Since the beginning of 2022, much has changed – and more is likely to change – with the scope of the Department of Defense (DoD) CMMC levels and security requirements.
In an effort to streamline processes and help defense contractors, CMMC dropped the initial five levels to three.
But what are those changes and why should you be concerned?
In this article, we will explain what the CMMC framework is, the various levels and security domains, and a summation of the intent behind each CMMC control family.
The Cybersecurity maturity model certification framework was born as a result of a realization by DoD that the Defense Industrial Base (DIB) ability to self-assess was failing and DIB members were overwhelmingly unprepared and not appropriately resourced to handle a compliance program.
The CMMC model started as a result of Executive Order 13556 signed by President Obama in 2010, directing all Federal agencies to safeguard their Controlled Unclassified Information (CUI).
CMMC compliance at its core is not about compliance but a program that has been established to provide proactive protection measures against Advance Persistent Threat types such as:
Nation states – targeting military technologies for a competitive edge on the battlefield.
Terrorist and other non-governmental organizations – targeting to learn ways to defeat our countermeasures on the battlefield.
Criminals – targeting to steal our IP and disrupt economic activity.
DoD has recently streamlined the CMMC process calling it CMMC 2.0. This resulted in the elimination of CMMC levels 2 and 4 leaving only three levels (Levels 1, 2, and 3) under the new CMMC framework to streamline the maturity processes.
DoD Contractors that have the DFARS 7012 in their DoD contracts are required to meet the additional safeguards defined within the 7012 clause as well as 48 CFR 52.204-21 referred to the Federal Acquisition Regulation clause.
CMMC Level 1 is intended to implement basic cyber hygiene to meet 17 foundational CMMC requirements intended to protect Federal Contract Information (FCI). These requirements are derived from the National Institute for Standards and Technology (NIST) Special Publication 800-171. NIST SP 800-171 defines the requirements and objectives for DoD Contractors to implement.
CMMC Level 2 under CMMC 2.0 program aligns with NIST 800-171 110 security controls designed to protect CUI. This level is designed to achieve advanced cybersecurity practices to deter and prevent Advanced Persistent Threats (APTs) and non-state actors from compromising Defense Contractors’ information systems.
CMMC Level 3 will be reserved for the most sensitive types of CUI that could cause the most damage to U.S. national security interests. Although the cybersecurity requirements haven’t been finalized or released as of yet, CMMC 3 is considered to be an expert implementation of a subset of requirements derived from NIST SP 800-172.
The CMMC level 3 assessment guide focuses on Advanced Persistent Threat (APT) mitigation and is used for the DoD’s highest levels.
Please note that CMMC Level 3 has not been finalized as of November 22, 2022, and the below standards are referring to NIST 800-172 which DoD indicated it will derive from to establish CMMC enhanced security controls.
As such, the following are the proposed level three controls:
Controlling information flows between connected domains using secure transfer mechanisms.
Utilizing practical exercises that align to current threat scenarios to make it unique to your operating environment.
Establish and maintain an authoritative repository of information system components such as an asset management tool, configuration management database, change management, etc.
Establish automated or manual processes and procedures to prohibit systems and services from connecting unless they are known, authenticated, in a properly configured state, or in a trust profile.
Establish an operational Security Operations Center and create and maintain a ready IR team that can be deployed in an acceptable time period.
Perform individual personnel screening and reassess individual positions and access to CUI need-to-know frequently.
Employ and require cybersecurity personnel to be involved in all parts of the system development lifecycles to ensure secure architectures, controls, monitoring capabilities, response, and recovery functions are implemented.
Perform (usually annually or bi-annually) penetration testing that uses your threat profile as well as the use of automated scanning and manual testing tools by subject matter experts.
Employ a diverse approach to software, hardware, and services to reduce the risk of malware propagation.
Verify the correctness of assets using verification techniques such as configuration checks, cryptographic signatures, and trusted capabilities that provide assurance and trustworthiness that they employ secure protocols and practices.
As of March 2022, the DoD has streamlined its requirements and eliminated both CMMC level 4 and CMMC level 5 requirements, reducing it to three levels for more effective processes.
Determining what level your company is required to be at requires a review of your existing contracts and your future pipeline. If any of your current contracts process, store, or transmit CUI within your corporate infrastructure you are required to seek certification at level 2.
However, if CUI is not present in your environment nor do you have a contractual obligation you are then required to seek certification at level 1. Again, CMMC certification level 1 only requires that you self-certify and enter your score in the U.S. Government’s Supplier Performance Risk System.
For those organizations seeking a CMMC certification at level 3, it will be very clear during the acquisition process this will be required. However, assessment guidance and resources to certify organizations at this level are not available at the time of this writing.
CMMC implementation requires a detailed action plan, an intermediate cyber hygiene level, and expert CMMC consultants to roll out and remain compliant.
for a complete list of standards for each level, and then reach out to us for any further questions or help to upgrade the cybersecurity program for your organization.