Bill Text: HI SB1478 | 2023 | Regular Session | Amended
Bill Title: Relating To Offensive Cybersecurity.
Spectrum: Partisan Bill (Democrat 7-0)
Status: (Engrossed - Dead) 2023-03-22 - Passed Second Reading as amended in HD 1 and referred to the committee(s) on FIN with none voting aye with reservations; none voting no (0) and Representative(s) Kitagawa excused (1). [SB1478 Detail]
Download: Hawaii-2023-SB1478-Amended.html
THE SENATE |
S.B. NO. |
1478 |
THIRTY-SECOND LEGISLATURE, 2023 |
S.D. 1 |
|
STATE OF HAWAII |
|
|
|
|
|
|
||
|
A BILL FOR AN ACT
RELATING TO OFFENSIVE CYBERSECURITY.
BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII:
""Office" means the office of enterprise technology services established pursuant to section 27-43."
SECTION 2. Section 27-43.5, Hawaii Revised Statutes, is amended to read as follows:
"[[]§27-43.5[]] Additional duties of the
chief information officer relating to security of government information[.];
offensive cybersecurity program; establishment; reporting. (a)
The chief information officer shall provide for periodic security audits
of all executive branch departments and agencies regarding the protection of
government information and data communication infrastructure.
(b)
Security audits may include on-site audits as well as reviews of all
written security procedures and documented practices. The chief information officer may contract
with a private firm or firms that specialize in conducting security audits;
provided that information protected from disclosure by federal or state law,
including confidential tax information, shall not be disclosed. All executive branch departments, agencies,
boards, or commissions subject to the security audits authorized by this
section shall fully cooperate with the entity designated to perform the
audit. The chief information officer may
direct specific remedial actions to mitigate findings of insufficient
administrative, technical, and physical controls necessary to protect state
government information or data communication infrastructure.
(c) There is established within the office an
offensive cybersecurity program, which shall:
(1) Analyze cybersecurity threats;
(2) Evaluate and provide intelligence
regarding cybersecurity;
(3) Promote cybersecurity awareness,
including awareness of social engineering threats;
(4) Conduct penetration testing among
state and county agencies to evaluate the security of state and county
information technology systems;
(5) Conduct agent-based security and
ensure that assets are being inventoried and managed according to best
practices;
(6) Use the common vulnerability scoring
system to evaluate the severity of vulnerabilities in information technology
systems across state and county agencies and prioritize remediation; and
(7) Take other proactive measures to
ensure increased cybersecurity for agencies.
(d) State and county agencies shall disclose to
the office an identified or suspected cybersecurity incident that affects the
confidentiality, integrity, or availability of information systems, data, or
services. Disclosure shall be made
expediently and without unreasonable delay.
Cybersecurity incidents required to be reported include suspected
breaches; malware incidents that cause significant damage; denial of service
attacks that affect the availability of services; demands for ransom related to
a cybersecurity incident or unauthorized disclosure of digital records;
instances of identity theft or identity fraud occurring on an agency's
information technology system; incidents that require response and remediation
efforts that will cost more than $10,000 in equipment, software, and labor; and
other incidents the agency deems worthy of communication to the office;
provided that:
(1) Until a cybersecurity incident is resolved,
an agency shall continue to disclose details regarding a cybersecurity incident
to the office, including:
(A) The number of potentially exposed
records;
(B) The type of records potentially
exposed, including health insurance information, medical information, criminal
justice information, regulated information, financial information, and personal
information;
(C) Efforts the agency is undertaking to
mitigate and remediate the damage of the incident to the agency and other
affected agencies; and
(D) The expected impact of the incident,
including:
(i) The disruption of the agency's
services;
(ii) The effect on customers and
employees that experienced data or service losses; and
(iii) Other concerns that could
potentially disrupt or degrade the confidentiality, integrity, or availability
of information systems, data, or services that may affect the State or a county;
and
(2) The legislative and judicial branches may
disclose to the office cybersecurity incidents that affect the confidentiality,
integrity, or availability of information systems, data, or services.
(e) The office shall adopt rules pursuant to
chapter 91 regarding the procedures and form in which an agency shall disclose
cybersecurity incidents to the office.
(f) The office, to the extent possible, shall
provide consultation services and other resources to assist agencies and the
legislative and judicial branches in responding to and remediating
cybersecurity incidents.
(g) No later than twenty days prior to the
convening of each regular session, the chief information officer shall
submit a report to the legislature that includes:
(1) All disclosed cybersecurity
incidents required pursuant to this section;
(2) The status of those cybersecurity
incidents; and
(3) Any response or remediation to
mitigate the cybersecurity incidents.
The office shall ensure that all reports
of disclosed cybersecurity incidents are communicated in a manner that protects
victims of cybersecurity incidents, prevents unauthorized disclosure of
cybersecurity plans and strategies, and adheres to federal and state laws
regarding protection of cybersecurity information.
[(c)](h) This section shall not infringe upon
responsibilities assigned to the comptroller or the auditor by any state or
federal law."
SECTION 3. (a) No later than January 1, 2026, the office of enterprise technology services shall:
(1) Complete an initial round of penetration testing on the information technology systems of each agency;
(2) Assess vulnerabilities within those systems using the common vulnerability scoring system; and
(3) Work with agencies to identify and address any vulnerability threats identified having a benchmark score exceeding 3.9 on the common vulnerability scoring system.
(b) No later than twenty days prior to the
convening of the regular session of 2026, the office of enterprise technology
services shall submit a report to the legislature describing the office's
progress in meeting the requirements of this section.
SECTION 4. There is appropriated out of the general revenues of the State of Hawaii the sum of $ or so much thereof as may be necessary for fiscal year 2023-2024 and the sum of $ or so much thereof as may be necessary for fiscal year 2024-2025 for the software, services, and full-time equivalent ( FTE) permanent positions necessary to establish an offensive cybersecurity program.
The sums appropriated shall be expended by the office of enterprise technology services for the purposes of this Act.
SECTION 5. Statutory material to be repealed is bracketed and stricken. New statutory material is underscored.
SECTION 6. This Act shall take effect on January 1, 2050.
Report Title:
Offensive Cybersecurity Program; Office of Enterprise Technology Services; Report; Positions; Appropriation
Description:
Establishes an offensive cybersecurity program within the Office of Enterprise Technology Services to analyze an evaluate cybersecurity threats and increase cybersecurity awareness and education. Establishes a goal for all state and county agencies to identify and address vulnerabilities having a benchmark score exceeding 3.9 on the Common Vulnerability Scoring System by January 1, 2026. Makes appropriations and authorizes the establishment of positions. Effective 1/1/2050. (SD1)
The summary description
of legislation appearing on this page is for informational purposes only and is
not legislation or evidence of legislative intent.