NIST800-171 Compliance

DFARS 252.204-7012, NIST 800-171 & CMMC compliance for the Commercial Supply Chain and DOD, Defense Industrial Base (DIB)

Latest

NIST 800-171 guidelines are being enforced by the U.S. government. NIST 800-171 is the recommended baseline for CMMC certification. If your company is is a supplier to the the U.S. government directly or as a subcontractor, contact us for an immediate NIST/CMMC cyber assessment in preparation for CMMC Certification now.

 

Background

Most small to medium-sized commercial companies face constant challenges simply to maintain their network security, cloud security and network firewall security. This is especially true for firms in the manufacturing supply chain, as recent information NIST,DFARS & CMMC compliance requirements can adversely affect their profitability as well as status.

Equally important, commercial supply chain organizations are also required to adhere to these new guidelines. It is no longer enforceable for federal contractors alone. Other key changes include:

  • All contractors awarded contracts to provide products or services that require the use of Controlled Unclassified Information (CUI) are ordered to comply with DFARS 252.204-7012
  • Over 100 controls must now be addressed, as well as the cyber security posture of the supplier’s network or system across the 14 security domains defined in NIST SP 800-171
  • The obligation of proof is now placed on the supplier, and their entire supply chain
  • Failure to comply will result in a Corrective Action Report (CAR), loss of contract or potential legal actions

Guidelines

Firms who want to remain as a trusted U.S. government supplier must ensure their company — and their entire supply chain — meet the following minimum requirements for DFARS 252.204-7012 / NIST 800-171:

  1. Self-Attestation of the contract obligations for compliance (attesting to compliance)
  2. System Security Plan with the following provable elements (updated periodically):
    • System Boundaries: Identify the network map, connections and segmentations initially and through the life of the contract
    • System Environments of Operations: Operating Environment where CUI is stored
    • How the security requirements are implemented: Policy, actual evidence and proof of the security requirements as active in real time
    • Relationships or connections with other systems: Real-time situational awareness of all connections and system profile information
  3. Plan of Action and Milestones: Detailed plan of cyber gaps and necessary remediations, regularly updated to show continuous improvements
  4. Incident Response Plan: An approved process defined by the DoD for reporting incidents within 72 hours of the event on a non-negotiable basis
  5. Proof of cyber resiliency, such as implemented “adequate” cybersecurity controls, cyber event monitoring and processes. Failure to provide proof if requested may lead to the loss of federal contracts

Solution

With our decades of expertise as a key cyber security services partner to the U.S. government, Cytellix understands the requirements and context of the new guidelines in detail. We are actively working with firms of all sizes and industries to ensure compliance in the safest, most direct and cost-effective manner. Our core methodology includes:

CYTELLIX Security SERVICES

  • Cybersecurity Assessments – DFARS 7012
  • Compliance, NIST 800-171
  • CMMC Pre-Assessments 
  • Firewall Assessments
  • Device Profiling
  • Network Leak Detection
  • Vulnerability Management
  • Cybersecurity Managed Services (SaaS)

CYTELLIX SOLUTIONS

  • Cybersecurity SOC
  • SIEM as a Service
  • Network Security
  • Real-time Situational Awareness
  • Complete Visibility
  • Cyber Analytics
  • Security Orchestration
  • Vulnerability Services & Management
  • Cyber Kill Chain Analysis
 
 

Action

Cytellix is available to provide a detailed security services assessment. Our goal is to ensure you are fully aware of the steps required to stay compliant, cyber prepared, and provide a plan of action that will minimize time or cost disruption. Contact us to learn more and arrange a security services assessment at your convenience.

Contact Us