Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Cyber Security, DFARS, NIST SP800-171, and or other requirements

Posted on 2016-11-02
2
Medium Priority
?
37 Views
Last Modified: 2016-11-22
Just a general question as to how many corporate users are having to respond to requests to meet NIST SP800-171 or other types of additional Cyber Security requirements and how you are responding.
0
Comment
Question by:Michael Opalinski
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points (awarded by participants)
ID: 41871990
I will say broadly it is more of SP 800-53 instead for compliance in the govt asset and setting it as baseline controls intended for use by mainly federal agencies in contracts or other agreements established between those agencies and nonfederal organizations (e.g., government contractors). Be The compliance is more for those under the Controlled Unclassified Information (CUI) requirements within NIST 800-171 are directly linked to NIST 800-53 MODERATE baseline controls. So if you have dealing with govt on those information, this compliance is required. In short it cover all applicable parties and the count of users may not be significant as it applies to all of them as the employee of the company.
0
 
LVL 65

Expert Comment

by:btan
ID: 41897219
As per advice.
1

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're a modern-day technology professional, you may be wondering if certifications are really necessary. They are. Here's why.
This article covers the basics of data encryption, what it is, how it works, and why it's important. If you've ever wondered what goes on when you "encrypt" data, you can look here to build a good foundation for your personal learning.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question