The Cybersecurity Maturity Model Certification (CMMC) is the DoD’s latest verification mechanism designed to ensure that cybersecurity controls and processes adequately protect Controlled Unclassified Information (CUI) that resides on DoD supplier’s systems and networks. It builds upon Defense Federal Acquisition Regulation Supplement (DFARS) and National Institute of Standards and Technology (NIST) frameworks by requiring every contractor to be audited and certified by a third-party auditor.
CMMC combines various cybersecurity control standards such as NIST SP 800-171, NIST SP 800- 53, ISO 27001, ISO 27032, AIA NAS9933 and others into one, unified standard for cybersecurity with maturity levels ranging from ranging from Basic Cybersecurity Hygiene to Advanced. CMMC also measures the maturity of a company’s institutionalization of cybersecurity practices and processes.
The CMMC model is designed to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) shared with defense contractors and subcontractors during contract performance.
The organizations that are subject to CMMC certification compose the Defense Industrial Base (DIB), the supply chain for the Department of Defense (DoD). These are organizations that are essential in the research, engineering, development, acquisition, production, delivery, sustainment, and operations of DoD systems, networks, installations, capabilities, and services.
The CMMC version 2.0 was enacted in November 2020 by the DoD to ensure that contractors part of the DIB perform cyber hygiene to level compatible with doing business with the government. The main changes from CMMC version 1 include a consolidation of the five maturity levels into three, and the elimination of unique practices and processes in favor of mirroring existing frameworks such as the Cybersecurity Framework from the National Institute of Standards and Technology (NIST) — special publications 800-171 and 800-172, in particular.
The CMMC version 2.0 model measures the implementation of cybersecurity requirements at three levels. Each level consists of a set of CMMC practices:
The CMMC levels and associated sets of practices across domains are cumulative. More specifically, for an organization to achieve a specific CMMC level, it must also demonstrate achievement of the preceding lower levels. For the case in which an organization does not meet its targeted level, it will be certified at the highest level for which it has achieved all applicable practices.
Failure to meet CMMC requirements can lead to the loss of existing DoD contracts or the inability to bid on new ones. It may include fines for violating contract terms or federal regulations, potentially including penalties under the False Claims Act (FCA). Additional legal liabilities, audits and investigations may also be enforced.
Read our detailed white paper to understand how Thales can help with CMMC compliance requirements
Thales’ solutions can help organizations that are part of the Defense Industrial Base comply with the CMMC requirements by simplifying compliance and automating security reducing the burden on security and compliance teams. We help address essential cybersecurity risk-management requirements for CMMC 2.0 level 2 addressing application security, data security and identity & access management requirements across multiple categories.
CMMC Compliance Solutions
Protect applications and APIs at scale in the cloud, on-premises, or in a hybrid model. Our market leading product suite includes Web Application Firewall (WAF) protection against Distributed Denial of Service (DDoS) and malicious BOT attacks, security for APIs, a secure Content Delivery Network (CDN), and Runtime Application Self- Protection (RASP).
Discover and classify sensitive data across hybrid IT and automatically protect it anywhere, whether at rest, in motion, or in use, using encryption, tokenization, and key management. Thales solutions also identify, evaluate, and prioritize potential risks for accurate risk assessment. They also identify anomalous behavior and monitor activity to identify potential threats and verify compliance, allowing organizations to prioritize where to allocate their efforts.
Provide seamless, secure, and trusted access to applications and digital services for customers, employees, and partners. Our solutions limit the access of internal and external users based on their roles and context with granular access policies and multi-factor authentication that help ensure that the right user is granted access to the right resource at the right time.
Identity & Access Management
Data Security
Data Security
Identity & Access Management
Identity & Access Management
Application Security
Data Security
Identity & Access Management
Data Security
Application Security
Data Security