PolicyBrief
H.R. 8710
119th CongressMay 7th 2026
National Defense Data Resilience Act
IN COMMITTEE

This bill establishes mandatory data recovery requirements, recovery time objectives, and annual certification reports for the Department of Defense to enhance resilience against cyberattacks.

Suhas Subramanyam
D

Suhas Subramanyam

Representative

VA-10

LEGISLATION

DoD Mandates New Data Recovery Rules: Critical Systems Must Be Back Online Faster After Cyberattacks

Alright, let's talk about something that might sound super technical but actually keeps the lights on, metaphorically speaking, for our national defense. We're diving into the National Defense Data Resilience Act, a bill that's all about making sure the Department of Defense (DoD) can bounce back quickly if a cyberattack tries to knock out its digital systems.

This isn't some abstract IT problem; it's about protecting the data that keeps our military operations running, from logistics to intelligence. The bill basically says, "Hey DoD, get your act together when it comes to recovering from cyberattacks, and do it fast." It's a clear directive for better digital disaster preparedness.

Digital Fort Knox: Classifying Data and Setting Recovery Deadlines

Think of your own digital life: some files are super important (like your tax documents), some are important (family photos), and some are just... there (that old meme collection). This bill makes the DoD do the same thing, but with a much higher stakes. It requires the Secretary of Defense to categorize all DoD data into three buckets: critical data, important data, and necessary data. Critical data, as defined in the bill, is stuff so vital that its loss would "have a debilitating impact on security, national economic security, national public health or safety." So, we're talking about the absolute essentials.

Once that data is sorted, the DoD has to set "recovery time objectives" (RTOs). For critical data, they've got 180 days from the bill's enactment to figure out how fast they can get it back online after a hit. For important and necessary data, they get a bit more breathing room, 270 days. These RTOs aren't set in stone; they have to be updated as new threats emerge, especially from state actors like China. This means less guessing and more hard deadlines for getting crucial systems operational again, which is a big deal if you're relying on those systems for, say, air traffic control or troop movements.

Building Better Digital Defenses

This bill isn't just about setting goals; it's about building the infrastructure to meet them. Within 180 days for critical data (and 270 days for the rest), the DoD must implement specific "data recovery capabilities." Imagine your personal computer getting hit with ransomware. You'd want a backup, right? This bill mandates "immutable backups" for the DoD — essentially, copies of data that can't be changed or deleted by an attacker. These backups also need to be isolated from the main network, like putting your valuables in a separate, locked safe.

Beyond backups, the DoD has to continuously monitor these backup environments for any signs of tampering or malicious activity. And here's the kicker: they have to run annual "recovery exercises" that simulate sophisticated cyberattacks from nation-states. It's like a fire drill, but for digital systems, with independent groups acting as the attackers to truly test the DoD's ability to recover. This means less 'crossing our fingers' and more 'we know exactly how long it takes to fix this' when a real attack happens.

Crucially, the bill (in Section 391c(d)) also states that any technology used for these recovery efforts must be on the DoD's approved list for cybersecurity and data protection. If it's for repairing damaged data, it needs to ensure immutable storage, full audit trails, and continuous monitoring. This keeps the DoD from just buying any old software and ensures they're using robust, vetted tools.

The Long-Term Game Plan and Accountability

Within 90 days of this bill becoming law, the Secretary of Defense has to hand over a full "data recovery strategy" to Congress. This isn't just a wish list; it needs to detail the specific recovery time objectives, the technology needed to hit those goals, the oversight processes, and, of course, how much money it's all going to cost. It's about laying out a clear, actionable plan.

Then, every year, the Secretary has to submit an "auditable recovery certification report" to Congress. This report will confirm whether each DoD element is actually meeting its recovery objectives. Think of it as a yearly report card on how well the DoD is protecting and recovering its most vital digital assets. This adds a layer of accountability that ensures these new requirements aren't just checked off a list, but actually implemented effectively.

In essence, this bill is a major push to harden the DoD's digital infrastructure against increasingly sophisticated cyber threats. It's about ensuring that even if an adversary manages to breach their systems, the impact is minimized, and critical operations can be restored quickly. For anyone concerned about national security in the digital age, this is a pretty straightforward and necessary step.