CMMC compliance process: What to expect and five steps to take
Version 2.0 of the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) stipulates that Defense Industrial Base (DIB) contractors can no longer self-report cybersecurity assessments. Instead, they are required to earn certification from a CMMC Third-Party Assessor Organization (C3PAO). To help DIB contractors meet CMMC Level 2 requirements, the CohnReznick cybersecurity team committed to becoming a C3PAO assessor when the inaugural version of CMMC was published in January 2020.
Becoming a C3PAO required that we undergo an assessment from the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC), a unit of the Defense Contract Management Agency (DCMA), which manages all DoD contracts. We’re sharing our accreditation journey to offer DoD contractors insight into what to expect and five actionable steps to start now on your CMMC compliance journey.
When planning for an assessment by the DIBCAC (if you are applying for C3PAO) or by a C3PAO assessor, don’t underestimate the timeframe – particularly the preparation phase. The CohnReznick CMMC team first discussed the C3PAO accreditation with our executives and board early in the process to help eliminate any surprises to the timeframe. DoD prime contractors that have Level 2 controls in place may have a shorter lead time while organizations that are in the middle to end of the Defense Supply Chain (DSC) may not. It all depends on the company’s exposure to DoD contracts and their level of operational maturity.
Our experience of the assessment process was well organized and straightforward. DIBCAC assessors kicked off the certification process by scheduling several meetings with CohnReznick CMMC stakeholders to explain the procedure, gain an understanding of our technical environment, and finalize the assessment timeline. The assessment was scheduled to be completed within five business days with the assessors requesting a tranche of documents that included:
- System Security Plan (SSP), with documented policies and procedures covering the 110 Level 2 controls of CMMC.
- Network diagram
- Controlled Unclassified Information (CUI) flow diagram
- System boundary diagram
- Asset list
There is also a requirement to create an expanded asset list which can be unexpectedly demanding; in part because the list comprises five comprehensive categories:
- Controlled unclassified information (CUI) assets
- Security protection assets
- Contractor risk managed assets
- Specialized assets
- Out-of-scope assets
Be aware that you can – and should – make changes to your environment. During the assessment, the assessors may allow businesses to modify their environment and update documentation to meet requirements if the change can be completed and reviewed by the assessors during the agreed upon assessment period. When doing so, be sure to follow your documented procedures to the letter. Making modifications without following your organization’s procedures may result in the assessors penalizing you resulting in a “not met” status.
While it’s important to know what to expect, it’s also important to know what steps contractors can take now to better prepare for the accreditation process.
Here are five actionable steps to get you started:
- Perform a readiness assessment: Get ready for the CMMC audit by performing a readiness assessment against the CMMC controls. The preparatory assessment will help make sure that any overlooked gaps are identified and remediated before the audit is under way.
- Observe the objectives: The assessors will test your company’s control objectives against each of the CMMC controls to determine if they are “met”. To prepare, review the objectives control by control, ensure that you have two pieces of evidence for each objective, and be sure that experts who can address each objective participate in the assessment sessions.
- Coach your service providers: Assessors will dig into third-party managed services. It’s essential that provider representatives are present during the assessment to answer any questions. It’s important to rehearse potential responses and issues with major managed services and Security Operations Center (SOC) providers before the assessment sessions. Also consider rehearsing with stakeholders from IT and human resources.
- Test incident response: Make sure to have a tested incident-response plan that specifies the tools and procedures to identify, eliminate, and recover from cybersecurity incidents. Ensure to include respective CMMC stakeholders and program owners in the testing. If applicable, managed service providers should be present during testing. The test plan, narrative, and lessons-learned need to be documented and presented to the assessors.
- Update documentation: Be sure your documented System Security Plan is accurate, up-to-date, and that it’s documented to strictly adhere to your security processes.
Bhavesh Vadhani, Principal, Global leader, Cybersecurity, Technology Risk, and Privacy
Daryouche Behboudi, Managing Director, Cybersecurity, Technology Risk and Privacy
Access Our Government Contracting Topic Page for Key Insights & Powerful Tools
InsightGovCons: Proactively assess your compliance programMaurice L. Crescenzi Jr., Rich MeeneGovCons face extensive requirements for protecting against fraud and misconduct. Get a list of key rules and regulations, plus top steps to meeting them.
InsightPre-award compensation considerations: The best things in life aren’t freeCaitlin Lewis, Hareem MalikThere are many components to pre-award compensation for government contractors; and the RFP requirements are the best place to start to determine compensation costs and requirements. Learn more.
Press ReleaseSun joins CohnReznick as Principal, CybersecurityDavid Sun leads CohnReznick’s security incident response and recovery; computer forensic and litigation support; and cloud security services.
On-demandMastering the GovCon dealBetter understand key considerations for M&A transactions and integrations in the GovCon space. Our panel of experts will cover the risk, opportunity, and deal value across the lifecycle of the typical deal. Register now.
InsightUnderstanding Zero TrustBhavesh Vadhani, Adonye ChamberlainRead about the evolution of this cybersecurity paradigm, why it is increasingly necessary, and how to get started on its implementation.