RSI Security

Overview of CMMC Level 5 Requirements

Ecommerce

Welcome to the fifth and final installment of our series on the Cybersecurity Maturity Model Certification (CMMC), a framework required for companies contracting with the US Department of Defense (DoD). In this guide, we’ll break down everything you need to know about CMMC Level 5. For information about other levels of the CMMC, see our guides, levels 1, 2, 3, and 4.

Overview of CMMC Level 5 Requirements

The key to complying with CMMC requirements at all levels is understanding exactly what is required. To that end, this blog (and the whole series) is built around descriptions of all practices for each given level, sourced directly from CMMC Volume 1.02 from March 2020

Since this is the final level, we’ll begin with a more robust overview (or recap) of the CMMC Framework that touches on all its levels in detail, harkening back to our 101 from the very first installment. As a whole, the structure below breaks down as follows:

Let’s get started!

 

Assess your CMMC compliance

 

Final Review of CMMC Framework

The primary function of the CMMC is protecting the supply chain of the DoD. This umbrella term covers companies across a wide range of industries, all of which make up the Defense Industrial Base sector (DIB). If you contract with the DoD, your company is part of the DIB.

Likewise, you also likely transmit, harbor, and process two critical forms of information:

Clause 52.203-21 of the Federal Acquisition Regulation (FAR) details requirements for the protection of FCI. Likewise, Defense Federal Acquisition Regulation Supplement (DFARS) Clause 252.204-7012 specifies security requirements for CUI. These requirements are met in the CMMC by incorporating National Institute for Standards and Technology (NIST) Special Publication 800-171 in its entirety, among other source texts (NIST SP 800-172, etc).

The Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)) is responsible for publishing the CMMC Framework. To build it, it worked together with various DoD stakeholders and industry experts, including University Affiliated Research Centers (UARCs) and Federally Funded Research and Development Centers (FFRDs).

The various controls of the CMMC are distributed across domains, each of which has various controls added across the 5 maturity levels. Let’s take a closer look at the latter first.

Levels, Their Focuses, and Processes

Maturity levels of the CMMC exist to accommodate an organization’s gradual evolution in cybersecurity posture. Rather than expecting institutions to immediately implement all of the CMMC’s controls at once, the framework enables a tiered approach.

At each level, the change in an organization’s cybersecurity maturity is measured by its implementation of practices and its institutionalization of processes.

The level breakdown is as follows:

These levels may apply to the posture of the entire organization, or they may reflect only one part thereof. For example, a company might be at maturity level 1 overall, whereas a subdivision within the company may have advanced to level 3 or higher.

 

Here are a few more articles to help you learn more about CMMC :

 

The 17 Domains of CMMC Security

The practices an organization needs to implement in order to ascend to level 5 are distributed across 17 domains of cybersecurity. These domains, based on NIST’s Federal Information Processing Standards Publication 200 (FIPS), divide the overall scope of cybersecurity into areas of concern, each of which contains capabilities (43 total) to address it.

The domain and capability scheme breaks down as follows:

Not every level contains practices in each domain, but the sum total of practices is cumulative. For example, level 5 does not add any IA controls. Nor does Level 4. Nevertheless, all prior IA practices from levels 1-3 are part of level 5 and thus must be performed, documented, managed, reviewed, and optimized, along with all other new and existing controls at this level.

With that in mind, let’s take a look at the practices that are added at Level 5.

 

Download our CMMC Whitepaper: Best Cybersecurity Practices for DoD Contractors

 

The Final Stage: CMMC Level 5 Controls

As noted above, Level 5 adds the fewest number of practices (just 15) of any level — even fewer than the first (just 17). However, the specific controls added at the final stage are significantly more complex and burdensome than those at prior levels. And, at Level 5, an organization is responsible for the complete implementation and institutionalization of all practices in the CMMC.

Level 4 had seen a shift away from “cyber hygiene” concerns toward protection against Advanced Persistent Threats (APT). That carries over into level 5, where the goal of optimization (specifically optimizing) involves continued, ongoing improvement. CMMC’s notes for process institutionalization highlight the increasing “depth and sophistication” of defenses.

Let’s take a look at the 15 practices introduced, across the 8 domains they pertain to.

 

Level 5 Access Control Practice

There is just 1 final AC control introduced at Level 5:

 

Level 5 Audit and Accountability Practice

There is just 1 final AU control introduced at Level 5:

Level 5 Configuration Management Practice

There is just 1 final CM control introduced at Level 5:

 

Level 5 Incident Response Practices

There are 5 final IR controls introduced at Level 5:

 

Level 5 Recovery Practice

There is just 1 final RE control introduced at Level 5:

 

Level 5 Risk Management Practices

There are 2 final RM controls introduced at Level 5:

 

Level 5 System and Communications Protection Practices

There are 3 final SC controls introduced at Level 5:

 

Level 5 System and Information Integrity Practices

There are 2 final SI controls introduced at Level 5:

 

How to Meet CMMC Level 5 Requirements

Level 5 is the final stage of complete CMMC certification. But it’s less a plateau than a new beginning; the process goal of “optimizing” involves and requires an ongoing commitment to evolving maturity in cyberdefense. That means constantly building on your systems and incorporating new controls to combat new threats as (or before) they arise.

As we’ve touched on in previous installments, CMMC certification is granted by a Certified Third Party Assessment Organization (C3PAO), which itself must be certified by the CMMC Accreditation Body. And the absolute best way to ensure certification is to contract with a C3PAO who will not only grant certification, but also walk you through what it takes to get there.

That’s where RSI Security comes in. We aren’t just a C3PAO; our dedicated suite of CMMC services is both robust and flexible, meeting you where you are and guiding you to certification.

 

Achieve Total Cybersecurity Maturity

RSI Security isn’t just here for your CMMC certification. Our talented team of experts has over a decade of experience helping DoD contractors and other firms keep their stakeholders safe. Whether you need help completing CMMC level 5 certification, achieving compliance with other regulatory guidelines, or with any other element of managed IT, contact RSI Security today!

 


Speak with a CMMC compliance expert today – Schedule a free consultation

Exit mobile version