American Council of Life Insurers Issues Public Comment to Homeland Security
TARGETED NEWS SERVICE (founded 2004) features non-partisan 'edited journalism' news briefs and information for news organizations, public policy groups and individuals; as well as 'gathered' public policy information, including news releases, reports, speeches. For more information contact
The comment, on Docket No. CISA-2022-0010, was sent to
* * *
INTRODUCTION
Insurance companies have robust data security programs in recognition of their affirmative obligation to protect the security of their customers' personal information and the information systems on which such information is stored. ACLI urges CISA to consider the state cybersecurity regulation of insurers, as well as CIRCIA's risk-based approach to determining inclusion, and exclude insurers from reporting obligations under CIRCIA.
STATE REGULATION OF THE INSURANCE INDUSTRY
* Presidential Policy Directive/PPD-21/2 states, "Each critical infrastructure sector has unique characteristics, operating models, and risk profiles that benefit from a sector identified
* Primarily regulated by the states, the insurance industry is a unique subset of the financial services sector. The McCarran-Ferguson Act of 1945 exempts the regulation of insurance from most federal regulation. The McCarran-Ferguson Act declared "that the continued regulation and taxation by the several States of the business of insurance is in the public interest, and that silence on the part of the
1
2 Presidential Policy Directive/PPD-21
* * *
...Act of
* For decades, states have operated an interconnected, yet independent regulatory system to govern all aspects of the insurance business, including cybersecurity. All 50 states and DC have insurer-specific data security breach notification requirements./4
* 21 of those states have enacted a version of the
Adopted by the NAIC in 2017, the Model Law builds on the existing broad regulatory authority vested in state insurance regulators and establishes standards for data security. Moreover, it provides standards for the investigation of and notification to a state insurance commissioner of a cybersecurity event. Like CIRCIA, the Model Law requires a 72-hour timeline to report cybersecurity events.
* The
* The NAIC provides several tools to assist state regulators in managing cybersecurity in the insurance industry./9
These tools include the Principles for Effective Cybersecurity: Insurance Regulatory Guidance,/10 Financial Condition Examiners Handbook, Market Regulation Handbook, and the Cybersecurity Vulnerability Response Plan.
* ACLI requests that CISA consider the established state-based insurance regulatory system, as well as the current comprehensive oversight of cybersecurity in the insurance industry, when drafting regulations promulgated under CIRCIA.
DEFINITIONS, CRITERIA, AND SCOPE OF REGULATORY COVERAGE
* To be effective, CISA must remain within CIRCIA's stated boundaries and develop regulations that filter the wide range of cyber incidents occurring in our country to focus on those posing the greatest threat to economic and national security. Reporting cyber incidents and ransom payments to CISA is most beneficial when CISA's response is accurate, actionable, and useful. Broad inclusion will overwhelm CISA's investigation resources, thereby reducing its effectiveness in disrupting threat actors.
Covered Entity
3 https://content.naic.org/cipr-topics/mccarran-ferguson-act
4 A copy of the
5 The
6 https://content.naic.org/sites/default/files/inline-files/MDL-668.pdf
7 https://content.naic.org/cipr-topics/cybersecurity
8 https://content.naic.org/cmte_h.htm
9 NAIC Summary of Cybersecurity Tools
10 NAIC Principles for Effective Cybersecurity: Insurance Regulatory Guidance
* * 8
* Not all entities categorized as part of a critical infrastructure sector should be considered "covered entities." CIRCIA gives CISA leeway in defining "covered entity" so long as it is an entity in a critical infrastructure sector, as defined in Presidential Policy Directive 21.
* ACLI believes that any new federal regulations should not needlessly duplicate the states' oversight efforts nor the cybersecurity reporting requirements with which insurers already must comply under existing law. In determining the criteria for a "covered entity," it is imperative that CISA factor in the extent to which an industry is subject to existing cybersecurity regulation and notification requirements, whether it be at the state or federal level.
* Keeping the initial categorization of "covered entity" narrow will also allow time to test the reporting process and scale up capacity, if necessary. Limiting the initial "covered entity" categorization will conserve CISA's resources for the extensive work needed to coordinate reporting requirements and establish sharing agreements with other federal agencies.
* The definition of "covered entity" must incorporate the elements contained in Section 2242 (c)(1). The elements include "(A) the consequences that disruption to or compromise of such an entity could cause to national security, economic security, or public health and safety; (B) the likelihood that such an entity may be targeted by a malicious cyber actor, including a foreign country; and (C) the extent to which damage, disruption, or unauthorized access to such an entity, including the accessing of sensitive cybersecurity vulnerability information or penetration testing tools or techniques, will likely enable the disruption of the reliable operation of critical infrastructure."
* These elements create a risk-based approach in determining what is considered a "covered entity." Of these elements, the probability a disruption to an entity could harm national and economic security is likely the most restrictive. As such, it should be used as key criteria in determining whether an entity is "covered." ACLI suggests CISA focus on those financial service companies that provide core financial products or services where a compromise of its information or information systems would be a threat to national and economic security.
* While insurers are an important component of our nation's critical infrastructure, its products and services are such that a disruption is unlikely to threaten national security and most likely to remain limited to impacts on the insurer and its customers.
* Guidance should be clear about whether an entity is or is not a "covered entity," and therefore subject to CIRCIA reporting requirements. When a cyber incident or ransom attack occurs, entities often must dedicate considerable resources to mitigating the incident. Attempting to determine whether an entity is subject to reporting requirements during this time is not the best use of resources, nor is it in the best interest of the entity's customers or national security.
* Given the interconnectedness of businesses, CISA should take practical consideration of third-party service providers, including cloud service providers, when establishing the criteria for a "covered entity." A cyber attack that exploits the concentration risk of third-party service providers would impact entire industry sectors.
* CISA should also account for the contractual agreements between covered entities and their third-party service providers. Many of these contractual agreements include a cybersecurity notification provision, including the respective notification responsibilities of the contracting parties. The regulations should be structured to limit the number of entities reporting the same covered incident. Moreover, covered entities should only be required to report to the extent they are affected by a covered cyber incident.
* Finally, we point out that certain terms, including "third-party service provider" could be defined and understood differently in different industry sectors. All terms should be clearly defined for the purposes of the regulations promulgated under CIRCIA. Where practicable, such definitions and terms should align with a well-regarded, pre-existing standard, such as those developed by the
Covered Cyber Incident
* Clear guidance on the criteria for a "covered cyber incident" designation will help identify and prioritize the highest risk cyber incidents for CISA's evaluation. This guidance should not be prescriptive. Instead, such criteria should be flexible, risk-based, and considerate of a covered entity's particular risk profile.
* While incorporating the elements contained in Section 2242 (c)(2), CIRCIA's criteria for a "covered cyber incident" should set a high threshold for reporting and only include the reporting of cyber incidents that are likely to harm the national or economic security of
* By establishing a high threshold for reportable incidents, CISA's notification requirements will build upon other, broader reporting requirements, whether state or federal. A tighter focus for the CIRCIA reporting criteria will make it easier to harmonize government efforts by establishing CISA as the preeminent federal government response to those cyber incidents that are likely to harm national and economic security.
* Per CIRCIA Section 2240 (6), any requirements to notify CISA of a cyber incident should apply only to events that actually jeopardize information on information systems or information systems. Potential or imminent jeopardy does not meet this standard.
* Regulations that incorporate a risk of harm analysis to critical infrastructure, as laid out in Section 2242 (c)(2) will help to ensure only those cyber incidents which lead to a substantial loss of confidentiality, integrity, or availability of information or an information system are required to be reported. This substantial impact should be measured by its likelihood to harm national or economic security. Tying the criteria for a "covered entity" as well as a "covered cyber incident" to impact on national and economic security aligns these terms and makes clear the standards for reporting under CIRCIA.
* Where there is no disruption to business operations, CISA should consider clearly excluding incidents where there has been a determination that information was not viewed, accessed, or acquired. For example, where there is no disruption to business operations, a "covered cyber incident" should not include the unauthorized acquisition of encrypted nonpublic information if the encryption, process, or key is not also acquired, released, or used without authorization. Further, the definition should specify that such information is nonpublic, electronic information in the possession of a covered entity.
* The regulations should account for the good faith judgment of covered entities in determining whether a cyber incident meets the criteria of a "covered cyber incident."
11 As part of the
* * *
REPORT CONTENTS AND SUBMISSION PROCEDURES
Covered Cyber Incident and Ransom Payment Reports
* ACLI recommends a standardized, streamlined reporting method. While a designated portal for standardized submissions is ideal, it is possible covered entities will need access to alternative secure reporting methods, which should be available when necessary.
* When a cybersecurity event is occurring, a covered entity's goal is to mitigate the event, fix the vulnerability, and communicate with impacted stakeholders and customers. Notification of a covered cyber incident or ransom payment should contain only the most pertinent information, restricted to those delineated in Section 2242 (c)(4), to conserve covered entities' resources for mitigation. Any material, new information, or material changes to the information included in the initial notification to CISA, can be provided in a supplemental report.
* Insisting on comprehensive information in the notification can lead to both under and overstating the significance of a covered cyber incident.
* CISA must consider the sensitive nature of the information included in an incident report and develop a clear set of principles to govern how they protect and use the data they collect, as well as with whom it will be shared.
* As a repository for the sensitive information and security vulnerabilities of covered entities, CISA will become a prime
Reasonable Belief And 72-Hour Reporting Timeline
* CIRCIA states, "A covered entity that experiences a covered cyber incident shall report the covered cyber incident to the Agency not later than 72 hours after the covered entity reasonably believes that the covered cyber incident has occurred."
* The "reasonable belief trigger" must constitute actual reasonable belief that a confirmed cyber incident meets the threshold criteria of "covered cyber incident." It is also important to recognize that it can take time to determine whether an incident has met the threshold of a covered cyber incident. It is in CISA's, and ultimately the nation's, best interest to receive accurate information. Accuracy must not suffer in a misplaced preference for timeliness.
* When determining "reasonable belief," CISA should recognize that, particularly for less resourced entities, incidents that may occur over a weekend or on a holiday may not be discovered or fully investigated until the next business day.
* CISA should also note that due to the broad trigger criteria in some other federal and state government agency reporting requirements, CISA might not receive the first report of an incident. It's imperative that CISA recognize the varying reporting triggers that many entities must currently interpret when complying with a range of cybersecurity reporting requirements.
* Covered entities, who in good faith do not reasonably believe a covered cyber incident has occurred, should not be subject to penalty.
Supplemental Reports
* A covered entity's obligation to update CISA about changes to information provided previously only applies if substantial new or different information becomes available or if the covered entity makes a ransom payment.
* Substantial new or different information should be defined as information that has a material impact on specified concepts such as intent,
* A covered entity should have no obligation to update information provided previously if the changes to that information are not material.
Balancing Reporting Requirements with Investigation
* Requirements for reporting substantial cyber incidents must be considerate of the focused emergency efforts of covered entities along the lifecycle of the security incident response process. Regulator reporting requirements within the identification, containment, or eradication phases of incident response divert attention from the focused acts of minimizing the impact of the incident.
* Reporting requirements will have an outsized impact on smaller covered entities with fewer resources to devote to both reporting and investigation and mitigation.
OTHER INCIDENT REPORTING REQUIREMENTS AND SECURITY VULNERABILITY INFORMATION SHARING
Existing Or Proposed Federal Or State Reporting Regulations and Directives
* In
* Many of ACLI's member companies sell vision, dental, and long-term care insurance, and may be subject to HIPAA's federal cybersecurity reporting requirement. HIPAA mandates that if a data breach occurs which exposes the personal health information of more than 500 individuals, the
* Insurers also report under the Payment Card Industry Data Security Standard (PCI DSS),/15 which establishes cybersecurity controls and business practices that any company that accepts credit card payments must implement. Per the PCI DSS, merchants have an obligation to notify their payment processor of any breach.
*
12 Indicator of Compromise (IOC)/Tactics, Techniques, and Procedures (TTPs)
13 86 FR 66424. The rule also requires certain bank service providers to notify each affected institution after experiencing a certain computer-security incidents.
14 45 CFR Secs. 164.400-414.
15 https://www.pcisecuritystandards.org/standards/
* * *
...the two
* Insurance companies comply with voluntary cybersecurity notification requirements as well. These voluntary cybersecurity notification requirements include those to the
In addition, many insurers have voluntarily reported to CISA for years, seeing CISA as a valuable resource in managing cyber-attacks.
* As previously discussed in this letter, insurers are subject to cybersecurity oversight and reporting requirements in all fifty states, DC, and
* Managing multiple federal and state cybersecurity regulatory requirements is extremely burdensome if reporting is not harmonized between federal agencies or duplicates the states' cybersecurity oversight.
Substantially Similar Reported Information and Timeframe
* Layering substantially similar cyber incident notification obligations on covered entities will hinder CISA's efforts to coordinate a response to cybersecurity incidents that may harm national and economic security or disrupt critical infrastructure.
* Robust sharing agreements will go far in alleviating the burden on covered entities that are currently subject to multiple reporting obligations.
* Section 2242 (a)(5)(B) provides that covered entities may be exempt from reporting under CIRICA if the covered entity is also required to report substantially similar information to another federal agency within a substantially similar timeframe. The exemption only takes effect once an agency agreement and sharing mechanism are in place between CISA and the respective federal agency.
* Clarifying the terms "substantially similar information" and "substantially similar timeframe," as well as setting up these agency agreements and sharing mechanisms, should be a top priority for CISA. We recommend CISA have as many agreements and sharing mechanisms in place as possible when the regulations promulgated under CIRCIA become effective. Any sharing mechanism should assure the durability of the interagency agreements creating the preemption. As administrations change, along with government agency heads, the sharing mechanisms should be relied upon to remain intact. Sharing mechanisms should also eliminate the need to report in multiple formats.
* Moreover, CISA should consider its concurrent or separate jurisdiction with the
CONCLUSION
16 87 FR 16590.
17
* * *
A targeted, coordinated approach to federal cybersecurity notification requirements will help to ensure that businesses within
Sincerely,
Associate Director, Cybersecurity Working Group Lead, ACLI
* * *
Original text here: https://downloads.regulations.gov/CISA-2022-0010-0095/attachment_1.pdf
TARGETED NEWS SERVICE (founded 2004) features non-partisan 'edited journalism' news briefs and information for news organizations, public policy groups and individuals; as well as 'gathered' public policy information, including news releases, reports, speeches. For more information contact
3 New England states require health insurance
American Property Casualty Insurance Association Issues Public Comment to Homeland Security
Advisor News
Annuity News
Health/Employee Benefits News
Life Insurance News