Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements; Correction, 47471-47472 [2024-12084]

Download as PDF 47471 Proposed Rules Federal Register Vol. 89, No. 107 Monday, June 3, 2024 This section of the FEDERAL REGISTER contains notices to the public of the proposed issuance of rules and regulations. The purpose of these notices is to give interested persons an opportunity to participate in the rule making prior to the adoption of the final rules. DEPARTMENT OF HOMELAND SECURITY 6 CFR Part 226 [Docket No. CISA–2022–0010] RIN 1670–AA04 Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements; Correction Cybersecurity and Infrastructure Security Agency, DHS. ACTION: Proposed rule; correction. AGENCY: On April 4, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) published, in the Federal Register, the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements notice of proposed rulemaking (NPRM). The NPRM proposes regulations to implement CIRCIA’s covered cyber incident and ransom payment reporting requirements for covered entities. In the section describing covered entities, the NPRM included information and references in the applicability criteria for transportation system entities that were based on a proposed rule that has not yet been published by the Transportation Security Administration (TSA). This document clarifies and corrects the proposed applicability criteria for pipeline facilities and systems in the sector-based criteria discussion for transportation systems sector entities. DATES: Comments to the NPRM published at 89 FR 23644 on April 4, 2024, and related material must be submitted on or before July 3, 2024. ADDRESSES: You may send comments, identified by docket number CISA– 2022–0010, through the Federal eRulemaking Portal available at https:// www.regulations.gov. Instructions: All comments received must include the docket number for this rulemaking. All comments received will be posted to https:// www.regulations.gov, including any personal information provided. If you lotter on DSK11XQN23PROD with PROPOSALS1 SUMMARY: VerDate Sep<11>2014 16:22 May 31, 2024 Jkt 262001 cannot submit your comment using https://www.regulations.gov, contact the person in the FOR FURTHER INFORMATION CONTACT section of this proposed rule for alternate instructions. For detailed instructions on sending comments and additional information on the types of comments that are of particular interest to CISA for this proposed rulemaking, see the SUPPLEMENTARY INFORMATION section of the proposed rulemaking document at 89 FR 23644 (Apr. 4, 2024). Docket: For access to the docket and to read background documents mentioned in this proposed rule and comments received, go to https:// www.regulations.gov. FOR FURTHER INFORMATION CONTACT: Todd Klessman, CIRCIA Rulemaking Team Lead, Cybersecurity and Infrastructure Security Agency, circia@ cisa.dhs.gov, 202–964–6869. SUPPLEMENTARY INFORMATION: Background and Discussion On April 4, 2024, CISA published a NPRM, ‘‘Cyber Incident Reporting for Critical Infrastructure Act Reporting Requirements,’’ 89 FR 23644, that was required by the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA).1 CIRCIA requires covered entities to report to CISA within certain prescribed timeframes any covered cyber incidents, ransom payments made in response to a ransomware attack, and any substantial new or different information discovered related to a previously submitted report.2 CIRCIA further requires the Director of CISA to implement these new reporting requirements through rulemaking. The NPRM solicits public comment on proposed regulations that would codify these reporting requirements. In proposed 6 CFR 226.2, Applicability, CISA proposed a list of entities that would be required to report under the proposed regulation.3 Specifically, in § 226.2(b)(14), CISA proposed sector-based criteria for ‘‘Transportation system entities’’ that would be considered covered entities.4 As noted in the NPRM, CISA aligned the aforementioned sector-based criteria’s description of a covered entity to 1 See 6 U.S.C. 681–681g; Public Law 117–103, as amended by Public Law 117–263 (Dec. 23, 2022). 2 6 U.S.C. 681b(a)(1)–(3). 3 89 FR 23768 (Apr. 4, 2024). 4 89 FR 23768. PO 00000 Frm 00001 Fmt 4702 Sfmt 4702 include those entities identified by TSA as requiring cyber incident reporting and, in some cases, enhanced cybersecurity measures.5 To facilitate this alignment, CISA’s NPRM proposed § 226.2(b)(14) that an ‘‘entity required by the Transportation Security Administration to report cyber incidents’’ or otherwise meets one or more criteria related to owners and operators of various non-maritime transportation system infrastructure, such as freight railroad, public transportation and passenger railroads (PTPR), pipeline facilities and systems, over-the-road bus (OTRB) operations, passenger and all-cargo aircraft, indirect air carriers, airports, and Certified Cargo Screening Facilities, would be considered a covered entity.6 Each of these proposed criteria included specific references to where these entities are identified in TSA’s current regulations.7 However, for the sectorbased criteria that would be applicable to pipeline facilities or systems, the proposed criterion references a section, 49 CFR 1586.101, that TSA intends to include in TSA’s forthcoming Enhancing Surface Cyber Risk Management NPRM, which has not yet been published in the Federal Register.8 Until that rule is finalized, the section related to pipeline facilities or systems does not exist in the CFR. Because the CIRCIA NPRM does not specifically describe which pipeline facilities or systems that CISA proposes as covered entities until TSA’s rulemaking is finalized, CISA’s intent through this notice is to clarify and correct this point. As stated in the CIRCIA NPRM, CISA’s intent is to align CIRCIA requirements applicable to aviation and surface transportation entities with TSA’s requirements to support reduction of duplication and to avoid unintended gaps in cyber incident reporting. As such, CISA proposed applicability criteria describing covered entities in 6 CFR 226.2(b)(14) that include entities that are currently required, or will be required, to report 5 See 89 FR 23699–23701. FR 23768. 7 See 89 FR 23768. 8 See 89 FR 23768 and TSA, Fall 2023 Unified Agenda, RIN 1652–AA74: Enhancing Surface Cyber Risk Management, https://www.reginfo.gov/public/ do/eAgendaViewRule?pubId=202310RIN=1652AA74 (accessed May 14, 2024). 6 89 E:\FR\FM\03JNP1.SGM 03JNP1 lotter on DSK11XQN23PROD with PROPOSALS1 47472 Federal Register / Vol. 89, No. 107 / Monday, June 3, 2024 / Proposed Rules cyber incidents to TSA.9 It is for this reason that CISA specifically proposed describing a covered entity as an ‘‘entity [that] is required by the Transportation Security Administration to report cyber incidents’’ in proposed 6 CFR 226.2(b)(14), so that any entities, such as pipeline facilities or systems, that are required to currently report cyber incidents to TSA under Security Directives would also be considered covered entities that are required to report under CIRCIA. For the surface transportation sector, TSA currently requires reporting of cyber incidents to CISA by owner/ operators of certain freight railroads, passenger railroads, rail transit systems, and hazardous and natural gas pipeline facilities and systems pursuant to Security Directives issued under the authority of 49 U.S.C. 114(l)(2).10 Under these Security Directives, TSA notifies owner/operators of pipeline facilities or systems directly if the requirements in the Security Directive are applicable to them. Using a risk-based approach, a small percentage within each mode of transportation are required to report cybersecurity incidents, but these entities represent a significant portion of capacity, throughput, and ridership for each of these modes. As indicated in the CIRCIA NPRM, and as described in this notice, CISA proposes that all such owners/operators of pipeline facilities and systems identified by TSA and required to report cybersecurity incidents pursuant to TSA Security Directives are considered covered entities under 6 CFR 226.2(b)(14) until TSA finalizes its Enhancing Surface Cyber Risk Management rule. To address the concern regarding cross-referencing a regulatory section that does not currently exist, CISA is issuing this correction to remove the reference to that specific regulatory section and, instead, propose criterion to make clear that CIRCIA’s description of a covered entity for pipeline facilities or systems includes any entity that is currently required by TSA to report cyber incidents under a Security Directive or is otherwise identified as required to report under TSA’s final regulations. For owner/operators of pipeline facilities or systems not currently subject to reporting requirements under TSA’s Security Directives, it is CISA’s understanding, through consultation with TSA, that TSA intends to continue using a riskbased approach in determining entities subject to its regulations, similar to its Security Directive approach and that 9 89 FR 23768. 10 See 89 FR 23651. VerDate Sep<11>2014 17:34 May 31, 2024 Jkt 262001 applicability of cyber incident reporting requirements beyond the existing Security Directives will not be substantially expanded. TSA’s Security Directives indicate that approximately 100 pipeline systems are considered the most critical.11 CISA acknowledges the total number of owner/operators may slightly change consistent with an updated risk analysis developed for purposes of TSA’s proposed rule. However, CISA continues to believe the Regulatory Impact Analysis for the CIRCIA rulemaking is an accurate estimate insomuch that the applicability of the TSA covered entities will continue to be approximately 115 entities.12 As mentioned in the CIRCIA NPRM, CISA believes that aligning CIRCIA’s Applicability section with the population of entities from which TSA requires cyber incident reporting or at which TSA requires the implementation of enhanced cybersecurity measures is appropriate for CIRCIA and consistent with the factors contained in 6 U.S.C. 681b(c)(1). CISA will continue to coordinate with TSA throughout the rulemaking process to harmonize CIRCIA’s Applicability section with TSA, to the maximum extent practicable. Comments on the NPRM and related material must be submitted on or before July 3, 2024. See Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements; Extension of Comment Period at 89 FR 37141. DHS believes this correction does not warrant extending the current 90-day comment period for the NPRM. Correction In FR Doc. 2024–06526, published at 89 FR 23644 in the issue of April 4, 2024, on page 23768, in the third column, in § 226.2, correct paragraph (b)(14)(iv) to read as follows: ■ § 226.2 [Corrected] * * * * * (b) * * * (14) * * * (iv) A pipeline facility or system owner or operator required to report 11 See TSA Security Directive Pipeline-2021–02D, at 4 n.9 (citing section 1557(b) of the Implementing Recommendations of the 9/11 Commission Act of 2007, Public Law 110–53 121 Stat. 266, 475 (codified at 6 U.S.C. 1207(b)). 12 See Section 2.2.14 of the Preliminary RIA, which estimates 115 pipeline entities would be affected by the proposed criteria for pipeline facilities or systems. PO 00000 Frm 00002 Fmt 4702 Sfmt 4702 cyber incidents by the Transportation Security Administration; * * * * * Jennie M. Easterly, Director, Cybersecurity and Infrastructure Security Agency, Department of Homeland Security. [FR Doc. 2024–12084 Filed 5–30–24; 8:45 am] BILLING CODE 9111–LF–P DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket Number USCG–2024–0449] RIN 1625–AA00 Safety Zone; Fireworks Display, Marina Park, Irrigon, OR Coast Guard, DHS. Notice of proposed rulemaking. AGENCY: ACTION: The Coast Guard is proposing to establish a temporary safety zone for certain waters of Umatilla Marina. This action is necessary to provide for the safety of life on these navigable waters near Irrigon, OR, during a fireworks display on July 27, 2024. This proposed rulemaking would prohibit persons and vessels from entering the safety zone unless authorized by the Captain of the Port Columbia River or a designated representative. We invite your comments on this proposed rulemaking. DATES: Comments and related material must be received by the Coast Guard on or before July 3, 2024. ADDRESSES: You may submit comments identified by docket number USCG– 2024–0449 using the Federal DecisionMaking Portal at https:// www.regulations.gov. See the ‘‘Public Participation and Request for Comments’’ portion of the SUPPLEMENTARY INFORMATION section for further instructions on submitting comments. This notice of proposed rulemaking with its plain-language, 100word-or-less proposed rule summary will be available in this same docket. FOR FURTHER INFORMATION CONTACT: If you have questions about this proposed rulemaking, call or email Lieutenant Carlie Gilligan, Waterways Management Division, Marine Safety Unit Portland, Coast Guard; telephone 503–240–9319, email SCRWWM@USCG.MIL. SUPPLEMENTARY INFORMATION: SUMMARY: I. Table of Abbreviations CFR Code of Federal Regulations COTP Captain of the Port E:\FR\FM\03JNP1.SGM 03JNP1

Agencies

[Federal Register Volume 89, Number 107 (Monday, June 3, 2024)]
[Proposed Rules]
[Pages 47471-47472]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-12084]


========================================================================
Proposed Rules
                                                Federal Register
________________________________________________________________________

This section of the FEDERAL REGISTER contains notices to the public of 
the proposed issuance of rules and regulations. The purpose of these 
notices is to give interested persons an opportunity to participate in 
the rule making prior to the adoption of the final rules.

========================================================================


Federal Register / Vol. 89, No. 107 / Monday, June 3, 2024 / Proposed 
Rules

[[Page 47471]]



DEPARTMENT OF HOMELAND SECURITY

6 CFR Part 226

[Docket No. CISA-2022-0010]
RIN 1670-AA04


Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) 
Reporting Requirements; Correction

AGENCY: Cybersecurity and Infrastructure Security Agency, DHS.

ACTION: Proposed rule; correction.

-----------------------------------------------------------------------

SUMMARY: On April 4, 2024, the Cybersecurity and Infrastructure 
Security Agency (CISA) published, in the Federal Register, the Cyber 
Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting 
Requirements notice of proposed rulemaking (NPRM). The NPRM proposes 
regulations to implement CIRCIA's covered cyber incident and ransom 
payment reporting requirements for covered entities. In the section 
describing covered entities, the NPRM included information and 
references in the applicability criteria for transportation system 
entities that were based on a proposed rule that has not yet been 
published by the Transportation Security Administration (TSA). This 
document clarifies and corrects the proposed applicability criteria for 
pipeline facilities and systems in the sector-based criteria discussion 
for transportation systems sector entities.

DATES: Comments to the NPRM published at 89 FR 23644 on April 4, 2024, 
and related material must be submitted on or before July 3, 2024.

ADDRESSES: You may send comments, identified by docket number CISA-
2022-0010, through the Federal eRulemaking Portal available at https://www.regulations.gov.
    Instructions: All comments received must include the docket number 
for this rulemaking. All comments received will be posted to https://www.regulations.gov, including any personal information provided. If 
you cannot submit your comment using https://www.regulations.gov, 
contact the person in the FOR FURTHER INFORMATION CONTACT section of 
this proposed rule for alternate instructions. For detailed 
instructions on sending comments and additional information on the 
types of comments that are of particular interest to CISA for this 
proposed rulemaking, see the SUPPLEMENTARY INFORMATION section of the 
proposed rulemaking document at 89 FR 23644 (Apr. 4, 2024).
    Docket: For access to the docket and to read background documents 
mentioned in this proposed rule and comments received, go to https://www.regulations.gov.

FOR FURTHER INFORMATION CONTACT: Todd Klessman, CIRCIA Rulemaking Team 
Lead, Cybersecurity and Infrastructure Security Agency, 
[email protected], 202-964-6869.

SUPPLEMENTARY INFORMATION:

Background and Discussion

    On April 4, 2024, CISA published a NPRM, ``Cyber Incident Reporting 
for Critical Infrastructure Act Reporting Requirements,'' 89 FR 23644, 
that was required by the Cyber Incident Reporting for Critical 
Infrastructure Act of 2022 (CIRCIA).\1\ CIRCIA requires covered 
entities to report to CISA within certain prescribed timeframes any 
covered cyber incidents, ransom payments made in response to a 
ransomware attack, and any substantial new or different information 
discovered related to a previously submitted report.\2\ CIRCIA further 
requires the Director of CISA to implement these new reporting 
requirements through rulemaking. The NPRM solicits public comment on 
proposed regulations that would codify these reporting requirements.
---------------------------------------------------------------------------

    \1\ See 6 U.S.C. 681-681g; Public Law 117-103, as amended by 
Public Law 117-263 (Dec. 23, 2022).
    \2\ 6 U.S.C. 681b(a)(1)-(3).
---------------------------------------------------------------------------

    In proposed 6 CFR 226.2, Applicability, CISA proposed a list of 
entities that would be required to report under the proposed 
regulation.\3\ Specifically, in Sec.  226.2(b)(14), CISA proposed 
sector-based criteria for ``Transportation system entities'' that would 
be considered covered entities.\4\ As noted in the NPRM, CISA aligned 
the aforementioned sector-based criteria's description of a covered 
entity to include those entities identified by TSA as requiring cyber 
incident reporting and, in some cases, enhanced cybersecurity 
measures.\5\ To facilitate this alignment, CISA's NPRM proposed Sec.  
226.2(b)(14) that an ``entity required by the Transportation Security 
Administration to report cyber incidents'' or otherwise meets one or 
more criteria related to owners and operators of various non-maritime 
transportation system infrastructure, such as freight railroad, public 
transportation and passenger railroads (PTPR), pipeline facilities and 
systems, over-the-road bus (OTRB) operations, passenger and all-cargo 
aircraft, indirect air carriers, airports, and Certified Cargo 
Screening Facilities, would be considered a covered entity.\6\ Each of 
these proposed criteria included specific references to where these 
entities are identified in TSA's current regulations.\7\ However, for 
the sector-based criteria that would be applicable to pipeline 
facilities or systems, the proposed criterion references a section, 49 
CFR 1586.101, that TSA intends to include in TSA's forthcoming 
Enhancing Surface Cyber Risk Management NPRM, which has not yet been 
published in the Federal Register.\8\ Until that rule is finalized, the 
section related to pipeline facilities or systems does not exist in the 
CFR. Because the CIRCIA NPRM does not specifically describe which 
pipeline facilities or systems that CISA proposes as covered entities 
until TSA's rulemaking is finalized, CISA's intent through this notice 
is to clarify and correct this point.
---------------------------------------------------------------------------

    \3\ 89 FR 23768 (Apr. 4, 2024).
    \4\ 89 FR 23768.
    \5\ See 89 FR 23699-23701.
    \6\ 89 FR 23768.
    \7\ See 89 FR 23768.
    \8\ See 89 FR 23768 and TSA, Fall 2023 Unified Agenda, RIN 1652-
AA74: Enhancing Surface Cyber Risk Management, https://www.reginfo.gov/public/do/eAgendaViewRule?pubId=202310RIN=1652-AA74 
(accessed May 14, 2024).
---------------------------------------------------------------------------

    As stated in the CIRCIA NPRM, CISA's intent is to align CIRCIA 
requirements applicable to aviation and surface transportation entities 
with TSA's requirements to support reduction of duplication and to 
avoid unintended gaps in cyber incident reporting. As such, CISA 
proposed applicability criteria describing covered entities in 6 CFR 
226.2(b)(14) that include entities that are currently required, or will 
be required, to report

[[Page 47472]]

cyber incidents to TSA.\9\ It is for this reason that CISA specifically 
proposed describing a covered entity as an ``entity [that] is required 
by the Transportation Security Administration to report cyber 
incidents'' in proposed 6 CFR 226.2(b)(14), so that any entities, such 
as pipeline facilities or systems, that are required to currently 
report cyber incidents to TSA under Security Directives would also be 
considered covered entities that are required to report under CIRCIA.
---------------------------------------------------------------------------

    \9\ 89 FR 23768.
---------------------------------------------------------------------------

    For the surface transportation sector, TSA currently requires 
reporting of cyber incidents to CISA by owner/operators of certain 
freight railroads, passenger railroads, rail transit systems, and 
hazardous and natural gas pipeline facilities and systems pursuant to 
Security Directives issued under the authority of 49 U.S.C. 
114(l)(2).\10\ Under these Security Directives, TSA notifies owner/
operators of pipeline facilities or systems directly if the 
requirements in the Security Directive are applicable to them. Using a 
risk-based approach, a small percentage within each mode of 
transportation are required to report cybersecurity incidents, but 
these entities represent a significant portion of capacity, throughput, 
and ridership for each of these modes. As indicated in the CIRCIA NPRM, 
and as described in this notice, CISA proposes that all such owners/
operators of pipeline facilities and systems identified by TSA and 
required to report cybersecurity incidents pursuant to TSA Security 
Directives are considered covered entities under 6 CFR 226.2(b)(14) 
until TSA finalizes its Enhancing Surface Cyber Risk Management rule.
---------------------------------------------------------------------------

    \10\ See 89 FR 23651.
---------------------------------------------------------------------------

    To address the concern regarding cross-referencing a regulatory 
section that does not currently exist, CISA is issuing this correction 
to remove the reference to that specific regulatory section and, 
instead, propose criterion to make clear that CIRCIA's description of a 
covered entity for pipeline facilities or systems includes any entity 
that is currently required by TSA to report cyber incidents under a 
Security Directive or is otherwise identified as required to report 
under TSA's final regulations. For owner/operators of pipeline 
facilities or systems not currently subject to reporting requirements 
under TSA's Security Directives, it is CISA's understanding, through 
consultation with TSA, that TSA intends to continue using a risk-based 
approach in determining entities subject to its regulations, similar to 
its Security Directive approach and that applicability of cyber 
incident reporting requirements beyond the existing Security Directives 
will not be substantially expanded. TSA's Security Directives indicate 
that approximately 100 pipeline systems are considered the most 
critical.\11\ CISA acknowledges the total number of owner/operators may 
slightly change consistent with an updated risk analysis developed for 
purposes of TSA's proposed rule. However, CISA continues to believe the 
Regulatory Impact Analysis for the CIRCIA rulemaking is an accurate 
estimate insomuch that the applicability of the TSA covered entities 
will continue to be approximately 115 entities.\12\
---------------------------------------------------------------------------

    \11\ See TSA Security Directive Pipeline-2021-02D, at 4 n.9 
(citing section 1557(b) of the Implementing Recommendations of the 
9/11 Commission Act of 2007, Public Law 110-53 121 Stat. 266, 475 
(codified at 6 U.S.C. 1207(b)).
    \12\ See Section 2.2.14 of the Preliminary RIA, which estimates 
115 pipeline entities would be affected by the proposed criteria for 
pipeline facilities or systems.
---------------------------------------------------------------------------

    As mentioned in the CIRCIA NPRM, CISA believes that aligning 
CIRCIA's Applicability section with the population of entities from 
which TSA requires cyber incident reporting or at which TSA requires 
the implementation of enhanced cybersecurity measures is appropriate 
for CIRCIA and consistent with the factors contained in 6 U.S.C. 
681b(c)(1). CISA will continue to coordinate with TSA throughout the 
rulemaking process to harmonize CIRCIA's Applicability section with 
TSA, to the maximum extent practicable.
    Comments on the NPRM and related material must be submitted on or 
before July 3, 2024. See Cyber Incident Reporting for Critical 
Infrastructure Act (CIRCIA) Reporting Requirements; Extension of 
Comment Period at 89 FR 37141. DHS believes this correction does not 
warrant extending the current 90-day comment period for the NPRM.

Correction

0
In FR Doc. 2024-06526, published at 89 FR 23644 in the issue of April 
4, 2024, on page 23768, in the third column, in Sec.  226.2, correct 
paragraph (b)(14)(iv) to read as follows:


Sec.  226.2   [Corrected]

* * * * *
    (b) * * *
    (14) * * *
    (iv) A pipeline facility or system owner or operator required to 
report cyber incidents by the Transportation Security Administration;
* * * * *

Jennie M. Easterly,
Director, Cybersecurity and Infrastructure Security Agency, Department 
of Homeland Security.
[FR Doc. 2024-12084 Filed 5-30-24; 8:45 am]
BILLING CODE 9111-LF-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.