{"id":11086,"date":"2021-04-21T08:21:03","date_gmt":"2021-04-21T13:21:03","guid":{"rendered":"https:\/\/ndisac.org\/dibscc\/?page_id=11086"},"modified":"2026-01-22T11:30:49","modified_gmt":"2026-01-22T16:30:49","slug":"cybersecurity-maturity-model-certification","status":"publish","type":"page","link":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/","title":{"rendered":"Cybersecurity Maturity Model Certification"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;banner-block&#8221; _builder_version=&#8221;4.0.4&#8243; height=&#8221;250px&#8221;][et_pb_fullwidth_header title=&#8221;Cybersecurity Maturity Model Certification (CMMC)&#8221; module_id=&#8221;Aboutpg&#8221; _builder_version=&#8221;4.9.2&#8243; title_font=&#8221;Muli|800|||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;48px&#8221; content_font=&#8221;Muli||||||||&#8221; content_text_color=&#8221;#ffffff&#8221; content_font_size=&#8221;23px&#8221; subhead_text_color=&#8221;#ffffff&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; background_image=&#8221;https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/dibscc-home.jpg&#8221; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; background_layout=&#8221;light&#8221; height=&#8221;250px&#8221; custom_padding=&#8221;5%||10%||false|false&#8221; z_index_tablet=&#8221;500&#8243; title_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; title_text_shadow_vertical_length_tablet=&#8221;0px&#8221; title_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_text_shadow_blur_strength_tablet=&#8221;1px&#8221; subhead_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; subhead_text_shadow_vertical_length_tablet=&#8221;0px&#8221; subhead_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; button_one_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; button_one_text_shadow_vertical_length_tablet=&#8221;0px&#8221; button_one_text_shadow_blur_strength_tablet=&#8221;1px&#8221; button_two_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; button_two_text_shadow_vertical_length_tablet=&#8221;0px&#8221; button_two_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; box_shadow_horizontal_image_tablet=&#8221;0px&#8221; box_shadow_vertical_image_tablet=&#8221;0px&#8221; box_shadow_blur_image_tablet=&#8221;40px&#8221; box_shadow_spread_image_tablet=&#8221;0px&#8221; box_shadow_horizontal_button_one_tablet=&#8221;0px&#8221; box_shadow_vertical_button_one_tablet=&#8221;0px&#8221; box_shadow_blur_button_one_tablet=&#8221;40px&#8221; box_shadow_spread_button_one_tablet=&#8221;0px&#8221; box_shadow_horizontal_button_two_tablet=&#8221;0px&#8221; box_shadow_vertical_button_two_tablet=&#8221;0px&#8221; box_shadow_blur_button_two_tablet=&#8221;40px&#8221; box_shadow_spread_button_two_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover=&#8221;null&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover=&#8221;null&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover=&#8221;null&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover=&#8221;null&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover=&#8221;null&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover=&#8221;null&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover=&#8221;null&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover=&#8221;null&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover=&#8221;null&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover=&#8221;null&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover=&#8221;null&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover=&#8221;null&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover=&#8221;null&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover=&#8221;null&#8221;]<br \/>\n[\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.4.3&#8243; min_height=&#8221;319px&#8221; locked=&#8221;off&#8221;][et_pb_row _builder_version=&#8221;4.9.2&#8243; custom_margin=&#8221;-49px|auto||auto||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.4.3&#8243;][et_pb_cta _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#0C71C3&#8243; min_height=&#8221;73.3px&#8221; custom_padding=&#8221;18px||0px|||&#8221;]<\/p>\n<p style=\"text-align: center\"><strong>Phased Implementation of CMMC Requirements Has Begun!<br \/>CMMC Phase 1 Implementation (Nov 10, 2025 &#8211; Nov 9, 2026) to focus primarily on CMMC Level 1 and Level 2 self-assessments<br \/><\/strong><a style=\"color: #ffffff\" href=\"https:\/\/www.federalregister.gov\/documents\/2025\/09\/10\/2025-17359\/defense-federal-acquisition-regulation-supplement-assessing-contractor-implementation-of\">Click HERE for details<\/a><\/p>\n<p>[\/et_pb_cta][et_pb_testimonial quote_icon=&#8221;off&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; min_height=&#8221;177px&#8221; custom_padding=&#8221;18px||0px|||&#8221; z_index_tablet=&#8221;0&#8243; author_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; author_text_shadow_vertical_length_tablet=&#8221;0px&#8221; author_text_shadow_blur_strength_tablet=&#8221;1px&#8221; position_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; position_text_shadow_vertical_length_tablet=&#8221;0px&#8221; position_text_shadow_blur_strength_tablet=&#8221;1px&#8221; company_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; company_text_shadow_vertical_length_tablet=&#8221;0px&#8221; company_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; box_shadow_horizontal_image_tablet=&#8221;0px&#8221; box_shadow_vertical_image_tablet=&#8221;0px&#8221; box_shadow_blur_image_tablet=&#8221;40px&#8221; box_shadow_spread_image_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221;]<\/p>\n<p>The <a href=\"https:\/\/dodcio.defense.gov\/CMMC\/Documentation\/\">CMMC framework<\/a> consists of the security requirements from NIST SP 800-171 Rev 2, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, and a subset of the requirements from NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171. The model framework organizes these practices into a set of domains, which map directly to the NIST SP 800-171 Rev 2 families. There are three levels within CMMC &#8211; Level 1, Level 2, and Level 3. <a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/CMMC-101-Nov2025.pdf\">Source<\/a><\/p>\n<p>[\/et_pb_testimonial][et_pb_cta button_url=&#8221;https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/11\/The-Role-of-VDI-for-CMMC-White-Paper.pdf&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#F1C232&#8243; background_layout=&#8221;light&#8221; min_height=&#8221;73.3px&#8221; custom_padding=&#8221;18px||0px|||&#8221;]<\/p>\n<p style=\"text-align: center\"><strong>October 2025 &#8211; NDISAC Whitepaper: The Role of VDI for CMMC <span style=\"color: #000000\"><a style=\"color: #000000\" href=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/11\/The-Role-of-VDI-for-CMMC-White-Paper.pdf\">Now Available<\/a><\/span><\/strong><\/p>\n<p>[\/et_pb_cta][et_pb_accordion icon_color=&#8221;#0c71c3&#8243; admin_label=&#8221;Accordion: CMMC Accordion&#8221; module_class=&#8221;toggle&#8221; _builder_version=&#8221;4.9.2&#8243; toggle_font=&#8221;|700|||||||&#8221; toggle_text_align=&#8221;left&#8221; toggle_font_size=&#8221;20px&#8221; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; text_orientation=&#8221;left&#8221; custom_padding=&#8221;2px||2px|&#8221; hover_transition_duration=&#8221;100ms&#8221; hover_enabled=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; custom_css_toggle=&#8221;margin-bottom: 10px !important;&#8221; toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; closed_toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_accordion_item title=&#8221;CMMC Program Resources&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n\n\t\t\t<div class='et-tabs-container et_sliderfx_fade et_sliderauto_false et_sliderauto_speed_5000 et_slidertype_top_tabs'>\n\t\t\t\t<ul class='et-tabs-control'>\n\t\t\t<li><a href='#'>\n\t\t\tOfficial CMMC Websites\n\t\t<\/a><\/li>\n\t\t<li><a href='#'>\n\t\t\tInformation &amp; Resources\n\t\t<\/a><\/li>\n\t\t<li><a href='#'>\n\t\t\tPublic User Forums\n\t\t<\/a><\/li>\n\t\t<\/ul> <!-- .et-tabs-control -->\n\t\t<div class='et-tabs-content'>\n\t\t\t<div class='et-tabs-content-main-wrap'>\n\t\t\t\t<div class='et-tabs-content-wrapper'>\n\t\t\t\t\t<div class='et_slidecontent'>\n\t\t\t<span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat555 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/cyberab.org\/\" id=\"link-7852\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">The Cyber Accreditation Body (AB)<\/a>\n<p>The Cyber AB will provide information and set requirements for prospective C3PAOs and individual assessors. Prospective C3PAOs and assessors should reference the Cyber AB website.<\/p><\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/CMMC\/\" id=\"link-1645\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">U.S Department of Defense Chief Information Officer Cybersecurity Certification Maturity Model (CMMC)<\/a>\n<p>To safeguard sensitive national security information, the Department of Defense (DoD) launched CMMC 2.0, a comprehensive framework to protect the defense industrial base\u2019s (DIB) sensitive unclassified information from frequent and increasingly complex cyberattacks. With its streamlined requirements, CMMC 2.0: Simplifies compliance by allowing self-assessment for some requirements, Applies priorities for protecting DoD information, and Reinforces cooperation between the DoD and industry in addressing evolving cyber threats.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'e9fbff8de4',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n<\/span>\n\t\t<\/div>\n\t\t<div class='et_slidecontent'>\n\t\t\t<span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat553 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/CMMC-101-Nov2025.pdf\" id=\"link-14838\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC 101 Brief<\/a>\n<p>August 22, 2025 - DoD CIO CMMC Overview presentation<\/p><\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL1v2.pdf\" id=\"link-9988\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 1 Self-Assessment Guide<\/a>\n<p>This document provides self-assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 1.<\/p><\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL2v2.pdf\" id=\"link-9989\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 2 Assessment Guide<\/a>\n<p>This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 2.<\/p><\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL3v2.pdf\" id=\"link-14791\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 3 Assessment Guide<\/a>\n<p>This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 3.<\/p><\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/ModelOverviewv2.pdf\" id=\"link-14843\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Model Overview<\/a>\n<p>DoD CIO CMMC overview.<\/p><\/li>\n<li><a href=\"https:\/\/www.exostar.com\/products\/certification-assistant\/\" id=\"link-7977\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Exostar &#8211; CMMC Certification Assistant<\/a>\n<p>Certification Assistant streamlines the implementation of practices and processes necessary for accurate self-assessment and evidence collection while paving the way to CMMC-certification success.<\/p><\/li>\n<li><a href=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/11\/The-Role-of-VDI-for-CMMC-White-Paper.pdf\" id=\"link-17322\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">National Defense-ISAC: The Role of VDI for CMMC<\/a>\n<p>Focused on securing Controlled Unclassified Information, this work highlights how Virtual Desktop Infrastructure (VDI) reduces endpoint risk and aligns with CMMC requirements across the defense industrial base.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'e9fbff8de4',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n<\/span>\n\t\t<\/div>\n\t\t<div class='et_slidecontent'>\n\t\t\t<p>The external user forum links below can be used to seek assistance outside of the CyberAssist webpage. The DIB SCC neither monitors nor moderates these communities.<\/p>\n<p><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat570 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.reddit.com\/r\/CMMC\/\" id=\"link-9358\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Reddit &#8211; CMMC<\/a>\n<p>A reddit community with information, guidance, and assistance for meeting the new DoD CMMC rating guidelines.<\/p><\/li>\n<li><a href=\"https:\/\/www.reddit.com\/r\/NISTControls\/\" id=\"link-9359\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Reddit &#8211; NIST Controls Discussion, Resource Sharing, News, Recommendations for Solutions<\/a>\n<p>A reddit community for navigating the complicated world of NIST Publications and their controls.  This includes discussions, resource sharing, news, and recommendations for solutions. Collaboration on implementing and maintaining NIST SP 800-53 &amp; NIST SP 800-171 controls.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'e9fbff8de4',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<\/div> <!-- .et-tabs-container -->\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;DIB SCC Cyber \/ CMMC Training&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; open=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>The intent of the Defense Industrial Base (DIB) Sector Coordinating Council (SCC) Supply Chain Cyber training is to build awareness for DIB suppliers of the Cybersecurity Maturity Model Certification (CMMC) requirements and their obligation to meet FAR 52.204-21, basic cyber hygiene and specialized data handling and protection requirements aligned to DFARS 252.204-7012. For additional information, <a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/CMMC-101-Nov2025.pdf\" target=\"_blank\" rel=\"noopener\">click here<\/a> to access the DoD CIO CMMC 101 briefing.<\/p>\n<p>The training below is self-paced and intended for a range of roles and responsibilities including, but not limited to, executives, project managers and technical staff from organizations seeking certification or assessment (OSC\/A), and who need to comply with CMMC.<\/p>\n<p><a href=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2026\/01\/DIB_SCC_Suppliers_Cyber_CMMC_Training_v4.0.pptx\"><span style=\"text-decoration: underline\"><strong>PowerPoint &#8211; Cyber\/CMMC Training<\/strong><\/span><\/a><\/p>\n<blockquote>\n<p>Tip: Important information included in the notes section<\/p>\n<\/blockquote>\n<p><a href=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2026\/01\/DIB_SCC_Suppliers_Cyber_CMMC_Training_v4.0.pdf\"><span style=\"text-decoration: underline\"><strong>PDF &#8211; Cyber\/CMMC Training<\/strong><\/span><\/a><\/p>\n<p><span style=\"text-decoration: underline\"><strong><a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/dib-scc-cyber-and-cmmc-training-survey\/\">Training Survey<\/a><\/strong><\/span><\/p>\n<p><span style=\"text-decoration: underline\"><strong><a href=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2022\/08\/Supply-Chain-Academy_FAQs.pdf\">Frequently Asked Questions<\/a><\/strong><\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;When will CMMC be required on contracts?&#8221; title_tablet=&#8221;What is CDI\/CUI and how do I tell if my data is considered CDI\/CUI?&#8221; title_phone=&#8221;What is CDI\/CUI and how do I tell if my data is considered CDI\/CUI?&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; vertical_offset_phone=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; horizontal_offset_phone=&#8221;0&#8243; background_color_gradient_direction_tablet=&#8221;180deg&#8221; background_color_gradient_direction_phone=&#8221;180deg&#8221; background_color_gradient_start_position_tablet=&#8221;0%&#8221; background_color_gradient_start_position_phone=&#8221;0%&#8221; background_color_gradient_end_position_tablet=&#8221;100%&#8221; background_color_gradient_end_position_phone=&#8221;100%&#8221; z_index_tablet=&#8221;1&#8243; z_index_phone=&#8221;1&#8243; hover_transition_duration_tablet=&#8221;300ms&#8221; hover_transition_duration_phone=&#8221;300ms&#8221; hover_transition_delay_tablet=&#8221;0ms&#8221; hover_transition_delay_phone=&#8221;0ms&#8221; body_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_link_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_link_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_link_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ul_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ol_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_quote_text_shadow_blur_strength_phone=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_horizontal_phone=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_vertical_phone=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_blur_phone=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; box_shadow_spread_phone=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_phone=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_phone=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221; text_shadow_blur_strength_phone=&#8221;1px&#8221; toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; toggle_text_shadow_horizontal_length_phone=&#8221;0px&#8221; toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; toggle_text_shadow_vertical_length_phone=&#8221;0px&#8221; toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; toggle_text_shadow_blur_strength_phone=&#8221;1px&#8221; closed_toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_horizontal_length_phone=&#8221;0px&#8221; closed_toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_vertical_length_phone=&#8221;0px&#8221; closed_toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; closed_toggle_text_shadow_blur_strength_phone=&#8221;1px&#8221; open=&#8221;off&#8221;]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15716 size-full aligncenter\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/09\/CMMC-32-v-48CFR3.png\" alt=\"\" width=\"1264\" height=\"712\" \/><\/p>\n<p><u><strong>CMMC Program Final Rule &#8211; <\/strong>32 Code of Federal Regulations (CFR) <\/u><u>\u00a7 <\/u><u>170\u00a0<\/u><\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>The 32 CFR \u00a7 170 formally establishes the DoD\u2019s CMMC Program<\/li>\n<li>It sets up the framework, components, policy, and procedures for how the CMMC Program will be implemented and managed<\/li>\n<li>The DoD published the CMMC Program Rule in October 2024<\/li>\n<li>The rule was effective as of December 2024<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><u><strong>CMMC DFARS\u00a0Acquisition Final Rule &#8211; 48 CFR \u00a7 204, 212, 217 and 252 (DFARS 252.204-7021 &amp; 7025)<\/strong><\/u><\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Establishes the requirements for incorporating CMMC into DoD contracts<\/li>\n<li>DoD published the final rule in September 2025<\/li>\n<li>CMMC Phase 1 implementation of self-assessments to begin November 10, 2025<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Source: Department of Defense CMMC Program | September 2025<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;CMMC Framework Overview&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; open=&#8221;off&#8221;]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15429 size-full aligncenter\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/01\/CMMC-Framework-Requirement-1.png\" alt=\"\" width=\"1660\" height=\"943\" srcset=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/01\/CMMC-Framework-Requirement-1.png 1660w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/01\/CMMC-Framework-Requirement-1-1280x727.png 1280w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/01\/CMMC-Framework-Requirement-1-980x557.png 980w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/01\/CMMC-Framework-Requirement-1-480x273.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1660px, 100vw\" \/><\/p>\n<p>The CMMC model measures the implementation of cybersecurity requirements at three levels. Each level consists of a set of CMMC security requirements: as set fourth in 32 CFR \u00a7 170.14 (c).<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li><b>Level 1: <\/b>Encompasses the basic safeguarding requirements for Federal Contract Information (FCI) specified in FAR Clause 52.204-21.<\/li>\n<li><b>Level 2: <\/b>Encompasses the security requirements for Controlled Unclassified Information (CUI) specified in NIST SP 800-171 Rev 2 per DFARS Clause 252.204-7012.<\/li>\n<li><b>Level 3: <\/b>Encompasses a subset of enhanced security requirements for CUI specified in NIST SP 800-172 with DoD-approved parameters where applicable.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><b>Source: <\/b>Cybersecurity Maturity Model Certification Model Overview Version 2.13 | September 2024<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>CMMC is intended to be cost-effective and affordable for small businesses to implement at the lower CMMC levels.<\/li>\n<li>CMMC includes 14 domains (key sets of cybersecurity capabilities).<\/li>\n<li>All contractors and suppliers doing business with DoD must meet the CMMC Level 1 requirements at a minimum.<\/li>\n<li>The CMMC level of certification required for each DoD procurement will be specified in RFIs and RFPs<\/li>\n<li>Contractors will need to flow down appropriate CMMC Level requirements and verify supplier certification levels (CMMC Level 1 for FCI but no CUI; CMMC Level 2 or above for CUI).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;CMMC Ecosystem Overview&#8221; title_tablet=&#8221;Who is considered a US Person or a Non-US Person?&#8221; title_phone=&#8221;Who is considered a US Person or a Non-US Person?&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; vertical_offset_phone=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; horizontal_offset_phone=&#8221;0&#8243; background_color_gradient_direction_tablet=&#8221;180deg&#8221; background_color_gradient_direction_phone=&#8221;180deg&#8221; background_color_gradient_start_position_tablet=&#8221;0%&#8221; background_color_gradient_start_position_phone=&#8221;0%&#8221; background_color_gradient_end_position_tablet=&#8221;100%&#8221; background_color_gradient_end_position_phone=&#8221;100%&#8221; z_index_tablet=&#8221;1&#8243; z_index_phone=&#8221;1&#8243; hover_transition_duration_tablet=&#8221;300ms&#8221; hover_transition_duration_phone=&#8221;300ms&#8221; hover_transition_delay_tablet=&#8221;0ms&#8221; hover_transition_delay_phone=&#8221;0ms&#8221; body_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_link_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_link_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_link_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ul_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ol_text_shadow_blur_strength_phone=&#8221;1px&#8221; body_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_horizontal_length_phone=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_phone=&#8221;0px&#8221; body_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_quote_text_shadow_blur_strength_phone=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_horizontal_phone=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_vertical_phone=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_blur_phone=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; box_shadow_spread_phone=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_phone=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_phone=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221; text_shadow_blur_strength_phone=&#8221;1px&#8221; toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; toggle_text_shadow_horizontal_length_phone=&#8221;0px&#8221; toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; toggle_text_shadow_vertical_length_phone=&#8221;0px&#8221; toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; toggle_text_shadow_blur_strength_phone=&#8221;1px&#8221; closed_toggle_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_horizontal_length_phone=&#8221;0px&#8221; closed_toggle_text_shadow_vertical_length_tablet=&#8221;0px&#8221; closed_toggle_text_shadow_vertical_length_phone=&#8221;0px&#8221; closed_toggle_text_shadow_blur_strength_tablet=&#8221;1px&#8221; closed_toggle_text_shadow_blur_strength_phone=&#8221;1px&#8221; open=&#8221;off&#8221;]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15641 alignnone size-full\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/02\/CMMC-Ecosystem.png\" alt=\"\" width=\"1648\" height=\"942\" srcset=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/02\/CMMC-Ecosystem.png 1648w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/02\/CMMC-Ecosystem-1280x732.png 1280w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/02\/CMMC-Ecosystem-980x560.png 980w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/02\/CMMC-Ecosystem-480x274.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 1648px, 100vw\" \/><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15717 alignnone size-full\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/02\/CMMC-Ecosystem2.png\" alt=\"\" width=\"1279\" height=\"718\" srcset=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/02\/CMMC-Ecosystem2.png 1279w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/02\/CMMC-Ecosystem2-980x550.png 980w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/02\/CMMC-Ecosystem2-480x269.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1279px, 100vw\" \/><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;CMMC Security Requirements by Level &#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; toggle_level=&#8221;h5&#8243; open=&#8221;off&#8221;]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15648 alignnone size-full\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/02\/Assessment-Level-Identification.png\" alt=\"\" width=\"1247\" height=\"703\" srcset=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/02\/Assessment-Level-Identification.png 1247w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/02\/Assessment-Level-Identification-980x552.png 980w, https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/02\/Assessment-Level-Identification-480x271.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1247px, 100vw\" \/><\/p>\n<p>Select to see the security requirements and resources for each CMMC Level:<br \/><style type='text\/css' media='all'>#rt-tpg-container-924463850 .rt-holder .rt-woo-info .price{color:#0367bf;}body .rt-tpg-container .rt-tpg-isotope-buttons .selected,\n\t\t\t\t\t#rt-tpg-container-924463850 .layout12 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-924463850 .isotope8 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-924463850 .carousel8 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-924463850 .layout13 .rt-holder .overlay .post-info,\n\t\t\t\t\t#rt-tpg-container-924463850 .isotope9 .rt-holder .overlay .post-info,\n\t\t\t\t\t#rt-tpg-container-924463850.rt-tpg-container .layout4 .rt-holder .rt-detail,\n\t\t\t\t\t.rt-modal-924463850 .md-content,\n\t\t\t\t\t.rt-modal-924463850 .md-content > .rt-md-content-holder .rt-md-content,\n\t\t\t\t\t.rt-popup-wrap-924463850.rt-popup-wrap .rt-popup-navigation-wrap,\n\t\t\t\t\t#rt-tpg-container-924463850 .carousel9 .rt-holder .overlay .post-info{background-color:#0367bf;}#rt-tpg-container-924463850 .layout5 .rt-holder .overlay, #rt-tpg-container-924463850 .isotope2 .rt-holder .overlay, #rt-tpg-container-924463850 .carousel2 .rt-holder .overlay,#rt-tpg-container-924463850 .layout15 .rt-holder h3, #rt-tpg-container-924463850 .isotope11 .rt-holder h3, #rt-tpg-container-924463850 .carousel11 .rt-holder h3, #rt-tpg-container-924463850 .layout16 .rt-holder h3,\n\t\t\t\t\t#rt-tpg-container-924463850 .isotope12 .rt-holder h3, #rt-tpg-container-924463850 .carousel12 .rt-holder h3 {background-color:rgba(3,103,191,0.8);}#rt-tpg-container-924463850 .read-more a{border-radius:px;}#rt-tpg-container-924463850 .rt-img-holder img.rt-img-responsive,#rt-tpg-container-924463850 .rt-img-holder,\n\t\t\t\t\t#rt-tpg-container-924463850 .rt-post-overlay .post-img,\n\t\t\t\t\t#rt-tpg-container-924463850 .post-sm .post-img,\n\t\t\t\t\t#rt-tpg-container-924463850 .rt-post-grid .post-img,\n\t\t\t\t\t#rt-tpg-container-924463850 .post-img img {border-radius:px;}<\/style><div class='rt-container-fluid rt-tpg-container tpg-shortcode-main-wrapper ' id='rt-tpg-container-924463850'   data-layout='layout1' data-grid-style='even' data-desktop-col='3'  data-tab-col='2'  data-mobile-col='1' data-sc-id='4718'><div data-title='Loading ...' class='rt-row rt-content-loader   layout1 tpg-even '><div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5079\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5079\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/\">CMMC Level 1<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4724\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4724\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/\">CMMC Level 2<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5093\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5093\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-3\/\">CMMC Level 3<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><\/p>\n<p>When CMMC \u201cgoes live,\u201d organizations will need to determine the appropriate assessment path and level, given the type of information they have access to or develop<\/p>\n<ul>\n<li><b>Federal Contract Information (FCI) only<\/b>\n<ul>\n<li>Self-assessment of CMMC Level 1 (L1) requirements using the <a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL1v2.pdf\">CMMC Self-Assessment Guide &#8211; Level 1<\/a> for additional guidance<\/li>\n<\/ul>\n<\/li>\n<li><b>Controlled Unclassified Information (CUI) identified as Non-critical to national security *<\/b>\n<ul>\n<li>Self-assessment of CMMC L2 requirements using the <a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL2v2.pdf\">CMMC L2 Assessment Guide<\/a><\/li>\n<\/ul>\n<\/li>\n<li><b>CUI identified as <\/b><b>Critical to national security *<\/b>\n<ul>\n<li>Requires certification by an authorized C3PAO from the Cyber AB Marketplace<\/li>\n<\/ul>\n<\/li>\n<li><b>CUI identified as requiring enhanced protections *<\/b>\n<ul>\n<li>Requires CMMC L3 certification by DCMA DIBCAC* using the <a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL3v2.pdf\">CMMC L3 Assessment Guide<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>In February 2025, the DoD released a <a href=\"https:\/\/dodprocurementtoolbox.com\/uploads\/DOPSR_Cleared_OSD_Memo_CMMC_Implementation_Policy_d26075de0f.pdf\">memorandum<\/a> with the subject: &#8220;<em>Implementing the Cybersecurity Maturity Model Certification (CMMC) Program: Guidance for Determining Appropriate CMMC Compliance Assessment Levels and Process for Waiving CMMC Assessment requirements<\/em>&#8221; that further define how Program Managers and requiring activities will identify the appropriate level for a given contract.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;CMMC Security Requirements by Domain&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; open=&#8221;off&#8221;]<\/p>\n<p>The CMMC model consists of 14 domains that align with the families specified in NIST SP 800-171 rev 2.<\/p>\n<p><strong><style type='text\/css' media='all'>#rt-tpg-container-2968636173 .rt-holder .rt-woo-info .price{color:#0367bf;}body .rt-tpg-container .rt-tpg-isotope-buttons .selected,\n\t\t\t\t\t#rt-tpg-container-2968636173 .layout12 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-2968636173 .isotope8 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-2968636173 .carousel8 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-2968636173 .layout13 .rt-holder .overlay .post-info,\n\t\t\t\t\t#rt-tpg-container-2968636173 .isotope9 .rt-holder .overlay .post-info,\n\t\t\t\t\t#rt-tpg-container-2968636173.rt-tpg-container .layout4 .rt-holder .rt-detail,\n\t\t\t\t\t.rt-modal-2968636173 .md-content,\n\t\t\t\t\t.rt-modal-2968636173 .md-content > .rt-md-content-holder .rt-md-content,\n\t\t\t\t\t.rt-popup-wrap-2968636173.rt-popup-wrap .rt-popup-navigation-wrap,\n\t\t\t\t\t#rt-tpg-container-2968636173 .carousel9 .rt-holder .overlay .post-info{background-color:#0367bf;}#rt-tpg-container-2968636173 .layout5 .rt-holder .overlay, #rt-tpg-container-2968636173 .isotope2 .rt-holder .overlay, #rt-tpg-container-2968636173 .carousel2 .rt-holder .overlay,#rt-tpg-container-2968636173 .layout15 .rt-holder h3, #rt-tpg-container-2968636173 .isotope11 .rt-holder h3, #rt-tpg-container-2968636173 .carousel11 .rt-holder h3, #rt-tpg-container-2968636173 .layout16 .rt-holder h3,\n\t\t\t\t\t#rt-tpg-container-2968636173 .isotope12 .rt-holder h3, #rt-tpg-container-2968636173 .carousel12 .rt-holder h3 {background-color:rgba(3,103,191,0.8);}#rt-tpg-container-2968636173 .read-more a{border-radius:px;}#rt-tpg-container-2968636173 .rt-img-holder img.rt-img-responsive,#rt-tpg-container-2968636173 .rt-img-holder,\n\t\t\t\t\t#rt-tpg-container-2968636173 .rt-post-overlay .post-img,\n\t\t\t\t\t#rt-tpg-container-2968636173 .post-sm .post-img,\n\t\t\t\t\t#rt-tpg-container-2968636173 .rt-post-grid .post-img,\n\t\t\t\t\t#rt-tpg-container-2968636173 .post-img img {border-radius:px;}<\/style><div class='rt-container-fluid rt-tpg-container tpg-shortcode-main-wrapper ' id='rt-tpg-container-2968636173'   data-layout='layout3' data-grid-style='even' data-desktop-col='2'  data-tab-col='2'  data-mobile-col='1' data-sc-id='4733'><div data-title='Loading ...' class='rt-row rt-content-loader   layout3 tpg-even '><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4956\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4956\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/access-control\/\">Access Control (AC)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4748\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4748\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/awareness-and-training\/\">Awareness and Training (AT)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4746\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4746\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/audit-and-accountability\/\">Audit and Accountability (AU)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4752\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4752\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/configuration-management\/\">Configuration Management (CM)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4754\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4754\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/identification-and-authentication\/\">Identification and Authentication (IA)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4756\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4756\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/incident-response\/\">Incident Response (IR)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4758\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4758\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/maintenance\/\">Maintenance (MA)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4760\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4760\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/media-protection\/\">Media Protection (MP)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4762\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4762\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/personnel-security\/\">Personnel Security (PS)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4765\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4765\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/physical-protection-2\/\">Physical Protection (PE)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4771\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4771\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/risk-assessment\/\">Risk Assessment (RA)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4773\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4773\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/security-assessment\/\">Security Assessment (CA)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4778\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4778\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/system-and-communications-protection\/\">System and Communications Protection (SC)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"rt-col-md-6 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4780\"><div class=\"rt-holder\"><div class=\"rt-row\"><div class='rt-col-xs-12'><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4780\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/system-and-information-integrity\/\">System and Information Integrity (SI)<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/strong><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;banner-block&#8221; _builder_version=&#8221;4.0.4&#8243; height=&#8221;250px&#8221;][et_pb_fullwidth_header title=&#8221;Cybersecurity Maturity Model Certification (CMMC)&#8221; module_id=&#8221;Aboutpg&#8221; _builder_version=&#8221;4.9.2&#8243; title_font=&#8221;Muli|800|||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;48px&#8221; content_font=&#8221;Muli||||||||&#8221; content_text_color=&#8221;#ffffff&#8221; content_font_size=&#8221;23px&#8221; subhead_text_color=&#8221;#ffffff&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; background_image=&#8221;https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/dibscc-home.jpg&#8221; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; background_layout=&#8221;light&#8221; height=&#8221;250px&#8221; custom_padding=&#8221;5%||10%||false|false&#8221; [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":1017,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-11086","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Maturity Model Certification - DIB SCC CyberAssist<\/title>\n<meta name=\"description\" content=\"Information, resources, and links related to the Cybersecurity Maturity Model Certification (CMMC) framework\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Maturity Model Certification - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"Information, resources, and links related to the Cybersecurity Maturity Model Certification (CMMC) framework\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T16:30:49+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/\",\"name\":\"Cybersecurity Maturity Model Certification - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/09\/CMMC-32-v-48CFR3.png\",\"datePublished\":\"2021-04-21T13:21:03+00:00\",\"dateModified\":\"2026-01-22T16:30:49+00:00\",\"description\":\"Information, resources, and links related to the Cybersecurity Maturity Model Certification (CMMC) framework\",\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyberAssist\",\"item\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Maturity Model Certification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Maturity Model Certification - DIB SCC CyberAssist","description":"Information, resources, and links related to the Cybersecurity Maturity Model Certification (CMMC) framework","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Maturity Model Certification - DIB SCC CyberAssist","og_description":"Information, resources, and links related to the Cybersecurity Maturity Model Certification (CMMC) framework","og_url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/","og_site_name":"DIB SCC CyberAssist","article_modified_time":"2026-01-22T16:30:49+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/","url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/","name":"Cybersecurity Maturity Model Certification - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/#primaryimage"},"image":{"@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/#primaryimage"},"thumbnailUrl":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2025\/09\/CMMC-32-v-48CFR3.png","datePublished":"2021-04-21T13:21:03+00:00","dateModified":"2026-01-22T16:30:49+00:00","description":"Information, resources, and links related to the Cybersecurity Maturity Model Certification (CMMC) framework","breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"CyberAssist","item":"https:\/\/ndisac.org\/dibscc\/cyberassist\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Maturity Model Certification"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"markcarr","author_link":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"},"rttpg_comment":0,"rttpg_category":"","rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;banner-block&#8221; _builder_version=&#8221;4.0.4&#8243; height=&#8221;250px&#8221;][et_pb_fullwidth_header title=&#8221;Cybersecurity Maturity Model Certification (CMMC)&#8221; module_id=&#8221;Aboutpg&#8221; _builder_version=&#8221;4.9.2&#8243; title_font=&#8221;Muli|800|||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;48px&#8221; content_font=&#8221;Muli||||||||&#8221; content_text_color=&#8221;#ffffff&#8221; content_font_size=&#8221;23px&#8221; subhead_text_color=&#8221;#ffffff&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; background_image=&#8221;https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/dibscc-home.jpg&#8221; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; background_layout=&#8221;light&#8221; height=&#8221;250px&#8221; custom_padding=&#8221;5%||10%||false|false&#8221; [&hellip;]","_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/11086"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=11086"}],"version-history":[{"count":115,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/11086\/revisions"}],"predecessor-version":[{"id":17393,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/11086\/revisions\/17393"}],"up":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/1017"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=11086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}