Beyond CMMC. Why You Should Develop an Information Control Plan




 The Opportunity

Defense contractors fulfilling CMMC requirements should also consider developing an information control plan. While the CMMC certification evaluates systems, the plan will address information residing on the systems and networks.

Where NIST provides technical guidance and NISPOM might address the protection of classified information, there is still a need to address adequate protection of other information such as TAR, CUI, FGI and proprietary.

The Problem

Take a look at this paraphrase from Allen Dulles' book The Craft of Intelligence:

In the 1950's the US Congress was concerned that there was just too much technical information available on government programs. From that concern, they commissioned researchers to assemble as much information from public domain about a particular program as they could. The group scoured libraries, newsstands, TV, radio and other media common to the decade and provided a report. As a result, the government determined the information to be classified, safeguarded the information and disbanded the group. The lesson; intimate program details were not properly identified, marked and protected.

Here are a few examples of where this happens today.

  1. CMMC ratings evaluate a contractors ability to protect data that resides on networks, devices and computers. However, the data residing on protected networks and devices is not marked. CMMC measures technical countermeasures to protect the data. However, the additional requirement is to "Develop a CUI program or information control plan complete with methods, policies and training. This is usually an area that falls under the IT manager, an expert at countermeasures, but not intimately knowledgeable of the information being protected.
  2. An employee is required to provide white papers, pamphlets, or technical drawings for public event such as a conference or publication. While the employee is an expert on their information, they may not understand which products (drawings, technical references, research results, etc.) are CUI, ITAR or proprietary. This is usually an area controlled by a compliance officer, FSO, or other employee, who may not be familiar with the technical information. When the employee uses technical drawings to provide required products, and reviews are not in place, there is a potential CUI or ITAR violation.
  3. Employees create work products, deliverables, purchase orders, etc and is distributed through shared drives, emails or other public facing method. This becomes an issue where reference documents such as technical manuals, statement of work, or other source documents and products are marked CUI, export controlled, or proprietary information, but not identified in derived products.

There are so many situations, too many to put into one article, on how vulnerable technical information can be. The above three situations can lead to information and data release violations if the correct measures are not taken.

Don't believe the hype

Let's use CUI as an example of what should be part of an information protection plan and how to apply it. There is bad advice going around that says: "contractors are not authorized to determine CUI". or "contractors are not authorized to mark CUI on documents". Don't fall for this, it's your responsibility to identify, document and control information.

How to implement your own program

For example, while it is true is that the government determines what information is CUI, contractors can derive CUI in products created from CUI source documents. Further, if a contractor is creating blueprints or providing a product using a source document marked CUI or export controlled, then anything produced from that source should carry over the new creation.

Unfortunately, sensitive information derived by contractors is not always carried over into work instructions, purchase orders, technical drawings, or other products. The solution can't be only technical controls found in NIST, rather is should include the other requirements for applying an information control plan with the following objectives:

  1. Identify or recognize source products
  2. Train employees to identify protected source documents
  3. Label and catalog decisions
  4. Develop public release review process to ensure protected information is not released
  5. Publish policies and training to ensure it is complete
  6. Implement self-inspection

The work effort is huge, but rewarding. It involves working groups, records and accountability.

However, you might consider getting assistance. Where third party services ensure NIST compliance and perform CMMC reviews, they do not create CUI programs or information control plans as described above. If you need assistance with developing your program, please reach out to us.

Contact us for CMMC and CUI Protection Resources

Comments

Popular posts from this blog

Appointing the Threat Program Senior Official (ITPSO)

How Contractors Get Facility Security Clearances

Protecting CUI on work Computers