DFARS Cybersecurity Requirements
Overview
The Defense Federal Acquisition Regulation Supplement (DFARS) implements comprehensive cybersecurity requirements for all Department of Defense contractors and subcontractors through specific clauses that establish mandatory security standards and incident reporting procedures.
Authoritative Source: https://www.acquisition.gov/dfars
Current Version: October 24, 2025 (Change 10/24/2025)
Primary Cybersecurity Subparts:
- Subpart 204.73: Safeguarding Covered Defense Information and Cyber Incident Reporting
- Subpart 204.75: Cybersecurity Maturity Model Certification (CMMC)
Key DFARS Clauses
DFARS 252.204-7012: Safeguarding Covered Defense Information and Cyber Incident Reporting
Effective Date: October 24, 2025 (most recent change); Original: December 31, 2017
Primary Purpose: Establishes mandatory security requirements and cyber incident reporting procedures for contractors handling covered defense information.
Key Requirements:
- Security Implementation
- Contractors must provide "adequate security" for covered defense information
- Primary method: Implement NIST Special Publication (SP) 800-171 controls (110 security requirements)
- For external cloud service providers: Meet FedRAMP Moderate baseline equivalency
- Compliance deadline for pre-October 2017 contracts: December 31, 2017
- Cyber Incident Reporting
-
Reporting Timeline: Within 72 hours of discovery of any cyber incident
-
Reporting Method: Report via https://dibnet.dod.mil using Incident Collection Form (ICF)
-
Certificate Requirement: DoD-approved medium assurance certificate required for DIBnet access
-
Definition: "Actions taken through use of computer networks resulting in compromise or adverse effect on information system"
- Supporting Obligations
- Preserve affected system images and monitoring/packet capture data for at least 90 days
- Provide forensic analysis access upon DoD request
- Submit malicious software samples to DoD Cyber Crime Center (DC3)
- Conduct compromise evidence review within systems
- Subcontractor Requirements
- Flow-down clause to all subcontractors handling covered defense information
- Subcontractors must notify prime contractors of incidents
- Prime contractors remain responsible for reporting to DoD
DFARS 252.204-7019: Notice of NIST SP 800-171 DoD Assessment Requirements
Type: Solicitation Provision
Primary Purpose: Notifies offerors of requirement to possess current NIST SP 800-171 assessments before award consideration.
Key Requirements:
- Offerors must have current assessments "not more than 3 years old unless lesser time specified"
- Assessments required for each covered contractor information system relevant to contract
- Summary-level scores must be posted in Supplier Performance Risk System (SPRS)
- Offerors without current SPRS-posted scores may conduct and submit Basic Assessments
DFARS 252.204-7020: NIST SP 800-171 DoD Assessment Requirements
Type: Contract Clause
Applicability: All solicitations and contracts except those solely for COTS items
Assessment Types (Three Levels):
- Basic Assessment
- Contractor self-assessment
- Based on review of system security plans
- Conducted per NIST SP 800-171 DoD Assessment Methodology
- Confidence Level:
"Low" - Score format: "X out of 110" (e.g., "95 out of 110")
- Medium Assessment
- Government or third-party conducted
- Includes thorough examination of documentation, contractor discussions, walkthrough
- Confidence Level:
"Medium"- High Assessment
- Government personnel conducted
- Uses NIST SP 800-171A assessment methodology
- Includes verification, examination, and demonstration of contractor's system security plan
- Confidence Level:
"High" - Results retained as CUI for internal DoD use only
SPRS Scoring Requirements:
- Summary-level scores (not individual requirement scores) posted in SPRS
- Assessment frequency: Current assessments renewed at least every 3 years
- Provides DoD Components visibility into contractor security posture
DFARS 252.204-7021: Cybersecurity Maturity Model Certification Requirements
Type: Contract Clause
Effective Date: October 1, 2025 (for general use)
Primary Purpose: Mandates contractors maintain current Cybersecurity Maturity Model Certification at levels specified in contract.
Core Requirements:
- Contractors must have current (not older than 3 years) CMMC certificate at required level
- Certification must be maintained for entire contract performance duration
- Contracting officers cannot award contracts without required CMMC certificate
- Cannot exercise contract options or extend performance periods without valid current certificate
- Verification through Supplier Performance Risk System (SPRS)
Subcontractor Requirements:- Must flow down CMMC clause to all subcontracts except COTS items
- Verify subcontractors possess current CMMC certificates at appropriate levels before award
Covered Defense Information (CDI): Definition and Scope
Official Definition (DFARS 204.7301):
"Covered defense information" means unclassified controlled technical information or other information requiring safeguarding or dissemination controls pursuant to law, regulations, and Government-wide policies, and is:
- Marked or otherwise identified in contract and provided to contractor by or on behalf of DoD; or
- Collected, developed, received, transmitted, used, or stored by or on behalf of contractor in support of contract performance
Controlled Technical Information (CTI):Technical information with military or space application subject to controls on access, use, reproduction, modification, performance, display, release, disclosure, or dissemination.
Scope:
- Includes all information supporting DoD contract performance whether marked or not
- Applies to commercial products and services that may incidentally involve CDI
- Does not apply to purely commercial off-the-shelf items used without modification
Cyber Incident Reporting Requirements
72-Hour Reporting Timeline:
"Rapidly report" is defined in DFARS 204.7301 as: "Within 72 hours of discovery of any cyber incident"
Reporting Discovery Standard:
- Reporting begins upon "discovery" of incident
- Discovery occurs when contractor becomes aware through any means
Reporting Portal and Method:- Reporting Portal: https://dibnet.dod.mil (Defense Industrial Base Network)
- Reporting Tool: Incident Collection Form (ICF)
- Recipient: Department of Defense directly
- Certification: DIBnet access requires DoD-approved medium assurance certificate
Post-Reporting Obligations:- Media Preservation - Preserve images of all affected systems for at least 90 days
- Forensic Analysis Support - Provide access for DoD forensic analysis upon request
- Malicious Software Submission - Submit samples to DoD Cyber Crime Center (DC3)
- Notification to Prime - Subcontractors notify prime; prime reports to DoD
Contractor Reporting Protection:Per DFARS 252.204-7009, cyber incident reports NOT interpreted as evidence of contractor failure to provide adequate security. Contracting officers must assess incidents in context of overall contractor cybersecurity posture.
Flow-Down Requirements to Subcontractors
Subpart 204.73 (Safeguarding) Flow-Down:
DFARS 252.204-7012 must be flowed down to all subcontractors that:
- Receive or handle covered defense information
- Operate covered contractor information systems
- Support DoD contract performance involving CDI
Subpart 204.75 (CMMC) Flow-Down:DFARS 252.204-7021 must be flowed down to all subcontracts except COTS-only acquisitions
Supply Chain Applicability:
- Flow-down extends through entire supply chain
- Each contractor responsible for ensuring subcontractor compliance
- Multi-tier subcontracting: Each level flows down requirements further
- Commercial suppliers must comply if performing work involving CDI
Prime Contractor Responsibility:- Prime contractors remain responsible for subcontractor compliance
- Must verify CMMC certificates before subcontract award via SPRS
- Must receive and report cyber incident notifications from subcontractors to DoD
- Must enforce compliance through subcontract terms and conditions
Assessment Requirements (NIST SP 800-171 Assessments)
Three Assessment Levels
1. Basic Assessment (Self-Assessment)
- Conducted By: Contractor self-assessment
- Confidence Level: "Low"
- Methodology: NIST SP 800-171 DoD Assessment Methodology
- Components: Review of system security plans, self-evaluation of 14 security families
- Cost: Minimal (internal resources)
2. Medium Assessment (Third-Party/Government)- Conducted By: Government or third-party assessor
- Confidence Level: "Medium"
- Depth: Review of basic assessment, thorough examination of documentation, discussions, walkthrough
- Cost: Moderate (professional assessment fees if third-party)
3. High Assessment (Government-Conducted)- Conducted By: DoD personnel or authorized government representatives
- Confidence Level: "High"
- Methodology: NIST SP 800-171A, "Assessing Security Requirements for Controlled Unclassified Information"
- Depth: Complete verification, examination, and demonstration of security plan and controls
- Cost: Highest (extensive government resources)
SPRS (Supplier Performance Risk System) Scoring
Scoring Format:
- Summary-level score expressed as number out of 110
- Example: "95 out of 110" or "110 out of 110"
- NOT individual scores for each requirement, but aggregate score
SPRS Posting Timeline:- Summary-level scores posted 30 days post-assessment
- Provides DoD Components visibility into contractor security posture
- Contracting officers verify current assessments before award
Assessment Currency Requirements:- Contractors must maintain current assessments "not more than 3 years old"
- Solicitations may specify shorter periods (e.g., 1 year, 2 years) as needed
Scope: Who Must Comply
Mandatory Applicability:
This applies to all contracts and subcontracts requiring contractors to:
- Safeguard covered defense information in or transiting through covered contractor information systems
- Report cyber incidents affecting such systems
Contractor Categories Affected:- Prime Contractors to DoD - All defense contractors receiving unclassified CDI/CUI from DoD
- Subcontractors at All Levels - All tiers when involved in CDI handling
- Commercial Contractors and Suppliers - Commercial providers if handling CDI
- Research Institutions and Universities - Universities with DoD research contracts
Geographic Scope:- Applies to all contractors regardless of location (U.S. and foreign equally)
- Does not replace classified information security requirements
- Applies to unclassified information only
Effective Application Date:- DFARS 252.204-7012: December 31, 2017 compliance deadline for NIST SP 800-171
- DFARS 252.204-7019/7020: Applied to new solicitations and contracts as issued
- DFARS 252.204-7021 (CMMC): October 1, 2025 for most acquisitions
Enforcement: Contractual and Regulatory Consequences
Contractual Consequences
1. Contract Award Decisions
Per DFARS 204.7501: Contracting officers shall NOT award to offerors lacking required CMMC certificate at specified level
2. Option Exercise Restrictions
Cannot exercise contract options unless contractor maintains current CMMC certificate
3. Cyber Incident Reporting Impact
Cyber incident reported by contractor NOT automatically interpreted as failure to provide adequate security
4. SPRS Score Impact
- Low NIST SP 800-171 scores or lack of current assessments negatively impacts bid competitiveness
- SPRS scores affect contractor's ability to bid on other DoD contracts
Administrative Remedies
- Suspension from Bidding - Suspension from specific contract opportunities
- Debarment Procedures - Serious or repeated violations may trigger debarment (typically 3 years)
- Cost Disallowance - Costs associated with incidents may be deemed unallowable
Contracting Officer Authority
Contracting officers shall:
- Consult with DoD component CIO or cyber security office before assessing contractor compliance
- Consider cyber incidents in overall compliance context
- Document assessment basis
- Apply remedies proportionate to violation severity
Massachusetts Perspective
Massachusetts Defense Contractor Categories
Based on industry knowledge, Massachusetts hosts:
- Aerospace and Defense Contractors - Major contractors in Boston metro area
- Research Universities with DoD Contracts - MIT, Harvard, Northeastern, UMass, WPI, Tufts
- Cybersecurity and IT Services Contractors - Defense IT services companies
Applicable DFARS Requirements for Massachusetts Entities:All Massachusetts-based DoD contractors and subcontractors subject to identical requirements:
- DFARS 252.204-7012 - Safeguarding and cyber incident reporting (72-hour requirement)
- DFARS 252.204-7019/7020 - NIST SP 800-171 assessments (SPRS posting)
- DFARS 252.204-7021 - CMMC certification requirements (from October 1, 2025)
Special Considerations for Universities:- Research institutions receiving DoD funding must comply with DFARS
- University research networks handling CDI must implement NIST SP 800-171
- Some exemptions may apply under FAR/DFARS education/research provisions
Registration and Reporting:- Massachusetts contractors register with System for Award Management (SAM.gov)
- DIBnet registration required for cyber incident reporting
- SPRS registration required for NIST SP 800-171 and CMMC scores
Related Frameworks
NIST Special Publication 800-171 (NIST SP 800-171)
Current Version: Revision 3 (Released May 14, 2024)
Full Title: "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations"
- DFARS 252.204-7012 mandates implementation of NIST SP 800-171 controls
- Provides 14 security requirement families
- DoD assessments evaluate compliance with NIST SP 800-171
NIST SP 800-172
Official Title: "Enhanced Security Requirements for Protecting CUI"
- Provides enhanced requirements for high-value or critical CUI
- 24 additional requirements addressing APTs
- Forms basis for CMMC Level 3
Cybersecurity Maturity Model Certification (CMMC) 2.0
Official Source: https://www.acq.osd.mil/asda/dpc/cp/cyber/cmmc.html
- DFARS 252.204-7021 requires contractors maintain CMMC certificate
- Three-level framework (Level 1, 2, 3)
- Applies to all DoD contracts except COTS-only acquisitions
Federal Acquisition Regulation (FAR)
FAR 52.204-21: Safeguarding of Controlled Unclassified Information
- 15 security practices (basic cyber hygiene)
- Basis for CMMC Level 1 requirements
Controlled Unclassified Information (CUI) Registry
Official Source: http://www.archives.gov/cui/registry/category-list.html
- Establishes categories of unclassified information requiring safeguarding
- DFARS relies on CUI Registry to define information types requiring protection
Effective Dates and Timeline
Historical Timeline
2017: Initial Safeguarding Requirements
- December 31, 2017: Compliance deadline for implementing NIST SP 800-171 controls
DFARS 252.204-7012- First Effective Date: October 24, 2017
- Compliance Deadline: December 31, 2017 (NIST SP 800-171 implementation)
- Current Effective Date: October 24, 2025
DFARS 252.204-7019/7020- Effective Date: November 2023
- Current Version: October 24, 2025 change
DFARS 252.204-7021 (CMMC)- Initial Effective Date: January 2023 (with approval requirement)
- General Applicability Date: October 1, 2025
- Current Version: October 24, 2025 change
CMMC 2.0 Framework Rule (32 CFR Part 170)- Published: October 15, 2024
- Effective Date: December 16, 2024
DFARS Case 2019-D041 Final Rule- Published: September 10, 2025
- Effective Date: November 10, 2025
NIST SP 800-171 Revisions- Revision 3: Published May 14, 2024 (current version)
Current Status (November 20, 2025)
- DFARS 252.204-7012: In effect, current version October 24, 2025
- DFARS 252.204-7019/7020: In effect, current version October 24, 2025
- DFARS 252.204-7021 (CMMC): In effect for general use
- CMMC 2.0 Framework: In effect per 32 CFR Part 170
- NIST SP 800-171 Rev. 3: Current standard
Key Takeaways
- Comprehensive Framework: DFARS establishes comprehensive cybersecurity requirements for DoD contractors through multiple clauses
- NIST SP 800-171 Mandate: All contractors handling CUI must implement 110 security requirements
- 72-Hour Incident Reporting: Mandatory rapid reporting to DoD via DIBnet
- SPRS Scoring: Assessment scores visible to all DoD contracting officers through SPRS
- CMMC Integration: DFARS 252.204-7021 makes CMMC certification contractual requirement
- Supply Chain Flow-Down: Requirements flow down through entire supply chain to all tiers
- Contract Ineligibility: Non-compliance results in inability to bid or receive DoD contracts
- Massachusetts Context: Applies to all MA-based defense contractors, subcontractors, and research institutions