The Cybersecurity Maturity Model Certification (CMMC) represents an evolution in the cybersecurity landscape for DoD contractors. This guide aims to overview CMMC 2.0 Level 2, requirements, an assessment guide, and how DoD contractors and organizations can prepare for certification.
Don’t forget to check out our CMMC Level 1 overview and our Ultimate Guide to CMMC 2.0.
Officially released in November of 2021, CMMC 2.0 is a Department of Defense (DoD) program aimed to grow adoption of cybersecurity best practices throughout the DoD’s entire supply chain. Any organization that is part of the DoD supply chain will become more evolved at proactively identifying, responding, and remedying cyber threats as a result of CMMC.
The CMMC 2.0 model categorizes contractors and suppliers into three levels based on the types of information involved in performing the contracts.
CMMC 2.0 Level 1 is for any contractor or supplier who receives Federal Contract Information (FCI) and is all about safeguarding FCI.
CMMC 2.0 Level 2, the topic of this post, applies to any contractor or supplier who receives or generates Controlled Unclassified Information (CUI). We’ll cover CUI in more detail below.
Lastly, CMMC 2.0 Level 3 will add a subset of expert requirements from NIST SP 800-172, but is only required for large integrators who receive or generate CUI most critical to national security.
Image credit: Office of the Under Secretary of Defense for Acquisition & Sustainment
In this post, we’ll dive into CMMC 2.0 level 2.
Before diving into the nuts and bolts of CMMC Level 2, it’s important to understand what CUI is.
Controlled Unclassified Information (CUI) is a designation that refers to unclassified information that requires safeguarding or dissemination controls pursuant to and consistent with laws, regulations, and government-wide policies. CUI is information the U.S. government creates or possesses, or that an entity creates or possesses for or on behalf of the government, that a law, regulation, or government-wide policy requires or permits an agency to handle using safeguarding or dissemination controls.
Under the framework of CMMC 2.0 Level 2, the handling of Controlled Unclassified Information (CUI) is a critical aspect that organizations must navigate with diligence. CUI encompasses a range of sensitive information, which can include Federal Contract Information (FCI) and other unclassified data that still necessitates protection under federal laws, regulations, or executive orders. While not classified at a high security level, CUI requires safeguarding due to its sensitive nature and is not permissible for public release. Notably, CUI does not include information classified under Executive Order No 13526 and the Atomic Energy Act, such as data labeled “classified”, “secret”, or “top-secret”. For organizations dealing with CUI on a limited scale, achieving CMMC compliance might be expedited through the establishment of an "Enclave" – a protected, software-defined perimeter segregated from the main network, purpose-built to handle CUI and similar sensitive data. This approach not only aids in effective CUI management but also circumvents the need for extensive system-wide upgrades.
Compared to CMMC 1.0, CMMC 2.0 Level 2 gives DoD contractors a more streamlined and focused path to certification, aiming to reduce complexities and costs while making it more feasible for organizations to achieve compliance.
CMMC 2.0 Level 2 replaces CMMC’s original Level 3, eliminating 20 requirements, aligning directly with NIST 800-171’s 110 requirements. Along with the drop in requirements, another significant change from CMMC 1.0 Level 3 to CMMC 2.0 Level 2 is assessment flexibility. Organizations handling less sensitive information may be eligible for self-assessments, while others will require third-party assessments.
CMMC 2.0 Level 2 compliance comprises 110 requirements spread across 14 domains.
The 14 CMMC Level 2 domains are:
Below is a list of all 110 requirements of CMMC 2.0 Level 2, organized by their parent domains. These requirements align with the NIST SP 800-171 controls.
The Access Control domain is essential in managing who has access to specific data within the organization. The controls here aim to limit and monitor access to critical information. The 25 Access Control requirements are:
The Awareness and Training domain aims to ensure employees are aware of potential security risks associated with their activities. The 3 Awareness and Training requirements are:
Audit and Accountability practices include mechanisms to track actions performed on the system and review them for potential security risks. The 9 Audit and Accountability requirements are:
The Configuration Management domain focuses on maintaining the integrity and security of system configurations. The 9 Configuration Management requirements are:
The Identification and Authentication domain ensures the secure verification of user identities. The 11 Identification and Authentication requirements are:
The Incident Response domain is focused on preparing for, detecting, and responding to cybersecurity incidents. The 3 Incident Response requirements are:
The Maintenance domain aims to keep all systems in optimal condition. The 6 Maintenance requirements are:
The Media Protection domain aims to ensure the secure storage and access of media containing CUI. The 7 Media Protection requirements are:
The Personnel Security domain is focused on ensuring that individuals who are provided access to organizational systems containing CUI are properly screened. The 2 Personnel Security requirements are:
The Physical Protection domain is focused on securing the physical environment where the organization's information systems are located. The 5 Physical Protection requirements are:
The Risk Assessment domain is focused on identifying and managing potential risks that could harm the organization. The 3 Risk Managements requirements are:
The Security Assessment domain is focused on evaluating the effectiveness of the organization's security measures. The 4 Security Assessment requirements are:
The System and Communications Protection domain is focused on protecting the organization's information systems from external threats. The 16 System and Communications Protection requirements are:
The System and Information Integrity domain is focused on ensuring the integrity and accuracy of the organization's information systems. The 7 System and Information Integrity requirements are:
First and foremost, it’s important to familiarize yourself and understand the 110 security requirements we outlined above. For reference, these requirements are aligned with NIST 800-171 controls.
It is also important that you understand where in your organization Controlled Unclassified Information (CUI) is handled.
Once you have a firm grasp on the 110 security requirements, it’s time to perform a thorough self assessment. Your self assessment should ultimately measure your organization’s cyber posture against the CMMC Level 2 requirements. Identify and document gaps and areas where your organization has opportunity to better conform to each requirement.
After identifying the gaps between your current cyber posture and the CMMC Level 2 requirements, you need to prioritize remediation. This involves developing and implementing a strategy to address deficiencies, which could range from simple process tweaks to more complex technological deployments. Continuous monitoring and improvement are key, as the cyber threat landscape is always evolving.
Following your organization’s self assessment, it’s time to implement any controls, which again, are primarily focused on protecting CUI which we covered earlier. This often includes the deployment of technology, processes, and practices. During implementation, it’s important to ensure that the measures deployed aren’t simply viewed as “add-ons” but rather integrated parts of your organizational processes.
With CMMC compliance, documentation – specifically, documented policies and practices – is a must. Creating a System Security Plan (SSP) which is documentation outlining your organization’s cybersecurity strategy and how it’s managed will be important. Additionally, a Plan of Action and Milestones (POA&M) will outline and address how your organization manages any gaps identified during your self assessment.
When it comes to employee training and awareness, organizations should look at it as an ongoing process, never a one-time event for the sake of certification. As humans are often at the center of cyberattacks, it’s important to ensure all employees receive regular training, updated regularly to reflect the latest in cyberthreats, attacks, and best practices. Reference materials like Zog’s small business cybersecurity guide, updated frequently to include actionable insights.
Selecting a CMMC Third-Party Assessment Organization (C3PAO) is a crucial step in achieving CMMC Level 2 compliance. Select a C3PAO accredited by the CMMC Accreditation Body (CMMC-AB) with expertise in your particular industry. They’ll ultimately evaluate your compliance with CMMC requirements.
Now that you have your C3PAO selected, it’s time to schedule your assessment which will involve a thorough evaluation of your organization’s compliance with the 110 security requirements we reviewed earlier. The C3PAO will require access to your facilities, systems, and documentation needed to verify the required controls are in place and operating as they should be. We’ll dive deeper into the assessment process in the following section.
Before your organization’s formal CMMC Level 2 evaluation begins, your C3PAO will undergo a preliminary review of your SSP and other documentation outlining your organization’s cybersecurity framework. This pre-assessment phase is important because it lays the foundation for the remainder of the certification process and typically begins with a meeting to discuss the scope of the assessment and expectations. This is also an ideal time to address any questions your organization might have about the assessment, before the in-depth assessment begins.
The onsite assessment is crucial as it’s the time in which assessors ensure whether or not your organization has the necessary cybersecurity measures in place to align with CMMC standards. To start, your C3PAO will contract a third-party assessor or assessment firm to review your cybersecurity strategy. The effectiveness of your strategies will be determined by way of employee interviews and real-time observation.
Next, your C3PAO will test the effectiveness of your security controls in protecting from cyberthreats. Through use of automated scanning tools, a meticulous examination process, simulations, and other methods, the goal of testing is to ensure controls operate as intended.
Following your assessment, the assessment team will prepare a detailed report, documenting compliance with each CMMC Level 2 requirement. In addition to documenting compliance, the report will also overview any gaps, highlighting a detailed roadmap for remediation.
In the event gaps are identified during assessment, you’ll be required to remedy them immediately. Depending on the severity of the gaps identified, a reassessment may be required. Once all issues are resolved, your C3PAO will submit a final assessment report to the CMMC Accreditation Body (CMMC-AB).
Assuming the CMMC-AB is satisfied with the final report, at this point you’ll be issued your CMMC Level 2 certification. This is your official recognition of your commitment to cybersecurity and is valid for three years. Throughout the three years, your organization is subject to periodic audits to ensure continued compliance.
The cost of CMMC Level 2 compliance and certification varies based on size and complexity of the scope of the assessment. It is estimated for cost to range between $18,058 to $482,874.
How does CMMC 2.0 Level 2 address the evolving cyber threats faced by the defense industrial base?
CMMC 2.0 Level 2 has been designed to address the evolving cyber threats that the defense industrial base encounters. By examining the progression from Level 1 to Level 2 in the framework, it becomes evident that there's an emphasis on meticulous handling of information, especially when communicating with external organizations.
Are there any recommended tools, software, or platforms that can assist in achieving and maintaining CMMC 2.0 Level 2 compliance?
While the market offers a plethora of tools, it's paramount to choose those that provide compliance tracking capabilities. At Zog, we give preference to tools that can address multiple compliance frameworks, enabling contractors to handle various audits and compliance requirements efficiently.
How frequently will assessments or audits for CMMC 2.0 Level 2 compliance be required for DoD Contractors?
While assessments or audits for CMMC 2.0 Level 2 compliance are generally expected at least annually, certain components might require more frequent updates or different timelines for review.
What training or certifications are recommended for IT Professionals to understand and implement CMMC 2.0 Level 2 requirements effectively?
IT professionals aiming to comprehend and implement CMMC 2.0 Level 2 requirements should consider obtaining certifications such as CSSIP and Ethical Hacker. It's also beneficial to have skilled documenters who are organized. Several organizations, like Zog, specialize in preparing entities for CMMC 2.0, while other firms are authorized to audit such preparations. It's wise to collaborate with a partner matching your organization's scale and having a C3PAO certification. Proper preparation is critical, and companies should initiate this process 12-18 months in advance to ensure all required elements are in place. Implementing enclaves to segregate federal information is paramount; it ensures comprehensive protection while taking into account the specific limitations of the enclave. Microsoft 365's GCC High, for instance, offers enclave support but can be costly. Achieving a DIB CAC Joint Surveillance voluntary assessment, administered by US personnel, positions a company well for CMMC 2.0 readiness. For those handling a significant amount of CUI and anticipating the need for CMMC 2.0 compliance, it's advisable to begin preparations now, even if audit dates are yet to be announced, due to the increasing demand for audit bookings.
Achieving CMMC Level 2 compliance requires an investment in time, resources, and expertise. Having a clear understanding of CMMC Level 2 requirements and a plan to ensure your organization’s cybersecurity practices align to these requirements, it is not by any means an unattainable certification.
For support on your compliance journey, reach out to Zog’s cybersecurity experts. We’re here to help you achieve compliance!