Federal Acquisition Regulation; Basic Safeguarding of Contractor Information Systems, 30439-30447 [2016-11001]
Download as PDF
Federal Register / Vol. 81, No. 94 / Monday, May 16, 2016 / Rules and Regulations
Flexibility Act 5 U.S.C. 601, et seq. The
FRFA is summarized as follows:
The final rule, in order to implement 41
U.S.C. 153, sets forth a higher simplified
acquisition threshold (SAT) for overseas
acquisitions in support of humanitarian or
peacekeeping operations.
There were no significant issues raised by
the public in response to the Initial
Regulatory Flexibility Analysis provided in
the proposed rule.
The rule applies only to overseas
acquisitions in support of humanitarian or
peacekeeping operations. In Fiscal Year 2014,
1545 awards were made in support of
humanitarian or peacekeeping operations,
and 585 (37.86 percent) of those were to
small businesses. Additionally, only 81 (5.24
percent) of the awards were valued between
the former threshold of $150,000 and the new
threshold of $300,000. Therefore, it is not
anticipated that this rule will have a
significant economic impact on small
businesses.
Interested parties may obtain a copy
of the FRFA from the Regulatory
Secretariat Division. The Regulatory
Secretariat Division has submitted a
copy of the FRFA to the Chief Counsel
for Advocacy of the Small Business
Administration.
V. Paperwork Reduction Act
This rule does not contain any
information collection requirements that
require the approval of the Office of
Management and Budget under the
Paperwork Reduction Act (44 U.S.C.
chapter 35).
List of Subjects in 48 CFR Parts 2, 4, 13,
18, and 19
Government procurement.
Dated: May 5, 2016.
William Clark,
Director, Office of Government-wide
Acquisition Policy, Office of Acquisition
Policy, Office of Government-wide Policy.
2. Amend section 2.101 by revising
the definition ‘‘Simplified acquisition
threshold’’ to read as follows:
asabaliauskas on DSK3SPTVN1PROD with RULES
■
Definitions.
18:51 May 13, 2016
Jkt 238001
[FAC 2005–88; FAR Case 2011–020; Item
III; Docket No. 2011–0020, Sequence No.
1]
4.1102
[Amended]
3. Amend section 4.1102 by removing
from paragraph (a)(3)(i) ‘‘peacekeeping
operations as defined in 10 U.S.C.
2302(7)’’ and adding ‘‘peacekeeping
operations as defined in 10 U.S.C.
2302(8)’’ in its place.
[Amended]
8. Amend section 19.502–2 by
removing from paragraph (a) ‘‘paragraph
(1) of the Simplified Acquisition
Threshold’’ and adding ‘‘paragraph (1)(i)
of the simplified acquisition threshold’’
in its place.
■
[FR Doc. 2016–10999 Filed 5–13–16; 8:45 am]
BILLING CODE 6820–EP–P
DEPARTMENT OF DEFENSE
GENERAL SERVICES
ADMINISTRATION
NATIONAL AERONAUTICS AND
SPACE ADMINISTRATION
48 CFR Parts 4, 7, 12, and 52
■
PART 13—SIMPLIFIED ACQUISITION
PROCEDURES
13.003
[Amended]
4. Amend section 13.003 by removing
from paragraph (b)(1) ‘‘described in
paragraph (1)’’ and adding ‘‘described in
paragraph (1)(i)’’ in its place.
■
PART 18—EMERGENCY
ACQUISITIONS
[Redesignated as 18.205]
6. Add a new section 18.204 to read
as follows:
■
18.204 Humanitarian or peacekeeping
operation.
(a) A humanitarian or peacekeeping
operation is defined in 2.101.
(b) Simplified acquisition threshold.
The threshold increases when the head
of the agency determines the supplies or
services are to be used to support a
humanitarian or peacekeeping
operation. (See 2.101.)
PART 19—SMALL BUSINESS
PROGRAMS
*
*
*
*
Simplified acquisition threshold
means $150,000, except for—
(1) Acquisitions of supplies or
services that, as determined by the head
VerDate Sep<11>2014
PART 4—ADMINISTRATIVE MATTERS
5. Redesignate section 18.204 as
section 18.205.
PART 2—DEFINITIONS OF WORDS
AND TERMS
*
19.502–2
■
Authority: 40 U.S.C. 121(c); 10 U.S.C.
chapter 137; and 51 U.S.C. 20113.
2.101
of the agency, are to be used to support
a contingency operation or to facilitate
defense against or recovery from
nuclear, biological, chemical, or
radiological attack (41 U.S.C. 1903), the
term means—
(i) $300,000 for any contract to be
awarded and performed, or purchase to
be made, inside the United States; and
(ii) $1 million for any contract to be
awarded and performed, or purchase to
be made, outside the United States; and
(2) Acquisitions of supplies or
services that, as determined by the head
of the agency, are to be used to support
a humanitarian or peacekeeping
operation (10 U.S.C. 2302), the term
means $300,000 for any contract to be
awarded and performed, or purchase to
be made, outside the United States.
*
*
*
*
*
18.204
Therefore, DoD, GSA, and NASA are
amending 48 CFR parts 2, 4, 13, 18, and
19 as set forth below:
■ 1. The authority citation for FAR parts
2, 4, 13, 18, and 19 continues to read as
follows:
30439
19.203
[Amended]
7. Amend section 19.203 by removing
from paragraph (b) ‘‘described in
paragraph (1)’’ and adding ‘‘described in
paragraph (1)(i)’’ in its place.
■
PO 00000
Frm 00013
Fmt 4701
Sfmt 4700
RIN 9000–AM19
Federal Acquisition Regulation; Basic
Safeguarding of Contractor
Information Systems
Department of Defense (DoD),
General Services Administration (GSA),
and National Aeronautics and Space
Administration (NASA).
ACTION: Final rule.
AGENCY:
DoD, GSA, and NASA are
issuing a final rule amending the
Federal Acquisition Regulation (FAR) to
add a new subpart and contract clause
for the basic safeguarding of contractor
information systems that process, store
or transmit Federal contract
information. The clause does not relieve
the contractor of any other specific
safeguarding requirement specified by
Federal agencies and departments as it
relates to covered contractor
information systems generally or other
Federal requirements for safeguarding
Controlled Unclassified Information
(CUI) as established by Executive Order
(E.O.). Systems that contain classified
information, or CUI such as personally
identifiable information, require more
than the basic level of protection.
DATES: Effective: June 15, 2016.
FOR FURTHER INFORMATION CONTACT: Ms.
Cecelia L. Davis, Procurement Analyst,
at 202–219–0202, for clarification of
content. For information pertaining to
status or publication schedules, contact
the Regulatory Secretariat Division at
202–501–4755. Please cite FAC 2005–
88, FAR Case 2011–020.
SUPPLEMENTARY INFORMATION:
SUMMARY:
E:\FR\FM\16MYR2.SGM
16MYR2
asabaliauskas on DSK3SPTVN1PROD with RULES
30440
Federal Register / Vol. 81, No. 94 / Monday, May 16, 2016 / Rules and Regulations
I. Background
This final rule has basic safeguarding
measures that are generally employed as
part of the routine course of doing
business. DoD, GSA, and NASA
published a proposed rule in the
Federal Register at 77 FR 51496 on
August 24, 2012, to address the
safeguarding of contractor information
systems that contain or process
information provided by or generated
for the Government (other than public
information). This proposed rule had
been preceded by DoD publication of an
Advance Notice of Proposed
Rulemaking (ANPR) and notice of
public meeting in the Federal Register
at 75 FR 9563 on March 3, 2010, under
Defense Federal Acquisition Regulation
Supplement (DFARS) Case 2008–D028,
Safeguarding Unclassified Information.
The ANPR addressed basic and
enhanced safeguarding procedures for
the protection of DoD unclassified
information. Resulting public comments
on the DFARS rule were considered in
drafting a proposed FAR rule under
FAR case 2009–030, which focused on
the basic safeguarding of unclassified
Federal information contained within
information systems. On June 29, 2011,
the contents of FAR case 2009–030 were
merged into FAR case 2011–020, Basic
Safeguarding of Contractor Information
Systems.
This rule, which focuses on ensuring
a basic level of safeguarding for any
contractor system with Federal
information, reflective of actions a
prudent business person would employ,
is just one step in a series of coordinated
regulatory actions being taken or
planned to strengthen protections of
information systems. Last summer,
OMB issued proposed guidance to
enhance and clarify cybersecurity
protections in Federal acquisitions
related to CUI in systems that
contractors operate on behalf of the
Government as well as in systems that
are not operated on behalf of an agency
but are used incidental to providing a
product or service for an agency with
particular focus on security controls,
incident reporting, information system
assessments, and information security
continuous monitoring. DOD, GSA, and
NASA will be developing FAR changes
to implement the OMB guidance when
it is finalized.
In addition, we plan to develop
regulatory changes for the FAR in
coordination with National Archives
and Records Administration (NARA)
which is separately finalizing a rule to
implement E.O. 13556 addressing CUI.
The E.O. established the CUI program to
standardize the way the executive
VerDate Sep<11>2014
18:51 May 13, 2016
Jkt 238001
branch handles information (other than
classified information) that requires
safeguarding or dissemination controls.
All of these actions should help,
among other things, clarify the
application of the Federal Information
Security Management Act (FISMA) and
the National Institute of Standards and
Technology (NIST) information systems
requirements to contractors and, by
doing so, help to create greater
consistency, where appropriate, in
safeguarding practices across agencies.
Prior to all of these actions occurring,
DOD has updated a DFARS rule
addressing enhanced safeguarding for
certain sensitive DOD information in
those systems.
Sixteen respondents submitted
comments on this proposed rule.
II. Discussion and Analysis
The Civilian Agency Acquisition
Council and the Defense Acquisition
Regulations Council (the Councils)
reviewed the comments in the
development of the final rule. A
discussion of the comments and the
changes made to the rule as a result of
those comments are provided as
follows:
A. Summary of Significant Changes
From the Proposed Rule
1. Safeguarding of Covered Contractor
Information System
• Provides for safeguarding the
contractor information system, rather
than specific information contained in
the system.
• Revises the title of the case and
throughout the final rule to add the term
‘‘covered’’ to ‘‘contractor information
system,’’ thus indicating that the policy
applies only to contractor information
systems that contain Federal contract
information.
2. Safeguarding Requirements
• Deletes the safeguarding
requirements and procedures in the
clause that relate to transmitting
electronic information, transmitting
voice and fax information, and
information transfer limitations.
• Replaces the other safeguarding
requirements with comparable security
requirements from NIST SP 800–171.
3. Definitions
• Adds definitions of ‘‘covered
contractor information system’’ and
‘‘Federal contract information.’’
• Deletes definitions of ‘‘public
information’’ and all other proposed
definitions in the clause, except
‘‘information,’’ ‘‘information system,’’
and ‘‘safeguarding.’’
PO 00000
Frm 00014
Fmt 4701
Sfmt 4700
4. Applicability
Makes the final rule—
• Applicable below the simplified
acquisition threshold.
• Not applicable to the acquisition of
commercially available off-the-shelf
(COTS) items.
5. Other Safeguarding Requirements
Clarifies that the clause does not
relieve the contractor from complying
with any other specific safeguarding
requirements and procedures specified
by Federal agencies and departments
relating to covered contractor
information systems generally or other
Federal requirements for safeguarding
CUI as established by E.O. 13556.
B. Analysis of Public Comments
1. Scope and Applicability
a. Information Provided by or Generated
for the Government (Other Than Public
Information)
Comments: About half the
respondents commented on the scope
and applicability of the proposed rule,
which required safeguarding of
information provided by or generated
for the Government (other than public
information). The proposed rule
included the statutory definition of
‘‘public information’’ from 44 U.S.C.
3502. The respondents generally
commented on the breadth of the scope
or a lack of clarity.
One respondent urged the FAR
Council to withhold release of a final
rule until NARA implements E.O.
13556, Controlled Unclassified
Information. Without such coordination,
contractors may be required to establish
conflicting protections that may later
conflict or be revised by the
Governmentwide NARA program.
Several respondents were also
concerned about the broad potential
scope of the information subject to these
requirements. One respondent stated
that the rule would cover nearly all
information and all information systems
of any company that holds even a single
Government contract. One respondent
questioned whether ‘‘generated for the
Government’’ just applied to
information that is part of a contract
deliverable, or whether it also covered
information about the contractor’s own
proprietary practices that is submitted
to the Government. Another respondent
was concerned that agencies have
tended to broadly expand FISMA
requirements to information developed
under Federal contracts, regardless of
whether the information is a deliverable
under the contract (e.g., data exchanged
among researchers). One respondent
recommended limiting the covered
E:\FR\FM\16MYR2.SGM
16MYR2
asabaliauskas on DSK3SPTVN1PROD with RULES
Federal Register / Vol. 81, No. 94 / Monday, May 16, 2016 / Rules and Regulations
information to ‘‘information provided
by or delivered to the Government.’’
Another respondent urged narrowing
the rule to the type of information for
which safeguards are warranted, based
on a reasoned risk assessment and costbenefit analysis. One respondent
recommended that the rule should
exclude contractor proprietary or trade
secret data from the scope of
information generated for the
Government, so that the responsibility
for protecting such information remains
with the contractor.
One respondent is concerned that the
Government may send non-public
information to a recipient, who may be
unaware that it is in their possession on
any device, in any form. The
information could be temporarily
exposed, even if transferred and not
retained.
Further, respondents were concerned
about interpretation of the definition of
‘‘public information.’’ Several
respondents considered that the
definition of ‘‘public information’’ was
too narrow, because it requires the
actual disclosure, dissemination, or
disposition of information. One
respondent stated that the Government
has significant volumes of data that
have not yet been made public, but that
may be subject to obligations for
disclosure under a variety of statutes.
Several respondents stated that
contractors cannot readily determine
what information is categorized as
public information, because it is almost
impossible for contractors to keep track
of what information has been released to
the public.
One respondent stated that the
Government should proactively mark
protected materials.
Response: The intent is that the scope
and applicability of this rule be very
broad, because this rule requires only
the most basic level of safeguarding.
However, applicability of the final rule
is limited to covered contractor
information systems, i.e., systems that
are owned or operated by a contractor
that process, store, or transmit Federal
contract information. ‘‘Federal contract
information’’ means information, not
intended for public release, that is
provided by or generated for the
Government under a contract to develop
or deliver a product or service to the
Government, but not including
information provided by the
Government to the public (such as on
public Web sites) or simple
transactional information, such as
necessary to process payments. The
final rule has been coordinated with
NARA. The focus of the final rule is
shifted from the safeguarding of specific
VerDate Sep<11>2014
18:51 May 13, 2016
Jkt 238001
information to the basic safeguarding of
certain contractor information systems.
Therefore, it is not necessary to draw a
fine line as to what information was
‘‘generated for the Government,’’ when
the information is received, or whether
the information is marked. The
requirements pertain to the information
system itself. The type of analysis
required to narrow the rule to the type
of information for which safeguards are
warranted, based on risk-assessment
and cost-benefit analysis, is appropriate
for CUI and the enhanced safeguarding
that would be required for such
information consistent with law,
Federal regulation, and
Governmentwide policy. A prudent
business person would employ this
most basic level of safeguarding, even if
not covered by this rule. This rule is
intended to provide a basic set of
protections for all Federal contract
information, upon which other rules,
such as a forthcoming FAR rule to
protect CUI, may build.
Since the safeguarding applies to the
contractor information system, not to
specific information within the system,
it is irrelevant whether there is also
contractor information in the system.
However, if the contractor stores preexisting proprietary data or trade secrets
in a separate information system, the
contractor can decide how to protect its
own information.
The definition of ‘‘public
information’’ has been deleted, as it is
no longer necessary.
b. Information Residing in or Transiting
Through a Contractor Information
System
Comment: One respondent requested
clarification of the statutory definition
of ‘‘information system,’’ i.e., what
would be the limitation for a system
interfacing with another system. The
respondent requested that the rule
specifically identify the medium of
communication, the mechanism for
delivering the communication, and the
disposition.
Response: Generally, separately
accredited information systems that
interface through loosely coupled
mechanisms, such as email or Web
services, are not considered direct
connections, even if they involve
dynamic interaction between software
systems in different organizations that
are designed to interact with each other
(e.g., messaging, electronic commerce/
electronic data interchange
transactions). It would not be practical
to specify all the possible mechanisms
for interaction among systems, since
they are constantly evolving.
PO 00000
Frm 00015
Fmt 4701
Sfmt 4700
30441
Comment: Another respondent
requested a definition of ‘‘resides on or
transits through’’ an information system.
The respondent is concerned that much
of the focus of information security
efforts is directed at protecting
perimeter devices and may overlook the
necessity of protecting the host servers.
Response: Information ‘‘residing on’’ a
system means information being
processed by or stored on the
information system. ‘‘Transiting
through’’ the system means simple
transport of the data through the system
to another destination (i.e., no local
storage or processing). All of the
controls listed are focused on protection
of the information system (e.g., the host
servers, workstations, routers). None of
the controls are devoted to protection of
‘‘perimeter devices’’ although several
(particularly paragraphs (b)(1)(x) and
(xi)) are applied at the perimeter of the
system.
c. Solicitations
Comment: One respondent was
concerned that the requirements of the
rule were applied to solicitations, thus
imposing this requirement as a barrier to
even bidding on Government work.
Another respondent commented that the
FAR rule would affect not only
companies that receive Government
contracts, but also companies soliciting
Government contracts.
Response: This was not the intent of
the proposed rule. The final rule has
revised the applicability section to
address ‘‘acquisitions’’ rather than
‘‘solicitations and contracts.’’ Of course,
the clause prescription still requires
inclusion of the clause in solicitations,
so that offerors are aware of the clause
that will be included in the resultant
contract. The clause does not take effect
until the offeror is awarded a contract
containing the clause.
d. Fundamental Research
Comment: Two respondents requested
exclusion of contracts for fundamental
research from the requirements of the
rule. One respondent noted that the
prior proposed DFARS rule included an
exception for solicitations and contracts
for fundamental research, while also
noting that most of the respondent’s
member institutions have at least first
level information technology security
measures in place within their systems,
which appear to meet most of the basic
safeguarding requirements. Another
respondent, while recognizing that some
level of protection should be afforded,
seeks regulations that will provide an
appropriate level of protection without
creating unwieldy compliance burdens
or creating a chilling effect on academic
E:\FR\FM\16MYR2.SGM
16MYR2
30442
Federal Register / Vol. 81, No. 94 / Monday, May 16, 2016 / Rules and Regulations
activity, including fundamental
research.
Response: The final rule does not
focus on the protection of any specific
type of information, but requires basic
elements for safeguarding an
information system. These requirements
should not have any chilling effect on
fundamental research.
e. Policies and Procedures
Comment: One respondent stated that
the scope statement that the subpart
provides policies and procedures is
inaccurate, because the subpart just
defines terms and prescribes the use of
a contract clause.
Response: The scope section has been
deleted in the final rule.
2. Basic Safeguarding Requirements
asabaliauskas on DSK3SPTVN1PROD with RULES
a. General
Comment: According to one
respondent, some of the safeguarding
requirements are too basic and
rudimentary to achieve the rule’s
intended purpose.
Response: The intended purpose of
the rule is to provide basic safeguarding
of covered contractor information
systems. This rule is not related to any
specific information categories other
than the broad and basic safeguarding.
Comment: Various respondents were
of the opinion that the rule should hold
contractors to NIST and FISMA
requirements.
• One respondent stated that the
proposed rule severely downgrades
existing recommendations in place by
NIST regarding the proper procedures
and controls for protection of Federal
information systems. According to the
respondent, the rule should require
contractors to adhere to same standards
required of Federal agencies by the
NIST SP 800 x series and the FISMA.
• Another respondent noted that
Federal agencies are required to adhere
to information security standards and
guidelines published by NIST in Federal
Information Processing Standards (FIPS)
and Special Publications (SP). These
publications explicitly state that the
same standards apply to outsourced
external service providers. Agencies and
their contractors are also required to
implement the configuration control
settings at a ‘‘bits and bytes’’ level
contained in the security configuration
control checklists found in the National
Security Program (NSP), which is cohosted by NIST and the Department of
Homeland Security (DHS).
Response: This rule establishes the
basic, minimal information system
safeguarding standards which Federal
agencies are already required to follow
VerDate Sep<11>2014
18:51 May 13, 2016
Jkt 238001
internally and most prudent businesses
already follow as well. The rule makes
clear that Federal contractors whose
information systems process, store, or
transmit Federal contract information
must follow these basic safeguarding
standards. When contractors will be
processing CUI or higher-level sensitive
information, additional safeguarding
standards, not covered by this rule will
apply.
Comment: One respondent stated that
the requirements are not specific
enough from a technological standpoint
to encompass the current state of
information security technology.
Response: The final rule replaces the
requirements in the proposed rule with
requirements from NIST guidelines
(NIST SP 800–171), which are
appropriate to the level of technology,
and are updated as technology changes.
Flexibility is provided for specific
implementation.
Comment: Another respondent
recommended that the Councils should
consider adopting a performance
standard for protecting specific types of
information from unauthorized
disclosure rather than the ‘‘design
standard’’ in the proposed rule.
Response: The standards in the
proposed rule and in the final rule are
not design standards; they are
performance standards.
Comment: One respondent requested
clarification of the meaning of
‘‘safeguarding.’’ According to the
respondent, the definition of
‘‘safeguarding’’ neither refers to nor
incorporates the definition of
‘‘information security.’’ The respondent
questions whether the rule intends to
distinguish between information
security and safeguarding.
Response: There is a basic distinction
between ‘‘safeguarding’’ and
‘‘information security.’’ ‘‘Safeguarding’’
is a verb and expresses required action
and purpose. The term ‘‘safeguarding’’
is common in Executive orders relating
to information systems. Although
safeguarding has some commonality
with ‘‘information security’’ the focus of
information security is narrower.
Safeguarding the contractor’s
information system will promote
confidentiality and integrity of data, but
is not specifically concerned with data
availability.
Comment: One respondent
recommended that the rule should just
require the contractor to protect
information provided to or generated for
the Government ‘‘at a level no less than
what the company provides for its own
confidential and proprietary business
information.’’
PO 00000
Frm 00016
Fmt 4701
Sfmt 4700
Response: There would be no need for
a FAR clause if that is all it required.
That would provide no advantage over
the current status. FISMA requires this
protection of Federal contract
information.
b. Specific Requirements
i. Protecting Information on Public
Computers or Web sites
Comment: One respondent
commented on the requirement in the
proposed rule (FAR 52.204–21(b)(1)) to
protect information on public
computers or Web sites. The respondent
recommended focusing on covered
contractor information systems. If
retaining the term ‘‘public computers,’’
the respondent recommended defining
the term, taking into consideration that
some contractors have a contractual
obligation to use ‘‘public computers’’ in
performance of a contract, and removing
the restriction on the use of public
computers if the use has implemented a
secure means of accessing the covered
Government information.
Response: The heading in the
proposed rule in FAR paragraph
52.204–21(b)(1), ‘‘Protecting information
on public computers or Web sites,’’
misstated the intent of the requirement.
The requirement was to not process
information provided by the
Government on public computers or
Web sites. In the final rule, this heading
has been removed and the requirement
has been restated to be consistent with
NIST 800–171.
ii. Transmitting Electronic Information
Comment: Many respondents
commented on the requirement in the
proposed rule (FAR 52.204–21(b)(2))
regarding transmitting electronic
information. The primary concern of all
of these respondents was the
requirement for ‘‘the best level of
security and privacy available given
facilities, conditions, and environment.’’
As one respondent stated, this is not
consistent with the objective of the rule
to require basic safeguarding, is not a
defined term of art, and may not be
consistent with the cost-effective
standards and risk-based approach
established by FISMA. Another
respondent noted that requiring
contractors to use the best level for all
data, would prevent businesses from
upgrading communications security for
the transmission of more sensitive data.
Another respondent pointed out that
changes in technology would cause
frequent changes in what would
constitute the ‘‘best level.’’ One
respondent recommended replacing
E:\FR\FM\16MYR2.SGM
16MYR2
Federal Register / Vol. 81, No. 94 / Monday, May 16, 2016 / Rules and Regulations
‘‘best’’ with ‘‘adequate,’’ or
‘‘commercially reasonable.’’
Response: After evaluating the public
comments, the requirement regarding
transmitting electronic information was
removed from the coverage in the final
rule because transmission of email, text
messages, and blogs are outside the
scope of the final rule, which deals with
safeguards for the contractor’s
information system, not protection of
information.
asabaliauskas on DSK3SPTVN1PROD with RULES
iii. Transmitting Voice and Fax
Information
Comment: More than half the
respondents commented on the
requirement in the proposed rule (FAR
52.204–21(b)(3)) relating to transmitting
voice and fax information. A primary
concern of respondents was the
requirement that covered information
can be transmitted orally only when the
sender has ‘‘reasonable assurance’’ that
access is limited to authorized
recipients. The respondents found this
requirement to be too vague. According
to one respondent, there is further
concern that the term ‘‘voice
information’’ could arguably apply to
any oral communication, such as
telephone conversations. One
respondent recommended the adoption
of strict, clear policies in securing the
voice communications of contractor
systems, including encryption
requirements for all transmissions. One
respondent questioned whether the rule
covered voice communication over
CDMA [code-division multiple access],
GSM [Global System for Mobile], and
VOIP [voice-over-Internet-Protocol], or
some combination of the three.
Response: After evaluation of public
comments, the requirement regarding
transmission by phone and fax are
outside the scope of the final rule,
which deals with safeguards for the
contractor’s information system not
protection of information.
iv. Physical and Electronic Barriers
Comment: Several respondents
commented on the requirement in the
proposed rule (FAR 52.204–21(b)(4))
regarding physical and electronic
barriers to protect Federal contract
information. There was general concern
that for certain devices it would not be
practicable to always have both a
physical barrier and an electronic
barrier, when not under direct
individual control. One respondent was
concerned that NIST does not mention
the specific types of locks or keys that
will provide acceptable protection.
Another respondent questioned what
‘‘direct individual control’’ means.
Another respondent was concerned
VerDate Sep<11>2014
18:51 May 13, 2016
Jkt 238001
about the potential need to protect the
information itself, when in hard copy.
One respondent considered that this
requirement may philosophically
conflict with Government and
commercial efforts to create and
accommodate a mobile workforce.
Response: The requirements at FAR
52.204–21(b)(4) in the proposed rule
have been replaced by multiple security
controls in paragraph (b)(1) of the clause
52.204–21. There is no longer a specific
requirement to have both a physical
barrier and an electronic barrier in all
instances. The rule now clearly
addresses the protection of the
information system as a whole, rather
than just the protection of the Federal
contract information. The requirement
for a basic level of safeguarding for
covered contractor information systems
is not in philosophical conflict with
accommodation of a mobile work force.
For example, it is common practice not
to leave a smart phone with access to
Federal contract information unattended
in a public place and without any
password protection.
v. Sanitization
Comment: One respondent
commented on the requirement for data
sanitization in the proposed rule (FAR
52.204–21(b)(5)). The respondent stated
that the proposed rule did not
adequately address data sanitization,
because some media are unable to be
cleared due to format or a lack of
compatible equipment, and would
require purging or destruction for
proper sanitization. The respondent also
noted that the URL for NIST 800–88 was
incorrect.
Response: The requirement in the
final rule is covered by paragraph
(b)(1)(vii) of FAR 52.204–21, which
includes destruction as a possible
sanitization technique. The URL for
NIST 800–88 is not included in the final
rule.
vi. Intrusion Protection
Comment: Several respondents
commented on the requirement for
intrusion protection in the proposed
rule (FAR 52.204–21(b)(6)).
• One respondent stated that the only
proposed intrusion-protection
safeguards relate to malware protection
services and security-relevant software
upgrades. According to the respondent,
these types of safeguards are generally
not considered sufficient to provide a
reasonable level of protection in a
sophisticated enterprise environment.
• One respondent recommended that
if hardware reaches its end of life and
is no longer supported by the
manufacturer, there should be a clause
PO 00000
Frm 00017
Fmt 4701
Sfmt 4700
30443
imposing a 6 month to 1 year deadline
to upgrade the security system.
Response: The proposed requirements
for intrusion protection have been
replaced with paragraphs (b)(1)(xii)–
(xiv) of FAR 52.204–21 to provide basic
intrusion protection. The
recommendation for imposing a 6month to 1-year deadline to upgrade the
security system is outside the scope of
this rule.
vii. Transfer Limitations
Comment: Various respondents
commented on the transfer limitations
in the proposed rule (FAR 52.204–
21(b)(7)), which limited transfer of
Federal contract information only to
those subcontractors that both require
the information for purposes of contract
performance and provide at least the
same level of security as specified in
this clause. The primary concern of the
respondents was whether the prime
contractors might be held responsible
for reviewing or approving a
subcontractor’s safeguards.
Response: This requirement has been
deleted. The final rule no longer focuses
on the safeguarding of information, but
of information systems. The
requirement to flow the clause down to
subcontractors accomplishes the
objectives of the rule to require
safeguarding of covered contractor
information systems at all tiers.
c. Other Recommended Requirements
Comment: Some respondents
recommended additional requirements
for inclusion in the final rule:
• Training. One respondent
recommended that contractor
information security employees be
required to obtain the same levels of
certification and training as provided in
the DOD 8570 guidelines. Another
respondent recommended security
awareness training, as required by 44
U.S.C. 3544(b)(4).
• Penetration or vulnerability testing,
evaluation, and reporting. Several
respondents recommended a
requirement for periodic testing of the
effectiveness of information security
policies in accordance with 44 U.S.C.
3544(c).
• Detecting, reporting, and
responding to security incidents. One
respondent stated that under FISMA it
is mandatory for contractors to report
security incidents to law enforcement if
Federal contract information is resident
on or passing through the contractor
information system. This respondent
also expressed concern about how
personally identifiable information (PII)
notifications would be properly made,
without reporting requirements.
E:\FR\FM\16MYR2.SGM
16MYR2
30444
Federal Register / Vol. 81, No. 94 / Monday, May 16, 2016 / Rules and Regulations
• DFARS rule. One respondent
recommended that this FAR rule should
include procedures similar to those in
the draft DFARS rule 2011–D039,
Safeguarding Unclassified DoD
Information.
• Encryption at rest. One respondent
recommended that data be stored in an
encrypted manner, rather than
encrypting exclusively for the purpose
of transit.
• Cyber security insurance. One
respondent also recommended requiring
Government contractors to carry
insurance that specifically covers the
protection of intangible property such as
data. Another respondent thought that
the rule would already require small
businesses to maintain cyber liability
insurance.
Response: This rule establishes
minimum standards for contractors’
information systems that process, store,
or transmit Federal contract information
where the sensitivity/impact level of the
Federal contract information being
protected does not warrant a level of
protection necessitating training,
penetration or vulnerability testing,
evaluation, and reporting, detecting,
reporting, and responding to security
incidents, encryption at rest, or
cybersecurity insurance. Such standards
would be needed if contract
performance involved the contractor
accessing CUI or classified Federal
information systems. The final rule
under DFARS Case 2011–D039, retitled
‘‘Safeguarding Unclassified Controlled
Technical Information’’ (published in
the Federal Register at 78 FR 69273 on
November 18, 2013), provided for
enhanced levels of safeguarding because
that case addressed a more sensitive
level of information. Requiring
cybersecurity insurance is outside the
scope of this case.
asabaliauskas on DSK3SPTVN1PROD with RULES
d. Order of Precedence
Comment: One respondent
commented on the order of precedence
in the proposed rule at FAR 52.204–
21(d), which stated that if any
restrictions or authorizations in this
clause are inconsistent with a
requirement of any other such clause in
the contract, the requirement of the
other clause takes precedence over the
requirements of this clause.
Response: The proposed paragraph at
FAR 52.204–21(d) has been deleted
from the final rule, and replaced by a
new paragraph (b)(2). The basic
safeguarding provisions should not
conflict with any requirement for more
stringent control if handling of more
sensitive data is required. Paragraph
(b)(2) of the FAR 52.204–21 clause states
VerDate Sep<11>2014
18:51 May 13, 2016
Jkt 238001
that there may be other safeguarding
requirements for CUI.
e. Noncompliance Consequences
Comment: One respondent was
concerned that any inadvertent release
of information could be turned into not
only an information security issue but
also a potential breach of contract.
Response: The refocus of the final rule
on the safeguarding requirements
applicable to the system itself should
allay the respondent’s concerns.
Generally, as long as the safeguards are
in place, failure of the controls to
adequately protect the information does
not constitute a breach of contract.
3. Clause
a. Prescription
Comment: Several respondents
commented on the prescription for use
of clause 52.204–21.
• One respondent was concerned that
it would be difficult to know when to
use the clause because contracting
officers have limited insight into
offerors’ existing information systems.
• One respondent recommended
incorporating the clause into the list of
clauses at FAR 52.212–5 instead of
separately prescribing it at 12.301 for
use in solicitations and contracts for the
acquisition of commercial items.
Response: The clause is prescribed for
inclusion in the solicitation when the
contractor or a subcontractor at any tier
may have Federal contract information
residing in or transiting through its
information system. This does not
require any specific knowledge of the
contractor’s existing information
system. Generally, the person drafting
the contract requirements/statement of
work would know if contract
performance will involve Federal
contract information residing in or
transiting through its information
system. The contracting officer may not
have the technical expertise to make
this determination.
It is not possible to include FAR
clause 52.204–21 in 52.212–5 because
the clause is not necessary to implement
statute or E.O.
b. Flowdown
Comment: One respondent was
concerned about the scope of the
flowdown obligation, because it would
be co-extensive with the definition of
information. According to the
respondent, the flowdown requirement
would likely extend to all subcontracts
for commercial items and COTS items,
and even to small dollar value
subcontracts.
Response: The clause only flows
down to covered contractor information
PO 00000
Frm 00018
Fmt 4701
Sfmt 4700
systems. The Councils have revised the
final rule to exclude applicability to
COTS items, at both the prime and
subcontract level. However, there may
be subcontracts for commercial items
(especially services, e.g., a consultant) at
lower dollar values that would involve
covered contractor information systems.
In such instances, it is still necessary to
apply basic safeguards to such covered
contractor information system.
4. Acquisition Planning
Comment: One respondent was
concerned that the acquisition planning
requirement in the proposed rule at FAR
7.105(b)(18) could lead to varying
security standards rather than uniform
Governmentwide standards.
Response: The intent of the proposed
requirement, which included a cross
reference to the new subpart on basic
safeguarding, was that the acquisition
plan should address compliance with
the requirements of the new subpart, not
that each plan would invent a new set
of requirements. The final rule has
rewritten this requirement to make the
requirement for compliance with FAR
subpart 4.19 clearer.
5. Contract Administration Functions
Comment: One respondent
commented on the requirement in the
proposed rule (FAR 42.302(a)(21))
regarding the contract administration
function to ‘‘ensure that the contractor
has protective measures in place,
consistent with the requirements of the
clause at 52.204–21.’’ The respondent
noted that the term ‘‘protective
measures’’ was not used in the clause.
Response: This requirement has been
deleted from the final rule.
6. Impact of Rule
Comment: Various respondents were
concerned with the general impact of
the rule and, in particular, the impact of
the rule on small business concerns.
One respondent stated disagreement
with the Government’s assessment that
the cost of implementing the rule would
be insignificant because it requires firstlevel protective matters that are
typically employed as part of the
routine course of doing business.
Some respondents were concerned
that the lack of clarity imposes
significant risks of disputes, and
increases costs, since a contractor must
design to the most stringent standard in
an attempt to assure compliance. For
example, several respondents were
concerned that the potentially broad
definition of ‘‘information’’ would
significantly increase the compliance
burden for contractors. Another
respondent noted that the vagueness
E:\FR\FM\16MYR2.SGM
16MYR2
Federal Register / Vol. 81, No. 94 / Monday, May 16, 2016 / Rules and Regulations
and subjective nature of some of the
requirements (e.g., ‘‘best available’’
standard at 52.204–21(b)(2)) would
place an incredible financial burden on
businesses, creating an inequitable
burden upon many small businesses.
Response: The final rule has been
amended in response to the public
comments (see section II.A. of this
preamble), such that the particular
requirements that were mentioned as
imposing a greater burden have been
clarified or deleted. As a result, the
burden on all businesses, including
small businesses, should not be
significant.
IV. Executive Orders 12866 and 13563
Executive Orders (E.O.s) 12866 and
13563 direct agencies to assess all costs
and benefits of available regulatory
alternatives and, if regulation is
necessary, to select regulatory
approaches that maximize net benefits
(including potential economic,
environmental, public health and safety
effects, distributive impacts, and
equity). E.O. 13563 emphasizes the
importance of quantifying both costs
and benefits, of reducing costs, of
harmonizing rules, and of promoting
flexibility. This is a significant
regulatory action and, therefore, was
subject to review under Section 6(b) of
E.O. 12866, Regulatory Planning and
Review, dated September 30, 1993. This
rule is not a major rule under 5 U.S.C.
804.
asabaliauskas on DSK3SPTVN1PROD with RULES
V. Regulatory Flexibility Act
DoD, GSA, and NASA have prepared
a Final Regulatory Flexibility Analysis
(FRFA) consistent with the Regulatory
Flexibility Act, 5 U.S.C. 601, et seq. The
FRFA is summarized as follows:
This action is being implemented to revise
the Federal Acquisition Regulation (FAR) to
safeguard contractor information systems that
process, store, or transmit Federal contract
information. The objective of this rule is to
require contractors to employ basic security
measures, as identified in the clause, for any
covered contractor information system.
Various respondents were concerned with
the general impact of the rule and, in
particular, the impact of the rule on small
business concerns. The final rule has been
amended in response to the public
comments, such that the particular
requirements that were mentioned as
imposing a greater burden have been clarified
or deleted. As a result, the burden on all
businesses, including small businesses,
should not be significant.
This final rule applies to all Federal
contractors and appropriate subcontractors,
including those below the simplified
acquisition threshold, if the contractor has
Federal contract information residing in or
transiting through its information system.
The final rule is not applicable to the
VerDate Sep<11>2014
18:51 May 13, 2016
Jkt 238001
acquisition of commercially available off-theshelf (COTS) items. In FY 2013, the Federal
Government awarded over 250,000 contracts
to almost 40,000 unique small business
concerns. Of those awards, about half were
for commercial items awarded to about
25,000 unique small business concerns. It is
not known what percentage of those awards
were for COTS items.
There are no reporting or recordkeeping
requirements associated with the rule. The
other compliance requirements will not have
a significant cost impact, since these are the
basic safeguarding measures (e.g., updated
virus protection, the latest security software
patches, etc.). This final rule has basic
safeguarding measures that are generally
employed as part of the routine course of
doing business. It is recognized that the cost
of not using basic information technology
system protection measures would be an
enormous detriment to contractor and
Government business, resulting in reduced
system performance and the potential loss of
valuable information. It is also recognized
that prudent business practices to protect an
information technology system are generally
a common part of everyday operations. As a
result, requiring basic safeguarding of
contractor information systems, if Federal
contract information resides in or transits
through such systems, offers enormous value
to contractors and the Government by
reducing vulnerabilities to covered contractor
information systems.
There are no known significant alternatives
to the rule that would further minimize any
economic impact of the rule on small entities
and still meet the objectives of the rule. DoD,
GSA, and NASA considered excluding
acquisitions below the simplified acquisition
threshold, but rejected this alternative
because there are many acquisitions below
the simplified acquisition threshold where
the Government nevertheless has a
significant interest in requiring basic
safeguarding of the contractor information
system (e.g., a consulting contract with an
individual).
This final rule does not apply to the
acquisition of COTS items, because it is
unlikely that acquisitions of COTS items will
involve Federal contract information residing
in or transiting through the contractor
information system. Excluding acquisitions
of COTS items reduces the number of small
entities to which the rule will apply.
Interested parties may obtain a copy
of the FRFA from the Regulatory
Secretariat Division. The Regulatory
Secretariat Division has submitted a
copy of the FRFA to the Chief Counsel
for Advocacy of the Small Business
Administration.
VI. Paperwork Reduction Act
The rule does not contain any
information collection requirements that
require the approval of the Office of
Management and Budget under the
Paperwork Reduction Act (44 U.S.C.
chapter 35).
PO 00000
Frm 00019
Fmt 4701
Sfmt 4700
30445
List of Subjects in 48 CFR Parts 4, 7, 12,
and 52
Government procurement.
Dated: May 5, 2016.
William Clark,
Director, Office of Government-wide
Acquisition Policy, Office of Acquisition
Policy, Office of Government-wide Policy.
Therefore, DoD, GSA, and NASA
amend 48 CFR parts 4, 7, 12, and 52 as
set forth below:
■ 1. The authority citation for 48 CFR
parts 4, 7, 12, and 52 continues to read
as follows:
Authority: 40 U.S.C. 121(c); 10 U.S.C.
chapter 137; and 51 U.S.C. 20113.
PART 4—ADMINISTRATIVE MATTERS
■
2. Add subpart 4.19 to read as follows:
Subpart 4.19—Basic Safeguarding of
Covered Contractor Information
Systems
Sec.
4.1901
4.1902
4.1903
Definitions.
Applicability.
Contract clause.
Subpart 4.19—Basic Safeguarding of
Covered Contractor Information
Systems
4.1901
Definitions.
As used in this subpart—
Covered contractor information
system means an information system
that is owned or operated by a
contractor that processes, stores, or
transmits Federal contract information.
Federal contract information means
information, not intended for public
release, that is provided by or generated
for the Government under a contract to
develop or deliver a product or service
to the Government, but not including
information provided by the
Government to the public (such as that
on public Web sites) or simple
transactional information, such as that
necessary to process payments.
Information means any
communication or representation of
knowledge such as facts, data, or
opinions in any medium or form,
including textual, numerical, graphic,
cartographic, narrative, or audiovisual
(Committee on National Security
Systems Instruction (CNSSI) 4009).
Information system means a discrete
set of information resources organized
for the collection, processing,
maintenance, use, sharing,
dissemination, or disposition of
information (44 U.S.C. 3502).
Safeguarding means measures or
controls that are prescribed to protect
information systems.
E:\FR\FM\16MYR2.SGM
16MYR2
30446
4.1902
Federal Register / Vol. 81, No. 94 / Monday, May 16, 2016 / Rules and Regulations
Applicability.
This subpart applies to all
acquisitions, including acquisitions of
commercial items other than
commercially available off-the-shelf
items, when a contractor’s information
system may contain Federal contract
information.
4.1903
Contract clause.
The contracting officer shall insert the
clause at 52.204–21, Basic Safeguarding
of Covered Contractor Information
Systems, in solicitations and contracts
when the contractor or a subcontractor
at any tier may have Federal contract
information residing in or transiting
through its information system.
PART 7—ACQUISITION PLANNING
3. Amend section 7.105 by revising
paragraph (b)(18) to read as follows:
■
7.105 Contents of written acquisition
plans.
*
*
*
*
*
(b) * * *
(18) Security considerations. (i) For
acquisitions dealing with classified
matters, discuss how adequate security
will be established, maintained, and
monitored (see subpart 4.4).
(ii) For information technology
acquisitions, discuss how agency
information security requirements will
be met.
(iii) For acquisitions requiring routine
contractor physical access to a
Federally-controlled facility and/or
routine access to a Federally-controlled
information system, discuss how agency
requirements for personal identity
verification of contractors will be met
(see subpart 4.13).
(iv) For acquisitions that may require
Federal contract information to reside in
or transit through contractor
information systems, discuss
compliance with subpart 4.19.
*
*
*
*
*
PART 12—ACQUISITION OF
COMMERCIAL ITEMS
4. Amend section 12.301 by
redesignating paragraphs (d)(3) through
(7) as paragraphs (d)(4) through (8) and
adding a new paragraph (d)(3) to read as
follows:
asabaliauskas on DSK3SPTVN1PROD with RULES
■
12.301 Solicitation provisions and
contract clauses for the acquisition of
commercial items.
*
*
*
*
*
(d) * * *
(3) Insert the clause at 52.204–21,
Basic Safeguarding of Covered
Contractor Information Systems, in
solicitations and contracts (except for
VerDate Sep<11>2014
18:51 May 13, 2016
Jkt 238001
acquisitions of COTS items), as
prescribed in 4.1903.
*
*
*
*
*
PART 52—SOLICITATION PROVISIONS
AND CONTRACT CLAUSES
5. Add section 52.204–21 to read as
follows:
■
52.204–21 Basic Safeguarding of Covered
Contractor Information Systems.
As prescribed in 4.1903, insert the
following clause:
Basic Safeguarding of Covered
Contractor Information Systems (June,
2016)
(a) Definitions. As used in this clause—
Covered contractor information system
means an information system that is owned
or operated by a contractor that processes,
stores, or transmits Federal contract
information.
Federal contract information means
information, not intended for public release,
that is provided by or generated for the
Government under a contract to develop or
deliver a product or service to the
Government, but not including information
provided by the Government to the public
(such as on public Web sites) or simple
transactional information, such as necessary
to process payments.
Information means any communication or
representation of knowledge such as facts,
data, or opinions, in any medium or form,
including textual, numerical, graphic,
cartographic, narrative, or audiovisual
(Committee on National Security Systems
Instruction (CNSSI) 4009).
Information system means a discrete set of
information resources organized for the
collection, processing, maintenance, use,
sharing, dissemination, or disposition of
information (44 U.S.C. 3502).
Safeguarding means measures or controls
that are prescribed to protect information
systems.
(b) Safeguarding requirements and
procedures. (1) The Contractor shall apply
the following basic safeguarding
requirements and procedures to protect
covered contractor information systems.
Requirements and procedures for basic
safeguarding of covered contractor
information systems shall include, at a
minimum, the following security controls:
(i) Limit information system access to
authorized users, processes acting on behalf
of authorized users, or devices (including
other information systems).
(ii) Limit information system access to the
types of transactions and functions that
authorized users are permitted to execute.
(iii) Verify and control/limit connections to
and use of external information systems.
(iv) Control information posted or
processed on publicly accessible information
systems.
(v) Identify information system users,
processes acting on behalf of users, or
devices.
(vi) Authenticate (or verify) the identities
of those users, processes, or devices, as a
PO 00000
Frm 00020
Fmt 4701
Sfmt 4700
prerequisite to allowing access to
organizational information systems.
(vii) Sanitize or destroy information system
media containing Federal Contract
Information before disposal or release for
reuse.
(viii) Limit physical access to
organizational information systems,
equipment, and the respective operating
environments to authorized individuals.
(ix) Escort visitors and monitor visitor
activity; maintain audit logs of physical
access; and control and manage physical
access devices.
(x) Monitor, control, and protect
organizational communications (i.e.,
information transmitted or received by
organizational information systems) at the
external boundaries and key internal
boundaries of the information systems.
(xi) Implement subnetworks for publicly
accessible system components that are
physically or logically separated from
internal networks.
(xii) Identify, report, and correct
information and information system flaws in
a timely manner.
(xiii) Provide protection from malicious
code at appropriate locations within
organizational information systems.
(xiv) Update malicious code protection
mechanisms when new releases are available.
(xv) Perform periodic scans of the
information system and real-time scans of
files from external sources as files are
downloaded, opened, or executed.
(2) Other requirements. This clause does
not relieve the Contractor of any other
specific safeguarding requirements specified
by Federal agencies and departments relating
to covered contractor information systems
generally or other Federal safeguarding
requirements for controlled unclassified
information (CUI) as established by Executive
Order 13556.
(c) Subcontracts. The Contractor shall
include the substance of this clause,
including this paragraph (c), in subcontracts
under this contract (including subcontracts
for the acquisition of commercial items, other
than commercially available off-the-shelf
items), in which the subcontractor may have
Federal contract information residing in or
transiting through its information system.
(End of clause)
6. Amend section 52.213–4 by—
a. Revising the date of the clause and
paragraph (a)(2)(viii);
■ b. Redesignating paragraphs (b)(2)(i)
through (iv) as paragraphs (b)(2)(ii)
through (v); and
■ c. Adding a new paragraph (b)(2)(i).
The revisions and addition read as
follows:
■
■
52.213–4 Terms and Conditions—
Simplified Acquisitions (Other Than
Commercial Items).
*
*
*
*
*
Terms and Conditions—Simplified
Acquisitions (Other Than Commercial
Items)
(June, 2016)
E:\FR\FM\16MYR2.SGM
16MYR2
Federal Register / Vol. 81, No. 94 / Monday, May 16, 2016 / Rules and Regulations
(a) * * *
(2) * * *
(viii) 52.244–6, Subcontracts for
Commercial Items (June, 2016).
*
*
*
*
ACTION:
*
*
*
*
*
*
7. Amend section 52.244–6 by—
a. Revising the date of the clause and
in paragraph (a) the definition
‘‘Commercial item’’;
■ b. Redesignating paragraphs (c)(1)(iii)
through (xiv) as paragraphs (c)(1)(iv)
through (xv); and
■ c. Adding a new paragraph (c)(1)(iii).
The revisions and addition read as
follows:
■
■
*
*
Subcontracts for Commercial
*
*
*
I. Background
Subcontracts for Commercial Items
(June, 2016)
(a) * * *
Commercial item and commercially
available off-the-shelf item have the
meanings contained in Federal Acquisition
Regulation 2.101, Definitions.
*
*
*
*
*
(c)(1) * * *
(iii) 52.204–21, Basic Safeguarding of
Covered Contractor Information Systems
(June, 2016), other than subcontracts for
commercially available off-the-shelf items, if
flow down is required in accordance with
paragraph (c) of FAR clause 52.204–21.
*
*
*
*
*
[FR Doc. 2016–11001 Filed 5–13–16; 8:45 am]
BILLING CODE 6820–EP–P
GENERAL SERVICES
ADMINISTRATION
NATIONAL AERONAUTICS AND
SPACE ADMINISTRATION
48 CFR Part 36
[FAC 2005–88; FAR Case 2015–018; Item
IV; Docket No. 2015–0018; Sequence No 1]
asabaliauskas on DSK3SPTVN1PROD with RULES
RIN 9000–AN10
Federal Acquisition Regulation;
Improvement in Design-Build
Construction Process
Department of Defense (DoD),
General Services Administration (GSA),
and National Aeronautics and Space
Administration (NASA).
AGENCY:
18:51 May 13, 2016
DoD, GSA, and NASA published a
proposed rule in the Federal Register at
80 FR 60833 on October 8, 2015, to
implement section 814 of the Carl Levin
and Howard P. ‘Buck’ McKeon NDAA
for FY 2015, Public Law 113–291.
Section 814 requires the head of the
contracting activity, delegable to a level
no lower than the senior contracting
official, to approve any determinations
to select more than five offerors to
submit phase-two proposals for a twophase design-build construction
acquisition that is valued at greater than
$4 million. Five respondents submitted
comments on the proposed rule.
II. Discussion and Analysis
DEPARTMENT OF DEFENSE
VerDate Sep<11>2014
DoD, GSA, and NASA are
issuing a final rule amending the
Federal Acquisition Regulation (FAR) to
implement section 814 of the Carl Levin
and Howard P. ‘Buck’ McKeon National
Defense Authorization Act (NDAA) for
Fiscal Year (FY) 2015 that requires the
head of the contracting activity to
approve any determinations to select
more than five offerors to submit phasetwo proposals for a two-phase designbuild construction acquisition that is
valued at greater than $4 million.
DATES: Effective: June 15, 2016.
FOR FURTHER INFORMATION CONTACT: Mr.
Curtis E. Glover, Sr., Procurement
Analyst, at 202–501–1448, for
clarification of content. For information
pertaining to status or publication
schedules, contact the Regulatory
Secretariat Division at 202–501–4755.
Please cite FAC 2005–88, FAR Case
2015–018.
SUPPLEMENTARY INFORMATION:
SUMMARY:
(b) * * *
(2) * * *
(i) 52.204–21, Basic Safeguarding of
Covered Contractor Information Systems
(June, 2016) (Applies to contracts when the
contractor or a subcontractor at any tier may
have Federal contract information residing in
or transiting through its information system.
52.244–6
Items.
Final rule.
Jkt 238001
The Civilian Agency Acquisition
Council and the Defense Acquisition
Regulations Council (the Councils)
reviewed the public comments in the
development of the final rule. One
change was made to the rule as a result
of those comments. A discussion of the
comments is provided as follows:
Comment: One respondent requested
that the maximum number of offerors
allowed to submit phase-two proposals
be limited to three of the most highly
qualified offerors.
Response: The scope of this rule is
limited to the implementation of
Section 814 of the FY 2015 NDAA,
which requires a higher approval
authority when selecting more than five
offerors to participate in Phase 2 of a
design-build acquisition. Identifying the
ideal number of contractors for
participation in Phase 2 is beyond the
PO 00000
Frm 00021
Fmt 4701
Sfmt 4700
30447
scope of the case and the statute that is
being implemented.
Comment: Two respondents
recommended that the rule be revised to
add a reporting requirement for those
instances when more than five offerors
are selected to submit phase-two
proposals.
Response: The scope of this rule is
limited to the implementation of
Section 814 of the FY 2015 NDAA.
Adding a public reporting requirement
is beyond the scope of the case and the
statute that is being implemented.
Comment: One respondent
recommended that the rule be revised to
include a requirement that the senior
contracting official’s approval be
documented in the contract file.
Response: The requirement to
document the contract file was in the
proposed rule at FAR 36.303–1(a)(4). In
civilian agencies, for paragraph (a)(4) of
FAR section 36.303–1, the senior
contracting official is the advocate for
competition for the procuring activity,
unless the agency designates a different
position in agency procedures. The
approval shall be documented in the
contract file.
Comment: One respondent
recommended that the FAR be revised
to limit the use of single-step designbuild procurements by requiring the use
of two-step design-build procurement
process for all design-build
procurements above $4 million.
Response: The recommendation is
beyond the scope of the case and the
statute that is being implemented.
III. Executive Orders 12866 and 13563
Executive Orders (E.O.s) 12866 and
13563 direct agencies to assess all costs
and benefits of available regulatory
alternatives and, if regulation is
necessary, to select regulatory
approaches that maximize net benefits
(including potential economic,
environmental, public health and safety
effects, distributive impacts, and
equity). E.O. 13563 emphasizes the
importance of quantifying both costs
and benefits, of reducing costs, of
harmonizing rules, and of promoting
flexibility. This is not a significant
regulatory action and, therefore, was not
subject to review under Section 6(b) of
E.O. 12866, Regulatory Planning and
Review, dated September 30, 1993. This
rule is not a major rule under 5 U.S.C.
804.
IV. Regulatory Flexibility Act
DoD, GSA, and NASA have prepared
a Final Regulatory Flexibility Analysis
(FRFA) consistent with the Regulatory
Flexibility Act, 5 U.S.C. 601, et seq. The
FRFA is summarized as follows:
E:\FR\FM\16MYR2.SGM
16MYR2
Agencies
[Federal Register Volume 81, Number 94 (Monday, May 16, 2016)]
[Rules and Regulations]
[Pages 30439-30447]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2016-11001]
-----------------------------------------------------------------------
DEPARTMENT OF DEFENSE
GENERAL SERVICES ADMINISTRATION
NATIONAL AERONAUTICS AND SPACE ADMINISTRATION
48 CFR Parts 4, 7, 12, and 52
[FAC 2005-88; FAR Case 2011-020; Item III; Docket No. 2011-0020,
Sequence No. 1]
RIN 9000-AM19
Federal Acquisition Regulation; Basic Safeguarding of Contractor
Information Systems
AGENCY: Department of Defense (DoD), General Services Administration
(GSA), and National Aeronautics and Space Administration (NASA).
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: DoD, GSA, and NASA are issuing a final rule amending the
Federal Acquisition Regulation (FAR) to add a new subpart and contract
clause for the basic safeguarding of contractor information systems
that process, store or transmit Federal contract information. The
clause does not relieve the contractor of any other specific
safeguarding requirement specified by Federal agencies and departments
as it relates to covered contractor information systems generally or
other Federal requirements for safeguarding Controlled Unclassified
Information (CUI) as established by Executive Order (E.O.). Systems
that contain classified information, or CUI such as personally
identifiable information, require more than the basic level of
protection.
DATES: Effective: June 15, 2016.
FOR FURTHER INFORMATION CONTACT: Ms. Cecelia L. Davis, Procurement
Analyst, at 202-219-0202, for clarification of content. For information
pertaining to status or publication schedules, contact the Regulatory
Secretariat Division at 202-501-4755. Please cite FAC 2005-88, FAR Case
2011-020.
SUPPLEMENTARY INFORMATION:
[[Page 30440]]
I. Background
This final rule has basic safeguarding measures that are generally
employed as part of the routine course of doing business. DoD, GSA, and
NASA published a proposed rule in the Federal Register at 77 FR 51496
on August 24, 2012, to address the safeguarding of contractor
information systems that contain or process information provided by or
generated for the Government (other than public information). This
proposed rule had been preceded by DoD publication of an Advance Notice
of Proposed Rulemaking (ANPR) and notice of public meeting in the
Federal Register at 75 FR 9563 on March 3, 2010, under Defense Federal
Acquisition Regulation Supplement (DFARS) Case 2008-D028, Safeguarding
Unclassified Information. The ANPR addressed basic and enhanced
safeguarding procedures for the protection of DoD unclassified
information. Resulting public comments on the DFARS rule were
considered in drafting a proposed FAR rule under FAR case 2009-030,
which focused on the basic safeguarding of unclassified Federal
information contained within information systems. On June 29, 2011, the
contents of FAR case 2009-030 were merged into FAR case 2011-020, Basic
Safeguarding of Contractor Information Systems.
This rule, which focuses on ensuring a basic level of safeguarding
for any contractor system with Federal information, reflective of
actions a prudent business person would employ, is just one step in a
series of coordinated regulatory actions being taken or planned to
strengthen protections of information systems. Last summer, OMB issued
proposed guidance to enhance and clarify cybersecurity protections in
Federal acquisitions related to CUI in systems that contractors operate
on behalf of the Government as well as in systems that are not operated
on behalf of an agency but are used incidental to providing a product
or service for an agency with particular focus on security controls,
incident reporting, information system assessments, and information
security continuous monitoring. DOD, GSA, and NASA will be developing
FAR changes to implement the OMB guidance when it is finalized.
In addition, we plan to develop regulatory changes for the FAR in
coordination with National Archives and Records Administration (NARA)
which is separately finalizing a rule to implement E.O. 13556
addressing CUI. The E.O. established the CUI program to standardize the
way the executive branch handles information (other than classified
information) that requires safeguarding or dissemination controls.
All of these actions should help, among other things, clarify the
application of the Federal Information Security Management Act (FISMA)
and the National Institute of Standards and Technology (NIST)
information systems requirements to contractors and, by doing so, help
to create greater consistency, where appropriate, in safeguarding
practices across agencies. Prior to all of these actions occurring, DOD
has updated a DFARS rule addressing enhanced safeguarding for certain
sensitive DOD information in those systems.
Sixteen respondents submitted comments on this proposed rule.
II. Discussion and Analysis
The Civilian Agency Acquisition Council and the Defense Acquisition
Regulations Council (the Councils) reviewed the comments in the
development of the final rule. A discussion of the comments and the
changes made to the rule as a result of those comments are provided as
follows:
A. Summary of Significant Changes From the Proposed Rule
1. Safeguarding of Covered Contractor Information System
Provides for safeguarding the contractor information
system, rather than specific information contained in the system.
Revises the title of the case and throughout the final
rule to add the term ``covered'' to ``contractor information system,''
thus indicating that the policy applies only to contractor information
systems that contain Federal contract information.
2. Safeguarding Requirements
Deletes the safeguarding requirements and procedures in
the clause that relate to transmitting electronic information,
transmitting voice and fax information, and information transfer
limitations.
Replaces the other safeguarding requirements with
comparable security requirements from NIST SP 800-171.
3. Definitions
Adds definitions of ``covered contractor information
system'' and ``Federal contract information.''
Deletes definitions of ``public information'' and all
other proposed definitions in the clause, except ``information,''
``information system,'' and ``safeguarding.''
4. Applicability
Makes the final rule--
Applicable below the simplified acquisition threshold.
Not applicable to the acquisition of commercially
available off-the-shelf (COTS) items.
5. Other Safeguarding Requirements
Clarifies that the clause does not relieve the contractor from
complying with any other specific safeguarding requirements and
procedures specified by Federal agencies and departments relating to
covered contractor information systems generally or other Federal
requirements for safeguarding CUI as established by E.O. 13556.
B. Analysis of Public Comments
1. Scope and Applicability
a. Information Provided by or Generated for the Government (Other Than
Public Information)
Comments: About half the respondents commented on the scope and
applicability of the proposed rule, which required safeguarding of
information provided by or generated for the Government (other than
public information). The proposed rule included the statutory
definition of ``public information'' from 44 U.S.C. 3502. The
respondents generally commented on the breadth of the scope or a lack
of clarity.
One respondent urged the FAR Council to withhold release of a final
rule until NARA implements E.O. 13556, Controlled Unclassified
Information. Without such coordination, contractors may be required to
establish conflicting protections that may later conflict or be revised
by the Governmentwide NARA program.
Several respondents were also concerned about the broad potential
scope of the information subject to these requirements. One respondent
stated that the rule would cover nearly all information and all
information systems of any company that holds even a single Government
contract. One respondent questioned whether ``generated for the
Government'' just applied to information that is part of a contract
deliverable, or whether it also covered information about the
contractor's own proprietary practices that is submitted to the
Government. Another respondent was concerned that agencies have tended
to broadly expand FISMA requirements to information developed under
Federal contracts, regardless of whether the information is a
deliverable under the contract (e.g., data exchanged among
researchers). One respondent recommended limiting the covered
[[Page 30441]]
information to ``information provided by or delivered to the
Government.'' Another respondent urged narrowing the rule to the type
of information for which safeguards are warranted, based on a reasoned
risk assessment and cost-benefit analysis. One respondent recommended
that the rule should exclude contractor proprietary or trade secret
data from the scope of information generated for the Government, so
that the responsibility for protecting such information remains with
the contractor.
One respondent is concerned that the Government may send non-public
information to a recipient, who may be unaware that it is in their
possession on any device, in any form. The information could be
temporarily exposed, even if transferred and not retained.
Further, respondents were concerned about interpretation of the
definition of ``public information.'' Several respondents considered
that the definition of ``public information'' was too narrow, because
it requires the actual disclosure, dissemination, or disposition of
information. One respondent stated that the Government has significant
volumes of data that have not yet been made public, but that may be
subject to obligations for disclosure under a variety of statutes.
Several respondents stated that contractors cannot readily determine
what information is categorized as public information, because it is
almost impossible for contractors to keep track of what information has
been released to the public.
One respondent stated that the Government should proactively mark
protected materials.
Response: The intent is that the scope and applicability of this
rule be very broad, because this rule requires only the most basic
level of safeguarding. However, applicability of the final rule is
limited to covered contractor information systems, i.e., systems that
are owned or operated by a contractor that process, store, or transmit
Federal contract information. ``Federal contract information'' means
information, not intended for public release, that is provided by or
generated for the Government under a contract to develop or deliver a
product or service to the Government, but not including information
provided by the Government to the public (such as on public Web sites)
or simple transactional information, such as necessary to process
payments. The final rule has been coordinated with NARA. The focus of
the final rule is shifted from the safeguarding of specific information
to the basic safeguarding of certain contractor information systems.
Therefore, it is not necessary to draw a fine line as to what
information was ``generated for the Government,'' when the information
is received, or whether the information is marked. The requirements
pertain to the information system itself. The type of analysis required
to narrow the rule to the type of information for which safeguards are
warranted, based on risk-assessment and cost-benefit analysis, is
appropriate for CUI and the enhanced safeguarding that would be
required for such information consistent with law, Federal regulation,
and Governmentwide policy. A prudent business person would employ this
most basic level of safeguarding, even if not covered by this rule.
This rule is intended to provide a basic set of protections for all
Federal contract information, upon which other rules, such as a
forthcoming FAR rule to protect CUI, may build.
Since the safeguarding applies to the contractor information
system, not to specific information within the system, it is irrelevant
whether there is also contractor information in the system. However, if
the contractor stores pre-existing proprietary data or trade secrets in
a separate information system, the contractor can decide how to protect
its own information.
The definition of ``public information'' has been deleted, as it is
no longer necessary.
b. Information Residing in or Transiting Through a Contractor
Information System
Comment: One respondent requested clarification of the statutory
definition of ``information system,'' i.e., what would be the
limitation for a system interfacing with another system. The respondent
requested that the rule specifically identify the medium of
communication, the mechanism for delivering the communication, and the
disposition.
Response: Generally, separately accredited information systems that
interface through loosely coupled mechanisms, such as email or Web
services, are not considered direct connections, even if they involve
dynamic interaction between software systems in different organizations
that are designed to interact with each other (e.g., messaging,
electronic commerce/electronic data interchange transactions). It would
not be practical to specify all the possible mechanisms for interaction
among systems, since they are constantly evolving.
Comment: Another respondent requested a definition of ``resides on
or transits through'' an information system. The respondent is
concerned that much of the focus of information security efforts is
directed at protecting perimeter devices and may overlook the necessity
of protecting the host servers.
Response: Information ``residing on'' a system means information
being processed by or stored on the information system. ``Transiting
through'' the system means simple transport of the data through the
system to another destination (i.e., no local storage or processing).
All of the controls listed are focused on protection of the information
system (e.g., the host servers, workstations, routers). None of the
controls are devoted to protection of ``perimeter devices'' although
several (particularly paragraphs (b)(1)(x) and (xi)) are applied at the
perimeter of the system.
c. Solicitations
Comment: One respondent was concerned that the requirements of the
rule were applied to solicitations, thus imposing this requirement as a
barrier to even bidding on Government work. Another respondent
commented that the FAR rule would affect not only companies that
receive Government contracts, but also companies soliciting Government
contracts.
Response: This was not the intent of the proposed rule. The final
rule has revised the applicability section to address ``acquisitions''
rather than ``solicitations and contracts.'' Of course, the clause
prescription still requires inclusion of the clause in solicitations,
so that offerors are aware of the clause that will be included in the
resultant contract. The clause does not take effect until the offeror
is awarded a contract containing the clause.
d. Fundamental Research
Comment: Two respondents requested exclusion of contracts for
fundamental research from the requirements of the rule. One respondent
noted that the prior proposed DFARS rule included an exception for
solicitations and contracts for fundamental research, while also noting
that most of the respondent's member institutions have at least first
level information technology security measures in place within their
systems, which appear to meet most of the basic safeguarding
requirements. Another respondent, while recognizing that some level of
protection should be afforded, seeks regulations that will provide an
appropriate level of protection without creating unwieldy compliance
burdens or creating a chilling effect on academic
[[Page 30442]]
activity, including fundamental research.
Response: The final rule does not focus on the protection of any
specific type of information, but requires basic elements for
safeguarding an information system. These requirements should not have
any chilling effect on fundamental research.
e. Policies and Procedures
Comment: One respondent stated that the scope statement that the
subpart provides policies and procedures is inaccurate, because the
subpart just defines terms and prescribes the use of a contract clause.
Response: The scope section has been deleted in the final rule.
2. Basic Safeguarding Requirements
a. General
Comment: According to one respondent, some of the safeguarding
requirements are too basic and rudimentary to achieve the rule's
intended purpose.
Response: The intended purpose of the rule is to provide basic
safeguarding of covered contractor information systems. This rule is
not related to any specific information categories other than the broad
and basic safeguarding.
Comment: Various respondents were of the opinion that the rule
should hold contractors to NIST and FISMA requirements.
One respondent stated that the proposed rule severely
downgrades existing recommendations in place by NIST regarding the
proper procedures and controls for protection of Federal information
systems. According to the respondent, the rule should require
contractors to adhere to same standards required of Federal agencies by
the NIST SP 800 x series and the FISMA.
Another respondent noted that Federal agencies are
required to adhere to information security standards and guidelines
published by NIST in Federal Information Processing Standards (FIPS)
and Special Publications (SP). These publications explicitly state that
the same standards apply to outsourced external service providers.
Agencies and their contractors are also required to implement the
configuration control settings at a ``bits and bytes'' level contained
in the security configuration control checklists found in the National
Security Program (NSP), which is co-hosted by NIST and the Department
of Homeland Security (DHS).
Response: This rule establishes the basic, minimal information
system safeguarding standards which Federal agencies are already
required to follow internally and most prudent businesses already
follow as well. The rule makes clear that Federal contractors whose
information systems process, store, or transmit Federal contract
information must follow these basic safeguarding standards. When
contractors will be processing CUI or higher-level sensitive
information, additional safeguarding standards, not covered by this
rule will apply.
Comment: One respondent stated that the requirements are not
specific enough from a technological standpoint to encompass the
current state of information security technology.
Response: The final rule replaces the requirements in the proposed
rule with requirements from NIST guidelines (NIST SP 800-171), which
are appropriate to the level of technology, and are updated as
technology changes. Flexibility is provided for specific
implementation.
Comment: Another respondent recommended that the Councils should
consider adopting a performance standard for protecting specific types
of information from unauthorized disclosure rather than the ``design
standard'' in the proposed rule.
Response: The standards in the proposed rule and in the final rule
are not design standards; they are performance standards.
Comment: One respondent requested clarification of the meaning of
``safeguarding.'' According to the respondent, the definition of
``safeguarding'' neither refers to nor incorporates the definition of
``information security.'' The respondent questions whether the rule
intends to distinguish between information security and safeguarding.
Response: There is a basic distinction between ``safeguarding'' and
``information security.'' ``Safeguarding'' is a verb and expresses
required action and purpose. The term ``safeguarding'' is common in
Executive orders relating to information systems. Although safeguarding
has some commonality with ``information security'' the focus of
information security is narrower. Safeguarding the contractor's
information system will promote confidentiality and integrity of data,
but is not specifically concerned with data availability.
Comment: One respondent recommended that the rule should just
require the contractor to protect information provided to or generated
for the Government ``at a level no less than what the company provides
for its own confidential and proprietary business information.''
Response: There would be no need for a FAR clause if that is all it
required. That would provide no advantage over the current status.
FISMA requires this protection of Federal contract information.
b. Specific Requirements
i. Protecting Information on Public Computers or Web sites
Comment: One respondent commented on the requirement in the
proposed rule (FAR 52.204-21(b)(1)) to protect information on public
computers or Web sites. The respondent recommended focusing on covered
contractor information systems. If retaining the term ``public
computers,'' the respondent recommended defining the term, taking into
consideration that some contractors have a contractual obligation to
use ``public computers'' in performance of a contract, and removing the
restriction on the use of public computers if the use has implemented a
secure means of accessing the covered Government information.
Response: The heading in the proposed rule in FAR paragraph 52.204-
21(b)(1), ``Protecting information on public computers or Web sites,''
misstated the intent of the requirement. The requirement was to not
process information provided by the Government on public computers or
Web sites. In the final rule, this heading has been removed and the
requirement has been restated to be consistent with NIST 800-171.
ii. Transmitting Electronic Information
Comment: Many respondents commented on the requirement in the
proposed rule (FAR 52.204-21(b)(2)) regarding transmitting electronic
information. The primary concern of all of these respondents was the
requirement for ``the best level of security and privacy available
given facilities, conditions, and environment.'' As one respondent
stated, this is not consistent with the objective of the rule to
require basic safeguarding, is not a defined term of art, and may not
be consistent with the cost-effective standards and risk-based approach
established by FISMA. Another respondent noted that requiring
contractors to use the best level for all data, would prevent
businesses from upgrading communications security for the transmission
of more sensitive data. Another respondent pointed out that changes in
technology would cause frequent changes in what would constitute the
``best level.'' One respondent recommended replacing
[[Page 30443]]
``best'' with ``adequate,'' or ``commercially reasonable.''
Response: After evaluating the public comments, the requirement
regarding transmitting electronic information was removed from the
coverage in the final rule because transmission of email, text
messages, and blogs are outside the scope of the final rule, which
deals with safeguards for the contractor's information system, not
protection of information.
iii. Transmitting Voice and Fax Information
Comment: More than half the respondents commented on the
requirement in the proposed rule (FAR 52.204-21(b)(3)) relating to
transmitting voice and fax information. A primary concern of
respondents was the requirement that covered information can be
transmitted orally only when the sender has ``reasonable assurance''
that access is limited to authorized recipients. The respondents found
this requirement to be too vague. According to one respondent, there is
further concern that the term ``voice information'' could arguably
apply to any oral communication, such as telephone conversations. One
respondent recommended the adoption of strict, clear policies in
securing the voice communications of contractor systems, including
encryption requirements for all transmissions. One respondent
questioned whether the rule covered voice communication over CDMA
[code-division multiple access], GSM [Global System for Mobile], and
VOIP [voice-over-Internet-Protocol], or some combination of the three.
Response: After evaluation of public comments, the requirement
regarding transmission by phone and fax are outside the scope of the
final rule, which deals with safeguards for the contractor's
information system not protection of information.
iv. Physical and Electronic Barriers
Comment: Several respondents commented on the requirement in the
proposed rule (FAR 52.204-21(b)(4)) regarding physical and electronic
barriers to protect Federal contract information. There was general
concern that for certain devices it would not be practicable to always
have both a physical barrier and an electronic barrier, when not under
direct individual control. One respondent was concerned that NIST does
not mention the specific types of locks or keys that will provide
acceptable protection. Another respondent questioned what ``direct
individual control'' means. Another respondent was concerned about the
potential need to protect the information itself, when in hard copy.
One respondent considered that this requirement may philosophically
conflict with Government and commercial efforts to create and
accommodate a mobile workforce.
Response: The requirements at FAR 52.204-21(b)(4) in the proposed
rule have been replaced by multiple security controls in paragraph
(b)(1) of the clause 52.204-21. There is no longer a specific
requirement to have both a physical barrier and an electronic barrier
in all instances. The rule now clearly addresses the protection of the
information system as a whole, rather than just the protection of the
Federal contract information. The requirement for a basic level of
safeguarding for covered contractor information systems is not in
philosophical conflict with accommodation of a mobile work force. For
example, it is common practice not to leave a smart phone with access
to Federal contract information unattended in a public place and
without any password protection.
v. Sanitization
Comment: One respondent commented on the requirement for data
sanitization in the proposed rule (FAR 52.204-21(b)(5)). The respondent
stated that the proposed rule did not adequately address data
sanitization, because some media are unable to be cleared due to format
or a lack of compatible equipment, and would require purging or
destruction for proper sanitization. The respondent also noted that the
URL for NIST 800-88 was incorrect.
Response: The requirement in the final rule is covered by paragraph
(b)(1)(vii) of FAR 52.204-21, which includes destruction as a possible
sanitization technique. The URL for NIST 800-88 is not included in the
final rule.
vi. Intrusion Protection
Comment: Several respondents commented on the requirement for
intrusion protection in the proposed rule (FAR 52.204-21(b)(6)).
One respondent stated that the only proposed intrusion-
protection safeguards relate to malware protection services and
security-relevant software upgrades. According to the respondent, these
types of safeguards are generally not considered sufficient to provide
a reasonable level of protection in a sophisticated enterprise
environment.
One respondent recommended that if hardware reaches its
end of life and is no longer supported by the manufacturer, there
should be a clause imposing a 6 month to 1 year deadline to upgrade the
security system.
Response: The proposed requirements for intrusion protection have
been replaced with paragraphs (b)(1)(xii)-(xiv) of FAR 52.204-21 to
provide basic intrusion protection. The recommendation for imposing a
6-month to 1-year deadline to upgrade the security system is outside
the scope of this rule.
vii. Transfer Limitations
Comment: Various respondents commented on the transfer limitations
in the proposed rule (FAR 52.204-21(b)(7)), which limited transfer of
Federal contract information only to those subcontractors that both
require the information for purposes of contract performance and
provide at least the same level of security as specified in this
clause. The primary concern of the respondents was whether the prime
contractors might be held responsible for reviewing or approving a
subcontractor's safeguards.
Response: This requirement has been deleted. The final rule no
longer focuses on the safeguarding of information, but of information
systems. The requirement to flow the clause down to subcontractors
accomplishes the objectives of the rule to require safeguarding of
covered contractor information systems at all tiers.
c. Other Recommended Requirements
Comment: Some respondents recommended additional requirements for
inclusion in the final rule:
Training. One respondent recommended that contractor
information security employees be required to obtain the same levels of
certification and training as provided in the DOD 8570 guidelines.
Another respondent recommended security awareness training, as required
by 44 U.S.C. 3544(b)(4).
Penetration or vulnerability testing, evaluation, and
reporting. Several respondents recommended a requirement for periodic
testing of the effectiveness of information security policies in
accordance with 44 U.S.C. 3544(c).
Detecting, reporting, and responding to security
incidents. One respondent stated that under FISMA it is mandatory for
contractors to report security incidents to law enforcement if Federal
contract information is resident on or passing through the contractor
information system. This respondent also expressed concern about how
personally identifiable information (PII) notifications would be
properly made, without reporting requirements.
[[Page 30444]]
DFARS rule. One respondent recommended that this FAR rule
should include procedures similar to those in the draft DFARS rule
2011-D039, Safeguarding Unclassified DoD Information.
Encryption at rest. One respondent recommended that data
be stored in an encrypted manner, rather than encrypting exclusively
for the purpose of transit.
Cyber security insurance. One respondent also recommended
requiring Government contractors to carry insurance that specifically
covers the protection of intangible property such as data. Another
respondent thought that the rule would already require small businesses
to maintain cyber liability insurance.
Response: This rule establishes minimum standards for contractors'
information systems that process, store, or transmit Federal contract
information where the sensitivity/impact level of the Federal contract
information being protected does not warrant a level of protection
necessitating training, penetration or vulnerability testing,
evaluation, and reporting, detecting, reporting, and responding to
security incidents, encryption at rest, or cybersecurity insurance.
Such standards would be needed if contract performance involved the
contractor accessing CUI or classified Federal information systems. The
final rule under DFARS Case 2011-D039, retitled ``Safeguarding
Unclassified Controlled Technical Information'' (published in the
Federal Register at 78 FR 69273 on November 18, 2013), provided for
enhanced levels of safeguarding because that case addressed a more
sensitive level of information. Requiring cybersecurity insurance is
outside the scope of this case.
d. Order of Precedence
Comment: One respondent commented on the order of precedence in the
proposed rule at FAR 52.204-21(d), which stated that if any
restrictions or authorizations in this clause are inconsistent with a
requirement of any other such clause in the contract, the requirement
of the other clause takes precedence over the requirements of this
clause.
Response: The proposed paragraph at FAR 52.204-21(d) has been
deleted from the final rule, and replaced by a new paragraph (b)(2).
The basic safeguarding provisions should not conflict with any
requirement for more stringent control if handling of more sensitive
data is required. Paragraph (b)(2) of the FAR 52.204-21 clause states
that there may be other safeguarding requirements for CUI.
e. Noncompliance Consequences
Comment: One respondent was concerned that any inadvertent release
of information could be turned into not only an information security
issue but also a potential breach of contract.
Response: The refocus of the final rule on the safeguarding
requirements applicable to the system itself should allay the
respondent's concerns. Generally, as long as the safeguards are in
place, failure of the controls to adequately protect the information
does not constitute a breach of contract.
3. Clause
a. Prescription
Comment: Several respondents commented on the prescription for use
of clause 52.204-21.
One respondent was concerned that it would be difficult to
know when to use the clause because contracting officers have limited
insight into offerors' existing information systems.
One respondent recommended incorporating the clause into
the list of clauses at FAR 52.212-5 instead of separately prescribing
it at 12.301 for use in solicitations and contracts for the acquisition
of commercial items.
Response: The clause is prescribed for inclusion in the
solicitation when the contractor or a subcontractor at any tier may
have Federal contract information residing in or transiting through its
information system. This does not require any specific knowledge of the
contractor's existing information system. Generally, the person
drafting the contract requirements/statement of work would know if
contract performance will involve Federal contract information residing
in or transiting through its information system. The contracting
officer may not have the technical expertise to make this
determination.
It is not possible to include FAR clause 52.204-21 in 52.212-5
because the clause is not necessary to implement statute or E.O.
b. Flowdown
Comment: One respondent was concerned about the scope of the
flowdown obligation, because it would be co-extensive with the
definition of information. According to the respondent, the flowdown
requirement would likely extend to all subcontracts for commercial
items and COTS items, and even to small dollar value subcontracts.
Response: The clause only flows down to covered contractor
information systems. The Councils have revised the final rule to
exclude applicability to COTS items, at both the prime and subcontract
level. However, there may be subcontracts for commercial items
(especially services, e.g., a consultant) at lower dollar values that
would involve covered contractor information systems. In such
instances, it is still necessary to apply basic safeguards to such
covered contractor information system.
4. Acquisition Planning
Comment: One respondent was concerned that the acquisition planning
requirement in the proposed rule at FAR 7.105(b)(18) could lead to
varying security standards rather than uniform Governmentwide
standards.
Response: The intent of the proposed requirement, which included a
cross reference to the new subpart on basic safeguarding, was that the
acquisition plan should address compliance with the requirements of the
new subpart, not that each plan would invent a new set of requirements.
The final rule has rewritten this requirement to make the requirement
for compliance with FAR subpart 4.19 clearer.
5. Contract Administration Functions
Comment: One respondent commented on the requirement in the
proposed rule (FAR 42.302(a)(21)) regarding the contract administration
function to ``ensure that the contractor has protective measures in
place, consistent with the requirements of the clause at 52.204-21.''
The respondent noted that the term ``protective measures'' was not used
in the clause.
Response: This requirement has been deleted from the final rule.
6. Impact of Rule
Comment: Various respondents were concerned with the general impact
of the rule and, in particular, the impact of the rule on small
business concerns. One respondent stated disagreement with the
Government's assessment that the cost of implementing the rule would be
insignificant because it requires first-level protective matters that
are typically employed as part of the routine course of doing business.
Some respondents were concerned that the lack of clarity imposes
significant risks of disputes, and increases costs, since a contractor
must design to the most stringent standard in an attempt to assure
compliance. For example, several respondents were concerned that the
potentially broad definition of ``information'' would significantly
increase the compliance burden for contractors. Another respondent
noted that the vagueness
[[Page 30445]]
and subjective nature of some of the requirements (e.g., ``best
available'' standard at 52.204-21(b)(2)) would place an incredible
financial burden on businesses, creating an inequitable burden upon
many small businesses.
Response: The final rule has been amended in response to the public
comments (see section II.A. of this preamble), such that the particular
requirements that were mentioned as imposing a greater burden have been
clarified or deleted. As a result, the burden on all businesses,
including small businesses, should not be significant.
IV. Executive Orders 12866 and 13563
Executive Orders (E.O.s) 12866 and 13563 direct agencies to assess
all costs and benefits of available regulatory alternatives and, if
regulation is necessary, to select regulatory approaches that maximize
net benefits (including potential economic, environmental, public
health and safety effects, distributive impacts, and equity). E.O.
13563 emphasizes the importance of quantifying both costs and benefits,
of reducing costs, of harmonizing rules, and of promoting flexibility.
This is a significant regulatory action and, therefore, was subject to
review under Section 6(b) of E.O. 12866, Regulatory Planning and
Review, dated September 30, 1993. This rule is not a major rule under 5
U.S.C. 804.
V. Regulatory Flexibility Act
DoD, GSA, and NASA have prepared a Final Regulatory Flexibility
Analysis (FRFA) consistent with the Regulatory Flexibility Act, 5
U.S.C. 601, et seq. The FRFA is summarized as follows:
This action is being implemented to revise the Federal
Acquisition Regulation (FAR) to safeguard contractor information
systems that process, store, or transmit Federal contract
information. The objective of this rule is to require contractors to
employ basic security measures, as identified in the clause, for any
covered contractor information system.
Various respondents were concerned with the general impact of
the rule and, in particular, the impact of the rule on small
business concerns. The final rule has been amended in response to
the public comments, such that the particular requirements that were
mentioned as imposing a greater burden have been clarified or
deleted. As a result, the burden on all businesses, including small
businesses, should not be significant.
This final rule applies to all Federal contractors and
appropriate subcontractors, including those below the simplified
acquisition threshold, if the contractor has Federal contract
information residing in or transiting through its information
system. The final rule is not applicable to the acquisition of
commercially available off-the-shelf (COTS) items. In FY 2013, the
Federal Government awarded over 250,000 contracts to almost 40,000
unique small business concerns. Of those awards, about half were for
commercial items awarded to about 25,000 unique small business
concerns. It is not known what percentage of those awards were for
COTS items.
There are no reporting or recordkeeping requirements associated
with the rule. The other compliance requirements will not have a
significant cost impact, since these are the basic safeguarding
measures (e.g., updated virus protection, the latest security
software patches, etc.). This final rule has basic safeguarding
measures that are generally employed as part of the routine course
of doing business. It is recognized that the cost of not using basic
information technology system protection measures would be an
enormous detriment to contractor and Government business, resulting
in reduced system performance and the potential loss of valuable
information. It is also recognized that prudent business practices
to protect an information technology system are generally a common
part of everyday operations. As a result, requiring basic
safeguarding of contractor information systems, if Federal contract
information resides in or transits through such systems, offers
enormous value to contractors and the Government by reducing
vulnerabilities to covered contractor information systems.
There are no known significant alternatives to the rule that
would further minimize any economic impact of the rule on small
entities and still meet the objectives of the rule. DoD, GSA, and
NASA considered excluding acquisitions below the simplified
acquisition threshold, but rejected this alternative because there
are many acquisitions below the simplified acquisition threshold
where the Government nevertheless has a significant interest in
requiring basic safeguarding of the contractor information system
(e.g., a consulting contract with an individual).
This final rule does not apply to the acquisition of COTS items,
because it is unlikely that acquisitions of COTS items will involve
Federal contract information residing in or transiting through the
contractor information system. Excluding acquisitions of COTS items
reduces the number of small entities to which the rule will apply.
Interested parties may obtain a copy of the FRFA from the
Regulatory Secretariat Division. The Regulatory Secretariat Division
has submitted a copy of the FRFA to the Chief Counsel for Advocacy of
the Small Business Administration.
VI. Paperwork Reduction Act
The rule does not contain any information collection requirements
that require the approval of the Office of Management and Budget under
the Paperwork Reduction Act (44 U.S.C. chapter 35).
List of Subjects in 48 CFR Parts 4, 7, 12, and 52
Government procurement.
Dated: May 5, 2016.
William Clark,
Director, Office of Government-wide Acquisition Policy, Office of
Acquisition Policy, Office of Government-wide Policy.
Therefore, DoD, GSA, and NASA amend 48 CFR parts 4, 7, 12, and 52
as set forth below:
0
1. The authority citation for 48 CFR parts 4, 7, 12, and 52 continues
to read as follows:
Authority: 40 U.S.C. 121(c); 10 U.S.C. chapter 137; and 51
U.S.C. 20113.
PART 4--ADMINISTRATIVE MATTERS
0
2. Add subpart 4.19 to read as follows:
Subpart 4.19--Basic Safeguarding of Covered Contractor Information
Systems
Sec.
4.1901 Definitions.
4.1902 Applicability.
4.1903 Contract clause.
Subpart 4.19--Basic Safeguarding of Covered Contractor Information
Systems
4.1901 Definitions.
As used in this subpart--
Covered contractor information system means an information system
that is owned or operated by a contractor that processes, stores, or
transmits Federal contract information.
Federal contract information means information, not intended for
public release, that is provided by or generated for the Government
under a contract to develop or deliver a product or service to the
Government, but not including information provided by the Government to
the public (such as that on public Web sites) or simple transactional
information, such as that necessary to process payments.
Information means any communication or representation of knowledge
such as facts, data, or opinions in any medium or form, including
textual, numerical, graphic, cartographic, narrative, or audiovisual
(Committee on National Security Systems Instruction (CNSSI) 4009).
Information system means a discrete set of information resources
organized for the collection, processing, maintenance, use, sharing,
dissemination, or disposition of information (44 U.S.C. 3502).
Safeguarding means measures or controls that are prescribed to
protect information systems.
[[Page 30446]]
4.1902 Applicability.
This subpart applies to all acquisitions, including acquisitions of
commercial items other than commercially available off-the-shelf items,
when a contractor's information system may contain Federal contract
information.
4.1903 Contract clause.
The contracting officer shall insert the clause at 52.204-21, Basic
Safeguarding of Covered Contractor Information Systems, in
solicitations and contracts when the contractor or a subcontractor at
any tier may have Federal contract information residing in or
transiting through its information system.
PART 7--ACQUISITION PLANNING
0
3. Amend section 7.105 by revising paragraph (b)(18) to read as
follows:
7.105 Contents of written acquisition plans.
* * * * *
(b) * * *
(18) Security considerations. (i) For acquisitions dealing with
classified matters, discuss how adequate security will be established,
maintained, and monitored (see subpart 4.4).
(ii) For information technology acquisitions, discuss how agency
information security requirements will be met.
(iii) For acquisitions requiring routine contractor physical access
to a Federally-controlled facility and/or routine access to a
Federally-controlled information system, discuss how agency
requirements for personal identity verification of contractors will be
met (see subpart 4.13).
(iv) For acquisitions that may require Federal contract information
to reside in or transit through contractor information systems, discuss
compliance with subpart 4.19.
* * * * *
PART 12--ACQUISITION OF COMMERCIAL ITEMS
0
4. Amend section 12.301 by redesignating paragraphs (d)(3) through (7)
as paragraphs (d)(4) through (8) and adding a new paragraph (d)(3) to
read as follows:
12.301 Solicitation provisions and contract clauses for the
acquisition of commercial items.
* * * * *
(d) * * *
(3) Insert the clause at 52.204-21, Basic Safeguarding of Covered
Contractor Information Systems, in solicitations and contracts (except
for acquisitions of COTS items), as prescribed in 4.1903.
* * * * *
PART 52--SOLICITATION PROVISIONS AND CONTRACT CLAUSES
0
5. Add section 52.204-21 to read as follows:
52.204-21 Basic Safeguarding of Covered Contractor Information
Systems.
As prescribed in 4.1903, insert the following clause:
Basic Safeguarding of Covered Contractor Information Systems (June,
2016)
(a) Definitions. As used in this clause--
Covered contractor information system means an information
system that is owned or operated by a contractor that processes,
stores, or transmits Federal contract information.
Federal contract information means information, not intended for
public release, that is provided by or generated for the Government
under a contract to develop or deliver a product or service to the
Government, but not including information provided by the Government
to the public (such as on public Web sites) or simple transactional
information, such as necessary to process payments.
Information means any communication or representation of
knowledge such as facts, data, or opinions, in any medium or form,
including textual, numerical, graphic, cartographic, narrative, or
audiovisual (Committee on National Security Systems Instruction
(CNSSI) 4009).
Information system means a discrete set of information resources
organized for the collection, processing, maintenance, use, sharing,
dissemination, or disposition of information (44 U.S.C. 3502).
Safeguarding means measures or controls that are prescribed to
protect information systems.
(b) Safeguarding requirements and procedures. (1) The Contractor
shall apply the following basic safeguarding requirements and
procedures to protect covered contractor information systems.
Requirements and procedures for basic safeguarding of covered
contractor information systems shall include, at a minimum, the
following security controls:
(i) Limit information system access to authorized users,
processes acting on behalf of authorized users, or devices
(including other information systems).
(ii) Limit information system access to the types of
transactions and functions that authorized users are permitted to
execute.
(iii) Verify and control/limit connections to and use of
external information systems.
(iv) Control information posted or processed on publicly
accessible information systems.
(v) Identify information system users, processes acting on
behalf of users, or devices.
(vi) Authenticate (or verify) the identities of those users,
processes, or devices, as a prerequisite to allowing access to
organizational information systems.
(vii) Sanitize or destroy information system media containing
Federal Contract Information before disposal or release for reuse.
(viii) Limit physical access to organizational information
systems, equipment, and the respective operating environments to
authorized individuals.
(ix) Escort visitors and monitor visitor activity; maintain
audit logs of physical access; and control and manage physical
access devices.
(x) Monitor, control, and protect organizational communications
(i.e., information transmitted or received by organizational
information systems) at the external boundaries and key internal
boundaries of the information systems.
(xi) Implement subnetworks for publicly accessible system
components that are physically or logically separated from internal
networks.
(xii) Identify, report, and correct information and information
system flaws in a timely manner.
(xiii) Provide protection from malicious code at appropriate
locations within organizational information systems.
(xiv) Update malicious code protection mechanisms when new
releases are available.
(xv) Perform periodic scans of the information system and real-
time scans of files from external sources as files are downloaded,
opened, or executed.
(2) Other requirements. This clause does not relieve the
Contractor of any other specific safeguarding requirements specified
by Federal agencies and departments relating to covered contractor
information systems generally or other Federal safeguarding
requirements for controlled unclassified information (CUI) as
established by Executive Order 13556.
(c) Subcontracts. The Contractor shall include the substance of
this clause, including this paragraph (c), in subcontracts under
this contract (including subcontracts for the acquisition of
commercial items, other than commercially available off-the-shelf
items), in which the subcontractor may have Federal contract
information residing in or transiting through its information
system.
(End of clause)
0
6. Amend section 52.213-4 by--
0
a. Revising the date of the clause and paragraph (a)(2)(viii);
0
b. Redesignating paragraphs (b)(2)(i) through (iv) as paragraphs
(b)(2)(ii) through (v); and
0
c. Adding a new paragraph (b)(2)(i).
The revisions and addition read as follows:
52.213-4 Terms and Conditions--Simplified Acquisitions (Other Than
Commercial Items).
* * * * *
Terms and Conditions--Simplified Acquisitions (Other Than Commercial
Items)
(June, 2016)
[[Page 30447]]
(a) * * *
(2) * * *
(viii) 52.244-6, Subcontracts for Commercial Items (June, 2016).
* * * * *
(b) * * *
(2) * * *
(i) 52.204-21, Basic Safeguarding of Covered Contractor
Information Systems (June, 2016) (Applies to contracts when the
contractor or a subcontractor at any tier may have Federal contract
information residing in or transiting through its information
system.
* * * * *
0
7. Amend section 52.244-6 by--
0
a. Revising the date of the clause and in paragraph (a) the definition
``Commercial item'';
0
b. Redesignating paragraphs (c)(1)(iii) through (xiv) as paragraphs
(c)(1)(iv) through (xv); and
0
c. Adding a new paragraph (c)(1)(iii).
The revisions and addition read as follows:
52.244-6 Subcontracts for Commercial Items.
* * * * *
Subcontracts for Commercial Items
(June, 2016)
(a) * * *
Commercial item and commercially available off-the-shelf item
have the meanings contained in Federal Acquisition Regulation 2.101,
Definitions.
* * * * *
(c)(1) * * *
(iii) 52.204-21, Basic Safeguarding of Covered Contractor
Information Systems (June, 2016), other than subcontracts for
commercially available off-the-shelf items, if flow down is required
in accordance with paragraph (c) of FAR clause 52.204-21.
* * * * *
[FR Doc. 2016-11001 Filed 5-13-16; 8:45 am]
BILLING CODE 6820-EP-P