Request Demo

Cybersecurity Maturity Model Certification Starts with DFARS 800-171

down-arrow

Controlling CUI: DFARS to CMMC

A few years back, the United States Department of Defense (DoD) released a new regulation, a Defense Federal Acquisition Regulation Supplement, or “DFARS” (DFARS clause 252.204-7012), which aimed to bolster cybersecurity in the Defense Industrial Base (DIB) by setting clear requirements outlined in the National Institute of Standards and Technology’s (NIST) Special Publication (SP) 800-171. The requirements serve to protect Controlled Unclassified Information (CUI) flowing from the federal government out to private and public contractors from falling into the wrong hands and was a positive step in the effort to strengthen U.S. national security. Although DFARS was introduced in 2016, organizations that are part of the DoD supply chain are focusing on DFARS compliance years later.

In last 2019, though, the DoD release the first versions of what became the Cybersecurity Maturity Model Certification (CMMC), set to displace DFARS (NIST 800-171) as the means by which the DoD ensured that its supply chain had adequate security for to the extent that they handled CUI. 

When the DoD first released version 1.0 of the CMMC and announced that the new Cybersecurity Maturity Model Certification (CMMC) framework would replace the DFARS standard in their effort to assess the cybersecurity posture of the defense industrial base, many organizations were left scrambling to learn how applicable their previous work on NIST SP 800 171 was to the new requirements. Thankfully, the CMMC Accreditation Body (AB) has made it clear that aligning with the DFARS standard is paramount to the Cybersecurity Maturity Model Certification from small business or prime DoD contractors.

CMMC vs NIST 800 171

The Cybersecurity Maturity Model Certification is slotted to be added to prime DoD contracts in 2020 as a unified standard for “go/no go” decisions at the time of award. It will require organizations in the DoD supply chain to undergo a CMMC audit by an official CMMC auditor. This program as outlined by the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSDA&S) will serve as verification ensuring that the defense supplier has adequate cybersecurity practices across basic cyber hygiene, processes, procedures, and policies in place. The Cybersecurity Maturity Model Certification naturally builds on NIST SP 800-171 cybersecurity standards by adding the certification piece. Different levels of the CMMC security requirements or CMMC levels 1-5, include more advanced practices to reduce cybersecurity risk as more CUI is present, or further up the DoD supply chain up to the prime contractors, denoting a higher certification level requirement.

The Future of CUI: CMMC/DFARS

Ultimately, the DoD will require all organizations that process, store, or transmit CUI (members of the DIB) to undergo the CMMC audits and CMMC assessments to validate their cybersecurity practices, performed by independent third-party certified organizations. Aligning with the DFARS/NIST 800 171 standard, which naturally aligns with CMMC requirements outlined in Tier 3 - the Tier that most contractors will be required to comply with - is the best and most effective move for defense industrial base members looking to win contracts associated with the DoD in 2020 and beyond - so says the CMMC AB, Katie Arrington, and the writers of the Cybersecurity Maturity Model Certification among others.

View the infographic below to learn how to start with DFARS and how many secure controls to implement achieve CMMC level 3.

inforgraphic02 (1)

See why leading DoD contractors are choosing CyberStrong to prepare for the CMMC: 

 

You may also like

Risk Register Examples for ...
on July 29, 2020

Risk registers are a widespread utility among many cybersecurity professionals that allow practitioners to track and measure risks in one place. This type of reporting can quickly ...

3 Templates for a Comprehensive ...
on July 27, 2020

What is a Cyber Risk Assessment Information security risk assessments are increasingly replacing checkbox compliance as the foundation for an effective cybersecurity program. As ...

Infographic: The Six Steps of the ...
on July 24, 2020

As many organizations begin to mature their cybersecurity program, they are shifting to a risk-based approach to security. In most cases, security leaders are no strangers to ...

3 Cybersecurity Risk Areas to ...
on July 20, 2020

2020 has brought with it immense change across the cybersecurity risk landscape. The effects of COVID-19 pandemic are still ongoing, and the opportunities for new cybersecurity ...

Alison Furneaux
Efficient Demotivation: How Black ...
on July 16, 2020

As information security shifts from a siloed function to an increasingly relied upon business function and enabler, business executives and Boards have taken a greater interest in ...

Developing Your Risk Management ...
on July 14, 2020

The scope and process for an organization seeking to implement the NIST Cybersecurity Framework (CSF) can be daunting for even the most experienced CISO to handle. Despite the ...