact level above
moderate through agreements with nonexecutive branch entities and does not
need an update to the CUI Registry to do
so. DHS will determine if an
information system is Federal or
nonfederal, perform the necessary risk
assessment consistent with
Departmental policy, and identify the
security controls contractors must meet
through an SRTM. The SRTM will be
included in the solicitation to ensure
contractors clearly understand the
security requirements they must meet
before responding to the solicitation.
Apart from using NIST SP 800–171 as
a baseline for the security controls, DHS
does not anticipate a change to the
E:\FR\FM\21JNR3.SGM
21JNR3
40576
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
process of providing an SRTM and
identifying the type(s) of CUI provided
or developed under a contract where
nonfederal information systems are
used. However, this process cannot be
fully defined until the FAR CUI rule is
finalized.
lotter on DSK11XQN23PROD with RULES3
14. Self-Deleting Requirements
Comment: DHS invited comments on
the self-deleting requirements in
proposed clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information. One respondent raised
concerns with the use of self-deleting
requirements and requested that DHS
consider the use of alternates to help
parties achieve certainty about their
responsibilities to implement the
requirements of the clause.
Response: DHS agrees with the
commenter that the use of alternates
will increase certainty among DHS
contractors on their responsibilities to
comply with the requirements of clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information. As
such, DHS has: (1) made the
requirements of paragraph (c), Authority
to Operate, Alternate I to the basic
clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information;
and (2) made the requirements of
paragraphs (f), PII and SPII Notification
Requirements, and (g), Credit
Monitoring Requirements, a separate
clause at 3052.204–7Y titled
Notification and Credit Monitoring
Requirements for Personally Identifiable
Information Incidents.
As a result of these changes, basic
clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information, is
limited to the following provisions:
paragraphs (a), Definitions; (b),
Handling of Controlled Unclassified
Information; (c), Incident Reporting
Requirements; (d), Incident Response
Requirements; (e), Certification of
Sanitization of Government and
Government-Activity-Related Files and
Information; (f), Other Reporting
Requirements; and (g), Subcontracts.
Compliance with these requirements is
mandatory regardless of the information
system type (i.e., Federal information
system or nonfederal information
system). Alternate I to the basic clause
is applicable when Federal information
systems, which include contractor
information systems operated on behalf
of the agency, are used to collect,
process, store, or transmit CUI. New
clause 3052.204–7Y, Notification and
Credit Monitoring Requirements for
Personally Identifiable Information
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
Incidents, is applicable to solicitations
and contracts where a contractor will
have access to PII. These changes were
made to: (1) ensure DHS contractors
clearly understand the scope and
applicability of the various
requirements contained in clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information; (2)
make clear that the ATO requirements
of the clause are only applicable to
Federal information systems, which
include contractor information systems
operated on behalf of the agency; and (3)
ensure DHS contractors understand
credit monitoring and notification
requirements are only applicable when
the solicitation and contract require
contractor access to PII.
15. Applicability to Service Contracts
Comment: The proposed rule
requested comments on making
proposed clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, applicable to all service
contracts with the understanding that
the clause would be self-deleting if it
does not apply. One respondent stated
that it would be preferable for DHS to
include the clause only in those
contracts where the clause is required,
saying there is no realistic self-deleting
function.
Response: DHS agrees with the
commenter and will not make the
requirements of the proposed rule
applicable to all service contracts.
Clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information,
will be included only in contracts where
its requirements are applicable.
16. Costs
Comment: One respondent noted that
the cost data provided in the proposed
rule are based on the assumption of a
contractor having a centralized system
base (for example, one information
system, one accounting system, a
limited number of individuals with
access, a controlled physical
environment). The respondent stated
that institutions of higher education are
highly decentralized entities and that
costs increase significantly when
implementing these requirements over
multiple systems, on a case-by-case
basis, as would generally be required in
the decentralized higher education
environment. The respondent said the
problem only is magnified when each
agency adopts separate and distinct
requirements for the safeguarding of
CUI, making it imperative to have one
standard to operate by, such as that
proposed under the NARA CUI rule.
PO 00000
Frm 00018
Fmt 4701
Sfmt 4700
Response: The information system
security requirements of this rule are
focused on the requirements applicable
to Federal information systems.
Requirements for Federal information
systems are governed by Federal
Information Processing Standards (FIPS)
Publication 199, Standards for Security
Categorization of Federal Information
and Information Systems; FIPS
Publication 200, Minimum Security
Requirements for Federal Information
and Information Systems; and NIST SP
800–53, Security and Privacy Controls
for Information Systems and
Organizations. These publications
define the process by which the
Government categorizes a Federal
information system as requiring low,
moderate, or high security controls to
protect the confidentiality, integrity,
and availability of information that is
processed, stored, and transmitted by
those systems/organizations and to
satisfy a set of defined security
requirements. The commenter’s
approach displaces compliance with
these publications and requests that the
Government identify a single security
standard for Federal information
systems without the benefit of the
methodical and deliberate processes
required by each of these publications.
This approach is unacceptable because
it is inconsistent with FISMA and NIST
policy for Federal information systems.
Alternatively, the NARA CUI rule
establishes baseline information
security requirements necessary to
protect CUI Basic on nonfederal
information systems by mandating the
use of NIST SP 800–171, Protecting
Controlled Unclassified Information in
Nonfederal Information Systems and
Organizations, when establishing
security requirements to protect CUI’s
confidentiality on nonfederal
information systems. However,
consistent with 32 CFR 2002.14(a)(3)
and (g), ‘‘[a]gencies may increase CUI
Basic’s confidentiality impact level
above moderate only internally, or by
means of agreements with agencies or
non-executive branch entities (including
agreements for the operation of an
information system on behalf of the
agencies).’’
The Department has not updated cost
estimates to account for institutions
with multiple systems because, based
on Federal Procurement Data System
(FPDS) data on unique vendors awarded
contracts under the most likely
applicable Product and Service Codes
(PSCs) in Fiscal Year (FY) 2019 and FY
E:\FR\FM\21JNR3.SGM
21JNR3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
2020, fewer than 1 percent of affected
entities are educational institutions that
could have multiple systems. Based on
the estimated population of affected
entities (171), only one entity would be
an educational institution that might
have multiple systems on average.4 In
addition, DHS has no data on how many
systems these entities use. Other types
of entities could have multiple systems.
However, multiple variables dictate the
cost of an independent assessment (e.g.,
governance, decentralization of
information systems, number of
information systems (i.e., size),
complexity, categorization, and
documentation). As such, the number of
information systems impacted by the
ATO is not the sole factor to consider
when determining if there will be
increases to the cost of an independent
assessment. While there may be
increases to the cost of an independent
assessment when multiple information
systems are involved, such increases are
largely dependent upon the level of
decentralization of the systems and
variances in the governance structure of
each system. If the information systems
have the same or similar governance
structures, the cost of the independent
assessment may not see significant cost
impacts. Conversely, if there is
significant decentralization and
variances in governance structures, the
cost of an independent assessment
could increase. Such determinations
must be made on a case-by-case basis
and take into consideration all relevant
factors that dictate the cost of an
independent assessment.
Therefore, DHS maintains the cost
estimates from the proposed rule but
recognizes that these costs may be
underestimates because FPDS data do
40577
not indicate subcontractors that may
have multiple systems, and there is
uncertainty on the prevalence of
multiple systems for affected entities
beyond educational institutions and
uncertainty related to the cost
implications to independent assessment
of multiple systems.
them. In addition, section IV.A.3
describes the qualitative costs, cost
savings, and benefits of the final rule.
Section IV.A.4 summarizes the
estimated first year and 10-year total
and annualized costs of the final rule.
Finally, section IV.A.5 presents the
regulatory alternatives considered.
IV. Statutory and Regulatory
Requirements
2. Summary of the Analysis
A. Executive Orders 12866 and 13563
E.O. 12866 (Regulatory Planning and
Review) and E.O. 13563 (Improving
Regulation and Regulatory Review)
direct agencies to assess the costs and
benefits of available regulatory
alternatives and, if regulation is
necessary, to select regulatory
approaches that maximize net benefits
(including potential economic,
environmental, public health, and safety
effects; distributive impacts; and
equity). E.O. 13563 emphasizes the
importance of quantifying both costs
and benefits, of reducing costs, of
harmonizing rules, and of promoting
flexibility. This rule has been
designated a ‘‘significant regulatory
action,’’ although not economically
significant, under section 3(f) of E.O.
12866. Accordingly, the rule has been
reviewed by OMB.
1. Outline of the Analysis
Section IV.A.2.a describes the need
for the final rule, and section IV.A.2.b
describes the process used to estimate
the costs of the rule and the general
inputs used, such as the number of
affected entities. Section IV.A.3 explains
how the provisions of the final rule will
result in quantifiable costs and presents
the calculations DHS used to estimate
DHS expects that the final rule will
result in costs, cost savings, and
benefits. As shown in Exhibit 1, DHS
estimates a range of costs to capture
uncertainty in cost data and, therefore,
presents the estimated impacts using a
lower bound, upper bound, and primary
estimate. The primary estimate is
calculated by taking the average of the
upper bound and lower bound
estimates. DHS estimates the final rule
will have an annualized cost ranging
from $15.32 million to $17.28 million at
a discount rate of 7 percent and a total
10-year cost that ranges from $107.62
million to $121.37 million at a discount
rate of 7 percent. DHS was unable to
quantify the cost savings or benefits
associated with the rule. However, the
final rule is expected to produce cost
savings by reducing the time required to
grant an ATO, reducing DHS time
reviewing and reissuing proposals
because contractors are better qualified,
and reducing the time to identify a data
breach. The final rule also produces
benefits by better notifying the public
when their data are compromised,
requiring the provision of credit
monitoring services so that the public
can better monitor and avoid costly
consequences of data breaches, and
reducing the severity of incidents
through timely incident reporting.
EXHIBIT 1—ESTIMATED MONETIZED COSTS OF THE FINAL RULE
[$2020 millions]
Costs
Low
Undiscounted 10-Year Total ........................................................................................................
10-Year Total with Discount Rate of 3% .....................................................................................
10-Year Total with Discount Rate of 7% .....................................................................................
Annualized with Discount Rate of 3% .........................................................................................
Annualized with Discount Rate of 7% .........................................................................................
lotter on DSK11XQN23PROD with RULES3
Exhibit 2 below provides a detailed
summary of the final rule provisions
and their impacts. See the costs and cost
savings subsections of section IV.A.3
Primary
$152.60
130.28
107.62
15.27
15.32
20:57 Jun 20, 2023
Jkt 259001
PO 00000
Frm 00019
Fmt 4701
Sfmt 4700
$172.04
146.889
121.37
17.22
17.28
(Subject-by-Subject Analysis) below for
more detailed explanations.
4 Calculation: 171 ATO vendors * 0.72 percent of
educational institutions in the population = 1.2
ATO vendors with multiple systems.
VerDate Sep<11>2014
$162.32
138.58
114.49
16.25
16.30
High
E:\FR\FM\21JNR3.SGM
21JNR3
40578
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
EXHIBIT 2—SUMMARY OF PROVISIONS AND ECONOMIC IMPACTS OF THE FINAL RULE
3052.204–7X,
Safeguarding of
controlled
unclassified
information
Expressly
required by
statute,
regulation, or
governmentwide
policy?
Requirement(s)
(a) Definitions .........
Defines terms applicable to
the clause.
N/A .....................
(b) Handling of Controlled Unclassified Information.
(a) Requires contractors to
comply with DHS policies
and procedures for the
handling of CUI.
(b) Limits contractors’ use or
redistribution of CUI to
only those activities specified in the contract.
(a) Yes ...............
(b) No ................
(c) Ensures CUI transmitted
via email is protected by
encryption or transmitted
within secure communications systems.
Contractors and subcontractors must: (a) Report all
known or suspected incidents involving PII or SPII
within 1 hour of discovery.
(c) Incident Reporting Requirements.
lotter on DSK11XQN23PROD with RULES3
VerDate Sep<11>2014
(a) Requires contractors and
subcontractors to provide
full access and cooperation for all activities determined by the Government
to be required to ensure
an effective incident response.
20:57 Jun 20, 2023
Jkt 259001
Costs
Definitions for adequate security, Homeland Security
Agreement Information,
Homeland Security Enforcement Information, Operations Security Information, Personnel Security
Information, and Sensitive
Personally Identifiable Information are the only
terms that are not defined
in a statute, regulation, or
Governmentwide policy.
(a) 32 CFR part 2002, Controlled Unclassified Information (CUI).
(b) N/A—Internal DHS requirement.
No costs associated with
definitions.
(c) No .................
(c) N/A—Internal DHS requirement.
(c) Imposes no new cost.
(a) Yes ...............
(a) OMB Memorandum M–
17–12 PRIV, Preparing for
and Responding to a
Breach of Personally Identifiable Information, requires each agency to
have a breach response
plan that includes timely
reporting. The DHS Senior
Agency Official for Privacy
determined that to meet
the timeliness requirements of M–17–12, the initial report must occur within 1 hour of discovery.
(a, b) The primary estimate
of reporting an incident to
DHS is $1,075 per incident. DHS cannot quantify
the aggregate total of
these costs because DHS
does not track the origin of
security event notices and
is therefore unable to determine how many security
event notices external
contractors reported to
their respective Component SOC or the DHS Network Operations Security
Center.
(b) Report all other incidents (b) No, internal
within 8 hours of discovery.
policy requirement.
(c) Ensure CUI transmitted
(c) No .................
via email is protected by
encryption or transmitted
within secure communications systems.
(d) Incident Response Requirements.
Statute, regulation, or
governmentwide policy
(a) Yes ...............
PO 00000
Frm 00020
(a) No new costs, is currently a regulatory requirement.
(b) Imposes no new cost .....
Benefits
Unquantified cost savings to
DHS from clarified system
requirements, which reduce time to grant ATOs,
identify better qualified
bidders for DHS contracts,
and prevent DHS from
putting contracts on hold
to reissue requests for
proposals and alternate
contractors.
(a, b, c) Timely reporting of
incidents is critical to prevent the impact of an incident from expanding, ensure incident response
and mitigation activities
are undertaken quickly,
and ensure individuals are
timely notified of the possible or actual compromise
of their PII. Reducing the
time to identify a breach
improves the effectiveness
of incident management,
reduces false positives,
improves triage by lowering the cost of trivial true
positives, minimizes mission disruption and the resulting impact on revenue
and performance, and reduces the cost of investigation.
(b) N/A.
(c) 32 CFR 2002.14, Safeguarding, paragraphs (c),
Protecting CUI under the
control of an authorized
holder, and (g), Information systems that process,
store, or transmit CUI.
(a) Federal Information Security Modernization Act of
2014 (44 U.S.C. 3551),
OMB A–130, Managing Information as a Strategic
Resource.
Fmt 4701
Sfmt 4700
(c) No new costs, is currently a regulatory requirement.
(a) DHS components have
included differing language
in contracts for incident response, while this provision creates consistency
across DHS components
in language without
change to requirements.
Since DHS already conducts this practice, these
costs are part of the existing baseline costs of business.
E:\FR\FM\21JNR3.SGM
21JNR3
Standardizing incident reporting leads to more
proactive incident response, potentially faster
incident resolution, and
potential reduction in the
scope and impact of the
incident depending on the
nature of the attack (i.e.,
fewer records breached).
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
EXHIBIT 2—SUMMARY OF PROVISIONS AND ECONOMIC IMPACTS OF THE FINAL RULE—Continued
3052.204–7X,
Safeguarding of
controlled
unclassified
information
Requirement(s)
Statute, regulation, or
governmentwide policy
(b) Allows the Government
to obtain outside assistance to assist in incident
response activities.
(b) No ................
(b) N/A—Internal DHS requirement.
(e) Certificate of
Sanitization of
Government and
Government-Activity-Related
Files and Information.
Requires the contractor to
return all CUI to DHS and/
or destroy it physically
and/or logically. Destruction must conform to the
guidelines for media sanitization contained in NIST
SP 800–88, Guidelines for
Media Sanitization.
Yes ....................
Paragraph (d) of HSAR
3052.204–70, Security Requirements for Unclassified Information Technology Resources.
(f) Other Reporting
Requirements.
Informs contractors that the
incident reporting required
by this clause does not rescind the contractor’s responsibility for other incident reporting pertaining
to its unclassified information systems under other
clauses that may apply to
its contract(s), or as a result of other applicable
statutory or regulatory requirements, or other U.S.
Government requirements.
Requires the contractor to
insert this clause in all
subcontracts and require
subcontractors to include
this clause in all lower tier
subcontracts when subcontractor employees will
have access to CUI; CUI
will be collected or maintained on behalf of the
agency by a subcontractor; or a subcontractor
information system(s) will
be used to process, store,
or transmit CUI.
No ......................
N/A .......................................
In part. Prime
contractors are
required to
flow down the
text of this
clause to applicable subcontracts.
Many of the
clause requirements stem
from a statute,
regulation, or
Governmentwide policy as
indicated
above and
below.
See above and below.
(g) Subcontracts .....
lotter on DSK11XQN23PROD with RULES3
Expressly
required by
statute,
regulation, or
governmentwide
policy?
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
PO 00000
Frm 00021
Fmt 4701
Sfmt 4700
Costs
(b) N/A—The Government
bears the costs related to
obtaining assistance from
external parties for incident response activities
(e.g., existing DHS contracts, interagency agreements). This cost is not
new because incident response is a longstanding
practice and DHS has existing pre-position contracts that allow it to tap
services for incident response.
No new costs are anticipated
as this requirement simply
replaces the pre-existing
requirement in paragraph
(d) of HSAR 3052.204–70,
Security Requirements for
Unclassified Information
Technology Resources.
Additionally, any costs associated with this requirement are covered under
the initial regulation for
HSAR 3052.204–70, Security Requirements for
Unclassified Information
Technology Resources.
No costs related to DHS are
anticipated with this requirement as those costs
would be covered under
the ‘‘other applicable statutory or regulatory requirements, or other U.S. Government requirements’’.
E:\FR\FM\21JNR3.SGM
21JNR3
Benefits
40579
40580
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
EXHIBIT 2—SUMMARY OF PROVISIONS AND ECONOMIC IMPACTS OF THE FINAL RULE—Continued
3052.204–7X,
Safeguarding of
controlled
unclassified
information
lotter on DSK11XQN23PROD with RULES3
(h) Authority to Operate.
VerDate Sep<11>2014
Requirement(s)
Expressly
required by
statute,
regulation, or
governmentwide
policy?
(a) Security Authorization .....
(a) Yes ...............
(b) Independent Assessment
(b) No ................
(c) ATO Renewal .................
(c) Yes ...............
(c) See response at paragraph (a).
(d) Security Review ..............
(d) No ................
(d) N/A ..................................
(e) Federal Reporting and
Continuous Monitoring Requirements.
(e) Yes ...............
(e) Federal Information Security Modernization Act of
2014 (44 U.S.C. 3551),
OMB A–130, Managing Information as a Strategic
Resource, OMB Memorandum M–14–03, Enhancing the Security of
Federal Information and
Information Systems, and
NIST SP 800–53, Revisions 4 and 5, Security
and Privacy Controls for
Information Systems and
Organizations.
20:57 Jun 20, 2023
Jkt 259001
PO 00000
Frm 00022
Statute, regulation, or
governmentwide policy
Costs
(a) Federal Information Security Modernization Act of
2014 (44 U.S.C. 3551),
OMB A–130, Managing Information as a Strategic
Resource, OMB Memorandum M–22–01, Improving Detection of Cybersecurity Vulnerabilities and
Incidents on Federal Government Systems through
Endpoint Detection and
Response, NIST SP 800–
53, Revisions 4 and 5, Security and Privacy Controls
for Information Systems
and Organizations, and
paragraphs (a) and (e) of
HSAR 3052.204–70, Security Requirements for
Unclassified Information
Technology Resources.
(b) N/A ..................................
(a) No new costs are anticipated as this requirement
simply replaces the preexisting requirement in
paragraphs (a), (b), and
(e) of HSAR 3052.204–70,
Security Requirements for
Unclassified Information
Technology Resources.
As part of the existing paragraphs (a) and (e) of
HSAR 3052.204–70, Security Requirements for
Unclassified Information
Technology Resources,
vendors are required to
maintain full-time equivalent (FTE) oversight that is
estimated to cost
$209,008 per vendor.
Fmt 4701
Sfmt 4700
(b) $71.28 million at a 7%
discount rate associated
with the cost of an independent third party validating the security and privacy controls in place for
the information system(s);
reviewing and analyzing
the SA package; and reporting on technical, operational, and management
level deficiencies.
(c) No new costs are anticipated as this requirement
simply replaces the preexisting requirement in
paragraphs (a), (b), and
(e) of HSAR 3052.204–70,
Security Requirements for
Unclassified Information
Technology Resources.
Additionally, any costs associated with this requirement are covered under
the initial regulation for
HSAR 3052.204–70, Security Requirements for
Unclassified Information
Technology Resources.
(d) $159,924 at a 7% discount rate from a new cost
to the government to conduct the security reviews
and to the contractor for
any interruptions to normal
operations caused by the
security review.
(e) No new costs are anticipated as this requirement
simply replaces the preexisting requirement in
paragraphs (a) and (e) of
HSAR 3052.204–70, Security Requirements for
Unclassified Information
Technology Resources.
Additionally, any costs associated with this requirement are covered under
the initial regulation for
HSAR 3052.204–70, Security Requirements for
Unclassified Information
Technology Resources.
E:\FR\FM\21JNR3.SGM
21JNR3
Benefits
Independent assessment
provides an objective
measure of compliance
with security and privacy
controls. Benefits of using
a third party to perform an
independent assessment
extend to contractor because they can use results
to demonstrate cybersecurity excellence for customers.
(d) Security review is an important mechanism for the
Department to consistently
ensure contractors are
and remain compliant with
the security requirements
contained in their contracts.
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
3052.204–7Y,
Safeguarding of
controlled
unclassified
information
Requirement(s)
(a) Definitions .........
Defines terms applicable to
the clause.
No ......................
(b) PII and SPII Notification Requirements.
Requires the contractor,
when directed, to notify
any individual whose PII
or SPII was either under
the control of the contractor or resided in an information system under
control of the contractor at
the time the incident occurred.
Yes ....................
(c) Credit Monitoring Requirements.
Requires the contractor,
when directed, to provide
credit monitoring services
to individuals whose PII or
SPII was under the control
of the contractor, or resided in the information
system at the time of the
incident, for a period beginning the date of the incident and extending not
less than 18 months from
the date the individual is
notified.
Yes ....................
Statute, regulation, or
governmentwide policy
Definition for Sensitive Personally Identifiable Information is not defined in a
statute, regulation, or Governmentwide policy.
OMB Memorandum M–17–
12, Preparing for and Responding to a Breach of
Personally Identifiable Information.
Costs
Benefits
N/A—No new costs are anticipated with the changes
to this clause as the
changes are merely updates to terminology and
clarifying edits to ensure
complete understanding of
pre-existing requirements.
Additionally, the costs associated with this clause
are covered under the initial regulation for HSAR
3052.204–71, Contractor
Employee Access.
No costs associated with
definitions.
No new costs, is currently a
regulatory requirement.
Provides definition of CUI .....
N/A .....................
Definitions for Homeland Security Agreement Information, Homeland Security
Enforcement Information,
Operations Security Information, Personnel Security
Information, and Sensitive
Personally Identifiable Information are the only
terms that are not defined
in a statute, regulation, or
Governmentwide policy.
(b) Information Resources.
(c) Background Investigation Requirements.
Provides definition of information resources.
Identifies background investigation requirements.
N/A .....................
(d) Prohibition ......
Identifies circumstances
where the contracting officer can prohibit individuals
from working under a contract.
Yes .....................
Definition is taken from statute.
Paragraph (c) of HSAR
3052.204–71, Contractor
Employee Access. Note:
Paragraph was updated in
final rule to replace the
term ‘‘IT resources’’ with
‘‘information resources’’.
Paragraph (d) of HSAR
3052.204–71, Contractor
Employee Access. Note:
No change from original
text.
20:57 Jun 20, 2023
Jkt 259001
PO 00000
Frm 00023
No costs associated with
definition.
Statute, regulation, or
governmentwide policy
OMB Memorandum M–17–
12, Preparing for and Responding to a Breach of
Personally Identifiable Information.
(a) Controlled Unclassified Information.
VerDate Sep<11>2014
Benefits
Benefit of improved notification to the public regarding
breaches of their data, allowing better self-monitoring for identity theft.
Such notification affords
individuals the opportunity
to take steps to minimize
any harm associated with
unauthorized or fraudulent
activity.
Requirement(s)
Yes .....................
Costs
Estimated costs of notification are $2.72 per year per
individual. DHS cannot
quantify an aggregate total
of this cost due to the rule
because DHS does not
track at the Department
level the number of notifications required on either
an annual or per-incident
basis. Note: These costs
are discretionary as the
Government may or may
not choose to have the
contractor perform these
services.
Credit monitoring is estimated to cost $6.53 per
year per individual. DHS
cannot quantify these
costs because it does not
have estimates for the
population of individuals
affected. Note: These
costs are discretionary as
the Government may or
may not choose to have
the contractor perform
these services.
Expressly
required by
statute,
regulation, or
governmentwide
policy?
3052.204–71,
Contractor
employee access
lotter on DSK11XQN23PROD with RULES3
Expressly
required by
statute,
regulation, or
governmentwide
policy?
40581
Fmt 4701
Sfmt 4700
No new costs, is currently a
regulatory requirement.
E:\FR\FM\21JNR3.SGM
21JNR3
Credit monitoring services
can be particularly beneficial to the affected public
as they can assist individuals in the early detection
of identity theft as well as
notify individuals of
changes that appear in
their credit report, such as
creation of new accounts,
changes to their existing
accounts or personal information, or new inquiries
for credit. Such notification
affords individuals the opportunity to take steps to
minimize any harm associated with unauthorized or
fraudulent activity.
40582
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
Expressly
required by
statute,
regulation, or
governmentwide
policy?
3052.204–71,
Contractor
employee access
Requirement(s)
(e) CUI Disclosure
and Training Requirements.
Identifies limitation on disclosure of CUI and training
requirements.
Yes ....................
(f) Subcontract Requirements.
Identifies when clause must
be included in subcontracts.
Yes ....................
(g) Training and
Non-Disclosure
Agreement Requirements.
Identifies that contractors
Yes ....................
must complete a security
briefing, additional training
for specific categories of
CUI (if identified in the
contract), and sign a nondisclosure agreement before receiving access to
information resources
under the contract.
Identifies restrictions on acYes ....................
cess to DHS information
resources and consequences for attempting
to access information resources that are not authorized under the contract.
No change from original
Yes ....................
clause text.
(h) Contractor Access to Information Resources.
(i), (j), (k), and (l) ....
lotter on DSK11XQN23PROD with RULES3
a. Need for Regulation
DHS has determined that rulemaking
is needed to implement security and
privacy measures to safeguard CUI and
facilitate improved incident reporting to
DHS. The final rule enables DHS to
identify, remediate, mitigate, and
resolve incidents when they occur, not
necessarily completely prevent them.
DHS understands that there is no ‘‘true’’
way to completely prevent an incident
from occurring. However, these
measures are intended to decrease the
likelihood of occurrence with full
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
Statute, regulation, or
governmentwide policy
Costs
Paragraph (e) of HSAR
3052.204–71, Contractor
Employee Access. Note:
Replaced references to
‘‘sensitive information’’
with ‘‘CUI’’ and clarified
the timing for completion
of training discussed in the
original clause.
Paragraph (f) of HSAR
3052.204–71, Contractor
Employee Access. Note:
Replaced reference to
‘‘sensitive information’’
with ‘‘CUI’’ and ‘‘resources’’ with ‘‘information
resources’’.
No new costs, is currently a
regulatory requirement.
Paragraph (g) of HSAR
3052.204–71, Contractor
Employee Access. Note:
Added language to clarify
that additional training for
specific categories of CUI
from paragraph (e) will be
identified in the contract.
Paragraph (h) of HSAR
3052.204–71, Contractor
Employee Access. Note:
Replaced reference to ‘‘information technology resources’’ with ‘‘information
resources’’.
Paragraphs (i), (j), (k), and
(l) of HSAR 3052.204–71,
Contractor Employee Access. Note: No change
from original clause text.
No new costs, is currently a
regulatory requirement.
Note: The change in terminology from ‘‘sensitive information’’ to ‘‘CUI’’ does
not change the requirement for safeguarding.
This change was made
solely to comply with E.O.
13556, Controlled Unclassified Information, and its
implementing regulation at
32 CFR part 2002. The
type(s) of information DHS
protected under ‘‘sensitive
information’’ and now
under ‘‘CUI’’ is not
changed. Additionally, cost
impacts associated with
Governmentwide implementation of the CUI Program will be captured
under the Federal Acquisition Regulation rulemaking
that is currently in
progress.
No new costs, is currently a
regulatory requirement.
No new costs, already a regulatory requirement.
No new costs, is currently a
regulatory requirement.
knowledge that there is no such thing as
an ‘‘unhackable’’ system.
The final rule adds a new clause at
3052.204–7X, Safeguarding of
Controlled Unclassified Information,
that ensures adequate protection of CUI.
That new clause (1) identifies CUI
handling requirements and security
processes and procedures applicable to
Federal information systems, which
include contractor information systems
operated on behalf of the agency; (2)
identifies incident reporting
requirements, including timelines and
required data elements, inspection
provisions, and post-incident activities;
PO 00000
Frm 00024
Fmt 4701
Sfmt 4700
Benefits
and (3) requires certification of
sanitization of government and
government-activity-related files and
information. Additionally, new clause
3052.204–7Y, Notification and Credit
Monitoring Requirements for Personally
Identifiable Information Incidents,
requires contractors to have in place
procedures and the capability to notify
and provide credit monitoring services
to any individual whose PII or SPII was
under the control of the contractor or
resided in the information system at the
time of the incident.
These measures are necessary because
of the urgent need to protect CUI and
E:\FR\FM\21JNR3.SGM
21JNR3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
respond appropriately when DHS
contractors experience incidents with
DHS information. Persistent and
pervasive high-profile breaches of
Federal information continue to
demonstrate the need to ensure that
information security protections are
clearly, effectively, and consistently
addressed in contracts. This final rule
strengthens and expands existing HSAR
language to ensure adequate security
when contractor and/or subcontractor
employees will have access to CUI; CUI
will be collected or maintained on
behalf of the agency; or Federal
information systems, which include
contractor information systems operated
on behalf of the agency, are used to
collect, process, store, or transmit CUI.
b. Analysis Considerations
In accordance with the regulatory
analysis guidance articulated in OMB’s
Circular A–4 and consistent with DHS’s
practices in previous rulemakings, this
regulatory analysis focuses on the likely
consequences of the final rule (i.e., costs
and cost savings that accrue to entities
affected) relative to the baseline
(existing regulations, statutes, and
guidance).
This analysis covers 10 years (2023
through 2032) to ensure it captures
major costs and cost savings that accrue
over time. DHS expresses all
quantifiable impacts in 2020 dollars and
uses discount rates of 3 and 7 percent,
pursuant to Circular A–4.5 The impacts
of this final rule are estimated relative
to the existing baseline (i.e., current
requirements for security and training
for contractors). DHS estimates impacts
using a range of potential costs and cost
savings to account for uncertainty and,
therefore, presents the estimated
impacts using a lower bound, upper
bound, and primary estimate. The
primary estimate is calculated by taking
the average of the upper bound and
lower bound estimates. DHS was unable
to quantify some costs, cost savings, and
benefits of the final rule. DHS describes
them qualitatively in section IV.A.3
(Subject-by-Subject Analysis).
lotter on DSK11XQN23PROD with RULES3
(1) Analysis Baseline
The final rule primarily codifies and
updates the HSAR regulation to clarify,
streamline, and include requirements
from existing regulations, including
those required by:
• Existing HSAR 3052.204–70, Security
Requirements for Unclassified
Information Technology
Requirements
5 All present value calculations assume a base
year of 2022.
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
• 32 CFR part 2002, Controlled
Unclassified Information (CUI)
• Federal Information Security
Modernization Act of 2014 (44 U.S.C.
3551)
• NIST SP 800–53, Recommended
Security and Privacy Controls for
Federal Information Systems and
Organizations, and NIST SP 800–88,
Guidelines for Media Sanitization
(Appendix G)
A more comprehensive discussion of
existing requirements is in section
IV.A.3 (Subject-by-Subject Analysis). In
addition, the prior Exhibit 2 maps
provisions of the final rule to relevant
existing requirements.
The analysis of this final rule
estimates impacts relative to a baseline
assuming no regulatory action. The
baseline represents the agency’s best
assessment of what the world would be
like absent this action. A key difference
in the impacts estimated in this final
rule compared to the proposed rule is
that the proposed rule did not perform
an analysis incremental to a baseline of
existing regulations. Instead, the
proposed rule presented estimates of the
costs of activities covered by provisions,
regardless of whether those activities
were new requirements from the
rulemaking. In particular, two of the
larger cost estimates (FTE oversight and
continuous monitoring) presented in the
proposed rule were for activities already
required by existing regulations and are
discussed below.
(a) Baseline Cost of Continuous
Monitoring
Alternate I to clause 3052.204–7X,
Authority to Operate, mandates that
contractors operating Federal
information systems comply with
information system continuous
monitoring requirements. FISMA
regulations (44 U.S.C. 3551, et seq.)
already require continuous monitoring
and vendors therefore historically have
incurred costs associated with
continuous monitoring equipment and
labor costs for setup, maintenance, and
operation of continuous monitoring.6
Consistent with the proposed rule
analysis, internal DHS data and cost
information from vendors indicate the
cost for vendors complying with
continuous monitoring requirements to
acquire continuous monitoring
equipment ranges from a lower bound of
$82,034 to an upper bound of $376,107,
with a primary estimate of $229,071.7
6 See
44 U.S.C. 3551.
final rule estimates of obtaining continuous
monitoring equipment are consistent with the
proposed rule (Safeguarding of Controlled
Unclassified Information (HSAR Case 2015–001)
7 The
PO 00000
Frm 00025
Fmt 4701
Sfmt 4700
40583
ATO vendors already are required by
FISMA to incur this one-time cost.
ATO vendors that are complying with
continuous monitoring requirements
also have labor in place to operate
information systems and perform
continuous monitoring. Internal DHS
historical data and cost information
from vendors indicate that labor costs
for initial setup and operation of
information systems to perform
continuous monitoring range from a
lower bound of $50,506 to an upper
bound of $69,848 per year, with a
primary estimate of $59,827.8 This labor
cost occurs every 3 years when there is
ATO renewal and systems need to be
initialized. ATO vendors complying
with existing continuous monitoring
requirements also have an annual cost
to maintain systems that assist with
continuous monitoring. DHS estimates
this cost ranges from a lower bound of
$6,448 to an upper bound of $19,343,
with a primary estimate of $12,895.9
(b) Baseline Cost of FTE Oversight
Meeting the requirements of the final
rule requires overseeing compliance of
individuals who have received security
authorization, as already required by
FISMA. The final rule maintains this
requirement in Alternate I to clause
3052.204–7X, Authority to Operate. The
costs associated with this FTE oversight
stem directly from a vendor’s preexisting information security posture.
Vendors, particularly those operating in
the IT space, have been complying with
these requirements for years. In these
instances, the vendors have the existing
infrastructure (i.e., hardware, software,
and personnel) to implement these
requirements and implementation costs
are lower. The same is also true for
many vendors that provide professional
services to the Government and use IT
to provide those services. Alternatively,
vendors with less experience and
capability in this area procure the
hardware and software necessary to
implement these requirements, as well
as the labor costs associated with
[Docket No. DHS–2017–0006]) estimates and
adjusted to 2020 dollars from 2016 dollars using the
GDP deflator (Bureau of Economic Analysis (BEA)
NAIPA Table 1.1.9 Implicit Price Deflators for Gross
Domestic Product: https://apps.bea.gov/iTable/
iTable.cfm?reqid=19&step=2#reqid=19&step=2&
isuri=1&1921=survey).
8 Estimates were developed using cost
information from multiple vendors whose contracts
with DHS include similar continuous monitoring
requirements. The final rule estimates of labor cost
to perform continuous monitoring are consistent
with the proposed rule estimates and adjusted to
2020 dollars using the GDP deflator.
9 The final rule estimates of labor cost to maintain
systems that assist with continuous monitoring are
consistent with the proposed rule estimates and
adjusted to 2020 dollars using the GDP deflator.
E:\FR\FM\21JNR3.SGM
21JNR3
40584
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
personnel needed to implement and
oversee these requirements. Costs vary
depending on the hardware and
software selected and the skill set each
contractor requires in its employee(s)
responsible for ensuring compliance
with these requirements.
DHS determined the costs associated
with FTE oversight of the final rule
requirements by requesting cost
information from multiple vendors.
These data indicated that the cost of
FTE oversight ranges from a lower
bound of $69,848 to an upper bound of
$348,168, with a primary estimate of
$209,008.10 These costs decline as
vendors become more sophisticated and
efficient.
(2) Estimated Number of Vendors
Impacted by the Final Rule
The final rule will apply to DHS
contractors that require access to CUI,
collect or maintain CUI on behalf of the
Government, or operate Federal
information systems, which include
contractor information systems operated
on behalf of the agency that collect,
process, store, or transmit CUI. DHS
estimated the number of vendors subject
to the final rule using FY 2019 and FY
2020 Federal Procurement Data System
(FPDS) data on unique vendors awarded
contracts under the most likely
applicable Product and Service Codes
(PSCs) in FY 2019 and FY 2020. FPDS
data indicated that 3,030 unique
vendors were awarded contracts under
the most likely applicable PSCs in FY
2019 and 3,203 in FY 2020, including
small business. However, not all
contractors will be subject to clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information.
(a) Population of Alternate I to Clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information
DHS estimated that approximately 5.5
percent of the unique vendors identified
as being awarded contracts under the
most likely applicable PSCs in FY 2019
and FY 2020 would be subject to the
requirements of Alternate I to clause
3052.204–7X, Safeguarding of
Controlled Unclassified Information,
and will be required to respond to ATO
requirements and submit SA
documentation.11 DHS calculated the
number of vendors subject to Alternate
I to clause 3052.204–7X, Authority to
Operate, by multiplying the number of
unique vendors awarded contracts
under the most likely applicable PSCs
in FY 2019 (3,030 unique vendors) and
FY 2020 (3,203 unique vendors) by 5.5
percent. DHS estimated that in FY 2019,
167 vendors would be subject to
Alternate I to clause 3052.204–7X,12 and
in FY 2020, 176 vendors would be
subject to Alternate I to clause
3052.204–7X.13 DHS then took a 2-year
average of the 167 and 176 figures to
estimate that approximately 171
vendors will be subject to Alternate I to
clause 3052.204–7X.14 DHS presents the
ATO population estimate in Exhibit 3
along with the population estimate used
in the NPRM.
EXHIBIT 3—CHANGE TO ATO POPULATION COMPARED TO NPRM
Component
NPRM
Final rule
ATO vendors subject to the rule .............................................................................................................................
137
171
Based on FY 2019 and FY 2020 data,
DHS estimated that approximately 11
percent of the unique vendors identified
as being awarded contracts under the
most likely applicable PSCs in FY 2019
and FY 2020 would be subject to the
requirements of paragraphs (b), (c), (d),
(e), and (f) of clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information.15 DHS calculated the
number of vendors subject to paragraphs
(b), (c), (d), (e), and (f) by multiplying
the number of unique vendors awarded
contracts under the most likely
applicable PSCs in FY 2019 (3,030
unique vendors) and FY 2020 (3,203
unique vendors) by 11 percent. DHS
estimated that in FY 2019, 333 vendors
would be subject to paragraphs (b), (c),
(d), (e), and (f),16 and in FY 2020, 352
vendors would be subject to paragraphs
(b), (c), (d), (e), and (f).17 DHS then took
a 2-year average of the 333 and 352
figures to estimate that approximately
343 vendors will be subject to
paragraphs (b), (c), (d), (e), and (f).18
DHS presents the non-ATO population
estimates in Exhibit 4 along with the
non-ATO population estimates used in
the NPRM.
10 The final rule estimates of FTE oversight are
consistent with the proposed rule estimates and
adjusted to 2020 dollars using the GDP deflator.
11 The estimate of the number of entities to which
the rule will apply was established by reviewing
FPDS data for FY 2019 and FY 2020, internal DHS
contract data, experience with similar safeguarding
requirements used in certain DHS contracts, and the
most likely applicable PSCs. Additionally, the
estimate was reviewed and validated by the
cognizant departmental subject-matter experts
(SMEs) for information security, information system
security, and privacy. These SMEs have extensive
experience in the requirements of these clauses and
their applicability and current implementation in
DHS contracts. The data review identified 3,030
unique contractors that were awarded contracts
under the most likely applicable PSCs in FY 2019
and 3,203 in FY 2020, including small and large
businesses. However, not all contractors awarded
contracts under the most likely applicable PSCs are
subject to clauses 3052.204–7X, Safeguarding of
Controlled Unclassified Information, and 3052.204–
7Y, Notification and Credit Monitoring
Requirements for Personally Identifiable
Information Incidents. A number of factors
determine the applicability of the clauses, and a
case-by-case analysis of each action is required to
determine the applicability of the clauses. Further,
the clauses are delineated by those entities that are
granted access to CUI but information systems will
not be used to process, store, or transmit CUI, and
those that are required to meet the ATO
requirements because Federal information systems
will be used to process, store, or transmit CUI.
12 Calculation: 3,030 unique vendors subject to
Alternate I to clause 3052.204–7X in FY 2019 * 5.5
percent of PSCs affected by the rule = 166.65
vendors.
13 Calculation: 3,203 unique vendors subject to
Alternate I to clause 3052.204–7X in FY 2020 * 5.5
percent of PSCs affected by the rule = 176.16
vendors.
14 Calculation: (166.65 vendors subject to
Alternate I to clause 3052.204–7X in FY 2019 +
176.16 vendors subject to Alternate I to clause
3052.204–7X in FY 2020)/2 = 171.4 vendors (the 2year average number of vendors subject to Alternate
I to clause 3052.204–7X).
15 The estimate of the number of entities to which
the rule will apply was established by reviewing
FPDS data for FY 2019 and FY 2020, internal DHS
contract data, experience with similar safeguarding
requirements used in certain DHS contracts, and the
most likely applicable PSCs. Additionally, the
estimate was reviewed and validated by the
cognizant departmental SMEs for information
security, information system security, and privacy.
See footnote 11 for more detail.
16 Calculation: 3,030 unique vendors subject to
paragraphs (b), (c), (d), (e), and (f) in FY 2019 * 11
percent of PSCs affected by the rule = 333.3
vendors.
17 Calculation: 3,203 unique vendors subject to
paragraphs (b), (c), (d), (e), and (f) in FY 2019 * 11
percent of PSCs affected by the rule = 352.33
vendors.
18 Calculation: (333.30 vendors subject to
paragraphs (b), (c), (d), (e), and (f) in FY 2019 +
352.33 vendors subject to paragraphs (b), (c), (d),
(e), and (f) in FY 2020)/2 = 342.82 vendors (the 2year average number of vendors subject to
paragraphs (b), (c), (d), (e), and (f)).
lotter on DSK11XQN23PROD with RULES3
(b) Population of Paragraphs (b), (c), (d),
(e), and (f) of Clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
PO 00000
Frm 00026
Fmt 4701
Sfmt 4700
E:\FR\FM\21JNR3.SGM
21JNR3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
40585
EXHIBIT 4—CHANGES TO NON-ATO POPULATION COMPARED TO NPRM
Component
NPRM
Non-ATO prime contractors subject to the rule ......................................................................................................
Non-ATO subcontractors subject to the rule ...........................................................................................................
(3) Changes to Component Costs
Relative to NPRM
Under the proposed rule, DHS
requested cost information from vendors
whose contracts with DHS include
requirements similar to this final rule;
obtained cost input from FedRAMP, for
which DHS is a participant; reviewed
the Congressional Budget Office Cost
Estimate for the Personal Data
Protection and Breach Accountability
Act of 2011; reviewed pricing from the
Identity Protection Services (IPS)
blanket purchase agreements recently
awarded by the General Services
Administration (GSA); and reviewed
internal price data from DHS’s Managed
Compliance Services and notification
and credit monitoring services
contracts. DHS determined that the
majority of these costs are unchanged
from the proposed rule and, therefore,
adjusts them to 2020 dollars.19 For two
Final rule
274
411
343
514
costs, DHS obtained updated estimates:
the cost of notification of incidents to
individuals whose PII was compromised
and the cost of credit monitoring
services. These costs are discussed in
more detail in the subject-by-subject
analysis. For this final rule analysis,
DHS presents a low, high, and primary
estimate to capture uncertainty in the
costs to affected entities. Exhibit 5
summarizes the costs in the NPRM and
this final rule.
EXHIBIT 5—SUMMARY OF CHANGES TO COMPONENT COSTS T
NPRM **
Final rule
Component cost
Independent assessment ($ per entity) ...........................................................
Equipment to set up continuous monitoring system ($ per entity) ..................
Labor to perform continuous monitoring ($ per entity) ....................................
Maintain continuous monitoring equipment ($ per entity) ...............................
FTE oversight ($ per entity) .............................................................................
Reporting an incident to DHS ($ per incident) ................................................
Notification of incident to individuals ($ per impacted individual) ...................
Credit monitoring services ($ per impacted individual) ...................................
Low
High
Low
$123,615
76,340
47,000
6,000
65,000
500
1.03
60
$150,000
350,000
65,000
18,000
324,000
1,500
4.60
260
* $132,836
* 82,034
* 50,506
* 6,448
* 69,848
* 537
0.84
4.16
Primary
* $147,012
* 229,071
* 59,827
* 12,895
* 209,008
* 1,075
2.72
6.53
High
* $161,189
* 376,107
* 69,848
* 19,343
* 348,168
* 1,612
4.60
8.90
t The table includes costs that were presented in the proposed rule that are considered baseline costs in the final rule, including continuous
monitoring and FTE oversight.
* Value is unchanged but is inflated to 2020 dollars.
** The proposed rule did not use a primary estimate.
lotter on DSK11XQN23PROD with RULES3
3. Subject-by-Subject Analysis
DHS’s analysis below covers the
estimated costs and cost savings of the
final rule relative to the existing
baseline. DHS emphasizes that many of
the provisions in the final rule are
existing requirements in the statute,
regulations, or regulatory guidance and
presents existing requirements related to
each provision in the previous Exhibit
2. The final rule codifies these practices
under one set of rules; therefore, they
are not considered ‘‘new’’ burdens
resulting from the final rule. This rule
addresses the safeguarding requirements
specified in:
• FISMA, which (1) provides a
comprehensive framework for ensuring
the effectiveness of information security
controls over information resources that
support Federal operations and assets;
(2) recognizes the highly networked
nature of the current Federal computing
environment and provides effective
governmentwide management and
19 The values used in the NPRM adjusted to 2020
dollars using a GDP deflator of 105.736 for 2016 and
a GDP deflator of 113.623 for 2020. Bureau of
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
oversight of the related information
security risks, including coordination of
information security efforts throughout
the civilian, national security, and law
enforcement communities; (3) provides
for development and maintenance of
minimum controls required to protect
Federal information and information
systems; and (4) provides a mechanism
for improved oversight of Federal
agency information security programs,
including through automated security
tools to continuously diagnose and
improve security.
• NIST SP 800–53, Recommended
Security and Privacy Controls for
Federal Information Systems and
Organizations, and NIST SP 800–88,
Guidelines for Media Sanitization
(Appendix G). Pursuant to FISMA, NIST
is responsible for developing
information security standards and
guidelines, including minimum
requirements for Federal information
systems (Note: Such standards and
guidelines do not apply to national
security systems without the express
approval of appropriate Federal officials
exercising policy authority over such
systems.). NIST SP 800–53 sets forth
information security requirements
contractors operating a Federal
information system must meet prior to
collecting, processing, storing, or
transmitting CUI in that information
system. NIST SP 800–88 assists
organizations and system owners in
making practical sanitization decisions
based on the categorization of
confidentiality of their information.
• OMB Circular A–130, Managing
Information as a Strategic Resource,
which establishes general policy for the
planning, budgeting, governance,
acquisition, and management of Federal
information, personnel, equipment,
funds, IT resources, and supporting
infrastructure and services. The
Circular’s appendices include
responsibilities for protecting Federal
information resources and managing PII.
Economic Analysis: Table 1.1.4. Price Indexes for
GDP. https://apps.bea.gov/iTable/iTable.cfm?reqid=
19&step=2#reqid=19&step=2&isuri=
1&1921=survey.
PO 00000
Frm 00027
Fmt 4701
Sfmt 4700
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
40586
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
• OMB Memorandum M–17–12,
Preparing for and Responding to a
Breach of Personally Identifiable
Information, which sets forth the policy
for Federal agencies to prepare for and
respond to a breach of PII, including a
framework for assessing and mitigating
the risk of harm to individuals
potentially affected by a breach, as well
as guidance on whether and how to
provide notification and services to
those individuals.
• OMB Memorandum M–20–04,
Fiscal Year 2019–2020 Guidance on
Federal Information Security and
Privacy Management Requirements,
which in accordance with FISMA
provides agencies with FY 2020
reporting guidance and deadlines.
• E.O. 13556, Controlled Unclassified
Information, and its implementing
regulation at 32 CFR part 2002, which
defines the executive branch’s CUI
Program and establishes policy for
designating, handling, and decontrolling
information that qualifies as CUI and
standardizes the way the executive
branch handles information that
requires protection under laws,
regulations, or Governmentwide
policies but that does not qualify as
classified information.
DHS considered both the costs and
benefits associated with the
requirements of clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, and clause 3052.204–7Y,
Notification and Credit Monitoring
Requirements for Personally Identifiable
Information Incidents, specifically those
requirements believed to be of most
import to industry, such as the
requirements to: obtain an independent
assessment, perform continuous
monitoring, report all known and
suspected incidents, provide
notification and credit monitoring
services in the event an incident
impacts PII, document sanitization of
Government and Government-activityrelated files and information, as well as
ensure overall compliance with the
requirements of the clauses.
Accordingly, the regulatory analysis
focuses on the costs and cost savings
that can be attributed exclusively to the
new requirements in the final rule.
The analysis assumes that not all
efforts (e.g., retrieving and retaining
records) are attributed solely to this new
rule; only those actions resulting from
this rule that are not customary to
normal business practices are attributed
to this estimate. There are several
instances of requirements of the final
rule that are not new requirements; for
example, the analysis does not include
revisions to clause 3052.204–71,
Contractor Employee Access, as the
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
revisions to this clause are primarily
clarifying in nature (i.e., updates to
terminology). Regarding the training
requirements discussed in the revisions
to this clause, specifically additional
training that may be required due to the
CUI Specified status of the information,
this requirement is not new for DHS
contractors. CUI Basic and CUI
Specified categories of information
previously were considered sensitive
but unclassified information under prior
Departmental policy. When additional
training is required for CUI Specified
information, it is because the statute or
regulation for that specific category
requires certain training. DHS and its
contractors always complied with the
additional training requirements when
they were applicable under its sensitive
but unclassified information policy. As
such, these requirements are covered by
the existing information collection that
covers this clause (i.e., OMB Control
Number 1600–0003). Another example
is clause 3052.204–7X(c)(3), specifying
contractors and subcontractors should
not include CUI in the body of any
email but instead include such
information in encrypted attachments,
with passwords to these files sent via
separate emails. The cost of this
requirement (i.e., the time to compose
two emails, rather than one email) is not
quantified because it is an existing
requirement. Other requirements are
required by existing regulations. For
example, FISMA requires continuous
monitoring and vendors therefore
historically have incurred costs
associated with continuous monitoring
equipment and labor costs for setup,
maintenance, and operation of
continuous monitoring. The previous
Exhibit 2 lays out which provisions
have requirements that already exist
under FISMA, existing HSAR, and other
regulations.
a. Costs
This section quantifies the costs
associated with the final rule changes,
including costs associated with rule
familiarization, reporting and
recordkeeping requirements, conducting
an independent assessment, and
security review. DHS presents each cost
with an associated lower bound
estimate, upper bound estimate, and
primary estimate.
(1) Quantitative Costs
(a) Rule Familiarization
When the final rule takes effect, ATO
vendors will need to familiarize
themselves with the new regulations.
Consequently, this imposes a one-time
cost on ATO vendors in the first year of
PO 00000
Frm 00028
Fmt 4701
Sfmt 4700
the rule. DHS estimates the time to
review the rule is 1 hour. Therefore,
DHS estimated the one-time cost of rule
familiarization to be $12,590.20 DHS
estimated the total cost of rule
familiarization over the 10-year period
is $12,223 and $11,766 at discount rates
of 3 percent and 7 percent, respectively.
The annualized cost over the 10-year
period is $1,433 and $1,675 at discount
rates of 3 percent and 7 percent,
respectively.
(b) Reporting and Recordkeeping
DHS has determined that 343 nonATO vendors and 514 non-ATO
subcontractors, for a total of 857 entities
(Exhibit 4), are subject to reporting
requirements associated with
notification and credit monitoring. DHS
estimates that each non-ATO vendor
will require 36 hours to meet the
reporting requirements. Therefore, DHS
estimated the cost of reporting for nonATO vendors to be $2.27 million
annually.21 DHS has determined that
171 ATO vendors are subject to
reporting requirements associated with
notification and credit monitoring. DHS
estimated that each ATO vendor will
require 120 hours to meet the reporting
requirements. Therefore, DHS estimated
that the cost of reporting for ATO
vendors is $1.51 million annually.22
It is estimated that the number of
recordkeepers associated with these
clauses (ATO and non-ATO vendors) is
1,028. Both ATO and non-ATO vendors
will require the same preparation time
and maintenance per response, which is
estimated to average 16 hours per year,
meaning that the total annual
recordkeeping burden is 16,455.20
hours.23 DHS estimates the cost of
recordkeeping requirements to be $1.21
million annually.24
20 Calculation: 171.41 ATO vendors * $73.45
loaded hourly wage rate of Information Security
Analysts = $12,589.95 one-time, undiscounted cost
of rule familiarization to ATO vendors.
21 Calculation: 857.04 total annual responses * 36
estimated hours per response = 30,852.44 total
estimated burden hours. Calculation: 30,852.44
total estimated hours * ($51.72/hour * 1.42 loaded
wage rate factor) = $2,266,191. The average hourly
salary is based on the hourly wage of private sector
information security analysts (https://www.bls.gov/
oes/current/oes151212.htm). The loaded wage rate
factor is based on BLS’ estimates for private
industry workers by occupational and industry
group (https://www.bls.gov/news.release/
ecec.t04.htm).
22 Calculation: 171.41 total annual responses *
120 estimated hours per response = 20,569.20 total
estimated burden hours. Calculation: 20,569.20
total estimated hours * ($51.72/hour * 1.42 loaded
wage rate factor) = $1,510,794.
23 Calculation: 1,028.45 recordkeepers * 16 hours
per recordkeeper per year = 16,455.20 hours.
24 Calculation: 16,455.20 annual reporting hours
* ($51.72/hour * 1.42 loaded wage rate factor)
hourly wage plus overhead = $1,208,635.
E:\FR\FM\21JNR3.SGM
21JNR3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
Finally, the Government will face
costs to receive, review, and take action
on reporting and recordkeeping
submissions. To estimate the cost of
receiving, reviewing, and taking action
on reporting and recordkeeping
submissions, the Department assumed
an Information Security Analyst reviews
submissions.25 26 DHS estimated that the
Government’s cost of receiving,
reviewing, and taking action from
incident reporting, incident response
activities, PII and SPII notification
requirements, credit monitoring, and
receipt of certification of sanitization of
government and government-activityrelated files and information from nonATO vendors is $452,516 annually.27
The Government’s cost of these
activities from ATO vendors is $678,774
annually.28
Reporting and recordkeeping
requirements impose costs on ATO
vendors, non-ATO vendors, and the
Government. The total cost of reporting
and recordkeeping associated with the
final rule is $6.12 million.29 DHS
estimates the total cost of reporting and
recordkeeping over the 10-year period is
$52.18 million and $42.96 million at
discount rates of 3 percent and 7
percent, respectively. The annualized
cost estimate over the 10-year period is
$6.30 million and $6.55 million at
discount rates of 3 percent and 7
percent, respectively.
(c) Independent Assessment
According to the changes in Alternate
I to clause 3052.204–7X, Authority to
Operate, contractors must have an
independent third party validate the
security and privacy controls in place
for the information system(s); review
and analyze the SA package; and report
on technical, operational, and
management level deficiencies.30 The
contractor must address all deficiencies
before submitting the SA package to the
COR for review.
Alternate I to clause 3052.204–7X,
Authority to Operate, requires ATO
vendors to acquire an independent
assessment. The independent
assessment is used to validate the
security and privacy controls in place
for the information system prior to
submission of the SA package to the
Government for review and acceptance.
DHS estimated the cost of an
independent assessment to ATO
40587
vendors by first determining the price of
an independent assessment. DHS
estimated that the cost of an
independent assessment ranges from a
lower bound of $132,836 to an upper
bound of $161,189, with a primary
estimate of $147,012.31 Once an ATO is
accepted and signed by the Government,
it is valid for 3 years and must be
renewed at that time unless otherwise
specified in the ATO letter. As a result,
ATO vendors will incur the cost of
obtaining an independent assessment in
the first year of the study period and in
3-year increments following the initial
independent assessment. DHS then
determined that 171 ATO vendors are
subject to the provision. DHS estimates
the total cost of independent
assessments over the 10-year period,
using the primary estimate, is $71.28
million and $86.09 million at discount
rates of 3 percent and 7 percent,
respectively. The primary annualized
cost estimate over the 10-year period is
$10.09 million and $10.15 million at
discount rates of 3 percent and 7
percent, respectively. Exhibit 6
summarizes the range of cost estimates
of independent assessments.
EXHIBIT 6—ESTIMATED MONETIZED COSTS OF INDEPENDENT ASSESSMENTS
[$2020 Millions]
Cost
(low estimate)
10-Year Total (Undiscounted) ...................................................................................
10-Year Total (3% Discounted) .................................................................................
10-Year Total (7% Discounted) .................................................................................
Annualized (3% Discounted) .....................................................................................
Annualized (7% Discounted) .....................................................................................
$91.08
77.79
64.40
9.12
9.17
$100.80
86.09
71.28
10.09
10.15
Cost
(high estimate)
$110.52
94.40
78.15
11.07
11.13
The Government may elect to conduct
periodic reviews to ensure that the
security requirements contained in
contracts are being implemented and
enforced. The Government, at its sole
discretion, may obtain assistance from
other Federal agencies and/or thirdparty firms to aid in security review
activities. Under this requirement, the
contractor must afford DHS, the Office
of the Inspector General, other
government organizations, and
contractors working in support of the
Government access to the contractor’s
facilities, installations, operations,
documentation, databases, networks,
systems, and personnel used in the
performance of the contract. The
contractor must, through the
Contracting Officer and COR, contact
the Component or Headquarters CIO, or
designee, to coordinate and participate
in review and inspection activity by
government organizations external to
DHS. Access must be provided, to the
extent necessary as determined by the
Government (including providing all
requested images), for the Government
to carry out a program of inspection,
25 Calculation: $36.64 Private Industry Workers’
Total Compensation/$25.80 Private Industry
Workers’ Wages and Salaries = 1.42 Loaded Wage
Factor. Employer Costs for Employee Compensation
for private industry workers by occupational and
industry group. https://www.bls.gov/news.release/
ecec.t04.htm.
26 Loaded hourly wage is $73.45. Calculation:
$51.72 * Loaded Wage Factor (1.42). Occupational
Employment and Wages, May 2020, Information
Security Analyst, https://www.bls.gov/oes/2020/
may/oes151212.htm.
27 Calculation: 857.04 non-ATO vendors * 8
hours of review time * $66 hourly wage plus
overhead = $452,516. The average hourly salary is
based on the OPM GS–13/Step 4 salary ($48.09 an
hour) plus a 36.25 percent fringe and overhead
burden rate, the one mandated by OMB
Memorandum M–08–13 for use in public-private
competition, rounded to the nearest dollar, or $66
an hour. Reference Salary Table 2020–RUS,
Effective January 2020, found at https://
www.opm.gov.
28 Calculation: 171.41 ATO vendors * 60 hours of
review time * $66 hourly wage plus overhead =
$678,774.
29 Calculation: $3,776,986 total reporting cost +
$1,208,635 recordkeeping cost + $1,131,290 cost to
the Government = $6,116,911.
30 These standards are outlined in NIST SP 800–
53, Security and Privacy Controls for Information
Systems and Organizations, or successor
publication, accessible at https://csrc.nist.gov/
publications/sp.
31 The $132,836 estimate of an independent
assessment is consistent with the proposed rule
estimate of $123,615 and adjusted to 2020 dollars
using the GDP deflator. The $123,615 estimate of an
independent assessment was sourced from cost
information requested from multiple vendors whose
contracts with DHS require an independent
assessment as part of the SA process. The $161,189
estimate of an independent assessment is consistent
with the proposed rule estimate of $150,000, which
was sourced from FedRAMP data and adjusted to
2020 dollars.
(d) Security Review
lotter on DSK11XQN23PROD with RULES3
Cost
(primary estimate)
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
PO 00000
Frm 00029
Fmt 4701
Sfmt 4700
E:\FR\FM\21JNR3.SGM
21JNR3
40588
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
investigation, and audit to safeguard
against threats and hazards to the
integrity, availability, and
confidentiality of government data or
the function of computer systems used
in performance of the contract and to
preserve evidence of computer crime.
These requirements impose a cost to
the contractor to perform the security
review and to DHS to review and assist
the security review. DHS has
determined that it will conduct 50 selfassessment surveys and 4 full
assessments annually, which take 3 and
40 hours, respectively. To estimate the
cost of receiving, reviewing, and taking
action on reporting and recordkeeping
submissions, the Department assumed
an Information Security Analyst reviews
submissions.32 33 After completing
security reviews, DHS has a GS–13 level
analyst review 20 self-assessments and
2 full assessments annually. The total
cost to contractors over 10 years to
conduct self-assessments and full
assessments is $227,696.34 The total cost
to DHS to review self-assessments and
full assessments over 10 years is
$118,800.35 The total cost of security
review associated with the final rule is
$346,496.36 DHS estimates the total cost
of security reviews over the 10-year
period—both the self-assessments and
full assessments as well as their
review—using the primary estimate, is
$295,568 and $243,365 at discount rates
of 3 percent and 7 percent, respectively.
The primary annualized cost estimate
over the 10-year period is $34,650 at
discount rates of both 3 percent and 7
percent.
lotter on DSK11XQN23PROD with RULES3
(2) Qualitative Costs
DHS is unable to quantify some costs
related to clause 3052.204–7X paragraph
(c), Incident Reporting Requirements,
and clause 3052.204–7Y paragraphs (b),
PII and SPII Notification Requirements,
and (c), Credit Monitoring
32 Calculation: $36.64 Private Industry Workers’
Total Compensation/$25.80 Private Industry
Workers’ Wages and Salaries = 1.42 Loaded Wage
Factor. Employer Costs for Employee Compensation
for private industry workers by occupational and
industry group. https://www.bls.gov/news.release/
ecec.t04.htm.
33 Loaded hourly wage is $73.45. Calculation:
$51.72 * Loaded Wage Factor (1.42). Occupational
Employment and Wages, May 2020, Information
Security Analyst, https://www.bls.gov/oes/2020/
may/oes151212.htm.
34 Calculation: ($73.45 loaded hourly wage * 50
self-assessments * 3 hours per self-assessment) +
($73.45 loaded hourly wage * 4 full assessments *
40 hours per full assessment) = $227,696.
35 Calculation: ($66 loaded hourly wage * 50 selfassessments * 2 hours review per self-assessment)
+ ($66 loaded hourly wage * 4 full assessments *
20 hours review per full assessment) = $118,800.
36 Calculation: $227,696 cost of self-assessments
and full assessments + $118,800 cost of reviewing
self-assessments and full assessments = $346,496.
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
Requirements. Monetization is not
possible for clause 3052.204–7Y
paragraphs (b) and (c) because DHS does
not track data on the number of
individuals whose data are
compromised under a data breach.
Without this estimate, DHS is unable to
determine the average number of
individuals whom vendors would have
to notify and who will require credit
monitoring services. DHS anticipates a
cost to vendors that are subject to the
requirements of clause 3052.204–7Y
paragraphs (b) and (c) and experience a
data breach.
(a) Costs Related to Clause 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, Paragraph (c), Incident
Reporting Requirements
Clause 3052.204–7X, Safeguarding of
Controlled Unclassified Information,
paragraph (c), Incident Reporting
Requirements, requires contractors to
report known or suspected incidents
that involve PII or SPII within 1 hour of
discovery as well as all other incidents
(such as those impacting any other
category of CUI) within 8 hours of
discovery. Contractors must also
provide as many of the following data
elements that are available at the time
the incident is reported, with any
remaining data elements provided
within 24 hours of submission of the
initial incident report:
(i) Unique Entity Identifier (UEI);
(ii) Contract numbers affected unless
all contracts by the company are
affected;
(iii) Facility CAGE code if the location
of the event is different than the prime
contractor location;
(iv) Point of contact (POC) if different
than the POC recorded in the System for
Award Management (address, position,
telephone, and email);
(v) Contracting Officer POC (address,
telephone, and email);
(vi) Contract clearance level;
(vii) Name of subcontractor and CAGE
code if this was an incident on a
subcontractor network;
(viii) Government programs,
platforms, or systems involved;
(ix) Location(s) of incident;
(x) Date and time the incident was
discovered;
(xi) Server names where CUI resided
at the time of the incident, both at the
contractor and subcontractor level;
(xii) Description of the Government
PII or SPII contained within the system;
and
(xiii) Any additional information
relevant to the incident.
DHS determined the cost of reporting
an incident by requesting cost
information from multiple vendors
PO 00000
Frm 00030
Fmt 4701
Sfmt 4700
whose contracts with DHS include
similar incident reporting requirements
and reviewing internal historical data.
These data indicated that the cost of
reporting an incident to DHS ranges
from a lower bound of $537 per incident
to an upper bound of $1,612 per
incident, with a primary estimate of
$1,075 per incident.37 DHS cannot
quantify the aggregate total of these
costs because DHS does not track the
origin of security event notices and is
therefore unable to determine how
many security event notices external
contractors reported to their respective
Component SOC or the DHS Network
Operations Security Center.
(b) Costs Related to Clause 3052.204–
7Y, Safeguarding of Controlled
Unclassified Information, Paragraph (b),
PII and SPII Notification Requirements
Clause 3052.204–7Y, Safeguarding of
Controlled Unclassified Information,
paragraph (b), PII and SPII Notification
Requirements, sets forth the notification
procedures and capability requirements
for contractors when notifying any
individual whose PII and/or SPII was
under the control of the contractor or
resided in the information system at the
time of the incident. The provision
requires that, when appropriate,
vendors must provide notification to
individuals affected by the incident.
In response to compromised PII/SPII,
the Government determines whether
notification is appropriate, thereby
adding another cost to both non-ATO
and ATO vendors. DHS obtained values
for the cost of providing notification to
individuals via the GSA Data Breach
Response and Identity Protection
Services web page.38 The Department
assumed that vendors will purchase the
‘‘Per Impacted Individual’’ package (as
opposed to the ‘‘Per Enrollee’’ package)
when obtaining notification services.39
The Department collected per impacted
individual data from Experian, Identity
Theft Guards, and Sontiq and then
determined the lowest value and highest
value for each service to create the
following estimates. DHS estimated that
the cost of notifying each individual
ranges from $0.84 ($0.29 plus $0.55 for
a standard-sized letter stamp) to $4.60
37 The final rule estimates of incident reporting
are consistent with the proposed rule and adjusted
to 2020 dollars using the GDP deflator.
38 GSA eLibrary Data Breach and Identity
Protection: https://www.gsaelibrary.gsa.gov/
ElibMain/sinDetails.do?schedule
Number=MAS&specialItemNumber=541990IPS&
executeQuery=YES.
39 Per Impacted Individual pricing is used when
the enrollment rate of a breach is unknown and
services are therefore provided to the entire
impacted population regardless of enrollment
status.
E:\FR\FM\21JNR3.SGM
21JNR3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
per year per individual, or $2.72 on
average, depending on the level of
security, features, and data included in
each plan by the companies providing
these services.
DHS cannot quantify an aggregate
total of this cost due to the rule because
DHS does not track at the Department
level the number of notifications
required on either an annual or perincident basis. Additionally, the number
of individuals requiring notification
varies from incident to incident.
Because DHS cannot estimate the
number of individuals who require
notification on an annual or perincident basis, the Department cannot
quantify an aggregate total of this cost
due to the rule. Finally, there are
existing State or local laws requiring
notification and DHS does not collect
data on where breaches are occurring.
Therefore, DHS does not collect data on
the baseline notification costs that
already exist. The bearer of the
notification cost—the government or the
contractor—is determined on a case-bycase basis based on DHS’s discretion.
(c) Costs Related to Clause 3052.204–7Y,
Safeguarding of Controlled Unclassified
Information, Paragraph (c), Credit
Monitoring Requirements
Clause 3052.204–7Y, Safeguarding of
Controlled Unclassified Information,
paragraph (c), Credit Monitoring
Requirements, requires that contractors,
in the event of an incident, provide
credit monitoring services, including
call center services, if directed by the
Contracting Officer, to any individual
whose PII or SPII was under the control
of the contractor, or resided in the
information system, at the time of the
incident for a period beginning the date
of the incident and extending not less
than 18 months from the date the
individual is notified.
This rule requires contractors to
provide credit monitoring services
(including call center services) to any
individual whose PII or SPII resided in
a compromised information system.
DHS updated costs estimated in the
proposed rule by obtaining values for
the cost of providing credit monitoring
services to individuals from data on the
GSA Data Breach Response and Identity
Protection Services web page.40 The
Department assumed that vendors will
purchase the ‘‘Per Impacted Individual’’
package (as opposed to the ‘‘Per
Enrollee’’ packages) when obtaining
credit monitoring services. The
Department collected per impacted
individual data from Experian, Identity
Theft Guards, and Sontiq and then
determined the lowest value and highest
value for each service to create the
following estimates. The Department
40589
estimates that the cost of private credit
monitoring services ranges from $4.16 to
$8.90 per year per individual, or $6.53
on average, depending on the level of
security, features, and data included in
each plan by the companies providing
these services. The Department assumes
that vendors will have the capabilities
to obtain favorable credit monitoring
prices. DHS cannot quantify these costs
because it does not have estimates for
the population of individuals affected.
(3) Summary of Costs
The changes in the final rule are
expected to incur a cost to vendors that
are subject to the final rule
requirements. DHS estimates the 10-year
costs to range from an undiscounted
lower bound of $152.60 million to an
undiscounted upper bound of $172.04
million. Over the 10-year analysis
period, DHS estimates that the final rule
will incur a total lower bound cost to
vendors of $130.28 million at a 3percent discount rate and $107.62
million at a 7-percent discount rate.
DHS estimates that over the 10-year
analysis period, the final rule will incur
a total upper bound cost to vendors of
$146.88 million at a 3-percent discount
rate and $121.376 million at a 7-percent
discount rate. Exhibit 7 provides a
summary of the total estimated costs
due to the final rule by provision.
EXHIBIT 7—ESTIMATED 10-YEAR MONETIZED COSTS THE FINAL RULE BY PROVISION
[$2020 Millions]
Cost
(low estimate)
Provision
Independent assessment ...........................................................................................
Rule familiarization ....................................................................................................
Reporting and Recordkeeping ...................................................................................
Security Review .........................................................................................................
10-Year Undiscounted Total ......................................................................................
10-Year Total with a Discount Rate of 3% ................................................................
10-Year Total with a Discount Rate of 7% ................................................................
lotter on DSK11XQN23PROD with RULES3
b. Qualitative Cost Savings
This section describes the cost savings
associated with the final rule changes,
including cost savings associated with
clause 3052.204–7X paragraph (b),
Handling of Controlled Unclassified
Information, and Alternate I to clause
3052.204–7X, Authority to Operate.
The final rule will result in multiple
cost savings associated with the
transparency and consistency provided
to contractors considering doing
business with DHS. One cost saving is
associated with the reduced time for
DHS to grant an ATO. If a system is
40 GSA eLibrary Data Breach and Identity
Protection: https://www.gsaelibrary.gsa.gov/
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
Cost
(primary estimate)
$91.08
0.01
61.17
0.35
152.60
130.28
107.62
Cost
(high estimate)
$100.80
0.01
61.17
0.35
162.32
138.58
114.49
$110.52
0.01
61.17
0.35
172.04
146.889
121.37
presented to DHS without the correct
SRTM and/or with a poorly developed
SA package, it can take up to 6 months
to correct the issues and rewrite the SA
package. In addition, post-assessment
activities can be greatly reduced, as the
number and severity of those
corrections through POA&Ms required
would be significantly reduced. DHS is
unable to quantify reductions in time
required for the ATO process, but
lowering the risk of delays has the
potential to produce significant time
savings to DHS and impacted
contractors.
Another cost savings to DHS results
from time saved reviewing and reissuing
requests for proposals and finding new
contractors when they are unable to
implement the SRTM. Under the final
rule, contractors are more clearly
notified of the system requirements of
the contract up front, resulting in more
bids from contractors capable of meeting
DHS standards. Previously, embedding
requirements in separate documents
(i.e., Statement of Work, Statement of
Objectives, or Performance Work
Statement) or through existing clause
3052.204–70, Security Requirements for
ElibMain/sinDetails.do?scheduleNumber=
MAS&specialItemNumber=541990IPS
&executeQuery=YES.
PO 00000
Frm 00031
Fmt 4701
Sfmt 4700
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
40590
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
Unclassified Information Technology
Requirements, had the following
impacts: (1) created inconsistencies in
the identification of information
security requirements for applicable
contracts; (2) required the identification
and communication of security controls
for which compliance was necessary
after contract award had been made; and
(3) resulted in delays in contract
performance. Under this final rule, DHS
is less likely to have to put the project
on hold to reissue a request for proposal
or look for an alternate contractor,
which reduces the reissuance of
solicitations in situations where
contractors are unable to implement the
SRTM. Avoiding the reissuance of
proposals also results in cost savings
associated with avoiding background
investigations for IT contractors, which
can range in cost from approximately
$425 to $1,000 per investigation. DHS is
unable to quantify the cost savings
associated with more bids from
contractors capable of meeting DHS
standards because we are unable to
estimate the number of avoided
reissuances that will occur.
The final rule will reduce the
response time when incidents do occur,
resulting in quicker identification of
breaches and reducing the severity of
incidents, thereby producing significant
cost savings. The timely reporting of
incidents is critical to prevent the
impact of the incident from expanding,
ensure incident response and mitigation
activities are undertaken quickly, and
ensure individuals are timely notified of
the possible or actual compromise of
their PII and offered credit monitoring
services when applicable. Contractors
were previously not consistently
provided with specific incident
reporting timelines, leaving the
timeliness of incident reporting to the
contractor. Standardizing incident
reporting leads to more proactive
incident response, potentially faster
incident resolution, and potential
reduction in the scope and impact of the
incident depending on the nature of the
attack (i.e., fewer records breached).
According to Cyentia Institute’s 2020
Information Risk Insights Study report,
the median cost of a data breach in the
public sector was approximately
$132,000, with higher cost cases (95th
percentile) reaching approximately $13
million per incident.41 An alternative
source, the most recent (2021) Verizon
Data Breach Investigations Report
(DBIR), indicates that while 76 percent
41 Cyentia Institute, 2020 Information Risk
Insights Study (Mar. 2020), https://
www.cyentia.com/wp-content/uploads/IRIS2020_
cyentia.pdf.
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
of the reported data breaches did not
result in a loss, the losses for the
remaining 24 percent ranged between
$148 and $1.6 million, with a median
breach cost of $30,000 for 95 percent of
the cases with losses.42 Based on an
analysis of 79,000 breaches, the 2021
Verizon DBIR shows that approximately
60 percent of the incidents are
discovered in days, while 20 percent
could take months or longer to
discover.43 Early detection of the
incidents is critical in preventing data
loss, data encryption, and other
damage.44 Reducing the time to identify
the breach results in immediate shortterm benefits, such as improving the
effectiveness of incident management,
reducing false positives, improving
triage by lowering the cost of trivial true
positives,45 minimizing mission
disruption and the resulting impact on
revenue and performance, and reducing
the cost of investigation.46 There are
also significant long-term benefits of
early discovery. Specifically, decreasing
time to detection enables streamlined
incident data collection and reporting,
which allows for the generation of
actionable insights and advice to the
broader Federal Civilian Executive
Branch, State-Local-Tribal-Territorial
Government, and Critical Infrastructure
communities on the proactive measures
that reduce the potential for large-scale
service disruptions. Cumulatively,
short- and long-term benefits increase
costs to the adversary, thus reducing the
effectiveness of adversary campaigns.
However, lacking an authoritative
source that establishes a defensible
estimate of the difference in a breach
cost in the public sector based on the
mean time to detection, DHS is unable
to estimate the reduction in time to
identify a breach under the final rule
42 Verizon, 2021 Data Breach Investigations
Report (May 2021), https://www.verizon.com/
business/en-nl/resources/reports/dbir/.
43 Based on Verizon DBIR analysis of breaches in
88 countries. https://enterprise.verizon.com/
resources/articles/s/how-to-minimize-your-meantime-to-detect-a-breach/.
44 Michael Paye, ‘‘Poor incident detection can
cost your organization a fortune’’ (Sept. 24, 2020),
Security Magazine, https://www.securitymagazine.
com/articles/93173-poor-incident-detection-cancost-your-organization-a-fortune.
45 Druce MacFarlane, ‘‘The 3 hidden costs of
incident response’’ (May 10, 2018), CSO Online,
https://www.csoonline.com/article/3270940/the-3hidden-costs-of-incident-response.html.
46 Michael Paye, ‘‘Poor incident detection can
cost your organization a fortune’’ (Sept. 24, 2020),
Security Magazine, https://
www.securitymagazine.com/articles/93173-poorincident-detection-can-cost-your-organization-afortune and AlertOps, ‘‘MTTR vs MTBF vs MTTD
vs MTTF’’ (2021) https://alertops.com/mttd-vs-mttfvs-mtbf-vs-mttr/.
PO 00000
Frm 00032
Fmt 4701
Sfmt 4700
and, therefore, does not quantify these
cost savings and other benefits.
c. Qualitative Benefits
This section describes the benefits
associated with the final rule changes,
including cost savings associated with
clause 3052.204–7X paragraph (d),
Incident Response Requirements, and
clause 3052.204–7Y paragraphs (b), PII
and SPII Notification Requirements, and
(c), Credit Monitoring Requirements.
There are several nonquantifiable
benefits of the final rule in addition to
the cost savings discussed above. One of
the main benefits is reducing the
severity of a data breach to individuals
and businesses that would have data
compromised by a data breach. There
are four cost categories that contribute
to the total cost of a data breach:
detection and escalation, lost business,
notification, and ex-post response
(including credit monitoring, identity
protection services, and more). While
some costs, such as the cost of lost
business due to lowered trust, are not
relevant to DHS, DHS expects this rule
to reduce other costs, such as
notification and ex-post response (credit
monitoring and identity protection
services). Although there is no way to
eliminate the risk of breach completely,
the purpose of this rule is to mitigate the
negative effects of breaches, which
include identity theft.
The public will be better notified of
breaches in their data, allowing for
better self-monitoring for identity theft.
In particular, the rule requires
contractors to have in place procedures
and capability to notify any individual
whose PII and/or SPII was under the
control of the contractor or resided in
the information system at the time of an
incident. At a minimum, this
notification must include: a brief
description of the incident; a
description of the types of PII or SPII
involved; a statement as to whether the
PII or SPII was encrypted or protected
by other means; steps individuals may
take to protect themselves; what the
contractor and/or the Government are
doing to investigate the incident, to
mitigate the incident, and to protect
against any future incidents; and
information identifying who individuals
may contact for additional information.
DHS is unable to monetize the benefit
associated with notifying individuals
that their data may be compromised
because it is difficult to estimate the
number of individuals who may have
their data compromised and to monetize
the benefit of notification. DHS is
unable to monetize the benefit
associated with notification because
DHS cannot estimate the number of
E:\FR\FM\21JNR3.SGM
21JNR3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
individuals who require notification on
an annual or per-incident basis. DHS
does not track at the Department level
the number of notifications required on
either an annual or per-incident basis.
Additionally, the number of individuals
requiring notification varies from
incident to incident. Because DHS
cannot estimate the number of
individuals who require notification on
either an annual or per-incident basis,
the Department cannot monetize the
benefit of notification.
The final rule also will produce a
benefit to individuals associated with
providing credit monitoring services.
Under the final rule, when directed by
the contracting officer, contractors are
required to provide credit monitoring
services, including call center services,
to any individual whose PII or SPII was
under the control of the contractor, or
resided in the information system, at the
time of the incident for a period
beginning on the date of the incident
and extending not less than 18 months
from the date the individual is notified.
Credit monitoring services can be
particularly beneficial to the affected
public, as they can assist individuals in
the early detection of identity theft as
well as notify individuals of changes
that appear in their credit report, such
as creation of new accounts, changes to
their existing accounts or personal
information, or new inquiries for credit.
Such notification affords individuals the
opportunity to take steps to minimize
any harm associated with unauthorized
or fraudulent activity. DHS is unable to
quantify the benefit associated with
providing credit monitoring services
because it is difficult to estimate the
number of individuals who may require
credit monitoring services.
Another benefit of the Safeguarding of
Controlled Unclassified Information
clause is expedited reporting timelines.
Incident reporting requires a contractor
to report all known or suspected
incidents to the Component SOC, or the
DHS Enterprise SOC if the Component
SOC is not available, in accordance with
4300A Sensitive Systems Handbook,
Attachment F, Incident Response. All
known or suspected incidents involving
PII or SPII must be reported within 1
hour of discovery. All other incidents
must be reported within 8 hours of
discovery. Timely reporting of incidents
is critical for proactive incident
response and potentially faster incident
resolution. Also, timely reporting
prevents the impact of the incident from
expanding, ensures incident response
and mitigation activities are undertaken
quickly, and ensures that individuals
are timely notified of the possible or
40591
actual compromise of their PII and
offered credit monitoring services when
applicable. DHS is unable to quantify
this benefit because it is difficult to
quantify the impact of timely reporting
on the severity of an incident.
4. Summary
DHS presents the estimated range of
costs under the final rule in Exhibit 8.
DHS estimates the final rule will have
an annualized cost that ranges from
$15.32 million to $17.28 million at a
discount rate of 7 percent and a total 10year cost that ranges from $107.62
million to $121.37 million at a discount
rate of 7 percent. DHS was unable to
quantify the cost savings or benefits
associated with the rule. However, the
final rule is expected to produce cost
savings by reducing the time required to
grant an ATO, reducing DHS time
reviewing and reissuing proposals
because contractors are better qualified,
and reducing the time to identify a data
breach. The final rule also produces
benefits by better notifying the public
when their data are compromised,
requiring the provision of credit
monitoring services so that the public
can better monitor and avoid costly
consequences of data breaches, and
reducing the severity of incidents
through timely incident reporting.
EXHIBIT 8—ESTIMATED MONETIZED COSTS OF THE FINAL RULE
[$2020 Millions]
Costs
Low
2023 .............................................................................................................................................
2024 .............................................................................................................................................
2025 .............................................................................................................................................
2026 .............................................................................................................................................
2027 .............................................................................................................................................
2028 .............................................................................................................................................
2029 .............................................................................................................................................
2030 .............................................................................................................................................
2031 .............................................................................................................................................
2032 .............................................................................................................................................
Undiscounted 10-Year Total ........................................................................................................
10-Year Total with Discount Rate of 3% .....................................................................................
10-Year Total with Discount Rate of 7% .....................................................................................
Annualized with Discount Rate of 3% .........................................................................................
Annualized with Discount Rate of 7% .........................................................................................
lotter on DSK11XQN23PROD with RULES3
5. Regulatory Alternatives
DHS evaluated two alternatives to the
chosen approach of independent
assessment, which requires vendors to
obtain an independent assessment from
a third party to validate the security and
privacy controls in place for an
information system prior to submission
of the security authorization package to
the Government for review and
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
acceptance. In general, when assessing
compliance with a standard or set of
requirements, there are three
alternatives: (1) first-party attestation or
self-certification; (2) second-party
attestation (i.e., internal independent);
or (3) third-party attestation. While the
first two options may be considered the
least economically burdensome, thirdparty attestation is an accepted best
practice in commercial industry as
PO 00000
Frm 00033
Fmt 4701
Sfmt 4700
Primary
$28.93
6.15
6.15
28.92
6.15
6.15
28.92
6.15
6.15
28.92
152.60
130.28
107.62
15.27
15.32
$31.63
6.15
6.15
31.35
6.15
6.15
31.35
6.15
6.15
31.35
162.32
138.58
114.49
16.25
16.30
High
$33.79
6.15
6.15
33.78
6.15
6.15
33.78
6.15
6.15
33.78
172.04
146.89
121.37
17.22
17.28
objectivity increases with
independence. DHS has selected the
chosen approach of requiring vendors to
obtain an independent assessment from
a third party to ensure a truly objective
measure of an entity’s compliance with
the requisite security and privacy
controls. Recent high-profile breaches of
Federal information demonstrate the
need for Departments, agencies, and
industry to ensure that information
E:\FR\FM\21JNR3.SGM
21JNR3
40592
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
security protections are clearly,
effectively, and consistently addressed
and appropriately implemented in
contracts. The benefits of using a third
party to perform an independent
assessment extends to the contractor, as
the contractor can use the results of the
independent assessment to demonstrate
its cybersecurity excellence for
customers other than DHS.
lotter on DSK11XQN23PROD with RULES3
B. Regulatory Flexibility Act
The Regulatory Flexibility Act of
1980, 5 U.S.C. 601 et seq., as amended
by the Small Business Regulatory
Enforcement Fairness Act of 1996,
Public Law 104–121 (Mar. 29, 1996),
hereafter jointly referred to as the
‘‘RFA,’’ requires Federal agencies
engaged in rulemaking to assess the
impact of regulations that will have a
significant economic impact on a
substantial number of small entities.
The agency also is required to respond
to public comments on the NPRM.47
The Chief Counsel for Advocacy of the
SBA did not submit public comments
on the NPRM.
The Department believes that this
final rule may have a significant
economic impact on a substantial
number of small entities. Therefore, the
Department publishes this final
regulatory flexibility analysis (FRFA)
that builds on the assessment provided
in the initial regulatory flexibility
analysis (IRFA) published as part of the
NPRM. The Department invited
interested persons to submit comments
on impacts to small entities during the
proposed rule phase.
1. A Statement of the Need for, and
Objectives of, the Rule
DHS has determined that the new
rulemaking is needed to implement
security and privacy measures to
safeguard CUI and facilitate improved
incident reporting to DHS. The final
rule enables DHS more efficiently to
identify, remediate, mitigate, and
resolve incidents when they occur, not
necessarily completely prevent them.
DHS understands that there is no ‘‘true’’
way to completely prevent an incident
from occurring. However, these
measures are intended to decrease the
likelihood of occurrence with full
knowledge that there is no such thing as
an ‘‘unhackable’’ system.
The final rule adds a new clause at
3052.204–7X, Safeguarding of
Controlled Unclassified Information,
that ensures adequate protection of CUI.
That new clause: (1) identifies CUI
handling requirements and security
processes and procedures applicable to
47 See
Federal information systems, which
include contractor information systems
operated on behalf of the agency; (2)
identifies incident reporting
requirements, including timelines and
required data elements, inspection
provisions, and post-incident activities;
and (3) requires certification of
sanitization of government and
government-activity-related files and
information. Additionally, new clause
3052.204–7Y, Notification and Credit
Monitoring Requirements for Personally
Identifiable Information Incidents,
requires contractors to have in place
procedures and the capability to notify
and provide credit monitoring services
to any individual whose PII or SPII was
under the control of the contractor or
resided in the information system at the
time of the incident.
These measures are necessary because
of the urgent need to protect CUI and
respond appropriately when DHS
contractors experience incidents with
DHS information. Persistent and
pervasive high-profile breaches of
Federal information continue to
demonstrate the need to ensure that
information security protections are
addressed clearly, effectively, and
consistently in contracts. This final rule
strengthens and expands existing HSAR
language to ensure adequate security
when contractor and/or subcontractor
employees will have access to CUI; CUI
will be collected or maintained on
behalf of the agency; or Federal
information systems, which include
contractor information systems operated
on behalf of the agency, are used to
collect, process, store, or transmit CUI.
2. A Statement of the Significant Issues
Raised by the Public Comments in
Response to the IRFA, a Statement of
the Assessment of the Agency of Such
Issues, and a Statement of Any Changes
Made to the Proposed Rule as a Result
of Such Comments
The Department did not receive
public comments on the IRFA.
3. The Response of the Agency to Any
Comments Filed by the Chief Counsel
for Advocacy of the SBA in Response to
the Proposed Rule, and a Detailed
Statement of Any Change Made to the
Proposed Rule as a Result of the
Comments
The Department did not receive
comments from the Chief Counsel for
Advocacy of the SBA.
5 U.S.C. 604.
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
PO 00000
Frm 00034
Fmt 4701
Sfmt 4700
4. A Description of and an Estimate of
the Number of Small Entities to Which
the Rule Will Apply or an Explanation
of Why No Such Estimate is Available
a. Definition of Small Entity
The RFA defines a ‘‘small entity’’ as
a (1) small not-for-profit organization;
(2) small governmental jurisdiction; or
(3) small business. The Department used
the entity size standards defined by
SBA, in effect as of August 19, 2019, to
classify businesses as small.48 SBA
establishes separate standards for
individual 6-digit North American
Industry Classification System (NAICS)
codes, and standard cutoffs typically are
based on either the average number of
employees or the average annual
receipts. For example, small businesses
generally are defined as having fewer
than 500, 1,000, or 1,250 employees in
manufacturing industries and less than
$7.5 million in average annual receipts
for nonmanufacturing industries.
However, some exceptions do exist, the
most notable being that depository
institutions (including credit unions,
commercial banks, and noncommercial
banks) are classified by total assets
(small defined as less than $550 million
in assets). Small governmental
jurisdictions are another noteworthy
exception. They are defined as the
governments of cities, counties, towns,
townships, villages, school districts, or
special districts with populations of less
than 50,000 people.49
b. Number of Small Entities
The Department collected
employment and annual revenue data
from the business information provider
Data Axle and merged those data into
FY 2020 Federal FPDS data. The FPDS
data contained PSC information for each
vendor identifying the type of service
being provided to DHS. This dataset
allowed the Department to identify the
number and type of small entities in the
FPDS data, and their PSC information,
as well as their annual revenues. DHS
identified 2,218 unique vendors with
PSCs for FY 2020 that may be impacted
by the final rule. Of those 2,218
vendors, the Department was able to
obtain data matches of revenue or
employees for 366 vendors in FY 2020.
Duplicate vendors that appeared
multiple times within the dataset were
removed (i.e., the same vendor
appearing multiple times). The
Department was unable to obtain data
48 SBA Table of Small Business Size Standards
Matched to North American Industry Classification
System Codes (Aug. 2019), https://www.sba.gov/
document/support-table-size-standards.
49 See https://advocacy.sba.gov/resources/theregulatory-flexibility-act for details.
E:\FR\FM\21JNR3.SGM
21JNR3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
matches for 184 vendors in FY 2020. In
order to prevent underestimating the
number of small entities the final rule
would affect, DHS conservatively
considers all the nonmatched vendors
as small entities for the purpose of this
analysis. Of the 366 vendors with
employee or revenue matches, the
Department identified 265 unique
vendors (or 48 percent of the sample) as
40593
small.50 Within the 265 matched small
vendors, the Department was unable to
obtain revenue data for four vendors.
These data points are displayed in
Exhibit 9 below.
EXHIBIT 9—NUMBER OF SMALL ENTITIES
Parameter
Quantity
Population ........................................................................................................................................................................
Population (unique entities) .............................................................................................................................................
Minimum Required Sample .............................................................................................................................................
Selected Sample ..............................................................................................................................................................
Nonmatched Sample Segment ........................................................................................................................................
Matched Sample Segment ..............................................................................................................................................
Matched Small Entities ....................................................................................................................................................
Sub-Sample Missing Revenue Data ...............................................................................................................................
Matched Non-Small Entities ............................................................................................................................................
Number of Small Entities Discovered in Research .........................................................................................................
In sum, the Department classified 449
vendors as small.51 Of these unique
small entities, 261 of them had revenue
data available from Data Axle. The
Department’s analysis of the financial
impact of this final rule on small
entities is based on the number of small
unique entities with revenue data (261).
To provide clarity on the industries
impacted by this regulation, Exhibit 10
Proportion
of sample
(percent)
3,203
2,218
328
550
184
366
265
4
101
449
100
33
67
48
2
18
82
shows the number of unique small
entities (265) in FY 2020 within each
NAICS code at the 6-digit and 4-digit
level.
EXHIBIT 10—NUMBER OF SMALL ENTITIES BY NAICS CODE
6-Digit
NAICS
541511
443142
541618
423610
Description
..............
..............
..............
..............
511210 ..............
541614 ..............
541330 ..............
561990 ..............
238990 ..............
561621 ..............
Other NAICS .....
Number
of small
employers
Custom Computer Programming Services ......................................................................................
Electronics Stores ............................................................................................................................
Other Management Consulting Services .........................................................................................
Electrical Apparatus and Equipment, Wiring Supplies, and Related Equipment Merchant Wholesalers.
Software Publishers20 .....................................................................................................................
Process, Physical Distribution and Logistics Consulting Services ..................................................
Engineering Services .......................................................................................................................
All Other Support Services ..............................................................................................................
All Other Specialty Trade Contractors .............................................................................................
Security Systems Services (except Locksmiths) .............................................................................
..........................................................................................................................................................
4-Digit
NAICS
Description
lotter on DSK11XQN23PROD with RULES3
21
16
11
10
8
6
4
4
10
8
7
7
6
6
163
4
3
3
3
2
2
61
Number
of small
employers
5416 .................. Management, Scientific, and Technical Consulting Services ..........................................................
5415 .................. Computer Systems Design and Related Services ..........................................................................
4431 .................. Electronics and Appliance Stores ....................................................................................................
4236 .................. Household Appliances and Electrical and Electronic Goods Merchant Wholesalers .....................
5413 .................. Architectural, Engineering, and Related Services ...........................................................................
5616 .................. Investigation and Security Services .................................................................................................
5112 .................. Software Publishers .........................................................................................................................
2389 .................. Other Specialty Trade Contractors ..................................................................................................
5619 .................. Other Support Services ...................................................................................................................
5419 .................. Other Professional, Scientific, and Technical Services ...................................................................
Other NAICS ....................................................................................................................................................................
Percent
of small
employers
Percent
of small
employers
27
26
16
11
10
10
10
7
7
7
134
A small percentage of entities in the
sample segment are educational
institutions or not-for-profit entities.52
Using data with the profit/non-profit
status of each vendor in the sample
segment, we count the number of for-
50 SBA Table of Small Business Size Standards
Matched to North American Industry Classification
System Codes. (Aug. 2019), https://www.sba.gov/
document/support-table-size-standards.
51 Calculation: 184 nonmatched entities + 265
matched entities = 449 small entities.
52 Educational institutions include HBCUs,
private universities or colleges, State-controlled
institutions of higher learning, Tribal colleges,
veterinary colleges, or other educational
institutions.
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
PO 00000
Frm 00035
Fmt 4701
Sfmt 4700
E:\FR\FM\21JNR3.SGM
21JNR3
10
10
6
4
4
4
4
3
3
3
49
40594
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
profit and not-for-profit entities and the
number of small and non-small
entities.53 We assume that all
unspecified entities—those marked as
neither educational institutions, nonprofit organizations, or for-profit
organizations—are for-profit businesses.
Table 11 includes these data for both
entities we were able to match and nonmatched entities.
EXHIBIT 11—NUMBER OF SMALL ENTITIES
Parameter
Quantity
Selected Sample ..............................................................................................................................................................
Profit .................................................................................................................................................................................
Non-Profit .........................................................................................................................................................................
Educational Institution ......................................................................................................................................................
Other ................................................................................................................................................................................
c. Projected Impacts to Affected Small
Entities
The Department has estimated the
incremental costs for small entities from
the baseline (i.e., the 2017 proposed
rule) to this final rule. We estimated the
costs of obtaining an independent
assessment and rule familiarization.
Although the sample population of
small entities identified in this analysis
is 449, DHS does not anticipate the
actual number of small entities
impacted by the final rule to be of this
magnitude. As discussed in the E.O.
12866 section, DHS expects 171 entities
to be impacted by cost provisions
annually. The Department anticipates
these 171 entities would have a
distribution of large and small entities,
and impacts to the small entities, that
follow the sample population’s
distribution of size and costs presented
in this FRFA.
Small entities in the IT field will be
subject to only the independent
assessment, ongoing maintenance of
continuous monitoring, and rule
familiarization costs. DHS classified an
entity as being in the IT field if their
PSC began with a ‘‘7’’ or ‘‘D,’’ or if the
PSC matched any of the following
codes: 5810, 6350, AJ11, AJ21, AJ23,
AJ43, R423, R430, R431, R611, and
R615. Additionally, entities classified as
non-ATO will be subject to only rule
familiarization costs. DHS classified an
entity as being non-ATO if their PSC
550
496
19
6
29
Proportion
of sample
(percent)
100.0
90.2
3.4
1.1
5.3
and description was as follows: (1)
S201—Housekeeping—Custodial
Janitorial; (2) 6515—Medical and
Surgical Instruments, Equipment, and
Supplies; (3) S216—Housekeeping—
Facilities Operations Support; (4)
R614—Support—Administrative: Paper
Shredding; or (5) U008—Education/
Training—Training/Curriculum
Development. The estimates included in
this analysis are consistent with those
presented in the E.O. 12866 section and
include costs of rule familiarization,
reporting and recordkeeping, and
independent assessment.
The Department presents the impacts
of the final rule on small entities as a
percent of revenue in Exhibit 12 below.
EXHIBIT 12—SUMMARY OF SMALL ENTITY COSTS AS A PERCENT OF REVENUE
50 Percent
lotter on DSK11XQN23PROD with RULES3
Impacts
Number
of small
entities
% of
small
entities
75 Percent
Cumulative
%
Number
of small
entities
% of
small
entities
90 Percent
Cumulative
%
Number
of small
entities
% of
small
entities
Cumulative
%
<1% ................
1–5% ..............
5–10% ............
10–25% ..........
25–50% ..........
>50% ..............
39
83
48
58
23
13
15
31
18
22
9
5
15
46
64
86
95
100
34
82
47
59
27
15
13
31
18
22
10
6
13
44
62
84
94
100
29
86
42
59
26
22
1
33
16
22
10
8
11
44
59
82
92
100
Total ........
264
..................
....................
264
..................
....................
264
..................
....................
DHS expects its contractors may
choose to reflect these costs in the price
and cost proposals they submit to the
Department. Therefore, the Department
conducted a sensitivity analysis with
varying levels of passthrough assumed
for small businesses. DHS does not
assume a specific percentage of costs
that vendors will pass on since some
vendors may choose to pass on fewer
costs in pursuance of a competitive
advantage on their price. Therefore, the
Department presents three scenarios
using the primary estimates of the rule
costs: (1) vendors pass on 50 percent of
rule costs to the Department; (2) vendors
pass on 75 percent of rule costs to the
Department; and (3) vendors pass on 90
percent of rule costs to the Department.
The results of the sensitivity analysis
are displayed in Exhibit 13 below.
53 The SBA’s Office of Advocacy defines small
organizations as not-for-profit entities that are
independently owned and operated and not
dominant in their field. For more information, visit
https://www.sba.gov/sites/default/files/advocacy/
How-to-Comply-with-the-RFA-WEB.pdf.
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
PO 00000
Frm 00036
Fmt 4701
Sfmt 4700
E:\FR\FM\21JNR3.SGM
21JNR3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
40595
EXHIBIT 13—SENSITIVITY OF SMALL ENTITY COSTS ASSUMING DIFFERENT PASSTHROUGHS
50 Percent
Impacts
Number
of small
entities
75 Percent
% of
small
entities
Cumulative
%
% of
small
entities
Cumulative
%
Number
of small
entities
% of
small
entities
Cumulative
%
<1% ................
1–5% ..............
5–10% ............
10–25% ..........
25–50% ..........
>50% ..............
70
100
43
38
8
5
27
38
16
14
3
2
27
64
81
95
98
100
109
99
32
19
5
0
41
38
12
7
2
0
41
79
91
98
100
100
157
85
14
8
0
0
59
32
5
3
0
0
59
92
97
100
100
100
Total ........
264
..................
....................
264
..................
....................
264
..................
....................
5. A Description of the Projected
Reporting, Recordkeeping, and Other
Compliance Requirements of the Rule,
Including an Estimate of the Classes of
Small Entities That Will Be Subject to
the Requirement and the Type of
Professional Skills Necessary for
Preparation of the Report or Record
The final rule has reporting and
recordkeeping requirements impacting
small entities. DHS needs information
required by clauses 3052.204–7X,
Safeguarding of Controlled Unclassified
Information, and 3052.204–7Y,
Notification and Credit Monitoring
Requirements for Personally Identifiable
Information Incidents, to implement the
requirements for safeguarding against
unauthorized contractor/subcontractor
disclosure and inappropriate use of CUI
that contractors and subcontractors may
have access to during the course of
contract performance. Reporting and
recordkeeping for the SA package
consists of the following: Security Plan,
Contingency Plan, Contingency Plan
Test Results, Configuration Management
Plan, Security Assessment Plan,
Security Assessment Report, and
Authorization to Operate Letter.
Additional documents that may be
required include a Plan(s) of Action and
Milestones and Interconnection Security
Agreement(s). Additional requirements
include an independent assessment,
security review, renewal of the ATO
(required every 3 years unless stated
otherwise), and Federal reporting and
continuous monitoring requirements.
lotter on DSK11XQN23PROD with RULES3
Number
of small
entities
90 Percent
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
6. A Description of the Steps the Agency
Has Taken To Minimize the Significant
Economic Impact on Small Entities
Consistent With the Stated Objectives of
Applicable Statutes, Including a
Statement of the Factual, Policy, and
Legal Reasons for Selecting the
Alternative Adopted in the Final Rule
and Why Each of the Other Significant
Alternatives to the Rule Considered by
the Agency That Affects the Impact on
Small Entities Was Rejected
The Department considered
alternative requirements for
independent assessment that would be
less burdensome on small entities. In
general, when assessing compliance
with a standard or set of requirements,
there are three alternatives: (1) firstparty attestation or self-certification; (2)
second-party attestation (i.e., internal
independent); or (3) third-party
attestation. While the first two options
may be considered the least
economically burdensome, third-party
attestation is an accepted best practice
in commercial industry as objectivity
increases with independence. DHS has
selected the chosen approach of
requiring vendors to obtain an
independent assessment from a third
party to ensure a truly objective measure
of an entity’s compliance with the
requisite security and privacy controls.
Recent high-profile breaches of Federal
information demonstrate the need for
departments, agencies, and industry to
ensure that information security
protections are clearly, effectively, and
consistently addressed and
appropriately implemented in contracts.
The benefits of using a third party to
perform an independent assessment
extends to the contractor, as the
contractor can use the results of the
independent assessment to demonstrate
its cybersecurity excellence for
customers other than DHS.
The information security
requirements associated with this rule
are not geared toward a type of
PO 00000
Frm 00037
Fmt 4701
Sfmt 4700
contractor; the requirements are based
on the sensitivity of the information and
the impact on the program, the
Government, and security in the event
CUI is breached. That standard would
not vary based on the size of the entity.
DHS has determined that the costs
associated with compliance with the
security requirements of this rule are a
necessary expense to ensure DHS CUI is
adequately protected and to produce the
resulting benefits and cost savings that
accrue to DHS, vendors, and the public
from the provisions of the final rule, as
discussed in the E.O. 12866 section.
C. Paperwork Reduction Act
The Paperwork Reduction Act (44
U.S.C. ch. 35) applies. The rule contains
information collection requirements.
Accordingly, DHS will be submitting a
request for approval of a new
information collection requirement
concerning this rule to OMB under 44
U.S.C. 3501, et seq.
The collection requirements for this
rule are based on two new clauses,
3052.204–7X, Safeguarding of
Controlled Unclassified Information,
and 3052.204–7Y, Notification and
Credit Monitoring Requirements for
Personally Identifiable Information
Incidents.
Overview of Information Collection:
(1) Type of Information Collection:
New Collection.
(2) Title of the Form/Collection:
Homeland Security Acquisition
Regulation: Safeguarding of Controlled
Unclassified Information.
(3) Agency form number, if any, and
the applicable component of DHS
sponsoring the collection: No form;
OCPO.
(4) Affected public who will be asked
or required to respond; as well as a brief
abstract: The affected public is business
or other for-profit institutions. DHS
needs the information required by
clauses 3052.204–7X and 3052.204–7Y
to implement the requirements for
safeguarding against unauthorized
E:\FR\FM\21JNR3.SGM
21JNR3
40596
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
lotter on DSK11XQN23PROD with RULES3
contractor/subcontractor disclosure and
inappropriate use of CUI that
contractors and subcontractors may
have access to during the course of
contract performance. Responses are
required for respondents to obtain or
retain benefits.
(5) An estimate of the total number of
respondents and the amount of time
estimated for an average respondent to
respond: The estimated number of
respondents for reporting is 1,028. The
weighted average public reporting
burden for this collection of information
is estimated to be approximately 50
hours per response to comply with the
requirements, including time for
reviewing instructions, searching
existing data sources, gathering and
maintaining the data needed, and
completing and reviewing the collection
of information. This weighted average is
based on an estimated 36 hours per
response to comply with the
requirements when an ATO is not
required and an estimated 120 hours to
comply with the requirements when an
ATO is required (i.e., when a contractor
is required to submit an SA package).54
The SA package consists of the
following: Security Plan, Contingency
Plan, Contingency Plan Test Results,
Configuration Management Plan,
Security Assessment Plan, Security
Assessment Report, and Authorization
to Operate Letter. Additional documents
that may be required include a Plan(s)
of Action and Milestones and
Interconnection Security Agreement(s).
Additional requirements include an
independent assessment, security
review, renewal of the ATO (required
every 3 years unless stated otherwise),
and Federal reporting and continuous
monitoring requirements. It is estimated
that the number of recordkeepers
associated with these clauses will be
1,028 and the estimated burden per
response is 16 hours.
(6) An estimate of the total public
burden (in hours) associated with the
information collection: The total
estimated annual hour burden
associated with this collection is 67,820.
(7) An estimate of the total public
burden (in cost) associated with the
information collection: The estimated
total annual cost burden associated with
this collection of information is
$4,476,120.
List of Subjects in 48 CFR Parts 3001,
3002, 3004 and 3052
Government procurement.
For reasons set out in the preamble,
DHS amends chapter 30 of title 48 of the
54 Estimated hours weighted by 171 ATO vendors
and 857 non-ATO vendors.
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
Code of Federal Regulations as set forth
below.
■ 1. The authority citation for 48 CFR
parts 3001, 3002, 3004, and 3052 is
revised to read as follows:
Authority: 5 U.S.C. 301–302, 41 U.S.C.
1707, 41 U.S.C. 1702, 41 U.S.C. 1303(a)(2), 48
CFR part 1, subpart 1.3, and DHS Delegation
Number 0702.
PART 3001—FEDERAL ACQUISITION
REGULATIONS SYSTEM
2. In section 3001.106 amend
paragraph (a) by adding a new OMB
control number at the end of the list to
read as follows:
■
3001.106 OMB Approval Under the
Paperwork Reduction Act.
(a) * * *
OMB Control No. 1601–0023
(Safeguarding of Controlled Unclassified
Information)
*
*
*
*
*
PART 3002—DEFINITIONS OF WORDS
AND TERMS
3. Amend section 3002.101 by adding
the definitions ‘‘Adequate security’’,
‘‘Controlled unclassified information
(CUI)’’, ‘‘Federal information’’, ‘‘Federal
information system’’, ‘‘Handling’’,
‘‘Information resources’’, ‘‘Information
security’’, and ‘‘Information systems’’ to
read as follows:
Adequate security means security
protections commensurate with the risk
resulting from the unauthorized access,
use, disclosure, disruption,
modification, or destruction of
information. This includes ensuring that
information hosted on behalf of an
agency and information systems and
applications used by the agency operate
effectively and provide appropriate
confidentiality, integrity, and
availability protections through the
application of cost-effective security
controls.
*
*
*
*
*
Controlled unclassified information
(CUI) is any information the
Government creates or possesses, or an
entity creates or possesses for or on
behalf of the Government (other than
classified information) that a law,
regulation, or Governmentwide policy
requires or permits an agency to handle
using safeguarding or dissemination
controls. This definition includes the
following CUI categories and
subcategories of information:
(1) Chemical-terrorism Vulnerability
Information (CVI) as defined in 6 CFR
part 27, ‘‘Chemical Facility AntiTerrorism Standards,’’ and as further
■
PO 00000
Frm 00038
Fmt 4701
Sfmt 4700
described in supplementary guidance
issued by an authorized official of the
Department of Homeland Security
(including the Revised Procedural
Manual ‘‘Safeguarding Information
Designated as Chemical-Terrorism
Vulnerability Information’’ dated
September 2008);
(2) Protected Critical Infrastructure
Information (PCII) as set out in the
Critical Infrastructure Information Act
of 2002 (title XXII, subtitle B of the
Homeland Security Act of 2002 as
amended through Pub. L. 116–283),
PCII’s implementing regulations (6 CFR
part 29), the PCII Program Procedures
Manual, and any supplementary
guidance officially communicated by an
authorized official of the Department of
Homeland Security, the PCII Program
Manager, or a PCII Program Manager
Designee;
(3) Sensitive Security Information
(SSI) as defined in 49 CFR part 1520,
‘‘Protection of Sensitive Security
Information,’’ as amended, and any
supplementary guidance officially
communicated by an authorized official
of the Department of Homeland Security
(including the Assistant Secretary for
the Transportation Security
Administration or designee), including
Department of Homeland Security MD
11056.1, ‘‘Sensitive Security
Information (SSI)’’ and, within the
Transportation Security Administration,
TSA MD 2810.1, ‘‘SSI Program’’;
(4) Homeland Security Agreement
Information means information the
Department of Homeland Security
receives pursuant to an agreement with
State, local, Tribal, territorial, or private
sector partners that is required to be
protected by that agreement. The
Department receives this information in
furtherance of the missions of the
Department, including, but not limited
to, support of the Fusion Center
Initiative and activities for cyber
information sharing consistent with the
Cybersecurity Information Sharing Act
of 2015;
(5) Homeland Security Enforcement
Information means unclassified
information of a sensitive nature
lawfully created, possessed, or
transmitted by the Department of
Homeland Security in furtherance of its
immigration, customs, and other civil
and criminal enforcement missions, the
unauthorized disclosure of which could
adversely impact the mission of the
Department;
(6) International Agreement
Information means information the
Department of Homeland Security
receives that is required to be protected
by an information sharing agreement or
arrangement with a foreign government,
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
an international organization of
governments or any element thereof, an
international or foreign public or
judicial body, or an international or
foreign private or non-governmental
organization;
(7) Information Systems Vulnerability
Information (ISVI) means:
(i) Department of Homeland Security
information technology (IT) systems
data revealing infrastructure used for
servers, desktops, and networks;
applications name, version, and release;
switching, router, and gateway
information; interconnections and
access methods; and mission or
business use/need. Examples of ISVI are
systems inventories and enterprise
architecture models. Information
pertaining to national security systems
and eligible for classification under
Executive Order 13526 will be classified
as appropriate; and/or
(ii) Information regarding developing
or current technology, the release of
which could hinder the objectives of the
Department, compromise a
technological advantage or
countermeasure, cause a denial of
service, or provide an adversary with
sufficient information to clone,
counterfeit, or circumvent a process or
system;
(8) Operations Security Information
means Department of Homeland
Security information that could be
collected, analyzed, and exploited by a
foreign adversary to identify intentions,
capabilities, operations, and
vulnerabilities that threaten operational
security for the missions of the
Department;
(9) Personnel Security Information
means information that could result in
physical risk to Department of
Homeland Security personnel or other
individuals whom the Department is
responsible for protecting;
(10) Physical Security Information
means reviews or reports illustrating or
disclosing facility infrastructure or
security vulnerabilities related to the
protection of Federal buildings,
grounds, or property. For example,
threat assessments, system security
plans, contingency plans, risk
management plans, business impact
analysis studies, and certification and
accreditation documentation;
(11) Privacy Information includes
both Personally Identifiable Information
(PII) and Sensitive Personally
Identifiable Information (SPII). PII refers
to information that can be used to
distinguish or trace an individual’s
identity, either alone or when combined
with other information that is linked or
linkable to a specific individual; and
SPII is a subset of PII that if lost,
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
compromised, or disclosed without
authorization could result in substantial
harm, embarrassment, inconvenience, or
unfairness to an individual. To
determine whether information is PII,
DHS will perform an assessment of the
specific risk that an individual can be
identified using the information with
other information that is linked or
linkable to the individual. In performing
this assessment, it is important to
recognize that information that is not PII
can become PII whenever additional
information becomes available, in any
medium or from any source, that would
make it possible to identify an
individual. Certain data elements are
particularly sensitive and may alone
present an increased risk of harm to the
individual.
(i) Examples of stand-alone PII that
are particularly sensitive include: Social
Security numbers (SSNs), driver’s
license or State identification numbers,
Alien Registration Numbers (Anumbers), financial account numbers,
and biometric identifiers.
(ii) Multiple pieces of information
may present an increased risk of harm
to the individual when combined,
posing an increased risk of harm to the
individual. SPII may also consist of any
grouping of information that contains an
individual’s name or other unique
identifier plus one or more of the
following elements:
(A) Truncated SSN (such as last 4
digits);
(B) Date of birth (month, day, and
year);
(C) Citizenship or immigration status;
(D) Ethnic or religious affiliation;
(E) Sexual orientation;
(F) Criminal history;
(G) Medical information; and
(H) System authentication
information, such as mother’s birth
name, account passwords, or personal
identification numbers (PINs).
(iii) Other PII that may present an
increased risk of harm to the individual
depending on its context, such as a list
of employees and their performance
ratings or an unlisted home address or
phone number. The context includes the
purpose for which the PII was collected,
maintained, and used. This assessment
is critical because the same information
in different contexts can reveal
additional information about the
impacted individual.
*
*
*
*
*
Federal information means
information created, collected,
processed, maintained, disseminated,
disclosed, or disposed of by or for the
Federal Government, in any medium or
form.
PO 00000
Frm 00039
Fmt 4701
Sfmt 4700
40597
Federal information system means an
information system used or operated by
an agency or by a contractor of an
agency or by another organization on
behalf of an agency.
Handling means any use of controlled
unclassified information, including but
not limited to marking, safeguarding,
transporting, disseminating, re-using,
and disposing of the information.
*
*
*
*
*
Information resources means
information and related resources, such
as personnel, equipment, funds, and
information technology.
Information security means protecting
information and information systems
from unauthorized access, use,
disclosure, disruption, modification, or
destruction in order to provide—
(1) Integrity, which means guarding
against improper information
modification or destruction, and
includes ensuring information
nonrepudiation and authenticity;
(2) Confidentiality, which means
preserving authorized restrictions on
access and disclosure, including means
for protecting personal privacy and
proprietary information; and
(3) Availability, which means
ensuring timely and reliable access to
and use of information.
Information system means a discrete
set of information resources organized
for the collection, processing,
maintenance, use, sharing,
dissemination, or disposition of
information.
*
*
*
*
*
PART 3004—ADMINISTRATIVE
MATTERS
4. Revise subpart 3004.4 to read as
follows:
■
Subpart 3004.4—Safeguarding
Classified and Controlled Unclassified
Information Within Industry
3004.470 Security requirements for access
to unclassified facilities, information
resources, and controlled unclassified
information.
3004.470–1 Scope.
3004.470–2 Definitions.
3004.470–3 Policy.
3004.470–4 Contract Clauses.
3004.470–1
Scope.
This section implements DHS policies
for assuring adequate security of
unclassified facilities, information
resources, and controlled unclassified
information (CUI) during the acquisition
lifecycle.
3004.470–2
Definitions.
As used in this subpart—
E:\FR\FM\21JNR3.SGM
21JNR3
40598
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
Incident means an occurrence that—
(1) Actually or imminently
jeopardizes, without lawful authority,
the integrity, confidentiality, or
availability of information or an
information system; or
(2) Constitutes a violation or
imminent threat of violation of law,
security policies, security procedures, or
acceptable use policies.
3004.470–3
Policy.
(a) DHS requires that CUI be
safeguarded when it resides on DHSowned and operated information
systems, DHS-owned and contractoroperated information systems,
contractor-owned and/or operated
information systems operating on behalf
of the Department, and any situation
where contractor and/or subcontractor
employees may have access to CUI
because of their relationship with DHS.
There are several Department policies
and procedures (accessible at https://
www.dhs.gov/dhs-security-and-trainingrequirements-contractors) that also
address the safeguarding of CUI.
Compliance with these policies and
procedures, as amended, is required.
(b) DHS requires contractor
employees that require recurring access
to government facilities or access to CUI
to complete such forms as may be
necessary for security or other reasons,
including the conduct of background
investigations to determine fitness.
Department policies and procedures
that address contractor employee fitness
are contained in Instruction Handbook
Number 121–01–007, The Department
of Homeland Security Personnel
Suitability and Security Program.
Compliance with these policies and
procedures, as amended, is required.
lotter on DSK11XQN23PROD with RULES3
3004.470–4
Contract Clauses.
(a) Contracting officers shall insert the
basic clause at (HSAR) 48 CFR
3052.204–71, Contractor Employee
Access, in solicitations and contracts
when contractor and/or subcontractor
employees require recurring access to
government facilities or access to CUI.
Contracting officers shall insert the
basic clause with its Alternate I for
acquisitions requiring contractor access
to government information resources.
For acquisitions in which contractor
and/or subcontractor employees will not
have access to government information
resources, but the department has
determined contractor and/or
subcontractor employee access to CUI or
government facilities must be limited to
U.S. citizens and lawful permanent
residents, the contracting officer shall
insert the clause with its Alternate II.
Neither the basic clause nor its
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
alternates shall be used unless
contractor and/or subcontractor
employees will require recurring access
to government facilities or access to
CUI. Neither the basic clause nor its
alternates should ordinarily be used in
contracts with educational institutions.
(b)(1) Contracting officers shall insert
the clause at (HSAR) 48 CFR 3052.204–
72, Safeguarding of Controlled
Unclassified Information, in
solicitations and contracts where:
(i) Contractor and/or subcontractor
employees will have access to CUI; or
(ii) CUI will be collected or
maintained on behalf of the agency.
(2) Contracting officers shall insert the
basic clause with its alternate when
Federal information systems, which
include contractor information systems
operated on behalf of the agency, are
used to collect, process, store, or
transmit CUI.
(c) Contracting officers shall insert the
clause at (HSAR) 48 CFR 3052.204–73,
Notification and Credit Monitoring
Requirements for Personally Identifiable
Information Incidents, in solicitations
and contracts where contractor and/or
subcontractor employees have access to
PII.
PART 3052—SOLICITATION
PROVISIONS AND CONTRACT
CLAUSES
5. Remove and reserve clause
3052.204–70.
■ 6. Revise clause 3052.204–71 to read
as follows:
■
3052.204–71
Contractor employee access.
As prescribed in (HSAR) 48 CFR
3004.470–4(a), insert the following
clause with appropriate alternates:
Contractor Employee Access (July 2023)
(a) Controlled Unclassified Information
(CUI) is any information the Government
creates or possesses, or an entity creates or
possesses for or on behalf of the Government
(other than classified information) that a law,
regulation, or Governmentwide policy
requires or permits an agency to handle using
safeguarding or dissemination controls. This
definition includes the following CUI
categories and subcategories of information:
(1) Chemical-terrorism Vulnerability
Information (CVI) as defined in 6 CFR part
27, ‘‘Chemical Facility Anti-Terrorism
Standards,’’ and as further described in
supplementary guidance issued by an
authorized official of the Department of
Homeland Security (including the Revised
Procedural Manual ‘‘Safeguarding
Information Designated as ChemicalTerrorism Vulnerability Information’’ dated
September 2008);
(2) Protected Critical Infrastructure
Information (PCII) as set out in the Critical
Infrastructure Information Act of 2002 (title
XXII, subtitle B of the Homeland Security Act
PO 00000
Frm 00040
Fmt 4701
Sfmt 4700
of 2002 as amended through Pub. L. 116–
283), PCII’s implementing regulations (6 CFR
part 29), the PCII Program Procedures
Manual, and any supplementary guidance
officially communicated by an authorized
official of the Department of Homeland
Security, the PCII Program Manager, or a PCII
Program Manager Designee;
(3) Sensitive Security Information (SSI) as
defined in 49 CFR part 1520, ‘‘Protection of
Sensitive Security Information,’’ as amended,
and any supplementary guidance officially
communicated by an authorized official of
the Department of Homeland Security
(including the Assistant Secretary for the
Transportation Security Administration or
designee), including Department of
Homeland Security MD 11056.1, ‘‘Sensitive
Security Information (SSI)’’ and, within the
Transportation Security Administration, TSA
MD 2810.1, ‘‘SSI Program’’;
(4) Homeland Security Agreement
Information means information the
Department of Homeland Security receives
pursuant to an agreement with State, local,
Tribal, territorial, or private sector partners
that is required to be protected by that
agreement. The Department receives this
information in furtherance of the missions of
the Department, including, but not limited to,
support of the Fusion Center Initiative and
activities for cyber information sharing
consistent with the Cybersecurity
Information Sharing Act of 2015;
(5) Homeland Security Enforcement
Information means unclassified information
of a sensitive nature lawfully created,
possessed, or transmitted by the Department
of Homeland Security in furtherance of its
immigration, customs, and other civil and
criminal enforcement missions, the
unauthorized disclosure of which could
adversely impact the mission of the
Department;
(6) International Agreement Information
means information the Department of
Homeland Security receives that is required
to be protected by an information sharing
agreement or arrangement with a foreign
government, an international organization of
governments or any element thereof, an
international or foreign public or judicial
body, or an international or foreign private or
non-governmental organization;
(7) Information Systems Vulnerability
Information (ISVI) means:
(i) Department of Homeland Security
information technology (IT) systems data
revealing infrastructure used for servers,
desktops, and networks; applications name,
version, and release; switching, router, and
gateway information; interconnections and
access methods; and mission or business use/
need. Examples of ISVI are systems
inventories and enterprise architecture
models. Information pertaining to national
security systems and eligible for
classification under Executive Order 13526
will be classified as appropriate; and/or
(ii) Information regarding developing or
current technology, the release of which
could hinder the objectives of the
Department, compromise a technological
advantage or countermeasure, cause a denial
of service, or provide an adversary with
sufficient information to clone, counterfeit,
or circumvent a process or system;
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
(8) Operations Security Information means
Department of Homeland Security
information that could be collected,
analyzed, and exploited by a foreign
adversary to identify intentions, capabilities,
operations, and vulnerabilities that threaten
operational security for the missions of the
Department;
(9) Personnel Security Information means
information that could result in physical risk
to Department of Homeland Security
personnel or other individuals whom the
Department is responsible for protecting;
(10) Physical Security Information means
reviews or reports illustrating or disclosing
facility infrastructure or security
vulnerabilities related to the protection of
Federal buildings, grounds, or property. For
example, threat assessments, system security
plans, contingency plans, risk management
plans, business impact analysis studies, and
certification and accreditation
documentation;
(11) Privacy Information includes both
Personally Identifiable Information (PII) and
Sensitive Personally Identifiable Information
(SPII). PII refers to information that can be
used to distinguish or trace an individual’s
identity, either alone, or when combined
with other information that is linked or
linkable to a specific individual; and SPII is
a subset of PII that if lost, compromised, or
disclosed without authorization could result
in substantial harm, embarrassment,
inconvenience, or unfairness to an
individual. To determine whether
information is PII, DHS will perform an
assessment of the specific risk that an
individual can be identified using the
information with other information that is
linked or linkable to the individual. In
performing this assessment, it is important to
recognize that information that is not PII can
become PII whenever additional information
becomes available, in any medium or from
any source, that would make it possible to
identify an individual. Certain data elements
are particularly sensitive and may alone
present an increased risk of harm to the
individual.
(i) Examples of stand-alone PII that are
particularly sensitive include: Social Security
numbers (SSNs), driver’s license or State
identification numbers, Alien Registration
Numbers (A-numbers), financial account
numbers, and biometric identifiers.
(ii) Multiple pieces of information may
present an increased risk of harm to the
individual when combined, posing an
increased risk of harm to the individual. SPII
may also consist of any grouping of
information that contains an individual’s
name or other unique identifier plus one or
more of the following elements:
(A) Truncated SSN (such as last 4 digits);
(B) Date of birth (month, day, and year);
(C) Citizenship or immigration status;
(D) Ethnic or religious affiliation;
(E) Sexual orientation;
(F) Criminal history;
(G) Medical information; and
(H) System authentication information,
such as mother’s birth name, account
passwords, or personal identification
numbers (PINs).
(iii) Other PII that may present an
increased risk of harm to the individual
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
40599
depending on its context, such as a list of
employees and their performance ratings or
an unlisted home address or phone number.
The context includes the purpose for which
the PII was collected, maintained, and used.
This assessment is critical because the same
information in different contexts can reveal
additional information about the impacted
individual.
(b) Information Resources means
information and related resources, such as
personnel, equipment, funds, and
information technology.
(c) Contractor employees working on this
contract must complete such forms as may be
necessary for security or other reasons,
including the conduct of background
investigations to determine suitability.
Completed forms shall be submitted as
directed by the Contracting Officer. Upon the
Contracting Officer’s request, the Contractor’s
employees shall be fingerprinted or subject to
other investigations as required. All
Contractor employees requiring recurring
access to government facilities or access to
CUI or information resources are required to
have a favorably adjudicated background
investigation prior to commencing work on
this contract unless this requirement is
waived under departmental procedures.
(d) The Contracting Officer may require the
Contractor to prohibit individuals from
working on the contract if the Government
deems their initial or continued employment
contrary to the public interest for any reason,
including, but not limited to, carelessness,
insubordination, incompetence, or security
concerns.
(e) Work under this contract may involve
access to CUI. The Contractor shall access
and use CUI only for the purpose of
furnishing advice or assistance directly to the
Government in support of the Government’s
activities, and shall not disclose, orally or in
writing, CUI for any other purpose to any
person unless authorized in writing by the
Contracting Officer. For those Contractor
employees authorized to access CUI, the
Contractor shall ensure that these persons
receive initial and refresher training
concerning the protection and disclosure of
CUI. Initial training shall be completed
within 60 days of contract award and
refresher training shall be completed every 2
years thereafter.
(f) The Contractor shall include this clause
in all subcontracts at any tier where the
subcontractor may have access to government
facilities, CUI, or information resources.
(h) The Contractor shall have access only
to those areas of DHS information resources
explicitly stated in this contract or approved
by the COR in writing as necessary for
performance of the work under this contract.
Any attempts by Contractor personnel to gain
access to any information resources not
expressly authorized by the terms and
conditions in this contract, or as approved in
writing by the COR, are strictly prohibited. In
the event of violation of this provision, DHS
will take appropriate actions with regard to
the contract and the individual(s) involved.
(i) Contractor access to DHS networks from
a remote location is a temporary privilege for
mutual convenience while the Contractor
performs business for DHS. It is not a right,
a guarantee of access, a condition of the
contract, or government-furnished equipment
(GFE).
(j) Contractor access will be terminated for
unauthorized use. The Contractor agrees to
hold and save DHS harmless from any
unauthorized use and agrees not to request
additional time or money under the contract
for any delays resulting from unauthorized
use or access.
(k) Non-U.S. citizens shall not be
authorized to access or assist in the
development, operation, management, or
maintenance of Department IT systems under
the contract, unless a waiver has been
granted by the Head of the Component or
designee, with the concurrence of both the
Department’s Chief Security Officer (CSO)
and the Chief Information Officer (CIO) or
their designees. Within DHS Headquarters,
the waiver may be granted only with the
approval of both the CSO and the CIO or
their designees. In order for a waiver to be
granted:
(1) There must be a compelling reason for
using this individual as opposed to a U.S.
citizen; and
(2) The waiver must be in the best interest
of the Government.
(l) Contractors shall identify in their
proposals the names and citizenship of all
non-U.S. citizens proposed to work under the
contract. Any additions or deletions of nonU.S. citizens after contract award shall also
be reported to the Contracting Officer.
(End of clause)
■
Alternate I (July 2023)
When the contract will require Contractor
employees to have access to information
resources, add the following paragraphs:
(g) Before receiving access to information
resources under this contract, the individual
must complete a security briefing; additional
training for specific categories of CUI, if
identified in the contract; and any
nondisclosure agreement furnished by DHS.
The Contracting Officer’s Representative
(COR) will arrange the security briefing and
any additional training required for specific
categories of CUI.
PO 00000
Frm 00041
Fmt 4701
Sfmt 4700
(End of clause)
Alternate II (June 2006)
*
*
*
*
*
(End of clause)
*
*
*
*
*
7. Add section 3052.204–72 to read as
follows:
3052.204–72 Safeguarding of Controlled
Unclassified Information.
As prescribed in (HSAR) 48 CFR
3004.470–4(b), insert the following
clause:
Safeguarding of Controlled Unclassified
Information (July 2023)
(a) Definitions. As used in this clause—
Adequate Security means security
protections commensurate with the risk
resulting from the unauthorized access, use,
disclosure, disruption, modification, or
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
40600
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
destruction of information. This includes
ensuring that information hosted on behalf of
an agency and information systems and
applications used by the agency operate
effectively and provide appropriate
confidentiality, integrity, and availability
protections through the application of costeffective security controls.
Controlled Unclassified Information (CUI)
is any information the Government creates or
possesses, or an entity creates or possesses
for or on behalf of the Government (other
than classified information) that a law,
regulation, or Governmentwide policy
requires or permits an agency to handle using
safeguarding or dissemination controls. This
definition includes the following CUI
categories and subcategories of information:
(1) Chemical-terrorism Vulnerability
Information (CVI) as defined in 6 CFR part
27, ‘‘Chemical Facility Anti-Terrorism
Standards,’’ and as further described in
supplementary guidance issued by an
authorized official of the Department of
Homeland Security (including the Revised
Procedural Manual ‘‘Safeguarding
Information Designated as ChemicalTerrorism Vulnerability Information’’ dated
September 2008);
(2) Protected Critical Infrastructure
Information (PCII) as set out in the Critical
Infrastructure Information Act of 2002 (title
XXII, subtitle B of the Homeland Security Act
of 2002 as amended through Public Law 116–
283), PCII’s implementing regulations (6 CFR
part 29), the PCII Program Procedures
Manual, and any supplementary guidance
officially communicated by an authorized
official of the Department of Homeland
Security, the PCII Program Manager, or a PCII
Program Manager Designee;
(3) Sensitive Security Information (SSI) as
defined in 49 CFR part 1520, ‘‘Protection of
Sensitive Security Information,’’ as amended,
and any supplementary guidance officially
communicated by an authorized official of
the Department of Homeland Security
(including the Assistant Secretary for the
Transportation Security Administration or
designee), including Department of
Homeland Security MD 11056.1, ‘‘Sensitive
Security Information (SSI)’’ and, within the
Transportation Security Administration, TSA
MD 2810.1, ‘‘SSI Program’’;
(4) Homeland Security Agreement
Information means information the
Department of Homeland Security receives
pursuant to an agreement with State, local,
Tribal, territorial, or private sector partners
that is required to be protected by that
agreement. The Department receives this
information in furtherance of the missions of
the Department, including, but not limited to,
support of the Fusion Center Initiative and
activities for cyber information sharing
consistent with the Cybersecurity
Information Sharing Act of 2015;
(5) Homeland Security Enforcement
Information means unclassified information
of a sensitive nature lawfully created,
possessed, or transmitted by the Department
of Homeland Security in furtherance of its
immigration, customs, and other civil and
criminal enforcement missions, the
unauthorized disclosure of which could
adversely impact the mission of the
Department;
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
(6) International Agreement Information
means information the Department of
Homeland Security receives that is required
to be protected by an information sharing
agreement or arrangement with a foreign
government, an international organization of
governments or any element thereof, an
international or foreign public or judicial
body, or an international or foreign private or
non-governmental organization;
(7) Information Systems Vulnerability
Information (ISVI) means:
(i) Department of Homeland Security
information technology (IT) systems data
revealing infrastructure used for servers,
desktops, and networks; applications name,
version, and release; switching, router, and
gateway information; interconnections and
access methods; and mission or business use/
need. Examples of ISVI are systems
inventories and enterprise architecture
models. Information pertaining to national
security systems and eligible for
classification under Executive Order 13526
will be classified as appropriate; and/or
(ii) Information regarding developing or
current technology, the release of which
could hinder the objectives of the
Department, compromise a technological
advantage or countermeasure, cause a denial
of service, or provide an adversary with
sufficient information to clone, counterfeit,
or circumvent a process or system;
(8) Operations Security Information means
Department of Homeland Security
information that could be collected,
analyzed, and exploited by a foreign
adversary to identify intentions, capabilities,
operations, and vulnerabilities that threaten
operational security for the missions of the
Department;
(9) Personnel Security Information means
information that could result in physical risk
to Department of Homeland Security
personnel or other individuals whom the
Department is responsible for protecting;
(10) Physical Security Information means
reviews or reports illustrating or disclosing
facility infrastructure or security
vulnerabilities related to the protection of
Federal buildings, grounds, or property. For
example, threat assessments, system security
plans, contingency plans, risk management
plans, business impact analysis studies, and
certification and accreditation
documentation;
(11) Privacy Information includes both
Personally Identifiable Information (PII) and
Sensitive Personally Identifiable Information
(SPII). PII refers to information that can be
used to distinguish or trace an individual’s
identity, either alone, or when combined
with other information that is linked or
linkable to a specific individual; and SPII is
a subset of PII that if lost, compromised, or
disclosed without authorization could result
in substantial harm, embarrassment,
inconvenience, or unfairness to an
individual. To determine whether
information is PII, the DHS will perform an
assessment of the specific risk that an
individual can be identified using the
information with other information that is
linked or linkable to the individual. In
performing this assessment, it is important to
recognize that information that is not PII can
PO 00000
Frm 00042
Fmt 4701
Sfmt 4700
become PII whenever additional information
becomes available, in any medium or from
any source, that would make it possible to
identify an individual. Certain data elements
are particularly sensitive and may alone
present an increased risk of harm to the
individual.
(i) Examples of stand-alone PII that are
particularly sensitive include: Social Security
numbers (SSNs), driver’s license or State
identification numbers, Alien Registration
Numbers (A-numbers), financial account
numbers, and biometric identifiers.
(ii) Multiple pieces of information may
present an increased risk of harm to the
individual when combined, posing an
increased risk of harm to the individual. SPII
may also consist of any grouping of
information that contains an individual’s
name or other unique identifier plus one or
more of the following elements:
(A) Truncated SSN (such as last 4 digits);
(B) Date of birth (month, day, and year);
(C) Citizenship or immigration status;
(D) Ethnic or religious affiliation;
(E) Sexual orientation;
(F) Criminal history;
(G) Medical information; and
(H) System authentication information,
such as mother’s birth name, account
passwords, or personal identification
numbers (PINs).
(iii) Other PII that may present an
increased risk of harm to the individual
depending on its context, such as a list of
employees and their performance ratings or
an unlisted home address or phone number.
The context includes the purpose for which
the PII was collected, maintained, and used.
This assessment is critical because the same
information in different contexts can reveal
additional information about the impacted
individual.
Federal information means information
created, collected, processed, maintained,
disseminated, disclosed, or disposed of by or
for the Federal Government, in any medium
or form.
Federal information system means an
information system used or operated by an
agency or by a Contractor of an agency or by
another organization on behalf of an agency.
Handling means any use of controlled
unclassified information, including but not
limited to marking, safeguarding,
transporting, disseminating, re-using, storing,
capturing, and disposing of the information.
Incident means an occurrence that—
(1) Actually or imminently jeopardizes,
without lawful authority, the integrity,
confidentiality, or availability of information
or an information system; or
(2) Constitutes a violation or imminent
threat of violation of law, security policies,
security procedures, or acceptable use
policies.
Information Resources means information
and related resources, such as personnel,
equipment, funds, and information
technology.
Information Security means protecting
information and information systems from
unauthorized access, use, disclosure,
disruption, modification, or destruction in
order to provide—
(1) Integrity, which means guarding against
improper information modification or
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
destruction, and includes ensuring
information nonrepudiation and authenticity;
(2) Confidentiality, which means
preserving authorized restrictions on access
and disclosure, including means for
protecting personal privacy and proprietary
information; and
(3) Availability, which means ensuring
timely and reliable access to and use of
information.
Information System means a discrete set of
information resources organized for the
collection, processing, maintenance, use,
sharing, dissemination, or disposition of
information.
(b) Handling of Controlled Unclassified
Information. (1) Contractors and
subcontractors must provide adequate
security to protect CUI from unauthorized
access and disclosure. Adequate security
includes compliance with DHS policies and
procedures in effect at the time of contract
award. These policies and procedures are
accessible at https://www.dhs.gov/dhssecurity-and-training-requirementscontractors.
(2) The Contractor shall not use or
redistribute any CUI handled, collected,
processed, stored, or transmitted by the
Contractor except as specified in the contract.
(3) The Contractor shall not maintain SPII
in its invoicing, billing, and other
recordkeeping systems maintained to support
financial or other administrative functions. It
is acceptable to maintain in these systems the
names, titles, and contact information for the
Contracting Officer’s Representative (COR) or
other government personnel associated with
the administration of the contract, as needed.
(4) Any government data provided,
developed, or obtained under the contract, or
otherwise under the control of the
Contractor, shall not become part of the
bankruptcy estate in the event a Contractor
and/or subcontractor enters bankruptcy
proceedings.
(c) Incident Reporting Requirements.
(1) Contractors and subcontractors shall
report all known or suspected incidents to
the Component Security Operations Center
(SOC) in accordance with Attachment F,
Incident Response, to DHS Policy Directive
4300A Information Technology System
Security Program, Sensitive Systems. If the
Component SOC is not available, the
Contractor shall report to the DHS Enterprise
SOC. Contact information for the DHS
Enterprise SOC is accessible at https://
www.dhs.gov/dhs-security-and-trainingrequirements-contractors. Subcontractors are
required to notify the prime Contractor that
it has reported a known or suspected
incident to the Department. Lower tier
subcontractors are required to likewise notify
their higher tier subcontractor, until the
prime contractor is reached. The Contractor
shall also notify the Contracting Officer and
COR using the contact information identified
in the contract. If the report is made by
phone, or the email address for the
Contracting Officer or COR is not
immediately available, the Contractor shall
contact the Contracting Officer and COR
immediately after reporting to the
Component or DHS Enterprise SOC.
(2) All known or suspected incidents
involving PII or SPII shall be reported within
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
1 hour of discovery. All other incidents shall
be reported within 8 hours of discovery.
(3) CUI transmitted via email shall be
protected by encryption or transmitted
within secure communications systems. CUI
shall be transmitted using a FIPS 140–2/140–
3 Security Requirements for Cryptographic
Modules validated cryptographic module
identified on https://csrc.nist.gov/projects/
cryptographic-module-validation-program/
validated-modules. When this is impractical
or unavailable, for Federal information
systems only, CUI may be transmitted over
regular email channels. When using regular
email channels, Contractors and
subcontractors shall not include any CUI in
the subject or body of any email. The CUI
shall be included as a password-protected
attachment with the password provided
under separate cover, including as a separate
email. Recipients of CUI information will
comply with any email restrictions imposed
by the originator.
(4) An incident shall not, by itself, be
interpreted as evidence that the Contractor or
Subcontractor has failed to provide adequate
information security safeguards for CUI or
has otherwise failed to meet the requirements
of the contract.
(5) If an incident involves PII or SPII, in
addition to the incident reporting guidelines
in Attachment F, Incident Response, to DHS
Policy Directive 4300A Information
Technology System Security Program,
Sensitive Systems, Contractors shall also
provide as many of the following data
elements that are available at the time the
incident is reported, with any remaining data
elements provided within 24 hours of
submission of the initial incident report:
(i) Unique Entity Identifier (UEI);
(ii) Contract numbers affected unless all
contracts by the company are affected;
(iii) Facility CAGE code if the location of
the event is different than the prime
Contractor location;
(iv) Point of contact (POC) if different than
the POC recorded in the System for Award
Management (address, position, telephone,
and email);
(v) Contracting Officer POC (address,
telephone, and email);
(vi) Contract clearance level;
(vii) Name of subcontractor and CAGE
code if this was an incident on a
subcontractor network;
(viii) Government programs, platforms, or
systems involved;
(ix) Location(s) of incident;
(x) Date and time the incident was
discovered;
(xi) Server names where CUI resided at the
time of the incident, both at the Contractor
and subcontractor level;
(xii) Description of the government PII or
SPII contained within the system; and
(xiii) Any additional information relevant
to the incident.
(d) Incident Response Requirements.
(1) All determinations by the Department
related to incidents, including response
activities, will be made in writing by the
Contracting Officer.
(2) The Contractor shall provide full access
and cooperation for all activities determined
by the Government to be required to ensure
PO 00000
Frm 00043
Fmt 4701
Sfmt 4700
40601
an effective incident response, including
providing all requested images, log files, and
event information to facilitate rapid
resolution of incidents.
(3) Incident response activities determined
to be required by the Government may
include, but are not limited to, the following:
(i) Inspections;
(ii) Investigations;
(iii) Forensic reviews;
(iv) Data analyses and processing; and
(v) Revocation of the Authority to Operate
(ATO), if applicable.
(4) The Contractor shall immediately
preserve and protect images of known
affected information systems and all
available monitoring/packet capture data.
The monitoring/packet capture data shall be
retained for at least 180 days from
submission of the incident report to allow
DHS to request the media or decline interest.
(5) The Government, at its sole discretion,
may obtain assistance from other Federal
agencies and/or third-party firms to aid in
incident response activities.
(e) Certificate of Sanitization of
Government and Government-ActivityRelated Files and Information. Upon the
conclusion of the contract by expiration,
termination, cancellation, or as otherwise
indicated in the contract, the Contractor shall
return all CUI to DHS and/or destroy it
physically and/or logically as identified in
the contract unless the contract states that
return and/or destruction of CUI is not
required. Destruction shall conform to the
guidelines for media sanitization contained
in NIST SP 800–88, Guidelines for Media
Sanitization. The Contractor shall certify and
confirm the sanitization of all government
and government-activity related files and
information. The Contractor shall submit the
certification to the COR and Contracting
Officer following the template provided in
NIST SP 800–88, Guidelines for Media
Sanitization, Appendix G.
(f) Other Reporting Requirements. Incident
reporting required by this clause in no way
rescinds the Contractor’s responsibility for
other incident reporting pertaining to its
unclassified information systems under other
clauses that may apply to its contract(s), or
as a result of other applicable statutory or
regulatory requirements, or other U.S.
Government requirements.
(g) Subcontracts. The Contractor shall
insert this clause in all subcontracts and
require subcontractors to include this clause
in all lower tier subcontracts when
subcontractor employees will have access to
CUI; CUI will be collected or maintained on
behalf of the agency by a subcontractor; or a
subcontractor information system(s) will be
used to process, store, or transmit CUI.
(End of clause)
Alternate I (July 2023)
When Federal information systems, which
include Contractor information systems
operated on behalf of the agency, are used to
collect, process, store, or transmit CUI, add
the following paragraphs:
(h) Authority to Operate. The Contractor
shall not collect, process, store, or transmit
CUI within a Federal information system
until an ATO has been granted by the
E:\FR\FM\21JNR3.SGM
21JNR3
lotter on DSK11XQN23PROD with RULES3
40602
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
Component or Headquarters CIO, or
designee. Once the ATO has been granted by
the Government, the Contracting Officer shall
incorporate the ATO into the contract as a
compliance document. Unless otherwise
specified in the ATO letter, the ATO is valid
for 3 years. An ATO is granted at the sole
discretion of the Government and can be
revoked at any time. Contractor receipt of an
ATO does not create any contractual right of
access or entitlement. The Government’s
grant of an ATO does not alleviate the
Contractor’s responsibility to ensure the
information system controls are implemented
and operating effectively.
(1) Complete the Security Authorization
process. The Security Authorization (SA)
process shall proceed according to DHS
Policy Directive 4300A Information
Technology System Security Program,
Sensitive Systems (Version 13.3, February 13,
2023), or any successor publication; and the
Security Authorization Process Guide,
including templates. These policies and
templates are accessible at https://
www.dhs.gov/dhs-security-and-trainingrequirements-contractors.
(i) Security Authorization Package. The SA
package shall be developed using the
government-provided Security Requirements
Traceability Matrix and SA templates. The
SA package consists of the following:
Security Plan, Contingency Plan,
Contingency Plan Test Results, Configuration
Management Plan, Security Assessment Plan,
Security Assessment Report, and
Authorization to Operate Letter. Additional
documents that may be required include a
Plan(s) of Action and Milestones and
Interconnection Security Agreement(s). The
Contractor shall submit a signed copy of the
SA package, validated by an independent
third party, to the COR for review and
approval by the Component or Headquarters
CIO, or designee, at least 30 days prior to the
date of operation of the information system.
The Government is the final authority on the
compliance of the SA package and may limit
the number of resubmissions of modified
documents.
(ii) Independent Assessment. Contractors
shall have an independent third party
validate the security and privacy controls in
place for the information system(s). The
independent third party shall review and
analyze the SA package, and report on
technical, operational, and management level
deficiencies as outlined in NIST SP 800–53,
Security and Privacy Controls for Information
Systems and Organizations, or successor
publication, accessible at https://csrc.nist.
gov/publications/sp. The Contractor shall
address all deficiencies before submitting the
SA package to the COR for review.
(2) Renewal of ATO. Unless otherwise
specified in the ATO letter, the Contractor
shall renew the ATO every 3 years. The
Contractor is required to update its SA
package as part of the ATO renewal process
for review and verification of security
controls. Review and verification of security
controls is independent of the system
production date and may include onsite
visits that involve physical or logical
inspection of the Contractor environment to
ensure controls are in place. The updated SA
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
package shall be submitted for review and
approval by the Component or Headquarters
CIO, or designee, at least 90 days before the
ATO expiration date. The Contractor shall
update its SA package by one of the
following methods:
(i) Updating the SA package in the DHS
Information Assurance Compliance System;
or
(ii) Submitting the updated SA package
directly to the COR.
(3) Security Review. The Government may
elect to conduct periodic reviews to ensure
that the security requirements contained in
the contract are being implemented and
enforced. The Government, at its sole
discretion, may obtain assistance from other
Federal agencies and/or third-party firms to
aid in security review activities. The
Contractor shall afford DHS, the Office of the
Inspector General, other government
organizations, and Contractors working in
support of the Government access to the
Contractor’s facilities, installations,
operations, documentation, databases,
networks, systems, and personnel used in the
performance of this contract. The Contractor
shall, through the Contracting Officer and
COR, contact the Component or Headquarters
CIO, or designee, to coordinate and
participate in review and inspection activity
by government organizations external to
DHS. Access shall be provided, to the extent
necessary as determined by the Government
(including providing all requested images),
for the Government to carry out a program of
inspection, investigation, and audit to
safeguard against threats and hazards to the
integrity, availability, and confidentiality of
government data or the function of computer
systems used in performance of this contract
and to preserve evidence of computer crime.
(4) Federal Reporting and Continuous
Monitoring Requirements. Contractors
operating information systems on behalf of
the Government shall comply with Federal
reporting and information system continuous
monitoring requirements. Reporting
requirements are determined by the
Government and are defined in the Fiscal
Year 2015 DHS Information Security
Performance Plan, or successor publication,
accessible at https://www.dhs.gov/dhssecurity-and-training-requirementscontractors. The plan is updated on an
annual basis. Annual, quarterly, and monthly
data collection will be coordinated by the
Government. The Contractor shall provide
the Government with all information to fully
satisfy Federal reporting requirements for
information systems. The Contractor shall
provide the COR with requested information
within 3 business days of receipt of the
request. Unless otherwise specified in the
contract, monthly continuous monitoring
data shall be stored at the Contractor’s
location for a period not less than 1 year from
the date the data are created. The
Government may elect to perform
information system continuous monitoring
and IT security scanning of information
systems from government tools and
infrastructure.
PO 00000
Frm 00044
Fmt 4701
Sfmt 4700
(End of clause)
8. Add section 3052.204–73 to read as
follows:
■
3052.204–73 Notification and Credit
Monitoring Requirements for Personally
Identifiable Information Incidents.
As prescribed in (HSAR) 48 CFR
3004.470–4(c), insert the following
clause:
3052.204–73 Notification and Credit
Monitoring Requirements for Personally
Identifiable Information Incidents (July
2023)
(a) Definitions. Privacy Information
includes both Personally Identifiable
Information (PII) and Sensitive Personally
Identifiable Information (SPII). PII refers to
information that can be used to distinguish
or trace an individual’s identity, either alone,
or when combined with other information
that is linked or linkable to a specific
individual; and SPII is a subset of PII that if
lost, compromised, or disclosed without
authorization could result in substantial
harm, embarrassment, inconvenience, or
unfairness to an individual. To determine
whether information is PII, the DHS will
perform an assessment of the specific risk
that an individual can be identified using the
information with other information that is
linked or linkable to the individual. In
performing this assessment, it is important to
recognize that information that is not PII can
become PII whenever additional information
becomes available, in any medium or from
any source, that would make it possible to
identify an individual. Certain data elements
are particularly sensitive and may alone
present an increased risk of harm to the
individual.
(1) Examples of stand-alone PII that are
particularly sensitive include: Social Security
numbers (SSNs), driver’s license or State
identification numbers, Alien Registration
Numbers (A-numbers), financial account
numbers, and biometric identifiers.
(2) Multiple pieces of information may
present an increased risk of harm to the
individual when combined, posing an
increased risk of harm to the individual. SPII
may also consist of any grouping of
information that contains an individual’s
name or other unique identifier plus one or
more of the following elements:
(i) Truncated SSN (such as last 4 digits);
(ii) Date of birth (month, day, and year);
(iii) Citizenship or immigration status;
(iv) Ethnic or religious affiliation;
(v) Sexual orientation;
(vi) Criminal history;
(vii) Medical information; and
(viii) System authentication information,
such as mother’s birth name, account
passwords, or personal identification
numbers (PINs).
(3) Other PII that may present an increased
risk of harm to the individual depending on
its context, such as a list of employees and
their performance ratings or an unlisted
home address or phone number. The context
includes the purpose for which the PII was
collected, maintained, and used. This
assessment is critical because the same
E:\FR\FM\21JNR3.SGM
21JNR3
Federal Register / Vol. 88, No. 118 / Wednesday, June 21, 2023 / Rules and Regulations
lotter on DSK11XQN23PROD with RULES3
information in different contexts can reveal
additional information about the impacted
individual.
(b) PII and SPII Notification Requirements.
(1) No later than 5 business days after being
directed by the Contracting Officer, or as
otherwise required by applicable law, the
Contractor shall notify any individual whose
PII or SPII was either under the control of the
Contractor or resided in an information
system under control of the Contractor at the
time the incident occurred. The method and
content of any notification by the Contractor
shall be coordinated with, and subject to
prior written approval by, the Contracting
Officer. The Contractor shall not proceed
with notification unless directed in writing
by the Contracting Officer.
(2) All determinations by the Department
related to notifications to affected individuals
and/or Federal agencies and related services
(e.g., credit monitoring) will be made in
writing by the Contracting Officer.
(3) Subject to government analysis of the
incident and direction to the Contractor
regarding any resulting notification, the
notification method may consist of letters to
affected individuals sent by first-class mail,
electronic means, or general public notice, as
approved by the Government. Notification
may require the Contractor’s use of address
verification and/or address location services.
At a minimum, the notification shall include:
(i) A brief description of the incident;
(ii) A description of the types of PII or SPII
involved;
(iii) A statement as to whether the PII or
SPII was encrypted or protected by other
means;
(iv) Steps individuals may take to protect
themselves;
(v) What the Contractor and/or the
Government are doing to investigate the
incident, mitigate the incident, and protect
against any future incidents; and
(vi) Information identifying who
individuals may contact for additional
information.
VerDate Sep<11>2014
20:57 Jun 20, 2023
Jkt 259001
(c) Credit Monitoring Requirements. The
Contracting Officer may direct the Contractor
to:
(1) Provide notification to affected
individuals as described in paragraph (b).
(2) Provide credit monitoring services to
individuals whose PII or SPII was under the
control of the Contractor or resided in the
information system at the time of the
incident for a period beginning the date of
the incident and extending not less than 18
months from the date the individual is
notified. Credit monitoring services shall be
provided from a company with which the
Contractor has no affiliation. At a minimum,
credit monitoring services shall include:
(i) Triple credit bureau monitoring;
(ii) Daily customer service;
(iii) Alerts provided to the individual for
changes and fraud; and
(iv) Assistance to the individual with
enrollment in the services and the use of
fraud alerts.
(3) Establish a dedicated call center. Call
center services shall include:
(i) A dedicated telephone number to
contact customer service within a fixed
period;
(ii) Information necessary for registrants/
enrollees to access credit reports and credit
scores;
(iii) Weekly reports on call center volume,
issue escalation (i.e., those calls that cannot
be handled by call center staff and must be
resolved by call center management or DHS,
as appropriate), and other key metrics;
(iv) Escalation of calls that cannot be
handled by call center staff to call center
management or DHS, as appropriate;
(v) Customized Frequently Asked
Questions, approved in writing by the
Contracting Officer in coordination with the
Component or Headquarters Privacy Officer;
and
(vi) Information for registrants to contact
customer service representatives and fraud
resolution representatives for credit
monitoring assistance.
PO 00000
Frm 00045
Fmt 4701
Sfmt 9990
40603
(End of clause)
9. In section 3052.212–70 amend
paragraph (b) of the clause by:
■ a. Removing ‘‘l3052.204–70, Security
Requirements for Unclassified
Information Technology Resources’’
■ b. Revising the entry for 3052.204–71,
Contractor Employee Access, and
■ c. Adding 3052.204–72, Safeguarding
of Controlled Unclassified Information
and 3052.204–73, Notification and
Credit Monitoring Requirements for
Personally Identifiable Information
Incidents.
The revision reads as follows:
■
3052.212–70 Contract terms and
conditions applicable to DHS acquisition of
commercial items.
Contract Terms and Conditions Applicable
to DHS Acquisition of Commercial Items
(July 2023)
*
*
*
*
*
(b) * * *
ll3052.204–71 Contractor Employee
Access.
llAlternate I
llAlternate II
ll3052.204–72 Safeguarding of
Controlled Unclassified Information.
ll3052.204–73 Notification and Credit
Monitoring Requirements for Personally
Identifiable Information Incidents.
*
*
*
*
*
Paul Courtney,
Chief Procurement Officer, Department of
Homeland Security.
[FR Doc. 2023–11270 Filed 6–20–23; 8:45 am]
BILLING CODE 9110–9B–P
E:\FR\FM\21JNR3.SGM
21JNR3
Agencies
[Federal Register Volume 88, Number 118 (Wednesday, June 21, 2023)]
[Rules and Regulations]
[Pages 40560-40603]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-11270]
[[Page 40559]]
Vol. 88
Wednesday,
No. 118
June 21, 2023
Part V
Department of Homeland Security
-----------------------------------------------------------------------
48 CFR Parts 3001, 3002, 3004, et al.
Homeland Security Acquisition Regulation; Safeguarding of Controlled
Unclassified Information; Final Rule
Federal Register / Vol. 88 , No. 118 / Wednesday, June 21, 2023 /
Rules and Regulations
[[Page 40560]]
-----------------------------------------------------------------------
DEPARTMENT OF HOMELAND SECURITY
48 CFR Parts 3001, 3002, 3004 and 3052
[HSAR Case 2015-001; DHS Docket No. DHS-2017-0006]
RIN 1601-AA76
Homeland Security Acquisition Regulation; Safeguarding of
Controlled Unclassified Information
AGENCY: Office of the Chief Procurement Officer, Department of Homeland
Security (DHS).
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: DHS is issuing a final rule to amend the Homeland Security
Acquisition Regulation (HSAR) to modify a subpart, remove an existing
clause and reserve the clause number, update an existing clause, and
add two new contract clauses to address requirements for the
safeguarding of Controlled Unclassified Information (CUI). This final
rule implements security and privacy measures to safeguard CUI and
facilitate improved incident reporting to DHS. These measures are
necessary because of the urgent need to protect CUI and respond
appropriately when DHS contractors experience incidents with DHS
information.
DATES: This final rule is effective July 21, 2023.
FOR FURTHER INFORMATION CONTACT: Shaundra Ford, Procurement Analyst,
DHS, Office of the Chief Procurement Officer, Acquisition Policy and
Legislation, (202) 447-0056, or email [email protected]. When using
email, include HSAR Case 2015-001 in the subject line.
SUPPLEMENTARY INFORMATION:
Table of Contents
I. Executive Summary
A. Purpose of the Regulatory Action
B. Legal Authority
C. Costs and Benefits
II. Background
III. Discussion and Analysis
A. Significant Changes From Proposed Rule
B. Discussion of Public Comments and Responses
1. General
2. Alignment With FISMA, E.O. 13556 (Controlled Unclassified
Information), and Its Implementing Regulation at 32 CFR Part 2002
(Controlled Unclassified Information)
3. Applicability of NIST SP 800-171
4. ATO Requirements
5. CUI Registry
6. DHS Internal Policies and Procedures
7. Definitions
8. Reciprocity in Interagency Regulations and Information
Security Requirements
9. Incident Reporting and Response
10. Privacy Requirements
11. Sanitization of Government and Government-Activity-Related
Files and Information
12. Subcontractor Flow-Down Requirements
13. Requirements Applicable to Educational Institutions
14. Self-Deleting Requirements
15. Applicability to Service Contracts
16. Costs
IV. Statutory and Regulatory Requirements
A. Executive Orders 12866 and 13563
1. Outline of the Analysis
2. Summary of the Analysis
3. Subject-by-Subject Analysis
4. Summary
5. Regulatory Alternatives
B. Regulatory Flexibility Act
1. A Statement of the Need for, and Objectives of, the Rule
2. A Statement of the Significant Issues Raised by the Public
Comments in Response to the IRFA, a Statement of the Assessment of
the Agency of Such Issues, and a Statement of Any Changes Made to
the Proposed Rule as a Result of Such Comments
3. The Response of the Agency to Any Comments Filed by the Chief
Counsel for Advocacy of the SBA in Response to the Proposed Rule,
and a Detailed Statement of Any Change Made to the Proposed Rule as
a Result of the Comments
4. A Description of and an Estimate of the Number of Small
Entities to Which the Rule Will Apply or an Explanation of Why No
Such Estimate is Available
5. A Description of the Projected Reporting, Recordkeeping, and
Other Compliance Requirements of the Rule, Including an Estimate of
the Classes of Small Entities That Will Be Subject to the
Requirement and the Type of Professional Skills Necessary for
Preparation of the Report or Record
6. A Description of the Steps the Agency Has Taken To Minimize
the Significant Economic Impact on Small Entities Consistent With
the Stated Objectives of Applicable Statutes, Including a Statement
of the Factual, Policy, and Legal Reasons for Selecting the
Alternative Adopted in the Final Rule and Why Each of the Other
Significant Alternatives to the Rule Considered by the Agency That
Affects the Impact on Small Entities Was Rejected
C. Paperwork Reduction Act
Table of Abbreviations
ATO Authority to Operate
BAA Buy American Act
CAGE Commercial and Government Entity
CIO Chief Information Officer
COR Contracting Officer's Representative
CSO Chief Security Officer
CUI Controlled Unclassified Information
CVI chemical-terrorism vulnerability information
DHS Department of Homeland Security
DoD Department of Defense
EA Executive Agent
E.O. Executive Order
FAR Federal Acquisition Regulation
FedRAMP Federal Risk and Authorization Management Program
FIPS Federal Information Processing Standards
FISMA Federal Information Security Modernization Act of 2014
FPDS Federal Procurement Data System
FR Federal Register
FRFA final regulatory flexibility analysis
FTE full-time equivalent
FY Fiscal Year
GFE government-furnished equipment
GSA General Services Administration
HIPAA Health Insurance Portability and Accountability Act
HSAR Homeland Security Acquisition Regulation
IRFA initial regulatory flexibility analysis
ISAC Information Sharing and Analysis Center
ISAO Information Sharing and Analysis Organization
IT information technology
NAICS North American Industry Classification System
NARA National Archives and Records Administration
NIST National Institute of Standards and Technology
NPRM notice of proposed rulemaking
OIRA Office of Information and Regulatory Affairs
OMB Office of Management and Budget
PCII protected critical infrastructure information
PII Personally Identifiable Information
POA&M Plans of Action and Milestones
POC Point of Contact
PSC Product and Service Code
RFA Regulatory Flexibility Act of 1980, as amended by the Small
Business Regulatory Enforcement Fairness Act of 1996
SA Security Authorization
SBA Small Business Administration
SME subject-matter expert
SOC Security Operations Center
SP Special Publication
SPII Sensitive Personally Identifiable Information
SRTM Security Requirements Traceability Matrix
SSI Sensitive Security Information
TAA Trade Agreements Act
TSA Transportation Security Administration
UEI Unique Entity Identifier
US-CERT United States Computer Emergency Readiness Team
I. Executive Summary
A. Purpose of the Regulatory Action
The purpose of this final rule is to implement security and privacy
measures to safeguard CUI and facilitate improved incident reporting to
DHS. This final rule does not apply to classified information. These
measures are necessary because of the urgent need to protect CUI and
respond appropriately when DHS contractors experience incidents with
DHS information. Persistent and pervasive high-profile breaches of
Federal information continue to demonstrate the need to ensure that
information security protections are clearly, effectively, and
[[Page 40561]]
consistently addressed in contracts. This final rule strengthens and
expands existing HSAR language to ensure adequate security when: (1)
contractor and/or subcontractor employees will have access to CUI; (2)
CUI will be collected or maintained on behalf of the agency; or (3)
Federal information systems, which include contractor information
systems operated on behalf of the agency, are used to collect, process,
store, or transmit CUI. Specifically, the final rule:
Identifies CUI handling requirements and security
processes and procedures applicable to Federal information systems,
which include contractor information systems operated on behalf of the
agency;
Identifies incident reporting requirements, including
timelines and required data elements, inspection provisions, and post-
incident activities;
Requires certification of sanitization of government and
government-activity-related files and information; and
Requires contractors to have in place procedures and the
capability to notify and provide credit monitoring services to any
individual whose Personally Identifiable Information (PII) or Sensitive
PII (SPII) was under the control of the contractor or resided in the
information system at the time of the incident.
B. Legal Authority
This rule addresses the safeguarding requirements specified in the
Federal Information Security Modernization Act of 2014 (FISMA) (44
U.S.C. 3551, et seq.); Office of Management and Budget (OMB) Circular
A-130, Managing Information as a Strategic Resource; relevant National
Institute of Standards and Technology (NIST) guidance; Executive Order
(E.O.) 13556, Controlled Unclassified Information (75 FR 68675, Nov. 9,
2010), and its implementing regulation at 32 CFR part 2002; and the
following OMB memoranda: M-17-12, Preparing for and Responding to a
Breach of Personally Identifiable Information; M-14-03, Enhancing the
Security of Federal Information and Information Systems; and Reporting
Instructions for FISMA and Agency Privacy Management as identified in
various OMB memoranda.
C. Costs and Benefits
The final rule will apply to DHS contractors that require access to
CUI, collect or maintain CUI on behalf of the Government, or operate
Federal information systems, which include contractor information
systems operating on behalf of the agency, that collect, process,
store, or transmit CUI. DHS estimates the final rule will have an
annualized cost that ranges from $15.32 million to $17.28 million at a
discount rate of 7 percent and a total 10-year cost that ranges from
$107.62 million to $121.37 million at a discount rate of 7 percent. The
primary contributors to these costs are the independent assessment
requirement and reporting and recordkeeping requirements. There are
additional small, quantified costs from rule familiarization and
security review processes. DHS was unable to quantify costs associated
with incident reporting requirements, PII and SPII notification
requirements, credit monitoring requirements and they are therefore
discussed qualitatively. DHS was unable to quantify the cost savings or
benefits associated with the rule. However, the final rule is expected
to produce cost savings by reducing the time required to grant an ATO,
reducing DHS time reviewing and reissuing proposals because contractors
are better qualified, and reducing the time to identify a data breach.
The final rule also produces benefits by better notifying the public
when their data are compromised, requiring the provision of credit
monitoring services so that the public can better monitor and avoid
costly consequences of data breaches, and reducing the severity of
incidents through timely incident reporting.
II. Background
DHS published a notice of proposed rulemaking (NPRM) in the Federal
Register at 82 FR 6429 on January 19, 2017, to implement adequate
security and privacy measures to safeguard CUI from unauthorized access
and disclosure and facilitate improved incident reporting to DHS.
Fourteen respondents submitted public comments in response to the
proposed rule. This final rule incorporates the reasoning of the
proposed rule except as reflected elsewhere in this preamble.
III. Discussion and Analysis
DHS reviewed the public comments in the development of the final
rule. A certain number of the comments received were outside the scope
of the rule. A discussion of the comments within the scope of the rule
and the changes made to the rule as a result of those comments is
provided, as follows:
A. Significant Changes From Proposed Rule
1. HSAR 3052.204-71, Contractor Employee Access, is revised as
follows:
Revised paragraph (a) to remove the definition of
``sensitive information'' and replace it with the definition of
``CUI'';
Revised paragraph (b) to remove the definition of
``information technology resources'' and replace it with the definition
of ``information resources'';
Replaced all references to ``sensitive information'' with
``CUI'' and all references to ``information technology resources'' with
``information resources'';
Revised paragraph (e) to clarify that both initial and
refresher training concerning the protection and disclosure of CUI is
required;
Revised paragraph (g) of Alternate I to make clear that
additional training on certain CUI categories may be required if
identified in the contract; and
Replaced the reference to ``statement of work'' in
paragraph (h) of Alternate I with ``contract.''
2. Restructured clause 3052.204-7X, Safeguarding of Controlled
Unclassified Information, as follows:
Made the requirements of paragraph (c), Authority to
Operate, into Alternate I to the basic clause; and
Made the requirements of paragraphs (f), PII and SPII
Notification Requirements, and (g), Credit Monitoring Requirements,
into a separate clause at 3052.204-7Y, Notification and Credit
Monitoring Requirements for Personally Identifiable Information
Incidents. This includes clarifying updates to the PII and SPII
Notification Requirements section.
3. Revised requirements of restructured clause 3052.204-7X,
Safeguarding of Controlled Unclassified Information, as follows:
Made clear that both contractors and subcontractors are
responsible for reporting known or suspected incidents to the
Department;
Made clear that subcontractors are required to notify the
prime contractor that they have reported a known or suspected incident
to the Department;
Increased the amount of time a vendor must retain
monitoring/packet capture data from 90 days to 180 days; and
Revised the requirements for when prime contractors must
include clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information, in subcontracts.
4. Made clarifying edits to the definitions of the following terms:
Controlled Unclassified Information, Sensitive Security Information,
Homeland Security Agreement Information, Information Systems
Vulnerability Information, Personnel Security Information, Privacy
Information, and Sensitive Personally Identifiable Information.
[[Page 40562]]
5. Made additional amendments to paragraph (b) of clause 3052.212-
70 to add clause 3052.204-7Y, Notification and Credit Monitoring
Requirements for Personally Identifiable Information Incidents.
B. Discussion of Public Comments and Responses
1. General
Comment: Two comments requested that the Department withdraw the
proposed rule. One of the comments requested that DHS grant an
extension of the comment period if the rule was not going to be
withdrawn. The other comment stated that the rule was ill-considered
and was not properly coordinated with other agencies that follow and
support the principles in 32 CFR part 2002. The comment also stated the
rulemaking adds burdens to DHS and its contractors that differ from
what is required or expected by others and requested that DHS delay
implementation of the entire rule or suspend the rulemaking process
altogether pending further progress with the expected general Federal
Acquisition Regulation (FAR) CUI rule.\1\
---------------------------------------------------------------------------
\1\ Rulemaking to implement the National Archives and Records
Administration (NARA) CUI program (see E.O. 13556 and 32 CFR part
2002).
---------------------------------------------------------------------------
Response: Given the nature of this rule, and the prevalent and
persistent nature of cyber-attacks impacting both public and private
networks, DHS declines the respondents' request to withdraw this rule.
Failure to proceed with this rule places at risk both the Department's
CUI and the information systems where CUI resides, which would be in
contravention to the Department's mission and to the public interest.
In addition, DHS will neither delay nor suspend this rulemaking pending
progress on the FAR CUI rule. A 30-day extension of the comment period
from March 20, 2017, to April 19, 2017, was granted. Additionally, DHS
conducted extensive interagency coordination while developing this
rule, including coordination with NARA. Also, the FAR CUI rule does not
eliminate the need for DHS to proceed with this rulemaking. DHS is a
participant on the FAR team responsible for drafting the FAR language
that will implement the CUI Program and has determined that the
issuance of a FAR CUI rule does not eliminate the need for DHS to
identify its agency-specific requirements for CUI and the methodology
it uses to ensure that Federal information systems, which includes
contractor information systems operated on behalf of the agency, that
collect, process, store, or transmit CUI are adequately protected.
Also, DHS does not agree that this rulemaking adds burdens to DHS and
its contractors that differ substantively from what is required or
expected by other agencies as the requirements for Federal information
systems are largely based in statute, i.e., FISMA (44 U.S.C. 3551, et
seq.), and implementing policies promulgated by OMB and NIST. Agency
specific requirements such as an independent assessment and security
review are not in conflict with these requirements. They are at the
discretion of the agency, considered industry best practices, and are
actually becoming more pervasive Governmentwide. Notwithstanding this,
DHS has determined that information security is of paramount importance
and is prepared to accept the cost impacts stemming from vendor
compliance with these requirements.
Comment: One respondent stated that the rule does not clearly
articulate how requirements would be applied to professional service
providers, what safeguards they would be obligated to provide, or how
they would be assessed by DHS.
Response: Clause 3052.204-7X, Safeguarding of Controlled
Unclassified Information, clearly identifies the requirements
applicable to contractors that access or develop CUI under DHS
contracts, as well as the information security requirements applicable
to Federal information systems, which include contractor information
systems operated on behalf of the agency. The applicability of these
requirements does not change depending on the type of contractor. As
such, there is no need to identify requirements applicable to the
subset of contractors that fall within the professional services
community.
Comment: One respondent proposed that DHS use a server that
requires verification from a higher ranking official so that the
information does not enter the wrong hands, such as an extremist group.
The respondent also recommended that there should be logins for each
official that could be listed on public servers, as long as the server
was American, and that citizens trying to access the information should
pass a background check to make sure they are not a threat.
Response: The commenter has oversimplified the process by which DHS
should ensure CUI is adequately protected, and DHS has made no
corresponding changes to the rule. While DHS and its contractors
routinely use servers, logins, and passwords to control access on
networks and information systems, this is only a subset of the actions
required to ensure CUI and the information systems where CUI resides
are adequately protected. Making login information publicly available
is a violation of information security policy. Also, limiting servers
used by the Department and its contractors to those manufactured only
in the United States does not ensure the security of the server and
violates statutory requirements that govern Federal procurements. DHS,
like other Departments and agencies, adheres to FAR part 25, Foreign
Acquisition, when purchasing supplies. FAR part 25 details the
application of the Buy American Act (BAA) and the Trade Agreements Act
(TAA), including the dollar thresholds at which the TAA supersedes the
BAA and nondomestic trading partners receive equal treatment with
domestic sources. Additionally, the Department already has in place
background investigation requirements for Federal employees and
contractors that have access to CUI. Where the Department has
determined access to CUI must be limited to U.S. citizens and lawful
permanent residents, DHS policies and regulations already reflect those
requirements.
Comment: One respondent stated that the proposed rule is very
important considering how open information is in this day and age,
adding that this rule will help secure important information about the
U.S. Government.
Response: DHS agrees that this rule is important and that its
requirements will help ensure the security of important government
information.
Comment: One respondent stated that small businesses should be
concerned by this rule, citing that DHS acknowledged that the rule is a
``significant'' regulatory action that will impact small business. The
respondent stated that there is nothing specific in the rule to assure
the small business community that it will be able to comply.
Response: This rule is a ``significant'' regulatory action that
will have an impact on small business; however, this comment implies
that all small businesses will be impacted equally, which is not the
case. Small businesses that routinely provide services to the
Government that rely on Federal information systems, which include
contractor information systems operated on behalf of an agency, already
are positioned to implement these requirements and always have been
required to do so under DHS contracts. Information security and
information security requirements applicable to Federal information
systems are not based on the size of a particular business but rather
on the sensitivity of
[[Page 40563]]
the information and the impact(s) of unauthorized access to such
information. Applying a lesser standard because a business voluntarily
operating in this space is considered small would be untenable and in
contravention to the mission of the Department. Additionally, it is
important to note that DHS's commitment to small business participation
is unparalleled, as evidenced by the Department's 12 consecutive
ratings of ``A'' or higher on the Small Business Administration's (SBA)
Small Business Procurement Scorecard (see https://www.sba.gov/document/support-department-homeland-security-contracting-scorecard). The
Department expressed in the proposed rule its interest in receiving
comments from small business concerns related to this rule and has
thoroughly considered and adjudicated all comments received.
Comment: One respondent stated that guidance on DHS CUI
requirements for cleared facilities should be consistent with
Department of Defense (DoD) cleared facility requirements.
Response: The protection of classified information at contractor
locations, whether cleared by DoD or another government agency, is
outside the scope of this regulation. CUI is protected according to the
underlying law, regulation, or Governmentwide policy. DHS does not have
the broad authority to waive CUI safeguarding or dissemination
requirements that differ from those of classified information.
Comment: One respondent questioned if the proposed rule covers
sharing of information on software vulnerabilities with Information
Sharing and Analysis Organizations (ISAOs) or Information Sharing and
Analysis Centers (ISACs). The respondent also questioned if the ISAOs
or ISACs require flow-down of the clauses to ensure that their members
provide adequate protection in accordance with the DHS proposed rule.
The respondent stated such a requirement would impose a significant
barrier for private sector entities to participate in information
sharing.
Response: DHS shares information with ISAOs and ISACs through
information sharing agreements between the Government and the ISAO/
ISAC, not through contracts. Generally, information sharing agreements
do not include the clauses.
2. Alignment With FISMA, E.O. 13556 (Controlled Unclassified
Information), and Its Implementing Regulation at 32 CFR Part 2002
(Controlled Unclassified Information)
Comment: Several respondents stated that the proposed rule is not
consistent with FISMA, E.O. 13356, and 32 CFR part 2002.
Response: (a) Alignment with FISMA: The rule is fully consistent
with FISMA. FISMA and its predecessor, the Federal Information Security
Management Act of 2002, require that agency heads provide ``information
security protections commensurate with the risk and magnitude of the
harm resulting from unauthorized access, use, disclosure, disruption,
modification, or destruction of--(i) information collected or
maintained by or on behalf of the agency; and (ii) information systems
used or operated by an agency or by a contractor of an agency or other
organization on behalf of an agency . . . .'' See, e.g., 44 U.S.C.
3554(a)(1)(A). The rule is consistent with these requirements by
requiring that information collected or maintained on behalf of the
Department and information systems used or operated by an agency or by
a contractor of an agency or other organization on behalf of an agency
are adequately protected. The rule does this in two ways by
identifying: (1) requirements and DHS policies and procedures for
handling and protecting CUI collected and maintained on behalf of the
Department; and (2) security requirements and procedures for
information systems used or operated by a contractor on behalf of an
agency.
(b) Alignment with E.O. 13556 and 32 CFR part 2002: The rule is
fully consistent with E.O. 13556 and 32 CFR part 2002 (81 FR 63324,
Sept. 14, 2016). The NARA CUI rule requires Departments and agencies to
develop internal policies and procedures to implement the requirements
of the CUI Program.\2\ These policies and procedures are subject to
review and approval by the CUI Executive Agent (EA) before they are
finalized. In addition, the NARA CUI rule establishes baseline
information security requirements necessary to protect CUI Basic \3\ on
nonfederal information systems by mandating the use of NIST Special
Publication (SP) 800-171, Protecting Controlled Unclassified
Information in Nonfederal Information Systems and Organizations, when
establishing security requirements to protect CUI's confidentiality on
nonfederal information systems. However, consistent with 32 CFR
2002.14(a)(3) and (g), ``[a]gencies may increase CUI Basic's
confidentiality impact level above moderate only internally, or by
means of agreements with agencies or non-executive branch entities
(including agreements for the operation of an information system on
behalf of the agencies).'' Relatedly, 32 CFR 2002.4(c) states that
agreements ``include, but are not limited to, contracts, grants,
licenses, certificates, memoranda of agreement/arrangement or
understanding, and information-sharing agreements or arrangements.''
Therefore, DHS can require a confidentiality impact level above
moderate through agreements with non-executive branch entities.
Nonetheless, the information system security requirements of this rule
are focused on those applicable to Federal information systems.
---------------------------------------------------------------------------
\2\ The NARA CUI rule is implemented at 32 CFR part 2002 (81 FR
63324). That regulation describes the executive branch's CUI Program
and establishes policy for designating, handling, and decontrolling
information that qualifies as CUI. The CUI Program standardizes the
way the executive branch handles information that requires
protection under laws, regulations, or Governmentwide policies but
that does not qualify as classified under E.O. 13526, Classified
National Security Information (Dec. 29, 2009), or any predecessor or
successor order, or the Atomic Energy Act of 1954 (42 U.S.C. 2011,
et seq.), as amended.
\3\ CUI Basic is the subset of CUI for which the authorizing
law, regulation, or Governmentwide policy does not set out specific
handling or dissemination controls. Agencies handle CUI Basic
according to the uniform set of controls set forth in 32 CFR part
2002 and the CUI Registry. CUI Basic controls apply whenever CUI
Specified ones do not cover the involved CUI. CUI Specified is the
subset of CUI in which the authorizing law, regulation, or
Governmentwide policy contains specific handling controls that it
requires or permits agencies to use that differ from those for CUI
Basic. The CUI Registry indicates which laws, regulations, and
Governmentwide policies include such specific requirements. CUI
Specified controls may be more stringent than, or may simply differ
from, those required by CUI Basic; the distinction is that the
underlying authority spells out specific controls for CUI Specified
information and does not for CUI Basic information. CUI Basic
controls apply to those aspects of CUI Specified where the
authorizing laws, regulations, and Governmentwide policies do not
provide specific guidance.
---------------------------------------------------------------------------
Comment: One respondent stated that the revisions to the HSAR must
be coordinated as part of the DHS implementation of the CUI Program,
per the milestones established by CUI Notice 2016-01, Implementation
Guidance for the Controlled Unclassified Information Program.
Response: CUI Notice 2016-01, Implementation Guidance for the
Controlled Unclassified Information Program, was superseded by CUI
Notice 2020-01, CUI Program Implementation Guidelines, issued May 14,
2020. Neither of the CUI Notices provide guidance on coordination of
rulemakings. Nonetheless, DHS conducted extensive interagency
coordination while developing this rule, including coordination with
NARA.
Comment: One respondent stated that the proposed rule federalizes
contractor systems that are not used in an
[[Page 40564]]
operational capacity on behalf of the Government.
Response: The rule does not federalize contractor systems that are
not used in an operational capacity on behalf of the Government.
Conversely, it recognizes that there are circumstances when contractor
information systems are operated on behalf of an agency. When this is
the case, the contractor information system is considered a Federal
information system and is subject to the same information system
security requirements required for Federal information systems. The
rule identifies the security requirements and processes such systems
must meet before they are able to operate on behalf of the agency.
These requirements are now provided as Alternate I to the basic clause.
The rulemaking does not identify any information system security
requirements or processes for information systems that are not
categorized as Federal information systems. The applicability of the
basic clause is not predicated on the type of information system, i.e.,
Federal or nonfederal. The basic clause is limited to definitions, DHS
CUI handling requirements, incident reporting and response
requirements, and sanitization requirements. These requirements exist
whenever CUI will be accessed or developed under a contract regardless
of the type of information system involved in contract performance.
This is the reason why the basic clause is more broadly applicable. DHS
was intentionally silent in this rule on the requirements applicable to
nonfederal information systems as that was never the purpose of this
rulemaking, and the FAR CUI rule is intended to address the
requirements for these information systems.
Comment: One respondent requested that DHS revise the scope of its
rule to clarify or remove the language related to accessing CUI.
Response: Contractors and subcontractors that have access to CUI
are responsible for ensuring the information is handled and safeguarded
appropriately and reporting any known or suspected incidents regarding
the information for which they have access. As such, DHS declines to
revise the scope of the rule to clarify or remove language related to
accessing CUI.
Comment: One respondent expressed concern that clause 3004.470-3
requires that ``CUI be safeguarded wherever such information resides,''
including on both ``contractor-owned and/or operated information
systems operating on behalf of the agency'' as well as ``any situation
where contractor and/or subcontractor employees may have access to
CUI.'' The respondent also expressed concern that contracting officers
are required to insert clause 3052.204-7X, Safeguarding of Controlled
Unclassified Information, in all solicitations and contracts where
contractor and/or subcontractor employees will have access to CUI and
that the clause requires contractors provide ``adequate security to
protect CUI,'' which ``includes compliance with DHS policies and
procedures in effect at the time of contract award. These policies and
procedures are accessible at https://www.dhs.gov/dhs-security-and-training-requirements-contractors.'' Another respondent similarly
stated that inclusion of these statements improperly subjects all
contractors and all contractor information systems to DHS agency-
specific standards.
Response: Some of the policies and procedures currently posted to
the DHS publicly facing website predate the CUI E.O. and the NARA CUI
rule. DHS, like many other Departments and agencies, is still in the
process of implementing the CUI Program. This process includes an
update to internal policies and procedures related to CUI. Once these
policies and procedures have been drafted and finalized, they will
replace the policies and procedures currently listed on the publicly
facing website. These policies and procedures are required to address
all elements of the CUI Program and extend beyond the protection of CUI
in information systems. For example, the new policies and procedures
also will address training, handling, transmission, marking
requirements, incident reporting, etc. The current DHS-specific
policies and procedures on the publicly facing website address these
requirements and the new policies and procedures will as well. As such,
compliance with these policies and procedures is mandatory.
It appears that the respondents have focused on the information
system security policies that are incorporated into the rule without
also considering the other policies and procedures identified, all of
which have varying applicability depending on the specifics of the
contract. For example, one of the policies referenced governs the
Department's background investigation process and security requirements
applicable to individuals who have access to the Department's sensitive
but unclassified information, now known as CUI. It is both necessary
and appropriate that DHS mandate that its contractors comply with these
requirements. Anything less is inconsistent with the mission of the
Department, has the potential to place important government information
at risk, and is contrary to the public interest. Like many of the other
DHS policies referenced, the need to comply with this requirement is
based on access to the information, not whether a Federal information
system or nonfederal information system will process, store, or
transmit the data. Also, the applicability of the information system
security policies is specifically defined in the text of clause
3052.204-7X, Safeguarding of Controlled Unclassified Information.
Specifically, Alternate I, Authority to Operate, documents the
applicability of DHS Sensitive Systems Policy Directive 4300A and DHS
4300A Sensitive Systems Handbook. The prescription for Alternate I is
clear that these requirements are applicable when Federal information
systems, which include contractor information systems operated on
behalf of the agency, are used to collect, process, store, or transmit
CUI. In addition, the first sentence of proposed paragraph (c),
Authority to Operate, of clause 3052.204-7X, Safeguarding of Controlled
Unclassified Information, specifically stated that its requirements are
``applicable only to Federal information systems, which include[ ]
contractor information systems operating on behalf of the agency.'' As
such, it is clear that it is not the intent of the Department to levy
the requirements in these policies and procedures on contractor
information systems that are not operated on its behalf. Lastly, the
basic clause is limited to definitions, DHS CUI handling requirements,
incident reporting and response requirements, and sanitization
requirements. These requirements exist whenever CUI will be accessed or
developed under a contract regardless of the type of information system
involved in contract performance. This is the reason why the basic
clause is more broadly applicable.
Also, the statements in paragraph (a) of clause 3004.470-3, Policy,
are levied on DHS contractors through the inclusion of clause 3052.204-
7X, Safeguarding of Controlled Unclassified Information, in the
solicitation and resultant contract. Absent inclusion of the clause in
the contract, the requirements are not applicable.
Comment: One respondent stated that the proposed rule fails to
reflect the information systems safeguarding requirements of the CUI
Federal regulation (32 CFR part 2002) and allows DHS full discretion on
what electronic safeguarding controls to apply to contractors for any
category of CUI. The respondent asserted that the
[[Page 40565]]
rule makes no distinction operationally in the way nonfederal
contractor information systems and DHS agency information systems are
treated, a distinction made in the CUI regulation (32 CFR part 2002)
and in FISMA.
Response: The respondent is incorrect that the rule: (1) allows DHS
full discretion on what electronic safeguarding controls to apply to
contractors for any category of CUI; and (2) makes no distinction
between nonfederal contractor information systems and the Federal
information systems. DHS understands that the information security
requirements applicable to Federal information systems differ from the
requirements applicable to nonfederal information systems, as
referenced in footnote 5 of the proposed rule, which advised that DHS
is aware NIST Special Publication 800-171, Protecting Controlled
Unclassified Information in Nonfederal Information Systems and
Organizations, was released in June 2015 to provide federal agencies
with recommended requirements for protecting the confidentiality of
Controlled Unclassified Information on non-Federal information systems.
However, the information system security requirements in this proposed
rulemaking are focused on Federal information systems, which include
contractor information systems operating on behalf of an agency, and
consistent with 32 CFR part 2002, these information systems are not
subject to the requirements of NIST Special Publication 800-171.
DHS also makes this distinction in the prescription for Alternate
I, Authority to Operate, to clause 3052.204-7X, Safeguarding of
Controlled Unclassified Information. It specifies that these
requirements are applicable when Federal information systems, which
include contractor information systems operated on behalf of the
agency, are used to collect, process, store, or transmit CUI.
Additionally, the first sentence of paragraph (c), Authority to
Operate, of clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information, in the proposed rule stated ``[t]his subsection is
applicable only to Federal information systems, which include[ ]
contractor information systems operating on behalf of the agency.'' As
such, the Department has made clear it understands there are differing
requirements for nonfederal information systems and has not, through
the rule, retained full discretion on what electronic safeguarding
controls to apply to contractors for any category of CUI.
Comment: One respondent expressed concerns regarding clause
3004.470-4(a), which states ``subcontractor employee access to CUI or
government facilities must be limited to U.S. citizens and lawful
permanent residents.'' The respondent stated that this limitation is
not a legal requirement and recommended that access to government
facilities be treated as a separate and distinct issue from the issue
of access to CUI and that access limitations for CUI be based on the
associated legal requirement as outlined in the NARA CUI rule.
Response: This recommendation is outside the scope of this
regulation. DHS notes that although CUI Basic does not inherently
convey citizenship or residency requirements, some of the limited
dissemination caveats that can be appended to CUI Basic do. While 32
CFR part 2002 does standardize the safeguarding and dissemination
requirements that can be imposed on those with whom CUI is shared, the
determination and decision to share CUI information remains subject to
agency policy and discretion.
3. Applicability of NIST SP 800-171
Comment: Several respondents raised concerns regarding the
applicability of NIST SP 800-171. Some of the respondents correctly
recognized that the information system security requirements in the
proposed rule are specific to Federal information systems, which
include contractor information systems operated on behalf of the
Government. These respondents expressed concern that the rule did not
address the information system security requirements applicable to
nonfederal information systems and requested that DHS identify the
information system security requirements applicable to nonfederal
information systems either through this rulemaking or another one.
Response: DHS does not accept the suggestion to identify the
information system security requirements applicable to nonfederal
information systems. The rule is intentionally silent on the security
requirements applicable to nonfederal information systems because NARA
is working with the FAR Councils, in which DHS is a participant, to
develop a FAR CUI rule that addresses the requirements nonfederal
information systems must meet before processing, storing, or
transmitting CUI. As such, there is no need for the Department to
identify requirements applicable to nonfederal information systems in
this rulemaking, as inclusion would be duplicative and redundant to the
work of the FAR Councils.
Comment: Several respondents did not recognize that the scope of
the information system security requirements in the proposed rule were
specific to Federal information systems and believed that the
Department either conflated the two different categories of information
systems (i.e., Federal and nonfederal) or was incorrectly applying
requirements for Federal information systems to nonfederal information
systems (i.e., contractor information systems that are not operated on
behalf of the Department). These respondents either requested that DHS
refine the scope of the rule to exclude contractor information systems
or explicitly identify NIST SP 800-171 as the applicable security
standard for contractor information systems. One respondent stated that
the proposed rule requires contracting officers to insert proposed
clause 305.204-7X, Safeguarding of Controlled Unclassified Information,
too often (i.e., any time the contractor or subcontractor will have
access to CUI regardless of the type of information system being used).
Response: DHS does not accept the recommendation to modify the
scope of the rule to exclude contractor information systems or
explicitly identify NIST SP 800-171 as the applicable security standard
for such systems. There is a misconception among industry actors that
NIST SP 800-171 is the only policy that must be followed when CUI is
provided or accessed under a contract. This is not correct. As
discussed in the preamble of the proposed rule, OMB Circular A-130,
Managing Information as a Strategic Resource, makes clear that a
contractor information system can be considered a Federal information
system if it operates on behalf of an agency. Specifically, Circular A-
130 defines a Federal information system as an information system used
or operated by an agency or by a contractor of an agency or by another
organization on behalf of an agency. In accordance with FISMA,
Departments and agencies are responsible for determining when a
contractor information system is operated on its behalf. As such, a
blanket exclusion of contractor information systems absent a
determination of the type of system (i.e., Federal or nonfederal) is
not appropriate.
When the Government determines that a contractor information system
is being operated on its behalf, that information system is considered
a Federal information system and subject to the requirements of NIST SP
800-53, Security and Privacy Controls for Information Systems and
Organizations.
[[Page 40566]]
Alternatively, NIST SP 800-171 is applicable ``(1) when the CUI is
resident in a nonfederal system and organization; (2) when the
nonfederal organization is not collecting or maintaining information on
behalf of a federal agency or using or operating a system on behalf of
an agency; and (3) where there are no specific safeguarding
requirements for protecting the confidentiality of CUI prescribed by
the authorizing law, regulation, or governmentwide policy for the CUI
category listed in the CUI Registry'' (emphasis original; footnote
omitted).
Generally speaking, should the Government determine that a
contractor information system is not operated on its behalf, NIST SP
800-171 is applicable. However, consistent with 32 CFR 2002.14(a)(3)
and (g), ``[a]gencies may increase CUI Basic's confidentiality impact
level above moderate only internally, or by means of agreements with
agencies or non-executive branch entities (including agreements for the
operation of an information system on behalf of the agencies).''
Relatedly, 32 CFR 2002.4(c) states that agreements ``include, but are
not limited to, contracts, grants, licenses, certificates, memoranda of
agreement/arrangement or understanding, and information-sharing
agreements or arrangements.'' Therefore, Departments and agencies can
require a confidentiality impact level above moderate for nonfederal
information systems through agreements with non-executive branch
entities. Nonetheless, the information system security requirements of
this rule, including those in DHS Sensitive Systems Policy Directive
4300A and DHS 4300A Sensitive Systems Handbook, are specific to Federal
information systems.
As stated in the preamble of the proposed rule, the Government
believed that requirements of proposed clause 3052.204-7X, Safeguarding
of Controlled Unclassified Information, were written in such a way that
they would be self-deleting when they are not applicable to a
solicitation or contract. For example, the first sentence of paragraph
(c), Authority to Operate, of the proposed clause stated ``[t]his
subsection is applicable only to Federal information systems, which
include[ ] contractor information systems operating on behalf of the
agency.'' This section of the clause also defined the applicability of
DHS Sensitive Systems Policy Directive 4300A and DHS 4300A Sensitive
Systems Handbook, making clear these policies are applicable only to
Federal information systems. Additional examples include language for
the notification and credit monitoring requirements stating that the
applicability is limited to incidents involving PII or SPII. The
remaining requirements of the proposed clause did not include any
caveats on their applicability because compliance with them is
mandatory regardless of the type of information system (i.e., Federal
information system or nonfederal information system).
However, DHS believes the concerns raised regarding proper
understanding of the applicability of the requirements of proposed
clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information, are legitimate. In response, DHS has: (1) made the
requirements of paragraph (c), Authority to Operate, Alternate I to the
basic clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information; and (2) made the requirements of paragraphs (f), PII and
SPII Notification Requirements, and (g), Credit Monitoring
Requirements, a separate clause at 3052.204-7Y titled Notification and
Credit Monitoring Requirements for Personally Identifiable Information
Incidents. As a result of these changes, basic clause 3052.204-7X,
Safeguarding of Controlled Unclassified Information, is limited to the
following provisions: paragraphs (a), Definitions; (b), Handling of
Controlled Unclassified Information; (c), Incident Reporting
Requirements; (d), Incident Response Requirements; (e), Certification
of Sanitization of Government and Government-Activity-Related Files and
Information; (f), Other Reporting Requirements; and (g), Subcontracts.
Compliance with these requirements is mandatory regardless of the
information system type (i.e., Federal information system or nonfederal
information system). Alternate I to the basic clause is applicable when
Federal information systems, which include contractor information
systems operated on behalf of the agency, are used to collect, process,
store, or transmit CUI. New clause 3052.204-7Y, Notification and Credit
Monitoring Requirements for Personally Identifiable Information
Incidents, is applicable to solicitations and contracts where a
contractor will have access to PII. These changes were made to: (1)
ensure that DHS contractors clearly understand the scope and
applicability of the various requirements contained in proposed clause
3052.204-7X, Safeguarding of Controlled Unclassified Information; (2)
make clear that the Authority to Operate (ATO) requirements of the
clause are only applicable to Federal information systems, which
include contractor information systems operated on behalf of the
agency; and (3) ensure that DHS contractors understand credit
monitoring and notification requirements are only applicable when the
solicitation and contract require contractor access to PII.
Comment: Several respondents raised concerns about footnote 5 in
the proposed rule. The footnote advised that DHS is aware NIST Special
Publication 800-171, Protecting Controlled Unclassified Information in
Nonfederal Information Systems and Organizations, was released in June
2015 to provide federal agencies with recommended requirements for
protecting the confidentiality of Controlled Unclassified Information
on non-Federal information systems. However, the information system
security requirements in this proposed rulemaking are focused on
Federal information systems, which include contractor information
systems operating on behalf of an agency, and consistent with 32 CFR
part 2002, these information systems are not subject to the
requirements of NIST Special Publication 800-171.
One respondent interpreted the footnote to mean that DHS believes
NIST SP 800-171 is applicable to nonfederal entities that handle,
process, use, share, or receive CUI. One respondent raised concerns
that the proposed rule was not consistent with the footnote because the
rule requires in clause 3004.470-3(a) that CUI be safeguarded in ``any
situation where contractor and/or subcontractor employees may have
access to CUI.'' Another respondent stated that the footnote downplays
the applicability of NIST SP 800-171 and implies that the guidance is
for the more limited set of systems covered by NIST SP 800-53. The same
respondent advised that in other parts of the rule, contractors'
internal business systems that do fall under the provisions of NIST SP
800-171 are specifically called out. Specific actions requested
include:
Moving the content of footnote 5 to the Background section
to improve the clarity of the scope of the rule and avoid unnecessary
misinterpretations and misunderstandings;
Making clear that the proposed rule does not apply to
contractor information systems;
Clarifying that the ``adequate security'' requirements of
the rule do not apply to internal contractor information systems that
are not operated on behalf of an agency, and stressing that the use of
sanitization procedures for CUI spills onto internal contractor
information systems, instead of requiring ``adequate security''
[[Page 40567]]
implementation on systems ``regardless of where'' the CUI may reside;
and
Clarifying that contractors are not responsible for
implementing the ``adequate security'' requirements on government-
furnished equipment (GFE) that contractors operate in their own
internal contractor environment, unless specifically agreed between the
DHS procuring activity (i.e., contracting office) and the contractor.
Response: There appears to be a misunderstanding within industry
regarding the applicability of NIST SP 800-171. Categorization as a
nonfederal entity does not mean the security requirements for
information systems used by a nonfederal entity default to those
provided for in NIST SP 800-171. The Government must first determine if
the contactor information system is operated on its behalf, thus making
the information a Federal information system. If the Government
determines the contractor information system is operated on its behalf,
then the system is required to comply with NIST SP 800-53. Generally
speaking, if the Government determines that the contractor information
system is not operated on its behalf, NIST SP 800-171 is applicable.
The Government's determination of the type of system, Federal versus
nonfederal, must be made before any decision can be made on the
security requirements applicable to the information system.
Commenters are incorrect in stating that the proposed rule is not
consistent with the footnote by requiring that CUI be safeguarded in
``any situation where contractor and/or subcontractor employees may
have access to CUI.'' CUI is required to be handled properly and
adequately safeguarded at all times. As previously stated, it appears
that the respondents have focused on the information system security
policies that are incorporated into the rule with no regard for the
other policies and procedures identified, all of which have varying
applicability depending on the specifics of the contract. The only
requirement in proposed clause 3052.204-7X, Safeguarding of Controlled
Unclassified Information, applicable to information systems was
paragraph (c), Authority to Operate. The remaining requirements of the
proposed clause, namely paragraphs (b), Handling of Controlled
Unclassified Information, (d), Incident Reporting Requirements, (e),
Incident Response Requirements, (f), PII and SPII Notification
Requirements, (g), Credit Monitoring Requirements, (h), Certificate of
Sanitization of Government and Government-Activity-Related Files and
Information, (i), Other Reporting Requirements, and (j), Subcontracts,
are applicable regardless of the type of information system (i.e.,
Federal or nonfederal), as well as when information systems are not
used and only paper documents are available under the contract. DHS
Sensitive Systems Policy Directive 4300A and DHS 4300A Sensitive
Systems Handbook are only applicable to Federal information systems.
The prescription for Alternate I is clear that the ATO requirements are
applicable only when Federal information systems, which include
contractor information systems operated on behalf of the agency, are
used to collect, process, store, or transmit CUI. Additionally, the
proposed rule made clear this point by specifically stating in the
first sentence of paragraph (c), Authority to Operate, of clause
3052.204-7X, Safeguarding of Controlled Unclassified Information, that
the ``subsection is applicable only to Federal information systems,
which include[ ] contractor information systems operating on behalf of
the agency.''
The footnote is no longer included in the rule and DHS has provided
significant information regarding the applicability of NIST SP 800-171
throughout the Discussion and Analysis section of the rule. These
statements not only address the applicability of the publication to
nonfederal information systems, but they also address the ability of
Departments and agencies to increase CUI Basic's confidentiality impact
level above moderate on nonfederal systems (i.e., beyond the
requirements of NIST SP 800-171), pursuant to the terms of an agreement
as provided for in 32 CFR part 2002.
DHS declines the recommendation to clarify that the rule is not
applicable to contractor information systems. As previously stated, the
only requirement in the proposed rule specific to information systems
was paragraph (c), Authority to Operate, in clause 3052.204-7X,
Safeguarding of Controlled Unclassified Information; in this final
rule, the requirements of that paragraph have been made into Alternate
I to the basic clause. All the other requirements are applicable
regardless of the type of information system (i.e., Federal or
nonfederal), as well as when information systems are not used, making
the requirements applicable to contractors that access or develop CUI
under DHS contracts. Also, absent a determination of the status of the
contractor information system as Federal or nonfederal, it would be
inappropriate for DHS to state that the rule is not applicable to
contractor information systems.
DHS declines the recommendation to clarify that the ``adequate
security'' requirements of the rule do not apply to internal contractor
information systems that are not operated on behalf of an agency, and
stress that the use of sanitization procedures for CUI spills onto
internal contractor information systems, instead of requiring
``adequate security'' implementation on systems ``regardless of where''
the CUI may reside. The requirement for adequate security is not solely
specific to information systems. Adequate security includes ensuring
security protections are applied commensurate with the risk resulting
from unauthorized access, use, disclosure, disruption, modification or
destruction of the information. It also includes ensuring information
contractors and subcontractors host on information systems on behalf of
the agency, as well as information systems and applications used by the
agency, operate effectively and provide appropriate protections related
to confidentiality, integrity, and availability.
Additionally, paragraph (b)(1) of clause 305.204-7X, Safeguarding
of Controlled Unclassified Information, requires contractors and
subcontractors to provide adequate security to protect CUI from
unauthorized access and disclosure. This includes complying with DHS
policies and procedures, accessible at https://www.dhs.gov/dhs-security-and-training-requirements-contractors, in effect when the
contract is awarded.
A review of the policies and procedures on the referenced website
would demonstrate that the applicability of the various policies and
procedures depends on the requirements of each contract, including the
type(s) of CUI accessed or developed under the contract. In addition,
the clause makes clear that the information system security policies
and procedures on the website are only applicable to Federal
information systems. Also, the respondent is incorrect that internal
contractor information systems that are not operated on behalf of the
agency should not be required to have adequate security. If such a
system includes the Department's CUI, it is imperative that adequate
security of the system be maintained. Nonetheless, the information
system security requirements of this rule are limited to Federal
information systems. The purpose of this rule is the safeguarding of
CUI, so it would be inappropriate to assert that DHS was attempting to
apply security standards to contractor information systems that do not
contain CUI. Also, ``CUI spills onto internal
[[Page 40568]]
contractor information systems'' are considered incidents and are
subject to the incident reporting and response requirements of clause
3052.204-7X, Safeguarding of Controlled Unclassified Information.
DHS declines the recommendation to clarify that contractors are not
responsible for implementing the ``adequate security'' requirements on
GFE that contractors operate in their own internal contractor
environment, unless specifically agreed between the DHS procuring
activity and the contractor. Clause 3052.204-7X Safeguarding of
Controlled Unclassified Information, is clear on the applicability of
the information system security requirements and, as such, there is no
need to state within the text of the clause that the requirements are
not applicable to GFE.
4. ATO Requirements
Comment: One respondent stated that it appears as if the
requirements of paragraph (c)(1)(i) of proposed clause 3052.204-7X,
Safeguarding of Controlled Unclassified Information, would apply only
to an information system that is in development and the security
authorization (SA) package must be submitted before the system goes
operational.
Response: The respondent is partially correct. The SA package must
be submitted and ATO granted before a Federal information system, which
includes a contractor information system operated on behalf of the
agency, can be used to collect, process, store, or transmit CUI.
However, the requirement for submission of a SA package is not limited
to information systems that are under development. Whether the Federal
information system is under development or already in existence, before
it can be used to collect, process, store, or transmit CUI it must
receive an ATO from DHS and the requirements for submission of the SA
package must be met.
Comment: The same respondent questioned if the ATO requirements are
applicable to nonfederal information systems. If so, the respondent
stated that the clause should state when the SA package for these
systems must be submitted as well as clarify the applicability of the
independent assessment and which standard (i.e., NIST SP 800-53 or NIST
SP 800-171) will be used to determine compliance.
Response: The prescription for Alternate I identifies that these
requirements are applicable when Federal information systems, which
include contractor information systems operated on behalf of the
agency, are used to collect, process, store, or transmit CUI.
Additionally, the first sentence of paragraph (c), Authority to
Operate, in proposed clause 3052.204-7X, Safeguarding Controlled
Unclassified Information, stated ``[t]his subsection is applicable only
to Federal information systems, which include[ ] contractor information
systems operating on behalf of the agency.'' As such, the information
system security requirements of the clause are applicable only to
Federal information systems. As previously stated, DHS is intentionally
silent on the requirements applicable to nonfederal information systems
as the FAR CUI rule is intended to address the requirements for these
information systems. Inclusion of such requirements in this rule would
be duplicative and redundant to the work of the FAR Councils.
Comment: One respondent stated that the proposed clause could be
interpreted to require that contractors meet the security requirements
of NIST SP 800-53 when safeguarding CUI at DHS prior to collecting,
processing, storing, or transmitting CUI. The respondent also stated
that a contractor will need to have gone through the DHS ATO process
and demonstrated its capabilities to meet the requirements of the
proposed clause. The respondent raised concerns that such a process
thwarts the ``do once, use many'' efficiencies established under the
Federal Risk and Authorization Management Program (FedRAMP).
Additionally, the respondent stated that absent definitive guidance on
the timing of the ATO, unnecessary expenses may be incurred by
potential offerors, or competition may be needlessly stifled,
precluding access to best commercial solutions and innovative new
technology.
Response: Consistent with FISMA and its implementing Governmentwide
policies, Federal information systems, which include contractor
information systems operated on behalf of the Government, are required
to receive an ATO before they can collect, process, store, or transmit
Federal information. This requirement does not mean that a contractor's
information system must have received an ATO from the Department before
a contractor responds to a DHS solicitation. To require a contractor to
obtain an ATO before contract award is costly and unnecessarily
burdensome, and it could potentially place contractors in the position
to incur costs that they would have no possibility to recoup. Clause
3052.204-7X, Safeguarding of Controlled Unclassified Information,
documents the timeline and process contractors must comply with to
receive an ATO from the Department and it is clear that this process
takes place after a contract award is made.
Comment: One respondent asserted that DHS should tie new regulatory
requirements on cybersecurity controls to FedRAMP. Another respondent
stated that the rule does not recognize or accommodate the use of cloud
services.
Response: FedRAMP addresses requirements for cloud computing. To
the extent a contractor is proposing a cloud solution to the
Department, DHS would comply with FedRAMP policies and procedures. This
includes the expectation that contractors would rely on the documents
the cloud service provider used to obtain its provisional ATO under
FedRAMP and modify them to reflect any additional requirements
necessary to provide the specific services required by the Department.
Comment: One respondent stated that the proposed process will
impose significant responsibilities on DHS, will require a great
expense to the contractor, and will end up limiting competition.
Response: DHS recognizes there are significant costs associated
with these requirements; however, the persistent and prevalent nature
of cyber-attacks on both government and private sector networks has
shown that this is a necessary expense. DHS fully expects its
contractors to reflect these costs in the price and cost proposals they
submit to the Department.
Comment: Two respondents raised concerns regarding the
applicability of the rule to contracts awarded using the procedures of
FAR part 12, Acquisition of Commercial Items. The respondents stated
that applying the requirements of the rule to contracts awarded under
the procedures of this FAR part impact the Department's access to
innovative technology and increase the number of obstacles to market
entry to the DHS supply chain for these companies as well as new start-
ups with innovative technical ideas. The respondents recommended that
DHS exclude commercial items from the requirements of the rule.
Response: DHS relies extensively on commercial contractors to
provide services that include access to and the processing, storing,
and transmitting of CUI. Eliminating this large pool of contractors
from compliance with these requirements is untenable. It is not only
inconsistent with the mission of the Department, but it is also
contrary to the public interest. DHS has determined that the costs
associated with compliance with the security requirements of this rule
are a necessary
[[Page 40569]]
expense to ensure DHS CUI is adequately protected.
Comment: One respondent recommended that DHS specify if the
Department will be the arbiter of compliance or if contractor self-
assessments will suffice, the latter of which is the preference of the
respondent.
Response: Clause 3052.204-7X, Safeguarding of Controlled
Unclassified Information, is clear that a contractor operating a
Federal information system, which includes a contractor information
system operated on behalf of the agency, must receive an independent
assessment. Specifically, the clause requires contractors have an
independent third party validate the security and privacy controls in
place for the information system(s). Validation includes reviewing and
analyzing the SA package and reporting on technical, operational and
other deficiencies as outlined in NIST Special Publication 800-53,
Security and Privacy Controls for Information Systems and
Organizations. Deficiencies must be addressed before the SA package is
submitted to the COR for review. DHS will review the independent
assessment and, in conjunction with its own analysis, determine if an
ATO should be granted.
Comment: One respondent recommended if DHS will be responsible for
determining if a contractor has implemented adequate security that the
rule clarify how any determination of adequacy will be made. The
respondent requested that the authority be placed at a level higher
than the contracting officer, such as the Chief Information Officer
(CIO), to ensure a more uniform application across DHS. The respondent
also recommended that DHS include further guidance on this subject on
the cited website to explain to contractors how this standard will be
applied.
Response: Clause 3052.204-7X, Safeguarding of Controlled
Unclassified Information, consistently has identified that the
Component or Headquarters CIO, or designee, is responsible. Alternate
I, which incorporates paragraph (c) of the proposed clause, states that
``[t]he Contractor shall not collect, process, store, or transmit CUI
within a Federal information system until an ATO has been granted by
the Component or Headquarters CIO, or designee.'' Alternate I makes
clear that these requirements are only applicable to Federal
information systems and the Component or Headquarters CIO, or designee,
is responsible for determining if a contractor has implemented adequate
security.
DHS declines the recommendation to add further guidance on this
topic on the publicly facing website. Adequate security means ensuring
security protections are applied commensurate with the risk resulting
from unauthorized access, use, disclosure, disruption, modification or
destruction of the information. It also includes ensuring information
contractors and subcontractors host on information systems on behalf of
the agency, as well as information systems and applications used by the
agency, operate effectively and provide appropriate protections related
to confidentiality, integrity, and availability.
Additionally, paragraph (b)(1) of clause 3052.204-7X, Safeguarding
of Controlled Unclassified Information, requires contractors and
subcontractors to provide adequate security to protect CUI from
unauthorized access and disclosure. This includes complying with DHS
policies and procedures, accessible at https://www.dhs.gov/dhs-security-and-training-requirements-contractors, in effect when the
contract is awarded.
As it relates to the information system security portion of the
adequate security requirements, the process to obtain an ATO is clearly
described in the text of clause 3052.204-7X, Safeguarding of Controlled
Unclassified Information. The remaining adequate security requirements
are documented in the policies and procedures on the publicly facing
website. As such, no additional guidance on adequate security is
required.
Comment: One respondent recommended that DHS establish mechanisms
through which contractors can obtain sufficient clarity during the
proposal stage both to determine whether CUI will be processed under
the contract and, if yes, to assess whether they can comply with such
safeguarding obligations.
Response: DHS shared this concern when developing the proposed rule
and indicated as such in the preamble of the proposed rule by stating
that feedback from industry consistently has indicated the need for
transparency and clear and concise requirements as it relates to
information security. This concern led DHS to establish in the proposed
rule a process by which DHS contractors will be aware of the security
requirements they must meet when responding to DHS solicitations that
require a contractor to collect, process, store, or transmit CUI.
Previously, information security requirements were either embedded in a
requirements document (i.e., Statement of Work, Statement of
Objectives, or Performance Work Statement) or identified through
existing clause 3052.204-70, Security Requirements for Unclassified
Information Technology Requirements. This approach: (1) created
inconsistencies in the identification of information security
requirements for applicable contracts; (2) required the identification
and communication of security controls for which compliance was
necessary after contract award had been made; and (3) resulted in
delays in contract performance. Clause 3052.204-7X, Safeguarding of
Controlled Unclassified Information, substantially mitigates the
concerns with DHS's previous approach. Through the government-provided
Security Requirements Traceability Matrix (SRTM), contractors will know
at the solicitation level the security requirements with which they
must comply. The SRTM identifies the security controls that must be
implemented on an information system that collects, processes, stores,
or transmits CUI and that are necessary for the contractor to prepare
its SA package. Clear identification of these requirements at the
solicitation level affords contractors the ability to: (1) assess their
qualifications and ability to fully meet the Government's requirements;
(2) make informed business decisions when deciding to compete on the
Government's requirements; and (3) engage subcontractors, if needed,
early in the process to enable them to be fully responsive to the
Government's requirements. The rule states that ``[t]he SA package
shall be developed using the government-provided Security Requirements
Traceability Matrix and SA templates.'' Any concerns regarding the SRTM
can be raised and resolved using traditional solicitation processes.
Comment: One respondent recommended that DHS consider implementing
a review process for ensuring that contractors can propose alternative,
but equally effective, controls, an approach used by DoD in its
information safeguarding rulemaking. The respondent recommended that
the process also include a procedure through which contractors can
obtain confirmation that a particular control is unnecessary. The
respondent also recommended that DHS clarify the process for making
such determinations and that contractors be permitted to make such
determinations on an individual basis.
Response: DHS declines these recommendations given that the ability
for a contractor to engage on security measures included in the SRTM,
which includes the applicability of the control
[[Page 40570]]
and implementation method, is inherent in the Department's SA process.
In addition, because the SRTM will be included in all applicable
solicitations, any concerns regarding the SRTM can be raised and
resolved using traditional solicitation processes. As such, there is no
need to add language to the clause to identify this capability.
Comment: One respondent stated that the government-supplied SRTM
has the potential to be a useful tool to help ensure its members'
ability to be responsive to the Government's security requirements. The
respondent was unclear whether an SRTM will be provided with each
solicitation or only in cases where a contractor will be operating an
information technology (IT) system on behalf of the Government. The
respondent requested that all DHS solicitations include: (1) a
description of whether CUI Basic and/or CUI Specified information will
be collected, processed, stored, or transmitted by the contractor on
behalf of DHS during the course of the project; and (2) a list of
applicable security requirements, including any requirements for CUI
Specified information that must be protected on nonfederal information
systems at higher than the CUI Basic ``moderate'' confidentiality level
of the NIST SP 800-171 standards.
Response: The information system security requirements in this rule
are focused on those applicable to Federal information systems, which
include contractor information systems operated on behalf of the
agency. As previously stated, the requirements applicable to nonfederal
information systems will be addressed in the FAR CUI rule, and as such,
they are not addressed in this rulemaking. For the purposes of the
information systems subject to this rulemaking, an SRTM will be
included in all applicable solicitations using the controls from NIST
SP 800-53. The type(s) of CUI provided and/or developed under the
contract also will be identified in the solicitation. Apart from using
NIST SP 800-171 as a baseline for the security controls, DHS does not
anticipate a change to the process of providing an SRTM and identifying
the type(s) of CUI provided or developed under a contract where
nonfederal information systems are used. However, this process cannot
be fully defined until the FAR CUI rule is finalized.
Comment: One respondent raised concerns regarding the security
review requirements of paragraph (c)(3) of clause 3052.204-7X,
Safeguarding of Controlled Unclassified Information. The respondent
stated that proper control of information is already outlined in the
applicable law, regulation, and Governmentwide policy that applies to
that information and that compliance with contract terms is already
included in agreement terms. The commenter requested that DHS take an
approach similar to DoD and either use existing FAR processes and
procedures to facilitate these requirements or identify them at the
contract level in lieu of specifying the requirements in the clause.
Response: The ability to perform periodic security reviews is an
important mechanism for the Department to consistently ensure
contractors are and remain compliant with the security requirements
contained in their contracts. This is borne out by the prevalent and
persistent nature of cyber-attacks against both public and private
networks and information systems. Although the Department is reserving
the right to perform random security reviews, the Department will be
judicious in its use and will coordinate appropriately with contractors
to ensure operations are not unduly impacted. It is also important to
note that reciprocity among agency regulations is outside the scope of
this rule.
5. CUI Registry
Comment: Several respondents raised concerns that the rule proposed
included categories of CUI that are not included in the CUI Registry
maintained by NARA. In support of these concerns, respondents cited
various sections of 32 CFR part 2002, such as ``[a]gencies may use only
those categories or subcategories approved by the CUI EA [established
by E.O. 13556 as NARA] and published in the CUI Registry to designate
information as CUI.'' 32 CFR 2002.12(b).
Response: Based on the number of comments related to DHS's
inclusion of new categories and subcategories of CUI in the proposed
rule, it appears there is: (1) a misperception among our industry
partners that the CUI Registry cannot change; and (2) a
misunderstanding of the process by which agencies can add new
categories to the CUI Registry. The categories and subcategories of
information in the CUI Registry are not static. E.O. 13556, Controlled
Unclassified Information, establishes a process to add new categories
and subcategories of CUI. DHS's addition of new CUI categories and
subcategories is in line with the procedures established by E.O. that
require that the category or subcategory of information be in a law,
regulation, or Governmentwide policy. DHS proposed the new categories
and subcategories of CUI through the regulatory process (i.e., its
NPRM) and received provisional approval from NARA for the proposed
categories. As a result of this approval, these categories now appear
in the CUI registry.
Comment: One respondent advised that restating CUI categories
increases administrative burdens. The same respondent also raised
concerns that paragraph (b), Handling of Controlled Unclassified
Information, of clause 3052.204-7X, Safeguarding of Controlled
Unclassified Information, refers contractors back to DHS policies and
procedures and advised that DHS should instead refer contractors to the
CUI Registry and avoid duplicative descriptions of CUI. The respondent
also stated that DHS defined Operations Security Information too
broadly and that it could be interpreted to include almost any
information. Multiple respondents raised the same concern about the
Department's definition of Homeland Security Agreement Information. One
respondent stated that the definition is vague and overly broad and
does not comport with either the definition of CUI set forth in 32 CFR
part 2002 or the categories or subcategories of CUI included in the CUI
Registry, while other respondents stated that the definition allows DHS
to determine what Homeland Security Agreement Information is on a case-
by-case basis in individual contracts. Another stated that the
parameters for Homeland Security Agreement Information are very
uncertain and seemingly could apply to any information included in such
agreements.
Response: The CUI Registry does not describe safeguarding and
dissemination requirements in sufficient detail to allow for general
users to properly protect information without supplemental guidance. In
most instances, it is only a citation of a law, regulation, or
Governmentwide policy. With regard to Operations Security Information,
the definition used in this regulation has been updated and is derived
from the definition ``Operations Security (OPSEC)'' from National
Security Presidential Memorandum 28, which was issued in January 2021.
While agreeing that the category is broad, DHS also believes it
necessary, much like other similarly broad categories, such as privacy
and law enforcement information. DHS is unable to address it solely in
specific contracts or project guidance as such a practice would by
definition be an ad-hoc agency practice existing outside of a law,
regulation, or Governmentwide policy and, thus, contrary to E.O. 13556.
[[Page 40571]]
Instead, DHS opted to define this protection within the scope of this
regulation.
With regard to Homeland Security Agreement Information, in
furtherance of the Department's core missions of (1) preventing
terrorism and enhancing security, (2) securing and managing the
borders, (3) Homeland Security Agreement Information enforcing and
administering immigration laws, (4) safeguarding and securing
cyberspace, and (5) ensuring resilience to disasters, DHS enters into
thousands of information sharing agreements with State, local, and
private sector entities. The information being shared is often
sensitive, thus requiring protections from public disclosure, but does
not easily fall into one of the other CUI categories. DHS has
historically protected this information as For Official Use Only, the
DHS precursor to the CUI regime. While the definition of Homeland
Security Agreement Information is admittedly broad, fulfilling core DHS
missions while protecting sensitive information shared with DHS by our
nonfederal partners requires such flexibility. DHS finalizes the CUI
categories as proposed and declines to make changes in response to
public comments.
Comment: One respondent stated the rule does not discuss who has
the responsibility to identify or designate DHS CUI; whether any
safeguarding obligations also apply to other categories or
subcategories of CUI as listed in the CUI Registry; what relationship
must exist between the presence of information that could be CUI and a
contractual obligation to DHS; or how the agency will respond, advise,
or adjudicate any questions as to application, administration,
implementation, or enforcement of the safeguarding obligation.
Response: The purpose of this rulemaking is to clearly identify
contractor responsibilities with respect to safeguarding CUI and
identify security requirements and processes applicable to Federal
information systems, which include contractor information systems
operated on behalf of the Government. Identification of individuals/
organizations within the Department responsible for designating CUI and
safeguards applicable to CUI does not achieve this end. Also, a
specific process on how the agency will respond, advise, or adjudicate
any questions as to application, administration, implementation, or
enforcement of the safeguarding obligation is also unnecessary. Should
an issue or concern arise, it can be handled through traditional
contract administration practices.
6. DHS Internal Policies and Procedures
Comment: One respondent expressed concern that the ``adequate
security'' requirements in paragraph (b), Handling of Controlled
Unclassified Information, in clause 3052.204-7X, Safeguarding of
Controlled Unclassified Information, refer to security standards in
DHS-specific documents (as opposed to security standards designed for
use across the executive branch) that are hosted on a DHS website. The
respondent expressed concern that DHS may unilaterally change these
security standards from time to time, causing significant adverse
effects to contractors without giving them a meaningful opportunity to
comment on these changes. Based on this concern, the respondent
proposed the following revision (revision in bold type):
Adequate security includes compliance with DHS policies and
procedures in effect at the time of contract award. These policies
and procedures are accessible at https://www.dhs.gov/dhs-security-and-training-requirements-contractors. Changes to policies and
procedures will be identified by version controls and
implementations of these new versions will only occur after the
contractors affected by the change are allowed time to comment on
changes that will affect a contract's cost and/or schedule.
Response: DHS does not accept the recommendation to add language to
clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information, documenting how and when updates to the Department's
policies and procedures will be handled after a contract has been
awarded. DHS employs version control on all internal policies and
procedures. Contractors are not afforded the opportunity to comment on
internal policies and procedures of Federal agencies when they are
developed or when they are updated. Any impacts to DHS contractors as a
result of updates to policies and procedures will be handled through
the normal contract administration process, which already allows a
contractor to assess the impact of the change and request consideration
from the Government prior to implementation of the change. As such,
there is no need to add specific language in the clause allowing a
contractor to review and assess impacts to contract schedules and
costs.
7. Definitions
Comment: Multiple respondents requested that DHS include the
definition of ``on behalf of an agency'' consistent with 32 CFR part
2002. Another respondent stated that the rule does not clearly define
the term ``nonfederal information system'' as storing or handling CUI
only incidental to providing a service or product to the Government,
nor does it apply ``on behalf of an agency'' in a manner consistent
with 32 CFR part 2002.
Response: DHS intentionally excluded the ``on behalf of an agency''
definition provided in the NARA CUI rule from this rulemaking. The
phrase ``on behalf of an agency'' is already rooted in statute and is
used extensively in FISMA. FISMA designates the Director of the OMB as
being responsible for ``developing and overseeing the implementation of
policies, principles, standards, and guidelines on information
security. . . .'' 44 U.S.C. 3553(a)(1). As such, any definition of the
phrase ``on behalf of an agency'' must be provided in FISMA policy and
guidance issued by OMB after going through the appropriate interagency
coordination process to assess the wide-ranging implications of
defining this term. In the case of the NARA CUI rule, that has not
happened. In addition, the NARA CUI rule addresses a small subset of
the issues covered by FISMA. For example, FISMA applies to all
information, not just CUI. In addition, FISMA requires agencies to
provide information security protections related to the integrity,
confidentiality, and availability of all information (including CUI).
The NARA CUI rule relates only to a subset of these concerns,
specifically confidentiality of CUI.
The rule defines a Federal information system as ``an information
system used or operated by an agency or by a Contractor of an agency or
by another organization on behalf of an agency.'' This definition was
taken directly from OMB Circular A-130. Defining a Federal information
system is sufficient for the purposes of this rulemaking as an
information system, in the context of this rule, is either Federal or
nonfederal. Including a definition of a nonfederal information system
is not necessary as it logically follows that a nonfederal information
system is the opposite of a Federal information system. Also,
``nonfederal information system'' is not defined in Governmentwide
policy. Lastly, the information system security requirements of this
rule are limited to Federal information systems.
8. Reciprocity in Interagency Regulations and Information Security
Requirements
Comment: Multiple respondents raised concerns that the requirements
of the rule are not the same as other rules related to CUI issued by
other Departments and agencies, such as DoD,
[[Page 40572]]
and requested that DHS revise this rule to be consistent with those
rules. Respondents also stated that there is a lack of consistency
between DHS and DoD incident reporting requirements on what constitutes
timely reporting of breaches. Because companies often do work for
multiple Federal agencies, the respondent stated that it is important
to have a consistent approach Governmentwide so that companies can set
up a single compliant system and process.
Response: Reciprocity in information security policies and
regulations and incident reporting requirements among Departments and
agencies is outside the scope of this regulation. The purpose of this
rulemaking is to ensure that DHS contractors adequately protect CUI
received under DHS contracts. As such, the focus of this rule is
properly limited to the interests and mission needs of the Department.
Additionally, this rule is fully consistent with all applicable
statutes, regulations, and Governmentwide policies applicable to CUI
and information systems. With regard to reciprocity in information
security policies, DHS finalizes the rule as proposed and declines to
make changes in response to public comments.
Comment: One respondent expressed concern that the rule fails to
emphasize the need for reciprocity across Federal agencies and the
requirement to rely upon provisional authorizations and ATOs already
obtained through other Federal agencies.
Response: The focus of this rule is properly limited to the
interests and requirements of DHS. As such, reciprocity across the
Federal government and the requirement to rely upon provisional
authorizations and ATOs obtained from other Departments and agencies is
beyond the scope of this rule. However, nothing in the rule prevents a
contractor from submitting a SA package that was previously approved by
another Department, agency, or DHS Component. DHS will consider
existing SA packages and test results, as appropriate. It is quite
possible that such a submission would expedite the approval process to
obtain an ATO from DHS.
9. Incident Reporting and Response
Comment: Several respondents stated that the DHS requirement to
report incidents involving PII or SPII within 1 hour of discovery, and
all other incidents within 8 hours of discovery, is unreasonably short
and inconsistent with other government requirements. One respondent
stated that it is important to have a consistent approach
Governmentwide so that companies can set up a single compliant system
and process. One respondent recommended DHS extend the reporting
timeframes to 8 hours for known incidents and 72 hours for suspected
incidents involving contractors' internal information systems. One
respondent suggested DHS extend the timeframe for reporting known or
suspected incidents on contractor information systems not operated on
behalf of the Department to 72 hours. Another respondent requested that
DHS revise its incident reporting requirement to exclude reporting when
the contractor information system is not operated on behalf of the
Department.
Response: The requirement to report incidents impacting PII within
1 hour of discovery is documented in OMB memorandum M-18-02, Fiscal
Year 2017-2018 Guidance on Federal Information Security and Privacy
Management Requirements, and in United States Computer Emergency
Readiness Team (US-CERT) Federal Incident Notification Guidelines. The
8-hour reporting timeline for incidents impacting all other categories
of CUI came from the Department's review of its internal policies and
procedures for other categories of CUI. Specifically, the Department
reviewed its policies for chemical-terrorism vulnerability information
(CVI), protected critical infrastructure information (PCII), and
sensitive security information (SSI) (categories of information for
which the Department is statutorily responsible) and determined that
the existing reporting timeline for incidents impacting these
information categories is 8 hours. The Department considered creating a
separate reporting timeline for PII, CVI, PCII, and SSI and
establishing a different reporting timeline for the remaining
categories of CUI and determined that having multiple reporting
timelines would create confusion and could potentially result in
incidents not being timely reported to the Department. It is also
important to note that Departments and agencies must report information
security incidents where the confidentiality, integrity, or
availability of a Federal information system is potentially compromised
to US-CERT within 1 hour of being identified by the agency's top-level
Computer Security Incident Response Team, Security Operations Center
(SOC), or IT department. As it relates to the incident reporting
timelines required by DoD, reciprocity among agency regulations is
outside the scope of this rule.
DHS does not accept the recommendation to extend the reporting
requirement for known or suspected incidents on contractor information
systems that are not operated on behalf of the Department (i.e., a
nonfederal information system). The importance of CUI is not changed by
being on a nonfederal information system. As such, DHS will not hold
nonfederal information systems that contain the Department's CUI to a
lower standard than Federal information systems that contain the same
information.
DHS also does not accept the recommendation that incidents
impacting CUI on a contractor's internal information systems should not
be reported to the Department. A suspected or known incident impacting
the Department's CUI should always be reported. To require anything
less would be contrary to the public interest and the mission of the
Department.
Comment: One respondent asked DHS to clarify that if a
subcontractor experiences an incident, the subcontractor is required to
submit the incident report to DHS, but the subcontractor also must
notify the prime contractor (or next higher tier contractor) that it
submitted the report.
Response: DHS accepts this recommendation. DHS included paragraph
(j), Subcontracts, in proposed clause 3052.204-7X, Safeguarding of
Controlled Unclassified Information, to make clear that the
requirements of the clause must be included in the terms and conditions
of subcontract agreements, making subcontractors responsible for
complying with the requirements of the clause. However, to make clear
the Department's intent to require that subcontractors report incidents
that occur in their facilities and information systems, DHS has revised
proposed paragraph (d) (now paragraph (c)), Incident Reporting
Requirements, to add subcontractor reporting responsibilities.
Comment: One respondent raised concerns that the incident response
requirements in paragraphs (e)(3) and (5) of proposed clause 3052.204-
7X, Safeguarding of Controlled Unclassified Information, state the
following: ``(3) Incident response activities determined to be required
by the Government may include, but are not limited to, the following:
(i) Inspections, (ii) Investigations . . .'' and ``(5) The Government,
at its sole discretion, may obtain assistance from other Federal
agencies and/or third-party firms to aid in incident response
activities.'' The respondent recommended that the clause clarify how a
contractor's confidential and privileged information will be protected
in a case where the Government elects to conduct such inspections and
investigations,
[[Page 40573]]
particularly with the assistance of third-party firms.
Response: DHS does not accept the recommendation to identify in the
text of the clause how a contractor's confidential and privileged
information will be protected when third-party firms assist with the
Department's incident response activities. However, DHS's current
processes account for the protection of this information when third-
party firms are used. DHS will continue to protect against the
unauthorized use or disclosure of information received or obtained from
contractors under clause 3052.204-7X, Safeguarding of Controlled
Unclassified Information. Contractors from third-party firms that
assist in the Government's incident response activities are required to
sign nondisclosure agreements. Additionally, both DHS and its
contractors that report suspected or known incidents are required to
complete a formal Rules of Engagement before incident response
activities begin. The Rules of Engagement documents the security
mechanisms that will be used to ensure the protection of information
received during the Department's incident response activities.
Comment: One respondent stated that the incident reporting
obligation does not limit the scope of reportable incidents to Federal
information systems or even contractor information systems that contain
Federal information. Because this distinction is not made, the
respondent asserted that the rule could be read to require a contractor
to report to DHS any incident impacting its own internal information
systems, regardless of whether the incident has any likelihood of
impacting the DHS CUI resident on that information system. The
respondent recommended that DHS harmonize its reporting obligations
with any reporting obligations currently under consideration by the FAR
Councils in conjunction with its work on the FAR CUI rule.
Response: DHS disagrees that incidents should be reported to the
Department only after the contractor determines it is likely the
incident will impact/has impacted the DHS CUI resident on the
information system. If DHS CUI is resident on an information system
where a suspected or known incident occurs, contractors are required to
report that incident to the Department. Additionally, it is clear from
the title and substance of this rule that the focus is ensuring the
adequate security of CUI, in general and when resident on an
information system. To imply that this rule is requiring that suspected
or known incidents must be reported on any and all information systems,
including those that do not include the Department's CUI, is
unreasonable and false. DHS is a participant on the FAR team
responsible for drafting the FAR CUI rule and has not identified any
conflicts between this rule and the work taking place with the FAR
team.
Comment: One respondent stated that the requirement to report all
known and suspected incidents may result in a substantial number of
false positives that would be unduly burdensome for both DHS and its
contractors.
Response: The respondent is correct that the incident reporting
requirements of the clause may result in a number of ``false
positives'' being reported to the Department. DHS expects that this may
be the case and is structured to receive and resolve the anticipated
number of incidents to be reported under this clause. Given the
persistent and prevalent nature of cyber-attacks against both public
and private networks and information systems, it is increasingly
imperative that the Department is timely notified of any suspected or
known incidents impacting information systems where the Department's
CUI resides.
Comment: One respondent stated that paragraphs (e), Incident
Response Requirements, and (f), PII and SPII Notification Requirements,
of proposed clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information, should be revised to be consistent with the current OMB
directive. The Discussion and Analysis section of the proposed rule
stated that ``[t]he timing for reporting incidents involving PII or
SPII is consistent with OMB Memorandum M-07-16, Safeguarding Against
and Responding to the Breach of Personally Identifiable Information.''
The respondent advised that the OMB memorandum cited was superseded on
January 3, 2017, by OMB Memorandum M-17-12, Preparing for and
Responding to a Breach of Personally Identifiable Information. The
respondent recommended that DHS update the rule and proposed clause to
reflect the current OMB memorandum.
Response: DHS accepts the recommendation and has updated the
relevant portions of the rule to ensure consistency with OMB M-17-12,
Preparing for and Responding to a Breach of Personally Identifiable
Information.
10. Privacy Requirements
Comment: One respondent raised a concern regarding paragraph (b)(3)
of proposed clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information, which prohibits a contractor from maintaining SPII in its
invoicing, billing, and other recordkeeping systems. The respondent
stated that some recordkeeping systems may have appropriate protections
in place for safeguarding SPII while other systems may not. Because of
this gap, the respondent recommended that contractors be required to
protect SPII as required by law and be permitted to choose how best to
meet that obligation given the nature of their information systems. The
contractor also stated that the requirement would be prohibitive for an
institution of higher education accepting a contract.
Response: DHS does not accept the respondent's recommendation. DHS
has made a business decision based on previous incident response
activities that DHS contractors are not authorized to maintain the
Department's SPII in their invoicing, billing, and other recordkeeping
systems.
Comment: One respondent raised concerns with paragraph (f)(1) of
proposed clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information, which states that ``[t]he Contractor shall not proceed
with notification unless directed in writing by the Contracting
Officer.'' The respondent expressed concern that the SPII or PII also
might fall under the Health Insurance Portability and Accountability
Act (HIPAA) or other Federal breach reporting requirements. If so, the
respondent said, the language may present a conflict as to when and how
to notify someone of the breach of their personal information. The
respondent also stated that while it is unlikely that an institution
would be notifying individuals of breaches within 5 days of the
incident, an institution may choose to notify another government
official, such as the Secretary of Health and Human Services, if the
incident also constitutes a breach under HIPAA. Because there is no
other section of the clause clearly delineating the process to notify
other governmental bodies, as may be required by State or Federal law,
the respondent recommends revising the language as follows (revision in
bold type):
The Contractor may notify other state or federal government
agencies as required by law, but must copy the Contracting Officer
on any reports made to other federal or state agencies. The
Contractor shall not proceed with notification to individuals or
entities outside of the government unless directed in writing by the
Contracting Officer.
Response: DHS partially accepts the recommendation. Proposed clause
[[Page 40574]]
3052.204-7X, Safeguarding of Controlled Unclassified Information,
identifies requirements for reporting suspected or confirmed PII
incidents as required by internal DHS policy and OMB memorandum M-17-
12, Preparing for and Responding to a Breach of Personally Identifiable
Information. Such requirements are identified in the DHS Incident
Handling Guidance and are implemented in proposed clause 3052.204-7X,
Safeguarding of Controlled Unclassified Information. Nonetheless, this
clause was not intended to preempt contractors from reporting PII
incidents under any applicable law. To ensure this point is clear, the
statement was amended to add language allowing for compliance with
applicable laws. Also, it is important to note the Department's
timeline for notifying individuals pertains to when a contractor
receives a notification request from the contracting officer; it is not
related to the date the incident is reported.
Comment: One respondent recommended DHS consider extending the 5-
day notification requirement to affected individuals to enable
contractors to dedicate resources to remediation and investigation
activities in the initial days after a breach. The respondent stated
that the 5-day notification period is substantially shorter than most
State reporting obligations (30-45 days in many States). The respondent
asserted that many companies reflect these State time periods for
providing notifications to affected individuals and raised concerns
that the notification timeline will detract from a contractor's ability
to meaningfully respond to the incident.
Response: DHS does not accept the recommendation. The Department is
requiring that contractors notify the individual whose PII and/or SPII
was under the control of the contractor or resided in its systems at
the time of the incident not later than 5 business days after being
directed to notify individuals, unless otherwise approved by the
Contracting Officer (emphasis added). The 5-business day notification
period is only to address the time period in which the contractor must
prepare and mail the notification to the individual, after being
directed to do so by the Contracting Officer. It is completely
unrelated to the timing of incident notification.
Comment: One respondent raised concerns with paragraph (g), Credit
Monitoring Requirements, of proposed clause 3052.204-7X, Safeguarding
of Controlled Unclassified Information. The section requires the
contractor to provide credit monitoring services, including call center
services, if directed by the Contracting Officer, to any individual
whose PII or SPII was under the control of the contractor, or resided
in the information system, at the time of the incident for a period
beginning the date of the incident and extending not less than 18
months from the date the individual is notified. The respondent
recommends that contractor's internal information systems be excepted
from this requirement.
Response: DHS does not accept the recommendation to exclude
contractor information systems from the credit monitoring requirements
in clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information. The respondent is attempting to draw a distinction where
there is none. Unauthorized access to or disclosure of the Department's
PII on a contractor's internal information system has the same level of
importance and potential impact as it would on a Federal information
system. To the extent a contractor's internal information system
contains PII provided by the Government or generates PII on behalf of
the Government and is subject to a known or suspected incident that
impacts the PII, the contractor is responsible for providing
notification and credit monitoring if the Government determines it is
appropriate to do so. Any stance to the contrary is inconsistent with
the public interest and the mission of the Department.
Comment: One respondent stated that the HSAR should include a
requirement that the DHS procuring activity and the contractor
explicitly agree on whether and to what extent the contractor has
credit monitoring and call center obligations as part of a specific
contract. The respondent stated that the agreement should specifically
clarify whether these obligations extend to the contractor in relation
to GFE that the contractor operates in its own internal contractor
environment.
Response: Paragraphs (f), PII and SPII Notification Requirements,
and (g), Credit Monitoring Requirements, of proposed clause 3052.204-
7X, Safeguarding of Controlled Unclassified Information, state that
those requirements are only applicable when an incident involves PII or
SPII. To ensure that contractors understand when these requirements are
applicable, DHS is making these requirements a separate clause at
3052.204-7Y titled Notification and Credit Monitoring Requirements for
Personally Identifiable Information Incidents. The applicability of new
clause 3052.204-7Y, Notification and Credit Monitoring Requirements for
Personally Identifiable Information Incidents, is limited to
solicitations and contracts where a contractor will have access to PII.
This change ensures DHS contractors understand credit monitoring and
notification requirements are only applicable when the solicitation and
contract require contractor access to PII.
The decision to provide notification and credit monitoring services
is specific to each incident. As such, a blanket determination cannot
be made that these services will be required each time a known or
suspected incident is reported that impacts PII. The intent of the
clause is to ensure that the Government can timely notify individuals
impacted by an incident and provide them with credit monitoring
services if and when the Government determines it is appropriate to do
so. Paragraph (b)(2) of clause 3052.204-7Y, Notification and Credit
Monitoring Requirements for Personally Identifiable Information
Incidents, states that ``[a]ll determinations by the Department related
to notifications to affected individuals and/or Federal agencies and
related services (e.g., credit monitoring) will be made in writing by
the Contracting Officer.'' Therefore, the Contracting Officer will
advise contractors of their requirements depending on the incident on a
case-by-case basis. Depending on the severity of the incident, credit
monitoring may not be necessary in one instance, but may be in another.
11. Sanitization of Government and Government-Activity-Related Files
and Information
Comment: One respondent questioned the implementation of paragraph
(h), Certificate of Sanitization of Government and Government-Activity-
Related Files and Information, of proposed clause 3052.204-7X,
Safeguarding of Controlled Unclassified Information. The clause states
``the Contractor shall return all CUI to DHS and/or destroy it
physically and/or logically as identified in the contract.'' The
respondent asked where such information would be identified in the
contract, specifically whether the information would be identified in
the clause, the Statement of Work, or some other attachment. The
respondent also stated that it would be helpful to see the DHS language
that identifies how a contractor is to destroy CUI physically and/or
logically.
Response: DHS will identify in the Statement of Work, Statement of
Objectives, Performance Work Statement, or specification if and when
CUI is required to be returned,
[[Page 40575]]
physically and/or logically destroyed, or both. Clause 3052.204-7X,
Safeguarding of Controlled Unclassified Information, states that
destruction of the CUI ``shall conform to the guidelines for media
sanitization contained in NIST SP 800-88, Guidelines for Media
Sanitization.'' As such, no additional instruction on how to physically
or logically destroy CUI is necessary.
Comment: One respondent noted that the sanitization requirement is
contrary to data use rights typical for an institution of higher
education environment. The respondent stated that it is very common for
higher education institutions to maintain files and data associated
with research under U.S. Government contracts and grants that will be
used for follow-on research and that CUI may be resident on contractor
information systems. The respondent recommended that the language be
revised to indicate that the contractor must return or destroy the CUI
when it is specified by the individual contract. The respondent also
recommended DHS use the requirements under NIST SP 800-171, which
includes a media sanitization protocol.
Response: Proposed paragraph (h), Certificate of Sanitization of
Government and Government-Activity-Related Files and Information,
requires contractors to return all CUI to DHS and/or destroy it
physically and/or logically using the guidelines in NIST SP 800-88,
Guidelines for Media Sanitization. Contractors must also certify and
confirm sanitization and submit the certification to the COR and
contracting officer.
However, to ensure that media is returned and destroyed only when
the Government has determined it to be appropriate to do so, the
language is revised to state that CUI must be returned and/or destroyed
unless the contract states that return or destruction of CUI is not
required. Also, the media sanitization requirements in the clause do
not conflict with the media sanitization protocols in NIST SP 800-171
as the sanitization requirements in this publication are taken from
NIST SP 800-88.
12. Subcontractor Flow-Down Requirements
Comment: Multiple respondents expressed concern that paragraph (j),
Subcontracts, of proposed clause 3052.204-7X, Safeguarding of
Controlled Unclassified Information, requires contractors to ``insert
this clause in all subcontracts and require subcontractors to include
this clause in all lower-tier subcontracts.'' The respondent stated
that this language appears to require contractors to flow down the
clause to subcontractors that have no role in receiving or creating CUI
in performance of the contract. The respondent stated that this is
inconsistent with the applicability described in the preamble to the
proposed rule and recommended that the language be updated accordingly.
Response: DHS agrees with the recommendation. Proposed paragraph
(j) (now paragraph (g)), Subcontracts, has been revised to require
contractors flow down the clause only to subcontracts involving CUI.
13. Requirements Applicable to Educational Institutions
Comment: One respondent noted that paragraph (a) of proposed clause
3004.470-4 states that ``[n]either the basic clause nor its alternates
should ordinarily be used in contracts with educational institutions.''
The respondent stated that it would be helpful for DHS to indicate what
specific contract clauses they expect to use with educational
institutions, and what controls (such as, for example, those described
in NIST SP 800-171) would be required to be in place to protect CUI
information received pursuant to those clauses. The respondent
recommended that, in the case of contracts requiring an institution of
higher education to have access to CUI, or to collect or maintain CUI
on behalf of the agency, DHS use the baseline requirement of
``moderate'' security controls for CUI Basic information, as described
in NIST SP 800-171. The respondent stated that protections required in
addition to those present under CUI Basic should be implemented through
the CUI Registry's CUI Specified mechanisms to reflect the requirements
of applicable law, regulations, or Governmentwide policy requiring
supplemental controls, and should be specifically identified in the
governing contract. The respondent also requested that information that
does not meet the definition of CUI, such as vendor proprietary
information, be specifically identified in the contract, along with the
level of protection that must be afforded to such information. The
respondent stated that this approach would reduce the substantial
administrative and financial burdens to the institutions, funding
agencies, and their external partners and will allow institutions of
higher education to adopt the compliance solutions that work best with
their existing information systems and practices.
Response: The statement that ``[n]either the basic clause nor its
alternates should ordinarily be used in contracts with educational
institutions'' is only applicable to clause 3052.204-71, Contractor
Employee Access. It is also important to note that this statement does
not prohibit the Department from including the clause or its alternates
in contracts with educational institutions when it is determined to be
necessary. The recommendation that DHS should indicate what specific
contract clauses it expects to use and security controls required to be
in place to protect CUI when contracting with educational institutions
implies the Department should use a lesser information security
standard when contracting with these organizations. This is not the
case. The security requirements required are those discussed in this
rule. Additionally, information that is neither CUI nor classified is
not required to be protected.
As previously stated, Federal information systems, which include
contractor information systems operated on behalf of the agency, are
subject to the requirements of NIST SP 800-53. Generally speaking,
should the Government determine that a contractor information system is
not operated on its behalf, NIST SP 800-171 is applicable instead of
NIST SP 800-53. However, consistent with 32 CFR 2002.14(a)(3) and (g),
``[a]gencies may increase CUI Basic's confidentiality impact level
above moderate only internally, or by means of agreements with agencies
or non-executive branch entities (including agreements for the
operation of an information system on behalf of the agencies).''
Relatedly, 32 CFR 2002.4(c) states that agreements ``include, but are
not limited to, contracts, grants, licenses, certificates, memoranda of
agreement/arrangement or understanding, and information-sharing
agreements or arrangements.'' Therefore, DHS can require a
confidentiality impact level above moderate through agreements with
non-executive branch entities and does not need an update to the CUI
Registry to do so. DHS will determine if an information system is
Federal or nonfederal, perform the necessary risk assessment consistent
with Departmental policy, and identify the security controls
contractors must meet through an SRTM. The SRTM will be included in the
solicitation to ensure contractors clearly understand the security
requirements they must meet before responding to the solicitation.
Apart from using NIST SP 800-171 as a baseline for the security
controls, DHS does not anticipate a change to the
[[Page 40576]]
process of providing an SRTM and identifying the type(s) of CUI
provided or developed under a contract where nonfederal information
systems are used. However, this process cannot be fully defined until
the FAR CUI rule is finalized.
14. Self-Deleting Requirements
Comment: DHS invited comments on the self-deleting requirements in
proposed clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information. One respondent raised concerns with the use of self-
deleting requirements and requested that DHS consider the use of
alternates to help parties achieve certainty about their
responsibilities to implement the requirements of the clause.
Response: DHS agrees with the commenter that the use of alternates
will increase certainty among DHS contractors on their responsibilities
to comply with the requirements of clause 3052.204-7X, Safeguarding of
Controlled Unclassified Information. As such, DHS has: (1) made the
requirements of paragraph (c), Authority to Operate, Alternate I to the
basic clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information; and (2) made the requirements of paragraphs (f), PII and
SPII Notification Requirements, and (g), Credit Monitoring
Requirements, a separate clause at 3052.204-7Y titled Notification and
Credit Monitoring Requirements for Personally Identifiable Information
Incidents.
As a result of these changes, basic clause 3052.204-7X,
Safeguarding of Controlled Unclassified Information, is limited to the
following provisions: paragraphs (a), Definitions; (b), Handling of
Controlled Unclassified Information; (c), Incident Reporting
Requirements; (d), Incident Response Requirements; (e), Certification
of Sanitization of Government and Government-Activity-Related Files and
Information; (f), Other Reporting Requirements; and (g), Subcontracts.
Compliance with these requirements is mandatory regardless of the
information system type (i.e., Federal information system or nonfederal
information system). Alternate I to the basic clause is applicable when
Federal information systems, which include contractor information
systems operated on behalf of the agency, are used to collect, process,
store, or transmit CUI. New clause 3052.204-7Y, Notification and Credit
Monitoring Requirements for Personally Identifiable Information
Incidents, is applicable to solicitations and contracts where a
contractor will have access to PII. These changes were made to: (1)
ensure DHS contractors clearly understand the scope and applicability
of the various requirements contained in clause 3052.204-7X,
Safeguarding of Controlled Unclassified Information; (2) make clear
that the ATO requirements of the clause are only applicable to Federal
information systems, which include contractor information systems
operated on behalf of the agency; and (3) ensure DHS contractors
understand credit monitoring and notification requirements are only
applicable when the solicitation and contract require contractor access
to PII.
15. Applicability to Service Contracts
Comment: The proposed rule requested comments on making proposed
clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information, applicable to all service contracts with the understanding
that the clause would be self-deleting if it does not apply. One
respondent stated that it would be preferable for DHS to include the
clause only in those contracts where the clause is required, saying
there is no realistic self-deleting function.
Response: DHS agrees with the commenter and will not make the
requirements of the proposed rule applicable to all service contracts.
Clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information, will be included only in contracts where its requirements
are applicable.
16. Costs
Comment: One respondent noted that the cost data provided in the
proposed rule are based on the assumption of a contractor having a
centralized system base (for example, one information system, one
accounting system, a limited number of individuals with access, a
controlled physical environment). The respondent stated that
institutions of higher education are highly decentralized entities and
that costs increase significantly when implementing these requirements
over multiple systems, on a case-by-case basis, as would generally be
required in the decentralized higher education environment. The
respondent said the problem only is magnified when each agency adopts
separate and distinct requirements for the safeguarding of CUI, making
it imperative to have one standard to operate by, such as that proposed
under the NARA CUI rule.
Response: The information system security requirements of this rule
are focused on the requirements applicable to Federal information
systems. Requirements for Federal information systems are governed by
Federal Information Processing Standards (FIPS) Publication 199,
Standards for Security Categorization of Federal Information and
Information Systems; FIPS Publication 200, Minimum Security
Requirements for Federal Information and Information Systems; and NIST
SP 800-53, Security and Privacy Controls for Information Systems and
Organizations. These publications define the process by which the
Government categorizes a Federal information system as requiring low,
moderate, or high security controls to protect the confidentiality,
integrity, and availability of information that is processed, stored,
and transmitted by those systems/organizations and to satisfy a set of
defined security requirements. The commenter's approach displaces
compliance with these publications and requests that the Government
identify a single security standard for Federal information systems
without the benefit of the methodical and deliberate processes required
by each of these publications. This approach is unacceptable because it
is inconsistent with FISMA and NIST policy for Federal information
systems. Alternatively, the NARA CUI rule establishes baseline
information security requirements necessary to protect CUI Basic on
nonfederal information systems by mandating the use of NIST SP 800-171,
Protecting Controlled Unclassified Information in Nonfederal
Information Systems and Organizations, when establishing security
requirements to protect CUI's confidentiality on nonfederal information
systems. However, consistent with 32 CFR 2002.14(a)(3) and (g),
``[a]gencies may increase CUI Basic's confidentiality impact level
above moderate only internally, or by means of agreements with agencies
or non-executive branch entities (including agreements for the
operation of an information system on behalf of the agencies).''
The Department has not updated cost estimates to account for
institutions with multiple systems because, based on Federal
Procurement Data System (FPDS) data on unique vendors awarded contracts
under the most likely applicable Product and Service Codes (PSCs) in
Fiscal Year (FY) 2019 and FY
[[Page 40577]]
2020, fewer than 1 percent of affected entities are educational
institutions that could have multiple systems. Based on the estimated
population of affected entities (171), only one entity would be an
educational institution that might have multiple systems on average.\4\
In addition, DHS has no data on how many systems these entities use.
Other types of entities could have multiple systems. However, multiple
variables dictate the cost of an independent assessment (e.g.,
governance, decentralization of information systems, number of
information systems (i.e., size), complexity, categorization, and
documentation). As such, the number of information systems impacted by
the ATO is not the sole factor to consider when determining if there
will be increases to the cost of an independent assessment. While there
may be increases to the cost of an independent assessment when multiple
information systems are involved, such increases are largely dependent
upon the level of decentralization of the systems and variances in the
governance structure of each system. If the information systems have
the same or similar governance structures, the cost of the independent
assessment may not see significant cost impacts. Conversely, if there
is significant decentralization and variances in governance structures,
the cost of an independent assessment could increase. Such
determinations must be made on a case-by-case basis and take into
consideration all relevant factors that dictate the cost of an
independent assessment.
Therefore, DHS maintains the cost estimates from the proposed rule
but recognizes that these costs may be underestimates because FPDS data
do not indicate subcontractors that may have multiple systems, and
there is uncertainty on the prevalence of multiple systems for affected
entities beyond educational institutions and uncertainty related to the
cost implications to independent assessment of multiple systems.
IV. Statutory and Regulatory Requirements
A. Executive Orders 12866 and 13563
E.O. 12866 (Regulatory Planning and Review) and E.O. 13563
(Improving Regulation and Regulatory Review) direct agencies to assess
the costs and benefits of available regulatory alternatives and, if
regulation is necessary, to select regulatory approaches that maximize
net benefits (including potential economic, environmental, public
health, and safety effects; distributive impacts; and equity). E.O.
13563 emphasizes the importance of quantifying both costs and benefits,
of reducing costs, of harmonizing rules, and of promoting flexibility.
This rule has been designated a ``significant regulatory action,''
although not economically significant, under section 3(f) of E.O.
12866. Accordingly, the rule has been reviewed by OMB.
1. Outline of the Analysis
Section IV.A.2.a describes the need for the final rule, and section
IV.A.2.b describes the process used to estimate the costs of the rule
and the general inputs used, such as the number of affected entities.
Section IV.A.3 explains how the provisions of the final rule will
result in quantifiable costs and presents the calculations DHS used to
estimate them. In addition, section IV.A.3 describes the qualitative
costs, cost savings, and benefits of the final rule. Section IV.A.4
summarizes the estimated first year and 10-year total and annualized
costs of the final rule. Finally, section IV.A.5 presents the
regulatory alternatives considered.
2. Summary of the Analysis
DHS expects that the final rule will result in costs, cost savings,
and benefits. As shown in Exhibit 1, DHS estimates a range of costs to
capture uncertainty in cost data and, therefore, presents the estimated
impacts using a lower bound, upper bound, and primary estimate. The
primary estimate is calculated by taking the average of the upper bound
and lower bound estimates. DHS estimates the final rule will have an
annualized cost ranging from $15.32 million to $17.28 million at a
discount rate of 7 percent and a total 10-year cost that ranges from
$107.62 million to $121.37 million at a discount rate of 7 percent. DHS
was unable to quantify the cost savings or benefits associated with the
rule. However, the final rule is expected to produce cost savings by
reducing the time required to grant an ATO, reducing DHS time reviewing
and reissuing proposals because contractors are better qualified, and
reducing the time to identify a data breach. The final rule also
produces benefits by better notifying the public when their data are
compromised, requiring the provision of credit monitoring services so
that the public can better monitor and avoid costly consequences of
data breaches, and reducing the severity of incidents through timely
incident reporting.
Exhibit 1--Estimated Monetized Costs of the Final Rule
[$2020 millions]
----------------------------------------------------------------------------------------------------------------
Costs
-----------------------------------------------
Low Primary High
----------------------------------------------------------------------------------------------------------------
Undiscounted 10-Year Total...................................... $152.60 $162.32 $172.04
10-Year Total with Discount Rate of 3%.......................... 130.28 138.58 146.889
10-Year Total with Discount Rate of 7%.......................... 107.62 114.49 121.37
Annualized with Discount Rate of 3%............................. 15.27 16.25 17.22
Annualized with Discount Rate of 7%............................. 15.32 16.30 17.28
----------------------------------------------------------------------------------------------------------------
Exhibit 2 below provides a detailed summary of the final rule
provisions and their impacts. See the costs and cost savings
subsections of section IV.A.3 (Subject-by-Subject Analysis) below for
more detailed explanations.
---------------------------------------------------------------------------
\4\ Calculation: 171 ATO vendors * 0.72 percent of educational
institutions in the population = 1.2 ATO vendors with multiple
systems.
[[Page 40578]]
Exhibit 2--Summary of Provisions and Economic Impacts of the Final Rule
--------------------------------------------------------------------------------------------------------------------------------------------------------
Expressly required by
3052.204-7X, Safeguarding of statute, regulation, Statute, regulation,
controlled unclassified Requirement(s) or governmentwide or governmentwide Costs Benefits
information policy? policy
--------------------------------------------------------------------------------------------------------------------------------------------------------
(a) Definitions.................... Defines terms N/A................... Definitions for No costs associated
applicable to the adequate security, with definitions.
clause. Homeland Security
Agreement
Information,
Homeland Security
Enforcement
Information,
Operations Security
Information,
Personnel Security
Information, and
Sensitive Personally
Identifiable
Information are the
only terms that are
not defined in a
statute, regulation,
or Governmentwide
policy.
(b) Handling of Controlled (a) Requires (a) Yes............... (a) 32 CFR part 2002, (a) No new costs, is Unquantified cost
Unclassified Information. contractors to comply (b) No................ Controlled currently a savings to DHS from
with DHS policies and Unclassified regulatory clarified system
procedures for the Information (CUI). requirement. requirements, which
handling of CUI. (b) N/A--Internal DHS (b) Imposes no new reduce time to grant
(b) Limits requirement. cost. ATOs, identify
contractors' use or better qualified
redistribution of CUI bidders for DHS
to only those contracts, and
activities specified prevent DHS from
in the contract. putting contracts on
hold to reissue
requests for
proposals and
alternate
contractors.
(c) Ensures CUI (c) No................ (c) N/A--Internal DHS (c) Imposes no new
transmitted via email requirement. cost.
is protected by
encryption or
transmitted within
secure communications
systems.
(c) Incident Reporting Requirements Contractors and (a) Yes............... (a) OMB Memorandum M- (a, b) The primary (a, b, c) Timely
subcontractors must: 17-12 PRIV, estimate of reporting of
(a) Report all known Preparing for and reporting an incidents is
or suspected Responding to a incident to DHS is critical to prevent
incidents involving Breach of Personally $1,075 per incident. the impact of an
PII or SPII within 1 Identifiable DHS cannot quantify incident from
hour of discovery. Information, the aggregate total expanding, ensure
requires each agency of these costs incident response
to have a breach because DHS does not and mitigation
response plan that track the origin of activities are
includes timely security event undertaken quickly,
reporting. The DHS notices and is and ensure
Senior Agency therefore unable to individuals are
Official for Privacy determine how many timely notified of
determined that to security event the possible or
meet the timeliness notices external actual compromise of
requirements of M-17- contractors reported their PII. Reducing
12, the initial to their respective the time to identify
report must occur Component SOC or the a breach improves
within 1 hour of DHS Network the effectiveness of
discovery. Operations Security incident management,
Center. reduces false
positives, improves
triage by lowering
the cost of trivial
true positives,
minimizes mission
disruption and the
resulting impact on
revenue and
performance, and
reduces the cost of
investigation.
(b) Report all other (b) No, internal (b) N/A..............
incidents within 8 policy requirement.
hours of discovery.
(c) Ensure CUI (c) No................ (c) 32 CFR 2002.14, (c) No new costs, is
transmitted via email Safeguarding, currently a
is protected by paragraphs (c), regulatory
encryption or Protecting CUI under requirement.
transmitted within the control of an
secure communications authorized holder,
systems. and (g), Information
systems that
process, store, or
transmit CUI.
(d) Incident Response Requirements. (a) Requires (a) Yes............... (a) Federal (a) DHS components Standardizing
contractors and Information Security have included incident reporting
subcontractors to Modernization Act of differing language leads to more
provide full access 2014 (44 U.S.C. in contracts for proactive incident
and cooperation for 3551), OMB A-130, incident response, response,
all activities Managing Information while this provision potentially faster
determined by the as a Strategic creates consistency incident resolution,
Government to be Resource. across DHS and potential
required to ensure an components in reduction in the
effective incident language without scope and impact of
response. change to the incident
requirements. Since depending on the
DHS already conducts nature of the attack
this practice, these (i.e., fewer records
costs are part of breached).
the existing
baseline costs of
business.
[[Page 40579]]
(b) Allows the (b) No................ (b) N/A--Internal DHS (b) N/A--The
Government to obtain requirement. Government bears the
outside assistance to costs related to
assist in incident obtaining assistance
response activities. from external
parties for incident
response activities
(e.g., existing DHS
contracts,
interagency
agreements). This
cost is not new
because incident
response is a
longstanding
practice and DHS has
existing pre-
position contracts
that allow it to tap
services for
incident response.
(e) Certificate of Sanitization of Requires the Yes................... Paragraph (d) of HSAR No new costs are
Government and Government-Activity- contractor to return 3052.204-70, anticipated as this
Related Files and Information. all CUI to DHS and/or Security requirement simply
destroy it physically Requirements for replaces the pre-
and/or logically. Unclassified existing requirement
Destruction must Information in paragraph (d) of
conform to the Technology Resources. HSAR 3052.204-70,
guidelines for media Security
sanitization Requirements for
contained in NIST SP Unclassified
800-88, Guidelines Information
for Media Technology
Sanitization. Resources.
Additionally, any
costs associated
with this
requirement are
covered under the
initial regulation
for HSAR 3052.204-
70, Security
Requirements for
Unclassified
Information
Technology Resources.
(f) Other Reporting Requirements... Informs contractors No.................... N/A.................. No costs related to
that the incident DHS are anticipated
reporting required by with this
this clause does not requirement as those
rescind the costs would be
contractor's covered under the
responsibility for ``other applicable
other incident statutory or
reporting pertaining regulatory
to its unclassified requirements, or
information systems other U.S.
under other clauses Government
that may apply to its requirements''.
contract(s), or as a
result of other
applicable statutory
or regulatory
requirements, or
other U.S. Government
requirements.
(g) Subcontracts................... Requires the In part. Prime See above and below..
contractor to insert contractors are
this clause in all required to flow down
subcontracts and the text of this
require clause to applicable
subcontractors to subcontracts. Many of
include this clause the clause
in all lower tier requirements stem
subcontracts when from a statute,
subcontractor regulation, or
employees will have Governmentwide policy
access to CUI; CUI as indicated above
will be collected or and below.
maintained on behalf
of the agency by a
subcontractor; or a
subcontractor
information system(s)
will be used to
process, store, or
transmit CUI.
[[Page 40580]]
(h) Authority to Operate........... (a) Security (a) Yes............... (a) Federal (a) No new costs are
Authorization. Information Security anticipated as this
Modernization Act of requirement simply
2014 (44 U.S.C. replaces the pre-
3551), OMB A-130, existing requirement
Managing Information in paragraphs (a),
as a Strategic (b), and (e) of HSAR
Resource, OMB 3052.204-70,
Memorandum M-22-01, Security
Improving Detection Requirements for
of Cybersecurity Unclassified
Vulnerabilities and Information
Incidents on Federal Technology Resources.
Government Systems As part of the
through Endpoint existing paragraphs
Detection and (a) and (e) of HSAR
Response, NIST SP 3052.204-70,
800-53, Revisions 4 Security
and 5, Security and Requirements for
Privacy Controls for Unclassified
Information Systems Information
and Organizations, Technology
and paragraphs (a) Resources, vendors
and (e) of HSAR are required to
3052.204-70, maintain full-time
Security equivalent (FTE)
Requirements for oversight that is
Unclassified estimated to cost
Information $209,008 per vendor.
Technology Resources.
(b) Independent (b) No................ (b) N/A.............. (b) $71.28 million at Independent
Assessment. a 7% discount rate assessment provides
associated with the an objective measure
cost of an of compliance with
independent third security and privacy
party validating the controls. Benefits
security and privacy of using a third
controls in place party to perform an
for the information independent
system(s); reviewing assessment extend to
and analyzing the SA contractor because
package; and they can use results
reporting on to demonstrate
technical, cybersecurity
operational, and excellence for
management level customers.
deficiencies.
(c) ATO Renewal....... (c) Yes............... (c) See response at (c) No new costs are
paragraph (a). anticipated as this
requirement simply
replaces the pre-
existing requirement
in paragraphs (a),
(b), and (e) of HSAR
3052.204-70,
Security
Requirements for
Unclassified
Information
Technology
Resources.
Additionally, any
costs associated
with this
requirement are
covered under the
initial regulation
for HSAR 3052.204-
70, Security
Requirements for
Unclassified
Information
Technology Resources.
(d) Security Review... (d) No................ (d) N/A.............. (d) $159,924 at a 7% (d) Security review
discount rate from a is an important
new cost to the mechanism for the
government to Department to
conduct the security consistently ensure
reviews and to the contractors are and
contractor for any remain compliant
interruptions to with the security
normal operations requirements
caused by the contained in their
security review. contracts.
(e) Federal Reporting (e) Yes............... (e) Federal (e) No new costs are
and Continuous Information Security anticipated as this
Monitoring Modernization Act of requirement simply
Requirements. 2014 (44 U.S.C. replaces the pre-
3551), OMB A-130, existing requirement
Managing Information in paragraphs (a)
as a Strategic and (e) of HSAR
Resource, OMB 3052.204-70,
Memorandum M-14-03, Security
Enhancing the Requirements for
Security of Federal Unclassified
Information and Information
Information Systems, Technology
and NIST SP 800-53, Resources.
Revisions 4 and 5, Additionally, any
Security and Privacy costs associated
Controls for with this
Information Systems requirement are
and Organizations. covered under the
initial regulation
for HSAR 3052.204-
70, Security
Requirements for
Unclassified
Information
Technology Resources.
--------------------------------------------------------------------------------------------------------------------------------------------------------
[[Page 40581]]
--------------------------------------------------------------------------------------------------------------------------------------------------------
Expressly required by
3052.204-7Y, Safeguarding of statute, regulation, Statute, regulation,
controlled unclassified Requirement(s) or governmentwide or governmentwide Costs Benefits
information policy? policy
--------------------------------------------------------------------------------------------------------------------------------------------------------
(a) Definitions.................... Defines terms No.................... Definition for No costs associated
applicable to the Sensitive Personally with definition.
clause. Identifiable
Information is not
defined in a
statute, regulation,
or Governmentwide
policy.
(b) PII and SPII Notification Requires the Yes................... OMB Memorandum M-17- Estimated costs of Benefit of improved
Requirements. contractor, when 12, Preparing for notification are notification to the
directed, to notify and Responding to a $2.72 per year per public regarding
any individual whose Breach of Personally individual. DHS breaches of their
PII or SPII was Identifiable cannot quantify an data, allowing
either under the Information. aggregate total of better self-
control of the this cost due to the monitoring for
contractor or resided rule because DHS identity theft. Such
in an information does not track at notification affords
system under control the Department level individuals the
of the contractor at the number of opportunity to take
the time the incident notifications steps to minimize
occurred. required on either any harm associated
an annual or per- with unauthorized or
incident basis. fraudulent activity.
Note: These costs
are discretionary as
the Government may
or may not choose to
have the contractor
perform these
services.
(c) Credit Monitoring Requirements. Requires the Yes................... OMB Memorandum M-17- Credit monitoring is Credit monitoring
contractor, when 12, Preparing for estimated to cost services can be
directed, to provide and Responding to a $6.53 per year per particularly
credit monitoring Breach of Personally individual. DHS beneficial to the
services to Identifiable cannot quantify affected public as
individuals whose PII Information. these costs because they can assist
or SPII was under the it does not have individuals in the
control of the estimates for the early detection of
contractor, or population of identity theft as
resided in the individuals well as notify
information system at affected. Note: individuals of
the time of the These costs are changes that appear
incident, for a discretionary as the in their credit
period beginning the Government may or report, such as
date of the incident may not choose to creation of new
and extending not have the contractor accounts, changes to
less than 18 months perform these their existing
from the date the services. accounts or personal
individual is information, or new
notified. inquiries for
credit. Such
notification affords
individuals the
opportunity to take
steps to minimize
any harm associated
with unauthorized or
fraudulent activity.
--------------------------------------------------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------------------
Expressly required by
3052.204-71, Contractor employee statute, regulation, Statute, regulation,
access Requirement(s) or governmentwide or governmentwide Costs Benefits
policy? policy
--------------------------------------------------------------------------------------------------------------------------------------------------------
(a) Controlled Unclassified Provides definition of N/A................... Definitions for N/A--No new costs are
Information. CUI. Homeland Security anticipated with the
Agreement changes to this
Information, clause as the
Homeland Security changes are merely
Enforcement updates to
Information, terminology and
Operations Security clarifying edits to
Information, ensure complete
Personnel Security understanding of pre-
Information, and existing
Sensitive Personally requirements.
Identifiable Additionally, the
Information are the costs associated
only terms that are with this clause are
not defined in a covered under the
statute, regulation, initial regulation
or Governmentwide for HSAR 3052.204-
policy. 71, Contractor
Employee Access.
(b) Information Resources.......... Provides definition of N/A................... Definition is taken No costs associated
information resources. from statute. with definitions.
(c) Background Investigation Identifies background Yes................... Paragraph (c) of HSAR No new costs, is
Requirements. investigation 3052.204-71, currently a
requirements. Contractor Employee regulatory
Access. Note: requirement.
Paragraph was
updated in final
rule to replace the
term ``IT
resources'' with
``information
resources''.
(d) Prohibition.................... Identifies Yes................... Paragraph (d) of HSAR No new costs, is
circumstances where 3052.204-71, currently a
the contracting Contractor Employee regulatory
officer can prohibit Access. Note: No requirement.
individuals from change from original
working under a text.
contract.
[[Page 40582]]
(e) CUI Disclosure and Training Identifies limitation Yes................... Paragraph (e) of HSAR No new costs, is
Requirements. on disclosure of CUI 3052.204-71, currently a
and training Contractor Employee regulatory
requirements. Access. Note: requirement.
Replaced references
to ``sensitive
information'' with
``CUI'' and
clarified the timing
for completion of
training discussed
in the original
clause.
(f) Subcontract Requirements....... Identifies when clause Yes................... Paragraph (f) of HSAR No new costs, is
must be included in 3052.204-71, currently a
subcontracts. Contractor Employee regulatory
Access. Note: requirement. Note:
Replaced reference The change in
to ``sensitive terminology from
information'' with ``sensitive
``CUI'' and information'' to
``resources'' with ``CUI'' does not
``information change the
resources''. requirement for
safeguarding. This
change was made
solely to comply
with E.O. 13556,
Controlled
Unclassified
Information, and its
implementing
regulation at 32 CFR
part 2002. The
type(s) of
information DHS
protected under
``sensitive
information'' and
now under ``CUI'' is
not changed.
Additionally, cost
impacts associated
with Governmentwide
implementation of
the CUI Program will
be captured under
the Federal
Acquisition
Regulation
rulemaking that is
currently in
progress.
(g) Training and Non-Disclosure Identifies that Yes................... Paragraph (g) of HSAR No new costs, is
Agreement Requirements. contractors must 3052.204-71, currently a
complete a security Contractor Employee regulatory
briefing, additional Access. Note: Added requirement.
training for specific language to clarify
categories of CUI (if that additional
identified in the training for
contract), and sign a specific categories
nondisclosure of CUI from
agreement before paragraph (e) will
receiving access to be identified in the
information resources contract.
under the contract.
(h) Contractor Access to Identifies Yes................... Paragraph (h) of HSAR No new costs, already
Information Resources. restrictions on 3052.204-71, a regulatory
access to DHS Contractor Employee requirement.
information resources Access. Note:
and consequences for Replaced reference
attempting to access to ``information
information resources technology
that are not resources'' with
authorized under the ``information
contract. resources''.
(i), (j), (k), and (l)............. No change from Yes................... Paragraphs (i), (j), No new costs, is
original clause text. (k), and (l) of HSAR currently a
3052.204-71, regulatory
Contractor Employee requirement.
Access. Note: No
change from original
clause text.
--------------------------------------------------------------------------------------------------------------------------------------------------------
a. Need for Regulation
DHS has determined that rulemaking is needed to implement security
and privacy measures to safeguard CUI and facilitate improved incident
reporting to DHS. The final rule enables DHS to identify, remediate,
mitigate, and resolve incidents when they occur, not necessarily
completely prevent them. DHS understands that there is no ``true'' way
to completely prevent an incident from occurring. However, these
measures are intended to decrease the likelihood of occurrence with
full knowledge that there is no such thing as an ``unhackable'' system.
The final rule adds a new clause at 3052.204-7X, Safeguarding of
Controlled Unclassified Information, that ensures adequate protection
of CUI. That new clause (1) identifies CUI handling requirements and
security processes and procedures applicable to Federal information
systems, which include contractor information systems operated on
behalf of the agency; (2) identifies incident reporting requirements,
including timelines and required data elements, inspection provisions,
and post-incident activities; and (3) requires certification of
sanitization of government and government-activity-related files and
information. Additionally, new clause 3052.204-7Y, Notification and
Credit Monitoring Requirements for Personally Identifiable Information
Incidents, requires contractors to have in place procedures and the
capability to notify and provide credit monitoring services to any
individual whose PII or SPII was under the control of the contractor or
resided in the information system at the time of the incident.
These measures are necessary because of the urgent need to protect
CUI and
[[Page 40583]]
respond appropriately when DHS contractors experience incidents with
DHS information. Persistent and pervasive high-profile breaches of
Federal information continue to demonstrate the need to ensure that
information security protections are clearly, effectively, and
consistently addressed in contracts. This final rule strengthens and
expands existing HSAR language to ensure adequate security when
contractor and/or subcontractor employees will have access to CUI; CUI
will be collected or maintained on behalf of the agency; or Federal
information systems, which include contractor information systems
operated on behalf of the agency, are used to collect, process, store,
or transmit CUI.
b. Analysis Considerations
In accordance with the regulatory analysis guidance articulated in
OMB's Circular A-4 and consistent with DHS's practices in previous
rulemakings, this regulatory analysis focuses on the likely
consequences of the final rule (i.e., costs and cost savings that
accrue to entities affected) relative to the baseline (existing
regulations, statutes, and guidance).
This analysis covers 10 years (2023 through 2032) to ensure it
captures major costs and cost savings that accrue over time. DHS
expresses all quantifiable impacts in 2020 dollars and uses discount
rates of 3 and 7 percent, pursuant to Circular A-4.\5\ The impacts of
this final rule are estimated relative to the existing baseline (i.e.,
current requirements for security and training for contractors). DHS
estimates impacts using a range of potential costs and cost savings to
account for uncertainty and, therefore, presents the estimated impacts
using a lower bound, upper bound, and primary estimate. The primary
estimate is calculated by taking the average of the upper bound and
lower bound estimates. DHS was unable to quantify some costs, cost
savings, and benefits of the final rule. DHS describes them
qualitatively in section IV.A.3 (Subject-by-Subject Analysis).
---------------------------------------------------------------------------
\5\ All present value calculations assume a base year of 2022.
---------------------------------------------------------------------------
(1) Analysis Baseline
The final rule primarily codifies and updates the HSAR regulation
to clarify, streamline, and include requirements from existing
regulations, including those required by:
Existing HSAR 3052.204-70, Security Requirements for
Unclassified Information Technology Requirements
32 CFR part 2002, Controlled Unclassified Information (CUI)
Federal Information Security Modernization Act of 2014 (44
U.S.C. 3551)
NIST SP 800-53, Recommended Security and Privacy Controls for
Federal Information Systems and Organizations, and NIST SP 800-88,
Guidelines for Media Sanitization (Appendix G)
A more comprehensive discussion of existing requirements is in section
IV.A.3 (Subject-by-Subject Analysis). In addition, the prior Exhibit 2
maps provisions of the final rule to relevant existing requirements.
The analysis of this final rule estimates impacts relative to a
baseline assuming no regulatory action. The baseline represents the
agency's best assessment of what the world would be like absent this
action. A key difference in the impacts estimated in this final rule
compared to the proposed rule is that the proposed rule did not perform
an analysis incremental to a baseline of existing regulations. Instead,
the proposed rule presented estimates of the costs of activities
covered by provisions, regardless of whether those activities were new
requirements from the rulemaking. In particular, two of the larger cost
estimates (FTE oversight and continuous monitoring) presented in the
proposed rule were for activities already required by existing
regulations and are discussed below.
(a) Baseline Cost of Continuous Monitoring
Alternate I to clause 3052.204-7X, Authority to Operate, mandates
that contractors operating Federal information systems comply with
information system continuous monitoring requirements. FISMA
regulations (44 U.S.C. 3551, et seq.) already require continuous
monitoring and vendors therefore historically have incurred costs
associated with continuous monitoring equipment and labor costs for
setup, maintenance, and operation of continuous monitoring.\6\
Consistent with the proposed rule analysis, internal DHS data and cost
information from vendors indicate the cost for vendors complying with
continuous monitoring requirements to acquire continuous monitoring
equipment ranges from a lower bound of $82,034 to an upper bound of
$376,107, with a primary estimate of $229,071.\7\ ATO vendors already
are required by FISMA to incur this one-time cost.
---------------------------------------------------------------------------
\6\ See 44 U.S.C. 3551.
\7\ The final rule estimates of obtaining continuous monitoring
equipment are consistent with the proposed rule (Safeguarding of
Controlled Unclassified Information (HSAR Case 2015-001) [Docket No.
DHS-2017-0006]) estimates and adjusted to 2020 dollars from 2016
dollars using the GDP deflator (Bureau of Economic Analysis (BEA)
NAIPA Table 1.1.9 Implicit Price Deflators for Gross Domestic
Product: https://apps.bea.gov/iTable/iTable.cfm?reqid=19&step=2#reqid=19&step=2&isuri=1&1921=survey).
---------------------------------------------------------------------------
ATO vendors that are complying with continuous monitoring
requirements also have labor in place to operate information systems
and perform continuous monitoring. Internal DHS historical data and
cost information from vendors indicate that labor costs for initial
setup and operation of information systems to perform continuous
monitoring range from a lower bound of $50,506 to an upper bound of
$69,848 per year, with a primary estimate of $59,827.\8\ This labor
cost occurs every 3 years when there is ATO renewal and systems need to
be initialized. ATO vendors complying with existing continuous
monitoring requirements also have an annual cost to maintain systems
that assist with continuous monitoring. DHS estimates this cost ranges
from a lower bound of $6,448 to an upper bound of $19,343, with a
primary estimate of $12,895.\9\
---------------------------------------------------------------------------
\8\ Estimates were developed using cost information from
multiple vendors whose contracts with DHS include similar continuous
monitoring requirements. The final rule estimates of labor cost to
perform continuous monitoring are consistent with the proposed rule
estimates and adjusted to 2020 dollars using the GDP deflator.
\9\ The final rule estimates of labor cost to maintain systems
that assist with continuous monitoring are consistent with the
proposed rule estimates and adjusted to 2020 dollars using the GDP
deflator.
---------------------------------------------------------------------------
(b) Baseline Cost of FTE Oversight
Meeting the requirements of the final rule requires overseeing
compliance of individuals who have received security authorization, as
already required by FISMA. The final rule maintains this requirement in
Alternate I to clause 3052.204-7X, Authority to Operate. The costs
associated with this FTE oversight stem directly from a vendor's pre-
existing information security posture. Vendors, particularly those
operating in the IT space, have been complying with these requirements
for years. In these instances, the vendors have the existing
infrastructure (i.e., hardware, software, and personnel) to implement
these requirements and implementation costs are lower. The same is also
true for many vendors that provide professional services to the
Government and use IT to provide those services. Alternatively, vendors
with less experience and capability in this area procure the hardware
and software necessary to implement these requirements, as well as the
labor costs associated with
[[Page 40584]]
personnel needed to implement and oversee these requirements. Costs
vary depending on the hardware and software selected and the skill set
each contractor requires in its employee(s) responsible for ensuring
compliance with these requirements.
DHS determined the costs associated with FTE oversight of the final
rule requirements by requesting cost information from multiple vendors.
These data indicated that the cost of FTE oversight ranges from a lower
bound of $69,848 to an upper bound of $348,168, with a primary estimate
of $209,008.\10\ These costs decline as vendors become more
sophisticated and efficient.
---------------------------------------------------------------------------
\10\ The final rule estimates of FTE oversight are consistent
with the proposed rule estimates and adjusted to 2020 dollars using
the GDP deflator.
---------------------------------------------------------------------------
(2) Estimated Number of Vendors Impacted by the Final Rule
The final rule will apply to DHS contractors that require access to
CUI, collect or maintain CUI on behalf of the Government, or operate
Federal information systems, which include contractor information
systems operated on behalf of the agency that collect, process, store,
or transmit CUI. DHS estimated the number of vendors subject to the
final rule using FY 2019 and FY 2020 Federal Procurement Data System
(FPDS) data on unique vendors awarded contracts under the most likely
applicable Product and Service Codes (PSCs) in FY 2019 and FY 2020.
FPDS data indicated that 3,030 unique vendors were awarded contracts
under the most likely applicable PSCs in FY 2019 and 3,203 in FY 2020,
including small business. However, not all contractors will be subject
to clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information.
(a) Population of Alternate I to Clause 3052.204-7X, Safeguarding of
Controlled Unclassified Information
DHS estimated that approximately 5.5 percent of the unique vendors
identified as being awarded contracts under the most likely applicable
PSCs in FY 2019 and FY 2020 would be subject to the requirements of
Alternate I to clause 3052.204-7X, Safeguarding of Controlled
Unclassified Information, and will be required to respond to ATO
requirements and submit SA documentation.\11\ DHS calculated the number
of vendors subject to Alternate I to clause 3052.204-7X, Authority to
Operate, by multiplying the number of unique vendors awarded contracts
under the most likely applicable PSCs in FY 2019 (3,030 unique vendors)
and FY 2020 (3,203 unique vendors) by 5.5 percent. DHS estimated that
in FY 2019, 167 vendors would be subject to Alternate I to clause
3052.204-7X,\12\ and in FY 2020, 176 vendors would be subject to
Alternate I to clause 3052.204-7X.\13\ DHS then took a 2-year average
of the 167 and 176 figures to estimate that approximately 171 vendors
will be subject to Alternate I to clause 3052.204-7X.\14\ DHS presents
the ATO population estimate in Exhibit 3 along with the population
estimate used in the NPRM.
---------------------------------------------------------------------------
\11\ The estimate of the number of entities to which the rule
will apply was established by reviewing FPDS data for FY 2019 and FY
2020, internal DHS contract data, experience with similar
safeguarding requirements used in certain DHS contracts, and the
most likely applicable PSCs. Additionally, the estimate was reviewed
and validated by the cognizant departmental subject-matter experts
(SMEs) for information security, information system security, and
privacy. These SMEs have extensive experience in the requirements of
these clauses and their applicability and current implementation in
DHS contracts. The data review identified 3,030 unique contractors
that were awarded contracts under the most likely applicable PSCs in
FY 2019 and 3,203 in FY 2020, including small and large businesses.
However, not all contractors awarded contracts under the most likely
applicable PSCs are subject to clauses 3052.204-7X, Safeguarding of
Controlled Unclassified Information, and 3052.204-7Y, Notification
and Credit Monitoring Requirements for Personally Identifiable
Information Incidents. A number of factors determine the
applicability of the clauses, and a case-by-case analysis of each
action is required to determine the applicability of the clauses.
Further, the clauses are delineated by those entities that are
granted access to CUI but information systems will not be used to
process, store, or transmit CUI, and those that are required to meet
the ATO requirements because Federal information systems will be
used to process, store, or transmit CUI.
\12\ Calculation: 3,030 unique vendors subject to Alternate I to
clause 3052.204-7X in FY 2019 * 5.5 percent of PSCs affected by the
rule = 166.65 vendors.
\13\ Calculation: 3,203 unique vendors subject to Alternate I to
clause 3052.204-7X in FY 2020 * 5.5 percent of PSCs affected by the
rule = 176.16 vendors.
\14\ Calculation: (166.65 vendors subject to Alternate I to
clause 3052.204-7X in FY 2019 + 176.16 vendors subject to Alternate
I to clause 3052.204-7X in FY 2020)/2 = 171.4 vendors (the 2-year
average number of vendors subject to Alternate I to clause 3052.204-
7X).
Exhibit 3--Change to ATO Population Compared to NPRM
------------------------------------------------------------------------
Component NPRM Final rule
------------------------------------------------------------------------
ATO vendors subject to the rule....... 137 171
------------------------------------------------------------------------
(b) Population of Paragraphs (b), (c), (d), (e), and (f) of Clause
3052.204-7X, Safeguarding of Controlled Unclassified Information
Based on FY 2019 and FY 2020 data, DHS estimated that approximately
11 percent of the unique vendors identified as being awarded contracts
under the most likely applicable PSCs in FY 2019 and FY 2020 would be
subject to the requirements of paragraphs (b), (c), (d), (e), and (f)
of clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information.\15\ DHS calculated the number of vendors subject to
paragraphs (b), (c), (d), (e), and (f) by multiplying the number of
unique vendors awarded contracts under the most likely applicable PSCs
in FY 2019 (3,030 unique vendors) and FY 2020 (3,203 unique vendors) by
11 percent. DHS estimated that in FY 2019, 333 vendors would be subject
to paragraphs (b), (c), (d), (e), and (f),\16\ and in FY 2020, 352
vendors would be subject to paragraphs (b), (c), (d), (e), and (f).\17\
DHS then took a 2-year average of the 333 and 352 figures to estimate
that approximately 343 vendors will be subject to paragraphs (b), (c),
(d), (e), and (f).\18\ DHS presents the non-ATO population estimates in
Exhibit 4 along with the non-ATO population estimates used in the NPRM.
---------------------------------------------------------------------------
\15\ The estimate of the number of entities to which the rule
will apply was established by reviewing FPDS data for FY 2019 and FY
2020, internal DHS contract data, experience with similar
safeguarding requirements used in certain DHS contracts, and the
most likely applicable PSCs. Additionally, the estimate was reviewed
and validated by the cognizant departmental SMEs for information
security, information system security, and privacy. See footnote 11
for more detail.
\16\ Calculation: 3,030 unique vendors subject to paragraphs
(b), (c), (d), (e), and (f) in FY 2019 * 11 percent of PSCs affected
by the rule = 333.3 vendors.
\17\ Calculation: 3,203 unique vendors subject to paragraphs
(b), (c), (d), (e), and (f) in FY 2019 * 11 percent of PSCs affected
by the rule = 352.33 vendors.
\18\ Calculation: (333.30 vendors subject to paragraphs (b),
(c), (d), (e), and (f) in FY 2019 + 352.33 vendors subject to
paragraphs (b), (c), (d), (e), and (f) in FY 2020)/2 = 342.82
vendors (the 2-year average number of vendors subject to paragraphs
(b), (c), (d), (e), and (f)).
[[Page 40585]]
Exhibit 4--Changes to Non-ATO Population Compared to NPRM
------------------------------------------------------------------------
Component NPRM Final rule
------------------------------------------------------------------------
Non-ATO prime contractors subject to the 274 343
rule...................................
Non-ATO subcontractors subject to the 411 514
rule...................................
------------------------------------------------------------------------
(3) Changes to Component Costs Relative to NPRM
Under the proposed rule, DHS requested cost information from
vendors whose contracts with DHS include requirements similar to this
final rule; obtained cost input from FedRAMP, for which DHS is a
participant; reviewed the Congressional Budget Office Cost Estimate for
the Personal Data Protection and Breach Accountability Act of 2011;
reviewed pricing from the Identity Protection Services (IPS) blanket
purchase agreements recently awarded by the General Services
Administration (GSA); and reviewed internal price data from DHS's
Managed Compliance Services and notification and credit monitoring
services contracts. DHS determined that the majority of these costs are
unchanged from the proposed rule and, therefore, adjusts them to 2020
dollars.\19\ For two costs, DHS obtained updated estimates: the cost of
notification of incidents to individuals whose PII was compromised and
the cost of credit monitoring services. These costs are discussed in
more detail in the subject-by-subject analysis. For this final rule
analysis, DHS presents a low, high, and primary estimate to capture
uncertainty in the costs to affected entities. Exhibit 5 summarizes the
costs in the NPRM and this final rule.
---------------------------------------------------------------------------
\19\ The values used in the NPRM adjusted to 2020 dollars using
a GDP deflator of 105.736 for 2016 and a GDP deflator of 113.623 for
2020. Bureau of Economic Analysis: Table 1.1.4. Price Indexes for
GDP. https://apps.bea.gov/iTable/iTable.cfm?reqid=19&step=2#reqid=19&step=2&isuri=1&1921=survey.
Exhibit 5--Summary of Changes to Component Costs \t\
----------------------------------------------------------------------------------------------------------------
NPRM ** Final rule
Component cost ------------------------------------------------------------
Low High Low Primary High
----------------------------------------------------------------------------------------------------------------
Independent assessment ($ per entity).............. $123,615 $150,000 * $132,836 * $147,012 * $161,189
Equipment to set up continuous monitoring system ($ 76,340 350,000 * 82,034 * 229,071 * 376,107
per entity).......................................
Labor to perform continuous monitoring ($ per 47,000 65,000 * 50,506 * 59,827 * 69,848
entity)...........................................
Maintain continuous monitoring equipment ($ per 6,000 18,000 * 6,448 * 12,895 * 19,343
entity)...........................................
FTE oversight ($ per entity)....................... 65,000 324,000 * 69,848 * 209,008 * 348,168
Reporting an incident to DHS ($ per incident)...... 500 1,500 * 537 * 1,075 * 1,612
Notification of incident to individuals ($ per 1.03 4.60 0.84 2.72 4.60
impacted individual)..............................
Credit monitoring services ($ per impacted 60 260 4.16 6.53 8.90
individual).......................................
----------------------------------------------------------------------------------------------------------------
\t\ The table includes costs that were presented in the proposed rule that are considered baseline costs in the
final rule, including continuous monitoring and FTE oversight.
* Value is unchanged but is inflated to 2020 dollars.
** The proposed rule did not use a primary estimate.
3. Subject-by-Subject Analysis
DHS's analysis below covers the estimated costs and cost savings of
the final rule relative to the existing baseline. DHS emphasizes that
many of the provisions in the final rule are existing requirements in
the statute, regulations, or regulatory guidance and presents existing
requirements related to each provision in the previous Exhibit 2. The
final rule codifies these practices under one set of rules; therefore,
they are not considered ``new'' burdens resulting from the final rule.
This rule addresses the safeguarding requirements specified in:
FISMA, which (1) provides a comprehensive framework for
ensuring the effectiveness of information security controls over
information resources that support Federal operations and assets; (2)
recognizes the highly networked nature of the current Federal computing
environment and provides effective governmentwide management and
oversight of the related information security risks, including
coordination of information security efforts throughout the civilian,
national security, and law enforcement communities; (3) provides for
development and maintenance of minimum controls required to protect
Federal information and information systems; and (4) provides a
mechanism for improved oversight of Federal agency information security
programs, including through automated security tools to continuously
diagnose and improve security.
NIST SP 800-53, Recommended Security and Privacy Controls
for Federal Information Systems and Organizations, and NIST SP 800-88,
Guidelines for Media Sanitization (Appendix G). Pursuant to FISMA, NIST
is responsible for developing information security standards and
guidelines, including minimum requirements for Federal information
systems (Note: Such standards and guidelines do not apply to national
security systems without the express approval of appropriate Federal
officials exercising policy authority over such systems.). NIST SP 800-
53 sets forth information security requirements contractors operating a
Federal information system must meet prior to collecting, processing,
storing, or transmitting CUI in that information system. NIST SP 800-88
assists organizations and system owners in making practical
sanitization decisions based on the categorization of confidentiality
of their information.
OMB Circular A-130, Managing Information as a Strategic
Resource, which establishes general policy for the planning, budgeting,
governance, acquisition, and management of Federal information,
personnel, equipment, funds, IT resources, and supporting
infrastructure and services. The Circular's appendices include
responsibilities for protecting Federal information resources and
managing PII.
[[Page 40586]]
OMB Memorandum M-17-12, Preparing for and Responding to a
Breach of Personally Identifiable Information, which sets forth the
policy for Federal agencies to prepare for and respond to a breach of
PII, including a framework for assessing and mitigating the risk of
harm to individuals potentially affected by a breach, as well as
guidance on whether and how to provide notification and services to
those individuals.
OMB Memorandum M-20-04, Fiscal Year 2019-2020 Guidance on
Federal Information Security and Privacy Management Requirements, which
in accordance with FISMA provides agencies with FY 2020 reporting
guidance and deadlines.
E.O. 13556, Controlled Unclassified Information, and its
implementing regulation at 32 CFR part 2002, which defines the
executive branch's CUI Program and establishes policy for designating,
handling, and decontrolling information that qualifies as CUI and
standardizes the way the executive branch handles information that
requires protection under laws, regulations, or Governmentwide policies
but that does not qualify as classified information.
DHS considered both the costs and benefits associated with the
requirements of clause 3052.204-7X, Safeguarding of Controlled
Unclassified Information, and clause 3052.204-7Y, Notification and
Credit Monitoring Requirements for Personally Identifiable Information
Incidents, specifically those requirements believed to be of most
import to industry, such as the requirements to: obtain an independent
assessment, perform continuous monitoring, report all known and
suspected incidents, provide notification and credit monitoring
services in the event an incident impacts PII, document sanitization of
Government and Government-activity-related files and information, as
well as ensure overall compliance with the requirements of the clauses.
Accordingly, the regulatory analysis focuses on the costs and cost
savings that can be attributed exclusively to the new requirements in
the final rule.
The analysis assumes that not all efforts (e.g., retrieving and
retaining records) are attributed solely to this new rule; only those
actions resulting from this rule that are not customary to normal
business practices are attributed to this estimate. There are several
instances of requirements of the final rule that are not new
requirements; for example, the analysis does not include revisions to
clause 3052.204-71, Contractor Employee Access, as the revisions to
this clause are primarily clarifying in nature (i.e., updates to
terminology). Regarding the training requirements discussed in the
revisions to this clause, specifically additional training that may be
required due to the CUI Specified status of the information, this
requirement is not new for DHS contractors. CUI Basic and CUI Specified
categories of information previously were considered sensitive but
unclassified information under prior Departmental policy. When
additional training is required for CUI Specified information, it is
because the statute or regulation for that specific category requires
certain training. DHS and its contractors always complied with the
additional training requirements when they were applicable under its
sensitive but unclassified information policy. As such, these
requirements are covered by the existing information collection that
covers this clause (i.e., OMB Control Number 1600-0003). Another
example is clause 3052.204-7X(c)(3), specifying contractors and
subcontractors should not include CUI in the body of any email but
instead include such information in encrypted attachments, with
passwords to these files sent via separate emails. The cost of this
requirement (i.e., the time to compose two emails, rather than one
email) is not quantified because it is an existing requirement. Other
requirements are required by existing regulations. For example, FISMA
requires continuous monitoring and vendors therefore historically have
incurred costs associated with continuous monitoring equipment and
labor costs for setup, maintenance, and operation of continuous
monitoring. The previous Exhibit 2 lays out which provisions have
requirements that already exist under FISMA, existing HSAR, and other
regulations.
a. Costs
This section quantifies the costs associated with the final rule
changes, including costs associated with rule familiarization,
reporting and recordkeeping requirements, conducting an independent
assessment, and security review. DHS presents each cost with an
associated lower bound estimate, upper bound estimate, and primary
estimate.
(1) Quantitative Costs
(a) Rule Familiarization
When the final rule takes effect, ATO vendors will need to
familiarize themselves with the new regulations. Consequently, this
imposes a one-time cost on ATO vendors in the first year of the rule.
DHS estimates the time to review the rule is 1 hour. Therefore, DHS
estimated the one-time cost of rule familiarization to be $12,590.\20\
DHS estimated the total cost of rule familiarization over the 10-year
period is $12,223 and $11,766 at discount rates of 3 percent and 7
percent, respectively. The annualized cost over the 10-year period is
$1,433 and $1,675 at discount rates of 3 percent and 7 percent,
respectively.
---------------------------------------------------------------------------
\20\ Calculation: 171.41 ATO vendors * $73.45 loaded hourly wage
rate of Information Security Analysts = $12,589.95 one-time,
undiscounted cost of rule familiarization to ATO vendors.
---------------------------------------------------------------------------
(b) Reporting and Recordkeeping
DHS has determined that 343 non-ATO vendors and 514 non-ATO
subcontractors, for a total of 857 entities (Exhibit 4), are subject to
reporting requirements associated with notification and credit
monitoring. DHS estimates that each non-ATO vendor will require 36
hours to meet the reporting requirements. Therefore, DHS estimated the
cost of reporting for non-ATO vendors to be $2.27 million annually.\21\
DHS has determined that 171 ATO vendors are subject to reporting
requirements associated with notification and credit monitoring. DHS
estimated that each ATO vendor will require 120 hours to meet the
reporting requirements. Therefore, DHS estimated that the cost of
reporting for ATO vendors is $1.51 million annually.\22\
---------------------------------------------------------------------------
\21\ Calculation: 857.04 total annual responses * 36 estimated
hours per response = 30,852.44 total estimated burden hours.
Calculation: 30,852.44 total estimated hours * ($51.72/hour * 1.42
loaded wage rate factor) = $2,266,191. The average hourly salary is
based on the hourly wage of private sector information security
analysts (https://www.bls.gov/oes/current/oes151212.htm). The loaded
wage rate factor is based on BLS' estimates for private industry
workers by occupational and industry group (https://www.bls.gov/news.release/ecec.t04.htm).
\22\ Calculation: 171.41 total annual responses * 120 estimated
hours per response = 20,569.20 total estimated burden hours.
Calculation: 20,569.20 total estimated hours * ($51.72/hour * 1.42
loaded wage rate factor) = $1,510,794.
---------------------------------------------------------------------------
It is estimated that the number of recordkeepers associated with
these clauses (ATO and non-ATO vendors) is 1,028. Both ATO and non-ATO
vendors will require the same preparation time and maintenance per
response, which is estimated to average 16 hours per year, meaning that
the total annual recordkeeping burden is 16,455.20 hours.\23\ DHS
estimates the cost of recordkeeping requirements to be $1.21 million
annually.\24\
---------------------------------------------------------------------------
\23\ Calculation: 1,028.45 recordkeepers * 16 hours per
recordkeeper per year = 16,455.20 hours.
\24\ Calculation: 16,455.20 annual reporting hours * ($51.72/
hour * 1.42 loaded wage rate factor) hourly wage plus overhead =
$1,208,635.
---------------------------------------------------------------------------
[[Page 40587]]
Finally, the Government will face costs to receive, review, and
take action on reporting and recordkeeping submissions. To estimate the
cost of receiving, reviewing, and taking action on reporting and
recordkeeping submissions, the Department assumed an Information
Security Analyst reviews submissions.25 26 DHS estimated
that the Government's cost of receiving, reviewing, and taking action
from incident reporting, incident response activities, PII and SPII
notification requirements, credit monitoring, and receipt of
certification of sanitization of government and government-activity-
related files and information from non-ATO vendors is $452,516
annually.\27\ The Government's cost of these activities from ATO
vendors is $678,774 annually.\28\
---------------------------------------------------------------------------
\25\ Calculation: $36.64 Private Industry Workers' Total
Compensation/$25.80 Private Industry Workers' Wages and Salaries =
1.42 Loaded Wage Factor. Employer Costs for Employee Compensation
for private industry workers by occupational and industry group.
https://www.bls.gov/news.release/ecec.t04.htm.
\26\ Loaded hourly wage is $73.45. Calculation: $51.72 * Loaded
Wage Factor (1.42). Occupational Employment and Wages, May 2020,
Information Security Analyst, https://www.bls.gov/oes/2020/may/oes151212.htm.
\27\ Calculation: 857.04 non-ATO vendors * 8 hours of review
time * $66 hourly wage plus overhead = $452,516. The average hourly
salary is based on the OPM GS-13/Step 4 salary ($48.09 an hour) plus
a 36.25 percent fringe and overhead burden rate, the one mandated by
OMB Memorandum M-08-13 for use in public-private competition,
rounded to the nearest dollar, or $66 an hour. Reference Salary
Table 2020-RUS, Effective January 2020, found at https://www.opm.gov.
\28\ Calculation: 171.41 ATO vendors * 60 hours of review time *
$66 hourly wage plus overhead = $678,774.
---------------------------------------------------------------------------
Reporting and recordkeeping requirements impose costs on ATO
vendors, non-ATO vendors, and the Government. The total cost of
reporting and recordkeeping associated with the final rule is $6.12
million.\29\ DHS estimates the total cost of reporting and
recordkeeping over the 10-year period is $52.18 million and $42.96
million at discount rates of 3 percent and 7 percent, respectively. The
annualized cost estimate over the 10-year period is $6.30 million and
$6.55 million at discount rates of 3 percent and 7 percent,
respectively.
---------------------------------------------------------------------------
\29\ Calculation: $3,776,986 total reporting cost + $1,208,635
recordkeeping cost + $1,131,290 cost to the Government = $6,116,911.
---------------------------------------------------------------------------
(c) Independent Assessment
According to the changes in Alternate I to clause 3052.204-7X,
Authority to Operate, contractors must have an independent third party
validate the security and privacy controls in place for the information
system(s); review and analyze the SA package; and report on technical,
operational, and management level deficiencies.\30\ The contractor must
address all deficiencies before submitting the SA package to the COR
for review.
---------------------------------------------------------------------------
\30\ These standards are outlined in NIST SP 800-53, Security
and Privacy Controls for Information Systems and Organizations, or
successor publication, accessible at https://csrc.nist.gov/publications/sp.
---------------------------------------------------------------------------
Alternate I to clause 3052.204-7X, Authority to Operate, requires
ATO vendors to acquire an independent assessment. The independent
assessment is used to validate the security and privacy controls in
place for the information system prior to submission of the SA package
to the Government for review and acceptance. DHS estimated the cost of
an independent assessment to ATO vendors by first determining the price
of an independent assessment. DHS estimated that the cost of an
independent assessment ranges from a lower bound of $132,836 to an
upper bound of $161,189, with a primary estimate of $147,012.\31\ Once
an ATO is accepted and signed by the Government, it is valid for 3
years and must be renewed at that time unless otherwise specified in
the ATO letter. As a result, ATO vendors will incur the cost of
obtaining an independent assessment in the first year of the study
period and in 3-year increments following the initial independent
assessment. DHS then determined that 171 ATO vendors are subject to the
provision. DHS estimates the total cost of independent assessments over
the 10-year period, using the primary estimate, is $71.28 million and
$86.09 million at discount rates of 3 percent and 7 percent,
respectively. The primary annualized cost estimate over the 10-year
period is $10.09 million and $10.15 million at discount rates of 3
percent and 7 percent, respectively. Exhibit 6 summarizes the range of
cost estimates of independent assessments.
---------------------------------------------------------------------------
\31\ The $132,836 estimate of an independent assessment is
consistent with the proposed rule estimate of $123,615 and adjusted
to 2020 dollars using the GDP deflator. The $123,615 estimate of an
independent assessment was sourced from cost information requested
from multiple vendors whose contracts with DHS require an
independent assessment as part of the SA process. The $161,189
estimate of an independent assessment is consistent with the
proposed rule estimate of $150,000, which was sourced from FedRAMP
data and adjusted to 2020 dollars.
Exhibit 6--Estimated Monetized Costs of Independent Assessments
[$2020 Millions]
----------------------------------------------------------------------------------------------------------------
Cost (low Cost (primary Cost (high
estimate) estimate) estimate)
----------------------------------------------------------------------------------------------------------------
10-Year Total (Undiscounted)........................... $91.08 $100.80 $110.52
10-Year Total (3% Discounted).......................... 77.79 86.09 94.40
10-Year Total (7% Discounted).......................... 64.40 71.28 78.15
Annualized (3% Discounted)............................. 9.12 10.09 11.07
Annualized (7% Discounted)............................. 9.17 10.15 11.13
----------------------------------------------------------------------------------------------------------------
(d) Security Review
The Government may elect to conduct periodic reviews to ensure that
the security requirements contained in contracts are being implemented
and enforced. The Government, at its sole discretion, may obtain
assistance from other Federal agencies and/or third-party firms to aid
in security review activities. Under this requirement, the contractor
must afford DHS, the Office of the Inspector General, other government
organizations, and contractors working in support of the Government
access to the contractor's facilities, installations, operations,
documentation, databases, networks, systems, and personnel used in the
performance of the contract. The contractor must, through the
Contracting Officer and COR, contact the Component or Headquarters CIO,
or designee, to coordinate and participate in review and inspection
activity by government organizations external to DHS. Access must be
provided, to the extent necessary as determined by the Government
(including providing all requested images), for the Government to carry
out a program of inspection,
[[Page 40588]]
investigation, and audit to safeguard against threats and hazards to
the integrity, availability, and confidentiality of government data or
the function of computer systems used in performance of the contract
and to preserve evidence of computer crime.
These requirements impose a cost to the contractor to perform the
security review and to DHS to review and assist the security review.
DHS has determined that it will conduct 50 self-assessment surveys and
4 full assessments annually, which take 3 and 40 hours, respectively.
To estimate the cost of receiving, reviewing, and taking action on
reporting and recordkeeping submissions, the Department assumed an
Information Security Analyst reviews submissions.32 33 After
completing security reviews, DHS has a GS-13 level analyst review 20
self-assessments and 2 full assessments annually. The total cost to
contractors over 10 years to conduct self-assessments and full
assessments is $227,696.\34\ The total cost to DHS to review self-
assessments and full assessments over 10 years is $118,800.\35\ The
total cost of security review associated with the final rule is
$346,496.\36\ DHS estimates the total cost of security reviews over the
10-year period--both the self-assessments and full assessments as well
as their review--using the primary estimate, is $295,568 and $243,365
at discount rates of 3 percent and 7 percent, respectively. The primary
annualized cost estimate over the 10-year period is $34,650 at discount
rates of both 3 percent and 7 percent.
---------------------------------------------------------------------------
\32\ Calculation: $36.64 Private Industry Workers' Total
Compensation/$25.80 Private Industry Workers' Wages and Salaries =
1.42 Loaded Wage Factor. Employer Costs for Employee Compensation
for private industry workers by occupational and industry group.
https://www.bls.gov/news.release/ecec.t04.htm.
\33\ Loaded hourly wage is $73.45. Calculation: $51.72 * Loaded
Wage Factor (1.42). Occupational Employment and Wages, May 2020,
Information Security Analyst, https://www.bls.gov/oes/2020/may/oes151212.htm.
\34\ Calculation: ($73.45 loaded hourly wage * 50 self-
assessments * 3 hours per self-assessment) + ($73.45 loaded hourly
wage * 4 full assessments * 40 hours per full assessment) =
$227,696.
\35\ Calculation: ($66 loaded hourly wage * 50 self-assessments
* 2 hours review per self-assessment) + ($66 loaded hourly wage * 4
full assessments * 20 hours review per full assessment) = $118,800.
\36\ Calculation: $227,696 cost of self-assessments and full
assessments + $118,800 cost of reviewing self-assessments and full
assessments = $346,496.
---------------------------------------------------------------------------
(2) Qualitative Costs
DHS is unable to quantify some costs related to clause 3052.204-7X
paragraph (c), Incident Reporting Requirements, and clause 3052.204-7Y
paragraphs (b), PII and SPII Notification Requirements, and (c), Credit
Monitoring Requirements. Monetization is not possible for clause
3052.204-7Y paragraphs (b) and (c) because DHS does not track data on
the number of individuals whose data are compromised under a data
breach. Without this estimate, DHS is unable to determine the average
number of individuals whom vendors would have to notify and who will
require credit monitoring services. DHS anticipates a cost to vendors
that are subject to the requirements of clause 3052.204-7Y paragraphs
(b) and (c) and experience a data breach.
(a) Costs Related to Clause 3052.204-7X, Safeguarding of Controlled
Unclassified Information, Paragraph (c), Incident Reporting
Requirements
Clause 3052.204-7X, Safeguarding of Controlled Unclassified
Information, paragraph (c), Incident Reporting Requirements, requires
contractors to report known or suspected incidents that involve PII or
SPII within 1 hour of discovery as well as all other incidents (such as
those impacting any other category of CUI) within 8 hours of discovery.
Contractors must also provide as many of the following data elements
that are available at the time the incident is reported, with any
remaining data elements provided within 24 hours of submission of the
initial incident report:
(i) Unique Entity Identifier (UEI);
(ii) Contract numbers affected unless all contracts by the company
are affected;
(iii) Facility CAGE code if the location of the event is different
than the prime contractor location;
(iv) Point of contact (POC) if different than the POC recorded in
the System for Award Management (address, position, telephone, and
email);
(v) Contracting Officer POC (address, telephone, and email);
(vi) Contract clearance level;
(vii) Name of subcontractor and CAGE code if this was an incident
on a subcontractor network;
(viii) Government programs, platforms, or systems involved;
(ix) Location(s) of incident;
(x) Date and time the incident was discovered;
(xi) Server names where CUI resided at the time of the incident,
both at the contractor and subcontractor level;
(xii) Description of the Government PII or SPII contained within
the system; and
(xiii) Any additional information relevant to the incident.
DHS determined the cost of reporting an incident by requesting cost
information from multiple vendors whose contracts with DHS include
similar incident reporting requirements and reviewing internal
historical data. These data indicated that the cost of reporting an
incident to DHS ranges from a lower bound of $537 per incident to an
upper bound of $1,612 per incident, with a primary estimate of $1,075
per incident.\37\ DHS cannot quantify the aggregate total of these
costs because DHS does not track the origin of security event notices
and is therefore unable to determine how many security event notices
external contractors reported to their respective Component SOC or the
DHS Network Operations Security Center.
---------------------------------------------------------------------------
\37\ The final rule estimates of incident reporting are
consistent with the proposed rule and adjusted to 2020 dollars using
the GDP deflator.
---------------------------------------------------------------------------
(b) Costs Related to Clause 3052.204-7Y, Safeguarding of Controlled
Unclassified Information, Paragraph (b), PII and SPII Notification
Requirements
Clause 3052.204-7Y, Safeguarding of Controlled Unclassified
Information, paragraph (b), PII and SPII Notification Requirements,
sets forth the notification procedures and capability requirements for
contractors when notifying any individual whose PII and/or SPII was
under the control of the contractor or resided in the information
system at the time of the incident. The provision requires that, when
appropriate, vendors must provide notification to individuals affected
by the incident.
In response to compromised PII/SPII, the Government determines
whether notification is appropriate, thereby adding another cost to
both non-ATO and ATO vendors. DHS obtained values for the cost of
providing notification to individuals via the GSA Data Breach Response
and Identity Protection Services web page.\38\ The Department assumed
that vendors will purchase the ``Per Impacted Individual'' package (as
opposed to the ``Per Enrollee'' package) when obtaining notification
services.\39\ The Department collected per impacted individual data
from Experian, Identity Theft Guards, and Sontiq and then determined
the lowest value and highest value for each service to create the
following estimates. DHS estimated that the cost of notifying each
individual ranges from $0.84 ($0.29 plus $0.55 for a standard-sized
letter stamp) to $4.60
[[Page 40589]]
per year per individual, or $2.72 on average, depending on the level of
security, features, and data included in each plan by the companies
providing these services.
---------------------------------------------------------------------------
\38\ GSA eLibrary Data Breach and Identity Protection: https://www.gsaelibrary.gsa.gov/ElibMain/sinDetails.do?scheduleNumber=MAS&specialItemNumber=541990IPS&executeQuery=YES.
\39\ Per Impacted Individual pricing is used when the enrollment
rate of a breach is unknown and services are therefore provided to
the entire impacted population regardless of enrollment status.
---------------------------------------------------------------------------
DHS cannot quantify an aggregate total of this cost due to the rule
because DHS does not track at the Department level the number of
notifications required on either an annual or per-incident basis.
Additionally, the number of individuals requiring notification varies
from incident to incident. Because DHS cannot estimate the number of
individuals who require notification on an annual or per-incident
basis, the Department cannot quantify an aggregate total of this cost
due to the rule. Finally, there are existing State or local laws
requiring notification and DHS does not collect data on where breaches
are occurring. Therefore, DHS does not collect data on the baseline
notification costs that already exist. The bearer of the notification
cost--the government or the contractor--is determined on a case-by-case
basis based on DHS's discretion.
(c) Costs Related to Clause 3052.204-7Y, Safeguarding of Controlled
Unclassified Information, Paragraph (c), Credit Monitoring Requirements
Clause 3052.204-7Y, Safeguarding of Controlled Unclassified
Information, paragraph (c), Credit Monitoring Requirements, requires
that contractors, in the event of an incident, provide credit
monitoring services, including call center services, if directed by the
Contracting Officer, to any individual whose PII or SPII was under the
control of the contractor, or resided in the information system, at the
time of the incident for a period beginning the date of the incident
and extending not less than 18 months from the date the individual is
notified.
This rule requires contractors to provide credit monitoring
services (including call center services) to any individual whose PII
or SPII resided in a compromised information system. DHS updated costs
estimated in the proposed rule by obtaining values for the cost of
providing credit monitoring services to individuals from data on the
GSA Data Breach Response and Identity Protection Services web page.\40\
The Department assumed that vendors will purchase the ``Per Impacted
Individual'' package (as opposed to the ``Per Enrollee'' packages) when
obtaining credit monitoring services. The Department collected per
impacted individual data from Experian, Identity Theft Guards, and
Sontiq and then determined the lowest value and highest value for each
service to create the following estimates. The Department estimates
that the cost of private credit monitoring services ranges from $4.16
to $8.90 per year per individual, or $6.53 on average, depending on the
level of security, features, and data included in each plan by the
companies providing these services. The Department assumes that vendors
will have the capabilities to obtain favorable credit monitoring
prices. DHS cannot quantify these costs because it does not have
estimates for the population of individuals affected.
---------------------------------------------------------------------------
\40\ GSA eLibrary Data Breach and Identity Protection: https://www.gsaelibrary.gsa.gov/ElibMain/sinDetails.do?scheduleNumber=MAS&specialItemNumber=541990IPS&executeQuery=YES.
---------------------------------------------------------------------------
(3) Summary of Costs
The changes in the final rule are expected to incur a cost to
vendors that are subject to the final rule requirements. DHS estimates
the 10-year costs to range from an undiscounted lower bound of $152.60
million to an undiscounted upper bound of $172.04 million. Over the 10-
year analysis period, DHS estimates that the final rule will incur a
total lower bound cost to vendors of $130.28 million at a 3-percent
discount rate and $107.62 million at a 7-percent discount rate. DHS
estimates that over the 10-year analysis period, the final rule will
incur a total upper bound cost to vendors of $146.88 million at a 3-
percent discount rate and $121.376 million at a 7-percent discount
rate. Exhibit 7 provides a summary of the total estimated costs due to
the final rule by provision.
Exhibit 7--Estimated 10-Year Monetized Costs the Final Rule by Provision
[$2020 Millions]
----------------------------------------------------------------------------------------------------------------
Cost (low Cost (primary Cost (high
Provision estimate) estimate) estimate)
----------------------------------------------------------------------------------------------------------------
Independent assessment................................. $91.08 $100.80 $110.52
Rule familiarization................................... 0.01 0.01 0.01
Reporting and Recordkeeping............................ 61.17 61.17 61.17
Security Review........................................ 0.35 0.35 0.35
10-Year Undiscounted Total............................. 152.60 162.32 172.04
10-Year Total with a Discount Rate of 3%............... 130.28 138.58 146.889
10-Year Total with a Discount Rate of 7%............... 107.62 114.49 121.37
----------------------------------------------------------------------------------------------------------------
b. Qualitative Cost Savings
This section describes the cost savings associated with the final
rule changes, including cost savings associated with clause 3052.204-7X
paragraph (b), Handling of Controlled Unclassified Information, and
Alternate I to clause 3052.204-7X, Authority to Operate.
The final rule will result in multiple cost savings associated with
the transparency and consistency provided to contractors considering
doing business with DHS. One cost saving is associated with the reduced
time for DHS to grant an ATO. If a system is presented to DHS without
the correct SRTM and/or with a poorly developed SA package, it can take
up to 6 months to correct the issues and rewrite the SA package. In
addition, post-assessment activities can be greatly reduced, as the
number and severity of those corrections through POA&Ms required would
be significantly reduced. DHS is unable to quantify reductions in time
required for the ATO process, but lowering the risk of delays has the
potential to produce significant time savings to DHS and impacted
contractors.
Another cost savings to DHS results from time saved reviewing and
reissuing requests for proposals and finding new contractors when they
are unable to implement the SRTM. Under the final rule, contractors are
more clearly notified of the system requirements of the contract up
front, resulting in more bids from contractors capable of meeting DHS
standards. Previously, embedding requirements in separate documents
(i.e., Statement of Work, Statement of Objectives, or Performance Work
Statement) or through existing clause 3052.204-70, Security
Requirements for
[[Page 40590]]
Unclassified Information Technology Requirements, had the following
impacts: (1) created inconsistencies in the identification of
information security requirements for applicable contracts; (2)
required the identification and communication of security controls for
which compliance was necessary after contract award had been made; and
(3) resulted in delays in contract performance. Under this final rule,
DHS is less likely to have to put the project on hold to reissue a
request for proposal or look for an alternate contractor, which reduces
the reissuance of solicitations in situations where contractors are
unable to implement the SRTM. Avoiding the reissuance of proposals also
results in cost savings associated with avoiding background
investigations for IT contractors, which can range in cost from
approximately $425 to $1,000 per investigation. DHS is unable to
quantify the cost savings associated with more bids from contractors
capable of meeting DHS standards because we are unable to estimate the
number of avoided reissuances that will occur.
The final rule will reduce the response time when incidents do
occur, resulting in quicker identification of breaches and reducing the
severity of incidents, thereby producing significant cost savings. The
timely reporting of incidents is critical to prevent the impact of the
incident from expanding, ensure incident response and mitigation
activities are undertaken quickly, and ensure individuals are timely
notified of the possible or actual compromise of their PII and offered
credit monitoring services when applicable. Contractors were previously
not consistently provided with specific incident reporting timelines,
leaving the timeliness of incident reporting to the contractor.
Standardizing incident reporting leads to more proactive incident
response, potentially faster incident resolution, and potential
reduction in the scope and impact of the incident depending on the
nature of the attack (i.e., fewer records breached). According to
Cyentia Institute's 2020 Information Risk Insights Study report, the
median cost of a data breach in the public sector was approximately
$132,000, with higher cost cases (95th percentile) reaching
approximately $13 million per incident.\41\ An alternative source, the
most recent (2021) Verizon Data Breach Investigations Report (DBIR),
indicates that while 76 percent of the reported data breaches did not
result in a loss, the losses for the remaining 24 percent ranged
between $148 and $1.6 million, with a median breach cost of $30,000 for
95 percent of the cases with losses.\42\ Based on an analysis of 79,000
breaches, the 2021 Verizon DBIR shows that approximately 60 percent of
the incidents are discovered in days, while 20 percent could take
months or longer to discover.\43\ Early detection of the incidents is
critical in preventing data loss, data encryption, and other
damage.\44\ Reducing the time to identify the breach results in
immediate short-term benefits, such as improving the effectiveness of
incident management, reducing false positives, improving triage by
lowering the cost of trivial true positives,\45\ minimizing mission
disruption and the resulting impact on revenue and performance, and
reducing the cost of investigation.\46\ There are also significant
long-term benefits of early discovery. Specifically, decreasing time to
detection enables streamlined incident data collection and reporting,
which allows for the generation of actionable insights and advice to
the broader Federal Civilian Executive Branch, State-Local-Tribal-
Territorial Government, and Critical Infrastructure communities on the
proactive measures that reduce the potential for large-scale service
disruptions. Cumulatively, short- and long-term benefits increase costs
to the adversary, thus reducing the effectiveness of adversary
campaigns. However, lacking an authoritative source that establishes a
defensible estimate of the difference in a breach cost in the public
sector based on the mean time to detection, DHS is unable to estimate
the reduction in time to identify a breach under the final rule and,
therefore, does not quantify these cost savings and other benefits.
---------------------------------------------------------------------------
\41\ Cyentia Institute, 2020 Information Risk Insights Study
(Mar. 2020), https://www.cyentia.com/wp-content/uploads/IRIS2020_cyentia.pdf.
\42\ Verizon, 2021 Data Breach Investigations Report (May 2021),
https://www.verizon.com/business/en-nl/resources/reports/dbir/.
\43\ Based on Verizon DBIR analysis of breaches in 88 countries.
https://enterprise.verizon.com/resources/articles/s/how-to-minimize-your-mean-time-to-detect-a-breach/.
\44\ Michael Paye, ``Poor incident detection can cost your
organization a fortune'' (Sept. 24, 2020), Security Magazine,
https://www.securitymagazine.com/articles/93173-poor-incident-detection-can-cost-your-organization-a-fortune.
\45\ Druce MacFarlane, ``The 3 hidden costs of incident
response'' (May 10, 2018), CSO Online, https://www.csoonline.com/article/3270940/the-3-hidden-costs-of-incident-response.html.
\46\ Michael Paye, ``Poor incident detection can cost your
organization a fortune'' (Sept. 24, 2020), Security Magazine,
https://www.securitymagazine.com/articles/93173-poor-incident-detection-can-cost-your-organization-a-fortune and AlertOps, ``MTTR
vs MTBF vs MTTD vs MTTF'' (2021) https://alertops.com/mttd-vs-mttf-vs-mtbf-vs-mttr/.
---------------------------------------------------------------------------
c. Qualitative Benefits
This section describes the benefits associated with the final rule
changes, including cost savings associated with clause 3052.204-7X
paragraph (d), Incident Response Requirements, and clause 3052.204-7Y
paragraphs (b), PII and SPII Notification Requirements, and (c), Credit
Monitoring Requirements.
There are several nonquantifiable benefits of the final rule in
addition to the cost savings discussed above. One of the main benefits
is reducing the severity of a data breach to individuals and businesses
that would have data compromised by a data breach. There are four cost
categories that contribute to the total cost of a data breach:
detection and escalation, lost business, notification, and ex-post
response (including credit monitoring, identity protection services,
and more). While some costs, such as the cost of lost business due to
lowered trust, are not relevant to DHS, DHS expects this rule to reduce
other costs, such as notification and ex-post response (credit
monitoring and identity protection services). Although there is no way
to eliminate the risk of breach completely, the purpose of this rule is
to mitigate the negative effects of breaches, which include identity
theft.
The public will be better notified of breaches in their data,
allowing for better self-monitoring for identity theft. In particular,
the rule requires contractors to have in place procedures and
capability to notify any individual whose PII and/or SPII was under the
control of the contractor or resided in the information system at the
time of an incident. At a minimum, this notification must include: a
brief description of the incident; a description of the types of PII or
SPII involved; a statement as to whether the PII or SPII was encrypted
or protected by other means; steps individuals may take to protect
themselves; what the contractor and/or the Government are doing to
investigate the incident, to mitigate the incident, and to protect
against any future incidents; and information identifying who
individuals may contact for additional information. DHS is unable to
monetize the benefit associated with notifying individuals that their
data may be compromised because it is difficult to estimate the number
of individuals who may have their data compromised and to monetize the
benefit of notification. DHS is unable to monetize the benefit
associated with notification because DHS cannot estimate the number of
[[Page 40591]]
individuals who require notification on an annual or per-incident
basis. DHS does not track at the Department level the number of
notifications required on either an annual or per-incident basis.
Additionally, the number of individuals requiring notification varies
from incident to incident. Because DHS cannot estimate the number of
individuals who require notification on either an annual or per-
incident basis, the Department cannot monetize the benefit of
notification.
The final rule also will produce a benefit to individuals
associated with providing credit monitoring services. Under the final
rule, when directed by the contracting officer, contractors are
required to provide credit monitoring services, including call center
services, to any individual whose PII or SPII was under the control of
the contractor, or resided in the information system, at the time of
the incident for a period beginning on the date of the incident and
extending not less than 18 months from the date the individual is
notified. Credit monitoring services can be particularly beneficial to
the affected public, as they can assist individuals in the early
detection of identity theft as well as notify individuals of changes
that appear in their credit report, such as creation of new accounts,
changes to their existing accounts or personal information, or new
inquiries for credit. Such notification affords individuals the
opportunity to take steps to minimize any harm associated with
unauthorized or fraudulent activity. DHS is unable to quantify the
benefit associated with providing credit monitoring services because it
is difficult to estimate the number of individuals who may require
credit monitoring services.
Another benefit of the Safeguarding of Controlled Unclassified
Information clause is expedited reporting timelines. Incident reporting
requires a contractor to report all known or suspected incidents to the
Component SOC, or the DHS Enterprise SOC if the Component SOC is not
available, in accordance with 4300A Sensitive Systems Handbook,
Attachment F, Incident Response. All known or suspected incidents
involving PII or SPII must be reported within 1 hour of discovery. All
other incidents must be reported within 8 hours of discovery. Timely
reporting of incidents is critical for proactive incident response and
potentially faster incident resolution. Also, timely reporting prevents
the impact of the incident from expanding, ensures incident response
and mitigation activities are undertaken quickly, and ensures that
individuals are timely notified of the possible or actual compromise of
their PII and offered credit monitoring services when applicable. DHS
is unable to quantify this benefit because it is difficult to quantify
the impact of timely reporting on the severity of an incident.
4. Summary
DHS presents the estimated range of costs under the final rule in
Exhibit 8. DHS estimates the final rule will have an annualized cost
that ranges from $15.32 million to $17.28 million at a discount rate of
7 percent and a total 10-year cost that ranges from $107.62 million to
$121.37 million at a discount rate of 7 percent. DHS was unable to
quantify the cost savings or benefits associated with the rule.
However, the final rule is expected to produce cost savings by reducing
the time required to grant an ATO, reducing DHS time reviewing and
reissuing proposals because contractors are better qualified, and
reducing the time to identify a data breach. The final rule also
produces benefits by better notifying the public when their data are
compromised, requiring the provision of credit monitoring services so
that the public can better monitor and avoid costly consequences of
data breaches, and reducing the severity of incidents through timely
incident reporting.
Exhibit 8--Estimated Monetized Costs of the Final Rule
[$2020 Millions]
----------------------------------------------------------------------------------------------------------------
Costs
-----------------------------------------------
Low Primary High
----------------------------------------------------------------------------------------------------------------
2023............................................................ $28.93 $31.63 $33.79
2024............................................................ 6.15 6.15 6.15
2025............................................................ 6.15 6.15 6.15
2026............................................................ 28.92 31.35 33.78
2027............................................................ 6.15 6.15 6.15
2028............................................................ 6.15 6.15 6.15
2029............................................................ 28.92 31.35 33.78
2030............................................................ 6.15 6.15 6.15
2031............................................................ 6.15 6.15 6.15
2032............................................................ 28.92 31.35 33.78
Undiscounted 10-Year Total...................................... 152.60 162.32 172.04
10-Year Total with Discount Rate of 3%.......................... 130.28 138.58 146.89
10-Year Total with Discount Rate of 7%.......................... 107.62 114.49 121.37
Annualized with Discount Rate of 3%............................. 15.27 16.25 17.22
Annualized with Discount Rate of 7%............................. 15.32 16.30 17.28
----------------------------------------------------------------------------------------------------------------
5. Regulatory Alternatives
DHS evaluated two alternatives to the chosen approach of
independent assessment, which requires vendors to obtain an independent
assessment from a third party to validate the security and privacy
controls in place for an information system prior to submission of the
security authorization package to the Government for review and
acceptance. In general, when assessing compliance with a standard or
set of requirements, there are three alternatives: (1) first-party
attestation or self-certification; (2) second-party attestation (i.e.,
internal independent); or (3) third-party attestation. While the first
two options may be considered the least economically burdensome, third-
party attestation is an accepted best practice in commercial industry
as objectivity increases with independence. DHS has selected the chosen
approach of requiring vendors to obtain an independent assessment from
a third party to ensure a truly objective measure of an entity's
compliance with the requisite security and privacy controls. Recent
high-profile breaches of Federal information demonstrate the need for
Departments, agencies, and industry to ensure that information
[[Page 40592]]
security protections are clearly, effectively, and consistently
addressed and appropriately implemented in contracts. The benefits of
using a third party to perform an independent assessment extends to the
contractor, as the contractor can use the results of the independent
assessment to demonstrate its cybersecurity excellence for customers
other than DHS.
B. Regulatory Flexibility Act
The Regulatory Flexibility Act of 1980, 5 U.S.C. 601 et seq., as
amended by the Small Business Regulatory Enforcement Fairness Act of
1996, Public Law 104-121 (Mar. 29, 1996), hereafter jointly referred to
as the ``RFA,'' requires Federal agencies engaged in rulemaking to
assess the impact of regulations that will have a significant economic
impact on a substantial number of small entities. The agency also is
required to respond to public comments on the NPRM.\47\ The Chief
Counsel for Advocacy of the SBA did not submit public comments on the
NPRM.
---------------------------------------------------------------------------
\47\ See 5 U.S.C. 604.
---------------------------------------------------------------------------
The Department believes that this final rule may have a significant
economic impact on a substantial number of small entities. Therefore,
the Department publishes this final regulatory flexibility analysis
(FRFA) that builds on the assessment provided in the initial regulatory
flexibility analysis (IRFA) published as part of the NPRM. The
Department invited interested persons to submit comments on impacts to
small entities during the proposed rule phase.
1. A Statement of the Need for, and Objectives of, the Rule
DHS has determined that the new rulemaking is needed to implement
security and privacy measures to safeguard CUI and facilitate improved
incident reporting to DHS. The final rule enables DHS more efficiently
to identify, remediate, mitigate, and resolve incidents when they
occur, not necessarily completely prevent them. DHS understands that
there is no ``true'' way to completely prevent an incident from
occurring. However, these measures are intended to decrease the
likelihood of occurrence with full knowledge that there is no such
thing as an ``unhackable'' system.
The final rule adds a new clause at 3052.204-7X, Safeguarding of
Controlled Unclassified Information, that ensures adequate protection
of CUI. That new clause: (1) identifies CUI handling requirements and
security processes and procedures applicable to Federal information
systems, which include contractor information systems operated on
behalf of the agency; (2) identifies incident reporting requirements,
including timelines and required data elements, inspection provisions,
and post-incident activities; and (3) requires certification of
sanitization of government and government-activity-related files and
information. Additionally, new clause 3052.204-7Y, Notification and
Credit Monitoring Requirements for Personally Identifiable Information
Incidents, requires contractors to have in place procedures and the
capability to notify and provide credit monitoring services to any
individual whose PII or SPII was under the control of the contractor or
resided in the information system at the time of the incident.
These measures are necessary because of the urgent need to protect
CUI and respond appropriately when DHS contractors experience incidents
with DHS information. Persistent and pervasive high-profile breaches of
Federal information continue to demonstrate the need to ensure that
information security protections are addressed clearly, effectively,
and consistently in contracts. This final rule strengthens and expands
existing HSAR language to ensure adequate security when contractor and/
or subcontractor employees will have access to CUI; CUI will be
collected or maintained on behalf of the agency; or Federal information
systems, which include contractor information systems operated on
behalf of the agency, are used to collect, process, store, or transmit
CUI.
2. A Statement of the Significant Issues Raised by the Public Comments
in Response to the IRFA, a Statement of the Assessment of the Agency of
Such Issues, and a Statement of Any Changes Made to the Proposed Rule
as a Result of Such Comments
The Department did not receive public comments on the IRFA.
3. The Response of the Agency to Any Comments Filed by the Chief
Counsel for Advocacy of the SBA in Response to the Proposed Rule, and a
Detailed Statement of Any Change Made to the Proposed Rule as a Result
of the Comments
The Department did not receive comments from the Chief Counsel for
Advocacy of the SBA.
4. A Description of and an Estimate of the Number of Small Entities to
Which the Rule Will Apply or an Explanation of Why No Such Estimate is
Available
a. Definition of Small Entity
The RFA defines a ``small entity'' as a (1) small not-for-profit
organization; (2) small governmental jurisdiction; or (3) small
business. The Department used the entity size standards defined by SBA,
in effect as of August 19, 2019, to classify businesses as small.\48\
SBA establishes separate standards for individual 6-digit North
American Industry Classification System (NAICS) codes, and standard
cutoffs typically are based on either the average number of employees
or the average annual receipts. For example, small businesses generally
are defined as having fewer than 500, 1,000, or 1,250 employees in
manufacturing industries and less than $7.5 million in average annual
receipts for nonmanufacturing industries. However, some exceptions do
exist, the most notable being that depository institutions (including
credit unions, commercial banks, and noncommercial banks) are
classified by total assets (small defined as less than $550 million in
assets). Small governmental jurisdictions are another noteworthy
exception. They are defined as the governments of cities, counties,
towns, townships, villages, school districts, or special districts with
populations of less than 50,000 people.\49\
---------------------------------------------------------------------------
\48\ SBA Table of Small Business Size Standards Matched to North
American Industry Classification System Codes (Aug. 2019), https://www.sba.gov/document/support-table-size-standards.
\49\ See https://advocacy.sba.gov/resources/the-regulatory-flexibility-act for details.
---------------------------------------------------------------------------
b. Number of Small Entities
The Department collected employment and annual revenue data from
the business information provider Data Axle and merged those data into
FY 2020 Federal FPDS data. The FPDS data contained PSC information for
each vendor identifying the type of service being provided to DHS. This
dataset allowed the Department to identify the number and type of small
entities in the FPDS data, and their PSC information, as well as their
annual revenues. DHS identified 2,218 unique vendors with PSCs for FY
2020 that may be impacted by the final rule. Of those 2,218 vendors,
the Department was able to obtain data matches of revenue or employees
for 366 vendors in FY 2020. Duplicate vendors that appeared multiple
times within the dataset were removed (i.e., the same vendor appearing
multiple times). The Department was unable to obtain data
[[Page 40593]]
matches for 184 vendors in FY 2020. In order to prevent underestimating
the number of small entities the final rule would affect, DHS
conservatively considers all the nonmatched vendors as small entities
for the purpose of this analysis. Of the 366 vendors with employee or
revenue matches, the Department identified 265 unique vendors (or 48
percent of the sample) as small.\50\ Within the 265 matched small
vendors, the Department was unable to obtain revenue data for four
vendors. These data points are displayed in Exhibit 9 below.
---------------------------------------------------------------------------
\50\ SBA Table of Small Business Size Standards Matched to North
American Industry Classification System Codes. (Aug. 2019), https://www.sba.gov/document/support-table-size-standards.
Exhibit 9--Number of Small Entities
------------------------------------------------------------------------
Proportion
Parameter Quantity of sample
(percent)
------------------------------------------------------------------------
Population.................................... 3,203
Population (unique entities).................. 2,218
Minimum Required Sample....................... 328
Selected Sample............................... 550 100
Nonmatched Sample Segment..................... 184 33
Matched Sample Segment........................ 366 67
Matched Small Entities........................ 265 48
Sub-Sample Missing Revenue Data............... 4 2
Matched Non-Small Entities.................... 101 18
Number of Small Entities Discovered in 449 82
Research.....................................
------------------------------------------------------------------------
In sum, the Department classified 449 vendors as small.\51\ Of
these unique small entities, 261 of them had revenue data available
from Data Axle. The Department's analysis of the financial impact of
this final rule on small entities is based on the number of small
unique entities with revenue data (261).
---------------------------------------------------------------------------
\51\ Calculation: 184 nonmatched entities + 265 matched entities
= 449 small entities.
---------------------------------------------------------------------------
To provide clarity on the industries impacted by this regulation,
Exhibit 10 shows the number of unique small entities (265) in FY 2020
within each NAICS code at the 6-digit and 4-digit level.
Exhibit 10--Number of Small Entities by NAICS Code
------------------------------------------------------------------------
------------------------------------------------------------------------
6-Digit Description........... Number Percent
NAICS of small of small
employers employers
------------------------------------------------------------------------
541511................ Custom Computer 21 8
Programming Services.
443142................ Electronics Stores.... 16 6
541618................ Other Management 11 4
Consulting Services.
423610................ Electrical Apparatus 10 4
and Equipment, Wiring
Supplies, and Related
Equipment Merchant
Wholesalers.
511210................ Software Publishers20. 10 4
541614................ Process, Physical 8 3
Distribution and
Logistics Consulting
Services.
541330................ Engineering Services.. 7 3
561990................ All Other Support 7 3
Services.
238990................ All Other Specialty 6 2
Trade Contractors.
561621................ Security Systems 6 2
Services (except
Locksmiths).
Other NAICS........... ...................... 163 61
------------------------------------------------------------------------
4-Digit Description........... Number Percent
NAICS of small of small
employers employers
------------------------------------------------------------------------
5416.................. Management, 27 10
Scientific, and
Technical Consulting
Services.
5415.................. Computer Systems 26 10
Design and Related
Services.
4431.................. Electronics and 16 6
Appliance Stores.
4236.................. Household Appliances 11 4
and Electrical and
Electronic Goods
Merchant Wholesalers.
5413.................. Architectural, 10 4
Engineering, and
Related Services.
5616.................. Investigation and 10 4
Security Services.
5112.................. Software Publishers... 10 4
2389.................. Other Specialty Trade 7 3
Contractors.
5619.................. Other Support Services 7 3
5419.................. Other Professional, 7 3
Scientific, and
Technical Services.
Other NAICS................................... 134 49
------------------------------------------------------------------------
A small percentage of entities in the sample segment are
educational institutions or not-for-profit entities.\52\ Using data
with the profit/non-profit status of each vendor in the sample segment,
we count the number of for-
[[Page 40594]]
profit and not-for-profit entities and the number of small and non-
small entities.\53\ We assume that all unspecified entities--those
marked as neither educational institutions, non-profit organizations,
or for-profit organizations--are for-profit businesses. Table 11
includes these data for both entities we were able to match and non-
matched entities.
---------------------------------------------------------------------------
\52\ Educational institutions include HBCUs, private
universities or colleges, State-controlled institutions of higher
learning, Tribal colleges, veterinary colleges, or other educational
institutions.
\53\ The SBA's Office of Advocacy defines small organizations as
not-for-profit entities that are independently owned and operated
and not dominant in their field. For more information, visit https://www.sba.gov/sites/default/files/advocacy/How-to-Comply-with-the-RFA-WEB.pdf.
Exhibit 11--Number of Small Entities
------------------------------------------------------------------------
Proportion
Parameter Quantity of sample
(percent)
------------------------------------------------------------------------
Selected Sample............................... 550 100.0
Profit........................................ 496 90.2
Non-Profit.................................... 19 3.4
Educational Institution....................... 6 1.1
Other......................................... 29 5.3
------------------------------------------------------------------------
c. Projected Impacts to Affected Small Entities
The Department has estimated the incremental costs for small
entities from the baseline (i.e., the 2017 proposed rule) to this final
rule. We estimated the costs of obtaining an independent assessment and
rule familiarization. Although the sample population of small entities
identified in this analysis is 449, DHS does not anticipate the actual
number of small entities impacted by the final rule to be of this
magnitude. As discussed in the E.O. 12866 section, DHS expects 171
entities to be impacted by cost provisions annually. The Department
anticipates these 171 entities would have a distribution of large and
small entities, and impacts to the small entities, that follow the
sample population's distribution of size and costs presented in this
FRFA.
Small entities in the IT field will be subject to only the
independent assessment, ongoing maintenance of continuous monitoring,
and rule familiarization costs. DHS classified an entity as being in
the IT field if their PSC began with a ``7'' or ``D,'' or if the PSC
matched any of the following codes: 5810, 6350, AJ11, AJ21, AJ23, AJ43,
R423, R430, R431, R611, and R615. Additionally, entities classified as
non-ATO will be subject to only rule familiarization costs. DHS
classified an entity as being non-ATO if their PSC and description was
as follows: (1) S201--Housekeeping--Custodial Janitorial; (2) 6515--
Medical and Surgical Instruments, Equipment, and Supplies; (3) S216--
Housekeeping--Facilities Operations Support; (4) R614--Support--
Administrative: Paper Shredding; or (5) U008--Education/Training--
Training/Curriculum Development. The estimates included in this
analysis are consistent with those presented in the E.O. 12866 section
and include costs of rule familiarization, reporting and recordkeeping,
and independent assessment.
The Department presents the impacts of the final rule on small
entities as a percent of revenue in Exhibit 12 below.
Exhibit 12--Summary of Small Entity Costs as a Percent of Revenue
--------------------------------------------------------------------------------------------------------------------------------------------------------
50 Percent 75 Percent 90 Percent
-----------------------------------------------------------------------------------------------------------------
Impacts Number of % of Number of % of Number of % of
small small Cumulative small small Cumulative small small Cumulative
entities entities % entities entities % entities entities %
--------------------------------------------------------------------------------------------------------------------------------------------------------
<1%................................... 39 15 15 34 13 13 29 1 11
1-5%.................................. 83 31 46 82 31 44 86 33 44
5-10%................................. 48 18 64 47 18 62 42 16 59
10-25%................................ 58 22 86 59 22 84 59 22 82
25-50%................................ 23 9 95 27 10 94 26 10 92
>50%.................................. 13 5 100 15 6 100 22 8 100
-----------------------------------------------------------------------------------------------------------------
Total............................. 264 .......... ........... 264 .......... ........... 264 .......... ...........
--------------------------------------------------------------------------------------------------------------------------------------------------------
DHS expects its contractors may choose to reflect these costs in
the price and cost proposals they submit to the Department. Therefore,
the Department conducted a sensitivity analysis with varying levels of
passthrough assumed for small businesses. DHS does not assume a
specific percentage of costs that vendors will pass on since some
vendors may choose to pass on fewer costs in pursuance of a competitive
advantage on their price. Therefore, the Department presents three
scenarios using the primary estimates of the rule costs: (1) vendors
pass on 50 percent of rule costs to the Department; (2) vendors pass on
75 percent of rule costs to the Department; and (3) vendors pass on 90
percent of rule costs to the Department. The results of the sensitivity
analysis are displayed in Exhibit 13 below.
[[Page 40595]]
Exhibit 13--Sensitivity of Small Entity Costs Assuming Different Passthroughs
--------------------------------------------------------------------------------------------------------------------------------------------------------
50 Percent 75 Percent 90 Percent
-----------------------------------------------------------------------------------------------------------------
Impacts Number of % of Number of % of Number of % of
small small Cumulative small small Cumulative small small Cumulative
entities entities % entities entities % entities entities %
--------------------------------------------------------------------------------------------------------------------------------------------------------
<1%................................... 70 27 27 109 41 41 157 59 59
1-5%.................................. 100 38 64 99 38 79 85 32 92
5-10%................................. 43 16 81 32 12 91 14 5 97
10-25%................................ 38 14 95 19 7 98 8 3 100
25-50%................................ 8 3 98 5 2 100 0 0 100
>50%.................................. 5 2 100 0 0 100 0 0 100
-----------------------------------------------------------------------------------------------------------------
Total............................. 264 .......... ........... 264 .......... ........... 264 .......... ...........
--------------------------------------------------------------------------------------------------------------------------------------------------------
5. A Description of the Projected Reporting, Recordkeeping, and Other
Compliance Requirements of the Rule, Including an Estimate of the
Classes of Small Entities That Will Be Subject to the Requirement and
the Type of Professional Skills Necessary for Preparation of the Report
or Record
The final rule has reporting and recordkeeping requirements
impacting small entities. DHS needs information required by clauses
3052.204-7X, Safeguarding of Controlled Unclassified Information, and
3052.204-7Y, Notification and Credit Monitoring Requirements for
Personally Identifiable Information Incidents, to implement the
requirements for safeguarding against unauthorized contractor/
subcontractor disclosure and inappropriate use of CUI that contractors
and subcontractors may have access to during the course of contract
performance. Reporting and recordkeeping for the SA package consists of
the following: Security Plan, Contingency Plan, Contingency Plan Test
Results, Configuration Management Plan, Security Assessment Plan,
Security Assessment Report, and Authorization to Operate Letter.
Additional documents that may be required include a Plan(s) of Action
and Milestones and Interconnection Security Agreement(s). Additional
requirements include an independent assessment, security review,
renewal of the ATO (required every 3 years unless stated otherwise),
and Federal reporting and continuous monitoring requirements.
6. A Description of the Steps the Agency Has Taken To Minimize the
Significant Economic Impact on Small Entities Consistent With the
Stated Objectives of Applicable Statutes, Including a Statement of the
Factual, Policy, and Legal Reasons for Selecting the Alternative
Adopted in the Final Rule and Why Each of the Other Significant
Alternatives to the Rule Considered by the Agency That Affects the
Impact on Small Entities Was Rejected
The Department considered alternative requirements for independent
assessment that would be less burdensome on small entities. In general,
when assessing compliance with a standard or set of requirements, there
are three alternatives: (1) first-party attestation or self-
certification; (2) second-party attestation (i.e., internal
independent); or (3) third-party attestation. While the first two
options may be considered the least economically burdensome, third-
party attestation is an accepted best practice in commercial industry
as objectivity increases with independence. DHS has selected the chosen
approach of requiring vendors to obtain an independent assessment from
a third party to ensure a truly objective measure of an entity's
compliance with the requisite security and privacy controls. Recent
high-profile breaches of Federal information demonstrate the need for
departments, agencies, and industry to ensure that information security
protections are clearly, effectively, and consistently addressed and
appropriately implemented in contracts. The benefits of using a third
party to perform an independent assessment extends to the contractor,
as the contractor can use the results of the independent assessment to
demonstrate its cybersecurity excellence for customers other than DHS.
The information security requirements associated with this rule are
not geared toward a type of contractor; the requirements are based on
the sensitivity of the information and the impact on the program, the
Government, and security in the event CUI is breached. That standard
would not vary based on the size of the entity. DHS has determined that
the costs associated with compliance with the security requirements of
this rule are a necessary expense to ensure DHS CUI is adequately
protected and to produce the resulting benefits and cost savings that
accrue to DHS, vendors, and the public from the provisions of the final
rule, as discussed in the E.O. 12866 section.
C. Paperwork Reduction Act
The Paperwork Reduction Act (44 U.S.C. ch. 35) applies. The rule
contains information collection requirements. Accordingly, DHS will be
submitting a request for approval of a new information collection
requirement concerning this rule to OMB under 44 U.S.C. 3501, et seq.
The collection requirements for this rule are based on two new
clauses, 3052.204-7X, Safeguarding of Controlled Unclassified
Information, and 3052.204-7Y, Notification and Credit Monitoring
Requirements for Personally Identifiable Information Incidents.
Overview of Information Collection:
(1) Type of Information Collection: New Collection.
(2) Title of the Form/Collection: Homeland Security Acquisition
Regulation: Safeguarding of Controlled Unclassified Information.
(3) Agency form number, if any, and the applicable component of DHS
sponsoring the collection: No form; OCPO.
(4) Affected public who will be asked or required to respond; as
well as a brief abstract: The affected public is business or other for-
profit institutions. DHS needs the information required by clauses
3052.204-7X and 3052.204-7Y to implement the requirements for
safeguarding against unauthorized
[[Page 40596]]
contractor/subcontractor disclosure and inappropriate use of CUI that
contractors and subcontractors may have access to during the course of
contract performance. Responses are required for respondents to obtain
or retain benefits.
(5) An estimate of the total number of respondents and the amount
of time estimated for an average respondent to respond: The estimated
number of respondents for reporting is 1,028. The weighted average
public reporting burden for this collection of information is estimated
to be approximately 50 hours per response to comply with the
requirements, including time for reviewing instructions, searching
existing data sources, gathering and maintaining the data needed, and
completing and reviewing the collection of information. This weighted
average is based on an estimated 36 hours per response to comply with
the requirements when an ATO is not required and an estimated 120 hours
to comply with the requirements when an ATO is required (i.e., when a
contractor is required to submit an SA package).\54\ The SA package
consists of the following: Security Plan, Contingency Plan, Contingency
Plan Test Results, Configuration Management Plan, Security Assessment
Plan, Security Assessment Report, and Authorization to Operate Letter.
Additional documents that may be required include a Plan(s) of Action
and Milestones and Interconnection Security Agreement(s). Additional
requirements include an independent assessment, security review,
renewal of the ATO (required every 3 years unless stated otherwise),
and Federal reporting and continuous monitoring requirements. It is
estimated that the number of recordkeepers associated with these
clauses will be 1,028 and the estimated burden per response is 16
hours.
---------------------------------------------------------------------------
\54\ Estimated hours weighted by 171 ATO vendors and 857 non-ATO
vendors.
---------------------------------------------------------------------------
(6) An estimate of the total public burden (in hours) associated
with the information collection: The total estimated annual hour burden
associated with this collection is 67,820.
(7) An estimate of the total public burden (in cost) associated
with the information collection: The estimated total annual cost burden
associated with this collection of information is $4,476,120.
List of Subjects in 48 CFR Parts 3001, 3002, 3004 and 3052
Government procurement.
For reasons set out in the preamble, DHS amends chapter 30 of title
48 of the Code of Federal Regulations as set forth below.
0
1. The authority citation for 48 CFR parts 3001, 3002, 3004, and 3052
is revised to read as follows:
Authority: 5 U.S.C. 301-302, 41 U.S.C. 1707, 41 U.S.C. 1702, 41
U.S.C. 1303(a)(2), 48 CFR part 1, subpart 1.3, and DHS Delegation
Number 0702.
PART 3001--FEDERAL ACQUISITION REGULATIONS SYSTEM
0
2. In section 3001.106 amend paragraph (a) by adding a new OMB control
number at the end of the list to read as follows:
3001.106 OMB Approval Under the Paperwork Reduction Act.
(a) * * *
OMB Control No. 1601-0023 (Safeguarding of Controlled Unclassified
Information)
* * * * *
PART 3002--DEFINITIONS OF WORDS AND TERMS
0
3. Amend section 3002.101 by adding the definitions ``Adequate
security'', ``Controlled unclassified information (CUI)'', ``Federal
information'', ``Federal information system'', ``Handling'',
``Information resources'', ``Information security'', and ``Information
systems'' to read as follows:
Adequate security means security protections commensurate with the
risk resulting from the unauthorized access, use, disclosure,
disruption, modification, or destruction of information. This includes
ensuring that information hosted on behalf of an agency and information
systems and applications used by the agency operate effectively and
provide appropriate confidentiality, integrity, and availability
protections through the application of cost-effective security
controls.
* * * * *
Controlled unclassified information (CUI) is any information the
Government creates or possesses, or an entity creates or possesses for
or on behalf of the Government (other than classified information) that
a law, regulation, or Governmentwide policy requires or permits an
agency to handle using safeguarding or dissemination controls. This
definition includes the following CUI categories and subcategories of
information:
(1) Chemical-terrorism Vulnerability Information (CVI) as defined
in 6 CFR part 27, ``Chemical Facility Anti-Terrorism Standards,'' and
as further described in supplementary guidance issued by an authorized
official of the Department of Homeland Security (including the Revised
Procedural Manual ``Safeguarding Information Designated as Chemical-
Terrorism Vulnerability Information'' dated September 2008);
(2) Protected Critical Infrastructure Information (PCII) as set out
in the Critical Infrastructure Information Act of 2002 (title XXII,
subtitle B of the Homeland Security Act of 2002 as amended through Pub.
L. 116-283), PCII's implementing regulations (6 CFR part 29), the PCII
Program Procedures Manual, and any supplementary guidance officially
communicated by an authorized official of the Department of Homeland
Security, the PCII Program Manager, or a PCII Program Manager Designee;
(3) Sensitive Security Information (SSI) as defined in 49 CFR part
1520, ``Protection of Sensitive Security Information,'' as amended, and
any supplementary guidance officially communicated by an authorized
official of the Department of Homeland Security (including the
Assistant Secretary for the Transportation Security Administration or
designee), including Department of Homeland Security MD 11056.1,
``Sensitive Security Information (SSI)'' and, within the Transportation
Security Administration, TSA MD 2810.1, ``SSI Program'';
(4) Homeland Security Agreement Information means information the
Department of Homeland Security receives pursuant to an agreement with
State, local, Tribal, territorial, or private sector partners that is
required to be protected by that agreement. The Department receives
this information in furtherance of the missions of the Department,
including, but not limited to, support of the Fusion Center Initiative
and activities for cyber information sharing consistent with the
Cybersecurity Information Sharing Act of 2015;
(5) Homeland Security Enforcement Information means unclassified
information of a sensitive nature lawfully created, possessed, or
transmitted by the Department of Homeland Security in furtherance of
its immigration, customs, and other civil and criminal enforcement
missions, the unauthorized disclosure of which could adversely impact
the mission of the Department;
(6) International Agreement Information means information the
Department of Homeland Security receives that is required to be
protected by an information sharing agreement or arrangement with a
foreign government,
[[Page 40597]]
an international organization of governments or any element thereof, an
international or foreign public or judicial body, or an international
or foreign private or non-governmental organization;
(7) Information Systems Vulnerability Information (ISVI) means:
(i) Department of Homeland Security information technology (IT)
systems data revealing infrastructure used for servers, desktops, and
networks; applications name, version, and release; switching, router,
and gateway information; interconnections and access methods; and
mission or business use/need. Examples of ISVI are systems inventories
and enterprise architecture models. Information pertaining to national
security systems and eligible for classification under Executive Order
13526 will be classified as appropriate; and/or
(ii) Information regarding developing or current technology, the
release of which could hinder the objectives of the Department,
compromise a technological advantage or countermeasure, cause a denial
of service, or provide an adversary with sufficient information to
clone, counterfeit, or circumvent a process or system;
(8) Operations Security Information means Department of Homeland
Security information that could be collected, analyzed, and exploited
by a foreign adversary to identify intentions, capabilities,
operations, and vulnerabilities that threaten operational security for
the missions of the Department;
(9) Personnel Security Information means information that could
result in physical risk to Department of Homeland Security personnel or
other individuals whom the Department is responsible for protecting;
(10) Physical Security Information means reviews or reports
illustrating or disclosing facility infrastructure or security
vulnerabilities related to the protection of Federal buildings,
grounds, or property. For example, threat assessments, system security
plans, contingency plans, risk management plans, business impact
analysis studies, and certification and accreditation documentation;
(11) Privacy Information includes both Personally Identifiable
Information (PII) and Sensitive Personally Identifiable Information
(SPII). PII refers to information that can be used to distinguish or
trace an individual's identity, either alone or when combined with
other information that is linked or linkable to a specific individual;
and SPII is a subset of PII that if lost, compromised, or disclosed
without authorization could result in substantial harm, embarrassment,
inconvenience, or unfairness to an individual. To determine whether
information is PII, DHS will perform an assessment of the specific risk
that an individual can be identified using the information with other
information that is linked or linkable to the individual. In performing
this assessment, it is important to recognize that information that is
not PII can become PII whenever additional information becomes
available, in any medium or from any source, that would make it
possible to identify an individual. Certain data elements are
particularly sensitive and may alone present an increased risk of harm
to the individual.
(i) Examples of stand-alone PII that are particularly sensitive
include: Social Security numbers (SSNs), driver's license or State
identification numbers, Alien Registration Numbers (A-numbers),
financial account numbers, and biometric identifiers.
(ii) Multiple pieces of information may present an increased risk
of harm to the individual when combined, posing an increased risk of
harm to the individual. SPII may also consist of any grouping of
information that contains an individual's name or other unique
identifier plus one or more of the following elements:
(A) Truncated SSN (such as last 4 digits);
(B) Date of birth (month, day, and year);
(C) Citizenship or immigration status;
(D) Ethnic or religious affiliation;
(E) Sexual orientation;
(F) Criminal history;
(G) Medical information; and
(H) System authentication information, such as mother's birth name,
account passwords, or personal identification numbers (PINs).
(iii) Other PII that may present an increased risk of harm to the
individual depending on its context, such as a list of employees and
their performance ratings or an unlisted home address or phone number.
The context includes the purpose for which the PII was collected,
maintained, and used. This assessment is critical because the same
information in different contexts can reveal additional information
about the impacted individual.
* * * * *
Federal information means information created, collected,
processed, maintained, disseminated, disclosed, or disposed of by or
for the Federal Government, in any medium or form.
Federal information system means an information system used or
operated by an agency or by a contractor of an agency or by another
organization on behalf of an agency.
Handling means any use of controlled unclassified information,
including but not limited to marking, safeguarding, transporting,
disseminating, re-using, and disposing of the information.
* * * * *
Information resources means information and related resources, such
as personnel, equipment, funds, and information technology.
Information security means protecting information and information
systems from unauthorized access, use, disclosure, disruption,
modification, or destruction in order to provide--
(1) Integrity, which means guarding against improper information
modification or destruction, and includes ensuring information
nonrepudiation and authenticity;
(2) Confidentiality, which means preserving authorized restrictions
on access and disclosure, including means for protecting personal
privacy and proprietary information; and
(3) Availability, which means ensuring timely and reliable access
to and use of information.
Information system means a discrete set of information resources
organized for the collection, processing, maintenance, use, sharing,
dissemination, or disposition of information.
* * * * *
PART 3004--ADMINISTRATIVE MATTERS
0
4. Revise subpart 3004.4 to read as follows:
Subpart 3004.4--Safeguarding Classified and Controlled Unclassified
Information Within Industry
3004.470 Security requirements for access to unclassified
facilities, information resources, and controlled unclassified
information.
3004.470-1 Scope.
3004.470-2 Definitions.
3004.470-3 Policy.
3004.470-4 Contract Clauses.
3004.470-1 Scope.
This section implements DHS policies for assuring adequate security
of unclassified facilities, information resources, and controlled
unclassified information (CUI) during the acquisition lifecycle.
3004.470-2 Definitions.
As used in this subpart--
[[Page 40598]]
Incident means an occurrence that--
(1) Actually or imminently jeopardizes, without lawful authority,
the integrity, confidentiality, or availability of information or an
information system; or
(2) Constitutes a violation or imminent threat of violation of law,
security policies, security procedures, or acceptable use policies.
3004.470-3 Policy.
(a) DHS requires that CUI be safeguarded when it resides on DHS-
owned and operated information systems, DHS-owned and contractor-
operated information systems, contractor-owned and/or operated
information systems operating on behalf of the Department, and any
situation where contractor and/or subcontractor employees may have
access to CUI because of their relationship with DHS. There are several
Department policies and procedures (accessible at https://www.dhs.gov/dhs-security-and-training-requirements-contractors) that also address
the safeguarding of CUI. Compliance with these policies and procedures,
as amended, is required.
(b) DHS requires contractor employees that require recurring access
to government facilities or access to CUI to complete such forms as may
be necessary for security or other reasons, including the conduct of
background investigations to determine fitness. Department policies and
procedures that address contractor employee fitness are contained in
Instruction Handbook Number 121-01-007, The Department of Homeland
Security Personnel Suitability and Security Program. Compliance with
these policies and procedures, as amended, is required.
3004.470-4 Contract Clauses.
(a) Contracting officers shall insert the basic clause at (HSAR) 48
CFR 3052.204-71, Contractor Employee Access, in solicitations and
contracts when contractor and/or subcontractor employees require
recurring access to government facilities or access to CUI. Contracting
officers shall insert the basic clause with its Alternate I for
acquisitions requiring contractor access to government information
resources. For acquisitions in which contractor and/or subcontractor
employees will not have access to government information resources, but
the department has determined contractor and/or subcontractor employee
access to CUI or government facilities must be limited to U.S. citizens
and lawful permanent residents, the contracting officer shall insert
the clause with its Alternate II. Neither the basic clause nor its
alternates shall be used unless contractor and/or subcontractor
employees will require recurring access to government facilities or
access to CUI. Neither the basic clause nor its alternates should
ordinarily be used in contracts with educational institutions.
(b)(1) Contracting officers shall insert the clause at (HSAR) 48
CFR 3052.204-72, Safeguarding of Controlled Unclassified Information,
in solicitations and contracts where:
(i) Contractor and/or subcontractor employees will have access to
CUI; or
(ii) CUI will be collected or maintained on behalf of the agency.
(2) Contracting officers shall insert the basic clause with its
alternate when Federal information systems, which include contractor
information systems operated on behalf of the agency, are used to
collect, process, store, or transmit CUI.
(c) Contracting officers shall insert the clause at (HSAR) 48 CFR
3052.204-73, Notification and Credit Monitoring Requirements for
Personally Identifiable Information Incidents, in solicitations and
contracts where contractor and/or subcontractor employees have access
to PII.
PART 3052--SOLICITATION PROVISIONS AND CONTRACT CLAUSES
0
5. Remove and reserve clause 3052.204-70.
0
6. Revise clause 3052.204-71 to read as follows:
3052.204-71 Contractor employee access.
As prescribed in (HSAR) 48 CFR 3004.470-4(a), insert the following
clause with appropriate alternates:
Contractor Employee Access (July 2023)
(a) Controlled Unclassified Information (CUI) is any information
the Government creates or possesses, or an entity creates or
possesses for or on behalf of the Government (other than classified
information) that a law, regulation, or Governmentwide policy
requires or permits an agency to handle using safeguarding or
dissemination controls. This definition includes the following CUI
categories and subcategories of information:
(1) Chemical-terrorism Vulnerability Information (CVI) as
defined in 6 CFR part 27, ``Chemical Facility Anti-Terrorism
Standards,'' and as further described in supplementary guidance
issued by an authorized official of the Department of Homeland
Security (including the Revised Procedural Manual ``Safeguarding
Information Designated as Chemical-Terrorism Vulnerability
Information'' dated September 2008);
(2) Protected Critical Infrastructure Information (PCII) as set
out in the Critical Infrastructure Information Act of 2002 (title
XXII, subtitle B of the Homeland Security Act of 2002 as amended
through Pub. L. 116-283), PCII's implementing regulations (6 CFR
part 29), the PCII Program Procedures Manual, and any supplementary
guidance officially communicated by an authorized official of the
Department of Homeland Security, the PCII Program Manager, or a PCII
Program Manager Designee;
(3) Sensitive Security Information (SSI) as defined in 49 CFR
part 1520, ``Protection of Sensitive Security Information,'' as
amended, and any supplementary guidance officially communicated by
an authorized official of the Department of Homeland Security
(including the Assistant Secretary for the Transportation Security
Administration or designee), including Department of Homeland
Security MD 11056.1, ``Sensitive Security Information (SSI)'' and,
within the Transportation Security Administration, TSA MD 2810.1,
``SSI Program'';
(4) Homeland Security Agreement Information means information
the Department of Homeland Security receives pursuant to an
agreement with State, local, Tribal, territorial, or private sector
partners that is required to be protected by that agreement. The
Department receives this information in furtherance of the missions
of the Department, including, but not limited to, support of the
Fusion Center Initiative and activities for cyber information
sharing consistent with the Cybersecurity Information Sharing Act of
2015;
(5) Homeland Security Enforcement Information means unclassified
information of a sensitive nature lawfully created, possessed, or
transmitted by the Department of Homeland Security in furtherance of
its immigration, customs, and other civil and criminal enforcement
missions, the unauthorized disclosure of which could adversely
impact the mission of the Department;
(6) International Agreement Information means information the
Department of Homeland Security receives that is required to be
protected by an information sharing agreement or arrangement with a
foreign government, an international organization of governments or
any element thereof, an international or foreign public or judicial
body, or an international or foreign private or non-governmental
organization;
(7) Information Systems Vulnerability Information (ISVI) means:
(i) Department of Homeland Security information technology (IT)
systems data revealing infrastructure used for servers, desktops,
and networks; applications name, version, and release; switching,
router, and gateway information; interconnections and access
methods; and mission or business use/need. Examples of ISVI are
systems inventories and enterprise architecture models. Information
pertaining to national security systems and eligible for
classification under Executive Order 13526 will be classified as
appropriate; and/or
(ii) Information regarding developing or current technology, the
release of which could hinder the objectives of the Department,
compromise a technological advantage or countermeasure, cause a
denial of service, or provide an adversary with sufficient
information to clone, counterfeit, or circumvent a process or
system;
[[Page 40599]]
(8) Operations Security Information means Department of Homeland
Security information that could be collected, analyzed, and
exploited by a foreign adversary to identify intentions,
capabilities, operations, and vulnerabilities that threaten
operational security for the missions of the Department;
(9) Personnel Security Information means information that could
result in physical risk to Department of Homeland Security personnel
or other individuals whom the Department is responsible for
protecting;
(10) Physical Security Information means reviews or reports
illustrating or disclosing facility infrastructure or security
vulnerabilities related to the protection of Federal buildings,
grounds, or property. For example, threat assessments, system
security plans, contingency plans, risk management plans, business
impact analysis studies, and certification and accreditation
documentation;
(11) Privacy Information includes both Personally Identifiable
Information (PII) and Sensitive Personally Identifiable Information
(SPII). PII refers to information that can be used to distinguish or
trace an individual's identity, either alone, or when combined with
other information that is linked or linkable to a specific
individual; and SPII is a subset of PII that if lost, compromised,
or disclosed without authorization could result in substantial harm,
embarrassment, inconvenience, or unfairness to an individual. To
determine whether information is PII, DHS will perform an assessment
of the specific risk that an individual can be identified using the
information with other information that is linked or linkable to the
individual. In performing this assessment, it is important to
recognize that information that is not PII can become PII whenever
additional information becomes available, in any medium or from any
source, that would make it possible to identify an individual.
Certain data elements are particularly sensitive and may alone
present an increased risk of harm to the individual.
(i) Examples of stand-alone PII that are particularly sensitive
include: Social Security numbers (SSNs), driver's license or State
identification numbers, Alien Registration Numbers (A-numbers),
financial account numbers, and biometric identifiers.
(ii) Multiple pieces of information may present an increased
risk of harm to the individual when combined, posing an increased
risk of harm to the individual. SPII may also consist of any
grouping of information that contains an individual's name or other
unique identifier plus one or more of the following elements:
(A) Truncated SSN (such as last 4 digits);
(B) Date of birth (month, day, and year);
(C) Citizenship or immigration status;
(D) Ethnic or religious affiliation;
(E) Sexual orientation;
(F) Criminal history;
(G) Medical information; and
(H) System authentication information, such as mother's birth
name, account passwords, or personal identification numbers (PINs).
(iii) Other PII that may present an increased risk of harm to
the individual depending on its context, such as a list of employees
and their performance ratings or an unlisted home address or phone
number. The context includes the purpose for which the PII was
collected, maintained, and used. This assessment is critical because
the same information in different contexts can reveal additional
information about the impacted individual.
(b) Information Resources means information and related
resources, such as personnel, equipment, funds, and information
technology.
(c) Contractor employees working on this contract must complete
such forms as may be necessary for security or other reasons,
including the conduct of background investigations to determine
suitability. Completed forms shall be submitted as directed by the
Contracting Officer. Upon the Contracting Officer's request, the
Contractor's employees shall be fingerprinted or subject to other
investigations as required. All Contractor employees requiring
recurring access to government facilities or access to CUI or
information resources are required to have a favorably adjudicated
background investigation prior to commencing work on this contract
unless this requirement is waived under departmental procedures.
(d) The Contracting Officer may require the Contractor to
prohibit individuals from working on the contract if the Government
deems their initial or continued employment contrary to the public
interest for any reason, including, but not limited to,
carelessness, insubordination, incompetence, or security concerns.
(e) Work under this contract may involve access to CUI. The
Contractor shall access and use CUI only for the purpose of
furnishing advice or assistance directly to the Government in
support of the Government's activities, and shall not disclose,
orally or in writing, CUI for any other purpose to any person unless
authorized in writing by the Contracting Officer. For those
Contractor employees authorized to access CUI, the Contractor shall
ensure that these persons receive initial and refresher training
concerning the protection and disclosure of CUI. Initial training
shall be completed within 60 days of contract award and refresher
training shall be completed every 2 years thereafter.
(f) The Contractor shall include this clause in all subcontracts
at any tier where the subcontractor may have access to government
facilities, CUI, or information resources.
(End of clause)
Alternate I (July 2023)
When the contract will require Contractor employees to have
access to information resources, add the following paragraphs:
(g) Before receiving access to information resources under this
contract, the individual must complete a security briefing;
additional training for specific categories of CUI, if identified in
the contract; and any nondisclosure agreement furnished by DHS. The
Contracting Officer's Representative (COR) will arrange the security
briefing and any additional training required for specific
categories of CUI.
(h) The Contractor shall have access only to those areas of DHS
information resources explicitly stated in this contract or approved
by the COR in writing as necessary for performance of the work under
this contract. Any attempts by Contractor personnel to gain access
to any information resources not expressly authorized by the terms
and conditions in this contract, or as approved in writing by the
COR, are strictly prohibited. In the event of violation of this
provision, DHS will take appropriate actions with regard to the
contract and the individual(s) involved.
(i) Contractor access to DHS networks from a remote location is
a temporary privilege for mutual convenience while the Contractor
performs business for DHS. It is not a right, a guarantee of access,
a condition of the contract, or government-furnished equipment
(GFE).
(j) Contractor access will be terminated for unauthorized use.
The Contractor agrees to hold and save DHS harmless from any
unauthorized use and agrees not to request additional time or money
under the contract for any delays resulting from unauthorized use or
access.
(k) Non-U.S. citizens shall not be authorized to access or
assist in the development, operation, management, or maintenance of
Department IT systems under the contract, unless a waiver has been
granted by the Head of the Component or designee, with the
concurrence of both the Department's Chief Security Officer (CSO)
and the Chief Information Officer (CIO) or their designees. Within
DHS Headquarters, the waiver may be granted only with the approval
of both the CSO and the CIO or their designees. In order for a
waiver to be granted:
(1) There must be a compelling reason for using this individual
as opposed to a U.S. citizen; and
(2) The waiver must be in the best interest of the Government.
(l) Contractors shall identify in their proposals the names and
citizenship of all non-U.S. citizens proposed to work under the
contract. Any additions or deletions of non-U.S. citizens after
contract award shall also be reported to the Contracting Officer.
(End of clause)
Alternate II (June 2006)
* * * * *
(End of clause)
* * * * *
0
7. Add section 3052.204-72 to read as follows:
3052.204-72 Safeguarding of Controlled Unclassified Information.
As prescribed in (HSAR) 48 CFR 3004.470-4(b), insert the following
clause:
Safeguarding of Controlled Unclassified Information (July 2023)
(a) Definitions. As used in this clause--
Adequate Security means security protections commensurate with
the risk resulting from the unauthorized access, use, disclosure,
disruption, modification, or
[[Page 40600]]
destruction of information. This includes ensuring that information
hosted on behalf of an agency and information systems and
applications used by the agency operate effectively and provide
appropriate confidentiality, integrity, and availability protections
through the application of cost-effective security controls.
Controlled Unclassified Information (CUI) is any information the
Government creates or possesses, or an entity creates or possesses
for or on behalf of the Government (other than classified
information) that a law, regulation, or Governmentwide policy
requires or permits an agency to handle using safeguarding or
dissemination controls. This definition includes the following CUI
categories and subcategories of information:
(1) Chemical-terrorism Vulnerability Information (CVI) as
defined in 6 CFR part 27, ``Chemical Facility Anti-Terrorism
Standards,'' and as further described in supplementary guidance
issued by an authorized official of the Department of Homeland
Security (including the Revised Procedural Manual ``Safeguarding
Information Designated as Chemical-Terrorism Vulnerability
Information'' dated September 2008);
(2) Protected Critical Infrastructure Information (PCII) as set
out in the Critical Infrastructure Information Act of 2002 (title
XXII, subtitle B of the Homeland Security Act of 2002 as amended
through Public Law 116-283), PCII's implementing regulations (6 CFR
part 29), the PCII Program Procedures Manual, and any supplementary
guidance officially communicated by an authorized official of the
Department of Homeland Security, the PCII Program Manager, or a PCII
Program Manager Designee;
(3) Sensitive Security Information (SSI) as defined in 49 CFR
part 1520, ``Protection of Sensitive Security Information,'' as
amended, and any supplementary guidance officially communicated by
an authorized official of the Department of Homeland Security
(including the Assistant Secretary for the Transportation Security
Administration or designee), including Department of Homeland
Security MD 11056.1, ``Sensitive Security Information (SSI)'' and,
within the Transportation Security Administration, TSA MD 2810.1,
``SSI Program'';
(4) Homeland Security Agreement Information means information
the Department of Homeland Security receives pursuant to an
agreement with State, local, Tribal, territorial, or private sector
partners that is required to be protected by that agreement. The
Department receives this information in furtherance of the missions
of the Department, including, but not limited to, support of the
Fusion Center Initiative and activities for cyber information
sharing consistent with the Cybersecurity Information Sharing Act of
2015;
(5) Homeland Security Enforcement Information means unclassified
information of a sensitive nature lawfully created, possessed, or
transmitted by the Department of Homeland Security in furtherance of
its immigration, customs, and other civil and criminal enforcement
missions, the unauthorized disclosure of which could adversely
impact the mission of the Department;
(6) International Agreement Information means information the
Department of Homeland Security receives that is required to be
protected by an information sharing agreement or arrangement with a
foreign government, an international organization of governments or
any element thereof, an international or foreign public or judicial
body, or an international or foreign private or non-governmental
organization;
(7) Information Systems Vulnerability Information (ISVI) means:
(i) Department of Homeland Security information technology (IT)
systems data revealing infrastructure used for servers, desktops,
and networks; applications name, version, and release; switching,
router, and gateway information; interconnections and access
methods; and mission or business use/need. Examples of ISVI are
systems inventories and enterprise architecture models. Information
pertaining to national security systems and eligible for
classification under Executive Order 13526 will be classified as
appropriate; and/or
(ii) Information regarding developing or current technology, the
release of which could hinder the objectives of the Department,
compromise a technological advantage or countermeasure, cause a
denial of service, or provide an adversary with sufficient
information to clone, counterfeit, or circumvent a process or
system;
(8) Operations Security Information means Department of Homeland
Security information that could be collected, analyzed, and
exploited by a foreign adversary to identify intentions,
capabilities, operations, and vulnerabilities that threaten
operational security for the missions of the Department;
(9) Personnel Security Information means information that could
result in physical risk to Department of Homeland Security personnel
or other individuals whom the Department is responsible for
protecting;
(10) Physical Security Information means reviews or reports
illustrating or disclosing facility infrastructure or security
vulnerabilities related to the protection of Federal buildings,
grounds, or property. For example, threat assessments, system
security plans, contingency plans, risk management plans, business
impact analysis studies, and certification and accreditation
documentation;
(11) Privacy Information includes both Personally Identifiable
Information (PII) and Sensitive Personally Identifiable Information
(SPII). PII refers to information that can be used to distinguish or
trace an individual's identity, either alone, or when combined with
other information that is linked or linkable to a specific
individual; and SPII is a subset of PII that if lost, compromised,
or disclosed without authorization could result in substantial harm,
embarrassment, inconvenience, or unfairness to an individual. To
determine whether information is PII, the DHS will perform an
assessment of the specific risk that an individual can be identified
using the information with other information that is linked or
linkable to the individual. In performing this assessment, it is
important to recognize that information that is not PII can become
PII whenever additional information becomes available, in any medium
or from any source, that would make it possible to identify an
individual. Certain data elements are particularly sensitive and may
alone present an increased risk of harm to the individual.
(i) Examples of stand-alone PII that are particularly sensitive
include: Social Security numbers (SSNs), driver's license or State
identification numbers, Alien Registration Numbers (A-numbers),
financial account numbers, and biometric identifiers.
(ii) Multiple pieces of information may present an increased
risk of harm to the individual when combined, posing an increased
risk of harm to the individual. SPII may also consist of any
grouping of information that contains an individual's name or other
unique identifier plus one or more of the following elements:
(A) Truncated SSN (such as last 4 digits);
(B) Date of birth (month, day, and year);
(C) Citizenship or immigration status;
(D) Ethnic or religious affiliation;
(E) Sexual orientation;
(F) Criminal history;
(G) Medical information; and
(H) System authentication information, such as mother's birth
name, account passwords, or personal identification numbers (PINs).
(iii) Other PII that may present an increased risk of harm to
the individual depending on its context, such as a list of employees
and their performance ratings or an unlisted home address or phone
number. The context includes the purpose for which the PII was
collected, maintained, and used. This assessment is critical because
the same information in different contexts can reveal additional
information about the impacted individual.
Federal information means information created, collected,
processed, maintained, disseminated, disclosed, or disposed of by or
for the Federal Government, in any medium or form.
Federal information system means an information system used or
operated by an agency or by a Contractor of an agency or by another
organization on behalf of an agency.
Handling means any use of controlled unclassified information,
including but not limited to marking, safeguarding, transporting,
disseminating, re-using, storing, capturing, and disposing of the
information.
Incident means an occurrence that--
(1) Actually or imminently jeopardizes, without lawful
authority, the integrity, confidentiality, or availability of
information or an information system; or
(2) Constitutes a violation or imminent threat of violation of
law, security policies, security procedures, or acceptable use
policies.
Information Resources means information and related resources,
such as personnel, equipment, funds, and information technology.
Information Security means protecting information and
information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction in order to provide--
(1) Integrity, which means guarding against improper information
modification or
[[Page 40601]]
destruction, and includes ensuring information nonrepudiation and
authenticity;
(2) Confidentiality, which means preserving authorized
restrictions on access and disclosure, including means for
protecting personal privacy and proprietary information; and
(3) Availability, which means ensuring timely and reliable
access to and use of information.
Information System means a discrete set of information resources
organized for the collection, processing, maintenance, use, sharing,
dissemination, or disposition of information.
(b) Handling of Controlled Unclassified Information. (1)
Contractors and subcontractors must provide adequate security to
protect CUI from unauthorized access and disclosure. Adequate
security includes compliance with DHS policies and procedures in
effect at the time of contract award. These policies and procedures
are accessible at https://www.dhs.gov/dhs-security-and-training-requirements-contractors.
(2) The Contractor shall not use or redistribute any CUI
handled, collected, processed, stored, or transmitted by the
Contractor except as specified in the contract.
(3) The Contractor shall not maintain SPII in its invoicing,
billing, and other recordkeeping systems maintained to support
financial or other administrative functions. It is acceptable to
maintain in these systems the names, titles, and contact information
for the Contracting Officer's Representative (COR) or other
government personnel associated with the administration of the
contract, as needed.
(4) Any government data provided, developed, or obtained under
the contract, or otherwise under the control of the Contractor,
shall not become part of the bankruptcy estate in the event a
Contractor and/or subcontractor enters bankruptcy proceedings.
(c) Incident Reporting Requirements. (1) Contractors and
subcontractors shall report all known or suspected incidents to the
Component Security Operations Center (SOC) in accordance with
Attachment F, Incident Response, to DHS Policy Directive 4300A
Information Technology System Security Program, Sensitive Systems.
If the Component SOC is not available, the Contractor shall report
to the DHS Enterprise SOC. Contact information for the DHS
Enterprise SOC is accessible at https://www.dhs.gov/dhs-security-and-training-requirements-contractors. Subcontractors are required
to notify the prime Contractor that it has reported a known or
suspected incident to the Department. Lower tier subcontractors are
required to likewise notify their higher tier subcontractor, until
the prime contractor is reached. The Contractor shall also notify
the Contracting Officer and COR using the contact information
identified in the contract. If the report is made by phone, or the
email address for the Contracting Officer or COR is not immediately
available, the Contractor shall contact the Contracting Officer and
COR immediately after reporting to the Component or DHS Enterprise
SOC.
(2) All known or suspected incidents involving PII or SPII shall
be reported within 1 hour of discovery. All other incidents shall be
reported within 8 hours of discovery.
(3) CUI transmitted via email shall be protected by encryption
or transmitted within secure communications systems. CUI shall be
transmitted using a FIPS 140-2/140-3 Security Requirements for
Cryptographic Modules validated cryptographic module identified on
https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules. When this is impractical or unavailable,
for Federal information systems only, CUI may be transmitted over
regular email channels. When using regular email channels,
Contractors and subcontractors shall not include any CUI in the
subject or body of any email. The CUI shall be included as a
password-protected attachment with the password provided under
separate cover, including as a separate email. Recipients of CUI
information will comply with any email restrictions imposed by the
originator.
(4) An incident shall not, by itself, be interpreted as evidence
that the Contractor or Subcontractor has failed to provide adequate
information security safeguards for CUI or has otherwise failed to
meet the requirements of the contract.
(5) If an incident involves PII or SPII, in addition to the
incident reporting guidelines in Attachment F, Incident Response, to
DHS Policy Directive 4300A Information Technology System Security
Program, Sensitive Systems, Contractors shall also provide as many
of the following data elements that are available at the time the
incident is reported, with any remaining data elements provided
within 24 hours of submission of the initial incident report:
(i) Unique Entity Identifier (UEI);
(ii) Contract numbers affected unless all contracts by the
company are affected;
(iii) Facility CAGE code if the location of the event is
different than the prime Contractor location;
(iv) Point of contact (POC) if different than the POC recorded
in the System for Award Management (address, position, telephone,
and email);
(v) Contracting Officer POC (address, telephone, and email);
(vi) Contract clearance level;
(vii) Name of subcontractor and CAGE code if this was an
incident on a subcontractor network;
(viii) Government programs, platforms, or systems involved;
(ix) Location(s) of incident;
(x) Date and time the incident was discovered;
(xi) Server names where CUI resided at the time of the incident,
both at the Contractor and subcontractor level;
(xii) Description of the government PII or SPII contained within
the system; and
(xiii) Any additional information relevant to the incident.
(d) Incident Response Requirements.
(1) All determinations by the Department related to incidents,
including response activities, will be made in writing by the
Contracting Officer.
(2) The Contractor shall provide full access and cooperation for
all activities determined by the Government to be required to ensure
an effective incident response, including providing all requested
images, log files, and event information to facilitate rapid
resolution of incidents.
(3) Incident response activities determined to be required by
the Government may include, but are not limited to, the following:
(i) Inspections;
(ii) Investigations;
(iii) Forensic reviews;
(iv) Data analyses and processing; and
(v) Revocation of the Authority to Operate (ATO), if applicable.
(4) The Contractor shall immediately preserve and protect images
of known affected information systems and all available monitoring/
packet capture data. The monitoring/packet capture data shall be
retained for at least 180 days from submission of the incident
report to allow DHS to request the media or decline interest.
(5) The Government, at its sole discretion, may obtain
assistance from other Federal agencies and/or third-party firms to
aid in incident response activities.
(e) Certificate of Sanitization of Government and Government-
Activity-Related Files and Information. Upon the conclusion of the
contract by expiration, termination, cancellation, or as otherwise
indicated in the contract, the Contractor shall return all CUI to
DHS and/or destroy it physically and/or logically as identified in
the contract unless the contract states that return and/or
destruction of CUI is not required. Destruction shall conform to the
guidelines for media sanitization contained in NIST SP 800-88,
Guidelines for Media Sanitization. The Contractor shall certify and
confirm the sanitization of all government and government-activity
related files and information. The Contractor shall submit the
certification to the COR and Contracting Officer following the
template provided in NIST SP 800-88, Guidelines for Media
Sanitization, Appendix G.
(f) Other Reporting Requirements. Incident reporting required by
this clause in no way rescinds the Contractor's responsibility for
other incident reporting pertaining to its unclassified information
systems under other clauses that may apply to its contract(s), or as
a result of other applicable statutory or regulatory requirements,
or other U.S. Government requirements.
(g) Subcontracts. The Contractor shall insert this clause in all
subcontracts and require subcontractors to include this clause in
all lower tier subcontracts when subcontractor employees will have
access to CUI; CUI will be collected or maintained on behalf of the
agency by a subcontractor; or a subcontractor information system(s)
will be used to process, store, or transmit CUI.
(End of clause)
Alternate I (July 2023)
When Federal information systems, which include Contractor
information systems operated on behalf of the agency, are used to
collect, process, store, or transmit CUI, add the following
paragraphs:
(h) Authority to Operate. The Contractor shall not collect,
process, store, or transmit CUI within a Federal information system
until an ATO has been granted by the
[[Page 40602]]
Component or Headquarters CIO, or designee. Once the ATO has been
granted by the Government, the Contracting Officer shall incorporate
the ATO into the contract as a compliance document. Unless otherwise
specified in the ATO letter, the ATO is valid for 3 years. An ATO is
granted at the sole discretion of the Government and can be revoked
at any time. Contractor receipt of an ATO does not create any
contractual right of access or entitlement. The Government's grant
of an ATO does not alleviate the Contractor's responsibility to
ensure the information system controls are implemented and operating
effectively.
(1) Complete the Security Authorization process. The Security
Authorization (SA) process shall proceed according to DHS Policy
Directive 4300A Information Technology System Security Program,
Sensitive Systems (Version 13.3, February 13, 2023), or any
successor publication; and the Security Authorization Process Guide,
including templates. These policies and templates are accessible at
https://www.dhs.gov/dhs-security-and-training-requirements-contractors.
(i) Security Authorization Package. The SA package shall be
developed using the government-provided Security Requirements
Traceability Matrix and SA templates. The SA package consists of the
following: Security Plan, Contingency Plan, Contingency Plan Test
Results, Configuration Management Plan, Security Assessment Plan,
Security Assessment Report, and Authorization to Operate Letter.
Additional documents that may be required include a Plan(s) of
Action and Milestones and Interconnection Security Agreement(s). The
Contractor shall submit a signed copy of the SA package, validated
by an independent third party, to the COR for review and approval by
the Component or Headquarters CIO, or designee, at least 30 days
prior to the date of operation of the information system. The
Government is the final authority on the compliance of the SA
package and may limit the number of resubmissions of modified
documents.
(ii) Independent Assessment. Contractors shall have an
independent third party validate the security and privacy controls
in place for the information system(s). The independent third party
shall review and analyze the SA package, and report on technical,
operational, and management level deficiencies as outlined in NIST
SP 800-53, Security and Privacy Controls for Information Systems and
Organizations, or successor publication, accessible at https://csrc.nist.gov/publications/sp. The Contractor shall address all
deficiencies before submitting the SA package to the COR for review.
(2) Renewal of ATO. Unless otherwise specified in the ATO
letter, the Contractor shall renew the ATO every 3 years. The
Contractor is required to update its SA package as part of the ATO
renewal process for review and verification of security controls.
Review and verification of security controls is independent of the
system production date and may include onsite visits that involve
physical or logical inspection of the Contractor environment to
ensure controls are in place. The updated SA package shall be
submitted for review and approval by the Component or Headquarters
CIO, or designee, at least 90 days before the ATO expiration date.
The Contractor shall update its SA package by one of the following
methods:
(i) Updating the SA package in the DHS Information Assurance
Compliance System; or
(ii) Submitting the updated SA package directly to the COR.
(3) Security Review. The Government may elect to conduct
periodic reviews to ensure that the security requirements contained
in the contract are being implemented and enforced. The Government,
at its sole discretion, may obtain assistance from other Federal
agencies and/or third-party firms to aid in security review
activities. The Contractor shall afford DHS, the Office of the
Inspector General, other government organizations, and Contractors
working in support of the Government access to the Contractor's
facilities, installations, operations, documentation, databases,
networks, systems, and personnel used in the performance of this
contract. The Contractor shall, through the Contracting Officer and
COR, contact the Component or Headquarters CIO, or designee, to
coordinate and participate in review and inspection activity by
government organizations external to DHS. Access shall be provided,
to the extent necessary as determined by the Government (including
providing all requested images), for the Government to carry out a
program of inspection, investigation, and audit to safeguard against
threats and hazards to the integrity, availability, and
confidentiality of government data or the function of computer
systems used in performance of this contract and to preserve
evidence of computer crime.
(4) Federal Reporting and Continuous Monitoring Requirements.
Contractors operating information systems on behalf of the
Government shall comply with Federal reporting and information
system continuous monitoring requirements. Reporting requirements
are determined by the Government and are defined in the Fiscal Year
2015 DHS Information Security Performance Plan, or successor
publication, accessible at https://www.dhs.gov/dhs-security-and-training-requirements-contractors. The plan is updated on an annual
basis. Annual, quarterly, and monthly data collection will be
coordinated by the Government. The Contractor shall provide the
Government with all information to fully satisfy Federal reporting
requirements for information systems. The Contractor shall provide
the COR with requested information within 3 business days of receipt
of the request. Unless otherwise specified in the contract, monthly
continuous monitoring data shall be stored at the Contractor's
location for a period not less than 1 year from the date the data
are created. The Government may elect to perform information system
continuous monitoring and IT security scanning of information
systems from government tools and infrastructure.
(End of clause)
0
8. Add section 3052.204-73 to read as follows:
3052.204-73 Notification and Credit Monitoring Requirements for
Personally Identifiable Information Incidents.
As prescribed in (HSAR) 48 CFR 3004.470-4(c), insert the following
clause:
3052.204-73 Notification and Credit Monitoring Requirements for
Personally Identifiable Information Incidents (July 2023)
(a) Definitions. Privacy Information includes both Personally
Identifiable Information (PII) and Sensitive Personally Identifiable
Information (SPII). PII refers to information that can be used to
distinguish or trace an individual's identity, either alone, or when
combined with other information that is linked or linkable to a
specific individual; and SPII is a subset of PII that if lost,
compromised, or disclosed without authorization could result in
substantial harm, embarrassment, inconvenience, or unfairness to an
individual. To determine whether information is PII, the DHS will
perform an assessment of the specific risk that an individual can be
identified using the information with other information that is
linked or linkable to the individual. In performing this assessment,
it is important to recognize that information that is not PII can
become PII whenever additional information becomes available, in any
medium or from any source, that would make it possible to identify
an individual. Certain data elements are particularly sensitive and
may alone present an increased risk of harm to the individual.
(1) Examples of stand-alone PII that are particularly sensitive
include: Social Security numbers (SSNs), driver's license or State
identification numbers, Alien Registration Numbers (A-numbers),
financial account numbers, and biometric identifiers.
(2) Multiple pieces of information may present an increased risk
of harm to the individual when combined, posing an increased risk of
harm to the individual. SPII may also consist of any grouping of
information that contains an individual's name or other unique
identifier plus one or more of the following elements:
(i) Truncated SSN (such as last 4 digits);
(ii) Date of birth (month, day, and year);
(iii) Citizenship or immigration status;
(iv) Ethnic or religious affiliation;
(v) Sexual orientation;
(vi) Criminal history;
(vii) Medical information; and
(viii) System authentication information, such as mother's birth
name, account passwords, or personal identification numbers (PINs).
(3) Other PII that may present an increased risk of harm to the
individual depending on its context, such as a list of employees and
their performance ratings or an unlisted home address or phone
number. The context includes the purpose for which the PII was
collected, maintained, and used. This assessment is critical because
the same
[[Page 40603]]
information in different contexts can reveal additional information
about the impacted individual.
(b) PII and SPII Notification Requirements. (1) No later than 5
business days after being directed by the Contracting Officer, or as
otherwise required by applicable law, the Contractor shall notify
any individual whose PII or SPII was either under the control of the
Contractor or resided in an information system under control of the
Contractor at the time the incident occurred. The method and content
of any notification by the Contractor shall be coordinated with, and
subject to prior written approval by, the Contracting Officer. The
Contractor shall not proceed with notification unless directed in
writing by the Contracting Officer.
(2) All determinations by the Department related to
notifications to affected individuals and/or Federal agencies and
related services (e.g., credit monitoring) will be made in writing
by the Contracting Officer.
(3) Subject to government analysis of the incident and direction
to the Contractor regarding any resulting notification, the
notification method may consist of letters to affected individuals
sent by first-class mail, electronic means, or general public
notice, as approved by the Government. Notification may require the
Contractor's use of address verification and/or address location
services. At a minimum, the notification shall include:
(i) A brief description of the incident;
(ii) A description of the types of PII or SPII involved;
(iii) A statement as to whether the PII or SPII was encrypted or
protected by other means;
(iv) Steps individuals may take to protect themselves;
(v) What the Contractor and/or the Government are doing to
investigate the incident, mitigate the incident, and protect against
any future incidents; and
(vi) Information identifying who individuals may contact for
additional information.
(c) Credit Monitoring Requirements. The Contracting Officer may
direct the Contractor to:
(1) Provide notification to affected individuals as described in
paragraph (b).
(2) Provide credit monitoring services to individuals whose PII
or SPII was under the control of the Contractor or resided in the
information system at the time of the incident for a period
beginning the date of the incident and extending not less than 18
months from the date the individual is notified. Credit monitoring
services shall be provided from a company with which the Contractor
has no affiliation. At a minimum, credit monitoring services shall
include:
(i) Triple credit bureau monitoring;
(ii) Daily customer service;
(iii) Alerts provided to the individual for changes and fraud;
and
(iv) Assistance to the individual with enrollment in the
services and the use of fraud alerts.
(3) Establish a dedicated call center. Call center services
shall include:
(i) A dedicated telephone number to contact customer service
within a fixed period;
(ii) Information necessary for registrants/enrollees to access
credit reports and credit scores;
(iii) Weekly reports on call center volume, issue escalation
(i.e., those calls that cannot be handled by call center staff and
must be resolved by call center management or DHS, as appropriate),
and other key metrics;
(iv) Escalation of calls that cannot be handled by call center
staff to call center management or DHS, as appropriate;
(v) Customized Frequently Asked Questions, approved in writing
by the Contracting Officer in coordination with the Component or
Headquarters Privacy Officer; and
(vi) Information for registrants to contact customer service
representatives and fraud resolution representatives for credit
monitoring assistance.
(End of clause)
0
9. In section 3052.212-70 amend paragraph (b) of the clause by:
0
a. Removing ``_3052.204-70, Security Requirements for Unclassified
Information Technology Resources''
0
b. Revising the entry for 3052.204-71, Contractor Employee Access, and
0
c. Adding 3052.204-72, Safeguarding of Controlled Unclassified
Information and 3052.204-73, Notification and Credit Monitoring
Requirements for Personally Identifiable Information Incidents.
The revision reads as follows:
3052.212-70 Contract terms and conditions applicable to DHS
acquisition of commercial items.
Contract Terms and Conditions Applicable to DHS Acquisition of
Commercial Items (July 2023)
* * * * *
(b) * * *
__3052.204-71 Contractor Employee Access.
__Alternate I
__Alternate II
__3052.204-72 Safeguarding of Controlled Unclassified
Information.
__3052.204-73 Notification and Credit Monitoring Requirements
for Personally Identifiable Information Incidents.
* * * * *
Paul Courtney,
Chief Procurement Officer, Department of Homeland Security.
[FR Doc. 2023-11270 Filed 6-20-23; 8:45 am]
BILLING CODE 9110-9B-P