01.05.2022 Views

Cyber Defense eMagazine May Edition for 2022

Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The evolution of CMMC<br />

The CMMC is part of the DoD’s ef<strong>for</strong>t to secure its supply chain and protect its DIB contractors from<br />

cybersecurity threats who have increasingly been the target of frequent and complex cyberattacks. The<br />

program was designed to provide assurance to the DoD that DIB contractors could adequately protect<br />

CUI, and the requirement includes any in<strong>for</strong>mation that may flow down to subcontractors in a multi-tier<br />

supply chain.<br />

When the interim CMMC 1.0 rule went into effect, it was met with mixed reviews. Some applauded it,<br />

while others felt it was far too stringent because of its assessment requirements <strong>for</strong> very small contractors<br />

that manage CUI––and that continues to be a major barrier.<br />

Initially, all DIB contractors were required to undergo an audit by a third party, referred to as C3PAO<br />

(CMMC 3rd Party Assessor Organization). Now, under CMMC 2.0, only organizations that manage<br />

Federal Contract In<strong>for</strong>mation (FCI), that they’ve classified as Level 1, may self-attest. All other DIB<br />

contractors that handle CUI––Level 2 and 3––must pass an audit by a C3PAO. Self-attestation is not an<br />

option <strong>for</strong> those businesses.<br />

The problem with this requirement is that there simply aren’t enough auditors to meet the demand.<br />

Backlogs of audit requests have grown, and will continue to, as there is no assessor ecosystem in place<br />

today to accommodate requests. The DoD and the CMMC Accreditation Board (AB) are working to<br />

correct the backlog, however.<br />

What CMMC 2.0 means <strong>for</strong> small businesses<br />

While the number of security tiers to be achieved was reduced from five to three tiers in the transition<br />

from CMMC 1.0 to CMMC 2.0, it also put a heightened priority and urgency on contractors and<br />

subcontractors to become certified to continue their work with the DoD. Though contractors who process<br />

CUI will require C3PAO certification, at least 140,000 additional subcontractors who process only FCI<br />

have the ability to per<strong>for</strong>m self-assessments.<br />

The ability to self-assess, however, can be a double-edged sword as it places the onus on those<br />

companies to confirm that they are audit-ready and compliant. For smaller companies that typically don’t<br />

have security or privacy experts on their teams, self-assessment will represent a significant undertaking,<br />

and most don’t know where to start.<br />

How small businesses can prepare<br />

The first step is to determine the scope of the business’s CMMC auditable environment. It is imperative<br />

to understand where FCI and CUI data is processed within the contractor’s environment, then to build a<br />

security strategy around it.<br />

For the Level 1 contractor, controls that are required to be compliant consist of 17 practices that fall under<br />

six domains:<br />

• Access Control<br />

• Identification and Authentication<br />

• Media Protection<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>May</strong> <strong>2022</strong> <strong>Edition</strong> 100<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!