Contractors and subcontractors for the United States Department of Defense (DoD) should have a working knowledge of the Cybersecurity Maturity Model Certification (CMMC) framework. Itรขโฌโขs the set of guidelines set by the DoD in implementing cybersecurity protocols for contractors. These guidelines augment, and overlap with, the requirements of the Defense Federal Acquisition Regulation Supplement (DFARS) compliance.
What Is CMMC Level 3?
There are five CMMC maturity levels under the framework, but letรขโฌโขs focus on the third level. Under a CMMC Level 3 certification, organizations must follow protocols on protecting controlled unclassified information (CUI). Compared to prior levels, a Level 3 certification entails handling more confidential data sets.
To achieve Level 3 certification, companies must have Good Cyber Hygiene and actively manage cybersecurity processes. This means complying with Level 1รขโฌโBasic Cyber Hygiene (comprising 17 basic safeguarding requirements specified in FAR 48 CFR 52.204-21) and Level 2รขโฌโIntermediate Cyber Hygiene (an additional 55 cybersecurity practices) requirements.
How CMMC Level 3 Certification Requirements Overlap with DFARS Requirements
Some CMMC Level 3 requirements overlap with DFARS requirements, which is why organizations aiming for Level 3 must enforce security controls implemented by both NIST 800-171 (110 security controls) and CMMC (additional 20 controls). In fact, complying with NIST 800-171 makes it easier to meet the CMMC Level 3 requirements.
These certification requirements trickle down to subcontractors, meaning contractors must work with subcontractors who meet DFARS and CMMC requirements. And in case of a security incident, contractors must notify the DoD and allow access to their systems handling CUI, all of which should be done according to DFARSรขโฌโข prescribed reporting protocols.
What Are the CMMC Level 3 Requirements?
Refer to this checklist to understand the CMMC Level 3 controls:
รขลโ Wireless access protection
- This involves implementing authentication and encryption methods that safeguard access to wireless networks.
รขลโ Remote access protocols
- This entails cryptographic mechanisms to protect the confidentiality of usersรขโฌโข remote access sessions, whether theyรขโฌโขre accessing systems via a home workstation or any alternative workspace.
รขลโ Separation of employeesรขโฌโข duties and responsibilities
- Tasks must be properly divided among employees to avoid the risk of malicious activities. Employees may commit errors and/or fraud if critical duties are not clearly defined, and only one person is tasked to perform them from start to finish.
รขลโ Privileged and nonprivileged user access
- Prevent nonprivileged users from executing privileged functions. Only privileged users must be given permissions to privileged functions, especially those involving security functions, and the execution of security functions must be captured in audit logs.
- Only a small subset of privileged users should modify audit logs, audit settings, and perform other audit management tasks.
รขลโ Automatic termination of user sessions
- Usersรขโฌโข sessions must be terminated based on an organizationรขโฌโขs policy. This policy should indicate circumstances and particular triggers that will necessitate automatically ending a userรขโฌโขs session to avoid attackers from abusing unattended sessions.
รขลโ Control connection of mobile devices
- This requires organizations to establish guidelines on the proper use and configuration of mobile devices. All devices must be identified, authenticated, and running the proper software versions for their corresponding operating systems. They must also have antivirus software installed and hardware settings configured so that unauthorized features are disabled.
รขลโ Remote execution for privileged users
- Privileged users need to be able to execute privileged commands and be allowed remote access to security-relevant information, with important restrictions. These users and the changes they make must be identified and documented.
รขลโ CUI Encryption on mobile devices
- CUI on all mobile devices (laptops, smartphones, tablets, etcal.) and mobile platforms must be encrypted using container-based encryption mechanisms.
- This also includes enabling an encryption scheme that protect CUI transported in various media devices.
รขลโ Establish procedures for handling CUI data
- These must include guidance on how to categorize, implement access, receive, transmit, and destroy physical and digital CUI.
รขลโ Security awareness training on identifying insider threats
- Training sessions must cover how to identify staff behavior that indicates the risk for insider threats, and processes on reporting such behavior.
รขลโ Review and update logged events
- Regularly reviewing logged events will allow organizations to recognize potential security events. When logging non-security events, on the other hand, include installed software and attempts to connect to a virtual private network (VPN) server.
รขลโ Audit logging process failure alerts
- Security officers and system administrators must automatically be notified of audit log failures, so theyรขโฌโขll always be aware of any suspicious activity.
รขลโ Audit information collected/stored in centralized locations
- This is to provide the organization with complete information on audit logs.
รขลโ Audit information protection
- Organizations must protect audit information from unauthorized access, modification, and deletion by enabling proper configuration of logs or audit logging tools.
รขลโ Audit record review and analysis
- This involves the review, analysis, and reporting of audit records to identify and report security incidents so that they may be investigated on time.
รขลโ Audit record reduction
- This includes removing unnecessary information pertaining to audit files such as details on nightly backups, to avoid irrelevant information on audit record reports.
รขลโ Ongoing monitoring of security controls
- This process lets you assess your organizationรขโฌโขs overall security posture.
รขลโ Deployment of security assessment of enterprise software
- This is another step to identify and mitigate security risks and vulnerabilities.
รขลโ Physical and logical access restrictions
- Only qualified, authorized individuals must be able to make physical and logical changes to hardware, software, software libraries, and other relevant components.
รขลโ Restriction of nonessential programs
- Create a policy on disabling or removing nonessential programs, functions, ports, protocols, and services from servers.
รขลโ Blacklisting/Whitelisting policies to prevent the use of unauthorized software
- This can be done by creating an unauthorized software list.
รขลโ Multifactor authentication (MFA)
- MFA should be enabled for privileged accountsรขโฌโข local and network access and nonprivileged accountsรขโฌโข network access.
รขลโ Replay-resistant authentication mechanisms
- These mechanisms apply to privileged and nonprivileged accountsรขโฌโข network access, aimed at preventing man-in-the-middle attacks.
รขลโ Do not reuse identifiers for a certain period
- This is to avoid reusing identifiers within the organizationรขโฌโขs specified time period.
รขลโ Disable inactive identifiers
- Remove unnecessary user accounts.
รขลโ Testing incident response
- This should address and document everything that has to do with an incident.
รขลโ Media checks
- This involves checking media for malicious codes and controlling access to media containing CUI.
รขลโ Prohibiting the use of portable storage
- Particularly, portable storage devices (such as small hard drives) that have no identifiable owner.
รขลโ Physical protections
- This pertains to physical protective measures such as file drawers not just for the organizationรขโฌโขs premises but also to alternate work sites.
รขลโ Resilient and comprehensive data backups
- Systems and data essential to business continuity should be backed up regularly.
รขลโ Risk assessments and protection plans
- This applies to identifying risks to an organizationรขโฌโขs functions and assets including IT systems, people, data, and facilities. An organization must develop a mitigation plan for every identified risk.
รขลโ End-of-life technologies management and support
- Some end-of-life technologies may be used for an extended period to support a business, but others will need to be removed to reduce security risks.
รขลโ External cyberthreat information
- Leverage information sharing forums to enhance situational awareness, and these must be communicated to the organizationรขโฌโขs stakeholders.
รขลโ Effective information security systems
- Use a resource like the NIST SP 800-160 System Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems to develop a guideline for your organizationรขโฌโขs security engineering and design principles.
รขลโ Shared system resources restrictions
- Hard disks and other shared system resources must not transmit information from user to user to protect confidentiality of information.
รขลโ Network communications traffic restrictions
- Deny all incoming and outgoing traffic in the network, but permit specific ones per your organizationรขโฌโขs set policies.
รขลโ Controlled use of mobile codes
- Unauthorized mobile codes, whether theyรขโฌโขre Java, Flash, or other codes, should not be allowed to execute on the network.
รขลโ Controlled use of Voice over Internet Protocol (VoIP) technologies
- Set guidelines for using VoIP technologies to avoid threats such as eavesdropping on calls and caller ID spoofing.
รขลโ Protection for the authenticity of communication sessions
- Authenticating a session requires users to enter their login credentials to establish communication.
รขลโ Protection for CUI at rest
- Implement security controls for CUI stored in drives and does not move through the network.
รขลโ Domain Name System (DNS) filtering
- Implement a DNS filter to block access to malicious websites and IP addresses.
รขลโ CUI publication restrictions
- Prohibit staff from publishing CUI and CUI-related information to externally owned, publicly accessible websites such as forums and social media platforms like LinkedIn, Facebook, and Twitter.
รขลโ Spam protections
- Enable spam filters on inbound and outbound emails.
รขลโ Email forgery protections
- These augment your spam filters and other email protections. Some of these toolsรขโฌโขs functions include displaying servers allowed to send email for a given domain and authenticating email messages.
รขลโ Sandboxing
- Implementing an email sandbox entails developing an isolated environment where file attachments and linked URLs can be executed, and allows you to detect suspicious activity before such files enter your network.
Take the first step to achieving a CMMC Level 3 certification with the help of Charles ITรขโฌโขs CMMC compliance experts. Call us to start your gap assessment now รขโฌโ we promise youรขโฌโขll get a call in one hour.
{{cta(‘8ebd3a9e-4fe5-4554-84e7-011fb483e2ba’)}}