• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us
cybersecurity requirements

Enhanced Cybersecurity Requirements for Federal Contractors

February 5, 2018 Posted by Scott Goodwin Cybersecurity, DFARS, IT Security

The Defense Federal Acquisition Regulation Supplement (DFARS) has been a central focus for contractors working with Covered Defense Information (CDI) on behalf of the United States Department of Defense. This new regulation, which took effect December 31st, 2017, takes the form of a contract clause (DFAR 252.204-7012) and requires that DoD contractors implement the 110 security controls found in the National Institute for Standards and Technology (NIST) Special Publication 800-171 Revision 1.

DFARS Implementation

At a minimum, this implementation requires contractors to perform an assessment of those information systems that store, process, or transmit CDI for compliance with NIST 800-171, and document this implementation in a System Security Plan (SSP). Areas which are found to be non-compliant must be documented in a Plan of Action and Milestones (PoAM) and managed towards remediation. While this regulation has had massive implications for DoD contractors large and small, as of yet, its reach has not extended beyond the defense and aerospace industries.

However, because nation-state sponsored cyber-espionage and other forms of cyber-attack have become a serious threat to all organizations that handle any form of sensitive or valuable information, new regulations have been proposed to protect this information outside of the defense space. Currently, the basic (non-defense) Federal Acquisition Regulation (FAR) incorporates only 15 of the 110 NIST 800-171 requirements. In the meantime, federal organizations are developing their own enhanced cybersecurity standards to get ahead of the potentially forthcoming changes to the FAR clause.

For example, the General Services Administration (GSA), a clearinghouse for federal procurement of goods and plan services, has proposed amendments to the GSA FAR Supplement (GSAR). This new supplement will impose enhanced control requirements on contractors who store, process or transmit unclassified GSA data. While the exact control requirements are still under development, existing federal cybersecurity requirements based on NIST controls are cited. Additionally, GSA has proposed an amendment which would impose breach and incident reporting requirements, similar to what is required under DFARS. These changes would affect nearly all contractors receiving contracts from GSA, and have far-reaching implications.

While the cybersecurity horizon is ever-changing, contractors to the federal government, in any capacity that requires access to federal data or information systems, should expect changes in contract language requiring implementation and documentation of enhanced security controls. Contractors who have a robust security program already in place will be best prepared to effectively navigate these changing regulations. In many cases, documented alignment with an existing industry standard, for example, NIST 800-171, NIST Cybersecurity Framework, or ISO 27001/2, is an excellent starting point for documenting compliance with the newly emerged regulation. Contact OCD Tech today for an assessment of your environment against industry standard security controls, in preparation for these forthcoming changes.

Tags: covered defense informationCYBERcybersecurityNISTnist 800-171SSPSystem Security Plan
Share
1
Scott Goodwin

About Scott Goodwin

Scott manages the Information Security Advisory Services practice within OCD Tech. Prior to joining the firm, he graduated from the University of Massachusetts Boston with a degree in Physics. Scott’s primary engagements include security advisory services, and security assessments against industry standard frameworks including NIST 800-53 and the NIST Cybersecurity Framework, as well as NIST 800-171 assessments for multiple clients in the defense and aerospace sector. Currently, Scott oversees many technical engagements, including vulnerability assessments, and is a lead penetration tester for OCD Tech.  Scott is directly responsible for the identification of three (3) previously unknown vendor software vulnerabilities which have been registered with Mitre’s Common Vulnerabilities and Exposures (CVE) database as CVE-2018-11628, 2019-7004, and 2019-19774.  Scott is also the key developer on the OCD Tech open source discovery platform, Scrapy. The platform identifies public domain information and provides reporting and alerting for OCD Tech clients upon discovery of key sensitive company/personal information.

You also might be interested in

IT GENERAL CONTROLS

IT General Controls

May 16, 2024

With data breaches and cyberattacks on the rise in 2024,[...]

VIRTUAL CISO

Virtual Ciso

Apr 16, 2024

Expertise on Demand  With new threats emerging seemingly every day.[...]

Debunking Cybersecurity Creepy Myths

Debunking Cybersecurity Creepy Myths

Nov 3, 2023

Cybersecurity is a topic that’s gained significant attention over the[...]

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next