CMMC 2.0
Cybersecurity Maturity Model Certification
The Cybersecurity Maturity Model Certification (CMMC) is a certification process developed by the Department of Defense (DoD) to assess the cybersecurity practices of organizations that handle Federal Contract Information (FCI) or Controlled Unclassified Information (CUI) for the DoD. CMMC requires that government contractors protect their Controlled Unclassified Data (CUI) by implementing the NIST SP 800-171 controls and having them verified by a CMMC Third-Party Assessment Organization (C3PAO). With the recent release of CMMC 2.0, it's important for organizations to understand the changes and how it can affect their business.
The CMMC model includes 14 domains of cybersecurity practices, such as access control, incident response, and Maintenance. Each level includes a set of requirements and practices that organizations must meet in order to achieve certification at that level. One of the major changes in CMMC 2.0 is the introduction of a new certification level, Level 3. This new level will require organizations to demonstrate a greater level of maturity and capability in their cybersecurity practices. Additionally, CMMC 2.0 also includes new requirements for incident response, risk management, systems and communications protection, and cybersecurity governance. The certification process involves an assessment of an organization's cybersecurity practices by a third-party assessor, who will evaluate whether the organization is meeting the requirements for the level of certification being sought. The new version also features a new certification process, where the certifying body will have more control over the assessment process and will be responsible for the selection of the assessors, and the scheduling and conduct of the assessment, which allows more flexibility and responsiveness to the organization’s needs.
It's important to note that the CMMC certification is mandatory for certain contracts and not for others. Organization’s that handle FCI or CUI for the DoD must comply with the new requirements if they want to continue doing business with the DoD. Implementing the CMMC framework can bring many benefits to an organization. It can help improve the overall security posture by identifying and mitigating vulnerabilities, and it can also help organizations to comply with other regulatory requirements such as the Federal Risk and Authorization Management Program (FedRAMP) and the Health Insurance Portability and Accountability Act (HIPAA). Obtaining a CMMC certification can also bring a competitive advantage for organizations, as it demonstrates to customers and partners that the organization is taking cybersecurity seriously and that it is committed to protecting sensitive information.
To Summarize, the CMMC is a certification process that assesses the cybersecurity practices of organizations that handle FCI or CUI for the DoD, it provides a standard for measuring the maturity and capability of an organization's cybersecurity practices and it helps ensure that DoD suppliers are following best practices to protect sensitive information. Organizations that handle FCI or CUI for the DoD must comply with the new requirements if they want to continue doing business with the DoD, and it can bring many benefits to the organization such as improving overall security posture and gaining competitive advantage.
Written By: Chris Gonzalez, RP


ring a recent Ransomware incident, a law firm had many of terabytes of litigation data. Millions of individual 45kb tiff files. The firm decided to not pay the Ransom and so started the process of restoration. After two days of restoration, it was determined that the restoration of this one system was going to take two weeks to restore. The firm never tested a full restoration or bothered to calculate what it would take to restore the data. The time it would take to restore the data was more costly than paying the Ransom.
elves wanting to solve this problem as quickly as possible and start weighing the price of the ransom compared to the value of the data that is encrypted. While initially, organizations say they wouldn’t pay the ransom; the majority will.