The Department of Defense announced updated requirements and guidelines for the Cybersecurity Maturity Model Certification (CMMC) in November 2021. The CMMC establishes cybersecurity protocols that protect digital assets, controlled information, and more across the supply chain that impacts our national security.
The Cybersecurity Maturity Model Certification (CMMC) is the compliance standard for organizations that operate in America’s Defense Industrial Base (DIB), established in order to safeguard digital assets, sensitive yet unclassified information, and more across the supply chain.
CMMC’s framework is comprised of three important components:
The revised CMMC 2.0 model consolidates the original 5-levels of compliance into a neater 3 levels for organizations to follow.
As the title suggests, Level 1 CMMC compliance is the minimum cybersecurity requirement set for DoD contractors, subcontractors, or suppliers that handle federal contract information (FCI). This level covers 17 practices from Federal Acquisition Regulation (FAR) Clause 52.204.21 and can be mapped to NIST 800-171 controls for which an annual self-assessment must be completed to maintain compliance.
The 17 practices can be broken down into six categories:
These foundational standards will apply to a majority of DoD contractors, subcontractors, and suppliers who don’t necessitate compliance with the more intense standards outlined in Levels 2 or 3.
This intermediate level of compliance for organizations that handle controlled unclassified information (CU). It features all 110 practices from NIST 800-171 and stipulates triennial third-party assessments for critical national security information; annual self-assessments are required for select projects only.
The 110 cybersecurity practices from NIST 800-171 can be understood across 14 categories, including:
While the foundational Level 1 categories are carried over into Level 2, this intermediate level of compliance is more in-depth and comprehensive across an organization. You can read more into these specifications by looking at the extensive NIST 800-171 publication that outlines the details and expectations set forth.
The final level of CMMC 2.0 compliance is Level 3, which is by far the most stringent. For maintaining compliance at this level, organizations must follow the 110 practices from NIST 800-171 plus 35 enhanced security requirements for protecting CUI from NIST 800-172 and complete triennial government-led assessments.
Essentially, NIST 800-172 outlines more fortified security measures to protect CUI and will apply to fewer organizations. The enhanced security requirements apply to only the following categories:
The official NIST 800-172 document itself states that:
“The enhanced security requirements address the protection of CUI by promoting: (1) penetration-resistant architecture, (2) damage-limiting operations, and (3) designs to achieve cyber resiliency and survivability. The enhanced security requirements are intended to supplement the basic and derived security requirements in [SP 800-171] and are for use by federal agencies in contractual vehicles or other agreements established between those agencies and nonfederal organizations.”
Security Compliance Associates offers a variety of services to assess your organization’s cybersecurity controls and provide corrective advice, which helps you maintain compliance while saving time and money. By partnering with us to manage your cybersecurity posture, your internal team can address other important matters.
Contact us today at 727-571-1141 to get started. We can evaluate your organization to assess if you are following CMMC 2.0 requirements and conduct a Readiness Assessment, as needed, to help you attain your desired maturity level. Take an active step in strengthening your security regulations to protect controlled unclassified information and avoid threats from cyber-attacks.