CMMC FAQs

CMMC FAQs2022-12-29T13:06:48-05:00
How up-to-date is Peak InfoSec regarding CMMC?2024-04-23T11:41:08-04:00

Our founder, Matt Titcombe, was a volunteer on the Cyber-AB Standards Industry Working Group.  He has directly participated in:

  • Creation of the assessment methodology
  • Creation and drafting of the CMMC Assessment Criteria
  • Creation and drafting of the CMMC Getting Started guide

Mr. Titcombe is also a Subject matter Expert developing certified training curriculum for the Cyber-AB approved Licensed Partner Publishers.  Specifically, he has worked on the CMMC Certified Practitioner (CCP) and Assessor (CCA) curriculums.

What CMMC Level Conformity Assessments is Peak InfoSec authorized to conduct?2024-04-23T11:11:33-04:00

As of right now, none.

Peak InfoSec is an Authorized C3PAO. However, until the 32 CFR Part 170 CMMC Program rule is formally published, CMMC technically does not exist.

Once it is published, Peak InfoSec will be re-authorized by the CyberAB and allowed to conduct CMMC Conformity Assessments.

Can Peak InfoSec conduct CMMC Conformity Assessments?2024-04-23T11:25:34-04:00

Not Yet.

Peak InfoSec was authorized by the Cyber Accreditation Body (Cyber-AB) to be a CMMC 3rd Party Assessor Organization in May 2022.  Our CMMC Accreditation Body Marketplace listing is at https://cyberab.org/Catalog#!/c/s/Results/Format/list/Page/1/Size/9/Sort/NameAscending?term=Peak%20InfoSec.

We are waiting for the Draft 32 CFR Part 170 rule to go into effect before we can conduct formal CMMC Conformity Assessments.

 

What level is Peak InfoSec certified at under CMMC?2024-04-23T11:26:02-04:00

Peak InfoSec completed a Defense Industrial Base Cybersecurity Assurance Center (DIBCAC) CMMC assessment in April 2022 and we were certified as being fully compliant at Level 2.

Can Peak InfoSec help us prepare for CMMC?2020-02-10T09:07:21-05:00

Yes.  Peak InfoSec can help you organization by providing:

  • Assessment of your current status
  • Identification of required remediations
  • Helping to implement remediations
  • Tailoring our CMMC Policy Package to meet your business
  • Building your evidence book
  • Being there during the Audit
Does Peak InfoSec have CMMC compliant Policy, Plans, Procedures, and Standards we can use?2022-12-30T12:25:11-05:00

Yes, and all will require varying degrees of tailoring to fir your business.

Our Policy & Plans package requires the least amount of tailoring while procedures will require a lot more.

Is Peak InfoSec DFARs & NIST SP 800-171 Compliant?2024-04-23T11:35:52-04:00

Yes.  Peak InfoSec is an authorized C3PAO.  To be authorized, Peak InfoSec underwent a Defense Industrial Base Cybersecurity Assurance Center (DIBCAC) audit of our NIST SP 800-171 implementation and conformity to DFARS Clause 252.204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting.

Is Peak InfoSec CMMC Certified?2024-04-23T11:13:18-04:00

Yes.  Peak InfoSec is an authorized C3PAO.  To be authorized, Peak InfoSec underwent a Defense Industrial Base Cybersecurity Assurance Center (DIBCAC) audit of our NIST SP 800-171 implementation.  DIBCAC certified us against CMMC 2.0.

What is the difference between an Audit and an Assessment?2024-04-23T11:19:26-04:00

When it comes to CMMC, the formal audit is called a “Conformity Assessment,” and we refer to the gap assessment phase where we provide recommended remediations as “Consulting.”

What is an “Evidence Book”?2020-02-10T09:07:45-05:00

An “Evidence Book” is created during the pre-Audit efforts and is provided to the Auditor at the start of an audit.  The Auditor uses this to document to conduct their initial compliance review of your controls.  Depending on the Auditor and audit requirements, the Auditor may spot check a percentage of controls or validate all are compliant.  The “Evidence Book” streamlines the audit process for everyone.

Does our IT or Managed Service Provider (MSP) have to be compliant?2024-04-23T11:37:24-04:00

Yes.

CMMC auditors will focus extra attention on your Supply Chain and your IT/MSP provider will be the first ones a good auditor will ask about.

Make sure your organization passes both the FAR 52 & DFARS Clause onto them.  Don’t try to read in partial compliance…you don’t have the authority per the DFARS clause.

External Service Providers (ESP) are heavily cited as being in scope in the DRAFT 32 CFR Part 170 – Cybersecurity Maturity Model Certification (CMMC) Program rule.

What do we need to know in order to report an incident to DC3?2020-02-10T09:03:33-05:00

In our experience working through real world Incidents with DC3, you only need to provide them the information about the confirmed or potential Indicators of Compromise.

Information about the hackers Tools, Techniques, and Procedures (TTP); business impacts; data exfiltration; and remediation efforts can be provided in your final report.

DC3 does like to get your list on DoD contracts as soon as possible.

For more information about our Incident Response Services, please go to our CMMC Incident Response page.

Does an incident have to be confirmed before we report it?2020-02-10T09:03:44-05:00

No.

The key word in the definition is “potential.”  We also call it an “Indicator of Compromise” or IoC.

The “potential” part is wherever Confidentiality, Integrity, or Availability of the system may indicate a compromise.

The firewall or your End Point Protection software blocking malware or stopping a user from going to malicious site is not an IoC and does not need to be reported.

Remember, you need to report an Incident with 72 hours to DC3.

For more information about our Incident Response Services, please go to our CMMC Incident Response page.

 

We are DFARS & NIST SP 800-171 Compliant. Which level should we target?2024-04-23T11:40:28-04:00

We recommend clients target CMMC Level 2 because it encompasses all of the 110 controls in NIST SP 800-171.

Only DoD can direct an organization to be CMMC Level 3 Certified.  It is recommended that organizations that already handle Classified artifacts, work with Space, Command and Control, or are large integrators be ready to be CMMC Level 3 certified.

What is Federal Contract Information (FCI)?2024-04-23T11:34:17-04:00

Officially:

Federal Contract Information means information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government, but not including information provided by the Government to the public (such as on public Web sites) or simple transactional information, such as necessary to process payments. Source: 48 CFR § 52.204-21

Unofficially, FCI is the lowest level of information a DoD Contractor has to protect and is only associated with CMMC Level 1.  FCI occurs where information is created by either the Federal Agency or a contractor when it is information about the contract that the Federal government does not want publicly released.

FCI is not:

  • Publicly available content
  • Classified information

Some common examples of FCI include:

  • Emails between you and your DoD Contracting Officer or Prime about the contract.
  • Information you may be loading into your ERP about the contract.
"What is Federal Contract Information (FCI)?" diagram.
What is Controlled Unclassified Information (CUI)?2020-02-10T09:06:54-05:00

For the long answer, go to “Does our organization handle Controlled Unclassified Information (CUI)? (Long Winded Answer)

Our interpreted definition is:

Any Technical Information collected, developed, received, transmitted, used, or stored,” such as “research and engineering data, engineering drawings, and associated lists, specifications, standards, process sheets, manuals, technical reports, technical orders, catalog-item identifications, data sets, studies and analyses and related information, and computer software executable code and source code,” used or created “in support of the performance of” a DoD “contract.”

We like turn it around and ask it as question:

Since 2015, has your organization ever “Collected, developed, received, transmitted, used, or stored” any “technical information” such as “research and engineering data, engineering drawings, and associated lists, specifications, standards, process sheets, manuals, technical reports, technical orders, catalog-item identifications, data sets, studies and analyses and related information, and computer software executable code and source code” “in support of the performance of” a DoD “contract” ?

Does our organization handle Controlled Unclassified Information (CUI)? (Long Winded Answer)2020-02-10T09:04:07-05:00

This sure sounds like an easy question, and, given the Federal government’s involvement, it isn’t.

HINT:  If you want to skip the long-winded answer, go to What is Controlled Unclassified Information (CUI)?.

Step 1: Define Covered Defense Information (CDI)

The answer begins with the DFAR’s Clause 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting.  Paragraph (a) has two key definitions we need to bring highlight:

“Controlled Technical Information (CTI)” means technical information with military or space application that is subject to controls on the access, use, reproduction, modification, performance, display, release, disclosure, or dissemination. Controlled technical information would meet the criteria, if disseminated, for distribution statements B through F using the criteria set forth in DoD Instruction 5230.24, Distribution Statements on Technical Documents. The term does not include information that is lawfully publicly available without restrictions.
“Covered Defense Information (CDI)” means unclassified controlled technical information or other information, as described in the Controlled Unclassified Information (CUI) Registry at http://www.archives.gov/cui/registry/category-list.html, that requires safeguarding or dissemination controls pursuant to and consistent with law, regulations, and Governmentwide policies, and is—

(1) Marked or otherwise identified in the contract, task order, or delivery order and provided to the contractor by or on behalf of DoD in support of the performance of the contract; or
(2) Collected, developed, received, transmitted, used, or stored by or on behalf of the contractor in support of the performance of the contract.

So, does the DFARs clause ever define CUI, no.  Nor does it clearly define the relationship between CDI & CTI.

Step 2: Define CUI

To get the official definition of CUI, we need to go to https://www.archives.gov/cui/about, which states:

Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended.

That really didn’t help.

Step 3: Understand NARA’s CUI categories

The second definition points us to the National Archives & Records Administration (NARA) at http://www.archives.gov/cui/registry/category-list.html to figure out this mess.  If you go to the, you will see a list of categories and sub-categories like:

  • Critical Infrastructure
  • Defense
    • Controlled Technical Information
    • DoD Critical Infrastructure Security Information
    • Naval Nuclear Propulsion Information
    • Unclassified Controlled Nuclear Information – Defense
  • Export Control
  • Immigration
  • Intelligence
  • International Agreements
  • Law Enforcement
  • Legal
  • Natural and Cultural Resources
  • North Atlantic Treaty Organization (NATO)
  • Nuclear
  • Patent
  • Privacy
  • Proprietary Business Information
  • Provisional
  • Statistical
  • Tax
  • Transportation

What matter to us is the definition for CTI:

“Controlled Technical Information means technical information with military or space application that is subject to controls on the access, use, reproduction, modification, performance, display, release, disclosure, or dissemination. Controlled technical information is to be marked with one of the distribution statements B through F, in accordance with Department of Defense Instruction 5230.24, “Distribution Statements of Technical Documents.” The term does not include information that is lawfully publicly available without restrictions. “Technical Information” means technical data or computer software, as those terms are defined in Defense Federal Acquisition Regulation Supplement clause 252.227-7013, “Rights in Technical Data – Noncommercial Items” (48 CFR 252.227-7013). Examples of technical information include research and engineering data, engineering drawings, and associated lists, specifications, standards, process sheets, manuals, technical reports, technical orders, catalog-item identifications, data sets, studies and analyses and related information, and computer software executable code and source code.”

The italicized part is what really matters.

Step 4: Bring it all together

In short hand, CDI is the CUI Category of Defense CTI.

We find it best to bring all of this together in the form of a question:

Since 2015, has your organization ever “Collected, developed, received, transmitted, used, or stored” any “technical information” such as “research and engineering data, engineering drawings, and associated lists, specifications, standards, process sheets, manuals, technical reports, technical orders, catalog-item identifications, data sets, studies and analyses and related information, and computer software executable code and source code” “in support of the performance of” a DoD “contract” ?

If you can answer yes to this question, then your organization handled CUI, CDI, or CTI.

For more information, please contact us at [email protected].

Key CMMC Sites

Key References

Key Acquisition References

Other Key Sites

Go to Top