chevron-down Created with Sketch Beta.

Public Contract Law Journal

Public Contract Law Journal Vol. 54, No. 2

Comparing Section 889’s Huawei Ban and the Cybersecurity Maturity Model Certificate: The Challenge of Pursuing Cybersecurity Through Friend-Shoring

Stuart Joseph Anderson

Summary

  • Two major cybersecurity measures for government data include Section 889 of the 2019 John S. McCain National Defense Authorization Act and the Cybersecurity Maturity Model Certificate of the Department of Defense.
  • The pursuit of cybersecurity through friend-shoring means creates a set of challenges for both agencies and the defense industrial base that a best-practices regime can avoid. 
  • Policymakers concerned about cybersecurity should consider downsides and the availability of alternative schemes, like CMMC, that deliver security outcomes with less disruption, confusion, and loss of technological advantage.
Comparing Section 889’s Huawei Ban and the Cybersecurity Maturity Model Certificate: The Challenge of Pursuing Cybersecurity Through Friend-Shoring
bauhaus1000 via Getty Images

Jump to:

Abstract

The U.S. Government’s recent efforts to ensure the cybersecurity of government data maintained by government agencies and their contractor partners include two major cybersecurity measures: Section 889 of the 2019 John S. McCain National Defense Authorization Act (Section 889) and the Cybersecurity Maturity Model Certificate (CMMC) of the Department of Defense (DoD). To protect data from theft by the Chinese government, Section 889 excludes from U.S. procurement certain Chinese manufacturers of telecommunications and video-surveillance equipment, including the Chinese telecommunications giant Huawei Technologies Company. In practice, Section 889 resembles other “friend-shoring” measures that protect critical supply chains by moving those supply chain from geopolitical rivals to domestic and friendly markets. CMMC proceeds by very different means, as it will require contractors maintaining unclassified DoD information to adopt a suite of best practices and certify compliance through an assessment process. This paper documents lessons learned from the implementation of Section 889, as identified through interviews with professionals in federal agencies and industry, and it evaluates the applicability of those lessons to CMMC’s implementation. This evaluation shows that CMMC and Section 889 will likely share only those effects that would arise with the implementation of any new requirement. By contrast, the most serious challenges resulting from Section 889—including overbroad application and the consequent disruption of activities not covered by the statute—stem from its specific “friend-shoring” features. As a result, these challenges likely will not emerge under CMMC. Policymakers considering future cybersecurity measures should consider this lesson, that a cybersecurity regime based on best practices avoids the difficulties, costs, and risks that friend-shoring regime can be expected to create.

I. Introduction

The effective functioning and security of the U.S. government depends on the ability of government agencies and their private sector contractors to store and use data in information technology systems. Dependence on these data and the systems in which they are stored, however, leaves the United States vulnerable to the breach of these systems. Currently, the United States faces a multitude of direct and indirect security threats to these systems driven by adversaries including state actors, criminal organizations, and non-state ideological groups.

A particular area of concern in this context is the ability of the defense industrial base (DIB) to secure government information that is unclassified but nevertheless requires some level of protection—so-called “Controlled Unclassified Information,” or “CUI.” CUI has received attention from cybersecurity policymakers because it is a broad class of information that, by definition, requires protection but has not historically enjoyed the kinds of standardized controls provided for classified information. The DIB stands out as a target of concern for U.S. cybersecurity policy because the industry has struggled to adapt adequate internal security measures. Currently, forty-four percent of prime contractors do not have system security plans from their subcontractors, and only five percent of prime contractors have taken corrective action against their subcontractors for failure to adequately secure CUI.

As the United States’ geopolitical rivals continue to develop their cyberwarfare capabilities, the U.S. government itself has also been the victim of a number of noteworthy data breaches made possible by cyberattacks. These notably include the 2015 theft of millions of personnel records from the Office of Personnel Management by actors supported by the Chinese government and the months-long 2020 breach by Russian hackers of key government networks, including those used by the Pentagon, the Department of Homeland Security (DHS), the State Department, and the Treasury Department, through malicious code planted into a software update provided by the Texas-based SolarWinds.

To address these vulnerabilities, the U.S. Government has undertaken two significant cybersecurity measures since 2019 that are the subject of this paper—Section 889 of the 2019 John S. McCain National Defense Authorization Act (2019 NDAA) and the Cybersecurity Maturity Model Certificate (CMMC). The former seeks to protect cybersecurity in the DIB by strictly limiting the ability of both federal agencies and federal contractors to use supplies or services from Huawei Technologies Company (Huawei), Zhongxing Telecommunications Equipment Corporation (ZTE), and three other Chinese firms providing surveillance and telecommunications services and hardware. Though a measure geared to ensure cybersecurity, Section 889 has essential similarities to the approach known as “friend-shoring,” wherein a nation seeks “security of supply” by ensuring procurement supply chains are located in domestic markets or the markets of reliable allies. By contrast, under CMMC, the Department of Defense (DoD) pursues cybersecurity through a comprehensive set of cybersecurity practices for DIB contractors to follow when handling “Federal Contract Information” (FCI) and CUI. This paper will ultimately show that CMMC’s reliance on best practices avoids the most severe consequences encountered in Section 889’s implementation as those consequences stemmed from Section 889’s friend-shoring aspects. This conclusion has implications for policymakers interested in designing future cybersecurity programs.

Part II of this paper provides a history of cybersecurity efforts, including CMMC and Section 889. This history includes two general lines of effort of interest to this article: the promulgation of cybersecurity best practices for holders of government information and the exclusion of technology developed by companies with connections to rival nation governments. Part III, in turn, describes the structure of Section 889 and the lessons learned from its implementation as identified by procurement professionals working for defense contractors, the private bar, and federal agencies during a series of interviews conducted by the author. Part IV provides a description of CMMC.

Finally, in Part V, this paper evaluates the applicability of the lessons learned from the implementation of Section 889 to the implementation of CMMC as a way to compare the different means of achieving cybersecurity represented by the two regimes. That comparison will show that the pursuit of cybersecurity through friend-shoring creates significant problems for contractors and government agencies unrelated to its cybersecurity benefits, while a best-practices approach like CMMC promises to avoid the downsides and to affect more directly the level of cybersecurity. As cybersecurity will remain a priority and calls to engage in friend-shoring will likely continue, the lessons learned in the implementation of Section 889 will have enduring value as a cautionary tale about the value of friend-shoring as a means to achieve cybersecurity.

II. A Brief History of Cybersecurity Efforts

Over the past two decades, the U.S. government—Congress and executive agencies alike—have made important efforts to enhance the security of federal IT systems. One line of effort has been the establishment of cybersecurity practices and activities for the contractors and agencies holding U.S. government information. Through a series of statutes, executive orders, and regulations, the U.S. government has promulgated a canon of such best practices; imposed them on an increasing set of participants in federal procurement; and begun to implement a certification regime to ensure compliance. The latest example of this is DoD’s CMMC.

The U.S. Government has also sought to enhance the security of federal information systems by excluding from the DIB certain foreign firms deemed to pose an unacceptable risk due to their relationships with foreign governments. Most notably, Section 889 of the 2019 NDAA effectively barred five Chinese firms from participation in, and even provision of services to, the DIB—including Huawei, a major global supplier of cutting-edge telecommunications equipment. Though this second line of effort has cybersecurity as its end, the means of obtaining this end are those means that the United States has adopted in its more recent efforts to pursue the security of supply through friend-shoring.

A. Many Cybersecurity Efforts Have Relied on Best Practices and Industry Standards

The Federal Information System Modernization Act (FISMA) of 2002, though not the first federal cybersecurity measure, was a foundational effort to arm government agencies with the power to ensure cybersecurity. FISMA of 2002 combined the key portions of earlier statutory efforts to establish standard IT security requirements for federal systems. Under this regime, the Office of Management and Budget (OMB) promulgated the implementing policies; the National Institute of Standards and Technology (NIST) provided guidance and standards; and the Federal Acquisition Regulation (FAR) mandated compliance with these policies, guidance, and standards. This NIST guidance included NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, which DoD eventually adopted as their basic cybersecurity standard for handling CUI. The early years under the FISMA of 2002 regime were relatively unsuccessful; from 2002 to 2006, “none of the [twenty-four] major agencies . . . fully implemented agency-wide information security programs as required by FISMA.” Moreover, several federal agencies responsible for implementing the law proved unable to stay abreast of the growing threat of cyberattacks.

In January 2008, the Bush administration created the Comprehensive National Cybersecurity Initiative (CNCI), subsequently expanded by President Barack Obama. The CNCI was intended to create a national cybersecurity strategy to defend U.S. information and communications infrastructure. It ultimately comprised twelve related initiatives, including creation of a single Federal Enterprise Network under the auspices of OMB and DHS; provision of coordinated research and development; increase of security for classified networks; and development of a risk-management program for global supply chains.

The next major cybersecurity initiative was legislative as, in August 2012, the Senate debated the Cybersecurity Act of 2012. This act proposed to establish a National Cybersecurity Council that would assess cyber vulnerabilities, foster public-private partnerships to combat cyber threats, incentivize the adoption of voluntary cybersecurity measures by critical infrastructure owners, and strengthen the federal information technology (IT) workforce. The act, however, failed to pass the Senate after resistance from industry based on concerns about the imposition of a risk-management regulatory and compliance regime, as well as opposition by privacy groups concerned about elements of the legislation that would facilitate industry’s sharing information about cyber threats with the government.

Because the Cybersecurity Act of 2012 did not pass, in February 2013 the Obama administration issued the Improving Critical Infrastructure Cybersecurity Executive Order (Cybersecurity EO) to protect critical IT infrastructure. The Cybersecurity EO called for policy coordination within the National Security Council system and an increase in cybersecurity information sharing between federal agencies and the U.S. private sector. It also required federal agencies to address privacy and civil liberties concerns at the highest agency levels.

Importantly for the history of federal cybersecurity best practices, the Cybersecurity EO required the Secretary of Homeland Security to develop, in conjunction with the NIST Director, a Cybersecurity Framework to reduce cyber risks to critical infrastructure. This framework would identify standards, guidelines, best practices, and areas for improvement through public- and private-sector collaboration with “an open public review and comment process.” The first version of the NIST Cybersecurity Framework (CSF), aimed at operators of critical infrastructure, was published in 2014; version 2.0 was released in February 2024. The framework consists of a CSF Core, a set of more than one hundred desired cybersecurity outcomes described in narrative form; CSF Tiers, which provide the context to match organizations with the appropriate level of cybersecurity rigor; and CSF Profiles, which align organizational requirements with the desired outcomes of the Framework Core.

In 2014, Congress amended FISMA to clarify agencies’ responsibilities to secure federal information. FISMA of 2014 required federal agencies to identify the risk resulting from the unauthorized access, use, disclosure, disruption, modification, or destruction of information collected or maintained by or on behalf of an agency and to provide information security protections commensurate with that risk. This obligation applied to information systems used or operated by an agency, by a contractor of an agency, or by any other organization on behalf of an agency.

The next major development in federal cybersecurity best practices occurred when DoD began to use procurement as a tool to standardize and enhance cybersecurity in the DIB. In 2015, DoD amended the Defense Federal Acquisition Regulation Supplement (DFARS) to establish basic cybersecurity requirements for the handling by defense contractors of CUI. These requirements were implemented through the clause DFARS 252.204-7012, which obligates contractors handling CUI to implement the cybersecurity best practices identified in NIST SP 800-171 in all DoD contracts except those for commercial-off-the-shelf (COTS) items. NIST SP 800-171, in turn, sets out 110 best practices for protecting the confidentiality of CUI across fourteen “facilities” of requirements, such as awareness and training, and physical protection. DoD Contractors handling CUI, except providers of COTS supplies and services, had also to complete a triennial self-assessment using a DoD Assessment Methodology for collection in a DoD database, or submit to a government assessment if necessary.

In 2016, the FAR counsel promulgated a rule requiring contractors handling FCI that was not CUI to adopt a more basic series of cybersecurity practices. This mandate was required to ensure the information security of contractor-managed information required by FISMA of 2002.

The combination of cybersecurity best practices with contractor self-assessment remains the pattern for DoD contractor cybersecurity efforts. In September 2020, the DoD released a draft of a new global program to ensure security of federal information (FCI and CUI) in the DIB—the CMMC. The details have changed since the first publication, with the October 2024 release of a revised final rule creating the CMMC framework, effective December 16, 2024, and with the proposed rule that would implement the program in DoD acquisitions published in August 2024. The general nature of CMMC, however, has remained consistent, requiring contractors handling federal information to comply with standard cybersecurity practices and to participate in assessments of their compliance. Because the FAR and DFARS already require most of the relevant cybersecurity activities for most contractors, the biggest difference lies in the certification assessment regime, which requires third-party and government assessments for contractors handling more sensitive CUI. CMMC represents the latest major development in DoD efforts to attain cybersecurity through the mandated adoption by contractors of expert-prescribed activities and practices.

B. Other Cybersecurity Efforts Have Focused on Security of Supply

Meanwhile, the U.S. Government also began to pursue cybersecurity through a different means—the exclusion from the DIB of particular foreign firms determined to pose an unacceptable risk based on their nationality. In recent history, the first such effort related to the Russian cybersecurity firm Kaspersky Lab. Kaspersky sells antivirus and cybersecurity software that was, at one time, used in the computer systems of fifteen percent of U.S. federal agencies. Because of the CEO’s ties to the Kremlin and a requirement under Russian law that the company assist the Russian Federal Security Service in its operations, concerns grew that the Russian government might use Kaspersky products as a tool to commit espionage or sabotage against the U.S. Government systems. As a result, in September 2017, the DHS issued binding guidance directing executive departments and agencies to identify Kaspersky products in their information systems and to develop a plan to remove and discontinue the use of those products. Then, in December 2017, Congress passed the National Defense Authorization Act for Fiscal Year 2018, section 1634, which prohibited all federal agencies, departments, and organizations from using hardware, software, and services provided by Kaspersky.

The next such effort came when Congress passed the 2019 NDAA in August 2018. Section 889 of the 2019 NDAA acted to secure the federal supply chain from the perceived threats caused by the use of certain Chinese-sourced technologies through a ban on federal procurement of equipment and services from five Chinese firms, as well as procurement from some firms that themselves use these equipment and services. Among the five firms, the act targets telecommunications equipment and services from Huawei and ZTE, both of which had a history as targets of U.S. actions to protect national security and cybersecurity.

ZTE is a telecommunications company based in Shenzhen, China, best known for selling inexpensive smartphones in developing markets, but also an important source of cloud-computing products and Fifth Generation (5G) network technology. As late as 2018, U.S. telecommunications firms AT&T, Verizon, and T-Mobile, sold ZTE smartphones. In 2016, after ZTE “sold almost ‘$40 million of U.S.-origin goods’ to Iran and North Korea ‘in . . . violation of U.S. sanctions laws,’” the Commerce Department designated ZTE as a company posing national security threats to the United States and imposed strict licensing requirements that effectively barred ZTE from buying U.S.-made technology. In 2018, the Commerce Department imposed additional fines and banned ZTE from importing U.S.-origin goods for seven years.

Huawei has had a similar history. Huawei, like ZTE headquartered in Shenzhen, is China’s largest telecommunications manufacturer and was in 2018 the world’s second-largest manufacturer of smartphones. Huawei is major source of the technology needed for 5G infrastructure worldwide. While Huawei has focused on developing countries as its expansion strategy, this list of countries where Huawei has provided 5G infrastructure includes several countries with which the United States has important alliance relationships.

Huawei has also long been a target of U.S. efforts to limit the firm’s reach into international markets. For instance, “[t]he U.S. government blocked Huawei’s deals with 3Com Corporation in 2008 and 3Leaf Systems in 2011.” Huawei has been “completely excluded from purchase lists of U.S. top-tier carriers including AT&T, Sprint, T-Mobile and Verizon.” After Huawei issued an open letter to the U.S. government in 2011 calling for fair treatment and full investigation to clear its name, the House Permanent Select Committee on Intelligence started an investigation and published a report in 2012 finding that Chinese telecommunication companies pose national security threats and urging the U.S. government to “remain vigilant.”

In 2017, Congress passed an appropriations bill prohibiting DoD’s purchase of telecommunications equipment produced by Huawei, ZTE, or any other Chinese state-owned or state-directed companies for substantial use in DoD nuclear deterrence and homeland defense missions. In February 2018, the FBI Director expressed concerns to the Senate Intelligence Committee that the Chinese government could easily harness Huawei to collect intelligence on the United States. At the same time, the U.S. Department of Justice (DoJ) was investigating Huawei for allegedly violating sanctions laws by selling U.S.-origin equipment to Iran and other countries, an investigation which led to the arrest by Canadian law enforcement of Huawei’s Chief Financial Officer, also the daughter of the company’s founder, pending extradition to the United States.

In 2019, Congress moved to exclude Chinese technology firms, including ZTE and Huawei, from U.S. procurement supply chains. Section 889 of the 2019 NDAA, with implementing FAR regulations, prohibits executive agencies from procuring surveillance equipment produced by Huawei, ZTE, and three other Chinese companies, including equipment with components produced by these firms. Section 889 prohibits agencies from procuring services from these firms. Most strikingly, it also prohibits agencies from doing business with firms that use such equipment or services as a sufficiently important component in their own IT systems. Section 889 applies to all federal contracts and solicitations, including those for COTS items or those under the micro-purchase threshold exemption.

As will be seen, the practical effects of Section 889’s implementation depend heavily on the means selected to achieve the end of cybersecurity. While the approach taken in Section 889 pursues the same goal as CMMC generally speaking, the means selected have little in common with CMMC and other cybersecurity measures, as will be discussed in greater detail below. Instead, it has striking similarities to the approach that the United States has adopted to address a different concern, namely the inclusion of geopolitical rivals, particularly China, in the increasingly complex supply chains on which the United States depends. To secure against this vulnerability and maintain the security of supply, the United States has taken steps to ensure that critical procurement supply chains are located in domestic markets or the markets of reliable allies, an approach sometimes known as “friend-shoring.”

The CHIPS and Science Act of 2022, in part, takes this friend-shoring approach to secure the U.S. supply of semiconductors. While the act has elements of onshoring, as it encourages the location of semiconductor manufacturing within the United States, it also encourages U.S. suppliers to develop semiconductor supply chain partnerships with allies and discourages their commercial links with China. Signed into law shortly thereafter, the Inflation Reduction Act (IRA) of 2022 targeted electric vehicle- (EV-) related technology with friend-shoring efforts. The IRA limits EV tax credits to those finally assembled in North America and requires for battery tax credits that sufficient critical mineral and battery components are extracted, processed, or recycled in the United States or countries with whom the United States has a free trade agreement. In this friend-shoring context, free trade agreements are often an important means of defining the circle of friends from whom supplies can be securely obtained.

With the enactment of Section 5949 of the National Defense Authorization Act for Fiscal Year 2023 (NDAA FY23), Congress again addressed the security of supply, again in the context of the semiconductor supply chains. Section 5949 prohibits federal procurement of electronic parts, products, or services that include certain Chinese semiconductors. This bill will have significant impacts on the DIB as it limits access to important sources of microchips and micro-electronics. The next subject of security-of-supply efforts in Congress was drones where, in May 2023, the White House signed into law a bill that bans the procurement by federal agencies of drones from designated countries, including China.

The following sections will provide the important features of Section 889 and CMMC, and lessons learned by private industry and procuring agencies in implementing Section 889, to explore how those lessons might apply to the future implementation of CMMC. This exploration will show that the most important downsides caused by Section 889’s implementation are unlikely to emerge during CMMC’s implementation because they stem from Section 889’s friend-shoring nature, which CMMC does not share. The evaluation thus also shows, more generally, that the adoption of friend-shoring means to achieve cybersecurity brings significant downsides that an expert-crafted, best-practices approach can avoid. When crafting future cybersecurity measures, policymakers should consider the lessons of this comparison.

III. Section 889, Its Implementing Regulations, and Lessons Learned from Implementation

In August 2018, Congress included in Section 889 of the 2019 NDAA a sweeping effort to protect the federal supply chain by excluding five Chinese telecommunications companies. The Federal Acquisition Regulatory Council (FAR Council) implemented Section 889 through FAR regulations that create two prohibitions: a “Use Prohibition,” which prohibits executive agencies from purchasing equipment and services from those companies; and a “Supply Chain Prohibition,” which prohibits executive agencies from doing business with companies that use such equipment or services. For both prohibitions, the FAR also requires that contractors certify that they are complying with the prohibitions. These rules apply to all federal contracts and solicitations, including to contracts for commercially available off-the-shelf (COTS) items and contracts under the micro-purchase threshold, and apply to subcontractors as well as to primes. Finally, but significantly, the rules also apply to the operation of federal contractors outside their government-contracting book.

The author interviewed professionals in industry, the private bar, and DoD to identify lessons learned from the implementation of Section 889. These professionals identified that DIB suppliers have generally adapted to Section 889 by addressing the bans early in the procurement process, by requiring their own suppliers to certify compliance, and by locating substitutes for the covered equipment. Interviewees also noted that the assignment of enforcement duties to contracting officers, who often lack expertise, means that implementation has emphasized cautious avoidance of risk, rather than fact-based assessment. Finally, interviewees identified that the DIB’s adaptations have likely limited U.S. access to low-price innovation and led to a general restriction of access to foreign-sourced technology—particularly but not limited to Chinese technology.

A. Section 889 Bans Federal Agencies from Procuring “Covered Telecommunications Equipment and Services” Offered by Certain Chinese Firms Including Huawei

For contracting professionals, the most salient feature of the short statutory language of Section 889 is the breadth and depth of its coverage. Section 889 bars procurements by federal agencies of “covered telecommunications equipment or services” provided by five named Chinese entities. It covers all executive agency procurements, which have been determined to include “Other Transactions” as well. That breadth of coverage in terms of transactions is matched by breadth of coverage of activities by contractors, as Section 889’s Supply Chain Prohibition applies to the government supply chain directly and the Use Prohibition applies as well to the “outside” activities of entities contractors. Scope of coverage is also deep, inasmuch as the Supply Chain Prohibition, as the name suggests, extends down the supply chain, although the Use Prohibition applies only to prime contractors.

In contrast to this breadth and depth, the ban narrowly targets the Chinese firms at issue. Section 889 applies to five Chinese firms—Huawei, ZTE, Hytera Communications Corporation (Hytera), Hangzhou Hikvision Digital Technology Company (Hangzhou Hikvision), and Dahua Technology Company (Dahua), and their subsidiaries and affiliates—and it covers only certain kinds of equipment produced by each, the so-called “covered telecommunications equipment and services.” Section 889 defines the “covered telecommunications equipment” as telecommunications equipment provided by Huawei and ZTE, and video surveillance and telecommunications equipment for specified security and surveillance purposes provided by Hytera, Hangzhou Hikvision, and Dahua. It defines “covered telecommunications . . . services” as telecommunications or video surveillance services provided by such entities or using such equipment.

Finally, while Section 889 does provide specific exceptions and a waiver, these are of limited use to contractors generally. The statute excepts from the Supply Chain Prohibition procurements for services that connect to a third party’s facilities, “such as backhaul, roaming, or interconnection arrangements,” and “telecommunications equipment that cannot route or redirect user data traffic or permit visibility into any user data or packets that such equipment transmits or otherwise handles.” The statute also provides for a waiver by “the head of an executive agency, on a onetime basis, for a maximum of two years,” and by the Director of National Intelligence (DNI) in the interest of national security. This waiver option does not promise significant relief, however. Agencies, including DoD and GSA, have indicated they will allow for agency waivers only as a “last resort.” It appears that the bar is high, and it is unlikely that many contractors will be able to secure agency waivers. The Use and Supply Chain prohibitions, described below, thus provide the ground rules that will govern nearly all government contracting activity.

In accordance with the effective dates of Section 889’s two parts (A and B), the FAR Council issued several interim rules that implemented Part A, which establishes the Supply Chain Prohibition, effective initially on August 13, 2019, as well as the interim final rule that implemented Part B, which establishes the Use Prohibition, effective August 13, 2020. As a result of these rules, the FAR has a new subpart (Subpart 4.21) incorporating the definitions, restrictions, and requirements of Section 889 and new solicitation provisions and contract clause directing contractors to make the representations required in Section 889: FAR 52.204-24, FAR 52.204-25, and FAR 52.204-26. These changes to the FAR generally prohibit the procurement of the covered equipment and services, require contractors to make the representations or disclosures needed to effect the prohibition, and place on contractors the burden of conducting the comprehensive due diligence of operations and supply chains to comply. As a result, contractors face the risk of noncompliance that follows from the requirement to comply with and make representations regarding both prohibitions. The FAR’s implementation of Section 889, however, creates important differences between the Supply Chain and Use Prohibitions in practice.

B. The Supply Chain Prohibition: Section 889 Bars Federal Agencies from Procuring Equipment and Services That Themselves Use Covered Telecommunications Equipment or Services

The Supply Chain Prohibition bars agencies from bringing the listed firms’ telecommunications equipment and services into the U.S. government contracting supply chain. It rests on Part A of Section 889, which prohibits federal agencies from obtaining products or services that use the “covered telecommunications equipment or services,” defined above, as “a substantial or essential component of the system” or as “critically technology as part of any system.” In the implementing regulation, the chief obligation imposed on contractors is the requirement to confirm that they will not provide covered equipment and services. This requirement is found in FAR 52.204-24, a clause mandatory for all FAR solicitations or requests for proposals, as well as for all notices of intent to place an order and solicitations for an order under indefinite quantity indefinite delivery (IDIQ) contracts.

The part of FAR 52.204-24 relating to the Supply Chain Prohibition also requires the offeror to represent whether it “will [or] will not provide covered telecommunications equipment or services to the Government in the performance of any contract, subcontract or other contractual instrument resulting from this solicitation.” Unlike the statutory prohibition, which applies only to the use of covered equipment as “a substantial or essential component of any system, or as critical technology,” the FAR clause’s representation has no such limitation, resulting in a greater breadth of application.

In the event that the offeror will provide covered equipment or services, the offeror must make certain disclosures as part of its offer. For covered equipment, the offeror must identify the entity that produced the covered equipment, provide a description of all covered equipment offered (including the brand, model number, item number, etc.), and provide an explanation of the proposed use and any factors relevant to determining if such use would be permissible under the Supply Chain Prohibition. For covered services, the offeror must disclose if the service is related to item maintenance and, if it is, provide a description of all covered services offered (including the brand, model number, and item description of the item being maintained). If it is not, the offeror must provide the Product Service Code of the service being provided, an explanation of the proposed use, and any factors relevant to determining if such use would be permissible under the Supply Chain Prohibition. In general, then, the Supply Chain Prohibition effectively prohibits the government from purchasing the banned Chinese products and services without significant exception.

A second clause implementing the Supply Chain Prohibition, FAR 52.204-25, contains an additional reporting requirement for all government contractors who discover that they have violated the prohibition. This clause requires a contractor to notify the government immediately—within one business day—if, during contract performance, the contractor identifies covered telecommunications equipment or services “used as a substantial or essential component of any system, or as critical technology as part of any system.” This immediate report must identify the contract number, order numbers, supplier name, supplier unique identifier, supplier CAGE code, brand, model number, item description, and any readily available information about mitigation actions undertaken or recommended. This clause also requires a follow-up report, to be submitted within ten business days, that must include “any further available information about mitigation actions undertaken or recommended” and a description of any efforts undertaken and “any additional efforts that will be incorporated to prevent future use or submission of covered telecommunications equipment or services.”

Unlike the representation under FAR 52.204-24, however, the reporting requirement under FAR 52.204-25 is only triggered when the covered equipment or services are “used as a substantial or essential component of any system, or as critical technology as part of any system.” Thus, reporting may not be required if the services or equipment are not “substantial or essential.” While the government has not yet elaborated on the definition of “substantial or essential” contained in FAR 52.204-24—“any component necessary for the proper function or performance of a piece of equipment, system, or service”—this definition and the rest of FAR 52.204-25 suggest that “the contractor may make a reasonable judgment on whether the exception applies.”

Contractors face a potential range of consequences for noncompliance with these prohibitions and requirements. Although the provisions imposing the prohibitions and associated representations, FAR 52.204-25 and 52.204-36, do not themselves provide for any liability or remedy in the event of a breach, as a strictly contractual matter, noncompliance constitutes a breach of contract that could lead to non-award or non-exercise of an option, termination, negative past performance ratings, or suspension or debarment proceedings. In addition, violation of Section 889 could lead to liability under the False Claims Act. Finally, the U.S. Department of Justice has at least charged one individual with wire fraud and making false statements regarding Section 889 compliance.

C. The Use Prohibition: Section 889 Bars Federal Contractors from Using Many Classes of Covered Telecommunications Equipment or Services in Their Non-Federal Businesses Efforts

In contrast to the Supply Chain Prohibition, the Use Prohibition, based on Section 889 Part B, addresses the general business activities of entities that perform contracts on behalf of the government, including those unrelated to government contracting. It bars agencies from contracting with entities that use “covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.” This prohibition is implemented by a FAR provision, FAR 52.204-24, requiring contractors to confirm that they will not themselves use covered equipment and services in their own business. This is the same provision implementing the Supply Chain obligation, and so the prohibition is likewise mandatory for all solicitations, notices of intent to place an order, and solicitations for an order under IDIQ contracts. “Notably, . . . ‘use’ is not limited to use in the performance of work under a federal contract.” The Use Prohibition thus effectively prohibits government contractors from using the banned Chinese restricted products and services without regard to the interaction of that use with the government’s supply chain.

Just as with the Supply Chain Prohibition representation, the FAR requires contractors to represent that they have complied with the Use Prohibition. Further representations follow when the offeror will use covered equipment or services. These representations are the same as required under the Supply Chain Prohibition. Critically, this provision applies to a broader class of activity than the statutory prohibition, as it is not limited to equipment or services used as “a substantial or essential component of any system, or as critical technology as part of any system.” Unlike the Supply Chain Prohibition representation, however, this Use Prohibition representation currently applies solely to the offeror and not to subsidiary or affiliate companies of the offeror.

The Use Prohibition adds an additional requirement for a “reasonable inquiry” to the requirement for representations. The part of FAR 52.204-24 containing the Use Prohibition requires an offeror to conduct a “reasonable inquiry” into its own operations to determine whether “it does [or] does not use covered telecommunications equipment or services, or use any equipment, system, or service that uses covered telecommunications equipment or services.” The FAR Council has clarified that the reasonable inquiry is limited to the offeror that will act as the prime contractor. The reasonable inquiry need not extend to suppliers or subcontractors and currently need not extend to subsidiaries or affiliates of the offeror entity. “However, for the Final Rule, the FAR Council is considering expanding the scope . . . [to include] affiliates, parents, and subsidiaries of the offeror that are domestic concerns. . . [though even the expanded scope would] not apply to foreign subsidiaries or affiliates.”

D. Lessons Learned in the Implementation of Section 889

1.
Interviewees Identified the Best Practices and Common Trends in the Implementation of Section 889

From the contractor’s perspective, interviewees generally identified that the most important practice with regard to Section 889 is to push their certification requirements down the supply chain. In other words, contractors must ensure that they require their suppliers to certify their own compliance with the Supply Prohibition and to provide the information needed for the contractors themselves to make the Use Prohibition certification. This Supply Chain prohibition is required by law to be included in subcontracts, but diligence in obtaining subcontractor certification was nevertheless a key recommendation by interviewees. Critically, in this regard, Section 889 covers many products that are embedded as components in other products at a level that will not be apparent except to the manufacturer. This creates a risk that contractors will have to make certifications with an imperfect ability to assure accuracy, which risk contractors can best mitigate by ensuring that another party farther down the supply chain and with better information makes the certification.

This risk arises from the breadth of coverage of Section 889. The FAR’s Use Prohibition certification is quite broad as, unlike the statute, it is not limited to “substantial or essential” components or “critical technology,” and it is not limited by the nature of the contracted performance or the even the contractor’s industry. More generally, the sheer breadth of covered services and goods creates such risk, where the covered Chinese firms are major global sources of not only cellular phone network infrastructure, but also radios, virtual reality, cameras, and display screens. Indeed, two interviewees noted that firms were required to replace the thermal cameras that they used to screen for COVID as coming from a covered source.

As a result, when certifying, contractors must protect themselves from the risk of “black boxes” in the component supply chain—articles the subcomponents of which the contractor likely has no ability to identify. As a hypothetical example, two interviewees proposed a contractor providing laundry services for a federal agency whose delivery vans had backup cameras containing covered equipment. It is easy to imagine such a contractor failing even to identify the issue, much less to obtain adequate certification; yet such failure would violate the certification required by the FAR’s implementation of the Use Prohibition.

Contractors can protect themselves from the risk of “black boxes” by ensuring that they obtain the proper certification from their own subcontractors and suppliers. Diligence in this regard ensures that those with visibility at the correct component level are the parties certifying a component’s provenance. For contractors with limited resources, one interviewee recommended as a resource for standard subcontract terms the subcontractor, vendor, or supplier terms publicly available on the websites of the biggest defense contractors. Government contract professionals also rely on contractors to ensure that the certification is pushed down to the right level, as they face the risk of scandal in the event an incorrect certification leads to noncompliant procurement, and they face the risk with even less insight into the supply chain than the prime contractor.

Pushing the certification requirement down, however, is an imperfect solution for the practical problem of correctly identifying banned equipment and services in the supply chain. Ideally, and in general, it provides an efficient allocation of risk because, for any given component, the party with actual knowledge will have certified or provided the information needed to do so. However, this practice also creates the risk that inquiry will merely flow down the supply chain to a party who cannot or will not effectively comply. Suppliers far enough down the supply chain, all things being equal, tend to have fewer resources, less sophistication, or less experience with federal contracting. As a result, pushing the certification requirement down the chain will sometimes result in the requirement being passed to the first party that fails either to recognize what is being asked or to answer correctly rather than to the party best situated to answer.

Another important lesson learned, in tension with the importance of pushing the certification down the supply chain, is that contractors should carefully scope their “reasonable inquiry” conducted under the Use Prohibition. This inquiry is broader than the prohibition that it covers, as noted above, and this breadth was intentional. When the Section 889 interim rule first came out, then, contractors generally expected to take an expansive view of implementation, including flowing down the Use Prohibition to suppliers.

Those contractors, however, received pushback from suppliers who were unwilling to provide that information and could not get it from their own unwilling suppliers. A subset of those suppliers were those who used covered services through the cellular phone infrastructure in their home market. This subset and their concerns were significant because Huawei provides a large fraction of cellular phone network infrastructure used worldwide, particularly 5G, including in nations that are likely locations of contract performance and that are potential sources of technology for U.S. procurement.

Moreover, when contractors could get the information and provide it, they found that the FAR requirement exposed them to unintended consequences. One interviewee reported that a “does use” certification can negatively impact a contractor, even though the certification does not necessarily mean that the contractor is out of compliance with Section 889 or requires a waiver. Contracting officers have reportedly refused to award to contractors that certify “does use,” even if the equipment or services in question are not covered. In the interviewee’s opinion, this denial was either the result of the contracting officer’s not understanding the certification or of the contracting officer’s preference to avoid the risk of awarding to a contractor that used covered equipment or services in the event of a cybersecurity incident. Such risk aversion is common as agencies face increasing vigilance of their cybersecurity and pressure to avoid being seen as “soft on China.” One interviewee noted, as an obvious avenue to inform these risk-averse contracting officers, that SAM.gov allows contractors certifying use to provide a narrative explanation or a separate certification for geographically based use; but such an ability does not exist.

In addition, the rules and guidance provided so far have not helped contractors manage or circumscribe this burden. The breadth of the FAR certification requirement prevents contractors from determining for themselves whether a given piece of technology is a “substantial or essential” component of their systems or “critical technology.” Agencies have not provided helpful clarification about what constitutes “use,” leaving contractors to rely on the literal meaning, which is impractical in application.

These circumstances have led contractors to take a more tailored and nuanced approach to the scope of their reasonable inquiry than they had initially planned. In the absence of guidance but faced with serious consequences for over-reporting, it has proven better for contractors to rely on a reasonable interpretation of what constitutes “use” and what is required for a “reasonable inquiry” to avoid creating unreasonable obstacles for themselves. For example, contractors with suppliers operating outside of the United States where Huawei may be the source of telecommunications equipment have adopted a more judicious reasonable inquiry, in which they rely on the definition of “reasonable inquiry” to limit that inquiry to the identity of the actual manufacturers of supplies and leave it at that.

Section 889 theoretically provides two mechanisms to reduce the burdens and risks of certification: the waiver, and the exceptions under the Supply Chain Prohibition for backhaul and other services that connect to third-party facilities and equipment that do not connect. The use of waivers is essential, given the global importance of covered firms in providing telecommunications infrastructure. In this regard, Huawei provides a large fraction of cellular phone network infrastructure used worldwide, particularly 5G, including in nations that are likely locations of contract performance and that are potential sources of technology for U.S. procurement. In fact, the U.S. Embassy in London has indicated that all its suppliers must indicate “does use” in its Use Prohibition representation. Three interviewees reported cases in which Section 889 was implicated by the performance of a contract overseas where Huawei provided the components for the cellular infrastructure, and two verified that the procurements required a waiver.

However, the waivers have not proven to offer meaningful relief in practice. They are not only infrequently granted, but also difficult to request due to the rarity of the requests and the level of approval required. Three interviewees reported awareness of a waiver having been granted for contractors operating overseas, and one familiar with the waiver process reported that it took almost two years because the agency was both unaccustomed to that process and concerned about the repercussions for having invoked the waiver in the event of a cybersecurity breach. This delay is consistent with the prospective statement that waivers would be granted only as a “last resort.” It does, however, pose a significant concern for contractors whose contracts implicate the geographic range of Huawei’s 5G technology. Moreover, a waiver under one contract will prove of limited value if other contracting officers refuse to pursue one under a different solicitation based on the “does use” certification in the SAM.gov database.

The exceptions, in turn, offer limited relief that will probably be undermined by the significant risks facing any party seeking to take advantage of them. The Section 889 program, as implemented through the FAR, is a tool wielded and gate guarded by contracting professionals rather than IT professionals. Anecdotally, contracting officers do not always understand what contracts or technologies carry a high risk of data breach via Chinese telecommunications equipment. More specifically, they are not comfortable invoking the exceptions in the face of their uncertainty as to its application. In this current environment of mistrust in Chinese firms, contracting officers also face a high downside risk for invoking the exception to contract with a firm using Chinese-sourced telecommunications or video surveillance equipment. As a result, the exceptions will likely not be underutilized even when they would appear to offer necessary and appropriate relief. The provision for waivers and exceptions, then, does little to reduce the impact of the ban.

Finally, one interviewee observed that Section 889 has been more of a “compliance” regime than a cybersecurity one. The interviewee who identified this concern explained that, with Section 889, contracting officers focused more on the contractors’ certification of compliance rather than the avoidance of certain risks of data breaches from insecure technology. This focus follows in part from the structure of the statute itself, inasmuch as the ban applies to all contracts without reference to specific risks.

It also, however, follows from the decision to make this cybersecurity measure a question for contracting officers. Contracting officers do not tend to have meaningful cybersecurity experience and so will not be able to identify which procurements, contracts, and contractors involve higher levels of risk from the particular concerns that motivated Section 889. They will not often have the tools to identify when a closer look at a contractor certification is warranted or to evaluate the sufficiency of the inquiry on which the certification is based. This may push agencies to treat Section 889 as a compliance regime in which the risk is that the contractor fails to certify compliance rather than that any particular threat to cybersecurity is incurred or mitigated. The interviewee who raised this matter expressed reservations about the effectiveness of such an approach in the realm of cybersecurity, as it led to a disconnection between the IT professionals, the contracting offices, and the industry. As another interviewee put it, the regime consisted in large part of “[taking] the contractor at its word, which seems counterintuitive.” Together, these factors ensure that the focus lies on compliance rather than the reduction of identifiable risks.

This interpretation was not unanimous, however. A different interviewee identified as costs—and indeed benefits—of Section 889’s implementation the additional scrutiny applied by agencies themselves to the sourcing of the components of procured supplies, as well as a general sense of heightened caution in procurement generally. According to either assessment, however, the effectiveness of the regime actually to achieve cybersecurity goals depends on the capacities of the implementing procurement teams.

2. Interviewees Identified the Impact of Section 889 on Technology Procurement

The interviewees generally agreed that Section 889 has impaired, to some extent, the ability of procuring agencies to access emerging technology. Covered firms are critical sources for technology used in radios, virtual reality, cameras, and display screens. At the time of implementation, one firm that overwhelmingly dominated the market for commercial drones used covered Chinese technology and so was no longer available, leaving contractors unable to substitute. Likewise, in a procurement for equipment requiring virtual reality technology, the supplier was unable to find any substitute after Section 889 ruled out the initial solution. These affected areas of technology will continue to increase in importance, as virtual reality is becoming a more important tool for training and because, as one interviewee put it, “networking makes 889 into a rule for everything.”

As a result, Section 889 poses the risk of limiting the sources of critical technology, even to the point of limiting entire classes of critical technology, at least for a time. Some vendors experienced initial delays in sourcing alternatives, while others were initially unwilling to certify in the face of opaque supply chains. Indeed, some commercial technology companies continued to refuse to tell government contractors whether they used covered equipment and services in response to Use Prohibition “reasonable inquiries.” Nevertheless, the interviewees agreed that, with time, DIB firms have generally been able to find substitutes quickly and effectively.

Certain areas of difficulty have persisted however. As was noted above, the covered firms are effectively the only source for certain classes of technology: cellular phone network infrastructure used worldwide, particularly 5G, components for radios, virtual reality, cameras, and display screens, commercial drone technology, and virtual-reality technology. In addition, one interviewee pointed out that the market’s adaptation to a broader pressure to exclude Chinese-associated firms has created a risk out of the participation by Chinese firms in Silicon Valley. Silicon Valley is a significant source of innovation, and much of the investment in Silicon Valley firms is from Chinese banks. The interviewee postulated that actions tending to exclude Chinese firms from U.S. infrastructure might interfere with the U.S. Government’s ability to access this source of innovation.

Other downsides in the contracting process have persisted as well. Procurements have faced continuing delays as both prime contractors and agency industrial security processes have increased their scrutiny of components’ provenance. In addition, the loss of access to lower-cost options has meant higher prices overall. Finally, Section 889 has added compliance costs and delays for government agencies, where agencies expend labor in certification checks. One interviewee cited the so-called “procurement trilemma”—the common understanding that, of the three desirable characteristics in a procurement (good, fast, or cheap), procuring agencies must choose two—and opined that Section 889 has altered the balance by moving agencies away from both fast and cheap.

The foregoing comments applied with particular salience to Other Transactions (OT). OTs are instruments for the purchase of goods or services that are neither “procurement contract[s], cooperative agreement[s], [n]or grant[s];” several federal agencies, including DoD, are authorized to enter into these OTs. Because OTs are not procurement contracts, cooperative agreements, or grants, they are “not subject to the law, regulations, and other requirements applicable to such contracts, agreements, and grants,” which permits flexibility in the procurement process. This flexibility, in turn, allows agencies to obtain goods and services from leading technology firms that did not have experience doing business with the federal government or sufficient appetite to navigate the suite of laws, regulations, and other requirements. As a result, agencies commonly use OTs to purchase cutting-edge commercial technology, which projects often use commercial parts for which it was more difficult to certify the source down to the sub-component level. Moreover, OT suppliers previously faced no comparable limitations in sourcing, whereas, at least for traditional DoD contracts, the DFARS already required sourcing from qualified countries for a significant portion of procurements. Likewise, the non-traditional firms who participate in OTs were not generally accustomed to using the FAR or working with the U.S. government, and many were not even aware of the Section 889 list at the time of implementation.

Section 889’s implementation also reflects a significant shift in the realm of OTs because agencies usually took advantage of the OT’s flexibility to craft the cybersecurity requirements based on a case-by-case analysis. In such cases, cybersecurity, including sourcing of components, was one of several competing concerns for source selection. Section 889, however, has converted these concerns as they relate to covered components into a ban and thus left them outside the realm of tradeoffs.

According to interviews, a key solution to these challenges has been education of the DIB. Traditional contractors initially experienced delays and required contract modifications to substitute banned equipment, but such instances have been increasingly rare as firms adapted. In the OT sphere, procuring officials have avoided delays and design changes by ensuring that potential offerors are aware at the outset that the Section 889 requirements apply and are, in practice, non-negotiable. Agencies have also worked with the consortia that manage many groups of OT participants to introduce Section 889 in the requests for white papers, agency- and consortia-provided trainings, and the basic information otherwise provided to potential OT participants.

3.
Interviewees Identified the Effects of Section 889 on the Defense Industrial Base

The adaptations to Section 889 in the DIB reflect an interesting outcome of its implementation: the displacement of Chinese firms more generally from the DIB. Interviewees familiar with OT consortia and traditional procurement alike have noted that agencies have tended to eschew Chinese-sourced technology, even from firms not covered by Section 889. Partly because of a lack of contractor sophistication, the ban may also have generally contributed to an environment in which government suppliers simply avoid Chinese telecommunications and video-surveillance technology entirely. One interviewee reported cases in which contracting officers instructed contractors that they could not use components or articles manufactured by Chinese firms unrelated to the covered equipment and services. In addition, the implementation of Section 889 has created a general reluctance to use not only the banned Chinese vendor, but also foreign vendors generally, for fear that those other suppliers may utilize banned components. In addition, potential contractors from countries other than China have often been unable to flow down the certification as their subcontractors simply cannot or will not comply. With less confidence, some have suggested that the demand for substitutes may have stimulated domestic firms to fill in where no acceptable substitute for Chinese technology is currently available. To the extent Section 889 has these effects, it would only be one part of a larger trend of pushback against Chinese technology in domestic markets, as well as the markets of U.S. allies.

The removal of covered technology from the market has led to other, less desirable outcomes. Chiefly, Section 889 has removed access to some low-cost options. In certain areas, implementation of Section 889 will effectively rule out the lowest price technically acceptable (LPTA) competition because, as a matter of course, the putative LPTA technology is covered by Section 889. Elimination of the actual low-price option levels the playing field between the other competitors, thereby removing downward pressure on cost. As a result, one experienced contracting officer opined that, going forward, contracting officers would have to focus on negotiating to obtain suitable prices.

That cost will, of course, ultimately be borne by the government, but it will also likely alter the competitive landscape. Larger, traditional, defense contractors may be better situated to pass on these higher costs than smaller firms. Moreover, Section 889, as yet another rule applied to government procurement but not the private sector, may also serve as a barrier to entry for new, smaller entrants into the DIB. On the other hand, smaller contractors with a single legal entity and a smaller inventory will likely have less trouble identifying any problematic equipment or services either in use or in their smaller catalogs. Overall, however, this effect exacerbates a problem that the U.S. government has already spent much effort to ameliorate.

In sum, DIB contractors have adapted to Section 889 by finding substitutes for Chinese components in their own products and requiring their suppliers to certify compliance in their own right. Federal agencies generally achieved their procurement goals with these adaptations. They have, however, tended to focus on ensuring that suppliers make the requisite certifications and avoid supplies that may contain covered technology, rather than on identifying and addressing specific cybersecurity risks posed by such technology or services. Finally, these compliance practices have raised costs and tended to exclude Chinese goods from the U.S. procurement market to a degree even greater than the already broad statutory language of Section 889 already did.

IV. The Cyber-Security Model Maturity Certificate

The Department of Defense has developed its own cybersecurity initiative, CMMC, which, in October 2024, after several years of public deliberation and revision, DoD released in its second iteration, CMMC 2.0. With CMMC, DoD has taken a very different approach from that taken with Section 889. Where Section 889 relies on the broad exclusion of Chinese firms from the DIB to ensure protection of government information, CMMC relies on a regime of best practices and assessments graded to the sensitivity of the information at question.

Put simply, the CMMC is a suite of standard practices for the protection of federal information in the DIB and a framework for certifying contractors’ implementation of those practices. DoD created it as a response to an increased risk of the loss of federal information from the DIB. Recognizing the costs of malicious cyber activity to the U.S. economy and the related need to build the security and resiliency of the DIB, DoD designed CMMC as “the [DoD]’s metric to measure a company’s ability to secure its supply chain from cyber threats, protecting both the company and the department,” a “unified cybersecurity standard” for DoD’s acquisitions to “[p]erpetuate a collaborative culture of cybersecurity and cyber resilience.”

CMMC establishes minimum standards of cybersecurity for DoD contractors handling FCI, including CUI, except under contracts for COTS. There are three levels of required cybersecurity practices, most of which are already required by the FAR, with the level of requirements based on the sensitivity of the information being handled under the contract. Compliance, in turn, will be assured through the mandatory assessment performed by DoD contractors, third-party certification bodies, or the government, depending on the level of risk (the latter termed “certification assessments”). Finally, all defense contractors and subcontractors handling U.S. government information not intended for public release, including but not limited to CUI, as well as the vendors these contractors hire to handle that data, will be required to achieve some level of CMMC certification.

DoD introduced its first draft of the CMMC framework in September 2019 and released version 1.0 of CMMC in January 2020. Initially, CMMC imposed a series of requirements across five levels of stringency and required security audits of contractors by third-party assessment organizations. While CMMC 1.0 borrowed many of the requirements from standards promulgated by NIST in other contexts—NIST SP 800-171 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations; and for certain programs, NIST SP 800-172 Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171—it did not mirror those standards so that CMMC represented new demands on contractors. Critics complained about this proposed approach, arguing that it imposed requirements on many firms that lacked the cybersecurity infrastructure to comply and created ambiguity concerning coverage. DoD nevertheless continued to implement the program. In September 2020, DoD published an interim DFARS rule implementing the program effective November 30, 2020, albeit with a five-year phase-in period during which compliance would only be required in select pilot contracts approved by the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD (A&S)).

Congressional hearings followed, and DoD initiated an internal review of the program, with the result that, in November 2021, DoD announced a much-streamlined CMMC 2.0. CMMC 2.0 was designed to reduce costs, particularly for small businesses, to increase trust in the assessment program, and to clarify and align DoD’s cybersecurity requirements with other federal requirements and commonly accepted standards. In the same publication, DoD announced that it would suspend the CMMC piloting efforts until CMMC was codified through formal rulemaking.

Reflecting its history, CMMC 2.0 maintains the standardization, universal application, and tiered model appearing in version 1.0, while reducing the number of levels to three, setting cybersecurity standards consistent with the existing FAR and NIST standards, and imposing less onerous certification assessment requirements. The salient features of each level are discussed below, but, because the FAR already requires most DoD contracts to comply with these cybersecurity standards, the most important innovation is the certification assessment requirement.

CMMC will not take effect until the program requirements have been implemented in the DFARS. As noted earlier, in October 2024, DoD completed the review process announced in November 2021 and issued a final rule providing the complete contents of the regulations enacting the CMMC 2.0 program. In addition, on August 15, 2024, DoD issued a proposed rule that identifies how the CMMC requirements will be implemented in DoD contracts. The comment period on this proposed rule ran through October 15, 2024. Assuming the proposed rule amending the DFARS is finalized by the end of 2024, DoD contracts could begin requiring CMMC compliance in early 2025, though the program will have a staged implementation over a three-year period.

A.
CMMC Level 1 Imposes Fifteen Security Practices and a Self-Inspection Requirement on Contractors Handling Uncontrolled Federal Contract Information

Once in effect, CMMC will require solicitation documents to identify the applicable CMMC level. CMMC will apply to all contractors and subcontractors under all contracts above the micro-purchase threshold, except for COTS. CMMC Level 1, the least complex and onerous level of CMMC, will apply to all contracts under which the contractor will hold FCI. This is the CMMC level that DoD estimates will apply to the majority of contractors subject to CMMC. It imposes the fifteen security practices found in FAR 52.204-21 since 2016, discussed further below, and requires affirmation of compliance through annual self-assessment.

Substantively, Level 1 represents no significant change. Level 1 will require of contractors handling FCI the same cybersecurity activities that FAR 52.204-21 has required since November 2021. Accordingly, the differences anticipated under CMMC are formal rather than substantive: in addition to conducting these activities as a matter of contract performance, CMMC requires contractors to assess their own performance and affirm that they have performed.

The fifteen cybersecurity activities themselves—called “security controls”—provide general narrative descriptions of best practices. The security controls include the limitation of access to and authentication of users on the system in question, the control of connections to external and public information systems, the maintenance of physical and logical barriers to protect the system, and the control of physical access. An example of the first security control gives an idea of the form these standards take: “[l]imit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).” The others operate at a comparable level of generality, identifying the desired action without stipulating the hardware, systems, or procedural solutions that the contractor should adopt to undertake that action. As a result, accomplishment of each security control implies the implementation of some unidentified set of hardware, software, or procedural solutions to accomplish the desired end state.

B.
CMMC Level 2 Imposes 110 Security Practices and an Inspection Requirement on Contractors Handling CUI Other Than the Most Sensitive

Level 2, the “Advanced” level of CMMC, applies to companies with CUI on their information systems. It consists of the 110 practices that make up the whole of NIST SP 800-171 Rev. 2. Level 2 also requires triennial assessments conducted by a third party for contractors with critical national-security information, and self-assessments for other selected programs. DoD estimates that more than a third of contractors to which CMMC applies will be required to comply with Level 2.

NIST created NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, to further its statutory responsibilities under FISMA. Since 2015, DoD has required all contractors, except under contracts for COTS items, to comply with the requirements of NIST SP 800-171 and to submit the results of a self-assessment. It sets out recommendations for protecting the confidentiality of CUI through 110 practices across fourteen “facilities” of requirements, each of which represents a general category of activity. These fourteen facilities are the following: access control, awareness and training, audit and accountability, configuration management, identification and authentication, incident response, maintenance, media protection, personnel security, physical protection, risk assessment, security assessment, system and communications protection, and system and information integrity.

Each of the fourteen facilities contains requirements in the form of general narrative descriptions of the best practices. These best practices, in turn, consist of “basic” requirements, which provide broad instructions for safeguarding federal information and the systems containing it, and “derived” security requirements that supplement the basic security requirements. For example, the “Media Protection” family contains three basic requirements: “Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital”; “Limit access to CUI on system media to authorized users”; and “Sanitize or destroy system media containing CUI before disposal or release for reuse.” From these basic requirements are derived additional requirements that provide detail as to how the basic requirements are achieved:

• [[BL]]“Mark media with necessary CUI markings and distribution limitations”;

• “Control access to media containing CUI and maintain accountability for media during transport outside of controlled areas”;

• “Implement cryptographic mechanisms to protect the confidentiality of CUI stored on digital media during transport unless otherwise protected by alternative physical safeguards”;

• “Control the use of removable media on system components”;

• “Prohibit the use of portable storage devices when such devises have no identifiable owner”; and

• “Protect the confidentiality of backup CUI at storage locations.”

[[BL]]The other families are similar in structure, though not all have derived requirements. Unlike the “Foundational” requirements for CMMC Level 1, NIST SP 800-171 provides further discussion paragraphs defining terms and explaining how the tasks may be accomplished.

For those contractors subject to Level 2 but without information critical to national security, Level 2 requires self-assessment, as with Level 1. For contractors on prioritized contracts—those with information critical to national security—Level 2 imposes the most salient feature of CMMC, outside certification assessment. Under CMMC Level 2, these contractors will have to obtain third-party certification on a triennial basis. In January 2020, to effectuate this requirement, DoD created a CMMC Accreditation Body, made up of members of the DIB, the cybersecurity community, and the academic community, which body will, in turn, accredit CMMC Third Party Assessment Organizations (C3PAOs) and the CMMC Assessors and Instructors Certification Organization (CAICO).

These C3PAOs will audit defense contractors to verify that they are meeting the certification assessment program’s requirements, which include “the most rigorous standards for protecting [CUI] and non-federal networks.” The responsibility will fall on the contractor to obtain the needed assessment certification, including coordinating and planning the CMMC assessment. DoD has provided guidance identifying the assessment objective for each of the requirements in NIST 800-171, and the anticipated physical examination, testing, and interviews of contractor personnel. This third-party certification assessment, for which there was no prior equivalent, represents the biggest change for Level 2 contractors from previous DoD cybersecurity requirements.

C.
CMMC Level 3 Imposes More Than 110 Security Practices and a Government-Inspection Requirement on Contractors Handling the Most Sensitive CUI

Level 3 applies to contracts, the performance of which requires handling the highest priority CUI. It will be used to provide additional protection for CUI when contractors handle information “associated with critical programs or high value assets.” This level will apply to the very small minority of CMMC-covered contractors holding the most sensitive information.

Following the tiered approach, Level 3’s requirements are stricter than Level 2’s, incorporating the 110 practices of Level 2 while adding 24 additional practices aligned with NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information. NIST SP 800-172 contains 35 of these enhanced requirements, organized and numbered so that NIST SP 800-171 and NIST SP 800-172 can be combined to provide a single “enhanced” list of 145 requirements across 14 families. The rule implementing CMMC identifies the specific 24 practices from NIST SP 800-172 that CMMC Level 3 will require.

As the title suggests, NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information, contains “enhanced requirements” intended to “supplement the basic and derived security requirements in NIST Special Publication 800-171.” NIST designed these enhancements to counter more sophisticated adversaries who seek to maintain their footholds within infrastructure over time, including by adapting to defensive measures. The requirements in SP 800-172, then, assist organizations not only to resist penetration but also to limit damage and to build resilience and survivability in the event of breach. As a result, while the SP 800-171 focuses primarily on the protection of confidentiality, SP 800-172 addresses “confidentiality, integrity, and availability protection.”

The substantive requirements of Level 3, however, differ in degree, rather than kind, from those of Level 2. Level 3’s additional requirements have a broader focus, as noted above, but the majority of the requirements are in common; and all, even the enhanced requirements adopted from SP 800-172, are similarly framed as general narrative descriptions of the best practice in question. For example, the first “Configuration Management” security requirement (CM.L3-3.4.1e) is to “[e]stablish and maintain an authoritative source and repository to provide a trusted source and accountability for approved and implemented system components.” The requirements of Level 3 thus reflect simply that companies in the DIB with critical CUI will be required to provide additional protections to safeguard that information.

Also consistent with the tiered approach, Level 3 involves a higher level of scrutiny, as appropriate for contractors handling the most sensitive information. To begin, Level 3 certification requires receipt of a CMMC Final Level 2 Certification Assessment as a prerequisite. The U.S. government itself, rather than the contractor or a third party, will conduct the triennial assessment of the contractor’s implementation of the requirements from NIST SP 800-172 that are not required under Level 2.

In sum, then, CMMC represents an adjustment rather than a wholesale change to DoD contractor cybersecurity policy, with additional requirements chiefly for contracts with more sensitive information. At Level 1, CMMC will mandate only what is already required for many contractors under the FAR’s basic cybersecurity requirements, plus a self-assessment. At Level 2, CMMC will require contractors to comply with NIST SP 800-171, as they currently do, and require, for contracts with more important CUI, certification by a third party instead of the current self-certification. Finally, Level 3 will add a layer of “enhanced” security requirements to contracts handling the most critical unclassified information with certification requiring an audit by the government itself. Given this structure, the lessons learned from the implementation of Section 889 will prove of limited applicability.

V. Section 889 Lessons Learned Applied to CMMC

The implementation of Section 889 has created significant effects on both contracting agencies and the DIB, as described in the interviews of procurement professionals outlined above. These effects include limitation of access to cutting-edge technology, uncertainty concerning the scope of Section 889 and the attendant risk of over-application, and cybersecurity benefits that are more hypothetical than real and should interest cybersecurity regulators. A comparison of Section 889 and CMMC shows that these effects are unlikely to arise during CMMC’s implementation because they stem from Section 889’s friend-shoring nature, which CMMC does not share. By contrast, those effects that CMMC will likely share with Section 889 are those effects created by any new regime of requirements, whether cybersecurity or otherwise. The lesson of this comparison, then, is that the adoption of friend-shoring means to achieve cybersecurity brings appreciable downsides that an expert-crafted, best-practices approach like CMMC can avoid. Although the impulse toward friend-shoring will likely continue, policymakers considering future cybersecurity measures should consider this lesson.

To begin with, the areas of expected similarity, those effects that will likely arise in both the implementation of Section 889 and CMMC are those that would arise with the implementation of any new regulation regime. One of the few areas of similarity is the burden on contractors and the associated impact on price. Professionals familiar with Section 889 identified that its implementation might raise contractor costs and otherwise discourage smaller businesses from participating in government procurement. Likewise, commentators have argued that CMMC’s burden may bar smaller contractors from entering U.S. government contract competition, and, more generally, CMMC will require additional efforts by contractors that will likely be reflected in price. These concerns are those that accompany any additional burden on contractors, as the increased cost of performance is a generally observed outcome of adding regulations.

Additionally, it can be expected that education of the DIB will be important in both cases. Interviewees noted that early exposure, particularly among nontraditional firms, to the requirement eased the transition and sped quick adaptation. CMMC, in turn, imposes long lists of requirements and calls for compliance checks for some contractors, which suggests that DIB preparation will be useful. The preparation and education of the DIB, however, are an important process whenever the government imposes a complex set of contractor requirements not related to the details of either program.

By contrast, CMMC will likely diverge from Section 889 when it comes to those lessons learned that relate to the actual contents of the two regimes: the means selected to achieve cybersecurity. Where the key lessons learned under Section 889 were the importance of obtaining subcontractor and supplier certifications and correctly scoping the reasonable inquiry into supplier use of covered equipment and services, CMMC will not require such efforts. As will be discussed below, CMMC does not share those aspects of Section 889 that drove these lessons learned, beginning with the statutory language of Section 889 and including other features that have caused uncertainty under Section 889 in practice, all of which relate to Section 889’s basic friend-sharing approach.

First, of course, the requirements under CMMC are simply different from those under Section 889. Under CMMC the contract tells the contractor which standards it must meet, and these standards are specific, concrete, limited in number, and relate to activities chiefly in the contractor’s control. CMMC has nothing like Section 889’s requirement that contractors certify that they do not supply or use banned products or services.

CMMC also does not appear to share the practical problems that require contractors to obtain certifications from the supply chain. CMMC raises no challenges comparable to those that, under Section 889, face contractors with poor information about components embedded further down the supply chain. Just the same, where Section 889 leaves government agencies with little to do in many cases but rely on the contractors’ assurance, CMMC offers the solution of outside certification for contractors handling more sensitive information.

Likewise, CMMC does not pose the same risk of overbroad application, from which arises the importance of correctly scoping the reasonable inquiry. The risk of inappropriate or unnecessary application of Section 889 rests on its breadth and uncertainty of application; CMMC does not pose such risks. Decisions about its applicability and the appropriate level depend on the nature of the government information a particular contractor will maintain under a particular contract. Moreover, CMMC establishes standards for a comprehensive list of cybersecurity activities, which relate only to access to, and control of, information; and each standard provides a concrete set of required tasks. While each standard may impose a significant burden on contractors, it does not admit the possibility of cybersecurity noncompliance occurring in an area apparently unrelated to cybersecurity—as with the laundry service that uses banned rearview cameras.

Moreover, the consequences of misapplication differ greatly between the two regimes in a way that limits this set of risks for CMMC as compared to Section 889. The risk of misapplication of CMMC is that the agency mischaracterizes the federal information that a contractor will handle during performance, which appears to be a less likely outcome than a contracting officer misapplying the definitions, exceptions, and waivers under Section 889. Further, the misapplication of CMMC would result, most likely, in unnecessary scrutiny of a contractor’s cybersecurity practices. Incorrect application of Section 889, by contrast, can result in federal contractors losing access to sources of components that may be critical or difficult to replace. It can even result in a contractor who uses and certifies using covered equipment in a manner permitted by Section 889 in the performance of a U.S. government contract being then excluded from other opportunities as a result. CMMC does not apparently have such potential. As a result, the application of CMMC will more likely be correct, and the consequences of incorrect application will be less severe. For all these reasons, CMMC’s focus on contractor activities and practices appears to avoid both the causes and effects of Section 889’s uncertainty in application.

Likewise, the main practical effects of Section 889 noted by the interviewees are unlikely to recur under CMMC because of CMMC’s effective assignment of responsibilities for cybersecurity. For example, the structure of CMMC avoids the disconnect between IT professionals, contracting officers, and contractors concerning the adequacy of cybersecurity measures that observers have reported with regard to Section 889. To implement CMMC properly, the contracting officer needs only to identify the sensitivity of the information to be handled under the contract, which can be determined ex ante in the statement of work and the prime contractor’s proposal. The government agency with the requirement is well-situated to provide that information to the contracting officer. The evaluation of compliance, in turn, is left to the contractor, the appropriate third-party, or the government cybersecurity professionals who will do the substantive work of ensuring that the standards are met. No analytical burden falls on the contracting officer.

For the same reason, CMMC does not appear likely to operate as a “compliance” regime in the way that certain interviewees characterized Section 889’s operation. The requirements of CMMC are explicitly calibrated to the risk posed by the information to be secured, and CMMC directly assures a certain level of actual cybersecurity inasmuch as the subject matter experts at NIST have determined that its standards represented best practices to ensure cybersecurity for more sensitive data. Section 889, in contrast, rests on concerns that either lack comparable clarity—such as the legal obligation of Chinese firms to cooperate with Chinese security services—or have not been explicitly articulated—such as the risk posed by security cameras’ transferring intelligence to the Chinese security apparatus. Finally, for contracts with the most sensitive information, the CMMC’s evaluation process itself provides contracting agencies certain assurance that contractors have met those requirements, independent of their certification, at least for Level 2 and Level 3 contracts. This choice can be contrasted with Section 889, where contracting officers will often be unable to determine which components in a supply chain pose the greatest risk and would be forced to rely on contractor certification in any case.

In the matter of U.S. government access to technology, CMMC also raises fewer new obstacles than Section 889. While CMMC standards may favor U.S. contractors inasmuch as they impose standards promulgated by the FAR council and NIST, U.S. bodies both, they do not otherwise favor domestic suppliers. Also, CMMC does not promise to preclude access to particular classes of technology in any systematic sense, in contrast to Section 889, which has an outsized impact on certain technologies for which covered firms are the chief global suppliers.

Consequently, CMMC poses challenges that are fundamentally dissimilar to and likely more limited than those posed by Section 889. The former appears to cause a general burden applied widely, one that, at most, requires increased resources and impacts the ability of individual contractors or the class of small contractors to compete for federal contracts. Section 889, by contrast, not only occupies resources and possibly excludes smaller contractors, but it also has the overall tendency to limit the goods and services available to the government, beyond even the explicit requirements of Section 889.

These differences also highlight the extent to which Section 889’s friend-shoring nature has predominated in its implementation. The experiences of the contractors and agencies interviewed for this paper have confirmed this view, as the most important features the interviewees noted arise from Section 889’s basic concept of requiring the agency, at the contract level, to exclude high-tech components from a global supply chain. Where CMMC’s suite of best practices covers a wide range of contractor activities, applies as well to subcontractors, and requires an arguably intrusive certification process, it nevertheless is poised to avoid the issues encountered with Section 889. The comparison of these two cybersecurity measures, then, confirms that the pursuit of cybersecurity through friend-shoring brings significant downsides that an expert-crafted, best-practices approach like CMMC can avoid.

Cybersecurity will remain a key concern for U.S. agencies, regulators, and lawmakers as information technology continues to promise the U.S. government greater capabilities for action and defense, and to offer adversaries asymmetrical vulnerabilities to exploit. Agencies, regulators, and lawmakers considering future cybersecurity measures should consider the lessons of this comparison when deciding on the appropriate means to achieve their cybersecurity ends. This lesson is particularly important given the current popularity and likely continued adoption of security-of-supply or friend-shoring measures in the future in the wake of U.S. Government concerns about competition with China.

As the structure of Section 889 shows, cybersecurity and friend-shoring can be pursued in a single statute. Setting aside the wisdom of such friend-shoring measures for achieving security of supply itself, the lessons learned noted in this article clearly show that friend-shoring as a cybersecurity tool has unique downsides—including the loss of access to technology, burdens on industry, and a chilling effect on arguably permissible activity—that lack a clear relationship with desired cybersecurity outcomes. In a time when friend-shoring is popular and available, policymakers concerned about cybersecurity should consider very carefully these downsides and the availability of alternative schemes, like CMMC, that deliver security outcomes with less disruption, confusion, and loss of technological advantage.

VI. Conclusion

In short, this evaluation of the lessons learned from the implementation of Section 889 in light of CMMC demonstrates that CMMC and Section 889 will likely have in common only those effects that arise with the addition of any general requirement. By contrast, the most serious challenges resulting from Section 889 stem from specific features implementing its friend-shoring policy and will not be seen with CMMC. This evaluation, then, demonstrates that the pursuit of cybersecurity through friend-shoring means creates a set of challenges for both agencies and the DIB that a best-practices regime can avoid. The recent history of friend-shoring activity and the current geopolitical situation, moreover, shows that such security of supply measures will likely continue to be a significant feature of procurement. As a result, this conclusion will remain relevant for policymakers considering future cybersecurity measures.

Mr. Anderson is an attorney with the United States Navy Sea Systems Command, Office of Counsel, as well as a Judge Advocate in the United States Air Force Reserve. This paper was submitted in partial satisfaction of the requirements for the degree of Master of Laws in Government Procurement Law at The George Washington University Law School. The views expressed in this paper are solely those of the author and do not reflect the official policy or position of the United States Navy, United States Air Force, Department of Defense, or U.S. Government.