<img src="https://ws.zoominfo.com/pixel/4CagHYMZMRWAjWFEK36G" width="1" height="1" style="display: none;">
Request Demo

Audit Management, DFARS, Corporate Compliance and Oversight, Cybersecurity Frameworks

Defense Contractors: How to Approach Meeting NIST SP 800-171 Requirements

down-arrow

Fifth Domain just published an article written by CyberSaint CEO, George Wrenn.

Just about all defense contractors are smaller organizations than the U.S. Department of Defense, and very few are well versed in the often obscure terms and acronyms used by it.

At the same time, all defense contractors must be compliant with the National Institute of Standards and Technology Special Publication 800-171 (NIST SP 800-171) by Dec. 31, 2017. The Special Publication describes what they must do to protect covered defense information (CDI) and controlled unclassified information (CUI). This information can pass through their IT systems as a result of the activities they conduct in support of the various DoD departments and agencies.

Few civilian organizations are as prepared as they should be at this point for the level of specificity and the DFARS compliance requirements that military agencies see as standard. NIST SP 800-171 helps these organizations comply so that they aren’t prevented from doing business with the military.

Here are a few key ways in which defense contractors (especially smaller defense contractors), can properly prepare themselves to achieve full compliance with NIST SP 800-171, a 76-page document that can be accessed on NIST’s website.

Read the full article, written by CyberSaint CEO George Wrenn on Fifth Domain Cyber.

You may also like

Compliance and Regulations for ...
on January 9, 2023

Compliance for many cybersecurity programs has been the cornerstone and the catalyst for why many programs exist in the first place. Since the rise of the information technology ...

Cyber Risk Quantification: Metrics ...
on January 6, 2023

Risk management is the new foundation for an information security program. Risk management, coupled with necessary compliance activities to support ongoing business operations, ...

Padraic O'Reilly
Cybersecurity Maturity Models You ...
on December 30, 2022

Cybercrime has forced businesses worldwide into paying billions of dollars yearly. As more of the population becomes dependent on technology, the fear of cyber attacks continues ...

Top 10 Risks in Cyber Security
on December 23, 2022

Increasing cyber security threats continue creating problems for companies and organizations, obliging them to defend their systems against cyber threats. According to research ...

Governance and Process Automation
on December 21, 2022

Any enterprise operating at scale understands the need for standardization and strong corporate governance. Having served Fortune 50 companies for decades, I have seen the ...

Jerry Layden
Introducing Crosswalking Templates
on December 19, 2022

Crosswalking can be a handy tool to view control performance for a single asset/system against multiple frameworks. One can complete an assessment using one framework by ...