If your company works anywhere within a Department of Defense supply chain (or hopes to), the new CMMC cybersecurity standard will soon be part of your life. And that brings along all the alphabet soup and uncertainty you’d expect from a government process. Here’s what you need to know.
It began in 2010, when the federal government defined Controlled Unclassified Information (CUI). This provided a unified standard for labeling and handling sensitive government information such as health documents, engineering plans or legal documents. Since 2018, the DoD has required its contractors to comply with NIST 800-171 as a control for properly handling CUI. (NIST 800-171 was published as a Defense Federal Acquisition Regulation Supplement, or DFARS.)
The government allowed organizations to self-certify their compliance with NIST 800-171, leaving some obvious gaps. The remedy is the Cybersecurity Maturity Model Certification (CMMC) program, which is scheduled to start appearing in DoD Requests for Proposal (RFPs) this fall. The Pentagon has stated that all DoD contracts will contain CMMC requirements by 2026.
The standard has five levels, all of which include standards for both digital and physical security. All DoD contractors will be required to achieve at least Level 1. This “basic cyber hygiene” level includes familiar steps such as installing and regularly updating antivirus software.
Any contractors with access to CUI will be required to achieve at least Level 3, which is a big step up from Level 2’s 17 controls to Level 3’s 100+ controls.
All DoD RFPs and Requests for Information (RFIs) will specify the required CMMC level. A company’s CMMC certification will last for three years.
Any site that handles sensitive information must be certified. A third-party consultant can help you determine whether various sites in your organization require accreditation.
In general, yes. At a press conference announcing CMMC, Ellen M. Lord, Under Secretary of Defense for Acquisition and Sustainment, specifically said that, from a hacker’s perspective, "Attacking a sub-tier supplier is far more appealing than a prime [supplier]." Lord did clarify, however, that the required level may be different for a prime contractor and its subs.
The exception is a vendor who sells you raw materials such as steel or wire. Because those vendors have no access to sensitive information such as engineering plans, they do not need certification.
Companies could perform self-certification under NIST 800-171, but CMMC won’t allow that. The CMMC Accreditation Body will be accrediting Certified Third-Party Assessment Organizations (known as C3PAOs). So far, CMMC-AB has published no details about the process for becoming a C3PAO or what guidelines C3PAOs will use when performing assessments.
You can bid on a new contract before receiving your certification, but you must be accredited by the time the contract is awarded. Based on Pratum’s experience with previous government standard rollouts, we expect the DoD may provide a “waterfall” approach that gives vendors a series of required milestones for some lower risk contracts. The DoD will be motivated to work with current vendors to help them achieve this standard and continue with existing relationships.
The most effective approach is to get help preparing for the accreditation process to ensure you pass. Depending on your current cybersecurity program maturity, plan on a minimum of six months to evaluate your current posture, prepare for the audit and complete the audit. Here’s a suggested roadmap:
1. Hire a third-party security firm to help evaluate your organization’s current posture compared to the level you need to achieve. Look for a firm with experience in complying with past government standards. Note that one vendor cannot serve as both your consultant in preparing for the audit and the auditing organization.
2. Use the assessment to address any shortcomings before your audit.
3. Retain a C3PAO to perform the audit.
4. Correct any weaknesses revealed during accreditation. You may be required to create a Plan of Action and Milestones (POAM) to track and report on remediation of problem areas in order to keep a contract.
You can read the DoD’s official CMMC page here.
For help in understanding the new standard and preparing for an audit, contact Pratum’s experienced team of compliance experts!
Hackers, like all humans, crave efficiency. And that makes your employees their favorite target. It’s easier, after all, to crack a person than a computer. Even though your cybersecurity fears may envision someone tapping out code in a darkened room, the bigger threat is an e-mail that fools an employee into granting access to the company’s system. That’s why social engineering attacks (such as bogus e-mails in phishing attacks) have become the most common method for penetrating an organization’s system.
To fully protect your data, you have to educate and motivate every employee to make security part of their daily responsibility rather than counting on IT to handle it on their own. Use the following list to check how you’re doing on the most common cybersecurity pitfalls.
A security culture takes shape only after someone with authority deems it important, forms a plan for achieving specific goals and then carries out the plan. Your first step should be a written plan that defines the security culture you envision and provides specific steps you’ll take to get there. For example, your culture will define what level of access to company data each employee receives. Include information security themes for each quarter, which will guide your communication and training.
If you’re thinking only in terms of access to office-based computers and servers, you’re several years behind. The rapid switch in 2020 to working from home should cement our understanding that the dispersed workforce is here to stay. Your data probably lives largely in the cloud with access coming from dozens of personal devices and home networks. Your plan and training need to cover all of that.
About 30% of U.S. companies say they have no security awareness and training programs for employees or other stakeholders. That leaves hackers a wide doorway into your systems. For your first information security training program, you can turn to dozens of low-cost solutions that provide excellent and relevant material. Or consider putting together a PowerPoint with relevant security topics that engage employees across all departments. Effective security training solutions include, at a minimum, the following list of topics:
Many companies capitalize on a new employee’s eagerness by providing security training on the first day. While this is an important step in the onboarding process, it shouldn’t be the last time the employee hears about these policies and procedures. A study by Vanson Bourne found that just 11% of organizations continuously train employees on information security. We recommend refresher sessions at least a couple of times per year, which ensures employees get reminders on best practices, hear about the latest threats and recognize that management takes the topic seriously.
Don’t generalize based on employees' job skills or age. Many leaders assume that young employees are savvier about information security since they’ve grown up using multiple digital platforms. But that familiarity—and a culture of sharing almost everything online—may actually make your younger team members bigger risks. Train everyone, and make it available in several formats (presentations, videos, quizzes, etc.) so that employees get the message regardless of their learning style.
And don’t skip the basics in your training materials. For example, “Password” is still one of the world’s most common passwords. And a Verizon study shows that approximately 76% of attacks on corporate networks involved weak passwords. So as obvious as the need for strong passwords may seem—it obviously isn’t.
When employees not only hear leaders talking about the importance of information security but actually see the leaders sitting beside them in training sessions, the message is clear. Use your top managers to reinforce the priority your organization puts on security.
Your long-term strategy should include benchmarks showing how you’re doing. Some common performance indicators include tracking how many employees fail routine phishing tests, who is reporting suspicious emails, how often employees change their passwords, and who is adhering to your organization’s Clean Desk Policy. With metrics in place, you can track progress and identify employees who aren’t embracing or understanding policies.
If all of that sounds a bit overwhelming, see how Pratum can help! Every week, our consultants help companies create their security strategy, develop plans for implementation, and maintain security awareness and training effectiveness.
By this point in 2020, most of us feel like runners who left the starting line expecting a 5K and realized we were actually running a marathon. Or an ultramarathon. Or Forrest Gump’s open-ended run across America. Who actually knows? Every week forces a new revision of our pace and overall strategy as the finish line keeps running away from us.
Much of the IT world is still living on stop-gap measures thrown into place in March when it became obvious that ideas about a dispersed workplace were materializing in the span of a week or two. Arizona State University research shows that about 13% of employees worked from home a few weeks before COVID. Now, about 66% of people who still have jobs are working from home.
The old analogy of building a plane while we’re flying it doesn’t even cover the full challenge. Thanks to hackers, we also have people trying to hijack the plane we’re building in mid-flight.
Pratum’s cybersecurity experts have been working daily during the pandemic to help clients adjust to 2020’s constantly revised realities. Here are some key lessons we’ve shared with clients so far:
It’s time to focus on long-term solutions. We can all give ourselves a pass for thinking that the dispersed workforce would be a two-to-three-month phenomenon. But now that we’re hitting five months with no end in sight, it’s time to work on sustainable setups. That requires an investment. It will probably take weeks of discussions among multiple stakeholders to address all the implications of a much larger percentage of employees in a work-from-home environment. Company leaders must be ready to devote those resources to the job.
The “data-centric” mindset is now. Many IT leaders had already started shifting cybersecurity architecture from a focus on devices to the data itself. But the pandemic’s current has pulled in even late adopters. Business now happens in the cloud on a wide array of devices, many of which companies don’t own. That’s forcing IT teams to reconsider how to protect critical files, wherever they travel.
The cloud has its own requirements. Practically overnight, organizations nationwide shifted systems and processes to the cloud or provided remote access before proper security reviews could be completed. Unfortunately, many failed to properly configure their systems, leaving open doors for hackers. This spring, for example, researchers found a real estate database on Google Cloud that required no password or authentication. It contained detailed information on more than 200 million American homeowners.
Personal devices are part of the plan. Most IT teams built security policies for a handful of remote employees, not an almost entirely remote workforce. So revisions are in order to account for a wave of personal device usage that goes far beyond BYOD (bring your own device) phones. Hackers aren’t waiting around for companies to plug the holes. Ransomware attacks have spiked this summer. And one attack earlier this year penetrated a company’s mobile device management platform, giving it access to nearly every connected device.
Social engineers thrive on disrupted processes. Hackers are also capitalizing on the muddled processes that come with dispersing a workforce for the first time. At the beginning of 2020, an office worker who got an unexpected e-mail about an invoice might have shouted over the wall to confirm the payment with a co-worker or manager. Now the communication requires a phone call or e-mail, which may or may not clarify things, and may not even happen. Hackers are counting on that.
Phishing season is wide open. By some estimates, phishing attacks are up 70% since the spring of 2020. Social engineers have long recognized that remote employees often make easier targets since they may feel less connected to the organization and could be less aware of security best practices. Hackers also keep honing their phishing strategy with messages tailored around research into specific organizations and individuals. In today’s phishing e-mails, the tip-off may be as subtle as a mismatched font or referring to someone who goes by “Steve” as “Stephen.”
Clearly 2020 is forcing all of us to rapidly adjust plans while the ground shifts under us. Pratum’s consultants can help. Contact us today!