Read this if you are involved in cybersecurity at your organization.
The cyber threat landscape is growing
Over the years, the cyber threat landscape has experienced a steady increase in cyberattacks, with more data breaches, targeted social engineering attacks, and crippling ransomware attacks taking place. The increase in cyberattacks is affecting all industries, including government supply chain vendors, higher education and research institutions, and many others.
The US government is particularly aware of the risks involved with the increase in cyberattacks and understands it must continue to strengthen its cybersecurity program to protect intellectual property and national security. This means not only strengthening cybersecurity controls and processes for the government, but also for contractors who work directly and indirectly with the government. In this case, “contractors” include businesses that enter into contracts with the US government and any supplier, distributor, vendor, or firm that provides products or services to contractors and other subcontractors.
What is the Cybersecurity Maturity Model Certification (CMMC) framework?
The CMMC framework provides a foundation for establishing a strong cybersecurity program to effectively manage cyber threats. The framework was developed by the Department of Defense (DoD) and is designed to help ensure that cybersecurity controls and processes adequately protect sensitive information that is shared among entities across various industries. Broadly speaking, contractors and subcontractors that work with the DoD will be required to comply with CMMC guidelines.
Prior to the enforcement of CMMC, contractors were responsible for implementing and monitoring their own cybersecurity controls and processes and could self-attest to their level of security. In other words, the DoD did not audit or verify the level of security maintained by contractors. But now with cyber criminals frequently targeting the weakest link in supply chains, the DoD has responded by moving to a trust-but-verify approach, meaning organizations working with the DoD may be required to have a third party (also called a C3PAO) assess cybersecurity controls and processes and verify CMMC compliance.
CMMC industry standards and cybersecurity best practices
Although the framework is evolving and requirements are still being finalized, CMMC currently mandates NIST 800-171 compliance and adds additional requirements coming from other cybersecurity frameworks, including the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), Center for Internet Security (CIS) Controls, and the Computer Emergency Response Team (CERT) Resilience Management Model (RMM). CMMC uses these industry standards and cybersecurity best practices to establish a benchmark against which assessors can measure an organization’s cybersecurity posture. Following the assessment, the organization will better understand the maturity of their controls and processes and where gaps may exist.
CMMC compliance benefits beyond the DoD
CMMC compliance will soon become a prerequisite for DoD contract awards and is expected to impact over 300,000 contractors and subcontractors. The purpose of CMMC is to provide a uniform set of security standards that every contractor working with the DoD must use to protect sensitive information. Without compliance, organizations could be excluded from bidding on DoD contracts. By 2025, every organization doing business with the DoD must be CMMC compliant, including those entities conducting research using federal grant funds.
Outside of helping companies with DoD contract prerequisites, CMMC compliance is important for several other reasons. First, the framework helps ensure that organizations have implemented the proper controls and processes to protect themselves from cyber threats. It also helps ensure compliance with other laws and regulations. Additionally, by following the CMMC set of standards and best practices, organizations can maintain a high trust relationship with partners and customers.
Who should be CMMC compliant?
All contractors and subcontractors that work with the DoD should be CMMC certified. The required maturity level will depend on the DoD contract and the sensitivity of information the organization receives or uses. Today, only organizations that directly provide products and services to the DoD, known as prime contractors, must meet NIST 800-171 and additional requirements of CMMC compliance. Prime contractors must also verify that subcontractors further down the supply chain also meet requirements. By 2025, CMMC compliance obligations will extend to all organizations bidding on defense contracts. At that point, all organizations working with the DoD, no matter what service or services they provide, will need at least Level 1 CMMC compliance to win or maintain a DoD contract (more information on maturity levels below).
If an organization is planning to contract with the DoD, they should plan to be CMMC certified and should preemptively attain Level 1 CMMC compliance. Again, the maturity level required by an organization will be stipulated on a case-by-case basis in the contract. Fortunately, if an organization is already compliant with NIST 800-53 or FedRAMP (the security standard for all government contractors generally), they are not far from becoming certified. Likewise, if an organization is compliant with NIST 800-171, they may already fulfill many of the requirements of CMMC.
A breakdown of CMMC maturity levels
In September 2020, the DoD established CMMC 1.0. The original framework organized security maturity levels into five tiers, but in November 2021, the DoD announced the most recent version, CMMC 2.0, which introduces several key changes, including a more streamlined model that should reduce costs, particularly for smaller organizations. Additionally, CMMC 2.0 organizes maturity levels into three tiers—instead of five.
- Foundational
The first tier includes basic cybersecurity hygiene appropriate for small organizations utilizing a subset of universally accepted best practices. This tier only requires an annual self-assessment and attestation by company leadership.
- Advanced
The second tier includes coverage of all 110 NIST SP 800-171 controls. This tier will require a CMMC third-party Assessment Organization (C3PAO) to perform a triennial assessment of their CMMC implementation.
- Expert
The final tier includes implementing highly advanced cybersecurity controls and processes. The processes involved at this level include continuous improvement across the organization and timely incident response capabilities. The details of this tier are still being defined, but it is expected that it will incorporate a subset of controls from NIST 800-172. Additionally, the organization would be assessed by the DoD and not by a C3PAO.
Challenges and considerations of CMMC compliance
CMMC compliance can be challenging for several reasons. The first challenge refers to the extent of CMMC compliance for the organization, whether you are starting from scratch or modifying another cybersecurity framework. The CMMC’s core is comprised of the 14 cybersecurity domains outlined in NIST 800-171. The domains include areas such as access control, awareness and training, and incident response. Within the 14 domains there are 110 controls. These controls include topics like limiting unsuccessful login attempts, ensuring that personnel are trained to carry out their assigned information security-related duties and responsibilities, and testing organizational incident response capabilities. Mapping all these security requirements is not easy and implementing them without a clear idea of what they entail is almost impossible.
Another common challenge with CMMC compliance is cost, and organizations should begin to build budgets to upgrade cybersecurity controls and processes to the levels needed. The costs associated with CMMC compliance depend on several factors:
- Organization size
The size of the organization may have an impact on project costs; however, the number of employees accessing sensitive information is the more significant driver in determining overall costs of compliance. Thus, organizations should limit the number of employees receiving and using sensitive information.
- Maturity
The journey to CMMC compliance will likely cost more and take longer for organizations starting from scratch. For organizations further along in the process, it will be important to consider the current maturity level of documentation development, technology implementation, and what processes and procedures are already documented and in use.
- Technology implementation
Achieving compliance will require a combination of policy and technology. The more technologies the organization must implement, the greater the costs. Some of the more expensive technologies include a security incident and event management (SIEM) system and vulnerability scanner.
- Consultants
Consulting costs should be considered when setting out for CMMC compliance. Organizations often have consultants perform a gap analysis to analyze how well their current cybersecurity program meets—or does not meet—the demands of NIST 800-171. This helps an organization determine whether it complies with the CMMC, or what steps will be necessary to achieve compliance. In other words, a gap analysis can keep the organization’s CMMC compliance strategy on track.
It is important that organizations understand that CMMC compliance is not a one-time expense. Compliance can have an impact on IT support teams, forcing units to spend time on regulated data environments at the cost of supporting broader organizational needs. Ongoing training is necessary to keep stakeholders up to date on the evolving threat landscape. Requirements are also not easy to implement and may have an impact on the organization. Finally, noncompliance carries its own risks, such as not qualifying for new awards or the potential loss of current projects.
The last challenge to completing CMMC compliance is getting the official certification. Contrary to many other frameworks, the organization must obtain the certification from a C3PAO that has been granted accreditation by the CMMC Accreditation Body/The Cyber AB.
Preparing for CMMC compliance
Before achieving CMMC compliance, organizations should understand their current state of security and determine what level of compliance is necessary. Organizations should perform a gap analysis to analyze how their current cybersecurity program meets—or does not meet—compliance requirements. Following the analysis, organizations should develop a security roadmap that outlines how they will implement requirements to prepare for a CMMC assessment. It will also be important for the organization to determine the scope of the assessment.
For organizations that are ready to attain CMMC compliance, the next step is to perform the assessment. A CMMC assessment is the process of assessing an organization’s cybersecurity maturity, and it is required to demonstrate an organization’s compliance with the desired CMMC level before being certified. For organizations looking to achieve Level 1 CMMC compliance, an assessment can be performed through a self-assessment. Any organizations that intend to attain Level 2 or 3 compliance need to pass a third-party assessment.
CMMC assessments examine the cybersecurity policies, procedures, controls, and processes to determine compliance with NIST 800-171, NIST 800-172, and any other requirements. The extent of the assessment will depend on the maturity level an organization wants to achieve. The assessor will request information to evaluate the controls and processes protecting sensitive information, which may include previous risk assessments, network diagrams, vulnerability scans, and other relevant documentation.
Conclusion
In today’s rapidly evolving environment, the DoD is focused on protecting sensitive information from malicious cyberattacks, particularly throughout the supply chain. CMMC offers a structured framework for organizations to strengthen their cybersecurity posture. For organizations doing business or looking to do business with the DoD, CMMC compliance will soon be required to help ensure that contractors are meeting minimum industry standards and cybersecurity best practices.
While the road to compliance presents challenges like resource allocation and technological adaptation, the journey toward compliance is an ongoing process. To help ensure compliance, organizations should establish transparent ownership and consistent expectations across their enterprise and partnerships.