CMMC Is Complex, But You Need It If You Want to Do Business

Apr 8, 2020 | Cyber Security, IT News

You have probably heard about Cybersecurity Maturity Model Certification lately, especially while looking for work in the Federal system. In a previous article, we talked a little about a new set of standards to meet in addition to NIST. As we mentioned, Cybersecurity Maturity Model Certification, or CMMC, is basically an extension of NIST 800-171. Today we’re going to go into a little more detail on what’s involved in meeting CMMC compliance and how V2 Systems can help you achieve certification.

CMMC Is a DoD Requirement

As we mentioned before, if you plan on doing any business at all with the Department of Defense, you need CMMC certification. The CMMC is the DoD’s next step to ensure and enhance the scope of cybersecurity for national security data and networks following the Defense Federal Acquisition Regulation Supplement (DFARS) issued in 2016. This scope covers a total of 17 areas of importance:

  1. Access Control
  2. Asset Management
  3. Audit and Accountability
  4. Awareness and Training
  5. Configuration Management
  6. Identification and Authentication
  7. Incident Response
  8. Maintenance
  9. Media Protection
  10. Personnel Security
  11. Physical Security
  12. Recovery
  13. Risk Management
  14. Security Assessment
  15. Situational Awareness
  16. Systems and Communications Protection
  17. System and Information Integrity

These 17 points comprise five “levels” that make up your entire security rating, ranging from basic habits to advanced security operations.

If that sounds like a lot, that’s because it is. And what’s more, there is no “self-certification” when it comes to CMMC, like there is with NIST 800-171. Your organization will coordinate directly with an accredited and independent third-party commercial certification organization to request and schedule a CMMC assessment.

Here’s How You Can Prepare for a CMMC Assessment

CMMC Is Complex, But You Need It If You Want to Do Business.The best thing an organization can do to prepare for a CMMC assessment is to first create what NIST refers to as a System Security Plan, or SSP. An SSP basically outlines your entire security structure. NIST has provided an SSP template which can be found here. Once your SSP is fully outlined, it’s time to start identifying weak spots and – most importantly — lay out how you plan to correct them. These are known as Plan of Action and Milestones (POAM) and will link directly back to each area covered in CMMC.

All of this may seem like a lot, but it’s completely necessary. Anyone who does not meet the requirements for CMMC will not be able to do business with the Department of Defense in any way — and that’s a huge deal for many. Contact us today at 703-396-6120, and we’ll help you through a plan of action to meet these complex requirements. The less you have to worry about it, the more time you can spend focusing on what matters most to you and your organization.

 

Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Concentrate on your VISION…We’ll handle the TECHNOLOGY!

More From V2 Systems

CMMC in Practice: How Day-to-Day IT Operations Affect Compliance

CMMC is not just policy. It depends on day-to-day IT execution like patching, access control, monitoring, and documentation. This blog explains what contractors should focus on now, plus why the assessment process can be more expensive than expected.

What Happens After the Breach: How Incident Response Really Works for SMBs

Incident response is what determines whether a cyber incident becomes a short disruption or a major business crisis. This blog explains the real steps SMBs should take after a breach and how MSP support speeds recovery.

From Policy to Practice: Why Cybersecurity Fails Without Daily Execution

Cybersecurity policies and tools do not protect businesses unless they are executed consistently. This blog explains why daily operational discipline matters and how MSP support helps turn security into repeatable routines.

Why Professional Services Firms Are Prime Cyber Targets in 2026 and How MSPs Help Reduce Risk

Law firms, accounting firms, engineering companies, nonprofits, and healthcare organizations are increasingly targeted by cybercriminals. This blog explains why professional services firms face higher risk in 2026 and how MSPs help secure operations without slowing productivity.

The True Cost of In-House IT in 2026 and Why More SMBs Are Outsourcing

Rising labor costs, cybersecurity requirements, and insurance pressures are making in-house IT harder for SMBs to sustain. This blog breaks down the true cost of internal IT and why more businesses are outsourcing in 2026.

Free
Small Business Cybersecurity Checklist

cybersecurity checklist graphic