866-629-3757

Free Consulation

Call 866-629-3757

DFARS Compliance Solutions

Flexible Data Security and Regulatory Compliance Solutions for Your Business

DFARS Consulting Services photo.

Safeguarding of Unclassified Controlled Technical Information (UCTI)

Cybersecurity attacks are ever increasing for the aerospace and defense industries resulting in a new security clause requirement for all new DoD contracts and subcontracts: DFARS clause 252.204-7012 to safeguard Unclassified Controlled Technical Information (UCTI).

Two Main Compliance Components of DFARS 252.204-7012

  • DoD and its contractors and subcontractors must provide adequate security to safeguard DoD unclassified controlled technical information resident on or transiting through their unclassified information systems from unauthorized access and disclosure.
  • Contractors must report to DoD certain cyber incidents that affect the protected.

You've got questions. We've got answers. Call 1-866-629-3757 to speak to a private investigator or security consultant.

What is the definition of UCTI?

Controlled technical information is defined as technical data or computer software (as defined in DFARS 252.227-7013) with military or space application that is subject to controls on the access, use, reproduction, modification, performance, display, release, disclosure, or dissemination. The clause further specifies that controlled technical information is to be marked with one of the distribution statements B through F, in accordance with DoD instruction 5230.24, Distribution Statements on Technical Documents at http://www.esd.whs.mil/DD/

Phase I: Scoping and Readiness Assessment

  1. Assessing your environment for all origins of unclassified “controlled technical information”, which includes examining all data flow lifecycles, relevant information systems, personnel, third-party entities, and other critical subject matter.
  2. Comprehensive review of all mandated DFARS UCTI information security policies and procedures and supporting processes and practices as mandated within NIST SP 800-171. Specifically, this includes examining all relevant cybersecurity and operational internal controls and processes, those applicable to both DFARS UCTI, but also for best practices.
  3. Identifying all critical gaps and deficiencies – such as policy documentation to actual process improvements, and more – as mandated for DFARS UCTI compliance.

Phase II: Remediation

  1. Developing highly-customized, well-written, and comprehensive information security and operational specific policies, procedures, and other applicable DFARS UCTI mandated documentation.
  2. Working with organizations for ensuring all necessary processes and practices are also implemented for successfully aligning with newly developed policy documentation.
  3. Ensuring a true “cultural change” takes place for adopting all new policy documentation and practices as necessary.
  4. Outline a Plan Of Action and Milestones (POA&M) for tracking mitigation of cybersecurity program and system-level findings/weaknesses.

A Message from Bill Smith

Our agents are highly trained in their respective fields; licensed, bonded and insured, and possess the requisite requirements of at least ten years of senior level management experience, primarily with federal law enforcement agencies. Our firm is the security consulting firm for the State of Connecticut and provides discreet, confidential investigative, security and forensic services for a number of Fortune 500 companies.

Contact us by telephone at 866-629-3757 or e-mail with questions or specific service requests. We look forward to hearing from you.

Call 1-866-629-3757 for expert, discreet private investigations in CT and across the US.

  • Jennings Smith Associates Professional Certifications

    • Professional Certified Investigator (PCI), ASIS International
    • Certified Protection Professional (CPP), ASIS International
    • Physical Security Professional (PSP), ASIS International
    • Certified Homeland Security Level 5 (CHS-V), American Board for Certification in Homeland Security
    • Certified Business Continuity Professional (CBCP), Disaster Recovery Institute International
    • Certified Healthcare Safety Professional (CHSP), Board of Certified Hazard Control Management
    • Certified Healthcare Emergency Professional (CHEP), Board of Certified Hazard Control Management
    • Certified Safety & Health Manager (CSHM), Institute for Safety and Health Management
    • Certified Hazard Control Manager (CHCM), Board of Certified Hazard Control Management
    • Certified Forensic Consultant (CFC), American College of Forensic Examiners International

    Certifications Continued

  • NEW SERVICE OFFERING

    Cyber Forensic Investigations

    JSA's cybersecurity experts are ready to assist you with a complete array of cybercrime protection, data recovery, and evidence collection services. Cyber forensic Investigations include: unauthorized data access; PII (personal identifiable information) exposure; IP (intellectual property/proprietary information) theft; employee social media/email/messaging abuse; ransomware data corruption; and more.

    Cyber Forensics Continued

  • Share

    Share
  • Major Credit Cards Accepted