The Cybersecurity Maturity Model Certification (CMMC) is currently being developed by the US Department of Defense (DoD) as the next generation cybersecurity requirement for contractors. Section 1 below summarizes the publicly available information regarding CMMC, highlighting key facts, key dates, and key unknowns. Section 2 provides an analysis of how to interpret CMMC and what it may mean for future contracting efforts with the DoD. Section 3 provides the sources used.
Key Takeaways:
- CMMC may be very important for future interactions with the DoD, as it establishes cybersecurity compliance requirements for *all* entities contracting (or subcontracting) with the DoD.
- CMMC requirements are currently planned to be included in all DoD contracts by JAN 2026.
- CMMC is an evolution in the DoD’s treatment of CUI, adding a “verification component” to what had previously been a regime “based on trust.”
- CMMC establishes five levels of cybersecurity requirements, ranging from “Basic Cyber Hygiene” to “Advanced/Progressive.”
- Presently, there are still uncertainties regarding how the program will be implemented and what assessments will look like.
- The substantive challenges, frequent changes, and emergence of COVID-19 all cast doubts on whether CMMC will actually be implemented as currently envisioned.
- Organizations that anticipate needing CMMC certification should continue to monitor the developments in this space. Organizations with current DoD contracts should work with their contract officer and review the CMMC document to self evaluate compliance.
1. What We Know So Far
The core of CMMC is a five-level “maturity model” [5] specifying required “practices” and “processes” for compliance. Every DoD contract will eventually have a CMMC level requirement that must be satisfied by defense contractors wishing to bid on that contract. Contractors must have their specified cybersecurity level evaluated and certified by an accredited “CMMC 3rd Party Assessment Organization” (C3PAO) or individual assessor.[6] The different CMMC levels are intended to protect against different adversaries or attacks.[7]
- Level 1: “Basic Cyber Hygiene” establishes the minimal set of requirements for CMMC, which are largely a restatement of the federal contract requirements in FAR 52.204-21.[8] Every DoD contractor will be required to satisfy at least Level 1.
- Level 2: “Intermediate Cyber Hygiene” is an intermediate step for organizations targeting Level 3. This level is not currently planned to be included in any DoD contracts, but may be used as a competitive advantage when bidding on Level 1 contracts.
- Level 3: “Good Cyber Hygiene” is the required level for any contract handling CUI.[9] The requirements for Level 3 are largely a restatement of NIST SP 800-171/DFARS 252.204-7012, along with an additional 20 controls.
- Level 4: “Proactive” focuses on the protection of CUI from Advanced Persistent Threats (APTs), drawing on controls in NIST SP 800-171B.
- Level 5: “Advanced/Progressive” is the highest level, reserved for the most critical non-classified contracts. Level 5 also focuses on the protection of CUI from APTs, but requires even “greater depth and sophistication of cybersecurity capabilities.”
Key Facts:
- CMMC will eventually apply to *all* DoD contracts, including those without CUI requirements. This includes all DoD subcontractors.
- Only companies that supply COTS products will be excluded.
- The estimated number of impacted organizations is ~350,000.
- CMMC will be gradually rolled out, with requirements included in ~10-15 contracts during 2020, and complete incorporation planned by January 2026.
- Third party certification assessment is required for all CMMC levels, even those without CUI requirements.
- The contractor determines the scope of CMMC certifications (organization-wide or partial).[14]
- The initial set of C3PAOs will consist of 250 companies, with additional assessors being added monthly.
- There is no self certification.[15]
- Certification will last 3 years.
- Plans of Action and Milestones (POAMs) are not allowed.
- Data breaches / incidents *may* prompt a requirement to get recertified. (Details not specified.)
- CMMC applies only to DoD contracts (i.e., does not carry over to other government contracts).
- CMMC levels will be required in RFP sections L and M, and used as a “go /no go decision.”[16]
- CMMC levels will be evaluated equally across all contractor sizes. However, lower levels are designed to be achievable by small, non-technical contractors.
Key Dates:
- MAR 2019: CMMC first announced.
- JUL - OCT 2019: CMMC “listening tour.”
- JAN 2020: Version 1.0 of the CMMC framework released.
- MAR 2020: CMMC Accreditation Body signed MOU with DoD.
- MAR 2020: Version 1.02 released.
- APRIL 2020: CMMC AB issues RFP for continuous monitoring.[17]
- MID 2020[18]: Planned DFARS update from 800-171 to CMMC.
- JUN 2020: Planned release of training from the AB.
- JUN 2020: Planned date for incorporation into Requests for Information (RFIs) for selected prime contractors.
- JAN 2026: Planned date for incorporation into all Request for Proposals (RFPs).
Key Unknows:
- It is not clear whether the proposed development timeline will be realized. The short history of CMMC development has shown a pattern of aggressive timeline estimates that aren’t realized.
- It is not clear how contracts will be assigned specific CMMC levels.
- It is not clear how recertification will be managed.
- It is not clear how C3PAOs will be chosen, what form the assessments will take, and how much they will cost.[19]
- It is not clear what role DoD contracting officers (or other stakeholders) will play in evaluating cybersecurity requirements (outside of verifying the CMMC certification level).
- It is not clear whether CMMC will apply to other vehicles; e.g. grants, cooperative agreements (CAs), or other transactional authorities (OTAs).
2. Analysis
Notwithstanding these stated intentions, the core of CMMC appears to be a restatement of existing cybersecurity compliance control sets, drawing from NIST SP 800-171, NIST SP 800-53, and other well known control sets. Although CMMC might use these control sets in a way that avoids the problems of most cybersecurity frameworks, most notably the “checkbox mentality,”[20] early evidence does not support this conclusion. CMMC appears to be placing a heavy emphasis on third party assessors and clearly defined “levels,” implying that CMMC compliance is likely to be evaluated in a mechanical, checkbox manner consistent with most contemporary cybersecurity compliance regimes.
Despite being built from existing control sets, the underlying structure of CMMC is new, making it difficult to evaluate what compliance will look like. Most strikingly, the core distinction between “practices” and “processes” has the potential for considerable overlap. For example, the Basic Cyber Hygiene level currently has no process requirements whatsoever. However, it includes process language in its practices (i.e., “. . . in an ad hoc manner.”) Higher levels of practices also employ process language, in some cases actually using the word “process” as a practice requirement. (I.e. “The organization has a process . . .”) Moreover, despite using the words “processes,” “policy,” “practices,” and “plan” each as distinct requirements, none of these terms are defined.
On a positive note, the establishment of clear ‘levels’ could simplify the DoD contracting environment for cybersecurity, as this will reduce uncertainty regarding what is required for CUI compliance, and the certification process should remove redundancies when negotiating multiple contracts with multiple different contracting officers. Additionally, the highest levels (4 and 5) are expected to only apply to a select few large defense contractors, while Level 1 is designed to encompass even entirely small, non-technical organizations. (One third party referred to it as being for “the lawn mowing company.”) This broad scope, coupled with the currently published requirements, suggests that although CMMC will apply to every defense contractor, the requirements will potentially not be too burdensome.
However, even if the individual CMMC level requirements are reasonable, CMMC could also run into problems from overly aggressive application of “flow down” requirements. “Flow down” essentially requires contractors to include the same requirements in their subcontracts. If CMMC certification is required for *every* subcontractor, this could be prohibitive for large organizations (with a large number of subcontractors) wishing to pursue relatively small DoD contracts, such as research universities. Data-specific compliance regimes limit this problem by only flowing down with the relevant data. Generalized compliance regimes may not have a clear limiting principle in this respect.
Moreover, there appears to be a conflict with regard to scope. CMMC has consistently pushed toward establishing “enterprise-wide” security certifications, in contrast to the data-specific regimes typically employed by cybersecurity standards (e.g., NIST SP 800-171 applies only to CUI). And yet, it allows the contractor to pick a specific segment of the network where the information to be protected is located. This creates an additional problem for non-IT contractors, since it is unclear which information is in scope.
The concept of enterprise-wide cybersecurity compliance audits is a daunting one, as organizations typically do not apply security controls universally, the amount of documentation likely required for a larger organization could be prohibitive, and the process of certifying enterprise-wide compliance of even basic security controls is likely to be extremely expensive.
Finally, since CMMC does not state an intent to apply to grants, CAs, or OTAs, these vehicles may not be impacted, and organizations may wish to prioritize these vehicles when multiple funding vehicles are possible options. Note, however, that some level of CMMC compliance may still be required if the work performed under these other vehicles generates or requires access to CUI.
Caveats:
3. Sources
- OSD website: https://www.acq.osd.mil/cmmc/index.html
- CMMC Model v1.0 Briefing: https://www.acq.osd.mil/cmmc/docs/CMMC_v1.0_Public_Briefing_20200131_v2.pdf
- CMMC Rev. 1.02: https://www.acq.osd.mil/cmmc/docs/CMMC_ModelMain_V1.02_20200318.pdf
- CMMC Appendices: https://www.acq.osd.mil/cmmc/docs/CMMC_Appendices_V1.02_20200318.pdf
- CMMC FAQs: https://www.acq.osd.mil/cmmc/faq.html
- DFARS 252.204-7012 https://www.acq.osd.mil/dpap/dars/dfars/html/current/252204.htm.
- Undersecretary Lord comments: https://www.defense.gov/Newsroom/Transcripts/Transcript/Article/1944326/undersecretary-of-defense-lord-holds-press-briefing-on-acquisition-reform-and-i/; https://www.fedscoop.com/draft-dod-contractor-cyber-standards/.
- Frank Kendall Op-Ed: https://www.forbes.com/sites/frankkendall/2020/04/29/cyber-security-maturity-model-certificationan-idea-whose-time-has-not-come-and-never-may/?utm_source=Sailthru&utm_medium=email&utm_campaign=EBB%2004.30.20&utm_term=Editorial%20-%20Early%20Bird%20Brief#32829a773bf2.
References
[2] https://www.acq.osd.mil/cmmc/index.html.
[3] Other control sets and frameworks currently referenced include the CIS Critical Security Controls, DIB SCC TF WG Top 10, and the CERT Resilience Management Model.
[4] https://www.acq.osd.mil/cmmc/docs/CMMC_ModelMain_V1.02_20200318.pdf.
[5] Note, despite the name, CMMC does not operate as a typical maturity model.
[6] Contractors without a current CMMC certification will be allowed to submit proposals but must complete certification prior to funding.
[7] “For a given CMMC level, the associated controls and processes . . . will reduce risk against a specific set of cyber threats.” https://www.acq.osd.mil/cmmc/index.html. Currently this “threat protection” appears to be manifested only by a statement for each level specifying “resistance against data exfiltration” and “resilience against malicious actions.”
[8] https://www.law.cornell.edu/cfr/text/48/52.204-21
[9] DFARS 252.204-7012 will continue to apply to CUI until it is superseded by CMMC.
[10] https://www.acq.osd.mil/cmmc/docs/CMMC_Appendices_V1.02_20200318.pdf.
[11] https://fcw.com/articles/2020/01/09/cmmc-chair-cyber-cert.aspx.
[12] https://www.acq.osd.mil/cmmc/index.html.
[13] https://www.cmmcab.org.
[14] According to the CMMC v1.02 document, “...A DIB contractor can achieve a specific CMMC level for its entire enterprise network or for particular segment(s) or enclave(s), depending on where the information to be protected is handled and stored.”
[15] FAQ #12, https://www.acq.osd.mil/cmmc/faq.html.
[16] FAQ #4, https://www.acq.osd.mil/cmmc/faq.html.
[17] The CMMC AB issued an RFP on April 22, 2020 for vendors to provide “continuous monitoring” in the form of “non-intrusive” review of the company’s internet traffic, a secure portal for displaying monitoring data, and security of AB/DOD intellectual property.
[18] This date is unlikely to be met since COVID-19 has delayed public hearing for the DFARS rule change https://fcw.com/articles/2020/05/11/cmmc-covid-dfar-rule-change-delay.aspx.
[19] However, the FAQ does state that the cost of certification will be reimbursable. FAQ#19 https://www.acq.osd.mil/cmmc/faq.html.
[20] The term “checkbox mentality” or “checkbox security” refers to a common problem in security where organizations are more concerned with their compliance with legal requirements than the actual security of their mission.
[21] https://www.itic.org/policy/CMMCmultiassoc_3.26_Final.pdf.
[22] https://er.educause.edu/articles/2020/1/us-federal-policy-perspectives-on-the-educause-2020-top-10-it-issues.
[23] “Cybersecurity Maturity Model Certification: An Idea Whose Time Has Not Come and Never May” by Frank Kendall, former Undersecretary of Defense for Acquisition Technology https://www.forbes.com/sites/frankkendall/2020/04/29/cyber-security-maturity-model-certificationan-idea-whose-time-has-not-come-and-never-may/?utm_source=Sailthru&utm_medium=email&utm_campaign=EBB%2004.30.20&utm_term=Editorial%20-%20Early%20Bird%20Brief#32829a773bf2.