COMPLIANCE BRIEF
CMMC 2.0 Rulemaking
Procedure and the
False Claims Act
What organizations doing business with the DoD need to
know about CMMC 2.0 and how the False Claims Act is
making noncompliance a costly decision
CMMC 2.0
Cybersecurity Maturity Model Certification (CMMC) 2.0 is a set of standards created by the Department of Defense (DoD) to
for organizations seeking to bid on DoD contracts, and the level of compliance required depends on the sensitivity of the
information they will handle. Organizations doing business with the DoD must comply with these standards, or face fines and
penalties under the False Claims Act.
CMMC 1.0 had five maturity levels, but CMMC 2.0 reduced them to three tiers and aligned closely to NIST 800 standards. Level 1 is
foundational and requires annual self-assessment with attestation from a corporate executive. It consists of 17 basic cyber-hygiene
practices that all companies in the defense supply chain must implement. Companies at this level must demonstrate that they
have established basic security practices to protect federal contract information (FCI). Level 2 is mapped to NIST SP 800-171 and
requires triennial third-party assessments from CMMC Third Party Assessor Organizations (C3PAOs) for contractors that send,
share, receive, and store critical national security information. A total of 110 practices must be implemented at this level, which
includes configuration management, incident response, identification and authentication, and maintenance. Level 3 is expert,
aligned with NIST SP 800-172, and will require triennial government-led assessments. It is still in production and the specifics have
not yet been made public.
Final Rulemaking Expectations
CMMC 2.0 updates the program structure and requirements, which will be implemented through rulemaking in both Title 32 and
Title 48 of the Code of Federal Regulations via the Defense Federal Acquisition Regulation Supplement (DFARS) and to finalize
the National Institute of Standards and Technology (NIST) 800-171 assessment methodology and requirements. Both rules are
scheduled for release in May 2023. Changes to CMMC 2.0 include reducing the number of levels from five to three, removing
maturity processes and unique practices from all levels, and requiring independent third-party assessments for prioritized
acquisitions involving controlled unclassified information (CUI) at Level 2.
The DOD has previously stated that the rulemaking process may take up to 24 months to complete, although they have also said
it could take 15 to 24 months to implement the changes through rulemaking. According to contracting attorney Robert Metzger,
the likely 32 CFR rule will go out for public comment in summer 2023 as a proposed rule and be released as a final rule in 2024. It is
pivotal for organizations to stay compliant with their contract if they claim to be implementing controls, as according to Metzger,
“companies remain subject to the existing cyber contract requirements, and they can demonstrate their achieved security by
having C3PAO assessments done before the rules are final.”





COMPLIANCE BRIEF
Copyright © 2023 Kiteworks. Kiteworks’ mission is to empower organizations to effectively manage risk in every send, share, receive, and
save of sensitive content. The Kiteworks platform provides customers with a Private Content Network that delivers content governance,
compliance, and protection. The platform unifies, tracks, controls, and secures sensitive content moving within, into, and out of their
organization, significantly improving risk management and ensuring regulatory compliance on all sensitive content communications.
CMMC 2.0 Rulemaking Procedure and the False Claims Act
In the first comprehensive, independent study of the DIB’s cybersecurity maturity, conducted by Merrill Research and
commissioned by CyberSheath, “A shocking 87% of contractors have a sub-70 Supplier Performance Risk System (SPRS) score,
the metric that shows how well a contractor meets Defense Federal Acquisition Regulation Supplement (DFARS) requirements.
An organization can demonstrate their achieved security by having C3PAO assessments done before the rules are final. If
organizations are not compliant, they are expected to disclose any breaches under the Civil Cyber Fraud Initiative.
Cost of Noncompliance
Compliance with CMMC 2.0 is critical to maintaining security in the supply chain and ensuring the protection of sensitive data.
Noncompliance with CMMC 2.0 is not an option and could result in dire consequences for organizations doing business with
the DoD. The Civil Cyber-Fraud Initiative, which combines the department’s expertise in civil fraud enforcement, government
procurement, and cybersecurity, uses the False Claims Act to pursue cybersecurity-related fraud by government contractors and
grant recipients. This Act includes a whistleblower provision that allows private parties to assist the government in identifying
fraudulent conduct and share in any recovery while being protected from retaliation. Failure to comply with CMMC 2.0 can lead
to fines of $10,000 per control, with a minimum of 110 controls in Level 2, under the False Claims Act. Compliance with CMMC 2.0
is critical to maintaining supply chain security, protecting sensitive data, and preventing new and emerging cyber threats to the
security of critical systems and information.
CMMC 2.0 is a crucial security standard that DoD contractors must adhere to when bidding on DoD contracts. CMMC 2.0 reduces
the number of levels from five to three and requires independent third-party assessments for prioritized acquisitions involving
CUI at Level 2. Organizations not complying with CMMC 2.0 may face fines of $10,000 per control under the False Claims Act.
Compliance is critical to preventing new and emerging cyber threats to the security of critical systems and information, and failure
to comply can lead to severe consequences.


Share
Tweet
Share
DOWNLOAD PDF