US Code
Part A— Cybersecurity and Infrastructure Security
§ 660. Cybersecurity plans

(a) DefinitionsIn this section, the term “agency information system” means an information system used or operated by an agency or by another entity on behalf of an agency.
(b) Intrusion assessment plan(1) RequirementThe Secretary, in coordination with the Director of the Office of Management and Budget, shall—(A) develop and implement an intrusion assessment plan to proactively detect, identify, and remove intruders in agency information systems on a routine basis; and
(B) update such plan as necessary.
(2) ExceptionThe intrusion assessment plan required under paragraph (1) shall not apply to the Department of Defense, a national security system, or an element of the intelligence community.
(c) Cyber incident response planThe Director of the Cybersecurity and Infrastructure Security Agency shall, in coordination with appropriate Federal departments and agencies, State and local governments, sector coordinating councils, Information Sharing and Analysis Organizations, owners and operators of critical infrastructure, and other appropriate entities and individuals, develop, update not less often than biennially, maintain, and exercise adaptable cyber incident response plans to address cybersecurity risks to critical infrastructure. The Director, in consultation with relevant Sector Risk Management Agencies and the National Cyber Director, shall develop mechanisms to engage with stakeholders to educate such stakeholders regarding Federal Government cybersecurity roles and responsibilities for cyber incident response.
(d) National Response FrameworkThe Secretary, in coordination with the heads of other appropriate Federal departments and agencies, and in accordance with the National Cybersecurity Incident Response Plan required under subsection (c), shall regularly update, maintain, and exercise the Cyber Incident Annex to the National Response Framework of the Department.
(e) Homeland Security Strategy to Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments(1) In general(A) RequirementNot later than one year after December 27, 2021, the Secretary, acting through the Director, shall, in coordination with the heads of appropriate Federal agencies, State, local, Tribal, and territorial governments, and other stakeholders, as appropriate, develop and make publicly available a Homeland Security Strategy to Improve the Cybersecurity of State, Local, Tribal, and Territorial Governments.
(B) Recommendations and requirementsThe strategy required under subparagraph (A) shall provide recommendations relating to the ways in which the Federal Government should support and promote the ability of State, local, Tribal, and territorial governments to identify, mitigate against, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, and incidents.
(2) ContentsThe strategy required under paragraph (1) shall—(A) identify capability gaps in the ability of State, local, Tribal, and territorial governments to identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, incidents, and ransomware incidents;
(B) identify Federal resources and capabilities that are available or could be made available to State, local, Tribal, and territorial governments to help those governments identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, incidents, and ransomware incidents;
(C) identify and assess the limitations of Federal resources and capabilities available to State, local, Tribal, and territorial governments to help those governments identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, incidents, and ransomware incidents and make recommendations to address such limitations;
(D) identify opportunities to improve the coordination of the Agency with Federal and non-Federal entities, such as the Multi-State Information Sharing and Analysis Center, to improve—(i) incident exercises, information sharing and incident notification procedures;
(ii) the ability for State, local, Tribal, and territorial governments to voluntarily adapt and implement guidance in Federal binding operational directives; and
(iii) opportunities to leverage Federal schedules for cybersecurity investments under section 502 of title 40;
(E) recommend new initiatives the Federal Government should undertake to improve the ability of State, local, Tribal, and territorial governments to identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, incidents, and ransomware incidents;
(F) set short-term and long-term goals that will improve the ability of State, local, Tribal, and territorial governments to identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, incidents, and ransomware incidents; and
(G) set dates, including interim benchmarks, as appropriate for State, local, Tribal, and territorial governments to establish baseline capabilities to identify, protect against, detect, respond to, and recover from cybersecurity risks, cybersecurity threats, incidents, and ransomware incidents.
(3) ConsiderationsIn developing the strategy required under paragraph (1), the Director, in coordination with the heads of appropriate Federal agencies, State, local, Tribal, and territorial governments, and other stakeholders, as appropriate, shall consider—(A) lessons learned from incidents that have affected State, local, Tribal, and territorial governments, and exercises with Federal and non-Federal entities;
(B) the impact of incidents that have affected State, local, Tribal, and territorial governments, including the resulting costs to such governments;
(C) the information related to the interest and ability of state and non-state threat actors to compromise information systems owned or operated by State, local, Tribal, and territorial governments; and
(D) emerging cybersecurity risks and cybersecurity threats to State, local, Tribal, and territorial governments resulting from the deployment of new technologies.
(4) ExemptionChapter 35 of title 44 (commonly known as the “Paperwork Reduction Act”) shall not apply to any action to implement this subsection.

Structure US Code

US Code

Title 6— DOMESTIC SECURITY

CHAPTER 1— HOMELAND SECURITY ORGANIZATION

SUBCHAPTER XVIII— CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY

Part A— Cybersecurity and Infrastructure Security

§ 651. Definition

§ 652. Cybersecurity and Infrastructure Security Agency

§ 652a. Sector Risk Management Agencies

§ 653. Cybersecurity Division

§ 654. Infrastructure Security Division

§ 655. Enhancement of Federal and non-Federal cybersecurity

§ 656. NET Guard

§ 657. Cyber Security Enhancement Act of 2002

§ 658. Cybersecurity recruitment and retention

§ 659. National cybersecurity and communications integration center

§ 660. Cybersecurity plans

§ 661. Cybersecurity strategy

§ 662. Clearances

§ 663. Federal intrusion detection and prevention system

§ 664. National asset database

§ 665. Duties and authorities relating to .gov internet domain

§ 665a. Intelligence and cybersecurity diversity fellowship program

§ 665b. Joint cyber planning office

§ 665c. Cybersecurity State Coordinator

§ 665d. Sector Risk Management Agencies

§ 665e. Cybersecurity Advisory Committee

§ 665f. Cybersecurity education and training programs

§ 665g. State and Local Cybersecurity Grant Program

§ 665h. National Cyber Exercise Program

§ 665i. CyberSentry program

§ 665j. Ransomware threat mitigation activities

§ 665k. Federal Clearinghouse on School Safety Evidence-based Practices

§ 665l. School and daycare protection

§ 665m. President’s Cup Cybersecurity Competition

§ 665n. Industrial Control Systems Cybersecurity Training Initiative