888.678.7282    Get SUPPORT

Strata Information Technology Blog

DoD Supply Chain – THE DEADLINE DELAY IS OVER FOR CYBERSECURITY PREPAREDNESS

Sharing this great blog article by Brian Berger – Executive Vice President of Cytellix Cybersecurity The deadline for the supply chain to meet compliance with NIST SP 800-171 under Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was December 31, 2017. As we are all aware, the enforcement and teeth of this deadline was deferred until NOW. By the end of August 2018, all contractors who have been awarded contracts to provide products or services which requires the use of Controlled Unclassified Information (CUI), will be put on notice that enforcement will begin with the new government fiscal year starting October 1, 2018. The obligation of proof is placed upon the supplier, their suppliers and their suppliers.

What does this mean for the supply chain under these contracts? Audits will begin on October 1, 2018 for proof of compliance. The two forms of remedies for failing the audits include a Corrective Action Reports (CAR) and/or loss of contract. The end of the “grace period” has come to an end as well as the request for waivers.

What will occur in the audit is not merely a documentation exercise. Many consultants provided support that includes preparing documentation and policies; however, they have not done what is necessary to fulfil the Cyber requirements under these contracts. The obligation and requirements to be compliant is not a paperwork exercise. The complete cybersecurity assessment is an aggregation of technology, networking, security, situational awareness, vulnerability awareness, policies, procedures, and the cyber event reporting obligation.

As mentioned above, the cyber-compliance requirements must be backed up by proof. Proof is defined differently by different people, but, in the end, the burden is on the suppliers to have knowledge, evidence, and awareness of all the cyber controls, implementation, vulnerabilities, real-time cyber events and processes around each control, vs a checklist.

Below are the minimum requirements:

  1. Self-Attestation of the contract obligations for compliance – Attesting to compliance
  2. System Security Plan with the following provable elements (updated periodically)
    • System Boundaries – Identify the network map, connections and segmentations initially and through the life of the contract
    • System Environments of Operations - Operating Environment where CUI is stored.
    • How are the security requirements implemented – Both policy, actual evidence and proof of the security requirements are active in real-time.
    • Relationships with or connections to other systems – Real-time situational awareness of connections and system profile information.
  3. Plan of Action & Milestones – the detailed plan of cyber gaps and remediations necessary and updated to show continuous improvements.
  4. Incident Response Plan – An approved process defined by the DoD for reporting incidents within 72-hours of the event. The 72-hour time limit is Not negotiable.
  5. Be prepared to prove your cyber resiliency with implemented “adequate” cybersecurity controls, cyber event monitoring and processes. If you cannot, your business is at risk from cyber criminals and loss of federal contracts.

The time is now to act, and both prepare for compliance and become cyber prepared. The reality is your company is listed in multiple data base directories that you potentially hold CUI – you are a high risk of being attacked. When you are attacked the nation’s, security is at risk. Become cyber prepared and protect the nation, your business and your employees.

www.cytellix.com, #cytellix

Intro to Your Tech: Authentication
Which Hosted Solution Are You Depending On?

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Cybersecurity Malware Hackers Communications Ransomware Backup Internet Tech Term Smartphones Outsourced IT VoIP Network Security Passwords Productivity Software Alert Business Management Social Media IT Support Google Business Hardware Save Money Microsoft Hosted Solutions Data Phishing Android User Tips Network App Bandwidth Data Backup Windows 10 Twitter Email Communication Small Business Data Recovery Cloud Computing Microsoft Office Smartphone Browser Data Breach Vulnerability IT Services Office 365 Innovation Collaboration Settings Employer-Employee Relationship Miscellaneous Remote Monitoring Scam Excel Saving Money Company Culture Cybercrime Politics Access Control Government Mobile Device Management Internet of Things Efficiency Computer Compliance Business Continuity BDR Apps Productivity Law Enforcement Blockchain Mobile Device Patch Management Workers Website Computers Users Office Education Personal Information Vendor Management Automation Managed IT Service Chrome SaaS Spam Dark Web Networking Managing Stress Virus Windows Word Wi-Fi Virtual Assistant How To Applications Entertainment Facebook Recovery Antivirus Maintenance Password Retail Holiday Plug-In Telephone Systems Data Protection Encryption Computer Care Files Battery Data Management Backup and Disaster Recovery Cables Remote Support Hard Drive Paperless Office Tactics BYOD Microsoft Office 365 Gmail Automobile Websites Microsoft Teams Net Neutrality CrashOverride e-waste Disaster Recovery Medical IT Knowledge Artificial Intelligence Trends WhatsApp Wireless Charging Synergy Proactive IT Remote Control IT budget PowerPoint Gaming Console Yahoo SSD Voice over Internet Protocol Processors Digital Internet Explorer Analytics Authentication Wireless disposal GDPR Comparison Hard Drives A.I. Scalability Phone System Lead Generation Mobile Devices Remote Monitoring and Management IT Management Sports Video Games Google Maps Emergency Telephony DDoS Inventory Information Apple Edge Threat IaaS Two-factor Authentication Authorization Dongle Worker Spyware Value Television Information Technology Storage Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards News Dark Data Amazon Smart Technology Email Management Tech Terms Connectivity Staffing Licensing Voice over IP iPhone HaaS Printer Server Tech Support Cortana Bring Your Own Device Printer Unified Threat Management HP Biometrics Error Data loss Gadget Safety Telephone System WannaCry Workplace Tips Business Intelligence The Internet of Things Regulation Sales Managed Service Provider Cost Management Streaming Media Marketing Travel WiFi Managed IT Cleaning Printers Gadgets Budget Physical Security Technology Tips Hybrid Cloud HIPAA Botnet VPN Document Management Database Leadership Access Touchscreen Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut Reporting Tablet Downloads Live Streaming Fun Ink Millennials Customer Service Upgrade Google Drive Mobile Office Hosted Solution Domains File Sharing IT Support Autocorrect User Tip Virtualization Machine Learning Copy Public Speaking Spam Blocking User Security Search Scheduling Tip of the week Server G Suite Windows 10 Presentation Emoji Telecommute VoIP Lithium-ion battery Paste Augmented Reality Business Technology Instagram Mobile Security Money Laptop Printing Quick Tips Remote Computing Samsung Wireless Technology 5G IBM Conferencing Unified Communications Operating System Network Attached Storage Managed IT Services Hacker eCommerce Paper Telecommuting Customer Relationship Management Competition Environment Big Data Server Management IP Address Online Shopping

Newsletter Sign Up