Ready to Schedule a Consultation?

What You Need To Know

The Cybersecurity Maturity Model Certification (CMMC) is the standard response from the Department of Defense regarding notable compromises within contractors' information systems. It is used for implementing cybersecurity throughout the defense industrial base (DIB), which consists of over 300,000 organizations.

Latest Update

Version 1.0 was published January 31, 2020

Who Requires It?

All Department of Defense contractors require a CMMC certification, including all suppliers in the supply chain, SMBs, commercial contractors, and foreign suppliers.

Assessment

Contractors are responsible for implementing, monitoring, and certifying proper security is in place for protecting their data systems and any important DoD information. However, an independent 3rd party is also required to assess the contractors' compliance.

Framework

Five (5) certification levels are required to confirm proper security:
1. Fundamental Cyber Hygeine - using antivirus applications, employee password update protocols
2. Intermediate Security - protection of Controlled Unclassified Information (CUI) using portions of the S Department of Commerce National Institute of Standards and Technology's (NIST’s) Special Publication 800-171 Revision 2 (NIST 800-171 r2) security requirements.
3. Utilizing all NIST 800-171 r2 Security Requirements in an organization-wide cyber protection plan
4. A review board is in place to evaluate instilled practices, techniques and procedures
5. Set a standard process to detects and respond.

of 5  
Coyote Brown
Let's Talk Cyber

We are a Cyber Security Consulting & Advisory Firm composed of highly experienced strategic cybersecurity advisors and consultants helping clients maintain a healthy cyber security posture.

4.8 of 5  
Palo Alto Networks
We’re committed to delivering security without compromise

Palo Alto Networks, Inc., operates a multinational cybersecurity company that provides advanced firewalls and cloud-services.

appviewx netops secops devops automation
of 5  
AppViewX

AppViewX is the Next-Gen Machine Identity Management, Automation and Orchestration platform for Enterprise IT.

aqua security
of 5  
Aqua Security

Aqua protects applications from development to production, across VMs, containers, and serverless workloads,
up and down the stack.

brandshield-security
of 5  
BrandShield

BrandShield prevents, detects and fights online scams: phishing attacks, fraud, executive impersonations and more.

deceptive bytes cyber threat protection
of 5  
Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

fortalice
of 5  
Fortalice Solutions

Their highly-skilled practitioners are trained to meet clients where they are – whether that be in the midst of a crisis or proactively seeking cybersecurity services.

infoblox
of 5  
Infoblox

Infoblox delivers essential technology to enable customers to manage, control and optimize DNS, DHCP, IPAM (DDI).

infocyte cyber security threat detection
of 5  
Infocyte

Infocyte is a globally trusted leader in proactive threat detection, Microsoft 365 security compliance, and incident response.

of 5  
Kenna Security

Kenna Security saves you time and money, and helps your Security and IT teams work more efficiently.

lacework cyber security compliance
of 5  
Lacework

Lacework delivers security and compliance for the cloud.

trend micro security email networks
of 5  
Trend Micro

A global leader in cybersecurity that helps make the world safe for exchanging digital information.

quantum armor silent breech attack monitoring
of 5  
Quantum Armor
beyondtrust logo cybersecurity software
of 5  
BeyondTrust

BeyondTrust is a global leader in Privileged Access Management (PAM), empowering companies to protect and manage their entire universe of privileges

cyberark cyber security solutions
of 5  
CyberArk

CyberArk leads the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets

armis cybersecurity network monitor protection
5 of 5  
Armis
Armis Security - Agentless Device Security Platform

Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices.

4.7 of 5  
Blackpoint Cyber
Managed Detection and Response

Blackpoint Cyber is a technology-focused cybersecurity company headquartered in Maryland, USA. The company was established by former US Department of Defense and Intelligence security experts and leverages its real-world cyber experience and knowledge of malicious tradecraft to help MSPs safeguard their infrastructure and operations.

expel cyber saas soc service
of 5  
Expel
Managed Detection and Response (MDR) SOC as a Service

Expel - Transparent SaaS (SOC as a Service)

ironnet cybersecurity enterprise
of 5  
IronNet Cybersecurity
Network Detection & Response

IronNet Cybersecurity is a global cybersecurity leader that is revolutionizing how enterprises, industries, and governments secure their networks

onelogin sso cybersecurity cloud endpoint management
of 5  
OneLogin

OneLogin is the leader in Unified Access Management, Enabling Organizations to Access the World

avertium protection cyber cmmc
of 5  
Avertium

Avertium is a leading provider of managed cybersecurity services

semperis identity protection cybersecurity
of 5  
Semperis

Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments.