What is CMMC?
The Cybersecurity Maturity Model Certification (CMMC) is a mandatory framework established by the Department of Defense to safeguard Controlled Unclassified Information (CUI) within the Defense Industrial Base. This program ensures organizations handling sensitive defense data meet specific cybersecurity standards—reducing risks to national security.
FAQsDoes My Organization Need to Be Certified?
If your organization contracts or subcontracts with the Department of Defense and handles Controlled Unclassified Information (CUI), you must achieve CMMC certification. Certification is critical for securing and maintaining contracts within the defense supply chain.
The 3 Levels of CMMC
Level | Controls | Assessment |
---|---|---|
Level 1 Basic safeguarding of FCI | 15 Requirements aligned with FAR 52.204-21 |
|
Level 2 Broad protection of CUI | 110 Requirements aligned with NIST SP 800-171 r2 |
|
Level 3 Higher-level protection of CUI against advanced persistent threats | 134 110 from NIST SP 800-171 r2 plus 24 from 800-172 |
|
Our CMMC examination approach
The scope of our work will focus on evaluating OSC’s information security posture related to designing and implementing security controls in line with expectations defined within NIST SP 800-171. M&I utilizes a multiphase approach that is tried and tested to conduct a myriad of information security assessments and various security governance and compliance program buildouts. Specifically, we will assist the OSC with the following:
Planning & oversight
- Conduct a planning and logistics kickoff meeting with the OSC
- Develop a document and meeting request list
- Co-develop the communication expectations regarding periodic status meetings
CUI boundary validation
- Develop a baseline understanding of the OSC’s covered contractor information systems
- Review the system security plan (SSP) and data flow diagram to confirm the flow of CUI
- Identify and validate the obligations based on the review of current DoD contracts to determine CUI definition and associated information handling procedures
Technical assessment
- Perform a security controls evaluation based on NIST SP 800-171 to identify operational and technological improvement opportunities
- Evaluate security controls, processes, capabilities and technical configurations that govern the covered contractor information systems
- Analyze common themes, strengths and areas for improvement to determine the security gaps based on top-level requirements
Remediation validation
- Review the current state plan of action and milestone (POA&M) to understand noted observations and limited practice deficiencies
- Perform remediation validation procedures to confirm that deficiencies have been corrected in accordance with the POA&M within five business days of the assessment exit meeting
Certification reporting
- Summarize the current procedural, technological and human capital capabilities and compliance gaps
- Provide the OSC with an updated high level supplier performance risk system (SPRS) score
- Socialize results with stakeholders and management
- Develop the Level 2 assessment report