CISA’s Very Broad Proposed Rule for “Critical Infrastructure” Entities to Report Cyber Incidents
CISA’s Very Broad Proposed Rule for “Critical Infrastructure” Entities to Report Cyber Incidents
Next year, a lot more companies, including many that have not considered themselves to be critical infrastructure, may be required to report cyber incidents to the U.S. government.
The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) released a long-awaited Notice of Proposed Rulemaking (NPRM or “proposed rule”) to implement the March 2022 Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA). Notably, the NPRM broadly defines the types of entities to which these reporting obligations apply and includes any cyber incident that disrupts business or causes a substantial loss of confidentiality. If a report is required, the rule imposes detailed requirements about the information that must be shared with CISA, and the types of data and information that must be preserved.
The public has until July 3, 2024, to comment on the proposed rule; CISA will issue a final rule within 18 months.
When President Biden signed it into law in March 2022, CIRCIA broke new ground by requiring critical infrastructure entities to report cyber incidents and ransom payments in a relatively short time period to CISA, which emerged in 2018 as the government’s lead agency for non-military cybersecurity issues.
CIRCIA requires covered critical infrastructure entities to report to CISA within 72 hours after reasonably believing that a covered cyber incident has occurred. It also requires reporting of ransom payments made in response to a ransomware attack within 24 hours after the ransom payment has been made. However, CIRCIA did not define what qualifies as a “covered entity” and a “covered cyber incident,” but rather directed CISA to issue rules both defining those terms and providing details about the information that must be reported and preserved.
In the 447-page NPRM, CISA filled in the blanks in perhaps the broadest way possible. Its definition of covered entities includes almost every aspect of the United States’ critical infrastructure. The NPRM also introduced a new—and broad—definition for what qualifies as a “substantial cyber event” that triggers the 72-hour reporting requirement.
Under CIRCIA, Congress defined a “covered entity” as “an entity in a critical infrastructure sector, as defined by Presidential Policy Directive 21 (PPD-21),[1] that satisfies the definition established by the [CISA] Director in the final rule.”[2] Although Congress directed CISA to provide “a clear description of the types of entities that constitute covered entities”[3] the NPRM provides little clarity. Rather, the proposed rule essentially applies to all critical infrastructure entities, unless a narrow exception applies.
Under the proposed rule, an entity will be considered a covered entity so long as it falls within one of the 16 critical infrastructure sectors, as defined by Sector-Specific Plans developed pursuant to PPD-21 in 2015-2016, and it is not a small business. However, a critical infrastructure entity that is a small business will nonetheless be covered by the rule if it meets any of the broadly defined sector-based criterion listed in the rule.
Companies should review the plans and determine if they are covered because many companies that do not consider themselves to be part of critical infrastructure, such as the hospitality industry, retailers, and IT companies, are captured by those plans.
CIRCIA requires covered entities to report a “covered cyber incident,” which it defines as “a substantial cyber incident,” to CISA within 72 hours. Under the NPRM, CISA broadly defines a cyber incident to be “substantial” if any of the following four “impacts” are met:
Under this definition, CISA estimates that there could be at least 210,000 reports filed by 2033. We assess that, under the rules as proposed, the number of reports is likely to be far greater.
The NPRM requires covered entities that experience a covered cyber incident to submit a report within 72 hours after “reasonably believe[ing]” that the incident occurred. The proposed rule recognizes that, in many cases, an entity may need to perform some “preliminary analysis” before reaching a reasonable belief that a covered cyber incident has occurred; however, the proposed rule indicates CISA’s view that this preliminary analysis “should be relatively short in duration (i.e., hours, not days) before a ‘reasonable belief’ can be obtained, and generally would occur at the subject matter expert level and not the executive officer level.” The NPRM also requires covered entities to report to CISA any ransom payment within 24 hours of making the payment.
The NPRM contemplates requiring covered entities to submit detailed incident reports on a web-based portal, which can be submitted by a third party. These reports would include:
For ransom payment reports, CISA requires similar reports and additional details regarding the ransom demand amount, the date of the ransom payment, the amount paid, and any outcomes associated with the ransom payment (e.g., returned data or receiving a decryption key).
The NPRM also establishes that, after submitting a report, covered entities are expected to preserve certain types of data and information for no less than two years. Under the proposed rule, a covered entity must preserve data and records relating to the cyber incident and any ransom payment. Examples of such records include: logs, forensic artifacts, network data, communications with the threat actor, system information (e.g., operating system, patch levels, and configuration settings), and details about any exfiltrated data.
If the agency has reason to believe that the covered entity experienced a covered cyber incident or made a ransom payment but failed to make a required report, CIRCIA authorizes the Director of CISA to issue a request for information (RFI) to the covered entity. If an entity fails to respond to an RFI adequately within 72 hours, the Director may issue a subpoena to compel the disclosure of the requested information. The proposed rule also provides that CISA may refer the matter to a regulatory agency for an enforcement action or to the Department of Justice for civil enforcement or criminal prosecution.
The NPRM makes clear that CISA intends to make broad use of the authorities that Congress provided through CIRCIA. CISA has widened the meaning of critical infrastructure, potentially meaning hundreds of thousands of private sector companies would have reporting requirements under the statute. Further, because the agency broadly defined the type of cyber incidents that will trigger these reporting obligations, covered entities may be reporting sooner rather than later. Finally, because the proposed rule also requires detailed reporting and preservation requirements for entities that experience a cyber incident or make a ransom payment, companies should ensure that they have policies and procedures in place to comply with these obligations.
We will continue to analyze the potential impacts of the NPRM; however, here are a few key takeaways for impacted entities.
[1] PPD-21, issued by President Obama in 2013, identifies 16 critical infrastructure sectors.
[2] 6 U.S.C. § 681(4).
[3] 6 U.S.C. § 681b(c)(1).