CMMC case study: Inside a CMMC assessment
Meet the
panel
Leighton Johnson
Infosec instructor and CTO at ISFMT
Stacy High-Brinkley
VP of Compliance Solutions and Service at CASK
Government Services
Jeff Peters
Director of Content Marketing at Infosec
Today’s webcast
⮚ CMMC assessment and certification process
⮚ CMMC assessment levels
⮚ CMMC assessment criteria and methodology
⮚ CMMC timeline
⮚ CMMC Q&A
CMMC assessment and
certification process
OSC certification process
Organization Seeking Certification
(OSC) details
⮚ Contractors can achieve a CMMC level
for their entire enterprise network or
for a particular segment or enclave,
depending where the protected
information is handled and stored.
⮚ Plan at least six month to get your
CMMC certification
OSC benefits
➢ Certification valid for 3 years
➢ Can bid on DoD contracts where CMMC
Level requirements are designated
CMMC model and assessment guides
Office of the Under Secretary of Defense for Acquisition &
Sustainment (OUSD(A&S)) website
➢ CMMC Level 1 Assessment Guide (editable)
➢ CMMC Level 3 Assessment Guide (editable)
Other resources
➢ CMMC Model v1.02, its appendices and appendices in tabular form
➢ CMMC Model Errata v1.0
➢ CMMC Glossary (editable)
CMMC assessment process
Certification provides assurance of practices and processes
Certified Assessors use the same assessment methods for each contractor.
Once a contractor is assessed and certified at a level, other entities (e.g.,
government sponsors and prime contractors looking to hire subcontractors)
have assurance the certified contractor meets CMMC practices and processes.
Methodology the same regardless of size
The CMMC assessment methodology follows a data-centric security process
that applies the practices equally, regardless of the contractor’s size,
constraints or complexity. All CMMC levels are achievable by small, medium
and large contractors.
Assessment scope pre-determined by OSC and C3PAO
Prior to a CMMC assessment, the contractor must define the scope for the
assessment that represents the boundary for which the CMMC certificate will
be issued. Additional guidance on assessment scope will be available in the
next version of the CMMC Assessment Guides.
CMMC assessment levels
CMMC domains and levels
17 capability domains CMMC model with 5 levels
measures cybersecurity maturity
Access Control
(AC)
Incident
Response
(IR)
Risk
Management
(RM)
Asset
Management
(AM)
Maintenance
MA)
Security
Assessment (CA)
Awareness and
Training (AT)
Media Protection
(MP)
Situational
Awareness (SA)
Audit and
Accountability
(AU)
Personnel
Security (PS)
System and
Communications
Protection (SC)
Configuration
Management
(CM)
Physical
Protection (PE)
System and
Information
Integrity (SI)
Identification and
Authentication
(IA)
Recovery (RE)
CMMC Level 1
6 capability domains, 17 practices, 0 processes
Access Control
(AC)
Media Protection
(MP)
System and
Communications
Protection (SC)
Physical
Protection (PE)
System and
Information
Integrity (SI)
Identification and
Authentication
(IA)
Level 1 of CMMC addresses the protection of Federal Contract
Information (FCI) and encompasses the basic safeguarding requirements
for FCI specified in Federal Acquisition Regulation (FAR) Clause 52.204-21,
which defines FCI as:
Information, not intended for public release, that is provided by or generated
for the Government under a contract to develop or deliver a product or
service to the Government, but not including information provided by the
Government to the public (such as on public websites).
DoD contracts that specify the need for a contractor to process, store or
transmit FCI require the company to comply with CMMC Level 1 practices.
CMMC Level 3
17 capability domains, 130 total practices (Level 1: 17, Level 2: 55, Level 3: 58), 3 total processes
Access Control
(AC)
Incident
Response
(IR)
Risk
Management
(RM)
Asset
Management
(AM)
Maintenance
MA)
Security
Assessment (CA)
Awareness and
Training (AT)
Media Protection
(MP)
Situational
Awareness (SA)
Audit and
Accountability
(AU)
Personnel
Security (PS)
System and
Communications
Protection (SC)
Configuration
Management
(CM)
Physical
Protection (PE)
System and
Information
Integrity (SI)
Identification and
Authentication
(IA)
Recovery (RE)
CMMC Levels 1 through 3 consist of the security
requirements specified in National Institute of Standards
and Technology (NIST) Special Publication (SP) 800-171,
Protecting Controlled Unclassified Information in Nonfederal
Systems and Organizations; 20 additional CMMC practices;
and 3 CMMC maturity processes per each of the 17 domains.
CMMC Level 3 addresses the protection of Controlled
Unclassified Information (CUI), which the National Archives
and Record Administration (NARA) defines as:
Information that requires safeguarding or dissemination
controls pursuant to and consistent with laws, regulations and
government-wide policies, excluding information that is
classified under Executive Order 13526, Classified National
Security Information, December 29, 2009, or any predecessor or
successor order, or Atomic Energy Act of 1954, as amended.
CMMC assessment criteria and
methodology
Assessment criteria and methodology: Objects
Defined in NIST SP 800-171A Section 2.1.
Assessment objects identify the specific items being assessed and can include:
Specifications
Document-based artifacts (e.g.,
policies, procedures, security
plans, security requirements,
functional specifications,
architectural designs)
associated with a system.
Mechanisms
The specific hardware,
software or firmware
safeguards employed
within a system.
Activities
The protection-related
actions supporting a system
that involve people (e.g.,
conducting system backup
operations, exercising a
contingency plan and
monitoring network traffic).
Individuals
Or groups of individuals,
are people applying the
specifications,
mechanisms or activities
described above.
Assessment criteria and methodology: Actions
Defined in NIST SP 800-171A Section 2.1.
The assessment methods define the nature and the extent of the Certified Assessor’s actions:
Examine
Process of reviewing, inspecting,
observing, studying or analyzing
assessment objects (i.e.,
specifications, mechanisms,
activities) to facilitate understanding,
achieve clarification or obtain
evidence.
Interview
Process of holding discussions
with individuals or groups of
individuals to facilitate
understanding, achieve
clarification or obtain evidence
Test
Process of exercising
assessment objects (i.e.,
activities, mechanisms) under
specified conditions to compare
actual with expected behavior.
Assessment actions: Interview
The Certified Assessor has discussions with individuals
within an organization to understand if a practice or process
has been addressed.
Interviews of applicable staff (possibly at different
organizational levels) determine if:
➢ CMMC practices or processes are implemented
➢ If adequate resourcing, training and planning have
occurred for individuals to perform the practices
Assessment actions: Examine
Examination includes reviewing, inspecting, observing, studying
or analyzing assessment objects (documents, mechanisms or
activities).
Documents need to be in their final forms (drafts are not eligible to
be submitted as evidence because they are not yet official). Common
types of documents that can be used as evidence include:
➢ Policy, process and procedure documents
➢ Training materials
➢ Plans and planning documents
➢ System-level, network and data flow diagrams
In other cases, the practice or process is best assessed by observing
that safeguards are in place by viewing hardware or associated
configuration information or observing staff following a process.
Assessment actions: Test
Testing is an important part of the assessment process.
➢ Interviews tell the Certified Assessor what the contractor staff
believe to be true
➢ Documentation provides evidence of intent
➢ Testing demonstrates what has or has not been done.
For example:
➢ Contractor staff may talk about how users are identified
➢ Documentation may provide details on how users are identified
➢ Seeing a demonstration of identifying users provides evidence
that the practice is met
The Certified Assessor will determine which practices or objectives
within a practice need demonstration or testing. Not all practices
will require testing.
Assessment findings
The assessment of a CMMC practice or process results in one of three
possible findings: MET, NOT MET, or NOT APPLICABLE.
➢ MET: The contractor successfully meets the practice or process.
For each practice or process marked MET, the Certified Assessor
includes statements that indicate the response conforms to the
objectives and documents the appropriate evidence to support the
response.
➢ NOT MET: The contractor has not met the practice or process.
For each practice or process marked NOT MET, the Certified Assessor
includes statements that explain why and documents the appropriate
evidence that the contractor does not conform to the objectives.
➢ NOT APPLICABLE (N/A): The practice or process does not apply.
For each practice or process marked N/A, the Certified Assessor
includes a statement that explains why the practice or process does not
apply to the contractor. For example, SC.1.176 might be N/A if there are
no publicly accessible systems
Assessment findings: Inherited practices
A contractor can inherit practice or process objectives. A practice or
process objective that is inherited is met because adequate evidence is
provided that the enterprise or another entity, such as an External
Service Provider (ESP), performs the practice or process objective.
➢ Evidence from the enterprise or the entity from which the objectives
are inherited should show they are applicable to in-scope assets and
that the assessment objectives are met.
➢ For each practice or process objective that is inherited, the Certified
Assessor includes statements that indicate how they were evaluated
and from whom they are inherited.
If the contractor cannot demonstrate adequate evidence for all
assessment objectives, through either contractor evidence or evidence of
inheritance, the contractor will receive a NOT MET for the practice or
process.
CMMC timeline
Timeline of CMMC rollout
CMMC assessment Q&A
Are there any expenses associated
with CMMC for Organizations
Seeking Certification (OSC) that
can be reimbursed?
What is the status on ISO 27001
reciprocity and how will this effect
the appraisals for certifications?
The industry has conflicting rules regarding CUI. If you
go by the DoD CUI registry, it includes a lot. But we are
not seeing the government mark many documents as
CUI. Is CUI only the documents marked by the
government as CUI, or are contractors to also mark their
documents as CUI (e.g., proposals and such)?
Per the CMMC assessors guide, Assessors must
select from two of the following three: examine,
interview and test. Can they select to just examine
and interview for a specific practice? If so, then do
they collect evidence?
Is evidence (screen shot, documentation, reports or
tickets form a ticketing system) always collected to
be sent to the CMMC-AB Assessor for review?
How far back in time is evidence collect for —
3 months, 6 months, a year?
Do businesses using M365 need to
upgrade to MS Government GCC High
(Govt Community Cloud) to comply
with CMMC Maturity Level 3
requirements?
Other questions?
Additional CMMC resources
CMMC career path: How to become a CMMC Certified
Assessor
⮚ Available on-demand
⮚ Watch Now
CMMC rollout: How CMMC will impact your organization
➢ Available on-demand
⮚ Watch Now
All Infosec CMMC resources: infosecinstitute.com/cmmc
About us
Infosec believes knowledge is power when fighting
cybercrime. We help IT and security professionals advance
their careers with skills development and certifications
while empowering all employees with security awareness
and privacy training to stay cyber-safe at work and home.
www.infosecinstitute.com

More Related Content

PPTX
CMMC rollout: How CMMC will impact your organization
PDF
CompTIA cysa+ certification changes: Everything you need to know
PPTX
CompTIA Security+: Everything you need to know about the SY0-601 update
PPTX
CompTIA CASP+ | Everything you need to know about the new exam
PDF
Comp tia security sy0 601 domain 3 implementation
PPTX
Cybersecurity Skills Audit
PDF
Gpc case study_eng_0221
PDF
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
CMMC rollout: How CMMC will impact your organization
CompTIA cysa+ certification changes: Everything you need to know
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA CASP+ | Everything you need to know about the new exam
Comp tia security sy0 601 domain 3 implementation
Cybersecurity Skills Audit
Gpc case study_eng_0221
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...

What's hot (20)

PPTX
PDF
PPTX
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
PPTX
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
PDF
A Case Study of the Capital One Data Breach
PDF
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
PDF
NIST CSD Cybersecurity Publications 20160417
PDF
Item46763
PPTX
NIST IT Standards for Local Governments 2010
PPTX
CMMC Certification
PDF
Assessing Risk: Developing a Client/Server Security Architecture,
PDF
OWASP based Threat Modeling Framework
PDF
CISA Domain 4 Information Systems Operation | Infosectrain
PPTX
Top 20 Security Controls for a More Secure Infrastructure
PDF
Introduction to NIST Cybersecurity Framework
PPTX
Rothke rsa 2012 building a security operations center (soc)
PDF
Building a Product Security Practice in a DevOps World
PDF
Nist cybersecurity framework isc2 quantico
PPTX
Scott Hogg - Gtri cloud security knowledge and certs
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
A Case Study of the Capital One Data Breach
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
NIST CSD Cybersecurity Publications 20160417
Item46763
NIST IT Standards for Local Governments 2010
CMMC Certification
Assessing Risk: Developing a Client/Server Security Architecture,
OWASP based Threat Modeling Framework
CISA Domain 4 Information Systems Operation | Infosectrain
Top 20 Security Controls for a More Secure Infrastructure
Introduction to NIST Cybersecurity Framework
Rothke rsa 2012 building a security operations center (soc)
Building a Product Security Practice in a DevOps World
Nist cybersecurity framework isc2 quantico
Scott Hogg - Gtri cloud security knowledge and certs
Ad

Similar to CMMC case study: Inside a CMMC assessment (20)

PPTX
CTEK Summer Series Session 3: Understanding CMMC Requirements for Healthcare ...
PPTX
Supporting your CMMC initiatives with Sumo Logic
PPTX
Demystifying CMMC: Real-World Insights from ControlCase Experts
PPTX
CMMC DFARS/NIST SP 800-171
PDF
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
PDF
EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...
 
PDF
How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...
PPTX
Cybersecurity Maturity Model Certification (CMMC)
PPTX
CMMC 2.0 Explained: Impact for SMBs
PDF
CMMC Overview Arrington_20200903
PDF
Cmmc overview arrington_20200903
PPTX
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
PPTX
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
PPTX
Webinar: Critical Steps For NIST Compliance
PPTX
Webinar - CMMC Certification.pptx
PDF
CMMC briefing
PPTX
A Clear Path to NIST & CMMC Compliance_ISSA.pptx
PPTX
Government Webinar: Preparing for CMMC Compliance Roundtable
PPTX
[ON-DEMAND RECORDING] Deep Impact: Is Your Manufacturing Company On A Collisi...
 
PPTX
Preparing For CMMC Compliance: Key Steps To Ensure Readiness
CTEK Summer Series Session 3: Understanding CMMC Requirements for Healthcare ...
Supporting your CMMC initiatives with Sumo Logic
Demystifying CMMC: Real-World Insights from ControlCase Experts
CMMC DFARS/NIST SP 800-171
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...
 
How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...
Cybersecurity Maturity Model Certification (CMMC)
CMMC 2.0 Explained: Impact for SMBs
CMMC Overview Arrington_20200903
Cmmc overview arrington_20200903
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
Webinar: Critical Steps For NIST Compliance
Webinar - CMMC Certification.pptx
CMMC briefing
A Clear Path to NIST & CMMC Compliance_ISSA.pptx
Government Webinar: Preparing for CMMC Compliance Roundtable
[ON-DEMAND RECORDING] Deep Impact: Is Your Manufacturing Company On A Collisi...
 
Preparing For CMMC Compliance: Key Steps To Ensure Readiness
Ad

More from Infosec (20)

PPTX
CompTIA PenTest+ is changing in 2025: Everything you need to know
PPTX
Bridging the gap From security awareness training to human risk management - ...
PPTX
How to stay relevant as a cyber professional: Skills, trends and career paths...
PPTX
AWS Certified DevOps Engineer: What it is and how to get certified
PPTX
AWS Cloud Operations Administrator: What it is and how to get certified
PPTX
AWS Certified Security - Specialty: What it is and how to get certified
PPTX
AWS Certified Solutions Architect Webinar.pptx
PPTX
Infosec and AWS - A new way to train for your AWS certification (1).pptx
PPTX
How AI and ChatGPT are changing cybersecurity forever.pptx
PPTX
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
PPTX
NCSAM 2023 Webinar.pptx
PPTX
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
PPTX
Skills training value: How to differentiate your staff and your organization ...
PDF
Learning ≠ Education: How people really learn and what it means for security ...
PPTX
Security awareness training - 4 topics that matter most
PPTX
Join the hunt: Threat hunting for proactive cyber defense.pptx
PPTX
Threat hunting foundations: People, process and technology.pptx
PPTX
How to do application security right
PPTX
A public discussion about privacy careers: Training, certification and experi...
PPTX
Learn intrusion detection: Using Zeek and Elastic for incident response
CompTIA PenTest+ is changing in 2025: Everything you need to know
Bridging the gap From security awareness training to human risk management - ...
How to stay relevant as a cyber professional: Skills, trends and career paths...
AWS Certified DevOps Engineer: What it is and how to get certified
AWS Cloud Operations Administrator: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Solutions Architect Webinar.pptx
Infosec and AWS - A new way to train for your AWS certification (1).pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptx
NCSAM 2023 Webinar.pptx
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
Skills training value: How to differentiate your staff and your organization ...
Learning ≠ Education: How people really learn and what it means for security ...
Security awareness training - 4 topics that matter most
Join the hunt: Threat hunting for proactive cyber defense.pptx
Threat hunting foundations: People, process and technology.pptx
How to do application security right
A public discussion about privacy careers: Training, certification and experi...
Learn intrusion detection: Using Zeek and Elastic for incident response

Recently uploaded (20)

PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PPTX
Internet of Everything -Basic concepts details
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
SaaS reusability assessment using machine learning techniques
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
future_of_ai_comprehensive_20250822032121.pptx
Early detection and classification of bone marrow changes in lumbar vertebrae...
Internet of Everything -Basic concepts details
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Module 1 Introduction to Web Programming .pptx
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
A symptom-driven medical diagnosis support model based on machine learning te...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
4 layer Arch & Reference Arch of IoT.pdf
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Comparative analysis of machine learning models for fake news detection in so...
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
LMS bot: enhanced learning management systems for improved student learning e...
SaaS reusability assessment using machine learning techniques
Rapid Prototyping: A lecture on prototyping techniques for interface design
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf

CMMC case study: Inside a CMMC assessment

  • 2. Meet the panel Leighton Johnson Infosec instructor and CTO at ISFMT Stacy High-Brinkley VP of Compliance Solutions and Service at CASK Government Services Jeff Peters Director of Content Marketing at Infosec
  • 3. Today’s webcast ⮚ CMMC assessment and certification process ⮚ CMMC assessment levels ⮚ CMMC assessment criteria and methodology ⮚ CMMC timeline ⮚ CMMC Q&A
  • 5. OSC certification process Organization Seeking Certification (OSC) details ⮚ Contractors can achieve a CMMC level for their entire enterprise network or for a particular segment or enclave, depending where the protected information is handled and stored. ⮚ Plan at least six month to get your CMMC certification OSC benefits ➢ Certification valid for 3 years ➢ Can bid on DoD contracts where CMMC Level requirements are designated
  • 6. CMMC model and assessment guides Office of the Under Secretary of Defense for Acquisition & Sustainment (OUSD(A&S)) website ➢ CMMC Level 1 Assessment Guide (editable) ➢ CMMC Level 3 Assessment Guide (editable) Other resources ➢ CMMC Model v1.02, its appendices and appendices in tabular form ➢ CMMC Model Errata v1.0 ➢ CMMC Glossary (editable)
  • 7. CMMC assessment process Certification provides assurance of practices and processes Certified Assessors use the same assessment methods for each contractor. Once a contractor is assessed and certified at a level, other entities (e.g., government sponsors and prime contractors looking to hire subcontractors) have assurance the certified contractor meets CMMC practices and processes. Methodology the same regardless of size The CMMC assessment methodology follows a data-centric security process that applies the practices equally, regardless of the contractor’s size, constraints or complexity. All CMMC levels are achievable by small, medium and large contractors. Assessment scope pre-determined by OSC and C3PAO Prior to a CMMC assessment, the contractor must define the scope for the assessment that represents the boundary for which the CMMC certificate will be issued. Additional guidance on assessment scope will be available in the next version of the CMMC Assessment Guides.
  • 9. CMMC domains and levels 17 capability domains CMMC model with 5 levels measures cybersecurity maturity Access Control (AC) Incident Response (IR) Risk Management (RM) Asset Management (AM) Maintenance MA) Security Assessment (CA) Awareness and Training (AT) Media Protection (MP) Situational Awareness (SA) Audit and Accountability (AU) Personnel Security (PS) System and Communications Protection (SC) Configuration Management (CM) Physical Protection (PE) System and Information Integrity (SI) Identification and Authentication (IA) Recovery (RE)
  • 10. CMMC Level 1 6 capability domains, 17 practices, 0 processes Access Control (AC) Media Protection (MP) System and Communications Protection (SC) Physical Protection (PE) System and Information Integrity (SI) Identification and Authentication (IA) Level 1 of CMMC addresses the protection of Federal Contract Information (FCI) and encompasses the basic safeguarding requirements for FCI specified in Federal Acquisition Regulation (FAR) Clause 52.204-21, which defines FCI as: Information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government, but not including information provided by the Government to the public (such as on public websites). DoD contracts that specify the need for a contractor to process, store or transmit FCI require the company to comply with CMMC Level 1 practices.
  • 11. CMMC Level 3 17 capability domains, 130 total practices (Level 1: 17, Level 2: 55, Level 3: 58), 3 total processes Access Control (AC) Incident Response (IR) Risk Management (RM) Asset Management (AM) Maintenance MA) Security Assessment (CA) Awareness and Training (AT) Media Protection (MP) Situational Awareness (SA) Audit and Accountability (AU) Personnel Security (PS) System and Communications Protection (SC) Configuration Management (CM) Physical Protection (PE) System and Information Integrity (SI) Identification and Authentication (IA) Recovery (RE) CMMC Levels 1 through 3 consist of the security requirements specified in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations; 20 additional CMMC practices; and 3 CMMC maturity processes per each of the 17 domains. CMMC Level 3 addresses the protection of Controlled Unclassified Information (CUI), which the National Archives and Record Administration (NARA) defines as: Information that requires safeguarding or dissemination controls pursuant to and consistent with laws, regulations and government-wide policies, excluding information that is classified under Executive Order 13526, Classified National Security Information, December 29, 2009, or any predecessor or successor order, or Atomic Energy Act of 1954, as amended.
  • 12. CMMC assessment criteria and methodology
  • 13. Assessment criteria and methodology: Objects Defined in NIST SP 800-171A Section 2.1. Assessment objects identify the specific items being assessed and can include: Specifications Document-based artifacts (e.g., policies, procedures, security plans, security requirements, functional specifications, architectural designs) associated with a system. Mechanisms The specific hardware, software or firmware safeguards employed within a system. Activities The protection-related actions supporting a system that involve people (e.g., conducting system backup operations, exercising a contingency plan and monitoring network traffic). Individuals Or groups of individuals, are people applying the specifications, mechanisms or activities described above.
  • 14. Assessment criteria and methodology: Actions Defined in NIST SP 800-171A Section 2.1. The assessment methods define the nature and the extent of the Certified Assessor’s actions: Examine Process of reviewing, inspecting, observing, studying or analyzing assessment objects (i.e., specifications, mechanisms, activities) to facilitate understanding, achieve clarification or obtain evidence. Interview Process of holding discussions with individuals or groups of individuals to facilitate understanding, achieve clarification or obtain evidence Test Process of exercising assessment objects (i.e., activities, mechanisms) under specified conditions to compare actual with expected behavior.
  • 15. Assessment actions: Interview The Certified Assessor has discussions with individuals within an organization to understand if a practice or process has been addressed. Interviews of applicable staff (possibly at different organizational levels) determine if: ➢ CMMC practices or processes are implemented ➢ If adequate resourcing, training and planning have occurred for individuals to perform the practices
  • 16. Assessment actions: Examine Examination includes reviewing, inspecting, observing, studying or analyzing assessment objects (documents, mechanisms or activities). Documents need to be in their final forms (drafts are not eligible to be submitted as evidence because they are not yet official). Common types of documents that can be used as evidence include: ➢ Policy, process and procedure documents ➢ Training materials ➢ Plans and planning documents ➢ System-level, network and data flow diagrams In other cases, the practice or process is best assessed by observing that safeguards are in place by viewing hardware or associated configuration information or observing staff following a process.
  • 17. Assessment actions: Test Testing is an important part of the assessment process. ➢ Interviews tell the Certified Assessor what the contractor staff believe to be true ➢ Documentation provides evidence of intent ➢ Testing demonstrates what has or has not been done. For example: ➢ Contractor staff may talk about how users are identified ➢ Documentation may provide details on how users are identified ➢ Seeing a demonstration of identifying users provides evidence that the practice is met The Certified Assessor will determine which practices or objectives within a practice need demonstration or testing. Not all practices will require testing.
  • 18. Assessment findings The assessment of a CMMC practice or process results in one of three possible findings: MET, NOT MET, or NOT APPLICABLE. ➢ MET: The contractor successfully meets the practice or process. For each practice or process marked MET, the Certified Assessor includes statements that indicate the response conforms to the objectives and documents the appropriate evidence to support the response. ➢ NOT MET: The contractor has not met the practice or process. For each practice or process marked NOT MET, the Certified Assessor includes statements that explain why and documents the appropriate evidence that the contractor does not conform to the objectives. ➢ NOT APPLICABLE (N/A): The practice or process does not apply. For each practice or process marked N/A, the Certified Assessor includes a statement that explains why the practice or process does not apply to the contractor. For example, SC.1.176 might be N/A if there are no publicly accessible systems
  • 19. Assessment findings: Inherited practices A contractor can inherit practice or process objectives. A practice or process objective that is inherited is met because adequate evidence is provided that the enterprise or another entity, such as an External Service Provider (ESP), performs the practice or process objective. ➢ Evidence from the enterprise or the entity from which the objectives are inherited should show they are applicable to in-scope assets and that the assessment objectives are met. ➢ For each practice or process objective that is inherited, the Certified Assessor includes statements that indicate how they were evaluated and from whom they are inherited. If the contractor cannot demonstrate adequate evidence for all assessment objectives, through either contractor evidence or evidence of inheritance, the contractor will receive a NOT MET for the practice or process.
  • 21. Timeline of CMMC rollout
  • 23. Are there any expenses associated with CMMC for Organizations Seeking Certification (OSC) that can be reimbursed?
  • 24. What is the status on ISO 27001 reciprocity and how will this effect the appraisals for certifications?
  • 25. The industry has conflicting rules regarding CUI. If you go by the DoD CUI registry, it includes a lot. But we are not seeing the government mark many documents as CUI. Is CUI only the documents marked by the government as CUI, or are contractors to also mark their documents as CUI (e.g., proposals and such)?
  • 26. Per the CMMC assessors guide, Assessors must select from two of the following three: examine, interview and test. Can they select to just examine and interview for a specific practice? If so, then do they collect evidence? Is evidence (screen shot, documentation, reports or tickets form a ticketing system) always collected to be sent to the CMMC-AB Assessor for review? How far back in time is evidence collect for — 3 months, 6 months, a year?
  • 27. Do businesses using M365 need to upgrade to MS Government GCC High (Govt Community Cloud) to comply with CMMC Maturity Level 3 requirements?
  • 29. Additional CMMC resources CMMC career path: How to become a CMMC Certified Assessor ⮚ Available on-demand ⮚ Watch Now CMMC rollout: How CMMC will impact your organization ➢ Available on-demand ⮚ Watch Now All Infosec CMMC resources: infosecinstitute.com/cmmc
  • 30. About us Infosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. www.infosecinstitute.com