SlideShare a Scribd company logo
1 of 28
Download to read offline
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Cybersecurity Compliance &
Enforcement for Federal Contractors
Friday, September 30, 2022
12pm EST
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
About Jschaus & Associates:
Ø Washington DC based
Ø Consulting firm working with established Federal Contractors;
Ø Webinars, Events, Conferences;
Ø Newsletter – reaching 23K Federal Contractors;
Ø 500+ Webinars on YouTube;
Ø Advertising & Sponsor Opportunities
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
About Arnold & Porter:
Ø Top-ranked Government Contracts practice
Ø Represent the entire spectrum of domestic and international government
contractors: start-ups, Fortune 100 companies, and non-profits
Ø Help address the increasingly complex cyber issues confronting
commercial businesses, government contractors, and the special concerns
associated with work for DoD and intelligence agencies
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
MEET OUR SPEAKERS
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Sonia Tabriz
sonia.tabriz@arnoldporter.com
202.942.6574
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Tom Pettit
thomas.pettit@arnoldporter.com
202.942.6075
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Agenda
• Cybersecurity Requirements
• CMMC Overview and Updates
• Enforcement
7
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
CYBERSECURITY REQUIREMENTS
8
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
FAR 52.204-21, Basic Safeguarding of Covered Contractor Information
Systems
• Applies to any information system “owned or operated by a contractor that processes,
stores, or transmits” “federal contract information” (FCI)
• FCI is any information “not intended for public release” obtained from or developed for the
Government in the performance of a contract
• Establishes baseline security standards, such as:
• Identifying users, processes, and devices (e.g., personal identity verification (PIV))
• Limiting access to information systems to only authorized users, processes, and devices (e.g., mandating passwords,
managing group policies, and maintaining the Windows Registry)
• Installing and updating antivirus software and other protections against malicious code; scanning for malware
• Regulating physical access to information systems and facilities
9
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
DFARS 252.204-7012, Safeguarding Covered Defense Information and
Cyber Incident Reporting
• Applies to DoD contractors with information systems that will store, process, or transmit controlled
unclassified information (CUI) collected, developed, received, transmitted, used, or stored by or on
behalf of the contractors in support of the performance of the contract
• Two key elements: security controls and cyber incident reporting
• Security Controls
• Implement security controls in NIST SP 800-171
• Document security controls in system security plan
• Develop plan of action for any controls not implemented
10
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
DFARS 252.204-7012, Safeguarding Covered Defense Information and
Cyber Incident Reporting
• Security Controls
• NIST SP 800-171 compliance is generally a self-assessment system with a few caveats:
• System security plans and plans of action can be (but typically are not) formal contract deliverables
• Contractor must submit requests to vary from NIST SP 800-171 to the contracting officer for review by the DoD
CIO
• DIBCAC Assessments, DFARS 252.204-7019, and DFARS 252.204-7020
• Cloud Services
• CSPs must meet security requirements equivalent to the Federal Risk and Authorization Management Program
(FedRAMP) Moderate baseline
11
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
DFARS 252.204-7012, Safeguarding Covered Defense Information and
Cyber Incident Reporting
• Cyber Incident Reporting
• Cyber Incident: Actions taken through the use of computer networks that result in a compromise
or an actual or potentially adverse effect on an information system and/or the information
residing therein
• Compromise: Disclosure of information to unauthorized persons or a violation of the security policy
of a system and unauthorized intentional or unintentional disclosure, modification, destruction, or
loss of an object or the copying of information to unauthorized media may have occurred
• Adverse Effect: Not defined, but it could include, among other things, exfiltration, malware, DDoS
attack, ransomware attack
• Conduct a review, including assessing scope of cyber incident and impact on covered defense
information as well as ability to provide operationally critical support
• Must “rapidly” report cyber incidents through DIBNet
12
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
DFARS 252.204-7012, Safeguarding Covered Defense Information and
Cyber Incident Reporting
• Cyber Incident Reporting
• Submit malicious software to the DoD Cyber Crime Center
• Preserve information (images of information systems and monitoring/packet capture data) for at
least 90 days after reporting cyber incident
• DoD has right to perform forensic analysis and damage assessment, and contractor must
cooperate
• Subcontract flow down
13
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
DFARS 252.204-7019 & -7020, NIST SP 800-171 Assessments
• Apply to all solicitations and contracts that exceed the micro-purchase threshold and are not
exclusively for the acquisition of commercially available off-the-shelf (COTS) items
• Four Components:
• Weighted Score
• 110-point, weighted scoring system that measures the extent to which an offeror or contractor has implemented
the NIST SP 800-171 security controls.
• Standardized scoring methodology that assigns greater points to requirements that have greater impact on the
security of the network and its data than others.
• Confidence Levels
• Basic Assessment/Low Confidence: Self-assessment and self-generated score
• Medium Assessment/Confidence: DoD reviews Basic Assessment and associated documentation and discusses
any concerns with the contractor
• High Assessment/Confidence: Medium Assessment + verification, examination, and demonstration of SSP
14
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
DFARS 252.204-7019 & -7020, NIST SP 800-171 Assessments
• Four Components:
• Rebuttal and Adjudication: Contractor may, within 14 days, dispute any aspect of a DoD assessment
• Reporting: Contractor must enter data into the Supplier Performance Risk System (summary level score,
type of assessment, description of the SSP architecture, assessment date, and date when contractor will
achieve perfect score)
• American Fuel Cell & Coated Fabrics Co., B-420551, B-420551.2, June 2, 2022, 2022 CPD ¶ 139
15
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
CMMC OVERVIEW AND UPDATES
16
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Why CMMC?
• DFARS 252.204-7012 relies on contractor self-assessments
• There is no mandatory government oversight
• DoD concluded that the “Scout’s Honor” system was ineffective
• A 2018 National Defense Industrial Association (NDIA) survey revealed that 36% of contractors who responded were
not aware of DFARS 252.204-7012, and 45% of the respondents admitted that they had never read NIST SP 800-171
• A 2019 NDIA survey revealed that only 56% of defense contractors were prepared for a DCMA assessment of NIST SP
800-171 compliance
17
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
CMMC Overview and Updates
• DoD determined that more must be done to harden the DIB's and defense supply chain's
cyber infrastructure
• Verification is not required
• Industry surveys have indicated that many contractors are noncompliant
• Cyber incidents have increased
• CMMC 1.0
• Released in January 2020
• Five maturity levels (two transitional) and would have to be certified to be eligible for contracts
incorporating CMMC requirements
18
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
CMMC Overview and Updates
• CMMC 2.0
• “Announced” in November 2021
• Streamlined requirements
• CMMC-unique security practices removed
• New iteration will have three maturity levels instead of five (CMMC 1.0 Levels 2 and 3 removed)
• Level 1: Security controls for FCI
• Level 2: 110 NIST SP 800-171 security controls for CUI
• Level 3: 110 NIST SP 800-171 security controls for CUI, plus some subset of NIST SP 800-172
• Plans of action generally not allowed, with exceptions only for minor noncompliance
19
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
CMMC Overview and Updates
• Assessments
• Level 1 is achieved through a self assessment and attestation of compliance
• Level 2 generally requires third-party assessments through accredited CMMC Third Party
Assessment Organizations (C3PAOs), but self-assessments are permitted if contract
requirements do not involve information critical to national security
• Level 3 must be assessed by USG officials
• Interim rule is expected around March 2023, and CMMC may be incorporated into
solicitations and RFIs shortly thereafter
20
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
ENFORCEMENT
21
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Contract-Based Remedies
• In June 2022, DoD issued a memorandum reminding Contracting Officers of available contract-based
remedies for noncompliance with DFARS 252.204-7012 and the corresponding NIST SP 800-171 requirements
22
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Civil Cyber-Fraud Initiative
• In October 2021, the Department of Justice (DoJ) announced a new Civil Cyber-Fraud Initiative that leverages
the False Claims Act (FCA) to combat cyber threats
• Deputy Attorney General Lisa O. Monaco stated:
• “For too long, companies have chosen silence under the mistaken belief that it is less risky to hide a breach than to
bring it forward and to report it. Well that changes today. We are announcing today that we will use our civil
enforcement tools to pursue companies, those who are government contractors who receive federal funds, when
they fail to follow required cybersecurity standards — because we know that puts all of us at risk. This is a tool that
we have to ensure that taxpayer dollars are used appropriately and guard the public fisc and public trust.”
• In a recent Comprehensive Cyber Review report, DOJ confirmed that it plans to “lead the effort to enforce
cybersecurity requirements on federal contractors and grantees” and further announced its desire to
participate in developing those requirements
23
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Civil Cyber-Fraud Initiative
• DoJ has identified the following benefits of the Civil Cyber-Fraud Initiative:
• Building broad resiliency against cybersecurity intrusions across the government, the public sector and key industry
partners
• Holding contractors and grantees to their commitments to protect government information and infrastructure
• Supporting government experts’ efforts to timely identify, create and publicize patches for vulnerabilities in
commonly-used information technology products and services
• Ensuring that companies that follow the rules and invest in meeting cybersecurity requirements are not at a
competitive disadvantage
• Reimbursing the government and the taxpayers for the losses incurred when companies fail to satisfy their
cybersecurity obligations
• Improving overall cybersecurity practices that will benefit the government, private users and the American public
24
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Civil Cyber-Fraud Initiative
• DoJ has stated that the following types of contracts will be the focus of its enforcement efforts:
• Software and hardware procurement
• Developing, implementing or maintaining IT systems owned by the federal government
• Use of the contractor’s IT systems, especially if the systems maintain government data
• Cloud services
• Contracts that incorporate a regulatory, statutory or contractual requirement to monitor and report a cyber
breach or incident
• DoJ has also stated that it expects qui tam relators to play a significant role in implementing the
Civil Cyber-Fraud Initiative
• DoJ has already announced results of its enforcement efforts
25
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
Other Potential Risks
• Bid protest litigation
• Subcontract flow down negotiations and disputes
• Suspension and debarment
26
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
QUESTIONS?
Please Contact Our Speakers:
Sonia Tabriz
sonia.tabriz@arnoldporter.com
202.942.6574
Tom Pettit
thomas.pettit@arnoldporter.com
202.942.6574
27
Federal Government Contracting
CYBERSECURITY REQUIREMENTS
hello@JenniferSchaus.com
Cybersecurity Compliance & Enforcement for Federal Contractors
THANK YOU FOR ATTENDING
28

More Related Content

What's hot (6)

Prepositions of Movement
Prepositions of MovementPrepositions of Movement
Prepositions of Movement
 
Self-guided Social Media Training Manual
Self-guided Social Media Training ManualSelf-guided Social Media Training Manual
Self-guided Social Media Training Manual
 
M08 mark cb_uinglb_9935_u06
M08 mark cb_uinglb_9935_u06M08 mark cb_uinglb_9935_u06
M08 mark cb_uinglb_9935_u06
 
Freizeit
FreizeitFreizeit
Freizeit
 
Prepositions
PrepositionsPrepositions
Prepositions
 
There's no such thing as Artificial Intelligence
There's no such thing as Artificial IntelligenceThere's no such thing as Artificial Intelligence
There's no such thing as Artificial Intelligence
 

Similar to Arnold & Porter Cybersecurity Compliance and Enforcement for Federal Contractors

Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government Contracts
Patton Boggs LLP
 

Similar to Arnold & Porter Cybersecurity Compliance and Enforcement for Federal Contractors (20)

Robert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government ContractorsRobert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government Contractors
 
DFARS & CMMC Overview
DFARS & CMMC Overview DFARS & CMMC Overview
DFARS & CMMC Overview
 
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government ContractorsKey Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
 
Cybersecurity Maturity Model Certification
Cybersecurity Maturity Model CertificationCybersecurity Maturity Model Certification
Cybersecurity Maturity Model Certification
 
MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceMCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance Service
 
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdfA Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
 
Cybersecurity for GovCons - DFARS 252.204-7012 Latest Updates and Last Call
Cybersecurity for GovCons - DFARS 252.204-7012 Latest Updates and Last CallCybersecurity for GovCons - DFARS 252.204-7012 Latest Updates and Last Call
Cybersecurity for GovCons - DFARS 252.204-7012 Latest Updates and Last Call
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government Contracts
 
New York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services CompaniesNew York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services Companies
 
Cybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD IssueCybersecurity: More than A DoD Issue
Cybersecurity: More than A DoD Issue
 
The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?The CMMC Has Arrived. Are You Ready?
The CMMC Has Arrived. Are You Ready?
 
Government Contracting - DFARS Part 252 - Clauses - Win Federal Contracts
Government Contracting - DFARS Part 252 - Clauses - Win Federal ContractsGovernment Contracting - DFARS Part 252 - Clauses - Win Federal Contracts
Government Contracting - DFARS Part 252 - Clauses - Win Federal Contracts
 
Cybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdfCybersec Supply Chain Risks and Governance v0.1.pdf
Cybersec Supply Chain Risks and Governance v0.1.pdf
 
Webinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWebinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST Compliance
 
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
 
Cyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarlandCyber security for manufacturers umuc cadf-ron mcfarland
Cyber security for manufacturers umuc cadf-ron mcfarland
 
CMMC 2.0 Explained: Impact for SMBs
CMMC 2.0 Explained:  Impact for SMBsCMMC 2.0 Explained:  Impact for SMBs
CMMC 2.0 Explained: Impact for SMBs
 
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptxA Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
 

More from JSchaus & Associates

More from JSchaus & Associates (20)

2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
2024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 252024: The FAR, Federal Acquisition Regulations - Part 25
2024: The FAR, Federal Acquisition Regulations - Part 25
 
2024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 242024: The FAR, Federal Acquisition Regulations - Part 24
2024: The FAR, Federal Acquisition Regulations - Part 24
 
2024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 232024: The FAR, Federal Acquisition Regulations - Part 23
2024: The FAR, Federal Acquisition Regulations - Part 23
 
2024: The FAR, Federal Acquisition Regulations - Part 19
2024: The FAR, Federal Acquisition Regulations - Part 192024: The FAR, Federal Acquisition Regulations - Part 19
2024: The FAR, Federal Acquisition Regulations - Part 19
 
2024: The FAR, Federal Acquisition Regulations - Part 22
2024: The FAR, Federal Acquisition Regulations - Part 222024: The FAR, Federal Acquisition Regulations - Part 22
2024: The FAR, Federal Acquisition Regulations - Part 22
 
GSA Schedules - Requirements And Reality
GSA Schedules - Requirements And  RealityGSA Schedules - Requirements And  Reality
GSA Schedules - Requirements And Reality
 
2024: The FAR, Federal Acquisition Regulations - Part 18
2024: The FAR, Federal Acquisition Regulations - Part 182024: The FAR, Federal Acquisition Regulations - Part 18
2024: The FAR, Federal Acquisition Regulations - Part 18
 
SPONSORED CONTENT - MyGovWatch - RFP Cliches Debunked: What Government Buyers...
SPONSORED CONTENT - MyGovWatch - RFP Cliches Debunked: What Government Buyers...SPONSORED CONTENT - MyGovWatch - RFP Cliches Debunked: What Government Buyers...
SPONSORED CONTENT - MyGovWatch - RFP Cliches Debunked: What Government Buyers...
 
2024: The FAR, Federal Acquisition Regulations - Part 17
2024: The FAR, Federal Acquisition Regulations - Part 172024: The FAR, Federal Acquisition Regulations - Part 17
2024: The FAR, Federal Acquisition Regulations - Part 17
 
2024: The FAR, Federal Acquisition Regulations - Part 16
2024: The FAR, Federal Acquisition Regulations - Part 162024: The FAR, Federal Acquisition Regulations - Part 16
2024: The FAR, Federal Acquisition Regulations - Part 16
 
2024: The FAR, Federal Acquisition Regulations - Part 15
2024: The FAR, Federal Acquisition Regulations - Part 152024: The FAR, Federal Acquisition Regulations - Part 15
2024: The FAR, Federal Acquisition Regulations - Part 15
 
SPONSORED CONTENT - AGILE ATS - Recruiting Strategies Systems & Tactics For G...
SPONSORED CONTENT - AGILE ATS - Recruiting Strategies Systems & Tactics For G...SPONSORED CONTENT - AGILE ATS - Recruiting Strategies Systems & Tactics For G...
SPONSORED CONTENT - AGILE ATS - Recruiting Strategies Systems & Tactics For G...
 
SPONSORED CONTENT - DV Solutions - Building Relationships With The Federal Fo...
SPONSORED CONTENT - DV Solutions - Building Relationships With The Federal Fo...SPONSORED CONTENT - DV Solutions - Building Relationships With The Federal Fo...
SPONSORED CONTENT - DV Solutions - Building Relationships With The Federal Fo...
 

Recently uploaded

Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Menggugurkan Kandungan 087776558899
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 

Recently uploaded (20)

Vasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In MumbaiVasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
 
World Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterWorld Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - Poster
 
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfsponsor for poor old age person food.pdf
sponsor for poor old age person food.pdf
 
2024 UNESCO/Guillermo Cano World Press Freedom Prize
2024 UNESCO/Guillermo Cano World Press Freedom Prize2024 UNESCO/Guillermo Cano World Press Freedom Prize
2024 UNESCO/Guillermo Cano World Press Freedom Prize
 
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learning
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
 
Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...
Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...
Cheap Call Girls In Hyderabad Phone No 📞 9352988975 📞 Elite Escort Service Av...
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
 
tOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTRtOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTR
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.
 
3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
 
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
 
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
 
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsPakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
 

Arnold & Porter Cybersecurity Compliance and Enforcement for Federal Contractors

  • 1. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Cybersecurity Compliance & Enforcement for Federal Contractors Friday, September 30, 2022 12pm EST
  • 2. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors About Jschaus & Associates: Ø Washington DC based Ø Consulting firm working with established Federal Contractors; Ø Webinars, Events, Conferences; Ø Newsletter – reaching 23K Federal Contractors; Ø 500+ Webinars on YouTube; Ø Advertising & Sponsor Opportunities
  • 3. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors About Arnold & Porter: Ø Top-ranked Government Contracts practice Ø Represent the entire spectrum of domestic and international government contractors: start-ups, Fortune 100 companies, and non-profits Ø Help address the increasingly complex cyber issues confronting commercial businesses, government contractors, and the special concerns associated with work for DoD and intelligence agencies
  • 4. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors MEET OUR SPEAKERS
  • 5. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Sonia Tabriz sonia.tabriz@arnoldporter.com 202.942.6574
  • 6. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Tom Pettit thomas.pettit@arnoldporter.com 202.942.6075
  • 7. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Agenda • Cybersecurity Requirements • CMMC Overview and Updates • Enforcement 7
  • 8. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors CYBERSECURITY REQUIREMENTS 8
  • 9. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors FAR 52.204-21, Basic Safeguarding of Covered Contractor Information Systems • Applies to any information system “owned or operated by a contractor that processes, stores, or transmits” “federal contract information” (FCI) • FCI is any information “not intended for public release” obtained from or developed for the Government in the performance of a contract • Establishes baseline security standards, such as: • Identifying users, processes, and devices (e.g., personal identity verification (PIV)) • Limiting access to information systems to only authorized users, processes, and devices (e.g., mandating passwords, managing group policies, and maintaining the Windows Registry) • Installing and updating antivirus software and other protections against malicious code; scanning for malware • Regulating physical access to information systems and facilities 9
  • 10. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting • Applies to DoD contractors with information systems that will store, process, or transmit controlled unclassified information (CUI) collected, developed, received, transmitted, used, or stored by or on behalf of the contractors in support of the performance of the contract • Two key elements: security controls and cyber incident reporting • Security Controls • Implement security controls in NIST SP 800-171 • Document security controls in system security plan • Develop plan of action for any controls not implemented 10
  • 11. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting • Security Controls • NIST SP 800-171 compliance is generally a self-assessment system with a few caveats: • System security plans and plans of action can be (but typically are not) formal contract deliverables • Contractor must submit requests to vary from NIST SP 800-171 to the contracting officer for review by the DoD CIO • DIBCAC Assessments, DFARS 252.204-7019, and DFARS 252.204-7020 • Cloud Services • CSPs must meet security requirements equivalent to the Federal Risk and Authorization Management Program (FedRAMP) Moderate baseline 11
  • 12. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting • Cyber Incident Reporting • Cyber Incident: Actions taken through the use of computer networks that result in a compromise or an actual or potentially adverse effect on an information system and/or the information residing therein • Compromise: Disclosure of information to unauthorized persons or a violation of the security policy of a system and unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object or the copying of information to unauthorized media may have occurred • Adverse Effect: Not defined, but it could include, among other things, exfiltration, malware, DDoS attack, ransomware attack • Conduct a review, including assessing scope of cyber incident and impact on covered defense information as well as ability to provide operationally critical support • Must “rapidly” report cyber incidents through DIBNet 12
  • 13. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting • Cyber Incident Reporting • Submit malicious software to the DoD Cyber Crime Center • Preserve information (images of information systems and monitoring/packet capture data) for at least 90 days after reporting cyber incident • DoD has right to perform forensic analysis and damage assessment, and contractor must cooperate • Subcontract flow down 13
  • 14. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors DFARS 252.204-7019 & -7020, NIST SP 800-171 Assessments • Apply to all solicitations and contracts that exceed the micro-purchase threshold and are not exclusively for the acquisition of commercially available off-the-shelf (COTS) items • Four Components: • Weighted Score • 110-point, weighted scoring system that measures the extent to which an offeror or contractor has implemented the NIST SP 800-171 security controls. • Standardized scoring methodology that assigns greater points to requirements that have greater impact on the security of the network and its data than others. • Confidence Levels • Basic Assessment/Low Confidence: Self-assessment and self-generated score • Medium Assessment/Confidence: DoD reviews Basic Assessment and associated documentation and discusses any concerns with the contractor • High Assessment/Confidence: Medium Assessment + verification, examination, and demonstration of SSP 14
  • 15. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors DFARS 252.204-7019 & -7020, NIST SP 800-171 Assessments • Four Components: • Rebuttal and Adjudication: Contractor may, within 14 days, dispute any aspect of a DoD assessment • Reporting: Contractor must enter data into the Supplier Performance Risk System (summary level score, type of assessment, description of the SSP architecture, assessment date, and date when contractor will achieve perfect score) • American Fuel Cell & Coated Fabrics Co., B-420551, B-420551.2, June 2, 2022, 2022 CPD ¶ 139 15
  • 16. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors CMMC OVERVIEW AND UPDATES 16
  • 17. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Why CMMC? • DFARS 252.204-7012 relies on contractor self-assessments • There is no mandatory government oversight • DoD concluded that the “Scout’s Honor” system was ineffective • A 2018 National Defense Industrial Association (NDIA) survey revealed that 36% of contractors who responded were not aware of DFARS 252.204-7012, and 45% of the respondents admitted that they had never read NIST SP 800-171 • A 2019 NDIA survey revealed that only 56% of defense contractors were prepared for a DCMA assessment of NIST SP 800-171 compliance 17
  • 18. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors CMMC Overview and Updates • DoD determined that more must be done to harden the DIB's and defense supply chain's cyber infrastructure • Verification is not required • Industry surveys have indicated that many contractors are noncompliant • Cyber incidents have increased • CMMC 1.0 • Released in January 2020 • Five maturity levels (two transitional) and would have to be certified to be eligible for contracts incorporating CMMC requirements 18
  • 19. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors CMMC Overview and Updates • CMMC 2.0 • “Announced” in November 2021 • Streamlined requirements • CMMC-unique security practices removed • New iteration will have three maturity levels instead of five (CMMC 1.0 Levels 2 and 3 removed) • Level 1: Security controls for FCI • Level 2: 110 NIST SP 800-171 security controls for CUI • Level 3: 110 NIST SP 800-171 security controls for CUI, plus some subset of NIST SP 800-172 • Plans of action generally not allowed, with exceptions only for minor noncompliance 19
  • 20. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors CMMC Overview and Updates • Assessments • Level 1 is achieved through a self assessment and attestation of compliance • Level 2 generally requires third-party assessments through accredited CMMC Third Party Assessment Organizations (C3PAOs), but self-assessments are permitted if contract requirements do not involve information critical to national security • Level 3 must be assessed by USG officials • Interim rule is expected around March 2023, and CMMC may be incorporated into solicitations and RFIs shortly thereafter 20
  • 21. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors ENFORCEMENT 21
  • 22. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Contract-Based Remedies • In June 2022, DoD issued a memorandum reminding Contracting Officers of available contract-based remedies for noncompliance with DFARS 252.204-7012 and the corresponding NIST SP 800-171 requirements 22
  • 23. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Civil Cyber-Fraud Initiative • In October 2021, the Department of Justice (DoJ) announced a new Civil Cyber-Fraud Initiative that leverages the False Claims Act (FCA) to combat cyber threats • Deputy Attorney General Lisa O. Monaco stated: • “For too long, companies have chosen silence under the mistaken belief that it is less risky to hide a breach than to bring it forward and to report it. Well that changes today. We are announcing today that we will use our civil enforcement tools to pursue companies, those who are government contractors who receive federal funds, when they fail to follow required cybersecurity standards — because we know that puts all of us at risk. This is a tool that we have to ensure that taxpayer dollars are used appropriately and guard the public fisc and public trust.” • In a recent Comprehensive Cyber Review report, DOJ confirmed that it plans to “lead the effort to enforce cybersecurity requirements on federal contractors and grantees” and further announced its desire to participate in developing those requirements 23
  • 24. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Civil Cyber-Fraud Initiative • DoJ has identified the following benefits of the Civil Cyber-Fraud Initiative: • Building broad resiliency against cybersecurity intrusions across the government, the public sector and key industry partners • Holding contractors and grantees to their commitments to protect government information and infrastructure • Supporting government experts’ efforts to timely identify, create and publicize patches for vulnerabilities in commonly-used information technology products and services • Ensuring that companies that follow the rules and invest in meeting cybersecurity requirements are not at a competitive disadvantage • Reimbursing the government and the taxpayers for the losses incurred when companies fail to satisfy their cybersecurity obligations • Improving overall cybersecurity practices that will benefit the government, private users and the American public 24
  • 25. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Civil Cyber-Fraud Initiative • DoJ has stated that the following types of contracts will be the focus of its enforcement efforts: • Software and hardware procurement • Developing, implementing or maintaining IT systems owned by the federal government • Use of the contractor’s IT systems, especially if the systems maintain government data • Cloud services • Contracts that incorporate a regulatory, statutory or contractual requirement to monitor and report a cyber breach or incident • DoJ has also stated that it expects qui tam relators to play a significant role in implementing the Civil Cyber-Fraud Initiative • DoJ has already announced results of its enforcement efforts 25
  • 26. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors Other Potential Risks • Bid protest litigation • Subcontract flow down negotiations and disputes • Suspension and debarment 26
  • 27. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors QUESTIONS? Please Contact Our Speakers: Sonia Tabriz sonia.tabriz@arnoldporter.com 202.942.6574 Tom Pettit thomas.pettit@arnoldporter.com 202.942.6574 27
  • 28. Federal Government Contracting CYBERSECURITY REQUIREMENTS hello@JenniferSchaus.com Cybersecurity Compliance & Enforcement for Federal Contractors THANK YOU FOR ATTENDING 28