recommended reading

Contractors ask GSA to Freeze Cyber-Related Regulations


Federal suppliers are urging officials to stop computer security rulemakings for contractors until the government issues blanket cyber guidelines for all key industries in the fall. The argument is not that contractor-specific regulations are bad but that they could potentially conflict with the forthcoming national standards.

President Obama, as part of a February executive order, initiated a voluntary program for safeguarding life-sustaining networks, including energy, health care and water treatment systems. By November, the government must publish a draft set of standard policies and techniques, such as promptly installing antispyware updates. The government also must decide if and how these standards should be incorporated into federal contracts.

But -- independently -- multiple computer security mandates for contractors already are at various stages of development. 

The separate cyber rules for government vendors are “all well intentioned. For the longest time, nobody was paying attention to cybersecurity. Now, everybody is paying attention to cybersecurity,” said Alan Chvotkin, executive vice president for the Professional Services Council, a trade association that represents contractors.

However, he said, association leaders have told contracting officers that the pending regulations might be at odds with the executive order.

The General Services Administration, the government's purchasing division, must report to the White House by June on recommendations for weaving the security standards into federal acquisitions.

This week, the agency invited vendors to help untangle and align existing cyber-related procurement requirements.

According to a notice issued on Monday, GSA wants to hear about economic hardships standards could create for contractors, as well as incentives that would not strain government coffers.

The bulletin specifically requests "information about any conflicts in statutes, regulations, policies, practices, contractual terms and conditions, or acquisition processes affecting federal acquisition requirements related to cybersecurity and how the federal government might address those conflicts."

In an April 8 letter, Professional Services Council leaders told National Institute of Standards and Technology officials, who are developing the baseline standards, "It should be the NIST framework that serves as the foundation for other government cybersecurity initiatives. Therefore, it is logical to suspend non-final [federal acquisition rulemakings] until the initial framework has been established."

Chvotkin, during an interview this week, said there is a need to first identify the types of devices covered under cyber-related policies in general, and what techniques have proven to work best across the board.

"Once you establish that framework, that architecture, then contract clauses can flow from that. Right now we lack a governmentwide policy," he said.

One example of a potentially incompatible policy is a draft 2012 plan requiring contractors to employ safeguards for company equipment that transmits government information, Chvotkin said. The proposal calls for only a few, vague computer protections and leaves vendors substantial flexibility, some security researchers say.  Another evolving policy would impose unprecedented cyber certification requirements on private sector critical infrastructure essential to the military, such as power plants. The specifications are scheduled to be released this fall and take effect within a year, according to the Pentagon.

During a May 1 industry briefing, GSA officials outlined several proposed suggestions for applying cyber standards to federal contracts.  The items, which Nextgov reviewed, include devising a common lexicon that melds cyber lingo with acquisition jargon, as well as involving cyber specialists in operations and maintenance throughout a program’s lifecycle.

(Image via mtkang/

Threatwatch Alert

Network intrusion

Florida’s Concealed Carry Permit Holders Names Exposed

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.