(a) In General.—
(1)
Each year each agency shall have performed an independent evaluation of the information security program and practices of that agency to determine the effectiveness of such program and practices.
(2) Each evaluation under this section shall include—
(A)
testing of the effectiveness of information security policies, procedures, and practices of a representative subset of the agency’s information systems;
(B)
an assessment of the effectiveness of the information security policies, procedures, and practices of the agency; and
(C)
separate presentations, as appropriate, regarding information security relating to national security systems.
(b) Independent Auditor.—Subject to subsection (c)—
(c) National Security Systems.—For each agency operating or exercising control of a national security system, that portion of the evaluation required by this section directly relating to a national security system shall be performed—
(2)
in such a manner as to ensure appropriate protection for information associated with any information security vulnerability in such system commensurate with the risk and in accordance with all applicable laws.
(d) Existing Evaluations.—
The evaluation required by this section may be based in whole or in part on an audit, evaluation, or report relating to programs or practices of the applicable agency.
(e) Agency Reporting.—
(1)
Each year, not later than such date established by the Director, the head of each agency shall submit to the Director the results of the evaluation required under this section.
(2)
To the extent an evaluation required under this section directly relates to a national security system, the evaluation results submitted to the Director shall contain only a summary and assessment of that portion of the evaluation directly relating to a national security system.
(f) Protection of Information.—
Agencies and evaluators shall take appropriate steps to ensure the protection of information which, if disclosed, may adversely affect information security. Such protections shall be commensurate with the risk and comply with all applicable laws and regulations.
(g) OMB Reports to Congress.—
(1)
The Director shall summarize the results of the evaluations conducted under this section in the report to Congress required under section 3553(c).
(2)
The Director’s report to Congress under this subsection shall summarize information regarding information security relating to national security systems in such a manner as to ensure appropriate protection for information associated with any information security vulnerability in such system commensurate with the risk and in accordance with all applicable laws.
(3)
Evaluations and any other descriptions of information systems under the authority and control of the Director of National Intelligence or of National Foreign Intelligence Programs systems under the authority and control of the Secretary of Defense shall be made available to Congress only through the appropriate oversight committees of Congress, in accordance with applicable laws.
(h) Comptroller General.—The Comptroller General shall periodically evaluate and report to Congress on—
(i) Assessment Technical Assistance.—
The Comptroller General may provide technical assistance to an Inspector General or the head of an agency, as applicable, to assist the Inspector General or head of an agency in carrying out the duties under this section, including by testing information security controls and procedures.
(j) Guidance.—
The Director, in consultation with the Secretary, the Chief Information Officers Council established under section 3603, the Council of the Inspectors General on Integrity and Efficiency, and other interested parties as appropriate, shall ensure the development of guidance for evaluating the effectiveness of an information security program and practices.
(Added Pub. L. 113–283, § 2(a), Dec. 18, 2014, 128 Stat. 3082; amended Pub. L. 117–286, § 4(b)(89), Dec. 27, 2022, 136 Stat. 4352.)