(a)
(1) review and provide recommendations to the Secretary of Defense on Department of Defense budget requests for information technology and national security systems;
(2) ensure the interoperability of information technology and national security systems throughout the Department of Defense;
(3) ensure that information technology and national security systems standards that will apply throughout the Department of Defense are prescribed;
(4) provide for the elimination of duplicate information technology and national security systems within and between the military departments and Defense Agencies; and
(5) maintain a consolidated inventory of Department of Defense mission critical and mission essential information systems, identify interfaces between those systems and other information systems, and develop and maintain contingency plans for responding to a disruption in the operation of any of those information systems.
(b)
(1) review budget requests for all information technology and national security systems;
(2) ensure that information technology and national security systems are in compliance with standards of the Government and the Department of Defense;
(3) ensure that information technology and national security systems are interoperable with other relevant information technology and national security systems of the Government and the Department of Defense; and
(4) coordinate with the Joint Staff with respect to information technology and national security systems.
(c)
(1) The term "Chief Information Officer" means the senior official designated by the Secretary of Defense or a Secretary of a military department pursuant to section 3506 of title 44.
(2) The term "information technology" has the meaning given that term by section 11101 of title 40.
(3) The term "national security system" has the meaning given that term by section 3552(b)(6) of title 44.
Editorial Notes
Amendments
2015—Subsec. (c)(3). Pub. L. 114–92 substituted "section 3552(b)(6)" for "section 3552(b)(5)".
2014—Subsec. (c)(3). Pub. L. 113–283 substituted "section 3552(b)(5)" for "section 3542(b)(2)".
2006—Subsec. (c)(3). Pub. L. 109–364 substituted "section 3542(b)(2) of title 44" for "section 11103 of title 40".
2002—Subsecs. (a), (b). Pub. L. 107–217, §3(b)(1)(A), (B), substituted "section 11315 of title 40" for "section 5125 of the Clinger-Cohen Act of 1996 (40 U.S.C. 1425)" in introductory provisions.
Subsec. (c)(2). Pub. L. 107–217, §3(b)(1)(C), substituted "section 11101 of title 40" for "section 5002 of the Clinger-Cohen Act of 1996 (40 U.S.C. 1401)".
Subsec. (c)(3). Pub. L. 107–217, §3(b)(1)(D), substituted "section 11103 of title 40" for "section 5142 of the Clinger-Cohen Act of 1996 (40 U.S.C. 1452)".
2000—Subsec. (a)(5). Pub. L. 106–398 added par. (5).
Statutory Notes and Related Subsidiaries
Effective Date
Pub. L. 105–261, div. A, title III, §331(b), Oct. 17, 1998, 112 Stat. 1968, provided that: "Section 2223 of title 10, United States Code, as added by subsection (a), shall take effect on October 1, 1998."
Modernization of the Department of Defense's Authorization To Operate Processes
Pub. L. 118–159, div. A, title XV, §1522, Dec. 23, 2024, 138 Stat. 2140, provided that:
"(a)
"(1)
"(2)
"(A) the most current contact information for such authorizing official; and
"(B) a list of each training required to perform the duties and responsibilities of an authorizing official completed by such authorizing official.
"(b)
"(1)
"(2)
"(A) ensures the development of standardized and transparent documentation of the security, accreditation, performance, and operational capabilities of cloud-hosted platforms, services, and applications to enable decision making by mission owners of such cloud-hosted platforms, services, and applications;
"(B) provides for an intuitive and digital workflow to document acknowledgments among mission owners and system owners of use of the operational capabilities of cloud-hosted platforms, services, and applications;
"(C) directs a review by mission owners of existing authorization information, at the appropriate classification level, regarding the status of the operational capabilities of cloud-hosted platforms, services, and applications, including through management dashboards or other management analytic capabilities; and
"(D) defines a process, including required timelines, to allow authorizing officials that disagree with the security analysis of a cloud-hosted platform, service, or application that such official would be required to adopt under such policy to present such disagreement to the Chief Information Officer of the Department of Defense, or such other individual or entity designated by the Chief Information Officer, for adjudication.
"(3)
"(A) all authorizing officials in the Department of Defense, including in each military department, component, and agency of the Department; and
"(B) all operational capabilities of cloud-hosted platforms, services, and applications, including capabilities on public cloud infrastructure, as authorized through the Federal Risk and Authorization Management Program established under section 3608 of title 44, United States Code, and the Defense Information Systems Agency, and capabilities on private cloud landing zones managed by the Department of Defense that are authorized by Department accrediting officials.
"(c)
"(d)
"(1) the term 'Authorization to Operate' has the meaning given such term in the Office of Management and Budget Circular A-130;
"(2) the term 'authorizing official' means an officer who is authorized to assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the United States;
"(3) the term 'military departments' has the meaning given such term in section 101(a) of title 10, United States Code;
"(4) the term 'mission owner' means the user of a cloud-based platform, service, or application; and
"(5) the term 'system owner' means the element of the Department of Defense responsible for acquiring a cloud-based platform, service, or application, but which is not a mission owner of such cloud-based platform, service, or application."
Required Policies To Establish Datalink Strategy of Department of Defense
Pub. L. 118–31, div. A, title XV, §1527, Dec. 22, 2023, 137 Stat. 559, provided that:
"(a)
"(1)
"(2)
"(A) The designation of an organization to serve as the lead coordinator of datalink activities throughout the Department of Defense.
"(B) The prioritization and coordination across the military departments with respect to the strategy within the requirements generation process of the Department.
"(C) The use throughout the Department of a common standardized datalink network or transport protocol that ensures interoperability between independently developed datalinks, regardless of physical medium used, and ensures mesh routing. In developing such policy, the Secretary of Defense shall consider the use of a subset of Internet Protocol.
"(D) A programmatic decoupling of the physical method used to transmit data, the network or transport protocols used in the transmission and reception of data, and the applications used to process and use data.
"(E) Coordination of the strategy with respect to weapon systems executing the same mission types across the military departments, including through the use of a common set of datalink waveforms. In developing such policy, the Secretary shall evaluate the use of redundant datalinks for line-of-sight and beyond-line-of-sight information exchange for each weapon systems platform.
"(F) Coordination between the Department and the intelligence community (as such term is defined in section 3 of the National Security Act of 1947 (50 U.S.C. 3003)) to leverage any efficiencies and overlap with existing datalink waveforms of the intelligence community.
"(G) Methods to support the rapid integration of common datalinks across the military departments.
"(H) Support for modularity of specific datalink waveforms to enable rapid integration of future datalinks, including the use of software defined radios compliant with modular open system architecture and sensor open system architecture.
"(b)
"(1) provide to the appropriate congressional committees a briefing on the proposed policies under subsection (a)(1), including timelines for the implementation of such policies; and
"(2) submit to the appropriate congressional committees—
"(A) an estimated timeline for the implementations of datalinks;
"(B) a list of any additional resources and authorities necessary to implement the strategy; and
"(C) a determination of whether a common set of datalinks can and should be implemented across all major weapon systems (as such term is defined in section 3455 of title 10, United States Code) of the Department of Defense.
"(c)
Demonstration Program for Component Content Management Systems
Pub. L. 117–263, div. A, title IX, §917, Dec. 23, 2022, 136 Stat. 2756, provided that:
"(a)
"(b)
"(1) The Office of the Secretary of Defense, with respect to directives, instructions, and other regulatory documents of the Department.
"(2) The Office of the Secretary of Defense and the Joint Staff, with respect to execution orders.
"(3) The Office of the Under Secretary of Defense for Research and Engineering and the military departments, with respect to technical manuals.
"(4) The Office of the Under Secretary of Defense for Acquisition and Sustainment, with respect to Contract Data Requirements List documents.
"(c)
"(c) [sic]
"(d)
Improved Management of Information Technology and Cyberspace Investments
Pub. L. 116–92, div. A, title VIII, §892, Dec. 20, 2019, 133 Stat. 1539, provided that:
"(a)
"(1)
"(2)
"(b)
Chief Data Officer Responsibility for DoD Data Sets
Pub. L. 116–92, div. A, title IX, §903(b), Dec. 20, 2019, 133 Stat. 1555, as amended by Pub. L. 117–263, div. A, title II, §212(k), Dec. 23, 2022, 136 Stat. 2470, provided that:
"(1)
"(2)
"(3)
Pilot Program for Open Source Software
Pub. L. 115–91, div. A, title VIII, §875, Dec. 12, 2017, 131 Stat. 1503, provided that:
"(a)
"(b)
"(c)
Pilot Program on Evaluation of Commercial Information Technology
Pub. L. 114–328, div. A, title II, §232, Dec. 23, 2016, 130 Stat. 2061, provided that:
"(a)
"(b)
"(1) Prototyping, experimentation, operational demonstration, military user assessments, and other means of obtaining quantitative and qualitative feedback on the commercial information technology products.
"(2) Engagement with the commercial information technology industry to—
"(A) forecast military requirements and technology needs; and
"(B) support the development of market strategies and program requirements before finalizing acquisition decisions and strategies.
"(3) Assessment of novel or innovative commercial technology for use by the Department of Defense.
"(4) Assessment of novel or innovative contracting mechanisms to speed delivery of capabilities to the Armed Forces.
"(5) Solicitation of operational user input to shape future information technology requirements of the Department of Defense.
"(c)
Additional Requirements Relating to the Software Licenses of the Department of Defense
Pub. L. 113–66, div. A, title IX, §935, Dec. 26, 2013, 127 Stat. 833, provided that:
"(a)
"(1)
"(2)
"(A) include plans for implementing an automated solution capable of reporting the software license compliance position of the Department and providing a verified audit trail, or an audit trail otherwise produced and verified by an independent third party;
"(B) include details on the process and business systems necessary to regularly perform reviews, a procedure for validating and reporting deregistering and registering new software, and a mechanism and plan to relay that information to the appropriate chief information officer; and
"(C) a proposed timeline for implementation of the updated plan in accordance with paragraph (3).
"(3)
"(b)
Collection and Analysis of Network Flow Data
Pub. L. 112–239, div. A, title IX, §935, Jan. 2, 2013, 126 Stat. 1886, provided that:
"(a)
"(1) are potentially scalable to the volume used by Tier 1 Internet Service Providers to collect and analyze the flow data across their networks;
"(2) will substantially reduce the cost and complexity of capturing and analyzing high volumes of flow data; and
"(3) support the capability—
"(A) to detect and identify cyber security threats, networks of compromised computers, and command and control sites used for managing illicit cyber operations and receiving information from compromised computers;
"(B) to track illicit cyber operations for attribution of the source; and
"(C) to provide early warning and attack assessment of offensive cyber operations.
"(b)
Competition for Large-Scale Software Database and Data Analysis Tools
Pub. L. 112–239, div. A, title IX, §936, Jan. 2, 2013, 126 Stat. 1886, provided that:
"(a)
"(1)
"(2)
"(A) an analysis of the technical requirements and needs for large-scale software database and data analysis tools, including prioritization of key technical features needed by the Department of Defense; and
"(B) an assessment of the available sources from Government and commercial sources to meet such needs, including an assessment by the Deputy Assistant Secretary of Defense for Manufacturing and Industrial Base Policy to ensure sufficiency and diversity of potential commercial sources.
"(3)
"(b)
"(1)
"(2)
Software Licenses of the Department of Defense
Pub. L. 112–239, div. A, title IX, §937, Jan. 2, 2013, 126 Stat. 1887, provided that:
"(a)
"(1)
"(2)
"(3)
"(A) An identification and explanation of the software licenses determined by the Chief Information Officer under paragraph (2) to be selected software licenses for purposes of this section, and a summary outline of the software licenses determined not to be selected software licenses for such purposes.
"(B) Means to assess the needs of the Department and the components of the Department for selected software licenses during the two fiscal years following the date of the issuance of the plan.
"(C) Means by which the Department can achieve the greatest possible economies of scale and cost savings in the procurement, use, and optimization of selected software licenses.
"(b)
Ozone Widget Framework
Pub. L. 112–81, div. A, title IX, §924, Dec. 31, 2011, 125 Stat. 1539, provided that:
"(a)
"(b)
"(1) Improvements to the source code and documentation for the Ozone Widget Framework.
"(2) Alternative or compatible implementations of the published application programming interface specifications for the Framework.
"(c)
Continuous Monitoring of Department of Defense Information Systems for Cybersecurity
Pub. L. 111–383, div. A, title IX, §931, Jan. 7, 2011, 124 Stat. 4334, provided that:
"(a)
"(1) The continuous prioritization of the policies, principles, standards, and guidelines developed under section 20 of the National Institute of Standards and Technology Act (15 U.S.C. 278g–3) with agencies and offices operating or exercising control of national security systems (including the National Security Agency) based upon the evolving threat of information security incidents with respect to national security systems, the vulnerability of such systems to such incidents, and the consequences of information security incidents involving such systems.
"(2) The automation of continuous monitoring of the effectiveness of the information security policies, procedures, and practices within the information infrastructure of the Department of Defense, and the compliance of that infrastructure with such policies, procedures, and practices, including automation of—
"(A) management, operational, and technical controls of every information system identified in the inventory required under section 3505(c) of title 44, United States Code; and
"(B) management, operational, and technical controls relied on for evaluations under [former] section 3545 of title 44, United States Code [see now 44 U.S.C. 3555].
"(b)
"(1) The term 'information security incident' means an occurrence that—
"(A) actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information such system processes, stores, or transmits; or
"(B) constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies with respect to an information system.
"(2) The term 'information infrastructure' means the underlying framework, equipment, and software that an information system and related assets rely on to process, transmit, receive, or store information electronically.
"(3) The term 'national security system' has the meaning given that term in [former] section 3542(b)(2) of title 44, United States Code [see now 44 U.S.C. 3552(b)(6)]."