<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://www.hackerone.com/">
  <channel>
    <title>Required *Coming Soon</title>
    <link>https://www.hackerone.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Cybersecurity in the Marine Transportation System</title>
  <link>https://www.hackerone.com/node/2357</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Cybersecurity in the Marine Transportation System</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Mon, 07/29/2024 - 13:10
</span>

  
    Jurisdiction
              United States
          

  
    Region
              North America
          

  
    Requirement
              Required *Coming Soon
          

  
    Organization
              U.S. Coast Guard
          

  
    Provision
              Sec. 101.650(e)(3)(ii)
          

  
    Applies to
              U.S.-flagged vessels, Outer Continental Shelf facilities, and U.S. facilities subject to the Maritime Transportation Security Act of 2002 regulations
          

  
    Date
              TBD
          

  
    Description
              <p>(3) Routine system maintenance. Each owner or operator or a designated CySO of a vessel, facility, or OCS facility must ensure the following measures for routine system maintenance are in place and documented in Section 6 of the Cybersecurity Plan:&nbsp;</p><p>(i) Ensure patching or implementation of documented compensating controls for all KEVs in critical IT or OT systems, without delay;&nbsp;</p><p><strong>(ii) Maintain a method to receive and act on publicly submitted vulnerabilities;</strong>&nbsp;</p><p>(iii) Maintain a method to share threat and vulnerability information with external stakeholders;&nbsp;</p><p>(iv) Ensure there are no exploitable channels directly exposed to internet-accessible systems;&nbsp;</p><p>(v) Ensure no OT is connected to the publicly accessible internet unless explicitly required for operation, and verify that, for any remotely accessible OT system, there is a documented justification; and&nbsp;</p><p>(vi) Conduct vulnerability scans as specified in the Cybersecurity Plan.</p>
          

            <a href="https://www.federalregister.gov/documents/2024/02/22/2024-03075/cybersecurity-in-the-marine-transportation-system">https://www.federalregister.gov/documents/2024/02/22/2024-03075/cybersecurity-i…</a>
      ]]></description>
  <pubDate>Mon, 29 Jul 2024 18:10:00 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2357 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>Federal Information Security Modernization Act (FISMA) 2023</title>
  <link>https://www.hackerone.com/node/2342</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">Federal Information Security Modernization Act (FISMA) 2023</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Fri, 07/26/2024 - 14:56
</span>

  
    Jurisdiction
              United States
          

  
    Region
              North America
          

  
    Requirement
              Required *Coming Soon
          

  
    Organization
              Congress / CISA
          

  
    Provision
              Sec. 12(f)
          

  
    Applies to
              Federal agencies, excluding "national security systems"
          

  
    Date
              TBD
          

  
    Description
              The head of each federal agency must develop and make publicly available a vulnerability disclosure policy for their agency - clearly defining a scope and directions for how to submit informaiton. The head of each agency should coordinate with the Director of CISA in creating the policy. Agencies should not puruse legal action against submitters that made a "good faith effort" to idenitify a vulnerability and report it. The legislation <em>does not </em>apply to national security systems.&nbsp;
          

            <a href="https://www.congress.gov/bill/118th-congress/house-bill/4552?q=%7B%22search%22%3A%22H.R.%204552%22%7D&amp;s=1&amp;r=1">https://www.congress.gov/bill/118th-congress/house-bill/4552?q=%7B%22search%22%…</a>
      ]]></description>
  <pubDate>Fri, 26 Jul 2024 19:56:58 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2342 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>NIS 2 Directive (Directive (EU) 2022/2555)</title>
  <link>https://www.hackerone.com/node/2339</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">NIS 2 Directive (Directive (EU) 2022/2555)</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Fri, 07/26/2024 - 12:49
</span>

  
    Jurisdiction
              European Union
          

  
    Region
              Europe
          

  
    Requirement
              Required *Coming Soon
          

  
    Organization
              European Parliament / Commission / Council
          

  
    Provision
              Article 21.2(e)
          

  
    Applies to
              Important and essential entities (as defined, similar to critical infrastructure)
          

  
    Date
              October 17, 2024
          

  
    Description
              <p>2. The measures referred to in paragraph 1 shall be based on an all-hazards approach that aims to protect network and information systems and the physical environment of those systems from incidents, and shall include at least the following: (a) policies on risk analysis and information system security; (b) incident handling; (c) business continuity, such as backup management and disaster recovery, and crisis management; (d) supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers; (e) security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure;</p>
          

            <a href="https://eur-lex.europa.eu/eli/dir/2022/2555">https://eur-lex.europa.eu/eli/dir/2022/2555</a>
      ]]></description>
  <pubDate>Fri, 26 Jul 2024 17:49:58 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2339 at https://www.hackerone.com</guid>
    </item>
<item>
  <title>NIS 2 Directive (Directive (EU) 2022/2555)</title>
  <link>https://www.hackerone.com/node/2338</link>
  <description><![CDATA[<span class="field field--name-title field--type-string field--label-hidden">NIS 2 Directive (Directive (EU) 2022/2555)</span>
<span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>h1_admin</span></span>
<span class="field field--name-created field--type-created field--label-hidden">Fri, 07/26/2024 - 12:43
</span>

  
    Jurisdiction
              European Union
          

  
    Region
              Europe
          

  
    Requirement
              Required *Coming Soon
          

  
    Organization
              European Parliament / Commission / Council
          

  
    Provision
              Article 12(1)
          

  
    Applies to
              EU Member States (and their designated CSIRT) and ENISA
          

  
    Date
              October 17, 2024
          

  
    Description
              <p>Requires Member States to designate a Computer Security Incident Response Teams (CSIRTs) as the coordinator for CVD. That CSIRT will act as a trusted intermediary between natural/legal persons reporting a vulnerability and the manufacturer of the ICT product or service. ENISA must also develop a European vulnerability database.&nbsp;</p>
          

            <a href="https://eur-lex.europa.eu/eli/dir/2022/2555">https://eur-lex.europa.eu/eli/dir/2022/2555</a>
      ]]></description>
  <pubDate>Fri, 26 Jul 2024 17:43:35 +0000</pubDate>
    <dc:creator>h1_admin</dc:creator>
    <guid isPermaLink="false">2338 at https://www.hackerone.com</guid>
    </item>

  </channel>
</rss>
