Loading...
CUI
CUI

National Cybersecurity Strategy

On March 2, the Biden-Harris Administration released the National Cybersecurity Strategy. To learn more, visit the White House Fact Sheet.

Defense Industrial Base (DIB)
Cybersecurity Portal

  • Cyber Incident Reporting
  • FAQ
  • Policy and Resources
  • DC3
  • DIB CS Program
  • Weekly Cyber Threat Roundup
  • Contact Us

back-arrow

Click to Apply to the DIB CS Program
Send Email to DC3 DCISE
Download DIB CS Program Factsheet
Download Cyber Threat Roundup PDF
Visit DC3 DCISE Resources Page
Download DC3 Fact Sheet PDF
Download DCISE Fact Sheet PDF
Download DCISE partner brochure PDF
NSA Home Network Best Practices

forward-arrow

slider-dots

Submit Malware
FAQ and Factsheets
Policy and Resources
DoD Cyber Crime Center (DC3)
Obtain a Medium Assurance Certificate

faq anchor

Frequently Asked Questions (FAQ)

faq-1 anchor

This means that the primary contractor would like you to join the DIB CS Program, which is a voluntary public-private cybersecurity partnership in which Program participants share cyber threat information, mitigation, and remediation strategies. In order to learn more about the requirements to join the DIB CS Program click here.

If the primary contractor simply has a contract requirement to rapidly report cyber incidents, you can learn more about Reporting Cyber Incidents here.

faq-2 anchor

A DoD-approved Medium Assurance Certificate is required to access these capabilities. To learn more about Medium Assurance Certificates, and to obtain one, please visit http://public.cyber.mil/eca. You can also read more below.

If you do not yet have a DoD-approved Medium Assurance Certificate, please email the DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE) DC3.DCISE@us.af.mil or call the DCISE hotline at (410) 981-0104 for further assistance.

Please DO NOT send any malicious files to the email address.

faq-3 anchor

The DoD has established the External Certification Authority (ECA) Program to support the issuance of DoD-approved identification certificates to industry partners and other external entities and organizations. DFARS 252.204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting requires contractors and subcontracts to obtain a DoD-Approved Medium Assurance Certificate in order to report cyber incidents. The ECA Program is designed to provide the mechanism for these entities to securely communicate with the DoD and authenticate to DoD Information Systems. To learn more about Medium Assurance Certificates and to obtain one, please visit http://public.cyber.mil/eca.

faq-4 anchor

You can complete an Incident Collection Format (ICF) by using https://icf.dib.mil or by calling the DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE) hotline at (410) 981-0104.

faq-5 anchor

The DCISE hotline (410) 981-0104 operates 24/7. Normal, in-office operating hours for DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE) are from 6:00 a.m. to 6:00 p.m. ET.

faq-6 anchor

Mandatory incident reporting under DFARS 252.204-7012 Safeguarding Covered Defense Information (CDI) and Cyber Incident Reporting is required by most DoD contracts and in subcontracts that involve CDI and/or operationally critical support programs involving CDI. Contractors must report the discovery of cyber incidents that affect CDI information systems, or the CDI information residing therein, to https://dibnet.dod.mil within 72 hours of discovery. Malicious software, affected system images, packet capture, and other data relevant to the reported cyber incident must be preserved for 90 days to allow time for DoD to request the data in order to conduct a damage assessment or decline interest.

DFARS 252.204-7012 defines CDI as:

Any unclassified controlled technical information (CTI) OR other information, as described in the Controlled Unclassified Information (CUI) Registry at http://www.archives.gov/cui/registry/category-list.html, that requires safeguarding or dissemination controls pursuant to and consistent with law, regulations, and Government-wide policies, and is:

  1. Marked or otherwise identified in the contract, task order, or delivery order and provided to the contractor by or on behalf of DoD in support of the performance of the contract; or
  2. Collected, developed, received, transmitted, used, or stored by or on behalf of the contractor in support of the performance of the contract.

Voluntary reporting is the primary channel for DIB Participants to share cyber threat information and indicators of compromise (IoCs) that may help the cybersecurity posture of other DIB Participants. Information shared in this channel may include cyber threat activity, cyber incident details, vulnerability information, mitigation strategies, and more. Cyber threat activity recommended to be submitted as a voluntary report includes but is not limited to:

  • Suspected Advance Persistent Threat (APT) activity
  • Compromise not impacting DoD information
  • Targeted activity
  • Vulnerability scanning and exploitation attempts
  • Phishing email messages
  • Suspicious files, activity, or network traffic

For more information, please click here.

faq-7 anchor

No. The DIB CS Program is a voluntary information sharing initiative between private industry cleared defense contractors and the U.S. Government. All that is needed to report a cyber incident is possession of a DoD-approved Medium Assurance Certificate. To learn more about Medium Assurance Certificates, and to obtain one, please click here. To learn more about reporting a cyber incident, click here.

faq-8 anchor

No. DFARS 252.204-7012 requires the impacted company to submit a report on the specific cyber incident. Additionally, if a sub-contractor experiences a reportable cyber incident, the sub-contractor is required to provide the incident report number, automatically assigned by DoD, to the prime Contractor (or next higher-tier subcontractor) as soon as possible.

faq-10 anchor

A self-assessment that allows you to get a baseline of your cybersecurity resiliency is a valuable opportunity. The CRA will allow you to see where there are areas to improve and where you are already doing well. The practice areas and security domains in the CRA also map to the NIST 800-171 requirements for protection of CUI and the NIST Cybersecurity Framework.

faq-11 anchor

We recommend maintaining your relationships with other agencies that you share information with and maintain any other contractual requirements you may have to share with other agencies. On the Incident Collection Format (ICF), there is also an area to let us know who else you've shared the information with. Per the DFARS 252.204-7012 clause, you do need to report any incidents involving Controlled Unclassified Information (CUI) to DCISE via the Mandatory Report ICF.

faq-12 anchor

The U.S Government and law enforcement agencies have access to mandatory reporting. When it comes to the DIB CS Program however, voluntary reporting can only be shared with law enforcement with consent from the Partner.

Don't see what you need? Contact the DIB CS Program office at: OSD.DIBCSIA@mail.mil

reporting anchor

Cyber Incident Reporting

reporting-1 anchor

A DoD-Approved Medium Assurance Certificate is required to report a cyber incident. However, if you do not yet have a DoD-approved Medium Assurance Certificate, please email DC3.DCISE@us.af.mil or call the DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE) hotline at (410) 981-0104 for further assistance.

reporting-2 anchor

DoD contractors shall report as much of the following information as can be obtained to DoD within 72 hours of discovery of any cyber incident involving covered defense information (CDI) systems or CDI information contained therein. Also, if any additional information is obtained after the initial Incident Collection Format (ICF) is submitted, you can select the initial ICF in your submission history and report any new or updated information via a follow-on ICF.

  1. Company name
  2. Data Universal Numbering System (DUNS) Number
  3. Facility CAGE code
  4. Facility Clearance Level (Unclassified, Confidential, Secret, Top Secret, Not Applicable)
  5. Company point of contact information (name, position, telephone, email)
  6. U.S. Government Program Manager point of contact (name, position, telephone, email)
  7. Contract number(s) or other type of agreement affected or potentially affected
  8. Contracting Officer or other type of agreement point of contact (address, position, telephone, email)
  9. Contract or other type of agreement clearance level (Unclassified, Confidential, Secret, Top Secret, Not Applicable)
  10. Impact to Covered Defense Information
  11. Ability to provide operationally critical support
  12. Date incident discovered
  13. Location(s) of compromise
  14. Incident location CAGE code
  15. DoD programs, platforms or systems involved
  16. Type of compromise (unauthorized access, unauthorized release (includes inadvertent release), unknown, not applicable)
  17. Description of technique or method used in cyber incident
  18. Incident outcome (successful compromise, failed attempt, unknown)
  19. Incident/Compromise narrative (Ex: Chronological explanation of event/incident, threat actor TTPs, indicators of compromise, targeting, mitigation strategies, and any other relevant information to assist in understanding what occurred)
  20. Any additional information

See DFARS 252.204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting for more information.

reporting-3 anchor

DoD Contractors shall report as much of the following information as can be obtained to the DoD within one business day of identifying or being notified by a subcontractor that a covered article was provided to the Government during contract performance.

  1. Contract Number
  2. Order Number(s), if applicable
  3. Supplier Name
  4. Brand
  5. Model Number (Original Equipment Manufacturer (OEM) number, manufacturer part number, or wholesaler number)
  6. Item Description
  7. Any readily available information about mitigation actions undertaken or recommended

See FAR 52.204-23 Prohibition on Contracting for Hardware, Software, and Services Developed or Provided by Kaspersky Lab and Other Covered Entities for more information.

See FAR 52.204-25 Prohibition on Contracting for Certain Telecommunications and Video Surveillance Services or Equipment for more information.

reporting-4 anchor

  1. Contract information to include contract number, USG Contracting Officer(s) contact information, contract clearance level, etc.
  2. Contact information for the impacted and reporting organizations as well as the MCND
  3. Details describing any vulnerabilities involved (e.g., Common Vulnerabilities and Exposures (CVE) identifiers)
  4. Date/Time of occurrence, including time zone
  5. Date/Time of detection and identification, including time zone
  6. Related indicators (e.g., hostnames, domain names, network traffic characteristics, registry keys, X.509 certificates, MD5 file signatures)
  7. Threat vectors, if known (see Threat Vector Taxonomy and Cause Analysis flowchart within the US-CERT Federal Incident Notification Guidelines)
  8. Prioritization factors (e.g., functional impact, information impact, and recoverability as defined flowchart within the US-CERT Federal Incident Notification Guidelines)
  9. Source and Destination Internet Protocol (IP) address, port, and protocol
  10. Operating System(s) affected
  11. Mitigating factors (e.g., full disk encryption or two-factor authentication)
  12. Mitigation actions taken, if applicable
  13. System Function(s) (e.g., web server, domain controller, or workstation)
  14. Physical system location(s) (e.g., Washington DC, Los Angeles, CA)
  15. Sources, methods, or tools used to identify the incident (e.g., Intrusion Detection System or audit log analysis)
  16. Any additional information relevant to the incident and not included above

See DFARS 252.239-7010 Cloud Computing Services for more information.

reporting-5 anchor

DIB participants are encouraged to VOLUNTARILY report information to promote sharing of cyber threat information and indicators that they believe are valuable in alerting the U.S. Government and others, as appropriate in order to better counter threat actor activity. Cyber activity other than compromises of covered defense information (CDI) or do not adversely affect the contractor’s ability to perform operationally critical support may be of interest to the DIB and DoD for situational awareness purposes. Cyber threat activity recommended to be submitted as a voluntary report includes but is not limited to:

  • Suspected APT activity
  • Reconnaissance activities such as vulnerability scanning, exploitation attempts, etc.
  • Threat actor infrastructure
  • Network compromises NOT impacting DoD information
  • Phishing email messages
  • Suspicious files, activity, or network traffic

reporting-6 anchor

DFARS 252.204-7012 requires contractors to isolate and submit malicious files, if available, to DoD Cyber Crime Center (DC3) as part of the mandatory reporting requirements for cyber incidents. If you have a PKI certificate, you can get an Electronic Malware Submission (EMS) portal account where you will be able to submit malicious files and download the associated report once complete. Submit malicious files to EMS at https://ems.dc3on.gov. You may also request a DoD Safe link drop via emailing DC3.DCISE@us.af.mil and including your ICF number in the subject line, or by calling (410) 981-0104. DO NOT email malicious files to this email address.

Don't see what you need? Contact DC3 at: DC3.DCISE@us.af.mil

dc3 anchor

Department of Defense Cyber Crime Center (DC3)

dc3-1 anchor

The DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE), through the DoD Defense Cyber Crime Center (DC3), serves as the operational focal point for the DIB Cybersecurity Program under 32 Code of Federal Regulations, Part 236. DCISE fosters a cyber threat information sharing partnership with DIB participants by performing cyber analysis, offering mitigation and remediation strategies, providing best practices, and conducting analyst-to-analyst exchanges with DIB participants. Learn more at: https://www.dc3.mil/

Contact the DoD Cyber Crime Center (DC3): DC3.DCISE@us.af.mil, Hotline: (410) 981-0104, or Toll Free: (877) 838-2174

dc3-2 anchor

Weekly Cyber Threat Roundup

The Cyber Threat Roundup is a weekly collection of recent open-source articles of interest for the Defense Industrial Base. For the latest edition of the Cyber Threat Roundup, please click here (PDF).

DCISE Slick Sheets

  • DC3/DCISE Fact Sheet (PDF)
  • DCISE Partner Brochure (PDF)
  • DC3 DIB Collaboration (PDF)
  • External Certification Authorities (ECA) Certificate Instructions (PDF)

Analytics

  • DIB-Reported Cyber Threats
  • DIB-Reported Cyber Threats Q3 (PDF)
  • DIB-Reported Cyber Threats Q2 (PDF)
  • DIB-Reported Cyber Threats Q1 (PDF)

eXpanded Offerings and Projects (XOP)

  • Cyber Resilience Analysis Slick Sheet (PDF)
  • DCISE3 (DCISE Cubed) Service Slick Sheet (PDF)

Other Resources

  • Report a Cyber Incident: https://icf.dib.mil/
  • Report Malware: https://ems.dc3on.gov/
  • Customer Portal: https://customerportal.dc3.mil/

dc3-5 anchor

  • Clearance Jobs: Cyber Information Sharing & Cyber Crime in the DIB (YouTube)
  • DIB Tech Talk: Meet DoD DC3 DCISE (YouTube)
  • DIB Tech Talk: In-Depth Look at DoD Defense Industrial Base Cybersecurity Program (YouTube)
Don't see what you need? Contact DC3 at: DC3.DCISE@us.af.mil

dibcsprogram anchor

Defense Industrial Base Cybersecurity Program

dibcsprogram-1 anchor

DoD established the Defense Industrial Base (DIB) Cybersecurity (CS) Program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on or transits DIB unclassified networks or information systems. This public-private cybersecurity partnership is designed to improve DIB network defenses, reduce damage to critical programs, and increase DoD and DIB cyber situational awareness. Under the DIB CS Program, DoD and DIB participants share unclassified and classified cyber threat information.

DIB CS Program Fact Sheet (.pdf)

See 32 Code of Federal Regulations (CFR) Part 236, DoD's DIB Cybersecurity Activities for more information.

Learn more about the DoD's DIB Cybersecurity efforts here

Contact the DIB Cybersecurity Program: OSD.DIBCSIA@mail.mil, Hotline: (703) 604-3167, or Toll Free: (855) DoD-IACS

dibcsprogram-2 anchor

  • Actionable information, mitigation, and remediation strategies
  • Increases industry understanding of cyber threats as well as USG's role
  • Enables Partners to better protect unclassified defense information
  • Engagement opportunities at many levels between USG and DIB from the C-suite to analyst level
  • Indicators and threat products informed from DIB reporting, multiple USG data streams, and industry cyber threat reports
  • Collaborative partnership with USG and almost 1,000 DIB Partners
  • Quarterly Program Working Groups, including Policy and Operations and Technology and Architecture, and bi-annual Technical Exchanges
  • Virtual Industry Partner Exchanges (VIPEX)
  • Regional Partner Exchanges (RPEX)
  • Sub-Working Groups for Small Business, Cloud, and Cyber Best Practices
  • One-on-One Meetings for Analyst to Analyst (A2A) and Business to Business (B2B)
  • Malware analysis and Cyber Resilience Analysis (CRA)
  • DCISE3 - A Free Advanced Threat Protection service to receive consolidated visibility into network traffic with cutting-edge threat intelligence integration. DCISE3 provides simple, timely, and fully automated approach to anonymous sharing and analysis of threat indicators.
  • DIB-VDP - Leverages crowd-sourced white hat vulnerability researchers to identify vulnerabilities in DIB company internet-facing information systems that may otherwise have gone unnoticed and unmitigated.

dibcsprogram-3 anchor

Cleared DoD contractors may submit an application by clicking here. Access to DoD's DIB Cybersecurity Program application requires a DoD-approved medium assurance certificate. For information on obtaining a DoD-approved medium assurance certificate, please visit http://public.cyber.mil/eca. Also note that the online application process will only permit one application account per company. The company applicant must be a U.S. citizen and authorized to act on behalf of the company during the application process.

To be eligible to participate in this Program DoD contractors must be a cleared defense contractor (CDC) and shall:

  • Have an existing Facility Clearance (FCL) granted under NISPOM (DoD 5220.22-M)
  • Execute the standardized Framework Agreement (FA) with the Government

dibcsprogram-4 anchor

The DIB CS Program Framework Agreement has several Amendments available to qualifying participating companies. Learn more about the Subsidiary Amendment, International Business Unit Amendment, Third-Party Service Provider Amendment, and the Supply Chain Amendment in the Amendment Fact Sheet (PDF).

The Manufacturing Overlay was created to help secure information systems supporting manufacturing processes and was developed through a partnership with cybersecurity experts from the Defense Industrial Base (DIB) Cybersecurity (CS) Program and USG. The Manufacturing Overlay is intended to complement (and further refine) existing security control baselines; further tailoring of controls may be required for systems with additional security or operational considerations.

  • Manufacturing Overlay (PDF)

The DIB Guide to Implementing the Cybersecurity Framework supports DoD's critical infrastructure responsibilities for the DIB. This Guide was developed working with our private sector partners to implement the Framework, while also incorporating the security requirements of NIST SP 800-171.

  • DIB Guide to Implementing the Cybersecurity Framework (PDF)
  • DIB Guide Template for Implementing Cybersecurity Framework (XLSX)
Don't see what you need? Contact the DIB CS Program office at: OSD.DIBCSIA@mail.mil

resources anchor

Policy and Resources

resources-1 anchor

32 Code of Federal Regulations, Part 236: "Department of Defense (DoD) Defense Industrial Base (DIB) Cyber Security (CS) Activities"

DFARS 252.204-7012: "Safeguarding Covered Defense Information and Cyber Incident Reporting"

DFARS 252.239-7010: "Cloud Computing Services"

FAR 52.204-23: "Prohibition on Contracting for Hardware, Software, and Services Developed or Provided by Kaspersky Lab and Other Covered Entities"

FAR 52.204-25: "Prohibition on Contracting for Certain Telecommunications and Video Surveillance Services or Equipment"

Don't see what you need? Contact the DIB CS Program office at: OSD.DIBCSIA@mail.mil

contactus anchor

Contact Us
  • Report a Cyber Incident

    Need Assistance?

    Contact DoD Cyber Crime Center (DC3)
    DC3.DCISE@us.af.mil
    Hotline: (410) 981-0104
    Toll Free: (877) 838-2174
  • DOD DIB Cybersecurity (CS) Program

    Need Assistance?

    Contact the DIB CS Program Office
    OSD.DIBCSIA@mail.mil
    Hotline: (703) 604-3167
    Toll Free: (855) DoD-IACS
    Fax: (571) 372-5434

Organizations

  • Department of Defense
  • DoD Chief Information Officer
  • DoD Cyber Crime Center

Regulations

  • External Links Disclaimer
  • Privacy Policy
  • Accessibility/Section 508
  • FOIA
  • Public Use

Social

  • DoD CIO on Twitter
  • DoD CIO on LinkedIn
  • DC3 on Twitter
  • DC3 on LinkedIn

Contact

  • DIB CS Program Office
  • DoD Cyber Crime Center (DC3)

Partnerships

  • CISA
  • DCSA
  • NDISAC
  • NSA

DIBNet

CUI
CUI