Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contract. To provide adequate security, the Contractor shall— (1) Implement information systems security protections on all covered contractor information systems including, at a minimum— (i) For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government— (A) Cloud computing services shall be subject to the security requirements specified in the clause 252.239-7010, Cloud Computing Services, of this contract; and (B) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in this contract; or (ii) For covered contractor information systems that are not part of an IT service or system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1)(i) of this clause— (A) The security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” xxxx://xx.xxx.xxx/10.6028/NIST.SP.800-171 that is in effect at the time the solicitation is issued or as authorized by the Contracting Officer, as soon as practical, but not later than December 31, 2017. The Contractor shall notify the DoD CIO, via email at xxx.xxxxxxx@xxxx.xxx, within 30 days of contract award, of any security requirements specified by NIST SP 800-171 not implemented at the time of contract award; or (B) Alternative but equally effective security measures used to compensate for the inability to satisfy a particular requirement and achieve equivalent protection accepted in writing by an authorized representative of the DoD CIO; and (2) Apply other information systems security measures when the Contractor reasonably determines that information systems security measures, in addition to those identified in paragraph (b)(1) of this clause, may be required to provide adequate security in a dynamic environment based on an assessed risk or vulnerability.
Appears in 2 contracts
Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contract. To provide adequate security, the Contractor shall— shall-
(1) Implement information systems security protections on all covered contractor information systems including, at a minimum— minimum-
(i) For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government— Government-
(A) Cloud computing services shall be subject to the security requirements specified in the clause 252.239-252.239- 7010, Cloud Computing Services, of this contract; and and
(B) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in this contract; or or
(ii) For covered contractor information systems that are not part of an IT service or system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1)(ib)(l)(i) of this clause— clause-
(A) The security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “"Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” xxxx://xx.xxx.xxx/10.6028/NIST.SP.800-171 " xxxx://xxxxxxx.xxxx.xxx/nistpubs/SpecialPublications/NIST .SP .800-17lrl.pdf that is in effect at the time the solicitation is issued or as authorized by the Contracting Officer, as soon as practical, but not later than December 31, 2017. The Contractor shall notify the DoD CIO, via email at xxx.xxxxxxx@xxxx.xxx, within 30 days of contract award, of any security requirements specified by NIST SP 800-171 not implemented at the time of contract award; or or
(B) Alternative but equally effective security measures used to compensate for the inability to satisfy a particular requirement and achieve equivalent protection accepted in writing by an authorized representative of the DoD CIO; and and
(2) Apply other information systems security measures when the Contractor reasonably determines that information systems security measures, in addition to those identified in paragraph (b)(1b)(l) of this clause, may be required to provide adequate security in a dynamic environment based on an assessed risk or vulnerability.
Appears in 1 contract
Samples: Flowdown Attachment
Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor con- tractor information systems that support the performance of work under this contractsystems. To provide adequate xxx- xxxxx security, the Contractor shall— (1) Implement information systems security protections on all covered contractor information systems includingshall imple- ment, at a minimum— , the following informa- tion security protections:
(i1) For covered contractor Contractor information systems that are part of an Information Technology information technology (IT) service or system operated on behalf of the Government— , the following security requirements apply:
(Ai) Cloud computing services shall be subject sub- ject to the security requirements specified in the clause 252.239-70101252.239–76, Cloud Computing ServicesServ- ices, of this contract; and .
(Bii) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified speci- fied elsewhere in this contract; or .
(ii2) For covered contractor Contractor information systems that are not part of an IT service or system operated on behalf of the Government Govern- ment and therefore are not subject to the security se- curity requirement specified at paragraph (b)(1)(ib)(1) of this clause— , the following security requirements apply:
(Ai) The security Except as provided in paragraph (b)(2)(iv) of this clause, the contractor infor- mation system shall be subject to the secu- rity requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171800–171, “Protecting Revision 2, ‘‘Pro- tecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” xxxx://xx.xxx.xxx/10.6028/NIST.SP.800-171 that Or- ganizations’’ (available via the internet at xxxxx://xxxx.xxxx.xxx/publications/detail/sp/800- 171/rev-2/final) in effect at the time the solici- tation is issued or as authorized by the Con- tracting Officer.
(ii) The Contractor shall implement NIST SP 800–171, Rev. 2, no later than 30 days after the award of this contract. The Contractor shall notify Contract Officer of any security requirements specified by NIST SP 800–171, Rev. 2 not implemented within 30 days of time of contract award.
(iii) If the Offeror proposes to vary from any security requirements specified by NIST SP 800–171, Rev. 2 in effect at the time the solicitation is issued or as authorized by the Contracting Officer, as soon as practicalthe Offeror shall submit to the Contracting Officer, but for consideration by the DOT Chief Information Officer (CIO), a written explanation of—
(A) Why a particular security requirement is not later than December 31, 2017. The Contractor shall notify the DoD CIO, via email at xxx.xxxxxxx@xxxx.xxx, within 30 days of contract award, of any security requirements specified by NIST SP 800-171 not implemented at the time of contract awardapplicable; or or
(B) Alternative How the Contractor will use an alter- native, but equally effective effective, security measures used to compensate for the inability meas- ure to satisfy a particular requirement the requirements of NIST SP 800–171, Rev.
(iv) The Office of the DOT CIO will evalu- ate offeror requests to vary from NIST SP 800–171, Rev. 2 requirements and achieve equivalent protection accepted inform the Offeror in writing of its decision before con- tract award. The Government will incor- porate accepted variance(s) from NIST SP 800–171, Rev. 2 into any resulting contract.
(v) The Contractor need not implement any security requirement adjudicated by an authorized representative of the DoD CIO; DOT CIO to be nonapplicable, or have an alternative, but equally effective, security measure that may be implemented in its place.
(vi) If the DOT CIO has previously adju- dicated the contractor’s requests indicating that a requirement is not applicable or that an alternative security measure is equally effective, a copy of that approval shall be provided to the Contracting Officer when the Contractor requests its recognition under this contract
(3) If the Contractor intends to use an ex- ternal cloud service provider to store, proc- ess, or transmit any DOT sensitive data in performance of this contract, the Contractor shall require and ensure that the cloud serv- ice provider meets security requirements equivalent to those established by the Gov- ernment for the Federal Risk and Authoriza- tion Management Program (2FedRAMP) Apply Mod- erate baseline (xxxxx://xxx.xxxxxxx.xxx/re- sources/documents/) and that the cloud service provider complies with requirements in para- graphs (c) through (h) of this clause for cyber incident reporting, malicious software, media preservation and protection, access to additional information and equipment nec- xxxxxx for forensic analysis, and cyber inci- dent damage assessment.
(4) The Contractor will apply other information infor- mation systems security measures when the Contractor reasonably determines that information infor- mation systems security measures, in addition addi- tion to those identified in paragraph paragraphs (b)(1) and (b)(2) of this clause, may be required to provide adequate security in a dynamic environment envi- ronment or to accommodate special cir- cumstances (e.g., medical devices) and any individual, isolated, or temporary defi- ciencies based on an assessed risk or vulnerabilityvulner- ability. These measures may be addressed in a system security plan, as required by, clause 1252.239–70, Security Requirements for Unclassified Information Technology Re- sources.
Appears in 1 contract
Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contract. To provide adequate security, the Contractor shall— (1) Implement information systems security protections on all covered contractor information systems including, at a minimum— (i) For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government— (A) Cloud computing services shall be subject to the security requirements specified in the clause 252.239-7010, Cloud Computing Services, of this contract; and (B) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in this contract; or (ii) For covered contractor information systems that are not part of an IT service or system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1)(i) of this clause— (A) The security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” xxxx://xx.xxx.xxx/10.6028/NIST.SP.800-171 that is in effect at the time the solicitation is issued or as authorized by the Contracting Officer, as soon as practical, but not later than December 31, 2017. The Contractor shall notify the DoD CIO, via email at xxx.xxxxxxx@xxxx.xxx, within 30 days of contract award, of any security requirements specified by NIST SP 800-171 not implemented at the time of contract award; or (B) Alternative but equally effective security measures used to compensate for the inability to satisfy a particular requirement and achieve equivalent protection accepted in writing by an authorized representative of the DoD CIO; and (2) Apply other information systems security measures when the Contractor reasonably determines that information systems security measures, in addition to those identified in paragraph (b)(1) of this clause, may be required to provide adequate security in a dynamic environment based on an assessed risk or vulnerability.CONTINUED ON NEXT PAGE
Appears in 1 contract
Samples: Contract
Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contract. To provide adequate security, the Contractor shall— shall -- (1) Implement information systems security systemssecurity protections on all covered contractor information systems including, at a minimum— minimum -- (i) For i)For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government— Government - (A) Cloud A)Cloud computing services shall be subject to the security requirements specified requirementsspecified in the clause 252.239-7010, Cloud Computing Services, of this contract; and (B) Any other such IT service ITservice or system (i.e., other than cloud computing) shall be subject to the security requirements specified requirementsspecified elsewhere in this contract; or (ii) For ii)For covered contractor information systems that are not part of an IT service ITservice or system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1)(i) of this clause— clause -- (A) The security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” xxxx://xx.xxx.xxx/10.6028/NIST.SP.800-171 that is in effect at the time the solicitation is issued or as authorized by the Contracting Officer, as soon as practical, but not later than December 31, 2017. The Contractor shall notify the DoD CIO, via email at xxx.xxxxxxx@xxxx.xxxosd. xxxxxxx@xxxx.xxx, within 30 days of contract award, of any security requirements specified requirementsspecified by NIST SP NISTSP 800-171 not implemented at the time of contract award; or (B) Alternative but equally effective security measures used to compensate for the inability to satisfy a particular requirement and achieve CONTINUED ON NEXT PAGE
SECTION I - CONTRACT CLAUSES (CONTINUED) equivalent protection accepted in writing by an authorized representative of the DoD CIO; and (2) Apply other information systems security systemssecurity measures when the Contractor reasonably easonably determines that information systems security systemssecurity measures, in addition to those identified in paragraph (b)(1) of this clause, may be required to provide adequate security in a dynamic environment based on an assessed risk or vulnerability.
Appears in 1 contract
Samples: Contract
Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contract. To provide adequate security, the Contractor shall— shall - (1) Implement information systems security protections on all covered contractor information systems including, at a minimum— minimum - (i) For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government— Government - (A) Cloud computing services shall be subject to the security requirements specified in the clause 252.239-7010, Cloud Computing Services, of this contract; and (B) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in this contract; or (ii) For covered contractor information systems that are not part of an IT service or system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1)(i) of this clause— clause - (A) The security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” xxxx://xx.xxx.xxx/10.6028/NIST.SP.800-171 that is in effect at the time the solicitation is issued or as authorized by the Contracting Officer, as soon as practical, but not later than December 31, 2017. The Contractor shall notify the DoD CIO, via email at xxx.xxxxxxx@xxxx.xxx, within 30 days of contract award, of any security requirements specified by NIST SP 800-171 not implemented at the time of contract award; or (B) Alternative but equally effective security measures used to compensate for the inability to satisfy a particular requirement and achieve equivalent protection accepted in writing by an authorized representative of the DoD CIO; and (2) Apply other information systems security measures when the Contractor reasonably easonably determines that information systems security measures, in addition to those identified in paragraph (b)(1) of this clause, may be required to provide adequate security in a dynamic environment based on an assessed risk or vulnerability.
Appears in 1 contract
Samples: Contract
Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contract. To provide adequate security, the Contractor shall— —
(1) Implement information systems security protections on all covered contractor information systems including, at a minimum— —
(i) For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government— —
(A) Cloud computing services shall be subject to the security requirements specified in the clause 252.239-7010, Cloud Computing Services, of this contract; and and
(B) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in this contract; or or
(ii) For covered contractor information systems that are not part of an IT service or of system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1)(i) of this clause— —
(A) The security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” ", xxxx://xx.xxx.xxx/10.6028/NIST.SP.800-171 that is in effect at the time the solicitation is issued or as authorized by the Contracting Officer, as soon as practical, but not later than December 31, 2017. The Contractor shall notify the DoD CIO, via email at xxx.xxxxxxx@xxxx.xxx, within 30 days of contract award, of any security requirements specified by NIST SP 800-171 not implemented at the time of contract award; or or
(B) Alternative but equally effective security measures used to compensate for the inability to satisfy a particular requirement and achieve equivalent protection accepted approved in writing by an authorized representative of the DoD CIOCIO prior to contract award; and and
(2) Apply other information systems security measures when the Contractor reasonably determines that information systems security measures, in addition to those identified in paragraph (b)(1) of this clause, may be required to provide adequate security in a dynamic environment based on an assessed risk or vulnerability.
Appears in 1 contract
Samples: Contract
Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contract. To provide adequate security, the Contractor shall— (1) Implement information systems security protections on all covered contractor information systems including, at a minimum— (i) For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government— (A) Cloud computing services shall be subject to the security requirements specified in the clause 252.239-7010, Cloud Computing Services, of this contract; and (B) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in this contract; or (ii) For covered contractor information systems that are not part of an IT service or system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1)(i) of this clause— (A) The security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-800- 171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” xxxx://xx.xxx.xxx/10.6028/NIST.SP.800-171 that is in effect at the time the solicitation is issued or as authorized by the Contracting Officer, as soon as practical, but not later than December 31, 2017. The Contractor shall notify the DoD CIO, via email at xxx.xxxxxxx@xxxx.xxx, within 30 days of contract award, of any security requirements specified by NIST SP 800-171 not implemented at the time of contract award; or (B) Alternative but equally effective security measures used to compensate for the inability to satisfy a particular requirement and achieve equivalent protection accepted in writing by an authorized representative of the DoD CIO; and (2) Apply other information systems security measures when the Contractor reasonably determines that information systems security measures, in addition to those identified in paragraph (b)(1) of this clause, may be required to provide adequate security in a dynamic environment based on an assessed risk or vulnerability.
Appears in 1 contract
Samples: Contract
Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contract. To provide adequate security, the Contractor shall— —
(1) Implement information systems security protections on all covered contractor information systems including, at a minimum— —
(i) For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government— —
(A) Cloud computing services shall be subject to the security requirements specified in the clause 252.239-252.239- 7010, Cloud Computing Services, of this contract; and and
(B) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in this contract; or or
(ii) For covered contractor information systems that are not part of an IT service or of system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1)(i) of this clause— —
(A) The security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” xxxx://xx.xxx.xxx/10.6028/NIST.SP.800-171 that is in effect at the time the solicitation is issued or as authorized by the Contracting Officer, as soon as practical, but not later than December 31, 2017. The Contractor shall notify the DoD CIO, via email at xxx.xxxxxxx@xxxx.xxx, within 30 days of contract award, of any security requirements specified by NIST SP 800-171 not implemented at the time of contract award; or or
(B) Alternative but equally effective security measures used to compensate for the inability to satisfy a particular requirement and achieve equivalent protection accepted in writing by an authorized representative of the DoD CIO; and and
(2) Apply other information systems security measures when the Contractor reasonably determines that information systems security measures, in addition to those identified in paragraph (b)(1) of this clause, may be required to provide adequate security in a dynamic environment based on an assessed risk or vulnerability.
Appears in 1 contract
Samples: Contract
Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contractsystems. To provide adequate security, the Contractor shall— (1) Implement information systems security protections on all covered contractor information systems includingshall implement, at a minimum— , the following information security protections: CONTRACT NO. N00178-14-D-7931 DELIVERY ORDER NO. N6833519F3000 PAGE 81 of 112 FINAL
(i1) For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government— , the following security requirements apply:
(Ai) Cloud computing services shall be subject to the security requirements specified in the clause 252.239clause252.239-7010, Cloud Computing Services, of this contract; and .
(Bii) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in this contract; or .
(ii2) For covered contractor information systems that are not part of an IT service or system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1)(ib)(1) of this clause— , the following security requirements apply:
(Ai) The Except as provided in paragraph (b)(2)(ii) of this clause, the covered contractor information system shall be subject to the security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” xxxx://xx.xxx.xxx/10.6028/NIST.SP.800-171 that is (available via the internet at hxxx://xx.xxx.xxx/00.6028/NIST.SP.800-171) in effect at the time the solicitation is issued or as authorized by the Contracting Officer.
(ii) (A) The Contractor shall implement NIST SP 800-171, as soon as practical, but not later than December 31, 2017. The For all contracts awarded prior to October 1, 2017, the Contractor shall notify the DoD Chief Information Officer (CIO), via email at xxx.xxxxxxx@xxxx.xxxoxx.xxxxxxx@xxxx.xxx, within 30 days of contract award, of any security requirements specified by NIST SP 800-171 not implemented at the time of contract award; or (B) Alternative but equally effective security measures used to compensate for the inability to satisfy a particular requirement and achieve equivalent protection accepted in writing by an authorized representative of the DoD CIO; and (2) Apply other information systems security measures when the Contractor reasonably determines that information systems security measures, in addition to those identified in paragraph (b)(1) of this clause, may be required to provide adequate security in a dynamic environment based on an assessed risk or vulnerability.
Appears in 1 contract
Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contract. To provide adequate security, the Contractor shall— (1) Implement information systems security protections on all covered contractor information systems including, at a minimum— (i) For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government— (A) Cloud computing services shall be subject to the security requirements specified in the clause 252.239-7010, Cloud Computing Services, of this contract; and (B) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in this contract; or (ii) For covered contractor information systems that are not part of an IT service or system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1)(i) of this clause— (A) The security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” xxxx://xx.xxx.xxx/10.6028/NIST.SP.800-171 that is in effect at the time the solicitation is issued or as authorized by the Contracting Officer, as soon as practical, but not later than December 31, 2017. The Contractor shall notify the DoD CIO, via email at xxx.xxxxxxx@xxxx.xxx, within 30 days of contract award, of any security requirements specified by NIST SP 800-171 not implemented at the time of contract award; or (B) Alternative but equally effective security measures used to compensate for the inability to satisfy a particular requirement and achieve equivalent protection accepted in writing by an authorized representative of the DoD CIO; and (2) Apply other information systems security measures when the Contractor reasonably easonably determines that information systems security measures, in addition to those identified in paragraph (b)(1) of this clause, may be required to provide adequate security in a dynamic environment based on an assessed risk or vulnerability.
Appears in 1 contract
Samples: Bridge Contract