CMMC maps out five levels of maturity ranging from Basic Cyber Hygiene (Level 1) to Advanced/Progressive (Level 5). Any federal contractor or subcontractor handling federal contract information (FCI) or controlled unclassified information (CUI) will, at the least, be required to meet the requirements of Level 3—Good Cyber Hygiene—at a minimum. Examples of CUI would include any personally identifiable information such as legal material or health documents, technical drawings and blueprints, intellectual property, as well as many other types of data.
CMMC Levels
Source: https://www.acq.osd.mil/cmmc/docs/CMMC_v1.0_Public_Briefing_20200131_v2.pdf
Each level has a unique purpose, as follows:
Level 3 requires that contractors fulfill a total of 130 practices and/or controls; level 5 specifies 171 practices. In addition to meeting these, CMMC also requires an assessment of the contractor’s cybersecurity posture, to ensure the company has the tools, processes, and procedures in place to ensure effective compliance. Now the way in which this will work is still being developed, but it could well be that different contractors need to only reach a certain minimum level in order to work on projects.
Details of the practices, controls, and requirements can be found within the DoD’s original CMMC document released in January.
As CMMC specifies hundreds of controls and practices within the five levels based on 17 domains across the different levels.
We will now delve further into each of these categories and discuss the basic and derived security requirements where SolarWinds® products can help. As we proceed through each control, we differentiate between products that meet the particular process control and products that partially support or may meet process control depending on product configuration, setup of supporting processes, adherence to best practices, proper usage of tooling, and training of individual contributors. We will just refer to domains and capabilities where SolarWinds products meet process or support to do so.
CMMC is based on five levels, with Level 1 being “Basic Cyber Hygiene” where processes are performed at a minimum in an ad-hoc manner.
The domain Access Control (AC) focuses on:
C001 Establish system access requirements
AC.1.001
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
The following SolarWinds products meet the AC.1.001 process control:
The following SolarWinds products support and may meet the AC.1.001 protocol:
C002 Control internal system access
AC.1.002
Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
The following SolarWinds products meet the AC.1.002 process control:
The following SolarWinds products support and may meet the AC.1.002 protocol:
C004 Limit data access to authorized users and processes
AC.1.003
Verify and control/limit connections to and use of external information systems.
The following SolarWinds products meet the AC.1.003 process control:
The following SolarWinds products support and may meet the AC.1.003 protocol:
AC.1.004
Control information posted or processed on publicly accessible information systems.
The following SolarWinds products meet the AC.1.004 process control:
The following SolarWinds products support and may meet the AC.1.004 protocol:
C015 Grant access to authenticated entities
IA.1.076
Identify information system users, processes acting on behalf of users, or devices.
The following SolarWinds products meet the IA.1.076 process control:
The following SolarWinds products support and may meet the IA.1.076 protocol:
C015 Grant access to authenticated entities
IA.1.077
Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.
The following SolarWinds products meet the IA.1.077 process control:
The following SolarWinds products support and may meet the IA.1.077 protocol:
C028 Limit physical access
PE.1.133
Maintain audit logs of physical access.
The following SolarWinds products support and may meet the PE.1.133 protocol:
C039 Control communications at system boundaries
SC.1.175
Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.
The following SolarWinds products meet the SC.1.175 process protocol:
The following SolarWinds products support and may meet the SC.1.175 protocol:
C039 Control communications at system boundaries
SC.1.176
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
The following SolarWinds products meet the SC.1.176 process protocol:
The following SolarWinds products support and may meet the SC.1.176 protocol:
C040 Identify and manage information system flaws
SI.1.210
Identify, report, and correct information and information system flaws in a timely manner.
The following SolarWinds products meet the SI.1.210 process protocol:
The following SolarWinds products support and may meet the SI.1.210 protocol:
C041 Identify malicious content
SI.1.211
Provide protection from malicious code at appropriate locations within organizational information systems.
The following SolarWinds products meet the SI.1.211 process protocol:
The following SolarWinds products support and may meet the SI.1.211 protocol:
C041 Identify malicious content
SI.1.212
Update malicious code protection mechanisms when new releases are available.
The following SolarWinds products meet the SI.1.212 process protocol:
The following SolarWinds products support and may meet the SI.1.212 protocol:
C041 Identify malicious content
SI.1.213
Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
The following SolarWinds products meet the SI.1.213 process protocol:
The following SolarWinds products support and may meet the SI.1.213 protocol:
Below you find links to all products mentioned:
- Network Monitoring and Management
- Systems Monitoring and Management
- Database Performance Monitoring
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
SolarWinds solutions are rooted in our deep connection to our user base in the THWACK® online community. More than 150,000 members are here to solve problems, share technology and best practices, and directly contribute to our product development process.