Secure Your Business and Defense Contracts

Get backup from our team of security and compliance experts to prepare your organization for meeting CMMC standards.

CMMC

Cybersecurity Maturity Model Certification

What is the CMMC?

Level up your security program to meet future DOD requirements

The Cybersecurity Maturity Model Certification is the government’s way of keeping tabs on the security of its potential defense vendors. It provides a mechanism for the DOD to ensure their vendors are ready to work with the department. It focuses on certifying the “maturity” and “capability” of each DOD vendor’s security processes, practices, and methods. It also helps set goals and priorities for them to make improvements. The DOD will add CMMC levels to each RFP, meaning vendors who don’t possess mature enough processes may not even be allowed to submit for that proposal.

CMMC Levels and Requirements

How can we help?

Speak with one of our CMMC registered practitioners to get started on your path to compliance.

CONTACT US

How does FRSecure approach CMMC?

The CMMC is based off of industry standards that we already use in our unique risk assessment scoring methodology. Overlaying your risk assessment results to the five CMMC levels, your organization will quickly be able to see where it stands in each of the levels. Knowing what level you want or need to be at and how you scored there, we’ll look to see where the gaps in compliance are—and then provide you with a roadmap and dedicated security resource to make sure you get to that point by the time the requirements take effect.

Risk Assessment

Risk Assessment

Risk assessments measure four controls of your security program and maps those to CMMC standards.

Gap Assessment

Gap Assessment

We will determine where you fall short of CMMC compliance and tell you how to fill gaps in order to meet requirements.

Virtual CISO

Virtual CISO

A security expert in your back pocket, virtual CISOs provide a dedicated security resource to help grow your security program.

Roadmapping

Roadmapping

Roadmaps provide a detailed plan to help your organization get from its current point to one that meets certification.

Registered Provider

CMMC Levels

The most basic level of the CMMC, level one focuses on keeping Federal Contract Information (FCI) protected. Effectively, if you provide a good or service to the US Government, they may ask that you safeguard the contract information so that it stays confidential.

A step up from the basic safeguarding of contractual information, level two focuses on the documentation of policies and practices. It’s expected that level two contractors have a documented process for safeguarding information and that they practice those processes repeatedly.

Controlled Unclassified Information (CUI) is the emphasis for level three contractors. They’ll be expected to be able to develop and maintain a plan to mitigate threats that includes things like goals, project plans, resources, training, and more.

Level four is meant for measuring the effectiveness of the plan from level three. Level four contractors will review their security practices and find gaps they can improve or correct—increasing the protection of CUI and start reducing the risk of Advanced Persistent Threats (APTs).

Once the plan is in place and practiced, it’s reviewed, and the inefficiencies in the plan are identified, level five is the next step. Contractors in level five are expected to standardize and implement their plan and practices across the whole organization to further minimize APTs.

CMMC FAQ

The CMMC was created by the US Department of Defense as a way to have more control over their vendor and contractor security.

The DOD is going to create 10 RFPs with CMMC requirements in June of 2020 and then will slowly roll them out to all RFPs by the year 2026.

If you’re a part of the DOD’s supply chain or if you’re a service provider for the DOD, this will need to be something you comply with. Every contract the DOD enters will eventually have CMMC requirements. It’s anticipated that 350,000 vendors down the supply chain of the DOD will be impacted by this.

Your CMMC requirements will depend on the type of contract you’re trying to participate in. With five levels of increasing security controls, it’s likely that the impact of the contract on the defense industry will decide which of the five levels you’ll need to comply with.

The CMMC model consists of 17 domains stemming from areas in Federal Information Processing Standards (FIPS) Publication 200, Federal Acquisition Regulation (FAR) 52.204-21., and NIST SP 800-171. CMMC also includes asset management, recovery, and situational awareness.

There are 173 controls that will be assessed in CMMC Level Five and it contains all of the controls for levels one through four as well. The best way to ensure compliance with the CMMC model is figure out which level your contract is likely to require, conduct an information security risk assessment that maps to the standards/controls, and then work on remediating the control gaps.

“PGC has worked with FRSecure since late 2013. We have utilized their services for information security risk assessments, virtual CISO services, NIST standard process implementation, and training programs. FRSecure staff are knowledgeable, thorough, and helpful in allowing us to achieve our goal of supporting customers who serve the aerospace and military industries. We highly recommend FRSecure. You will be delighted with their offerings and results.”
Owner
PGC

The FRSecure Way

Why work with FRSecure?

Expertise

FRSecure has been in business for over 10 years, and our team has more than 300 years of combined experience working in information security and boasts 30 different kinds of certifications. When it comes to growing a security program that complies with CMMC, you have the benefit of experience in your corner.

Mission

Our mission at FRSecure is to fix the broken information security industry. Not only do we help comply with the CMMC, but we also solve as many weaknesses as we can in your security environment. We are dedicated to making real, lasting, impactful changes to your security program.

Style

Our style isn’t “cookie cutter.” We recognize that each organization is different, and every security program is at a different stage of maturity. We get to know your security program intimately, use an information security risk assessment to determine what your strengths and weaknesses are, and then apply industry best practices to provide the next steps that’ll help you comply with CMMC.

Focus

Information security is all we do. We don’t do IT, sell hardware, or provide telco services. We only do security. Because of this, our team can provide unbiased recommendations that will actually make a dramatic impact to the way you do security. We work hard to be a partner—collaborating with and educating your team every step of the way.

“FRSecure wants to make sure that they give you exactly what you need, and that’s the primary reason that I went back to them. They really offer you very personal instruction and guidance.”
Senior IS Officer
First National Minnesota Bank

We are open for new projects

Need help meeting CMMC requirements? Let's Talk!