CMMC: The Dramatic Year of the Pentagon’s Contractor Cybersecurity Program

gokturk_06/Shutterstock.com

The Defense Department’s main effort to protect its supply chain from cyber threats charged ahead through the pandemic but not without controversy.  

In 2020, an ambitious Defense Department effort to account for its suppliers’ cybersecurity had many in the community kicking and screaming in tow, but represents a new collective policy thrust that won’t be dismissed.  

The program, led by Katie Arrington, the chief information security officer for Defense acquisitions, is based on the idea that the government should incorporate security standards into its contract administration. Arrington’s presentations on the program often include an estimate of how much is lost each year through cyber disruptions—$600 billion, according to research cited in the DOD’s answers to frequently asked questions about the program—and highlight intellectual property theft by China.

Before the idea of CMMC, companies within the defense industrial base simply pledged their adherence to cybersecurity practices outlined by the National Institute of Standards and Technology. A 2015 rule required Defense contractors to report cyber incidents and to provide “adequate security” using NIST Special Publication 800-171 to protect covered information. But it wasn’t until summer 2019 that the Defense Department started checking whether companies were implementing the standard. 

Following a pilot in June 2019, the Defense Contract Management Agency officially stood up the Defense Industrial Base Cybersecurity Assessment Center and now does spot checks on companies. John Ellis, DCMA’s software division director, told consultant Leslie Weinstein the selection of companies for these is informed by DOD priorities and threats observed in the cyber realm. 

However, more than a year in, the DIBCAC has completed about 100 audits, just scratching the surface of the roughly 300,000 contractors serving the department. The sheer number of companies that work with the department is why Arrington said a whole new ecosystem of independent auditors is necessary to implement CMMC. She said she also considered turning to an existing official entity such as MITRE, a federally funded research and development corporation, for help with the audits, but that would have been prohibitively expensive. 

The Drama of the Nongovernment Auditors

To scale up auditing, the department issued an interim rule Sept. 30 sanctioning a nonprofit group, the CMMC Accreditation Body, or CMMC-AB, to “accredit and oversee multiple third-party assessment organizations (C3PAOs) which in turn, will conduct on-site assessments of DoD contractors throughout the multi-tier supply chain.”

The group raised eyebrows from the start. Instead of a formal process, the CMMC-AB was populated by volunteers from a meeting DOD held with industry stakeholders about the program. It also turned out Ty Schieber, the initial chairman of the board, had worked with Arrington for years in military and government sales and that he financially supported her 2018 run for a seat in Congress. Arrington refutes any impropriety associated with the Scheiber connection and has heaped praise on all members of the CMMC-AB for their unpaid dedication to the cause. 

Still, the volunteers seemed to struggle with funding. They took out lines of credit to establish operations, and Schieber and another board member were replaced suddenly, after a controversial sponsorship proposal that Arrington said the department could not condone.

The CMMC-AB takes fees from individuals and entities applying to participate in the ecosystem in various capacities, including as auditors and consultants. It is now searching for a CEO as a newly formed 501.C(3), according to a post on its website, but concerns remain that have prominent members of the DIB reaching for the arms of government.

Private-sector entities don’t usually cry out for the government to be more involved in monitoring their business practices, but 2020 has been anything but typical, and when it comes to the CMMC, that’s exactly what some of the largest tech companies are doing.

“While BSA understands that the Department of Defense seeks to create private sector-based certification infrastructure in order to enable it to meet the requirement for certifications across such a large group of vendors, the current approach creates a number of challenges undermining the integrity of the process, including potential for conflicts of interest, profiteering, and outsourcing of an inherently governmental function,” BSA | The Software Alliance wrote in response to the interim rule.

The Information Technology Industry Council expressed similar concerns and had outstanding questions about the adjudication process in the event audit outcomes are protested.  

“The establishment of an independent Accreditation Board composed of representatives from the Defense Industrial Base holds the potential to put industry representatives in a position to oversee the evaluation of their competitors, a troubling potential conflict,” read the comments from BSA, which has a number of members in common with ITI. “One approach would be for the Department to re-establish the Accreditation Board as a government body, and to put in place guide rails to prevent excessive certification pricing or other abuses. In any event, the current approach must be revisited.”

Learning about the CMMC has generally been a challenge due to irregular official communications about how the program is unfolding.

“Unfortunately a lot of the best information would require essentially skimming LinkedIn on a daily basis and hoping you got the right people,” Robert Metzger, shareholder at government contracts practice group Rogers Joseph O’Donnell, said during a CMMC briefing for the National Security Space Association. “It’s frustrating because knowledge is needed by a lot of people for reasons that affect their business and their finances and their opportunity and it’s hard to get. The distribution of that information is more episodic and accidental than systematic and trustworthy.”  

More Riding on Self-Assessment than Before?

The CMMC originally inspired hope, in addition to fear in the contracting community. Some, like ITI, advocated retaining a system of vendor declaration as the basis for certifications. Others, from the National Defense Industry Association, told Nextgov they would welcome more accountability and looked forward to a leveling of the playing field that would reward companies that invested more in cybersecurity. But the program rollout is scheduled to happen over a period of five years, and in the meantime, the new rule doubles down on the self-assessment system currently being used.

DOD can now write into contracts a requirement that companies submit a self-determined score based on NIST-outlined practices, along with a system security plan and a date for when they expect to have fully executed it to the Supplier Performance Risk System. 

Suppliers didn’t previously have to register their self-assessments and now the contracting community, including the industry group Professional Services Council, is concerned about how those submissions will be used.

“PSC’s comments raise concerns that self-scoring for compliance with [NIST SP 800–171] could lead to companies scoring themselves differently even if they have the same capabilities and security practices,” reads a press release on a Nov. 30 letter the group sent to the DOD. “Such differences could reduce competition, cause confusion in evaluation and awards, increase risk, and create delays in government procurement.”

There are also concerns about the security of information that is shared toward compliance with the new interim rule, a final version of which is expected in February. A Government Accountability Office report drawing attention to cybersecurity failings at the DOD didn’t help alleviate those at all. GAO implored the Pentagon to practice what it was preaching.

Faced with this and numerous other challenges, including training acquisitions staff to identify the kind of information that should spur certain CMMC security requirements, how to determine reciprocity for adherence to programs like the Federal Risk and Authorization Management Program, and establishing intergovernmental agreements to account for foreign suppliers, Arrington has said this is a learning process for all involved, including the department.

But she stresses that CMMC is the start of an inevitable cultural shift, not just at the DOD, but across the government. 

During a recent webinar with Information Systems Security Association International, she noted the direction of the congressionally mandated public-private Cyberspace Solarium Commission, which points to other goals such as requiring contractors to hold cybersecurity insurance. The contracting community isn’t thrilled about that either.  

“Threat intelligence should be shared,” she added during the webinar, which covered implications of the widespread breaches caused by a supply chain compromise. “‘Threat’ is not a bad word. Share it with your supply chain because if it happened to you, the likelihood that it’s going to happen to them is certain.” ITI’s comments on the CMMC indicated a reluctance among some to share information—something the government has been trying to get industry to do for about as long as cybersecurity policy has existed—due to cost and security concerns.

Although the CMMC isn’t set to roll out to all defense contractors for another five years, it may already be gaining momentum in other parts of the government, according to Arrington.

“In January, you’re going to see, it’s their story to tell, but you’ll hear at least two federal agencies that are going to formally acknowledge and say that they’re adopting the CMMC,” she said. “I think that this is definitely going to go outside DOD. I know it is.” 

RELATED PODCAST

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.