The guidance also describes 10 key elements that CISA recommends should be shared: (1) Incident date and time; (2) Incident location; (3) Type of observed activity; (4) Detailed narrative of the event; (5) Number of people or systems affected; (6) Company/Organization name; (7) Point of Contact details; (8) Severity of event; (9) Critical Infrastructure Sector if known; and (10) Anyone else informed.
The guidance provides insight into how CISA will implement CIRCIA. While CISA has two years to propose an implementation rule for the law, stakeholders believe it could begin the rulemaking process sooner.
CISA has announced the release a Request for Information (RFI) regarding CIRCIA. The RFI solicits stakeholder feedback on a number of important CIRCIA implementation items, including what entities would be covered and what should be included in reports. The RFI was published in the Federal Register on September 12, 2022. Responses are due 60 days after. CISA indicates it will also be hosting listening sessions across the country to collect information.
Performance Goals
On July 28, 2021, President Biden issued a National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control System. In addition to outlining an Industrial Control Systems Cybersecurity Initiative within the energy sector, the memo directed DHS to issue performance goals pursuant to E.O. 13636 (Improving Critical Infrastructure Cybersecurity), which President Obama issued in 2013 after Congress failed to pass legislation giving DHS authority to regulate cybersecurity.
By way of background, Sec. 7 of E.O. 13636 directed NIST to engage in a stakeholder process to create a framework for cybersecurity. Sec. 7 also directed DHS to develop performance goals for that framework informed by work on “Critical Infrastructure at Greatest Risk” (also called “Section 9 entities”). Those performance goals, though discussed by DHS in stakeholder meetings, never fully coalesced. This may have been due to pressure on the Obama Administration to not use E.O. 13636 to circumvent Congress on cybersecurity by creating de facto cybersecurity requirements.
The memo directs DHS to take up the effort again through issuing preliminary performance goals. The performance goals must be voluntary as there is no supporting statutory authority for general critical infrastructure cybersecurity regulation. However, the memo directs DHS to examine “whether additional legal authorities would be beneficial to enhancing the cybersecurity of critical infrastructure.”
Preliminary cybersecurity performance goals, which CISA calls the “Common Baseline” were released on September 22, 2021, with the most recent version released in June 2022. Final performance goals were due by July 28, 2022.
Eric Goldstein, CISA’s Executive Assistant Director for Cybersecurity, testified to Congress on September 15, 2022 that the final performance goals will be released in October 2022 to coincide with Cybersecurity Awareness Month.
In September 2022, CISA released its Strategic Plan 2023-2025, which states, “Where appropriate within CISA authorities, we will set standards and recommendations to guide security decisions, much like our efforts to establish performance goals and increase the cross-sector cybersecurity baseline.” The plan sets as a “representative outcome” that “stakeholders adopt CISA’s critical infrastructure security guidance, standards, performance benchmarks and risk management expertise.”
Securities and Exchange Commission
Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
On March 9, 2022, the Securities and Exchange Commission (SEC) proposed new cybersecurity disclosure rules for public companies by a vote of 3-1. Under the proposal, public companies would be required to disclose information under an amendment to the Form 8-K about a cybersecurity incident within four business days after the company determines that it has experienced a material cybersecurity incident. That disclosure would have to report:
- When the incident was discovered and whether it is ongoing;
- A brief description of the nature and scope of the incident;
- Whether any data was stolen, altered, accessed, or used for any other unauthorized purpose;
- The effect of the incident on operations; and
- Whether the company has remediated or is currently remediating the incident.
The proposal would require public companies to provide updates on the incident in its quarterly report on Form 10-Q or annual report on form 10-K. The proposal would also require public companies to disclose non-material cybersecurity incidents when they become material in the aggregate. Finally, the proposal would require public companies to make disclosures regarding: risk management, strategy, and governance, as well as board cybersecurity expertise.
Private sector organizations filed highly critical comments concerning the proposal. One comment signed by numerous trade associations, including those from the energy sector, said that the proposal "runs counter to sound cybersecurity policies and practices" because it could equip attackers with data that could be used against companies and law enforcement.
The Spring 2022 Unified Agenda of Regulatory and Deregulatory Actions projects that the SEC will take final action on the proposal in April 2023.
Federal Energy Regulatory Commission
Incentives for Advanced Cybersecurity Investment
On September 22, 2022, FERC issued a proposal pursuant to the Investment and Jobs Act of 2021 to establish incentive-based rate treatments for voluntary cybersecurity investments. The proposal would make expenses and capital investments associated with advanced cybersecurity technologies or participation in cybersecurity threat information sharing programs eligible for incentives. FERC is proposing to establish a prequalified list of cybersecurity expenditures eligible for incentives. The incentives would either be a return on equity adder of 200 basis points, or deferred cost recovery that could be included in the unamortized portion of a utility’s rate base. The incentives would remain in effect for up to five years after investments enter service or expenses are incurred.
The proposal terminates FERC’s December 17, 2021 proposal to establish incentive-based rate treatments a for voluntary cybersecurity investments pursuant to Federal Power Act sections 205 and 206. That proposal divided the electricity sector, drawing support from investor-owned utilizes, but opposition from public power and transmission owners who expressed concern that incentives could inflate costs without providing material benefits.
Comments on the proposal will be due 45 days after publication in the federal register.
Appendix A: Cyber Incident Reporting for Critical Infrastructure Act Summary