{"id":251,"date":"2014-04-23T00:00:00","date_gmt":"2014-04-23T00:00:00","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/"},"modified":"2024-06-23T23:07:37","modified_gmt":"2024-06-23T23:07:37","slug":"new-far-regulations-pushing-small-firms-to-upgrade","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/","title":{"rendered":"DFARS Regulations Pushing Small Firms to Upgrade"},"content":{"rendered":"<p>With the renewed emphasis within the U.S. Department of Defense (DOD) on trustworthy information systems and supply chain security, it is essential for companies in the DOD vendor supply chain to have the capability to express their information security policies and procedures with clarity and specificity.\u00a0 This will demonstrate compliance with, at a minimum:<\/p>\n<ul>\n<li>DFARS Subpart 204.73<\/li>\n<li>NIST Special Publication 800-53, Rev.4<\/li>\n<li>FIPS Publications 199 &amp; 200<\/li>\n<li>NIST Special Publication 800-37<\/li>\n<li>NIST Special Publication 800-39<\/li>\n<\/ul>\n<p>These regulations are authorized by the 2002 Federal Information Security Management Act (FISMA) information technology requirements and emphasize, among other things, the supply chain protection elements DOD must consider when procuring systems, components, and services necessary for mission success. To ensure to DOD that a company has such capabilities a demonstration of the security controls that a company in the supply chain currently has in place must be made.\u00a0 And, according to regulations issued in November, 2013, and updated December, 2014, this demonstration must be made in accordance with best practices as outlined in the National Institute for Standards and Technology (NIST) Special Publication (SP) 800-53, Revision 4, Appendices F &amp; G.\u00a0 If such controls are found to be insufficient in an initial assessment, a step-by-step remediation plan should be outlined and implemented according to a systematic schedule.<\/p>\n<p><strong>Background<\/strong><\/p>\n<p>Vendors in the DOD supply chain have a responsibility to meet the requirements of DFARS Subpart 204.73 (added November 18, 2013) for safeguarding \u201c<em>unclassified controlled technical information<\/em>\u201d residing on or transiting through unclassified information systems. DOD vendors are also responsible for reporting an incident to DOD within 72 hours of discovery in accordance with criteria set forth in FAR Subpart 252.204-7012. A cyber incident would include exfiltration, manipulation or other loss or compromise of data or any other activity that constitutes a breach of authorized access.\u00a0 Incident data that must be reported includes:<\/p>\n<ul>\n<li>Data Universal Numbering System (DUNS)<\/li>\n<li>Contract numbers affected unless all contracts by the company are affected<\/li>\n<li>Facility CAGE code if the location of the event is different than the prime Contractor location<\/li>\n<li>Point of contact if different than the POC recorded in the System for Award Management (address, position, telephone, email)<\/li>\n<li>Contracting Officer point of contact (address, position, telephone, email)<\/li>\n<li>Contract clearance level<\/li>\n<li>Name of subcontractor and CAGE code if this was an incident on a Sub-contractor network<\/li>\n<li>DoD programs, platforms or systems involved<\/li>\n<li>Location(s) of compromise and date discovered<\/li>\n<li>Type of compromise (e.g., unauthorized access, inadvertent release, other)<\/li>\n<li>Description of technical information compromise.<\/li>\n<\/ul>\n<p><strong>Summary of Controls<\/strong><\/p>\n<p>The key controls that a company must ensure are divided into 14 major categories<\/p>\n<table width=\"672\">\n<tbody>\n<tr>\n<td width=\"668\">\n<ul>\n<li>AC: Access Control<\/li>\n<li>AT: Awareness and Training<\/li>\n<li>AU: Auditing and Accountability<\/li>\n<li>CM: Configuration Management<\/li>\n<li>CP: Contingency Planning<\/li>\n<li>IA: Identification and Authentication<\/li>\n<li>IR: Incident Response<\/li>\n<li>MA: Maintenance<\/li>\n<li>MP: Media Protection<\/li>\n<li>PE: Physical &amp; Environmental Protection<\/li>\n<li>PM: Program Management<\/li>\n<li>RA: Risk Assessment<\/li>\n<li>SC: System &amp; Communications Protection<\/li>\n<li>SI: System &amp; Information Integrity<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"668\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Specific controls that map back to NIST SP 800-53 are called out in the DFARS.\u00a0 From 12 to 3 specific controls have been specified within each of the 14 categories and, when combined and fully operational, the control set is aimed at building a defense-in-depth cybersecurity strategy.<\/p>\n<p><strong>Compliance Challenges<\/strong><\/p>\n<p>According to several interviews with DOD prime contractors that purchase goods and services from specialty firms, many of their suppliers are smaller firms without the in-house information technology capabilities to implement FAR 204.\u00a0 These small and medium-sized enterprises (SMEs) must first perform a baseline assessment of their current conditions in each of these categories.\u00a0 They must then map their current implementation to applicable regulatory controls and assign priorities to each.\u00a0 They must then begin a systematic process for upgrading their administrative, technical and operational controls to meet the NIST 800-53 Standard.\u00a0 This is an expensive and time-consuming process that will take these SME personnel away from their core responsibilities, and divert them toward a regulatory and compliance activity that will not help their bottom line.\u00a0 However, given the uptick in cyber-attacks on US targets, this is likely to be a time-consuming, but necessary process.<\/p>\n<p>The Defense Industrial Base &#8211; Information Sharing and Analysis Center (DIB &#8211; ISAC) has developed a program for verifying compliance in accordance with these rules; CyberVerify. \u00a0CTIN is currently developing a SaaS-based software application to make the compliance process less painful for the small companies subject to these rules; VendorCET. Contact us at: rjg (at) ctin.us for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent FAR regulation changes.<\/p>\n","protected":false},"author":2,"featured_media":3697,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[27,122],"tags":[264,265,266,267,218,268,269],"class_list":["post-251","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy","category-regulations","tag-defense-industry","tag-dfars-204-73","tag-federal-acquisition-regulations","tag-fips","tag-nist","tag-nist-sp-800-53","tag-policy"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent FAR regulation changes.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"DFARS Regulations Pushing Small Firms to Upgrade - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent FAR regulation changes.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2014-04-23T00:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-23T23:07:37+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"DFARS Regulations Pushing Small Firms to Upgrade - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent FAR regulation changes.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2014\\\/04\\\/23\\\/new-far-regulations-pushing-small-firms-to-upgrade\\\/#blogposting\",\"name\":\"DFARS Regulations Pushing Small Firms to Upgrade - CTIN\",\"headline\":\"DFARS Regulations Pushing Small Firms to Upgrade\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/CyberAttack-Meme.png\",\"width\":1209,\"height\":675,\"caption\":\"Abstract background blue with \\\"cyber attack\\\" in red letters\"},\"datePublished\":\"2014-04-23T00:00:00+00:00\",\"dateModified\":\"2024-06-23T23:07:37+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2014\\\/04\\\/23\\\/new-far-regulations-pushing-small-firms-to-upgrade\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2014\\\/04\\\/23\\\/new-far-regulations-pushing-small-firms-to-upgrade\\\/#webpage\"},\"articleSection\":\"Policy, Regulations, defense industry, DFARS 204.73, federal acquisition regulations, FIPS, nist, NIST SP 800-53, policy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2014\\\/04\\\/23\\\/new-far-regulations-pushing-small-firms-to-upgrade\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"position\":3,\"name\":\"CyberSecurity\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"name\":\"Policy\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"position\":4,\"name\":\"Policy\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2014\\\/04\\\/23\\\/new-far-regulations-pushing-small-firms-to-upgrade\\\/#listItem\",\"name\":\"DFARS Regulations Pushing Small Firms to Upgrade\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2014\\\/04\\\/23\\\/new-far-regulations-pushing-small-firms-to-upgrade\\\/#listItem\",\"position\":5,\"name\":\"DFARS Regulations Pushing Small Firms to Upgrade\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"name\":\"Policy\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2014\\\/04\\\/23\\\/new-far-regulations-pushing-small-firms-to-upgrade\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2014\\\/04\\\/23\\\/new-far-regulations-pushing-small-firms-to-upgrade\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2014\\\/04\\\/23\\\/new-far-regulations-pushing-small-firms-to-upgrade\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2014\\\/04\\\/23\\\/new-far-regulations-pushing-small-firms-to-upgrade\\\/\",\"name\":\"DFARS Regulations Pushing Small Firms to Upgrade - CTIN\",\"description\":\"Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent FAR regulation changes.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2014\\\/04\\\/23\\\/new-far-regulations-pushing-small-firms-to-upgrade\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/CyberAttack-Meme.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2014\\\/04\\\/23\\\/new-far-regulations-pushing-small-firms-to-upgrade\\\/#mainImage\",\"width\":1209,\"height\":675,\"caption\":\"Abstract background blue with \\\"cyber attack\\\" in red letters\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2014\\\/04\\\/23\\\/new-far-regulations-pushing-small-firms-to-upgrade\\\/#mainImage\"},\"datePublished\":\"2014-04-23T00:00:00+00:00\",\"dateModified\":\"2024-06-23T23:07:37+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>DFARS Regulations Pushing Small Firms to Upgrade - CTIN<\/title>\n\n","aioseo_head_json":{"title":"DFARS Regulations Pushing Small Firms to Upgrade - CTIN","description":"Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent FAR regulation changes.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/#blogposting","name":"DFARS Regulations Pushing Small Firms to Upgrade - CTIN","headline":"DFARS Regulations Pushing Small Firms to Upgrade","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2014\/04\/CyberAttack-Meme.png","width":1209,"height":675,"caption":"Abstract background blue with \"cyber attack\" in red letters"},"datePublished":"2014-04-23T00:00:00+00:00","dateModified":"2024-06-23T23:07:37+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/#webpage"},"articleSection":"Policy, Regulations, defense industry, DFARS 204.73, federal acquisition regulations, FIPS, nist, NIST SP 800-53, policy"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","position":3,"name":"CyberSecurity","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","name":"Policy"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","position":4,"name":"Policy","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/#listItem","name":"DFARS Regulations Pushing Small Firms to Upgrade"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/#listItem","position":5,"name":"DFARS Regulations Pushing Small Firms to Upgrade","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","name":"Policy"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/","name":"DFARS Regulations Pushing Small Firms to Upgrade - CTIN","description":"Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent FAR regulation changes.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2014\/04\/CyberAttack-Meme.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/#mainImage","width":1209,"height":675,"caption":"Abstract background blue with \"cyber attack\" in red letters"},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/#mainImage"},"datePublished":"2014-04-23T00:00:00+00:00","dateModified":"2024-06-23T23:07:37+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"DFARS Regulations Pushing Small Firms to Upgrade - CTIN","og:description":"Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent FAR regulation changes.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2014-04-23T00:00:00+00:00","article:modified_time":"2024-06-23T23:07:37+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"DFARS Regulations Pushing Small Firms to Upgrade - CTIN","twitter:description":"Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent FAR regulation changes.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"251","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":null,"schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:16:14","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2021-08-07 21:53:22","updated":"2025-08-25 22:16:14"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/\" title=\"CyberSecurity\">CyberSecurity<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/\" title=\"Policy\">Policy<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tDFARS Regulations Pushing Small Firms to Upgrade\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"CyberSecurity","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/"},{"label":"Policy","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/"},{"label":"DFARS Regulations Pushing Small Firms to Upgrade","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2014\/04\/23\/new-far-regulations-pushing-small-firms-to-upgrade\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=251"}],"version-history":[{"count":4,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/251\/revisions"}],"predecessor-version":[{"id":4433,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/251\/revisions\/4433"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/3697"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}