RSI Security

The DFARS Interim Rule Explained Inside and Out

audit

The Federal Acquisition Regulation (FAR) governs the US government’s acquisitions and selects contractors that work with its agencies. Companies that work with the military fall under the jurisdiction of the Defense Federal Acquisition Regulation Supplement (DFARS). In 2020, an update to DFARS introduced new standards for testing these companies’ security. Read on to have the DFARS interim rule explained comprehensively.

 

The DFARS Interim Rule Explained Inside and Out

The Department of Defense (DoD) has worked to increase cybersecurity for the US to match steady increases to the depth, breadth, and complexity of cyber threats. As one part of that effort, the DFARS Interim Rule of 2020 has increased the speed with which companies need to implement required protections and new protocols for assessing these changes.

In the sections below, we’ll break down everything you need to know, including:

By the end of this article, you’ll be well prepared to meet the new standards required by the DFARS interim rule. But first, let’s take a close look at who exactly is impacted by DFARS.

 

Which Businesses Are Impacted by DFARS?

Regulatory guides like FAR and DFARS apply primarily to governmental agencies, such as the DoD. But businesses who work with the DoD make up the Defense Industrial Base sector (DIB), a key supply chain that contributes to the smooth functioning of all branches of the military. Businesses seeking out these contracts become critical to all American’s safety.

The DIB is one of 16 Critical Infrastructure Sectors presided over by the Cybersecurity and Infrastructure Security Agency (CISA). These sectors are essential to protect. By definition, any security compromise could have debilitating consequences for national security, public health, the economy, and the fabric of society in the US and abroad.

To prevent these negative impacts, all DIB businesses and DoD contractors need to follow DFARS regulations.

 

Understanding the DFARS Interim Rule

Businesses working with DoD were already required to implement the National Institute for Standards and Technology (NIST) SP 800-171 controls. Those seeking out preferred contractor status also had to achieve Cybersecurity Maturity Model Certification (CMMC) through the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD-A&S).

Under the Interim Rule, major changes impact these two frameworks in the following ways:

The most immediate impact of the Interim Rule on businesses is that it requires a re-assessment for NIST SP 800-171, even if the business was recently assessed. Other companies may now have to implement CMMC given the change.

 

Assess your CMMC compliance

 

Impacts on FAR and DFARS Requirements

All contractors looking to work with the DoD will need to implement NIST SP 800-171 and CMMC required controls. The interim rule speeds up the timeline within which these companies must comply and changes the way self-assessments are submitted and scored.

FAR and DFARs still exist to safeguard two primary types of information:

Various cybersecurity frameworks pertain to the protection of this information. The two most critical are those directly impacted by the Interim Rule: NIST SP 800-171 and the CMMC, focusing on FCI and CUI, respectively. Let’s take a close look at each one’s requirements.

 

Implementing NIST SP 800-171 Framework

As noted above, the DFARS Interim Rule Self-Assessment for NIST SP 800-171 compliance involves new methods for scoring and reporting your score via SPRS. However, requirements for compliance have not changed. Besides the FAR and DFARS protections for FCI and CUI, NIST SP 800-171 also protects another data class: Covered Defense Information (CDI).

To protect these various forms of sensitive information, NIST SP 800-171 draws heavily from NIST’s Cybersecurity Framework (CSF). The foundational text ISO/IEC 27002:2013 is also a significant source, as are Federal Information Processing Standards Publications (FIPS) 199 and 200. Drawing on all these inputs, NIST SP 800-171’s scheme comprises 14 “Requirement Families” and 110 “Requirements.” Let’s take a closer look at what each “Family” entails.

 

Breakdown of NIST SP 800-171 Controls

The Requirement Families and their respective Requirements break down as follows:

 

Achieving NIST SP 800-171 Compliance

Complying with NIST SP 800-171 means implementing all 110 Requirements simultaneously. While CMMC allows for a gradual approach, NIST does not. Implementation of such a wide range of controls can be challenging, especially for smaller companies new to the DIB. RSI Security offers robust and scalable NIST SP 800-171 services to help all companies comply.

Our suite of NIST SP 800-171 services is customizable to your company’s exact needs and means. You can begin with gap and patch reporting or broader, generalized vulnerability management. Or, you can start with powerful analytical tools like penetration testing that get to the root of any flaws in your architecture. See our NIST SP 800-171 datasheet to learn more.

   Download our CMMC Whitepaper: Best Cybersecurity Practices for DoD Contractors

 

Mapping Onto the CMMC Framework

CMMC encompasses all of NIST SP 800-171, as well as other key cybersecurity texts. The CMMC components of the DFARS Interim Rule, or the “CMMC Interim Rule,“ include faster and wider implementation of all five CMMC “Maturity Levels.” These break down as follows:

Across these five levels, the CMMC framework comprises 17 “Domains,” analogous to NIST’s “Families,” and 171 “Practices,” comparable to NIST’s “Requirements.” There are also 43 “Capabilities” which shape the purpose and direction of a Domain. Let’s take a closer look.

 

Breakdown of All CMMC Controls

The Domains and their respective Capabilities and Practices break down as follows:

 

Completing Full CMMC Certification

Achieving CMMC certification requires more than just implementing the required Practices, ranging from “Cyber Hygiene” to “Proactive.” Each Level also requires a given “Process” goal, from “documented” at Level 2 to “optimizing” at Level 5. Given these escalating challenges, CMMC compliance can be complex despite the gradual progression.

RSI Security’s suite of dedicated CMMC services is designed to facilitate certification for any company. As a Certified Third-Party Assessment Organization (C3PAO), we can directly grant certification. We can also help your company install the practices it requires alongside a targeted plan to help maintain them over the long term for optimal cybersecurity.

 

Full-Service DoD Cybersecurity Advisory

With the major components of the DFARS interim rule explained, your company should be able to implement all required controls and lock down lucrative DoD contracts. But understanding is not the same thing as implementing. Assessing and maintaining all these practices can be quite challenging for companies of all sizes. This is especially true for smaller companies new to the DIB. To see just how simple your NIST SP 800-171 and CMMC compliance can be, contact RSI Security today.

 


Speak with a CMMC compliance expert today – Schedule a free consultation

Exit mobile version