To say that organizations today are concerned about cybersecurity would be a gross understatement. Every time we turn around, there are reports of incidents where cybercriminals have either gamed a global social media tool or compromised a corporate customer database.

Needless to say, the U.S. government has also been extremely focused on cybersecurity — as evidenced by its recent directive, the Defense Federal Acquisition Regulation Supplement (DFARS), which aims to help government agencies protect their own data and that of organizations with which they do business.

What Does the DFARS Require?

The regulation requires any Department of Defense (DOD) contractor or subcontractor who handles controlled unclassified information (CUI) to comply with the data-protection standards outlined in the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171. According to NIST, CUI consists of “any sensitive federal government information routinely processed, stored or transmitted by a contractor in the course of its work providing essential products and services to federal agencies.”

DFARS is part of a worldwide trend of increasingly stringent data security standards. In May 2018, for example, the European Union (EU) enacted its General Data Protection Regulation (GDPR) to enhance user privacy and provide legal recourse when refuting algorithm-based decisions. Also, the Payment Card Industry Data Security Standard (PCI DSS) requires companies that accept credit card payments to host customer data securely with a PCI-compliant hosting provider. These and countless other standards show that data security is top of mind for industry leaders around the world.

The Multifactor Mandate: Why MFA Is Crucial in Today’s Threat Landscape

One of the most challenging requirements outlined in the DFARS directive is the mandatory use of multifactor authentication (MFA) for all local and remote accounts associated with users who access controlled, unclassified information. MFA requires users to provide two or more unique factors to gain access to a given digital infrastructure. These factors can include something the user knows, such as a password or personal identification number (PIN); something the user has, such as a cryptographic device or token; and something the user is, such as a fingerprint, facial scan or other biometric element.

The best MFA technology enables organizations to authenticate users with multiple factors, define policies for those factors and apply them to specific IDs. These advanced solutions integrate directly with the organization’s security server and not any specific authentication factor, so security teams can add factors without changing the MFA infrastructure.

Keep in mind that the new DFARS rules apply to both on-premises and cloud-based systems unless the contracting officer provides written, specific authorization. All cloud computing services must be located in the U.S. and support systemwide search and access for inspections, audits and investigations.

MFA is a logical outgrowth of the myriad processes and protocols that have been developed over the past several decades to keep data safe. Security has been in a constant state of evolution ever since the early days of computing, when users first had to enter a password to log into a machine.

Today, we need more advanced solutions that can address countless new cybersecurity challenges, such as the increasing use of Wi-Fi to access enterprise data, the migration of apps and data to the cloud, the widespread use of mobile devices for work and the growing sophistication of cybercriminal tactics.

DFARS Compliance Is a Gradual Process

While the deadline to achieve compliance has come and gone, it’s important to understand that organizations can’t realize DFARS compliance overnight. Large contractors may have over 250,000 employees and thousands of active contracts, so connecting the dots between where their most valuable data assets reside, who is accessing them, how they are interacting with them and whether they are meeting the NIST 800-171 requirements is a daunting task that could take years to complete.

Some organizations made every effort to comply by the Dec. 31, 2017 deadline, but failed due to the complexity of their relationships and the nebulous issue of data ownership.

If you aren’t sure whether DFARS affects you, it’s a good idea to check your contracts. The DFARS data security clause has been included in all solicitations issued and awarded by the DoD for at least the past year, except for commercial off-the-shelf items.

MFA is a powerful tool for ensuring safe and secure access to interactions where sensitive government information is routinely processed, stored or transmitted. While using MFA to monitor access to CUI might have been considered superfluous as recently as a few years ago, I think we can all agree that these extra layers of security are critical in today’s ever-evolving threat environment.

More from Identity & Access

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today