Texas DIR Cybersecurity Program and Standards
The Texas Department of Information Resources (DIR) administers the state's primary cybersecurity compliance framework, setting binding standards for state agencies, institutions of higher education, and an expanding set of public-sector entities under Texas Government Code Chapter 2054. This page covers the structure, scope, regulatory mechanics, classification boundaries, and operational tensions of the DIR cybersecurity program — functioning as a reference for procurement officers, compliance professionals, agency leadership, and researchers navigating Texas public-sector security requirements.
- Definition and Scope
- Core Mechanics or Structure
- Causal Relationships or Drivers
- Classification Boundaries
- Tradeoffs and Tensions
- Common Misconceptions
- Checklist or Steps
- Reference Table or Matrix
Definition and Scope
The DIR cybersecurity program is the statutory compliance architecture under which Texas state agencies and institutions of higher education manage information security risks. Its legal foundation is Texas Government Code, Chapter 2054, which designates DIR as the lead authority for statewide information technology policy, including security standards. Subchapter N-1, added by House Bill 3834 during the 86th Texas Legislature (2019), expanded DIR's authority specifically to mandate cybersecurity training for all state employees who use a computer in the performance of their duties.
The program's primary instruments are the Texas Cybersecurity Framework (TX-CSF) — aligned to the NIST Cybersecurity Framework (CSF) — and the Texas Cybersecurity Council, which advises DIR on statewide policy. The Statewide Information Security Assessment, conducted biennially, measures aggregate compliance posture across covered entities and is published through DIR's information security portal.
Scope of coverage: The program applies directly to Texas state agencies, state-funded institutions of higher education, and, under 2023 legislative expansions, certain local governments and critical infrastructure operators when they access state systems or participate in DIR-administered programs. It does not directly regulate private businesses (those obligations arise under Texas Business & Commerce Code Chapter 521), healthcare-specific entities under federal HIPAA frameworks, or federally chartered financial institutions governed by OCC or FDIC rules. For the broader statutory and regulatory architecture, the regulatory context for Texas cybersecurity provides a comprehensive treatment. The main site index maps additional reference materials across the full Texas cybersecurity domain.
Core Mechanics or Structure
The DIR cybersecurity program operates through four primary structural mechanisms:
1. Minimum Security Standards. Under Texas Government Code §2054.133, DIR establishes minimum security standards that covered entities must implement. These standards are benchmarked against NIST Special Publication 800-53 (NIST SP 800-53, Rev. 5), which organizes controls into 20 control families including Access Control, Incident Response, and Supply Chain Risk Management. DIR does not wholesale adopt NIST SP 800-53 but maps its state standards to the NIST framework to ensure federal compatibility.
2. Biennial Security Plans and Assessments. Each covered entity must submit a biennial information security plan to DIR, documenting current controls, identified gaps, and remediation timelines. The Statewide Information Security Assessment aggregates these submissions to produce a risk profile for state government as a whole.
3. Mandatory Cybersecurity Training. All state agency employees whose job functions involve computer use must complete DIR-certified cybersecurity training annually. Training providers and course content must meet certification criteria established by DIR under HB 3834 (86th Legislature, 2019). This requirement extends to contractors operating within state agency environments under certain conditions.
4. Incident Reporting and Response Coordination. Covered entities are required to report cybersecurity incidents to DIR within 48 hours of discovery under Texas Government Code §2054.1125. DIR coordinates with the Texas Division of Emergency Management (TDEM) for incidents with potential emergency management implications, and with CISA for incidents touching federal systems or critical infrastructure. The incident reporting and response structure is detailed further at Texas Cybersecurity Incident Response.
5. Procurement and Vendor Standards. DIR administers cooperative contracts (DIR Cooperative Contracts) through which state agencies procure IT products and services. Vendors participating in these contracts must meet security baseline requirements, bringing supply chain security into the DIR compliance structure. See Texas Supply Chain Cybersecurity for extended treatment.
Causal Relationships or Drivers
The current structure of the DIR cybersecurity program reflects a specific sequence of legislative and incident-driven expansions:
The 2019 ransomware attack on 22 Texas local government entities — one of the largest coordinated ransomware events targeting a single U.S. state at that time — directly accelerated legislative activity leading to Senate Bill 64 and associated measures in the 87th Legislature (2021), which expanded DIR's coordination authority and formalized incident response protocols. Texas Ransomware Threats and Response covers this incident class in detail.
Federal alignment creates a secondary driver: CISA's Known Exploited Vulnerabilities (KEV) Catalog and Binding Operational Directives (BODs) apply directly to federal civilian agencies, but their practical effect on state programs is substantial because state agencies that receive federal funding or operate shared infrastructure must demonstrate alignment with federal standards to maintain grant eligibility.
The Texas State Auditor's Office (SAO) generates a third structural pressure through its information security audit program. SAO publishes findings on individual agency compliance with DIR standards, and repeated audit failures create legislative record that historically precedes statutory tightening of DIR authority.
DIR's own threat intelligence function — operating in coordination with CISA and the Multi-State Information Sharing and Analysis Center (MS-ISAC) — feeds observed threat patterns back into standard updates, creating a feedback loop between the Texas cybersecurity threat landscape and the standards themselves.
Classification Boundaries
The DIR program distinguishes covered entities across three primary dimensions:
By Entity Type:
- State agencies — fully subject to all DIR standards, training mandates, and reporting obligations under Chapter 2054.
- Institutions of higher education — subject to DIR standards with limited carve-outs for research environments. The University of Texas System and Texas A&M System each maintain their own security offices but must conform to DIR minimums.
- K–12 public school districts — governed primarily by Texas Education Code §11.175, which requires school boards to adopt cybersecurity policies. DIR standards do not apply directly; see Texas Cybersecurity for School Districts.
- Local governments — not automatically subject to DIR standards unless they access state systems, participate in DIR cooperative contracts, or receive state grants with cybersecurity conditions. See Texas Cybersecurity for Local Governments.
By Data Classification:
DIR standards apply tiered controls based on data sensitivity, distinguishing at minimum between public information, confidential information (as defined under Texas Government Code §552), and categories subject to federal overlay requirements (HIPAA, FERPA, FedRAMP).
By System Criticality:
Systems designated as critical to state operations receive heightened control requirements, including more frequent vulnerability scanning, mandatory penetration testing cycles, and elevated incident reporting thresholds. The Texas Critical Infrastructure Protection framework further subdivides criticality for infrastructure sectors including energy, water, and transportation.
For compliance professionals assessing whether a given entity or system falls under DIR jurisdiction, the Texas Cybersecurity Frameworks and Standards reference page provides a comparative matrix.
Tradeoffs and Tensions
Centralization vs. Agency Autonomy. DIR's authority to set minimum standards creates tension with large agencies — particularly the Health and Human Services Commission and the Texas Department of Transportation, each of which operates complex, heterogeneous IT environments — that argue their operational requirements exceed what a uniform statewide standard accommodates. DIR addresses this through risk acceptance processes, but the asymmetry between DIR's standards-setting role and agencies' operational realities remains structurally unresolved.
Compliance Reporting vs. Security Outcomes. The biennial assessment model measures documented compliance posture. Agencies that invest in documentation infrastructure can demonstrate compliance without achieving equivalent operational security maturity. SAO audits have surfaced this gap — finding, in multiple agency-specific reports, that documented plans did not reflect actual implemented controls. For an extended treatment of audit and assessment dynamics, see Texas Cybersecurity Audits and Assessments.
Speed of Threat Evolution vs. Regulatory Update Cycles. DIR standards update on cycles measured in years; threat actors operate on cycles measured in days. The 48-hour incident reporting requirement reflects an attempt to compensate through operational responsiveness, but the underlying control standards can lag material threat shifts by 18 to 36 months.
Federal Overlay Complexity. CISA directives, FedRAMP requirements, and sector-specific federal standards (NERC CIP for electric utilities, for example) create compliance stacks that exceed DIR's authority to harmonize. Agencies operating under multiple frameworks must manage reconciliation independently, a burden that falls disproportionately on smaller agencies with limited security staff. The Texas Public Sector Cyber Risk Management framework addresses this multi-standard environment.
Common Misconceptions
Misconception: DIR standards apply to all Texas businesses.
Correction: DIR authority under Chapter 2054 applies to state agencies and institutions of higher education. Private-sector businesses in Texas are governed by Texas Business & Commerce Code Chapter 521 and applicable federal frameworks, not by DIR standards. Confusion arises because DIR administers cooperative contracts used by both public and private entities in some procurement contexts.
Misconception: Completing annual cybersecurity training satisfies all DIR compliance obligations.
Correction: Mandatory training under HB 3834 is one component of a multi-element compliance structure. Covered entities must also maintain current security plans, meet minimum technical controls, conduct risk assessments, and report incidents within required timeframes. Training completion does not substitute for technical or administrative controls.
Misconception: The Texas Cybersecurity Framework is identical to NIST CSF.
Correction: The TX-CSF is aligned to NIST CSF 1.1/2.0 but incorporates Texas-specific requirements and maps to state statutory obligations that have no direct NIST counterpart. An entity certified or compliant under NIST CSF is not automatically compliant with DIR standards.
Misconception: A 48-hour incident report to DIR satisfies all notification obligations.
Correction: DIR notification satisfies the state agency reporting requirement under §2054.1125. It does not substitute for breach notifications to affected individuals under Texas B&C Code §521.053, federal breach reporting under HIPAA (if applicable), or CISA reporting under federal requirements. See Reporting Cyber Incidents in Texas for the full notification matrix.
Misconception: Local governments are automatically covered by the DIR program.
Correction: Local governments in Texas are not automatically subject to DIR standards. Coverage depends on specific contractual, grant, or statutory relationships with state systems. Many Texas municipalities develop independent security policies, sometimes voluntarily aligned to DIR standards, but without a legal mandate to comply absent a triggering relationship.
Checklist or Steps
The following sequence describes the compliance cycle structure for covered entities under the DIR program. This is a structural reference, not advisory guidance.
DIR Compliance Cycle — Covered Entity Process
-
Confirm Entity Classification — Determine whether the entity qualifies as a state agency or institution of higher education under Texas Government Code Chapter 2054 definitions.
-
Assign Information Security Officer (ISO) — Designate an ISO as required under §2054.136. Document ISO credentials and reporting structure.
-
Conduct Risk Assessment — Perform a risk assessment aligned to DIR standards and NIST SP 800-30 (NIST SP 800-30, Rev. 1), identifying assets, threats, vulnerabilities, and risk ratings.
-
Develop or Update Security Plan — Draft the biennial information security plan incorporating risk assessment results, current control inventory, gap analysis, and remediation milestones.
-
Implement Minimum Security Controls — Map implemented controls to DIR minimum security standards, identifying any controls requiring risk acceptance documentation.
-
Enroll Employees in DIR-Certified Training — Verify all computer-using employees are enrolled in and complete DIR-certified annual cybersecurity training. Maintain completion records.
-
Submit Security Plan to DIR — File the biennial security plan through the DIR submission portal on the required schedule.
-
Establish Incident Response Procedures — Document incident detection, classification, internal escalation, and 48-hour DIR notification procedures in alignment with Texas Government Code §2054.1125.
-
Conduct Ongoing Monitoring — Implement continuous monitoring mechanisms consistent with DIR standards; participate in DIR/CISA vulnerability scanning programs where available.
-
Prepare for SAO Audit Cycle — Maintain documentation supporting compliance assertions; address prior SAO findings before audit recurrence.
Reference Table or Matrix
DIR Cybersecurity Program — Key Instruments and Coverage
| Instrument | Statutory Authority | Applies To | Frequency | Administering Body |
|---|---|---|---|---|
| Texas Cybersecurity Framework (TX-CSF) | Tex. Gov't Code §2054.133 | State agencies, higher ed | Ongoing | DIR |
| Biennial Information Security Plan | Tex. Gov't Code §2054.135 | State agencies, higher ed | Every 2 years | DIR |
| Annual Cybersecurity Training Mandate | Tex. Gov't Code §2054.519 (HB 3834, 2019) | All state agency employees using computers | Annual | DIR (certified providers) |
| 48-Hour Incident Reporting | Tex. Gov't Code §2054.1125 | State agencies | Per incident | DIR / TDEM |
| Statewide Information Security Assessment | Tex. Gov't Code §2054.138 | All covered entities | Biennial | DIR |
| Information Security Audit | Tex. Gov't Code §321.0136 | State agencies | Per SAO schedule | Texas State Auditor's Office |
| Breach Notification Obligation | Tex. B&C Code §521.053 | Private entities, state entities holding personal info | Within 60 days of discovery | Texas OAG |
| CISA Known Exploited Vulnerabilities Catalog | Federal (DHS/CISA authority) | Federal agencies (advisory to state) | Continuous updates | CISA |
For workforce and certification standards applicable to cybersecurity professionals operating within the DIR program environment, see Texas Cybersecurity Certifications and Licensing. For the intersection of DIR requirements and cloud platform use, see Texas Cloud Security Considerations.
References
- Texas Department of Information Resources (DIR) — Information Security
- Texas Government Code, Chapter 2054 — Texas Legislature Online
- Texas Business & Commerce Code, Chapter 521 — Texas Legislature Online
- NIST Cybersecurity Framework (CSF)
- NIST SP 800-53, Rev. 5 — Security and Privacy Controls
- NIST SP 800-30, Rev. 1 — Guide for Conducting Risk Assessments
- CISA — Cybersecurity and Infrastructure Security Agency
- CISA Known Exploited Vulnerabilities Catalog
- Texas State Auditor's Office (SAO) — Information Security Audits
- [