Solved

Cyber Security, DFARS, NIST SP800-171, and or other requirements

Posted on 2016-11-02
2
29 Views
Last Modified: 2016-11-22
Just a general question as to how many corporate users are having to respond to requests to meet NIST SP800-171 or other types of additional Cyber Security requirements and how you are responding.
0
Comment
Question by:mopalinski
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 64

Accepted Solution

by:
btan earned 500 total points (awarded by participants)
ID: 41871990
I will say broadly it is more of SP 800-53 instead for compliance in the govt asset and setting it as baseline controls intended for use by mainly federal agencies in contracts or other agreements established between those agencies and nonfederal organizations (e.g., government contractors). Be The compliance is more for those under the Controlled Unclassified Information (CUI) requirements within NIST 800-171 are directly linked to NIST 800-53 MODERATE baseline controls. So if you have dealing with govt on those information, this compliance is required. In short it cover all applicable parties and the count of users may not be significant as it applies to all of them as the employee of the company.
0
 
LVL 64

Expert Comment

by:btan
ID: 41897219
As per advice.
1

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of you may be aware of the recent Google Docs scam emails that have been floating around coming from various people that you know. Here's a guide on identifying How To Identify the Scam Email You will see an email from someone you’ve had co…
Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question