Order a 45-Day Trial of GateKeeper Enterprise or call 240-547-5446

DFARS / NIST 800-171

Meet complex compliance requirements with ease and minimal resources.

AUTOMATED COMPLIANCE

Automated access control, accountability, auditing, and authentication.

An integral aspect of meeting compliance mandates for companies working with the federal government.

Limit information system access to authorized users

Simple and instant multi-factor authentication

FIPS 140-2 compliant and AES 256 encryption

Automatically audit every account action

Enforce password lengths with custom requirements

GateKeeper Enterprise DFARS / NIST 800-171 Compliance Summary

As of Jan. 1, 2018, all government contractors processing, storing, or transmitting controlled but unclassified information (CUI) must meet the Defense Federal Acquisition Regulation Supplement (DFARS) security requirements or jeopardize losing their contracts.

Security RequirementControl FamilyControlControl NumberControl DetailsImplementation 
BasicAccess Control3.1.1 Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).3.1.1Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).GateKeeper Enterprise provides proximity-based authentication and authorization to workstations. Using GK enterprise an organization can granularly assign access permissions to individuals/groups on a per workstation basis. GK automatically locks a user’s computer when they are no longer in proximity to their workstation – immediately protecting unauthorized users from accessing a system.
BasicAccess Control3.1.2 Limit information system access to the types of transactions and functions that authorized users are permitted to execute.3.1.2Limit information system access to the types of transactions and functions that authorized users are permitted to execute.GateKeeper Enterprise provides proximity-based authentication and authorization to workstations. Using GK enterprise, an organization can granularly assign access permissions to individuals/groups on a per workstation basis. GK automatically locks a user’s computer when they are no longer in proximity to their workstation – immediately protecting unauthorized users from accessing a system.
DerivedAccess Control3.1.5 Employ the principle of least privilege, including for specific security functions and privileged accounts.3.1.5Employ the principle of least privilege, including for specific security functions and privileged accounts.GateKeeper Enterprise provides proximity-based authentication and authorization to workstations. Using GK enterprise, an organization can granularly assign access permissions to individuals/groups on a per workstation basis. This helps enforce the concept of least privilege on a system level.
DerivedAccess Control3.1.10 Use session lock with pattern-hiding displays to prevent access/viewing of data after period of inactivity.3.1.10Use session lock with pattern-hiding displays to prevent access/viewing of data after period of inactivity.GK automatically locks users' workstation when they are no longer in proximity to their workstation, preventing access/viewing of data.
BasicAudit and Accountability3.3.1 Create, protect, and retain information system audit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity.3.3.1Create, protect, and retain information system audit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity.GateKeeper Enterprise provides robust auditing capabilities that identify when an individual user was in proximity to a workstation and successfully locked/unlocked it. These audit logs are retained indefinitely.
BasicAudit and Accountability3.3.2 Ensure that the actions of individual information system users can be uniquely traced to those users so they can be held accountable for their actions.3.3.2Ensure that the actions of individual information system users can be uniquely traced to those users so they can be held accountable for their actions.GateKeeper Enterprise provides robust auditing capabilities that identify when an individual user was in proximity to a workstation and successfully locked/unlocked it.
DerivedAudit and Accountability3.3.5 Correlate audit review, analysis, and reporting processes for investigation and response to indications of inappropriate, suspicious, or unusual activity.3.3.5Correlate audit review, analysis, and reporting processes for investigation and response to indications of inappropriate, suspicious, or unusual activity.GateKeeper Enterprise provides robust auditing capabilities that identify when an individual user was in proximity to a workstation and successfully locked/unlocked it. Gatekeeper can connect to a syslog server and integrate with an enterprise security architecture. Authorized admins have the ability to export audit logs to further enable audit review, analysis, and reporting processes.
DerivedAudit and Accountability3.3.6 Provide audit reduction and report generation to support on-demand analysis and reporting.3.3.6Provide audit reduction and report generation to support on-demand analysis and reporting.GateKeeper Enterprise provides robust auditing capabilities that identify when an individual user was in proximity to a workstation and successfully locked/unlocked it. GateKeeper can connect to a syslog server and integrate with an enterprise security architecture. Authorized admins have the ability to export audit logs to further enable audit review, analysis, and reporting processes.
DerivedAudit and Accountability3.3.8 Protect audit information and audit tools from unauthorized access, modification, and deletion.3.3.8Protect audit information and audit tools from unauthorized access, modification, and deletion.GateKeeper Enterprise provides proximity-based authentication and authorization to workstations and thus can protect audit information and audit tools from unauthorized access.
DerivedAudit and Accountability3.3.9 Limit management of audit functionality to a subset of privileged users.3.3.9Limit management of audit functionality to a subset of privileged users.GateKeeper Enterprise provides proximity-based authentication and authorization to workstations and thus can protect audit functionality to a subset of users.
BasicIdentification and Authentication3.5.1 Identify information system users, processes acting on behalf of users, or devices.3.5.1Identify information system users, processes acting on behalf of users, or devices.GateKeeper Enterprise provides proximity-based identification, authentication, and authorization to workstations. Using GK, an organization can identify a user at a workstation.
BasicIdentification and Authentication3.5.2 Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.3.5.2Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.GateKeeper Enterprise provides proximity-based identification, authentication, and authorization to workstations. Using GK enterprise, an organization can granularly assign access permissions to individuals/groups on a per workstation basis.
DerivedIdentification and Authentication3.5.3 Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.3.5.3Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.GateKeeper Enterprise has the capability to enforce multifactor authentication for all access to a workstation.
DerivedIdentification and Authentication3.5.4 Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.3.5.4Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.GateKeeper is a proximity-based identification and authentication solution. A user must be present to unlock their workstation, making it inherently replay resistant.
DerivedIdentification and Authentication3.5.5 Prevent reuse of identifiers for a defined period.3.5.5Prevent reuse of identifiers for a defined period.GateKeeper can integrate with an organization's Active Directory to enforce this control.
DerivedIdentification and Authentication3.5.6 Disable identifiers after a defined period of inactivity.3.5.6Disable identifiers after a defined period of inactivity.GateKeeper can integrate with an organization's Active Directory to enforce this control.
DerivedIdentification and Authentication3.5.7 Enforce a minimum password complexity and change of characters when new passwords are created.3.5.7Enforce a minimum password complexity and change of characters when new passwords are created.GateKeeper can integrate with an organization's Active Directory to enforce this control.
DerivedIdentification and Authentication3.5.8 Prohibit password reuse for a specified number of generations.3.5.8Prohibit password reuse for a specified number of generations.GateKeeper can integrate with an organization's Active Directory to enforce this control.
DerivedIdentification and Authentication3.5.9 Allow temporary password use for system logons with an immediate change to a permanent password.3.5.9Allow temporary password use for system logons with an immediate change to a permanent password.GateKeeper can integrate with an organization's Active Directory to enforce this control.
DerivedIdentification and Authentication3.5.10 Store and transmit only encrypted representation of passwords.3.5.10Store and transmit only encrypted representation of passwords.GateKeeper uses military-grade AES 256 to store and transmit passwords.
DerivedIdentification and Authentication3.5.11 Obscure feedback of authentication information.3.5.11Obscure feedback of authentication information.GateKeeper PIN login is obscured and all authentication information is obscured.
DerivedPhysical Protection3.10.4 Maintain audit logs of physical access.3.10.4Maintain audit logs of physical access.GateKeeper is a proximity-based identification and authentication solution using a physical dongle. A user must be physically present to access a workstation. Audit logs of physical access using GateKeeper are stored indefinitely on the GateKeeper Enterprise server.
DerivedPhysical Protection3.10.5 Control and manage physical access devices.3.10.5Control and manage physical access devices.GateKeeper is a proximity-based identification and authentication solution using a physical dongle. A user must be physically present to access a workstation. Audit logs of physical access using GateKeeper are stored indefinitely on the GateKeeper Enterprise server.

See GateKeeper Enterprise in action

Take a self-guided tour of GateKeeper Enterprise, the proximity-based centralized access management platform. 

or call 240-547-5446

GateKeeper Enterprise 45-Day Trial

GateKeeper offers special pricing so you or your organization can try Enterprise before implementing on your entire network. All test packages include deployment assistance, premium support, and additional subscription discounts.

5 or more GateKeeper wireless keys

45 days of Enterprise subscription

Premium support & deployment assistance

Discounted subscription for the rest of the year

or call 240-547-5446

Pin It on Pinterest