Solved

Cyber Security, DFARS, NIST SP800-171, and or other requirements

Posted on 2016-11-02
2
22 Views
Last Modified: 2016-11-22
Just a general question as to how many corporate users are having to respond to requests to meet NIST SP800-171 or other types of additional Cyber Security requirements and how you are responding.
0
Comment
Question by:mopalinski
  • 2
2 Comments
 
LVL 62

Accepted Solution

by:
btan earned 500 total points (awarded by participants)
ID: 41871990
I will say broadly it is more of SP 800-53 instead for compliance in the govt asset and setting it as baseline controls intended for use by mainly federal agencies in contracts or other agreements established between those agencies and nonfederal organizations (e.g., government contractors). Be The compliance is more for those under the Controlled Unclassified Information (CUI) requirements within NIST 800-171 are directly linked to NIST 800-53 MODERATE baseline controls. So if you have dealing with govt on those information, this compliance is required. In short it cover all applicable parties and the count of users may not be significant as it applies to all of them as the employee of the company.
0
 
LVL 62

Expert Comment

by:btan
ID: 41897219
As per advice.
1

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Compromised PC? 17 219
forensics tools for file amendments/associations 2 80
Penetration Testing home based work 3 75
Suggestions on remote printing. 3 30
The new Gmail Phishing Scam going around is surprising even the savviest of users with its sophisticated techniques.
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question