Federal Cybersecurity Compliance for Federal Contractors: A Northern Virginia Attorney’s Guide to CMMC, NIST 800-171, DFARS 252.204-7012, and FedRAMP
By Anthony I. Shin, Esq., Shin Law Office
BOTTOM LINE UP FRONT
Federal cybersecurity compliance now sits at the center of the federal contracting field. Defense and civilian agency contractors that handle Controlled Unclassified Information are required to implement the 110 security controls in NIST Special Publication 800-171, comply with DFARS 252.204-7012’s safeguarding and incident reporting obligations, and (for the defense industrial base) move toward CMMC 2.0 certification. Cloud service providers serving federal customers must hold FedRAMP authorization. False certifications of compliance with any of these frameworks are now actionable under the False Claims Act through the DOJ Civil Cyber-Fraud Initiative, which has produced settlements at Aerojet Rocketdyne, Verizon, Penn State, Georgia Tech, and a growing list of others. The cost of getting compliance wrong has changed.
I am Anthony Shin and I represent federal contractors and federal contractor employees on cybersecurity compliance, disputes, and whistleblower matters in Virginia, Maryland, and DC. Call 571-445-6565 or use my contact page to Schedule a Consultation. The first call is protected by attorney-client privilege.
Table of Contents
- The Federal Cybersecurity Compliance Picture
- NIST SP 800-171: The Foundational Control Set
- DFARS 252.204-7012: The Safeguarding and Reporting Clause
- CMMC 2.0: Assessment and Certification
- FedRAMP: Cloud Authorization
- CUI and Why Information Categories Drive Compliance
- False Cybersecurity Certifications and FCA Exposure
- Incident Reporting, Breach Disclosure, and the 72-Hour DFARS Clock
- Compliance Disputes, Contract Terminations, and Remediation
- How Shin Law Office Helps Contractors and Contractor Employees
1. The Federal Cybersecurity Compliance Picture
Cybersecurity compliance for federal contractors used to be a checklist matter. A company implemented some controls, signed a self-attestation, and moved on. That world is gone. Today, cybersecurity is one of the most heavily enforced areas of federal contracting law, with five major frameworks operating in parallel and a fast-growing False Claims Act enforcement docket that turns false compliance statements into seven-figure and eight-figure liability.
The five frameworks that matter most for federal contractors in Virginia, Maryland, and DC are: (1) NIST Special Publication 800-171, the foundational set of 110 security controls for protecting Controlled Unclassified Information on contractor systems; (2) DFARS 252.204-7012, the Department of Defense’s contract clause that requires implementation of NIST 800-171 and imposes a 72-hour incident reporting obligation; (3) CMMC 2.0, the new Cybersecurity Maturity Model Certification regime that requires third-party assessment or government-led assessment for many DOD contractors at higher compliance levels; (4) FedRAMP, the Federal Risk and Authorization Management Program that authorizes cloud service providers to handle federal data; and (5) the DOJ Civil Cyber-Fraud Initiative, launched in October 2021, which uses the False Claims Act to pursue contractors that knowingly misrepresent their cybersecurity compliance.
These frameworks interact. A defense contractor handling CUI has to implement 800-171 controls, certify compliance under DFARS 7012, prepare for CMMC 2.0 assessment, use FedRAMP-authorized cloud services where applicable, and report incidents within 72 hours. A civilian agency contractor handling CUI faces similar but not identical requirements through FAR clause 52.204-21 and agency-specific addenda. A cloud service provider supporting federal customers needs FedRAMP authorization at the appropriate impact level (Low, Moderate, High, or DOD IL4 / IL5 / IL6). Subcontractors at any tier must comply with the same standards as the prime when handling covered information. The flow-down obligations have real teeth.
The enforcement risk has changed the practical calculus. Before October 2021, false cybersecurity certifications were primarily a compliance matter resolved through contract administration and corrective action. Since the DOJ Civil Cyber-Fraud Initiative launched, false cybersecurity certifications have produced FCA settlements including Aerojet Rocketdyne ($9 million in 2022), Comprehensive Health Services ($930,000 in 2022), Verizon ($4.1 million in 2023), Penn State University ($1.25 million in 2024), and Georgia Tech ($875,000 in 2024). The enforcement docket is still ramping up. Whistleblower-driven qui tam cases under Section 3730 are the dominant case generation engine, with relators sharing 15 to 30 percent of recoveries plus fees.
For federal contractors, the practical question is no longer whether to take compliance seriously but how to implement it correctly, document it accurately, and avoid the false-statement traps that produce both contract termination exposure and FCA exposure. For federal contractor employees who see compliance gaps that their employers are concealing, the practical question is what protections and remedies federal whistleblower statutes provide. This guide walks through each framework, the FCA exposure that now overlays them, the incident reporting obligations, the litigation patterns, and the practice approach Shin Law Office takes with both contractors and contractor employees.
2. NIST SP 800-171: The Foundational Control Set
NIST Special Publication 800-171, currently published as Revision 3 (May 2024), is the foundational control set for protecting Controlled Unclassified Information on nonfederal systems and organizations. It contains 110 security requirements (down from 110 in Rev 2 with various reorganizations) organized into 14 control families: Access Control; Awareness and Training; Audit and Accountability; Configuration Management; Identification and Authentication; Incident Response; Maintenance; Media Protection; Personnel Security; Physical Protection; Risk Assessment; Security Assessment; System and Communications Protection; and System and Information Integrity. Every federal contractor system that processes, stores, or transmits CUI is required to implement these controls or to document and accept the risk of partial implementation.
Documentation requirements
Implementation of 800-171 requires two key documents. A System Security Plan (SSP) describes how the contractor’s information system meets each of the 110 requirements. A Plan of Action and Milestones (POA&M) documents controls that are not fully implemented, the planned remediation activities, and the milestones for full implementation. Both documents are subject to government review and to discovery in FCA litigation. Inconsistencies between the SSP and actual practice are one of the most common evidentiary patterns in cyber-fraud cases.
Self-assessment scoring
Defense contractors that handle CUI are required to submit a self-assessment score to the DOD’s Supplier Performance Risk System (SPRS) under DFARS 252.204-7019 and 7020. The scoring methodology assigns a maximum score of 110 (one point per requirement) with deductions for unimplemented requirements weighted by the security significance of each control. A score below 110 indicates partial implementation and triggers POA&M obligations. A score significantly below 110 raises material questions about whether the contractor should be performing CUI-handling work at all. False or inflated SPRS scores are a recurring fact pattern in cyber-fraud cases.
Civilian agency implementation
Civilian agency contractors handling CUI implement 800-171 through FAR 52.204-21 (Basic Safeguarding) and agency-specific clauses that extend coverage. HHS, NASA, DOE, GSA, and other agencies have implemented their own NIST 800-171 application clauses. The substantive requirements track the DOD framework, but the procedural mechanics differ.
3. DFARS 252.204-7012: The Safeguarding and Reporting Clause
DFARS 252.204-7012, titled “Safeguarding Covered Defense Information and Cyber Incident Reporting,” is the Department of Defense’s primary cybersecurity contract clause. The clause has been in defense contracts since 2015 and was strengthened in 2017 to require implementation of NIST SP 800-171 controls. It applies to all DOD prime contracts that involve covered defense information and flows down to all subcontractors that handle the same information at any tier.
Safeguarding obligation
Section (b) of the clause requires the contractor to implement “adequate security” on all covered contractor information systems that process, store, or transmit covered defense information. The phrase “adequate security” is defined by reference to NIST SP 800-171. The clause requires implementation of the controls in 800-171 or alternative measures determined to provide equivalent protection.
72-hour incident reporting
Section (c) of the clause requires the contractor to report cyber incidents that affect a covered contractor information system or covered defense information to the DOD within 72 hours of discovery. The reporting is made through the DIBNet portal at dibnet.dod.mil. The contractor must conduct a damage assessment, preserve forensic images of affected systems for at least 90 days, and grant the DOD access for further investigation. The 72-hour clock is one of the strictest cyber reporting deadlines in federal contracting.
Subcontract flow-down
Section (m) of the clause requires the contractor to include the clause without alteration in subcontracts that involve covered defense information. The flow-down is mandatory and tier-blind: a fifth-tier subcontractor handling covered defense information has the same 7012 obligations as the prime. Disputes over flow-down compliance, subcontractor non-performance, and the prime’s responsibility for subcontractor compliance are recurring litigation patterns.
Cloud services
Section (b)(2)(ii)(D) addresses cloud computing services and requires the contractor to use cloud services that meet the DOD Cloud Computing SRG requirements at the appropriate Impact Level (typically IL4 or IL5 for CUI). The intersection of 7012 with FedRAMP is one of the more technically complex areas of federal cybersecurity compliance, particularly when subcontractors or downstream service providers are involved.
4. CMMC 2.0: Assessment and Certification
The Cybersecurity Maturity Model Certification (CMMC) program is the Department of Defense’s response to the persistent gap between NIST 800-171 self-attestation and actual security practice. Where DFARS 7012 has relied on self-assessment, CMMC adds independent verification. CMMC 2.0, the current version, was published as a final rule effective December 16, 2024, and is being incorporated into DOD solicitations in a phased rollout.
Three levels
CMMC 2.0 has three levels. Level 1 (Foundational) requires implementing the 15 basic safeguarding requirements in FAR 52.204-21, with an annual self-assessment. Level 2 (Advanced) requires implementing the 110 controls from NIST SP 800-171, with annual self-assessment for most contracts and a triennial third-party assessment for prioritized contracts handling especially sensitive CUI. Level 3 (Expert) requires the implementation of the 110 controls from 800-171, plus selected controls from NIST SP 800-172 (Enhanced Security Requirements), with a triennial government-led assessment by DCSA’s Defense Industrial Base Cybersecurity Assessment Center (DIBCAC).
Third-party assessment
CMMC Level 2 third-party assessments are conducted by CMMC Third-Party Assessor Organizations (C3PAOs) accredited by the Cyber AB (formerly the CMMC Accreditation Body). Contractors prepare for assessment over a period of typically 6 to 18 months, working with Registered Practitioners (RPs) and Registered Practitioner Organizations (RPOs) to remediate control gaps. The assessment itself produces a pass/fail outcome with no POA&M permitted for many critical controls.
Annual affirmation
Every CMMC-certified contractor is required to submit an annual affirmation of continuing compliance signed by a senior company official. The affirmation is filed in the Supplier Performance Risk System (SPRS) and creates an annual moment of FCA exposure: a false affirmation by a senior official with knowledge of the actual compliance status is a textbook false statement under 31 U.S.C. §3729(a)(1)(B).
Subcontract flow-down
CMMC requirements flow down to subcontractors based on the type of information they handle. A Level 2 prime cannot use a Level 1 subcontractor to handle Level 2 information. Verifying subcontractor certification status, ensuring that work is not assigned to subcontractors lacking appropriate certification, and managing the compliance posture across a complex supply chain are practical challenges that many primes are still working through.
5. FedRAMP: Cloud Authorization
The Federal Risk and Authorization Management Program (FedRAMP) is the standardized federal government approach to authorizing cloud service offerings. FedRAMP was launched in 2011 and is administered by GSA’s FedRAMP Program Management Office in coordination with the Joint Authorization Board (JAB), comprising the CIOs of DOD, DHS, and GSA. For Loudoun County’s data center cluster and the broader DC-area cloud workforce, FedRAMP is the operative compliance regime.
Impact levels
FedRAMP authorizations are granted at three impact levels based on FIPS 199 categorization: Low (limited adverse effect from a security breach), Moderate (serious adverse effect), and High (severe or catastrophic adverse effect). DOD layers on Impact Levels (IL2, IL4, IL5, IL6) that map to the data’s sensitivity and the operational environment. IL5 and IL6 require additional controls beyond FedRAMP High for handling CUI specified and classified information, respectively.
Authorization paths
A cloud service provider can pursue a JAB Provisional Authorization to Operate (P-ATO) granted by the JAB and reusable across agencies, or an Agency ATO granted by an individual agency and (after Continuous Monitoring requirements are met) typically reusable across agencies. Each path involves implementing the FedRAMP baseline controls (drawn from NIST SP 800-53), preparing a System Security Plan, obtaining a Security Assessment Report from a Third-Party Assessment Organization (3PAO), and establishing a continuous monitoring program after authorization.
FCA exposure
False FedRAMP authorization status, misrepresentation of which workloads are running on authorized infrastructure, and unauthorized configuration changes that move authorized workloads outside the assessed boundary are all FCA-actionable patterns. The Verizon $4.1 million settlement in 2023 involved false cybersecurity certifications on managed trusted internet protocol services contracts that touched FedRAMP-relevant compliance frameworks. Cloud cases tend to involve technical configuration evidence that takes time to develop.
6. CUI and Why Information Categories Drive Compliance
Controlled Unclassified Information (CUI) is the information category that drives most federal cybersecurity compliance. Executive Order 13556 established the CUI Program in 2010 to replace the prior patchwork of For Official Use Only (FOUO), Sensitive But Unclassified (SBU), Law Enforcement Sensitive (LES), and dozens of agency-specific markings with a unified framework. The National Archives and Records Administration (NARA) maintains the CUI Registry of authorized categories.
CUI categories
The CUI Registry lists categories including Controlled Technical Information (CTI), Export Controlled, Critical Infrastructure, Defense, Financial, Health, Intelligence, Law Enforcement, Privacy, Procurement and Acquisition, Proprietary Business Information, and many others. Each category has its own dissemination controls. The CUI Basic category receives standard handling. CUI Specified categories carry additional handling requirements imposed by the underlying statute or regulation that authorizes the category.
Why categorization matters
A federal contractor’s compliance obligations turn on what it actually handles. A contract that does not generate or handle CUI does not trigger NIST 800-171 or DFARS 7012’s safeguarding requirements. A contract that handles CUI but no covered defense information triggers different obligations than one that handles both. Miscategorization (treating CUI as non-CUI, or treating non-CUI as CUI) creates downstream compliance and litigation risk in both directions. Many disputes between contractors and the government center on whether particular contract deliverables actually constitute CUI.
7. False Cybersecurity Certifications and FCA Exposure
The DOJ Civil Cyber-Fraud Initiative, launched on October 6, 2021, has reshaped the practical risk picture for federal cybersecurity compliance. The initiative uses the False Claims Act to pursue contractors that knowingly misrepresent their cybersecurity practices, fail to monitor or report incidents as required, or violate cyber compliance obligations in connection with government contracts. The settlements that have followed are not bet-the-company in scale yet, but they are large enough to change behavior at the policy level.
Reported settlements
The reported civil cyber-fraud settlements include: Aerojet Rocketdyne, $9 million in July 2022 (false representations about NIST SP 800-171 compliance on DOD and NASA contracts, qui tam initiated); Comprehensive Health Services, $930,000 in March 2022 (false representations about EHR security on State Department and Air Force contracts, qui tam initiated); Jelly Bean Communications, $293,771 in March 2023 (false representations about HealthKids site hosting and security); Verizon, $4.1 million in September 2023 (false MTIPS cybersecurity certifications); Penn State University, $1.25 million in October 2024 (false representations about NIST SP 800-171 compliance on DOD and NASA contracts, qui tam initiated); Georgia Tech, $875,000 in 2024 (false representations about NIST SP 800-171 compliance on DOD contracts, qui tam initiated). The docket is small but growing, and most cases are qui tam initiated.
The legal theory
The Civil Cyber-Fraud Initiative’s legal theory is straightforward. When a contractor certifies compliance with NIST SP 800-171 (under DFARS 7012 or otherwise) and the certification is knowingly false and material to the government’s payment decision, the False Claims Act applies under Universal Health Services, Inc. v. United States ex rel. Escobar, 579 U.S. 176 (2016). The SuperValu subjective scienter standard from 2023 makes it easier to prove the knowledge element. The cases tend to focus on three patterns: false SPRS scores, false attestations of full implementation when known POA&Ms existed and were not disclosed, and failure to report cyber incidents.
Whistleblower pathway
Federal contractor employees who see cyber compliance gaps that their employers are concealing from the government can file qui tam complaints under 31 U.S.C. §3730. Successful relators share 15 to 30 percent of recoveries. The Section 3730(h) anti-retaliation provision protects from adverse employment action, alongside parallel protections under NDAA 10 U.S.C. §2409 and 41 U.S.C. §4712. For more on the broader whistleblower statute framework, see our companion guide on federal whistleblower statutes beyond the FCA.
8. Incident Reporting, Breach Disclosure, and the 72-Hour DFARS Clock
Cyber incident reporting is one of the most operationally demanding parts of federal cybersecurity compliance. The reporting clocks are short, the documentation requirements are detailed, and the consequences of incomplete or untimely reporting can extend from contract termination to FCA exposure.
The 72-hour DFARS clock
DFARS 252.204-7012 requires reporting a cyber incident within 72 hours of discovery if it affects a covered contractor information system or covered defense information. Reporting is made through the DIBNet portal. The 72-hour clock starts when the contractor discovers the incident, not when it occurred. Discovery includes both formal IR team escalation and informal awareness through any channel that puts the contractor on notice of a relevant incident.
Damage assessment
After the initial 72-hour report, the contractor is required to conduct a damage assessment to determine what covered defense information was affected, preserve forensic images of affected systems for at least 90 days, and grant the government access to the systems for further investigation if requested. The damage assessment becomes part of the formal record and may be discoverable in any subsequent litigation.
CIRCIA
The Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) adds another layer for covered critical infrastructure entities, requiring them to report substantial cyber incidents to CISA within 72 hours and ransomware payments within 24 hours. CISA’s proposed implementing rule (published April 2024) defines covered entities by sector. Federal contractors in critical infrastructure sectors may face both DFARS 7012 reporting and CIRCIA reporting obligations on the same incident.
Sector-specific frameworks
SEC cybersecurity disclosure rules (effective December 2023) require public companies to disclose material cybersecurity incidents on Form 8-K within four business days. Federal contractors that are publicly traded face SEC disclosure obligations alongside DFARS 7012 and (where applicable) CIRCIA reporting. The interplay among these frameworks is one of the more challenging areas of incident response for publicly traded federal contractors.
9. Compliance Disputes, Contract Terminations, and Remediation
Cybersecurity compliance failures can produce a range of consequences short of FCA litigation. Contracting officers can issue cure notices, show cause letters, default terminations, and remedies under the Contract Disputes Act. Each pathway has its own procedural mechanics and remedies framework.
Cure notices and show cause letters
Contracting officers who identify compliance gaps typically issue a cure notice giving the contractor a period (commonly 10 days) to demonstrate progress toward compliance. Failure to cure can lead to a show cause letter and ultimately to termination for default. Cybersecurity compliance gaps that result in cure notices often involve missed deadlines for POA&M items, incomplete System Security Plan documentation, or specific control failures identified during contractor self-reporting or government assessments.
Termination and challenge
A termination for default under FAR 49.402 can be challenged at the Civilian Board of Contract Appeals (CBCA) or the Armed Services Board of Contract Appeals (ASBCA), or directly in the Court of Federal Claims under the Contract Disputes Act. Successful conversion of a default termination into a termination for convenience preserves the contractor’s recovery on costs incurred and reasonable profit, where a default termination eliminates that recovery. Cybersecurity-driven terminations are a growing source of board litigation.
Suspension and debarment
In severe cases (particularly cases involving false statements about compliance), the contractor can face suspension or debarment from federal contracting. Suspension and debarment proceedings are administrative actions handled by agency Suspension and Debarment Officials (SDOs) under FAR Part 9. The exclusion can apply company-wide or to specific individuals. Cybersecurity compliance failures combined with false statements have produced both individual and company-level debarment actions.
10. How Shin Law Office Helps Contractors and Contractor Employees
My practice on federal cybersecurity compliance covers both sides of the contracting relationship. On the contractor side, I work with federal contractors and subcontractors on NIST SP 800-171 implementation, DFARS 7012 incident reporting, CMMC 2.0 readiness, FedRAMP authorization questions, internal investigations of suspected compliance gaps, response to government inquiries and audits, defense of contract terminations, and FCA matters initiated against the company. On the contractor employee side, I represent workers who have observed cybersecurity compliance gaps that their employer is concealing and need to evaluate whistleblower options, retaliation protection, and the procedural roadmap for qui tam, NDAA, SOX, and Dodd-Frank filings.
When a federal contractor calls me about a cybersecurity compliance matter, the first conversation typically covers: what triggered the call (audit, customer inquiry, internal report, news of a peer settlement, qui tam letter); the contracts at issue and the compliance framework that applies; the documentation status (SSP, POA&M, SPRS scores, prior attestations); the relevant facts (whether compliance gaps exist, when they were known, whether incidents have occurred and been reported); and the strategic options. For internal investigations and government inquiries, the early decisions about who learns what (and when) drive much of what comes later.
When a federal contractor employee calls me about a suspected compliance gap, the first conversation works through the same framework as any whistleblower matter: what was reported (or what the employee is considering reporting); the channels of disclosure; the timing; the applicable statute (FCA, NDAA, SOX, Dodd-Frank, or combinations); and the employee’s professional and financial circumstances. Cybersecurity compliance whistleblower cases have a distinctive feature: the technical evidence often takes time to translate into the language of statute and contract clause, and the right counsel makes that translation while protecting the employee.
Summary
Federal cybersecurity compliance for contractors in Virginia, Maryland, and DC now runs on five interacting frameworks: NIST SP 800-171 (the 110-control foundational set), DFARS 252.204-7012 (the safeguarding clause with the 72-hour incident reporting obligation), CMMC 2.0 (the assessment regime now rolling into solicitations), FedRAMP (cloud authorization at Low, Moderate, High, and IL4-IL6 baselines), and the DOJ Civil Cyber-Fraud Initiative (the FCA enforcement program for false certifications). Contractors face implementation, documentation, assessment, and reporting obligations across the framework. Contractor employees who see compliance gaps have qui tam pathways under the FCA and retaliation protection under multiple statutes. The risk of getting it wrong, both for contractors and for their workers, has changed materially since October 2021.
Frequently Asked Questions
Does my company need to be CMMC certified now?
Great question, and the honest answer is it depends on the contracts you hold and the rollout schedule. CMMC 2.0 became effective December 16, 2024, and is being incorporated into DOD solicitations on a phased schedule. The Department of Defense has published a four-phase rollout plan: Phase 1 (Level 1 and Level 2 self-assessment requirements), Phase 2 (Level 2 third-party assessment requirements), Phase 3 (Level 3 government assessment requirements), and Phase 4 (full implementation). Specific solicitations will specify the required CMMC level. The practical advice for most defense contractors is to begin Level 2 readiness work now even if current contracts do not yet require it.
What is the difference between NIST 800-171 and CMMC?
Honest answer, NIST SP 800-171 is the control set. CMMC is the assessment regime that verifies the implementation of that control set. A defense contractor that handles CUI has always been required to implement NIST 800-171 under DFARS 7012. CMMC adds independent verification through third-party assessment or government-led assessment at the higher levels, plus an annual senior-official affirmation requirement that closes a major FCA exposure gap.
What if my company has a low SPRS score?
Fair question because SPRS scores are highly visible to contracting officers and to potential qui tam relators. A low score (anything significantly below 110) reflects partial implementation of NIST 800-171 controls and triggers POA&M obligations. The strategic question is whether the score is honest (reflecting real gaps that are being remediated on a defensible schedule) or whether it has been inflated or backdated. An honestly reported low score is a compliance challenge but not an FCA case. An inflated or backdated score is a serious FCA exposure event.
What happens if we miss the 72-hour reporting deadline?
Missed reporting deadlines under DFARS 7012 create both contract administration exposure (cure notices, show cause letters, potential default termination) and FCA exposure (failure to report can be construed as a knowing concealment of material information affecting the government’s payment decision). The smart move is to report as soon as the contractor has knowledge that meets the discovery threshold, even if the assessment of what happened is incomplete at the time of reporting. The reporting can be supplemented as the investigation develops.
I am an employee and I have seen our SPRS score get inflated. What can I do?
You have multiple protected pathways. Internal reporting to compliance, ethics, or legal is protected under Section 3730(h), NDAA 10 U.S.C. §2409 (if you are a defense contractor employee) or 41 U.S.C. §4712 (civilian agency contractor), and (for publicly traded contractors) SOX 806 and Dodd-Frank. External reporting to the DOD IG, the Defense Industrial Base Cybersecurity Assessment Center, or via FCA qui tam complaint is also protected. The first consultation walks through the channels, the deadlines, and the strategic ordering. False SPRS scores are one of the central fact patterns in current Civil Cyber-Fraud Initiative cases.
How do FedRAMP and CMMC interact?
Honest answer, they cover different parts of the federal cloud and contractor framework. FedRAMP authorizes cloud service providers to handle federal data at specified impact levels. CMMC certifies the federal contractor that uses (or builds) the cloud service at the appropriate maturity level. A DOD contractor that processes CUI in the cloud needs both: an authorized cloud (FedRAMP Moderate, High, or DOD IL4 or IL5 as appropriate) and CMMC certification at Level 2 or Level 3 as the contract requires. Many compliance disputes arise at the intersection of these two frameworks.
Can subcontractor cyber failures expose my company to FCA liability?
Yes, and this is an underappreciated risk. DFARS 7012 flows down to subcontractors at all tiers, and the prime is responsible for ensuring subcontractor compliance with the clause’s requirements. When a prime certifies compliance with 7012 (or with CMMC at the relevant level) and a subcontractor in the supply chain is not actually compliant with the flowed-down obligations, the prime’s certification can become a false claim. Active subcontractor management is now a core part of federal contracting compliance practice.
What does the first consultation cost?
The conversation usually lasts 1 to 2 hours and is protected by the attorney-client privilege. For contractor-side cybersecurity compliance work, we typically discuss the matter, scope the engagement, and propose fee arrangements based on the nature of the work (compliance consulting, internal investigation, regulatory response, or litigation defense). For contractor-employee whistleblower matters, federal statutory fee-shifting and qui tam fee structures usually apply.
Schedule a Consultation
I represent federal contractors and federal contractor employees in Virginia, Maryland, and the District of Columbia on cybersecurity compliance, internal investigations, contract disputes, and whistleblower matters involving NIST SP 800-171, DFARS 252.204-7012, CMMC 2.0, FedRAMP, and the DOJ Civil Cyber-Fraud Initiative. The first conversation is protected by attorney-client privilege and usually takes one to two hours.
Call 571-445-6565 or visit my contact page to Schedule a Consultation.
Related Guides
The cornerstone hub for the full federal contracting series:
Federal Contracting Law in Virginia and Maryland: A Northern Virginia Attorney’s Complete Guide
Companion topic-level guides under this cornerstone:
Security Clearance Defense for Federal Contractors in Virginia and Maryland
References
31 U.S.C. §3729 (False Claims Act Liability).
31 U.S.C. §3730 (False Claims Act Procedures, Qui Tam, Anti-Retaliation).
DFARS 252.204-7012 (Safeguarding Covered Defense Information and Cyber Incident Reporting).
DFARS 252.204-7019 (Notice of NIST SP 800-171 DOD Assessment Requirements).
DFARS 252.204-7020 (NIST SP 800-171 DOD Assessment Requirements).
DFARS 252.204-7021 (Cybersecurity Maturity Model Certification Requirements).
FAR 52.204-21 (Basic Safeguarding of Covered Contractor Information Systems).
32 C.F.R. Part 170 (Cybersecurity Maturity Model Certification Program, final rule effective December 16, 2024).
NIST Special Publication 800-171, Revision 3 (May 2024) (Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations).
NIST Special Publication 800-172 (Enhanced Security Requirements for Protecting Controlled Unclassified Information).
NIST Special Publication 800-53 (Security and Privacy Controls for Information Systems and Organizations).
Executive Order 13556 (Controlled Unclassified Information, November 2010).
32 C.F.R. Part 2002 (Controlled Unclassified Information).
National Archives and Records Administration, CUI Registry. https://www.archives.gov/cui
Department of Defense, DIBNet Cyber Incident Reporting. https://dibnet.dod.mil
GSA, FedRAMP Program Management Office. https://www.fedramp.gov
DOD Cloud Computing Security Requirements Guide (SRG).
Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA), 6 U.S.C. §681 et seq.
SEC Cybersecurity Disclosure Rule, 17 C.F.R. §229.106 (Form 8-K Item 1.05, effective December 18, 2023).
Department of Justice, Civil Cyber-Fraud Initiative (October 6, 2021 launch). https://www.justice.gov/opa/pr/deputy-attorney-general-lisa-o-monaco-announces-new-civil-cyber-fraud-initiative
Universal Health Services, Inc. v. United States ex rel. Escobar, 579 U.S. 176 (2016).
United States ex rel. Schutte v. SuperValu Inc., 598 U.S. 739 (2023).
Cyber AB (CMMC Accreditation Body). https://cyberab.org





