Transcript
Rick Howard (0:02)
You're listening to the Cyberwire Network powered by N2K.
N/A (0:12)
Identity Architects and engineers. Simplify your identity management with Strata, securely integrate non standard apps with any idp, apply modern MFA and ensure seamless failover during outages. Strata helps you avoid app refactoring and reduces legacy tech debt, making your identity systems more robust and efficient. Strata does it better and at a better price. Experience stress free identity management and join industry leaders in transforming their identity architecture with Strata. Visit Strata IO Cyberwire, share your identity challenge and get a free set of AirPods Pro. Revolutionize your identity infrastructure. Now visit Strata IO CyberWire and our thanks to Strada for being a longtime friend and supporter of this podcast.
Nyla Genoi (1:17)
The word is Cybersecurity Maturity Model Certification spelled C for cybersecurity, M for Maturity, M for Model, and C for certification. A supply chain cybersecurity accreditation standard designed for the protection of controlled, unclassified information that the US Department of Defense or DoD will require for all contract bids by October 2020. Example sentence even if you're not a prime defense contractor, it's likely that you will need to add CMMC to your list of compliance obligations in the near future. Origin and context maturity models in software engineering have been around since 1986. Early capability maturity model approaches were geared toward improving the software development process, and now they have appeared in a range of disciplines from manufacturing to cybersecurity. The term maturity refers to a set of characteristics, attributes, indicators, or patterns that represent capability and progression. Maturity models establish benchmark levels to evaluate an organization's process and practices. According to Katie Arrington, the DOD's CISO for acquisition, CMMC will ensure a more level and fair playing field for companies bidding on DoD contracts. As John Roman from Security Magazine explains, up until now, companies that process sensitive government data, whether directly or as a subcontractor, have only been required to self attest as to their knowledge of relevant regulatory requirements. In many aspects, self attestation has proven unsuccessful, as evidenced by notable breaches of critical government information in both the public and private sector. Developed by DoD in conjunction with Carnegie Mellon University and Johns Hopkins University, the CMMC requirement is based on a compilation of multiple frameworks and standards, including the NIST SP800171, the NIST Cybersecurity Framework, ISO 27001, and others, it replaces DFARS or the Defense Federal Acquisition Regulation Supplement the current Government Contracting rule. According to Matt Kelly from Nabex Global, the CMMC establishes five levels of cybersecurity maturity. The more controls you implement the higher your maturity level and the more contracts your business would be eligible to bid on. In 2021, the DoD started CMMC compliance with a select number of large prime contractors. More and more contractors will be subject to CMMC over the next five years until all defense contracts will require CMMC compliance in fiscal year 20. Nerd Reference In November 2020, Katie Arrington appeared on the Insa Coffee and Conversation YouTube channel to talk about CMMC. She refers to the current source selection process for DoD contracts with that system. If a potential bidder showed progress in meeting the contract requirements, the Source Selection Authority could potentially rate another contractor who met all of the requirements at the same level.
![cybersecurity maturity model certification (CMMC) (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F8797f03a-a50b-11ea-b6c0-87ebb093948d%2Fimage%2Fhacking-humans-cover-art-cw.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)