Enhance Your Security Program with TAG
NISPOM Compliance Starts Here
At TAG, we empower Facility Security Officers with the tools and knowledge needed to ensure robust NISPOM compliance. Our expertise helps you build resilient security programs that stand up to any inspection.
Comprehensive FSO Training
Our tailored training programs equip FSOs with the skills necessary to manage security protocols effectively.
Expert Compliance Guidance
Receive step-by-step guidance to navigate the complexities of NISPOM regulations with confidence.
Tailored Security Solutions
We offer customized solutions that align with your organization’s unique security needs and objectives.
Insights on NISPOM Compliance and FSO Duties
Beyond CMMC. Why You Should Develop an Information Control Plan
The Opportunity
Defense contractors fulfilling CMMC requirements should also consider developing an information control plan. While the CMMC certification evaluates systems, the plan will address information residing on the systems and networks.
Where NIST provides technical guidance and NISPOM might address the protection of classified information, there is still a need to address adequate protection of other information such as TAR, CUI, FGI and proprietary.
The Problem
Take a look at this paraphrase from Allen Dulles’ book The Craft of Intelligence:
In the 1950’s the US Congress was concerned that there was just too much technical information available on government programs. From that concern, they commissioned researchers to assemble as much information from public domain about a particular program as they could. The group scoured libraries, newsstands, TV, radio and other media common to the decade and provided a report. As a result, the government determined the information to be classified, safeguarded the information and disbanded the group. The lesson; intimate program details were not properly identified, marked and protected.
Here are a few examples of where this happens today.
- CMMC ratings evaluate a contractors ability to protect data that resides on networks, devices and computers. However, the data residing on protected networks and devices is not marked. CMMC measures technical countermeasures to protect the data. However, the additional requirement is to “Develop a CUI program or information control plan complete with methods, policies and training. This is usually an area that falls under the IT manager, an expert at countermeasures, but not intimately knowledgeable of the information being protected.
- An employee is required to provide white papers, pamphlets, or technical drawings for public event such as a conference or publication. While the employee is an expert on their information, they may not understand which products (drawings, technical references, research results, etc.) are CUI, ITAR or proprietary. This is usually an area controlled by a compliance officer, FSO, or other employee, who may not be familiar with the technical information. When the employee uses technical drawings to provide required products, and reviews are not in place, there is a potential CUI or ITAR violation.
- Employees create work products, deliverables, purchase orders, etc and is distributed through shared drives, emails or other public facing method. This becomes an issue where reference documents such as technical manuals, statement of work, or other source documents and products are marked CUI, export controlled, or proprietary information, but not identified in derived products.
There are so many situations, too many to put into one article, on how vulnerable technical information can be. The above three situations can lead to information and data release violations if the correct measures are not taken.
Don’t believe the hype
Let’s use CUI as an example of what should be part of an information protection plan and how to apply it. There is bad advice going around that says: “contractors are not authorized to determine CUI”. or “contractors are not authorized to mark CUI on documents”. Don’t fall for this, it’s your responsibility to identify, document and control information.
How to implement your own program
For example, while it is true is that the government determines what information is CUI, contractors can derive CUI in products created from CUI source documents. Further, if a contractor is creating blueprints or providing a product using a source document marked CUI or export controlled, then anything produced from that source should carry over the new creation.
Unfortunately, sensitive information derived by contractors is not always carried over into work instructions, purchase orders, technical drawings, or other products. The solution can’t be only technical controls found in NIST, rather is should include the other requirements for applying an information control plan with the following objectives:
- Identify or recognize source products
- Train employees to identify protected source documents
- Label and catalog decisions
- Develop public release review process to ensure protected information is not released
- Publish policies and training to ensure it is complete
- Implement self-inspection
The work effort is huge, but rewarding. It involves working groups, records and accountability.
However, you might consider getting assistance. Where third party services ensure NIST compliance and perform CMMC reviews, they do not create CUI programs or information control plans as described above. If you need assistance with developing your program, please reach out to us.
The FSO should be plugged into on boarding and off boarding of cleared employees
Human Captial or Human Resources on board employees into the organization. This has been a practice for years and works very well. Part of onboarding should include verification of eligiblity to work as well as execution of a background check.
With cleared defense contractors, FSOs should be incorporated into the onboarding process. The FSO role is to either grant access to already cleared personnel, intitiate background investigations for those not already cleared, and prepare employees to execute on classified contracts.
In many organizations, HR and FSOs might be the same person or share the same office. In this case, the onboarding process for cleared employees may not be an issues as the employees are either the same or shared.
In larger organizations, the FSO and HR may be separated by distance, offices or other circumstances. However, they should be working together from onboarding to termination of cleared emloyees. Here are some important things to consider:
- If HR only uses I9 identification for onboarding, which is either a drivers license or social security number. These sources do not determine citizenship, just eligibility to work.
- FSOs must ensure U.S. citizenship, which requires passport, birthcertificate and or citizenship documents such as naturalization forms, therefore should be part of the on boarding process
- FSOs must ensure cleared employees remain eligible. This may require involving HR in policimaking and documentation of emlpoyee non-compliance
- FSOs must debrief employees when access is no longer required, therefore should be part of the off boarding process
As your company grows, consider ensuring your FSO is part of the growth and has the opportunity to execute their requirements to demonstrate NISPOM compliance.
Security Through Email; Not a Best Practice
How many emails does it take to for an FSO to get a Visit Authorization Request (VAR) approved
a. 4
b. 10
c. 1
Hopefully your answer is none of the above. However, it’s more likely that the answer for some of you is unfortunately, four or more. Some have commented that they have exchanged email correspondence up to 10 times with a subject before finally getting the information needed to complete the VAR request in Defense Information System for Security (DISS). 10 or more emails per VAR; multiply that by the number of employees and that’s a lot of attention. Now, lets add foreign travel and other required reports. Using email as the primary information gathering resource can significantly increase administrative workloads.
Why use email for FSO tasks at all.
For those of you who work in cleared facilities with large budgets, you might ask the same question and it’s a good question. In your case, you might be enjoying the benefits of a dashboard and all of the benefits of being a well trained security profession and perhaps even a security team in support. As such, you might rarely get emails for security tasks as each employee might have their own portal.
However, there are a large number of FSOs who are not security professionals and have been appointed to the position and may not be aware of a better way. Many of the FSOs I serve are managing tasks through email and it does involve a lot of time devoted to answering email, requesting additional information and so much more. These email tasks are tedious and if they already receive abundant emails with their full time job, they could get buried, lost or misfiled.
A better way
While these FSOs may not have the resources such as security dashboards for employee and FSO tasks, email can be incorporated into their procedures, but should not be the primary way of gathering information.
The danger with email is that it’s email and not a very good system for tasking. Additionally, the information that is required to complete reports and requests in DISS is sensitive and unsecure email may create a vulnerability. There is a better way
Here are a few recommendations for making your FSO tasks more efficient and secure.
- Create a fillable form or eform for each type of request or report. Duplicate required DISS fields to create the forms.
- Upload form on shared drive for employees to access, populate and send to FSO
- Create an FSO Workbook to file forms, archive documents and demonstrate NISPOM Compliance
Email is a great communication tool, but not a good tasking mechanism. For example, email can be used to notify and FSO that a form has been filled and ready to process. It may be a great way to remind employees to take their training. However, conducting operations and tasks via email may lead to a breakdown in efficiency and compliance.
If you would like to see some sample forms, contact me and I’ll be happy to provide.
If you are ready for consultation, program building or creating your own FSO Workbook and system contact me.
Alternatively, you can download files, folders and templates in our FSO Workbook product. I’ll also be happy to set that up.
How to Gain an Absolutely Unfair Advantage at Security Reviews
By: Jeffrey W. Bennett, SAPPC, SFPC, ISOC, ISPDemonstrating NISPOM compliance requires both an in-depth knowledge of NISPOM requirements and the ability to grasp administrative tasks. For example, the cleared company’s Senior Management Official (SMO) and Facility Security Officer (FSO) implement the NISPOM within their organization to address risk to classified information. While these leaders oversee and execute NISPOM requirements, there may be issues with demonstrating how they are meeting compliance. With a bit of organization, compliance can be easily demonstrated with the correct artifacts and documentation. In my newsletter, I tackle NISPOM compliance and lead with three pillars. One of which is a continuous study of NISPOM and application of FSO and NISPOM professional development; both critical to technically proficiency. The other resource is the Self-Inspection Handbook for NISP Contractors, which covers all NISPOM topics. Using the handbook as a professional development and assessment strategy, let’s tackle how to demonstrate compliance under the “Procedures” topics. One task is the identification of a Senior Management Official (SMO) who is responsible for overseeing the security and Insider Threat programs, reporting requirements and security operations. Compliance is measured by the SMO’s execution of their role and delegation of tasks. When Defense Counterintelligence and Security Agency (DCSA) conducts the security review, they will determine how SMO is exercising their role, approving procedures and resourcing programs. The SMO appoints the FSO and the Insider Threat Program Senior Official (ITPSO) in writing. Additionally, the SMO should sign, endorse and require the implementation of the following NISPOM required procedures:
These procedures should be tailored for the organization. Once they signed and implemented, they can be incorporated into training, presentations and available to employees. Appointment memos and policies can be signed and available to DCSA for review. However, let’s level up. For example, one question asks, “Has the company developed and implemented an Insider Threat Program endorsed by the SMO”. The answers are: YES, NO or NA. You can select an option and move to the next question. However, I always recommend populating the narrative space with how the practices are implemented. That way the FSO can rehearse answers, provide written documentation and verbally demonstrate how requirements are met. Let’s proceed to the narrative. How Implemented/Notes: _________________________________ This provides a white space for answers. Take the opportunity to write explanations as completely as possible. Most answers may translate to address DCSA’s Gold Standard Criteria, allowing the facility to possibly meet Commendable and Superior rating criteria. For example: How Implemented/Notes: “Our ITPSO developed a robust program policy and briefed it to the SMO who approved and signed it. The policy is available to each employee and referenced in Insider Threat Program training and Insider Threat Program Working Group training. Our organization also analyzes insider threat information with IXN Solutions or other third party vendor software” Again, this narrative assists with the future DCSA review. However, it takes a well educated FSO to be up to the task. FSOs should incorporate professional development that provides increasing and measurable technical proficiency. This NISPOM foundation also provides understanding the application of The Self-Inspection Handbook for NISP Contractors. Attend professional development opportunities and use the handbook to verify education and compliance.
|
Your NISPOM Compliance Questions Answered
What is the role of a Facility Security Officer?
A Facility Security Officer (FSO) is responsible for overseeing and implementing a security program that complies with NISPOM requirements, ensuring the protection of classified information.
How can I ensure my facility is NISPOM compliant?
To ensure NISPOM compliance, conduct regular audits, provide ongoing FSO training, and stay updated with regulatory changes. TAG offers comprehensive support to help you maintain compliance.
What are the key responsibilities of an FSO?
Key responsibilities include managing security clearances, conducting security training, and ensuring adherence to NISPOM guidelines.
How often should security training be conducted?
Security training should be conducted at least annually, with additional sessions as needed to address specific updates or changes in regulations.
What is NISPOM?
The National Industrial Security Program Operating Manual (NISPOM) outlines the requirements for safeguarding classified information within cleared contractor facilities.
How does TAG assist with FSO tasks?
TAG provides expert consulting services to help FSOs manage their duties effectively, offering training, compliance audits, and tailored security solutions.
What are the consequences of non-compliance with NISPOM?
Non-compliance can lead to penalties, loss of security clearances, and damage to your organization’s reputation. Ensuring compliance is essential for maintaining operational integrity.
How can I stay updated on NISPOM changes?
Stay informed by subscribing to industry newsletters, attending relevant workshops, and consulting with experts like TAG who monitor regulatory updates.
What resources are available for new FSOs?
New FSOs can benefit from TAG’s comprehensive training programs, mentorship opportunities, and access to a wealth of industry resources to build their expertise.
Key Features of Our FSO Programs
Comprehensive Compliance Audits
Our audits ensure your security program aligns with all NISPOM requirements, identifying gaps and providing actionable insights.
Tailored Training Solutions
We offer customized training programs that empower your team with the knowledge and skills needed to maintain compliance.
Proactive Risk Management
Our strategies focus on identifying potential threats and implementing measures to mitigate risks before they impact your operations.
Our Consulting Services
NISPOM Compliance Consulting
We provide expert guidance to ensure your organization meets all NISPOM standards efficiently.
FSO Capability Building
Develop your internal FSO capabilities with our hands-on training and support services.
Security Program Development
We assist in designing and implementing robust security programs tailored to your specific needs.
Inspection Preparation
Our team prepares you for successful inspections, minimizing disruptions and ensuring compliance.
