Trending

#DFARS

Latest posts tagged with #DFARS on Bluesky

Latest Top
Trending

Posts tagged #DFARS

Preview
Why You Should Adopt the Cybersecurity NIST Framework The NIST Cybersecurity Framework (NIST CSF) is a risk-based approach to managing and reducing cybersecurity threats. Developed by the National Institute of Standards and Technology following Executive Order 13636 signed by Barack Obama in 2013, the framework was created to strengthen the security and resilience of U.S. critical infrastructure. Today, organizations across industries use the NIST Cybersecurity Framework to identify vulnerabilities, protect sensitive data, detect threats, respond to incidents, and recover from cyberattacks. By providing structured guidance for cybersecurity risk management, the NIST CSF helps businesses reduce the likelihood and impact of costly data breaches. These outlined efforts were enacted to encourage efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties as cybersecurity standards for every organization. Once Executive Order 13636 was signed, a voluntary risk-based Cybersecurity Framework was established to guide organizations to better manage potential cybersecurity risks. The Framework that was originally published in Version 1.0 in 2014 was from The National Institute of Standards and Technology (NIST) after many months of collaboration between government and the private sector authorities. Lets take a closer look into the NIST Cybersecurity Framework (CSF), how to implement the NIST Cybersecurity Framework, and how it all is being used to combat future cybersecurity threats to critical infrastructure components. **Cybersecurity NIST framework** The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) is a three-part, risk-based approach to cyber risk management. Those who use the NIST CSF often refer to it simply as the Framework. According to NIST, there are no laws present that require organizations to use the Framework, but this doesnt mean that others wont expect you to use it as a vendor. In fact, there are some organizations that require vendors and some regulators to use the Framework and strongly encourage the use of the Framework. In these situations, if youre a vendor not using the Framework, these companies that strongly encourage its implementation might not renew their contract(s) with you as they may consider your operations to be riskier than others. What makes the Framework as coveted as it is by some organization is that it provides the necessary guidance, guidelines, and practices that allow organizations to better manage and reduce cybersecurity risk in their critical infrastructure. The Framework shouldnt be utilized as a checklist, but rather an overall information risk management program. The Framework is comprised of three parts: the Framework Core, the Framework Implementation Tiers, and the Framework Profiles. Lets cover these frameworks in the subheadings below: **Functions** | **Explanation** ---|--- **Identify** | Identify where threatened and non-threatened application data intersects is the key to effective and efficient security. All elements that need to be protected should be identified and documented which then provides a solid foundation for the other functions. **Protect** | Draft and implement appropriate safeguards that will ensure the delivery of critical services in the event of a cyberattack. This helps to limit the potential disruption of a data breach and allow core activities to continue as planned. **Detect** | The IT security team must put in place tools and processes that will allow the organization to rapidly detect and identify a cyberattack once one has commenced. This involves the deployment of monitoring tools that can alert staff should an anomalous event take place or unusual network activity be noticed. **Respond** | Develop a thorough list of steps to be carried out in the event of a cybersecurity incident to minimize the impact on the business and other stakeholders. **Recover** | Develop and implement appropriate measures to ensure the organization can return to normal operations as quickly as possible following an incident. ### ** Framework Core** The Framework Core provides a common baseline of cybersecurity activities that is also aligned to the common cybersecurity functions of threat identification, protection mechanisms, threat detection, incident response, and incident recovery. The core is designed to be an intuitive buffer that allows for communication between multidisciplinary teams via five high level functions: Identify, Protect, Detect, Respond, and Recover. These functions and an explanation for their uses is outlined in the table below: ### **Framework Implementation Tiers** Framework Implementation Tiers characterize an organizations practices from Partial (Tier 1) to Adaptive (Tier 4). Each Tier provides context into how an organization views cybersecurity risk(s) and the processes that they have in place to manage said risk(s). Each Tier describes how integrated cybersecurity risk decisions are into broader risk decisions and the degree to which the organization shares and receives cybersecurity info from external parties. Higher tiers represent a higher degree of sophistication and maturity in the management of cybersecurity risks and responses. Even at a higher tier, organizations should also consider their current risk management practices, threat environment, legal and regulatory requirements, business/mission objectives, and organizational constraints. For more information related to each of the four tiers in the Framework, peruse the below table: **Tier** | **Name** | **Explanation** ---|---|--- 1 | Partial | Informal practices; limited awareness; no cybersecurity coordination 2 | Risk Informed | Management approved processes and prioritization, but not deployed organization-wide; high-level awareness exists, adequate resources provided; informal sharing and coordination 3 | Repeatable | Formal policy defines risk management practices processes, with regular reviews and updates; organization-wide approach to manage cybersecurity risk, with implemented processes; regular formalized coordination 4 | Adaptive | Practices actively adapt based on lessons learned and predictive indicators; cybersecurity implemented and part of culture organization-wide; active risk management and information sharing. ### ### **Framework Profile** The Framework Profile is meant to document the status of an organization or new program, in an objective fashion. The Profile is essentially a snapshot of an organizations prescribed and implemented controls. This snapshot is compared to the objective framework to identify any gaps, and the gaps then drive plans to address any deficiencies in the program. The objective statuses that are derived from the snapshot assessment are based on business needs that an organization has selected from the Framework. Through aligning standards, guidelines, and practices from the Framework Core, the Profile can be optimized improve the organizations cybersecurity posture. ## **Implementing Cybersecurity NIST framework** Although the NIST framework is seen by many as an industry best practice, many of the organizations that adopt the Framework say that completing implementation carries with it a massive investment. These organizations are adamant that the required major investment necessary to fully implement the Framework is hampering their full adoption of it. While 70% of organizations view the Framework as a best practice, nearly 50% of companies explained that the high level of investment that it requires is a barrier to its widespread adoption. NIST’s goal with the creation of the CSF is to help eliminate the utterly fragmented cybersecurity landscape we find ourselves in, and it couldn’t matter more at this point in the history of the digital world. Because of this, organizations are searching for NIST solutions more frequently than ever. The Framework helps organizations understand, structure, manage, and reduce cybersecurity risks. It assists in identifying the most important activities to assure critical operations and service delivery, helps prioritize investments, and provides a common language that all members of the organization can utilize for cybersecurity and risk management. Each organization and industry will have to identify their special themes and topics within the Framework that they would like to utilize. Thankfully, most topics covered under the Framework are common to all sectors of industry. Here are some best practices for implementing the Framework in your organization: * Adoption of the Framework requires the input and consideration of various people within the organization and cannot be effectively implemented by one person or small group. * Just as any IT systems program your organization has, adoption of the Framework requires ongoing maintenance. This isnt something that your company just sets and forgets. It needs to be assessed and updated regularly. How often you assess and update your processes is completely up to your organization and how much you prioritize risk management. * Adopting the Framework to control your digital environment just for the sake of having more control is not advised. Maintaining control should be a byproduct to the main goal of achieving a less risky environment through the adoption of the Framework. * Just as Information Security (InfoSec) is not a one-size-fits-all discipline, either is implementation of the Framework. Your organization can adopt the framework in a means that is as simple or complex as you desire. Organizations without an existing cybersecurity program can use the Framework as a model to establish one. Establishing the Framework in your organization can be developed through a high-level strategy for meeting the function objective. The steps that your organization takes to implement the Framework will vary based on your organizations complexity and the industry laws and regulations that occupy your country. For instance, a startup might have a different mentality and objective in adopting the Framework than a global Fortune 500 company might. Thankfully, the Framework is easy to adopt and mold to fit the needs of an organization no matter where they are in their respective journeys. ## **Preventing Future Cyber Threats** From the very beginning, the Cybersecurity Framework has been a collaborative effort involving stakeholders from government, industry and academia. The Framework received an update in 2016 that included updating the informative references, clarifying guidance for implementation tiers, and placement of cyber threat intelligence in the Core Framework. In early 2018, the Framework was updated once more with the roll out of Version 1.1 that included updates on authentication and identity, self-assessing cybersecurity risk, managing cybersecurity within the supply chain and vulnerability disclosure. Version 1.1 is still compatible with version 1.0, so the changes to the framework arent earth shattering. Theyre largely refinements based on feedback from the community. With the number of updates that are being released to the Framework in recent years, the NIST has decided to host a Cybersecurity Risk Management Conference in early November 2018, in Baltimore, Maryland. The NIST website explains that this conference aims to share and explore best practices and receive and discuss stakeholder input on key cybersecurity and privacy risk management topics. The conference will focus on three main tracks: executive risk governance and administration, risk management programs, and operations. Lawmakers are also becoming more active in increasing recognition towards the framework to build secure IT infrastructures. Just in the past year, the following key bills have been drafted or passed in the U.S. House and Senate: * H.R. 1562: SAFE Act **_(House – Drafted)_** * H.R. 1981: Cyber Security Education and Federal Workforce Enhancement Act **_(House – Drafted)_** * S. 1656: Medical Device Cybersecurity Act of 2017 **_(Senate- Drafted)_** * S. 1691: Internet of Things (IoT) Cybersecurity Improvement Act of 2017 **_(Senate – Drafted)_** * H.R. 2105: NIST Small Business Cybersecurity Act **_(House Passed)_** * S. 770 Making Available Information Now to Strengthen Trust and Resilience and Enhance Enterprise Technology (MAIN STREET) Cybersecurity Act **_(Senate Passed)_** These NIST standards bills are a tremendous step towards a brighter future for public and private agencies to achieve the highest grade of cybersecurity preparedness possible. The impact of the Framework is evident in the widespread adoption of the framework by organizations across the United States and globally to countries around the world. ## **Closing Thoughts** Cybersecurity violations can cause substantial financial losses, damage reputation, or cause outages that may permanently damage a company’s market position. An astonishing 84% of organizations have at least one security framework in place currently which is remarkable. As companies pivot toward a digital business model, exponentially more data will be generated and shared among organizations, partners and customers. A must-have requirement moving forward will be the ability to maintain a current understanding of the cyber threat environment. This can be done through the implementation of the NIST CSF. As cyber threats continue to multiply, it is paramount that your organization implement an effective cybersecurity program that helps to protect you and your clients against threat while also propelling transformation.

Why You Should Adopt the Cybersecurity NIST Framework The NIST Cybersecurity Framework (NIST CSF) is a risk-based approach to managing and reducing cybersecurity threats. Developed by the National ...

#NIST #800-171 #/ #DFARS

Origin | Interest | Match

0 0 0 0
Preview
Big contract compliance burdens…aren’t just a problem for contractors "Universities and colleges are now being subject to more rules and regulations," said Aron Beezley. The post Big contract compliance burdens…aren’t just a problem for contractors first appeared on Federal News Network.
0 0 0 0
Video

GOVERNMENT SHUTDOWN IMPACT ON CMMC

Watch the full conversation here: bit.ly/4avIwo6

#CMMC #CMMCCompliance #CyberAB #NIST800171 #DFARS #DefenseContractors #DefenseIndustry #GovernmentContracts #DoDContracts #SubcontractorCompliance #PrimeContractor

0 0 0 0
Video

UNDERSTANDING SERVICE PROVIDERS: CSPs VS. ESPs

Watch the full conversation here: bit.ly/4avIwo6

#CMMC #CMMCCompliance #CyberAB #NIST800171 #DFARS #DefenseContractors #DefenseIndustry #GovernmentContracts #DoDContracts #SubcontractorCompliance #PrimeContractor

0 0 0 0
Video

CSPs AND ESPs COMPLIANCE REQUIREMENTS

Watch the full conversation here: bit.ly/4avIwo6

#CMMC #CMMCCompliance #CyberAB #NIST800171 #DFARS #DefenseContractors #DefenseIndustry #GovernmentContracts #DoDContracts #SubcontractorCompliance #PrimeContractor

0 0 0 0
Video

INTERNATIONAL EXPANSION OF CMMC ECOSYSTEM

Watch the full conversation here: bit.ly/4avIwo6

#CMMC #CMMCCompliance #CyberAB #NIST800171 #DFARS #DefenseContractors #DefenseIndustry #GovernmentContracts #DoDContracts #SubcontractorCompliance #PrimeContractor

0 0 0 0
Video

ONGOING COMPLIANCE EMPHASIZED

Watch the full conversation here: bit.ly/4avIwo6

#CMMC #CMMCCompliance #CyberAB #NIST800171 #DFARS #DefenseContractors #DefenseIndustry #GovernmentContracts #DoDContracts #SubcontractorCompliance #PrimeContractor

0 0 0 0
CMMC Final Rule Explained: What Contractors Need to Know from the Sept 2025 Town Hall - EP #34
CMMC Final Rule Explained: What Contractors Need to Know from the Sept 2025 Town Hall - EP #34 YouTube video by CMMC Compliance Guide

The Cyber AB’s September 2025 Town Hall brought major updates every defense contractor and subcontractor needs to know.

🎧 Listen now: youtu.be/iU-vvpDoryo

#CMMC #CMMCCompliance #DoDContracts #DefenseContractors #CybersecurityCompliance #NIST800171 #GovCon #DFARS #CyberAB #CUI

0 0 0 0
Preview
Pentagon sets start date for CMMC implementation Step one involves getting this new cyber and supply chain security standard into solicitations as the Defense Department sees the full rollout as taking three years.

CMMC 2.0 starts showing up in DOD contracts Nov. 10. If you’re in the defense supply chain, now’s the time to tighten up your cybersecurity posture. #CMMC #DFARS #CyberRisk #DefenseIndustry www.washingtontechnology.com/contracts/20...

0 0 0 0
Preview
DOD Issues Final Rule Addressing Conflicts of Interest in Certain Consulting Contracts WHAT: The U.S. Department of Defense (DOD) published a final rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to prohibit contracting officers from awarding contracts assign...

Federal contractors providing consulting services to the DOD should prepare for a significant compliance shift in late October, as a new DFARS amendment will prohibit awarding contracts to firms with ties to covered foreign entities.
https://bit.ly/45GWQcK
#DOD #DFARS

0 0 0 0
Video

UPCOMING CMMC EVENTS & CONFERENCES

Watch the full conversation here: cmmccomplianceguide.com/podcast

#CMMC #CyberAB #CMMCCompliance #DoDCompliance #NIST800171 #48CFR #Gcode #CUI #CAGECode #GovCon #DefenseContracting #MSP #ComplianceLeadership #DFARS #Cybersecurity #CMMCLevel2

0 0 0 0
Video

IMPORTANCE OF CAGE CODES IN ASSESSMENTS

Watch the full conversation here: cmmccomplianceguide.com/podcast

#CMMC #CyberAB #CMMCCompliance #DoDCompliance #NIST800171 #48CFR #Gcode #CUI #CAGECode #GovCon #DefenseContracting #MSP #ComplianceLeadership #DFARS #Cybersecurity #CMMCLevel2

0 0 0 0
Video

ADVICE FOR BUSINESSES ON CMMC REQUIREMENTS

Watch the full conversation here: cmmccomplianceguide.com/podcast

#CMMC #CyberAB #CMMCCompliance #DoDCompliance #NIST800171 #48CFR #Gcode #CUI #CAGECode #GovCon #DefenseContracting #MSP #ComplianceLeadership #DFARS #Cybersecurity #CMMCLevel2

0 0 0 0
Video

G-CODE DEBATE: IS IT CUI?

Watch the full conversation here: cmmccomplianceguide.com/podcast

#CMMC #CyberAB #CMMCCompliance #DoDCompliance #NIST800171 #48CFR #Gcode #CUI #CAGECode #GovCon #DefenseContracting #MSP #ComplianceLeadership #DFARS #Cybersecurity #CMMCLevel2

0 0 0 0
Why CMMC Compliance Is So Expensive (And How to Lower the Cost Without Cutting Corners) - EP #22
Why CMMC Compliance Is So Expensive (And How to Lower the Cost Without Cutting Corners) - EP #22 YouTube video by CMMC Compliance Guide

This week’s CMMC Compliance Guide episode breaks down what really drives up costs—and how you can stay secure without breaking the bank.

🎧 Watch now: youtu.be/kCj1zoW3l6Y

#CMMC #NIST800171 #DFARS #Cybersecurity #DefenseContractor #CUI #SPRS #ComplianceBudget #CMMCL2 #DIB

0 0 0 0
Preview
DoD addresses two big challenges to make CMMC a reality Stacy Bostjanick, DoD’s chief of the Defense Industrial Base Cybersecurity in the CIO’s office, said managed service providers could reduce the cost of CMMC.

“Stacy Bostjanick, DoD’s chief of the #DIB #Cybersecurity in the CIO’s office, said the rule to change the .. #DFARs .. close to going to the Office of Management & Budget’s .. #OIRA .. for final processing.” federalnewsnetwork.com/defense-news... @federalnewsnetwork.com

1 0 0 0
Post image

RIP DIBNet.
The DoD just decommissioned its main cyber incident reporting portal for contractors.
Here’s what changed + how to stay compliant under DFARS 252.204-7012:
buff.ly/IRYcFNx
#DFARS #CyberCompliance #DIB

0 0 0 0
Preview
Understanding NIST SP 800-171, CMMC, and NIST SP 800-53: A Guide for Government Contractors If your organization contracts with the U.S. Department of Defense (DoD) or other federal agencies, you’ve likely heard of frameworks like NIST SP 800-171, CMMC, and NIST SP 800-53. Each plays a critical role in ensuring your systems protect sensitive government data, and understanding how they work together is key to achieving and maintaining compliance. In this guide, we’ll break down each framework, how they differ, and what your organization needs to do to stay eligible for lucrative government contracts. ## **NIST SP 800-171: Protecting Controlled Unclassified Information (CUI)** NIST Special Publication 800-171 provides a standardized set of 110 security requirements to protect Controlled Unclassified Information (CUI) in non-federal systems. These requirements are grouped into 14 families, covering areas such as access control, risk assessment, and system integrity. ### **Key Facts:** * Mandated by the Defense Federal Acquisition Regulation Supplement (DFARS), specifically clause 252.204-7012. * Originally self-attested, current regulations require submission of a score via the Supplier Performance Risk System (SPRS) under DFARS 252.204-7019. * Compliance is a prerequisite for working with the DoD. While NIST 800-171 compliance used to be self-assessed, contractors now must submit a self-assessment score and implement a System Security Plan (SSP) and Plan of Action & Milestones (POA&M). ## **CMMC: Cybersecurity Maturity Model Certification** To strengthen cybersecurity across the defense supply chain, the DoD introduced the Cybersecurity Maturity Model Certification (CMMC). CMMC builds on NIST SP 800-171 and introduces third-party verification. ### **CMMC 2.0:** **Level** | **Focus** | **Based On** | **Assessment** ---|---|---|--- Level 1 | FCI Protection | FAR 52.204-21 (Basic Safeguarding) | Annual self-assessment Level 2 | CUI Protection | NIST SP 800-171 Rev. 3 (110 requirements) | Third-party or self-assessment based on contract Level 3 | Advanced Threat Protection | NIST SP 800-172 | Government-led assessments ### Purchase a Vulnerability Scan ### **Key Changes in CMMC 2.0:** * Streamlined levels (from 5 to 3). * Alignment with NIST 800-171 Rev. 3 at Level 2. * Removal of process maturity requirements. ## **NIST SP 800-53: Broad Federal Security Baselines** NIST SP 800-53 outlines a comprehensive catalog of security and privacy controls for federal information systems. While not a DoD requirement by default, it’s often mandated in civilian agency contracts and is foundational to broader risk management strategies. ### **Use Cases:** * Required by federal agencies under FISMA (Federal Information Security Modernization Act). * Used to establish security control baselines tailored to risk levels (Low, Moderate, High). SP 800-53 offers 20+ control families ranging from Access Control (AC) to Supply Chain Risk Management (SR), with hundreds of individual controls and enhancements. ### **Comparison to NIST 800-171:** NIST 800-171 is essentially a tailored subset of NIST 800-53, stripped of federal-specific controls (like personnel clearances or continuous monitoring requirements). ## **Quick Comparison Table** To help clarify the differences between the three main cybersecurity frameworks, the table below summarizes their purpose, who mandates them, and how they are assessed: **Framework** | **Purpose** | **Mandated By** | **Assessment Type** ---|---|---|--- NIST SP 800-171 | Protect CUI in non-federal systems | DFARS 252.204-7012 | Self-assessed (with score submission) CMMC 2.0 | Certify cybersecurity maturity for DoD work | DFARS 252.204-7021 (pending) | Self + Third-party (C3PAO/Gov) NIST SP 800-53 | Secure federal systems broadly | FISMA (non-DoD agencies) | Audited by agency or third party Get a Cyber Risk Report ## **Preparing for Compliance** Organizations aiming to win or retain federal contracts must treat cybersecurity compliance as a strategic priority. Here’s how to prepare: 1. **Determine your data type** : Are you handling Federal Contract Information (FCI), CUI, or both? 2. **Perform a gap analysis** : Map current practices against NIST SP 800-171 Rev. 3 or NIST SP 800-53. 3. **Develop your SSP and POA &M**: These documents are essential for both DFARS and CMMC compliance. 4. **Partner with experts** : Work with a consultant or Managed Security Service Provider (MSSP) to guide implementation and remediation. ## **Kick-Off Your Compliance Journey** For DoD contracts, CMMC certification will soon be non-negotiable. Even if you’re already compliant with NIST SP 800-171, preparing for third-party audits under CMMC 2.0 is critical. For other federal agencies, understanding and applying NIST SP 800-53 controls may be required. Whether you’re just starting your compliance journey or looking to validate and improve existing controls, now is the time to act. Need help navigating your organization’s compliance? Request a Free Consultation and start securing your contracts today. **Contact Us Now!**

Understanding NIST SP 800-171, CMMC, and NIST SP 800-53: A Guide for Government Contractors If yo...

blog.rsisecurity.com/understanding-nist-sp-80...

#CMMC #NIST #800-171 #/ #DFARS

Result Details

0 0 0 0
Preview
DoD Specifies Implementation Requirements for NIST 800-171 Cyber Standard | Government Contracts Legal Forum The Department of Defense (DoD) has released a memorandum establishing the DoD Organization-Defined Parameters (ODPs) for use in National

" .. release of this memorandum may indicate DoD’s intention to soon incorporate Rev. 3 into #DFARS 252.204-7012, #Safeguarding Covered Defense Information & Cyber Incident Reporting (DFARS 7012) as well as .. #CMMC .. " www.governmentcontractslegalforum.com/2025/05/arti...

0 0 0 0
Top 5 Ways Contractors Fail NIST 800-171 Assessments
Top 5 Ways Contractors Fail NIST 800-171 Assessments YouTube video by CMMC Compliance Guide

🚨 Are you really NIST 800-171 compliant—or just hoping no one checks? 😬
Brooke & Austin break down the top CMMC mistakes in this must-hear episode:
✅ Scoping
✅ MFA
✅ Risk docs
✅ Flow-down
🎧 youtu.be/PKJej4Hs9AE
#CMMC #NIST800171 #CUI #DFARS

0 0 0 0
Preview
How to Develop a System Security Plan for NIST SP 800-171 Compliance - IBSSCORP Learn how to develop a strong System Security Plan (SSP) for NIST SP 800-171 compliance.

Don't delay - it's time to prepare for NIST SP 800-171 compliance for DoD contracts. 

👉 ibsscorp.com/how-to-develop-a-system-...

#NISTSP800171 #DFARS #SystemSecurityPlan #CybersecurityCompliance #DoDContracting #CyberResilience

0 0 0 0
Video

Tools to Speed Up Compliance

Watch the full conversation here: bit.ly/4avIwo6

#SPRSScore #CMMCCompliance #NIST800171 #DoDContracts #CybersecurityCompliance #GovCon #DefenseContracting #ComplianceStrategy #SystemSecurityPlan #POAM #ControlledUnclassifiedInformation #DFARS #FutureFeed #GRCtools

0 0 0 0
Video

Improving Your SPRS Score

Watch the full conversation here: bit.ly/4avIwo6

#SPRSScore #CMMCCompliance #NIST800171 #DoDContracts #CybersecurityCompliance #GovCon #DefenseContracting #ComplianceStrategy #SystemSecurityPlan #POAM #ControlledUnclassifiedInformation #DFARS #FutureFeed #GRCtools #MFA

0 0 0 0
Video

The Importance of Encryption

Watch the full conversation here: bit.ly/4avIwo6

#SPRSScore #CMMCCompliance #NIST800171 #DoDContracts #CybersecurityCompliance #GovCon #DefenseContracting #ComplianceStrategy #SystemSecurityPlan #POAM #ControlledUnclassifiedInformation #DFARS #FutureFeed #GRCtools

0 0 0 0
Preview
Auburn Manufacturing, Inc. (B-423308; B-423308.2) You should not care. Category: Buy American Act, price evaluation Date: 26 March 2025 URL: https://www.gao.gov/products/b-423308 Auburn Manufacturing, Inc., a woman-owned small business, protested…

#GAO tosses Auburn’s protest over #foreign product award, clarifying #DFARS allows—not forbids—foreign items if disclosed. #BuyAmericanAct

0 0 0 0
Preview
CMMC Compliance Can Be EASY: A Practical Framework for Defense Contractors Struggling with CMMC compliance? Learn how defense contractors can simplify their path to certification using the E.A.S.Y. Framework—expert guidance, alignment to requirements, a streamlined approach,...

In our latest article, we break down a practical framework to help defense contractors simplify CMMC compliance without cutting corners.

Read the article here: cmmccomplianceguide.com/blog/b/cmmc-...

#CMMC #CMMCCompliance #defensecontractors #NIST800171 #DFARS #CUIProtection #federalcontracts

0 0 0 0
Video

CMMC Doesn't Have to Be Scary

Watch the full conversation here: youtu.be/_XDL64GFRC8

#CMMC #cmmccompliance #CybersecurityStandards #ComplianceGuide #AerospaceCompliance #DFARS #CybersecurityFramework #CUIProtection #SmallBusinessCompliance #DefenseContractors #CybersecurityTips #dataprotection

0 0 0 0
Video

Using Compliance as a Competitive Advantage

Watch the full conversation here: youtu.be/_XDL64GFRC8

#NIST800171 #CMMCCompliance #CybersecurityStandards #ComplianceGuide #AerospaceCompliance #DFARS #CybersecurityFramework #CUIProtection #SmallBusinessCompliance #DefenseContractors #CybersecurityTips

0 0 0 0
Preview
Understanding the Interplay Between CMMC, NIST, and DFARS <p><span style="font-weight: 400;">Organizations that contract with the US Military provide vital materials, products, and services that keep the country—and the world—safe. But to do so effectively, they need to comply with several regulatory standards. The critical ones are all connected: CMMC, NIST, and DFARS.</span></p> <p><span id="more-15511"></span></p> <p><span style="font-weight: 400;">Is your organization ready for full DoD compliance? </span><a href="https://www.rsisecurity.com/request-a-consultation/"><span style="font-weight: 400;">Schedule a consultation</span></a><span style="font-weight: 400;"> to find out.</span></p> <p><span style="font-weight: 400;"> </span></p> <h2><b>CMMC, NIST, DFARS, and Defense Industrial Base Security</b></h2> <p><span style="font-weight: 400;">Organizations that contract with the Department of Defense (DoD) make up the Defense Industrial Base (DIB). Every single entity in this community comes into contact with large amounts of sensitive information that needs to be protected. The DoD has worked with other governmental and private agencies to develop and maintain security standards to that effect.</span></p> <p><span style="font-weight: 400;">In a nutshell, DoD compliance comprises three unique but interconnected frameworks:</span></p> <ul> <li aria-level="1" style="font-weight: 400;"><span style="font-weight: 400;">The Cybersecurity Maturity Model Certification <a href="https://www.rsisecurity.com/compliance-advisory-services/cmmc/">(CMMC) program</a></span></li> <li aria-level="1" style="font-weight: 400;"><span style="font-weight: 400;">National Institute of Standards and Technology <a href="https://www.rsisecurity.com/compliance-advisory-services/nist_800-171/">(NIST)  regulations</a></span></li> <li aria-level="1" style="font-weight: 400;"><span style="font-weight: 400;">Defense Federal Acquisition Regulation Supplement<a href="https://blog.rsisecurity.com/guide-to-dfars-cybersecurity-compliance-requirements/"> (DFARS) rules</a></span></li> </ul> <p><span style="font-weight: 400;">CMMC is the most comprehensive suite for the purposes of all potential and current DoD contractors; working with a </span><a href="https://www.rsisecurity.com/compliance-advisory-services/cmmc/"><span style="font-weight: 400;">CMMC compliance partner</span></a><span style="font-weight: 400;"> will help you prepare for the future.</span></p> <p><span style="font-weight: 400;"> </span></p> <h2><b>The Cybersecurity Maturity Model Certification Program</b></h2> <p><span style="font-weight: 400;">CMMC is a regulatory framework developed by the DoD and other governmental stakeholders to optimize cybersecurity across the DIB. Its primary goals are related to two forms of data that are present in DIB ecosystems: Federal Contract Information (FCI) and <a href="https://blog.rsisecurity.com/department-of-defense-guidance-on-safeguarding-cui/">Controlled Unclassified Information (CUI)</a>. A contractor’s Level and <a href="https://blog.rsisecurity.com/what-are-the-cmmc-20-certification-requirements/">requisite controls</a> depend on which of these kinds of data they process, to what extent, and the amount and severity of threats to the sensitive data.</span></p> <p><span style="font-weight: 400;">Currently, the DoD Chief Information Officer (CIO) oversees the CMMC program as the primary compliance authority. Recent updates aim to streamline accessibility for both current and prospective DoD contractors.</span></p> <p><span style="font-weight: 400;">Given the newness and dynamism of the program, many organizations may be accustomed to language that has only recently been updated. For example, many organizations were preparing for compliance with one of five “Maturity Levels” in an earlier form of CMMC. Governing bodies have changed as well, as the program used to be run by the Office of the Undersecretary of Defense for Acquisition &amp; Sustainment (OUSD (A&amp;S))—now, as noted above, it’s the DoD CIO.</span></p> <p><span style="font-weight: 400;">These changes extend to the assessment ecosystem, which we’ll cover in detail below.</span></p> <p><span style="font-weight: 400;"> </span></p> <h3><b>How CMMC 2.0 Compares to Earlier Versions of the Program</b></h3> <p><span style="font-weight: 400;">The <a href="https://blog.rsisecurity.com/the-evolution-to-cmmc-20/">biggest changes to CMMC</a> in recent years have been to the framework itself and to the assessment ecosystem (see below). On both fronts, the changes have been in service of making compliance more streamlined and straightforward for every party involved.</span></p> <p><span style="font-weight: 400;">The CMMC 2.0 framework comprises 134 total possible controls that contractors need to implement and maintain, depending on which Level they fall into. Unlike prior editions, these controls are direct adaptations of NIST controls (rather than similar and loosely based on them).</span></p> <p><span style="font-weight: 400;">As of CMMC 2.0, there are three levels that DoD contractors can be categorized into:</span></p> <ul> <li aria-level="1"><b>CMMC 2.0 Level 1</b><span style="font-weight: 400;"> – Tailored for organizations handling only Federal Contract Information (FCI), with minimal cybersecurity risks and requirements. There are 15 requirements aligned with NIST SP 800-171 (see below), and organizations are able to perform annual self-assessments to comply.</span></li> </ul> <ul> <li aria-level="1"><b>CMMC 2.0 Level 2</b><span style="font-weight: 400;"> – Focuses on organizations managing Controlled Unclassified Information (CUI) alongside FCI. It encompasses 110 requirements aligned with NIST SP 800-171 and typically requires triennial third-party assessments with annual affirmations.</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;"><a href="https://blog.rsisecurity.com/who-needs-a-level-2-cmmc-assessment/">This level of maturity</a> is roughly equivalent to Level 3 in earlier versions of CMMC. The intermediate Level 2 was phased out in service of simplification.</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>CMMC 2.0 Level 3</b><span style="font-weight: 400;"> – Designed for organizations that process CUI and FCI in high-risk environments with advanced persistent threats (APTs). There are 134 requirements from SP 800-171 and 800-172 (see below) with government-led assessments for compliance.</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Similarly, this final level is equivalent to Level 5 in earlier versions of CMMC. An intermediate Level 4 was phased out in favor of full APT protection at this stage.</span></li> </ul> </li> </ul> <p><span style="font-weight: 400;">As these breakdowns illustrate, understanding the NIST frameworks from which CMMC derives its requirements is essential to their implementation, assessment, and long-term maintenance.</span></p> <p> </p> <p><span style="font-weight: 400;"><div class="su-button-center"><a class="su-button su-button-style-flat" href="https://www.rsisecurity.com/contact/" rel="noopener noreferrer" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px" target="_blank"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;text-shadow:none"> Request a Free Consultation</span></a></div></span></p> <p><span style="font-weight: 400;"> </span></p> <h2><b>The Impact of NIST Special Publications on the DIB</b></h2> <p><span style="font-weight: 400;">NIST’s Special Publications influence most if not all frameworks that apply to governmental offices and the private organizations they work with. In the case of CMMC, <a href="https://blog.rsisecurity.com/what-is-nist-and-why-is-it-critical-to-cybersecurity/">NIST SP 800-171</a> and 172 form the basis of the controls and sensibilities that DoD contractors implement to comply. When you<a href="https://blog.rsisecurity.com/how-to-prepare-for-cmmc-and-nist-assessments/"> implement the CMMC</a>, you are essentially implementing NIST’s controls.</span></p> <p><span style="font-weight: 400;">NIST SP 800-171 and NIST SP 800-172 <a href="https://blog.rsisecurity.com/how-to-map-nist-cybersecurity-framework-controls/">both comprise controls</a> meant to<a href="https://blog.rsisecurity.com/dod-cui-categories-to-protect-for-nist-and-dfars-compliance/"> protect CUI</a>. The former defines Basic and Derived Security Requirements, which loosely correspond to CMMC 2.0 Levels 1 and 2, respectively (see below). NIST SP 800-172 expands on these by introducing Enhanced Security Requirements specifically designed to address and mitigate APTs.</span></p> <p><span style="font-weight: 400;">Here is an overview of all Requirements across both documents by Requirement Family:</span></p> <ul> <li aria-level="1"><b>Access Control</b><span style="font-weight: 400;"> – Restriction, monitoring, and control over access to sensitive systems</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Basic Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">19 Derived Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Three Enhanced Security Requirements</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>Awareness and Training</b><span style="font-weight: 400;"> – Baselines for training and assessing staff for awareness</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Basic Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">One Derived Security Requirement</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Enhanced Security Requirements</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>Audit and Accountability</b><span style="font-weight: 400;"> – Schedules and minimum requirements for regular auditing</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Basic Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Seven Derived Security Requirements</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>Configuration Management</b><span style="font-weight: 400;"> – Baseline settings required on all organizational assets</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Basic Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Seven Derived Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Three Enhanced Security Requirements</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>Identification and Authentication</b><span style="font-weight: 400;"> – User identity, account, and credential management</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Basic Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Nine Derived Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Three Enhanced Security Requirements</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>Incident Response</b><span style="font-weight: 400;"> – Protocols for mitigation and recovery in the event of an incident</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Basic Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">One Derived Security Requirement</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Enhanced Security Requirements</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>Maintenance</b><span style="font-weight: 400;"> – Scheduling for regular and special event updates and repair work</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Basic Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Four Derived Security Requirements</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>Media Protection</b><span style="font-weight: 400;"> – Safeguards for onboarding, managing, and terminating devices</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Three Basic Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Six Derived Security Requirements</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>Personnel Security</b><span style="font-weight: 400;"> – Protections during recruitment, hiring, and personnel moves</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Basic Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Enhanced Security Requirements</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>Physical Protection</b><span style="font-weight: 400;"> – Restrictions on physical and proximal access to sensitive data</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Basic Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Four Derived Security Requirements</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>Risk Assessment</b><span style="font-weight: 400;"> – Mandates for risk monitoring, analysis, and overall mitigation</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">One Basic Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Derived Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Seven Enhanced Security Requirements</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>Security Assessment</b><span style="font-weight: 400;"> – Regular system-wide assessments to ensure efficacy</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Four Basic Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">One Enhanced Security Requirement</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>System and Communications Protection</b><span style="font-weight: 400;"> – Controls across communications</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Two Basic Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">14 Derived Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Five Enhanced Security Requirements</span></li> </ul> </li> </ul> </li> </ul> <ul> <li aria-level="1"><b>System and Information Integrity</b><span style="font-weight: 400;"> – Protections for confidentiality and privacy</span></li> </ul> <ul> <li style="list-style-type: none;"> <ul> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Three Basic Security Requirements, </span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Four Derived Security Requirements</span></li> <li aria-level="2" style="font-weight: 400;"><span style="font-weight: 400;">Seven Enhanced Security Requirements</span></li> </ul> </li> </ul> <p><span style="font-weight: 400;">Note that while NIST’s Basic and Derived Requirements inform CMMC 2.0 Levels 1 and 2, they do not directly correspond in a one-to-one manner. For example, Access Control has two Basic Security Requirements in NIST, but there are four AC requirements for CMMC 2.0 Level 1.</span></p> <p><span style="font-weight: 400;">However, there is a direct correspondence between Enhanced Requirements and CMMC 2.0 Level 3—only organizations at that level are expected to implement these advanced controls.</span></p> <p> </p> <p><span style="font-weight: 400;"><div class="su-button-center"><a class="su-button su-button-style-flat" href="https://www.rsisecurity.com/contact/" rel="noopener noreferrer" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px" target="_blank"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;text-shadow:none"> Request a Free Consultation</span></a></div></span></p> <p><span style="font-weight: 400;"> </span></p> <h2><b>How DFARS Shapes DoD and DIB Cybersecurity</b></h2> <p><span style="font-weight: 400;">DFARS serves as the foundational regulation driving the need for CMMC and NIST compliance across the Defense Industrial Base (DIB). The Federal Acquisition Regulation (FAR) applies to all executive agencies and sets up parameters for their dealings with entities across the public and private sectors. DFARS is a supplement to these rules that applies specifically to the branches of the US Military. Given the scope and sensitivity of the DoD’s relationship-building, DFARS places special emphasis on security and privacy.</span></p> <p><span style="font-weight: 400;">In essence, several SFARS clauses within DFARS 252.204 stipulate that contractors working with the US Military need to conduct assessments to ensure compliance with NIST. The CMMC program was born out of an effort to simplify and streamline these requirements. In a nutshell, NIST’s standards have always been what US Military contractors have needed to achieve, per DFARS. CMMC streamlined these requirements into a more accessible implementation and assessment scheme, and DFARS is the baseline document that requires CMMC and NIST.</span></p> <p><span style="font-weight: 400;">What this all means in practice is that CMMC is the regulation to focus on for contractors.</span></p> <p><span style="font-weight: 400;"> </span></p> <h2><b>Assessments for CMMC and DoD Compliance</b></h2> <p><span style="font-weight: 400;">As noted above, recent changes to CMMC have impacted the assessment ecosystem. In particular, more organizations are now eligible to self-assess, and the processes and oversight over high-level assessments have changed. While the DoD CIO is in charge of overall CMMC governance, it’s not the only entity overseeing assessments. Other players are the Cyber-AB (formerly the CMMC Accreditation Body) and DIB Cybersecurity Assessment Center (DIBCAC).</span></p> <p><span style="font-weight: 400;">Organizations at CMMC 2.0 Level 1 are generally eligible to self-assess their implementation. A Level 1 Self-Assessment Guide is available from the DoD CIO. However, it is still recommended for these organizations to work closely with an advisor to ensure their assessments go smoothly.</span></p> <p><span style="font-weight: 400;">The vast majority of organizations seeking CMMC compliance should be targeting Level 2. This involves full coverage of NIST SP 800-171 and, maybe more critically, a third-party assessment. These assessments need to be conducted by <a href="https://blog.rsisecurity.com/the-role-of-c3pao-in-cmmc-compliance/">Certified Third Party Assessment Organizations (C3PAOs)</a>, who themselves go through rigorous vetting via the Cyber AB. Working with an advisor in the run-up to formal assessment helps, and the <a href="https://blog.rsisecurity.com/the-benefits-of-c3pao-assessment-services/">best C3PAO partners</a> can also provide comprehensive support in scoping, preparation, and implementation processes.</span></p> <p><span style="font-weight: 400;">Organizations at CMMC 2.0 Level 3 also have their work cut out for them, as they need to undergo a government-led assessment through DIBCAC. As with Levels 1 and 2, organizations should work with an advisor to prepare for these formal triennial assessments.</span></p> <p><span style="font-weight: 400;"> </span></p> <h2><b>Prepare for Full DoD Compliance, Efficiently</b></h2> <p><span style="font-weight: 400;">Together, DFARS, NIST, and CMMC create a cohesive framework to secure sensitive data within the Defense Industrial Base, safeguarding national security and operational integrity. By extension, they ensure the security of the armed forces and of Americans across the country and the world. Understanding the interplay between these frameworks and rulesets is essential to establishing a relationship with the DoD.</span></p> <p><span style="font-weight: 400;">RSI Security is a fully accredited C3PAO vetted and listed by the Cyber-AB. Our experience working with military and other government contractors is extensive, and we’ve been helping organizations prepare for full DoD compliance since long before the current version of CMMC was released. We know that discipline upfront unlocks the freedom to grow in the long-run.</span></p> <p><span style="font-weight: 400;">To learn more about how we can help you comply, </span><a href="https://www.rsisecurity.com/contact/"><span style="font-weight: 400;">contact RSI Security today</span></a><span style="font-weight: 400;">!</span></p> <p> </p> <p><strong>Contact Us Now!</strong><br/> <script charset="utf-8" src="https://js.hsforms.net/forms/embed/v2.js" type="text/javascript"></script><br/> <script> hbspt.forms.create({ region: "na1", portalId: "45249340", formId: "742f8d2a-8542-43ca-9190-4673ee24bd91", onFormReady: function($form) { // Set the hidden field value for HIPAA Checklist $form.find('input[name="services"]').val('Contact'); } }); </script></p> <div class="penci-single-link-pages"> </div>

Understanding the Interplay Between CMMC, NIST, and DFARS Organizations that contract with the US...

blog.rsisecurity.com/understanding-the-interp...

#CMMC #NIST #800-171 #/ #DFARS

Event Attributes

0 0 0 0
Preview
FedRAMP Authorization vs. Equivalency: Key Insights for CMMC Compliance Discover the critical differences between FedRAMP Authorization and Equivalency. Learn how they impact compliance timelines, costs, and CMMC assessments. Schedule a free 10-minute discovery call today...

Struggling with CMMC compliance? Learn how choosing the right cloud service can impact costs, timelines & security. Don’t risk delays—get the facts now!

🔗 cmmccomplianceguide.com/blog/b/fedra...

#CMMC #FedRAMP #CyberSecurity #Compliance #CloudSecurity #NIST800171 #DFARS #DoDCompliance

0 0 0 0