CMMC
Cybersecurity Maturity Model Certification (CMMC) is a U.S. Department of Defense (DoD) program to safeguard sensitive information that is shared by the DoD with its contractors and subcontractors.
Understanding the CMMC 2.0 Certification
The DoD requires contractors and subcontractors to meet certain cybersecurity standards and announced the release of CMMC 2.0 as the new standardized program in November 2021. With the expected inclusion of CMMC 2.0 in contracts starting in 2025 it means that organizations must not only comply with these standards but also demonstrate their compliance effectively by getting certified at the appropriate level before a contract is awarded.
CMMC is designed to enforce protection of federal contract information (FCI) and controlled unclassified information (CUI) in alignment with DoD’s information security requirements, while keeping the supply chain running safely. The National Institute of Standards and Technology (NIST) Special Publications (SP) 800-171 and 800-172 serve as the basis for these protection measures.
CMMC is codified as part of the Defense Federal Acquisition Regulation Supplement (DFARS) within the Code of Federal Regulations. The CMMC program is overseen by the Office of the Under Secretary of Defense for Acquisitions and Sustainment. The DoD has designated an independent non-profit organization, the Cyber AB, to manage the certification and accreditation process, which is at the core of CMMC. The DoD and the Cyber AB work together to implement the CMMC program from end to end.
The new CMMC 2.0 program has three levels of compliance:
- Level 1 (Foundational): Applies to organizations that focus on the protection of FCI. It includes 17 practices based on FAR 52.204-21, Basic Safeguarding of Covered Contractor Information Systems.
- Level 2 (Advanced): Builds upon Level 1 requirements to include 110 practices based on NIST SP 800-171, introducing additional practices to increase security maturity. This level has additional requirements to ensure the protection of the two types of CUI data – prioritized and non-prioritized.
- Level 3 (Expert): Builds upon Level 2 requirements to introduce an additional subset of practices based on NIST SP 800-172, intended to protect CUI from advanced persistent threats (APTs).
DATA SHEET
Trustwave CMMC Readiness Accelerator
The Trustwave CMMC Readiness Accelerator provides you with a roadmap to prepare your security programs for CMMC certification. Depending on the certification goal, Trustwave will provide guidance and remediation planning to help you align with the CMMC requirements.
Advance Your Compliance
Meet Compliance Needs
Our trusted experts can help you gather requirements, identify security weaknesses and corrective actions, and prepare artifacts for examination by the Certified Third-Party Assessment Organization (C3PAO). Be ready to win government contracts requiring CMMC certification.
Increase Security Maturity
Achieve greater visibility into the data assets you are responsible for securing and uplift your security posture to sleep soundly at night. Rapidly mitigate the impact of a security incident with a comprehensive incident response plan.
Build Your Trust Story
With more and more clients – both public and private sector – demanding robust security controls, being able to tell a compelling story about your risk management, compliance, and security programs is key to winning contracts.
Balance Risk, Cost, and Service
Security has a cost. Implemented without an effective plan, you can easily spend more than you need to and achieve less effective security than you want to. We can help you balance risk, cost, and service delivery to ensure maximum return on investments.
Build, Test, and Run a Secure Organization
Trustwave’s range of capabilities help you get the right service to suit your specific needs, helping you maintain your maturity beyond compliance and increase your security maturity.
Advisory
Receive advice for boards and senior management on strategy, governance, compliance, and security to maximize return on investments. We can assess the gap between your current and target compliance state, then design and help deliver against the CMMC requirements.
Digital Forensics and Incident Response (DFIR)
Quickly determine the source, cause, and extent of a breach – and then contain, eradicate, and investigate the incident, or get proactive by solidifying your response before a security event occurs.
Penetration Testing
Conduct scanning and penetration testing across your networks, applications, and databases to reveal vulnerabilities in alignment with CMMC.
Database Security
Discover, assess, and report on misconfigurations, improper access controls, and other weaknesses within databases.
Managed Security Services
Augment your existing staff with managed security services that evolve processes, elevate data protection strategies, and advance the way you monitor for, detect, and respond to threats. With deep expertise and unmatched threat intelligence, we will design a program that supports your security and CMMC demands, while giving you complete visibility and control.
Email Security
Defend against the latest cyber threats, including phishing and ransomware, before they reach your inbox with an AI- and machine learning-powered email security platform.
Threat Hunting
Probe deep into your network using cyberthreat intel, behavioral analytics, anomaly detection, and deep-dive forensic analysis to identify ongoing attacks.
Security Colony
Access a library of resources developed for real clients, including incident response guidelines and playbooks, awareness training strategies and presentations, and more to help implement information security in your organization.
Additional Resources
Get Started
Learn more about how our specialists can tailor a security program to fit the needs of your organization.