Editor
OCD Tech
Category
CMMC
Date
April 26, 2025

The Defense Federal Acquisition Regulation Supplement (DFARS) has been a central focus for contractors working with Covered Defense Information (CDI) on behalf of the United States Department of Defense. This new regulation, which took effect December 31st, 2017, takes the form of a contract clause (DFAR 252.204-7012) and requires that DoD contractors implement the 110 security controls found in the National Institute for Standards and Technology (NIST) Special Publication 800-171 Revision 1.

DFARS Implementation

At a minimum, this implementation requires contractors to perform an assessment of those information systems that store, process, or transmit CDI for compliance with NIST 800-171, and document this implementation in a System Security Plan (SSP). Areas which are found to be non-compliant must be documented in a Plan of Action and Milestones (PoAM) and managed towards remediation. While this regulation has had massive implications for DoD contractors large and small, as of yet, its reach has not extended beyond the defense and aerospace industries.However, because nation-state sponsored cyber-espionage and other forms of cyber-attack have become a serious threat to all organizations that handle any form of sensitive or valuable information, new regulations have been proposed to protect this information outside of the defense space. Currently, the basic (non-defense) Federal Acquisition Regulation (FAR) incorporates only 15 of the 110 NIST 800-171 requirements. In the meantime, federal organizations are developing their own enhanced cybersecurity standards to get ahead of the potentially forthcoming changes to the FAR clause.For example, the General Services Administration (GSA), a clearinghouse for federal procurement of goods and plan services, has proposed amendments to the GSA FAR Supplement (GSAR). This new supplement will impose enhanced control requirements on contractors who store, process or transmit unclassified GSA data. While the exact control requirements are still under development, existing federal cybersecurity requirements based on NIST controls are cited. Additionally, GSA has proposed an amendment which would impose breach and incident reporting requirements, similar to what is required under DFARS. These changes would affect nearly all contractors receiving contracts from GSA, and have far-reaching implications.While the cybersecurity horizon is ever-changing, contractors to the federal government, in any capacity that requires access to federal data or information systems, should expect changes in contract language requiring implementation and documentation of enhanced security controls. Contractors who have a robust security program already in place will be best prepared to effectively navigate these changing regulations. In many cases, documented alignment with an existing industry standard, for example, NIST 800-171, NIST Cybersecurity Framework, or ISO 27001/2, is an excellent starting point for documenting compliance with the newly emerged regulation. Contact OCD Tech today for an assessment of your environment against industry standard security controls, in preparation for these forthcoming changes.

Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

OCD Tech

25 BHOP, Suite 407, Braintree MA, 02184

844-623-8324

https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
SOC 2 ® Readiness Assessment
SOC 2 ®
SOC 3 ®
SOC for Cybersecurity ®
IT Advisory Services
IT Vulnerability Assessment
Penetration Testing
Privileged Access Management
Social Engineering
WISP
General IT Controls Review
IT Government Compliance Services
CMMC
DFARS Compliance
FTC Safeguards vCISO

Industries

Financial Services
Government
Enterprise
Auto Dealerships

Enhanced Cybersecurity Requirements for Federal Contractors

By  
OCD Tech
February 5, 2018
4
min read
Share this post

The Defense Federal Acquisition Regulation Supplement (DFARS) has been a central focus for contractors working with Covered Defense Information (CDI) on behalf of the United States Department of Defense. This new regulation, which took effect December 31st, 2017, takes the form of a contract clause (DFAR 252.204-7012) and requires that DoD contractors implement the 110 security controls found in the National Institute for Standards and Technology (NIST) Special Publication 800-171 Revision 1.

DFARS Implementation

At a minimum, this implementation requires contractors to perform an assessment of those information systems that store, process, or transmit CDI for compliance with NIST 800-171, and document this implementation in a System Security Plan (SSP). Areas which are found to be non-compliant must be documented in a Plan of Action and Milestones (PoAM) and managed towards remediation. While this regulation has had massive implications for DoD contractors large and small, as of yet, its reach has not extended beyond the defense and aerospace industries.However, because nation-state sponsored cyber-espionage and other forms of cyber-attack have become a serious threat to all organizations that handle any form of sensitive or valuable information, new regulations have been proposed to protect this information outside of the defense space. Currently, the basic (non-defense) Federal Acquisition Regulation (FAR) incorporates only 15 of the 110 NIST 800-171 requirements. In the meantime, federal organizations are developing their own enhanced cybersecurity standards to get ahead of the potentially forthcoming changes to the FAR clause.For example, the General Services Administration (GSA), a clearinghouse for federal procurement of goods and plan services, has proposed amendments to the GSA FAR Supplement (GSAR). This new supplement will impose enhanced control requirements on contractors who store, process or transmit unclassified GSA data. While the exact control requirements are still under development, existing federal cybersecurity requirements based on NIST controls are cited. Additionally, GSA has proposed an amendment which would impose breach and incident reporting requirements, similar to what is required under DFARS. These changes would affect nearly all contractors receiving contracts from GSA, and have far-reaching implications.While the cybersecurity horizon is ever-changing, contractors to the federal government, in any capacity that requires access to federal data or information systems, should expect changes in contract language requiring implementation and documentation of enhanced security controls. Contractors who have a robust security program already in place will be best prepared to effectively navigate these changing regulations. In many cases, documented alignment with an existing industry standard, for example, NIST 800-171, NIST Cybersecurity Framework, or ISO 27001/2, is an excellent starting point for documenting compliance with the newly emerged regulation. Contact OCD Tech today for an assessment of your environment against industry standard security controls, in preparation for these forthcoming changes.

Share this post
OCD Tech