web analytics

US DoD finalizes CMMC cyber rules for suppliers – Source: www.csoonline.com

Rate this post

Source: www.csoonline.com – Author:

john_mello jr

News Analysis

15 Oct 20245 mins

ComplianceGovernment ITRegulation

The Cybersecurity Maturity Model Certification (CMMC) is a US Department of Defense program outlining tough requirements for Defense Industrial Base contractors to ensure the protection of sensitive data. It is expected to take effect by year-end.

A new rule by the US Department of Defense to ensure that Defense Industrial Base contractors and subcontractors are implementing information security measures required by the federal government is set to take effect 60 days after their expected publication in the Federal Register on Oct. 15.

The rule governs the agency’s Cybersecurity Maturity Model Certification (CMMC) program, which verifies that defense contractors are compliant with existing protections for federal contract information (FCI) and controlled unclassified information (CUI) and are protecting that information at a level commensurate with the risk from cybersecurity threats, including advanced persistent threats.

According to the department, the CMMC provides the tools to hold accountable entities or individuals that put US information or systems at risk by knowingly misrepresenting their cybersecurity practices or protocols, or knowingly violating obligations to monitor and report cybersecurity incidents and breaches.

The department, which has largely depended on security self-assessments by its suppliers in the past, has been criticized for some time by its Inspector General for weak supervision of its suppliers. In a report released in December 2023, Inspector General Robert P. Storch noted his agency issued five reports from 2018 to 2023 that consistently found DoD contract officials failed to establish processes to verify that contractors complied with selected federal cybersecurity requirements for CUI as required by the National Institute of Standards and Technology (NIST).

No relief from pressure to comply

With the new rule, the CMMC program implements an annual affirmation requirement that is a key element for monitoring and enforcing accountability of a company’s cybersecurity status. It also introduces Plans of Action and Milestones (POA&Ms). POA&Ms will be granted for specific requirements as outlined in the rule to allow a business to obtain conditional certification for 180 days while working to meet the NIST standards.

Despite the introduction of POA&Ms, contractors are concerned about their ability to comply with the new rule’s requirements within the desired time constraints. “If anyone in the industry was hoping that the pressure would be relieved, I don’t think it was,” said Robert Metzger, cybersecurity practice chair at the law firm of Rogers Joseph O’Donnell.

“There’s a little more time for things to happen,” he acknowledged. “It’s pretty clear that no one will be required to undergo a certification assessment until probably at the earliest, the first quarter of 2025 and maybe the second quarter.”

However, he added, “It is also clear that DoD continues to expect that companies who want to do business with it will satisfy all 110 requirements in NIST Special Publications SB 800-171-REV-2. That publication sets out security requirements designed to protect controlled unclassified information in non-federal systems and organizations.

“Many people urged DoD to take a more flexible approach,” he continued. “They wanted a lower minimum score from DoD as is needed to allow any POA&Ms. Essentially, DoD says that when an assessment is done, you have to pass 80% of the 110 stated requirements in that special publication. And if you don’t pass 80% of those, then you’re not eligible for any POA&Ms to close over a six-month interval.”

“But even then, there’s approximately 45 of the most important cyber requirements within that group of 110 that the DoD has said you have to meet on the first try, or they’re not going to let you have a POA&M to close them, even if you have an overall 80% score.”

Contractors urged to get head start on assessments

Contractors were urged to conduct CMMC assessments during the 60-day period following the publishing of the new rule in the Federal Register by Brian Kirk, senior manager for information assurance and cybersecurity at the accounting and consulting firm Cherry Bekaert, which is a CMMC Third-Party Assessor Organization (C3PAO). C3PAOs are independent entities authorized to evaluate contractors’ cybersecurity practices and controls to ensure they meet the required security standards set by the DoD.

“The finalization of the rule paves the way for C3PAOs to begin conducting CMMC Level 2 assessments independently of DIBCAC, beginning 60 days from the rule being released to the Federal Register,” Kirk said. The Defense Industrial Base Cybersecurity Assessment Center (DIBCAC) is a federal organization that conducts comprehensive cybersecurity assessments of defense contractors.

“The timing of the release of the rule allows contractors to get a head start by obtaining a CMMC Level 2 certification prior to CMMC being enforced in their contracts,” Kirk explained. “Additionally, this approach will help mitigate supply and demand challenges within the CMMC ecosystem by certifying contractors who are ready.”

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.

Original Post url: https://www.csoonline.com/article/1287812/us-dods-cmmc-2-0-rules-lift-burdens-on-msps-manufacturers.html

Category & Tags: Compliance, Government IT, Regulation, Supply Chain – Compliance, Government IT, Regulation, Supply Chain

Views: 2

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post