Request for Comment on Security Requirements for Restricted Transactions Under Executive Order 14117, 85976-85980 [2024-24709]

Download as PDF 85976 Federal Register / Vol. 89, No. 209 / Tuesday, October 29, 2024 / Notices Name of Committee: Center for Scientific Review Special Emphasis Panel; Member Conflict: Sensorimotor, Olfaction, and Interoception. Date: November 21, 2024. Time: 12 p.m. to 6 p.m. Agenda: To review and evaluate grant applications. Address: National Institutes of Health, Rockledge II, 6701 Rockledge Drive, Bethesda, MD 20892. Meeting Format: Virtual Meeting. Contact Person: Kirk Thompson, Ph.D., Scientific Review Officer, Center for Scientific Review, National Institutes of Health, 6701 Rockledge Drive, Room 5184, MSC 7844, Bethesda, MD 20892, 301–435– 1242, email: kgt@mail.nih.gov. Name of Committee: Center for Scientific Review Special Emphasis Panel; Member Conflict: Skeletal Muscle and Rehabilitation Sciences. Date: November 22, 2024. Time: 9 a.m. to 6 p.m. Agenda: To review and evaluate grant applications. Address: National Institutes of Health, Rockledge II, 6701 Rockledge Drive, Bethesda, MD 20892. Meeting Format: Virtual Meeting. Contact Person: Chee Lim, Ph.D., Scientific Review Officer, Center for Scientific Review, National Institutes of Health, 6701 Rockledge Drive, Room 4128, Bethesda, MD 20892, (301) 435–1850, email: limc4@csr.nih.gov. (Catalogue of Federal Domestic Assistance Program Nos. 93.306, Comparative Medicine; 93.333, Clinical Research, 93.306, 93.333, 93.337, 93.393–93.396, 93.837–93.844, 93.846–93.878, 93.892, 93.893, National Institutes of Health, HHS) Dated: October 24, 2024. Bruce A. George, Program Analyst, Office of Federal Advisory Committee Policy. [FR Doc. 2024–25099 Filed 10–28–24; 8:45 am] BILLING CODE 4140–01–P DEPARTMENT OF HOMELAND SECURITY [Docket No. CISA–2024–0028] Request for Comment on Product Security Bad Practices Guidance Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS). ACTION: Notice of availability; extension of comment period. AGENCY: On October 16, 2024, the Cybersecurity Division (CSD) within the Cybersecurity and Infrastructure Security Agency (CISA) published a request for comment in the Federal Register on the voluntary, draft Product Security Bad Practices guidance, which requests feedback on the draft guidance. CISA is extending the comment period khammond on DSKJM1Z7X2PROD with NOTICES SUMMARY: VerDate Sep<11>2014 17:34 Oct 28, 2024 Jkt 265001 for the draft guidance for an additional fourteen days through December 16, 2024. The comment period for the proposed voluntary guidance published on October 16, 2024, at 89 FR 83508 is extended. Comments and related materials must be submitted on or before December 16, 2024. ADDRESSES: You may submit comments, identified by docket number CISA– 2024–0028, by following the instructions below for submitting comments via the Federal eRulemaking Portal at https://www.regulations.gov. Instructions: All comments received must include the agency name and docket number Docket Number CISA– 2024–0028. All comments received will be posted without change to https:// www.regulations.gov, including any personal information provided. CISA reserves the right to publicly republish relevant and unedited comments in their entirety that are submitted to the docket. Do not include personal information such as account numbers, social security numbers, or the names of other individuals. Do not submit confidential business information or otherwise sensitive or protected information. Docket: For access to the docket to read the draft Product Security Bad Practices Guidance or comments received, go to https:// www.regulations.gov. DATES: Kirk Lawrence, 202–617–0036, SecureByDesign@cisa.dhs.gov. SUPPLEMENTARY INFORMATION: On October 16, 2024, CISA published a request for comment on voluntary, draft Product Security Bad Practices guidance (89 FR 83508). In the draft guidance, we provided an overview of product security practices that are deemed exceptionally risky, particularly for organizations supporting critical infrastructure or national critical functions (NCFs), and it provides recommendations for software manufacturers to voluntarily mitigate these risks. The guidance contained in the document is non-binding, and while CISA encourages organizations to avoid these bad practices, the document imposes no requirement on them to do so. The draft guidance is scoped to software manufacturers who develop software products and services, including on-premises software, cloud services, and software as a service (SaaS), used in support of critical infrastructure or NCFs. The request for comment provided for a 45-day comment period, set to close on FOR FURTHER INFORMATION CONTACT: PO 00000 Frm 00042 Fmt 4703 Sfmt 4703 December 2, 2024. CISA received requests to extend the deadline given the Thanksgiving holiday. Therefore, the comment period is now open through December 16, 2024. This notice is issued under the authority of 6 U.S.C. 652 and 659. Jeffrey E. Greene, Executive Assistant Director for Cybersecurity, Cybersecurity and Infrastructure Security Agency, Department of Homeland Security. [FR Doc. 2024–25078 Filed 10–28–24; 8:45 am] BILLING CODE 9111–LF–P DEPARTMENT OF HOMELAND SECURITY [Docket No. CISA–2024–0029] Request for Comment on Security Requirements for Restricted Transactions Under Executive Order 14117 Cybersecurity and Infrastructure Security Agency (CISA), DHS. ACTION: Notice and request for comment. AGENCY: CISA seeks public input on the development of security requirements for restricted transactions as directed by Executive Order (E.O.) 14117, ‘‘Preventing Access to Americans’ Bulk Sensitive Personal Data and United States GovernmentRelated Data by Countries of Concern.’’ E.O. 14117 addresses national-security and foreign-policy threats that arise when countries of concern and covered persons can access bulk U.S. sensitive personal data or government-related data. The proposed CISA security requirements for restricted transactions would apply to classes of restricted transactions identified in regulations issued by the Department of Justice (DOJ). DATES: Written comments are requested on or before November 29, 2024. ADDRESSES: You may send comments, identified by docket number CISA– 2024–0029, through the Federal eRulemaking Portal available at https:// www.regulations.gov. Instructions: All comments received will be posted to https:// www.regulations.gov, including any personal information provided. For detailed instructions on sending comments and for information on the types of comments that are of particular interest to CISA, see the ‘‘Public Participation’’ and ‘‘Request for Public Input’’ heading of the SUPPLEMENTARY INFORMATION section of this document. Please note that this notice and request SUMMARY: E:\FR\FM\29OCN1.SGM 29OCN1 Federal Register / Vol. 89, No. 209 / Tuesday, October 29, 2024 / Notices for comment is not a rulemaking and that the Federal eRulemaking Portal is being utilized only as a mechanism for receiving comments. FOR FURTHER INFORMATION CONTACT: Alicia Smith, Senior Policy Counsel, Cybersecurity and Infrastructure Security Agency, EOSecurityReqs@ cisa.dhs.gov, 202–316–1560. SUPPLEMENTARY INFORMATION: khammond on DSKJM1Z7X2PROD with NOTICES I. Public Participation All interested stakeholders are invited to comment on this notice and the security requirements described herein by submitting written data, comments, views, or arguments using the method identified in the ADDRESSES section. Interested stakeholders may view a copy of the proposed security requirements on CISA’s website by visiting https:// www.cisa.gov and searching for ‘‘Proposed Security Requirements for Restricted Transactions.’’ A copy of the proposed security requirements is also included in the docket for this notice and request for comment, docket number CISA–2024–0029. All members of the public are invited to comment including, but not limited to, specialists in the field, academic experts, industry stakeholders, and public interest groups. Instructions: All submissions must include the agency name and Docket ID for this notice. Comments may be submitted electronically via the Federal e-Rulemaking Portal. To submit comments electronically: 1. Go to www.regulations.gov and enter CISA–2024–0029 in the search field, 2. Click the ‘‘Comment Now!’’ icon, complete the required fields, and 3. Enter or attach your comments. All submissions, including attachments and other supporting materials, will become part of the public record and may be subject to public disclosure. CISA reserves the right to publish relevant comments publicly, unedited and in their entirety. Personal information, such as account numbers or Social Security numbers, or names of other individuals, should not be included. Do not submit confidential business information or otherwise sensitive or protected information. All comments received will be posted to https://www.regulations.gov. Commenters are encouraged to identify the number of the specific topic or topics that they are addressing. Docket: For access to the docket to read background documents or comments received, go to https:// www.regulations.gov and search for the Docket ID. VerDate Sep<11>2014 17:34 Oct 28, 2024 Jkt 265001 II. Background 85977 A. History and Legal Authority On February 28, 2024, the President issued E.O. 14117 entitled ‘‘Preventing Access to Americans’ Bulk Sensitive Personal Data and U.S. GovernmentRelated Data by Countries of Concern’’ (the ‘‘Order’’), pursuant to his authority under the Constitution and laws of the United States, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.), the National Emergencies Act (50 U.S.C. 1601 et seq.), and section 301 of Title 3, United States Code. In the Order, the President expanded the scope of the national emergency declared in E.O. 13873 of May 15, 2019 ‘‘Securing the Information and Communications Technology and Services Supply Chain,’’ and further addressed the national emergency with additional measures in E.O. 14034 of June 9, 2021, ‘‘Protecting Americans’ Sensitive Data from Foreign Adversaries.’’ Specifically, Section 2(a) of E.O. 14117 directs the Attorney General, in coordination with the Secretary of Homeland Security and in consultation with the heads of relevant agencies, to issue, subject to public notice and comment, regulations that prohibit or otherwise restrict United States persons from engaging in any acquisition, holding, use, transfer, transportation, or exportation of, or dealing in, any property in which a foreign country or national thereof has any interest (‘‘transaction’’), where the transaction: (i) involves bulk sensitive personal data or United States Government-related data, as defined by final rules implementing the Order; (ii) is a member of a class of transactions that has been determined by the Attorney General to pose an unacceptable risk to the national security of the United States because the transactions may enable countries of concern or covered persons to access bulk sensitive personal data or United States Government-related data in a manner that contributes to the national emergency described in the Order; and (iii) meets other criteria specified by the Order.1 Among other things, the E.O., at Section 2(c) instructs the Attorney General, in coordination with the Secretary of Homeland Security and in consultation with the relevant agencies, to issue regulations identifying specific categories of transactions (‘‘restricted transactions’’) that meet the criteria described in (ii) above for which the Attorney General determines that security requirements, to be established by the Secretary of Homeland Security through the Director of CISA in accordance with Section 2(d) of the Order, adequately mitigate the risks of access by countries of concern or covered persons 2 to bulk sensitive personal data or United States Government-related data. In turn, Section 2(d) directs the Secretary of Homeland Security, acting through the Director of CISA, to propose, seek public comment on, and publish those security requirements, and Section 2(e) delegates to the Secretary of Homeland Security the President’s powers under IEPPA as necessary to carry out Section 2(d). On March 5, 2024, DOJ published an advance notice of proposed rulemaking (ANPRM) explaining a proposed framework that DOJ is considering for its forthcoming rules that would regulate certain data transactions involving bulk U.S. sensitive personal data and government-related data, as DOJ proposed to define these terms in the ANPRM. 89 FR 15780. The ANPRM states that DOJ is considering identifying three classes of restricted data transactions to address critical risk areas to the extent they involve countries of concern or covered persons and bulk U.S. sensitive personal data: vendor agreements; employment agreements; and investment agreements. 89 FR 15783. If implemented as described, such categories of transactions would be restricted, and otherwise prohibited unless they meet the security requirements developed by DHS in coordination with DOJ. See 89 FR 15788. The ANPRM includes an outline of what the security requirements might entail. 89 FR 15795. Through the ANPRM, DOJ also proposes a framework for enforcement of its regulations. See 89 FR 15797–15798. DOJ is issuing a notice of proposed rulemaking (NPRM), Provisions Pertaining to Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countries of Concern or Covered Persons, [DOJ Docket No. NSD–104, RIN 1124–AA01], in the proposed rule section of this issue of the Federal Register for public comment. Through this notice, CISA announces the proposed security requirements applicable to the classes of restricted transactions defined in DOJ’s 1 The other criteria do not directly impact the development of the security requirements but are related to DOJ’s implementation of the E.O.’s directive via their regulations. See E.O. 14117, sec. 2(a)(iii)–(v), 89 FR 15421, 15423 (Mar. 1, 2024). 2 Section 2(c)(iii) of the Order requires the Attorney General to identify, with the concurrence of the Secretaries of State and Commerce, countries of concern and, as appropriate, classes of covered persons for the purposes of the Order. PO 00000 Frm 00043 Fmt 4703 Sfmt 4703 E:\FR\FM\29OCN1.SGM 29OCN1 85978 Federal Register / Vol. 89, No. 209 / Tuesday, October 29, 2024 / Notices khammond on DSKJM1Z7X2PROD with NOTICES NPRM and requests public comment on the content of the security requirements. B. Purpose and Structure of Proposed Security Requirements The primary goal of the proposed security requirements is to address national-security and foreign-policy threats that arise when countries of concern 3 and covered persons access bulk U.S. sensitive personal data or U.S. government-related data that may be implicated by the categories of restricted transactions. As explained in E.O. 14117, unrestricted transfers of Americans’ bulk sensitive personal data and U.S. government-related data to countries of concern present a range of threats to national security and foreign policy. See 89 FR 15421. Access to bulk sensitive personal data and governmentrelated data can allow countries of concern to engage in malicious cyberenabled activities and malign foreign influence. See 89 FR 15422. With access to such data, countries of concern can track and build profiles on U.S. individuals, including members of the military and Federal employees and contractors, for illicit purposes such as blackmail and espionage. Id. Countries of concern can also use access to this data to collect information on activists, academics, journalists, dissidents, political figures, or members of nongovernmental organizations or marginalized communities to intimidate them; curb political opposition; limit freedoms of expression, peaceful assembly, or association; or enable other forms of suppression of civil liberties. Id. In making this assessment, DOJ noted that the Office of the Director of National Intelligence (ODNI) has assessed that adversaries view data, including personally identifiable information on U.S. citizens, ‘‘as a strategic resource’’ to increase the effectiveness of their espionage, influence, kinetic, and cyber-attack operations and provide a strategic advantage over the United States. See id. (citing Office of the Director of National Intelligence, Annual Threat Assessment of the U.S. Intelligence Community at 26 (Feb. 6, 2023), https://perma.cc/4B2Y7NVD). DOJ assessed that advanced technologies, including big-data analytics, artificial intelligence, and high-performance computing, increase the ability of countries of concern to analyze and manipulate large tranches of data to more effectively target, influence, and coerce people in the 3 Terms used in CISA’s proposed security requirements that are defined in the DOJ rulemaking have the same meaning in the proposed security requirements as provided in the DOJ rulemaking. VerDate Sep<11>2014 17:34 Oct 28, 2024 Jkt 265001 United States. See 89 FR 15781 and E.O. 14117. The proposed security requirements are designed to mitigate the risk of sharing bulk U.S. sensitive personal data or U.S. government-related data with countries of concern or covered persons through restricted transactions.4 They do this by imposing conditions specifically on the covered data that may be shared as part of a restricted transaction, on the covered systems more broadly (both terms CISA is proposing to define within the security requirements), and on the organization as a whole. While the proposed requirements on covered systems and on an organization’s governance of those systems apply more broadly than to the data at issue and the restricted transaction itself, CISA assesses that implementation of these requirements is necessary to validate that the organization has the technical capability and sufficient governance structure to appropriately select, successfully implement, and continue to apply the proposed covered data-level security requirements in a way that addresses the risks identified by DOJ for the restricted transactions. For example, to ensure and validate that a covered system denies covered persons access to covered data, it is necessary to maintain audit logs of accesses as well as organizational processes to utilize those logs. Similarly, it is necessary for an organization to develop identity management processes and systems to establish an understanding of which persons may have access to different data sets. In addition to proposed requirements on covered systems, applying security requirements on the covered data itself that may be accessed in a restricted transaction is also necessary to address the risks. The specific requirements that are most technologically and logistically appropriate for different types of 4 CISA notes that the proposed security requirements are, as required by the E.O., designed to ‘‘address the unacceptable risk posed by restricted transactions, as identified by the Attorney General.’’ E.O. 14117 Sec. 2(d). They are not intended to reflect a comprehensive cybersecurity program. For example, several areas addressed in CISA’s Cross-Sector Cybersecurity Performance Goals (CPGs), available at https://www.cisa.gov/ cross-sector-cybersecurity-performance-goals, are not reflected in the proposed data security requirements, even though the CPGs themselves are a common set of protections that CISA recommends all critical infrastructure entities voluntarily implement to meaningfully reduce the likelihood and impact of known risks and adversary techniques. As the operational lead for federal cybersecurity and national coordinator for critical infrastructure security and resilience, CISA recommends that all U.S. persons implement cybersecurity best practices in light of the risk and potential consequence of cyber events. PO 00000 Frm 00044 Fmt 4703 Sfmt 4703 restricted transactions may vary. For example, some transactions may be amenable to approaches that minimize data or process it in such a way that does not reveal covered data to covered persons. In other cases, techniques such as access control and encryption may be more appropriate to deny any access by covered persons to covered data. The proposed security requirements contemplate multiple options to minimize the risk to covered data, though all the options build upon the foundation of the proposed requirements imposed on covered systems and the organization as a whole. While CISA is proposing that U.S. persons 5 engaging in restricted transactions must implement all the organizational and covered-system level requirements, CISA proposes that such persons will have some flexibility to determine which combination of datalevel requirements are sufficient to fully and effectively prevent access to covered data by covered persons and/or countries of concern, based on the nature of the transaction and the data at issue. The proposed security requirements are divided into two sections: organizational and covered system-level requirements (Section I) and covered data-level requirements (Section II). The listed requirements were selected with the intent of directly mitigating the risk of access to covered data, with additional requirements included to ensure effective governance of that access, as well as approaches for establishing an auditable basis for compliance purposes. Requirements that directly mitigate the risk of access include I.B.1–2, I.B.4–6, and all datalevel requirements (II.A.1–3, II.B.1–3, II.C, and II.D). Requirements included as a mechanism for ensuring proper implementation and governance of those access controls include I.A.1–7. Additional requirements incorporated as a mechanism for ensuring auditable compliance of the aforementioned access controls include I.B.3 and I.C. These proposed requirements reflect a minimum set of practices that CISA believes are required for effective data 5 As noted above, for the purposes of the proposed security requirements, to the extent CISA uses a term that is proposed to be defined in the DOJ rulemaking, CISA proposes to use that definition. Therefore, CISA is using the term U.S. persons as proposed to be defined by the DOJ [A]NPRM. That definition reads ‘‘any United States citizen, national, or lawful permanent resident; or any individual admitted to the United States as a refugee under 8 U.S.C. 1157 or granted asylum under 8 U.S.C. 1158; or any entity organized solely under the laws of the United States or any jurisdiction within the United States (including foreign branches); or any person in the United States.’’ 89 FR 15788 and proposed 28 CFR 202.257. E:\FR\FM\29OCN1.SGM 29OCN1 khammond on DSKJM1Z7X2PROD with NOTICES Federal Register / Vol. 89, No. 209 / Tuesday, October 29, 2024 / Notices protection, as informed by CISA’s operational experience. Through this notice, CISA seeks additional input based on the experience industry stakeholders. These requirements have been designed to be representative of broadly accepted industry best practices and are intended to address the needs of national security without imposing an unachievable burden on industry. As directed by E.O. 14117, the proposed security requirements are based on National Institute of Standards & Technology (NIST) Cybersecurity Framework (CSF), and the NIST Privacy Framework (PF). 89 FR 15424. See NIST, Cybersecurity Framework ver. 2.0, available at https://www.nist.gov/ cyberframework, and NIST, Privacy Framework ver. 1.0, available at https:// www.nist.gov/privacy-framework. CISA has also leveraged existing performance goals, guidance, practices, and controls, including the CISA Cross-Sector Cybersecurity Performance Goals (CPGs), which are themselves based on the NIST CSF and PF. CISA, CrossSector Cybersecurity Performance Goals, available at https://www.cisa.gov/crosssector-cybersecurity-performance-goals. By leveraging existing performance goals, guidance, practices, and controls, CISA hopes to mitigate the burden of understanding and implementing the security requirements where necessary. In the proposed security requirements, CISA included parentheticals noting the specific NIST CSF and PF provisions upon which the proposed security requirements are based. CISA is seeking additional public comment on these references. The DOJ NPRM proposes to require, consistent with E.O. 14117, that United States persons engaging in restricted transactions must comply with the final security requirements by incorporating the standards by reference. Finally, the proposed security requirements include a definitions section. To the extent the proposed requirements use a term already proposed to be defined in the DOJ rulemaking, CISA’s use of that term in the proposed security requirement would carry the same meaning. For the purpose of these proposed security requirements, CISA proposes to include definitions for six terms used exclusively in the proposed security requirements: • Asset. CISA proposes to define the term to mean data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes. This proposed definition is derived from the CSF NIST CSF version 1.1, which defined asset as ‘‘[t]he data, personnel, devices, systems, and VerDate Sep<11>2014 17:34 Oct 28, 2024 Jkt 265001 facilities that enable the organization to achieve business purposes.’’ • Covered data. CISA proposes to define the term to mean the two categories of data identified by the E.O. and that DOJ is proposing to regulate— bulk U.S. sensitive personal data or government-related data. • Information system. CISA proposes to define this term consistent with the definition in the Paperwork Reduction Act (PRA), 44 U.S.C. 3502.6 The term would mean a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. • Covered system. CISA proposes to define this term as a specific type of information system that is used to conduct a number of activities related to covered data as part of a restricted transaction. These activities are drawn from a combination of the activities in the proposed definition of information system in the proposed security requirements and the activities in the DOJ ANPRM’s proposed definition of access. See 89 FR 15788; proposed 28 CFR 202.201. The term would mean an information system used to obtain, read, copy, decrypt, edit, divert, release, affect, alter the state of, view, receive, collect, process, maintain, use, share, disseminate, or dispose of covered data as part of a restricted transaction, regardless of whether the data is encrypted, anonymized, pseudonymized, or de-identified. • Network. CISA proposes to define this term, which CISA developed consistent with the definition of the term in NIST Special Publication 800– 171 rev. 3, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. The term would mean a system of interconnected components, which may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices. 6 6 U.S.C. 650(14) (which applies to all of Title XXII of the Homeland Security Act of 2002, which, in turn, contains most of CISA’s authorities) defines Information System as having the meaning given the term in the Paperwork Reduction Act, 44 U.S.C. 3502, and specifically includes ‘‘industrial control systems, such as supervisory control and data acquisition systems, distributed control systems, and programmable logic controllers.’’ 6 U.S.C. 650(14). However, given CISA’s assumption that this type of operational technology is unlikely to be implicated by DOJ’s proposed regulations, CISA is not proposing to include the operational technology-related prong here. CISA welcomes comments on this assumption. PO 00000 Frm 00045 Fmt 4703 Sfmt 4703 85979 III. Request for Public Input A. Importance of Public Feedback CISA is committed to seeking and incorporating public input into its approach to the development and content of the security requirements required by E.O. 14117. The proposed security requirements are available for review on CISA’s website by visiting https://www.cisa.gov and searching for ‘‘Proposed Security Requirements for Restricted Transactions.’’ A copy of the proposed security requirements is also included in the docket for this notice and request for comment, docket number CISA–2024–0029. Below is a list of questions regarding the proposed security requirements for which CISA believes feedback could be particularly useful. CISA seeks a balanced approach to development of the security requirements, which would mitigate the risks of access to Americans’ bulk sensitive personal data or governmentrelated data by countries of concern while accounting for the impact that adopting these measures may have on those entities that would implement them. CISA encourages public comment on these topics and any other topics that commenters believe may be useful to CISA in the development of the forthcoming security requirements. The type of feedback that is most useful to the agency will identify specific approaches that CISA may want to consider and provide information supporting why the approach would foster a cost-effective and balanced approach. As discussed in more detail below, commenters may want to consider submitting views on organizational- and system-level requirements and/or data-level requirements. Feedback that contains specific information, data, or recommendations is more useful to CISA than generic feedback that omits these components. For comments that contain any numerical estimates, CISA encourages the commenter to provide any assumptions made in calculating the numerical estimates. B. List of Questions for Commenters Below is a non-exhaustive list of questions that are meant to assist members of the public in formulating their comments in response to this notice. The list of questions is not intended to restrict the issues that commenters may address. For more information on the proposed regulatory structure in which the security requirements will apply, please review DOJ’s NPRM, Provisions Pertaining to Preventing Access to U.S. Sensitive Personal Data and Government-Related E:\FR\FM\29OCN1.SGM 29OCN1 khammond on DSKJM1Z7X2PROD with NOTICES 85980 Federal Register / Vol. 89, No. 209 / Tuesday, October 29, 2024 / Notices Data by Countries of Concern or Covered Persons, [DOJ Docket No. NSD– 104, RIN 1124–AA01], published in today’s proposed rule section of the Federal Register for public comment. 1. Are the proposed security requirements sufficiently robust to mitigate the risks of access to Americans’ bulk sensitive personal data or government-related data by countries of concern? 2. Are the proposed organizationaland system-level requirements sufficient to provide U.S. persons engaging in restricted transactions confidence that logical and physical access to covered data is sufficiently managed to deny access to covered persons or countries of concern? 3. Do the security requirements provide sufficient flexibility, clarity, and specificity for the types of restricted transactions typically engaged in by U.S. entities, including to avoid overly burdening commercial activity not involving covered data while providing sufficient level of detail to aid in compliance verification? 4. Are there other data-level requirements (beyond those listed in Section II of the proposed security requirements) that CISA should consider that would enable U.S. entities to engage in commercial transactions without revealing covered data to covered persons or countries of concern? 5. The current approach allows for flexibility to determine which data-level requirements are sufficient to fully and effectively prevent access to covered data by covered persons and/or countries of concern. Are there datalevel requirements that CISA should consider requiring in all cases? 6. What additional interpretive guidance would be helpful to U.S. entities in determining which data-level requirements should be applied based on the nature of the transaction and the data at issue? 7. What substantive requirements should CISA consider in Section II.C. to further define appropriate privacyenhancing technologies that may be used within restricted transactions? 8. Should the standards for data aggregation in Section II.A differ from the proposed definition of bulk in the DOJ regulations? If so, are there requirements CISA should impose for U.S. persons engaged in restricted transactions to ensure that covered data is not re-constructable through aggregation while permitting more granular thresholds? 9. Are there additional substantive standards that should be added to the data-level requirements in Section II to VerDate Sep<11>2014 17:34 Oct 28, 2024 Jkt 265001 better ensure their implementation can achieve the policy goal of not permitting access to covered data by covered persons or countries of concern? 10. To what extent could the measures described currently be reversed, broken, or circumvented by a technologically sophisticated actor? Are there additional conditions that would better or more appropriately mitigate this risk? If so, please describe them in detail. 11. To what extent could the measures described be rendered reversible, breakable, or able to be circumvented by anticipated future technology advances? What type of future technology advances would pose the greatest risk to these types of protective measures? 12. Would it be useful to the entities likely to undertake restricted transactions if CISA mapped these requirements to ISO–27001 or example controls from NIST Special Publication 800–171 (e.g., to facilitate compliance audits)? Jennie M. Easterly, Director, Cybersecurity and Infrastructure Security Agency, Department of Homeland Security. [FR Doc. 2024–24709 Filed 10–22–24; 4:15 pm] BILLING CODE 9111–1LF–P DEPARTMENT OF THE INTERIOR Fish and Wildlife Service [FWS–HQ–MB–2024–N056; FXMB1231099BPP0–256–FF09M22000; OMB Control Number 1018–0067] Agency Information Collection Activities; Submission to the Office of Management and Budget; Approval Procedures for Nontoxic Shot and Shot Coatings Fish and Wildlife Service, Interior. ACTION: Notice of information collection; request for comment. AGENCY: In accordance with the Paperwork Reduction Act of 1995, we, the U.S. Fish and Wildlife Service (Service), are proposing to renew an information collection without change. DATES: Interested persons are invited to submit comments on or before November 29, 2024. ADDRESSES: Written comments and recommendations for the proposed information collection should be submitted within 30 days of publication of this notice at https:// www.reginfo.gov/public/do/PRAMain. Find this particular information SUMMARY: PO 00000 Frm 00046 Fmt 4703 Sfmt 4703 collection by selecting ‘‘Currently under Review—Open for Public Comments’’ or by using the search function. Please provide a copy of your comments to the Service Information Collection Clearance Officer, U.S. Fish and Wildlife Service, MS: PRB (JAO/3W), 5275 Leesburg Pike, Falls Church, VA 22041–3803 (mail); or by email to Info_ Coll@fws.gov. Please reference ‘‘1018– 0067’’ in the subject line of your comments. FOR FURTHER INFORMATION CONTACT: Madonna L. Baucum, Service Information Collection Clearance Officer, by email at Info_Coll@fws.gov, or by telephone at (703) 358–2503. Individuals in the United States who are deaf, deafblind, hard of hearing, or have a speech disability may dial 711 (TTY, TDD, or TeleBraille) to access telecommunications relay services. Individuals outside the United States should use the relay services offered within their country to make international calls to the point-ofcontact in the United States. SUPPLEMENTARY INFORMATION: In accordance with the Paperwork Reduction Act (PRA; 44 U.S.C. 3501 et seq.) and its implementing regulations at 5 CFR 1320, all information collections require approval under the PRA. We may not conduct or sponsor and you are not required to respond to a collection of information unless it displays a currently valid OMB control number. As part of our continuing effort to reduce paperwork and respondent burdens, we invite the public and other Federal agencies to comment on new, proposed, revised, and continuing collections of information. This helps us assess the impact of our information collection requirements and minimize the public’s reporting burden. It also helps the public understand our information collection requirements and provide the requested data in the desired format. On August 7, 2024, we published in the Federal Register (89 FR 64476) a notice of our intent to request that OMB renew this information collection. In that notice, we solicited comments for 60 days, ending on October 7, 2024. In a continued effort to increase public awareness of, and participation in, our public commenting processes associated with information collection requests, the Service also published the Federal Register notice on Regulations.gov (Docket No. FWS–HQ–MB–2024–0093) to provide the public with an additional method to submit comments (in addition to the typical U.S. mail submission method). We received an E:\FR\FM\29OCN1.SGM 29OCN1

Agencies

[Federal Register Volume 89, Number 209 (Tuesday, October 29, 2024)]
[Notices]
[Pages 85976-85980]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-24709]


-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

[Docket No. CISA-2024-0029]


Request for Comment on Security Requirements for Restricted 
Transactions Under Executive Order 14117

AGENCY: Cybersecurity and Infrastructure Security Agency (CISA), DHS.

ACTION: Notice and request for comment.

-----------------------------------------------------------------------

SUMMARY: CISA seeks public input on the development of security 
requirements for restricted transactions as directed by Executive Order 
(E.O.) 14117, ``Preventing Access to Americans' Bulk Sensitive Personal 
Data and United States Government-Related Data by Countries of 
Concern.'' E.O. 14117 addresses national-security and foreign-policy 
threats that arise when countries of concern and covered persons can 
access bulk U.S. sensitive personal data or government-related data. 
The proposed CISA security requirements for restricted transactions 
would apply to classes of restricted transactions identified in 
regulations issued by the Department of Justice (DOJ).

DATES: Written comments are requested on or before November 29, 2024.

ADDRESSES: You may send comments, identified by docket number CISA-
2024-0029, through the Federal eRulemaking Portal available at https://www.regulations.gov.
    Instructions: All comments received will be posted to https://www.regulations.gov, including any personal information provided. For 
detailed instructions on sending comments and for information on the 
types of comments that are of particular interest to CISA, see the 
``Public Participation'' and ``Request for Public Input'' heading of 
the SUPPLEMENTARY INFORMATION section of this document. Please note 
that this notice and request

[[Page 85977]]

for comment is not a rulemaking and that the Federal eRulemaking Portal 
is being utilized only as a mechanism for receiving comments.

FOR FURTHER INFORMATION CONTACT: Alicia Smith, Senior Policy Counsel, 
Cybersecurity and Infrastructure Security Agency, 
[email protected], 202-316-1560.

SUPPLEMENTARY INFORMATION:

I. Public Participation

    All interested stakeholders are invited to comment on this notice 
and the security requirements described herein by submitting written 
data, comments, views, or arguments using the method identified in the 
ADDRESSES section. Interested stakeholders may view a copy of the 
proposed security requirements on CISA's website by visiting https://www.cisa.gov and searching for ``Proposed Security Requirements for 
Restricted Transactions.'' A copy of the proposed security requirements 
is also included in the docket for this notice and request for comment, 
docket number CISA-2024-0029. All members of the public are invited to 
comment including, but not limited to, specialists in the field, 
academic experts, industry stakeholders, and public interest groups.
    Instructions: All submissions must include the agency name and 
Docket ID for this notice. Comments may be submitted electronically via 
the Federal e-Rulemaking Portal.
    To submit comments electronically:
    1. Go to www.regulations.gov and enter CISA-2024-0029 in the search 
field,
    2. Click the ``Comment Now!'' icon, complete the required fields, 
and
    3. Enter or attach your comments.
    All submissions, including attachments and other supporting 
materials, will become part of the public record and may be subject to 
public disclosure. CISA reserves the right to publish relevant comments 
publicly, unedited and in their entirety. Personal information, such as 
account numbers or Social Security numbers, or names of other 
individuals, should not be included. Do not submit confidential 
business information or otherwise sensitive or protected information. 
All comments received will be posted to https://www.regulations.gov. 
Commenters are encouraged to identify the number of the specific topic 
or topics that they are addressing.
    Docket: For access to the docket to read background documents or 
comments received, go to https://www.regulations.gov and search for the 
Docket ID.

II. Background

A. History and Legal Authority

    On February 28, 2024, the President issued E.O. 14117 entitled 
``Preventing Access to Americans' Bulk Sensitive Personal Data and U.S. 
Government-Related Data by Countries of Concern'' (the ``Order''), 
pursuant to his authority under the Constitution and laws of the United 
States, including the International Emergency Economic Powers Act (50 
U.S.C. 1701 et seq.), the National Emergencies Act (50 U.S.C. 1601 et 
seq.), and section 301 of Title 3, United States Code. In the Order, 
the President expanded the scope of the national emergency declared in 
E.O. 13873 of May 15, 2019 ``Securing the Information and 
Communications Technology and Services Supply Chain,'' and further 
addressed the national emergency with additional measures in E.O. 14034 
of June 9, 2021, ``Protecting Americans' Sensitive Data from Foreign 
Adversaries.'' Specifically, Section 2(a) of E.O. 14117 directs the 
Attorney General, in coordination with the Secretary of Homeland 
Security and in consultation with the heads of relevant agencies, to 
issue, subject to public notice and comment, regulations that prohibit 
or otherwise restrict United States persons from engaging in any 
acquisition, holding, use, transfer, transportation, or exportation of, 
or dealing in, any property in which a foreign country or national 
thereof has any interest (``transaction''), where the transaction: (i) 
involves bulk sensitive personal data or United States Government-
related data, as defined by final rules implementing the Order; (ii) is 
a member of a class of transactions that has been determined by the 
Attorney General to pose an unacceptable risk to the national security 
of the United States because the transactions may enable countries of 
concern or covered persons to access bulk sensitive personal data or 
United States Government-related data in a manner that contributes to 
the national emergency described in the Order; and (iii) meets other 
criteria specified by the Order.\1\
---------------------------------------------------------------------------

    \1\ The other criteria do not directly impact the development of 
the security requirements but are related to DOJ's implementation of 
the E.O.'s directive via their regulations. See E.O. 14117, sec. 
2(a)(iii)-(v), 89 FR 15421, 15423 (Mar. 1, 2024).
---------------------------------------------------------------------------

    Among other things, the E.O., at Section 2(c) instructs the 
Attorney General, in coordination with the Secretary of Homeland 
Security and in consultation with the relevant agencies, to issue 
regulations identifying specific categories of transactions 
(``restricted transactions'') that meet the criteria described in (ii) 
above for which the Attorney General determines that security 
requirements, to be established by the Secretary of Homeland Security 
through the Director of CISA in accordance with Section 2(d) of the 
Order, adequately mitigate the risks of access by countries of concern 
or covered persons \2\ to bulk sensitive personal data or United States 
Government-related data. In turn, Section 2(d) directs the Secretary of 
Homeland Security, acting through the Director of CISA, to propose, 
seek public comment on, and publish those security requirements, and 
Section 2(e) delegates to the Secretary of Homeland Security the 
President's powers under IEPPA as necessary to carry out Section 2(d).
---------------------------------------------------------------------------

    \2\ Section 2(c)(iii) of the Order requires the Attorney General 
to identify, with the concurrence of the Secretaries of State and 
Commerce, countries of concern and, as appropriate, classes of 
covered persons for the purposes of the Order.
---------------------------------------------------------------------------

    On March 5, 2024, DOJ published an advance notice of proposed 
rulemaking (ANPRM) explaining a proposed framework that DOJ is 
considering for its forthcoming rules that would regulate certain data 
transactions involving bulk U.S. sensitive personal data and 
government-related data, as DOJ proposed to define these terms in the 
ANPRM. 89 FR 15780. The ANPRM states that DOJ is considering 
identifying three classes of restricted data transactions to address 
critical risk areas to the extent they involve countries of concern or 
covered persons and bulk U.S. sensitive personal data: vendor 
agreements; employment agreements; and investment agreements. 89 FR 
15783. If implemented as described, such categories of transactions 
would be restricted, and otherwise prohibited unless they meet the 
security requirements developed by DHS in coordination with DOJ. See 89 
FR 15788. The ANPRM includes an outline of what the security 
requirements might entail. 89 FR 15795. Through the ANPRM, DOJ also 
proposes a framework for enforcement of its regulations. See 89 FR 
15797-15798.
    DOJ is issuing a notice of proposed rulemaking (NPRM), Provisions 
Pertaining to Preventing Access to U.S. Sensitive Personal Data and 
Government-Related Data by Countries of Concern or Covered Persons, 
[DOJ Docket No. NSD-104, RIN 1124-AA01], in the proposed rule section 
of this issue of the Federal Register for public comment. Through this 
notice, CISA announces the proposed security requirements applicable to 
the classes of restricted transactions defined in DOJ's

[[Page 85978]]

NPRM and requests public comment on the content of the security 
requirements.

B. Purpose and Structure of Proposed Security Requirements

    The primary goal of the proposed security requirements is to 
address national-security and foreign-policy threats that arise when 
countries of concern \3\ and covered persons access bulk U.S. sensitive 
personal data or U.S. government-related data that may be implicated by 
the categories of restricted transactions. As explained in E.O. 14117, 
unrestricted transfers of Americans' bulk sensitive personal data and 
U.S. government-related data to countries of concern present a range of 
threats to national security and foreign policy. See 89 FR 15421. 
Access to bulk sensitive personal data and government-related data can 
allow countries of concern to engage in malicious cyber-enabled 
activities and malign foreign influence. See 89 FR 15422. With access 
to such data, countries of concern can track and build profiles on U.S. 
individuals, including members of the military and Federal employees 
and contractors, for illicit purposes such as blackmail and espionage. 
Id. Countries of concern can also use access to this data to collect 
information on activists, academics, journalists, dissidents, political 
figures, or members of non-governmental organizations or marginalized 
communities to intimidate them; curb political opposition; limit 
freedoms of expression, peaceful assembly, or association; or enable 
other forms of suppression of civil liberties. Id. In making this 
assessment, DOJ noted that the Office of the Director of National 
Intelligence (ODNI) has assessed that adversaries view data, including 
personally identifiable information on U.S. citizens, ``as a strategic 
resource'' to increase the effectiveness of their espionage, influence, 
kinetic, and cyber-attack operations and provide a strategic advantage 
over the United States. See id. (citing Office of the Director of 
National Intelligence, Annual Threat Assessment of the U.S. 
Intelligence Community at 26 (Feb. 6, 2023), https://perma.cc/4B2Y-7NVD). DOJ assessed that advanced technologies, including big-data 
analytics, artificial intelligence, and high-performance computing, 
increase the ability of countries of concern to analyze and manipulate 
large tranches of data to more effectively target, influence, and 
coerce people in the United States. See 89 FR 15781 and E.O. 14117.
---------------------------------------------------------------------------

    \3\ Terms used in CISA's proposed security requirements that are 
defined in the DOJ rulemaking have the same meaning in the proposed 
security requirements as provided in the DOJ rulemaking.
---------------------------------------------------------------------------

    The proposed security requirements are designed to mitigate the 
risk of sharing bulk U.S. sensitive personal data or U.S. government-
related data with countries of concern or covered persons through 
restricted transactions.\4\ They do this by imposing conditions 
specifically on the covered data that may be shared as part of a 
restricted transaction, on the covered systems more broadly (both terms 
CISA is proposing to define within the security requirements), and on 
the organization as a whole. While the proposed requirements on covered 
systems and on an organization's governance of those systems apply more 
broadly than to the data at issue and the restricted transaction 
itself, CISA assesses that implementation of these requirements is 
necessary to validate that the organization has the technical 
capability and sufficient governance structure to appropriately select, 
successfully implement, and continue to apply the proposed covered 
data-level security requirements in a way that addresses the risks 
identified by DOJ for the restricted transactions. For example, to 
ensure and validate that a covered system denies covered persons access 
to covered data, it is necessary to maintain audit logs of accesses as 
well as organizational processes to utilize those logs. Similarly, it 
is necessary for an organization to develop identity management 
processes and systems to establish an understanding of which persons 
may have access to different data sets.
---------------------------------------------------------------------------

    \4\ CISA notes that the proposed security requirements are, as 
required by the E.O., designed to ``address the unacceptable risk 
posed by restricted transactions, as identified by the Attorney 
General.'' E.O. 14117 Sec. 2(d). They are not intended to reflect a 
comprehensive cybersecurity program. For example, several areas 
addressed in CISA's Cross-Sector Cybersecurity Performance Goals 
(CPGs), available at https://www.cisa.gov/cross-sector-cybersecurity-performance-goals, are not reflected in the proposed 
data security requirements, even though the CPGs themselves are a 
common set of protections that CISA recommends all critical 
infrastructure entities voluntarily implement to meaningfully reduce 
the likelihood and impact of known risks and adversary techniques. 
As the operational lead for federal cybersecurity and national 
coordinator for critical infrastructure security and resilience, 
CISA recommends that all U.S. persons implement cybersecurity best 
practices in light of the risk and potential consequence of cyber 
events.
---------------------------------------------------------------------------

    In addition to proposed requirements on covered systems, applying 
security requirements on the covered data itself that may be accessed 
in a restricted transaction is also necessary to address the risks. The 
specific requirements that are most technologically and logistically 
appropriate for different types of restricted transactions may vary. 
For example, some transactions may be amenable to approaches that 
minimize data or process it in such a way that does not reveal covered 
data to covered persons. In other cases, techniques such as access 
control and encryption may be more appropriate to deny any access by 
covered persons to covered data. The proposed security requirements 
contemplate multiple options to minimize the risk to covered data, 
though all the options build upon the foundation of the proposed 
requirements imposed on covered systems and the organization as a 
whole. While CISA is proposing that U.S. persons \5\ engaging in 
restricted transactions must implement all the organizational and 
covered-system level requirements, CISA proposes that such persons will 
have some flexibility to determine which combination of data-level 
requirements are sufficient to fully and effectively prevent access to 
covered data by covered persons and/or countries of concern, based on 
the nature of the transaction and the data at issue.
---------------------------------------------------------------------------

    \5\ As noted above, for the purposes of the proposed security 
requirements, to the extent CISA uses a term that is proposed to be 
defined in the DOJ rulemaking, CISA proposes to use that definition. 
Therefore, CISA is using the term U.S. persons as proposed to be 
defined by the DOJ [A]NPRM. That definition reads ``any United 
States citizen, national, or lawful permanent resident; or any 
individual admitted to the United States as a refugee under 8 U.S.C. 
1157 or granted asylum under 8 U.S.C. 1158; or any entity organized 
solely under the laws of the United States or any jurisdiction 
within the United States (including foreign branches); or any person 
in the United States.'' 89 FR 15788 and proposed 28 CFR 202.257.
---------------------------------------------------------------------------

    The proposed security requirements are divided into two sections: 
organizational and covered system-level requirements (Section I) and 
covered data-level requirements (Section II). The listed requirements 
were selected with the intent of directly mitigating the risk of access 
to covered data, with additional requirements included to ensure 
effective governance of that access, as well as approaches for 
establishing an auditable basis for compliance purposes. Requirements 
that directly mitigate the risk of access include I.B.1-2, I.B.4-6, and 
all data-level requirements (II.A.1-3, II.B.1-3, II.C, and II.D). 
Requirements included as a mechanism for ensuring proper implementation 
and governance of those access controls include I.A.1-7. Additional 
requirements incorporated as a mechanism for ensuring auditable 
compliance of the aforementioned access controls include I.B.3 and I.C. 
These proposed requirements reflect a minimum set of practices that 
CISA believes are required for effective data

[[Page 85979]]

protection, as informed by CISA's operational experience. Through this 
notice, CISA seeks additional input based on the experience industry 
stakeholders. These requirements have been designed to be 
representative of broadly accepted industry best practices and are 
intended to address the needs of national security without imposing an 
unachievable burden on industry.
    As directed by E.O. 14117, the proposed security requirements are 
based on National Institute of Standards & Technology (NIST) 
Cybersecurity Framework (CSF), and the NIST Privacy Framework (PF). 89 
FR 15424. See NIST, Cybersecurity Framework ver. 2.0, available at 
https://www.nist.gov/cyberframework, and NIST, Privacy Framework ver. 
1.0, available at https://www.nist.gov/privacy-framework. CISA has also 
leveraged existing performance goals, guidance, practices, and 
controls, including the CISA Cross-Sector Cybersecurity Performance 
Goals (CPGs), which are themselves based on the NIST CSF and PF. CISA, 
Cross-Sector Cybersecurity Performance Goals, available at https://www.cisa.gov/cross-sector-cybersecurity-performance-goals. By 
leveraging existing performance goals, guidance, practices, and 
controls, CISA hopes to mitigate the burden of understanding and 
implementing the security requirements where necessary. In the proposed 
security requirements, CISA included parentheticals noting the specific 
NIST CSF and PF provisions upon which the proposed security 
requirements are based. CISA is seeking additional public comment on 
these references.
    The DOJ NPRM proposes to require, consistent with E.O. 14117, that 
United States persons engaging in restricted transactions must comply 
with the final security requirements by incorporating the standards by 
reference.
    Finally, the proposed security requirements include a definitions 
section. To the extent the proposed requirements use a term already 
proposed to be defined in the DOJ rulemaking, CISA's use of that term 
in the proposed security requirement would carry the same meaning. For 
the purpose of these proposed security requirements, CISA proposes to 
include definitions for six terms used exclusively in the proposed 
security requirements:
     Asset. CISA proposes to define the term to mean data, 
personnel, devices, systems, and facilities that enable the 
organization to achieve business purposes. This proposed definition is 
derived from the CSF NIST CSF version 1.1, which defined asset as 
``[t]he data, personnel, devices, systems, and facilities that enable 
the organization to achieve business purposes.''
     Covered data. CISA proposes to define the term to mean the 
two categories of data identified by the E.O. and that DOJ is proposing 
to regulate--bulk U.S. sensitive personal data or government-related 
data.
     Information system. CISA proposes to define this term 
consistent with the definition in the Paperwork Reduction Act (PRA), 44 
U.S.C. 3502.\6\ The term would mean a discrete set of information 
resources organized for the collection, processing, maintenance, use, 
sharing, dissemination, or disposition of information.
---------------------------------------------------------------------------

    \6\ 6 U.S.C. 650(14) (which applies to all of Title XXII of the 
Homeland Security Act of 2002, which, in turn, contains most of 
CISA's authorities) defines Information System as having the meaning 
given the term in the Paperwork Reduction Act, 44 U.S.C. 3502, and 
specifically includes ``industrial control systems, such as 
supervisory control and data acquisition systems, distributed 
control systems, and programmable logic controllers.'' 6 U.S.C. 
650(14). However, given CISA's assumption that this type of 
operational technology is unlikely to be implicated by DOJ's 
proposed regulations, CISA is not proposing to include the 
operational technology-related prong here. CISA welcomes comments on 
this assumption.
---------------------------------------------------------------------------

     Covered system. CISA proposes to define this term as a 
specific type of information system that is used to conduct a number of 
activities related to covered data as part of a restricted transaction. 
These activities are drawn from a combination of the activities in the 
proposed definition of information system in the proposed security 
requirements and the activities in the DOJ ANPRM's proposed definition 
of access. See 89 FR 15788; proposed 28 CFR 202.201. The term would 
mean an information system used to obtain, read, copy, decrypt, edit, 
divert, release, affect, alter the state of, view, receive, collect, 
process, maintain, use, share, disseminate, or dispose of covered data 
as part of a restricted transaction, regardless of whether the data is 
encrypted, anonymized, pseudonymized, or de-identified.
     Network. CISA proposes to define this term, which CISA 
developed consistent with the definition of the term in NIST Special 
Publication 800-171 rev. 3, Protecting Controlled Unclassified 
Information in Nonfederal Systems and Organizations. The term would 
mean a system of interconnected components, which may include routers, 
hubs, cabling, telecommunications controllers, key distribution 
centers, and technical control devices.

III. Request for Public Input

A. Importance of Public Feedback

    CISA is committed to seeking and incorporating public input into 
its approach to the development and content of the security 
requirements required by E.O. 14117. The proposed security requirements 
are available for review on CISA's website by visiting https://www.cisa.gov and searching for ``Proposed Security Requirements for 
Restricted Transactions.'' A copy of the proposed security requirements 
is also included in the docket for this notice and request for comment, 
docket number CISA-2024-0029. Below is a list of questions regarding 
the proposed security requirements for which CISA believes feedback 
could be particularly useful. CISA seeks a balanced approach to 
development of the security requirements, which would mitigate the 
risks of access to Americans' bulk sensitive personal data or 
government-related data by countries of concern while accounting for 
the impact that adopting these measures may have on those entities that 
would implement them. CISA encourages public comment on these topics 
and any other topics that commenters believe may be useful to CISA in 
the development of the forthcoming security requirements. The type of 
feedback that is most useful to the agency will identify specific 
approaches that CISA may want to consider and provide information 
supporting why the approach would foster a cost-effective and balanced 
approach. As discussed in more detail below, commenters may want to 
consider submitting views on organizational- and system-level 
requirements and/or data-level requirements. Feedback that contains 
specific information, data, or recommendations is more useful to CISA 
than generic feedback that omits these components. For comments that 
contain any numerical estimates, CISA encourages the commenter to 
provide any assumptions made in calculating the numerical estimates.

B. List of Questions for Commenters

    Below is a non-exhaustive list of questions that are meant to 
assist members of the public in formulating their comments in response 
to this notice. The list of questions is not intended to restrict the 
issues that commenters may address. For more information on the 
proposed regulatory structure in which the security requirements will 
apply, please review DOJ's NPRM, Provisions Pertaining to Preventing 
Access to U.S. Sensitive Personal Data and Government-Related

[[Page 85980]]

Data by Countries of Concern or Covered Persons, [DOJ Docket No. NSD-
104, RIN 1124-AA01], published in today's proposed rule section of the 
Federal Register for public comment.
    1. Are the proposed security requirements sufficiently robust to 
mitigate the risks of access to Americans' bulk sensitive personal data 
or government-related data by countries of concern?
    2. Are the proposed organizational- and system-level requirements 
sufficient to provide U.S. persons engaging in restricted transactions 
confidence that logical and physical access to covered data is 
sufficiently managed to deny access to covered persons or countries of 
concern?
    3. Do the security requirements provide sufficient flexibility, 
clarity, and specificity for the types of restricted transactions 
typically engaged in by U.S. entities, including to avoid overly 
burdening commercial activity not involving covered data while 
providing sufficient level of detail to aid in compliance verification?
    4. Are there other data-level requirements (beyond those listed in 
Section II of the proposed security requirements) that CISA should 
consider that would enable U.S. entities to engage in commercial 
transactions without revealing covered data to covered persons or 
countries of concern?
    5. The current approach allows for flexibility to determine which 
data-level requirements are sufficient to fully and effectively prevent 
access to covered data by covered persons and/or countries of concern. 
Are there data-level requirements that CISA should consider requiring 
in all cases?
    6. What additional interpretive guidance would be helpful to U.S. 
entities in determining which data-level requirements should be applied 
based on the nature of the transaction and the data at issue?
    7. What substantive requirements should CISA consider in Section 
II.C. to further define appropriate privacy-enhancing technologies that 
may be used within restricted transactions?
    8. Should the standards for data aggregation in Section II.A differ 
from the proposed definition of bulk in the DOJ regulations? If so, are 
there requirements CISA should impose for U.S. persons engaged in 
restricted transactions to ensure that covered data is not re-
constructable through aggregation while permitting more granular 
thresholds?
    9. Are there additional substantive standards that should be added 
to the data-level requirements in Section II to better ensure their 
implementation can achieve the policy goal of not permitting access to 
covered data by covered persons or countries of concern?
    10. To what extent could the measures described currently be 
reversed, broken, or circumvented by a technologically sophisticated 
actor? Are there additional conditions that would better or more 
appropriately mitigate this risk? If so, please describe them in 
detail.
    11. To what extent could the measures described be rendered 
reversible, breakable, or able to be circumvented by anticipated future 
technology advances? What type of future technology advances would pose 
the greatest risk to these types of protective measures?
    12. Would it be useful to the entities likely to undertake 
restricted transactions if CISA mapped these requirements to ISO-27001 
or example controls from NIST Special Publication 800-171 (e.g., to 
facilitate compliance audits)?

Jennie M. Easterly,
Director, Cybersecurity and Infrastructure Security Agency, Department 
of Homeland Security.
[FR Doc. 2024-24709 Filed 10-22-24; 4:15 pm]
BILLING CODE 9111-1LF-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.