Appalachia Technologies Blog
Get Ready for CMMC Requirements Now
Anyone offering a sure-shot solution to all your Cybersecurity Maturity Model Certification (CMMC) woes is trying to pull a fast one on you. The CMMC is a comprehensive move by the U.S. Department of Defense (DoD) that involves many moving parts and will take years to implement fully.
We have highlighted some crucial aspects you should immediately focus on to remain eligible and in good standing with current regulatory requirements. You’ll also find some strategic steps that you should implement throughout your business to be ready for the enhanced cybersecurity practices required under the new CMMC 2.0 framework.
The DFARS Interim Rule
The Defense Federal Acquisition Regulation Supplement (DFARS) Interim Rule was established because new requirements under CMMC 2.0 will not be fully rolled out for years. The Interim Rule immediately establishes the DoD Assessment Methodology to get a measure of a contractor’s implementation of the existing cybersecurity requirements. According to DFARS Case 2019-D041, effective November 30, 2020, the Interim Rule requires all DoD prime contractors and the estimated 300,000+ DIB supply chain members to perform a minimal self-assessment of their current cybersecurity posture and document their results in the Supplier Performance Risk System (SPRS) at https://www.sprs.csd.disa.mil/.
All contractors and subcontractors with existing contractual obligations related to the NIST SP 800-171 framework standards must complete a self-assessment using the standard assessment and scoring methodology to assess their organization’s implementation of the NIST requirements. Contractors must then upload the assessment to the federal Supplier Performance Risk System (SPRS) database to qualify for new or renewed defense contracts.
To help you better understand the DFARS Interim Rule requirements, you must familiarize your organization with these critical components:
- Self-assessment: This assessment involves evaluating the implementation of 110 different cybersecurity controls defined by the NIST SP 800-171. Organizations must perform self-assessments using the new NIST (SP) 800-171 DoD Assessment Methodology. For more on Supplier Performance Risk Scores (SPRS), check out our blog on the topic.
- Scoring methodology: The scoring methodology begins with a “perfect” score of 110 for each NIST (SP) 800-171 control that the organization must implement. Weighted points are deducted for every control that has not been implemented. Each deduction holds a point value ranging from one to five based on the individual control’s importance. No credit is given for partially implemented controls, except for multifactor authentication and FIPS-validated encryption.
- Submission of the score: You must upload the self-assessment score to a governmental Supplier Performance Risk System (SPRS) database within 30 days of completing the assessment to qualify for new contracts and contract renewals. For help entering the score, check out our blog, How to Enter an SPRS Score.
- System Security Plan (SSP): This is a required document that contains thorough details of implemented NIST 800-171 controls, such as operational procedures, organizational policies and technical components.
- Plan of Action and Milestones (POA&M): If you have not fully implemented a control, you must provide a POA&M document as an appendix explaining how you plan to address the deficiencies and when you will complete the implementation. You can post updated scores once previously deficient controls have been addressed and remediated.
Eligibility to win new federal or defense contracts issued includes requirements with respect to the completion of the Interim Rule standards.
Immediate steps to take
If you haven’t already, your organization should prepare to conduct a thorough and accurate self-assessment to measure your cybersecurity posture score to ensure you are adequately securing and protecting your information assets. This is the first step in preparing for the enhanced cybersecurity requirements and certification process rolling out under the new CMMC framework. To ensure you don’t miss out on new contracts or renewal opportunities, you must start preparing and implementing the necessary security controls and policies now.
Here are some steps you need to take to prepare your organization right away:
- Establish a Systems Security Plan (SSP): Building an SSP will help you map your network and information assets (hardware and software) and will mark the beginning of knowing how many controls (out of the 110) your business has implemented so far.
- Assess how you deal with controlled unclassified information (CUI): Ask yourself questions on how your business manages CUI — who accesses it, where CUI lives, how it’s shared, etc.
- Conduct a DoD self-assessment: You can utilize a tool to conduct a self-assessment and obtain a score as per the NIST (SP) 800-171 DoD Assessment Methodology.
- Build a POA&M document: In this document, list all the steps you will take to mitigate the deficiencies that prevented you from getting a perfect score of 110 (along with the estimated completion time).
- Upload the self-assessment score: Don’t forget to upload the results to the governmental SPRS database within 30 days of conducting the self-assessment.
- Document everything: This step is non-negotiable. Ensure you document every crucial aspect of your journey — from preparation to self-assessment and remediation.
The enhanced cybersecurity policies, controls and standards within the CMMC regulatory framework are vast and complex, making understanding your obligations and how or where to get started a daunting and overwhelming task.
Partnering with a specialist can help make the entire process less stressful and time-consuming. As an IT service provider, we can provide you with the specialized tools and cybersecurity expertise you need to help you prepare for and implement the cybersecurity controls necessary to satisfy and validate compliance with the DFARS Interim Rule and new CMMC 2.0 requirements.