Introduction to the Federal Defense Acquisition Regulation

Slides:



Advertisements
Similar presentations
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Advertisements

Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
© Carnegie Mellon University The CERT Insider Threat Center.
Security Controls – What Works
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Information Systems Security Officer
Computer Security: Principles and Practice
Computer Security Fundamentals
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Session 3 – Information Security Policies
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
SEC835 Database and Web application security Information Security Architecture.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
DFARS & What is Unclassified Controlled Technical Information (UCTI)?
HIPAA PRIVACY AND SECURITY AWARENESS.
Information Systems Security Computer System Life Cycle Security.
HIPAA COMPLIANCE WITH DELL
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Risk in New Computing Paradigms Applying FISMA Standards and Guidelines to Cloud Computing Workshop.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Engineering Essential Characteristics Security Engineering Process Overview.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
HIPAA Security A Quantitative and Qualitative Risk Assessment Rosemary B. Abell Director, National Healthcare Vertical Keane, Inc. HIPAA Summit VII September.
Privacy Act United States Army (Managerial Training)
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
HIPAA: So You Think You’re Compliant September 1, 2011 Carolyn Heyman-Layne, J.D.
Information Security Management Goes Global
Information ITIL Technology Infrastructure Library ITIL.
TGIC Cyber-Security for Government Contractor Information Systems
Special Publication Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Patricia Toth NIST MEP.
Safeguarding CDI - compliance with DFARS
BruinTech Vendor Meet & Greet December 3, 2015
Got DoD Contracts in Your Supply Chain
Presenter: Mohammed Jalaluddin
WSU IT Risk Assessment Process
Safeguarding Covered Defense Information
INDULGENCE There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
Security Standard: “reasonable security”
Risk Management and Compliance
Special Publication Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Dr. Ron Ross Computer Security.
Safeguarding Covered Defense Information
IS4550 Security Policies and Implementation
Supplier Information Session Safeguarding Covered Defense Information and Cyber Incident Reporting, DFARS August 16, 2016 Christian Ortego.
UConn NIST Compliance Project
DFARS Cybersecurity Requirements
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
How to Mitigate the Consequences What are the Countermeasures?
Cyber security Policy development and implementation
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
Cybersecurity ATD technical
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
IT Management Services Infrastructure Services
Presentation transcript:

Introduction to the Federal Defense Acquisition Regulation 252.204 - Clause 7012 “Safeguarding Covered Defense Information and Cyber Incident Reporting” Contractor Compliance Required by December 2017

Who Does the 7012 Clause Apply to? Government Defense Contractors Educational Research Government Data Repositories Any entity who handles or accesses USG Unclassified Uncontrolled Technical Information Services “Adequate security” means protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to, or modification of information.

What is the Purpose of the 7012 Clause? DFARS clause 252.204-7012 was structured to ensure that unclassified DoD information residing on a contractor’s internal information system is safeguarded from cyber incidents, and that any consequences associated with the loss of this information are assessed and minimized via the cyber incident reporting and damage assessment processes. In addition, by providing a single DoD-wide approach to safeguarding covered contractor information systems, the clause prevents the proliferation of cyber security clauses and contract language by the various entities across DoD. Examine your Existing Contracts to Determine Compliance Requirements

What Needs To Be Done? Assess your Information Systems Perform Risk Analysis /Define Priorities Define the Necessary Resources Create a Plan that fits your Budget Create Policies , Directives and Agreements Create Processes and Procedures Remediate and Mitigate Document Baselines Socialize the New Infrastructure Train Employees, Management and Partners Readdress Compliance Frequently ASSESS PLAN IMPLEMENT SUSTAIN

DFAR 7012 is Specific to Acquisition Does not supersede other Contractual Requirements Does not replace other Responsibilities Designed to Reduce the Risk of Unintentional or intention Exploitation or Spillage May be covered as part of the Contractor Information Infrastructure Supported by many other Department of Defense Directives and Instructions

What is considered “Technical Information” “Technical information” means technical data or computer software, as those terms are defined in the by the NIST Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. Which describes Technical Data, Noncommercial Items, regardless of whether or not the clause is incorporated in this solicitation or contract. Examples of technical information include research and engineering data, engineering drawings, and associated lists, specifications, standards, process sheets, manuals, technical reports, technical orders, catalog-item identifications, data sets, studies and analyses and related information, and computer software executable code and source code.

Overview of the 7012 Control Set DFAR Clause 7012 is supported by NIST SP 800-171 “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations” Access Control - Supports how users are Provisioned, Controlled, Monitored and Managed Awareness and Training - Supports the continued Security Training of all Contractor Personnel Audit and Accountability - Supports the functions of real time audit of the information environment - Also restricts the Audit Function from Administrators and Users Configuration Management - Supports requirements for diligent Configuration Management of all aspects of the Information Environment - Applies to Systems, Networks, Documentation, User Provisioning Contingency Planning - Supports the requirements for adequate Contingency Planning – (Includes DRPS and SOPs) CLICK HERE FOR EXPANDED GUIDANCE

Overview of the 7012 Control Set (Cont.) Identification and Authentication - Supports the requirements for processes, procedures and methods of identification and Authentication of Users Incident Response - Supports the requirements for timely and accurate Incident Response - Scopes who and what needs to happen in situations considered “Cyber Security Incidents” Maintenance - Defines who, how and when maintenance is provided to existing information infrastructure - Applies to Systems, Networks, Documentation, User Provisioning Media Protection - Supports requirements for protecting media through Encryption and “Best Practice” Supported by other documentation i.e.. Data Classification Guides, DoD Instructions etc... Personnel Security - Supports the requirement for Personnel to be scanned, qualified and trained to handle data CLICK HERE FOR EXPANDED GUIDANCE

Overview of the 7012 Control Set (Cont.) Physical Protection - Supports the requirement for data access to be limited and controlled in regard to equipment, access and reporting. Risk Assessment - Supports the requirement for Vulnerability Compliance, Patch Management, Scanning, and Reporting Security Assessment - Supports the periodic assessment of the security controls in organizational information systems to determine if the controls are effective in their application. Development of plans and processes which support the ongoing security posture of the information system System and Communication Protection - Supports the Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. Also includes the architectural design and change management of information systems. Systems and Information Integrity - Identify, report, and correct information and information system flaws in a timely manner. In addition to providing protection from malicious code and monitoring for system state changes CLICK HERE FOR EXPANDED GUIDANCE

Remediate Non compliant Findings How to Respond to the 7012 Requirements Assess and document your company Information Management Systems against the applicable Security Controls Remediate Non compliant Findings and create a Plan of Action and Milestones to address on-going requirements Remember to address, Basic, Derived and Aggregate Security Requirements defined in NIST SP 800-171 er Constantly Test and Re-evaluate your Compliance Posture

“Outsourcing” DFAR 7012 Requirements Outsourcing may be an alternative for some or all the controls Important Factors when considering Outsourcing You will remain the Liable Entity Lack of Control – Audit Limitations Reduced Access to time sensitive information Available Partnerships Amazon Web Services - https://aws.amazon.com/ – Currently Accredited to a Moderate by the US Department of Health Other Technical Service Providers – May support some but not all of the controls

Ramifications of 7012 Noncompliance Contract Cancellation or Suspension Penalties and Fines Restricted access to Contract Resources Data Breaches for which the Contractor is Liable

Need more information and assistance obtaining 7012 compliance? Contact Peregrine Technical Solutions LLC www.gbpts.com Phone - (757) 234-6664 Email - larmistead@gbpts.com