System for Award Management (SAM) Changes

System for Award Management
System for Award Management
Photo by Kendall Hoopes

The System for Award Management (SAM) has undergone significant changes under the Revolutionary FAR Overhaul (RFO). This RFO initiative is an effort by the Office of Federal Procurement Policy (OFPP), the Federal Acquisition Regulation (FAR) Council, and the General Services Administration (GSA) to support sound procurement for government contracts.  It is being initiated in an effort to unveil Ultimate Beneficial Owners (UBO) in organizations that are part of complex corporate structures that often are construct to hide entities involved in illicit and hostile activities.

What SAM Changes Mean for Businesses

The System for Award Management is a U.S. government e-procurement system that collects and manages data from suppliers, allowing them to register to do business with the federal government.  SAM simplifies the process for vendors and federal agencies by providing a single platform for managing entity information. 

Under the revised arrangement, which is expected to be implemented in January of 2026, all businesses will need to provide representations and certifications that are specific to the entity when registering for SAM.  It is stressed that organizations pay special attention to SAM interactions as this transition period may require duplicative efforts with regards to registration updates.  It is, however, anticipated that the revised process will be more efficient and easy to navigate.

Complex Corporate Structures Concealing Illicit Actions

Complex corporate structures can obscure ultimate ownership of listed entities by using multiple layers of ownership across different jurisdictions.  This makes it difficult, if not impossible to trace who is really in control.  Organizations often use shell companies, trusts, and nominee arrangements, to separate legal ownership from beneficial ownership.  This can make it easier to launder funds, evade sanctions, and circumvent regulations.

The U.S. government is focusing on these issues from all sides.  This includes government acquisitions, law enforcement against organizations involved in narcotics smuggling, and regulations preventing export of sensitive technologies to protect U.S. national security and foreign policy.

Bureau of Industry and Security Affiliates Rule

The Bureau of Industry and Security published its interim final Affiliates rule in September of this year.  This rule would expand export restrictions to foreign entities that are owned by 50% or more by listed parties. This would include parties on the Entity and Military End User (MEU) lists.  It would also place the onus of parsing obscured corporate ownerships on exporters, increasing the potential for involuntary violations of the Export Administration Regulations (EAR).

This so called 50% Rule has been temporarily delayed for one year, starting from November 10, 2025, as part of trade negotiations between the U.S. and China. This pause allows exporters and compliance teams time to adjust to the rule’s requirements before it is reinstated on November 10, 2026.

CVG Strategy Export Compliance Management Programs

Changes to the System for Award Management show the government’s intention to reveal dishonest corporate structures that hide harmful entities.  These efforts are being shared by other federal agencies to prevent the illegal export of strategically significant technologies.  As such, exporters should be on guard to ensure that parties to transactions are above board to prevent unintentional violations of export regulations.

Export Compliance Management Programs establish clearly defined policies and procedures for all departments within an organization.  They ensure that registration, item classifications, license applications, denied part screening, and security measures are taken that will prevent violation.  They also ensure that training, auditing, and record keeping are maintained according to requirements.

CVG Strategy can help you understand revisions to the International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR), and help you establish a coherent and effective export compliance program.   We can perform export control classifications, perform audits, assist in filings for export licenses and educate your team.  Regardless of whether your business falls under EAR or ITAR, CVG Strategy has the expertise to help. 

Cyber Insurance and Business Cyber Risk Management

cyber insurance
cyber insurance
Photo by Kampus Production

Cyber insurance has become a larger part of the cybersecurity risk management process for businesses. This is due to the rising potential impacts of cyber threats to sensitive data.  As a result, cyber liability insurance market is changing rapidly.  These changes include reduced coverage limits, increased premium, and requirements for adequate security controls for cyber coverage. 

Trends in the Cyber Insurance Industry

In the last few years the cyber insurance industry has seen a marked growth of small and medium sized enterprises are realizing that a cyber incident could destroy their businesses.  As a memorandum released by the National Association of Insurance Commissioners (NAIC) points out however, cyber insurance is no substitute for a sound cybersecurity program.

The global cyber insurance market is projected to be worth over $20 billion by the close of 2025. The number of businesses taking out cyber insurance policies has risen to 62% of firms in 2025 compared to 49% in 2024.  The market is expected to continue growing, with projections suggesting it could reach nearly $30 billion by 2030.  Meanwhile, premiums have decreased by about 6% in 2025 compared to the previous year.

Requirements for Obtaining Cyber Insurance

Businesses must. at a minimum, employ specific security requirements.  These requirements include the use of Multi-Factor Authentication (MFA), Endpoint Detection and Response (EDR), scheduled backups, vulnerability management, and cybersecurity training.

Remediation efforts should be documented to reflect patches and configuration changes.  Lastly, monitoring and reporting functions should be performed to identify new vulnerabilities and implement remediations in an effort to continually improve the organization’s security posture.

Vulnerability management involves identification of devices, software and computer systems within an organization.  These assets should be scanned for vulnerabilities on a regular schedule.  Risk assessments should be conducted when vulnerabilities are identified and accepted risk management frameworks should be used to rank them. 

Remediation efforts should document patch management and configuration changes.  Additionally, continuous monitoring and reporting should be conducted to identify new vulnerabilities and remediate them.

Insurers may also require incident response plans to address cyber incidents and data breaches.  They may also look for documented security policies that adhere to specific industry standards and regulations.  Failure to meet these requirements can result in application rejection or higher premiums.

Business Regulatory Requirements for Information Security

Businesses must comply with various cybersecurity regulations that depend on their industry and location. Key regulations include the Health Insurance Portability and Accountability Act (HIPAA) for healthcare, the Gramm-Leach-Bliley Act (GLBA) for financial services, and the Payment Card Industry Data Security Standard (PCI DSS) for companies handling credit card information.

In addition to regulatory requirements, government contractors must adhere to specific contractual requirements to protect sensitive information. These requirements are primarily driven by the Department of Defense (DoD) and include compliance with the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) guidelines.

CVG Strategy Cybersecurity Consultants

Cyber insurance trends reveal that many small businesses are facing challenges meeting cyber security requirements because of limited budgets, a lack of qualified personnel, and the complexity of standards.  CVGS can provide guidance and help your organization understand and implement contractually required NIST standards and CMMC.

We are dedicated to helping small businesses navigate federal regulations and contract requirements for Quality Management, CybersecurityExport Compliance, and Test and Evaluation. We can help you meet your information security management system goals.  CVG Strategy QMS experts can provide the training required to understand and engage in a ISMS and make it meet desired objectives.

Identify CUI Areas with CVG Strategy Signs

CVG Strategy provides signs to identify areas containing CUI and export controlled items. These signs should be posted at all facility entrances where products are being produced or services are being performed that are under the control of the U.S. Department of State Directorate of Defense Trade Controls (DDTC) and are subject to the International Traffic in Arms Regulations per title 22, Code of Federal Regulations (CFR), Parts 120-130.

MIL-STD-461 Documentation – Test Plan Requirements

MIL-STD-461 documentation
MIL-STD-461 documentation

MIL-STD-461 documentation development is a requirement in preparing for testing.  Test plans should include the content called out in DI-EMCS-80201 Electromagnetic Interference Test Procedures (EMITP).  This content includes a table of all MIL-STD-461 procedures to be performed, description of the Equipment Under Test (EUT), and any approved exceptions or deviations.  Other requirements include test site and test equipment requirements, EUT setup, and EUT operation.

MIL-STD-461 Overview

MIL-STD-461 Requirements for the control of Electromagnetic Interference (EMI) Characteristics of Subsystems and Equipment is a Department of Defense standard that outlines the testing requirements for Electromagnetic Compatibility (EMC) of equipment.  While primarily applicable for equipment designed for military platforms, the standard is also utilized for testing electronic systems for space and civilian applications.

The standard is comprised of 19 different procedures, the requirements for which are based on type of equipment under test and specific platform and service for which the equipment is intended.  Procedures are broken up into two major categories, emission tests and susceptibility tests. 

Emissions limits for the EUT are set for both radiated and conducted emissions.  Numerous susceptibility tests are available for conducted and radiated susceptibility in the magnetic, electrical, and electromagnetic fields. Specific testing methods are dedicated to antennae ports and power leads.  Additionally, method CS118 replicates personnel borne electrostatic discharge.

Test Tailoring for Equipment Designed for Harsh Electromagnetic Environments

Tailoring of the test plan is essential to ensure proper testing under MIL-STD-461.  For example, pass/fail criteria for specific modes of operation should be detailed so that test witnesses and laboratory personnel can identify anomalies during susceptibility testing.  Additionally, performance checks should be defined to ensure that the EUT has not been damaged by susceptibility testing.  

Test requirements and procedures for space applications can often exceed those defined in military test standards. This can often be the case for radiated emissions where the limits for certain frequency bands are extremely low. To achieve these measurements, MIL-STD-461 defined scans can be performed at reduced Resolution Bandwidths (RBW) as documented in AIAA S-121A . These options must be detailed in the test plan to communicate requirements with test facilities.

CVG Strategy Test Plan Templates

CVG Strategy offers Test Plan Templates for EMI/EMC and Electrical Compatibility Testing.  These plans have been developed for MIL-STD-461, MIL-STD-1275, MIL-STD-1399, and MIL-STD-704.

EMI/EMC and Electrical Test Plan Packet

  1. Test Plan Template (protected PDF).  This document provides essential information concerning: Equipment Under Test (EUT) set up, execution of each procedure, pass/fail criteria, and tolerances per the relevant standard.  All test plans are written per the requirements of DI-EMCS-80201C.
  2. Test Plan Addendum (Word Document).  This document is to be completed by the customer.  It addresses equipment to be tested specific information including:  EUT Description, EUT Set up, Modes of operation, and Performance Checks.
  3.  Test Lab Data Sheet (PDF form).  This document is used to document procedures to be performed and essential test parameters.  It also documents test facility report requirements per DI-EMCS-80201C.
  4. Test Label (Word document)  This label is to be used to identify the test performed in photographs.
  5. Tests to Be Performed (PDF form).  This form communicates to the test facility all test procedures to be performed during test sequence.
  6. Procedure Specific Worksheets (PDF form).  These worksheets are included where appropriate to assist the test witness in recording test events.

CVG Strategy

Our experts at CVG Strategy have extensive experience in EMI/EMC.  Our test and evaluation experts can provide requirement analysis, write MIL-STD-461 documentation, perform test witnessing, and provide troubleshooting and analysis of EMI/EMC test failures. 

We also have expertise in Environmental testing and evaluation of product design in a number of industries and products, both military and commercial.  CVG Strategy specializes in Independent Developmental Testing and Evaluation including: Development of Life Cycle Environmental Profiles, Test Plans, Test Witnessing and Troubleshooting.

CVG Strategy is a consultancy offering coaching, mentoring, training and program development focused on areas including Business Process Improvement, ITAR and Export Compliance, Cyber Security and Quality Management Systems.

American AI Export Program Announced

American AI Export
American AI Export
Photo by Google DeepMind

The U.S. Department of Commerce has announced the launching of the American AI Exports Program.  This initiative is part of a larger effort by President Donald Trump to advance the United State’s leadership in advanced technologies.  The program will include hardware, software, applications, models, and  full stack AI export. Full Stack AI refers to a comprehensive approach of building applications that utilize artificial intelligence across all layers of development.

Department of Commerce Export Promotion for AI

The Department of Commerce has launched a Request for Information (RFI) site to invite public comments from the artificial intelligence and the science and technology sectors. Feedback and proposals received from the RFI will be evaluated by the Secretary of State, the Secretary of War, the Secretary of Energy, and the Director of the Office of Science and Technology Policy.  

The interagency Economic Diplomacy Action Group will support qualified full stack AI package exports upon final approval. The Department of Commerce will continue to provide updates as implementation progresses.  Commerce will also launch a new website to facilitate communication between potential foreign buyers and American AI technology providers.  Additionally, Commerce will partner its leverage with the Department of State to support this advance of America’s global leadership internationally. 

Export Import Bank Involvement

The Export Import Bank of the United States (EXIM) is making use of its financing tools to finance exports of transformational technology sectors.  This effort will help companies developing AI to compete in global markets.  The agency is encouraging U.S. AI companies to explore opportunities for financing their development of American AI Export.

Export Controls on Advanced Technologies

Organizations engaged in the export of advanced technologies including AI should be mindful that stringent export regulations are still in place for this sector.   AI integrated circuits and associated articles, commodities, services and technical data are controlled under the International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR). 

Parties that engage in transactions without prior authorization from the Directorate of Defense Trade Controls or the Bureau of Industry and Security are subject to possible criminal and civil penalties if violations occur.  These transactions include the export, reexport, or in-country transfers of regulated commodities. It is important, therefore, to conduct classifications, denied parties screening, and to ensure appropriate end-use in the case of dual use items.

The BIS has released Industry Guidance to Prevent Diversion of Advanced Computing Circuits.  This document contains a  revised set of red flags that organizations should use to screen potential transactions.

CVG Strategy Export Compliance Management Programs

Organizations involved with export must adhere to regulations regardless of export regulations effectiveness.  Remaining informed and having an effective export compliance program is essential for avoiding criminal and civil penalties.

Export Compliance Management Programs establish clearly defined policies and procedures for all departments within an organization.  They ensure that registration, item classifications, license applications, denied part screening, and security measures are taken that will prevent violation.  They also ensure that training, auditing, and record keeping are maintained according to requirements.

CVG Strategy can help you understand revisions to the International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR), and help you establish a coherent and effective export compliance program.   We can perform export control classifications, perform audits, assist in filings for export licenses and educate your team.  Regardless of whether your business falls under EAR or ITAR, CVG Strategy has the expertise to help. 

Counterfeit Part Prevention Trends and Developments

counterfeit part prevention
counterfeit part prevention
Photo by Soly Moses

Counterfeit part prevention remains a high priority for the aerospace, defense, and electronics sectors in 2025.  Unauthorized parts when used in critical applications can lead to catastrophic failures.  Counterfeit components can include remarked parts or cloned components that are illegally manufactured.

There is an escalating trend for counterfeit parts in most manufacturing sectors.  Components at risk in the defense and aerospace industry include semiconductors, fasteners, electronic assemblies, and composite structures. 

US Federal Governmental Actions

The US Government has instituted contractual requirements for defense contractors by way of DFARS 252.246-7007.  This DFAR establishes requirements for contractors to implement and maintain risk-based policies and procedures for detection and avoidance.  Contractors are required to flow down these requirements to all subcontractors, ensuring compliance at all levels of the supply chain. This regulation emphasizes the importance of sourcing electronic parts from trusted suppliers to minimize risks.

The CHIPS Act, enacted on August 9, 2022, was created to promote domestic semiconductor manufacturing and research.  It also promotes semiconductor production and workforce development.  This along with efforts from various U.S. agencies is striving to develop trusted supply chains for Original Equipment Manufacturers (OEMs) in the United States.

AS9100 Quality Management System

AS9100D is a Quality Management System (QMS) based on the structure and content of ISO 9001:2015 with the addition of requirements specific to the defense and aerospace industries.  It includes provisions for customer and regulatory requirements. The standard is applicable to businesses of all sizes who need to consistently provide products and services to specified requirements. Additionally, it provides processes for systematic improvement of the management system and its ability to ensure customer satisfaction.

AS9100 requirements include counterfeit part prevention into manufacturing cycles.  It requires that specific actions be undertaken.  These actions include training, establishment of a parts monitoring program, use of authorized and approved sources, traceability requirements, verification methodologies, monitoring of counterfeit part reports, and reporting and quarantining of detected or suspected counterfeits.

AS5553 Standard for Supply Chain Security

AS5553 – Counterfeit Electronics Parts; Avoidance, Detection, Mitigation and Disposition was created in 2009.  The newest revision, SAE AS5553D, was released in April 2022.  It provides methods, requirements, and practices for parts management, supplier management, procurement, inspection, test/evaluation, and response strategies for designers and manufacturers of electromechanical parts (EEE). 

 These requirements are intended to be integrated throughout the supply chain.  The standard calls for risk-based assessments to establish priorities for mitigation of counterfeit EEE parts.  These assessments should consider vulnerabilities to crucial components, levels of desired performance, and necessary reliability of the product.

Private Sector Solutions

Industry and the aerospace sector in particular are developing solutions for counterfeit detection and supply chain integrity.  In recent developments Boeing and Aeroxchange have replaced paperwork with files that are cryptographically secured.  This system not only adds layers of security to the transfer of verifiable parts but reduces overall turnaround time.

Other companies are continuing the advancement of non-destructive analytical tests such as electrical spot checks, X-ray, and optical miscoscopy.  Additional anti-counterfeit technologies that are in use include hologram and optical variable devices, security inks, RFID tags, blockchain authentication, and tamper evident labels and packaging.

Information Security in the Supply Chain

Adequate information security is essential in ensuring counterfeit part prevention of components, and assemblies in the supply chain.  NIST SP 800-161 provides guidance on managing cybersecurity risks in the supply chain, including concerns about counterfeit parts that may contain malicious functionality or vulnerabilities due to poor manufacturing practices.  Implementation of this standard is a contractual requirement for many government contractors, their subcontractors, and suppliers.  

CVG Strategy Quality Management Experts

Our Exemplar Global Lead Auditor Consultants can help you with integrating multiple management systems.  CVG Strategy has prepared, trained and implemented management systems for manufacturing companies in many business sectors.

Our quality strategy allows clients new to Quality Management Systems to rapidly implement a tailored system, because everything we do as consultants is processed based.  Our Quality Experts have experience with ISO9001:2015, AS9100D, ISO 13485:2016, ISO 27001:2013 and Association of American Railroads (AAR) M-1003 and can readily deliver compliant procedures and work instructions.

CVG Strategy is a consultancy offering coaching, mentoring, training and program development focused on areas including Business Process ImprovementExport ComplianceCyber Security and Product Test and Evaluation

New York Telecom Threat Caught by Secret Service

New York Telecom Threat
New York Telecom Threat
Photo by panumas nikhomkhai

The U.S. Secret Service dismantled a network of devices in New York city that posed a significant telecom threat.  This equipment could have potentially disabled cellphone towers facilitating anonymous communications for criminal activities.  This operation was particularly urgent due to the ongoing United Nations General Assembly meeting with world leaders. 

Equipment at Various Sites Across Tri-State Area

Equipment seized in the investigation included 300 SIM servers and 100,000 SIM cards across multiple sites.  Initial findings indicate that nation state actors may have been involved. The equipment is thought to have been employed for various telecommunications threats aimed at high-ranking U.S. officials.  Forensic investigations are now being conducted on the active cell phones.  

A cellular network disruption generated from this site could have had serious ramifications as it was within 35 miles of the United Nations building.  This assemblage of equipment had the capability to send up to 30 million text messages per minute.  This could have disabled cell phone towers, facilitated encrypted communications between threat actors, and enabled denial of service attacks.  US Secret Service Director Sean Curran stated that bad actors that threaten the United States will be investigated and tracked down.

Action Undertaken by Multiple Federal Law Enforcement Agencies

This federal law enforcement action was taken by the U.S. Secret Service’s Advanced Threat Interdiction Unit.  Technical advice and assistance was provided by the Department of Justice, the Department of Homeland Security, the New York Police Department, and the Director of National Intelligence.  Secret Service special agent in charge Matt McCool stated that conducting the forensics on the 100,000 cell phones will take considerable effort and time.  McCool also stated that it would be unwise to assume that the New York telecom threat did not involve active networks in other cities in the United States.

CVG Strategy CMMC Consultants

After significant delays, the DFARS Implementing CMMC requirements for DoD contractors and subcontractors is here.  Many small businesses face challenges meeting CMMC requirements because of limited budgets and lack of qualified personnel.  CVGS can provide guidance and help your organization understand and implement CMMC.

We are dedicated to helping small businesses navigate federal regulations and contract requirements for Quality Management, Cybersecurity, Export Compliance, and Test and Evaluation. We can help you meet your information security management system goals.  CVG Strategy QMS experts can provide the training required to understand and engage in a ISMS and make it meet desired objectives.

Identify CUI Areas with CVG Strategy Signs

CVG Strategy provides signs to identify areas containing CUI and export controlled items. These signs should be posted at all facility entrances where products are being produced or services are being performed that are under the control of the U.S. Department of State Directorate of Defense Trade Controls (DDTC) and are subject to the International Traffic in Arms Regulations per title 22, Code of Federal Regulations (CFR), Parts 120-130.

CMMC and Export Compliance Program Violations

CMMC and Export Compliance
CMMC and Export Compliance
Image by DC Studio on Freepik

Cybersecurity Maturity Model Certification (CMMC) and export compliance programs should be coordinated efforts driven by upper management to avoid export regulation violations.  A Federal News Network article discussed the fact that CMMC assessments are uncovering unknown export regulation violations.  The article points out the dangers of maintaining compliance programs in separate silos.

Technology Control Plan

A Technology Control Plan (TCP) describes how to protect items and information that fall under export regulations. This includes export-controlled items, technical data, and Controlled Unclassified Information (CUI) at a facility.   A TCP is a key part of an International Traffic in Arms Regulations (ITAR) and Export Administration Regulations (EAR) export compliance program.  It explains basic steps to secure and manage export-controlled technology from unauthorized access by implementing physical security measures and personnel screening.  

The TCP, while important, does not detail the required controls for a comprehensive information security system.  For this reason the DoD has made CMMC a contractual obligation for the Defense Industrial Base.

CMMC Requirements Now in Place

CMMC establishes a tiered framework of cybersecurity standards based on NIST SP 800-171 controls.  The Department of Defense (DoD) created it to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). CMMC assessments are conducted by Certified Third-Party Assessment Organization (C3PAO) based on DoD contracting requirements.  These requirements for CMMC programs fall under three levels:

  • Level 1: Requires an annual self-assessment and affirmation of compliance with 15 basic security requirements.
  • Level 2: Involves a more comprehensive assessment every three years, focusing on 110 security requirements from NIST SP 800-171.
  • Level 3: Similar to Level 2 but includes additional requirements to protect against advanced persistent threats.

Coordination of Efforts Essential

Export compliance programs determine through classification, which articles and technology are subject to export regulations.  They also determine which parties are eligible to access those articles and technology through denied parties screening and licensing.  These actions provide an organization’s cybersecurity team with boundaries to ensure that associated information is kept confidential, intact, and accessible to appropriate personnel.

The two teams must work in conjunction to identify risks. define ensure that mitigating efforts are adequately resourced, and monitor and evaluate actions taken.  Export regulations are in a constant state of flux that alters which technical information falls under regulatory control.  Additionally, threat matrixes are constantly shifting to exploit new vulnerabilities and circumvent cybersecurity protections.

The Role of Upper Management

Upper management must remain informed of both teams’ status and requirements.  Policies should be created and shared to build a culture of compliance. Regular training should be given to support these efforts.  Management must ensure that data is mapped in all departments to identify and protect Controlled Technical Information.

It must also ensure that cybersecurity requirements are communicated to all vendors and contractors.  Ultimately, management’s greatest concern is to ensure that all parties work together to protect the organization from costly regulatory violations and cybersecurity incidents.  Such incidents cannot only result in costly civil and criminal fines but can result in a loss of the organization’s reputation and revocation of export privileges.

CVG Strategy Export Compliance Management Programs

Organizations implementing and maintaining CMMC and Export Compliance programs in the United States face numerous challenges in these rapidly evolving business areas.  Export Compliance Management Programs establish clearly defined policies and procedures for all departments within an organization to prevent.  They also ensure that training, auditing, and record keeping are maintained according to requirements. export control violations

CVG Strategy can help you understand revisions to the International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR), and help you establish a coherent and effective export compliance program.   We can perform export control classifications, perform audits, assist in filings for export licenses and educate your team.  Regardless of whether your business falls under EAR or ITAR, CVG Strategy has the expertise to help. 

CVG Strategy CMMC Consultants

After significant delays, the DFARS Implementing CMMC requirements for DoD contractors and subcontractors is here.  Many small businesses face challenges meeting CMMC requirements because of limited budgets and lack of qualified personnel.  CVGS can provide guidance and help your organization understand and implement CMMC.

We are dedicated to helping small businesses navigate federal regulations and contract requirements for Quality Management, Cybersecurity, Export Compliance, and Test and Evaluation. We can help you meet your information security management system goals.  CVG Strategy QMS experts can provide the training required to understand and engage in a ISMS and make it meet desired objectives.

Identify CUI Areas with CVG Strategy Signs

CVG Strategy provides signs to identify areas containing CUI and export controlled items. These signs should be posted at all facility entrances where products are being produced or services are being performed that are under the control of the U.S. Department of State Directorate of Defense Trade Controls (DDTC) and are subject to the International Traffic in Arms Regulations per title 22, Code of Federal Regulations (CFR), Parts 120-130.

BIS Revokes VEU Waivers for China

BIS Revokes VEU Program
BIS Revokes VEU Program
Image by rawpixel.com on Freepik

In an attempt to level the playing field, the Bureau of Industry and Security (BIS) revokes Validated End-User (VEU) waivers that allowed foreign-owned semiconductor facilities in China to import U.S. technology without licenses. Companies such as Samsung and SK Hynix will now be required to obtain licenses for their operations. This move aims to level the playing field for U.S. companies and restrict technological advancements in China’s semiconductor industry.

Closing Loopholes

This action closes loopholes in export controls created during the Biden administration that allowed certain China based companies to export semiconductor manufacturing equipment and technologies without licensing.  Under Secretary pf Commerce for Business and Security, Jefferey Kessler, stated that the current administration is committed to closing loopholes that put companies in the United States at a competitive disadvantage.

Validated End-User Program

The VEU program was established by the Department of Commerce Bureau of Industry and Security in June 2007. Its primary goal is to facilitate trade with civilian end users in eligible destinations, allowing certain dual-use items to be exported without a license. This program is voluntary, enabling entities in eligible countries to apply for VEU status. The program was expanded to allow items obtained under VEU authorization in India to be used for military purposes, not just civilian uses.

120 Day Registration Period

There  will be a 120 day registration period for former VEU participants to apply for export licenses.  There is a general policy for granting former participant to operate existing facilities in China, but there is no intention to allow expansion or upgrades for those facilities.

CVG Strategy Export Compliance Expertise

As the BIS revokes the VEU waivers program, other changes wait in the rafters.  Continual changes in the regulatory backdrop demand increased changes in activities for organizations involved in export transactions.  This increases the likelihood of a non-egregious violation occurring even in a company with a well-run export compliance program.   

If you are part of a large corporation or a small company with a part-time compliance person, CVG Strategy has the compliance and training programs to help you meet International Traffic in Arms Regulations (ITAR) and Export Administration Regulations (EAR) rules and requirements.  As the BIS place controls on a growing number of technologies it becomes increasing difficult for smaller businesses to stay abreast of regulatory developments.  Because of this, we provide Export Compliance Management Programs (ECMP) for businesses of all sizes.  

CVG Strategy, LLC is recognized the world over as the premier provider of Export Compliance Consulting and Export Compliance Programs for businesses involved in export in the U.S. and Canada.  We also provide the essential training that ensures that your team is up to date on governmental regulations, including the Export Administration Regulations (EAR), the International Traffic in Arms Regulations (ITAR), the Canadian Controlled Goods Program, and Office of Foreign Asset Controls (OFAC) and other regulatory agencies and more.

C-Suite Cybersecurity Responsibilities for Success

C-Suite cybersecurity responsibilities
C-Suite cybersecurity responsibilities
Photo by Vlada Karpovich

C-suite cybersecurity responsibilities include promoting a security culture, aligning cyber and business strategies, and provision of resources.  This requires involvement by all executives not the Chief Information Security Officer (CISO).  The prevention of a cybersecurity incident should be a key element in business strategy because of loss of operations, financial loss, and damage to organizational reputation.  Additionally, executives should address contractual obligations or regulatory requirements for the handling of customer data.

Executive Requirements for NIST SP 800-171

NIST SP 800-171 is a set of guidelines designed to protect Controlled Unclassified Information (CUI) in non-federal systems and organizations. It provides recommended security requirements to ensure the confidentiality of CUI, particularly for contractors and subcontractors working with the federal government.

The Cybersecurity Maturity Model Certification (CMMC) is a program developed by the U.S. Department of Defense (DoD) to ensure that contractors in the Defense Industrial Base (DIB) adequately protect sensitive information. This includes Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).  CMMC is built on the requirements of NIST 800-171, but it includes a third-party assessment process for certification.

CMMC requires that a senior executive certify compliance with the cybersecurity standards in the Supplier Performance Risk System (SPRS). Executives are accountable for ensuring that the organization meets and maintains cybersecurity requirements.

C-suite leaders should allocate budget resources for compliance initiatives. This includes costs associated with implementing security controls and ongoing maintenance. Executives must understand the risks of non-compliance, which can jeopardize contracts and revenue opportunities especially when securing government contracts.

A Call to Action

Fundamental Responsibilities

The importance of C-suite cybersecurity responsibilities in a viable information security management system are not fully appreciated by many businesses today.  Unfortunately, the notion that cybersecurity responsibilities can be delegated to the IT department still hangs on.  Cybersecurity requirements must be addressed by top management to address regulatory and contractual requirements.  They must also address business continuity and financial risks associated with potential cyber incidents.

Defining the Scope of the Cybersecurity Program

Defining the scope of a program prioritizes efforts and ensures that all critical areas are addressed systematically.  Typically this involves identifying objectives, determining which systems and assets need protection, engaging stakeholders, and understanding applicable regulatory requirements.

Perhaps the most daunting task, especially for older organization is determining which assets are to be protected.  Information in various forms is shared in various departments throughout an organization.  Positively identifying and labeling large amounts that data can be challenging.  In many cases automated tools can be used to perform these tasks but this can sometimes hamper productivity by creating excessive access rights.  

Establishing a Compliance Culture

Cybersecurity is a responsibility for every person in an organization.  Establishing a culture that prioritizes cybersecurity helps mitigate risks and enhances overall security posture.  This can be accomplished by establishing policies that outline how an organization protects its digital assets and sensitive information. This should include defining roles and responsibilities to ensure compliance and security. 

Requirements for employee awareness and training should be ascertained and addressed.  Role specific training requirements should also be considered for key positions within the program.

Monitoring and Maintaining a Cybersecurity Program

It is essential that a cybersecurity program is regularly assessed to identify vulnerabilities and determine program effectiveness in a changing risk environment.  This includes assessing the organization’s current cybersecurity posture, discussing potential risks, and evaluating the effectiveness of existing measures. Organizations should conduct internal audits at least annually. However, more frequent audits may be necessary based on changes in systems, processes, or regulations.

CVG Strategy Information Security Management System Consultants

CVG Strategy can assist your organization meet the challenges in developing a cohesive information security management system.  We are dedicated to helping small businesses navigate federal regulations and contract requirements for Quality Management, Cybersecurity, Export Compliance, and Test and Evaluation. We can help you meet your information security management system goals.  CVG Strategy QMS experts can provide the training required to understand and engage in a ISMS and make it meet desired objectives.

Identify CUI Areas with CVG Strategy Signs

CVG Strategy provides signs to identify areas containing CUI and export controlled items. These signs should be posted at all facility entrances where products are being produced or services are being performed that are under the control of the U.S. Department of State Directorate of Defense Trade Controls (DDTC) and are subject to the International Traffic in Arms Regulations per title 22, Code of Federal Regulations (CFR), Parts 120-130.

Sequencing MIL-STD-810 Test Methods

Sequencing MIL-STD-810
Sequencing MIL-STD-810

Sequencing MIL-STD-810 tests methods can be a challenge when developing an Environmental Test and Evaluation Master Plan (ETEMP).  Determining a representative test sequence is essential for generating representative cumulative environmental stressors that will provide an accurate evaluative process.  The standard provides, in most cases, vague and general guidance in Part 1 and in each of the methods.

Test Program Parameters

Test programs can vary greatly dependent on the type of equipment under test, the size of the equipment, and the number of available units for testing.  When multiple units are available multiple path testing can be performed.  As an example, Low Pressure, High Temperature, Ballistic Shock, and Sand and Dust could be performed on a unit or set of units while a different series of tests are being conducted on separate units.

Consideration should always be given to perceived vulnerabilities in the equipment under test.  Gaskets and seals are often at risk of degradation through thermal extremes, deformations due to shock, and material deterioration due to exposure to chemical agents.  These concerns should be taken into consideration when immersion or water jet testing is to be conducted.

Sever testing parameters can also be an area of special concern for sequencing.  In certain cases, performing Pyroshock testing early in the test program may be advantageous if a failure would result in significant redesign and retest. 

Pyroshock, even for far field, can involve amplitudes approaching 1,000 g’s with frequencies up to 3 kHz. This can cause multiple types of failures that would not be seen in other types of testing.  If cumulative effects are of concern then Pyroshock could be performed again at the end of a sequence.

MIL-STD-810 Sequencing Guidance

MIL-STD-810 offers guidance throughout parts 1 and 2 of the document on test sequencing.  In most cases the guidance advises that the anticipated life cycle be used to access the cumulative effects but concedes, that in most cases, that there is not a single definable sequence.  A number of factors including situation dependent usage and test program assets will contribute to the final sequence selection.

Hard and Fast Sequencing Rules

There are certain hard and fast rules in MIL-STD-810 sequencing that must be followed.  Certain methods should be considered end of sequence methods because the Unit Under Test (UUT) will have been severely degraded or will be rendered unsuitable for further testing.  These methods include Contamination by Fluids, Corrosive Atmosphere, Acidic Atmosphere, Ballistic Shock, and Sand and Dust.

A UUT should not be introduced into an environmental chamber after Contamination by Fluids or Acidic Atmosphere testing because it could contaminate the chamber.  Sand and Dust testing can leave deposits of dust that would provide nutrients for Fungus testing.  Sand and Dust will also degrade finishes and provide misleading results if followed by Corrosive Atmosphere.  Guidance for these concerns is provided in each method.

Take Aways

Sequencing of MIL-STD-810 is an often overlooked element in developmental test and evaluation. Inadequate attention in developing a rationale can result in misleading results from laboratory testing.  However, no matter how well a plan has been put together, test failures, requisite redesigns, lab scheduling, and test item availability can all require sequence changes.

CVG Strategy Test and Evaluation Expertise

We provide a variety of services to help you garner the most from your test and evaluation program.  Our course Understanding MIL-STD-810 help you develop a more effective product test program.  CVG Strategy offers this  webinar to increase your knowledge of the entire standard.  The course stresses the importance of the tailoring process and addresses sequencing of MIL-STD-810 test methods.

We can create LCEPs and EICLs that reflect your product’s needs.  We provide EZ-Test Plan Templates for product segments such as Ground MobileShipboard Controlled, and Aircraft Military.  Our test and evaluation experts can also create custom test plans for your product requirements.

To assist your product development during this Covid-19 crisis we offer test program management and test program witnessing.  This frees your team from travel requirements and ensures that testing is performed as specified.  CVG Strategy is partnered with labs in the Florida area to help you.

Organizations Are Not Ready for CMMC

Organizations not Ready for CMMC
Organizations not Ready for CMMC
Photo by panumas nikhomkhai

Recent studies have shown that organizations are not ready for CMMC.  The Aware but not Prepared report from Redspin states that only half of the Defense Industrial Base (DIB) are even moderately prepared for a Level 2 certification.  Despite a five year roll out for the final rule from the Department of Defense (DoD) DIB members, both large and small, site costs, a lack of technical expertise, and confusing information from the DoD as challenges for Cybersecurity Maturity Model Certification (CMMC) compliance.

Management Commitment

A recurring theme in studies and guidelines in cybersecurity of management commitment and organizational support were echoed in the report.  Unfortunately, in many organizations, the proception that cybersecurity is an IT function remains in place.  A functional information security system involves participation in all levels of the business.  This especially true for management, where risk assessments and continual improvement must be driven through communication of commitment and provision of adequate resources.

Getting Started

The first step in achieving compliance is to ascertain the organization’s cybersecurity status.  This can be accomplished by performing a Gap Assessment.  Finding for each control should be broken down into the following categories: Fully Compliant, Partially Compliant, and Non-Existent Controls.  Then an effort should be made to target the low hanging fruits to demonstrate progress and enhance the organization’s cybersecurity effectiveness.

Implementing External Service Providers (ESPs)

The report recommends that organizations utilize External Service Providers to mitigate risks and maintain the information security system.  A cybersecurity external service provider is a third-party organization that offers cybersecurity services to other companies, helping them protect their information systems from threats. These services can include monitoring, threat detection, incident response, and vulnerability management.

System Security Plans (SSP)

A majority of participants in the study reported having a System Security Plan in place though less than half have finalized this document.  A System Security Plan (SSP) is a formal document that outlines the security requirements for an information system and describes the security controls in place or planned to meet those requirements. It serves as a comprehensive overview of how an organization protects its systems and data from unauthorized access and threats. 

The Redspin report found that organizations that use the SSP to address each objective and then actively work through those objectives had a higher rate of success in achieving and maintaining compliance.

CMMC in the Trump Administration

CMMC 2.0 is not expected to be eliminated as a result of Trump administration deregulatory efforts.  CMMC requirements are seen as a necessary measure for cybersecurity in the defense sector. While there may be discussions about regulatory burdens to smaller organizations, the program is likely to continue due to its importance in protecting Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).

Issues Beyond the DIBs

Beyond the fact that organizations are not ready for CMMC, there may not be enough accredited Third Party Assessment Organization C3PAO auditors to meet the growing demand for CMMC certification.  The process for granting C3PAO status is stringent and has resulted in a limited number of organizations being approved. This could lead to logistical challenges for defense contractors seeking certification in the near future.

The Bottom Line

Organizations are not ready for CMMC.  CMMC compliance presents several challenges, particularly for small and medium businesses, including high costs for achieving and maintaining certification, complex requirements, and the need for significant investments in technology and processes. Additionally, the evolving nature of cybersecurity threats makes it difficult for organizations to keep up with the necessary standards and practices.

CVG Strategy Information Security Management System Consultants

CVG Strategy can assist your organization meet the challenges in meeting the CMMC final rule.  We are dedicated to helping small businesses navigate federal regulations and contract requirements for Quality Management, Cybersecurity, Export Compliance, and Test and Evaluation. We can help you meet your information security management system goals.  CVG Strategy QMS experts can provide the training required to understand and engage in a ISMS and make it meet desired objectives.

Identify CUI Areas with CVG Strategy Signs

CVG Strategy provides signs to identify areas containing CUI and export controlled items. These signs should be posted at all facility entrances where products are being produced or services are being performed that are under the control of the U.S. Department of State Directorate of Defense Trade Controls (DDTC) and are subject to the International Traffic in Arms Regulations per title 22, Code of Federal Regulations (CFR), Parts 120-130.

Integrated Business Management Systems for Effectiveness

Integrated Business Management Systems
Photo by Vlada Karpovich

Integrated business management systems provide more effective solutions to the challenges facing organizations today.  This approach consolidates business processes and systems across teams and unifies objectives.  It can effectively address requirements for quality management, export compliance, information security management, and other concerns, ensuring compliance without gaps, duplication of efforts, or teams working at cross purposes.

Quality Management Systems (QMS)

Quality Management Systems (QMS) are systems that document responsibilities, processes, and procedures of an organization to achieve policies and objectives.  These objectives are not limited to maintaining customer satisfaction for an organization’s products or services but extend to any external and internal issues relevant to objectives.  As defined in clause 4.3 of ISO 9001:2015, external issues include applicable statutory and regulatory requirements.

To accomplish these objectives, it is critical that leadership demonstrate leadership and commitment by ensuring that these requirements are integrated into business processes and provided adequate resources.  Furthermore, leadership must evaluate these requirements using a process approach and risk-based thinking to provide continuous improvement.  Leadership is also responsible for review of these inputs to address non-conformities and determine the extent to which objectives have been met.

Export Compliance Management Program Requirements

Export compliance presents challenges for organizations due to its complexity and because regulations are Both the International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR) have requirements for effective export compliance programs.

ITAR Program Requirements

As with ISO 9001:2015, the Directorate of Defense Trade Controls (DDTC) sites management commitment as an important factor for a successful program.  This is essential for promoting a culture of compliance and ensuring that adequate resources to the program are available for its operation.  The ITAR also stresses the importance of performing risk assessments and regular program audits.  

Training is a requirement for organizations that are subject to ITAR export requirements.  This training should be job specific and offered on a recurring basis.  Records should be maintained for training activities.  Additionally resources should be available for personnel to reference when export questions arise.

EAR Program Requirements

The Bureau of Industry and Security (BIS) places a strong emphasis on the need for commitment from senior management.  This top-down approach is to emphasis allocation of sufficient resources, public support of policies and procedures related to the export compliance program, and provision of training.

The BIS strongly advises that regular risk assessments be performed to identify and address preventable risk that could result in release of controlled items or technical data.  They also the performance of audits to check for program deficiencies and enable corrective actions to be taken through management processes.

Export Opportunities

Much emphasis is placed on the ramifications of being in violation of export violations, and justifiably so.  Export violations can result in costly fines, loss of business reputation, debarment from export activities, and even imprisonment.  However, maintaining an awareness of changes in export regulations can also result in new opportunities for business.  Examples of this are the AUKUS defense trade integration that has resulted in relaxation of controls of exports between Australia, the United Kingdom, and the United States, and recent developments in the commercial space sector.

Cybersecurity and Information Security Management Systems

Regardless of sector, businesses today are facing increasing pressure to ensure the confidentiality, integrity, availability, and safety of data.  This is applicable not only to data directly held by the organization but to data and products vulnerable to unauthorized access in the supply chain.  As with quality management and export compliance these security risks must be addressed by an integrated business management approach.

Security breaches must be prevented through implementation of digital controls and physical security.  These same physical controls are shared with export compliance requirements.  They must also be prevented by management backed policies that are communicated to all personnel and external providers. 

Cyber incidents must also be prevented through adequate training because the weakest link in cybersecurity is often the human factor.  This training should include security literacy, should inform personnel of changes to policies or procedures, and should stress recognizing and reporting indicators of insider threats or social engineering activities.

NIST SP 800-53, NIST SP 800-161, NIST SP 800171, and ISO 27001 all place requirements for management to define security and privacy risk tolerance to establish a scope for mitigation strategies.  This allows for a consistent application of a strategy that is both broad-based and comprehensive.

CVG Strategy Consultants

Quality Management

CVG Strategy quality consultancy team can help your organization implement an integrated business management system effectively and painlessly.  Our consulting services will guide you through all phases of QMS, from assessment and development to the certification process. 

CVG Strategy also provides the inclusion of statutory requirements for export compliance into your program.  Ask our experts how we can provide this feature into your quality management system.  Additionally, CVG Strategy can provide you with Quality Management training courses that will empower your team to achieve in a QMS environment.

CVG Strategy has  experience in a large number of quality management systems standards.  In addition to ISO 13485:2016 our Global Exemplar Lead Auditors can assist you designing and implementing a QMS to the following standards:

      • AS9100
      • ISO 27001
      • BS EN 13485:2016
      • FDA Title 21 Part 820
      • EN ISO 14971:2019

CVG Strategy can provide a QMS that incorporates multiple quality standards. This includes incorporating management strategies for ensuring compliance to industry regulations such as EU Directive 98/79EC for medical devices.

CVG Strategy Export Compliance Solutions

While many export compliance providers offer programs geared toward compliance with a single set of regulations, CVG Strategy offers a harmonized program that will ensure that your company is compliant to ITAR, EAR and international regulations.  Furthermore we consolidate this program in a collection of documents that can be integrated into a quality management system. 

Cyber Security Consulting

CVG consultants have over a decade of experience with ISMS, Quality Management Systems (QMS) and Export Compliance.  We understand that each business has a unique set of requirements that demand tailored solutions. 

 

 

 

 

CMMC Final Rule to be Implemented in 2025

cmmc final rule
cmmc final rule
Jessica McClanahan, Navy

The Department of Defense (DoD) has released its Cybersecurity Maturity Model Certification (CMMC) final rule.  This rule will now require contractors to verify that required security measures have been implemented for Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).  These requirements will are to be implemented in early to mid-2025 when verification of security controls will appear as a condition in Requests for Proposals (RFP).  It can be expected that these information security requirements will quickly flow down to subcontractors. 

CMMC Three Levels of Compliance

There are three defined levels of CMMC security compliance requirements for defense industrial base contractors.

Level 1

Level 1 requirements apply to contractors handling Federal Contract Information (FCI).  FCI is information provided or generated by the U.S. government that is not intended for public release that has been created under contract in reference to the provision of a product or service.  Requirements for Level 1 compliance are defined in  Federal Acquisition Regulation 52.204-21.

Level 2

Level 2 requirements apply to contractors that handle Controlled Unclassified Information (CUI).  CUI is unclassified information required by or possessed by the U.S. government.  CUI controls as specified in NIST SP 800-171, are required to prevent the release of information pertaining to defense and national security. 

Level 3

Level 3 requirements apply to contractors engaged with critical programs or high value assets.  Contractors falling in this category must meet all requirements of Levels 1 and 2 CMMC and meet 24 additional requirements specified in NIST SP 800-172.

The potential effective dates for final implementation of this Cybersecurity Maturity Model Certification (CMMC) Program structure are March of 2025 for Levels 1 and 2, and March of 2028 for Level 3. 

Cybersecurity Certification

The DoD has relied on a system of contractor self affirmations for cybersecurity requirements.  This has been seen as largely ineffective given the active level of threat presented by foreign adversaries.  This CMMC final rule will now require verification through Third-Party Assessment Organizations (C3PAOs) that organizations are compliant with NIST SP 800-171, rev. 2 requirements.

Concerns for Contractors and Subcontractors

There are numerous concerns for businesses in the defense industry that are in the process of implementing required controls.  Firstly, implementing an effective information security program is an involved process that requires a considerable amount of time and capital.  This is having a disproportional impact on smaller subcontractors. 

Secondly, there are insufficient numbers of personnel qualified for critical roles in an information security program.  Additionally, that even if a business is prepared for certification, that there is an insufficient amount of C3PAOs to assess them.

Presently, many contractors are already rolling out requirements to subcontractors ahead of final CMMC implementation.  This raises concerns that businesses may drop out of the already shrinking defense industrial sector.

Changes Implemented in the Final Rule

  1. Requirements were removed for External Service Providers (ESP) that do not process, store, or transmit CUI for meeting FedRAMP requirements of DFARS 252.204-7012.  ESPs are third-parties that deliver services affecting the confidentiality, integrity, or availability of DoD CUI.  This provision applies to both ESP that provide cloud services and those that do not.
  2. Definitions were added to the CMMC for temporary deficiencies and enduring exception.  These terms provide contractors to address security requirements not yet in place through a Plan of Action and Milestones (POA&M).
  3. Reassessments are now required for organizations undergoing Mergers and Acquisitions (M&A).  New assessments would evaluate significant architectural or boundary changes to systems handling CUI.

CVG Strategy Information Security Management System Consultants

CVG Strategy can assist your organization meet the challenges in meeting the CMMC final rule.  We are dedicated to helping small businesses navigate federal regulations and contract requirements for Quality Management, Cybersecurity, Export Compliance, and Test and Evaluation. We can help you meet your information security management system goals.  CVG Strategy QMS experts can provide the training required to understand and engage in a ISMS and make it meet desired objectives.

Identify Areas With CUI with CVG Strategy Signs

CVG Strategy provides signs to identify areas containing CUI and export controlled items. These signs should be posted at all facility entrances where products are being produced or services are being performed that are under the control of the U.S. Department of State Directorate of Defense Trade Controls (DDTC) and are subject to the International Traffic in Arms Regulations per title 22, Code of Federal Regulations (CFR), Parts 120-130.

Understanding MIL-STD-810 and How to Use It

Understanding MIL STD 810
Understanding MIL STD 810

Understanding MIL-STD-810 is essential for proper developmental evaluation of the environmental effects on equipment.  CVG Strategy has been helping our customers use this valuable standard to create test programs for over a decade.  In this time we have seen a number of commonly held misconceptions about the standard and how to use it. 

What is MIL STD 810?

MIL-STD-810 is used to evaluate the influences of environmental conditions on equipment during all phases of its life cycle through laboratory tests.  This Department of Defense military standard includes 29 methods for analysis of those effects.  These methods include climatic (temperature, humidity, solar, etc.) and dynamic (e.g. vibration, shock, pyroshock). 

With the exception of one of these methods, there are no established severities or pass/fail criteria.  Why?  Because these variables are dependent on the type of equipment being tested and where it is to be used.  For example, when performing high temperature testing; the appropriate high temperature for equipment intended for a vehicle crew compartment is very different than one for an engine compartment or the exterior of a supersonic aircraft.

How to Use the Standard

The secret to understanding MIL-STD-810 is in the seldom read Part 1 of the standard.  Part 1 establishes a process for evaluating the relevant environmental stressors likely to be encountered in the product’s life time.  This includes storage, transport, and operational configurations.  It provides a tailoring process to create realistic design parameters and test methods.

One tool that this tailoring process entails is the creation of a Life Cycle Environmental Profile (LCEP).  This process identifies all the environmental stresses from shipping dock to end of life.  Metrics can then be fed into an Environmental Issues/Criteria List (EICL) that can be used as design and test parameters. 

When measured data for a given stress is known, that data should be used.  When a value is not known, guidance is provided in the standard for realistic evaluation based on climatic and measured dynamic variables.

Developing a Plan

The first task is to create a Test and Evaluation Master Plan (TEMP) that outlines all the testing to be performed.  This can include multiple tests for each method.  Using high temperature again as an example,  it is often prudent to perform testing for transport, storage and operational tests, each with its specific values and temperature profiles. 

Each of these tests should have a Detailed Environmental Test Plan (DETP) to exactly specify how the test is to be conducted.  This description should include required operational tests, data to be recorded, and pass/fail criteria.  People often ask test labs to create test plans.  This is not the best solution as the lab does not have a thorough understanding of the equipment and cannot perform the LCEP and EICL steps of the tailoring process.

Operational Testing and MIL-STD-810

MIL-STD-810 has, with increasing intensity, stressed the importance of operational testing.  Climatic and dynamic stressors can often cause intermittent failures of equipment.  It is therefore of great importance to create operational testing that exercises all modes of operation. 

It is also important to create equipment that can monitor the equipment and capture those failures.  This process is one that is often overlooked.  As a result, testing performed does not provide substantive evaluation of the test item.

CVG Strategy Can Help

We provide a variety of services to help you garner the most from your test and evaluation program.  Understanding MIL-STD-810 and how to use it can help you develop a more effective product test program.  CVG Strategy offers webinars to increase your knowledge of the entire standard.  These courses stress the importance of the tailoring process and empower you to create appropriate test programs. 

We can create LCEPs and EICLs that reflect your product’s needs.  We provide EZ-Test Plan Templates for product segments such as Ground Mobile, Shipboard Controlled, and Aircraft Military.  Our test and evaluation experts can also create custom test plans for your product requirements.

To assist your product development during this Covid-19 crisis we offer test program management and test program witnessing.  This frees your team from travel requirements and ensures that testing is performed as specified.  CVG Strategy is partnered with labs in the Florida area to help you. 

MIL-STD-810H Change 1 Revises Method 509

MIL-STD-810H change 1
MIL-STD-810H change 1

MIL-STD-810H change 1 Environmental Engineering Considerations and Laboratory Tests was released by the Department of Defense (DoD) on May of 2022.  Although changes in the standard were few, Method 509 Salt Fog has been entirely rewritten.  Method 509.8 is now titled Salt Fog / Corrosive Environments and is comprised of three procedures.

Procedures for Salt Fog / Corrosive Environments

This test method now contains the following procedures:

  • Procedure I – Corrosion Screening
  • Procedure II – Design Corrosion Verification
  • Procedure III – Natural Environment

Procedure I – Corrosion Screening, most closely resembles the salt fog testing of previous revisions of MIL-STD-810.  It is intended for equipment and representative coupons to evaluate protective coatings and finishes.  It is applicable for the identification of design flaws and quality control deficiencies in a short period of time.  This method is to be performed in a salt spray test chamber in a testing laboratory.

Procedure II – Design Corrosion Verification is intended for verification of system designs and is to be performed early in product development.  This testing should, when practical, be conducted on actual components, subsystems, or avionic subsystems. 

This evaluation is to be tailored to specific corrosion types as specified by the Cognizant Engineering Authority (CEA) from the procurement agency.  Required testing is dependent on intended environments and may include corrosive pollutants such as sulfur dioxide modified salt fog.  These additional requirements are to be performed in accordance with a variety of test standards including ASTM B117, ASTM G85, and GMW 14872.

Procedure III – Natural Environment is to be performed to verify the corrosion resistance of coatings and system designs.  This testing involves the use of mock-up test specimens in natural locations for extended durations.  As with Procedure II, testing methodologies are to be specified by the CEA.

Other Changes for Salt Fog Testing

For Procedures I and II, refinements in MIL-STD-810H change 1 have been made in the preparations and methodologies employed.  Changes in handling and configuration, preparation of the salt solution, and recommendations for preheating of pressurized air will require test program personnel and test facility engineers to ensure that laboratory equipment is correctly configured for accelerated corrosion testing.

Additions have also been made for possible effects of corrosion, pretest ambient checkout, and test interruption.  Additionally, guidance is provided for post test analysis of possible physical, electrical, and corrosion effects that may have resulted from the Salt Fog / Corrosive Environments testing.

Tailoring for Environmental Testing

The secret to using the MIL STD 810 is in the seldom read Part 1 of the standard.  Part 1 establishes a process for evaluating the relevant environmental stressors likely to be encountered in the product’s life time.  This includes storage, transport, and operational configurations.  It provides a tailoring process to create realistic design parameters and test methods.

The authors of MIL-STD-810 have consistently stressed the need for tailoring in the test and evaluation process.  Tailoring is performed by matching the severity and duration of a test to its anticipated environments’ stressors.  This is accomplished through specifications provided by the acquisition agency and by performing a Life Cycle Environmental Profile (LCEP).

The LCEP was introduced in MIL-STD-810D and refined to its current status in MIL-STD-810G.  It provides an analysis of climatic and dynamic stresses likely to be encountered by materiel during storage, logistic transport, tactical transport, and operation.  From this analysis, a list of environmental issues and criteria (EICL) can be produced that will assist in the design and test of military components.

The LCEP process is integral to the development of relevant Test Plans that will provide meaningful information for design verification and validation.  This can greatly reduce the cost of development by identifying potential design deficiencies early in product development.

CVG Strategy Can Help

Our team of test and evaluation experts can assist you in creating a meaningful test program that meets requirements and prevents costly failures at the operational test stage.  CVG Strategy provides an array of services to help you with environmental and EMI/EMC testing. 

Our instructors have decades of experience in laboratory test and evaluation of military and commercial products.  We understand the importance of testing and getting a properly designed product to market in a timely fashion. 

We also offer classes in MIL-STD-810H change 1 to help you keep current with the latest developments in this important standard.  This instruction includes extensive coverage of the tailoring process and how to use it your product development.  Our courses are available online and on location. 

MIL-STD-810 Training Classes

CVG Strategy MIL-STD-810 classes will provide you with the ability to develop and conduct an environmental test program.  Our two-day course not only provides you with valuable information about climatic and dynamic test methods but also includes training in the methodology to correctly apply test tailoring relevant to the test item’s expected life cycle. 

This course is available online or onsite.  Ample time is available for questions and comments so that participants are encouraged to keep engaged.  Check here for our online Training Registration Schedule.

Fungus MIL-STD-810 Method 508

Fungus MIL-STD-810 Method 508
Fungus MIL-STD-810 Method 508
Aspergillus mold

Fungus MIL-STD-810 Method 508 evaluation is employed to assess a product’s susceptibility to support fungal growth. This test method is an important part of a testing program because fungus is present in a large number of environments and has numerous detrimental effects.

Effects of Fungus 

Direct and indirect attacks can occur to products of natural origin as well as synthetic materials such as polyvinylchlorides, polyurethanes, polyethers, paints, and varnishes. Additionally, fungus can cause damage to electrical systems and optical systems.

Health effects from ingestion or inhalation of mycotoxins from certain species of Aspergillus mold, a fungus, can lead to skin rash, inflammation of mucus membranes, liver damage, and cancers.

Considerations

Although the standard contains an Annex to identify the basic resistance of materials to fungal growth test by analysis is not recommended.  This is because of the combination of materials and their ability to support fungal growth are beyond the scope of such an analysis.

Fungus testing should not normally be conducted on the same item as used for Salt Fog/Corrosive Environments, Sand and Dust, Humidity, or Acidic Atmosphere.  If these methods are performed before the Fungus method, residues left on the test item may hinder or accelerate fungal growth.

Fungus Species

A number of species are used in this method.  These include Asperfillus flavus, Tricoderma virens, Talaromyces pinophilus, Chaetomium globosum, and Aspergillus brasilensis.  These species are representative of destructive fungi found around the world.  These species have also been selected as they are rated at Biosafety Level 1 and therefore present minimal threat to human health.

Because of the threat to human health and the fact that the procedure calls for highly-specialized techniques, it is essential that only technically qualified individuals perform these activities.  

Facility Requirements

Test chambers are to be used that prevent condensation from dripping on the test item.  The chamber should be monitored with sensors to allow for control of temperature and humidity.  Minimal airflow is used for this method, generally under 0.5 meters/second.  The chamber should be decontaminated in accordance to the guidance of Annex A in the standard.

Preparation of Test Item

It is preferable to use a new test item for this method.  Before being introduced into the chamber, the unit should be cleaned, not sterilized, using a damp cloth.  This cleaning should be conducted at least 72 hours before placing the item in the chamber.  If cleaners other than water are used it should be noted in the test report.

A mixed sport suspension is then created and incubated.   It is then verified for its ability to create fungus growth.  Control strips are created from unbleached, plain weave cotton and sterilized.  These are placed in the chamber to verify the spore solution is capable of producing fungus in the chamber. 

The test item and cotton strips are then inoculated and left in the chamber.  The chamber is kept at 86 ± 3.6 °F (30 ± 2 °C) and a relative humidity between 90 percent and 100 percent for the test duration of 28 days.  

Fungus Procedure

On day 7 the cotton control strips are inspected to verify at least 90 percent coverage from mold growth and again at 14 days.  If there is no increase in mold growth after 14 days the test must be restarted.

Once the 28-day duration has passed with successful results, the test item is inspected for fungus growth.  It should be noted that operational or use of the test item is only to be used if essential to requirements.  The results of the inspection are then recorded for the final report.

Decontamination

A complete procedure for the decontamination of equipment is described in Annex A of Method 508.  Again, this activity, as with others described above, are to be performed by suitably trained personnel (e.g., microbiologists).  This should be performed in a suitable facility with appropriate personal protective equipment.

Detailed Environmental Test Plans

CVG Strategy offers EZ-Test Plan Templates for MIL-STD environmental (climatic/dynamic) and EMI/EMC testing documentation.  Our DETPs are written as specified in MIL-STD-810 Task 405.  They are available for specific applications such as Ground MobileGround Stationary, and Shipboard Controlled, Shipboard Uncontrolled, and Aircraft Military.

These DETPs include appropriate methods, (such as Fungus MIL-STD-810 Method 508) addendums for product specific information, test labels for photo identification and data sheets for collection of required data. Profile (LCEP). 

Our Electromagnetic Interference Test Plans are written as specified in MIL-STD-461.  They contain the test methodology, addendums for product specific information, test labels for photo identification and data sheets.  These plans are available for procedures listed in MIL-STD-461 and are also available for MIL-STD-1275, MIL-STD-704, and MIL-STD-1399-300. 

Custom Test Plans are also available for applications not covered in the EZ-Test Plan offerings.  These plans can be written for any number of applications and their relevant standards.

Put CVG Strategy’s Experience to Work for You

Companies of all sizes, from start up to established product developers, face challenges in product test and evaluation.  This can particularly be the case when a product is developed for a new market sector or expanding sales internationally.

Properly tested products prevent costly product recalls, product redesign, and product liability.  They maintain customer satisfaction and keep your company’s reputation in good standing.  Contact CVG Strategy to see how our services can assist your engineering team with Fungus MIL-STD-810 Method 508 or any other test and evaluation concern.

MIL-STD-810 Training Classes

CVG Strategy MIL-STD-810 classes will provide you with the ability to develop and conduct an environmental test program.  Our two-day course not only provides you with valuable information about climatic and dynamic test methods but also includes training in the methodology to correctly apply test tailoring relevant to the test item’s expected life cycle. 

This course is available online or onsite.  Ample time is available for questions and comments so that participants are encouraged to keep engaged.  Check here for our online Training Registration Schedule.

Secret Link