The Department of Defense’s (DoD) new cybersecurity standard for contractors – Cybersecurity Maturity Model Certification (CMMC) – cleared two significant steps at the end of September 2020. It completed the interagency review process, and then the DoD published the interim version of the CMMC Defense Federal Acquisition Regulation Supplement (DFRARS) rule change, which initiated a 60-day comment period for the public. However, the latter of these two developments was met with some surprise and frustration by industry and those following the CMMC program.
Firstly, the DoD has published an interim final rule, which will come into effect at the end of November 2020 – following the comment period. Typically, rules are posted as a proposed draft and then published as a final rule only after the public comments are considered, which was not the case in this instance. As an interim final rule, the rule is in essence already in effect before – and thus regardless of – any comments from the public, and the final rule will likely be no different from what it is now. And once finalised, the rule can and will start appearing in RFPs/RFQs – though it’s expected that a CMMC clause will be included sparingly and strategically at first.
The second outcome from the publishing of the interim final rule is that it also introduces an additional certification requirement – defence industrial base (DIB) contractors will be required to certify compliance with NIST 800-171. Companies that are deemed ‘Basic’ can self-certify – this is the case right now expected to be the majority of the DIB – whilst assessments for those companies deemed ‘medium-’ and ‘high-risk’ contractors will be “completed by the government.” Self-attestation to NIST 800-171 is already a requirement for defence contractors, but now the government can inspect compliance with this set of controls more carefully.
• Access Controls (AC)
• Audit & Accountability (AU)
• Configuration Management (CM)
• Risk Management (RM)
• System & Communications Protection (SC)
• Asset Management (AM)
• Identification & Authentication (IA)
• Security Assessment (CA)
Taking just minutes to set up and generate accurate reports, Nipper automates the line-by-line analysis of your device configuration and operating system data, detecting precise security and compliance risks.
Already in service with all four arms of the DoD, Titania Nipper is trusted to automate the configuration assessments of core network devices against DISA STIG and CIS benchmarks to prove compliance with risk management frameworks such as NIST RMF, NIST CSF, NIST 800-53/800-171 and CMMC. Indeed, Nipper’s proven accuracy advantage is estimated to save the DoD up to 3 hours per device not investigating false positives reported by other compliance tools.
For more information on how Titania can automate CMMC compliance assessments for your organization or clients, and to download a mapping summary of those CMMC security practices that can be assessed using Nipper, visit our CMMC Solutions page.