There are an estimated 350, 000+ companies in the DIB, with many in the precision metalwork industry. However, manufacturing on shop floor comprises many processes, from consulting, drafting, drawing, casting, and assembly, among many others. In all these processes, information is generated, disseminated, shared, and stored among various teams or individuals involved. For instance, any drawings, BOMs, 3D CAD models, and other forms of data relating to the part being produced/manufactured are shared by various employees in the company. All this information is considered Controlled Unclassified Information (CUI). It must be handled according to the existing laws, government-wide policies, and regulations in line with NIST SP 800-171 Rev 2.
Therefore, secure management of CUI from its creation, sharing, dissemination and storage is critical. In fact, the DoD released CMMC as a unifying standard for implementing cybersecurity measures geared towards protecting CUI across the DIB. Although it has a lower sensitivity than Classified Information, CUI might also have potentially serious ramifications should it fall into the wrong hands. Therefore, the US government created the CUI program through Executive Order 13556 in November 2010. It mandated that all CUI be shared and protected under strict guidelines under NIST 800-171 to prevent any access by unauthorized personnel.
It is worth noting that the requirements for safeguarding and disseminating CUI flow down the DoD supply chain and subcontractors through DFARS 252.204-7012.
Authorized Holder and Controlled Environment
Who is a CUI Authorized Holder?
An Authorized Holder refers to an individual, agency, organization, or group of users permitted to handle or designate CUI. In other words, the Authorized Holder is responsible for managing CUI in your shop. However, a manufacturer can also assign an agency or group to act as the CUI Authorized Holder.What is a Controlled Environment?
To ensure that your company can properly handle CUI, it is recommended that it should have a Controlled Environment. A controlled environment is a space or area with adequate procedural or physical controls for CUI protection from unauthorized disclosure or access. Remember, anything falling under EAR or ITAR flow down is also considered CUI. Any workspace or shop has many workers that might not have a lawful government purpose to access CUI. Therefore, having a controlled environment is critical. Any unlawful access to this information constitutes a violation. When considering a controlled environment, ask yourself;- Who works on the floor of your machine shop?
- Who has unescorted access to your machine shop during and after normal business hours? At times, the maintenance and cleaning crew may access areas where CUI is being processed, presenting a risk to this information.
- Do you have a suitable area for sensitive discussions?
- Is there a visitor escort policy?
Process Documentation
All locations where CUI is stored are called CUI boundaries and footprints. If the CUI footprint is large, you will find it more expensive and challenging to secure. Handling the way controlled unclassified information flows in your machine shop starts with process documentation. This can be outlined in the following steps:Determine the Kind of CUI in Your Machine Shop
What is CUI, and what isn’t? This should be the first question you ask yourself as an Authorized Holder. Although there’s a wealth of information online that can help you distinguish what CUI is and isn’t, 32 CFR 2002.4(h) is possibly the best place to start. Classifying what data is and isn’t CUI will help you build systems and policies for proper CUI management. It will also help you institute proper data protection measures for non-CUI data. Generally, all data related to a DoD or government contract could be considered CUI. This includes CAD models, Drawings, specifications, equipment manuals, contract details including shipping addresses, qualities, shipment items, etcetera.Determine the CUI Lifecycle
Upon determining you generate or receive CUI in your machine shop, you should determine its entire lifecycle in your organization. This includes how you come into the possession of the CUI (i.e., through the mail, portals, emails, etc), where it’s generated, and how you store it (either physically or electronically). Other things include how CUI is shared between workers, how it is used on the floor of your machine shop, and how the CUI is archived and disposed of. Additionally, you must determine where the CUI touches hardware/software, processes, and people to determine the CUI boundary or footprint.What Should an Authorized Holder Do With CUI?
After determining your CUI boundaries, ask yourself, can I minimize those boundaries? Are there steps that I can take on my shop floor to simplify the footprint? Can I remove some unnecessary steps in the information handling process? Below are some basic requirements you should implement regarding CUI as the Authorized Holder.- Train their employees on CUI. This includes educating them on CUI, the importance of managing its access, and the ramifications if it isn’t properly managed.
- Build systems and create policies to ensure proper CUI monitoring, protection, and auditing.
- Ensure that only authorized/appropriate people can access the controlled unclassified information. CUI also shouldn’t be disclosed to unauthorized entities or persons, whether electronically or physically.
- All electronic systems handling CUI should be monitored, audited, and protected.
- Teach the employees about the requirements of NIST 800-171. This will ensure that they can properly protect the CUI. However, you might have to seek help from a CMMC or NIST 800-171 consultant or an RPO to train them.
- Label and mark the CUI. The authorized holder or the CUI designator should mark and label the CUI in a manner which meets CMMC and NIST requirements. If you’re printing the documents for use on your shop floor, such as CAD drawings, they should be marked as CUI. As explained by ISOO, the CUI Executive Agent, CUI can be marked in various ways.
Managing CUI in Your Machine Shop Floor
Data classification is critical in managing CUI on your shop floor and remaining compliant with the applicable guidelines, laws, regulations, and government-wide policies, especially NIST 800-171 and CMMC. However, the classification can be a tedious and time-consuming process unless automated. Fortunately, there are various tools that you can use for CUI classification, with Titus and Azure Information Protection being the most popular. In addition, there are sensible things that you can undertake to manage CUI properly. Remember that proper management of CUI is the only way of ensuring NIST and CMMC compliance. Below are some of the measures that you can take:Don’t Print Things
CAD models, drawings, customer purchase orders, BOMs, job travelers, and other documents are considered CUI. When printed documents are floating all around your shop floor, the CUI boundary and the complexity of the compliance practices dramatically increase. With the technological advancements today, there isn’t any reason to have so many printed documents lying around your shop floor.Centralize Where Electronic Files Containing CUI are Stored
Do you save CUI on individual personal computers, on insecure cloud storage such as Google Drive and Dropbox, or on any other non-secure area? You should stop that. This considerably increases the CUI boundary, making it difficult to manage it effectively. Instead, you should store the files in a minimum number of locations, and they can be authenticated and secured properly.Implement Least Privilege Access On CUI
A CNC inspector or programmer should look at the CAD drawings, but a cleaner or janitor doesn’t. Similarly, a project manager should be able to see the customer purchase order, but a machinist doesn’t. Hence, you should institute controls to limit the individuals or groups to only view what’s relevant for their job. This ensures that you comply with Section 3.1.5 of the NIST SP 800-171.Separating Employee Duties
The other measure you should take towards CUI management is to separate the duties of various employees working on your shop floor. This ensures that no employees potentially abuse the authorized privileges, helping reduce the risk of malevolent activity. In separating duties, you should divide the mission functions, production functions, support services, and other activities that happen inside your machine shop. The processes should also be subdivided into subprocesses to ensure that you can properly implement the principle of least privilege access explained above.Ensure Non-Privileged Users Don’t Execute Privileged Functions
Even on your machine floor, privileged workers should only perform some functionalities. For instance, only authorized and privileged employees should be able to establish system accounts, conduct system integrity checks, administer cryptographic key management, or even patch security vulnerabilities on systems holding CUI. However, non-privileged users might circumvent various protection measures, unintentionally or intentionally, posing a high-security risk. Therefore, to ensure that you can trace unauthorized or unprivileged access to controlled environments or systems on your shop floor, it is recommended that you implement logging. This will help you deal with both advanced persistent and insider threats.Physical Access Control
It is only sensible that your shop floor should have various physical access devices, from locks to fingerprint scanners. They are essential in creating a controlled environment. Hence, to ensure that CUI is effectively protected, you should manage and control these physical access devices such as card leaders, locks, biometric scanners, etc. Further, you should periodically inspect the logs to ensure any unauthorized access is noted and reported. Additionally, all visitors to the shop floor should be escorted at all times. Their activities should also be monitored to ensure that they don’t access, overhear, or observe CUI if they don’t have any lawful government purpose.Protect the Machine Shop Systems After Personnel Actions Such as Transfers or Terminations
Protecting the controlled unclassified information after and during personnel actions includes returning the property belonging to the shop and conducting exit interviews. The shop system property includes identification cards, hardware authentication tokens, building passes, admin technical manuals, and even physical keys. Employees who are terminated or transferred to another office should return all these items. During the exit interviews, you should remind the terminated employees of non-disclosure agreements (NDAs) and ensure they understand the constraints of being a former employee. Further, you should ensure that any configurations they had made on machine shop systems are cleared and their access permissions revoked.Remove Any CUI on Machine or Equipment Being Taken Offsite for Maintenance
Does any machine or information system need to be taken offsite for maintenance? First, you should ensure that ANY existing CUI is removed. The guidance on media sanitization for machines or information systems can be found on NIST SP 800-88. This includes any system maintenance conducted by non-local entities such as in-contract, in-house or warranty maintenance agreements. You can do many things to manage CUI on your shop floor, provided you remain compliant with NIST SP 800-171, CMMC, and DFARS 7012 on incident reporting. The last thing you want is to be fined because a particular terminated employee can remotely access the machine shop systems or left with some documents containing CUI. READ MORE: Learn how a Federal Contractor leveraged Microsoft AIP to secure Controlled Unclassified InformationManaging Shared Computer Logins or Accounts
Use of shared accounts is common in most shop floors. Privileged users, administrators, employees, applications, and services use shared accounts to access the information they need to complete an activity. But, what if an employee who doesn’t have a legitimate government purpose within the shop floor accesses the information through a shared account? Doesn’t this constitute a CUI compliance violation? It does. This underscores the inherent risks of using the same computers and account credentials to authenticate multiple users. Sharing computer logins presents considerable compliance and security risks from accidental, intentional, or indirect misuse of shared privileges. Therefore, proper management controls must be instituted. Regardless of how savvy your IT team is, it will still experience the following complexities when managing shared accounts:- Reporting and auditing privileged access are time-consuming and complex. This is because it is impossible or difficult to attribute any session activity in the shared account to a single entity.
- Hardcoded and embedded passwords are prone to misuse by external or internal attacks on the network.
- Static passwords can leave your machine shop easily, while manual password rotation is often unreliable.
- A2A (Application-to-application) and A2DB (application-to-database) passwords are, in most cases, left out of the management strategy.
