The Cybersecurity Maturity Model Certification (CMMC) 1.0 for the Defense Industrial Base (DIB) defines specific cybersecurity practices across five levels of maturity while also measuring the degree to which those practices are institutionalized within an organization. The CMMC model draws on maturity processes and cybersecurity best practices from multiple standards, including the National Institute of Standards and Technology (NIST) frameworks and references, as well as input from DIB entities and the Department of Defense. CMMC requires that DIB organizations complete an assessment of all CMMC practices at a particular level and become certified by a CMMC third-party assessment organization. When fully implemented, CMMC will require all DIB companies to achieve certification at one of the five CMMC levels, which includes both technical security practices and maturity processes. In this SEI Podcast, Andrew Hoover and Katie Stewart, architects of the CMMC model, discuss process documentation, a Level 2 requirement.
Why Software Architects Must Be Involved in the Earliest Systems Engineering Activities
Selecting Metrics for Software Assurance
AI in Humanitarian Assistance and Disaster Response
The AADL Error Library: 4 Families of Systems Errors
Women in Software and Cybersecurity: Suzanne Miller
Privacy in the Blockchain Era
Cyber Intelligence: Best Practices and Biggest Challenges
Assessing Cybersecurity Training
DevOps in Highly Regulated Environments
Women in Software and Cybersecurity: Dr. Ipek Ozkaya
The Role of the Software Factory in Acquisition and Sustainment
Defending Your Organization Against Business Email Compromise
My Story in Computing with Dr. Eliezer Kanal
Women in Software and Cybersecurity: Eileen Wrubel
Managing Technical Debt: A Focus on Automation, Design, and Architecture
Women in Software and Cybersecurity: Grace Lewis
Women in Software and Cybersecurity: Bobbie Stempfley
Women in Software and Cybersecurity: Dr. Lorrie Cranor
Leading in the Age of Artificial Intelligence
Applying Best Practices in Network Traffic Analysis
Create your
podcast in
minutes
It is Free