Cybersecurity, Privacy, & AI

Trending Now
AI May Revive Old-School Tradecraft Even as It Transforms Intelligence Work • Agency CIOs Must Supply Top-Down IT Contract Information, OMB Memo States • OPM Isn’t Using Its Own Dashboard for Cyber Workforce Planning • Enhancing Security Operations Builds on Zero Trust: Strengthening National Security Through Deception • Attack on Axios Software Developer Tool Threatens Widespread Compromises

DoD Preps – Then Withdraws – Updated Plan for CMMC 2.0

LeoWolfert | Shutterstock

The Department of Defense prepared and then withdrew a statement outlining a path forward for the Cybersecurity Maturity Model Certification. The original notice, expected to be published in the Federal Register Friday morning, suggested DoD would scale back the program and halt implementation, including new contract language, until the changes were finalized.

“Until the CMMC 2.0 changes become effective through both the title 32 CFR and title 48 CFR rulemaking processes, the department will suspend the CMMC piloting efforts, and will not approve inclusion of a CMMC requirement in DoD solicitations,” DoD wrote in the statement. “The CMMC 2.0 program requirements will not be mandatory until the title 32 CFR rulemaking is complete, and the CMMC program requirements have been implemented as needed into acquisition regulation through title 48 rulemaking.”

The statement was later withdrawn from publication in the Federal Register.

According to the initial notice, CMMC 2.0 would be scaled back to three certification levels, including a self-certification at level 1. Level 2 contractors would be designated as priority or non-priority acquisitions, with the latter also avoiding an independent third-party assessment. DoD did not announce any qualifications for the third and highest level.

CMMC 2.0 also would rely solely on NIST Special Publication 800-171, eliminating any additional controls, including CMMC-unique practices and all maturity processes. The updated model also would allow for DoD to accept plans of action and milestones and to develop a general waiver process.

Sources: 

Stay compliant and protected with daily updates on cybersecurity, data privacy, and federal oversight with our Cyber & Privacy newsletter, delivering up-to-the-minute intelligence Monday–SaturdaySubscribe here.