Cybersecurity Maturity Model Certification (CMMC)

The CMMC is a new government standard that combines various cybersecurity standards and best practices into a grading scale of maturity against which the assessed organization is compared.

What is CMMC?

The DoD’s Cybersecurity Maturity Model Certification (CMMC) will serve as the verification mechanism to ensure appropriate levels of cybersecurity practices and processes are in place across the DoD’s industry partners and suppliers. The CMMC combines various cybersecurity standards and best practices, listed below:

  • FAR Clause 52.204-21

  • NIST SP 800-171 Rev 1

  • Draft NIST SP 800-171B

  • CIS Controls v7.1

  • NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF) v1.1

  • CERT Resilience Management Model (CERT RMM) v1.2

  • NIST SP 800-53 Rev 4

  • Others such as, UK NCSC Cyber Essentials, or AU ACSC Essential Eight

WHY IS THE CMMC USEFUL?

All new contracts and Requests for Information from the Department of Defense (DoD) and its vendors will require specific levels of CMMC compliance by 4Q 2020. Any company wishing to do business with the DoD, or a DoD vendor will need to prove their compliance with CMMC. In addition, the CMMC provides a gauge for the auditing of organizational processes and procedures along with appropriate supporting evidence to expose areas in need of improvement to protect intellectual property and sensitive information. The Council of Economic Advisors estimates the cost of malicious cyber activity in the billions of dollars for the U.S. economy alone. Strong cybersecurity controls are one step all organizations can take to protect their most valuable assets, regardless of the industry they serve. Certification levels for each organization are validated by a CMMC Third Party Assessment Organization authorized and trained to perform the work by the CMMC Accreditation Body. Organization’s compliance with CMMC will go beyond the current DFARS 252.204-7012 self-attestation and is valid for three years.

CMMC Compliance and Cybersecurity Best Practices

The CMMC model contains 171 cybersecurity best practices.

Level 1

Basic safeguarding of client data

Level 2

Intermediate implemented safeguards in place

Level 3

Good broad protection of Controlled Unclassified Information (CUI)

Level 4

Proactive Reduction of Risk from Advanced Persistent Threats

Level 5

Advanced Reduction of Persistent Threats/Progressive Security

Additional information on CMMC model may be found here.

Levels & Descriptions

Each domain contains a set of defined processes and practices which align to the level of practice progression, or implementation, as defined above and in the right side of the graphic shown here. In addition, the institutionalization, or maturity, of the processes and practices is assessed as shown in the left side of the graphic. An organization must demonstrate both maturity and implementation of processes and practices to be certified at a given level.

Key Benefits

How CMMC Audits Strengthen Your Security and Compliance

CMMC works much like a NIST standard wherein 17 domains of controls and procedures are audited against an established standard. These areas include:

HOW IT WORKS

The CMMC Readiness Process

MegaplanIT helps organizations select the appropriate CMMC certification level (1 through 5), identify gaps between their current state and the requirements needed to achieve that level, and develop an internal project plan to remediate those gaps and prepare for a successful audit once the certification requirements are finalized and assessors are authorized.

Currently, the CMMC Accreditation Body is in the process of developing the standard to be used for applying the model and preparing to certify trainers for educating assessors. Until the CMMC AB has released the training and assessors have been authorized, organizations cannot be audited for CMMC compliance. Instead, organizations should focus on DFARS/NIST SP 800-171 compliance as the minimum preparation for CMMC.

Industry Leading Certified Experts

Make Our Team, Your Team!

Our innovative IT security and compliance solutions are designed to deliver customized, cost-effective service on time—because your priorities are our priorities. With a highly qualified team of PCI DSS QSAs, Penetration Testers, and Information Security Consultants here at MegaplanIT, we will assess your unique company and business environment and design a path to security that will fit all of your needs.

News & Expertise

Your Security. Our Insights.

Point-to-Point Encryption (P2PE) in the payment card industry involves deploying a recognized solution by the PCI council, where hardware, processes, and technology undergo rigorous testing against the current P2PE Standard v3.1 or earlier versions. The P2PE standard combines a recognized and certified PTS device with software and encryption methods to allow cardholder data to be encrypted upon swipe and transmitted encrypted throughout the merchant environment until decrypted within a decryption environment, inaccessible to the merchant.
In today’s rapidly evolving cybersecurity landscape, achieving and maintaining PCI compliance is more critical than ever. With the latest update to PCI DSS 4.0.1, businesses must adapt to meet new standards designed to enhance security and flexibility. This updated PCI Compliance Checklist outlines the essential steps for staying compliant while optimizing your organization’s security posture.
As with many things in popular culture, the PCI Data Security Standard (PCI DSS) has many myths associated with it. The PCI DSS has existed for many years and despite the efforts of the PCI Security Standards Council (PCI SSC) and industry experts, many misconceptions and myths persist. Below we will cover some common PCI DSS myths vs. the reality.
The PCI DSS standard is largely responsible for dictating the way organizations all over the world approach cybersecurity and the protection of credit card data. As v4.0 of the standard approaches, organizations should aim to identify and plan updates for the aspects of their security and compliance programs that are most likely to be affected.
Employees of companies of all sizes are now either required to shelter in place or State and Government lock-downs are forcing companies to require their employees to work remotely. How will this impact your PCI-DSS Compliance?