Draft CMMC v0.4 Has Been Released

CMMC Model Level Descriptions
 
 

Draft CMMC v0.4 Has Been Released

 

Published:
Sept. 6th, 2019

The Wait is Over.


The mid-point release of the CMMC standard is out in draft for a limited time.
We can finally see what the standard is shaping up to look like. The DoD has released the draft in an effort to gain industry feedback on the model. This is the first of three drafts that they plan to release. Draft CMMC v0.4 will be available until September 25, 2019 for feedback and review.

The Official Draft is available here.

CMMC Model Framework

What does the Model Framework look like?


CMMC model framework consists of 18 domains, based on cybersecurity “best practices”. You could compare CMMC’s “domains” to the “families” of NIST 800-171. Inside these domains you’ll find capabilities which are comparable to the controls you would find in the NIST framework. Finally, capabilities are comprised of practices and processes, which are mapped to CMMC Levels 1 through Level 5.


To break that down, basically you have a group of 18 domains (families). Inside the domains are a number of capabilities (controls), and inside each capability are different practices and processes which are primarily activities required by level to achieve said capability.

  – Practices are activities performed at each level of the domain
  – Processess detail maturity of institutionalization for the practices

CMMC Model Level Descriptions


CMMC September Draft Levels

CMMC Model Rev 0.4 Levels by the Numbers


Domains Capabilities Total Practices per Domain Practices per Level
Level 1 Level 2 Level 3 Level 4 Level 5
Access Control 5 30 5 9 11 5 0
Assett Management 4 19 2 5 7 5 0
Audit and Accountability 8 27 2 9 7 7 2
Awareness and Training 4 16 0 4 5 7 0
Configuration Management 5 21 2 8 4 6 1
Cybersecurity Governance 4 21 2 6 4 9 0
Identity and Authorization 2 17 2 1 9 2 3
Incident Response 9 41 3 15 7 9 7
Maintenance 2 9 1 5 2 1 0
Media Protection 8 13 1 6 5 0 1
Personnel Security 2 5 2 2 0 1 0
Physical Protection 5 17 4 10 3 0 0
Recovery 2 8 0 3 3 2 0
Risk Management 7 36 0 9 6 15 6
Security Assessment 6 15 1 6 2 5 1
Situational Awareness 4 17 2 2 3 7 3
System and Comms Protection 3 45 2 10 13 12 8
Systems and Info Integrity 5 13 4 5 0 2 2
  Total Practices Per Level 35 115 91 95 34

The Difference Between Levels


Levels 1 and 2 are intended to provide basic cybersecurity standards that will include practices such as anti-virus, ad hoc incident response, awareness and training, risk management, and security continuity.

Level 3 will be required of any contractor who actually handles and stores CUI. It will include all NIST SP 800-171 Rev 1 requirements, an Information Security Continuity Plan and ensure you are able to communicate threat information to key stakeholders.

Levels 4 and 5 are targeted toward a small subset of the DIB (Defense Industrial Base) sector that supports DOD critical programs and technologies.

Timeline/Schedule


– Public comment of draft CMMC Rev 0.4 in September 2019

– Public comment of draft CMMC Rev 0.6 in November 2019

– CMMC Rev 1.0 will be released in January 2020

– CMMC will be included in RFIs starting in June 2020

– CMMC will be included in RFPs starting in Fall 2020

Important Notes to Remember


The model is still being refined and a reduction in size is anticipated. This means that they are still working out the kinks. Keep in mind the goal of CMMC is to be cost-effective and affordable for small business to implement the lower levels.

Detailed assessment guidance is still under development as well. They are planning on releasing a series of “Desk Books” to give concrete expectation for each CMMC level. These desk books will address both contractors and auditors.

Contractors can expect the desk books to spell out specifically what is required to obtain certification at a specific level, plus implementation examples where appropriate. On the auditor side, these books will clearly state what should be evaluated and how. This will ensure audit results are trustworthy regardless of the source.