Code of Federal Regulations (Last Updated: October 10, 2024) |
Title 48 - Federal Acquisition Regulations System |
Chapter 3 - Health and Human Services |
SubChapter H - Clauses and Forms |
Part 352 - SOLICITATION PROVISIONS AND CONTRACT CLAUSES |
Subpart 352.2 - Texts of Provisions and Clauses |
§ 352.239-70 - Standard for security configurations.
-
As prescribed in 339.101(d)(1), the Contracting Officer shall insert the following clause:
Standard for Security Configurations (January 2010)
(a) The Contractor shall configure its computers that contain HHS data with the applicable Federal Desktop Core Configuration (FDCC) (see http://nvd.nist.gov/fdcc/index.cfm) and ensure that its computers have and maintain the latest operating system patch level and anti-virus software level.
Note: FDCC is applicable to all computing systems using Windows XPTM and Windows VistaTM, including desktops and laptops—regardless of function—but not including servers.
(b) The Contractor shall apply approved security configurations to information technology (IT) that is used to process information on behalf of HHS. The following security configuration requirements apply:
Note: The Contracting Officer shall specify applicable security configuration requirements in solicitations and contracts based on information provided by the Project Officer, who shall consult with the OPDIV/STAFFDIV Chief Information Security Officer.
(c) The Contractor shall ensure IT applications operated on behalf of HHS are fully functional and operate correctly on systems configured in accordance with the above configuration requirements. The Contractor shall use Security Content Automation Protocol (SCAP)-validated tools with FDCC Scanner capability to ensure its products operate correctly with FDCC configurations and do not alter FDCC settings—see http://nvd.nist.gov/validation.cfm. The Contractor shall test applicable product versions with all relevant and current updates and patches installed. The Contractor shall ensure currently supported versions of information technology products meet the latest FDCC major version and subsequent major versions.
(d) The Contractor shall ensure IT applications designed for end users run in the standard user context without requiring elevated administrative privileges.
(e) The Contractor shall ensure hardware and software installation, operation, maintenance, update, and patching will not alter the configuration settings or requirements specified above.
(f) The Contractor shall (1) include Federal Information Processing Standard (FIPS) 201-compliant (see http://csrc.nist.gov/publications/fips/fips201-1/FIPS-201-1-chng1.pdf), Homeland Security Presidential Directive 12 (HSPD-12) card readers with the purchase of servers, desktops, and laptops; and (2) comply with FAR Subpart 4.13, Personal Identity Verification.
(g) The Contractor shall ensure that its subcontractors (at all tiers) which perform work under this contract comply with the requirements contained in this clause.
(End of clause)
[74 FR 62398, Nov. 27, 2009, as amended at 75 FR 21511, Apr. 26, 2010]