SlideShare a Scribd company logo
New FAR ‘Final Rule’ Imposes Security Safeguard Requirementsfor
Contractor Information Systems
PostedbyDaniel Gardneron May 24, 2016 3:47:30 PM
Thisyear hasbeenmarkedbya numberof importantchangesandupdatedcontractingproceduresaimedatimproving
the U.S. Federal Government’scybersecuritysystems.Againstthe backdropof PresidentObama’s Cybersecurity
National ActionProgram, launchedearlierthisyear,anew Federal AcquisitionRegulation(FAR) rule hasrecentlyarrived
whichaddressesbasicsafeguardingof contractorinformationsystems.Thismayseeminnocuousatfirst,butthe change
shouldnotbe takenfor grantedby the contractor community. Despitesmall timebusinessescontributingtothe
majorityof Multiple AwardSchedules’total revenue,ITstart-upswithemergingstate of the arttechnologyhave foundit
increasinglydifficulttojointhischannel.
Overview of the FAR Final Rule
In a collective effort,the GeneralServicesAdministration(GSA) alongwiththe Departmentof Defense (DoD) andthe
National AeronauticsandSpace Administration(NASA),have implementeda Final Rule,addinga new subpartand a
supportingcontractclause to the FAR.
The amendmentaimstoreinforce strategic safeguardingmeasuresof contractorinformationsystemsthatconvey
“federal contractinformation.”Thisincludesprivate informationprovidedbyorgeneratedforgovernmentagencies
throughcontracts intendingtodevelopaproductor service foran agency.The rule appliestoall acquisitionsincluding
commercial items,notincludingcommercialoff-the-shelf items(“COTS”).
Contractors with a Commercial Items Practice should take note of the additional safeguarding measures.
How the Final Rule Will Impact Contractors
The Final Rule will applytoa contractor once theyaccept a contract that containsthe new revision,FAR52.204-21,
definedas“BasicSafeguardingof CoveredContactorInformationSystems.”The Governmentexpectsthisclause tohave
an immediate impactonce implemented,mandatingthe mostbasiclevelof safeguardingacrossamultitude of
contracts.
Furthermore,ContractingOfficers(COs)are requiredtoincludethe new FAR52.204-21 rule insolicitationsand
contracts whena contractor or subcontractormay have “federal contractinformation”residinginortransitioning
throughany of theirinformationsystems.
The Final Rule enactsa set of fifteensecuritycontrol requirementsforcontractorinformationsystemsthatcontain
fragile federal contractinformation.
These rules include:
o Limitaccessto authorizedusers.
o Limitinformationsystemaccesstothe typesof transactionsand functionsthatauthorizedusersare permittedto
execute.
o Verifycontrolsonconnectionstoexternal information systems.
o Impose controlsoninformationthatispostedorprocessedonpubliclyaccessibleinformationsystems.
o Identifyinformationsystemusersandprocessesactingonbehalf of usersordevices.
o Authenticate orverifythe identitiesof users,processes, anddevicesbefore allowingaccesstoan informationsystem.
o Sanitize ordestroyinformationsystemmediacontainingfederal contractinformationbefore disposal,release,orreuse.
o Limitphysical accesstoinformationsystems,equipment,andoperatingenvironmentstoauthorizedindividuals.
o Escort visitorsandmonitorvisitoractivity,maintainauditlogsof physical access,control andmanage physical access
devices.
o Monitor,control,and protectorganizational communicationsatexternal boundariesandkeyinternal boundariesof
informationsystems.
o Implementsubnetworksforpublicallyaccessible systemcomponentsthatare physicallyorlogicallyseparatedfrom
internal networks.
o Identify,report,andcorrectinformationandinformationsystemflawsina timelymanner.
o Provide protectionfrommaliciouscode atappropriate locationswithinorganizationalinformationsystems.
o Update maliciouscode protectionmechanismswhennew releasesare available.
o Performperiodicscansof the informationsystemandreal-time scansof filesfromexternal sourcesasfilesare
downloaded,opened,orexecuted.
The Final Rule doesnotrelieve contractorsof obligationspresentedbythe safeguardingof distinctGovernment
information.Thisincludescontrolledunclassifiedinformation(CUI) andcovereddefenseinformation,bothof which
require additional protectionthroughrespectivecontractors.
As fundscontinue toroll outforthe improvementof cybercapabilitiesgovernmentwide,contractorsare highly
encouragedtobegin necessarysystemalignmentimmediately,inordertomeetthe new FARrequirements.
The Final Rule is only a preliminary step in a vast series of regulatory developments in the cybersecurity
industry.
To identifycurrentcybervulnerabilities,federal contractorscanconduct an assessmentguidedbyanindependent
securityauditorandNISTframework(SP800-171 or SP 800-53a). Theymay alsoconductroutine cyberemployee
training,acquire cyberliabilityinsurance andadoptarobust IncidentResponse Plan.
Since mostorganizationsfocusonbothpreventionanddetection,usingthreatintelligence dataisanimportantwayto
ensure continuousmonitoringasnewcyberthreatsemerge.Winvalecreatedthe Dark WebID platform as a
compensatorysecuritymeasurethatcan be an effective,continuousmonitoringtool forfederal contractorsand
subcontractors. Contact us today to learnmore.

More Related Content

Similar to FAR 'Final Rule' Blog

Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Joe Orlando
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudSource Conference
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateWilmerHale
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...Cédric Laurant
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
 
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...Patton Boggs LLP
 
Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...padler01
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive OrderBooz Allen Hamilton
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran GSTF
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningUlf Mattsson
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1stevemeltzer
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortzitnewsafrica
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
 

Similar to FAR 'Final Rule' Blog (20)

Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy Update
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
 
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government ContractorsKey Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...
 
Data breaches at home and abroad
Data breaches at home and abroad Data breaches at home and abroad
Data breaches at home and abroad
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
NIST article I wrote
NIST article I wroteNIST article I wrote
NIST article I wrote
 
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 

FAR 'Final Rule' Blog

  • 1. New FAR ‘Final Rule’ Imposes Security Safeguard Requirementsfor Contractor Information Systems PostedbyDaniel Gardneron May 24, 2016 3:47:30 PM Thisyear hasbeenmarkedbya numberof importantchangesandupdatedcontractingproceduresaimedatimproving the U.S. Federal Government’scybersecuritysystems.Againstthe backdropof PresidentObama’s Cybersecurity National ActionProgram, launchedearlierthisyear,anew Federal AcquisitionRegulation(FAR) rule hasrecentlyarrived whichaddressesbasicsafeguardingof contractorinformationsystems.Thismayseeminnocuousatfirst,butthe change shouldnotbe takenfor grantedby the contractor community. Despitesmall timebusinessescontributingtothe majorityof Multiple AwardSchedules’total revenue,ITstart-upswithemergingstate of the arttechnologyhave foundit increasinglydifficulttojointhischannel. Overview of the FAR Final Rule In a collective effort,the GeneralServicesAdministration(GSA) alongwiththe Departmentof Defense (DoD) andthe National AeronauticsandSpace Administration(NASA),have implementeda Final Rule,addinga new subpartand a supportingcontractclause to the FAR. The amendmentaimstoreinforce strategic safeguardingmeasuresof contractorinformationsystemsthatconvey “federal contractinformation.”Thisincludesprivate informationprovidedbyorgeneratedforgovernmentagencies throughcontracts intendingtodevelopaproductor service foran agency.The rule appliestoall acquisitionsincluding commercial items,notincludingcommercialoff-the-shelf items(“COTS”). Contractors with a Commercial Items Practice should take note of the additional safeguarding measures. How the Final Rule Will Impact Contractors The Final Rule will applytoa contractor once theyaccept a contract that containsthe new revision,FAR52.204-21, definedas“BasicSafeguardingof CoveredContactorInformationSystems.”The Governmentexpectsthisclause tohave an immediate impactonce implemented,mandatingthe mostbasiclevelof safeguardingacrossamultitude of contracts. Furthermore,ContractingOfficers(COs)are requiredtoincludethe new FAR52.204-21 rule insolicitationsand contracts whena contractor or subcontractormay have “federal contractinformation”residinginortransitioning throughany of theirinformationsystems. The Final Rule enactsa set of fifteensecuritycontrol requirementsforcontractorinformationsystemsthatcontain fragile federal contractinformation.
  • 2. These rules include: o Limitaccessto authorizedusers. o Limitinformationsystemaccesstothe typesof transactionsand functionsthatauthorizedusersare permittedto execute. o Verifycontrolsonconnectionstoexternal information systems. o Impose controlsoninformationthatispostedorprocessedonpubliclyaccessibleinformationsystems. o Identifyinformationsystemusersandprocessesactingonbehalf of usersordevices. o Authenticate orverifythe identitiesof users,processes, anddevicesbefore allowingaccesstoan informationsystem. o Sanitize ordestroyinformationsystemmediacontainingfederal contractinformationbefore disposal,release,orreuse. o Limitphysical accesstoinformationsystems,equipment,andoperatingenvironmentstoauthorizedindividuals. o Escort visitorsandmonitorvisitoractivity,maintainauditlogsof physical access,control andmanage physical access devices. o Monitor,control,and protectorganizational communicationsatexternal boundariesandkeyinternal boundariesof informationsystems. o Implementsubnetworksforpublicallyaccessible systemcomponentsthatare physicallyorlogicallyseparatedfrom internal networks. o Identify,report,andcorrectinformationandinformationsystemflawsina timelymanner. o Provide protectionfrommaliciouscode atappropriate locationswithinorganizationalinformationsystems. o Update maliciouscode protectionmechanismswhennew releasesare available. o Performperiodicscansof the informationsystemandreal-time scansof filesfromexternal sourcesasfilesare downloaded,opened,orexecuted. The Final Rule doesnotrelieve contractorsof obligationspresentedbythe safeguardingof distinctGovernment information.Thisincludescontrolledunclassifiedinformation(CUI) andcovereddefenseinformation,bothof which require additional protectionthroughrespectivecontractors. As fundscontinue toroll outforthe improvementof cybercapabilitiesgovernmentwide,contractorsare highly encouragedtobegin necessarysystemalignmentimmediately,inordertomeetthe new FARrequirements. The Final Rule is only a preliminary step in a vast series of regulatory developments in the cybersecurity industry. To identifycurrentcybervulnerabilities,federal contractorscanconduct an assessmentguidedbyanindependent securityauditorandNISTframework(SP800-171 or SP 800-53a). Theymay alsoconductroutine cyberemployee training,acquire cyberliabilityinsurance andadoptarobust IncidentResponse Plan. Since mostorganizationsfocusonbothpreventionanddetection,usingthreatintelligence dataisanimportantwayto ensure continuousmonitoringasnewcyberthreatsemerge.Winvalecreatedthe Dark WebID platform as a compensatorysecuritymeasurethatcan be an effective,continuousmonitoringtool forfederal contractorsand subcontractors. Contact us today to learnmore.