Many More Defense Contractors Now Eligible for DoD Cyberthreat Info-Sharing Program

April 2, 2024

Reading Time : 3 min

On March 12, 2024, the Department of Defense (DoD) finalized a rule to open its Defense Industrial Base (DIB) Cybersecurity (CS) Program to all defense contractors who own or operate an unclassified information system that processes, stores or transmits covered defense information.[1]This will allow said contractors to benefit from the DIB CS Program bilateral information sharing arrangement to keep informed about impending cyberthreats.

The new rule takes effect April 11, 2024.

Background  

The DIB refers to the government, the DoD and the private sector industrial complex capable of researching, designing, developing, producing and maintaining military weapons systems to meet military requirements.[2]The DIB CS Program is a voluntary information sharing program to strengthen cybersecurity for DoD information transiting on, or residing on, DIB unclassified information systems.[3]

The DoD has mandatory cybersecurity activities contractually required through DFARS 252.204-7012.[4]The DIB CS Program’s voluntary cyberthreat info-sharing is meant to bolster these activities, and also plays a key role in helping the DoD meet its critical infrastructure protection duties (see our prior post covering critical infrastructure protection in the Biden Administration’s 2023 Cybersecurity Strategy).[5]The current DIB CS Program’s objectives are:

  • Establishing a voluntary, mutually acceptable framework for protecting information from unauthorized access;
  • Protecting the confidentiality of information exchanged to the greatest extent permitted by law; and
  • Creating a trusted environment to maximize network defense and remediation by both sharing cyberthreat information and incident reports, and providing mitigation and remediation strategies along with malware analysis.[6]

For eligible defense contractors, the DIB CS Program supports two-way information sharing and provides companies with the ability to access classified government information on cyberthreats targeting their networks and systems.[7]

The New Expanded Program

Eligibility for the DIB CS program is currently based on the October 2016 rule, which requires companies to be cleared defense contractors[8] who: (i) have DoD-approved medium assurance certificates; (ii) have an existing facility clearance to at least the Secret Level and (iii) can execute the standardized Framework Agreement[9]provided to interested contractors after verification that the company is eligible.[10]Due to multiple factors, namely the eligibility gap and the feedback from ineligible defense contractors, coupled with “a vulnerable DoD supply chain, and a pervasive cyber threat” the DoD is opening the DIB CS program up to non-cleared defense contractors.[11]Under the new expanded DIB CS Program, all defense contractors owning or operating an unclassified information system that processes, stores or transmits covered defense information will be eligible to participate in the program.

Impact of the Expansion

The DoD estimates that an additional 68,000 defense contractors will now be eligible for the DIB CS Program (currently only around 1,000 are participating).[12]Defense contractors that participate in the program will have access to technical exchange meetings, a collaborative web platform and threat information products and services through the DoD Cyber Crime Center (DC3). The DC3 shares cyber threat information and intelligence with the DIB, while also offering a range of tools, products, services and events for participants to benefit from.[13]

This expansion will enable many more smaller-sized defense contractors to take advantage of the DIB CS Program information sharing. The DoD emphasized that due to smaller contractors having fewer resources to devote to cybersecurity, leaving them out of the cyberthreat loop might create vulnerabilities that bad actors can exploit to gain national security information.[14]This expansion helps the defense contractor community at large better hone its cybersecurity capabilities.


[1] Department of Defense (DoD) Defense Industrial Base (DIB) Cybersecurity (CS) Activities, 89 Fed. Reg. 17741 (March 12, 2024) (to be codified at 32 C.F.R. pt. 236).

[2] Id. at 17742.

[3] Id.

[4] “Safeguarding Covered Defense Information and Cyber Incident Reporting” – https://www.ecfr.gov/current/title-48/chapter-2/subchapter-H/part-252/subpart-252.2/section-252.204-7012

[5] 89 Fed. Reg. 17742.

[6] Id.

[7] Id.

[8] A “cleared defense contractor” refers to a contractor cleared under the National Industrial Security Program (NISP) who has classified contracts with the DoD (32 C.F.R. 236.2).

[9] This Framework Agreement is made available after submitting an application on the program portal: https://dibnet.dod.mil/dibnet/.

[10] 89 Fed. Reg. 17743.

[11] Id.

[12] Id.

[13] Id.

[14] Id.

Share This Insight

Previous Entries

Data Dive

November 19, 2024

The European Union’s AI Office published the inaugural General-Purpose AI Code of Practice on November 14, 2024. The Code is intended to assist providers of AI models in their preparations for compliance with the forthcoming EU AI Act, to be enforced from August 2, 2025. The Code is designed to be both forward-thinking and globally applicable, addressing the areas of transparency, risk evaluation, technical safeguards and governance. While adherence to the Code is not mandatory, it is anticipated to serve as a means of demonstrating compliance with the obligations under the EU AI Act. Following a consultation period that garnered approximately 430 responses, the AI Office will be empowered to apply these rules, with penalties for nonconformity potentially reaching 3% of worldwide turnover or €15 million. Three additional iterations of the Code are anticipated to be produced within the coming five months.

...

Read More

Data Dive

November 15, 2024

On October 29, 2024, the DOJ issued a proposed rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

October 17, 2024

During the course of any lending transaction, lenders will conduct a due diligence review of the borrower, including reviewing any relevant “know-your-customer” information.

...

Read More

Data Dive

September 17, 2024

Following the publication of the European Union’s Artificial Intelligence Act (AI Act or Act) on 12 July 2024, there are now a series of steps that various EU bodies need to take towards implementation. One of the first key steps is in relation to the establishment of codes of practice to “contribute to the proper application” of the AI Act.

...

Read More

Data Dive

August 6, 2024

On July 30, 2024, the Senate passed the Kids Online Safety and Privacy Act (S. 2073) via an overwhelmingly bipartisan vote of 91-3 shortly before departing for the August recess.

...

Read More

Data Dive

July 18, 2024

On 12 July 2024, the European Union Artificial Intelligence Act (AI Act or Act) was published in the Official Journal of the European Union (EU), marking the final step in the AI Act’s legislative journey. Its publication triggers the timeline for the entry into force of the myriad obligations under the AI Act, along with the deadlines we set out below. The requirement to ensure a sufficient level of AI literacy of staff dealing with the operation and use of AI systems will, for example, apply to all providers and deployers on 2 February 2025.

...

Read More

Data Dive

July 18, 2024

On June 18, 2024, the United States Securities and Exchange Commission (SEC) announced a settlement with R.R. Donnelley & Sons Company (RRD) for alleged internal control and disclosure failures following a ransomware attack in 2021. Without admitting or denying the SEC’s findings, the business communications and marketing services provider agreed to pay a civil penalty of over $2.1 million to settle charges alleging violations of Section 13(b)(2)(B) of the Securities Exchange Act of 1934 (Exchange Act) and Exchange Act Rule 13a-15(a).1

...

Read More

Data Dive

June 11, 2024

In May, the National Institute of Standards and Technology (NIST) issued updated recommendations for security controls for controlled unclassified information (CUI) that is processed, stored or transmitted by nonfederal organizations using nonfederal systems, (NIST Special Publication 800-171 (SP 800-171), Revision 3). These security requirements are “intended for use by federal agencies in contractual vehicles or other agreements that are established between those agencies and nonfederal organizations.”1 While these new controls are only applicable to nonfederal entities that agree to comply with the new issuance, Revision 3 signals the next phase of expected security for government contractors.

...

Read More

© 2024 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.