-
FAR 52.204-21: Basic Safeguarding of Contractor Information Systems
-
- Join this Course to access resources
- Join this Course to access resources
- Quiz
-
Basic Understanding (1 of 5 courses, first course is free)
Minimum Security Protocol Introduction
The referenced document, publicly available, outlines Federal Acquisition Regulation (FAR) clause 52.204-21, which establishes the mandatory minimum security protocols for private contractors handling non-public government data. It defines covered contractor information systems and identifies the specific types of federal contract information that require protection. The regulation mandates fifteen basic safeguarding requirements, ranging from access control and identity authentication to malicious code protection and physical equipment security. Furthermore, it stipulates that these cybersecurity obligations must be extended to subcontractors who interact with the same sensitive data. Ultimately, this document serves as a legal framework to ensure that contractual information remains secure while residing on or moving through external private networks.
Rating
0
0
There are no comments for now.
Join this Course
to be the first to leave a comment.
1.
According to FAR 52.204-21, what is a 'covered contractor information system'?
2.
What is the definition of 'Federal contract information' (FCI)?
3.
Does 'Federal contract information' include information provided by the Government to the public on websites?,
4.
What type of 'simple transactional information' is excluded from the definition of Federal contract information?
5.
According to CNSSI 4009, how is 'information' defined in the context of FAR 52.204-21?
6.
What constitutes an 'information system' under 44 U.S.C. 3502?
7.
In the context of contractor information systems, what does 'safeguarding' mean?
8.
To what three entities must information system access be limited?
9.
Information system access must be limited to specific types of _____ and _____ that authorized users are permitted to execute.
10.
What must a contractor do regarding connections to external information systems?
11.
Where must a contractor control information being posted or processed?
12.
As a prerequisite to allowing access to organizational systems, a contractor must _____ the identities of users, processes, or devices.
13.
What action must be taken on information system media containing FCI before disposal?
14.
Physical access to information systems and equipment must be limited to _____.
15.
Besides limiting access, what three physical safeguarding actions are required for visitors
16.
What physical hardware must be controlled and managed to protect information systems?
Additional Resources
Join this Course to access resources