Lesson 1 Definition Flashcards
Defense Industrial Base (DIB)
Worldwide industrial complex, enables research and development and design/production of military weapons and systems to meet US military requirements
Prime Contractors
These contractors receive contracts from the government
Effects of loss of Intellectual Property
- Puts warfighter lives at danger
- Diminishes global competitive advantage
Philosophical change to securing the Nation’s Data
-“protect the information” not “protect the system”
Cybersecurity Maturity Matrix Certification (CMMC) program
- DoD initiative to verify defense contractors’ cybersecurity preparedness and effectiveness
- Standardizes cybersecurity implementation
Internal Intellectual Property (IP)
- The company’s own methods, techniques, inventions
External Intellectual Property
- Partners outside the government; protected by documents such as license agreements and Nondisclosure Agreements (NDAs)
- Federal government; commonly covers Federal Contract Information (FCI) and Controlled Unclassified Information (CUI)
Legal, Regulatory, Policy (LRP) drivers
Laws, regulation, and policies are behind the compliance requirements that government contractors must adhere to
Federal Aquisition Regulation (FAR)
Chapter 1 of Title 48 of the Code of Federal Regulations (CFR); 48 CFR
Provides uniform policies and procedures regarding acquisitions
Documents rules that government contractors are subject to
Defense Federal Acquisitions Regulations (DFARs)
Apply only DoD acquisition activities
Federal Contract Information (FCI) Legal driver
Federal Information Security Modernization Act
Federal Contract Information (FCI) Regulatory driver
Federal Acquisitions Regulation 52 (FAR 52)
What Federal Acquisitions Regulation 52 (FAR 52) covers
Regulation Definitions
Requirements and procedures to safeguard Federal Contract Information (FCI)
Responsibilities when delegating contract work to subcontractors
Federal Acquisition Regulation (FAR) definitions - Covered Contractor Information
Information system that is owned or operated by a contractor that processes, stores, or transmits Federal Contract Information (FCI)
Federal Acquisition Regulation (FAR) definition - Federal Contract Information (FCI)
Information not intended for public release, that is provided or generated for the Government under contract to develop or deliver a product or service to the Government
Federal Acquisition Regulation (FAR) definition - Information
Any communication or representation of knowledge
Federal Acquisition Regulation (FAR) definition - Information System
Set of information resources organized for collection, processing, maintenance, use, sharing, dissemination, or disposition of information
Federal Acquisition Regulation (FAR) definition - Safeguarding
measures or controls prescribed to protect information systems
Federal Acquisition Regulation 52 (FAR 52) safeguarding requirements and procedures 1-6
- Limit information system access to authorized users, processes acting on behalf of authorized users, or devices
- Limit information system access to the types of transactions and functions that authorized users are permitted to execute
- Verify and control/limit connections to and use of external information systems
- Control information posted or processed on publicly accessible information systems
- Identify information system users, processes acting on behalf of users, or devices
- Authenticate the identities of those users, processes, or devices, before allowing access to organizational information systems
Federal Acquisition Regulation 52 (FAR 52) safeguarding requirements and procedures 7-15
- Sanitize or destroy information system media containing Federal Contract Information (FCI) before disposal or release for reuse
- Limit physical access to organizational information systems, equipment, and the operating environment to authorized individuals
- Escort visitors and monitor visitor activity, maintain audit logs of physical access, control and manage physical access devices
- Monitor, control, and protect organizational communications at the external boundary and key internal boundaries of the information systems
- Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks
- Identify, report, and correct information and information system flaws in a timely manner
- Provide protection from malicious code
- Update malicious code protection mechanisms
- Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed
Controlled Unclassified Information (CUI) Legal drivers
2002 Federal Information Security Management Act amended 2014
Executive order 13556, Controlled Unclassified Information
Controlled Unclassifed Information (CUI) Regulatory driver
32 Code of Federal Regulation (CFR) Part 2002, Controlled Unclassified Information