Department of Defense Establishes New Cybersecurity Requirements for Defense Contractors and Subcontractors | Snell & Wilmer

Published:

Understanding the Cybersecurity Maturity Model Certification (CMMC) Final Rule: A New Era for Defense Contractors

The U.S. Department of Defense (DOD) has taken a significant step in enhancing cybersecurity across its supply chain by publishing a Final Rule to implement the Cybersecurity Maturity Model Certification (CMMC) program. This initiative establishes minimum cybersecurity requirements for nearly all DOD contracts, aiming to protect sensitive information within the defense industrial base from evolving cyber threats. Effective December 16, 2024, the CMMC program will require proactive measures from contractors and subcontractors seeking to partner with the DOD.

The Need for CMMC

In an era where cyber threats are increasingly sophisticated, the DOD recognizes the urgent need to safeguard sensitive information. The CMMC program is a response to the growing number of cyberattacks targeting defense contractors, which can compromise national security. By mandating cybersecurity standards, the DOD aims to create a more resilient defense industrial base capable of withstanding these threats.

Phased Implementation of the CMMC Program

The CMMC program will be rolled out in four phases over a three-year period. This phased approach allows for a gradual transition to the new requirements, giving contractors time to adapt. The related Defense Federal Acquisition Regulation Supplement (DFARS) Proposed Rule outlines how CMMC requirements will be integrated into contracts. Final comments on this proposed rule closed on October 15, 2024, with a Final Rule expected in mid-2025, marking the beginning of the phase-in process.

Once implemented, solicitations and defense contracts requiring contractors to process, store, or transmit federal contract information (FCI) or controlled unclassified information (CUI) will hinge on the contractor’s ability to meet these new cybersecurity standards.

Key Provisions of the CMMC Program

The CMMC program categorizes cybersecurity requirements into five levels, each with specific standards and assessment protocols. Here’s a breakdown of the key provisions:

Level 1: Self-Assessment

Contractors handling FCI must comply with 15 cybersecurity standards outlined in FAR 52.204-21. They are required to submit an affirmation of compliance to be eligible for contract awards. Additionally, an annual self-assessment is mandatory. Subcontractors processing FCI must also meet Level 1 requirements.

Level 2: Self-Assessment and C3PAO Assessment

Level 2 is divided into two categories. A small subset of contracts may allow self-assessments, while the majority will require a third-party assessment by a Certified Third-Party Assessment Organization (C3PAO). Contractors must comply with all 110 security requirements from NIST SP 800-171 R2. Self-assessments for Level 2 must occur every three years, with flow-down requirements for subcontractors mirroring those of Level 1 and Level 2.

Level 3: DIBCAC Assessment

For contractors working with CUI in critical programs, Level 3 requires compliance with an additional 24 requirements from NIST SP 800-172. Assessments will be conducted by the Defense Contract Management Agency (DCMA) Defense Industrial Base Cybersecurity Assessment Center (DIBCAC). Contractors must achieve Level 2 (C3PAO) status to qualify for Level 3.

Conditional Compliance and Financial Implications

Contractors will not be required to meet all CMMC requirements immediately to be eligible for contract awards. If a contractor is at least 80% compliant with Level 2 or Level 3 requirements at the time of contract award, they may be granted conditional status, with 180 days to achieve full compliance.

However, compliance with the CMMC program is expected to be costly. The DOD estimates that assessment costs could range from a few thousand dollars to over $100,000, depending on the CMMC level and the size of the contractor. This financial burden necessitates that all defense contractors, regardless of size, conduct a proactive review of their cybersecurity policies.

Preparing for Compliance

Given the complexities and potential costs associated with CMMC compliance, contractors should take immediate action. A thorough assessment of current cybersecurity practices against NIST security requirements is essential. Additionally, contractors must evaluate their supply chains to ensure that subcontractors can meet the necessary compliance standards.

Reviewing solicitation requirements in advance of bidding is crucial. Understanding which CMMC level applies to a specific contract can significantly impact profitability. Contractors that can demonstrate compliance readiness will likely have a competitive advantage in future solicitations.

Conclusion

As the DOD implements the CMMC program, contractors must prioritize compliance and cybersecurity readiness. The phased approach allows for gradual adaptation, but the onus is on contractors to ensure their systems and processes are aligned with the new requirements. Seeking regulatory counsel and conducting regular compliance assessments will be vital in navigating this new landscape. By taking proactive measures, contractors can not only protect sensitive information but also position themselves favorably in the competitive defense contracting arena.

Related articles

Recent articles