Skip to Content

Basic Understanding (1 of 5 courses, first course is free)

Minimum Security Protocol Introduction

The referenced document, publicly available, outlines Federal Acquisition Regulation (FAR) clause 52.204-21, which establishes the mandatory minimum security protocols for private contractors handling non-public government data. It defines covered contractor information systems and identifies the specific types of federal contract information that require protection. The regulation mandates fifteen basic safeguarding requirements, ranging from access control and identity authentication to malicious code protection and physical equipment security. Furthermore, it stipulates that these cybersecurity obligations must be extended to subcontractors who interact with the same sensitive data. Ultimately, this document serves as a legal framework to ensure that contractual information remains secure while residing on or moving through external private networks.
Rating
0 0

There are no comments for now.

to be the first to leave a comment.

3. Does 'Federal contract information' include information provided by the Government to the public on websites?,
4. What type of 'simple transactional information' is excluded from the definition of Federal contract information?
9. Information system access must be limited to specific types of _____ and _____ that authorized users are permitted to execute.
10. What must a contractor do regarding connections to external information systems?
11. Where must a contractor control information being posted or processed?
12. As a prerequisite to allowing access to organizational systems, a contractor must _____ the identities of users, processes, or devices.
13. What action must be taken on information system media containing FCI before disposal?
14. Physical access to information systems and equipment must be limited to _____.
15. Besides limiting access, what three physical safeguarding actions are required for visitors
16. What physical hardware must be controlled and managed to protect information systems?
Additional Resources
Join this Course to access resources