888.678.7282    Get SUPPORT

Strata Information Technology Blog

DoD Supply Chain – THE DEADLINE DELAY IS OVER FOR CYBERSECURITY PREPAREDNESS

Sharing this great blog article by Brian Berger – Executive Vice President of Cytellix Cybersecurity The deadline for the supply chain to meet compliance with NIST SP 800-171 under Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was December 31, 2017. As we are all aware, the enforcement and teeth of this deadline was deferred until NOW. By the end of August 2018, all contractors who have been awarded contracts to provide products or services which requires the use of Controlled Unclassified Information (CUI), will be put on notice that enforcement will begin with the new government fiscal year starting October 1, 2018. The obligation of proof is placed upon the supplier, their suppliers and their suppliers.

What does this mean for the supply chain under these contracts? Audits will begin on October 1, 2018 for proof of compliance. The two forms of remedies for failing the audits include a Corrective Action Reports (CAR) and/or loss of contract. The end of the “grace period” has come to an end as well as the request for waivers.

What will occur in the audit is not merely a documentation exercise. Many consultants provided support that includes preparing documentation and policies; however, they have not done what is necessary to fulfil the Cyber requirements under these contracts. The obligation and requirements to be compliant is not a paperwork exercise. The complete cybersecurity assessment is an aggregation of technology, networking, security, situational awareness, vulnerability awareness, policies, procedures, and the cyber event reporting obligation.

As mentioned above, the cyber-compliance requirements must be backed up by proof. Proof is defined differently by different people, but, in the end, the burden is on the suppliers to have knowledge, evidence, and awareness of all the cyber controls, implementation, vulnerabilities, real-time cyber events and processes around each control, vs a checklist.

Below are the minimum requirements:

  1. Self-Attestation of the contract obligations for compliance – Attesting to compliance
  2. System Security Plan with the following provable elements (updated periodically)
    • System Boundaries – Identify the network map, connections and segmentations initially and through the life of the contract
    • System Environments of Operations - Operating Environment where CUI is stored.
    • How are the security requirements implemented – Both policy, actual evidence and proof of the security requirements are active in real-time.
    • Relationships with or connections to other systems – Real-time situational awareness of connections and system profile information.
  3. Plan of Action & Milestones – the detailed plan of cyber gaps and remediations necessary and updated to show continuous improvements.
  4. Incident Response Plan – An approved process defined by the DoD for reporting incidents within 72-hours of the event. The 72-hour time limit is Not negotiable.
  5. Be prepared to prove your cyber resiliency with implemented “adequate” cybersecurity controls, cyber event monitoring and processes. If you cannot, your business is at risk from cyber criminals and loss of federal contracts.

The time is now to act, and both prepare for compliance and become cyber prepared. The reality is your company is listed in multiple data base directories that you potentially hold CUI – you are a high risk of being attacked. When you are attacked the nation’s, security is at risk. Become cyber prepared and protect the nation, your business and your employees.

www.cytellix.com, #cytellix

Intro to Your Tech: Authentication
Which Hosted Solution Are You Depending On?

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Internet Network Security Cybersecurity Malware Tech Term Hackers Communications Ransomware Backup Outsourced IT VoIP Software Business Management Smartphones Microsoft Passwords IT Support Productivity Alert User Tips Social Media Business Windows 10 Efficiency Communication Browser Users Network Google Data Backup Hardware Save Money Hosted Solutions Email Data Small Business Data Recovery Productivity Cloud Computing Phishing Android Miscellaneous Saving Money App Bandwidth Twitter Internet of Things Apps Microsoft Office Mobile Device Smartphone Data Breach Vulnerability IT Services Office 365 Innovation Collaboration Settings Employer-Employee Relationship Remote Monitoring Scam Excel Company Culture Cybercrime Networking Politics Access Control Government Mobile Device Management Wi-Fi Computer Compliance Business Continuity BDR Applications Workplace Tips Law Enforcement Blockchain Patch Management Workers Website Computers Office Education Personal Information BYOD Vendor Management Automation Managed IT Service Chrome SaaS Spam Dark Web Managing Stress Wireless Virus Information Windows Word Virtual Assistant Connectivity How To Entertainment Facebook Recovery Marketing Antivirus Maintenance Password Retail Holiday Plug-In Telephone Systems Data Protection Encryption Computer Care VoIPMyths Files Battery Data Management Backup and Disaster Recovery Cables Hard Drive Paperless Office Tactics Microsoft Office 365 Gmail Automobile Websites Microsoft Teams Net Neutrality CrashOverride Remote Support e-waste Disaster Recovery Medical IT Knowledge Artificial Intelligence Trends Profitability WhatsApp Wireless Charging Synergy Proactive IT Remote Control IT budget PowerPoint Gaming Console VoIPSavings Yahoo SSD Voice over Internet Protocol Processors Digital Internet Explorer Analytics Authentication disposal GDPR Comparison Hard Drives A.I. Scalability Phone System Eliminating Downtime Lead Generation Mobile Devices Remote Monitoring and Management IT Management Sports Video Games Google Maps Update Emergency Telephony DDoS Inventory Apple Edge Threat IaaS Two-factor Authentication Authorization Dongle Worker Spyware Value Television Information Technology Storage Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards Wireless Internet News Dark Data Smart Technology Email Management Tech Terms Staffing Technology Efficiently Licensing Voice over IP Amazon iPhone HaaS Printer Server Tech Support Cortana Bring Your Own Device Printer Unified Threat Management HP Biometrics Error Data loss Gadget Safety Help Desk Telephone System WannaCry Business Intelligence The Internet of Things Regulation Sales Managed Service Provider Cost Management Streaming Media Outlook Travel WiFi Managed IT Cleaning Printers Gadgets Budget Troubleshooting Physical Security Technology Tips Hybrid Cloud Botnet VPN Document Management Database Leadership Access Touchscreen Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut HIPAA Reporting Tablet Downloads Managed Service Live Streaming Fun Ink Millennials Customer Service Upgrade Google Drive Mobile Office Domains File Sharing IT Support Hosted Solution Autocorrect User Tip Virtualization Machine Learning Copy Public Speaking Spam Blocking User Security Search Scheduling Tip of the week Server G Suite Windows 10 Presentation Emoji Telecommute VoIP Lithium-ion battery Paste Augmented Reality Business Technology Instagram Mobile Security Money Laptop Printing Quick Tips Remote Computing Samsung Wireless Technology 5G IBM Conferencing Unified Communications Network Attached Storage Managed IT Services Hacker eCommerce Operating System Paper Telecommuting Customer Relationship Management Competition Environment Big Data Server Management IP Address Online Shopping

Newsletter Sign Up