skip to Main Content

The Defense Federal Acquisition Regulations (DFAR) are changing for cyber security.  Below are the minimum cyber security requirements required by a company that is currently in the Defense supply chain. These requirements must be met by December 31, 2017 unless extended once again by the Defense department. If you are a Tier 1 supplier, it is all but certain the company will be required to meet these minimum requirements. If you are in the supply chain, it will be up to the main supplier to push these requirements “down the chain”. It should be expected this will occur as the Tier 1 supplier could be in jeopardy of losing their Defense contract if the entire process does not meet the minimum criteria.  If you need assistance with meeting the expectations- Call MANTEC First- 717-843-5054


  1.  Limit system access to the types of transactions and functions that authorized users are permitted to execute.
  2. Limit unsuccessful login attempts.


  1. Ensure that managers, systems administrators, and all users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems.
  2. Provide security awareness training on recognizing and reporting potential indicators of insider threat.


  1. Create, protect, and retain system audit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate system activity.
  2. Protect audit information and audit tools from unauthorized access, modification, and deletion.


  1. Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles.
  2. Control and monitor ALL user-installed software.


  1. Enforce a minimum password complexity and change of characters when new passwords are created.
  2. Prohibit password reuse for a specified number of generations.


  1. Establish an operational incident-handling capability for organizational systems that includes adequate preparation, detection, analysis, containment, recovery, and user response activities.
  2. Track, document, and report incidents to appropriate officials and/or authorities both internal and external to the organization.


  1. Perform maintenance on organizational systems.  Applying systems updates in an appropriate timely manner.
  2. Ensure equipment removed for off-site maintenance is sanitized of any Controlled Unclassified Information.


  1. Protect (i.e., physically control and securely store) system media containing Controlled Unclassified Information, both paper and digital.
  2. Mark media with necessary Controlled Unclassified Information markings and distribution limitations.


  1. Screen individuals prior to authorizing access to organizational systems containing Controlled Unclassified Information.
  2. Ensure that Controlled Unclassified Information and organizational systems containing Controlled Unclassified Information are protected during and after personnel actions such as terminations and transfers.


  1. Limit physical access to organizational systems, equipment, and the respective operating environments to authorized individuals.
  2. Escort visitors and monitor visitor activity.


  1. Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of Controlled Unclassified Information.
  2. Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified.


  1. Periodically assess the security controls in organizational systems to determine if the controls are effective in their application.
  2. Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems.


  1. Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems.
  2. Implement cryptographic mechanisms to prevent unauthorized disclosure of Controlled Unclassified Information during transmission unless otherwise protected by alternative physical safeguards.


  1. Provide protection from malicious code at appropriate locations within organizational systems.
  2. Update malicious code protection mechanisms when new releases are available.
Back To Top