Transcript
A (0:02)
All right folks, it is January of 2025. We are here in the studio at Summit 7 headquarters. Always a cool place to record. Joined by Mr. Daniel Akridge himself, everybody.
B (0:14)
Hello everybody.
A (0:15)
And Daniel, we've got some somewhat breaking news. You know, we've talked about whether other agencies will adopt CMMC and what that might look like as far as looking for pre proof that their contractors are implementing NIST requirements to protect Controlled and classified information and well, here we are. The GSA just released CIO IT Security 2112 Revision 1, Revision 1 known otherwise as IT Security Procedural Guide for Protecting Controlled and Classified Information in Non Federal Systems and Organizational Process. That is the, that does doesn't really roll off the tongue like CMMC does. But anyways, this is their method for verifying that GSA contractors and vendors, as they call them, have implemented the requirements in NIST SP 800171 revision 3 NIST SP 800172 revision 3 and that's what we're going to talk about today. All righty. So we'll put the link down below. If you guys haven't seen or heard about this, you probably have not seen or heard about this because there is no rulemaking associated with this. There are no articles associated with this. There are no interviews associated with this. I can't even find the people who signed the thing From GSA on LinkedIn. Can't find blogs, interviews, stories, nothing about the fact that they released a 45 page long document for how in detail they're going to go through the various phases, sub phases, procedures, poams, external assessments, showstopper requirements, ODPs, blah blah blah, all the stuff and no one has talked about it. If you're a defense contractor and not a GSA contractor, this is still worth your time because there are lots of examples in this document about what GSA thinks a SSP entry might look like for a fully satisfied control or for a partially satisfied control. We never get examples out of the DoD. We definitely never get examples from NIST. So this is a useful thing to at least skim for examples. It's also valuable if you're a defense contractor for you to realize how much more straightforward CMMC is than whatever the heck this thing is that the GSA has come up with. Because as the GSA says in the document, the GSA process is very closely aligned with the NIST Risk Management Framework process. And if you've never read special publication 837, boy are you in for a treat. And if you don't want to Read the whole thing. You can read this 45 page document which is identical to the steps of the Risk Management framework process. The five phases of CIO IT Security 21112 R1 are prepare, document, assess, authorize, monitor, duck, dive, dip, dodge and duck. Right. There are lots of subphases and lots of details in the document. Under each one of those, I think we'll probably just scroll through and look at all the highlights. But again, as I said, this is a great example of what it looks like for an agency to say this is what we think. Right. Looks like. Specifically Table two. Seven, if you're following along at home. Daniel, what are your thoughts here?
