Book a demo form

Book a demo

E8 Brochure Campaign Traffic

Resource Download

Contact Us

Signup Form (Blog Page and Resources Page)

Services Signup (MSSP page popup)

MITRE Att@ck Download (SEIM Pages 2021)

Book a demo form

Landing page - free trial form

Book a demo

E8 Brochure Campaign Traffic

Landing page - E8 demo form

Download the SmartCheck Brochure

Request SmartCheck for Ransomware Demo

SmartCheck for Ransomware Demo

SmartCheck Demo LP

SmartCheck Demo LP 2

MITRE ATT@CK Webinar - Jun 2022

Register(Required)
Agree(Required)
you must read and acknowledge our privacy policy
Marketing

July 2022 Landing Page (Brochure Download)

  • This field is for validation purposes and should be left unchanged.

July 2022 Landing Page (Director)

  • This field is for validation purposes and should be left unchanged.

Insurance - 25 Minute Q&A

  • This field is for validation purposes and should be left unchanged.

Insurance - Checklist Download

  • This field is for validation purposes and should be left unchanged.

Contact Us (Japan New)

  • お問い合わせフォーム

Dec 22 - eGuide

  • This field is for validation purposes and should be left unchanged.

Dec 22 - No Obligation Demo

  • This field is for validation purposes and should be left unchanged.

Jan 23 - Cyber Gap

  • This field is for validation purposes and should be left unchanged.

Jan 23 - Cyber Gap - Sec Managers (AU)

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Jan 23 - E8 Brochure - Directors (AU)

"*" indicates required fields

Receive
Privacy*

Jan 23 - Talk To An Expert - Landing (AU)

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Jan 23 - E8 Brochure - Directors (AU) (POPUP)

"*" indicates required fields

Receive
Privacy*

Jan 23 - Cyber Gap - Landing (AU) (POPUP)

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Asset_Downloads_Insurance_Campaign_3

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Asset_Downloads_Insurance_Campaign_1

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Asset_Downloads_Insurance_Campaign_2

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Asset_Downloads_Insurance_Campaign_4

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

eGuide_Insurance_Campaign

  • This field is for validation purposes and should be left unchanged.

Checklist_Insurance_Campaign

  • This field is for validation purposes and should be left unchanged.

Expert_Insurance_Campaign

"*" indicates required fields

Marketing
Consent*
This field is for validation purposes and should be left unchanged.

Webinar - MITRE ATT&CK® work for you - PHT - Mar 23

Agree(Required)
you must read and acknowledge our privacy policy
Marketing

Webinar - MITRE ATT&CK® work for you - AEDT - Mar 23

Agree(Required)
you must read and acknowledge our privacy policy
Marketing

e8_requestademo_mar2023

  • This field is for validation purposes and should be left unchanged.
Japan

CMMC

CMMC compliance solution page for Huntsman Security

What is CMMC?

The Cybersecurity Maturity Model (CMMC) is a US initiative lead by the Office of the Assistant Secretary of Defense for Acquisition within the Department of Defence (DoD). It builds upon existing regulation (DFARS 252.204-7012) that requires DoD contractors and subcontractors to safeguard information within the US supply chain using a self-certification method.  The new risk management framework (RMF) adds a verification component that requires the employment of third-party auditors to conduct the audit and certification process. The intent is to identify the required CMMC level in RFP sections L and M and use as a “go / no go decision” when selecting suppliers.

Huntsman Security’s CMMC solution provides excellent coverage of the practices specified within CMMC requirements for both audit requirements and improvement of cyber hygiene.

Download our CMMC Compliance Guide Overview

A summary of CMMC requirements

The CMMC RMF provides a means of improving the alignment of maturity processes and cybersecurity practices with the type and sensitivity of information to be protected and the range of threats:

an image showing CMMC Maturity Levels

CMMC Maturity Levels

Suppliers who handle Controlled Unclassified Information (CUI) will need to be audited and obtain certification from a third-party auditor that appropriate maturity in processes and practices are being achieved.

The model consists of capabilities, processes and practices organised into a set of domains that are mapped across five maturity levels.  The model is cumulative, which means that in order to achieve a desired maturity level, an organisation must also demonstrate achievement of the preceding lower levels.  The 17 domains are summarised below.  Full details can be found on the official government site here.

A image illustrating the CMMC domains

CMMC Domains Overview

About CMMC Levels

At each maturity level, organisations are required to comply with the nominated processes and practices.

an illustration of CMMC risk management framework levels, processes and practices

CMMC Levels

CMMC Level 1 “Basic Cyber Hygiene”

Organisations are required to implement 17 specified practices.  However, they may not rely on documentation, consequently they do not need to be audited.

CMMC Level 2 “Intermediate Cyber Hygiene”

Organisations are required to implement 72 (17+55) specified practices, plus establish and document practices and policies.  Level 2 is regarded as a ‘progression’ stage where documentation is very much work in progress.

 CMMC Level 3 “Good Cyber Hygiene”

Organisations are required to implement 130 (17+55+58) specified practices.  They must also actively manage their established processes within detailed plans showing missions, goals, project plans, resourcing, training and inclusion of relevant stakeholders.

CMMC Level 4 “Proactive”

Organisations are required to implement 156 (17+55+58+26) specified practices.  In addition to Level 3 process requirements, they must also review and measure practices for effectiveness.

CMMC Level 5 “Advanced / Progressive”

Organisations are required to implement 171 (17+55+58+26+15) i.e. all specified practices.  In addition to Level 4 process requirements, they must standardise and optimise process implementation across the organisation.

When do suppliers need to comply?

CMMC version 1.0 became available in January 2020.  From June 2020, the requirements form part of the DoD’s Request for Information.  The new certification won’t be required for any contracts already signed, only new ones. The first solicitations mandating CMMC  are due to come out in the third quarter of 2020.  That means it will take some time to bring all contractors into compliance, as five years is the typical duration of many contracts.

How Huntsman Security meets CMMC requirements 

If you are a certified auditor or you are looking to implement the framework’s requirements, Huntsman Security’s solution provides excellent coverage, as per the table below:

A table detailing Huntsman Security's CMMC Domain coverage

Huntsman Security’s coverage of CMMC Domains

In summary the Huntsman Security solution supports:

  • 16/17 Domains (94%)
  • 37/43 Capabilities (86%)
  • 139/171 Practices (81%)

The solution includes operational controls directly, the monitoring of control operation and assurance (and regular reporting) of control effectiveness.

Mapping to the requirements

Download the Compliance Guide Overview to explore how Huntsman Security’s solution supports the certification process and improvement of cyber hygiene.

Download our CMMC Compliance Guide Overview

Find out more 

You can request the full Compliance Guide or arrange to discuss your requirements with the Huntsman Security Engineering Team via the button below.

Request More Info