{"id":1796,"date":"2020-07-20T17:13:29","date_gmt":"2020-07-20T17:13:29","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=1796"},"modified":"2021-04-12T05:29:09","modified_gmt":"2021-04-12T05:29:09","slug":"cybersecurity-maturity-model-certification-cmmc","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/","title":{"rendered":"What is the Cybersecurity Maturity Model Certification (CMMC)?"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>In January 2020, the U.S. Department of Defense (DoD) released the latest version of its <a href=\"https:\/\/www.acq.osd.mil\/cmmc\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity Maturity Model Certification<\/a> (CMMC).<\/p>\n<h2 class=\"navy\">CMMC in a Nutshell<\/h2>\n<p>The CMMC is a certification procedure developed by the Department of Defense (DoD) to certify that DoD contractors have the controls to protect sensitive data including Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).\u00a0 The CMMC Model is based on the best-practices of different cybersecurity standards including NIST SP 800-171, NIST SP 800-53, ISO 27001, ISO 27032, Aerospace Industries Association (AIA) National Aerospace Standard (NAS) 9933 and others into one cohesive standard for cybersecurity.<\/p>\n<h2 class=\"navy\">Why is CMMC Required?<\/h2>\n<p>In prior years, contracting authorities and prime contractors would request a <a href=\"https:\/\/nam01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Finfo.summit7systems.com%2Fblog%2Fwhat-is-an-ssp-and-poam-whats-the-difference&amp;data=02%7C01%7C%7C63f24173cc4e4b66012108d6f0be071a%7C0f93332f2ca942659897dbcf8034effa%7C0%7C0%7C636961096291960456&amp;sdata=84EQbbUXoUtQVwC%2Bdwc2InvH97uyGU5DXRWhKwSksGY%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\">System Security Plan (SSP) and Plan of Action and Milestones (POA&amp;M)<\/a>\u00a0in response to <a href=\"https:\/\/www.acq.osd.mil\/dpap\/dars\/dfars\/html\/current\/252204.htm\" target=\"_blank\" rel=\"noopener noreferrer\">DFARS 252.204-7012<\/a>. This request from contracting authorities was often post-award, and <a href=\"https:\/\/www.jdsupra.com\/legalnews\/california-district-court-issues-first-74068\/\" target=\"_blank\" rel=\"noopener noreferrer\">several companies<\/a> received severe penalties through the False Claims Act (FCA) settlements for misrepresenting their cybersecurity efforts.<\/p>\n<p>In addition, in 2018 MITRE had released the report entitled <a href=\"https:\/\/info.summit7systems.com\/blog\/dod-reviews-roadmap-for-dfars-enforcement\">&#8220;<\/a><a href=\"https:\/\/www.mitre.org\/publications\/technical-papers\/deliver-uncompromised-a-strategy-for-supply-chain-security\" target=\"_blank\" rel=\"noopener noreferrer\">Deliver Uncompromised: A Strategy for Supply Chain Security and Resilience in Response to the Changing Character of War&#8221;<\/a> which assesses the state of cybersecurity of the Defense Industrial Base (DIB). According to the report, most government contractors were not meeting the requirements of DFARS 252.204-7012, and many more did not have the understanding or means to meet the regulations. Since the DIB sector consists of over 300.000 companies that support the defense industry and contribute towards the research, engineering, development, acquisition, production, sustainment, and operations of DoD systems, networks, capabilities and services, the loss of intellectual property may pose an increased risk to national security.<\/p>\n<p>Further, according to a <a href=\"https:\/\/issuu.com\/professionalservicescouncil\/docs\/for_distro_-_katie_arrington_s_clea\" target=\"_blank\" rel=\"noopener noreferrer\">presentation<\/a> by Katie Arlington, Special Assistant to the Assistant Secretary of Defense for Acquisition for Cyber, the vast majority of contractors have not implemented the requirements of the NIST SP 800-171 within their information systems. It was therefore apparent that a fourth element should be included in the acquisition process: security. CMMC addresses the DoD&#8217;s intent to make security the foundation of the preexisting acquisition criteria (cost, performance, and schedule).<\/p>\n<h2 class=\"navy\">The CMMC in Greater Detail<\/h2>\n<p>The CMMC model measures cybersecurity maturity with five levels and aligns a set of processes and practices with the type and sensitivity of the information to be protected and the associated range of threats. The model consists of maturity processes and cybersecurity best practices from multiple cybersecurity standards and frameworks. The model framework organizes these processes and practices into a set of domains and maps them across five levels of maturity. To provide additional structure, the framework also aligns the practices to a set of capabilities within each domain.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-1799 lazyload\" data-src=\"http:\/\/72.52.228.46\/~itegriti\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure1.jpg\" alt=\"\" width=\"800\" height=\"284\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure1-200x71.jpg 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure1-400x142.jpg 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure1-600x213.jpg 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure1-768x273.jpg 768w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure1.jpg 800w\" data-sizes=\"(max-width: 800px) 100vw, 800px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/284;\" \/><\/p>\n<p><em>Figure 1: CMMC Model Hierarchical View. Source: CMMC Model, version 1.0<\/em><\/p>\n<h2 class=\"navy\">Processes and Practices<\/h2>\n<p>Process maturity or process institutionalization characterizes the extent to which an activity is embedded in the operations of an organization. The more deeply ingrained an activity, the more likely it is that the organization will continue to perform the activity \u2013including under times of stress \u2013and that the outcomes will be consistent, repeatable and of high quality.<\/p>\n<p>On the other hand, practices are activities performed at each level for the domain. The model consists of 171 practices mapped across the five levels for all capabilities and domains.<\/p>\n<h2>Levels and Domains<\/h2>\n<p>The CMMC model measures cybersecurity maturity at five levels. Each of these levels consists of a set of processes and practices, as depicted in Figure 2 below. The CMMC levels and the associated sets of processes and practices across domains are cumulative. This means that for an organization to achieve a specific CMMC level it must also demonstrate achievement of the preceding levels.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-1800 lazyload\" data-src=\"http:\/\/72.52.228.46\/~itegriti\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure2.jpg\" alt=\"\" width=\"800\" height=\"332\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure2-200x83.jpg 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure2-400x166.jpg 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure2-600x249.jpg 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure2-768x319.jpg 768w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure2.jpg 800w\" data-sizes=\"(max-width: 800px) 100vw, 800px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/332;\" \/><\/p>\n<p><em>Figure 2: CMMC Levels. Source: CMMC Model, version 1.0<\/em><\/p>\n<p>Further, the contractor must demonstrate both the institutionalization of processes and the implementation of practices for the specified CMMC level in order to be certified for that level. Otherwise, the organization will be certified at the lower of the two levels where both requirements are met.<\/p>\n<p>The CMMC model provides a means of improving the alignment of maturity processes and cybersecurity practices with the type and sensitivity of the information to be protected and the associated threats. As a result, CMMC levels focus on:<\/p>\n<ul>\n<li>Level 1: Safeguarding Federal Contact Information (FCI)<\/li>\n<li>Level 2: Transition step to protect Controlled Unclassified Information (CUI)<\/li>\n<li>Level 3: Protect CUI<\/li>\n<li>Levels 4 &amp; 5: Protect CUI and reduce risk of Advanced Persistent Threats (APTs)<\/li>\n<\/ul>\n<p>Finally, the CMMC model consists of 17 domains, which originate from FIPS-200 and NIST SP 800-171.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-1801 lazyload\" data-src=\"http:\/\/72.52.228.46\/~itegriti\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure3.jpg\" alt=\"\" width=\"800\" height=\"589\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure3-200x147.jpg 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure3-400x295.jpg 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure3-600x442.jpg 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure3-768x565.jpg 768w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_figure3.jpg 800w\" data-sizes=\"(max-width: 800px) 100vw, 800px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/589;\" \/><\/p>\n<p><em>Figure 3: CMMC Model Domains. Source: CMMC Model, Version 1.0<\/em><\/p>\n<h2 class=\"navy\">How to Become CMMC Certified<\/h2>\n<p>In effect, the CMMC framework aims to verify the implementation of processes and practices associated with the achievement of a maturity level. CMMC is designed to provide increased assurance to the DoD that a DIB contractor can adequately protect CUI at a level appropriate to the residual risk, accounting for any information flow down to its subcontractors in a multi-tier supply chain.<\/p>\n<p>As opposed to NIST SP 800-171 certification, there is no self-certification process for CMMC. The DIB contractor will coordinate directly with an CMMC-accredited and independent third-party assessment organization to request and schedule a CMMC assessment. The contractor will have to specify the level of the certification requested based on the company\u2019s specific business requirements. The certification at the appropriate CMMC level will demonstrate the maturity in capabilities and organizational processes to the satisfaction of the assessor.<br \/>\nWhen implementing CMMC certification, a DIB contractor can achieve a specific CMMC level for its entire enterprise network or for particular segments, depending on where the information to be protected is handled and stored.<\/p>\n<h2 class=\"navy\">How will CMMC Impact Businesses<\/h2>\n<p>In addition to the obvious efforts that DIB contractors have to undertake to achieve CMMC certification, being certified brings various advantages. First, the company will be included in the DoD certified contractors\u2019 list, having more possibilities to get valuable contracts. Being among the first to achieve this certification will place your business ahead of the competition and will have a strategic advantage against your competitors.<\/p>\n<p>In addition, a positive to the new certification will be the elimination of ambiguity. The industry has struggled to grasp compliance and understand how the DoD would enforce compliance. For example, Aerojet Rocketdyne was recently <a href=\"https:\/\/www.csoonline.com\/article\/3518728\/recent-false-claims-act-cases-a-caution-to-govt-contractors-that-skimp-on-security.html\" target=\"_blank\" rel=\"noopener noreferrer\">issued a Civil False Claims Act<\/a> (FCA) action for misleading the US Government of their compliance with DFARS 252.204-7012 and NIST 800-171. A previous employee and cybersecurity watchdog submitted the claim against them, and the company was not able to adequately defend themselves based on their own self-assessment.\u00a0Now companies will be able to rely on CMMC assessment performed by accredited third-party organizations and minimize the risk of potential FCA actions.<\/p>\n<h2 class=\"navy\">How to Prepare for CMMC<\/h2>\n<p>Businesses can begin their preparation for CMMC certification assessment early. They may follow these simple steps:<\/p>\n<ul>\n<li>Have a System Security Plan (SSP) and a Plan of Action and Milestones (POA&amp;M) in place. These plans are a must for NIST SP 800-171 compliance and are the baseline for CMMC.<\/li>\n<li>Configure your existing environment or opt for a cloud-based environment to meet NIST 800-171 compliance.<\/li>\n<li>Include security requirements in the overall corporate budget.<\/li>\n<li>Attend the CMMC industry days scheduled for Q3 of 2020.<\/li>\n<\/ul>\n<p>ITEGRITI will keep you updated you of any developments on the CMMC timeline. Furthermore, our experienced personnel can advise you on how to be prepared for a CMMC assessment. Follow us on <a href=\"https:\/\/twitter.com\/itegriti\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/itegriti\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> for further updates.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Verizon DBIR 2020: The Energy Sector is Phished in the Cloud for Cyber Espionage<br \/>\nIt\u2019s DBIR time! Time to read the key findings of this year\u2019s 13th edition of the annual Verizon Data Breach Investigations Report and learn from our mistakes.<\/p>\n","protected":false},"author":10,"featured_media":1803,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179],"tags":[1941],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is the Cybersecurity Maturity Model Certification (CMMC)? - kw022024<\/title>\n<meta name=\"description\" content=\"The certification procedure developed by the Department of Defense to certify that DoD contractors have the controls to protect sensitive data including Federal Contract Information and Controlled Unclassified Information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is the Cybersecurity Maturity Model Certification (CMMC)?\" \/>\n<meta property=\"og:description\" content=\"The certification procedure developed by the Department of Defense to certify that DoD contractors have the controls to protect sensitive data including Federal Contract Information and Controlled Unclassified Information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-20T17:13:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T05:29:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"What is the Cybersecurity Maturity Model Certification (CMMC)?\",\"datePublished\":\"2020-07-20T17:13:29+00:00\",\"dateModified\":\"2021-04-12T05:29:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/\"},\"wordCount\":1513,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_featured.jpg\",\"keywords\":[\"12 Minute Read\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/\",\"name\":\"What is the Cybersecurity Maturity Model Certification (CMMC)? - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_featured.jpg\",\"datePublished\":\"2020-07-20T17:13:29+00:00\",\"dateModified\":\"2021-04-12T05:29:09+00:00\",\"description\":\"The certification procedure developed by the Department of Defense to certify that DoD contractors have the controls to protect sensitive data including Federal Contract Information and Controlled Unclassified Information.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_featured.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_featured.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is the Cybersecurity Maturity Model Certification (CMMC)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is the Cybersecurity Maturity Model Certification (CMMC)? - kw022024","description":"The certification procedure developed by the Department of Defense to certify that DoD contractors have the controls to protect sensitive data including Federal Contract Information and Controlled Unclassified Information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/","og_locale":"en_US","og_type":"article","og_title":"What is the Cybersecurity Maturity Model Certification (CMMC)?","og_description":"The certification procedure developed by the Department of Defense to certify that DoD contractors have the controls to protect sensitive data including Federal Contract Information and Controlled Unclassified Information.","og_url":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2020-07-20T17:13:29+00:00","article_modified_time":"2021-04-12T05:29:09+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_featured.jpg","type":"image\/jpeg"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"What is the Cybersecurity Maturity Model Certification (CMMC)?","datePublished":"2020-07-20T17:13:29+00:00","dateModified":"2021-04-12T05:29:09+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/"},"wordCount":1513,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_featured.jpg","keywords":["12 Minute Read"],"articleSection":["Compliance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/","url":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/","name":"What is the Cybersecurity Maturity Model Certification (CMMC)? - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_featured.jpg","datePublished":"2020-07-20T17:13:29+00:00","dateModified":"2021-04-12T05:29:09+00:00","description":"The certification procedure developed by the Department of Defense to certify that DoD contractors have the controls to protect sensitive data including Federal Contract Information and Controlled Unclassified Information.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_featured.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/07\/Itegriti_Blog18_featured.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2020\/compliance\/cybersecurity-maturity-model-certification-cmmc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"What is the Cybersecurity Maturity Model Certification (CMMC)?"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1796"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=1796"}],"version-history":[{"count":8,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1796\/revisions"}],"predecessor-version":[{"id":1984,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1796\/revisions\/1984"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/1803"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=1796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=1796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=1796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}