Guest Column | November 30, 2017

An MSP Weighs In On Incident Reporting Compliance Responsibilities Under NIST 800-171

Regulatory Compliance Elevated Standards

By Tyler Hardison, CISSP, Director of Solutions and Innovation, Redhawk Network Security

I recently wrote about how MSPs can help companies prepare for NIST 800-171 compliance. Yet, despite best compliance and security efforts, plans, and procedures, cyber incidents are still part of doing business. Your organization’s data has been breached, or will be at some point. Cybersecurity is often an afterthought or considered too expensive, leaving smaller organizations vulnerable and exposed—when in fact, half of all cyber attacks target small businesses, according to the National CyberSecurity Alliance.

But first, what is a cyber incident? A cyber incident is defined as actions taken through the use of computer networks that result in a compromise or an actual or potentially adverse effect on an information system and/or the information residing therein.

Incident response is one of the 14 requirements outlined in the National Institute of Standards and Technology’s (NIST) Special Publication (SP) 800-171—Protecting Controlled Unclassified Information (CUI) in Nonfederal Information Systems and Organizations, and enforced by the U.S. Department of Defense (DoD). If your organization contracts for the government, you must implement all 14 of these security requirements and controls by December 31, 2017. Simply put, if you do not comply, you risk losing your contracts, costing your organization millions of dollars in lost revenue.

Incident Reporting Compliance Requirements

What is your organization doing to prepare for the inevitable? Are you prepared to successfully respond to cyber incidents, whether they stem from malware, denial-of-service (DoS) attacks, stolen passwords, or lost laptops? Don’t panic. Here are the compliance requirements required for incident reporting.

According to NIST SP 800-171 section 3.6, the Incident Response family of security requirements focuses on establishing an operational incident-handling capability for organizational information systems that includes adequate preparation, detection, analysis, containment, recovery, and user response. You must acquire a medium assurance certificate to access the reporting site. So, this is the first step.

Cyber incidents that impact a system within the scope of Defense Acquisition Regulations System (DFARS) must be reported within 72 hours of detection. To report cyber incidents, you must have a medium assurance certificate. A review must be conducted so that the scope of the compromise can be understood. At a minimum, this review must cover:

  • Identification of affected systems
  • Affected users accounts
  • Affected data
  • Other systems that might have been compromised

Who Should Report and Why?

  • DoD contractors report cyber incidents in accordance with the DFARS Clause 252.204-7012
  • DoD contractors report in accordance with other reporting requirements identified in a contract or other agreement
  • DoD Cloud Service Providers report cyber incidents in accordance with clause 252.239-7010, Cloud Computing Services
  • DoD's Defense Industrial Base Cybersecurity Program (DIB CS) Participants report cyber incidents in accordance with the Framework Agreement (FA)

The DoD has the right to request further information in order to investigate the cyber incident. To this end, the contractor:

  • Should take images of affected systems and any relevant monitoring/packet capture data for at least 90 days from the submission of the cyber incident report to allow the DoD to request the media or decline interest.
  • Provide access to the DoD in order to carry out forensic analysis.
  • Work with the DoD to provide any additional information that is required to complete the investigation.

What Do DoD Contractors Need to Report?

DoD contractors shall report as much of the following information as can be obtained to DoD within 72 hours of discovery of any cyber incident:

  1. Company name
  2. Company point of contact information (address, position, telephone, email)
  3. Data Universal Numbering System (DUNS) Number
  4. Contract number(s) or other type of agreement affected or potentially affected
  5. Contracting Officer or other type of agreement point of contact (address, position, telephone, email)
  6. USG Program Manager point of contact (address, position, telephone, email)
  7. Contract or other type of agreement clearance level (Unclassified, Confidential, Secret, Top Secret, Not applicable)
  8. Facility CAGE code
  9. Facility Clearance Level (Unclassified, Confidential, Secret, Top Secret, Not applicable)
  10. Impact to Covered Defense Information
  11. Ability to provide operationally critical support
  12. Date incident discovered
  13. Location(s) of compromise
  14. Incident location CAGE code
  15. DoD programs, platforms or systems involved
  16. Type of compromise (unauthorized access, unauthorized release (includes inadvertent release), unknown, not applicable)
  17. Description of technique or method used in cyber incident
  18. Incident outcome (successful compromise, failed attempt, unknown)
  19. Incident/Compromise narrative
  20. Any additional information

Knowing and implementing the NIST 800-171 requirements—all 14 of them including incident response —is not only a good way to mitigate risk and minimize data exposure but critical to maintaining your organization’s compliance and status with the federal government. Whether your organization needs a risk assessment, help meeting regulatory compliance requirements, or needs complete end-to-end security and network heavy lifting, Redhawk Network Security can help.

Tyler Hardison, CISSP, Director of Solutions and Innovation, Redhawk Network SecurityAs Director of Solutions and Innovation at Redhawk Network Security, Tyler Hardison is responsible for developing solutions for clients with the Solutions Architect team. He is also responsible for leading Redhawk’s innovation and developing new service solutions. Tyler is also responsible for leading the development team on the CyberSecurity Portal. Tyler is a  12-year veteran of technology management in the financial services industry. Rising from helpdesk to become CIO of a $3 billion Credit Union in California, Tyler has been at the forefront of the regulatory changes and the tools necessary to keep up. Tyler has a CISSP and is a PCI Qualified Security Assessor.