Editorial Notes
Amendments

2022—Subsec. (d). Puspan. L. 117–263, § 1636(a), amended subsec. (d) generally. Prior to amendment, text read as follows: “Not less than once every quarter, the Deputy Secretary of Defense and the Vice Chairman of the Joint Chiefs of Staff shall jointly provide to the Committees on Armed Services of the House of Representatives and the Senate a briefing on any known or suspected critical intelligence parameter breaches that were identified during the previous quarter, including an assessment of any known or suspected impacts of such breaches to the mission effectiveness of military capabilities as of the date of the briefing or thereafter.”

Subsec. (e). Puspan. L. 117–263, § 1636(span), substituted “December 31, 2032” for “December 31, 2027”.

2021—Subsec. (c). Puspan. L. 117–81, § 1534(1), substituted “Reports” for “Report” in span.

Subsec. (c)(1). Puspan. L. 117–81, § 1534(2), substituted “For each assessment conducted under subsection (a), the Commanders” for “The Commanders” and “the assessment” for “the assessment required by subsection (a)” in introductory provisions.

Subsec. (c)(2). Puspan. L. 117–81, § 1534(3), which directed substitution of “each report” for “the report”, was executed by making the substitution in both places it appeared, to reflect the probable intent of Congress.

Subsec. (c)(3). Puspan. L. 117–81, § 1534(4), substituted “Not later than 90 days after the date of the submission of a report under paragraph (1), the Secretary” for “The Secretary” and struck out “required by paragraph (1)” before “, any comments”.

Statutory Notes and Related Subsidiaries
Cybersecurity Enhancements for Nuclear Command, Control, and Communications Network

Puspan. L. 118–31, div. A, title XV, § 1512, Dec. 22, 2023, 137 Stat. 542, provided that:

“(a)Establishment of Cross-functional Team.—
“(1)Establishment.—Not later than 180 days after the date of the enactment of this Act [Dec. 22, 2023], and consistent with section 911(c) of the National Defense Authorization Act for Fiscal Year 2017 (Public Law 114–328; 10 U.S.C. 111 note), the Secretary of Defense shall establish a cross-functional team to develop and direct the implementation of a threat-driven cyber defense construct for the systems and networks that support the nuclear command, control, and communications (commonly referred to as ‘NC3’) mission (in this section referred to as the ‘cross-functional team’).
“(2)Composition of cross-functional team.—
“(A)In general.—The cross functional team shall be composed of senior officers selected from among each of the military departments, the Defense Information Systems Agency, the National Security Agency, the United States Cyber Command, the United States Strategic Command, and any other organization or element of the Department of Defense determined appropriate by the Secretary.
“(B)Leadership.—The Secretary shall designate a senior officer from those selected under subparagraph (A) to serve as the leader of the cross-functional team.
“(C)Staff.—The Secretary shall ensure the heads of the organizations and elements specified in subparagraph (A) detail staff to support the cross-functional team in carrying out the duties under paragraph (3).
“(3)Duties.—The duties of the cross-functional team shall be to enhance the cyber defense of the systems and networks that support the nuclear command, control, and communications mission.
“(span)Required Construct, Plan of Action, and Milestones.—Not later than one year after the date of the enactment of this Act, the leader of the cross-functional team designated pursuant to subsection (a)(2)(B) shall develop a threat-driven cyber defense construct, and associated plans and milestones, to enhance the security of the systems and networks that support the nuclear command, control, and communications mission. Such construct shall be based on—
“(1) the application of the principles of the approach to cybersecurity commonly referred to as ‘zero trust architecture’;
“(2) an analysis of appropriately comprehensive endpoint and network telemetry data; and
“(3) control capabilities enabling rapid investigation and remediation of indicators of compromise and threats to mission execution.
“(c)Annual Briefings.—During the 60-day period beginning on the date that is 30 days before the date on which the President submits to Congress the budget of the President pursuant to section 1105(a) of title 31, United States Code, for each of fiscal years 2025 through 2028, the Secretary shall provide to the appropriate congressional committees a briefing on the implementation of this section.
“(d)Termination.—
“(1)In general.—Except as provided in paragraph (2), the cross-functional team under this section shall terminate on October 31, 2028.
“(2)Extension authority.—The Secretary of Defense may extend the date of termination under paragraph (1) as the Secretary determines appropriate.
“(e)Appropriate Congressional Committees Defined.—In this section, the term ‘appropriate congressional committees’ means—
“(1) the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives]; and
“(2) the Permanent Select Committee on Intelligence of the House of Representatives.”

Ensuring Cyber Resiliency of Nuclear Command and Control System

Puspan. L. 116–283, div. A, title XVII, § 1747, Jan. 1, 2021, 134 Stat. 4140, provided that:

“(a)Plan for Implementation of Findings and Recommendations From First Annual Assessment of Cyber Resiliency of Nuclear Command and Control System.—Not later than October 1, 2021, the Secretary of Defense shall submit to the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives] a comprehensive plan, including a schedule and resourcing plan, for the implementation of the findings and recommendations included in the first report submitted under section 499(c)(3) of title 10, United States Code.
“(span)Concept of Operations and Oversight Mechanism for Cyber Defense of Nuclear Command and Control System.—Not later than October 1, 2021, the Secretary shall develop and establish—
“(1) a concept of operations for defending the nuclear command and control system against cyber attacks, including specification of the—
“(A) roles and responsibilities of relevant entities within the Office of the Secretary, the military services, combatant commands, the Defense Agencies, and the Department of Defense Field Activities; and
“(B) cybersecurity capabilities to be acquired and employed and operational tactics, techniques, and procedures, including cyber protection team and sensor deployment strategies, to be used to monitor, defend, and mitigate vulnerabilities in nuclear command and control systems; and
“(2) an oversight mechanism or governance model for overseeing the implementation of the concept of operations developed and established under paragraph (1), related development, systems engineering, and acquisition activities and programs, and the plan required by subsection (a), including specification of the—
“(A) roles and responsibilities of relevant entities within the Office of the Secretary, the military services, combatant commands, the Defense Agencies, and the Department of Defense Field Activities in overseeing the defense of the nuclear command and control system against cyber attacks;
“(B) responsibilities and authorities of the Strategic Cybersecurity Program in overseeing and, as appropriate, executing—
“(i) vulnerability assessments; and
“(ii) development, systems engineering, and acquisition activities; and
“(C) processes for coordination of activities, policies, and programs relating to the cybersecurity and defense of the nuclear command and control system.”