About 217 results
Open links in new tab
  1. ASD (A) - DPC - Contract Policy - Under Secretary of Defense for ...

    Describes and implements Cybersecurity Maturity Model Certification (CMMC) for the Department of Defense as a key step to enhance the protection of intellectual property and sensitive …

  2. Sep 29, 2020 · CMMC is designed to provide increased assurance to the Department that a defense industrial base (DIB) contractor can adequately protect sensitive unclassified …

  3. SUBPART 204.75 - CYBERSECURITY MATURITY MODEL …

    (a) This subpart prescribes policies and procedures for including the Cybersecurity Maturity Model Certification (CMMC) level requirements in DoD contracts. CMMC is a framework (see 32 CFR …

  4. The USD(A&S) memorandum, “Implementing the Cybersecurity Maturity Model Certification within the Department of Defense,” dated August 4, 2020, details the phased application of CMMC …

  5. OUSW Acquisition & Sustainment Homepage

    Link our defense and organic industrial bases to the broader economic and innovation ecosystems in the United States, and those of allies and partners. Improve and modernize …

  6. Oct 15, 2019 · CMMC is a framework that measures a contractor’s cybersecurity maturity to include the implementation of cybersecurity practices and institutionalization of processes.

  7. Jun 24, 2020 · This methodology informed the conduct of pilot NIST SP 800-171 DoD Assessments performed by DCMA, in partnership with the Defense Counterintelligence and …

  8. 2023-D002 212, 213, 223, 252 Restriction on DoD section 345 of the NDAA for FY 2023 08/07/2024 Case manager

  9. Provide the incident report number, automatically assigned by DoD, to the prime Contractor (or next higher-tier subcontractor) as soon as practicable, when reporting a cyber incident to DoD …

  10. ASD (A) - DPC - Contract Policy - Under Secretary of Defense for ...

    Feb 5, 2019 · Interim rule to amend the Defense Federal Acquisition Regulation Supplement (DFARS) to implement a DoD Assessment Methodology and Cybersecurity Maturity Model …