(a)
(1) review and provide recommendations to the Secretary of Defense on Department of Defense budget requests for information technology and national security systems;
(2) ensure the interoperability of information technology and national security systems throughout the Department of Defense;
(3) ensure that information technology and national security systems standards that will apply throughout the Department of Defense are prescribed;
(4) provide for the elimination of duplicate information technology and national security systems within and between the military departments and Defense Agencies; and
(5) maintain a consolidated inventory of Department of Defense mission critical and mission essential information systems, identify interfaces between those systems and other information systems, and develop and maintain contingency plans for responding to a disruption in the operation of any of those information systems.
(b)
(1) review budget requests for all information technology and national security systems;
(2) ensure that information technology and national security systems are in compliance with standards of the Government and the Department of Defense;
(3) ensure that information technology and national security systems are interoperable with other relevant information technology and national security systems of the Government and the Department of Defense; and
(4) coordinate with the Joint Staff with respect to information technology and national security systems.
(c)
(1) The term "Chief Information Officer" means the senior official designated by the Secretary of Defense or a Secretary of a military department pursuant to section 3506 of title 44.
(2) The term "information technology" has the meaning given that term by section 11101 of title 40.
(3) The term "national security system" has the meaning given that term by section 3552(b)(6) of title 44.
Editorial Notes
Amendments
2015—Subsec. (c)(3). Pub. L. 114–92 substituted "section 3552(b)(6)" for "section 3552(b)(5)".
2014—Subsec. (c)(3). Pub. L. 113–283 substituted "section 3552(b)(5)" for "section 3542(b)(2)".
2006—Subsec. (c)(3). Pub. L. 109–364 substituted "section 3542(b)(2) of title 44" for "section 11103 of title 40".
2002—Subsecs. (a), (b). Pub. L. 107–217, §3(b)(1)(A), (B), substituted "section 11315 of title 40" for "section 5125 of the Clinger-Cohen Act of 1996 (40 U.S.C. 1425)" in introductory provisions.
Subsec. (c)(2). Pub. L. 107–217, §3(b)(1)(C), substituted "section 11101 of title 40" for "section 5002 of the Clinger-Cohen Act of 1996 (40 U.S.C. 1401)".
Subsec. (c)(3). Pub. L. 107–217, §3(b)(1)(D), substituted "section 11103 of title 40" for "section 5142 of the Clinger-Cohen Act of 1996 (40 U.S.C. 1452)".
2000—Subsec. (a)(5). Pub. L. 106–398 added par. (5).
Statutory Notes and Related Subsidiaries
Effective Date
Pub. L. 105–261, div. A, title III, §331(b), Oct. 17, 1998, 112 Stat. 1968, provided that: "Section 2223 of title 10, United States Code, as added by subsection (a), shall take effect on October 1, 1998."
Enhanced Security Strategy for Procurement of Private Fifth-Generation Wireless Technology
Pub. L. 119–60, div. A, title VIII, §877, Dec. 18, 2025, 139 Stat. 1005, provided that:
"(a)
"(b)
"(1) A hardware bill of materials for such procurement described in subsection (a).
"(2) A description of the implementation and operational use of zero trust principles and capabilities for such procurement.
"(c)
"(d)
"(1) The term 'military installation' has the meaning given in section 2801 of title 10, United States Code.
"(2) The term 'Open-RAN' has the meaning given in section 9202 of title XCII of the National Defense Authorization Act for Fiscal Year 2021 (Public Law 116–283) [47 U.S.C. 906]."
Plan for Deploying Private Fifth Generation and Future Generation Open Radio Access Network Architecture on Department of Defense Military Installations
Pub. L. 119–60, div. B, title XXVIII, §2853, Dec. 18, 2025, 139 Stat. 1323, provided that:
"(a)
"(b)
"(1) Connection density.
"(2) Latency requirements.
"(3) Capacity requirements.
"(4) Geographic coverage requirements.
"(5) Enhanced security within wireless network services.
"(6) Military installation physical security and force protection requirements, including perimeter monitoring and detection and tracking of uncrewed aircraft systems.
"(7) Requirements with respect to large-scale warehousing and logistics operations.
"(8) The potential use of augmented or virtual reality technology, including for maintenance and training.
"(9) Requirements with respect to large-scale and high-tempo flight line operations.
"(c)
"(d)
"(1) The Under Secretary of Defense for Research and Engineering, [sic]
"(2) The Under Secretary of Defense for Acquisition and Sustainment.
"(3) The Chief Information Officer of the Department of Defense.
"(4) The service acquisition executive of the military department concerned.
"(5) Combatant commanders.
"(6) The heads of the Defense Agencies.
"(7) Installation and environment executives.
"(e)
"(1) consolidate the prioritized military installation lists developed by the Secretaries of the military departments under subsection (a), and determine an optimal investment, deployment, and resourcing plan for private fifth generation and future generation networks across the Department that are based on Open Radio Access Network architecture; and
"(2) submit to the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and House of Representatives] a report on the lists consolidated under paragraph (1) and the determinations made pursuant to such paragraph.
"(f)
"(1) The term 'military installation' has the meaning given such term in section 2801 of title 10, United States Code.
"(2) The term 'Open Radio Access Network architecture' has the meaning given such term in section 1526 of the National Defense Authorization Act for Fiscal Year 2024 (Public Law 118–31).
"(3) The term 'service acquisition executive' has the meaning given such term in section 101 of title 10, United States Code."
Modernization of the Department of Defense's Authorization To Operate Processes
Pub. L. 118–159, div. A, title XV, §1522, Dec. 23, 2024, 138 Stat. 2140, as amended by Pub. L. 119–60, div. A, title XV, §1521, Dec. 18, 2025, 139 Stat. 1154, provided that:
"(a)
"(1)
"(2)
"(A) the most current contact information for such authorizing official; and
"(B) a list of each training required to perform the duties and responsibilities of an authorizing official completed by such authorizing official.
"(b)
"(1)
"(2)
"(A) ensures the development of standardized and transparent documentation of the security, accreditation, performance, and operational capabilities of cloud-hosted platforms, services, and applications to enable decision making by mission owners of such cloud-hosted platforms, services, and applications;
"(B) provides for an intuitive and digital workflow to document acknowledgments among mission owners and system owners of use of the operational capabilities of cloud-hosted platforms, services, and applications;
"(C) directs a review by mission owners of existing authorization information, at the appropriate classification level, regarding the status of the operational capabilities of cloud-hosted platforms, services, and applications, including through management dashboards or other management analytic capabilities;
"(D) defines a process, including required timelines, to allow authorizing officials that disagree with the security analysis of a cloud-hosted platform, service, or application that such official would be required to adopt under such policy to present such disagreement to the Chief Information Officer of the Department of Defense, or such other individual or entity designated by the Chief Information Officer, for adjudication; and
"(E) defines Department of Defense-wide, mandatory timelines for activities performed by authorizing officials with respect to an Authorization to Operate for cloud-hosted platforms, services, and applications.
"(3)
"(A) all authorizing officials in the Department of Defense, including in each military department, component, and agency of the Department; and
"(B) all operational capabilities of cloud-hosted platforms, services, and applications, including capabilities on public cloud infrastructure, as authorized through the Federal Risk and Authorization Management Program established under section 3608 of title 44, United States Code, and the Defense Information Systems Agency, and capabilities on private cloud landing zones managed by the Department of Defense that are authorized by Department accrediting officials.
"(c)
"(1)
"(2)
"(A) such Authorization to Operate is for an information system of such element; and
"(B) the request for such Authorization to Operate was appropriately submitted to the authorizing official for such Authorization to Operate and—
"(i) the final determination whether to grant such Authorization to Operate as [sic] has been pending before such authorizing official for not fewer than 180 days without resolution;
"(ii) if a mechanism for appealing a determination by an authorizing official with respect to such Authorization to Operate exists, such an appeal has been pending before such authorizing official for not fewer than 90 days without response; or
"(iii) any other circumstances identified by the Chief Information Officer of the Department of Defense in the policy established under paragraph (1) that demonstrate unreasonable delay or impediment to the Authorization to Operate process.
"(3)
"(A) clearly defined timelines for resolution of the expedited review of the appeal, not to exceed 45 days from the date the expedited review is requested;
"(B) requirements for a written justification when such timelines cannot be met; and
"(C) tracking and reporting mechanisms to monitor compliance with such timelines.
"(d)[sic; two subsecs. (d) have been enacted]
"(1)
"(A)
"(B)
"(2)
"(A)
"(B)
"(i) the number of new Authorizations to Operate issued;
"(ii) the number of requests for an Authorization to Operate that were submitted with complete and sufficient documentation to the appropriate authorizing official;
"(iii) the number of requests for Authorizations to Operate that were denied;
"(iv) the number of requests for Authorizations to Operate that were escalated to the process implemented under subsection (c), disaggregated by escalations—
"(I) to the Chief Information Officer of the Department of Defense; and
"(II) to the Chief Information Officer of each military department;
"(v) the number of requests described in clause (iv) that were resolved, disaggregated by resolutions—
"(I) by the Chief Information Officer of the Department of Defense; and
"(II) by the Chief Information Officer of each military department;
"(vi) the average time required for a capability to receive an Authorization to Operate, disaggregated each element of the Department responsible for evaluating the request for the Authorization to Operate;
"(vii) the number of Authorizations to Operate issued pursuant to the policy required by subsection (b);
"(viii) the number of requested reciprocal Authorizations to Operate denied due to insufficiency of supporting evidence, along with a narrative summary of the primary reasons for such denials;
"(ix) a narrative summary of any recurring deficiencies in the materials required for system authorization under the Risk Management Framework;
"(x) recommendations to refine the Risk Management Framework and the Authority to Operate process, including opportunities to define, implement, and validate security controls at a higher organizational level so that subordinate systems may rely on those controls without duplicative implementation or assessment; and
"(xi) an evaluation of the training, standards, and qualification requirements for authorizing officials.
"(d)[sic]
"(1) the term 'Authorization to Operate' has the meaning given such term in the Office of Management and Budget Circular A-130;
"(2) the term 'authorizing official' means an officer who is authorized to assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the United States;
"(3) the term 'military departments' has the meaning given such term in section 101(a) of title 10, United States Code;
"(4) the term 'mission owner' means the user of a cloud-based platform, service, or application; and
"(5) the term 'system owner' means the element of the Department of Defense responsible for acquiring a cloud-based platform, service, or application, but which is not a mission owner of such cloud-based platform, service, or application."
Required Policies To Establish Datalink Strategy of Department of Defense
Pub. L. 118–31, div. A, title XV, §1527, Dec. 22, 2023, 137 Stat. 559, as amended by Pub. L. 119–60, div. A, title XV, §1522, Dec. 18, 2025, 139 Stat. 1156, provided that:
"(a)
"(1)
"(2)
"(A) The designation of an organization to serve as the lead coordinator of datalink activities throughout the Department of Defense.
"(B) The prioritization and coordination across the military departments with respect to the strategy within the requirements generation process of the Department.
"(C) The use throughout the Department of a common standardized datalink network or transport protocol that ensures interoperability between independently developed datalinks, regardless of physical medium used, and ensures mesh routing. In developing such policy, the Secretary of Defense shall consider the use of a subset of Internet Protocol.
"(D) A programmatic decoupling of the physical method used to transmit data, the network or transport protocols used in the transmission and reception of data, and the applications used to process and use data.
"(E) Coordination of the strategy with respect to weapon systems executing the same mission types across the military departments, including through the use of a common set of datalink waveforms. In developing such policy, the Secretary shall evaluate the use of redundant datalinks for line-of-sight and beyond-line-of-sight information exchange for each weapon systems platform.
"(F) Coordination between the Department and the intelligence community (as such term is defined in section 3 of the National Security Act of 1947 (50 U.S.C. 3003)) to leverage any efficiencies and overlap with existing datalink waveforms of the intelligence community.
"(G) Methods to support the rapid integration of common datalinks across the military departments.
"(H) Support for modularity of specific datalink waveforms to enable rapid integration of future datalinks, including the use of software defined radios compliant with modular open system architecture and sensor open system architecture.
"(b)
"(1) provide to the appropriate congressional committees a briefing on the proposed policies under subsection (a)(1), including timelines for the implementation of such policies; and
"(2) submit to the appropriate congressional committees—
"(A) an estimated timeline for the implementations of datalinks;
"(B) a list of any additional resources and authorities necessary to implement the strategy; and
"(C) a determination of whether a common set of datalinks can and should be implemented across all major weapon systems (as such term is defined in [former] section 3455 of title 10, United States Code) of the Department of Defense.
"(c)
"(d)
Demonstration Program for Component Content Management Systems
Pub. L. 117–263, div. A, title IX, §917, Dec. 23, 2022, 136 Stat. 2756, provided that:
"(a)
"(b)
"(1) The Office of the Secretary of Defense, with respect to directives, instructions, and other regulatory documents of the Department.
"(2) The Office of the Secretary of Defense and the Joint Staff, with respect to execution orders.
"(3) The Office of the Under Secretary of Defense for Research and Engineering and the military departments, with respect to technical manuals.
"(4) The Office of the Under Secretary of Defense for Acquisition and Sustainment, with respect to Contract Data Requirements List documents.
"(c)
"(c) [sic]
"(d)
Legacy Information Technologies and Systems Accountability
Pub. L. 117–81, div. A, title XV, §1522, Dec. 27, 2021, 135 Stat. 2041, provided that:
"(a)
"(b)
"(1) An identification of the applications, software, and information technologies that are considered active or operational, but which are judged to no longer be required by the respective Department.
"(2) Information relating to the sources of funding for the applications, software, and information technologies identified pursuant to paragraph (1).
"(3) An identification of the senior official responsible for each such application, software, or information technology.
"(4) A plan to discontinue use and funding for each such application, software, or information technology.
"(c)
"(d)
Governance of Fifth-Generation Wireless Networking in the Department of Defense
Pub. L. 116–283, div. A, title II, §224, Jan. 1, 2021, 134 Stat. 3472, provided that:
"(a)
"(1)
"(2)
"(A) A timeline for the transition of responsibility for 5G wireless networking to the Chief Information Officer, as required under subsection (b)(1).
"(B) A description of the roles and responsibilities of the organizations and elements of the Department of Defense with respect to the acquisition, sustainment, and operation of 5G wireless networking for the Department, as determined by the Secretary of Defense in accordance with subsection (d).
"(3)
"(4)
"(b)
"(1)
"(A) policy, oversight, guidance, research, and coordination on matters relating to 5G wireless networking; and
"(B) making proposals to the Secretary on governance, management, and organizational policy for 5G wireless networking.
"(2)
"(c)
"(1)
"(2)
"(A) to assist the Secretary of Defense in determining the roles and responsibilities of the organizations and elements of the Department of Defense with respect to the acquisition, sustainment, and operation of 5G wireless networking, as required under subsection (d);
"(B) to assist the senior official responsible for 5G wireless networking in carrying out the responsibilities assigned to such official under subsection (b);
"(C) to oversee the implementation of the strategy developed under section 254 of the National Defense Authorization Act for Fiscal Year 2020 (Public Law 116–92; 10 U.S.C. 2223a note [now 10 U.S.C. 2223 note]) for harnessing 5G wireless networking technologies, coordinated across all relevant elements of the Department;
"(D) to advance the adoption of commercially available, next-generation wireless communication technologies, capabilities, security, and applications by the Department and the defense industrial base; and
"(E) to support public-private partnerships between the Department and industry on matters relating to 5G wireless networking;
"(F) to coordinate research and development, implementation and acquisition activities, warfighting concept development, spectrum policy, industrial policy and commercial outreach and partnership relating to 5G wireless networking in the Department, and interagency and international engagement;
"(G) to integrate the Department's 5G wireless networking programs and policies with major initiatives, programs, and policies of the Department relating to secure microelectronics and command and control; and
"(H) to oversee, coordinate, execute, and lead initiatives to advance 5G wireless network technologies and associated applications developed for the Department.
"(3)
"(d)
"(e)
"(1) establishing the cross-functional team under subsection (c); and
"(2) determining the roles and responsibilities of the organizations and elements of the Department of Defense with respect to 5G wireless networking as required under subsection (d).
"(f) 5G
"(g)
"(1)
"(2)
"(A) develop a capability to communicate clearly and authoritatively about threats by foreign adversaries;
"(B) conduct independent red-team security analysis of systems, subsystems, devices, and components of the Department of Defense including no-knowledge testing and testing with limited or full knowledge of expected functionalities;
"(C) verify the integrity of personnel who are tasked with design fabrication, integration, configuration, storage, test, and documentation of noncommercial 5G technology to be used by the Department;
"(D) verify the efficacy of the physical security measures used at Department locations where system design, fabrication, integration, configuration, storage, test, and documentation of 5G technology occurs;
"(E) direct the Chief Information Officer to assess, using existing government evaluation models and schema where applicable, 5G core service providers whose services will be used by the Department through the Department's provisional authorization process; and
"(F) direct the Defense Information Systems Agency and the United States Cyber Command to develop a capability for continuous, independent monitoring of non-commercial, government-transiting packet streams for 5G data on frequencies assigned to the Department to validate the availability, confidentiality, and integrity of the Department's communications systems.
"(3)
"(4)
"(A) a comprehensive assessment of the findings and conclusions of the program under paragraph (1);
"(B) recommendations on how to mitigate vulnerabilities in the telecommunications infrastructure of the Department of Defense; and
"(C) an explanation of how the Department plans to implement such recommendations.
"(h)
"(1)
"(2)
Demonstration Project on Use of Certain Technologies for Fifth-Generation Wireless Networking Services
Pub. L. 116–283, div. A, title II, §225, Jan. 1, 2021, 134 Stat. 3475, provided that:
"(a)
"(b)
"(c)
"(d)
"(1) a disaggregated or virtualized radio access network and core in which components can be provided by different vendors and interoperate through open protocols and interfaces, including those protocols and interfaces utilizing the Open Radio Access Network (commonly known as 'Open RAN' or 'oRAN') approach; and
"(2) one or more massive multiple-input, multiple-output radio arrays, provided by one or more companies based in the United States, that have the potential to compete favorably with radios produced by foreign companies in terms of cost, performance, and efficiency."
Strategy and Implementation Plan for Fifth Generation Information and Communications Technologies
Pub. L. 116–92, div. A, title II, §254, Dec. 20, 2019, 133 Stat. 1287, as amended by Pub. L. 117–263, div. A, title II, §232, Dec. 23, 2022, 136 Stat. 2486, provided that:
"(a)
"(1) a strategy for harnessing fifth generation (commonly known as '5G') information and communications technologies to enhance military capabilities, maintain a technological advantage on the battlefield, and accelerate the deployment of new commercial products and services enabled by 5G networks throughout the Department of Defense; and
"(2) a plan for implementing the strategy developed under paragraph (1).
"(b)
"(1) Adoption and use of secure fourth generation (commonly known as '4G') communications technologies and the transition to advanced and secure 5G communications technologies for military applications and for military infrastructure.
"(2) Science, technology, research, and development efforts to facilitate the advancement and adoption of 5G technology and new uses of 5G systems, subsystems, and components, including—
"(A) 5G testbeds for developing military and dual-use applications; and
"(B) spectrum-sharing technologies and frameworks.
"(3) Strengthening engagement and outreach with industry, academia, international partners, and other departments and agencies of the Federal Government on issues relating to 5G technology and the deployment of such technology, including development of a common industrial base for secure microelectronics.
"(4) Defense industrial base supply chain risk, management, and opportunities.
"(5) Preserving the ability of the Joint Force to achieve objectives in a contested and congested spectrum environment.
"(6) Strengthening the ability of the Joint Force to conduct full spectrum operations that enhance the military advantages of the United States.
"(7) Securing the information technology and weapon systems of the Department against malicious activity.
"(8) Advancing the deployment of secure 5G networks nationwide.
"(9) Such other matters as the Secretary of Defense determines to be relevant.
"(c)
"(1) The Chief Information Officer of the Department of Defense.
"(2) The Under Secretary of Defense for Research and Engineering.
"(3) The Under Secretary of Defense for Acquisition and Sustainment.
"(4) The Under Secretary of Defense for Intelligence [now Under Secretary of Defense for Intelligence and Security].
"(5) Service Acquisition Executives of each military service.
"(d)
"(1)
"(A) is using secure 5G wireless network technology;
"(B) is reshaping the Department's policy for producing and procuring secure microelectronics; and
"(C) is working in the interagency and internationally to develop common policies and approaches.
"(2)
"(A) efforts to ensure a secure supply chain for 5G wireless network equipment and microelectronics;
"(B) the continued availability of electromagnetic spectrum for warfighting needs;
"(C) planned implementation of 5G wireless network infrastructure in warfighting networks, base infrastructure, defense-related manufacturing, and logistics;
"(D) steps taken to work with allied and partner countries to protect critical networks and supply chains; and
"(E) such other topics as the Secretary of Defense considers relevant."
Improved Management of Information Technology and Cyberspace Investments
Pub. L. 116–92, div. A, title VIII, §892, Dec. 20, 2019, 133 Stat. 1539, provided that:
"(a)
"(1)
"(2)
"(b)
Chief Data Officer Responsibility for DoD Data Sets
Pub. L. 116–92, div. A, title IX, §903(b), Dec. 20, 2019, 133 Stat. 1555, as amended by Pub. L. 117–263, div. A, title II, §212(k), Dec. 23, 2022, 136 Stat. 2470, provided that:
"(1)
"(2)
"(3)
Policy Regarding the Transition of Data and Applications to the Cloud
Pub. L. 116–92, div. A, title XVII, §1755, Dec. 20, 2019, 133 Stat. 1854, provided that:
"(a)
"(b)
"(1) making the data of the Department available to support new types of analyses;
"(2) preventing, to the maximum extent practicable, the replication in the cloud of data stores that cannot readily be accessed by applications for which the data stores were not originally engineered;
"(3) ensuring that data sets can be readily discovered and combined with others to enable new insights and capabilities; and
"(4) ensuring that data and applications are readily portable and not tightly coupled to a specific cloud infrastructure or platform."
Activities and Reporting Relating to Department of Defense's Cloud Initiative
Pub. L. 115–232, div. A, title X, §1064, Aug. 13, 2018, 132 Stat. 1971, provided that:
"(a)
"(1) Develop an approach to rapidly acquire advanced commercial network capabilities, including software-defined networking, on-demand bandwidth, and aggregated cloud access gateways, through commercial service providers in order—
"(A) to support the migration of applications and systems to commercial cloud platforms;
"(B) to increase visibility of end-to-end performance to enable and enforce service level agreements for cloud services;
"(C) to ensure efficient and common cloud access;
"(D) to facilitate shifting data and applications from one cloud platform to another;
"(E) to improve cybersecurity; and
"(F) to consolidate networks and achieve efficiencies and improved performance;
"(2) Conduct an analysis of existing workloads that would be migrated to the Joint Enterprise Defense Infrastructure, including—
"(A) identifying all of the cloud initiatives across the Department of Defense, and determining the objectives of such initiatives in connection with the intended scope of the Infrastructure;
"(B) identifying all the systems and applications that the Department would intend to migrate to the Infrastructure;
"(C) conducting rationalization of applications to identify applications and systems that may duplicate the processing of workloads in connection with the Infrastructure; and
"(D) as result of such actions, arriving at dispositions about migration or termination of systems and applications in connection with the Infrastructure.
"(b)
"(1) A description [of] the status of completion of the activities required under subsection (a).
"(2) Information relating to the current composition of the Cloud Executive Steering Group and the stakeholders relating to the Department of Defense's Cloud Initiative and associated mission, objectives, goals, and strategy.
"(3) A description of the characteristics and considerations for accelerating the cloud architecture and services required for a global, resilient, and secure information environment.
"(4) Information relating to acquisition strategies and timeline for efforts associated with the Department of Defense's Cloud Initiative, including the Joint Enterprise Defense Infrastructure.
"(5) A description of how the acquisition strategies referred to in paragraph (4) provides [sic] for a full and open competition, enable the Department of Defense to continuously leverage and acquire new cloud computing capabilities, maintain the ability of the Department to leverage other cloud computing vendor products and services, incorporate elements to maintain security, and provide for the best performance, cost, and schedule to meet the cloud architecture and services requirements of the Department for the duration of such contract.
"(6) A detailed description of existing workloads that will be migrated to enterprise-wide cloud infrastructure or platforms as a result of the Department of Defense's Cloud Initiative, including estimated migration costs and timelines, based on the analysis required under subsection (a)(2).
"(7) A description of the program management and program office of the Department of Defense's Cloud Initiative, including the number of personnel, overhead costs, and organizational structure.
"(8) A description of the effect of the Joint Enterprise Defense Infrastructure on and the relationship of such Infrastructure to existing cloud computing infrastructure, platform, and service contracts across the Department of Defense, specifically the effect and relationship to the private cloud infrastructure of the Department, MilCloud 2.0 run by the Defense Information Systems Agency based on the analysis required under subsection (a)(2).
"(9) Information relating to the most recent Department of Defense Cloud Computing Strategy and description of any initiatives to update such Strategy.
"(10) Information relating to Department of Defense guidance pertaining to cloud computing capability or platform acquisition and standards, and a description of any initiatives to update such guidance.
"(11) Any other matters the Secretary of Defense determines relevant.
"(c)
"(d)
"(1)
"(2)
"(e)
Pilot Program for Open Source Software
Pub. L. 115–91, div. A, title VIII, §875, Dec. 12, 2017, 131 Stat. 1503, provided that:
"(a)
"(b)
"(c)
Pilot Program on Evaluation of Commercial Information Technology
Pub. L. 114–328, div. A, title II, §232, Dec. 23, 2016, 130 Stat. 2061, provided that:
"(a)
"(b)
"(1) Prototyping, experimentation, operational demonstration, military user assessments, and other means of obtaining quantitative and qualitative feedback on the commercial information technology products.
"(2) Engagement with the commercial information technology industry to—
"(A) forecast military requirements and technology needs; and
"(B) support the development of market strategies and program requirements before finalizing acquisition decisions and strategies.
"(3) Assessment of novel or innovative commercial technology for use by the Department of Defense.
"(4) Assessment of novel or innovative contracting mechanisms to speed delivery of capabilities to the Armed Forces.
"(5) Solicitation of operational user input to shape future information technology requirements of the Department of Defense.
"(c)
Additional Requirements Relating to the Software Licenses of the Department of Defense
Pub. L. 113–66, div. A, title IX, §935, Dec. 26, 2013, 127 Stat. 833, provided that:
"(a)
"(1)
"(2)
"(A) include plans for implementing an automated solution capable of reporting the software license compliance position of the Department and providing a verified audit trail, or an audit trail otherwise produced and verified by an independent third party;
"(B) include details on the process and business systems necessary to regularly perform reviews, a procedure for validating and reporting deregistering and registering new software, and a mechanism and plan to relay that information to the appropriate chief information officer; and
"(C) a proposed timeline for implementation of the updated plan in accordance with paragraph (3).
"(3)
"(b)
Collection and Analysis of Network Flow Data
Pub. L. 112–239, div. A, title IX, §935, Jan. 2, 2013, 126 Stat. 1886, provided that:
"(a)
"(1) are potentially scalable to the volume used by Tier 1 Internet Service Providers to collect and analyze the flow data across their networks;
"(2) will substantially reduce the cost and complexity of capturing and analyzing high volumes of flow data; and
"(3) support the capability—
"(A) to detect and identify cyber security threats, networks of compromised computers, and command and control sites used for managing illicit cyber operations and receiving information from compromised computers;
"(B) to track illicit cyber operations for attribution of the source; and
"(C) to provide early warning and attack assessment of offensive cyber operations.
"(b)
Competition for Large-Scale Software Database and Data Analysis Tools
Pub. L. 112–239, div. A, title IX, §936, Jan. 2, 2013, 126 Stat. 1886, provided that:
"(a)
"(1)
"(2)
"(A) an analysis of the technical requirements and needs for large-scale software database and data analysis tools, including prioritization of key technical features needed by the Department of Defense; and
"(B) an assessment of the available sources from Government and commercial sources to meet such needs, including an assessment by the Deputy Assistant Secretary of Defense for Manufacturing and Industrial Base Policy to ensure sufficiency and diversity of potential commercial sources.
"(3)
"(b)
"(1)
"(2)
Software Licenses of the Department of Defense
Pub. L. 112–239, div. A, title IX, §937, Jan. 2, 2013, 126 Stat. 1887, provided that:
"(a)
"(1)
"(2)
"(3)
"(A) An identification and explanation of the software licenses determined by the Chief Information Officer under paragraph (2) to be selected software licenses for purposes of this section, and a summary outline of the software licenses determined not to be selected software licenses for such purposes.
"(B) Means to assess the needs of the Department and the components of the Department for selected software licenses during the two fiscal years following the date of the issuance of the plan.
"(C) Means by which the Department can achieve the greatest possible economies of scale and cost savings in the procurement, use, and optimization of selected software licenses.
"(b)
Ozone Widget Framework
Pub. L. 112–81, div. A, title IX, §924, Dec. 31, 2011, 125 Stat. 1539, provided that:
"(a)
"(b)
"(1) Improvements to the source code and documentation for the Ozone Widget Framework.
"(2) Alternative or compatible implementations of the published application programming interface specifications for the Framework.
"(c)
Continuous Monitoring of Department of Defense Information Systems for Cybersecurity
Pub. L. 111–383, div. A, title IX, §931, Jan. 7, 2011, 124 Stat. 4334, provided that:
"(a)
"(1) The continuous prioritization of the policies, principles, standards, and guidelines developed under section 20 of the National Institute of Standards and Technology Act (15 U.S.C. 278g–3) with agencies and offices operating or exercising control of national security systems (including the National Security Agency) based upon the evolving threat of information security incidents with respect to national security systems, the vulnerability of such systems to such incidents, and the consequences of information security incidents involving such systems.
"(2) The automation of continuous monitoring of the effectiveness of the information security policies, procedures, and practices within the information infrastructure of the Department of Defense, and the compliance of that infrastructure with such policies, procedures, and practices, including automation of—
"(A) management, operational, and technical controls of every information system identified in the inventory required under section 3505(c) of title 44, United States Code; and
"(B) management, operational, and technical controls relied on for evaluations under [former] section 3545 of title 44, United States Code [see now 44 U.S.C. 3555].
"(b)
"(1) The term 'information security incident' means an occurrence that—
"(A) actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information such system processes, stores, or transmits; or
"(B) constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies with respect to an information system.
"(2) The term 'information infrastructure' means the underlying framework, equipment, and software that an information system and related assets rely on to process, transmit, receive, or store information electronically.
"(3) The term 'national security system' has the meaning given that term in [former] section 3542(b)(2) of title 44, United States Code [see now 44 U.S.C. 3552(b)(6)]."
