Did the expensive and resource-intensive requirements of Defense Federal Acquisition Regulation Supplement (DFARS) compliance prevent you from bidding on a US Department of Defense (DoD) contract before? Well, you’ll be happy to know that the DoD is now transitioning to the Cybersecurity Maturity Model Certification (CMMC) framework.
The original CMMC model has five cybersecurity maturity levels, with the two lowest levels — CMMC Level 1 and 2 — not requiring DFARS compliance at all. This is because not all DoD contracts involve handling controlled unclassified information (CUI), so Levels 1 and 2 allow non-DFARS-compliant firms to still vie for these contracts.
As seen in the diagram above, of the different CMMC levels, Level 1 has the least number of security requirements since at this level, DoD contractors only have to safeguard federal contract information (FCI). This makes it the easiest and most cost-efficient one to achieve, which is perfect for small companies.
Further reading: FCI and CUI, What Is the Difference? |
Each CMMC level is characterized by a set of cybersecurity processes and practices, as shown in the diagram below. For Level 1, the “processes” are described as “performed” and “practices” as “basic cyber hygiene.”
Processes: Performed
At Level 1, you are only expected to execute the cybersecurity practices specified for this level (see next section).
Unlike in higher levels, at Level 1, you are not yet required to have your cybersecurity strategies on paper or be assessed by accredited third-party assessors/auditors. Because of this, a CMMC Level 1 supplier may have limited or inconsistent cybersecurity maturity processes.
Practices: Basic Cyber Hygiene
Since this level focuses on the protection of FCI, CMMC Level 1 suppliers are only expected to have limited resistance against data exfiltration and limited resilience against malicious actions. The required CMMC Level 1 controls is equivalent to the 17 basic safeguarding requirements specified in Federal Acquisition Regulation (FAR) 48 CFR 52.204-21.
To help you achieve all 17 controls, we’ve provided a checklist for each item:
1. Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
2. Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
3. Verify and control/limit connections to and use of external information systems.
4. Control information posted or processed on publicly accessible information systems.
5. Identify information system users, processes acting on behalf of users, or devices.
6. Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.
7. Sanitize or destroy information system media containing FCI before disposal or release for reuse.
8. Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.
9. Escort visitors and monitor visitor activity.
10. Maintain audit logs of physical access.
11. Control and manage physical access devices.
12. Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.
13. Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
14. Identify, report, and correct information and information system flaws in a timely manner.
15. Provide protection from malicious code at appropriate locations within organizational information systems.
16. Update malicious code protection mechanisms when new releases are available.
17. Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Do these security requirements sound too technical for you? Don’t worry, the IT experts of Charles IT can help you achieve your CMMC certification. Get started by availing our gap assessment.