{"id":7369,"date":"2019-11-14T06:49:29","date_gmt":"2019-11-14T11:49:29","guid":{"rendered":"https:\/\/tsisupport.com\/?p=7369"},"modified":"2021-07-07T04:32:46","modified_gmt":"2021-07-07T08:32:46","slug":"what-is-cmmc-compliance","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=7369","title":{"rendered":"What is CMMC? The Complete CMMC Compliance Guide"},"content":{"rendered":"<p>Believe it or not, the day that many of us thought would never arrive is finally here: the Department of Defense is actually going to start enforcing the CMMC or DFARS\/NIST 800-171 compliance requirements and if the conversations we\u2019ve been having with our managed IT services clients are of any indication, there\u2019s certainly a lot of surprise- and dread- to go around.<\/p>\n<p>As a direct result of these updates and in an attempt to properly secure the Defense Industrial Base (DIB), we\u2019ve developed a brief CMMC guide to help your organization navigate these numerous requirements.<\/p>\n<h2><span style=\"color: #800000;\"><strong>What is CMMC?<\/strong><\/span><\/h2>\n<p>At its core, the CMMC is designed to be an assessment model and certification program intended to clarify the degree in which contractors safeguard both their own and customers\u2019 CUI.<\/p>\n<p>As always, and as with anything related to IT or compliance, it\u2019s a recent progression that will require you to keep a few key things in mind.<\/p>\n<p>Maybe the most important factor to understand about all of this is that, unlike previous years, the various contracting authorities that you\u2019re working with will NOT accept an SSP (System Security Plan) and\/or POA&amp;M (Plan of Action and Milestones) as evidence of intent to eventually adhere with DFARS compliance or as an unofficial, long term compliance deferment strategy.<\/p>\n<p>Instead, under the CMMC, contractors will begin being audited and evaluated based upon their implementation of their respective level\u2019s mandate controls. This can include but is not limited to formulating detailed IT policies, generating comprehensive network documentation and for the higher CMMC levels, the performance of annual penetration tests, to validate their adherence to compliance and verify their CUI\u2019s security posture.<\/p>\n<p>Most organizations will likely be required to adhere to CMMC levels 1 or 3, but regardless of the CMMC level you are required to attain, your certification level and adherence to it, will determine the types of contracts you will be qualified to acquire.<\/p>\n<ul>\n<li>\n<h3><strong>Who Needs CMMC Compliance?<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>It\u2019s essential to reiterate that this CMMC level requirement will flow down to ALL subcontractors, prime and subcontractors alike, that are a part of the DoD supply chain. According to Katie Arrington, CISO for Acquisition under the Office of the Under-Secretary of Defense of Acquisition and Sustainment, only about 5% of contractors that will require CMMC are currently compliant, meaning that there is certainly a lot of work to be done to that end.<\/p>\n<p>As the Secretary of Defense has also stated, future RFPs will require a CMMC designation if you handle Controlled Unclassified Information (CUI)- period. All of this means that the CMMC is something you need to start thinking about as it is will become the standard framework for working with the DoD and any other government or federal agencies in the near future- including the GSA.<\/p>\n<p>The Department of Defense began finalizing the CMMC certifier accreditation program in January 2020, with the accreditation process itself expected starting in June. Based on this timeline, it\u2019s likely that we will see the first accreditations go out in the second half of 2020 with contractor evaluations -meaning the ones you have to care about- beginning now or shortly thereafter.<\/p>\n<ul>\n<li>\n<h3><strong>CMMC Audit and Compliance<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>A dedicated team of auditors will be conducting these CMMC audits, but it is unclear how they will select the contractors that will be reviewed. If the costs of implementing these controls has you concerned, one important change moving forward will be the opportunity to recover, from the prime contractor, the expense of these solutions\u00a0as an \u2018allowable cost\u2019.<\/p>\n<p>This presents an interesting opportunity to not only introduce increased rates, but also new bidding strategies that leverage your CMMC posture as a true competitive advantage over your historical competitors that delayed the implementation of these similar compliance measures.<\/p>\n<p>Because these numerous compliance controls present a considerable cost to any organization, we encourage that you weigh the benefits of attaining CMMC alongside their associated costs to determine if any missed contract opportunities are worth the trouble of implementing these compliance requirements.<\/p>\n<p>If the costs outweigh the potential benefit or if you don\u2019t have the financials to hire additional IT security\/compliance professionals, you may want to consider cutting your losses or outsourcing your compliance needs to a reputable managed services provider or managed security services provider.<\/p>\n<h2><strong>The CMMC versus NIST<\/strong><\/h2>\n<ul>\n<li>\n<h3><strong>What Is NIST?<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>The NIST 800-171 was established on January 1, 2018 and was created by the DoD to improve the low rate of NIST 800-171 compliance across the <strong>DIB<\/strong>.<\/p>\n<p>When NIST 800-171 was initially launched, the DoD did not accept third-party audits to verify both primes and sub contractors\u2019 adherence to these requirements which is why the CMMC was created. The CMMC was brought into effect to implement a systematic approach to audit contractor compliance with NIST SP 800-171 by requiring five varying levels of maturity expectations which range in the number of requirements and controls that must be met in order to achieve certification.<\/p>\n<ul>\n<li>\n<h3><strong>Key Differences between CMMC and NIST<\/strong><\/h3>\n<\/li>\n<\/ul>\n<blockquote><p><a href=\"https:\/\/www.keepandshare.com\/doc17\/23984\/nist-800-171-rev1-vs-cmmc-pdf-193k?dn=y&amp;dnad=y\">&gt; Click here to see our detailed chart of the CMMC vs NIST<\/a><\/p><\/blockquote>\n<h2><strong>CMMC Level 1 versus CMMC Level 3<\/strong><\/h2>\n<p>Based on our research, it is our understanding that the most required CMMC levels will be either CMMC 1 or 3. The requirements within each vary considerably so we\u2019ve outlined the principal differences between the two.<\/p>\n<p><a href=\"https:\/\/www.keepandshare.com\/doc17\/23983\/tsi-cmmc-compliance-checklist-pdf-351k?dn=y&amp;dnad=y\">&gt;&gt; Click here to view TSI\u2019S CMMC Technical Managed Programs<\/a><\/p>\n<ul>\n<li>\n<h3><strong>CMMC Level 1<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>Level 1 or \u201cbasic cybersecurity hygiene\u201d is the minimal level of security controls that a government contractor must establish to get the Cybersecurity Maturity Model Certification. Only the basic security controls, such as such as using antivirus software or ensuring employees change passwords, need to be in place to qualify for this level.<\/p>\n<p>Level 1 is the basis upon which the other levels are built. Once the basic security controls are in place, you will be able to safeguard FCI and keep it away from public viewing. Similarly to CMMC 3, this level has 17 practice areas, which are derived from FAR (<a href=\"https:\/\/www.govinfo.gov\/app\/details\/CFR-2016-title48-vol2\/CFR-2016-title48-vol2-sec52-204-21\/summary\">Federal Acquisition Regulation 48 CFR 52.204- 21<\/a>).<\/p>\n<ul>\n<li>\n<h3><strong>CMMC Level 3<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>This level builds on the basic Level 1 and Level 2 CMMC requirements. Contractors that have achieved Level 3 are equipped with the basic security controls needed to protect sensitive and confidential data and denotes that the contractor has facilitated 130 cybersecurity practices.<\/p>\n<p>These practices are derived from FAR and also include all the practices listed in <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-171.pdf\">NIST SP 800-171<\/a>, as well as 20 other practices. They help implement \u201cgood cyber hygiene\u201d practices to safeguard CUI.<\/p>\n<h2><strong>Implementing CMMC Controls Cost Effectively<\/strong><\/h2>\n<ul>\n<li>\n<h3><strong>The Assessment Phase<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>The first step toward CMMC compliance starts with the assessment phase where you establish a baseline for recommendations that will address any gaps that may impact your CMMC compliance posture. Based on the actionable insights stemming from this assessment, you can start formulating a strategic roadmap addressing these gaps and ultimately move onto the implementation of those controls in preparation of any audit or vendor driven compliance verification request.<\/p>\n<p>This assessment should clearly determine your compliance posture alongside all the required steps and resources to address them. It\u2019s important to also note that because the documentation attesting the completion of these controls is a CMMC requirement, you should do so to also help guide your efforts to make sure you\u2019re paying the appropriate amount of attention to the most heavily weighted compliance requirements of the CMMC.<\/p>\n<ul>\n<li>\n<h3><strong>Plan of Action and Milestones (POA&amp;M)<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>The good news is that getting ready for CMMC certification isn\u2019t necessarily difficult IF there is a precise, regimented plan in place addressing your strategic gaps alongside a solid understanding of how to minimize the exposure of CUI throughout your organization.<\/p>\n<p>At the very least, you can accomplish this by making sure that the parts of your network that are accessing CUI are segregated from the broader network.<\/p>\n<p>Minimizing your \u2018exposure\u2019 to CUI is one of the most critical ways that can significantly minimize your costs and achieve compliance in a way that is both complete and cost-effective.<\/p>\n<ul>\n<li>\n<h3><strong>The Role of a Managed Services Provider<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>Rather than hiring your own CIO\/CISO to address your CMMC requirements ,you could also dramatically minimize the costs of attaining CMMC compliance by choosing to partner with a Managed Security Services Provider that is well oriented with these compliance requirements \u2013 something that we\u2019ve spoken to in a recently published article, <a href=\"https:\/\/tsisupport.com\/tsistaging\/category\/nist-cmmc\/\">\u2018vCISO for CMMC \u00a0\u2019. \u00a0<\/a>\u00a0Because approximately 95%+ of all CMMC certification requirements are cybersecurity related, working with an MSP or MSSP will provide the resources and expertise required for a successful compliance strategy.<\/p>\n<p>In addition to the ongoing management of your compliance strategy, your MSSP can also work with your auditors or clients to verify you adherence and ensure you\u2019re positioned for long term success, rather than investing in additional internal resources to accommodate to these IT requirements. Keep in mind that your CMMC success not only includes the successful implementation of IT solutions, but a clear understanding of what auditors are looking for. Don\u2019t make the mistake of delegating these compliance tasks to your IT team and seriously consider either sourcing or hiring a CIO\/CISO level resource to help accomplish your respective compliance objectives. There is a high degree of expertise required to successfully implement these controls and relying on a small IT team or network administrator is both unfair to them and your organization as a whole- even if they\u2019re insistent that they can accomplish this!<\/p>\n<p>To say that CMMC certification is a huge undertaking is a bit of an understatement, especially considering that you\u2019ll be required to constantly document and verify the security posture of the greater network as well as the end users accessing CUI.<\/p>\n<p>That said, if partnering with an MSSP is your likely route, keep in mind that you need to give your provider considerable time to get you to the point where you need to be. Generally speaking, it takes several months- at a minimum- to get everything into place and requires the ongoing documentation, testing and configurations of these solutions- in addition to your existing security processes- to address today\u2019s evolving cyber threats.<\/p>\n<p>If nothing else, remember that CMMC certification is NOT something you want to wait until the last minute to do. At the very least, you should perform an assessment as soon as you\u2019re able, to help forecast your expenses as well as provide the chance to identify the who\/what\/when\/where\u2019s of the process to clarify exactly what you need to do to become compliant so that it isn\u2019t a complete surprise to your company and any sales opportunities are unanticipatedly lost.<\/p>\n<h2><strong>Preparing for CMMC Certification, Together<\/strong><\/h2>\n<p>At TSI Support International, we understand how important CMMC certification is &#8211; and we&#8217;re also aware that this is one road you&#8217;re not necessarily eager to travel down alone. But the good news is that we\u2019ve been addressing these and similar compliance requirements for over 20 years, and confident we can help you as well. To learn more about how we can help your organization, feel free to contact either myself or a colleague at TSI to schedule your introductory phone call. That way, we can make sure you\u2019re best positioned to address these requirements and can focus on growing your business.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"fl-builder-content fl-builder-content-8802 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8802\"><div class=\"fl-row fl-row-full-width fl-row-bg-color fl-node-5ecf5609ed45b fl-row-default-height fl-row-align-center BlogCTA\" data-node=\"5ecf5609ed45b\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecf5609ee3e5 fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecf5609ee3e5\">\n\t\t\t<div class=\"fl-col fl-node-5ecf5609ee84b fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecf5609ee84b\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5ecf56bfcd1a2\" data-node=\"5ecf56bfcd1a2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Preparing for CMMC Certification, Together<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5ecf56e70b40b\" data-node=\"5ecf56e70b40b\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>At TSI Support International, we understand how important CMMC certification is - and we're also aware that this is one road you're not necessarily eager to travel down alone. But the good news is that we\u2019ve been addressing these and similar compliance requirements for over 20 years, and confident we can help you as well. To learn more about how we can help your organization, feel free to contact either myself or a colleague at TSI to schedule your introductory phone call. That way, we can make sure you\u2019re best positioned to address these requirements and can focus on growing your business.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecf56d0d0793 primary-btn\" data-node=\"5ecf56d0d0793\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecf5684e4647 fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecf5684e4647\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-photo fl-node-5ecf56a357647\" data-node=\"5ecf56a357647\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div role=\"figure\" class=\"fl-photo fl-photo-align-right\" itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n\t<div class=\"fl-photo-content fl-photo-img-png\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" class=\"fl-photo-img wp-image-8801 size-full\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/11\/CMMC-Certification-CTA.png\" alt=\"CMMC-Certification-CTA\" height=\"300\" width=\"300\" title=\"CMMC-Certification-CTA\"  itemprop=\"image\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/11\/CMMC-Certification-CTA.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/11\/CMMC-Certification-CTA-150x150.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Believe it or not, the day that many of us thought would never arrive is finally here: the Department of Defense is actually going to start enforcing the CMMC or DFARS\/NIST 800-171 compliance requirements and if the conversations we\u2019ve been having with our managed IT services clients are of any indication, there\u2019s certainly a lot&hellip;<\/p>\n","protected":false},"author":7,"featured_media":8800,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7,369],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is CMMC? | The Complete CMMC Compliance Guide | TSI<\/title>\n<meta name=\"description\" content=\"Learn what Cybersecurity Maturity Model Certification or CMMC is, who needs cmmc compliance, and how you can implement CMMC controls cost-effectively.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is CMMC? | The Complete CMMC Compliance Guide | TSI\" \/>\n<meta property=\"og:description\" content=\"Learn what Cybersecurity Maturity Model Certification or CMMC is, who needs cmmc compliance, and how you can implement CMMC controls cost-effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=7369\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-14T11:49:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T08:32:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/11\/CMMC-Certification-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeremy Louise\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeremy Louise\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7369\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7369\",\"name\":\"What is CMMC? | The Complete CMMC Compliance Guide | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7369#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7369#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/11\/CMMC-Certification-banner.jpg\",\"datePublished\":\"2019-11-14T11:49:29+00:00\",\"dateModified\":\"2021-07-07T08:32:46+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926\"},\"description\":\"Learn what Cybersecurity Maturity Model Certification or CMMC is, who needs cmmc compliance, and how you can implement CMMC controls cost-effectively.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7369#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=7369\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7369#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/11\/CMMC-Certification-banner.jpg\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/11\/CMMC-Certification-banner.jpg\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7369#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is CMMC? The Complete CMMC Compliance Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926\",\"name\":\"Jeremy Louise\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g\",\"caption\":\"Jeremy Louise\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=7\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is CMMC? | The Complete CMMC Compliance Guide | TSI","description":"Learn what Cybersecurity Maturity Model Certification or CMMC is, who needs cmmc compliance, and how you can implement CMMC controls cost-effectively.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What is CMMC? | The Complete CMMC Compliance Guide | TSI","og_description":"Learn what Cybersecurity Maturity Model Certification or CMMC is, who needs cmmc compliance, and how you can implement CMMC controls cost-effectively.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=7369","og_site_name":"TSI Support","article_published_time":"2019-11-14T11:49:29+00:00","article_modified_time":"2021-07-07T08:32:46+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/11\/CMMC-Certification-banner.jpg","type":"image\/jpeg"}],"author":"Jeremy Louise","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jeremy Louise","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=7369","url":"https:\/\/tsisupport.com\/tsistaging\/?p=7369","name":"What is CMMC? | The Complete CMMC Compliance Guide | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=7369#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=7369#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/11\/CMMC-Certification-banner.jpg","datePublished":"2019-11-14T11:49:29+00:00","dateModified":"2021-07-07T08:32:46+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926"},"description":"Learn what Cybersecurity Maturity Model Certification or CMMC is, who needs cmmc compliance, and how you can implement CMMC controls cost-effectively.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=7369#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=7369"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=7369#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/11\/CMMC-Certification-banner.jpg","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/11\/CMMC-Certification-banner.jpg","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=7369#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"What is CMMC? The Complete CMMC Compliance Guide"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926","name":"Jeremy Louise","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g","caption":"Jeremy Louise"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=7"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/7369"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7369"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/7369\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8800"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}