{"id":13116,"date":"2023-08-29T14:50:44","date_gmt":"2023-08-29T19:50:44","guid":{"rendered":"https:\/\/ndisac.org\/dibscc\/?p=13116"},"modified":"2025-06-06T06:21:17","modified_gmt":"2025-06-06T11:21:17","slug":"cybersecurity-compliance-and-risk-assessment","status":"publish","type":"post","link":"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/","title":{"rendered":"Cybersecurity Compliance and Risk Assessment"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Cybersecurity Compliance and Risk Assessment Intro&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221;]<\/p>\n<h2>Cybersecurity Compliance and Risk Assessment<\/h2>\n<p><strong>Purpose:<\/strong> <strong>Introduces the concept of a common Cybersecurity Compliance and Risk Assessment (CCRA) for the Defense Industrial Base <\/strong><strong><a href=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/12\/CCRA-WG-Announcement-Letter-12-14-Final.pdf\">CCRA Announcement Letter<\/a><\/strong><\/p>\n<p>The CCRA concept allows suppliers to complete ONE assessment which would be accepted on a reciprocal basis by DoD Prime contractors, or other companies who recognize the CCRA.\u00a0 This will introduce efficiencies and cost savings in contrast to current practices. As suppliers have observed, while the regulatory requirements for cybersecurity continue to grow and evolve, companies have resorted to developing proprietary assessments or using outdated questionnaires to capture compliance and risk information. This approach has introduced a significant burden to suppliers that are required to provide unique responses to assessment tools containing varying numbers of security requirements and inconsistent language.<\/p>\n<p>The transition to the CCRA will introduce a consistent approach for acquiring cybersecurity compliance and risk information, introduce a reduced set of required responses, and introduce the efficiency of answering once and sharing with many who recognize the reciprocal value of the CCRA.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text admin_label=&#8221;Feedback Button&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; custom_padding=&#8221;20px||20px|||&#8221; z_index_tablet=&#8221;0&#8243; custom_css_main_element=&#8221;}||img {|| border-radius: 10px;&#8221; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221;]<a href=\"https:\/\/ndisac.org\/dibscc\/contactus\/ccra-feedback-form\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-13276 aligncenter \" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/Submit_Feedback-Copy.jpg\" alt=\"Submit Feedback\" width=\"173\" height=\"96\" \/><\/a>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_code raw_content_tablet=&#8221;&#8221; raw_content_phone=&#8221;&#8221; raw_content_last_edited=&#8221;on|desktop&#8221; admin_label=&#8221;Newsletter Subscription&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; min_height=&#8221;36px&#8221; custom_margin=&#8221;-13px|||||&#8221; custom_padding=&#8221;37px||0px|2px||&#8221; custom_css_main_element=&#8221;}||.tnp-field-email {|| width: 73%;|| box-sizing: border-box;|| vertical-align: middle;||}||.tnp-field-button {|| width: 27%;|| margin-left:25%;||}||.tnp-field-button input.tnp-button {|| font-size: 14px;|| padding: 10px 30px;|| box-sizing: border-box;|| vertical-align: middle;|| background-color: #053c74;|| line-height: normal;|| text-shadow: 1px 1px 2px #000;||}||.tnp-field input%91type=%22submit%22%93 {|| position: inherit;||}||button, html input%91type=%22button%22%93, input%91type=%22reset%22%93, input%91type=%22submit%22%93 {|| -webkit-appearance: button;|| cursor: pointer;||}||button, button%91disabled%93:hover, button%91disabled%93:focus, input%91type=%22button%22%93, input%91type=%22button%22%93%91disabled%93:hover, input%91type=%22button%22%93%91disabled%93:focus, input%91type=%22reset%22%93, input%91type=%22reset%22%93%91disabled%93:hover, input%91type=%22reset%22%93%91disabled%93:focus, input%91type=%22submit%22%93, input%91type=%22submit%22%93%91disabled%93:hover, input%91type=%22submit%22%93%91disabled%93:focus {|| background: #071139;|| border: 0;|| border-radius: 2px;|| color: #fff;|| font-family: &#8216;Muli&#8217;, sans-serif;|| font-weight: 700;|| letter-spacing: 0.046875em;|| text-transform: uppercase;|| line-height: 1;|| padding: 0.846153846em;&#8221;]<form method=\"post\" action=\"https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php?action=tnp&amp;na=s\" class=\"my_sub_class\" style=\"\">\n<input type=\"hidden\" name=\"nlang\" value=\"\">\n<!-- &#091;et_pb_line_break_holder&#093; --><!-- &#091;et_pb_line_break_holder&#093; --><!-- &#091;et_pb_line_break_holder&#093; --><!-- &#091;et_pb_line_break_holder&#093; --><!-- &#091;et_pb_line_break_holder&#093; --><div class=\"tnp-field tnp-field-email\"><input class=\"tnp-email\" type=\"email\" name=\"ne\" id=\"tnp-1\" value=\"\" placeholder=\"Enter Email to Subscribe for CCRA Updates\" required><\/div>\n<!-- &#091;et_pb_line_break_holder&#093; --><!-- &#091;et_pb_line_break_holder&#093; --><!-- &#091;et_pb_line_break_holder&#093; --><!-- &#091;et_pb_line_break_holder&#093; --><!-- &#091;et_pb_line_break_holder&#093; --><div class=\"tnp-field tnp-field-button\" style=\"text-align: left\"><input class=\"tnp-submit\" type=\"submit\" value=\"Submit\" style=\"\">\n<\/div>\n<\/form>[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_accordion icon_color=&#8221;#0c71c3&#8243; admin_label=&#8221;Accordion: Change Questions&#8221; _builder_version=&#8221;4.9.2&#8243; toggle_font=&#8221;|700|||||||&#8221; toggle_text_align=&#8221;left&#8221; toggle_font_size=&#8221;20px&#8221; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; text_orientation=&#8221;left&#8221; custom_padding=&#8221;2px||2px|&#8221; hover_transition_duration=&#8221;100ms&#8221; hover_enabled=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; custom_css_toggle=&#8221;margin-bottom: 10px !important;&#8221; toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; closed_toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_accordion_item title=&#8221;What is driving the change?&#8221; open=&#8221;on&#8221; title_tablet=&#8221;What is CDI\/CUI and how do I tell if my data is considered CDI\/CUI?&#8221; title_phone=&#8221;What is CDI\/CUI and how do I tell if my data is considered CDI\/CUI?&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; vertical_offset_phone=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; horizontal_offset_phone=&#8221;0&#8243; background_color_gradient_direction_tablet=&#8221;180deg&#8221; background_color_gradient_direction_phone=&#8221;180deg&#8221; background_color_gradient_start_position_tablet=&#8221;0%&#8221; background_color_gradient_start_position_phone=&#8221;0%&#8221; background_color_gradient_end_position_tablet=&#8221;100%&#8221; background_color_gradient_end_position_phone=&#8221;100%&#8221; z_index_tablet=&#8221;1&#8243; z_index_phone=&#8221;1&#8243; hover_transition_duration_tablet=&#8221;300ms&#8221; hover_transition_duration_phone=&#8221;300ms&#8221; hover_transition_delay_tablet=&#8221;0ms&#8221; hover_transition_delay_phone=&#8221;0ms&#8221; body_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_link_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_link_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_link_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ul_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ol_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_quote_text_shadow_blur_strength_phone=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_horizontal_phone=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_vertical_phone=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_blur_phone=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; box_shadow_spread_phone=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_phone=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_phone=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221; text_shadow_blur_strength_phone=&#8221;1px&#8221; toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; toggle_text_shadow_horizontal_length_phone=&#8221;0px&#8221; toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; toggle_text_shadow_vertical_length_phone=&#8221;0px&#8221; toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; toggle_text_shadow_blur_strength_phone=&#8221;1px&#8221; closed_toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_horizontal_length_phone=&#8221;0px&#8221; closed_toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_vertical_length_phone=&#8221;0px&#8221; closed_toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; closed_toggle_text_shadow_blur_strength_phone=&#8221;1px&#8221;]The primary drivers for this change include feedback from our suppliers who seek reduced administrative burden in documenting cybersecurity and risk information, coupled with supplier concern about meeting the DoD&#8217;s compliance requirements.\u00a0 To address suppliers&#8217; input, the Defense Industrial Base (DIB) Sector Coordinating Council (SCC) Supply Chain Cybersecurity Task Force (SCCTF) created the CCRA Working Group to develop the CCRA as a common set of security requirements integrated into a single concise format to measure both risk and compliance.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What is the Cybersecurity Compliance and Risk Assessment?&#8221; title_tablet=&#8221;Who is considered a US Person or a Non-US Person?&#8221; title_phone=&#8221;Who is considered a US Person or a Non-US Person?&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; vertical_offset_phone=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; horizontal_offset_phone=&#8221;0&#8243; background_color_gradient_direction_tablet=&#8221;180deg&#8221; background_color_gradient_direction_phone=&#8221;180deg&#8221; background_color_gradient_start_position_tablet=&#8221;0%&#8221; background_color_gradient_start_position_phone=&#8221;0%&#8221; background_color_gradient_end_position_tablet=&#8221;100%&#8221; background_color_gradient_end_position_phone=&#8221;100%&#8221; z_index_tablet=&#8221;1&#8243; z_index_phone=&#8221;1&#8243; hover_transition_duration_tablet=&#8221;300ms&#8221; hover_transition_duration_phone=&#8221;300ms&#8221; hover_transition_delay_tablet=&#8221;0ms&#8221; hover_transition_delay_phone=&#8221;0ms&#8221; body_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_link_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_link_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_link_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ul_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ol_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_quote_text_shadow_blur_strength_phone=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_horizontal_phone=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_vertical_phone=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_blur_phone=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; box_shadow_spread_phone=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_phone=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_phone=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221; text_shadow_blur_strength_phone=&#8221;1px&#8221; toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; toggle_text_shadow_horizontal_length_phone=&#8221;0px&#8221; toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; toggle_text_shadow_vertical_length_phone=&#8221;0px&#8221; toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; toggle_text_shadow_blur_strength_phone=&#8221;1px&#8221; closed_toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_horizontal_length_phone=&#8221;0px&#8221; closed_toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_vertical_length_phone=&#8221;0px&#8221; closed_toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; closed_toggle_text_shadow_blur_strength_phone=&#8221;1px&#8221; open=&#8221;off&#8221;]The current version of the CCRA contains a maximum of 60 total questions and security requirements in a macro-enabled Excel file format. The file adjusts the number of required questions and security requirements based on responses in the compliance section of the CCRA. The risk assessment section is a subset of <a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/171\/r2\/upd1\/final\">NIST SP 800-171 Rev 2<\/a> security requirements to ensure the protection of sensitive information. The CCRA is intended to be an industry-agnostic tool that will enable any company, regardless of size or scope, to effectively capture a baseline risk assessment for entities where sensitive data is shared. It should be noted, however, that completing the CCRA does not waive, or substitute for any DoD-required assessments, or imply approval to host or process controlled unclassified information (CUI).[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;CCRA Deployment &#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; open=&#8221;off&#8221;]Member companies who are part of the DIB SCC CCRA Working Group will begin piloting the use of the CCRA following this general announcement. The organizations that will pilot the CCRA are listed below:<\/p>\n<table style=\"border-collapse: collapse;width: 64.4654%;height: 345px\" border=\"1\">\n<tbody>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px;text-align: center\"><strong>Company Name<\/strong><\/td>\n<td style=\"width: 41.5105%;height: 23px;text-align: center\"><strong>Website<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">ND-ISAC &#8211; CCRA Working Group<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/ndisac.org\/\">https:\/\/ndisac.org\/<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">Lockheed Martin<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/www.lockheedmartin.com\/en-us\/suppliers\/cybersecurity.html\">https:\/\/www.lockheedmartin.com<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">Boeing Company<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/www.boeing.com\/\">https:\/\/www.boeing.com\/<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">Leidos, Inc.<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/www.leidos.com\/\">https:\/\/www.leidos.com\/<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">RTX<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/www.rtx.com\/\">https:\/\/www.rtx.com\/<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">Booz Allen Hamilton<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/www.boozallen.com\/\">https:\/\/www.boozallen.com\/<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">Centurum, Inc.<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/www.centurum.com\/\">https:\/\/www.centurum.com\/<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">Frontgrade<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/www.frontgrade.com\/\">https:\/\/frontgrade.com\/<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">Win-Tech<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/win-tech.net\/\">https:\/\/win-tech.net\/<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">Northrop Grumman<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/www.northropgrumman.com\/\">https:\/\/www.northropgrumman.com\/<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">L3Harris<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/www.l3harris.com\/\">https:\/\/www.l3harris.com\/<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">BAE Systems<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/www.baesystems.com\/en\">https:\/\/www.baesystems.com\/en\/home<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">Huntington Ingalls Industries<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/hii.com\/\">https:\/\/hii.com\/<\/a><\/td>\n<\/tr>\n<tr style=\"height: 23px\">\n<td style=\"width: 33.3333%;height: 23px\">Accenture Federal Services<\/td>\n<td style=\"width: 41.5105%;height: 23px\"><a href=\"https:\/\/www.accenture.com\/us-en\">https:\/\/www.accenture.com\/<\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 33.3333%\">Rolls Royce<\/td>\n<td style=\"width: 41.5105%\"><a href=\"https:\/\/www.rolls-royce.com\/\">https:\/\/www.rolls-royce.com\/<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_tabs admin_label=&#8221;Tabs: Download and FAQ&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_tab title=&#8221;Download&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>The Cybersecurity Compliance and Risk Assessment (.xlsm) can be downloaded below:<br \/>Version: 1.03<\/p>\n<h3 style=\"text-align: center\"><a href=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2024\/03\/Cybersecurity-Compliance-Risk-Assessment_v1.03.xlsm\"><strong>Download CCRA Now<\/strong><\/a><\/h3>\n<p><strong><br \/>Check Sum:<\/strong><br \/>MD5: EF2841C4CE09733AFB0159D8724454CB<br \/>SHA256: 41236A5B02AD907F041DBCB105F282CBAC829CFDA6C6EC796F30FDBCE14AB417<\/p>\n<p>Information on how to perform a checksum can be found at <a href=\"https:\/\/learn.microsoft.com\/en-us\/powershell\/module\/microsoft.powershell.utility\/get-filehash?view=powershell-7.4&amp;viewFallbackFrom=powershell-7.3\" target=\"_blank\" rel=\"noopener\">Microsoft Support.<\/a><\/p>\n<blockquote>\n<p>This content was developed by subject matter experts of Member Companies of the Defense Industrial Base Sector Coordinating Council (DIB SCC) Supply Chain Cybersecurity Task Force and its working group for Common Cybersecurity Compliance and Risk Assessment (CCRA). This content is provided with the assistance of the National Defense Information Sharing and Analysis Center (ND-ISAC) and is intended to assist and inform small and medium-sized businesses (SMBs) in assessing cybersecurity risk and compliance of their suppliers. This content is provided at no cost and is based on good faith analyses of best practices in cybersecurity compliance and risk assessment.<\/p>\n<p>THIS CONTENT IS EXPRESSLY PROVIDED &#8220;AS IS.&#8221; NEITHER THE DIB SCC CCRA WORKING GROUP NOR ND-ISAC MAKE WARRANTY OF ANY KIND, EXPRESSED, IMPLIED, IN FACT OR ARISING BY OPERATION OF LAW, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT AND DATA ACCURACY. NEITHER THE DIB SCC CCRA WORKING GROUP NOR ND-ISAC REPRESENTS NOR WARRANTS THAT THE OPERATION OF THIS CONTENT WILL BE UNINTERRUPTED OR ERROR-FREE, OR THAT ANY DEFECTS WILL BE CORRECTED. NEITHER THE DIB SCC CCRA WORKING GROUP NOR ND-ISAC WARRANT OR MAKE ANY REPRESENTATIONS REGARDING THE USE OF THIS CONTENT OR THE RESULTS THEREOF, INCLUDING BUT NOT LIMITED TO THE CORRECTNESS, ACCURACY, RELIABILITY, OR USEFULNESS OF THE CONTENT.<\/p>\n<p>You are solely responsible for determining the appropriateness of using this content and you assume all risks associated with its use, including but not limited to the risks and costs of program errors, compliance with applicable laws, damage to or loss of data, programs or equipment, and the unavailability or interruption of operation. This content is not intended to be used in any situation where a failure could cause risk of injury or damage to property. Furthermore, the use of this content does not alleviate any obligation you may have to comply with any contractual or legal requirements, e.g. DFARS 252.204-7012.<\/p>\n<p>Any actions or implementations based on this content are entirely at the user&#8217;s risk and with no implied warranty or guarantee; or liability to ND-ISAC or Member Company participants of the ND-ISAC or the DIB SCC. Any questions or issues with the CCRA tool should be referred to the DIB SCC CCRA Team at <a href=\"mailto:ccra@ndisac.org\">ccra@ndisac.org<\/a>.<\/p>\n<\/blockquote>\n<p>[\/et_pb_tab][et_pb_tab title=&#8221;Frequently Asked Questions&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_accordion icon_color=&#8221;#0c71c3&#8243; _builder_version=&#8221;4.9.2&#8243; custom_padding=&#8221;2px||2px|&#8221; toggle_font=&#8221;|700|||||||&#8221; toggle_text_align=&#8221;left&#8221; toggle_font_size=&#8221;20px&#8221; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; text_orientation=&#8221;left&#8221; custom_padding=&#8221;2px||2px|&#8221; hover_transition_duration=&#8221;100ms&#8221; z_index_tablet=&#8221;0&#8243; custom_css_toggle=&#8221;margin-bottom: 10px !important;&#8221; toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; closed_toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221;<br \/>body_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221;][et_pb_accordion_item title=&#8221;What is the Cybersecurity Compliance and Risk Assessment (CCRA) and why do we need to complete this survey?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]The Cybersecurity Compliance and Risk Assessment (CCRA) was developed by the Defense Industrial Base Sector Coordinating Council (DIB SCC) Supply Chain Task Force to drive a common set of cybersecurity requirements that both document compliance and measure risk. It\u2019s intended to reduce the burden on our suppliers, currently being assessed against multiple standards and in varied formats (often with overly complex and outdated cyber requirements).[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Where can I find the latest version of the CCRA?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]The latest version of the CCRA can be found on the ND-ISAC CyberAssist website located <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/\">here.<\/a>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Where should users be directed if they need technical support\/general questions?&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]Please contact the requesting organizations for support\/general questions.<br \/>Feedback on the CCRA\u2019s content can be submitted using the <a href=\"https:\/\/ndisac.org\/dibscc\/contactus\/ccra-feedback-form\/\">CCRA Feedback Form<\/a>.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Can the Cybersecurity Compliance and Risk Assessment (CCRA) be used across different prime contractors?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]Starting December 14, 2023, the CCRA will begin to be adopted by members of the Defense Industrial Base Sector Coordinating Council (DIB SCC) which include <span class=\"ui-provider ed bcg bch bci bcj bck bcl bcm bcn bco bcp bcq bcr bcs bct bcu bcv bcw bcx bcy bcz bda bdb bdc bdd bde bdf bdg bdh bdi bdj bdk bdl bdm bdn\" dir=\"ltr\">Lockheed Martin, Accenture Federal Services, BAE Systems, Booz Allen Hamilton, Boeing, Centurum, Frontgrade Technologies, HII, L3Harris, Leidos, Northrop Grumman, RTX, Rolls Royce, and Win-Tech<\/span>. We encourage members of the DIB supply chain to utilize the CCRA to assess the cybersecurity compliance and risk of their suppliers.<\/p>\n<p>Note: Each organization will begin piloting use of the CCRA following this <a href=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/12\/CCRA-WG-Announcement-Letter-12-14-Final.pdf\">general announcement.<\/a> Please contact the requesting organization for additional information.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;How will the CCRA be used and how is the information I put into the form secured?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]The use of the CCRA will vary from organization to organization. The CCRA is being made available through the DIB SCC CyberAssist site in an macro-enabled format for ease of access and use, with the ability to share assessment results via an exportable CSV format. Suppliers using the Excel version will maintain exclusive control over whom they share it with.<\/p>\n<p>It will also be implemented in web-based formats, like Exostar Onboarding Module (OBM) or OneTrust, where suppliers can select the organizations they want to share it with. Please contact the requesting organization for more information on how the response to the CCRA will be used.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;I do not receive CUI\/CDI. Why do I need to complete the CCRA to show that I\u2019m compliant with NIST 800-171 controls?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]The CCRA is used to assess both Cyber Compliance and Risk. The CCRA is built on a set of Scoping Questions that will dynamically add\/remove questions from the survey based on the response provided. The Scoping Questions will identify the type of information (i.e., Federal Contract Information (FCI), Controlled Unclassified Information (CUI), Covered Defense Information (CDI), or other customer-defined Sensitive Information), the supplier possesses, processes, transmits, and\/or stores; and highlight other key risk factors such as when Information &amp; Communication Technology (ICT) is being provided by the supplier. It will align them to a set of questions that will help us understand a supplier\u2019s compliance and risk posture.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Why were only a subset of security controls used in the CCRA? What was the reasoning behind the control selection?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]The objective of the working group was to develop a single questionnaire that enabled a company to collect compliance information and establish a baseline risk assessment. The current 31 controls were selected with the priority of asking as few questions as possible to gain a high-level understanding of where significant gaps may be present in a supplier\u2019s cyber posture. The 31 currently included on the common questionnaire are focused on identifying where there may be significant gaps.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Since the form is in an excel macro-enabled format (.xlsm), how can I be assured that it is safe to open?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]Ensure that you download the CCRA from the ND-ISAC CyberAssist website located <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/\">here<\/a>.<\/p>\n<p>You can calculate the checksum (hash) of the downloaded file using several options:<br \/>1. Navigate to the extracted file. Right-click on the file and select the \u201cCRC SHA\u201d option. Then select \u201cSHA-256\u201d. Then use the prompt with the checksum information to verify you have the same value as what\u2019s provided on the CyberAssist site.<\/p>\n<p>2. If the above doesn\u2019t work, open a Windows Powershell prompt and use the command \u201cGet-FileHash &lt;filename&gt;\u201d, where &lt;filename&gt; is the sample. For more details, see: <a href=\"https:\/\/learn.microsoft.com\/en-us\/powershell\/module\/microsoft.powershell.utility\/get-filehash?view=powershell-7.4\">Get File Hash with PowerShell<\/a>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;How does the survey help represent my compliance with the Cyber DFARS requirements?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]The survey has a set of scoping questions that identify the type of sensitive information you possess. If Controlled Unclassified Information (CUI) and DFARS 252.204-7012 are applicable, you will be asked for the status of your implementation of the NIST SP 800-171 security requirements. To be compliant with DFARS 7012, you must attest that all 110 NIST cybersecurity controls are implemented OR for controls not implemented, the supplier must have a documented Plan of Action and Milestone (POAM) in your System Security Plan (SSP).<\/p>\n<p>If DFARS 252.204-7020 is applicable, you will be asked for the status of your Supplier Performance Risk System (SPRS) submission. To be compliant with DFARS 7020, the supplier\u2019s NIST Assessment results (performed within the prior 3-year period) must be posted to the DoD SPRS.<\/p>\n<p>The CCRA will ask for the status of your compliance with these requirements with a few high-level questions. It should be noted, however, that completing the CCRA does not waive, or substitute for any DoD-required assessments, or imply approval to host or process controlled unclassified information (CUI).[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;How does the CCRA calculate and assess the risk rating?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]Cyber Risk is measured based on the responses to the Security Controls. In total, there are (31) Security Controls; (11) Category 1, (10) Category 2, (10) Category 3. Based on the response to the Cyber Security controls, a user will be given a Cyber Risk Rating of Negligible, Moderate, Significant.<\/p>\n<p>The following rules are applied for calculating Cyber Risk:<\/p>\n<ul>\n<li>Negligible = All Category 1, 2, and 3 controls are implemented<\/li>\n<li>Moderate= All Category 1 implemented AND &gt; 1 Category 2 or 3 implemented<\/li>\n<li>Significant = Less than 11 Category 1 implemented.<\/li>\n<\/ul>\n<p>For Suppliers receiving only FCI and no other customer-sensitive or Controlled data types, the following rules are applied:<\/p>\n<ul>\n<li>FCI- only suppliers = Negligible if all 6 FCI security controls are implemented or else Significant.<br \/>** The subset of FCI security controls is highlighted Yellow on the &#8220;Questionnaire&#8221;<\/li>\n<\/ul>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What does the risk ratings represent?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]The following are the rules and description for each of the Cyber Rating:<\/p>\n<ul>\n<li><span style=\"text-decoration: underline\"><strong>Negligible<\/strong><\/span> = (All Category 1, 2, and 3 controls are implemented)\n<ul>\n<li>Negligible to minimal risks are identified based on the response provided. The supplier has a strong performing cyber risk management program.<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"text-decoration: underline\"><strong>Moderate<\/strong><\/span> = (All Category 1 implemented AND &gt; 1 Category 2 or 3 implemented)\n<ul>\n<li>Minimal to moderate risks are identified based on the response provided. The supplier has a Cyber risk management program with good protections in place, but additional risk mitigations are likely required to protect Sensitive Information and\/or Government\/DOD Controlled Unclassified Information (CUI).<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"text-decoration: underline\"><strong>Significant<\/strong><\/span> = (Less than 11 Category 1 implemented)\n<ul>\n<li>Moderate to significant risks are identified based on the response provided. The supplier has minimal or no cyber risk management program and significant cyber protections are lacking.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Can the offline version of the CCRA be uploaded into Exostar or other \u201cbuyer\u201d organization\u2019s supply chain risk management systems\/platforms?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]The intent of the offline Excel version of the CCRA is to provide flexibility for DIB suppliers to use the form across multiple platforms and partners. As the form is adopted, organizations like Exostar will or already have developed solutions to enable the upload or acceptance of the CCRA into their systems. Please contact your requesting organizations for details on how it should be submitted.<\/p>\n<p>Note that the CCRA has a built-in capability to enable the export of the responses to a comma-separated value (.csv) file that may be used to upload across multiple platforms.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13538 size-full\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/CCRA-Validate-and-Export.jpg\" alt=\"\" width=\"1409\" height=\"389\" srcset=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/CCRA-Validate-and-Export.jpg 1409w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/CCRA-Validate-and-Export-1280x353.jpg 1280w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/CCRA-Validate-and-Export-980x271.jpg 980w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/CCRA-Validate-and-Export-480x133.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1409px, 100vw\" \/>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;I don\u2019t possess, manage, or generate Controlled Unclassified Information (CUI) and DFARS 252.204-7012 does not apply to me. Why do I have to complete the CCRA?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]The scope of the CCRA is not limited to CUI and DFARS 252.204-7012 requirements. For suppliers where DFARS\/CUI is not applicable but they store, process, or transmit other types of customer-defined Sensitive Information (i.e., Proprietary Information, Export Controlled Information, Personal Identifiable Information, Business Confidential, etc.,) or Information &amp; Communication Technology (ICT), there is a need to assess Cyber Risk and the supplier&#8217;s ability to safeguard the data that is entrusted to them.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Will completing the CCRA satisfy the requirements to be compliant with DFARS 252.204-7012, DFARS 252.204-7020 and\/or CMMC?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]No. The CCRA only captures the supplier\u2019s attestation that the DFARS 252.204-7012 and DFARS 252.204-7020 requirements are met. Completing the survey will not make the supplier compliant with these requirements.<\/p>\n<p>To be compliant with DFARS 7012, you must attest that all 110 NIST cybersecurity controls are implemented OR for controls not implemented, the supplier must have a documented Plan of Action and Milestone (POAM) in your System Security Plan (SSP).<\/p>\n<p>To be compliant with DFARS 7020, the supplier\u2019s NIST Assessment results (performed within the prior 3-year period) must be posted to the DoD SPRS.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;How do I access and complete the CCRA?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]Suppliers are encouraged to download and review the CCRA from the <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/\">CyberAssist website<\/a>. Submission of the CCRA will vary by requesting organization. Please contact your requesting organizations for details on how it should be submitted.[\/et_pb_accordion_item][et_pb_accordion_item _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title=&#8221;If organizations are implementing the CCRA in different systems and applications, how can I share my responses to the CCRA across the DIB.&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]Suppliers are encouraged to download and maintain a local version of the CCRA from the CyberAssist <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/\">website<\/a>. Once the form is completed, the user can \u201cValidate &amp; Export\u201d the responses to a comma-separated value (.csv) file that can be emailed or uploaded to different systems and applications. Instructions on how to do this are provided within the CCRA.<\/p>\n<p>Submission of the CCRA will vary by requesting organization. Please contact your requesting organizations for details on how it should be submitted.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13538 size-full\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/CCRA-Validate-and-Export.jpg\" alt=\"\" width=\"1409\" height=\"389\" srcset=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/CCRA-Validate-and-Export.jpg 1409w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/CCRA-Validate-and-Export-1280x353.jpg 1280w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/CCRA-Validate-and-Export-980x271.jpg 980w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/CCRA-Validate-and-Export-480x133.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1409px, 100vw\" \/>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What is the Onboarding Module (OBM)?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]The OBM is Exostar\u2019s solution for an electronic version of the CCRA. Requesting organizations that subscribe to this solution will prompt their suppliers to electronically fill out or upload the Excel version (with an exported .csv file) of the CCRA into OBM.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;When will suppliers be expected to move off of the current NIST SP 800-171 and Cybersecurity Questionnaire (CSQ) that is hosted in Exostar Partner Information Manager (PIM)?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]Suppliers that are currently using Exostar\u2019s NIST SP 800-171 questionnaire and Cybersecurity Questionnaire (CSQ) will begin their transition to the CCRA as early as 1st Quarter of 2024. As their NIST\/CSQ expires (1 year from the last submission), the suppliers will be prompted to transition to the CCRA on Exostar\u2019s Onboarding Module (OBM).<\/p>\n<p>Note: Each organization will begin piloting use of the CCRA following this <a href=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/12\/CCRA-WG-Announcement-Letter-12-14-Final.pdf\">general announcement.<\/a> Please contact the requesting organization for additional information.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;I recently completed the Cyber Security Questionnaire (CSQ) in Exostar. Do I now need to complete this new questionnaire?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]Suppliers that are currently using the legacy Cybersecurity Questionnaire (CSQ) and NIST SP 800-171 Questionnaire (NIST) will be phased into the new CCRA as their questionnaires become expired (annual renewal) or upon request of the requesting organization.<\/p>\n<p>Note: Each organization will begin piloting use of the CCRA following this <a href=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/12\/CCRA-WG-Announcement-Letter-12-14-Final.pdf\">general announcement.<\/a> Please contact the requesting organization for additional information.[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Will my answers from my previous assessment (CSQ) automatically pull over into this new assessment?&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]No, the new CCRA is much shorter (60 questions) and will significantly reduce the time it takes to complete over the legacy CSQ\/NIST questionnaires.[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_tab][\/et_pb_tabs][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Cybersecurity Compliance and Risk Assessment Intro&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[26],"tags":[],"class_list":["post-13116","post","type-post","status-publish","format-standard","hentry","category-awareness"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Compliance and Risk Assessment - DIB SCC CyberAssist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Compliance and Risk Assessment - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Cybersecurity Compliance and Risk Assessment Intro&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-29T19:50:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T11:21:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/Submit_Feedback.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"820\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"markcarr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"markcarr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/\",\"name\":\"Cybersecurity Compliance and Risk Assessment - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/Submit_Feedback-Copy.jpg\",\"datePublished\":\"2023-08-29T19:50:44+00:00\",\"dateModified\":\"2025-06-06T11:21:17+00:00\",\"author\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\"},\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/#primaryimage\",\"url\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/Submit_Feedback.jpg\",\"contentUrl\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/Submit_Feedback.jpg\",\"width\":820,\"height\":455,\"caption\":\"Submit Feedback\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Compliance and Risk Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\",\"name\":\"markcarr\",\"url\":\"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Compliance and Risk Assessment - DIB SCC CyberAssist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Compliance and Risk Assessment - DIB SCC CyberAssist","og_description":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Cybersecurity Compliance and Risk Assessment Intro&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","og_url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/","og_site_name":"DIB SCC CyberAssist","article_published_time":"2023-08-29T19:50:44+00:00","article_modified_time":"2025-06-06T11:21:17+00:00","og_image":[{"width":820,"height":455,"url":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/Submit_Feedback.jpg","type":"image\/jpeg"}],"author":"markcarr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"markcarr","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/","url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/","name":"Cybersecurity Compliance and Risk Assessment - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/#primaryimage"},"image":{"@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/Submit_Feedback-Copy.jpg","datePublished":"2023-08-29T19:50:44+00:00","dateModified":"2025-06-06T11:21:17+00:00","author":{"@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0"},"breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/#primaryimage","url":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/Submit_Feedback.jpg","contentUrl":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2023\/08\/Submit_Feedback.jpg","width":820,"height":455,"caption":"Submit Feedback"},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Compliance and Risk Assessment"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0","name":"markcarr","url":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"markcarr","author_link":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/ndisac.org\/dibscc\/category\/cyberassist\/awareness\/\" rel=\"category tag\">Awareness<\/a>","rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Cybersecurity Compliance and Risk Assessment Intro&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/13116"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=13116"}],"version-history":[{"count":212,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/13116\/revisions"}],"predecessor-version":[{"id":16742,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/13116\/revisions\/16742"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=13116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/categories?post=13116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tags?post=13116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}