The "New" CMMC 2.0 (aka 800-171): Not the Right Way to Fix the DIB Security Crisis
I. Current Analysis: The nation is under active, daily cyber attack by our adversaries. But the nation’s response has been too slow and ineffective, resulting in the loss of hundreds of billions of taxpayer dollars and Department of Defense (DoD) intellectual property and weapon systems we all depend upon for our security. A particularly vulnerable segment of our national Defense Industrial Base (DIB) is the huge number (300-750k) of companies that provide critical and sensitive products and services to the DoD--and which remains basically undefended. It is and will remain an enviable situation for our adversaries.
The DoD has recognized this vulnerability for years and in 2017 moved to require defense contractors to implement cybersecurity controls in DoD contracts via a pledge within contracts by contractors to meet NIST SP 800-171 requirements. Unfortunately, the DoD did not provide adequate resources to any responsible agencies for enforcement and support. This includes the Defense Contract Management Agency’s DIBCAC program, wherein government assessors would travel to a defense contractor’s facility and conduct an in-person assessment of their compliance with the controls detailed within NIST SP 800-171. The maximum number of on-site assessments which could be conducted by the DCMA DIBCAC personnel numbered in the dozens per year, wherein well over 350,000 companies required assessment.
Now, the DoD is moving to enhance NIST SP 800-171 requirements with the Cybersecurity Maturity Model Certification (CMMC) program. The new CMMC program attempts to address the issue of enforcement that led to the effective failure of the NIST SP 800-171 program.
Under the CMMC program, DIB companies are no longer able to self-certify their compliance with the government’s cybersecurity requirements. The plan is for independent, third-party assessors to perform CMMC assessments on behalf of the government. The government will then leverage the assessment results in order to make contract award decisions. By relying on industry to produce enough qualified and trained assessors, the DoD hopes to conduct over 100,000 on-site assessments per year throughout the DIB. With each CMMC assessment being valid for three years, this number of assessments theoretically should adequately cover the number of contractors resident in the DIB. However, conducting over 100,000 assessments per year, at varying CMMC levels, with differing-sized facilities and the entire range of cybersecurity maturity found within the DIB will take over 5,000 trained and certified assessors to complete. This number goes up in a linear fashion as more and more U.S. government agencies (DHS, GSA, etc.) and cabinet-level organizations adopt the CMMC model as their preferred choice of cybersecurity standard. In addition, all of the third parties that these DIB contractors use and who have access to their data also need to be assessed under the CMMC model.
The movement from a self-assessed cybersecurity requirement to a pass/fail external assessment should make a positive difference, but by itself, even if 5,000 qualified assessors can be recruited and trained in a reasonable amount of time, external assessments are not nearly enough to defend the DIB. This is especially true since (once again) the government and DoD have neither provided nor funded the resources required to achieve DIB CMMC compliance.
There is little evidence that the current approach will succeed--and meanwhile our adversaries are hard at work hollowing out the intellectual property that is the foundation of our nation's security.
Based on our years of hands-on experience, here are the five main reasons why we think the CMMC program (as it is currently being implemented) will fail to adequately address the security needs of companies within the DIB.
It could be rationally assumed that since the DoD is driving this radical change within the DIB in response to national security threats, the DoD would take responsibility for the current state of affairs and provide the resources required to effect the large-scale change required. Thus far, however, there is no evidence of that. The DoD does not even fund the CMMC-Accreditation Body or the CMMC Center of Excellence.
If we are accurately describing the current state of affairs with respect to the CMMC, DIB and DoD, then this apparent hands-off approach may end up being the number one reason for CMMC mission failure. And this failure will undoubtedly result in the wasting of billions of dollars spent by DIB private enterprise companies as they futilely chase the wrong cybersecurity solutions. It is our opinion that the current course of action is not only unsustainable but also not cost effective for the DIB. And if not quickly given other alternatives and/or support, many thousands of smaller companies will be forced to leave the DIB because they will be unable to comply with CMMC requirements.
This mass exit may result in the following:
Note: The solution associated with this White Paper is primarily targeted at the 90% of DIB companies that could be described as “smaller.” In addition, even though larger companies may have bigger budgets, we have seen no evidence that they are significantly more secure than the smaller companies we target.
III. Solution: An Evolved, IT/Cybersecurity Managed Service Paradigm Specifically for the DIB
Funded primarily by the private enterprise marketplace, we propose to use currently operational cloud technologies to fully host and protect DIB companies within multi-tiered, defendable, and agile enclave cloud environments. The basic idea is that willing companies will migrate their current IT infrastructures into highly structured, standardized, and protected environments. Responsibility for i) IT ii) cybersecurity and iii) privacy will transfer from DIB companies to a newly created services company whose sole mission is to protect and support the DIB.
One such company will be insufficient to protect the full DIB. A series of such organizations will no doubt develop to do so. The first will demonstrate and effectively evangelize the model.
We envision engineering this environment and specific requirements associated with it so it can be replicated by other companies. Demand will far exceed supply. Therefore, following the model established by Elon Musk, we intend to make our solutions available to others who are in a position to replicate them at minimal cost. We feel this model is required in order to scale at the rate necessary to meet national security demands.
It is our view that it is now technically feasible to protect large swaths of the DIB with extremely high levels of protection and, when done at scale, the costs for such protection will be less than current costs. While development and implementation of such a solution is clearly challenging on multiple levels, we are fortunate that the quickly evolving technical landscape presents this opportunity and solution.
The initial, willing DIB participants, can be migrated and co-located into multi-tiered, defendable, and upgradable enclave cloud environments, versus allowing them to solve this cybersecurity problem for themselves. While such a transition and transfer of risk is no small task, it is less daunting than trying to protect the DIB through the current method of tackling and maintaining CMMC compliance one company at a time.
The creation of multiple secure, government-like (e.g., GCC High), cloud environments which allow for multiple company enclaves is not only technically feasible, but also a superior technical and managerial solution. And the economies of scale of such a shared environment will make it a solution everyone can afford. While most companies only track direct IT costs, there are significant indirect IT costs, that, when added to the direct costs, makes this solution even more attractive. Especially for the majority of DoD contractors - small businesses.
It is our judgment that if these new cloud environments all follow and meet our standardized requirements, then these environments can be engineered to be 100% secure. Please understand that as cybersecurity professionals, we fully understand the current impossibility of a 100% secure environment and the danger of even using such terminology. But we have come to believe that this is an achievable goal.
But we ask the reader not to think of this solution in terms of today’s IT ecosystems. We ask you to move your thinking forward and look into the near future.
Current cybersecurity discussions give all advantages to the attackers. And rightly so. The current IT ecosystem is not defendable for the vast majority of organizations. But if the attackers were always confronted by the most sophisticated defenses available, then the number of attackers would be radically reduced, and defenses could be further honed to deal with them.
We believe that our stated goal of 100% security for clients who are willing to migrate their IT infrastructure into these fully controlled environments is technically feasible--even today with classical computing. However, effective use of emerging technologies such as AI, ML, blockchain, and other technologies, coupled with fully managed IT and security environments can further improve the security equation for participants. And, if one considers the exponential potential of quantum computing, then the possibilities for a new security paradigm become even stronger. The one variable that is hard to control is the human being. We will design, build and manage environments that can even deal with the challenge of error-prone human behavior.
All things considered, we believe our proposed solution is the only logical possibility.
IV. Taking the Conversation Further
Some topics for thought regarding our solution:Chris Golden: Founding Board Member of the CMMC-AB and trainer of all current Provisional Assessors
Mitch Tanenbaum and Raymond Hutchins: Owners of Turnkey Cybersecurity and Privacy Solutions LLC (an RPO for the CMMC-AB)