Cybersecurity Maturity Model Certification

Infor
  site   DEFENSE W DIM   

EXECUTIVE BRIEF

Defense contractors face the very real threat of losing business if they are noncompliant with the Cybersecurity Maturity Model Certification (CMMC) standard.

The CMMC is a new cybersecurity framework by the US Department of Defense (DoD) for the DoD supply chain and its contractors. The goal of the CMMC compliance requirement is to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).

This new umbrella standard includes requirements from National Institute of Standards and Technology (NIST) SP 800-171, Federal Acquisition Requirements (FAR) document 52.204-21, and beyond. In the latest iteration, CMMC 2.0 (announced November 4, 2021), there are three levels of CMMC compliance. Each level requires more practices and controls than the previous. Most organizations will have to comply with either Level 1 or Level 2.

With CMMC, self-attestation is out, and contractors must be audited and certified before they can receive new contract awards. The DoD is working with the CMMC Accreditation Body, an independent third party that's responsible for operational aspects of the certification.

These responsibilities include training third-party assessment organizations (C3PAOs) and licensing individual assessors.

To spur CMMC compliance, the final rule in 2020 added a new requirement that defense contractors must submit a NIST SP 800-171 self-assessment into the Supplier Performance Risk System (SPRS). While the numeric score, with a maximum of 110 possible points, is not used to evaluate suppliers, the self-assessment must be submitted before contract award. While NIST SP 800-171 compliance has been a requirement since December 2017, this is an opportunity for companies to reevaluate their security posture in preparation for CMMC.

Beyond meeting federal regulations, contractors who prioritize rigorous cybersecurity best practices now will substantially differentiate themselves from competitors. Companies that delay certification may get caught in a backlog of assessments that cause business opportunities to pass them by. Prime contractors will be looking for certified subcontractors that enable them to confidently incorporate suppliers and partners into their supply chains. Prime contractors are sending out supplier surveys that are very similar to the SPRS request, asking for attestations of compliance or timelines for anticipated completion of all the security controls. Companies without a strategy in place risk losing their preferred supplier status. Getting ahead of CMMC mitigates the risk of cyberattacks not only on CUI, but also on company intellectual property.

The three CMMC levels

The CMMC 2.0 model has been streamlined from five to three levels

  • Eliminates CMMC 1.0 Levels 2 and Levels 4; these levels were originally intended as transition levels and not meant to be assessed requirements
  • Eliminates all CMMC unique practices and maturity processes; works with NIST to address identified gaps in NIST SP 800-171
  • Establishes three levels, each one more advanced than the last, and based on the specific type of information

Level 1 (Foundational)—For companies with FCI only; the information must be protected but isn’t critical to national security

Level 1 addresses “basic cyber hygiene” practices, like regularly changing passwords and using anti-virus software

Level 2 (Advanced)—For companies with CUI

   Level 2 is a transitional step to Level 3; aligns Level 2 with NIST SP 800-171

Level 3 (Expert)—This applies to the top-priority programs with CUI requirements; it mirrors NIST SP 800-171 and NIST SP 800-172

Level 3 uses a subset of NIST SP 800-172 requirements; Level 3 requires a significant increase from 72 to 130 practices, and includes organizational policy to protect CUI

What's changed under CMMC 2.0?

To simplify compliance with DoD cybersecurity standards, the CMMC 2.0 framework implements a new tier system for the sensitivity of DoD information. The five-tier security system introduced in the original CMMC framework is now revised down to three. Originally, any external firm doing business with the DoD was required to meet one of five CMMC levels: basic cyber hygiene, intermediate cyber hygiene, good cyber hygiene, proactive, or advanced.

Under the original CMMC framework, contractors were required to undergo a third-party security assessment. This has been relaxed in CMMC 2.0. Now, only those contractors handling sensitive data are required to meet these qualifications, while contractors handling less critical data can perform self-assessments.

 

cmmc model 1 vs 2 chart 

Level 1 (Foundational)

Level 1 applies to contractors that neither receive, process, or create controlled CUI, nor handle high value assets (HVA). At this level, companies must perform self-assessments of their security protocols, as well as have them monitored and confirmed by company leadership. This must happen annually and is aligned with the existing FAR 52.204-21 standard.

Level 2 (Advanced)

Level 2 applies to contractors who receive, process, or create CUI, but not HVA. There are two subsections, depending on whether a company handles CUI that’s classified as Critical National Security Information. Those that don’t, can perform an annual self-assessment. Those that do require a third-party assessment, will be required to do so once every three years, which can be conducted by C3PAOs. This is aligned with the existing NIST SP 800-171 standard.

Level 3 (Expert)

Level 3 applies to any contractor that handles HVA. Assessments at this level must be completed by the government, rather than a C3PAO. This is aligned with the existing NIST SP 800-172 standard.

As the revised CMMC reduces the number of contractors that need a third-party security assessment, the DoD anticipates a faster rollout and implementation. The original CMMC standards were intended to be adopted over a five-year period. This lengthy process was criticized by those who advocated for stricter measures to be applied immediately. The DoD took this feedback seriously and emphasized the importance of speeding up progress and streamlining cybersecurity protocols as the driving factor behind its release of CMMC 2.0.

CMMC 2.0 also allows for “Plan of Action and Milestone” reports, otherwise known as PoAMs. These can be used by contractors that currently don’t meet the security requirements. This allows them to continue to bid on DoD contracts, provided they also submit an outline of how they will implement security procedures in the future.  

What you need to know: Cybersecurity Maturity Model Certification (CMMC)

  • CMMC applies to al subcontractors, regardless of their supply chain tier position
  • Contractors must achieve 100% adherence before they can receive new contract awards
  • Only certified assessors can provide CMMC validation
  • Remediation plans or Plan of Action & Milestones (POA&M) are not allowed
  • Certification is valid for three years
  • CMMC will not be applied retroactively to existing contracts
  • Certification costs are an allowable reimbursable cost

How should DoD contractors prepare for CMMC 2.0? 

Although CMMC 2.0 reduces the burden of cybersecurity audits and other requirements for many DoD contractors compared to the original proposals, contractors shouldn’t become complacent.

To prepare for CMMC 2.0, the first step is to determine which level of compliance applies to your business. This will depend on whether you handle CUI or HVA.

Learn more about Infor's Aerospace & Defense industry software solutions.

Let's Connect

Contact us and we'll have a Business Development Representative contact you within 24 business hours.

By clicking “Submit” you agree that Infor will process your personal data provided in the above form for communicating with you as our potential or actual customer or a client as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.