{"id":2037561,"date":"2024-11-25T16:56:55","date_gmt":"2024-11-25T21:56:55","guid":{"rendered":"https:\/\/www.legitsecurity.com\/blog\/cmmc-compliance-requirements"},"modified":"2024-11-25T16:56:55","modified_gmt":"2024-11-25T21:56:55","slug":"cmmc-compliance-requirements-a-complete-guide","status":"publish","type":"post","link":"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/","title":{"rendered":"CMMC Compliance Requirements: A Complete Guide"},"content":{"rendered":"<p>Department of Defense (DoD) data is some of the most sensitive out there. That\u2019s why the DoD designed the Cybersecurity Maturity Model Certification (CMMC) framework. It helps software providers implement cybersecurity measures to protect controlled information.&nbsp;<\/p>\n<p>When you follow CMMC compliance requirements, you can secure DoD contracts while strengthening your defenses against evolving cyber threats. Here\u2019s a CMMC overview with everything you need to know to achieve compliance.<\/p>\n<h2>What Is CMMC Compliance?<\/h2>\n<p>CMMC compliance ensures your organization has robust cybersecurity practices to safeguard sensitive and confidential information\u2014mainly what the DoD calls Controlled Unclassified Information (CUI) and Federal Contract Information (FCI). CUI refers to sensitive technical or personally identifiable information (PII) related to defense projects, while FCI refers to information the government provides or generates under a contract not intended for public release.<\/p>\n<p>Think of CMMC as a security scorecard. It measures your company&#8217;s preparedness to handle DoD data by <a href=\"https:\/\/www.legitsecurity.com\/blog\/a-complete-guide-to-the-secure-software-development-lifecycle\">assessing your cybersecurity practices<\/a>. If you don\u2019t have enough best practices in place, the DoD won\u2019t certify you.<\/p>\n<p>There are three certification levels, representing varying cybersecurity strengths. Level 1 focuses on basic cyber hygiene, while Level 3 requires proactive, advanced security measures. Level 2 offers an intermediate step between them. They all build upon existing standards, like the <a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/171\/r3\/final\">National Institute of Standards and Technology (NIST) SP 800-171<\/a>.&nbsp;<\/p>\n<h2>Who Needs CMMC Certification?<\/h2>\n<p>The DoD introduced CMMC to ensure that every organization handling DoD data, no matter how far down the supply chain, maintains strict cybersecurity practices.<\/p>\n<p>If your organization works with the DoD, you must meet CMMC compliance requirements, whether handling complex technical information or managing a simple piece of the project. Compliance is mandatory if any activities involve CUI or FCI.&nbsp;<\/p>\n<h2>When Is CMMC Compliance Required?<\/h2>\n<p>The DoD published its final rule in late 2024, meaning the requirements are added to contracts from 2025 onward. Initially, CMMC requirements only applied to new contracts or those being renewed, but the DoD will eventually require it for all new, renewed, or ongoing contracts.&nbsp;<\/p>\n<p>Organizations should prepare to become compliant as soon as possible if they haven\u2019t already, especially because requirements cascade through the supply chain. This means that if a prime contractor must comply, subtractors have to as well.<\/p>\n<h2>CMMC Levels Explained<\/h2>\n<p>CMMC compliance consists of three maturity levels, each measuring how effectively your organization\u2019s cybersecurity practices match the sensitivity of the information you handle. The higher the level, the more comprehensive your security measures must be.<\/p>\n<p>Here\u2019s a quick guide to each CMMC level:<\/p>\n<h3>CMMC Level 1: Basic Cyber Hygiene<\/h3>\n<p>Level 1 is about implementing foundational cybersecurity practices to protect FCI. This includes using strong passwords, installing antivirus software, and restricting system access to authorized users only.&nbsp;<\/p>\n<p>If your organization handles low-risk information, Level 1 compliance is likely where you need to start. It\u2019s a self-assessed process, which means you can handle it in-house every year. You just need to meet the minimum requirements in <a href=\"https:\/\/www.acquisition.gov\/far\/52.204-21\">Federal Acquisition Regulation (FAR) 52.204-21<\/a>\u2014a federal regulation outlining basic FCI requirements.<\/p>\n<h3>CMMC Level 2: Advanced Cyber Hygiene<\/h3>\n<p>CMMC Level 2 takes things up a notch. This level focuses on enhanced practices like data encryption, secure system configurations, and having a plan for responding to incidents. You also have to meet the 110 security controls that NIST SP 800-171 outlines.<\/p>\n<p>Compliance at Level 2 requires either a self-assessment or third-party assessment by a certified <a href=\"https:\/\/cyberab.org\/Accreditation\/Candidate-C3PAO-Listing\">CMMC Third Party Assessment Organization<\/a> (C3PAO), depending on the contract. This ensures you go beyond the basics and properly protect sensitive information.<\/p>\n<h3>CMMC Level 3: Expert<\/h3>\n<p>Level 3 is for organizations handling the most sensitive data. To comply, you need to meet all the requirements of Levels 1 and 2, plus additional controls from <a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/172\/final\">NIST SP 800-172<\/a>. Unlike NIST SP 800-171, which focuses on protecting CUI, NIST SP 800-172 adds advanced safeguards to counter sophisticated threats such as advanced persistent threats (APTs). This means adopting proactive security measures, like continuous monitoring, to ensure you\u2019re always ready for potential attacks.&nbsp;<\/p>\n<p>Level 3 certification isn\u2019t just about ticking boxes. It\u2019s about demonstrating that your organization has a sophisticated, mature <a href=\"https:\/\/www.legitsecurity.com\/blog\/how-to-improve-security-posture\">cybersecurity posture<\/a> prepared to handle the highest risks.&nbsp;<\/p>\n<h2>CMMC Certification Cost<\/h2>\n<p>The cost of CMMC certification varies depending on several factors, including your organization\u2019s size, the complexity of your network infrastructure, and the level of CMMC compliance you need.&nbsp;<\/p>\n<p>For Level 1 compliance, the costs are generally more manageable since you can perform a self-assessment internally.&nbsp;<\/p>\n<p>For Level 2 compliance, the expenses rise because you need to pay a C3PAO for a formal assessment. According to DoD estimates, a <a href=\"https:\/\/defensescoop.com\/2023\/12\/28\/cmmc-implementation-cost-estimates\/\">Level 2 assessment alone can exceed $100,000<\/a>. This includes preparation work, hiring a C3PAO, and ongoing compliance affirmations. For Level 3, the costs become even more significant because of its rigorous requirements.&nbsp;<\/p>\n<p>While compliance is expensive, remember that these costs aren\u2019t going out the window. They\u2019re an investment in your organization\u2019s future. Plus, achieving CMMC compliance allows you to work with the DoD and secure your systems, protecting sensitive information against growing threats while working on larger projects.&nbsp;<\/p>\n<h2>CMMC Compliance Checklist<\/h2>\n<p>Achieving CMMC compliance is a structured process that requires careful preparation and a thorough understanding of the requirements at each level. The key to success is to break the process down into actionable steps and tackle each one systematically.<\/p>\n<p>Here are the essential steps to getting CMMC compliant, from determining your maturity level to incorporating best practices:<\/p>\n<h3>1. Determine the CMMC Maturity Level<\/h3>\n<p> <\/p>\n<p>The first step in the CMMC journey is determining what level you need to meet. This helps you plan the resources and time you need for compliance.<\/p>\n<h3>2. Conduct a Self-Evaluation<\/h3>\n<p> <\/p>\n<p>Perform an internal assessment of current cybersecurity practices to identify gaps between existing measures and the CMMC requirements. The more you spot at this stage, the easier it is to address issues moving forward.&nbsp;<\/p>\n<h3>3. Develop a Plan of Action and Milestones (POA&amp;M)<\/h3>\n<p> <\/p>\n<p>Create a POA&amp;M to address any deficiencies and improvements. This document outlines your organization&#8217;s steps to achieve compliance, including timelines, responsibilities, and the resources necessary to implement necessary changes.&nbsp;<\/p>\n<h3>4. Incorporate Other Cybersecurity Standards<\/h3>\n<p> <\/p>\n<p>CMMC compliance relies on existing standards like the <a href=\"https:\/\/www.legitsecurity.com\/blog\/five-elements-of-the-nist-cybersecurity-framework\">NIST SP 800-171 framework<\/a>. Align your practices with these standards to build a solid foundation for compliance. Incorporating as many cybersecurity best practices as possible enhances your security posture and smoothens the certification process.&nbsp;<\/p>\n<h3>5. Engage With a C3PAO<\/h3>\n<p> <\/p>\n<p>For Levels 2 and 3, you need a formal assessment by a C3PAO. Find one early to schedule your assessment and get their guidance on what to expect during the evaluation. Proper preparation can significantly increase your chances of a successful outcome.<\/p>\n<h3>6. Implement Continuous Monitoring<\/h3>\n<p> <\/p>\n<p>Compliance isn\u2019t a one-time effort. Since all levels require further assessments, you need to keep up to date with requirements, vulnerabilities, and threats. Implement continuous monitoring to secure your systems and ensure ongoing adherence.&nbsp;<\/p>\n<h3>7. Train Your Workforce<\/h3>\n<p> <\/p>\n<p>A well-trained workforce can significantly improve your overall security posture by enhancing awareness, reducing human error, and fostering a strong security culture, minimizing the risk of <a href=\"https:\/\/www.legitsecurity.com\/blog\/what-is-software-supply-chain-attack\">cyberattacks<\/a> and data breaches. Conduct regular training sessions to ensure everyone understands their responsibilities and follows best practices for cybersecurity.&nbsp;<\/p>\n<h2>Ensure Compliance With Legit Security<\/h2>\n<p>Achieving CMMC compliance is complex, but you can manage it with the right approach and tools.&nbsp;<\/p>\n<p>Let <a href=\"https:\/\/www.legitsecurity.com\/\">Legit Security<\/a> be a valuable partner on the journey to ongoing compliance. Our tools are designed to help organizations streamline compliance efforts, providing visibility across your software supply chain and automating critical parts of the CMMC process. Identify vulnerabilities, keep required controls in place, and maintain continuous monitoring to stay ahead of evolving threats. <a href=\"https:\/\/info.legitsecurity.com\/request-a-demo\">Book a demo today<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fcmmc-compliance-requirements&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" alt=\"\" width=\"1\" height=\"1\" style=\"min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; \"><\/p>\n\n<p class=\"syndicated-attribution\">*** This is a Security Bloggers Network syndicated blog from <a href=\"https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a> authored by <a href=\"https:\/\/securityboulevard.com\/author\/0\/\" title=\"Read other posts by Legit Security\">Legit Security<\/a>. Read the original post at: <a href=\"https:\/\/www.legitsecurity.com\/blog\/cmmc-compliance-requirements\">https:\/\/www.legitsecurity.com\/blog\/cmmc-compliance-requirements<\/a> <\/p>","protected":false},"excerpt":{"rendered":"<div class=\"hs-featured-image-wrapper\">\n <a href=\"https:\/\/www.legitsecurity.com\/blog\/cmmc-compliance-requirements\" title=\"\" class=\"hs-featured-image-link\"> <img decoding=\"async\" src=\"https:\/\/www.legitsecurity.com\/hubfs\/Blog%20Image%20-%20CMMC.png\" alt=\"CMMC Compliance Requirements: A Complete Guide\" class=\"hs-featured-image\"> <\/a>\n<\/div>\n<p>Department of Defense (DoD) data is some of the most sensitive out there. That\u2019s why the DoD designed the Cybersecurity Maturity Model Certification (CMMC) framework. It helps software providers implement cybersecurity measures to protect controlled information.\u00a0<\/p>\n","protected":false},"author":19793,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20982,21028,5],"tags":[9868,13987,229,96141,191],"class_list":["post-2037561","post","type-post","status-publish","format-standard","hentry","category-ciso-suite","category-governance-risk-compliance","category-sbn","tag-best-practices","tag-ciso","tag-compliance","tag-explainers","tag-threats"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CMMC Compliance Requirements: A Complete Guide - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Department of Defense (DoD) data is some of the most sensitive out there. That\u2019s why the DoD designed the Cybersecurity Maturity Model Certification (CMMC) framework. It helps software providers implement cybersecurity measures to protect controlled information.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CMMC Compliance Requirements: A Complete Guide\" \/>\n<meta property=\"og:description\" content=\"Department of Defense (DoD) data is some of the most sensitive out there. That\u2019s why the DoD designed the Cybersecurity Maturity Model Certification (CMMC) framework. It helps software providers implement cybersecurity measures to protect controlled information.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-25T21:56:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fcmmc-compliance-requirements&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" \/>\n<meta name=\"author\" content=\"Legit Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@securityblvd\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/\",\"url\":\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/\",\"name\":\"CMMC Compliance Requirements: A Complete Guide - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fcmmc-compliance-requirements&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\",\"datePublished\":\"2024-11-25T21:56:55+00:00\",\"dateModified\":\"2024-11-25T21:56:55+00:00\",\"author\":{\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/6c1ed6fea3f0a808015c09dc1ff060f1\"},\"description\":\"Department of Defense (DoD) data is some of the most sensitive out there. That\u2019s why the DoD designed the Cybersecurity Maturity Model Certification (CMMC) framework. It helps software providers implement cybersecurity measures to protect controlled information.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/#primaryimage\",\"url\":\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fcmmc-compliance-requirements&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\",\"contentUrl\":\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fcmmc-compliance-requirements&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Bloggers Network\",\"item\":\"https:\/\/securityboulevard.com\/category\/sbn\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CMMC Compliance Requirements: A Complete Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/6c1ed6fea3f0a808015c09dc1ff060f1\",\"name\":\"Legit Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/51ddaf09d146421803f3e515d4c9769f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/51ddaf09d146421803f3e515d4c9769f?s=96&d=mm&r=g\",\"caption\":\"Legit Security\"},\"sameAs\":[\"https:\/\/www.legitsecurity.com\/blog\"],\"url\":\"https:\/\/securityboulevard.com\/author\/legit-security\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CMMC Compliance Requirements: A Complete Guide - Security Boulevard","description":"Department of Defense (DoD) data is some of the most sensitive out there. That\u2019s why the DoD designed the Cybersecurity Maturity Model Certification (CMMC) framework. It helps software providers implement cybersecurity measures to protect controlled information.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/","og_locale":"en_US","og_type":"article","og_title":"CMMC Compliance Requirements: A Complete Guide","og_description":"Department of Defense (DoD) data is some of the most sensitive out there. That\u2019s why the DoD designed the Cybersecurity Maturity Model Certification (CMMC) framework. It helps software providers implement cybersecurity measures to protect controlled information.\u00a0","og_url":"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_published_time":"2024-11-25T21:56:55+00:00","og_image":[{"url":"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fcmmc-compliance-requirements&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss"}],"author":"Legit Security","twitter_card":"summary_large_image","twitter_creator":"@securityblvd","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/","url":"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/","name":"CMMC Compliance Requirements: A Complete Guide - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fcmmc-compliance-requirements&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss","datePublished":"2024-11-25T21:56:55+00:00","dateModified":"2024-11-25T21:56:55+00:00","author":{"@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/6c1ed6fea3f0a808015c09dc1ff060f1"},"description":"Department of Defense (DoD) data is some of the most sensitive out there. That\u2019s why the DoD designed the Cybersecurity Maturity Model Certification (CMMC) framework. It helps software providers implement cybersecurity measures to protect controlled information.\u00a0","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/#primaryimage","url":"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fcmmc-compliance-requirements&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss","contentUrl":"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fcmmc-compliance-requirements&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss"},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Security Bloggers Network","item":"https:\/\/securityboulevard.com\/category\/sbn\/"},{"@type":"ListItem","position":3,"name":"CMMC Compliance Requirements: A Complete Guide"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/6c1ed6fea3f0a808015c09dc1ff060f1","name":"Legit Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/51ddaf09d146421803f3e515d4c9769f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/51ddaf09d146421803f3e515d4c9769f?s=96&d=mm&r=g","caption":"Legit Security"},"sameAs":["https:\/\/www.legitsecurity.com\/blog"],"url":"https:\/\/securityboulevard.com\/author\/legit-security\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p91vu9-8y3T","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/19793"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=2037561"}],"version-history":[{"count":1,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037561\/revisions"}],"predecessor-version":[{"id":2037562,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037561\/revisions\/2037562"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=2037561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/categories?post=2037561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/tags?post=2037561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}