Utah Code 63A-16-214. Zero trust architectures — Implementation — Requirements — Reporting
Current as of: 2024 | Check for updates
|
Other versions
(1) As used in this section:
Terms Used In Utah Code 63A-16-214
- Agency: means a board, commission, institution, department, division, officer, council, office, committee, bureau, or other administrative unit of the state, including the agency head, agency employees, or other persons acting on behalf of or under the authority of the agency head, the Legislature, the courts, or the governor, but does not mean a political subdivision of the state, or any administrative unit of a political subdivision of the state. See Utah Code 63A-1-103
- Chief information officer: means the chief information officer appointed under Section 63A-16-201. See Utah Code 63A-16-102
- Department: means the Department of Government Operations. See Utah Code 63A-1-103
- Division: means the Division of Technology Services. See Utah Code 63A-16-102
- Executive branch agency: means an agency or administrative subunit of state government. See Utah Code 63A-16-102
- State: when applied to the different parts of the United States, includes a state, district, or territory of the United States. See Utah Code 68-3-12.5
- United States: includes each state, district, and territory of the United States of America. See Utah Code 68-3-12.5
(1)(a) “Endpoint detection and response” means a cybersecurity solution that continuously monitors end-user devices to detect and respond to cyber threats.
(1)(b) “Governmental entity” means:
(1)(b)(i) the state;
(1)(b)(ii) a political subdivision of the state; and
(1)(b)(iii) an entity created by the state or a political subdivision of the state, including an agency, board, bureau, commission, committee, department, division, institution, instrumentality, or office.
(1)(c) “Multi-factor authentication” means using two or more different types of identification factors to authenticate a user’s identity for the purpose of accessing systems and data, which may include:
(1)(c)(i) knowledge-based factors, which require the user to provide information that only the user knows, such as a password or personal identification number;
(1)(c)(ii) possession-based factors, which require the user to have a physical item that only the user possesses, such as a security token, key fob, subscriber identity module card, or smart phone application; or
(1)(c)(iii) inherence-based credentials, which require the user to demonstrate specific known biological traits attributable only to the user, such as fingerprints or facial recognition.
(1)(d) “Zero trust architecture” means a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy that employs continuous monitoring, risk-based access controls, secure identity and access management practices, and system security automation techniques to address the cybersecurity risk from threats inside and outside traditional network boundaries.
(2) This section applies to:
(2)(a) all systems and data owned, managed, maintained, or utilized by or on behalf of an executive branch agency to access state systems or data; and
(2)(b) all hardware, software, internal systems, and essential third-party software, including for on-premises, cloud, and hybrid environments.
(3)
(3)(a) On or before November 1, 2023, the chief information officer shall develop uniform technology policies, standards, and procedures for use by executive branch agencies in implementing zero trust architecture and multi-factor authentication on all systems in accordance with this section.
(3)(b) On or before July 1, 2024, the division shall consider adopting the enterprise security practices described in this section and consider implementing zero trust architecture and robust identity management practices, including:
(3)(b)(i) multi-factor authentication;
(3)(b)(ii) cloud-based enterprise endpoint detection and response solutions to promote real-time detection, and rapid investigation and remediation capabilities; and
(3)(b)(iii) robust logging practices to provide adequate data to support security investigations and proactive threat hunting.
(4)
(4)(a) If implementing a zero trust architecture and multi-factor authentication, the division shall consider prioritizing the use of third-party cloud computing solutions that meet or exceed industry standards.
(4)(b) The division shall consider giving preference to zero trust architecture solutions that comply with, are authorized by, or align to applicable federal guidelines, programs, and frameworks, including:
(4)(b)(i) the Federal Risk and Authorization Management Program;
(4)(b)(ii) the Continuous Diagnostics and Mitigation Program; and
(4)(b)(iii) guidance and frameworks from the National Institute of Standards and Technology.
(5)
(5)(a) In procuring third-party cloud computing solutions, the division may utilize established purchasing vehicles, including cooperative purchasing contracts and federal supply contracts, to facilitate efficient purchasing.
(5)(b) The chief information officer shall establish a list of approved vendors that are authorized to provide zero trust architecture to governmental entities in the state.
(5)(c) If an executive branch agency determines that procurement of a third-party cloud computing solution is not feasible, the executive branch agency shall provide a written explanation to the division of the reasons that a cloud computing solution is not feasible, including:
(5)(c)(i) the reasons why the executive branch agency determined that a third-party cloud computing solution is not feasible;
(5)(c)(ii) specific challenges or difficulties of migrating existing solutions to a cloud environment; and
(5)(c)(iii) the total expected cost of ownership of existing or alternative solutions compared to a cloud computing solution.
(6)
(6)(a) On or before November 30 of each year, the chief information officer shall report on the progress of implementing zero trust architecture and multi-factor authentication to:
(6)(a)(i) the Public Utilities, Energy, and Technology Interim Committee; and
(6)(a)(ii) the Cybersecurity Commission created in Section 63C-25-201.
(6)(b) The report described in Subsection (6)(a) may include information on:
(6)(b)(i) applicable guidance issued by the United States Cybersecurity and Infrastructure Security Agency; and
(6)(b)(ii) the progress of the division, executive branch agencies, and governmental entities with respect to:
(6)(b)(ii)(A) shifting away from a paradigm of trusted networks toward implementation of security controls based on a presumption of compromise;
(6)(b)(ii)(B) implementing principles of least privilege in administering information security programs;
(6)(b)(ii)(C) limiting the ability of entities that cause incidents to move laterally through or between agency systems;
(6)(b)(ii)(D) identifying incidents quickly; and
(6)(b)(ii)(E) isolating and removing unauthorized entities from agency systems as quickly as practicable, accounting for cyber threat intelligence or law enforcement purposes.