<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jonathan Deglise, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/jonathan-deglise/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/jonathan-deglise/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 18 Jul 2024 09:00:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Jonathan Deglise, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/jonathan-deglise/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Timeline Update: CMMC 2.0 and the Phenomenon of Midnight Rulemaking</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/#respond</comments>
		
		<dc:creator><![CDATA[Jonathan Deglise]]></dc:creator>
		<pubDate>Wed, 17 Jul 2024 10:12:40 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[Cybersecurity Maturity Model Certification]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[FCI]]></category>
		<category><![CDATA[Midnight Rulemaking]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[third party]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23608</guid>

					<description><![CDATA[<p>Not familiar with CMMC 2.0? For more information regarding CMMC 2.0, please refer to this article. The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive framework designed to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI), shared with...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/">Timeline Update: CMMC 2.0 and the Phenomenon of Midnight Rulemaking</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><em>Not familiar with CMMC 2.0? For more information regarding CMMC 2.0, please refer to </em><a href="https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/"><em>this article</em></a><em>.</em></p>
<p style="text-align: justify;">The Cybersecurity Maturity Model Certification (CMMC) is a <strong>comprehensive framework </strong>designed to <strong>protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI), shared with contractors and subcontractors </strong>of the <strong>Department of Defense (DoD) </strong>through acquisition programs<strong>, as defined by Executive Order 13556</strong>.</p>
<p style="text-align: justify;">The CMMC 2.0 Proposed Rule, published on December 26, 2023, represents the latest evolution of the CMMC cybersecurity model.</p>
<p style="text-align: justify;">On June 27, 2024, after adjudicating nearly 2,000 comments, following a 60-day open-comment period, the <a href="https://cmmcinfo.org/cmmc-regulations-move-closer-to-final/">DoD submitted a draft of the CMMC 2.0 Final Rule</a> (32 CFR) to the Office of Information and Regulatory Affairs (OIRA) at the White House.</p>
<p style="text-align: justify;"><strong>The summited draft represents <span style="font-weight: normal !msorm;">the </span>final step before the CMMC 2.0 rule is published<span style="font-weight: normal !msorm;"> in the Federal Register</span>. As the final draft has been submitted the<span style="font-weight: normal !msorm;"> focus </span>now <span style="font-weight: normal !msorm;">shifts to the timeline for </span>when the CMMC 2.0 regulation will take effect and be enforced.</strong></p>
<p style="text-align: justify;">Before addressing this shift in focus, it is essential to understand that the security requirements, upon which CMMC 2.0 Level 2 is founded (NIST SP 800-171), <strong>have been mandatory</strong> for DoD contractors handling sensitive information <strong>since December 2017</strong>, when the DFARS clause 252.204-7012 was included in DoD contracts. However, during this period, compliance mostly relied on self-attestation <strong>without a robust enforcement mechanism</strong>, leaving the <strong>DoD unable to verify adherence.</strong> As a result, many contractors <span style="font-weight: normal !msorm;"><strong>neglected</strong></span> to fully implement the required controls.</p>
<p style="text-align: justify;">To address this issue, the DoD launched the <strong>CMMC program</strong>, which essentially serves as the <strong>mechanism through which the DoD will verify compliance</strong> with the requirements outlined in DFARS clause 252.204-7012 (NIST SP 800-171), mandated in contracts since 2017.</p>
<p style="text-align: justify;">As the DoD puts it: &#8220;<a href="https://www.federalregister.gov/documents/2023/12/26/2023-27280/cybersecurity-maturity-model-certification-cmmc-program"><em>A key difference between the DFARS 252.204-7012 and CMMC Level 2 requirements is that compliance with NIST SP 800-171 under DFARS 252.204-7012 has not been consistently verified. <strong>Under CMMC, compliance will be checked by independent third-party assessors certified by DoD</strong></em></a><strong><em>.</em></strong>&#8220;</p>
<p style="text-align: justify;">The <strong>significant change</strong> <strong>introduced by CMMC</strong>, requires contractors to <strong>obtain certification through assessments</strong> conducted by a CMMC Third Party Assessment Organization (C3PAO) to <strong>demonstrate compliance</strong> to retain and secure DoD contracts.</p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #50067a;"><strong>CMMC Rulemaking Timeline</strong></span></h2>
<p style="text-align: justify;">The CMMC rulemaking timeline is summarized below based on publicly available information as of July 17, 2024.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-23612" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN.png" alt="" width="3935" height="1545" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN.png 3935w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-437x172.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-768x302.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-1536x603.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-2048x804.png 2048w" sizes="(max-width: 3935px) 100vw, 3935px" /></p>
<p style="text-align: justify;">As with all federal regulations, CMMC requires a legal basis for implementation. Therefore, to determine when the CMMC 2.0 regulation will come into effect, we need to understand the rulemaking process behind CMMC 2.0, involving two rules from the <a href="https://www.ecfr.gov/">Code of Federal Regulations</a>: 32 CFR and 48 CFR.</p>
<p style="text-align: justify;">For the CMMC 2.0 regulation to come fully into effect, <strong>two things need to happen</strong>.</p>
<ol style="text-align: justify;">
<li>The <a href="https://www.reginfo.gov/public/do/eAgendaViewRule?pubId=202210&amp;RIN=0790-AL49">32 CFR CMMC</a> Final Rule has to come into effect. This rule outlines and codifies the CMMC program and will allow CMMC third-party assessments to begin, known as the &#8220;<strong>market rollout</strong>&#8220;.</li>
</ol>
<p style="text-align: justify;">The 32 CFR CMMC Final Rule is estimated to be published no later than October 26, 2024, after OIRA&#8217;s review of up to 120 days, and will come into <strong>effect approximately 60 days later, in late Q3 or early Q4 2024</strong>.</p>
<ol style="text-align: justify;" start="2">
<li><a href="https://www.reginfo.gov/public/do/eAgendaViewRule?pubId=202210&amp;RIN=0750-AK81">48 CFR CMMC</a> Final Rule must come into effect. This rule revises the DFARS clause 252.204-7021 to point to the CMMC program (32 CFR) and will introduce CMMC compliance as a contractual clause gradually over 3 years, known as the &#8220;<strong>phased rollout</strong>&#8220;.</li>
</ol>
<p style="text-align: justify;">The 48 CFR Proposed Rule was <strong>submitted to OIRA</strong> in May 2024. After a 90 to 120-day regulatory review and an initial 60-day public comment period, the Proposed Rule will undergo another 60-day public comment period, followed by a Final Rule review and adjudication process, estimated to take 150 to 280 business days. The 48 CFR Final Rule is <strong>expected to come into effect around Q3 or Q4 2025</strong> but could be sooner, as it revises an existing, small clause (DFARS clause 252.204-7021).</p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #50067a;"><strong>The 32 CFR is the Starting Gun for the CMMC Race</strong></span></h2>
<p style="text-align: justify;">While the effective date of the 48 CFR Final Rule (expected in Q3 or Q4 2025) will determine when the CMMC 2.0 regulation is mandatorily included in contracts, known as the &#8220;<strong>phase-rollout</strong>,&#8221; it&#8217;s a <strong>significant misconception</strong> that the pivotal milestone for the start of the CMMC race is the effective date of the 48 CFR.</p>
<p style="text-align: justify;">Indeed, the <strong>kickoff for the CMMC race will be determined by the effective date of the 32 CFR Final Rule</strong> (expected late Q3 or early Q4 2024), not the 48 CFR Final Rule.</p>
<p style="text-align: justify;">The 32 CFR Final Rule will trigger the &#8220;<strong>market rollout</strong>&#8220;, which will <strong>allow CMMC assessments to begin</strong>. Once these assessments are available, prime contractors (e.g., Lockheed Martin, Boeing, Raytheon) will likely <strong>require subcontractors to obtain CMMC certification</strong> as soon as possible, <strong>well before DoD does </strong>through the &#8220;<strong>phased rollout</strong>&#8220;, to maintain their competitive edge and mitigate the risk of non-certified suppliers jeopardizing their own certification status.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-23615" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN.png" alt="" width="3100" height="2277" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN.png 3100w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-260x191.png 260w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-53x39.png 53w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-768x564.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-1536x1128.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-2048x1504.png 2048w" sizes="(max-width: 3100px) 100vw, 3100px" /></p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #50067a;"><strong>Midnight Rulemaking and CMMC 2.0</strong></span></h2>
<p style="text-align: justify;">In the past 6 months, there has been a <strong>notable acceleration in the CMMC rulemaking process</strong>. This is evident in several key milestones, including the publication of the 32 CFR Proposed Rule in December 2023, the submission of a 48 CFR Proposed Rule to OIRA in May 2024, and most recently, the submission of the 32 CFR Final Rule to OIRA in June 2024. This <strong>phenomenon is often referred to as </strong>&#8220;<a href="https://www.gao.gov/products/gao-23-105510">Midnight Rulemaking</a>&#8220;, which describes the rush to finalize regulations in the final months before a presidential administration concludes.</p>
<p style="text-align: justify;">Thus, if we anticipate the 32 CFR Final Rule to be finalized and effective in late Q3 or early Q4 2024, given the Department of Defense&#8217;s strong motivation to complete the CMMC regulations before the U.S. 2024 elections, there is a very strong possibility it will <strong>become effective before November 5, 2024</strong>.</p>
<p> </p>
<h2 style="text-align: justify;"><strong><span style="color: #50067a;">Don’t Wait for the Starting Gun to Begin the CMMC Compliance Journey</span></strong></h2>
<p style="text-align: justify;">The DoD anticipates that it will take <a href="https://www.federalregister.gov/documents/2023/12/26/2023-27280/cybersecurity-maturity-model-certification-cmmc-program">two years</a> for companies with existing contracts to become CMMC certified, <strong>assuming they have already implemented the NIST SP 800-171 Rev. 2 requirements </strong>as per DFARS clause 252.204-7012. This extended timeline is due to several factors:</p>
<ol style="text-align: justify;">
<li>Once 32 CFR becomes effective, CMMC third-party assessments for CMMC Level 2 will commence, requiring organizations to achieve <strong>100% self-attestation readiness before undergoing assessment</strong>. This preparatory phase demands significant time and effort.</li>
<li>On average, organizations <strong>spend between 12 to 18 months preparing</strong> for a CMMC Level 2 assessment.</li>
<li>Due to a <strong>shortage</strong> of CMMC assessors, organizations may expect to <strong>wait approximately 9 to 15 months</strong> (3 to 5 quarters) for a CMMC assessment.</li>
</ol>
<p style="text-align: justify;">Therefore, to stay prepared for future DoD contract opportunities and maintain a competitive edge, it is recommended that organizations <strong>begin their CMMC compliance process today. </strong></p>
<p style="text-align: justify;">Feel free to <a href="https://www.wavestone.com/en/get-in-touch/">reach out</a> to discuss your CMMC journey with us and explore how #Wavestone can assist you in navigating the intricate landscape of CMMC 2.0 compliance, supporting your path to certification, and enhancing your cybersecurity readiness into a strategic advantage.</p>
<h3 style="text-align: justify;"><strong>Our CMMC 2.0 Compliance Services:</strong></h3>
<ol style="text-align: justify;">
<li><u>CUI Identification:</u>
<ul>
<li>We assist in identifying Controlled Unclassified Information (CUI) within your organization to ensure compliance with CMMC requirements.</li>
</ul>
</li>
<li><u>CMMC Assessment Scope Identification:</u>
<ul>
<li>We help define and minimize your CMMC Assessment Scope to stay cost-effective and pragmatic. By clearly identifying the scope, we ensure that all necessary systems and processes are included while avoiding unnecessary complexity and costs.</li>
</ul>
</li>
<li><u>CMMC Readiness Assessments</u>:
<ul>
<li>Our experts conduct CMMC Level 1 and 2 readiness assessments, evaluating your current state against the respective assessment objectives (e.g., NIST SP 800-171A) to provide you with actionable recommendations.</li>
</ul>
</li>
<li><u>CMMC Compliance Roadmap Definition</u>:
<ul>
<li>We work with you to define a clear roadmap to achieve CMMC compliance, tailored to your needs, whether for CMMC clusters or all-in scenarios.</li>
</ul>
</li>
<li><u>CMMC Implementation Support</u>:
<ul>
<li>We offer comprehensive guidance and support throughout the implementation phase, helping you effectively integrate the required controls and reach CMMC 2.0 compliance.</li>
</ul>
</li>
</ol>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/">Timeline Update: CMMC 2.0 and the Phenomenon of Midnight Rulemaking</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The DoD Strikes Back: Enhancing Supply Chain Cybersecurity with CMMC 2.0</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/#respond</comments>
		
		<dc:creator><![CDATA[Jonathan Deglise]]></dc:creator>
		<pubDate>Wed, 24 Apr 2024 08:25:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[Cybersecurity Maturity Model Certification]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[FCI]]></category>
		<category><![CDATA[règlementation]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[Supply-chain attacks]]></category>
		<category><![CDATA[third party]]></category>
		<category><![CDATA[TPRM]]></category>
		<category><![CDATA[US Department of Defense]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23048</guid>

					<description><![CDATA[<p>In late October 2023, a third-party data breach incident sent shockwaves through the business world, affecting over 57,000 entities engaged in business with Bank of America. This breach exposed sensitive personal and financial information, underscoring the pivotal role that third-party...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/">The DoD Strikes Back: Enhancing Supply Chain Cybersecurity with CMMC 2.0</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">In late October 2023, a <span style="color: #53548a;"><strong>third-party data breach incident</strong> </span>sent shockwaves through the business world, affecting over <span style="color: #53548a;"><strong>57,000 entities</strong></span> engaged in business with <span style="color: #53548a;"><strong>Bank of America</strong>.</span> This breach exposed sensitive personal and financial information, underscoring the pivotal role that third-party suppliers play in an organization’s cybersecurity infrastructure.</p>
<p style="text-align: justify;">These incidents, commonly referred to as “<span style="color: #53548a;"><strong>supply-chain attacks</strong></span>”, involve targeting an organization’s downstream <span style="color: #53548a;"><strong>third parties</strong></span> (e.g., partners, vendors) to gain access to valuable systems. In the Bank of America case, the compromised third party responsible for this breach, was Infosys McCamish Systems (IMS), an insurance process management services provider.</p>
<p style="text-align: justify;">This breach resonates with the infamous <span style="color: #53548a;"><strong>SolarWinds</strong> </span>cyberattack, where Nobelium hackers inserted malicious code into the SolarWinds Orion platform, enabling them to infiltrate numerous government systems, including the U.S.’ Homeland Security, State, Commerce, and Treasury, as well as private systems worldwide.</p>
<p style="text-align: justify;">As corporate IT architectures are arguably a mere reflection of a company’s intricate web of business relationships, these events serve as a stark reminder that <span style="color: #53548a;"><strong>organizations are not isolated entities</strong> </span>but rather <span style="color: #53548a;"><strong>hubs of interconnected and co-dependent partners</strong> </span>and third parties. Achieving a robust cybersecurity posture requires more than individual efforts; it demands cultivating a <span style="color: #53548a;"><strong>secure ecosystem</strong></span> of thoroughly vetted trusted partners to effectively safeguard the entire supply chain required for product delivery (TPRM).</p>
<p style="text-align: justify;">However, building such an ecosystem poses challenges. Many companies lack the resources to exclusively select leading, cutting-edge, and trusted third parties or may lack the leverage to demand transparency from existing partners.</p>
<p style="text-align: justify;">Drawing lessons from the SolarWinds cyberattack, and amid heightened geopolitical tensions (see <a href="https://www.wsj.com/politics/national-security/fbi-director-says-china-cyberattacks-on-u-s-infrastructure-now-at-unprecedented-scale-c8de5983">Chinese cyberattacks on U.S. infrastructure at an unprecedented scale</a>), the Department of Defense recognized this challenge and responded with the development of a solution for securing the supply-chain ecosystem of the Defense Industrial Base (DIB) called the <span style="color: #53548a;"><strong>CMMC</strong></span>.</p>
<p style="text-align: justify;">The Cybersecurity Maturity Model Certification (CMMC) is a <span style="color: #53548a;"><strong>comprehensive framework </strong></span>designed to <span style="color: #53548a;"><strong>protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI)</strong></span>, that is <strong><span style="color: #53548a;">shared with contractors and subcontractors of the Department of Defense (DoD) </span></strong>through acquisition programs.</p>
<p style="text-align: justify;">The CMMC 2.0 Proposed Rule Release, published on December 26, 2023, represents the latest evolution of the CMMC cybersecurity model, poised to supplant the preceding CMMC 1.0 with a <span style="color: #53548a;"><strong>more pragmatic approach</strong></span>. Following its release, the proposed policy underwent a <span style="color: #53548a;"><strong>60-day open-comment period</strong></span>, which <span style="color: #53548a;"><strong>concluded on February 26, 2024</strong>.</span> The new regulation is anticipated <span style="color: #666699;"><strong>to <span class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak" dir="ltr">be finalized by late 2024 or early 2025</span>.</strong></span></p>
<p style="text-align: justify;">The CMMC 2.0 is aimed at <span style="color: #53548a;"><strong>safeguarding sensitive national security information</strong></span> by protecting the Defense Industrial Base&#8217;s (DIB) sensitive unclassified information from frequent and increasingly complex cyberattacks. It streamlines requirements to <span style="color: #53548a;"><strong>three levels </strong></span>of compliance and aligns the requirements at each level with well-known and widely accepted NIST cybersecurity standards. The specific security requirements and assessment types (self-assessment, third-party assessment, or DoD assessment) vary based on the level.</p>
<ul style="text-align: justify;">
<li><span style="color: #53548a;"><strong>Foundational</strong> </span>(Level 1): Targets organizations handling FCI (e.g., contract performance reports, organizational charts). Compliance mandates strict adherence to the 15 security requirements outlined in FAR clause 52.204-21, through an annual self-assessment.</li>
<li><span style="color: #53548a;"><strong>Advanced</strong> </span>(Level 2): Targets organizations handling CUI, including Controlled Technical Information, DoD Critical Infrastructure Security Information, Naval Nuclear Propulsion Information, and Personally Identifiable Information (PIIs). Compliance requires adherence to 110 security requirements based on NIST SP 800-171 Rev. 2. Assessments are conducted by third-party organizations known as CMMC Third Party Assessment Organizations (C3PAO) tri-annually or through an annual self-assessment, depending on the sensitivity of the underlying CUIs.</li>
<li><span style="color: #53548a;"><strong>Expert</strong> </span>(Level 3): Targets organizations handling CUI for DoD programs with the highest priority. Compliance entails adhering to the 110 security requirements based on NIST SP 800-171 Rev 2 and an <span style="color: #53548a;"><strong>additional 24 security requirements</strong></span> based on NIST SP 800-172. These organizations undergo tri-annual assessments conducted by the DoD’s Defense Industrial Base Cybersecurity Assessment Center (DIBCAC).</li>
</ul>
<p style="text-align: justify;">Organizations must obtain a CMMC Level 2 Final Certification before scheduling a DIBCAC assessment for CMMC Level 3.</p>
<p style="text-align: justify;">The results of all assessments conducted on DIB organizations are consolidated within the <strong><span style="color: #53548a;">Supplier Performance Risk System (SPRS)</span></strong>. The SPRS (pronounced “Spurs”) is Department of Defense’s web platform that collects, processes, and retrieves data on supplier performance within the Defense Industrial Base, enabling the DoD to map the DIB&#8217;s business network cyber maturity, assess supplier performance, and evaluate risks related to contractual obligations.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-23041" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN.png" alt="" width="3557" height="1719" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN.png 3557w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-768x371.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-1536x742.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-2048x990.png 2048w" sizes="(max-width: 3557px) 100vw, 3557px" /></p>
<p style="text-align: justify;">By deploying this mandatory certification model, the DoD is at the forefront of establishing a comprehensive, secure, end-to-end supply chain framework within the DIB, hopefully enhancing long-term U.S. national security. Simultaneously, the DoD underscores that security is no longer optional; it is an integral aspect of business operations.</p>
<p><span style="color: #666699;"><strong>CMMC 2.0 assessments are expected to become available around Q4 2024</strong> </span>(once 32 CFR is finalized). <span style="color: #666699;"><strong>Prime contractors will expect sub-contractors to achieve CMMC compliance before Q3 2025</strong></span>, when CMMC 2.0 takes effect. Starting October 1, 2025, CMMC certification will be mandatory at the time of contract award.</p>
<p style="text-align: justify;"><strong> </strong></p>
<p style="text-align: justify;">If you require assistance navigating the intricate landscape of CMMC 2.0 compliance or need support on your path to certification, <span style="color: #53548a;"><strong>#Wavestone is ready to empower your journey</strong>.</span> Reach out today and elevate your cybersecurity readiness into a strategic advantage.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/">The DoD Strikes Back: Enhancing Supply Chain Cybersecurity with CMMC 2.0</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
