{"id":5069,"date":"2017-12-14T08:32:10","date_gmt":"2017-12-14T16:32:10","guid":{"rendered":"https:\/\/origin-www.parsons.com\/?page_id=5069"},"modified":"2023-05-23T15:17:28","modified_gmt":"2023-05-23T19:17:28","slug":"cybersecurity-requirements","status":"publish","type":"page","link":"https:\/\/www.parsons.com\/suppliers\/cybersecurity-requirements\/","title":{"rendered":"Cybersecurity Risk Affects Everyone"},"content":{"rendered":"\n

New legal, regulatory, and contractual requirements address the safeguarding of sensitive information on covered contractor information systems and the management of cybersecurity controls for its physical and logical access protection. Information system assets include software, hardware \u2013 endpoints. Mobile devices, & servers, and networks that store, process, generate, or transmit sensitive information.<\/p>\n\n\n\n

Supply-chain cybersecurity requirements were designed to manage the risks related to the supply chain of system or service providers \u2013 including contracts for commercial items \u2013 who must safeguard sensitive information types including but not limited to unclassified federal contract information (FCI), covered defense information (CDI), controlled technical information (CTI), export control information, personally identifiable information (PII), proprietary information, and controlled unclassified information (CUI). At Parsons, we believe that security is a shared responsibility and we are partners with our suppliers in safeguarding all types of controlled and sensitive information.<\/p>\n\n\n\n

Regulatory Compliance Resources<\/h3>\n\n\n\n

Below are references to U.S. Government and Department of Defense regulations flowing down from contracts to our suppliers and industry resources on how to improve the security posture of your organization.<\/p>\n\n\n\n