← Back to all briefings
Cybersecurity 6 min read Published Updated Credibility 91/100

CISA Issues Proposed Rule for CIRCIA Reporting — April 4, 2024

CISA released the CIRCIA proposed rule requiring critical infrastructure to report cyber incidents within 72 hours and ransomware payments within 24 hours. Comments are open.

Verified for technical accuracy — Kodi C.

Cybersecurity pillar illustration for Zeph Tech briefings
Cybersecurity threat, control, and response briefings

On the Cybersecurity and Infrastructure Security Agency (CISA) published its long-awaited notice of proposed rulemaking (NPRM) to implement the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA). The proposal sets out definitions for covered entities, reportable incidents, 72-hour incident reporting deadlines, and 24-hour ransomware payment notifications.

Key NPRM elements

  • Covered entities. Applies to owners and operators in 16 critical infrastructure sectors that meet size or criticality criteria outlined in the proposal.
  • Reportable incidents. Requires reporting of significant cyber incidents that cause serious impacts, including unauthorized access to sensitive systems, disruptions of essential functions, or operational technology degradation.
  • Reporting mechanics. Establishes the CIRCIA Reporting Portal, required data elements, and obligations to preserve records for at least two years.

Control alignment guidance

  • Incident response plans. Update playbooks to incorporate 72-hour reporting triggers, evidence preservation procedures, and coordination with legal counsel.
  • Regulatory mapping. Align CIRCIA obligations with existing TSA, SEC, and sector-specific reporting requirements to avoid conflicting timelines.
  • Vendor management. Ensure managed service providers and incident response partners can support CIRCIA data collection and notification workflows.

Operational recommendations

  • Submit comments by the deadline, addressing definitions and thresholds that affect your sector.
  • Run joint exercises with legal, communications, and technology teams to practice gathering the NPRM’s required data fields within the 72-hour window.
  • Assess logging, forensic readiness, and ransomware response contracts to ensure evidence retention for the mandated two-year period.

Rule Overview

The Cybersecurity and Infrastructure Security Agency (CISA) published a Notice of Proposed Rulemaking (NPRM) on April 4, 2024, implementing the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA). The proposed rule establishes mandatory reporting requirements for covered critical infrastructure entities experiencing significant cyber incidents or making ransomware payments.

CIRCIA represents a significant expansion of federal cyber incident reporting requirements, creating a centralized repository of incident data to inform government response and improve collective defense capabilities. The rule follows extensive stakeholder engagement and reflects input received through requests for information and public listening sessions.

Covered Entities

The proposed rule defines covered entities based on sector-specific criteria across critical infrastructure sectors. Size-based thresholds apply within sectors, generally requiring reporting from entities meeting Small Business Administration size standards or exceeding specified revenue or employee counts. Sector-specific regulations may impose additional requirements on entities already subject to federal oversight.

Covered entities include organizations in communications, energy, financial services, healthcare, information technology, transportation, and other critical infrastructure sectors. The rule provides detailed criteria for determining coverage within each sector, with CISA estimating approximately 316,000 entities would be subject to reporting requirements.

Reporting Requirements

Covered cyber incidents must be reported to CISA within 72 hours of the entity reasonably believing a covered incident has occurred. The definition of covered incident includes incidents causing significant loss of confidentiality, integrity, or availability of information systems, significant harm to safety, or disruption of the entity's ability to provide services.

Ransomware payments require supplemental reporting within 24 hours of payment, regardless of whether the underlying incident meets covered incident thresholds. This shorter timeline reflects the urgency of ransomware-related intelligence and the potential for payment information to inform ongoing investigations and disruption efforts.

Report Contents

Incident reports must include information about the covered entity, a description of the incident including affected systems and functions, dates of incident discovery and duration, indicators of compromise and tactics observed, remediation activities don, and any known attribution information. Reports should be updated as additional information becomes available.

CISA developed a reporting portal to help secure submission of incident information. The portal supports both initial reporting and subsequent updates, with mechanisms for entities to track their submissions and CISA engagement. Reporting formats accommodate varying levels of technical detail based on entity capabilities.

Information Protection

The rule establishes protections for reported information, limiting its use and disclosure consistent with CIRCIA statutory requirements. Reported information is exempt from Freedom of Information Act disclosure, cannot be used in civil enforcement actions against reporting entities, and maintains applicable legal privileges.

These protections address entity concerns about sharing sensitive incident information with the federal government. Clear boundaries on information use support reporting compliance while enabling CISA to aggregate and analyze incident data for defensive purposes.

Compliance and Enforcement

CISA may issue requests for information to entities believed to have experienced covered incidents without reporting. Failure to respond may result in subpoenas, and continued non-compliance may lead to civil penalties and referral to the Attorney General. The enforcement framework balances compliance incentives with recognition of setup challenges.

Wrapping up

The CIRCIA NPRM establishes full federal cyber incident reporting requirements for critical infrastructure. If you are affected, evaluate their coverage status, provide comments during the public comment period, and begin preparing compliance programs for setup upon final rule adoption.

Industry Coordination

If you are affected, engage with sector-specific information sharing and analysis centers (ISACs) and coordinating councils to understand sector interpretations and coordinate setup approaches. Industry associations provide forums for sharing compliance strategies and addressing common challenges. Coordination with legal counsel ensures reporting procedures appropriately balance compliance obligations with legal privilege and liability considerations.

Participation in the public comment process enables teams to influence final rule development, addressing setup concerns and seeking clarification on ambiguous requirements. CISA has showed responsiveness to stakeholder input throughout the rulemaking process, and significant comments may result in beneficial modifications to final requirements.

early compliance preparation positions organizations for successful setup while contributing to collective cybersecurity through systematic incident information sharing with federal authorities.

Documentation of compliance decisions supports regulatory inquiries and shows organizational commitment to cyber resilience objectives.

Early preparation ensures compliance readiness.

Regular monitoring tracks rule finalization.

Stakeholder input shapes final requirements.

Reporting Threshold Considerations

CIRCIA establishes specific reporting thresholds triggering mandatory disclosure obligations. Organizations must assess whether incidents meet threshold criteria including substantial loss of confidentiality, integrity, or availability affecting critical infrastructure operations. Clear internal classification procedures help ensure consistent application of reporting requirements across the organization.

Timing requirements demand rapid internal assessment and escalation procedures. The 72-hour reporting window for cyber incidents leaves limited time for investigation and decision-making. Organizations should establish pre-approved reporting templates and designated contacts to enable timely submissions without compromising ongoing response activities.

Coordination with Existing Requirements

CIRCIA reporting requirements overlay existing sector-specific incident reporting obligations. Organizations in regulated industries must coordinate CIRCIA submissions with sector-specific reporting to avoid duplicative efforts while ensuring thorough regulatory compliance. Documentation of reporting activities supports audit requirements and demonstrates compliance program effectiveness.

Continue in the Cybersecurity pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Coverage intelligence

Published
Coverage pillar
Cybersecurity
Source credibility
91/100 — high confidence
Topics
United States · CIRCIA · Incident reporting · Critical infrastructure
Sources cited
3 sources (cisa.gov, congress.gov, nist.gov)
Reading time
6 min

Cited sources

  1. CISA CIRCIA Notice of Proposed Rulemaking — cisa.gov
  2. Cyber Incident Reporting for Critical Infrastructure Act of 2022 — congress.gov
  3. NIST Cybersecurity Framework 2.0 — nist.gov
  • United States
  • CIRCIA
  • Incident reporting
  • Critical infrastructure
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.