Where is the Easy Button for CMMC? Why MSPs may be the solution.

Easy button image

Author: V. Amira Armond (CISSP, CISA, PMP, MBA) is a computer systems architect, cyber-security consultant, and owner of Kieri Solutions LLC.

Kieri Solutions LLC is in progress to become a CMMC assessment organization and has several Registered Practitioner and Certified Assessor candidates on staff. Amira is also the chief editor for cmmcaudit.org, a public resource for news and informational articles about the Cybersecurity Maturity Model Certification. 

Disclaimer: This is an opinion article. If you want official guidance, talk to your paid cybersecurity consultant or lawyer.

CMMC level 3 and DFARS 252.204-7012 is expensive.

For a 200 person company with little complexity, my workload calculations are that you will need one compliance officer (CISO) and three full time IT staff to perform all the required activities of CMMC level 3 or DFARS 252.204-7012. For the DC region, this comes out to $500,000 – $700,000 per year just in labor costs. I’d add an additional $3,000 per employee for back-end information systems, and now your IT budget is at least $1.1 – 1.4 million per year before you add CMMC assessments.

The DoD justifies security requirements by saying that they will pay for cybersecurity as an allowable cost.

This will be true, but it isn’t true today. Not all bidders have a high quality cybersecurity program. The ones that don’t have good cybersecurity can reduce their price and win the contract. This means that if a contractor adds “allowable” cybersecurity costs to their bid today, they are disadvantaged compared to less secure competitors.

I’m hoping that the recent DFARS Interim Rule which requires posting a summary score to SPRS will make contract officers choose more secure networks despite the increased cost, but that is yet to be seen. I also expect to see plenty of companies posting a perfect “110” just because they can, not because their network is secure. Will contract officers make the playing field even more uneven by prioritizing the false 110’s? There is no way for the government to win in this situation, except by enforcing the False Claims Act.

Once the CMMC is active, bidders won’t be able to falsely claim compliance. That means that insecure bidders won’t be able to undercut the competition.

This levels the playing field.

In order from easiest to hardest, how can a small/medium company comply with CMMC?

Note: from this point onward, I’m using CMMC to refer to CMMC level 3 as well as the DFARS 252.204-7012 and NIST SP 800-171 security requirements for CUI.

1. Nuclear option. Avoid DoD contracts that require CMMC Level 3 for now.

You don’t need to bid on contracts that require CMMC level 3 or DFARS 252.204-7012. Over the next years, industry will probably develop a strategy to provide high-security networks at reduced cost. Keep your ear to the ground and jump back in when things are easier.

2. Avoid CMMC by not accepting CUI to your systems.

Many contractors have the DFARS 7012 clause in their contract, but actual performance doesn’t require dealing with CUI. Tell the government that they need to get permission from you before sending CUI and they MUST label all CUI. Ask for it in paper form rather than electronic. Make no exceptions.

Even if the contract requires CMMC level 3, your systems will not be “in scope” unless you have CUI on them. Fun note: This brings up a logic problem with the current CMMC implementation plans. I’ve seen official statements saying that CMMC certification and roll-down to subs will be required to win a contract. I’ve also seen statements that companies bidding on a contract can hold lower levels if they use (certified) partner systems for CUI. Will contract officers accept a bid when only one team member (such as the prime) holds a certification at the required level?

3. Avoid CMMC by using government networks exclusively for CUI.

Many contractors provide full time employees to work inside government organizations. If some or all of your staff have been issued government computers, why in the world would you forward sensitive data to your corporate network? If you need to share data with other staff that don’t have government computers, consider options like asking the staff to join you in-person to view the data.

3. Avoid CMMC by using a partner network for your contract.

Go to your prime and ask if you can use their secure network and computers to work on the contract. By my calculations, even for larger networks with economy of scale, the cost for a CMMC level 3 information system is about $6-8k per user per year. Plan to pay your partner for this service.

In my opinion, the largest defense contractors should be offering this to their subs, rather than doing what is happening now, which is demanding their subs all become compliant with CMMC level 3 yesterday.

4. Lease a compliant network and oversight from a MSP.

Essentially, you’d use the Managed Service Provider’s (MSP) highly secure network. They’d send you laptops and grant you access to your own file share and email. They’d make sure that all the actions required by CMMC level 3 are performed, such as audit log reviews, incident reporting, personnel screening, patching, and vulnerability scans. Your team would be separated from other users on the network through role-based security groups.

Or the MSP will build a very secure CMMC level 3 compliant network in a reproduceable manner. Templates, scripts, standard images, etc. The MSP will provide staff and procedures to enforce all the manual activities relating to security. You will need to have a contract that specifies how the MSP will uphold compliance activities, and will need to do some due-diligence to verify that this is performed (such as having regular small audits performed). Any leased network will probably prevent your employees from installing software or using less common device types.

This concept doesn’t really exist right now, but I foresee it becoming more and more popular over time. Katie Arrington called for it during her first presentations of the CMMC model – she asked industry to create “tools” which offer easy CMMC compliance in a package. I’ve seen lots of tools that handle technical problems, but nothing that moves the oversight role from the contractor to a vendor.

There is a liability problem with using other networks.

This liability problem is faced by the MSP or by your partner if they host you on their information system.

Whoever is hosting the network needs to make sure that they can pass a CMMC assessment. There is a good chance that an assessor would fail the network on Access Control if multiple unrelated organizations are using the same system.

In my opinion, the only “safe” way to host other organizations without risk of a failed assessment is to do it in a formal partnership agreement. Both parties performing on the same DoD contract as prime and sub, or as multiple teaming partners on the same contract.

If you can’t be formal partners on the same DoD contracts, then you’d want to put each organization on their own completely separate network (not using the same Active Directory, for example). But at that point, you’d need separate assessments for each customer and duplicate setup and maintenance tasks, which returns us to the cost issue.

My challenge to the DoD and the CMMC-AB:

Please identify a path for MSPs to perform one assessment on a “model network” which can then be cloned for each client and renewed with a single assessment. Or state that it is acceptable (with major role-based restrictions and diligent access control) to host multiple organizations inside one highly secure information system.

We need precedent to show that hosting secure networks for other organizations is allowed. The risk of letting our customers down by failing an assessment is discouraging potential vendors (such as my own company, Kieri Solutions) from offering this solution.

Non-Easy-Mode Solution

4. Segment your organization and network to split out a Defense-oriented group.

If you can figure out a way for only a few employees or a few machines to need CUI, build out a network just for them.

I recommend also moving some support staff to this network, such as sales, accounting, and the chain of command (just the ones that deal with DoD contracts). This is because FCI needs to be contained as well, unless you are interested in a second CMMC level 1 assessment of your regular network.

Some international organizations choose to split their organization into different business units for each government they serve. While this is painful, it makes it very clear to the government that your United States-specific organization can be trusted.

A segmented network is still going to be incredibly expensive. If you only have 10 employees using it, expect costs of around $20,000 per employee per year to get it certified and maintain the required levels of process maturity for CMMC level 3. This assumes a part-time cybersecurity person and FedRAMP solutions.

I’ve said my piece. What do you think?

Please comment!

If you know Ms. Katie Arrington, do me a favor and forward my challenge to her about hosting other organizations on a single assessed information system. I think this solution is what she wanted when she asked industry to develop solutions for the CMMC.

Please register for our newsletter for more timely articles and news!

Cheers! Amira

Author: V. Amira Armond (CISSP, CISA, PMP, MBA) is a computer systems architect, cyber-security consultant, and owner of Kieri Solutions LLC.

Kieri Solutions LLC is in progress to become a CMMC assessment organization and has several Registered Practitioner and Certified Assessor candidates on staff. Amira is also the chief editor for cmmcaudit.org, a public resource for news and informational articles about the Cybersecurity Maturity Model Certification. 

Next articles:

CMMC Compliance FAQs – Organizations seeking certification

How to submit a NIST SP 800-171 self assessment to SPRS

DFARS 252.204-7012 or 252.204-7021 enforces NIST 800-171 and CMMC

5 thoughts on “Where is the Easy Button for CMMC? Why MSPs may be the solution.

  1. David Wilson says:

    I’m disturbed by the entire methodology of the CMMC roll out. They’ve essentially created a number of very expensive cottage industries that will be required to meet these requirements. The issues that they initially targeted dealt with security breaches caused by lack of oversight on the part of contractors, so, rather than bringing the solution in house and providing a clear way forward, they turned around and will now (still) require Industry to monitor the cybersecurity, but will also hand over the assessment of that certification – to Industry. The notion that this cost will be written into proposals on contracts is as you noted… unlikely to really work out that way. It, in fact, will give larger companies with big staffs and budgets an edge on almost any CMMC stamped contract, and will effectively (if they force the roll down) push small and medium sized companies out of fair competition even as sub-contractors. On top of all of that, regardless of how many different people break down the controls and the requirements, there is not a simple, plain English way forward to certification. It requires pre-assessments, re-assessments, an incredible amount of monitoring – probably the biggest cost we are facing as a company will be logging, monitoring, and auditing, which I believe will only be possible with a 3rd party add-on at a bare minimum, and likely not without a managed add-on. This is a great article, and puts a much clearer light on the expenses and challenges.

  2. Molly Dodge says:

    Wow – good stuff! I agree, MSP’s could lead the charge in providing CMMC CaaS. I look forward to reading more about this from you!

Leave a Reply

Your email address will not be published. Required fields are marked *