<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>ECURON</title>
	<atom:link href="https://www.ecuron.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ecuron.com</link>
	<description>Information and Cybersecurity Consulting - CMMC RPO</description>
	<lastBuildDate>Mon, 18 May 2026 18:24:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.ecuron.com/wp-content/uploads/favicon.png</url>
	<title>ECURON</title>
	<link>https://www.ecuron.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>GSA&#8217;s New CUI Requirements: What CMMC Contractors Need to Know</title>
		<link>https://www.ecuron.com/gsa-cui-requirements-cmmc/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 18 May 2026 18:21:48 +0000</pubDate>
				<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[GSA]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=2371</guid>

					<description><![CDATA[GSA&#8217;s New CUI Requirements: What CMMC Contractors Need to Know Published: May 18, 2026 On January 5, 2026, the U.S. General Services Administration (GSA) signed Revision 1 of an internal IT security procedural guide titled Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations Process — document number CIO-IT Security-21-112. The guide establishes a [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1><strong>GSA&#8217;s New CUI Requirements: What CMMC Contractors Need to Know</strong></h1>
<p><em>Published: May 18, 2026</em></p>
<p>On January 5, 2026, the U.S. General Services Administration (GSA) signed Revision 1 of an internal IT security procedural guide titled <em>Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations Process</em> — document number CIO-IT Security-21-112. The guide establishes a formal, evidence-based approval process for civilian contractors whose systems process, store, or transmit GSA Controlled Unclassified Information (CUI), built on a different NIST baseline than the Department of Defense&#8217;s (DoD) Cybersecurity Maturity Model Certification (CMMC) program.</p>
<p>There was no press release. No Federal Register notice. No notice-and-comment rulemaking. No contractor awareness campaign. For weeks after it was signed, the document existed in the way most agency procedural guides exist — as a PDF on a website, findable if you knew to look for it.</p>
<p>Then law firms started noticing.</p>
<p>By early February, Davis Wright Tremaine, Blank Rome, Ward &amp; Berry, Robinson+Cole, and others had published client alerts flagging the document as a meaningful shift in GSA CUI requirements, in how GSA evaluates contractor cybersecurity. Washington Technology ran an opinion piece making the same point bluntly: the document did not go through traditional rulemaking, was not accompanied by press releases or agency outreach, and as a result many contractors remained unaware it existed.</p>
<p>&nbsp;</p>
<p>That is still true today. So let us try to fix it.</p>
<p>This article explains what changed, why it matters specifically for contractors who already hold or are pursuing CMMC Level 2 certification, and where the budget and timeline pressure hits.</p>
<p><strong>This blog post covers:</strong></p>
<ul>
<li><a href="#what-is-cio-it-security-21-112-rev-1">What Is CIO-IT Security-21-112 Rev. 1?</a></li>
<li><a href="#why-this-is-not-just-cmmc-but-at-gsa">Why This Is Not Just &#8220;CMMC, but at GSA&#8221;</a></li>
<li><a href="#what-are-the-differences-that-will-actually-consume-budget">What Are the Differences That Will Actually Consume Budget?</a></li>
<li><a href="#what-can-you-reuse-if-you-are-already-cmmc-level-2">What Can You Reuse If You Are Already CMMC Level 2?</a></li>
<li><a href="#what-cmmc-does-not-prepare-you-for">What CMMC Does Not Prepare You For</a></li>
<li><a href="#what-should-you-do-this-quarter">What Should You Do This Quarter?</a></li>
<li><a href="#frequently-asked-questions">Frequently Asked Questions</a></li>
</ul>
<h2 id="what-is-cio-it-security-21-112-rev-1"><strong>What Is CIO-IT Security-21-112 Rev. 1?</strong></h2>
<p>CIO-IT Security-21-112 Rev. 1 is a GSA procedural guide that establishes a five-phase approval process for nonfederal contractor systems that handle GSA CUI. It applies to systems that process, store, or transmit GSA CUI — provided the contractor is not operating or maintaining that system on behalf of a federal agency, which would route to FISMA and FedRAMP instead.</p>
<p>The five phases — Prepare, Document, Assess, Authorize, Monitor — are derived from the NIST Risk Management Framework (RMF) and adapted for contractor environments.</p>
<p>The technical baseline is:</p>
<ul>
<li><strong>NIST SP 800-171 Revision 3</strong> for security requirements</li>
<li><strong>NIST SP 800-172 Revision 3</strong> for selected enhanced requirements</li>
<li><strong>NIST SP 800-53 Revision 5</strong> for selected privacy controls (where PII is in scope)</li>
</ul>
<p>The outcome of a successful path through the five phases is a Memorandum for Record (MFR) signed by the GSA Chief Information Security Officer (CISO) — not an Authority to Operate in the traditional NIST SP 800-37 sense, but functionally an approval that the contractor&#8217;s system is acceptable for handling GSA CUI.</p>
<p>This is not a regulation. It is internal agency guidance. But its practical effect is the same: contractors must comply to remain eligible for GSA contracts involving CUI. Contracting officers can apply it immediately to new solicitations, and GSA has not provided a transition period.</p>
<h2 id="why-this-is-not-just-cmmc-but-at-gsa"><strong>Why This Is Not Just &#8220;CMMC, but at GSA&#8221;</strong></h2>
<p>If you read the document expecting a civilian version of CMMC, you will misread it. The differences run deeper than the agency name on the cover page.</p>
<p><strong>Different NIST baseline.</strong> CMMC Level 2 assesses against NIST SP 800-171 Revision 2 — 110 requirements organized across 14 families. The DoD made an explicit choice to hold CMMC at Revision 2 even after Revision 3 was published, because Revision 3 dropped during CMMC&#8217;s ramp-up and DoD did not want to move the goalposts mid-program. GSA made the opposite choice. CIO-IT Security-21-112 Rev. 1 is built on Revision 3, which restructured, consolidated, and in some cases removed Revision 2 requirements. The result: a System Security Plan (SSP) written for CMMC cannot simply be relabeled for GSA. The requirement identifiers are different. Some requirements have been merged. Many new Organizationally Defined Parameters (ODPs) need explicit assignment in the GSA System Security and Privacy Plan (SSPP) that did not exist in the CMMC version.</p>
<p><strong>Different outcome model.</strong> CMMC produces a point score — 88 out of 110 minimum for Conditional, 110 for Final — entered into the Supplier Performance Risk System (SPRS), with a Certificate of CMMC Status valid for three years. GSA produces a binary judgment from the CISO based on a documentation package and an independent assessor&#8217;s report. There is no score. There is no certificate. There is the MFR, tied to the specific system offering, not portable to other GSA work.</p>
<p><strong>Different timeline posture.</strong> CMMC has a phased rollout running through 2028. GSA&#8217;s guide contains no transition period. Contracting officers can apply it immediately.</p>
<p><strong>No reciprocity.</strong> The GSA document does not mention CMMC. It does not mention reciprocity. It does not mention the DoD assessment ecosystem. The independent assessor must be a FedRAMP-accredited Third-Party Assessment Organization (3PAO) or an assessment organization specifically approved by GSA&#8217;s Office of the Chief Information Security Officer (OCISO) — and as of this writing, GSA has not published the criteria for that second path or a list of accepted assessors outside the FedRAMP ecosystem.</p>
<h2 id="what-are-the-differences-that-will-actually-consume-budget"><strong>What Are the Differences That Will Actually Consume Budget?</strong></h2>
<p>The NIST SP 800-171 version mismatch of is the conceptually largest difference. The differences below are the ones that will eat hours.</p>
<h3><strong>One-Hour Incident Reporting</strong></h3>
<p>Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 — the clause CMMC contractors operate under — gives a contractor 72 hours from discovery to report a cyber incident via DIBNet. GSA&#8217;s guide requires reporting to the GSA Incident Response team, the Information System Security Officer (ISSO), the Information System Security Manager (ISSM), and the Contracting Officer&#8217;s Representative (COR) within one hour of identification by the contractor&#8217;s Computer Security Incident Response Team (CSIRT), Security Operations Center (SOC), or IT department.</p>
<p>The guide is explicit: do not delay reporting to collect additional details.</p>
<p>A DoD-tuned incident response playbook built around 72-hour triage will not satisfy GSA without rework. Plan a tabletop exercise. Plan an on-call rotation that can credibly produce a notification inside one hour.</p>
<h3><strong>Nine Showstoppers, No POA&amp;M</strong></h3>
<p>Appendix C of the GSA guide lists nine specific NIST SP 800-171 Rev. 3 requirements that must be fully implemented before approval:</p>
<ul>
<li>Access enforcement</li>
<li>Remote access</li>
<li>Multi-factor authentication</li>
<li>Vulnerability monitoring</li>
<li>Boundary protection</li>
<li>Transmission and storage confidentiality</li>
<li>Cryptographic protection</li>
<li>Flaw remediation</li>
<li>Unsupported system components</li>
</ul>
<p>CMMC has a broader list of requirements weighted at 5 points that cannot be addressed through a Plan of Action and Milestones (POA&amp;M), but two of GSA&#8217;s showstoppers — vulnerability monitoring and unsupported system components — are treated less strictly in CMMC scoring. CMMC-certified contractors with weak posture in those two areas need to know that ahead of the GSA assessment, not during it.</p>
<h3><strong>Continuous Monitoring on GSA&#8217;s Calendar</strong></h3>
<p>GSA imposes a specific deliverable cadence tied to the federal fiscal year:</p>
<ul>
<li><strong>Quarterly:</strong> Vulnerability scan reports and POA&amp;M updates due the last workday of November, February, May, and August</li>
<li><strong>Annually:</strong> SSPP refresh, Privacy Threshold Assessment (PTA) / Privacy Impact Assessment (PIA) refresh, and recommended penetration testing due the last workday of July</li>
<li><strong>Every three years:</strong> Full independent reassessment</li>
</ul>
<p>CMMC requires an annual senior-executive affirmation and reassessment every three years — but it does not specify quarterly deliverable formats on calendar deadlines. The administrative overhead of running GSA&#8217;s continuous monitoring cadence in parallel with CMMC&#8217;s affirmation cycle is non-trivial and should be staffed accordingly.</p>
<h3><strong>Documentation Rework</strong></h3>
<p>The GSA SSPP template, Architecture Review Checklist, Integrated Inventory / Leveraged &amp; External Services Workbook, Privacy Threshold Assessment, Privacy Impact Assessment (conditional), and Supply Chain Risk Management Plan are GSA-specific deliverables. Most CMMC-aligned content can be repurposed, but the rewrite is real.</p>
<p>GSA&#8217;s Appendix E sets explicit style expectations — active voice, full who/what/when/where/how narrative, no copy-pasted boilerplate, no &#8220;such as&#8221; without specifics, no document citations without title, version, date, and section. CMMC SSPs that lean on policy citations will need real implementation prose.</p>
<h3><strong>A New Privacy Stack</strong></h3>
<p>CMMC has no privacy analog. GSA requires a Privacy Threshold Assessment in every case, plus a Privacy Impact Assessment if Personally Identifiable Information (PII) is in scope. Both have GSA-specific templates and route through the GSA Chief Privacy Officer.</p>
<h2 id="what-can-you-reuse-if-you-are-already-cmmc-level-2"><strong>What Can You Reuse If You Are Already CMMC Level 2?</strong></h2>
<p>The picture is not entirely additive. A CMMC-certified contractor has a meaningful head start.</p>
<p><strong>Implementation narratives at the technical level.</strong> Most of what you wrote for CMMC describes the same requirement universe, even if the numbering changed between Revision 2 and Revision 3.</p>
<p><strong>Architecture diagrams.</strong> These will need enrichment to meet GSA&#8217;s eight-item checklist — predominant border, ingress/egress detail, FedRAMP-authorization status of leveraged services, prohibited-vendor declaration, authentication-points-with-MFA labeling, and a ports/protocols table with eight specific columns — but the foundational diagrams exist.</p>
<p><strong>Scan reports.</strong> If recent and authenticated, these carry forward.</p>
<p><strong>Inventory data.</strong> Reformatting into GSA&#8217;s workbook structure is required, but the underlying asset data should already be documented.</p>
<p><strong>Your Certified Third-Party Assessor Organization (C3PAO) relationship.</strong> If your C3PAO is also FedRAMP-accredited, they may be able to perform the GSA-aligned assessment as well. Many are. Confirm in writing.</p>
<p><strong>A FedRAMP-authorized cloud underlay.</strong> GSA explicitly treats FedRAMP-authorized Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) more favorably. Non-FedRAMP-authorized cloud services route through a case-by-case GSA risk evaluation.</p>
<h2 id="what-cmmc-does-not-prepare-you-for"><strong>What CMMC Does Not Prepare You For</strong></h2>
<p>Even with a strong CMMC foundation, several GSA requirements will be new:</p>
<ul>
<li><strong>A two-stage SSPP submission cycle.</strong> GSA requires CISO concurrence twice — once on architecture and showstoppers, once on the complete SSPP — before the independent assessment can begin.</li>
<li><strong>A signed Security Assessment Plan from GSA before any testing starts.</strong> Assessments performed without GSA&#8217;s signed plan are at risk of being rejected.</li>
<li><strong>The privacy deliverables and the Supply Chain Risk Management Plan.</strong> These have no CMMC equivalent.</li>
<li><strong>The quarterly continuous monitoring deliverable rhythm.</strong> CMMC&#8217;s annual affirmation does not prepare you for GSA&#8217;s calendar-driven reporting cadence.</li>
<li><strong>The one-hour incident reporting clock.</strong> Moving from 72 hours to one hour is not a procedural adjustment. It is an operational redesign.</li>
</ul>
<h2 id="what-should-you-do-this-quarter"><strong>What Should You Do This Quarter?</strong></h2>
<p>If you hold a GSA contract or are pursuing one that may involve CUI, these steps apply now.</p>
<ol>
<li><strong> Confirm applicability.</strong> Ask your contracting officer whether they intend to apply CIO-IT Security-21-112 Rev. 1. Do not assume. The guide is procedural, not regulatory, so application is discretionary at the contract level.</li>
<li><strong> Read Appendix C.</strong> Nine showstopper items. Know whether you can pass all nine today.</li>
<li><strong> Update your incident response playbook.</strong> Build a one-hour reporting branch for GSA engagements. Run a tabletop exercise within 30 days.</li>
<li><strong> Inventory your CMMC artifacts against GSA&#8217;s deliverable list.</strong> Decide what gets rewritten, what gets reformatted, and what gets built new.</li>
<li><strong> Talk to your C3PAO.</strong> Determine whether they will perform a GSA-aligned assessment as well, and what evidence reuse is available.</li>
</ol>
<p>The story of this document is not that GSA introduced something contractors could not have predicted. The technical baseline is NIST SP 800-171, which contractors have been working with for years. The story is that it landed without notice — and the contractors who are best positioned to comply are the ones who find out earliest and budget accordingly.</p>
<p>If you missed the announcement, you were not paying poor attention. There was not one.</p>
<h2 id="frequently-asked-questions"><strong>Frequently Asked Questions</strong></h2>
<h4><strong>What is CIO-IT Security-21-112?</strong></h4>
<p>CIO-IT Security-21-112 Rev. 1 is a GSA procedural guide signed January 5, 2026, that establishes a five-phase approval process for contractor systems handling GSA CUI. It requires contractors to demonstrate compliance with NIST SP 800-171 Revision 3, selected NIST SP 800-172 requirements, and where applicable, NIST SP 800-53 privacy controls. The outcome is a Memorandum for Record from the GSA CISO approving the system.</p>
<h4><strong>Does CIO-IT Security-21-112 apply to all GSA contractors?</strong></h4>
<p>No. It applies only to nonfederal contractor systems that process, store, or transmit GSA CUI — and only when specifically incorporated into a solicitation or contract. Contracting officers can apply it at their discretion. If your GSA contract does not involve CUI, this guide does not apply.</p>
<h4><strong>Does CMMC certification satisfy GSA&#8217;s CUI requirements?</strong></h4>
<p>No. GSA&#8217;s guide does not mention CMMC, reciprocity, or the DoD assessment ecosystem. CMMC Level 2 is built on NIST SP 800-171 Revision 2. GSA&#8217;s framework is built on Revision 3. A CMMC certification does not substitute for the GSA approval process, though much of your underlying work can be reused.</p>
<h4><strong>What is the biggest difference between CMMC and GSA&#8217;s CUI framework?</strong></h4>
<p>Several differences matter, but the most operationally disruptive are the one-hour incident reporting requirement (versus CMMC&#8217;s 72-hour window under DFARS 252.204-7012), the nine showstopper requirements that cannot be addressed through a POA&amp;M, and the quarterly continuous monitoring deliverable cadence.</p>
<h4><strong>Who can perform the independent assessment for GSA?</strong></h4>
<p>A FedRAMP-accredited 3PAO or an assessment organization specifically approved by GSA OCISO. As of this writing, GSA has not published approval criteria or a list of accepted assessors outside the FedRAMP ecosystem. If your C3PAO is also FedRAMP-accredited, they may qualify. Confirm directly.</p>
<h4><strong>Is there a transition period for GSA&#8217;s CUI requirements?</strong></h4>
<p>No. Unlike CMMC, which has a phased rollout through 2028, GSA&#8217;s guide contains no transition period. Contracting officers can incorporate it into new solicitations immediately.</p>
<h4><strong>Does GSA&#8217;s framework affect DoD contractors?</strong></h4>
<p>Not directly. CIO-IT Security-21-112 applies to GSA contracts specifically. However, contractors who hold both GSA and DoD contracts involving CUI will need to maintain compliance with both frameworks simultaneously — against different NIST baselines, with different assessment processes, and on different reporting schedules.</p>
<h4><strong>What should I do first if this applies to my organization?</strong></h4>
<p>Confirm with your contracting officer whether CIO-IT Security-21-112 Rev. 1 will be incorporated into your contract. Then read Appendix C to determine whether you can meet all nine showstopper requirements today. These two steps will tell you the scale of effort required.</p>
<h2><strong>Where Ecuron Can Help</strong></h2>
<p>Understanding how these two frameworks interact — and where the gaps are between CMMC readiness and GSA approval — requires more than a checklist. It requires understanding how information flows through your environment, which systems are in scope for each framework, and where your documentation and evidence need to be extended rather than duplicated.</p>
<p>Scoping is the foundation. You cannot evaluate your readiness against GSA&#8217;s requirements until you understand where CUI lives in your environment and which systems are in scope for each framework. If you also hold DoD contracts, the scoping boundaries may differ — and getting that wrong creates compliance gaps in both directions.</p>
<p>If you hold or pursue contracts with both DoD and GSA, contact us at <a href="mailto:cmmc@ecuron.com">cmmc@ecuron.com</a> to discuss how your current CMMC posture maps to GSA&#8217;s requirements and where the real gaps are likely to be.</p>
<p><em>Ecuron is a Registered Provider Organization (RPO) authorized by the Cyber AB to provide CMMC consulting services. Our recommendations are based entirely on what your organization needs — we do not sell or resell any tools or services. Learn more about our <a href="https://www.ecuron.com/cybersecurity-services/cmmc-consulting-service/">5-step methodology</a> for CMMC certification preparation.</em></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NIST SP 800-172 Revision 3 Is Final: What It Means for CMMC Level 2 and Level 3</title>
		<link>https://www.ecuron.com/nist-sp-800-172-revision-3-cmmc/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 16 May 2026 19:44:37 +0000</pubDate>
				<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CUI]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=2361</guid>

					<description><![CDATA[NIST SP 800-172 Revision 3 Is Final: What It Means for CMMC Level 2 and Level 3 Published: May 15, 2026 NIST SP 800-172 Revision 3 is the updated set of enhanced security requirements for protecting Controlled Unclassified Information (CUI) associated with critical programs and high-value assets. Published on May 13, 2026, it replaces the [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1><strong>NIST SP 800-172 Revision 3 Is Final: What It Means for CMMC Level 2 and Level 3</strong></h1>
<p><em>Published: May 15, 2026</em></p>
<p>NIST SP 800-172 Revision 3 is the updated set of enhanced security requirements for protecting Controlled Unclassified Information (CUI) associated with critical programs and high-value assets. Published on May 13, 2026, it replaces the original SP 800-172 from February 2021 and significantly expands the scope and scale of requirements that may eventually form the basis for a revised CMMC Level 3.</p>
<p>This matters for every defense contractor tracking the Cybersecurity Maturity Model Certification (CMMC) program — not just those pursuing Level 3. Today&#8217;s publication completes the set of revised NIST baselines that the Department of Defense (DoD) would need to update CMMC through rulemaking. That has implications for Level 2 contractors as well.</p>
<p>This article explains what changed, what it means for CMMC, and what defense contractors should be doing now.</p>
<h3>In This Article</h3>
<ul>
<li><a href="#what-is-nist-sp-800-172">What Is NIST SP 800-172?</a></li>
<li><a href="#what-changed-in-revision-3">What Changed in Revision 3?</a></li>
<li><a href="#does-this-change-current-cmmc-requirements">Does This Change Current CMMC Requirements?</a></li>
<li><a href="#why-this-publication-matters-for-cmmc-rulemaking">Why This Publication Matters for CMMC Rulemaking</a></li>
<li><a href="#why-the-level-3-impact-deserves-attention">Why the Level 3 Impact Deserves Attention</a></li>
<li><a href="#what-does-this-mean-for-level-2-contractors">What Does This Mean for Level 2 Contractors?</a></li>
<li><a href="#what-should-defense-contractors-do-now">What Should Defense Contractors Do Now?</a></li>
<li><a href="#frequently-asked-questions">Frequently Asked Questions</a></li>
</ul>
<h2 id="what-is-nist-sp-800-172"><strong>What Is NIST SP 800-172?</strong></h2>
<p>NIST SP 800-172 provides enhanced security requirements designed to supplement NIST SP 800-171. While SP 800-171 establishes the baseline for protecting CUI in nonfederal systems, SP 800-172 adds requirements specifically intended to defend against Advanced Persistent Threats (APTs) — sophisticated, nation-state-level cyber threats targeting CUI associated with critical programs or high-value assets.</p>
<p>Under the current CMMC framework, codified in 32 CFR Part 170, the DoD selected 24 of the original 39 SP 800-172 requirements as the basis for CMMC Level 3 certification. Level 3 assessments are conducted by the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC) and apply to fewer than 1% of defense contractors in the Defense Industrial Base (DIB).</p>
<p>NIST also published SP 800-172A Revision 3 alongside the main publication. SP 800-172A provides the assessment procedures used to evaluate whether organizations have effectively implemented the enhanced requirements. Both publications are available on the NIST Computer Security Resource Center:</p>
<ul>
<li><a href="https://csrc.nist.gov/pubs/sp/800/172/r3/final" target="_blank" rel="noopener">NIST SP 800-172 Rev. 3</a></li>
<li><a href="https://csrc.nist.gov/pubs/sp/800/172/a/r3/final" target="_blank" rel="noopener">NIST SP 800-172A Rev. 3</a></li>
</ul>
<h2 id="what-changed-in-revision-3"><strong>What Changed in Revision 3?</strong></h2>
<p>The scope of this revision is significant.</p>
<p>The original SP 800-172 (February 2021) contained 39 enhanced security requirements focused on protecting the confidentiality of CUI. Revision 3 expands the framework to cover confidentiality, integrity, and availability — a fundamental shift in scope. Early analysis from the community suggests the requirement count has grown to approximately 115, with roughly 80 of those being new.</p>
<p>If those numbers hold, this is closer to a redesign than a revision.</p>
<p>The revision also introduces a substantial number of new Organizationally Defined Parameters (ODPs), which allow organizations and agencies to tailor certain requirements to their specific environments. The assessment procedures in SP 800-172A Revision 3 have been expanded accordingly.</p>
<p>Three structural themes define this revision:</p>
<h4><strong>Penetration-resistant architecture</strong></h4>
<p>Requirements designed to make systems inherently more difficult to compromise, rather than relying solely on detection and response.</p>
<h4><strong>Damage-limiting operations</strong></h4>
<p>Practices that constrain what an adversary can achieve even after gaining initial access — limiting lateral movement, reducing blast radius, and isolating critical assets.</p>
<h4><strong>Cyber resiliency</strong></h4>
<p>Requirements focused on the ability to continue operating and recover during sustained attacks, reflecting the reality that sufficiently motivated adversaries will eventually breach perimeter defenses.</p>
<h2 id="does-this-change-current-cmmc-requirements"><strong>Does This Change Current CMMC Requirements?</strong></h2>
<p>No. Nothing changes operationally right now.</p>
<p>CMMC Level 2 is still assessed against NIST SP 800-171 Revision 2. CMMC Level 3 is still assessed against the 24 requirements DoD selected from the original SP 800-172 (February 2021), as specified in 32 CFR Part 170. NIST publishing revised standards does not automatically update the CMMC program. The DoD would need to go through formal rulemaking to adopt either revised baseline.</p>
<p>This distinction matters. Contractors preparing for CMMC Level 2 or Level 3 today should continue working against the current assessment baselines. The revised NIST publications represent where the framework is heading, not where it is today.</p>
<h2 id="why-this-publication-matters-for-cmmc-rulemaking"><strong>Why This Publication Matters for CMMC Rulemaking</strong></h2>
<p>Here is what makes today&#8217;s publication significant from a rulemaking perspective: both updated baselines are now final.</p>
<p>NIST SP 800-171 Revision 3 was finalized in May 2024. NIST SP 800-172 Revision 3 is finalized as of May 13, 2026. That means DoD now has the option to update CMMC Level 2 and Level 3 requirements simultaneously through a single rulemaking process, rather than two separate efforts.</p>
<p>This may be one of the reasons DoD has not yet initiated rulemaking for SP 800-171 Revision 3 at Level 2. Updating one level while the other still referenced an older framework generation would have created an awkward mismatch — Level 2 on Revision 3 while Level 3 still pointed to Revision 2 publications. With both Revision 3 publications now complete, a unified update becomes possible.</p>
<p>DoD has published ODPs for NIST SP 800-171 Revision 3 already &#8211; the last missing piece is the list of ODPs for NIST SP 800-172 Revision 2. Howewever, this should not prevent start of rulemaking.</p>
<p>As of today, no timeline for rulemaking has been announced. But the building blocks are now in place.</p>
<h2 id="why-the-level-3-impact-deserves-attention"><strong>Why the Level 3 Impact Deserves Attention</strong></h2>
<p>The potential scale of change at Level 3 is substantial.</p>
<p>Currently, CMMC Level 3 requires 24 enhanced security requirements selected from the original 39 in SP 800-172 — approximately two-thirds. If DoD applies a similar selection ratio to the revised publication, that would mean roughly 77 enhanced requirements on top of the Level 2 baseline.</p>
<p>That is a significant jump from the current 24. It would substantially expand the scope, cost, and complexity of Level 3 certification.</p>
<p>The original SP 800-172 focused exclusively on confidentiality. Revision 3 adds integrity and availability, which means Level 3 contractors could eventually face requirements covering a much broader range of security objectives. The inclusion of cyber resiliency requirements — designing systems to operate through sustained attacks — represents a particularly demanding addition.</p>
<p>These changes will not take effect until DoD completes rulemaking. But Level 3 applies to contractors supporting the most sensitive DoD programs, and preparation timelines for this level of certification are already measured in years. Understanding the direction now is practical planning, not speculation.</p>
<h2 id="what-does-this-mean-for-level-2-contractors"><strong>What Does This Mean for Level 2 Contractors?</strong></h2>
<p>If you are pursuing or maintaining CMMC Level 2 certification, your immediate requirements have not changed. Continue preparing against NIST SP 800-171 Revision 2, which remains the current CMMC Level 2 assessment basis.</p>
<p>That said, today&#8217;s publication is relevant for Level 2 contractors for two reasons.</p>
<p>First, the completion of both Revision 3 baselines makes a unified CMMC rulemaking update more likely. When that rulemaking occurs, Level 2 will move to SP 800-171 Revision 3, which introduces ODPs and restructured requirements. Familiarizing yourself with Revision 3 now — particularly its ODPs — helps you anticipate the transition rather than react to it.</p>
<p>Second, some Level 2 contractors will eventually need Level 3 certification as their programs grow or contract requirements change. Understanding the trajectory of Level 3 requirements helps with long-term planning and resource allocation.</p>
<h2 id="what-should-defense-contractors-do-now"><strong>What Should Defense Contractors Do Now?</strong></h2>
<p>A practical approach depends on where you are in the certification process.</p>
<p><strong>Contractors preparing for Level 2 certification</strong> should stay focused on the current baseline — NIST SP 800-171 Revision 2. Your Certified Third-Party Assessor Organization (C3PAO) assessment will evaluate you against those requirements, and that has not changed. Where it makes sense, familiarize yourself with the ODPs in Revision 3, as they signal where requirements are heading.</p>
<p><strong>Contractors holding Level 2 certification</strong> should monitor the rulemaking process. When DoD announces a timeline for adopting Revision 3, you will need to plan a transition. Understanding the differences between Revision 2 and Revision 3 now reduces the effort required later.</p>
<p><strong>Contractors anticipating Level 3 requirements</strong> should read SP 800-172 Revision 3 now, even though compliance is not yet required. The expansion from 39 to approximately 115 requirements is not something to address reactively. Scoping decisions, infrastructure investments, and staffing plans all benefit from early visibility into where the framework is heading.</p>
<p><strong>For all contractors</strong>, remember that scoping comes before gap assessment. You cannot evaluate your readiness against a set of requirements until you understand where CUI lives in your environment, how it flows, and which systems are in scope. This is true under the current baselines and will be equally true under the revised ones.</p>
<h2 id="frequently-asked-questions"><strong>Frequently Asked Questions</strong></h2>
<h3><strong>Does NIST SP 800-172 Revision 3 change my current CMMC requirements?</strong></h3>
<p>No. Current CMMC requirements are defined in 32 CFR Part 170 and reference the original NIST publications (SP 800-171 Revision 2 for Level 2 and selected requirements from SP 800-172 February 2021 for Level 3). NIST publishing new revisions does not change CMMC until DoD completes formal rulemaking to adopt them.</p>
<h3><strong>When will CMMC be updated to reference the Revision 3 publications?</strong></h3>
<p>No timeline has been announced. With both SP 800-171 Revision 3 and SP 800-172 Revision 3 now finalized, DoD has the option to update both CMMC levels through a single rulemaking process. The timing remains at DoD&#8217;s discretion.</p>
<h3><strong>How many requirements are in SP 800-172 Revision 3?</strong></h3>
<p>Early community analysis suggests approximately 115 enhanced security requirements, up from 39 in the original publication. Roughly 80 of those are reported as new. These figures are based on initial reviews of the published document and should be verified against the official NIST publication or the CPRT dataset.</p>
<h3><strong>What is the difference between SP 800-172 and SP 800-172A?</strong></h3>
<p>SP 800-172 defines the enhanced security requirements — what organizations need to implement. SP 800-172A provides the assessment procedures — how those implementations are evaluated. Both were published simultaneously on May 13, 2026.</p>
<h3><strong>Will CMMC Level 3 require all 115 requirements?</strong></h3>
<p>That is not yet determined. Under the current framework, DoD selected 24 of the original 39 requirements for Level 3 — approximately two-thirds. If a similar ratio applies to Revision 3, approximately 77 requirements could be selected. The actual number will depend on future rulemaking.</p>
<h3><strong>Does this affect CMMC Level 1?</strong></h3>
<p>No. CMMC Level 1 is based on the 17 practices in FAR 52.204-21, which protects Federal Contract Information (FCI). NIST SP 800-172 applies to CUI protection and is relevant only to Level 2 and Level 3.</p>
<h3><strong>Should I start implementing SP 800-172 Revision 3 requirements now?</strong></h3>
<p>Not unless your contracts or agency specifically require it outside of CMMC. For CMMC purposes, continue working against the current baselines. However, reading the revised publication and understanding its direction is useful for long-term planning — particularly if you anticipate Level 3 requirements.</p>
<h2><strong>Looking Ahead</strong></h2>
<p>We will publish updates as the rulemaking picture develops. If you have questions about how — or whether — these changes may affect your organization, <a href="mailto:cmmc@ecuron.com">contact us</a> to discuss your specific situation.</p>
<p><strong>If you are working toward Level 2 certification or anticipate Level 3 requirements in future contracts, understanding how these baseline changes may affect your timeline and scope is worth a conversation. Contact us at <a href="mailto:cmmc@ecuron.com">cmmc@ecuron.com</a> to schedule a 30-minute consultation.</strong></p>
<p><strong><em>Ecuron is a Registered Provider Organization (RPO) since 2021 authorized by the Cyber AB to provide CMMC consulting services. We do not sell or resell any tools or services — our recommendations are based entirely on what your organization needs. Learn more about our <a href="https://www.ecuron.com/cybersecurity-services/cmmc-consulting-service/">5-step methodology</a> for CMMC certification preparation.</em></strong></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CMMC vs. NIST SP 800-171: What Is the Difference</title>
		<link>https://www.ecuron.com/cmmc-vs-nist-sp-800-171/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 18:02:19 +0000</pubDate>
				<category><![CDATA[CMMC]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=2338</guid>

					<description><![CDATA[If your company handles Controlled Unclassified Information (CUI), you have probably seen CMMC and NIST SP 800-171 mentioned in the same conversation. That is one reason so many contractors assume they mean the same thing. They do not. The short version is simple: NIST SP 800-171 tells you what security requirements to implement. CMMC is [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>If your company handles Controlled Unclassified Information (CUI), you have probably seen <strong>CMMC</strong> and <strong>NIST SP 800-171</strong> mentioned in the same conversation. That is one reason so many contractors assume they mean the same thing. They do not.</p>
<p>The short version is simple:</p>
<p><strong>NIST SP 800-171 tells you what security requirements to implement.</strong><br />
<strong>CMMC is the DoD program that evaluates whether you have implemented those requirements well enough to achieve the required assessment result for contract award.</strong> For Level 2, that means an assessment against NIST SP 800-171 Rev. 2 using the CMMC assessment process and criteria.</p>
<p>That distinction matters. Many companies lose time and money because they focus on documentation without validating implementation, or they assume partial alignment with NIST SP 800-171 automatically means they are ready for a CMMC Level 2 assessment. The official assessment materials make clear that CMMC assessments look at evidence through examine, interview, and test, and results are captured at the assessment objective level, not just at the level of policy statements. If you are not sure what this means keep reading.</p>
<h2><strong>What Is NIST SP 800-171?</strong></h2>
<p>NIST SP 800-171 is a cybersecurity standard designed to help organizations protect Controlled Unclassified Information in nonfederal systems and organizations. In practical terms, it is the security baseline contractors are expected to implement when they handle CUI in their environments.</p>
<p>For CMMC Level 2 environments involving CUI, the relevant baseline is still <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf" target="_blank" rel="nofollow noopener"><strong>NIST SP 800-171 Revision 2</strong></a>, not Revision 3. That point is important because many contractors see the “withdrawn” notice on Revision 2 and assume Revision 3 is now the CMMC expectation. NIST did withdraw Revision 2 and publish Revision 3, but DoD’s current CMMC guidance states that assessments are still being conducted against Revision 2 until the class deviation is withdrawn or superseded.</p>
<p>So while the market may already be talking about Revision 3, contractors preparing for CMMC Level 2 today still need to be grounded in Revision 2. That is where a lot of avoidable confusion starts.</p>
<h2><strong>What Is CMMC?</strong></h2>
<p>CMMC, or the Cybersecurity Maturity Model Certification, is the <a href="https://dodcio.defense.gov/CMMC/about/" target="_blank" rel="noopener">DoD program</a> used to verify that contractors and subcontractors have implemented the required cybersecurity safeguards for the information involved in the contract. For Level 2, that means assessing implementation of the 110 requirements in NIST SP 800-171 Rev. 2. Depending on the solicitation, currently Level 2 may require either a self-assessment or a Certified 3<sup>rd</sup> Party Assessor Organization (C3PAO) assessment, and both paths also require annual affirmations.</p>
<p>In other words, CMMC is not just about whether a policy exists. It is about whether the control is actually working in the environment, whether the organization can demonstrate that clearly, and whether the scope is properly defined. The Level 2 assessment guide is explicit that evidence must be in final form and that a single NOT MET assessment objective can cause failure of the entire requirement.</p>
<h2><strong>The Biggest Difference</strong></h2>
<p>The easiest way to explain the difference is this:</p>
<ul>
<li><strong>NIST SP 800-171 tells you what to implement.</strong></li>
<li><strong><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171a.pdf" target="_blank" rel="nofollow noopener">NIST SP 800-171A</a> tells assessors how to evaluate whether it is really implemented.</strong></li>
<li><strong>CMMC tells you what assessment path and status the DoD requires for the contract.</strong></li>
</ul>
<p>That is why companies that treat compliance as a paper exercise often run into trouble. A written policy may be necessary, but it is not enough on its own. Assessors will want to see that controls are operating in practice and that the organization can produce clear, supportable evidence.</p>
<p>Another point many defense contractors miss is that CMMC assessments are not really judged at the “we have 110 requirements on paper” level. They are judged at the level of the assessment objectives tied to those requirements. That is one reason organizations often overestimate readiness when they focus only on requirement statements and not on how those requirements will actually be assessed.</p>
<h2><img fetchpriority="high" decoding="async" class="aligncenter wp-image-2350 size-full" src="https://www.ecuron.com/wp-content/uploads/NIST-SP-800-171-vs-CMMC.png" alt="CMMC vs. NIST SP 800-171 comparison table" width="633" height="410" srcset="https://www.ecuron.com/wp-content/uploads/NIST-SP-800-171-vs-CMMC.png 633w, https://www.ecuron.com/wp-content/uploads/NIST-SP-800-171-vs-CMMC-300x194.png 300w" sizes="(max-width: 633px) 100vw, 633px" /></h2>
<h2><strong>Why Contractors Get Confused</strong></h2>
<p>There are a few common reasons for the confusion:</p>
<ul>
<li>The terms are often used together in the same sales and compliance discussions</li>
<li>Many organizations begin with NIST SP 800-171 and later realize they need to prepare for a more formal assessment path</li>
<li>Internal teams may focus heavily on documentation and underestimate the importance of evidence and operational consistency</li>
<li>Some teams mix current CMMC Level 2 expectations with newer NIST revisions, even though current CMMC Level 2 assessments are still tied to NIST SP 800-171 Revision 2</li>
</ul>
<p>This confusion can create real delays. A company may spend months updating policies while leaving major scoping, access control, or evidence gaps unresolved. That is often where the real readiness problems are.</p>
<h2><strong>What This Means for Defense Contractors</strong></h2>
<p>If you are a defense contractor, subcontractor, or supplier handling CUI, the practical question is not just whether you understand the terminology. The real question is whether your environment, documentation, and evidence would stand up to review. For Level 2, that means being able to demonstrate that the NIST SP 800-171 Rev. 2 requirements are implemented and supported by evidence across the defined assessment scope.</p>
<p>That includes questions like:</p>
<ul>
<li>Where does CUI live in your environment?</li>
<li>Which systems, assets, and users are in scope?</li>
<li>Are your controls implemented consistently?</li>
<li>Can you show evidence that those controls are functioning?</li>
<li>Have you evaluated readiness at the level of the assessment objectives, not just the requirement titles?</li>
<li>Have you identified weak points before a formal assessment?</li>
</ul>
<p>These are the issues that often separate organizations that are making steady progress from those that keep reworking the same problems.</p>
<h2><strong>Common Mistakes to Avoid</strong></h2>
<h3><strong>Treating compliance as a documentation project</strong></h3>
<p>Policies matter, but they are only one part of readiness. If implementation is inconsistent, documentation alone will not solve the problem. CMMC assessments rely on examining documentation, interviewing personnel, and testing how controls operate in practice.</p>
<h3><strong>Defining scope too late</strong></h3>
<p>If you do not know what is in scope, remediation becomes inefficient and expensive. CMMC assessment scope is a formal concept, and scoping mistakes can distort everything that comes after.</p>
<h3><strong>Waiting too long to collect evidence</strong></h3>
<p>Evidence is often harder to assemble than teams expect. It should be gathered as controls are implemented, not only at the end. The assessment guide also makes clear that evidence must be final, not draft.</p>
<h3><strong>Assuming partial alignment means assessment readiness</strong></h3>
<p>A company may be on the right path and still not be ready for evaluation. Readiness requires clarity, consistency, and proof.</p>
<h3><strong>Overlooking the role of NIST SP 800-171A</strong></h3>
<p>Many contractors focus on the 110 requirements and do not assess themselves at the level of the related assessment objectives. That gap often leads to inflated self-assessment scores and a false sense of readiness. We often see scores drop by more than 100 points when a 3<sup>rd</sup> party assessment is performed. NIST SP 800-171A exists specifically to provide the assessment procedures and methodology used to assess the security requirements.</p>
<h2><strong>How to Prepare More Effectively</strong></h2>
<p>A more practical approach usually includes:</p>
<ul>
<li>Defining the CUI environment clearly</li>
<li>Reviewing current controls against NIST SP 800-171 Revision 2</li>
<li>Evaluating implementation at the level of the NIST SP 800-171A assessment objectives</li>
<li>Identifying missing, weak, or inconsistent evidence</li>
<li>Prioritizing remediation based on risk and effort</li>
<li>Getting an independent view before moving too far ahead</li>
</ul>
<p>This helps reduce wasted effort and gives leadership a more realistic picture of current readiness.</p>
<h2><strong>FAQ &#8211; CMMC vs. NIST SP 800-171</strong></h2>
<h3><strong>Is NIST SP 800-171 the same as CMMC?</strong></h3>
<p>No. NIST SP 800-171 is the security requirements baseline. CMMC is the DoD program used to assess whether those requirements have been implemented and whether the organization has the required status for award.</p>
<h3><strong>Does CMMC Level 2 use NIST SP 800-171 Revision 3?</strong></h3>
<p>No. Current CMMC Level 2 assessments are still conducted against NIST SP 800-171 Revision 2. DoD has said that remains the assessment basis until the class deviation is withdrawn or superseded.</p>
<h3><strong>What is NIST SP 800-171A?</strong></h3>
<p>NIST SP 800-171A provides the assessment procedures and methodology used to evaluate whether the security requirements in NIST SP 800-171 have been implemented effectively.</p>
<h3><strong>Why do companies struggle with this transition?</strong></h3>
<p>Because many teams focus first on policies and technical changes without fully addressing scope, evidence, ownership, repeatability, and the level of detail reflected in the assessment objectives.</p>
<h3><strong>What should we do first?</strong></h3>
<p>Start by identifying where CUI exists, what systems and assets are in scope, and where your biggest gaps are likely to be. And do not forget about Federal Contract Information (FCI). If a contract involves only FCI and not CUI, the relevant CMMC requirement may be Level 1 rather than Level 2.</p>
<h2><strong>Conclusion</strong></h2>
<p>Understanding the difference between CMMC and NIST SP 800-171 is not just a terminology issue. It affects how you plan, prioritize, and prepare.</p>
<p>For CMMC Level 2, NIST SP 800-171 Revision 2 gives you the security requirements and NIST SP 800-171A gives you the assessment detail many organizations overlook. CMMC does not change the underlying Level 2 control baseline, but it does add formal assessment, affirmation, and status requirements. At Level 3, CMMC also adds selected NIST SP 800-172 requirements.</p>
<p><strong>For many contractors, the smartest next step is an independent gap assessment that shows where they stand now, what needs attention first, and how to move forward with less guesswork.</strong></p>
<p><strong>If you are unsure whether your current NIST SP 800-171 efforts will hold up under a CMMC assessment, Ecuron can help you identify gaps, clarify scope, and build a more practical path toward readiness.</strong></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Government Shutdown and CMMC: What Defense Contractors Need to Know</title>
		<link>https://www.ecuron.com/government-shutdown-and-cmmc-what-defense-contractors-need-to-know/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 10 Oct 2025 20:44:44 +0000</pubDate>
				<category><![CDATA[CMMC]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=2221</guid>

					<description><![CDATA[10/10/2025As the federal government shutdown reaches Day 10 with no resolution in sight, defense contractors are asking a critical question: Does this shutdown impact the November 10, 2025 CMMC implementation deadline?&#160;The short answer: No. CMMC requirements remain on track.&#160;Here&#8217;s what defense contractors need to understand about how the current government shutdown affects &#8211; or more [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="thrv_wrapper tve_wp_shortcode"><div class="tve_shortcode_raw" style="display: none"></div><div class="tve_shortcode_rendered"><p style="text-align: right;" data-pm-slice="1 1 []">10/10/2025</p><p data-pm-slice="1 1 []">As the federal government shutdown reaches Day 10 with no resolution in sight, defense contractors are asking a critical question: <strong>Does this shutdown impact the November 10, 2025 CMMC implementation deadline?</strong></p><p>The short answer: <strong>No. CMMC requirements remain on track.</strong></p><p>Here&#8217;s what defense contractors need to understand about how the current government shutdown affects &#8211; or more accurately, doesn&#8217;t affect &#8211; your CMMC compliance obligations.</p><h2>The November 10, 2025 Deadline Stands Firm</h2><p>Despite the government shutdown that began October 1, 2025, the Cybersecurity Maturity Model Certification (CMMC) program will launch as scheduled on <strong>November 10, 2025</strong>. On that date, the Department of Defense will begin incorporating CMMC requirements into new defense solicitations and contracts.</p><p>The final rule has been published, and the implementation timeline is proceeding regardless of the current appropriations lapse.</p><h2>Why CMMC Implementation Continues During the Shutdown</h2><p>Several factors ensure that CMMC moves forward even while other government operations are curtailed:</p><h3>1. The Regulatory Framework Is Already Established</h3><p>The CMMC final rule was published in the Federal Register and became effective on December 16, 2024. The regulatory authority for contracting officers to include CMMC requirements in solicitations (DFARS clause 252.204-7021) is already in place. No additional legislative action is required.</p><h3>2. DoD Contracting Activities Continue</h3><p>The Department of Defense has funding to continue essential operations during the shutdown, including contracting activities. According to DoD shutdown guidance issued in September 2025, existing contracts are not terminated or paused unless new funding is needed, and contracting officers continue to perform their duties for essential defense operations.</p><h3>3. C3PAOs Operate Independently</h3><p>CMMC Third-Party Assessment Organizations (C3PAOs) are private sector entities authorized by the Cyber Accreditation Body (Cyber AB). They do not rely on government appropriations to conduct assessments. Your ability to schedule and complete CMMC assessments is unaffected by the shutdown.</p><h3>4. The Cyber AB Functions as a Non-Profit</h3><p>The Cyber AB, which accredits C3PAOs and manages the CMMC ecosystem, operates as an independent non-profit organization. Its operations continue normally during government shutdowns.</p><h2>What May Be Temporarily Affected</h2><p>While CMMC implementation proceeds, some peripheral activities may experience delays as the shutdown extends into its second week:</p><ul><li><strong>Government Oversight Functions:</strong> Some DoD cybersecurity oversight and policy development activities may be reduced or delayed.</li><li><strong>New Solicitation Volume:</strong> The overall number of new contract solicitations may temporarily decrease as some DoD offices operate with reduced staff. However, essential defense contracting continues.</li><li><strong>DIBCAC Operations:</strong> The Defense Industrial Base Cybersecurity Assessment Center may have limited availability for questions or guidance during the shutdown.</li><li><strong>Training and Outreach:</strong> Government-sponsored CMMC training events and webinars may be postponed. The Defense Acquisition University (DAU) has suspended all classes and events that started on or after October 1.</li><li><strong>Military Pay at Risk:</strong> Active-duty military personnel (approximately 1.3 million service members) will miss their first paycheck on October 15, 2025 if the shutdown continues. This does not directly impact CMMC implementation timelines, but creates significant pressure for congressional action.</li><li><strong>Federal Worker Layoffs:</strong> The White House Office of Management and Budget announced on October 10 that &#8220;substantial&#8221; layoffs of federal workers have begun. This represents an escalation beyond typical shutdown furloughs and may affect some agency operations.</li><li><strong>Agency Response Times:</strong> Federal agencies are operating with limited staff, leading to delays in regulatory approvals and guidance responses.</li><li><strong>Congressional Recess:</strong> The Senate adjourned on October 9 and will not return until October 14, meaning no votes on funding legislation are possible until next week at the earliest. The shutdown is now expected to extend into Week 3.</li></ul><p>However, none of these temporary impacts change your compliance obligations or the November 10 implementation date.</p><h2>What Defense Contractors Should Do Right Now</h2><p>The government shutdown should not slow your CMMC preparation. In fact, it reinforces the urgency of getting ready now.</p><h3>For Companies Handling Federal Contract Information (FCI) &#8211; CMMC Level 1:</h3><ul><li><strong>Complete your self-assessment</strong> against the 17 CMMC Level 1 practices</li><li><strong>Document your security controls</strong> in your System Security Plan (SSP)</li><li><strong>Prepare to submit your annual self-assessment</strong> through the Supplier Performance Risk System (SPRS)</li><li><strong>Ensure you can obtain your CMMC Unique Identifier (UID)</strong> when required for contract bids</li></ul><h3>For Companies Handling Controlled Unclassified Information (CUI) &#8211; CMMC Level 2:</h3><ul><li><strong>Finalize your NIST SP 800-171 implementation</strong> across all 110 security requirements (and 320 assessment objectives!)</li><li><strong>Conduct internal readiness assessments</strong> to identify any remaining gaps</li><li><strong>Engage with a C3PAO</strong> to schedule your third-party assessment (lead times depend on the C3PAO but are now often 3-6 months or longer)</li><li><strong>Develop your Plan of Action &amp; Milestones (POA&amp;M)</strong> for any requirements you cannot yet meet</li><li><strong>Review your subcontractor relationships</strong> to ensure flowdown compliance</li></ul><h3>For All Defense Contractors:</h3><ul><li><strong>Monitor new solicitations closely</strong> starting November 10 for CMMC requirements</li><li><strong>Don&#8217;t wait for the shutdown to end</strong> to begin your compliance work</li><li><strong>Understand that False Claims Act implications remain in effect</strong> regardless of the shutdown—misrepresenting your cybersecurity posture carries serious legal and financial consequences</li><li><strong>Use this period productively</strong> to advance your CMMC preparation while solicitation volume may be temporarily reduced</li><li><strong>Plan for post-shutdown surge:</strong> When the shutdown ends, expect increased solicitation activity, compressed timelines, and greater demand for C3PAO assessments</li></ul><h2>The Four-Phase CMMC Rollout Timeline</h2><p>Understanding the phased implementation helps you prioritize your preparation:</p><p><strong><img decoding="async" class="size-full wp-image-2226 alignright" src="https://www.ecuron.com/wp-content/uploads/CMMC-4-phase-rollout-timeline-400x600-1.png" alt="CMMC 4 phase rollout-timeline" width="400" height="600" srcset="https://www.ecuron.com/wp-content/uploads/CMMC-4-phase-rollout-timeline-400x600-1.png 400w, https://www.ecuron.com/wp-content/uploads/CMMC-4-phase-rollout-timeline-400x600-1-200x300.png 200w" sizes="(max-width: 400px) 100vw, 400px" />Phase 1 (November 10, 2025 &#8211; November 9, 2026):</strong> Selective application of CMMC requirements in new solicitations. DoD will begin incorporating CMMC clauses, but not all contracts will require certification immediately.</p><p><strong>Phase 2 (November 10, 2026 &#8211; November 9, 2027):</strong> Increased application across more contract types and dollar thresholds.</p><p><strong>Phase 3 (November 10, 2027 &#8211; November 9, 2028):</strong> Broader enforcement with more contracts requiring CMMC certification.</p><p><strong>Phase 4 (November 10, 2028 and beyond):</strong> Full implementation across all applicable DoD contracts, except those exclusively for commercial off-the-shelf (COTS) products.</p><p>For more details see our post <a href="https://www.ecuron.com/cmmc-phased-rollout/">CMMC: Phased Rollout Timeline</a> .</p><p>Even though implementation is phased, you cannot predict which solicitations will require CMMC. or if a self-affirmation or C3PAO assessment is required. Waiting until your specific contract requires certification puts you at serious competitive disadvantage.</p><h2>Why This Shutdown Is Different for Cybersecurity</h2><p>In past government shutdowns, many regulatory initiatives were delayed or suspended. CMMC is different for several important reasons:</p><ul><li><strong>Regulatory Authority Already Granted:</strong> Unlike programs requiring new legislation or funding, CMMC operates under existing regulatory authority that remains valid during shutdowns.</li><li><strong>Private Sector Assessment Model:</strong> The use of independent C3PAOs means the assessment infrastructure doesn&#8217;t depend on government employees or appropriations.</li><li><strong>National Security Imperative:</strong> Cybersecurity threats to the defense industrial base continue regardless of appropriations status. The DoD views CMMC as essential to protecting sensitive defense information.</li></ul><h2>What Happens After the Shutdown Ends</h2><p>When appropriations are restored and government operations return to normal, expect:</p><ul><li><strong>Increased solicitation activity</strong> as delayed contracts move forward</li><li><strong>More CMMC requirements</strong> appearing in solicitations as contracting officers catch up on backlogged work</li><li><strong>Compressed timelines</strong> for proposal submissions as agencies work to obligate funds before the fiscal year ends</li><li><strong>Greater scrutiny</strong> of cybersecurity compliance as the DoD emphasizes supply chain security</li><li><strong>Potential surge in C3PAO demand</strong> as contractors rush to complete assessments</li><li><strong>Restoration of military pay and federal worker salaries,</strong> with back pay typically provided for all affected employees</li></ul><p>Contractors who used the shutdown period to advance their CMMC preparation will be positioned to respond quickly when opportunities arise.</p><h2>TLDR</h2><p>The current government shutdown does <strong>not</strong> impact:</p><ul><li>The November 10, 2025 CMMC effective date</li><li>Your compliance obligations under DFARS 252.204-7012</li><li>The phased rollout timeline</li><li>C3PAO assessment operations</li><li>Your ability to prepare for CMMC certification</li></ul><p>The shutdown <strong>may temporarily</strong> affect:</p><ul><li>Government response times for questions or guidance</li><li>The volume of new solicitations</li><li>DoD-sponsored training and outreach events</li><li>Agency staffing and administrative functions (with substantial layoffs now underway)</li><li>Military pay (first missed paycheck on October 15)</li></ul><p>For defense contractors, the message is clear: <strong>Continue your CMMC preparation without delay.</strong> The November 10 deadline is firm, the requirements are established, and the assessment infrastructure is operational.</p><p>The government shutdown is a temporary disruption to appropriations. CMMC is a permanent change to how the Department of Defense protects sensitive information across its supply chain.</p><p>As the shutdown reaches Day 10 with Congress adjourned until October 14 and no clear path to resolution, the contractors who maintain momentum on their compliance efforts will be best positioned for success when government operations normalize.</p><h2>Need Help Preparing for CMMC?</h2><p>Whether the government is open or in shutdown, cybersecurity threats don&#8217;t take a break—and neither should your compliance preparation.</p><p>Ecuron specializes in helping defense contractors navigate CMMC requirements, from gap assessments to full implementation and maintenance support. As a CMMC Registered Practitioner Organization (RPO), we understand both the technical requirements and the practical realities of achieving certification.</p><p><strong>Contact us today to discuss your CMMC readiness:</strong></p><ul><li>Phone: +1-713-646-5044</li><li>Email: cmmc@ecuron.com</li></ul><p>Don&#8217;t let the government shutdown become an excuse for delay. Your competitors are preparing—make sure you are too.</p></div></div><div class="tcb_flag" style="display: none"></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CMMC: Phased Rollout Timeline</title>
		<link>https://www.ecuron.com/cmmc-phased-rollout/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 13 Sep 2025 23:17:02 +0000</pubDate>
				<category><![CDATA[CMMC]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=2181</guid>

					<description><![CDATA[CMMC: Phased Rollout TimelineAfter years of delays, CMMC is finally launching. Six years, ten months, and 26 days after CMMC was first announced, the final rule putting CMMC into DoD contracts was published September 10, 2025.&#160;Starting November 10, 2025, the Department of Defense begins requiring cybersecurity certifications for contractors—and your company&#8217;s ability to win future [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="thrv_wrapper tve_wp_shortcode"><div class="tve_shortcode_raw" style="display: none"></div><div class="tve_shortcode_rendered"><h1>CMMC: Phased Rollout Timeline</h1><p>After years of delays, CMMC is finally launching. Six years, ten months, and 26 days after CMMC was first announced, the final rule putting CMMC into DoD contracts was published September 10, 2025.</p><p>Starting <strong>November 10, 2025</strong>, the Department of Defense begins requiring cybersecurity certifications for contractors—and your company&#8217;s ability to win future contracts depends on understanding these new rules. Here we summarize the Phased Rollout of CMMC.</p><p>Upfront some definitions:</p><ul><li><strong>OSC</strong>: Organization Seeking Certification (that would be you)</li><li><strong>COTS</strong>: Commercial Off-The Shelf</li><li><strong>FCI</strong>: Federal Contract Information</li><li><strong>CUI</strong>: Controlled Unclassified Information</li><li><strong>SPRS</strong>: Supplier Performance Risk System</li><li><strong>C3PAO</strong>: Certified Third Party Assessment Organization</li></ul><h3>Understanding CMMC UIDs (Unique Identifiers)</h3><div class="mb-1 mt-2 whitespace-pre-line leading-relaxed first:mt-0" data-sentry-component="P" data-sentry-source-file="p.tsx">Every CMMC assessment gets a Unique Identifier (UID) from SPRS. Think of it as a &#8220;serial number&#8221; for your compliance status that&#8217;s tied to the specific systems you assessed. Key points:</div><ul><li>Each UID represents one assessment scope (the systems/enclave you evaluated)</li><li>If you have multiple separate systems handling FCI/CUI, you may have multiple UIDs</li><li>You provide these UIDs in your proposals so contracting officers can verify your status</li><li>UIDs stay with those specific systems &#8211; if you change your system setup, you may need new UIDs</li></ul><div class="mb-1 mt-2 whitespace-pre-line leading-relaxed first:mt-0" data-sentry-component="P" data-sentry-source-file="p.tsx"><strong>Why this is important:</strong> Contracting officers use your UIDs to look up your exact compliance status in SPRS for the systems you&#8217;ll actually use on their contract. More on that below.</div><h2>What “CMMC phased rollout” means</h2><p>The CMMC phased rollout timeline is based on 4-phases:  the initial rollout in 3 phases over three years, with full implementation (Phase 4) beginning in year four:</p><ul><li><strong>Years 1–3 (Nov 10, 2025 → Nov 9, 2028):</strong> CMMC appears <strong>selectively</strong>. Program offices add it where they decide it’s appropriate (COTS-only awards are excluded &#8211; CMMC does not apply to them).</li><li><strong>Year 4 onward (Nov 10, 2028+):</strong> CMMC is <strong>generally required</strong> whenever the contract requires using contractor systems to process, store, or transmit <strong>FCI</strong> or <strong>CUI</strong> (again, excluding COTS-only).</li></ul><p><strong>What this means for you:</strong> Not every new solicitation after Nov 10, 2025 will carry CMMC, but many will &#8211; by policy choice &#8211; through the three-year phase-in. After Nov 10, 2028, expect CMMC requirements whenever your systems will handle FCI/CUI. <strong>Remember: Even if DoD doesn&#8217;t require CMMC in a specific contract right away, prime contractors can &#8211; and increasingly will &#8211; require it from their subs.</strong></p><h2>What contracting officers will check</h2><p>You will have to meet any CMMC requirements before contract award. Once CMMC appears in a solicitation, here&#8217;s what contracting officers will verify and what you need to maintain:</p><p><strong>Before contract award:</strong></p><div class="mb-1 mt-2 whitespace-pre-line leading-relaxed first:mt-0" data-sentry-component="P" data-sentry-source-file="p.tsx"><strong>SPRS verification:</strong> Contracting Officers must verify a current NIST SP 800-171r2 DoD Assessment score (where required) and a current CMMC status at the level required, for each CMMC UID tied to the systems you&#8217;ll use. &#8220;Current&#8221; means your CMMC status hasn&#8217;t expired and covers the systems you&#8217;ll actually use on the contract.</div><div class="mb-1 mt-2 whitespace-pre-line leading-relaxed first:mt-0" data-sentry-component="P" data-sentry-source-file="p.tsx"><strong>CMMC UIDs in proposals:</strong> You&#8217;ll list the UID(s) for each system that will process, store, or transmit FCI/CUI under the resulting award.</div><p><strong>During contract performance:</strong></p><div class="mb-1 mt-2 whitespace-pre-line leading-relaxed first:mt-0" data-sentry-component="P" data-sentry-source-file="p.tsx"><strong>Annual affirmation:</strong> You must post an annual affirmation of continuous compliance in SPRS for each CMMC UID. This affirmation must be signed by a company executive.</div><div class="mb-1 mt-2 whitespace-pre-line leading-relaxed first:mt-0" data-sentry-component="P" data-sentry-source-file="p.tsx"><strong>Status updates:</strong> Update SPRS when your status changes.</div><div class="mb-1 mt-2 whitespace-pre-line leading-relaxed first:mt-0" data-sentry-component="P" data-sentry-source-file="p.tsx"><strong>New systems:</strong> If you add systems that handle FCI/CUI during contract performance, provide new UIDs to the contracting officer.</div><div class="mb-1 mt-2 whitespace-pre-line leading-relaxed first:mt-0" data-sentry-component="P" data-sentry-source-file="p.tsx"><strong>At option exercise/extensions:</strong> Contracting Officers verify you still have current CMMC status before exercising options or extending performance periods.</div><p><strong>Where this comes from:</strong> DFARS 252.204-7021 is the clause, and DFARS 252.204-7025 is the solicitation provision used when 7021 appears.</p><h2>Conditional status &amp; POA&amp;M (Level 2/3 only)</h2><p>DoD permits a Conditional CMMC status (i.e., with valid POA&amp;Ms) for Levels 2 and 3 only, and for up to 180 days from the conditional date &#8211; award may occur with conditional status (subject to program needs).</p><p><strong>Important:</strong> Even for conditional status, your self-assessment must achieve a minimum score of 88 points out of 110 possible points in NIST SP 800-171. Only certain limited control requirements are allowed to be on your POAM which needs to be closed out within 180 days.</p><p>Level 1 has no conditional path.</p><h2>Flowdown &amp; subcontractors</h2><p>Subcontractors must comply with CMMC at the required level the same way primes do, including self-assessment posting, certification, and annual affirmation in SPRS. Only the prime submits UIDs to the contracting officer (subcontractors enter results in SPRS and can share screenshots with the prime).</p><h2>COTS exception (throughout)</h2><p>Awards solely for the acquisition of COTS items are excluded from the CMMC clause and provision prescriptions in both the selective (Years 1–3) and the broad (Year 4+) phases.</p><h2>For Level 1 (FCI only) OSCs</h2><p><strong>What is required:</strong></p><p style="padding-left: 40px;"><strong>Assessment type:</strong></p><p style="padding-left: 40px;">Self-assessment (Level 1) posted to SPRS when the clause is present; keep your CMMC status current for the life of the contract and affirm annually in SPRS.</p><p style="padding-left: 40px;"><strong>Scoping:</strong></p><p style="padding-left: 40px;">In scope are all assets that process, store, or transmit FCI; assets that do not handle FCI are out of scope. While no formal SSP is required, it is still smart to keep a lightweight SSP/system description and a few basic policies so you can clearly explain your scope and boundaries.</p><p style="padding-left: 40px;"><strong>Specialized assets:</strong></p><p style="padding-left: 40px;">(IoT/IIoT, OT, GFE, restricted systems, test equipment) are not assessed at Level 1.</p><h2>For Level 2 (FCI &amp; CUI) OSCs</h2><p><strong>What is required:</strong></p><p style="padding-left: 40px;"><strong>Assessment type:</strong></p><p style="padding-left: 40px;">At the minimum a self-assessment attesting full implementation of the NIST SP 800-171r2 requirements &#8211; so 110 points &#8211; is required. If the contract includes CUI from the DoD Organizational Index group (see <a href="https://www.archives.gov/cui/registry/category-list" target="_blank" rel="noopener">NARA CUI categories</a>) will also require a C3PAO assessment at Level 2. For Level 3 an additional assessment by DIBCAC is required.<br />Your program office determines the CMMC level of your contract.</p><p style="padding-left: 40px;"><strong>Scoping:</strong></p><p style="padding-left: 40px;">Level 2 scope includes CUI assets, Security Protection Assets, Contractor Risk-Managed Assets (CRMA), and Specialized Assets, with specific documentation/assessment expectations. Using enclaves to constrain scope is allowed; inherited controls are fine where valid, but all requirements must be met within the scope.</p><p style="padding-left: 40px;"><strong>Conditional Status &amp; POA&amp;M:</strong></p><p style="padding-left: 40px;">You can be awarded with a Conditional Status if<br />(a) your score is at least 88/110, and<br />(b) only a small, limited set of requirements are eligible to be on your POA&amp;M.</p><p style="padding-left: 40px;">Final status must be reached within 180 days by closing out all POA&amp;M items.</p><h2>When will you actually see DFARS 252.204-7021/7025?</h2><p>During the initial phase-in (through Nov 9, 2028), the -7021/-7025 clauses appear in a solicitation when the program office chooses to include CMMC for that buy.</p><p>Starting Nov 10, 2028 the -7021/-7025 clauses will appear automatically whenever your systems will handle FCI/CUI on that contract.</p><p>Also note that the clause can be added to solicitations issued just before the effective date so long as award occurs on/after Nov 10, 2025; Contracting Officers may bilaterally add it to existing contracts with consideration.</p><h2>Why you’ll hear about “UIDs,” “SPRS,” and “affirmations” so much</h2><p>DoD expects CMMC to be scoped to the specific systems you’ll use. Each assessment scope (enclave/system set) gets a CMMC UID from SPRS/eMASS, and those UIDs ride with your offer so Contracting Officers can verify your status. Then you affirm annually that you remain compliant and that there are no significant changes to the system.</p><h2>The Short Version:</h2><ul><li><strong>Phase 1 begins Nov 10, 2025</strong> &#8211; CMMC appears selectively for three years; from Nov 10, 2028 forward, it&#8217;s required when you&#8217;ll handle FCI/CUI</li><li><strong>Level 1:</strong> Self-assessment + annual affirmation; scope includes only FCI-handling assets</li><li><strong>Level 2:</strong> CUI from the DoD Organizational Index categories need a C3PAO assessment. CUI from not DoD categories will require a self-assessment. Conditional status (POA&amp;M) possible for 180 days &#8211; but see the details above!</li><li><strong>Always:</strong> Provide CMMC UIDs, keep SPRS current, affirm annually, and ensure subcontractors comply</li></ul><h2>Time to act is now</h2><div class="mb-1 mt-2 whitespace-pre-line leading-relaxed first:mt-0" data-sentry-component="P" data-sentry-source-file="p.tsx">With CMMC requirements starting in just weeks, the window for preparation is closing fast. <strong><a href="https://www.ecuron.com/cybersecurity-services/cmmc-consulting-service/cmmc-certification-process-and-timeline/" target="_blank" rel="noopener">CMMC Level 2 implementation</a> typically takes 12-18 months</strong>, and C3PAO availability is becoming a bottleneck as more companies rush to get certified.</div><div data-sentry-component="P" data-sentry-source-file="p.tsx"> </div><div class="mb-1 mt-2 whitespace-pre-line leading-relaxed first:mt-0" data-sentry-component="P" data-sentry-source-file="p.tsx"><strong>If you need help navigating <a href="https://www.ecuron.com/cmmc-compliance-a-quick-overview/" target="_blank" rel="noopener">CMMC compliance</a>,</strong> Ecuron specializes in getting defense contractors from their current status to full CMMC compliance efficiently. As a CMMC Registered Practitioner Organization<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> (CMMC-RPO), we&#8217;ve guided companies in more than 12 states through the process.</div><div data-sentry-component="P" data-sentry-source-file="p.tsx"> </div><div class="mb-1 mt-2 whitespace-pre-line leading-relaxed first:mt-0" data-sentry-component="P" data-sentry-source-file="p.tsx"><strong>Ready to get started?</strong> Schedule a complimentary 30-minute consultation to discuss your CMMC requirements and timeline. Email us at <a href="mailto:cmmc@ecuron.com" target="_blank" rel="noopener" data-sentry-component="A" data-sentry-source-file="a.tsx">cmmc@ecuron.com</a>, call +1-713-646-5044, or use the contact form below.</div><div data-sentry-component="P" data-sentry-source-file="p.tsx"> </div><div class="mb-1 mt-2 whitespace-pre-line leading-relaxed first:mt-0" data-sentry-component="P" data-sentry-source-file="p.tsx"><strong>Don&#8217;t wait until CMMC appears in your next RFP &#8211; start preparing now.</strong></div></div></div><div class="tcb_flag" style="display: none"></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Title 48 CFR Close to Finish Line</title>
		<link>https://www.ecuron.com/title-48-cfr-close-to-finish-line/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 29 Aug 2025 23:40:24 +0000</pubDate>
				<category><![CDATA[CMMC]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=2161</guid>

					<description><![CDATA[CMMC Final Rule Clears Regulatory Review: What are the Implications? August 29th 2025 We are close, very close. The wait is almost over. After years of anticipation, the 48 CFR final rule has officially cleared regulatory review on August 25th, marking a pivotal moment for defense contractors across the nation. What Happens Next? The review [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>CMMC Final Rule Clears Regulatory Review:<br />
What are the Implications?</h1>
<p>August 29th 2025</p>
<p><strong>We are close, very close. The wait is almost over.</strong> After years of anticipation, the 48 CFR final rule has officially <a title="Case# 2019-D041 (page 11)" href="https://www.acq.osd.mil/dpap/dars/opencases/dfarscasenum/dfars.pdf" target="_blank" rel="nofollow noopener">cleared regulatory review on August 25th</a>, marking a pivotal moment for defense contractors across the nation.</p>
<h2>What Happens Next?</h2>
<p>The review by OIRA was finalized well under the 90 day limit. Not much is left before the rule takes effect:</p>
<p><strong>Within the next week:</strong> The rule will be published in the Federal Register, officially marking the beginning of the end of the preparation phase.</p>
<p><strong>1-60 days after publication:</strong> The effective date kicks in, launching Phase 1 of the CMMC phased rollout. As mentioned in our <a href="https://www.ecuron.com/final-sprint-to-cmmc-48-cfr-rule-hits-oira-review/" target="_blank" rel="noopener">previous blog post</a>, the 48 CFR is no major rule and thereby no 60 day delay is required.</p>
<p><strong>From the effective date forward:</strong> Every new DoD solicitation and contract will include CMMC requirements. No exceptions.</p>
<h2>Not Just Self-Assessments</h2>
<h4><span style="font-size: 16px;">Here&#8217;s what many contractors are getting wrong: </span><strong style="font-size: 16px;">this isn&#8217;t just about self-assessments.</strong></h4>
<p>Contrary to popular belief circulating in industry forums, new contracts can easily require CMMC Level 2 certification right from the start when the contract includes <a href="https://www.archives.gov/cui/registry/category-list" target="_blank" rel="noopener">CUI of the Defense Category</a> — not just the self-assessment that many contractors have been banking on as a &#8220;soft landing.&#8221;</p>
<p>If you&#8217;ve been putting off your CMMC preparation thinking you&#8217;ll have more time to ease into compliance, it&#8217;s time to recalibrate your timeline.</p>
<h2>No Surprises in the Final Rule</h2>
<p>Don&#8217;t expect dramatic changes from what we&#8217;ve already seen. This final rule <strong>simply implements the policy that&#8217;s been codified at 32 CFR 170 since December 2024</strong>.</p>
<p>What it does accomplish:</p>
<ul>
<li>Updates instructions to contracting officers</li>
<li>Revises the text of DFARS 252.204-7021</li>
<li>Implements the overall CMMC program policy we&#8217;ve been preparing for</li>
</ul>
<p>Think of it as the operational manual for a policy framework that&#8217;s already been established.</p>
<h2>What This Means for Your Business</h2>
<p><strong>The preparation window is closing.</strong> Once that effective date hits, every new opportunity in the defense sector will come with CMMC strings attached.</p>
<p>For contractors who haven&#8217;t started their CMMC journey:</p>
<ul>
<li><a href="https://www.ecuron.com/cybersecurity-services/cmmc-gap-analysis/" target="_blank" rel="noopener"><strong>Gap assessments</strong></a> become urgent, not optional</li>
<li><a href="https://www.ecuron.com/cybersecurity-services/cmmc-consulting-service/cmmc-certification-process-and-timeline/" target="_blank" rel="nofollow noopener"><strong>Implementation timelines</strong></a> need to be compressed</li>
<li><strong>Certification planning</strong> should begin immediately</li>
</ul>
<p>For those already in progress:</p>
<ul>
<li>Stay the course—your early preparation is about to pay dividends</li>
<li>Ensure your implementation timeline aligns with your contract renewal dates</li>
<li>Consider accelerating certification if you&#8217;re pursuing new opportunities</li>
</ul>
<p>The CMMC program is no longer a future consideration—it&#8217;s an immediate business reality. Defense contractors who treat this as just another compliance checkbox are setting themselves up for lost opportunities and competitive disadvantage.</p>
<h4><strong>The time for preparation is now.</strong></h4>
<p><em>If you need help navigating your CMMC compliance journey: Our team at Ecuron specializes in helping defense contractors implementing the requirements of NIST SP 800-171 and prepare you for a CMMC certification efficiently and effectively. Contact us at <a href="mailto:cmmc@ecuron.com">cmmc@ecuron.com</a> for a no string attached 30 minute consultation to discuss your specific situation and requirements.</em></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Final Sprint to CMMC: 48 CFR Rule Hits OIRA Review</title>
		<link>https://www.ecuron.com/final-sprint-to-cmmc-48-cfr-rule-hits-oira-review/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 12 Aug 2025 23:43:58 +0000</pubDate>
				<category><![CDATA[CMMC]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=2146</guid>

					<description><![CDATA[48 CFR Rule Hits OIRA Review as DoD Signals &#8220;No Question&#8221; About Implementation August 12th, 2025 The moment Defense Industrial Base (DIB) contractors have been waiting for—and perhaps dreading—is finally here. The Cybersecurity Maturity Model Certification (CMMC) is about to become reality. There is no more time for &#8220;wait and see.&#8221; The Big Milestone: 48 [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1><strong>48 CFR Rule Hits OIRA Review as DoD Signals &#8220;No Question&#8221; About Implementation</strong></h1>
<p>August 12th, 2025<br />
The moment Defense Industrial Base (DIB) contractors have been waiting for—and perhaps dreading—is finally here. The Cybersecurity Maturity Model Certification (CMMC) is about to become reality. There is no more time for &#8220;wait and see.&#8221;</p>
<h2><strong>The Big Milestone: 48 CFR Rule in Final Review</strong></h2>
<p>On July 22, 2025, DoD took the one of last steps required to put CMMC requirements into future contracts: formally submitting the final 48 CFR rule to the Office of Information and Regulatory Affairs (OIRA). This rule is the missing piece that empowers contracting officers to insert DFARS 252.204-7021—the CMMC clause—into every new DoD solicitation and contract.</p>
<p>Once OIRA review is complete (<a title="Section 6 (b), page 8" href="https://www.archives.gov/files/federal-register/executive-orders/pdf/12866.pdf" target="_blank" rel="nofollow noopener">typically within 90 days</a>) and based on the current classification of the 48 CFR rule as not a major rule, nor economically significant it could be published in the Federal Register and become effective immediately—no 60 day waiting period. That means CMMC requirements could start appearing in contracts as early as October 2025. With delays it could take until February 2026 &#8211; but considering the recent activity that doesn’t seems likely.</p>
<h3><strong>Historic First: Secretary of Defense Publicly Endorses CMMC</strong></h3>
<p>For the first time ever, a statement from the Secretary of Defense in a <a title="https://media.defense.gov/2025/Jul/22/2003759081/-1/-1/1/ENHANCING-SECURITY-PROTOCOLS-FOR-THE-DEPARTMENT-OF-DEFENSE.PDF" href="https://media.defense.gov/2025/Jul/22/2003759081/-1/-1/1/ENHANCING-SECURITY-PROTOCOLS-FOR-THE-DEPARTMENT-OF-DEFENSE.PDF" target="_blank" rel="noopener">Memorandum for Senior Pentagon Leadership</a> from July 18<sup>th</sup> 2025 mentioned and endorsed CMMC:</p>
<p><em>“[…] the Department will fortify existing programs and processes utilized within the Defense Industrial Base (DIB) to ensure that adversarial foreign influence is appropriately eliminated or mitigated […]. Specifically, the DoD CIO will leverage efforts such as the Cybersecurity Maturity Model Certification, […].&#8221;</em></p>
<p>This marks a significant shift from internal policy discussions to official endorsement, underscoring the program&#8217;s legitimacy and long-term presence in the defense industrial base.</p>
<h3><strong>What This Means for Defense Contractors Right Now</strong></h3>
<h4><strong>Mandatory Compliance is Coming</strong></h4>
<ul>
<li>DFARS 252.204-7021 will require CMMC certification (or self-attestation during the initial roll-out phase and depending on contract type) before contract award</li>
<li>The rule could become effective upon publication—no long grace period</li>
<li>Both, self-assessment requirements and certified audits by C3PAOs, will begin appearing in solicitations</li>
</ul>
<h4><strong>The Specifics of the Level 2 Requirements </strong></h4>
<ul>
<li>Self-attestation requires implementation of at least 80% of the 110 NIST SP 800-171 Rev 2 controls – which translates to 88 controls</li>
<li>Any remaining deficiencies must be closed within 180 days</li>
<li>Third-party certification via C3PAOs will be the standard expectation for CUI contracts after the initial roll-out phase of 6-12 months.</li>
</ul>
<h4><strong>Critical Misunderstanding: Waivers Are Contract-Specific, Not Company-Wide</strong></h4>
<p>A key detail contractors often get wrong: <strong>waivers or exceptions to CMMC will NOT be granted at the company level.</strong></p>
<p>The DoD has made it clear that waivers will be issued only at the contract level, only for a <a title="https://downloads.regulations.gov/DOD-2023-OS-0063-0003/content.pdf" href="https://downloads.regulations.gov/DOD-2023-OS-0063-0003/content.pdf" target="_blank" rel="nofollow noopener">very small percentage (2%)</a>, and only when a specific mission-need justifies it. This means:</p>
<ul>
<li>You cannot expect a blanket exception for your company</li>
<li>Even if one program office grants a waiver, another solicitation may still require full CMMC compliance</li>
<li>Contractors should assume compliance is mandatory across the board unless explicitly told otherwise by the contracting officer for a specific contract</li>
</ul>
<h3><strong>Your Action Plan: No More Delays</strong></h3>
<p>The October 2025 timeline gives contractors a clear but short runway. Here&#8217;s what you need to do now:</p>
<ul>
<li>
<h5><strong>Start or accelerate your CMMC Level 2 readiness plan today. </strong></h5>
<p>Even if you have performed a self assessment for NIST SP 800-171 and submitted your score to SPRS: get a 3rd party assessment that will give you an accurate status of your implementation! Expect your score to drop by ~100 points.</li>
<li>
<h5><strong>Ensure your scope is correct.</strong></h5>
<p>One of the biggest issues we see: proper scoping of the CUI environment. If you need help reach out.</li>
<li>
<h5><strong>Finalize your NIST SP 800-171 implementation</strong><strong>.</strong></h5>
<p>Don&#8217;t assume you&#8217;ll get a waiver, because 98% won&#8217;t. If you are stuck get help!</li>
<li>
<h5><strong>Prepare for third-party assessments</strong></h5>
<p>If you are handling Controlled Unclassified Information (CUI) your are looking at CMMC Level 2 requirements. If you think you meet all 110 controls (and 320 assessment objectives !) engage with a 3rd party to confirm.</li>
<li>
<h5><strong>Engage stakeholders across your business</strong></h5>
<p>Executive support is probably the most important factor for a successful certification. This transition to CMMC will affect procurement, compliance, HR, and operations. This is not just an IT problem – it impacts business workflows and processes as well.</li>
</ul>
<h3><strong>Key CMMC Timeline at a Glance</strong></h3>
<ul>
<li><strong>October 2024:</strong> CMMC Program established via 32 CFR Part 170</li>
<li><strong>July 22, 2025:</strong> 48 CFR Rule submitted to OIRA</li>
<li><strong>as early as October, 2025:</strong> CMMC clause expected in new DoD solicitations</li>
</ul>
<p>The final rule signals the definitive end of delays. CMMC will soon be embedded in new DoD contracts, and compliance is about to become the price of admission to the Defense Industrial Base.</p>
<p>The question is no longer &#8220;if&#8221; but &#8220;when&#8221;—and that when is likely just weeks away.</p>
<p><strong>To discuss your organization’s specific cybersecurity &amp; compliance needs or simply to learn more about DFARS, NIST SP 800-171, and CMMC requirements <a href="https://www.ecuron.com/contact/">contact us</a> for a 30-minute consultation. Let’s make sure you don’t miss out on new contract awards.</strong></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Enhancing Security with Cyber Threat Intelligence Services</title>
		<link>https://www.ecuron.com/enhancing-security-with-cyber-threat-intelligence-services/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 12 Sep 2023 20:52:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=2077</guid>

					<description><![CDATA[In today&#8217;s digital age, where cybersecurity threats are becoming increasingly sophisticated and prevalent, the need for effective cyber threat intelligence services has never been greater. Organizations of all sizes and industries face the constant risk of data breaches, hacking attempts, and other malicious activities that can have devastating consequences.&#160;Cyber threat intelligence empowers organizations to stay [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="thrv_wrapper tve_wp_shortcode"><div class="tve_shortcode_raw" style="display: none"></div><div class="tve_shortcode_rendered"><p>In today&#8217;s digital age, where cybersecurity threats are becoming increasingly sophisticated and prevalent, the need for effective <strong>cyber threat intelligence services</strong> has never been greater. Organizations of all sizes and industries face the constant risk of data breaches, hacking attempts, and other malicious activities that can have devastating consequences.</p><p>Cyber threat intelligence empowers organizations to stay one step ahead of cyber-criminals by understanding their tactics, motivations, and targets. With this knowledge in hand, businesses can develop robust cybersecurity strategies that effectively protect their sensitive data and critical assets.</p><p>In this post, we will explore the various aspects of cyber threat intelligence services: from its definition, its role in mitigating risks associated with cyber threats, to the benefits it offers to organizations across different sectors.</p><h2><strong>Why Your Business Needs Professional Cyber Threat Intelligence Services</strong></h2><p>Often abbreviated as CTI, <strong>Cyber Threat Intelligence is the process of collecting, analyzing, and interpreting data to identify potential cyber threats and vulnerabilities.</strong> It involves monitoring various sources such as dark web forums, hacker communities, and security research reports to identify emerging patterns and trends in cyber-criminal activities. By leveraging advanced technologies and expert analysis, threat intelligence services provide organizations with valuable insights into potential vulnerabilities within their infrastructure and networks. This allows them to proactively detect and mitigate threats before they can cause significant damage.</p><p>One of the key advantages of professional <strong>cyber threat intelligence services</strong> is their ability to provide <strong>real-time insights</strong> into emerging threats and trends. This enables businesses to stay one step ahead of cyber-criminals and take proactive security measures to mitigate risks effectively. By continuously monitoring your digital infrastructure, these services ensure that any suspicious activities or <a href="https://www.cisa.gov/resources-tools/resources/operational-value-indicators-compromise-white-paper" target="_blank" rel="noopener"><strong>indicators of compromise</strong></a> are promptly detected and addressed.</p><p>Furthermore, engaging with professional cybersecurity providers allows businesses to benefit from their extensive knowledge and expertise in cyber risk management. They can conduct thorough assessments of your existing security protocols, identify potential weaknesses, and recommend tailored solutions that align with your specific needs.</p><p>Investing in professional cyber threat intelligence services is an investment in the long-term success and resilience of your business. By proactively managing cyber risks, you not only protect sensitive data but also safeguard your reputation, customer trust, and overall business continuity.</p><p>With the ever-evolving nature of cyber threats, relying solely on traditional passive security measures is no longer sufficient. Your business needs professional cyber threat intelligence services to stay ahead of adversaries by detecting threats early on while implementing proactive security measures for a robust defense against potential breaches.</p><p><img decoding="async" class="aligncenter size-full wp-image-2087" src="https://www.ecuron.com/wp-content/uploads/threat-intelligence-service-discussion-6500c72998316.webp" alt="Threat Intelligence Service Discussion" width="720" height="300" srcset="https://www.ecuron.com/wp-content/uploads/threat-intelligence-service-discussion-6500c72998316.webp 720w, https://www.ecuron.com/wp-content/uploads/threat-intelligence-service-discussion-6500c72998316-300x125.webp 300w" sizes="(max-width: 720px) 100vw, 720px" /></p><h3><strong> 1. Identifying and Mitigating Potential Risks</strong></h3><p>Identifying and mitigating potential risks is of utmost importance to ensure the security and stability of an organization. This involves conducting comprehensive vulnerability assessments, performing risk analysis, and engaging in proactive threat hunting.</p><p><strong>Vulnerability assessments</strong> play a critical role in identifying weaknesses within an organization&#8217;s systems, networks, and applications. By conducting regular assessments, businesses can gain insights into potential vulnerabilities that could be exploited by malicious actors. This allows them to prioritize their efforts towards addressing these vulnerabilities before they can be exploited.</p><p><strong>Risk analysis</strong> goes hand in hand with vulnerability assessments by evaluating the potential impact and likelihood of various risks materializing. By analyzing the severity of identified vulnerabilities and assessing their potential consequences, organizations can make informed decisions on how to allocate resources for mitigation efforts.</p><p>But it doesn&#8217;t stop there. Proactive threat hunting involves actively searching for signs of malicious activity within an organization&#8217;s network or systems. This approach allows businesses to detect threats that may have gone unnoticed by traditional security measures such as firewalls or antivirus software.</p><h3><strong> 2. Staying Ahead of Emerging Threats and Attack Vectors</strong></h3><p>Staying ahead of emerging threats and attack vectors is crucial for businesses to protect their sensitive data and maintain the trust of their customers. With the rapid advancements in technology, cyber-criminals are constantly evolving their tactics to exploit vulnerabilities and gain unauthorized access.</p><p>To effectively combat these threats, organizations must conduct thorough cyber threat landscape analysis. This involves monitoring and analyzing the latest trends, techniques, and vulnerabilities that cyber-criminals may exploit. By understanding the current state of the threat landscape, businesses can proactively implement security measures to mitigate risks.</p><p>One of the most challenging aspects of emerging threats is <strong>zero-day vulnerabilities</strong>. These are previously unknown vulnerabilities in software or systems that hackers can exploit before developers have a chance to patch them. To address this issue, organizations need to have robust vulnerability management programs in place. This includes continuous monitoring for new vulnerabilities, timely patching or mitigation strategies, and proactive threat intelligence gathering.</p><p>Furthermore, staying ahead of emerging threats requires keeping up with new attack techniques. Cyber-criminals are constantly innovating and finding new ways to infiltrate systems or deceive users. By actively researching and understanding these tactics, organizations can develop effective defense strategies such as implementing advanced firewalls, intrusion detection systems, multi-factor authentication protocols, and employee training programs.</p><p>To stay ahead of emerging threats and attack vectors, organizations must continuously analyze the cyber threat landscape, address zero-day vulnerabilities promptly with robust vulnerability management programs, and stay informed about new attack techniques through research and proactive defense strategies. By doing so, businesses can enhance their cybersecurity posture and safeguard their critical assets from potential breaches or unauthorized access attempts.</p><p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2085" src="https://www.ecuron.com/wp-content/uploads/cyber-threat-intelligence-services-abstract-720.webp" alt="Cyber Threat Intelligence Services - abstract" width="720" height="354" srcset="https://www.ecuron.com/wp-content/uploads/cyber-threat-intelligence-services-abstract-720.webp 720w, https://www.ecuron.com/wp-content/uploads/cyber-threat-intelligence-services-abstract-720-300x148.webp 300w" sizes="auto, (max-width: 720px) 100vw, 720px" /></p><h3><strong> 3. Enhancing Incident Response Capabilities</strong></h3><p>Incident response planning is crucial for organizations to effectively address and mitigate potential threats. However, simply having a plan in place is not enough. Organizations must also focus on enhancing their incident response capabilities to ensure swift and efficient action when a security incident occurs.</p><p>One key aspect of enhancing incident response capabilities is the development and implementation of effective incident containment and remediation strategies. These strategies involve identifying and isolating the affected systems or networks, as well as implementing appropriate measures to stop the spread of the incident and minimize its impact.</p><p>By investing in advanced technologies such as real-time monitoring tools, organizations can detect incidents early on and take immediate action to contain them. Additionally, leveraging automation can streamline the remediation process by rapidly deploying patches or updates to affected systems, reducing downtime and minimizing disruption to critical operations.</p><p>Organizations should prioritize continuous training and education for their incident response teams. By regularly conducting drills and simulations, team members can practice their skills in a controlled environment, ensuring they are prepared to handle incidents effectively when they arise.</p><p>Enhancing incident response capabilities is not only about reacting promptly to security incidents; it is also about learning from each experience. Organizations should conduct thorough post-incident analyses to identify areas for improvement in their planning, containment strategies, or overall security posture.</p><p>By focusing on enhancing their incident response capabilities through effective planning, robust containment strategies, leveraging advanced technologies, continuous training of personnel, and conducting post-incident analysis for continuous improvement; organizations can better protect themselves against cyber threats and minimize potential damages caused by security incidents.</p><h3><strong> 4. Strengthening Security Posture Through Actionable Insights</strong></h3><p>Real-time threat intelligence feeds with alerts and recommendations provide organizations with up-to-date information on emerging threats, vulnerabilities, and attack patterns. By continuously monitoring various sources such as dark web forums, hacker communities, and malware repositories, these feeds deliver actionable insights that enable proactive defense measures.</p><p>However, simply having access to threat intelligence is not enough. It is essential to have the ability to contextualize this information within the organization&#8217;s specific environment. This is where <strong>contextualized alerts</strong> and recommendations come into play. By analyzing the incoming threat intelligence in relation to an organization&#8217;s unique infrastructure, systems, and user behavior patterns, these tools can provide tailored insights that are directly relevant to the organization&#8217;s security posture.</p><p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-2089" src="https://www.ecuron.com/wp-content/uploads/abstract-network-diagram-720.webp" alt="Abstract network diagram" width="720" height="300" srcset="https://www.ecuron.com/wp-content/uploads/abstract-network-diagram-720.webp 720w, https://www.ecuron.com/wp-content/uploads/abstract-network-diagram-720-300x125.webp 300w" sizes="auto, (max-width: 720px) 100vw, 720px" /></p><p>The value of actionable insights gained from <strong>real-time threat intelligence</strong> feeds cannot be underestimated. By receiving timely alerts about potential threats or vulnerabilities specific to their environment, organizations can take immediate action to mitigate risks before they escalate into full-blown security incidents. Furthermore, contextualized recommendations empower security teams with the knowledge needed to prioritize remediation efforts effectively.</p><h3><strong>The Benefits of Outsourcing Cyber Threat Intelligence Services</strong></h3><p>One of the key advantages of outsourcing <a href="https://www.ecuron.com/cybersecurity-services/cyber-threat-intelligence-as-a-service/">cyber threat intelligence services</a> is cost-effectiveness. Building an in-house team with the necessary skills and knowledge can be expensive and time-consuming. Outsourcing allows businesses to access a dedicated team of experts without the overhead costs associated with hiring and training personnel.</p><p>Outsourcing and <strong>using cyber <a href="https://www.ecuron.com/cybersecurity-services/cyber-threat-intelligence-as-a-service/">threat intelligence as a service</a></strong> can provide numerous benefits for businesses of all sizes: it provides access to a wider range of expertise and resources that may not be available internally. By leveraging the expertise and resources of external providers specializing in <strong>cyber threat intelligence</strong>, companies can enhance their security posture and mitigate risks effectively.</p><h4><strong>By partnering with a trusted cyber threat intelligence service provider, organizations can strengthen their defense against evolving cyber threats while focusing on core business objectives.</strong></h4><p>To learn more about Ecuron&#8217;s Cyber Threat Intelligence Service see as stand alone service or as part of our vCISO offering  please see our <a href="https://www.ecuron.com/cybersecurity-services/cyber-threat-intelligence-as-a-service/" target="_blank" rel="noopener">Threat Intelligence Service</a> page or contact us.</p><p style="text-align: right;"><em>last changes: September 18th 2023</em></p></div></div><div class="tcb_flag" style="display: none"></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Wiring Harness News Features CMMC Update</title>
		<link>https://www.ecuron.com/wiring-harness-news-features-cmmc-update/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 01 Aug 2022 22:33:49 +0000</pubDate>
				<category><![CDATA[CMMC]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=1943</guid>

					<description><![CDATA[August 1st 2022The July/August issue of the Wiring Harness News features an update about the recent developments regarding CMMC. Our CMMC lead Nicholas McBride explains the changes that happened since he first introduced the DoD&#8217;s new cybersecurity framework CMMC to the readership more than a year ago. You can read the article starting page 36 [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="thrv_wrapper tve_wp_shortcode"><div class="tve_shortcode_raw" style="display: none"></div><div class="tve_shortcode_rendered"><p style="text-align: right;"><em>August 1st 2022</em></p><p style="text-align: left;"><a href="https://wiringharnessnews.com/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignright wp-image-1954 size-medium" src="https://www.ecuron.com/wp-content/uploads/wiring-harnesss-news-254x300.jpg" alt="Wiring Harness News Website" width="254" height="300" srcset="https://www.ecuron.com/wp-content/uploads/wiring-harnesss-news-254x300.jpg 254w, https://www.ecuron.com/wp-content/uploads/wiring-harnesss-news.jpg 400w" sizes="auto, (max-width: 254px) 100vw, 254px" /></a>The July/August issue of the <strong>Wiring Harness News</strong> features an update about the recent developments regarding CMMC. Our CMMC lead Nicholas McBride explains the changes that happened since he first introduced the DoD&#8217;s new cybersecurity framework CMMC to the readership more than a year ago. You can read the article starting page 36 in the current issue:<br /><a href="https://newsstand.wiringharnessnews.com/mag/0366868001655894515" target="_blank" rel="noopener">https://newsstand.wiringharnessnews.com/mag/0366868001655894515</a></p><p>For a more comprehensive dive into the existing DFARS requirements and the upcoming CMMC see our report &#8220;<a href="https://www.ecuron.com/dib-report/" target="_blank" rel="noopener"><strong><span data-css="tve-u-17f53857299">Cybersecurity for the DoD Supply Chain and Its Contractors</span></strong></a>&#8220;.</p><p>To discuss your organization&#8217;s specific cybersecurity &amp; compliance needs or simply to learn more about DFARS, NIST SP 800-171, and CMMC requirements <a href="https://www.ecuron.com/contact/">contact us</a> for a 30-minute consultation. Let’s make sure you don’t miss out on new contract awards.</p></div></div><div class="tcb_flag" style="display: none"></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CMMC Timeline Update by DoD</title>
		<link>https://www.ecuron.com/cmmc-timeline-update-by-dod/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 13 May 2022 20:20:10 +0000</pubDate>
				<category><![CDATA[CMMC]]></category>
		<guid isPermaLink="false">https://www.ecuron.com/?p=1919</guid>

					<description><![CDATA[May 13th 2022&#160;After years of delays, the CMMC rulemaking process and subsequent rollout seems to be on track. In fact, the latest update by CMMC director Stacy Bostjanick this week suggests that it might be progressing faster than initially announced. Instead of July of 2023 the new expectation is that CMMC requirements will take effect [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="thrv_wrapper tve_wp_shortcode"><div class="tve_shortcode_raw" style="display: none"></div><div class="tve_shortcode_rendered"><p style="text-align: right;"><em>May 13th 2022</em></p><p>After years of delays, the CMMC rulemaking process and subsequent rollout seems to be on track. In fact, the latest update by CMMC director Stacy Bostjanick this week suggests that it might be progressing faster than initially announced. Instead of July of 2023 the new expectation is that CMMC requirements will take effect in May of next year.</p><p><em>“May 2023 is the critical point. That’s when we think we will be able to start putting the requirement in contracts. … You are probably going to see RFIs, RFPs coming out in the summer of 2023.”</em></p><p>&#8220;<em>Bostjanick said the Pentagon is encouraging companies to do “an early adoption of CMMC” through getting an assessment completed by an approved certified third party assessment organization before the rulemakings go into effect.&#8221;</em></p><p>For the full article see:<br /><a href="https://insidecybersecurity.com/share/13502" target="_blank" rel="noopener" data-link-id="969249770">https://insidecybersecurity.com/share/13502</a></p><p>Depending on the current status, we estimate 6-12 months to prepare for a CMMC Level 2 certification assessment. The bottleneck will be the availability of C3PAOs as everybody will want to get certified at the same time. In other words – it’s time to get ready sooner than later to ensure eligibility for those new contracts.</p><p><a href="https://www.ecuron.com/contact/">Contact us</a> for a 30-minute consultation and let&#8217;s make sure you don&#8217;t miss out on new contract awards.</p></div></div><div class="tcb_flag" style="display: none"></div>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
