Edit

What is CMMC?

Get the basics of the Cybersecurity Maturity Model Certification & see how you can get started

Edit
CMMC–What-you-should-know

What You Should Know About CMMC

To standardize and enhance cybersecurity measures with their contractors, the United States DoD rolled out the Cybersecurity Maturity Model Certification in 2020, which includes five levels of security requirements to protect government information they share with contractors.

CMMC will apply to DoD contractors handling federal contract information and controlled unclassified information as part of a phased rollout. The General Services Administration (GSA) has specified CMMC in several multi-billion dollar solicitations, requesting organizations’ intent to become certified.

Jump point: #levels-cmmc

Levels of CMMC

Different contracts will have different levels of government information for the job, so there are different levels of CMMC depending on that information.

Level 1: Basic Cyber Hygiene
Level 2: Intermediate Cyber Hygiene
Level 3: Good Cyber Hygiene
Level 4: Proactive Cybersecurity
Level 5: Progressive Cybersecurity
Prescott-CMMC18
Jump point: #cmmc-protects
CMMC–CMMC-Protects

Different Types of Information CMMC Protects

CMMC was developed to protect sensitive information provided by the government to complete a work contract through a third party contractor. Types of information fall into two categories:

  • Federal Contract Information (FCI): Information provided by the government through a contract that is not intended for public release but necessary to complete the product or service.
  • Controlled Unclassified Information (CUI): Information, including laws, that needs safeguarding or is not intended for public release, but does not include classified information.

Higher levels of CMMC requirements implement systems to protect against advanced persistent threats (APT). An ATP is an attack where an entity hacks into a computer network without being detected for a long period of time, giving the hackers prolonged, unauthorized access to the computer network.

Edit

Prescott: Experts in CMMC

Our team is composed of compliance specialists and business process analysts that will embed themselves into each company’s culture and corporate structure while being overseen by a board of notable industry experts in the information technology, information security, and cybersecurity sectors.

LEARN ABOUT US

CMMC–Experts
Edit

Give your business the Green Light

Compliance can make or break your business. Get guidance, processes, and support providing peace of mind.

CONTACT US