5 Tips to Achieve DFARS Compliance

5 Tips to Achieve DFARS Compliance

The US Department of Defense (DoD) handles a lot of controlled unclassified information (CUI), which requires “safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies.” In December 2015, the DoD published an interim rule to the Defense Federal Acquisition Regulation Supplement (DFARS) that required DoD contractors to meet certain cybersecurity requirements by December 31, 2017.

If you’re planning to bid on a DoD contract, then you have to make sure that you achieve DFARS compliance.

What Does DFARS Compliance Entail?

DFARS compliance standards requires DoD contractors to have the National Institute of Standards and Technology (NIST) Special Publication 800-171-compliant security controls to prevent a data breach as well as procedures to report a breach should it occur. Under DFARS, DoD contractors must also periodically assess themselves to keep CUI protected.

What Can You Do to Meet DFARS Compliance?

To be DFARS-compliant, you must adequately address all 14 security requirement families outlined in the NIST SP 800-171. Following these five tips will help you get started:

DFARS-COMPLIANCE

#1 Undergo Security and Risk Assessments

There are operational risks involved in processing, storing, and transmitting CUI. That’s why it’s important for you to periodically scan your internal procedures and IT systems for vulnerabilities that may endanger CUI. Doing so will help you identify and correct deficiencies so you can reduce or eliminate risks.

Given the growing complexity of security and regulatory obligations, it’s best to ask a DFARS compliance expert like Charles IT to conduct these assessments for you.

#2 Roll Out IT System and Physical Safeguards

To ensure effective information security, you need to monitor, control, and protect your IT systems and the physical facilities housing these. This involves limiting physical access to your office, encrypting communications, separating internal networks from publicly accessible systems, preventing unauthorized data transfer to shared system resources, and more.

#3 Implement Identification, Authentication, and Access Controls

Register and manage every user and device that accesses your data and IT systems, and make sure each user only has access to what they need to do their job. For example, rank-and-file HR staff shouldn’t be able to easily obtain the finance department’s high-level information.

You must also be able to identify, track, and authenticate users and devices with proper security protocols each time they access your data or system. This means implementing multifactor authentication, prohibiting password reuse, enforcing password complexity requirements, and logging out a user automatically after a defined period of inactivity, among others.

#4 Conduct Cybersecurity Awareness Training

All employees must be made aware of the security risks associated with their use of company data and systems. It’s imperative that they learn about the different policies, standards, and procedures they must adopt to safely carry out their responsibilities.

#5 Develop and Employ an Incident Response Plan

You should have a team and a set of procedures that allow you to detect, analyze, contain, recover from, and respond to a data breach or any kind of cybersecurity incident; this set of procedures is called an Incident Response Plan. You should regularly test your company’s plan and make changes accordingly.

CMMC: Is This an Update to DFARS Compliance?

Over the years, the DoD grappled with a low rate of FAR and DFARS compliance among its contractors. To address this issue while still trying to increase the security of defense data and networks, the department introduced the Cybersecurity Maturity Model Certification (CMMC).

CMMC builds upon existing cybersecurity frameworks and requirements, such as the NIST SP 800-171. But since CMMC has five levels of cybersecurity maturity, contractors who achieved CMMC Levels 1 and 2 are not necessarily compliant with all aspects of DFARS.

At the same time, you can be DFARS-compliant but haven’t earned your CMMC. That’s because, unlike DFARS’s self-assessment, CMMC requires third-party accreditation. But if you’re already DFARS-compliant, you can easily achieve CMMC Level 3 maturity with a third-party auditor by just implementing a few more good cyber hygiene practices.

img-cmmc-1

Learn more about CMMC

Compliance with NIST SP 800-171 can be a herculean task for small businesses. CMMC is a cost-effective solution to achieve the minimum Level 1 requirement. Find out more by clicking the button below.

Show Me How

What Should You Do Next?

Starting September 2020, the DoD will require certain contractors to pass CMMC. But once fully operational, CMMC will become mandatory for all entities doing business with the DoD. That’s why you should work toward DFARS compliance and earn your CMMC if you want to be a DoD contractor.

It’s easy to get lost in all the legal and technical jargon of DFARS and CMMC. Good thing you can leverage the expertise of Charles IT. With our help, you’ll quickly and easily comply with DFARS and CMMC standards. Drop us a line today!

CIT-CMMC-cta-horz