You are on page 1of 6

Compliance Support

CMMC 2.0
Cybersecurity Maturity Model Certification 2.0 Achieving CMMC 2.0 With Self-Learning AI Defense
The Cybersecurity Maturity Model Certification 2.0 (CMMC 2.0) is a framework used Darktrace delivers AI-powered threat detection, investigation, and response that
to assess the cybersecurity posture of contractors and subcontractors working can support organizations in their journey towards cyber maturity as defined
with the US Department of Defense (DoD). It maps specific controls and processes by the CMMC 2.0 framework. Through a unified platform approach, Darktrace
associated with various cybersecurity standards to three maturity models, ranging provides autonomous cyber defense across the entire enterprise, from cloud,
from basic cyber hygiene to advanced. SaaS, and email environments, to corporate networks, remote endpoints, and
cyber-physical systems.
The initial version of CMMC (CMMC 1.0) was published by the DoD in September 2020.
In November 2021, the DoD announced CMMC 2.0 which included a streamlined With Self-Learning AI, the Darktrace learns what normal behavior looks like across
model, reliable assessments, and flexible implementation. Specific changes in the business in order to spot the subtle deviations that signal an attack, from
CMMC 2.0 include the following: reducing the model from 5 to 3 compliance levels; novel ransomware to stealthy insiders.
allowing companies at Level 1 and Level 2 to demonstrate compliance through
The technology spots emerging threats in real time with the Enterprise
self-assessment; and allowing companies to make Plans of Action & Milestones
Immune System, performs automatic investigations with Cyber AI Analyst, and
(POA&Ms) to achieve certification or waive CMMC requirements, both under certain
autonomously contains threats with Darktrace Antigena – all without relying on
limited circumstances.
any rules, signatures, or prior assumptions.
CMMC 2.0 has largely been put in place to verify organizational compliance with NIST
800-171 standards and ensures the security of Controlled Unclassified Information Darktrace and CMMC: Framework Applicability
(CUI) that resides on DOD industry partners’ networks. It will be incorporated into
the Defense Federal Acquisition Regulation Supplement (DFARS) and used as a Presented below is a guide showing how Darktrace can assist organizations in
requirement for awarding contracts. working towards CMMC 2.0 practices and associated maturity levels.

The framework is designed to allow smaller businesses to implement the controls For more information on how Darktrace capabilities map to the NIST framework,
associated with lower levels of maturity in a cost-effective and affordable way, while please see our white paper on Darktrace and NIST.
organizations with more resources can build to advanced maturity. Each DOD
contract specifies a required level of CMMC 2.0 certification.

It will be critical for all organizations that may affect the security of CUI to have some
level of CMMC 2.0 compliance at every level of the contractor supply chain. This
requires visibility and cyber defense of CUI across the entire lifecycle of the data and
anywhere it may be stored, transmitted, and processed.
Compliance Support | 2

CMMC Level
CMMC 2.0 Framework Applicability
Requirement

Domain Capacity Number Description Darktrace Capability 1 2 3

Limit information system access to Darktrace Antigena can enforce access


Authorized Access authorized users, processes acting on restrictions to tagged systems. This would
Access Control AC.1.001 S N/A N/A
Control behalf of authorized users, or devices provide a backstop for access controls that
(including other information systems). are not performing.

Darktrace can be configured in such


External Verify and control/limit connections to
AC.1.003 a way as to interrupt and prevent data S N/A N/A
Connections and use of external information systems.
transfer to unauthorized devices.

Darktrace can be used to detect


Control the flow of CUI in accordance
Control CUI Flow AC.2.016 misconfiguration and perodically N/A S N/A
with approved authorizations.
review system configurations.

Darktrace can be configured in such a way


Separate the duties of individuals to as to interrupt and prevent access to un-
Separation of Duties AC.3.017 reduce the risk of malevolent activity authorized devices. This would complement N/A S N/A
without collusion. proper SoD access control management
within the application layer.

Prevent non-privileged users from executing Darktrace can monitor and identify
Privileged Functions AC.3.018 privileged functions and capture the anomalous user activity. This would include N/A S N/A
execution of such functions in audit logs. anomalous logins from low privelaged users.

Darktrace can be used to detect and


Mobile Device
AC.3.020 Control connection of mobile devices. interrupt anomalous and unauthorized use, N/A S N/A
Connection
regardless of the device.
Compliance Support | 3

Domain Capacity Number Description Darktrace Capability 1 2 3

Authorize remote execution of privileged


Privileged Remote Darktrace can be used to detect and
AC.3.021 commands and remote access to security- N/A S N/A
Access interrupt anomalous and unauthorized use.
relevant information.

Darktrace provides real-time, AI-driven


Audit and
Event Review AU.3.045 Review and update logged events. investigation of anomalous events N/A S N/A
Accountability
occuring within the organization.

Darktrace monitors for anomalous


Protect audit information and audit
data transfer and anomalous identity
Audit Protection AU.3.049 logging tools from unauthorized access, N/A S N/A
usage and can act in real-time to
modification, and deletion.
disrupt malicious activity.

Correlate audit record review, analysis, Darktrace can serve as a centralized


and reporting processes for investigation collection point for collection and correlation
Audit Correlation AU.3.051 N/A S N/A
and response to indications of unlawful, of logs and network traffic to provide
unauthorized, suspicious, or unusual activity. situational awareness of anomalous activity.

Provide audit record reduction and report Darktrace AI can support investigation
Reduction &
AU.3.052 generation to support on-demand analysis of anomalous events including full N/A S N/A
Reporting
and reporting. automation for a subset of event criteria.

Define, document, approve, and


Darktrace can be configured in such a
Configuration Access Restrictions enforce physical and logical access
CM.3.067 way as to interrupt data transfer and file N/A S N/A
Management for Change restrictions associated with changes
writes to un-authorized devices.
to organizational systems.

Use multifactor authentication for


The Darktrace appliance can be configured
Identification and Multifactor local and network access to privileged
IA.3.083 to require Multi-Factor Authentication (MFA) N/A S N/A
Authentication Authentication accounts and for network access to
for remote access.
non-privileged accounts.
Compliance Support | 4

Domain Capacity Number Description Darktrace Capability 1 2 3


Darktrace conducts an AI-based
investigation and triage of all alerts in the
platform. This information is timelined
Track, document, and report incidents to
and summarized for human consumption.
Incident Response Incident Reporting IR.3.098 designated officials and/or authorities both N/A S N/A
Darktrace has several hundred models
internal and external to the organization.
alerting to anomalous behavior related to
incidents which will automatically trigger an
alert in real time.

Darktrace can be used to autonomously


System Provide controls on the tools, techniques,
detect and interrupt anomalous and
Maintenance Maintenance MA.2.112 mechanisms, and personnel used to N/A S N/A
unauthorized use, including for system
Control conduct system maintenance.
maintenance.

Darktrace can be configured in such


Control the use of removable
Media Protection Removable Media MP.2.121 a way as to interrupt and prevent data N/A S N/A
media on system components.
transfer to un-authorized devices.

Darktrace can used to tag users to put


them on a watch-list. Darktrace has the
Ensure that organizational systems
ability to fine-tune existing models to give
containing CUI are protected during and
Personnel Security Personnel Actions PS.2.128 greater emphasis to the behavior of users N/A S N/A
after personnel actions such as terminations
or devices deemed to be «high-risk». Many
and transfers.
organizations use this to provide additional
assurance for leavers.

Protect and monitor the physical facility and Darktrace can support the monitoring and
Physical Protection Monitor Facility PE.2.135 support infrastructure for organizational reporting on physical protection control N/A S N/A
systems. programs.

Monitor, control, and protect organizational


communications (i.e., information
System and
Boundary transmitted or received by organizational Darktrace can be used to detect and
Communications SC.1.175 S N/A N/A
Protection information systems) at the external interrupt anomalous and unauthorized use.
Protection
boundaries and key internal boundaries of
the information systems.
Compliance Support | 5

Domain Capacity Number Description Darktrace Capability 1 2 3

Implement subnetworks for publicly


Public-Access accessible system components that are Darktrace can be used to detect and
SC.1.176 S N/A N/A
System Separation physically or logically separated from interrupt anomalous and unauthorized use.
internal networks.

Deny network communications traffic by


Network Darktrace can be used to prohibit
default and allow network communications
Communication by SC.3.183 anomalous traffic and perodically review N/A S N/A
traffic by exception (i.e., deny all, permit by
Exception system configurations.
exception).

Terminate network connections associated


Darktrace uses unsupervised machine learning
Connections with communications sessions at the end
SC.3.186 algortihms to determine the rarity of a given N/A S N/A
Termination of the sessions or after a defined period of
connection based on behavior patterns.
inactivity.

Darktrace can be used to detect and


Voice Over Internet Control and monitor the use of Voice over
SC.3.189 take action on anomalous files and email N/A S N/A
Protocol Internet Protocol (VoIP) technologies
messages.

Darktrace provides robust protection of


the endpoint by monitoring data transfer
Data at Rest SC.3.191 Protect the confidentiality of CUI at rest. N/A S N/A
to and from the endpoint to determine and
interrupt anomalous data transfer.

Darktrace detects and can be configured


Provide protection from malicious code at
System and Malicious Code to prevent any amonalous activity and any
SI.1.211 appropriate locations within organizational S N/A N/A
Information Integrity Protection potential malicious software within the
information systems.
network.

Darktrace provides real-time, AI-driven


Security Alerts & Monitor system security alerts and
SI.2.214 investigation of anomalous events occuring N/A S N/A
Advisories advisories and take action in response.
within the organization.
Compliance Support | 6

Domain Capacity Number Description Darktrace Capability 1 2 3

Monitor organizational systems, including


Monitor Darktrace provides real-time, AI-driven
inbound and outbound communications
Communications for SI.2.216 investigation of all communications traffic N/A S N/A
traffic, to detect attacks and indicators of
Attacks occuring within the organization.
potential attacks.

Darktrace can serve as a centralized


Identify Identify unauthorized use of organizational collection point for collection and correlation
SI.2.217 N/A S N/A
Unauthorized Use systems. of logs and network traffic to provide
situational awareness of anomalous activity.

About Darktrace For more information


Darktrace (DARK:L), a global leader in cyber security AI, delivers world-class technology that protects over 6,500  Visit darktrace.com
customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. Darktrace’s
fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order DESKTOP Book a demo
to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,700 employees and over 30
offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021. YOUTUBE Visit our YouTube channel
Darktrace © Copyright 2022 Darktrace Limited. All rights reserved. Darktrace is a registered trademark of Darktrace
 Follow us on Twitter
Limited. Enterprise Immune System, and Threat Visualizer are unregistered trademarks of Darktrace Limited. Other  Follow us on LinkedIn
trademarks included herein are the property of their respective owners.

You might also like