Title 6 › Chapter 6— CYBERSECURITY › Subchapter II— FEDERAL CYBERSECURITY ENHANCEMENT › § 1524
Requires several federal officials to study and report on how the government finds and stops intruders in agency computer systems. It defines some key terms in one line each: agency information (the data agencies hold); cyber threat indicator and defensive measure (types of cyber threat data and defensive actions); intrusion assessments (actions to find and remove intruders); intrusion assessment plan (the required plan for those actions); and intrusion detection and prevention capabilities (the tools and systems to spot and stop intrusions). The Comptroller General must do a study and report on effectiveness not later than 3 years after December 18, 2015. The Secretary must report to the congressional committees not later than 6 months after December 18, 2015 and every year after that on how the detection and prevention tools are being implemented, including privacy controls; the detection and prevention technologies used (commercial or not); the kinds and counts of indicators or techniques used; how many times risks were detected and how many times traffic was blocked; and details of the pilot testing new technologies and participating agencies. The Director must, starting not later than 18 months after December 18, 2015 and annually, report to Congress on how each agency uses these tools and the numbers and types of detections and preventions. The Federal Chief Information Officer must review and report between 18 months and 2 years after December 18, 2015 on how well the tools work (including against advanced persistent threats), whether they and related systems secure federal systems, costs and benefits versus commercial tools, and agencies’ ability to protect sensitive indicators if shared unclassified. The Director must also send the intrusion assessment plan to Congress within 6 months after December 18, 2015 (and within 30 days of updates), and must provide other plan copies, implementation findings, tool descriptions, compliance lists, and improved metrics within 1 year and annually as required. All reports should be unclassified but may include a classified annex.
Full Legal Text
Domestic Security — Source: USLM XML via OLRC
Legislative History
Reference
Citation
6 U.S.C. § 1524
Title 6 — Domestic Security
Last Updated
Apr 3, 2026
Release point: 119-73not60