This new rule applies to information systems that are owned or operated by a contractor that processes, stores, or transmits Federal contract information. Federal contract information is information that is not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government. It does not include information provided by the Government to the public or simple transactional information, such as necessary to process payments.
Information includes any communication or representation of knowledge such as facts, data, or opinions, in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual. Information system, in this context, means a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.
So, what are the new expectations for safeguarding such information? Well, the FAR Councils have come up with a list of 15 basic safeguarding requirements and procedures.
- Limit information system access to authorized users
- Limit information system access to the type of transactions and functions that authorized users are permitted to execute.
- Verify and control/limit connections to and use of external information systems.
- Control information posted or processed on publicly accessible information systems.
- Identify information system users, processes acting on behalf of users, or devices.
- Authenticate the identities of those users, processes, or devices, as a prerequisite to allowing access to organization information systems.
- Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse.
- Limit physical access to organization information systems, equipment, and the respective operating environments to authorized individuals.
- Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices.
- Monitor, control, and protect organization communications.
- Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
- Identify, report, and correct information and information system flaws in a timely manner.
- Provide protection from malicious code at appropriate locations within organizational information systems.
- Update malicious code protection mechanisms when new releases are available.
- Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
These safeguards are basically fundamental internal controls for any information system. Most likely, larger contractors already have them (or their equivalent) in place. Smaller contractors may have a bit of work to do, providing they are covered by the new rule. Even if not covered, contractors would do well to use this as a checklist for assessing the adequacy and sufficiency of internal controls over their own information systems.
The new rule contains a flow-down provision to subcontractors.
No comments:
Post a Comment