No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

How Government Contractors & Agencies Should Navigate New Cyber Rules

June 25, 2023
in Protection
0
How Government Contractors & Agencies Should Navigate New Cyber Rules



There are kinks in the chain — the supply chain. And after several high-profile cybersecurity breaches over the past few years, the federal government continues to crack down on potential risks with new rules and regulations that affect government agencies and contractors.

The proposal of a new Federal Acquisition Regulation (FAR) rule — which would mandate contractors and service providers supporting US government agencies to meet enhanced cybersecurity requirements, along the lines of the Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) program — is the latest representation of this.

Currently, anyone handling sensitive information for the government is obligated to meet 15 basic cybersecurity requirements. However, the proposed changes aim to elevate cybersecurity standards and align them closer to the National Institute of Standards and Technology (NIST) Special Publication 800-171, which is already a requirement for Department of Defense (DoD) contractors that handle sensitive government information. However, it’s still unclear how compliance will be measured and monitored. If it tracks with the DoD CMMC program, there could be a mix of third-party assessment requirements and self-reporting.

Although these new expanded compliance measures will improve cyber and data security in the federal supply chain, many government agencies still face their own challenges. They operate on legacy systems and outdated network infrastructures, which may not meet modern, stringent security and compliance reporting requirements. Add in the rise of remote work and the use of external networks and devices and you risk having multiple access points that are less secure. Ensuring the integrity of the entire ecosystem, due to the interconnected nature of federal networks and reliance on contractors and third-party vendors to correctly and securely handle government data, is one part critical and one part challenging.

Zero-Trust Networking

The new requirements to move toward zero-trust networking are bringing to light just how much ground government agencies must make up. One of the biggest obstacles is the need for continuous monitoring. Network security requires an ongoing process to detect threats, vulnerabilities, and potential breaches. Many agencies lack the resources, tools, and expertise to effectively monitor their networks in real-time and respond promptly to emerging threats.

How should government contractors and agencies prepare for their respective security and compliance requirements?

  1. Prioritize all network devices. It’s become a habit to assess for vulnerabilities only at the perimeter. Our recent study of cybersecurity professionals across US military, federal government and critical national infrastructure revealed that 96% of organizations prioritize configuring and auditing firewalls but not routers or switches. This means that only 4% assess switches and routers, leaving these devices exposed to potentially significant and unidentified risks. According to zero-trust best practices, it is essential to assess all these devices to prevent lateral movement across networks.
  2. Segment networks. Implementing network segmentation can mitigate the impact of a potential breach by compartmentalizing sensitive information and limiting lateral movement within the network. By segregating networks based on access levels and data classification, organizations can reduce the possible attack surface and minimize the impact of a breach.
  3. Utilize compliance audits and assurance automation tools. This is one way for contractors and agencies to prepare for audits. Regular assessments should be conducted to identify vulnerabilities, assess risks, and ensure compliance with network security requirements. These assessments can identify gaps in network security controls and allow for prompt remediation. Using tools that provide exact technical fixes for misconfigurations is also essential.

The impending proposal of a FAR rule that introduces CMMC-like regulations for all contractors who handle sensitive government information highlights the increasing importance of enhanced network security and regulatory compliance across the federal supply chain. While this will help reduce the cybersecurity risk from contractors, US government agencies still have to address their own challenges in meeting current security and compliance requirements, starting with the steps above. This means that contractors and federal agencies must be proactive and stay ahead of the regulatory curve.

Protecting sensitive government information is paramount, and can be done by aligning cybersecurity requirements and incorporating established frameworks, such as NIST. By leveraging automation tools to perform security and compliance audits and through implementing principles supporting a zero-trust mindset, contractors and agencies can successfully adapt to the evolving cybersecurity landscape and contribute to a safer ecosystem.

Editorial Team

Editorial Team

Related Posts

Samsung Now Officially Supports AirDrop, but Only for These Devices
Protection

Samsung Now Officially Supports AirDrop, but Only for These Devices

March 22, 2026
My Favorite Portable Projector Is $130 Off During Amazon's Early Big Spring Sale
Protection

My Favorite Portable Projector Is $130 Off During Amazon’s Early Big Spring Sale

March 20, 2026
This Massive Data Breach Leaked 2.7 Million Social Security Numbers
Protection

This Massive Data Breach Leaked 2.7 Million Social Security Numbers

March 20, 2026
Six Strength Training 'Rules' You Can Safely Ignore, According to the ACSM
Protection

Six Strength Training ‘Rules’ You Can Safely Ignore, According to the ACSM

March 20, 2026
YouTube Wants Your Help Identifying AI Slop on Its Platform
Protection

YouTube Wants Your Help Identifying AI Slop on Its Platform

March 20, 2026
Google Just Made Four Big Upgrades to Android Gaming on Your Windows PC
Protection

Google Just Made Four Big Upgrades to Android Gaming on Your Windows PC

March 20, 2026
Load More
Next Post
Warlord Yevgeny Prigozhin to leave Russia as part of deal to end insurrection

Warlord Yevgeny Prigozhin to leave Russia as part of deal to end insurrection

Popular News

  • Josh Garber

    How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • Analysis-New Zealand struggles to regain economic mojo without housing recovery

    0 shares
    Share 0 Tweet 0
  • I Used Monarch Money for 30 Days: Here’s What Happened

    0 shares
    Share 0 Tweet 0
  • TAP Airline Portugal Partners: What to Know

    0 shares
    Share 0 Tweet 0
  • Ethereum Approaches A “Never Broken” Support Line: Accumulators Step In

    0 shares
    Share 0 Tweet 0

Latest News

CoinDCX’s founders under fire in $75K fraud case: Details

CoinDCX’s founders under fire in $75K fraud case: Details

March 23, 2026
0

CoinDCX, an Indian cryptocurrency exchange backed by Coinbase, is embroiled in a fraud case involving its founders, Sumit Gupta and...

Tokio Marine to form strategic partnership with Berkshire Hathaway, initially sell 2.49% stake

Tokio Marine to form strategic partnership with Berkshire Hathaway, initially sell 2.49% stake

March 23, 2026
0

Tokio Marine to form strategic partnership with Berkshire Hathaway, initially sell 2.49% stake

Ripple (XRP) injective

XRP Still Stuck In Bear Market Cycle With Threats Of A Price Crash To $1.13

March 23, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure Even though there have been a number...

Blockchain Messaging Adoption Rising in Line With Global Unrest

Blockchain Messaging Adoption Rising in Line With Global Unrest

March 23, 2026
0

Decentralized, blockchain-based messaging and social media apps saw a surge of interest over the last year amid civil unrest and...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.