As businesses lean more on tech and interconnected systems, they become prime targets for cyberthreats. These threats go beyond just stealing data – they can disrupt essential services like power grids, financial systems, and healthcare.

To combat these threats, the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) was introduced. This law mandates certain businesses to report cybersecurity incidents to the Cybersecurity and Infrastructure Security Agency (CISA) within specific timeframes. The goal? To create a coordinated approach to handling cyber incidents across critical infrastructure sectors, thereby improving security and enhancing our response to cyberthreats.

Why CIRCIA Matters to Your Business

Enhanced Cybersecurity: CIRCIA mandates reporting cyber incidents within 72 hours and ransomware payments within 24 hours. This rapid reporting helps identify and mitigate threats quickly, preventing further damage and containing cyberattacks.

Protecting Critical Infrastructure: Sectors like energy, finance, healthcare, and communications are vital. Cyber incidents here can disrupt services and endanger lives. CIRCIA ensures these threats are promptly reported and addressed, safeguarding these essential services.

National Security: Cybersecurity is a national security issue. By improving incident reporting and response, CIRCIA helps protect the nation’s critical infrastructure from severe cyberthreats. Timely reporting allows for a coordinated response, enhancing resilience against cyberattacks.

Understanding and complying with CIRCIA isn’t just about legal requirements; it’s about contributing to national cybersecurity efforts. By adhering to these reporting requirements, your business helps create a safer, more secure environment for everyone.

Understanding Covered Entities

Under CIRCIA, certain businesses and organizations must report cybersecurity incidents. So, what makes an entity a “covered entity”? Covered entities are businesses within critical infrastructure sectors that meet specific criteria, making prompt cyber incident reporting crucial.

Criteria for Determining if Your Business Is a Covered Entity

Size-Based Criteria: If your business exceeds the size standards set by the Small Business Administration (SBA) for your industry, it may be considered a covered entity. These standards vary but generally categorize businesses based on revenue or the number of employees.

Sector-Based Criteria: Some sectors are automatically considered critical infrastructure, regardless of business size. If your business operates in one of these sectors, it is likely covered under CIRCIA. Examples include:

  • Chemical Facilities
  • Communications Services
  • Critical Manufacturing
  • Defense
  • Emergency Services
  • Energy
  • Financial Services
  • Government
  • Healthcare
  • Information Technology
  • Nuclear
  • Transportation
  • Water Systems

By understanding these criteria, you can determine if your business is covered under CIRCIA and ensure you meet the reporting requirements.

Reporting Requirements and Procedures

Timeframes for Reporting:

  • 72 Hours for Cybersecurity Incidents: Report cybersecurity incidents to CISA within 72 hours of reasonably believing the incident has occurred. This helps in rapid response and mitigation, minimizing damage, and preventing further attacks.
  • 24 Hours for Ransomware Payments: If a ransomware payment is made, it must be reported to CISA within 24 hours. This ensures immediate awareness and response, aiding in tracking and combating ransomware activities.

 

Types of Information Required in Reports: 

  • Identity and Contact Information: Your business’s legal name, trade names, state of incorporation, physical address, website, and critical infrastructure sector. Include contact info for your business or authorized representatives.
  • Description of the Incident and Impacted Systems: Details of the incident, including affected systems, networks, and devices, along with their locations and technical specs.
  • Details on Vulnerabilities and Security Defenses: Identify specific products or technologies with vulnerabilities, describe your security controls, and detail which controls failed or were not implemented correctly.
  • Information on Perpetrators and Mitigation Efforts: Provide info on the identity of those responsible for the incident, your assessment of mitigation and response activities, and whether law enforcement or external parties were involved.

Accurate reporting ensures CISA has the necessary information to assess and respond to incidents effectively. Incomplete reports can delay responses and exacerbate the incident’s impact.

Situations Where Incidents Are Exempt From Reporting:

  • Good Faith Responses: Incidents carried out in good faith by an entity responding to a specific request from the system owner or operator
  • Lawful Government Activities: Activities conducted by U.S. government or state, local, tribal, and territorial (SLTT) government entities as part of lawful operations

 

Specific Content Requirements for Ransomware Payment Reports: 

  • Whether exfiltrated data was returned or decryption was provided after payment.
  • Detailed information on the ransom demand and payment, including currency type, payment instructions, and the amount demanded

Consequences of Noncompliance

CIRCIA provides several enforcement mechanisms to ensure compliance. If a covered entity fails to report a cyber incident, CISA can take various actions, including:

  • Request for Information (RFI): CISA can issue an RFI to obtain necessary details about the incident.
  • Subpoenas: If the entity does not comply with the RFI, CISA can issue a subpoena to compel information disclosure.
  • Civil Actions: CISA can refer the case to the attorney general for civil action against the noncompliant entity.
  • Additional Mechanisms: These may include suspension, debarment, and acquisition penalties.

Assessing and Updating Your Cyber Incident Response Strategy

Conduct a Risk Assessment: Identify potential cyberthreats and vulnerabilities within your organization to understand the types of incidents that could impact your business.

Develop a Response Plan: Create a comprehensive incident response plan that includes procedures for timely reporting as required by CIRCIA.

Train Your Team: Educate employees about cybersecurity and their role in incident response through regular training.

Test Your Plan: Regularly test your incident response plan with simulations and drills to ensure your team is prepared for real incidents.

Best Practices for Ensuring Compliance With CIRCIA Reporting Requirements

Stay Informed: Keep up to date with the latest guidelines and regulations from CISA to stay compliant with any changes.

Implement Robust Monitoring Systems: Use advanced monitoring tools to quickly detect and identify cyber incidents, aiding in meeting reporting deadlines.

Document Everything: Maintain detailed records of all cyber incidents, including descriptions, impacted systems, vulnerabilities, and mitigation efforts.

Engage With Third-Party Experts: Work with cybersecurity firms or consultants for expertise and assistance in managing incidents and ensuring compliance.

Get the help you need from Mega-Byte

CIRCIA is a crucial step in enhancing cybersecurity across critical infrastructure sectors. Understanding and complying with its requirements is essential for protecting your business and contributing to national security.

By staying informed and prepared, your business can respond swiftly and effectively to cyber incidents. Timely and accurate reporting is not just about compliance – it’s about safeguarding your operations and supporting the collective effort to combat cyberthreats.

For further assistance and guidance with the new CIRCIA requirements or any of your cybersecurity or IT needs, contact Mega-Byte. Our team of experts is here to help you navigate these regulations and strengthen your cybersecurity posture. Don’t wait – reach out to us today to ensure your business is protected and compliant.