Department of Defense Issues New Cyber Incident Reporting and Cloud Computing Requirements for Contractors
Time 2 Minute Read

On August 26, 2015, the U.S. Department of Defense (“DoD”) published an interim rule entitled Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services (DFARS Case 2013–D018) (the “Interim Rule”), that streamlines the obligations for contractors to report network penetrations and establishes DoD requirements for contracting with cloud computing service providers. The Interim Rule amends the information security contracting framework set forth in the Defense Federal Acquisition Regulation Supplement (“DFARS”) to implement section 941 of the National Defense Authorization Act (“NDAA”) for Fiscal Year (“FY”) 2013 and section 1632 of the NDAA for FY 2015, both of which impose cyber incident reporting obligations on contractors.

The Interim Rule requires DoD contractors and subcontractors to report cyber incidents that result in a compromise or have an actual or potentially adverse effect on a covered contractor information system or the covered defense information residing therein. Covered defense information includes controlled technical information, export controlled information, critical information and other information requiring protection by law, regulation or government-wide policy. Pursuant to the Interim Rule, contractors and subcontractors will be contractually obligated to report such cyber incidents to the DoD within 72 hours of discovery.

The Interim Rule also revises DFARS to implement policies and procedures for the acquisition of cloud computing services. Among the cloud computing policies and procedures added to DFARS, the Interim Rule requires that cloud computing service providers be contractually obligated to maintain all government data that is not physically located on DoD premises within the U.S. or outlying areas, unless otherwise authorized in writing by the contracting officer.

In addition, the Interim Rule revises the DFARS solicitation provisions and contract clauses related to safeguarding covered defense information. Notably, the Interim Rule replaces the table of security controls based on the National Institute of Standards and Technology (“NIST”) Special Publication (“SP”) 800–53 in DoD solicitations and contracts with NIST SP 800–171, entitled Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. This document is specifically tailored for use in protecting sensitive information residing in contractor information systems.

You May Also Be Interested In

Time 4 Minute Read

On January 27, 2026, the Centre for Information Policy Leadership hosted a fireside chat with California Privacy Protection Agency General Counsel Phil Laird in honor of Data Privacy Day.

Time 2 Minute Read

On January 8, 2026, the California Privacy Protection Agency announced enforcement activity against Rickenbacher Data LLC d/b/a Datamasters and S&P Global Inc. for failing to register as data brokers in California.

Time 2 Minute Read

On December 17, 2025, the California Privacy Protection Agency announced the release of its Enforcement Advisory No. 2025-01, reminding data brokers of their obligations under California’s Delete Act.

Time 2 Minute Read

On December 16, 2025, the Federal Trade Commission announced an enforcement action against Illusory Systems Inc., a Utah-based company doing business as Nomad, following a major data breach in which hackers stole $186 million from consumers.

Search

Subscribe Arrow

Recent Posts

Categories

Tags

Archives

Jump to Page