Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Wilson Bautista Jr.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Wilson Bautista Jr. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Navigating New DOD ODP Mandates in NIST SP 800-171 Revision 3

25:36
 
Share
 

Manage episode 480784763 series 3578015
Content provided by Wilson Bautista Jr.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Wilson Bautista Jr. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Send us a text

🚨 Working with the Department of Defense or handling Controlled Unclassified Information (CUI)? Here’s what you need to know about the DOD’s new approach to NIST SP 800-171 Revision 3 ODP values.

Just listened to the latest episode of CMMC News, where the hosts did a deep dive into the recent DOD memo standardizing “Organization Defined Parameters” (ODPs) for protecting CUI. If you’re a defense contractor—or work in the DIB—these aren’t just guidelines, they are your new minimums.

🔑 3 Key Takeaways:

  • No More Guesswork: The DOD has filled in the “blanks” of NIST 800-171 R3 by setting specific ODP values. These are now the baseline for all contractors—think max inactivity timeouts, access control reviews, and patching deadlines.
  • Timelines Are Tight: Some key numbers to know:
    • Account inactivity? Disable within 90 days.
    • Privileged session logoff? Required at end of work period.
    • High-risk vulnerability patching? 30 days max.
    • Quarterly updates for password “bad lists” and system inventories.
  • Documentation & Continuous Vigilance: Annual (or more frequent) reviews for policies, logs, training, and agreements are now required. Plus, always justify and document any deviations or risk-based modifications—the DOD wants your decisions traceable.

The big picture: The DOD is taking out ambiguity. If you handle CUI, you must implement these specific controls—or document strong justification for any flexibility allowed. And these requirements will change as threats evolve, so keep your risk assessments and compliance efforts agile.

Want the full detail? Highly recommend listening to the episode and reviewing both the NIST SP 800-171 R3 standard and the new DOD ODP memo. Stay compliant, stay secure! 💪
See the original PDF here: https://drive.google.com/file/d/1rtgUmlaCiUKst-mHR7Fsz5O95g46hCra/view

#cybersecurity #DoD #NIST #CUI #compliance #riskmanagement #defenseindustry

Support the show

  continue reading

20 episodes

Artwork
iconShare
 
Manage episode 480784763 series 3578015
Content provided by Wilson Bautista Jr.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Wilson Bautista Jr. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Send us a text

🚨 Working with the Department of Defense or handling Controlled Unclassified Information (CUI)? Here’s what you need to know about the DOD’s new approach to NIST SP 800-171 Revision 3 ODP values.

Just listened to the latest episode of CMMC News, where the hosts did a deep dive into the recent DOD memo standardizing “Organization Defined Parameters” (ODPs) for protecting CUI. If you’re a defense contractor—or work in the DIB—these aren’t just guidelines, they are your new minimums.

🔑 3 Key Takeaways:

  • No More Guesswork: The DOD has filled in the “blanks” of NIST 800-171 R3 by setting specific ODP values. These are now the baseline for all contractors—think max inactivity timeouts, access control reviews, and patching deadlines.
  • Timelines Are Tight: Some key numbers to know:
    • Account inactivity? Disable within 90 days.
    • Privileged session logoff? Required at end of work period.
    • High-risk vulnerability patching? 30 days max.
    • Quarterly updates for password “bad lists” and system inventories.
  • Documentation & Continuous Vigilance: Annual (or more frequent) reviews for policies, logs, training, and agreements are now required. Plus, always justify and document any deviations or risk-based modifications—the DOD wants your decisions traceable.

The big picture: The DOD is taking out ambiguity. If you handle CUI, you must implement these specific controls—or document strong justification for any flexibility allowed. And these requirements will change as threats evolve, so keep your risk assessments and compliance efforts agile.

Want the full detail? Highly recommend listening to the episode and reviewing both the NIST SP 800-171 R3 standard and the new DOD ODP memo. Stay compliant, stay secure! 💪
See the original PDF here: https://drive.google.com/file/d/1rtgUmlaCiUKst-mHR7Fsz5O95g46hCra/view

#cybersecurity #DoD #NIST #CUI #compliance #riskmanagement #defenseindustry

Support the show

  continue reading

20 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play