In November 2021, the Department of Defense (DoD) announced the transition from CMMC 1.0 to CMMC 2.0, streamlining the certification process and reducing compliance burdens for contractors.
The updated framework introduces three levels of cybersecurity maturity, with Level One serving as the foundational tier. Here’s an in-depth look at CMMC 2.0 Level One, its key components, and the industries that need to take note.
CMMC 2.0 Level One, also known as “Foundational,” focuses on safeguarding Federal Contract Information (FCI). FCI is information not intended for public release that is provided or generated under a government contract.
This level is designed to ensure that contractors implement basic cybersecurity practices to protect sensitive but unclassified information.
CMMC 2.0 Level One encompasses 17 cybersecurity practices aligned with the FAR (Federal Acquisition Regulation) 52.204-21, which outlines the minimum standards for safeguarding FCI. These practices focus on basic cyber hygiene and include:
Unlike the higher levels of CMMC, Level One does not require third-party certification. Instead, organizations can perform annual self-assessments and attest to their compliance.
This shift reduces the financial and administrative burden, particularly for small businesses.
While CMMC 2.0 Level One primarily applies to defense contractors handling FCI, its relevance extends beyond the defense industrial base. Industries and organizations that frequently interact with government contracts or sensitive information should be aware of these requirements. These include:
CMMC 2.0 Level One establishes a baseline for cybersecurity, addressing common vulnerabilities that adversaries exploit. By adhering to these practices, organizations can:
CMMC 2.0 Level One represents a critical step toward improving cybersecurity across the defense supply chain and beyond.
Its emphasis on basic cyber hygiene ensures that even small organizations can contribute to the security of sensitive information.
As cyber threats continue to evolve, adopting these foundational practices is not just a requirement but a necessity for organizations aiming to safeguard their operations and maintain compliance in today’s interconnected landscape.