You are on page 1of 17

®

DoD Contractor’s
Guide to CMMC 2.0
Compliance

January, 2022 Rev. 4.0


Contents

DoD Contractor’s Guide to CMMC


Compliance

Introduction 1
What is CMMC 2.0? 2
What are the CMMC certification levels? 3
What is the difference between FCI and CUI? 5
What is the difference between 800-171 and CMMC? 6
What do contractors need to know about FAR and DFARS? 7
CMMC Accreditation Body and Ecosystem 8
How to prepare for a CMMC assessment? 11
What does a third party CMMC assessment involve? 12
How to ensure ongoing compliance? 13

Conclusion 14
Introduction
The cyber threat landscape is evolving at a rapid pace and guarding critical infrastructure
and sensitive information against both nation-states and non-state actors has become
a top priority for the government. Recent attacks including the Solarwinds supply chain
compromise, HALFNIUM exchange vulnerabilities and log4j exploits have only increased
the focus on this issue.

Even though there have been many attempts in the past to enforce the adoption of robust
cybersecurity measures in the defense industry, they largely failed to deliver the desired
results, leaving vital assets exposed and vulnerable.

Now, the Cybersecurity Maturity Model Certification (CMMC) is here to change that, and

all contractors working for the Department of Defense (DoD) must


familiarize themselves with it and their obligations if they want to
continue offering their products and services.

The road to CMMC compliance may seem long and difficult, but this guide makes it much
less daunting by explaining each and all steps contractors need to take to prepare for it,
achieve it, and maintain it.

1
Chapter 1
What is CMMC 2.0?
The Cybersecurity Maturity Model Certification v2.0 is a
new requirement for DoD contractors and subcontractors. Eventually, all DoD contractors and
It replaces the previous CMMC model and brings together
subcontractors that handle FCI or CUI will
cybersecurity requirements necessary to protect Federal
Contract information (FCI) and Controlled Unclassified be required to meet CMMC requirements,
Information (CUI). documented either by third party assessment or
There are several major differences between CMMC 2.0 self-assessment & attestation.
and CMMC 1.0:
• First, CMMC practices not directly taken from NIST SP Only contractors that provide commercial-off-the-shelf
800-171 have been eliminated, at Level 2, this includes products and don’t handle any CUI won’t be required to
the 20 additional practices added to the 110 practices achieve one of the three levels of compliance.
from NIST 800-171. The CMMC process maturity
requirements (997/998/999) have also been removed. CMMC Timeline
• Second, only some contractors will be assessed by The most important CMMC dates include:
third-party entities (the so-called CMMC 3rd Party
• January 2020: The introduction of CMMC Version 1.0.
Assessor Organizations, or C3PAOs for short). CMMC
1.0 required all organizations to undergo a third-party • June 2020: The release of requirements and the
assessment. CMMC 2.0 limits this to only those opening of registration for C3PAOs.
organizations that hold CUI data of a higher level of
sensitivity. Organizations holding only FCI data, or CUI • March 2021: The DOD begins a review of the CMMC
of lesser sensitivity, will now be required to conduct a program
self-assessment on an annual basis. • April 2021: The first C3PAO’s begin to be assessed
• Third, the five certification levels outlined in CMMC 1.0 against CMMC Level 3 by the Defense Industrial Base
have been reduced to only 3. Level 1, for organizations Cybersecurity Assessment Center (DIBCAC). C3PAO’s
in possession of FCI, Level 2, for organizations in must pass their own Level 3 assessment before being
possession of CUI and Level 3, for organizations able to conduct assessments themselves.
possessing prioritized CUI. Most likely, prioritized CUI • July 2021 – November 2021: The first few C3PAO’s
will be restricted to CTI related to critical weapons complete their Level 3 assessments and are pending
systems and space or aerospace applications. final approvals to begin assessments
• Fourth, some open POAM items, with a limited • November 2021: The DOD review of the CMMC
remediation window, are now permitted. Controls that program is concluded, CMMC v1.0 is effectively
are assigned a 5-point weight in the existing SP 800- terminated and replaced by CMMC 2.0
171A self-assessment process will likely be mandatory
at assessment and not permitted in a POAM. • December 2021: CMMC v2.0 model documentation
and assessment guides released
The first full version of the CMMC was published on the
website of the Office of the Under Secretary of Defense for • January 2022 – July 2023 (Estimated): Rulemaking
Acquisition & Sustainment in January 2020, and removed underway while DIB contractors prepare for CMMC
on November 4th, 2021, after an internal DOD review of requirements
the CMMC program concluded. Subsequently, CMMC 2.0
• July 2023 – December 2023 (Estimated): Rulemaking
assessment guidelines and model documentation were
for CMMC 2.0 and the CUI program is completed, and
posted to the OSD site in December 2021.
CMMC v2.0 requirements are applied to all new DOD
contracts.

2
Chapter 2
What are the CMMC certification levels?
To reflect the fact that not all contractors handle the same This level encompasses all requirements specified in
kind and quantity of sensitive government information, the NIST SP 800-171. These requirements cover everything
CMMC framework defines three cybersecurity levels. These from logging and monitoring to incident response
levels begin as a subset of NIST SP 800-171 (Level 1) and to configuration management. Note that while the
progress to a full implementation of NIST SP 800-171 plus 997/998/999 maturity requirements that directly specified
additional components from NIST 800-172 (Level 3) requirements for policies, procedures and plans have
been removed from CMMC 2.0, in reality it will be nearly
In other words, the higher CMMC level a contractor impossible to pass a CMMC 2.0 third party assessment
must comply with, the more sophisticated and better without a robust suite of documentation for an assessor
documented its cybersecurity program needs to be. to review. NIST SP 800-171, and therefore CMMC 2.0,
CMMC Level 1 assumes that an organization has developed the policies
specified in SP 800-171 Appendix E (800-53 NFO Controls).
The first CMMC level is about meeting the basic These policies include most, but not all of those that were
requirements to protect FCI, such as ensuring access directly required in CMMC 1.0 and are necessary to support
to their systems is restricted to authorized users and NIST 800-171 / CMMC 2.0 Level 2 compliance.
maintaining an accurate inventory of authorized users,
applications, and devices. FCI is defined as information, not The release of CMMC 2.0 provides additional scoping
intended for public release, that is provided by or generated guidance, particularly for manufacturers and other
for the government under a contract to develop or deliver a organizations with Operational/Industrial Technologies (OT),
product or service to the government. test equipment and Internet-Of-Things (IOT) devices. These
devices must be documented in an organizations SSP,
All organizations that have an active contract with the inventory and systems diagrams, but are not required to be
DoD should be able to achieve CMMC Level 1 compliance assessed per other CMMC practices. However, following
without any significant investment in new technology, risk-based management principles, these assets should be
however improvements in documentation and processes protected using administrative functions and technology
are often required. Under CMMC 2.0, all CMMC Level 1 to the extent that this is possible. This new guidance is
compliance will be managed via a self-assessment process. extremely beneficial for organizations with OT/IOT systems
No third-party certification will occur at this level. that are unable to meet CMMC requirements and cannot be
replaced without an unsustainable financial outlay.
CMMC Level 2
CMMC Level 3
CMMC Level 2 is all about demonstrating good cyber
hygiene and having the controls necessary to protect CUI. CMMC Level 3 focuses on addressing the changing
Contractors who would like to achieve Level 2 compliance tactics, techniques, and procedures used by Advanced
should be prepared to continuously review all activities Persistent Threats (APT) adversaries. This level will include
based on their cybersecurity polices. CMMC Level 2 will the entirety of NIST SP 800-171 but will also include a
be obtained by a third-party independent assessment for subset of controls from NIST SP 800-172 as an additional
formal certification, or through a self-assessment process supplement. The exact makeup of CMMC 2.0 Level 3 is
conducted by the contractor. unknown currently.

3
How to determine which level applies to you? Contractors that don’t have the capacity to complete this
first step in-house should partner with a managed services
The CMMC framework is divided into three levels so provider (MSP) offering CMMC readiness assessments.
that DoD contractors are not expected to comply with
requirements that are not necessary to protect the type of Once a readiness assessment has been performed to
information they handle. A contractor at the very bottom of reveal how FCI and CUI is stored, and access to information
the supply chain will possibly be required to be compliant controlled, determining which systems must comply
only to Level 1, while a contractor with access to sensitive with which CMMC level shouldn’t be a problem. FCI and
space or weaponry data will be required to be compliant/ therefore CMMC Level 1 will generally apply to most
certified to Level 2 or Level 3. However, the nature of the systems at most contractors. The scope of an environment
DOD subcontracting flow has led to the widespread overuse containing CUI and meeting CMMC Level 2 requirements
of contract provisions mandating compliance with NIST should be more limited to minimize ongoing compliance
800-171 (i.e., CMMC Level 2) for organizations that do not overhead.
and are unlikely to ever hold CUI. These organizations are
in a difficult position and must either push back on these Only contractors that are CMMC compliant
requirements during contract negotiations or commit to a
will be allowed to store FCI or CUI in their
CMMC Level 2 security posture.
environment.

To determine which CMMC level a contractor CMMC however does not apply to Commercial Off-the-
should be working toward, it’s important shelf (COTS) products or services. These are commercial
to inventory all systems with the goal of items sold in substantial quantities in the commercial
marketplace which are offered to the government, under
determining the locations, if any, of FCI and CUI. a contract or subcontract at any tier, without modification,
in the same form in which it is sold in the commercial
marketplace.

4
Chapter 3
What is the difference between FCI and CUI?
Since the CMMC framework revolves around the protection of FCI and CUI, it’s important that we clarify the difference
between these potentially confusing terms. Here’s how the National Archives and Records Administration defines each term:

Federal Contract Information (FCI) Controlled Unclassified Information (CUI)

“Information, not intended for public release, that is “Information that requires safeguarding or dissemination
provided by or generated for the Government under a controls pursuant to and consistent with applicable law,
contract to develop or deliver a product or service to regulations, and government-wide policies but is not
the Government, but not including information provided classified under Executive Order 13526 or the Atomic
by the Government to the public (such as on public Energy Act, as amended.”
Web sites) or simple transactional information, such as
necessary to process payments.”

As the two definitions explain, the terms FCI and CUI are Controlled Technical Information (CTI) is a special type of
both used to describe information created or collected CUI. It consists of technical information with military or
by or for the government, and also information received space application that is subject to controls on access, use,
by the government. FCI data is of a lower sensitivity. It reproduction, modification, performance, display, release,
includes contract documents, performance metrics and disclosure, or dissemination. Examples of CTI include
pricing or vendor sensitive information that may not be research and engineering data, engineering drawings, and
publicly disclosed. CUI often includes building schematics, associated lists, specifications, standards, process sheets,
measurements and specifications for parts and other manuals, technical reports, technical orders, catalog-item
information that could be valuable to an adversary. identification, data sets, studies and analysis, and related
information, and computer software executable code
DoD has an obligation to label CUI as such when provided and source code. CTI is a CUI category that has been
to a contractor, however in practice this does not always specifically singled out by the DoD in the CMMC framework.
occur. The migration from legacy compliance terms such It is information that may need additional protection above
as FOUO and training of DoD contract officers is ongoing. and beyond CMMC 2.0 Level 2, meaning contractors with
Contractors should make their best effort to review the data this information are possible candidates for CMMC 2.0
in their possession and ensure it is appropriately protected Level 3. It is very likely that contracts containing CTI will be
if deemed to be CUI. prioritized for third party assessments at Level 2, and self-
There are two subsets of CUI: attestation will not be available.

• CUI Basic: Laws, Regulations, or Government-wide In summary, it can be said that all CUI is also FCI, but not all
policies that DO NOT require specific protections. FCI is CUI. At the same time, both FCI and CUI are distinctly
Agencies handle CUI Basic according to the uniform set different from information that is marked for public
of controls set forth in this part and the CUI Registry. release because that doesn’t carry any minimum-security
requirements.
• CUI Specified: Laws, Regulations, or Government-
wide policies that require specific protections. The
CUI Registry indicates which laws, regulations, and
Government-wide policies include such specific
requirements.

5
Chapter 4
What is the difference between 800-171 and CMMC?
Both NIST SP 800-171 and CMMC aim to strengthen Third-Party Certification
the cybersecurity posture of the defense industrial base
and protect sensitive information from unintended Under NIST SP 800-171, contractors didn’t have to pass
disclosure, but CMMC adds to, or in some cases removes any official certification process to prove that they have the
requirements from the overall 800-171 standard. ability to protect CUI. While some behaved responsibly and
took cybersecurity seriously, many merely developed a plan
for how compliance would eventually be achieved in the
For CMMC Level 1, only the NIST 800-171 future.
requirements necessary to implement basic This is changing with CMMC, which requires some
safeguarding of FCI are included. CMMC Level contractors to be certified by official assessment
organizations, CMMC 3rd Party Assessment Organizations.
2 includes all of the NIST 800-171 requirements, These organizations will be licensed by the CMMC
and CMMC Level 3 will add additional Accreditation Body (CMMC-AB), which was established
requirements from NIST 800-172. in January 2020 to train, test, and license up to 10,000
C3PAOs.

Tiered Approach to Cybersecurity Mandatory Certification


NIST SP 800-171 was presented by the DoD as a
NIST SP 800-171, or National Institute of Standards and
competitive advantage in the tender process, but today’s
Technology Special Publication 800-171, was developed in
cybersecurity landscape demands a different approach,
response to the Federal Information Security Management
one that doesn’t depend on contractors voluntarily
Act (FISMA), a United States federal law passed in 2002
strengthening their defenses to protect sensitive
that recognized the importance of information security to
information from malicious third parties and unintended
the economic and national security interests of the country.
public disclosure.
NIST SP 800-171 is essentially a one-size-fits-all standard.
The original version specified 110 security controls, many of To work with the DoD in the future, all
which were unreasonably difficult for small DoD contractors
to comply with. For example, Control 3.14.6 essentially
contractors will eventually be required to either
requires contractors to implement a security information attest to their CMMC status or obtain a CMMC
and event management (SIEM) solution because it requires certification from a C3PAO or the DOD.
organizations to “monitor organizational systems, including
inbound and outbound communications traffic, to detect
attacks and indicators of potential attacks.”

CMMC 2.0 abolishes the one-size-fits-all


approach to cybersecurity by mapping security
controls to one of three levels, with the second
maturity level covering 100 percent of the
NIST 800-171 controls. This way, contractors
that represent minimal risk can certify or
be compliant only at the lowest level, whose
requirements they may already meet.

6
Chapter 5
What do contractors need to know about
FAR and DFARS?
The CMMC builds upon existing regulations, extending Previously, CMMC 1.0 was required in contracts by the
them to meet the cybersecurity challenges government insertion of a reference to DFARS 252.204-7021. It is
contractors face in this day and age. These regulations are unclear if this clause will also be used for CMMC 2.0.
included in the Federal Acquisition Regulations (FAR) and There is likely to be no allowance for certification of a
the Defense Federal Acquisition Regulation Supplement contractor after a contract has been awarded. Certification,
(DFARS), which implements and supplements the FAR. if required, should be obtained before or during the bid
process. Importantly, CMMC, possibly via DFARS 7021 will
Both FAR and DFARS clauses are referenced in DoD be included in contracts alongside 800-171 and DFARS
contracts and are often flowed down to subcontractors 7012, assuming the contract requires CMMC Level 2 or
as well. A DoD contractors’ commitment to a specific above. CMMC does not replace the previous DFARS 7012
cybersecurity standard begins with the contractual requirements. This is critical as DFARS 7012 contains
commitments outlined in these clauses. Any compliance requirements in paragraphs c-g of the regulation itself
work undertaken prior to a thorough review of existing that are not included in CMMC. Additionally, NIST 800-171
contracts is time wasted. Appendix E contains 63 Non-Federal Organization (NFO)
FAR 52-204.12 governs requirements for managing controls that also are assumed to be implemented per
Federal Contract Information (FCI). These are 15 relatively DFARS 7012 and are not included in CMMC.
straightforward controls that all contractors must meet in In November of 2020, DoD elected to strengthen the
order to handle FCI. They will be assessed as part of any existing DFARS 7012 requirements as an interim step
CMMC certification, beginning with Level 1. due to the extended ramp up of the CMMC program. The
In October of 2016, the DoD issued the DFARS 252.204- so-called “interim rule”, implemented via DFARS 252.204-
7012 clause, requiring contractors to implement NIST 800- 7019 and 7020, requires contractors to perform a self-
171 standards to protect information systems containing assessment against NIST 800-171 and provide a score to
CUI. 7012 requires contractors to maintain a System the DoD prior to contract award. DFARS 7019/7020 are
Security Plan (SSP) and Plan of Actions & Milestones not retroactive, however their implementation has been
(POAM) and also includes requirements for reporting far more rapid than CMMC and requirements for self-
security incidents that impact CUI. The contractors’ level assessment completion are now commonplace, especially
of compliance with 800-171 is not reportable to DoD under from prime contractors seeking to verify the security
DFARS 7012. Today, the 7012 clause is commonly found in posture of their subcontractors and supply chain.
both DoD contracts and subcontracts.

7
Chapter 6
CMMC Accreditation Body and Ecosystem
The CMMC Accreditation Body (CMMC-AB) is an
independent nonprofit organization operating under an The CMMC-AB’s role is to help contractors,
agreement with the DoD. The CMMC-AB is not part of the consultants, and assessors better understand
DoD or the US government by design. The CMMC-AB was
what is acceptable under CMMC, and ensure that
designed to be run by an independent board of directors,
to ensure the CMMC business model is mindful of any the assessments are fair and meet requirements.
potential impact to small and midsized businesses that are The CMMC-AB does not perform assessments,
relied upon by the DoD.
or consulting.
The Initial governance architecture and business model
was designed through committees with representatives
from across industries and academia. The CMMC-AB The CMMC ecosystem consists of a marketplace that
continues to engage the industry through working groups includes Service Provider Organizations and Individuals
for continued feedback and was designed to be a listening Performing Services. Services Provider Organizations
organization that welcomes feedback from industry consist of Registered Provider Organizations (RPOs), who
advisory councils. are consulting companies that help contractors prepare for
assessments but are not permitted to provide formal third-
The CMMC-AB has a strong relationship with DoD, which party assessments, and Certified 3rd Party Assessment
oversees the CMMC framework, while the CMMC-AB Organizations (C3PAOs), who can provide assessments
manages the CMMC ecosystem. The DoD controls the or consulting services to contractors are also considered
CMMC model and sets minimum thresholds for acceptable Services Provider Organizations. However, an organization
CMMC assessments. The DoD can also impose at its providing assessment readiness consulting services to a
option additional cybersecurity requirements outside of the contractor cannot conduct a CMMC assessment on that
CMMC ecosystem. The DoD requires the implementation same organization. Individuals Performing Services consist
of CMMC requirements by contractors through DFARS and of Registered Practitioners (RPs) who are consultants that
other contractual requirements. help contractors prepare for assessments, and Certified
Professionals (CCPs) who are consultants that can
participate on assessment teams, and Certified Assessors
The CMMC ecosystem is managed by CMMC-
(CAs) who are consultants that lead formal assessments.
AB, which defines the ecosystem structure,
Contractors can visit the CMMC-AB service provider
entities, training, exam requirements, etc.
marketplace to find an RPO or C3PAO, who will then
determine what level individuals need to engage with the
contractor. Contractors can also prepare for an assessment
It also creates additional refinements as necessary to by themselves without engaging with an RPO or C3PAO.
ensure a strong CMMC ecosystem and provides feedback
to DoD about the CMMC Model and documentation, to
further refine and enhance the model.

8
Assessment Process at the beginning of the assessment, and the CMMC-AB
charges the contractor a fee if the certification is awarded.
However, the CMMC-AB does not set pricing between
Prior to a formal third-party assessment, contractors and C3PAOs.
contractors should conduct a pre-assessment Once the contractor and C3PAO enter into a contract, the
readiness review before engaging with a C3PAO registers the assessment with the CMMC-AB and
C3PAO. obtains an Assessment ID. This ID will be used to track the
assessment throughout the process. The lead assessor
will develop an assessment plan defining roles and
responsibilities, as well as what objective evidence needs
The purpose of a pre-assessment readiness review is to
to be collected. The assessor will not need access to CUI/
ensure the contractor has carefully cataloged the objective
FCI except any that may contain objective evidence. The
evidence necessary to demonstrate sufficient adoption
assessor will need to be able to walk the floors of the facility
of the controls corresponding to the desired CMMC
that are in scope, as site visits are necessary to validate
certification. The contractor can engage a consultant for a
controls in Physical Protection domain.
pre-assessment readiness review or perform it themselves.
The pre-assessment readiness review collects necessary During the assessment, the assessment team cannot
objective evidence for each control and provides a written provide consulting advice, recommendations, etc. including
description of how the objective evidence demonstrates minor changes that may benefit the contractor during the
satisfactory adoption of the control. It is important to assessment. The assessment team conducts interviews
note that falsifying or misrepresenting information in an in private and develops notes which are confidential. The
assessment can be grounds for False Claims Act action assessment team can also leverage virtual components,
against the contractor. such as screen sharing, videoconferences, etc., to conduct
their review.
At the start of the assessment, the assessment team will
After the contractor has prepared for the
provide an opening briefing to define the targeted maturity
assessment by performing a pre-assessment level for assessment, introduce the assessment team
readiness review, they can then engage with members, and methods for collecting data, as well as
the assessment schedule. At the end of each day, during
C3PAO.
the assessment, the assessment team will conduct a
daily debrief with the contractor to discuss daily progress
and ask any questions, as well as identify practices and
Contractors can find a C3PAO using any desired method, processes that were reviewed, and those that are “other
including visiting the CMMC-AB marketplace. Contractors than satisfied” areas that need to be re-examined and
are encouraged to validate with the CMMC-AB that a C3PAO discuss the next day’s schedule. An onsite visit as part of
is in good standing prior to engaging with them. all CMMC assessments is mandatory. The DIB is awaiting
guidance from DoD to determine how assessments will be
The contractor will define the scope with the C3PAO lead
conducted for organizations that have no office or have a
assessor based on FCI/CUI location and the necessary
mostly remote workforce.
maturity level. The pre-assessment readiness should
determine what is in or out of scope. In general, any system
that stores, processes, connects to or can otherwise
impact FCI or CUI will be in-scope for Level 1 and Level 2 After the assessment is complete, the assessment
respectively. However, exact interpretations regarding the team will generate recommended findings and provide a
applicability and scoping of controls will differ between timeline for when the assessment results will be registered
assessors and C3PAO’s. There is currently no process in with CMMC-AB. If there are any findings that prevent
place to reconcile these differences, so organizations are certification, the contractor will have 90 days to remediate
encouraged to thoroughly vet any C3PAO prior to a full minor issues. Findings that will take longer than 90 days
engagement. The CMMC-AB charges the C3PAO a fee to remediate may be entered into a plan of actions and
milestones (POAM) with a timeline for resolution of no more

9
than 180 days. However, certain controls are expected to be When a contractor submits an adjudication request, the
banned from being included in a POAM. These will likely be CMMC-AB will conduct a preliminary evaluation. If it is
the existing 5-point SPRS items as noted in the NIST 800- determined that the certification should have been granted,
171A Self-Assessment guide. then CMMC-AB will issue revised assessment results.
However, if it is determined that the assessment results
After any issues are remediated (where appropriate), are valid, the contractor has the opportunity to request a
the lead assessor finalizes the assessment report and secondary evaluation. The CMMC-AB will then conduct a
submits it to the C3PAO. The C3PAO must then perform secondary evaluation in the form of a “delta assessment”
a quality assurance review of the assessment report. The covering only the areas that are being disputed, at a cost
C3PAO must concur with the findings of the assessment to the contractor. The CMMC-AB quality staff will then
recommendation. Once the assessment report has been QA evaluate the results of the second evaluation and determine
reviewed, the report and assessment results are submitted the final results.
to the CMMC-AB by the C3PAO.
The CMMC-AB will receive the assessment report and
recommendations. If certification is not recommended, For the above reasons, it is critical for
the CMMC-AB will not complete a QA review. However, contractors to start preparing for their CMMC
if certification is recommended, then the CMMC-AB will
assessment now. The DoD’s phased approach
perform an independent QA review. If the review confirms
that the assessment report is sufficient, then the CMMC- gives contractors a chance to address any
AB will issue a certification to the contractor, which will potential shortcomings in their systems in
be valid for 3 years. If the QA review determines that the
advance of a formal assessment.
assessment is not sufficient, then CMMC-AB will notify
the contractor and C3PAO and provide details on why the
certification is not being issued.
Contractors can then dispute the CMMC-AB’s findings
if they feel that the assessment team or C3PAO
misinterpreted CMMC practices, displayed an ethical
lapse, made egregious errors, or were malfeasant in their
duty to perform a professional and unbiased assessment.
The contractor has 14 days from the completion of their
assessment to file the dispute with the CMMC-AB, and all
disputes will be completed and resolved within 90 days.

10
Chapter 7
How to prepare for a CMMC assessment?
Prior to the arrival of the CMMC, defense contractors were Step 2: Creating a remediation plan and
required to self-certify that they follow cybersecurity best resolving the gaps
practices, however there was no reporting back to DOD on
the contractor’s cybersecurity posture. The CMMC adds Once all cybersecurity gaps have been identified, they must
additional reporting and requirements to the status quo be resolved according to a remediation plan, which is an
and requires a subset of contractors to pass a CMMC actionable plan that lists all activities necessary to resolve
assessment performed by a C3PAO or the DOD itself. security issues in the order they should be performed.
The remediation plan should describe how the
Because it can take a lot of time and work to cybersecurity gaps were uncovered and quantify the risk
prepare for a CMMC assessment, the CMMC they represent. A timeline should be provided to help ensure
the remediation doesn’t take too long, and estimated
Accreditation Body (CMMC-AB) advises remediation costs should be included to avoid budget
contractors to start preparing for it at least six overruns. For CMMC, most of these gaps will be related to
months in advance, depending on their current written policies and procedures that must be developed.
The effort required to implement these for an organization
cybersecurity readiness and resources. is significant.

Step 3: Ongoing monitoring and reporting


Step 1: Start with a readiness assessment and The Department of Defense expects contractors to
gap analysis monitor their systems on an ongoing basis and report any
incidents they detect. Ongoing access reviews, auditing
As CMMC is comprised of existing standards, and common
and monitoring of controls should also be expected.
business practices, it is possible that many DoD contractors
Newly implemented policies and procedures must now be
already have some of the work required to achieve one of
reviewed on a recurring basis and updated as necessary.
the lower CMMC maturity levels.
For large contractors with a wealth of resources and plenty
The goal of a readiness assessment is to first provide of cybersecurity experience with specialized cybersecurity
a detailed inventory of information technology systems monitoring tools, this last step won’t be too much of a
including types of data stored, how that data flows to other challenge. Smaller contractors, on the other hand, may find
systems, where it is stored, and how users access systems it to be the most difficult step of the three.
during day-to-day work. This inventory allows for an
Such contractors are often unable to do everything in-house
accurate diagram and environment scope to be prepared,
without losing focus on their core business and maintaining
clearly showing which systems must be compliant with
the quality of service that has helped them secure a
800-171 and those that do not need to be as stringently
government contract in the first place. Fortunately, they
protected.
can outsource cybersecurity monitoring—and many other
This information is then used to perform a comprehensive activities associated with CMMC assessments for that
gap analysis in order to pinpoint what needs to be done to matter—to a Managed Security Service Provider (MSSP).
move from the current state to a compliant future state.
A gap analysis plays an essential role in helping DoD A partnership with an experienced MSSP allows DoD
contractors prepare for CMMC requirements because it contractors to get the expertise they require without
identifies risks, reveals the cost of remedial steps, and helps stretching themselves too thin, and it typically results in
develop an efficient plan for implementation. substantial time and cost savings compared with the in-
house approach, making it the best way to prepare for a
CMMC assessment.

11
Chapter 8
What does a third party CMMC assessment involve?
3. This verification can involve any staff member or job
Third party CMMC assessments are function mentioned in a policy or procedure including
performed by CMMC Third-Party Assessment HR, Operations and individual end users. All staff
must be able to demonstrate familiarity with policies,
Organizations, which are third-party procedures and training material that include them.
organizations that have received accreditation
• Issuing of an official assessment report: Finally, the
by the CMMC Accreditation Body (CMMC-AB). C3PAO will submit an official report to the CMMC
Accreditation Body (CMMC-AB), after doing its
own internal QA, detailing how well the assessed
CMMC assessments are evidence-based and take place
organization performed and whether or not it meets the
on-site. The result of a successful CMMC assessment
requirements of the target CMMC Level. The C3PAO
is a CMMC certification, which represents that the
will keep details about specific findings confidential,
contractor has demonstratively achieved a certain level of
so the organization doesn’t have to worry about
cybersecurity maturity.
suffering damage to its reputation. The CMMC-AB
Here’s what a CMMC assessment may involve in practice: will then conduct its own QA to validate the C3PAO’s
assessment and then determine whether certification
• Review of the current security program: First, the can be issued directly to the contractor.
C3PAO will get in touch with the person who is
responsible for the organization’s cybersecurity. This It’s important to keep in mind that passing one CMMC
can be a dedicated CISO, but it can also be the network assessment doesn’t mean that the certified contractor
administrator, or other designated personnel. The can stop worrying about CMMC and its requirements.
C3PAO will go over the current security program to According to the DoD, CMMC is intended to be an evolving
better understand the environment that it’s dealing with. certification and compliance process that will very likely
Specifically, the C3PAO will want to know what FCI/CUI introduce new controls to the various levels in response to
data is stored and transmitted by the organization and emerging threats.
how.
• Review of currently used controls: After familiarizing
itself with the organization’s security program, the Because CMMC certification will be valid for
C3PAO will review the organizations System Security three years, contractors must prepare for regular
Plan (SSP) that includes controls that the organization
reassessments by working toward ensuring
has implemented to detect, prevent, reduce, or
counteract security risks. At this point, the goal is to ongoing compliance.
find out whether all controls that are supposed to be in
place are actually in place.
• Verification of the implementation of controls:
Next, the C3PAO will perform an in-depth analysis of
individual controls to verify their implementation. An
assessor may ask the person who is responsible for
the organization’s cybersecurity to explain a certain
process or demonstrate how a specific control works.
Depending on the maturity level, the assessor may need
to see an informal walkthrough of the process for level
1 but may require written documentation in the form of
a policy, procedure, or configuration data at level 2 or

12
Chapter 9
How to ensure ongoing compliance?
The road to CMMC compliance doesn’t end with a
successfully obtained certification. In order to maintain All DoD contractors that want to achieve
the ability to protect sensitive information and pass future compliance with CMMC Level 2 and above
assessments, DoD contractors must take certain steps
to keep their cyber defenses effective against the latest must document their policies and procedures
threats coming from cybercriminals and state-sponsored to the extent necessary to support NIST 800-171
actors alike. A functional CMMC program will include requirements for identification, inventory, and
numerous requirements for audits, reviews or checks of
security controls on an ongoing basis. monitoring.

Designate a Compliance Position


More importantly, they must regularly audit them and
The first step any organization must take to ensure ongoing update them, if necessary, to maintain their relevancy and
CMMC compliance is to designate a compliance officer if effectiveness.
this has not already been done. The job of a compliance
officer is to maintain compliance with outside regulations Maintain Technical Capabilities
and internal policies by monitoring the controls put in place
Cybercriminals are constantly evolving their tactics,
to mitigate compliance risk and proactively suggesting
exploring increasingly sophisticated strategies for
ways in which they can be improved.
circumventing the cybersecurity defenses of organizations
The role of a compliance officer is suitable for someone handling sensitive government information. For DoD
who has an in-depth knowledge of the organization and contractors to ensure ongoing CMMC compliance, they
understands the regulatory landscape in which it operates. must prevent their tools from becoming obsolete and
In smaller organizations, it’s not unheard of for the ineffective.
compliance officer to also have the title of Chief Security
This is possible only when cybersecurity is given a
Officer (CSO) or Chief Information Officer (CIO), while larger
sufficiently high priority to maintain technical capabilities
organizations tend to separate the roles to prevent the
on an ongoing basis. For many contractors, this means
overlap of responsibilities.
partnering with a managed security services provider that
Maintain Policies and Procedures understands what it takes to protect sensitive government
information against release.
Policies and procedures can be seen as two sides of the
same coin. The goal of policies is to guide decisions and
actions by providing a deliberate system of principles.
Procedures, on the other hand, are established ways of
doing something.

13
Conclusion
The Cybersecurity Maturity Model Certification aims to address the growing number of
cybersecurity threats faced by the Department of Defense and its contractors. It unifies
the implementation of cybersecurity defenses by requiring all DoD contractors to become
compliant with one of three levels of the CMMC model,

In the near future, a CMMC certification or compliance will be a necessary prerequisite


for bidding on defense contracts. As such, it’s in the best interest of all DoD contractors to
learn what it takes to obtain it and start taking the steps necessary to protect CUI and FCI.

If you have any questions about CMMC and the steps it takes to achieve compliance with
it, contact us at OSIbeyond and let us help you improve the maturity of your cybersecurity
defenses.

14
®

About

OSIbeyond specializes in CMMC compliance and is a Registered Provider


Organization (RPO) authorized by the CMMC Accreditation Body (CMMC-AB)
to provide consulting services to DoD contractors seeking CMMC certification.
In addition, with multiple Registered Practitioners (RP) available on staff, we
have the credentials and expertise to guide your organization in becoming
CMMC audit ready and maintaining compliance post certification.
If your organization is a DoD contractor seeking to obtain CMMC certification,
then cybersecurity compliance is a critical component of your business.
Cyber threats continue to evolve and become more malicious every day.
Organizations that don’t take these threats as serious as they would with any
other external forces, will risk the demise of their business.
OSIbeyond offers comprehensive cyber security solutions to help your
organization stay ahead of cyber threats. Our compliance services are focused
on helping your organization meet compliance standards, while our managed
security services help maintain compliance on an ongoing basis. The
combination of both services offers an end to end cyber security solution.

www.osibeyond.com

You might also like