CMMC 2.0 is here

Nov 2, 2022 | Cyber Security, IT News

Last year, the U.S. Department of Defense (DoD) completed its internal review of the Cybersecurity Maturity Model Certification (CMMC). Several significant changes have been made, and all DoD contractors need to be aware of them.

What’s the difference between CMMC and CMMC “2.0”? Let’s take a look.

What is CMMC 2.0?

The DoD’s Cybersecurity Maturity Model Certification 2.0 (CMMC) is the new standard for DoD contracts that takes the place of the section of NIST 800-171 dealing with compliance for Controlled Unclassified Information (CUI). CMMC 2.0 has 3 levels. Level 1 has 17 practices, allows self-assessments, and is primarily targeted at protecting Federal Contract Information (FCI). Level 2 has 110 practices, may or may not require a third-party assessment, and is targeted at protecting CUI. Level 3 is based on NIST 800-172 and is only required for the highest priority, most critical defense programs.

As of right now, CMMC 2.0 mirrors NIST 800-171’s 110 security practices for most government contractors working with controlled unclassified information (CUI). The DoD specifies the required CMMC level in the solicitation and in any Requests for Information (RFIs), if utilized.

What has changed between CMMC and CMMC 2.0?

The most notable change is that the original five levels of CMMC have been condensed into three. Here is the complete breakdown of all key differences between CMMC and CMMC 2.0:

  • CMMC now has three levels (instead of five).
  • Annual self-assessments are allowed for Level 1 and a portion of Level 2.
  • An annual affirmation by company leadership is required for self-assessments.
  • CMMC 2.0 Level 1 has 17 practices.
  • Most government contractors working with CUI are at the new CMMC 2.0 Level 2.
  • CMMC 2.0 Level 2 may require a third-party assessment.
  • CMMC 2.0 Level 2 has 110 practices and mirrors NIST 800-171.
  • Cybersecurity maturity processes are no longer required.
  • CMMC 2.0 Level 3 is based on a subset of NIST 800-172.
  • Level 3 is only required for the highest priority, most critical defense programs and will require government-led assessments.
  • POAMs are allowed but are strictly time constrained and can only be used for a subset of practices.
  • CMMC 2.0 has now officially been implemented, but there may be revisions in the very near future.

CMMC 2.0 is hereWhile the DoD is not asking small to medium-sized businesses to implement Fort Knox’s level of security, they are requiring adequate security and good cyber hygiene. That’s what the Cybersecurity Maturity Model Certification is all about. And that’s exactly why you should turn to the experts for help in adopting it. That’s where we come in.

 

Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Concentrate on your VISION…We’ll handle the TECHNOLOGY!

More From V2 Systems

The Audit Readiness Problem Government Contractors Can’t Afford to Ignore

Many government contractors are not failing audits because they lack tools. They are failing because documentation is incomplete, evidence is disorganized, and readiness starts too late. This blog explains the most common gaps and how to fix them before an audit begins.

You Can’t Secure What You Can’t See: Why Asset Visibility Is a Cybersecurity Requirement

Asset visibility is one of the most overlooked parts of cybersecurity. In this blog, we explain why businesses need clear visibility into hardware, software, users, and cloud assets to reduce risk, strengthen operations, and support compliance.

When One Suspicious Alert Prevented a Much Bigger Disaster

A former client narrowly avoided a much larger cybersecurity incident after suspicious Microsoft 365 activity revealed an unauthorized intrusion. In this blog, we break down what happened, how phishing may have played a role, why MFA still matters, and what businesses should do next to reduce risk and respond quickly.

CMMC in Practice: How Day-to-Day IT Operations Affect Compliance

CMMC is not just policy. It depends on day-to-day IT execution like patching, access control, monitoring, and documentation. This blog explains what contractors should focus on now, plus why the assessment process can be more expensive than expected.

What Happens After the Breach: How Incident Response Really Works for SMBs

Incident response is what determines whether a cyber incident becomes a short disruption or a major business crisis. This blog explains the real steps SMBs should take after a breach and how MSP support speeds recovery.

Free
Small Business Cybersecurity Checklist

cybersecurity checklist graphic