HOME

TheInfoList



OR:

The Cybersecurity Maturity Model Certification (CMMC) is an assessment framework and assessor certification program designed to increase the trust in measures of compliance to a variety of standards published by the
National Institute of Standards and Technology The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into Outline of p ...
. The CMMC framework and model was developed by
Office of the Under Secretary of Defense for Acquisition and Sustainment The Under Secretary of Defense for Acquisition and Sustainment, or USD(A&S), is the Principal Staff Assistant (PSA) and advisor to the United States Secretary of Defense, Secretary of Defense for all matters relating to acquisition and sustainme ...
(OUSD(A&S)) of the United States Department of Defense through existing contracts with
Carnegie Mellon University Carnegie Mellon University (CMU) is a private research university in Pittsburgh, Pennsylvania. One of its predecessors was established in 1900 by Andrew Carnegie as the Carnegie Technical Schools; it became the Carnegie Institute of Technology ...
, The Johns Hopkins University Applied, Physics Laboratory LLC, and Futures, Inc. Th
Cybersecurity Maturity Model Certification Accreditation Body
oversees the program under a no cost contract. The program is currently overseen by the DOD CIO office. CMMC, which often requires third party assessment if a contractor handles
Controlled Unclassified Information Controlled Unclassified Information (CUI) is a category of unclassified information within the U.S. Federal government. The CUI program was created by President Obama’s Executive Order 13556 to create a streamlined method for information sharing ...
, will impact the $768bn Defense industry – 3.2% of the Gross Domestic Product of the United States of America. The purpose of the CMMC is to verify that the
information systems An information system (IS) is a formal, sociotechnical, organizational system designed to collect, process, store, and distribute information. From a sociotechnical perspective, information systems are composed by four components: task, people ...
used by the contractors of the United States Department of Defense to process, transmit or store sensitive data is in compliant with the mandatory information security requirements. The goal is to ensure appropriate protection of controlled unclassified information (CUI) and federal contract information (FCI) that is stored and processed by partner or vendor.  


Model

The framework provides a model for contractors in the Defense Industrial Base to meet the security requirements fro
NIST SP 800-171 Rev 2
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. Some contracts will also include a subset of requirements from NIST SP 800–172, Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication. 800–171. CMMC organizes these practices into a set of domains, which map directly to the NIST SP 800-171 Rev 2 and NIST SP 800-172 families. There are three levels within CMMC—Level 1, Level 2, and Level 3' CMMC will not be enforced on federal contracts until the final rulemaking has completed and incorporated into the 32 & 48
Code of Federal Regulations In the law of the United States, the ''Code of Federal Regulations'' (''CFR'') is the codification of the general and permanent regulations promulgated by the executive departments and agencies of the federal government of the United States. ...
(CFR)

Upcoming guidance has been promised from the CMMC office to help set expectations for companies in the Defense Industrial Base as to what level accreditation should be sought, depending on their role as a prime or sub on various contracts.


History

In 2002 the
Federal Information Security Management Act The Federal Information Security Management Act of 2002 (FISMA, , ''et seq.'') is a United States federal law enacted in 2002 as Title III of the E-Government Act of 2002 (, ). The act recognized the importance of information security to the ec ...
required each federal agency in the United States to develop, document, and implement an agency-wide program to provide information security for the information and information systems. In 2002 Cybersecurity Research and Development Act authorized appropriations to the
National Science Foundation (NSF) The National Science Foundation (NSF) is an independent agency of the United States government that supports fundamental research and education in all the non-medical fields of science and engineering. Its medical counterpart is the National I ...
and to the
Secretary of Commerce The United States secretary of commerce (SecCom) is the head of the United States Department of Commerce. The secretary serves as the principal advisor to the president of the United States on all matters relating to commerce. The secretary rep ...
for the
National Institute of Standards and Technology The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into Outline of p ...
(NIST) to establish new programs, and to increase funding for certain current programs, for computer and network security (CNS) research and development and CNS research fellowships. This led to the development of security requirements in the Cybersecurity Maturity Model Certification framework. In 2003 FISMA Project, Now the Risk Management Project, launched and published requirements such as
FIPS 199 FIPS 199 (Federal Information Processing Standard The Federal Information Processing Standards (FIPS) of the United States are a set of publicly announced standards that the National Institute of Standards and Technology (NIST) has developed f ...
, FIPS 200, and NIST Special Publications 800–53, 800–59, and 800–6. Then NIST Special Publications 800–37, 800–39, 800–171, 800-53A. In 2010 Executive Order 13556 – Controlled Unclassified Information rescinded a previous order and created a standard for labeling data across the government. In 2011 Defense Federal Acquisition Regulation Supplemental (DFARS) the proposed rule 7000 to enact requirements for safeguarding unclassified information specifically as it related to fundamental research got proposed in Case 2011-D039. In 2013 DFARS 252.204-7000 Rule goes into effect which required the protection of sensitive data on non-federal systems. In 2016 DFARS 7012 clause goes into in effect requiring all contract holders to self-assess to meeting the security requirements of NIST-SP-800-171. In 2019 the Department of Defense announced the creation of the Cybersecurity Maturity Model Certification (CMMC) to transition from a mechanism of self-attestation of an organization's basic cyber hygiene which was used to govern the Defense Industrial Base. Since 2017 all defense contractors were required to self-assess and report their cybersecurity readiness against the
NIST SP-800-171 The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical sci ...
standard. After a series of breaches in the supply chain, the Department of Defense working in partnership with industry created the CMMC model. In 2019 interim rule authorizing the inclusion of CMMC in procurement contracts, Defense Federal Acquisition Regulation Supplement (
DFARS The Federal Acquisition Regulation (FAR) is the principal set of rules regarding Government procurement in the United States,. and is codified at Chapter 1 of Title 48 of the Code of Federal Regulations, . It covers many of the contracts issued by ...
) 2019-D041, was published on September 29, 2020, with an effective date of November 30, 2020. On December 8, 2020, the CMMC Accreditation Board and the Department of Defense released an updated timeline that has the model fully implemented by September 2021. On December 8, 2020, the Department of Defense releases seven pathfinder grants that will pilot the CMMC framework and require any contractor on the grant to have a certified third-party assessor measure a company's compliance. On December 31, 2020, the
General Services Administration The General Services Administration (GSA) is an independent agency of the United States government established in 1949 to help manage and support the basic functioning of federal agencies. GSA supplies products and communications for U.S. gove ...
released a Request for Proposal for their Polaris program that noted while CMMC currently applies only to the Department of Defense all government contractors, civilian or military, should prepare to meet CMMC requirements. On November 4, 2021, the Department of Defense announced the release of CMMC 2.0. This new version was designed to streamline its requirements. On September 29, 2022, the Cyber AB (the accreditation body for the CMMC for the Department of Defense), established a subsidiary to manage the training and certification entitled the "Cybersecurity Assessor and Instructor Certification" (CAICO). On October 25, 2022, th
Cybersecurity Assessor and Instructor Certification Organization (CAICO)
announced the launch of the Certified CMMC Professional (CCP) exam. This exam verifies a candidate's knowledge of the Department of Defense's CMMC framework and the roles and responsibilities of the various positions within it. On January, 5th, 2023 RedSpin a CMMC third party assessor announced they had successfully assessed a client as part of the Joint Surveillance Voluntary Assessment Program (JSVAP) assessment.


Criticism

Industry professionals have voiced significant concern over the lack of centralized official communications and the accelerated timeline for rollout. The sheer number of companies affected in the
Defense industrial base The term defense industrial base (or DIB), also known as the defense industrial and technological base, is used in political science to refer to a government's industrial assets that are of direct or indirect importance for the production of equip ...
create a level of volume for the still-not-yet accredited CMMC Third Party Assessment Organizations (C3PAOs) that would appear to be unrealistic by the proposed deadlines and has been discussed heavily on LinkedIn. Arrington has responded by asserting that reciprocity with existing certification programs such as
FedRAMP The Federal Risk and Authorization Management Program (FedRAMP) is a United States federal government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and servi ...
and
FIPS 140 The 140 series of Federal Information Processing Standards ( FIPS) are U.S. government computer security standards that specify requirements for cryptography modules. , FIPS 140-2 and FIPS 140-3 are both accepted as current and active. FIPS 1 ...
will remove duplicative work and keep the work level minimal for companies already in compliance. CMMC Accreditation Body Chairman Ty Schieber left the board, along with Mark Berman, communications director, amidst an apparently unsanctioned 'Pay to Play' sponsorship program being published to the CMMC-AB website. Karlton Johnson stepped into the Chair role.


See also

*
Defense industrial base The term defense industrial base (or DIB), also known as the defense industrial and technological base, is used in political science to refer to a government's industrial assets that are of direct or indirect importance for the production of equip ...
(DIB) *
FIPS 140 The 140 series of Federal Information Processing Standards ( FIPS) are U.S. government computer security standards that specify requirements for cryptography modules. , FIPS 140-2 and FIPS 140-3 are both accepted as current and active. FIPS 1 ...
*
FIPS 140-2 The Federal Information Processing Standard Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to approve cryptographic modules. The title is ''Security Requirements for Cryptographic Modules''. Initial pu ...
*
FIPS 140-3 The Federal Information Processing Standard Publication 140-3, (FIPS PUB 140-3), is a U.S. government computer security standard used to approve cryptographic modules. The title is ''Security Requirements for Cryptographic Modules''. Initial publ ...
*
FedRAMP The Federal Risk and Authorization Management Program (FedRAMP) is a United States federal government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and servi ...
*
Common Criteria The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard ( ISO/ IEC 15408) for computer security certification. It is currently in version 3.1 revision 5. Common Criter ...

Level 1 Assessment Guide

Level 2 Assessment Guide


References

{{Reflist


External links


Official CMMC Website

Cyber AB (Accreditation Board) Official Website

Cyber AB on LinkedIn
Computer security standards