There are no products listed under this category.
Name: Defense Federal Acquisition Regulation Supplement (DFARS)
Type: Regulatory (Regulation)
Authoritative Source: Acquisition.gov
Certification Available: Yes. The US Department of Defense (DoD) has the Cybersecurity Maturity Model Certification (CMMC) as the method to certify contractors for compliance purposes.
Too Long / Didn’t Read (TL/DR): DFARS cybersecurity clauses, particularly 252.204-7012, -7019, -7020 and -7021,are no longer dormant regulatory obligations. They now represent a current compliance regime, grounded in NIST SP 800-171 and enforced through contractual terms, government assessments and civil litigation.
These DFARS clauses marked the end of the self-certification era. Defense contractors must now invest in defensible documentation, technical rigor and third-party assurance. Organizations that treat these clauses as operational mandates and not legal formalities will be better positioned to retain contracts, protect national security information and navigate DoD’s evolving cybersecurity landscape.
As enforcement continues to expand, the ability to prove compliance at any point in time through validated controls, accurate scoring and robust documentation has become the cornerstone of doing business in the Defense Industrial Base (DIB).
In response to escalating threats to defense supply chains, the US Department of Defense (DoD) codified a robust cybersecurity framework through a series of Defense Federal Acquisition Regulation Supplement (DFARS) clauses. These clauses are designed to enforce cybersecurity standards on DoD contractors and subcontractors, particularly those who handle Controlled Unclassified Information (CUI).
The five main DFARS clauses, 252.204-7008, 252.204-7012, 252.204-7019, 252.204-7020 and 252.204-7021, collectively establish the cybersecurity baseline for defense suppliers. Together, they impose prescriptive requirements for system security, incident reporting, assessment and third-party certification. From mandatory implementation of NIST SP 800-171 to the emerging Cybersecurity Maturity Model Certification (CMMC) program, these regulations fundamentally alter how defense contractors manage cybersecurity compliance.
This page provides a cybersecurity-focused summary of GLBA from a GRC practitioner's perspective, including:
The DFARS cybersecurity clauses emerged from a decade of rising concern within the DoD over the theft of sensitive defense information. With adversaries exploiting cyber weaknesses in the DIB, the DoD sought to impose enforceable cybersecurity obligations on contractors.
Key milestones include:
While each clause serves a distinct purpose, they function collectively to create a structured compliance pathway that links contractual eligibility with cybersecurity maturity.
DFARS 252.204-7008 – Compliance with Safeguarding Covered Defense Information Controls
This clause is a pre-award requirement asserting that contractors must represent their ability to comply with the security requirements of NIST SP 800-171, or list out variances via a System Security Plan (SSP) and Plan of Action and Milestones (POA&M):
Key compliance action: Maintain current and accurate SSP and POA&M documentation prior to contract award.
DFARS 252.204-7012 – Safeguarding Covered Defense Information and Cyber Incident Reporting
The core DFARS cybersecurity clause, -7012 mandates both preventive and responsive controls for handling CUI. Highlights include:
Compliance with -7012 is not optional. It is enforceable under contract law and is often a focal point during audits and investigations.
DFARS 252.204-7019 – Notice of NIST SP 800-171 DoD Assessment Requirements
Clause -7019 formalizes the requirement for contractors to perform and submit cybersecurity assessments to the DoD's Supplier Performance Risk System (SPRS). Requirements include:
SPRS scores are used by contracting officers during source selection and acquisition reviews, creating a direct link between cybersecurity posture and business opportunity.
DFARS 252.204-7020 – NIST SP 800-171 DoD Assessment Requirements
Clause -7020 mandates that contractors:
This clause operationalizes enforcement by granting the DoD access to audit and validate contractor claims and is often triggered by risk-based criteria or anomalies in SPRS scoring.
DFARS 252.204-7021 – Cybersecurity Maturity Model Certification (CMMC) Requirements
Clause -7021 codifies the requirement for contractors to meet the CMMC level specified in the solicitation before contract award.
No self-attestation is permitted under this clause. Certification must be verified prior to award and maintained throughout contract performance.
Failure to comply with DFARS cybersecurity clauses carries serious consequences—both contractual and legal.
While DoD has not widely publicized contract terminations under these clauses, recent legal activity suggests growing enforcement momentum.
Aerojet Rocketdyne (2022) – False Claims Act Settlement
This case confirmed that internal whistleblowers, even without a breach event, can bring FCA claims based on inadequate SSPs and security gaps.
DOJ Civil Cyber-Fraud Initiative (2021 – Present)
These developments show that DFARS cybersecurity compliance is no longer a passive or symbolic requirement—it is a measurable legal duty.
DFARS compliance is not achieved with a policy document or one-time assessment—it requires a sustained operational program rooted in NIST SP 800-171.
Documentation is not a formality in DFARS compliance, but is the primary evidence used by DoD and legal authorities to assess security posture and contract eligibility. Failure to produce documentation upon request can be interpreted as failure to implement the control.
Key Documents Include:
** SPONSORED CONTENT **
There are no products listed under this category.