Here’s the latest CMMC news and articles you should check out!
CMMC FAQ for Organizations Seeking Certification
This easy FAQ article discusses frequently asked questions about implementing CMMC security. Things like “Can my employees use their home computers to work on CUI?”
Incident Handling tips from CISA
The Cybersecurity and Infrastructure Security Agency (CISA.gov) just released this 14 page document with very actionable tips for incident handling. Great resource to hand to your systems engineer and security team.
Provisional Assessor training update
I’ve spoken with a few provisional assessor selects this week. They were given a day’s worth of online training to go through. The first in-person class (out of several) started the week of Sept 1. According to participants, the in-person training is covering topics up to CMMC level 3.
Drama about CMMC-AB “Sponsorships”
For a brief period last week, the CMMC Accreditation Body website displayed a “partners” page with options for sponsorship by companies. “Diamond” status ($500,000), Platinum ($250,000), Gold ($100,000). After community outrage, and possibly DoD influence, this page was taken down. As of today (September 9, 2020), several spokespersons from the DoD have said they will not condone sponsorships.
Related, the CMMC-AB and Duns & Bradstreet announced a partnership. The only problem is D&B is apparently offering a CMMC assessment tool, which again, may be putting it ahead of other private-sector CMMC compliance vendors.
My opinion: The CMMC-AB working groups and directors have put hundreds of thousands of dollars of hours into this project. They need funding and the top level full time positions should have been funded by the DoD. This is a big problem. HOWEVER, even with no funding, any preferential treatment toward for-profit companies invalidates the CMMC AB’s objectivity and needs to stop.
How to scope for your CMMC Assessment – from SEI
The Carnegie Mellon University – Software Engineering Institute (SEI) worked hand-in-hand with the DoD to develop the CMMC model. They are one of the highest authorities on the topic. This blog describes following your CUI flows to determine which aspects of your environment are in-scope or not. Note: CUI means CMMC Level 3+, it does not address level 1-2 scoping directly.
Microsoft 365 GCC High adds features
This week, GCC High finally replaced the old Intune portal with Endpoint Manager and connected Defender ATP for cloud-only tenants. For my company and clients using GCC High E5, this is a big money saver because we can use it for central audit and alert requirements for Windows 10 devices instead of a different solution. GCC High is a complex topic, and its unique “features” are not well documented – if you want 30 minutes of free advice about moving to GCC High, my company, Kieri Solutions, is happy to sponsor a discussion. Send us an email to schedule a call.
Achieving Cloud Compliance in the Age of CMMC, CUI, and DFARS 7012: How secure are your cloud vendors?
This new blog from CMMCaudit delves deep into cloud vendor risk and why the DFARS 7012 rule places so much importance on it.
It includes an exclusive memo from the DCMA group performing DFARS 7012 audits today. This memo identifies some categories of clouds as in-scope, despite most cybersecurity teams ignoring them.
DoD DCMA Audit report
This report from late 2019 is a wealth of information about DFARS 252.204-7012 assessments conducted in 2019 against approximately 20 contractors. It describes why contractors failed their audits and in particular, describes vendor risk as a major concern.
DFARS 252.204-7012 change delayed
This just in (September 9, 1:00pm EST)
Looks like the DFARS rule change is postponed by two months. This puts the public comment period in November 2020 instead of September. It should mean that the first official requirement for CMMC in contracts will be no earlier than February 2021.
Hope this all helps! Good luck to everyone in their assessment and compliance journeys.