CCP Lesson 1 Flashcards
Defense Industrial Base (DIB) includes.
DoD Components, companies providing materials and services, government-owned facilities operated by the government or contractors
Does Defense Supply Chain extend beyond DIB? Give examples.
Yes. office equipment, janitors, food
What certification makes cybersecurity foundational for all acquisitions?
Cybersecurity Maturity Model Certification (CMMC)
Who receives contracts from the government?
Prime contractors
Who helps prime contractors fulfill portions of the contracts?
Subcontractors
As information is moved between government, prime contractors, and subcontractors it is __ ____.
At risk
What represents a philosophical change to securing the nation’s data?
CMMC program
What is the DoD’s initiative to verify defense contractors’ cybersecurity preparedness and effectiveness?
CMMC
CMMC standardized cybersecurity implementation across what?
Defense Industrial Base (DIB)
What year did the CMMC program kick off?
2019
What year was CMMC Model 1.0 released?
2020
What year was CMMC Model 2.0 released?
2021
What is considered the company’s own methods, techniques and inventions?
Internal Intellectual Property (IP)
Information from partners outside the government that is generally protected by contracts between parties such as license agreements and NDA’sis what tpe of Intellectual Property (IP)?
External Intellectual Property (IP)
As it pertains to Legal, Regulatory, and Policy (LRP) Drivers, what ensures proper actions?
Laws
As it pertains to Legal, Regulatory, and Policy (LRP) Drivers, what are laws interpreted and implemented throug?
Regulations
As it pertains to Legal, Regulatory, and Policy (LRP) Drivers, regulations are detailed thorugh?
Policies
What provides policies and procedures that apply to all Executive Branch departments and agencies regarding acquisitions?
Federal Acquisition Regulation (FAR)
48 CFR is also known as?
Federal Acquisition Regulation (FAR)
What regulation documents rules that government contractors are subject to, takes priority over Defense Federal Aquisition Regulation Supplement (DFARS), and provides a consistent set of baselines that apply to all solicitations?
Federal Acquisition Regulation (FAR)
What regulation is a supplement of the Federal Aquisition regulation?
Defense Federal Aquisition Regulation Supplement (DFARS)
Defense Federal Aquisition Regulation Supplement (DFARS) includes policies and procedures that apply to who and administered by who?
Department of Defense (DoD)
What does Defense Federal Acquisition Regulation Supplement (DFARS) cover?
Department of Defense acquisitions
The Federal Information Security Modernization Act is the Legal Authority for what type of information?
Federal Contract Information (FCI) and Controlled Unclassified Information (CUI)
What law requires government to protect sensitive information?
Federal Information Security Modernization Act
What is the Regulatory Authority for Federal Contract Information?
48 CFR Section 52
What regulations explain how to adhere to the law, as applied to a contractor’s information systems?
48 CFR Section 52
What is section 52 of the Federal Acquisition Regulation (FAR) is also called?
FAR 52
What is the primary source of information on handling requirements for FCI?
FAR 52
As defined in FAR 52, what is an information system that is owned or operated by a contractor that processes, stores, or transmits Federal Contract Information (FCI)?
Covered Contractor information System
As defined in FAR 52, What is information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government, but not including information provided by the Government to the public or simple transactional information?
Federal Contract Information (FCI)
As defined in FAR 52, what is any communication or representation of knowledge?
Information
As defined in FAR 52, what is a discrete set of information resources organized for collection, processing, maintenance, use, sharing, dissemination, or disposition of information?
Information System
As defined in FAR 52, what are measures or controls that are prescribed to protect information systems?
Safeguards
2002 Federal Information Security Management Act (FISMA) Amended in 2014 and Executive Order 13556, Controlled Unclassified Information is the legal Authority for what type of information?
Controlled Unclassified Information (CUI)
32 CFR Part 2002 is the regulatory authority for what type of information?
Controlled Unclassified Information (CUI)
Who oversees CUI Policy?
National Archives and Records Administration (NARA)
What regulatory Authority appointed the National Archives and Administration (NARA) to oversee CUI policy?
32 CFR Part 2002
What regulation stood up Information Security Oversight Office (ISOO), which publishes CUI notices?
32 CFR Part 2002
What are the policy drivers for Controlled Unclassified Information?
National Archives and Records Administration (NARA); Information Security Oversight Office (ISOO)
What office publishes Controlled Unclassified Information (CUI) notices)?
Information Security Oversight Office (ISOO)
Policies stipulate that CUI must be protected in accordance with what National Institute of Standards and Technology (NIST) Special Publications (SP)?
NIST SP 800-171, NIST SP 800-171A, NIST SP 800-172
Defense Industrial Base (DIB)
Worldwide industrial complex, enables research and development + design/production of military weapons and systems to meet US military requirements
Prime Contractors
These contractors receive contracts from the government
Effects of loss of Intellectual Property
- Puts warfighter lives at danger
- Diminishes global competitive advantage
Philosophical change to securing the Nation’s Data
-“protect the information” not “protect the system”
Cybersecurity Maturity Matrix Certification (CMMC) program
- DoD initiative to verify defense contractors’ cybersecurity preparedness and effectiveness
- Standardizes cybersecurity implementation
Internal Intellectual Property (IP)
- The company’s own methods, techniques, inventions
External Intellectual Property
- Partners outside the government; protected by documents such as license agreements and Nondisclosure Agreements (NDAs)
- Federal government; commonly covers Federal Contract Information (FCI) and Controlled Unclassified Information (CUI)
Legal, Regulatory, Policy (LRP) drivers
Laws, regulation, and policies are behind the compliance requirements that government contractors must adhere to
Federal Aquisition Regulation (FAR)
Chapter 1 of Title 48 of the Code of Federal Regulations (CFR); 48 CFR
Provides uniform policies and procedures regarding acquisitions
Documents rules that government contractors are subject to
Defense Federal Acquisitions Regulations (DFARs)
Apply only DoD acquisition activities
Federal Contract Information (FCI) Legal driver
Federal Information Security Modernization Act
Federal Contract Information (FCI) Regulatory driver
Federal Acquisitions Regulation 52 (FAR 52)
What Federal Acquisitions Regulation 52 (FAR 52) covers
Regulation Definitions
Requirements and procedures to safeguard Federal Contract Information (FCI)
Responsibilities when delegating contract work to subcontractors
Federal Acquisition Regulation (FAR) definitions - Covered Contractor Information
Information system that is owned or operated by a contractor that processes, stores, or transmits Federal Contract Information (FCI)
Federal Acquisition Regulation (FAR) definition - Federal Contract Information (FCI)
Information not intended for public release, that is provided or generated for the Government under contract to develop or deliver a product or service to the Government
Federal Acquisition Regulation (FAR) definition - Information
Any communication or representation of knowledge
Federal Acquisition Regulation (FAR) definition - Information System
Set of information resources organized for collection, processing, maintenance, use, sharing, dissemination, or disposition of information
Federal Acquisition Regulation (FAR) definition - Safeguarding
measures or controls prescribed to protect information systems
Federal Acquisition Regulation 52 (FAR 52) safeguarding requirements and procedures 1-6
- Limit information system access to authorized users, processes acting on behalf of authorized users, or devices
- Limit information system access to the types of transactions and functions that authorized users are permitted to execute
- Verify and control/limit connections to and use of external information systems
- Control information posted or processed on publicly accessible information systems
- Identify information system users, processes acting on behalf of users, or devices
- Authenticate the identities of those users, processes, or devices, before allowing access to organizational information systems
Federal Acquisition Regulation 52 (FAR 52) safeguarding requirements and procedures 7-15
- Sanitize or destroy information system media containing Federal Contract Information (FCI) before disposal or release for reuse
- Limit physical access to organizational information systems, equipment, and the operating environment to authorized individuals
- Escort visitors and monitor visitor activity, maintain audit logs of physical access, control and manage physical access devices
- Monitor, control, and protect organizational communications at the external boundary and key internal boundaries of the information systems
- Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks
- Identify, report, and correct information and information system flaws in a timely manner
- Provide protection from malicious code
- Update malicious code protection mechanisms
- Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed
Controlled Unclassified Information (CUI) Legal drivers
2002 Federal Information Security Management Act amended 2014
Executive order 13556, Controlled Unclassified Information
Controlled Unclassifed Information (CUI) Regulatory driver
32 Code of Federal Regulation (CFR) Part 2002, Controlled Unclassified Information
Controlled Unclassifed Information (CUI) Policy drivers
National Archive and Records Administration (NARA)
Information Security Oversight Office (ISOO) Controlled Unclassified Information (CUI) notices
2002 Federal Information Security Management Act (FISMA) states
Government must protect its sensitive information:
-Federal Contract Information (FCI)
-Controlled unclassified Information (CUI)
Executive Order 13556, Controlled unclassified Information (4 November 2010)
Standardized handling of protected information that is unclassified
32 Code of Federal Regulations (CFR) Part 2002, Controlled Unclassified Information (CUI)
Explain how to adhere to Executive Order 13556
Stipulate and create overall requirements, governance, and management of Controlled Unclassified Information (CUI)
Appointed National Archives and Record Administration (NARA) to oversee Conrtolled Unclassified Information (CUI) Policy
Stood up Information Security Oversight Office (ISOO), which published Controlled Unclassified Information (CUI) notices
Controlled Unclassified information (CUI) should be protected in accordance with:
National Institute of Standards and Technology (NIST) 800-171
National Institute of Standards and Technology (NIST) 800-171A
National Institute of Standards and Technology (NIST) 800-172
National Archive and Records Administration’s (NARA) Information Security Oversight Office (ISOO)
Authority on the protection of Controlled Unclassified Information (CUI)
Information Security Oversight Office (ISOO)
Contained within National Archive and Records Administration’s (NARA)
Responsible to the President for policy and oversight of the U.S. government’s security classification system and the National Industrial Security Program
Receives policy and program guidance from Nation Security Council (NSC)
Serves as the authority on protection of Controlled Unclassified Information (CUI)
Information Security Oversight Office (ISOO) - Classification Management Staff
Develop security classification policies for classifying, declassifying, and safeguarding national security information generated in Government and industry
Information Security Oversight Office (ISOO) - Operations Staff
Evaluate the effectiveness of the security classification programs established by Government
Information Security Oversight Office (ISOO) - Controlled Unclassified Information (CUI) Staff
Develop standardized CUI policies and procedures
National Institute of Standards and Technology (NIST)
Put forth publications covering policies on managing cybersecurity on federal systems, specifically covering Controlled Unclassified Information (CUI)
National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171
Focuses on Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations
Focuses primarily on protecting the confidentiality of Controlled Unclassified Information (CUI)
National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53
Security controls recommended for federal information systems
National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171A
Provides procedures for assessing the Controlled Unclassified Information (CUI)
The primary and authoritative guidance on assessing compliance with NIST SP 800-171
National Institute of Standards and Technology (NIST) Special Publication (SP) 800-172
Enhanced Security Protection for Protecting Controlled Unclassified Information (CUI)
Provides federal agencies with enhanced security policies
Aims to protect the Confidentiality, Integrity, and Availability (CIA) of CUI
Cybersecurity Maturity Model Certification (CMMC) Legal Drivers
Federal Information Security Modernization Act (FISMA)
Executive Order 13556
Subordinate Regulatory Authorities in addition to 32 Code of Federal Regulation (CFR) Part 2002 are Defense Federal Acquisition Regulations Supplement (DFARS):
Clause 252.204-7012
Clause 252.204-7019
Clause 252.204-7020
Clause 252.204-7021
Subordinate Policies - Cybersecurity Maturity Model Certification (CMMC) and DoD Instruction 5200.48, Controlled Unclassified Information
Cybersecurity Maturity Model Certification (CMMC) Regulatory Drivers
32 Code of Federal Regulation (CFR) Part 2002
Subordinate Regulatory Authorities Defense Federal Acquisition Regulations Supplement (DFARS):
- Clause 252.204-7012
- Clause 252.204-7019
- Clause 252.204-7020
- Clause 252.204-7021
Cybersecurity Maturity Model Certification (CMMC) Policy Drivers
National Archives and Records Administration (NARA) Information Security Oversight Office
(ISOO) Controlled Unclassified Information (CUI) notices
- National Institute of Standards and Technology (NIST) Special Publications 800-171, 800-172, 800-171A
Subordinate Policies
- Cybersecuruty Maturity Model Certification (CMMC
- DoD Instructions 5200.48
Defense Federal Acquisition Regulations Supplement (DFARS)
DoD’s counterpart to Federal Acquisition Regulation (FAR) 52
Represent a significant philosophical change in how the nation’s data is secured, including the creation of the CMMC ecosystem
Cybersecurity Maturity Model Certification (CMMC)
DOD initiative to verify contracting cyber security preparedness.
An enhancement and set of constraints upon the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171/2
DoD Instruction 5200.48, Controlled Unclassified Information
Policies to improve how Controlled Unclassified Information (CUI) is marked, handled, and managed within DoD
Defense Federal Acquisition Regulations Supplement (DFARS) Clause 252.204-7012
(Safeguarding Covered Defense Information and Cyber Incident Reporting)
Identifies requirements for protecting Cyber Defense Information (CDI) and reporting cyber incidents
Requires compliance with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171
Global self-attestation by contract signature
Self-attest only
Defense Federal Acquisition Regulations Supplement (DFARS) Clause 252.204-7019
(Notice of NIST SP 800-171 DoD Assessment Requirements)
Identifies the DoD’s cybersecurity assessment requirements
Detailed self-attestation
Defense Industry Base (DIB) contractors must formally report to DoD a summary score of their NIST SP 800-171 compliance
Subject to Defense Contract Management Agency (DCMA) audits
Defense Federal Acquisition Regulations Supplement (DFARS) Clause 252.204-7020
(NIST SP 800-171 DoD Assessment Requirements)
Defines how DoD will conduct different types of assessments
Defense Federal Acquisition Regulations Supplement (DFARS) Clause 252.204-7021
(Contractor Compliance with the Cybersecurity Maturity Model Certification (CMMC) Level Requirement)
Covers the Cybersecurity Maturity Model Certification (CMMC) Model Requirement
Enacts Cybersecurity Maturity Model Certification (CMMC)
Cybersecurity Maturity Model Certification (CMMC) background Regulations and Standards
2002 Federal Information Security Management (FISMA) Act
2005 Risk Management Framework (RMF)
2011 Federal Risk and Authorization Management Program (FedRAMP)
2020 Cybersecurity Maturity Model Certification (CMMC)
Risk Management Framework (RMF)
Designed to help Federal agencies meet Federal Information Security Management Act (FISMA) requirements
Risk Management Framework (RMF) Process (7 Steps)
Prepare
Categorize
Select Controls
Implement Controls
Assess Controls
Authorize Systems
Monitor Systems
Risk Management Framework (RMF) Process - Prepare
Establish context and priorities
Risk Management Framework (RMF) Process - Categorize
Categorize information systems
Risk Management Framework (RMF) Process - Select Controls
Tailor controls to reduce risk to an acceptable level based on risk assessment
Risk Management Framework (RMF) Process - Implement Controls
Implement security controls
Risk Management Framework (RMF) Process - Assess Controls
Assess controls to see if they were implemented properly and have desired outcomes
Risk Management Framework (RMF) Process - Authorize Systems
Authorize Information Systems
Risk Management Framework (RMF) Process - Monitor Security Controls
Ensure ongoing effectiveness