Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Regulations

CMMC 2.0 retains focus on maturity, streamlines governance and reduces cost of compliance

  • Resiliant
  • March 15, 2022
Image contains wires plugged into a digital device.Image courtesy: Brett Sayles
Image courtesy: Brett Sayles
Total
0
Shares
0
0
0
0

The U.S. Department of Defense (DoD) remains committed to safeguarding sensitive national security information by protecting the defense industrial base (DIB) from increasingly frequent and complex cyberattacks. The agency recently released its CMMC 2.0 framework based on 850-plus public comments in response to the interim DFARS rule. The new framework simplifies the program and improves overall governance. While the framework has further optimized the number of controls needed, it hasn’t compromised its focus on “maturity.” In spirit, doing a few things well first is better than trying to spend resources on many things without assurance of quality across all.

The key differences and implications for contractors are summarized in the following table:

Focus still remains on "maturity" of practices.
Courtesy: ResiliAnt

The number of practices/controls required for certification have been reduced for many contractors that are exposed to CUI. This should result in overall cybersecurity and compliance cost reduction.

Contract awards are possible with a Plan of Action and Milestone (POA&M) and commitment to achieving the milestones in an agreed-upon timeline as opposed to needing certification to bid on a contract.

Eliminating third-party assessments for Level 1 and a subset of Level 2 certification-requiring contractors can reduce cost associated with an external audit for those who have internal capabilities of performing assessments in compliance with the CMMC Assessment Guide. A CMMC self-attestation is a representation that the offeror meets the requirements of the CMMC level required by the solicitation. The self-attestation essentially brings the accountability and associated liability to the contractors for ensuring assessment to the CMMC standard and compliance with the requirements. There is a difference between CMMC assessment and “Basic Assessment,” as defined in DFARS clause 252.204-7020, NIST SP 800-171 DoD Assessment Requirements. The Basic Assessment results in a confidence level of “Low” in comparison to what’s required under the CMMC assessment. Contractors wishing to pursue the self-assessment and self-attestation route should be mindful of the differences and resulting liabilities.

The new framework reduces unnecessary reliance on roles, entities and certifications such as RP, RPO, LPP and LTP that were created by CMMC-AB. The program will use CMMC-AB-certified CMMC third-party Assessment Organizations (C3PAO) and CMMC Assessors and Instructors Certification Organizations (CAICO), provided that CMMC-AB is ISO/IEC 17011 compliant. Level-3 assessments will be government led, and the government can potentially contract with a C3PAO or other entities. The DoD will govern and likely approve how and when a CMMC assessor can engage with contractors.

While CMMC 2.0 appears to have eliminated all maturity processes, the spirit of maturity is still intact within the assessment procedure. The assessment procedure involves evaluating specifications, mechanisms, activities and individual(s) associated with each CMMC practice for the assets in scope. The assessment methods include examining documentations (provides evidence of intent), interviewing staff (evaluates the belief of existence) and testing (provides a validation of existence and effectiveness). In a case where an entity inherits a practice objective, an assessor will have to provide adequate evidence of the effectiveness of the practice in that entity via testing. While a certified assessor is not required to use all objects and methods, s/he can use all of them to gain confidence that the CUI requirements have been satisfied. In other words, the assessor can assess for maturity level up to five processes (i.e., having KPIs, noting improvements and reporting mechanisms to the senior executives for high-risk items) for CMMC Level 3 certification. Assets include all things of value such as people, processes, systems, organizations, etc., and they are considered to be in scope if they can process, store or transmit CUI, connect to CUI assets or provide security function.

The subcontractors will be assigned the same CMMC level as the prime contractors if they are handling the same type of FCI and CUI. In cases where the prime only flows down select information, a lower CMMC level may apply to the subcontractor.

In summary, CMMC 2.0 really doesn’t change the need for rigor in cybersecurity from DIB. It reduces some practices and hence the associated costs; it offers some flexibility by allowing an organization to win a contract with POA&M and performing self-assessments where appropriate. There is no reason for companies to wait for an official rule to follow the framework for at least up to Level 2 (Level 3 details are yet to be confirmed) certification. We know that hackers have been targeting aerospace and defense industries for years. Early adoption of the framework will ensure robust enterprise cybersecurity and put them ahead of the game with DoD contracts. Overall, CMMC 2.0 remains focused on maturity, simplifies the program, streamlines governance and potentially reduces cost of compliance.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Resiliant

Related Topics
  • CFE Content
  • Featured
Previous Article
  • Education

Introduction to ICS security fundamentals

  • Stephen Mathezer
  • March 11, 2022
Read More
Next Article
Image courtesy: Brett Sayles
  • Strategies

Cybersecurity and the human element

  • James Richards
  • March 16, 2022
Read More
You May Also Like
SwRI used programmable logic controllers (PLCs) connected to input/output (I/O) modules to a test network. Algorithms scanned the network for cyberattacks through data packets transferred over the Modbus/TCP protocol. Courtesy: Southwest Research Institute (SwRI)
Read More

IDS developed for industrial control systems

Six key constituents can drive targeted solutions to the ICS environment: 1. Audit and application of security policies and procedures; 2. Access controls with secure data transfers; 3. Threat detection of abnormal and malicious activity at all levels of the ICS infrastructure; 4. Risk management and mitigation; 5. Process sensors security and authentication; and 6. Resolution of key security problems that requires intrinsic relationship with vendors. Courtesy: MG Strategy+, Control Engineering
Read More

Six critical components of integrated cybersecurity for industrial control systems (ICS)

Figure 1: To determine effectiveness and maturity, take a particular control and plot the effectiveness score on the Y-axis of a graph and the DMS on the X-axis of the graph. By seeing which quadrant the result falls into, people can quickly make some general statements about the systems under consideration. Courtesy: Maverick Technologies
Read More

Securing the ICS: Measure solution effectiveness, maturity

elliTek's IIoTA MES Gateway Appliance. Courtesy: elliTek
Read More

Cybersecurity and IT/OT convergence: How important is your data?

Courtesy: Brett Sayles
Read More

NERC CIP checklist for identification and categorization of BES cyber assets

Read More

How serial-to-Ethernet converters help attackers breach cyber-physical assets

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
Read More

An overlooked ICS cybersecurity gap for companies

Figure 4: The risk management cycle, and incorporation of Industry 4.0 goals for security controls implementation. Courtesy: Grantek
Read More

Upgrading industrial PC cybersecurity in manufacturing

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT