Our Top Five Blog Posts of 2020

By Kristen Morales • December 30, 2020

As 2020 ends, and if you missed them, we have rounded up five of our most popular blog posts. 

This past year was filled with discussion and updates regarding CMMC and NIST 800-171, so not surprisingly, these top posts cover NIST controls, the DFARS Interim Rule, as well as the steps required to ensure new Department of Defense (DoD) regulations are met.

 

Let’s get started.

 

The first two blog posts touch on NIST 800-171 and CMMC control compliance.

1. Top Five Most Difficult Controls to Implement Under NIST 800-171

As Prime and Sub-contractors begin to learn more about the regulations required to maintain or win new DoD revenue, you may wonder if your competitors share the issues you are running up against as you work to become compliant. Questions around the topmost complicated controls to implement, the why behind their complexity, and how you can overcome the obstacles they create are covered in this post. 

 

2. What is the CMMC Shared Security Model and Why is it Needed?

For commercial firms providing services to the U.S. defense industry, the challenge that is cybersecurity has been growing for years but mainly without any oversight from the DoD. Specifically, the collection of Controlled Unclassified Information (CUI) on unregulated and often under secured contractor networks across the DoD supply chain has become a risk that requires addressing for the DoD. This post explains how a CMMC shared security model assures coverage of all areas of the security environment to meet compliance.  

 

The next two blogs posts cover the DFARS Interim Rule before becoming law on December 1st. Though each post was designed to examine the interim rule, the guidance offered still applies since the rule’s transition into law.

3. DFARS Interim Rule: What You Must Do Immediately

The post goes through what is required of you today to be compliant with the updated DFARS clause that is now law.

 

4. DFARS Interim Rule and Emergency Justification FAQ: Everything You Need to Know

A robust, frequently asked question post with the answers necessary to understand the law’s impact on your business and what actions you must take to maintain competitiveness.

 

Lastly, our final post provides a step-by-step guide assuring the latest DoD regulation is met.

5. Step-by-Step Guide to SPRS NIST 800-171 Assessment Submittal

As of December 1st, the DFARS Interim Rule has become law; reinforcing suppliers need to submit their NIST 800-171 assessment score to the government to avoid lost DoD revenue.

The CyberSheath team works with our clients to ensure they meet all DoD cybersecurity requirements, and to that end, have assisted in the submittal of their assessment to the SPRS. This post contains a step-by-step guide walking through successfully creating an account and submitting your assessment score to the government.

Cybersheath Blog

3 Reasons Why You Need a Privileged Access Risk Assessment

A privileged account is one used by administrators to log in to servers, networks, firewalls, databases, applications, cloud services and other systems used by your organization. These accounts give enhanced permissions that allow the privileged user to access sensitive data or modify key system functions, among other things. You can…

Incident Response – Learning the Lesson of Lessons Learned

“Those who do not learn from history are condemned to repeat it.” Over the years, variations of this famous quote have been spoken by everyone from philosophers to world leaders. The message — that we must learn from our mistakes or continue to repeat them — is also highly relevant…

What is DFARS 252.204-7012 and NIST SP 800-171?

With the Department of Defense (DoD) promising the release of an update to NIST Special Publication 800-171, it is imperative defense contractors understand what DFARS 252.204-7012 and NIST SP 800-171 Clause is and how noncompliance with the Clause will impact their business.  Compliance is mandatory for contractors doing business with…

Our Trusted Partners

Cyberark McAfee Thycotic RSA Tenable Alien Vault Alert Logic Microsoft