§3531. Purposes
The purposes of this subchapter are the following:
(1) To provide a comprehensive framework for establishing and ensuring the effectiveness of controls over information resources that support Federal operations and assets.
(2)(A) To recognize the highly networked nature of the Federal computing environment including the need for Federal Government interoperability and, in the implementation of improved security management measures, assure that opportunities for interoperability are not adversely affected.
(B) To provide effective governmentwide management and oversight of the related information security risks, including coordination of information security efforts throughout the civilian, national security, and law enforcement communities.
(3) To provide for development and maintenance of minimum controls required to protect Federal information and information systems.
(4) To provide a mechanism for improved oversight of Federal agency information security programs.
(Added
Effective Date
Responsibilities of Certain Agencies
"(a)
"(1) develop, issue, review, and update standards and guidance for the security of Federal information systems, including development of methods and techniques for security systems and validation programs;
"(2) develop, issue, review, and update guidelines for training in computer security awareness and accepted computer security practices, with assistance from the Office of Personnel Management;
"(3) provide agencies with guidance for security planning to assist in the development of applications and system security plans for such agencies;
"(4) provide guidance and assistance to agencies concerning cost-effective controls when interconnecting with other systems; and
"(5) evaluate information technologies to assess security vulnerabilities and alert Federal agencies of such vulnerabilities as soon as those vulnerabilities are known.
"(b)
"(1)
"(A) the Secretary of Defense, the Director of Central Intelligence, and another agency head as designated by the President, shall, consistent with their respective authorities-
"(i) develop and issue information security policies, standards, and guidelines for systems described under subparagraphs (A) and (B) of section 3532(b)(2) of title 44, United States Code (as added by section 1061 of this Act), that provide more stringent protection, to the maximum extent practicable, than the policies, principles, standards, and guidelines required under section 3533 of such title (as added by such section 1061); and
"(ii) ensure the implementation of the information security policies, principles, standards, and guidelines described under clause (i); and
"(B) the Secretary of Defense shall, consistent with his authority-
"(i) develop and issue information security policies, standards, and guidelines for systems described under subparagraph (C) of section 3532(b)(2) of title 44, United States Code (as added by section 1061 of this Act), that are operated by the Department of Defense, a contractor of the Department of Defense, or another entity on behalf of the Department of Defense that provide more stringent protection, to the maximum extent practicable, than the policies, principles, standards, and guidelines required under section 3533 of such title (as added by such section 1061); and
"(ii) ensure the implementation of the information security policies, principles, standards, and guidelines described under clause (i).
"(2)
"(c)
"(1) legal remedies regarding security incidents and ways to report to and work with law enforcement agencies concerning such incidents; and
"(2) lawful uses of security techniques and technologies.
"(d)
"(1) review and update General Services Administration guidance to agencies on addressing security considerations when acquiring information technology; and
"(2) assist agencies in-
"(A) fulfilling agency responsibilities under section 3534(b)(2)(F) of title 44, United States Code (as added by section 1061 of this Act); and
"(B) the acquisition of cost-effective security products, services, and incident response capabilities.
"(e)
"(1) review and update Office of Personnel Management regulations concerning computer security training for Federal civilian employees;
"(2) assist the Department of Commerce in updating and maintaining guidelines for training in computer security awareness and computer security best practices; and
"(3) work with the National Science Foundation and other agencies on personnel and training initiatives (including scholarships and fellowships, as authorized by law) as necessary to ensure that the Federal Government-
"(A) has adequate sources of continuing information security education and training available for employees; and
"(B) has an adequate supply of qualified information security professionals to meet agency needs.
"(f)
"(1)
"(A) by the Director of the Office of Management and Budget, as appropriate, for application to the mission critical systems of all agencies; or
"(B) by an agency head, as appropriate, for application to the mission critical systems of that agency.
"(2)
"(g)