<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<REGINFO_RIN_DATA xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" RUN_DATE="2026-04-03-04:00" xsi:noNamespaceSchemaLocation="https://www.reginfo.gov/public/xml/REGINFO_XML_Ver10262011.xsd">
    <RIN_INFO>
        <RIN>0750-AK81</RIN>
        <PUBLICATION>
            <PUBLICATION_ID>202004</PUBLICATION_ID>
            <PUBLICATION_TITLE>Unified Agenda of Federal Regulatory and Deregulatory Actions</PUBLICATION_TITLE>
        </PUBLICATION>
        <AGENCY>
            <CODE>0750</CODE>
            <NAME>Defense Acquisition Regulations Council</NAME>
            <ACRONYM>DARC</ACRONYM>
        </AGENCY>
        <PARENT_AGENCY>
            <CODE>0700</CODE>
            <NAME>Department of Defense</NAME>
            <ACRONYM>DOD</ACRONYM>
        </PARENT_AGENCY>
        <RULE_TITLE>Strategic Assessment and Cybersecurity Certification Requirements (DFARS Case 2019-D041)</RULE_TITLE>
        <ABSTRACT><![CDATA[<!DOCTYPE html>
<html>
<head>
</head>
<body>
<p>DoD is proposing to amend the Defense Federal Acquisition Regulation Supplement (DFARS) to implement a standard DoD-wide standard methodology for assessing DoD contractor compliance with all security requirements in the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations and a DoD certification process, known of cybersecurity practices and processes. Currently, DFARS clause 252.204-7012, Network Penetration and Safeguarding of Covered Defense Information, requires contractors to provide adequate security for controlled unclassified information for which the minimum requirement is to implement the security requirements in NIST SP 800-171. The DoD standard methodology validates contractor implementation of the security requirements in NIST SP 800-171 in a consistent and objective manner. As a result of this rule, contractors will be required to review their system security plans and provide an implementation self-assessment to DoD in accordance with the scoring methodology. The score reflects the net effect of security requirements not yet implemented. Depending on the criticality of the data, DoD may also choose to review the system security plans, get additional information from the contractor through interviews, and ask for clarification in the plan by the contractor. For very critical systems, DoD may request an on-site validation/demonstration to ensure a high level of confidence with the implementation of NIST SP 800-171 requirements. Whether the assessment is conducted by the contractor or by DoD, the same scoring methodology will be used.&nbsp;&nbsp;CMMC is a DoD certification process that is intended to serve as a mechanism to ensure appropriate cybersecurity practices and processes are in place to ensure basic cyber hygiene, as well as protect CUI residing on DoD&rsquo;s industry partners&rsquo; networks. CMMC assessments take into consideration various cybersecurity controls/requirements/standards, including NIST SP 800-171, while also measuring the maturity of a company&rsquo;s institutionalization of these cybersecurity practices and processes.&nbsp; Information on CMMC and a copy of the draft CMMC model can be found at https://www.acq.osd.mil/cmmc/index.html. CMMC assessments will be primarily conducted by independent third parties. Upon completion of a CMMC assessment, a company is awarded certification at the appropriate CMMC level (as described in the CMMC model) and the certification level is documented in SPRS to enable the verification of an offeror&rsquo;s certification level prior to contract award.</p>
</body>
</html>]]></ABSTRACT>
        <PRIORITY_CATEGORY>Other Significant</PRIORITY_CATEGORY>
        <RIN_STATUS>First Time Published in The Unified Agenda</RIN_STATUS>
        <RULE_STAGE>Proposed Rule Stage</RULE_STAGE>
        <MAJOR>Yes</MAJOR>
        <UNFUNDED_MANDATE_LIST>
            <UNFUNDED_MANDATE>No</UNFUNDED_MANDATE>
        </UNFUNDED_MANDATE_LIST>
        <EO_13771_DESIGNATION>Regulatory</EO_13771_DESIGNATION>
        <CFR_LIST>
            <CFR>48 CFR 204</CFR>
            <CFR>48 CFR 212</CFR>
            <CFR>48 CFR 217</CFR>
            <CFR>48 CFR 252</CFR>
        </CFR_LIST>
        <LEGAL_AUTHORITY_LIST>
            <LEGAL_AUTHORITY>41 U.S.C 1303</LEGAL_AUTHORITY>
        </LEGAL_AUTHORITY_LIST>
        <LEGAL_DLINE_LIST/>
        <RPLAN_ENTRY>No</RPLAN_ENTRY>
        <TIMETABLE_LIST>
            <TIMETABLE>
                <TTBL_ACTION>NPRM</TTBL_ACTION>
                <TTBL_DATE>07/00/2020</TTBL_DATE>
            </TIMETABLE>
        </TIMETABLE_LIST>
        <RFA_REQUIRED>Undetermined</RFA_REQUIRED>
        <GOVT_LEVEL_LIST>
            <GOVT_LEVEL>Federal</GOVT_LEVEL>
        </GOVT_LEVEL_LIST>
        <FEDERALISM>Yes</FEDERALISM>
        <PRINT_PAPER>No</PRINT_PAPER>
        <INTERNATIONAL_INTEREST>No</INTERNATIONAL_INTEREST>
        <AGENCY_CONTACT_LIST>
            <CONTACT>
                <FIRST_NAME>Jennifer</FIRST_NAME>
                <LAST_NAME>Hawes</LAST_NAME>
                <TITLE>Defense Acquisition Regulations System</TITLE>
                <AGENCY>
                    <CODE>0700</CODE>
                    <NAME>Department of Defense</NAME>
                    <ACRONYM>DOD</ACRONYM>
                </AGENCY>
                <PHONE>571 372-6115</PHONE>
                <EMAIL>jennifer.l.hawes2.civ@mail.mil</EMAIL>
                <MAILING_ADDRESS>
                    <STREET_ADDRESS>3060 Defense Pentagon, Room 3B941,</STREET_ADDRESS>
                    <CITY>Washington</CITY>
                    <STATE>DC</STATE>
                    <ZIP>20301-3060</ZIP>
                </MAILING_ADDRESS>
            </CONTACT>
        </AGENCY_CONTACT_LIST>
    </RIN_INFO>
</REGINFO_RIN_DATA>
