{"id":5079,"date":"2020-04-02T09:48:42","date_gmt":"2020-04-02T14:48:42","guid":{"rendered":"https:\/\/ndisac.org\/dibscc\/?p=5079"},"modified":"2025-03-12T08:07:55","modified_gmt":"2025-03-12T13:07:55","slug":"level-1","status":"publish","type":"post","link":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/","title":{"rendered":"CMMC Level 1"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_menu menu_id=&#8221;550&#8243; _builder_version=&#8221;4.9.2&#8243;][\/et_pb_menu][et_pb_text disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221;]<\/p>\n<h2><strong>CMMC Level 1<\/strong><\/h2>\n<p>[\/et_pb_text][et_pb_testimonial quote_icon=&#8221;off&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; custom_margin=&#8221;||33px|||&#8221; z_index_tablet=&#8221;0&#8243; author_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; author_text_shadow_vertical_length_tablet=&#8221;0px&#8221; author_text_shadow_blur_strength_tablet=&#8221;1px&#8221; position_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; position_text_shadow_vertical_length_tablet=&#8221;0px&#8221; position_text_shadow_blur_strength_tablet=&#8221;1px&#8221; company_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; company_text_shadow_vertical_length_tablet=&#8221;0px&#8221; company_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; box_shadow_horizontal_image_tablet=&#8221;0px&#8221; box_shadow_vertical_image_tablet=&#8221;0px&#8221; box_shadow_blur_image_tablet=&#8221;40px&#8221; box_shadow_spread_image_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221;]<\/p>\n<p>Level 1 focuses on the protection of FCI and consists of the 15 requirements of FAR clause 52.204-21<\/p>\n<p><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/ScopingGuideL1v2.pdf\">Level 1 Scoping Guidance<\/a><br \/><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL1v2.pdf\">Level 1 Self-Assessment Guide<\/a>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.2.2&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.2.2&#8243;][et_pb_text _builder_version=&#8221;4.4.3&#8243; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<style type='text\/css' media='all'>#rt-tpg-container-4131907616 .rt-holder .rt-woo-info .price{color:#0367bf;}body .rt-tpg-container .rt-tpg-isotope-buttons .selected,\n\t\t\t\t\t#rt-tpg-container-4131907616 .layout12 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-4131907616 .isotope8 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-4131907616 .carousel8 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-4131907616 .layout13 .rt-holder .overlay .post-info,\n\t\t\t\t\t#rt-tpg-container-4131907616 .isotope9 .rt-holder .overlay .post-info,\n\t\t\t\t\t#rt-tpg-container-4131907616.rt-tpg-container .layout4 .rt-holder .rt-detail,\n\t\t\t\t\t.rt-modal-4131907616 .md-content,\n\t\t\t\t\t.rt-modal-4131907616 .md-content > .rt-md-content-holder .rt-md-content,\n\t\t\t\t\t.rt-popup-wrap-4131907616.rt-popup-wrap .rt-popup-navigation-wrap,\n\t\t\t\t\t#rt-tpg-container-4131907616 .carousel9 .rt-holder .overlay .post-info{background-color:#0367bf;}#rt-tpg-container-4131907616 .layout5 .rt-holder .overlay, #rt-tpg-container-4131907616 .isotope2 .rt-holder .overlay, #rt-tpg-container-4131907616 .carousel2 .rt-holder .overlay,#rt-tpg-container-4131907616 .layout15 .rt-holder h3, #rt-tpg-container-4131907616 .isotope11 .rt-holder h3, #rt-tpg-container-4131907616 .carousel11 .rt-holder h3, #rt-tpg-container-4131907616 .layout16 .rt-holder h3,\n\t\t\t\t\t#rt-tpg-container-4131907616 .isotope12 .rt-holder h3, #rt-tpg-container-4131907616 .carousel12 .rt-holder h3 {background-color:rgba(3,103,191,0.8);}#rt-tpg-container-4131907616 .read-more a{border-radius:px;}#rt-tpg-container-4131907616 .rt-img-holder img.rt-img-responsive,#rt-tpg-container-4131907616 .rt-img-holder,\n\t\t\t\t\t#rt-tpg-container-4131907616 .rt-post-overlay .post-img,\n\t\t\t\t\t#rt-tpg-container-4131907616 .post-sm .post-img,\n\t\t\t\t\t#rt-tpg-container-4131907616 .rt-post-grid .post-img,\n\t\t\t\t\t#rt-tpg-container-4131907616 .post-img img {border-radius:px;}<\/style><div class='rt-container-fluid rt-tpg-container tpg-shortcode-main-wrapper ' id='rt-tpg-container-4131907616'   data-layout='layout1' data-grid-style='even' data-desktop-col='4'  data-tab-col='2'  data-mobile-col='1' data-sc-id='5262'><div data-title='Loading ...' class='rt-row rt-content-loader   layout1 tpg-even '><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"14945\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"14945\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/ac-l1-b-1-i\/\">AC.L1-B.1.I Authorized Access Control<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"14949\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"14949\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/ac-l1-b-1-ii\/\">AC.L1-B.1.II Transaction &amp; Function Control<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"14956\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"14956\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/ac-l1-b-1-iii\/\">AC.L1-B.1.III External Connections<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"14968\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"14968\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/ac-l1-b-1-iv\/\">AC.L1-B.1.IV Control Public Information<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"14973\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"14973\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/ia-l1-b-1-v\/\">IA.L1-B.1.V Identification<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"14974\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"14974\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/ia-l1-b-1-vi\/\">IA.L1-B.1.VI Authentication<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"14975\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"14975\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/mp-l1-b-1-vii\/\">MP.L1-B.1.VII Media Disposal<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"15000\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"15000\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/pe-l1-b-1-viii\/\">PE.L1-B.1.VIII Limit Physical Access<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"14976\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"14976\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/pe-l1-b-1-ix\/\">PE.L1-B.1.IX Manage Visitors &amp; Physical Access<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"15001\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"15001\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/sc-l1-b-1-x\/\">SC.L1-B.1.X Boundary Protection<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"15002\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"15002\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/sc-l1-b-1-xi\/\">SC.L1-B.1.XI Public-Access System Separation<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"15003\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"15003\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/si-l1-b-1-xii\/\">SI.L1-B.1.XII Flaw Remediation<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"15026\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"15026\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/si-l1-b-1-xiii\/\">SI.L1-B.1.XIII Malicious Code Protection<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"15027\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"15027\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/si-l1-b-1-xiv\/\">SI.L1-B.1.XIV Update Malicious Code Protection<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"15028\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"15028\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/si-l1-b-1-xv\/\">SI.L1-B.1.XV System &amp; File Scanning<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.2.2&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.2.2&#8243;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.2.2&#8243;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.2.2&#8243;][et_pb_button button_url=&#8221;https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/&#8221; button_text=&#8221;CMMC Level 2&#8243; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.4.3&#8243; custom_button=&#8221;on&#8221; button_bg_color=&#8221;#00208a&#8221; button_icon=&#8221;%%28%%&#8221; button_on_hover=&#8221;off&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_menu menu_id=&#8221;550&#8243; _builder_version=&#8221;4.9.2&#8243;][\/et_pb_menu][et_pb_text disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>CMMC Level 2<\/p><p>Processes: Documented<br \/>Level 2 requires that an organization establish and document practices and policies to guide the implementation of their CMMC efforts. The documentation of practices enables individuals to perform them in a repeatable manner. Organizations develop mature capabilities by documenting their processes and then practicing them as documented.<\/p><p>Practices: Intermediate Cyber Hygiene<br \/>Level 2 serves as a progression from Level 1 to Level 3 and consists of a subset of the security requirements specified in NIST SP 800-171 as well as practices from other standards and references. Because this level represents a transitional stage, a subset of the practices reference the protection of CUI.<\/p><p><a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/\">CMMC Level 1 Controls<\/a><\/p>","_et_gb_content_width":"","footnotes":""},"categories":[327],"tags":[],"class_list":["post-5079","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-maturity-model-certification"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CMMC Level 1 - DIB SCC CyberAssist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CMMC Level 1 - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_menu menu_id=&#8221;550&#8243; _builder_version=&#8221;4.9.2&#8243;][\/et_pb_menu][et_pb_text disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-02T14:48:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-12T13:07:55+00:00\" \/>\n<meta name=\"author\" content=\"markcarr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"markcarr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/\",\"name\":\"CMMC Level 1 - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"datePublished\":\"2020-04-02T14:48:42+00:00\",\"dateModified\":\"2025-03-12T13:07:55+00:00\",\"author\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\"},\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CMMC Level 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\",\"name\":\"markcarr\",\"url\":\"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CMMC Level 1 - DIB SCC CyberAssist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/","og_locale":"en_US","og_type":"article","og_title":"CMMC Level 1 - DIB SCC CyberAssist","og_description":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_menu menu_id=&#8221;550&#8243; _builder_version=&#8221;4.9.2&#8243;][\/et_pb_menu][et_pb_text disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; [&hellip;]","og_url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/","og_site_name":"DIB SCC CyberAssist","article_published_time":"2020-04-02T14:48:42+00:00","article_modified_time":"2025-03-12T13:07:55+00:00","author":"markcarr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"markcarr","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/","url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/","name":"CMMC Level 1 - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"datePublished":"2020-04-02T14:48:42+00:00","dateModified":"2025-03-12T13:07:55+00:00","author":{"@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0"},"breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"CMMC Level 1"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0","name":"markcarr","url":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"markcarr","author_link":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/ndisac.org\/dibscc\/category\/cyberassist\/cybersecurity-maturity-model-certification\/\" rel=\"category tag\">CMMC<\/a>","rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_menu menu_id=&#8221;550&#8243; _builder_version=&#8221;4.9.2&#8243;][\/et_pb_menu][et_pb_text disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; [&hellip;]","_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/5079"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=5079"}],"version-history":[{"count":61,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/5079\/revisions"}],"predecessor-version":[{"id":15790,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/5079\/revisions\/15790"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=5079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/categories?post=5079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tags?post=5079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}