Top Ten Tips for Defense Contractors

Top Ten Tips for Defense Contractors
Over the last year we have offered a lot of tips and advice for defense contractors in the Defense Industrial Base (DIB). We thought we would gather up the ten tips we thought were the most important. We hope you find this a helpful resource as you prepare for CMMC compliance. If you are ready for your assessment or want to talk to us about your assessment, just use this link to pick a time that works for you. 
  1. Make sure you understand your contract. Does it specify that you will be handling, processing, or storing CUI? Do you understand why CUI is a part of your contract? If not, make sure to ask your contracting officer for details.

  2. Isolate CUI as much as you can and also make sure employees who have access to CUI truly need to have that access. This will help define and limit your assessment scope.

  3. Even though you may not have a large team, make sure a leader is assigned who is responsible for staying abreast of new cybersecurity compliance rules and regulations

  4. Understand your company’s appetite for cybersecurity risk. You can use our resource to help you see where your strengths and weaknesses are currently.

  5. When choosing a tool to help you on your compliance journey, look for an auditor module, all NIST SP 800-171 controls, the ability to store policies and evidence, and a link between controls/objects with policies and evidence files.

  6. Consider the 4 W’s when using an ERP with CUI – Where is your CUI, Who has access to your cui, what data is being stored, why is the data there

  7. Don’t overdo encryption. Consider whether your data truly needs to be encrypted. While encryption can be highly beneficial, it can also be risky if keys are misplaced or personnel changes.

  8. If you can remove CUI from a specialized asset (like a machine connected to the Internet of Things (IoT).

  9. Consider pursuing an ISO 27001 while pursuing your CMMC certification. Watch this ISO 27001 webinar to learn more.

  10. Never conduct sensitive communications on untrusted networks.


What questions do you have that have not been answered here? Let us know and we will cover it in a future blog post or webinar. 

 

Cancel
Show Policy

Latest Resources

See all resources