Attorney Authored
Cyberattack Reporting Rule for Federal Contractors Finalized
By Charles A. Patrizia & Mary-Elizabeth M. Hadley
The U.S. Department of Defense (“DoD”) has promulgated a new rule, effective November 3, 2016, that requires federal defense contractors and subcontractors to report within 72 hours any cyber incidents “that result in an actual or potentially adverse effect on a covered contractor information system” (or “covered defense information residing therein”), or that affect “a contractor’s ability to provide operationally critical support.”
I. Cyber Incident Reporting Requirement
A. Coverage
The rule’s mandatory reporting requirements apply broadly to all forms of agreements between DoD and DIB companies, including contracts, grants, cooperative agreements, technology investment agreements as well as “any other type of legal instrument or agreement.”
In defining the “covered defense information” subject to the rule, DoD has harmonized the term with the definition of “controlled unclassified information” utilized elsewhere in the Code of Federal Regulations, as well as with provisions of the Defense Federal Acquisition Regulation Supplement (“DFARS”) and Federal Acquisition Regulations (“FARs”).
Although the rule also defines the term “operationally critical support,” the DoD has promised to develop procedures “to ensure that contractors are notified when they are providing supplies or services designated as operationally critical support.”
B. 72-Hour Requirement
Covered incidents must be “rapidly” reported “within 72 hours of discovery.”
The DoD further explained that the 72-hour reporting time frame has been part of its DIB CS program since 2008 and, since that time, “has proven to be an effective balance of the need for timely reporting while recognizing the challenges inherent in the initial phases of investigating a cyber incident.”
Among the information to be included in the initial report are an assessment of the impact of the cyber incident, description of the technique or method used, and a summary of information compromised.
C. Associated Costs
In addition to costs associated with identifying, analyzing, and reporting security incidents and their impact on covered defense information or a contractor’s ability to provide operationally critical support, contractors are obligated to obtain “DoD-approved medium assurance certificates to ensure authentication and identification when reporting cyber incidents to DoD.”
D. Other Obligations Remain
Contractors remain responsible for complying with any other applicable cyber incident reporting requirements. In reporting incidents involving classified information on classified contractor systems, for example, contractors must comply with the National Industrial Security Program Operating Manual (“NISPOM”).
II. Voluntary Cyber Threat and Cybersecurity Information Sharing
In addition to the mandatory reporting requirements, the rule also addresses voluntary participation in the DIB CS information sharing program—modifying the eligibility criteria to enable greater participation.
A. Benefits of the Program
The DIB CS program offers eligible DIB participants the ability to receive cyber threat information from the government and other DIB contractors, leading to enhanced insight into adversarial activities threatening them.
B. Participation Requirements
To participate in the DIB CS program under the rule, a contractor must satisfy a number of criteria. First, it must be a cleared defense contractor (“CDC”), defined as “a private entity granted clearance by DoD to access, receive, or store classified information for the purpose of bidding for a contract or conducting activities in support of any program of DoD.”
III. Conclusion
Covered contractors and subcontractors should assess their incident response policies and procedures to ensure they have adequate mechanisms in place to identify and report security incidents to the DoD in the required 72 hours. Additionally, if eligible, entities should consider joining the DIB CS program to benefit from the exchange of potential threat information with the government and other contractor participants.
Contributors




Practice Areas
For More Information



