National Academies Press: OpenBook

The Growing Threat to Air Force Mission-Critical Electronics: Lethality at Risk: Unclassified Summary (2019)

Chapter: Appendix E: Defense Federal Acquisition Regulation Supplement Subparts Addressing SCRM

« Previous: Appendix D: SCRM-Specific NDAA/Public Laws (2009-2019)
Suggested Citation:"Appendix E: Defense Federal Acquisition Regulation Supplement Subparts Addressing SCRM." National Academies of Sciences, Engineering, and Medicine. 2019. The Growing Threat to Air Force Mission-Critical Electronics: Lethality at Risk: Unclassified Summary. Washington, DC: The National Academies Press. doi: 10.17226/25475.
×
Page 71
Suggested Citation:"Appendix E: Defense Federal Acquisition Regulation Supplement Subparts Addressing SCRM." National Academies of Sciences, Engineering, and Medicine. 2019. The Growing Threat to Air Force Mission-Critical Electronics: Lethality at Risk: Unclassified Summary. Washington, DC: The National Academies Press. doi: 10.17226/25475.
×
Page 72
Suggested Citation:"Appendix E: Defense Federal Acquisition Regulation Supplement Subparts Addressing SCRM." National Academies of Sciences, Engineering, and Medicine. 2019. The Growing Threat to Air Force Mission-Critical Electronics: Lethality at Risk: Unclassified Summary. Washington, DC: The National Academies Press. doi: 10.17226/25475.
×
Page 73

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

E Defense Federal Acquisition Regulation Supplement Subparts Addressing SCRM The following are the current Defense Federal Acquisition Regulations Supple- ment (DFARS) subparts that address supply chain risk management (SCRM) concerns, including reporting cyber incidents, counterfeits, and suppliers. These clauses should be considered for all Department of Defense (DoD) and U.S. Air Force (USAF) statement of work, request for proposal, and procurement agree- ments to inform and define expectations of supplier requirements in assuring product and service integrity. These clauses, and reforms like these, are fully com- pliant with the “full and open disclosure” clause (DFARS Subpart 6) required for fair competition.1 1. Subpart 204.7, Safeguarding Covered Defense Information and Cyber Incident Reporting, October 21, 2016. 1.1.  ubpart 252.204-7008 (Provision), Compliance with Safeguarding S Covered Defense Information Controls, October 2016. 1.2. Subpart 252.204-7009 (Clause), Limitations on the Use or Disclosure of Third-Party Contractor Reported Cyber Incident Information, October 2016. 1.3. Subpart 252.204-7012 (Clause), Safeguarding Covered Defense Infor- mation and Cyber Incident Reporting, October 2016. 1.4. Subpart 252.227-7013 (Clause), Rights in Technical Data-Non-Com- mercial Items, February 2014. 1  Revision dates included when available. 71

72 Lethality at Risk 1.4.1. Subpart 252.204-7014 (Clause), Limitations on the Use or Dis- closure of Information by Litigation Support Contractors, May 2016. 1.4.2.  ubpart 252.227-7025 (Clause), Limitations on the Use or S Disclosure of Government-Furnished Information Marked with Restrictive Legends, May 2014. 1.4.3.  Subpart 252.227-7103-7 (Clause), Use and Non-disclosure Agreement. 2. Subpart 211.274, Item Identification and Valuation Requirements, June 7, 2016. 2.1.  Subpart 252.211-7003 (Clause), Item Unique Identification and Valu- ation, March 2016. 2.2.  ubpart 252.211-7007 (Clause), Reporting of Government-Furnished S Property, August 2012. 2.3.  ubpart 252.211-7008 (Clause), Use of Government-Assigned Serial S Numbers, September 2010. 3. Subpart 231.205-71, Costs Related to Counterfeit Electronic Parts and Suspect Counterfeit Electronic Parts, November 4, 2016. 3.1.1. Subpart 204.303 (Clause), Extent of Review. 3.1.2.  Subpart 252.246-7007 (Clause), Contractor Counterfeit Elec- tronic Part Detection and Avoidance System, August 2016. 4. Subpart 239.73, Requirements for Information Relating to Supply Chain Risk, October 30, 2015. 4.1. Subpart 239.7301, Definitions, February 2019. 4.1.1. Subpart 208.405, Ordering Procedures for Federal Supply Sched- ules, June 2018. 4.1.2. Subpart 208.7402, General (Enterprise Software Agreements Section), October 2015. 4.1.3. Subpart 212.301, Acquisition of Commercial Items, April 2019. 4.1.4. Subpart 213.106-1, Soliciting Competition, March 2018. 4.1.5. Subpart 214.201-5, Part IV Solicitation of Bids, June 2018. 4.1.6. Subpart 214.503-1, Step 1 Two-Step Sealed Bidding, October 2015. 4.1.7. Subpart 215.304-5 (v), Evaluation Factors, February 2019. 4.1.8. Subpart 244.201-1, Consent Requirements, April 2019. 4.2. Subpart 239.7302, Applicability, February 2019. 4.3. Subpart 239.7303, Authorized Individuals, February 2019. 4.4. Subpart 239.7304, Determination and Notification, February 2019. 4.5. Subpart 239.7305, Exclusion and Limitation on Disclosure, February 2019.

Appendix E 73 4.6. Subpart 239.7306, Solicitation Provision and Contract Clause, February 2019. 4.6.1. Subpart 252.239-7017 (Clause), Notice of Supply Chain Risk, November 2013. 4.6.2. Subpart 252.239-7018 (Clause), Supply Chain Risk, October 2015. 5. Subpart 246.870, Contractors’ Counterfeit Electronic Part Detection and Avoidance Systems, October 21, 2016. 5.1. Subpart 246.870-1, Definition of “Authorized Supplier,” May 2018. 5.1.1. Subpart 252.246-7007 (Clause), Contractor Counterfeit Elec- tronic Part Detection and Avoidance System, August 2016. 5.2. Subpart 246.870-2, Policy, May 2018. 5.2.1. Subpart 252.246-7008 (Clause), Sources of Electronic Parts, May 2018. 5.2.2. Subpart 231.205-71 (Clause), Costs Related to Counterfeit Electronic Parts and Suspect Counterfeit Electronic Parts, August 2018. 5.2.3. Subpart 252.244-7001 (Clause), Contractor Purchasing System Administration. 5.3. Subpart 246.870-3, Contract Clauses, May 2014. 5.3.1. Subpart 252.246-7007 (Clause), Contractor Counterfeit Elec- tronic Part Detection and Avoidance System, August 2016. 5.3.2. Subpart 252.246-7008 (Clause), Sources of Electronic Parts, May 2018. 5.3.2.1.  Subpart 252.251-7000 (Clause), Ordering from Gov- ernment Supply Sources, August 2012.

Next: Appendix F: Industry Test Standards for Component Integrity and Counterfeit Detection »
The Growing Threat to Air Force Mission-Critical Electronics: Lethality at Risk: Unclassified Summary Get This Book
×
Buy Paperback | $60.00
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

High-performance electronics are key to the U.S. Air Force’s (USAF’s) ability to deliver lethal effects at the time and location of their choosing. Additionally, these electronic systems must be able to withstand not only the rigors of the battlefield but be able to perform the needed mission while under cyber and electronic warfare (EW) attack. This requires a high degree of assurance that they are both physically reliable and resistant to adversary actions throughout their life cycle from design to sustainment.

In 2016, the National Academies of Sciences, Engineering, and Medicine convened a workshop titled Optimizing the Air Force Acquisition Strategy of Secure and Reliable Electronic Components, and released a summary of the workshop. This publication serves as a follow-on to provide recommendations to the USAF acquisition community.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!