CMMC Is Finalized. How Will It Impact State and Local Government?
美国国防部发布网络安全成熟度模型认证(CMMC)2.0版本,要求所有处理联邦合同信息或受控未分类信息的承包商必须达标。该认证分为三个级别评估体系,未达标者将失去合同资格。州和地方政府可借助联邦资金提升网络安全能力,并通过CMMC框架加强自身防护。 2025-10-5 09:57:0 Author: securityboulevard.com(查看原文) 阅读量:4 收藏

Lohrmann on Cybersecurity

What is Cybersecurity Maturity Model Certification from the Department of Defense and why should state and local governments care about it? How agencies can leverage funding to grow their security programs.

October 05, 2025 • 

Dan Lohrmann

Techstrong Gang Youtube

What is Cybersecurity Maturity Model Certification (CMMC) and why should state and local governments care about it?

In August 2020, I interviewed cybersecurity expert Taiye Lambo in a blog called “Should State and Local Governments Obtain Cybersecurity Maturity Model Certification?”

Today, we have some updates and important steps taken by the federal government that all governments should be aware of and I turned to Mr. Lambo for his insights on recent developments.

“The wait is over: the government has finalized the CMMC rule, making robust cybersecurity a non-negotiable requirement for nearly every defense contractor.

“The new CMMC framework is now a contractual gatekeeper for United States Department of War business. All contractors and subcontractors handling Federal Contract Information (FCI) or Controlled Unclassified Information (CUI)—regardless of size or sector—must comply, with few exceptions.

“What’s changing?

“CMMC introduces a three-level system for cybersecurity controls and assessments. Depending on the sensitivity of the information you handle, you’ll face either self-assessment, third-party review, or a government-led audit.

“There’s no grace period: if you’re not certified at award, you’re out of the running.

“Key steps contractors must take now:

  • Assess your current cybersecurity posture against the CMMC requirements for your anticipated contract level.
  • Close compliance gaps and maintain comprehensive documentation.
  • Prepare for third-party or government assessments if you handle CUI.
  • Ensure your subcontractors are equally compliant.
  • Register and keep your CMMC status updated in SPRS.

“The risks of non-compliance are real: contract ineligibility, breach, regulatory penalties, and business disruption.

“The CMMC final rule is a fundamental shift for the military industrial base and an important step for national security.

To dive deeper into this topic, I once again interviewed Taiye Lambo, who is an expert on the CMMC. The focus on the discussion is on how this topic impacts state and local governments and the wider SLED community.

Taiye Lambo

Dan Lohrmann (DL): With current federal funding cuts, how can state and local governments, as well as tribes and schools, leverage DoD’s [Department of Defense’s] funding increase to mature their cybersecurity programs?

Taiye Lambo (TL): I want to keep my responses in bullet form to provide maximum benefit and offer additional resources:

  • Federal/state cyber funds (SLCGP, MS-ISAC) are tightening, but SLTTs can seek partnerships. [CISA SLCGP]
  • DoD requested over $64 billion in FY 25 for IT/cyber — align tooling, training, exercises.
  • National Guard Title 32 cyber units support SLTTs (vulnerability assessments, incident response).
  • Even with cuts, SLCGP funds can prioritize 800-171 controls. [CISA SLCGP]
  • Maintain intel-sharing via JCDC and MS-ISAC. [JCDC][MS-ISAC]

DL: What are the direct or indirect implications of CMMC 2.0 requirements on the SLTT/SLED sectors?  

TL:

  • CMMC is mandatory for DoD contractors (effective Dec. 16, 2024, phased Nov. 10, 2025). [CMMC 2.0 Rule]
  • Even without DoD work, primes/OEMs may flow down CMMC-like clauses. [CMMC 2.0 Rule]
  • Provides a clear control baseline mapping to NIST SP 800-171 Rev. 3. [NIST SP 800-171 Rev. 3]

DL: What does voluntary adoption of CMMC 2.0 requirements look like for the SLTT/SLED sectors?  

TL:

DL: How can the SLTT/SLED sectors leverage CMMC 2.0 to address cybersecurity risks in their supply chain?  

TL:

DL: How does the current AI race combined with the CMMC 2.0 requirements impact cyber resilience for the SLTT/SLED sectors?  

TL:

  • Federal AI EO 14110 (rescinded 2025) and the U.S. Office of Management and Budget guidance still shape expectations. [AI EO 14110]
  • Apply 800-171 controls to AI workloads (data, access, logging, IR). [NIST SP 800-171 Rev. 3]
  • Demand AI vendor transparency, align contracts with CMMC obligations. [CMMC 2.0 Rule]
  • Use MS-ISAC and JCDC for AI-related intel and exercises. [MS-ISAC][JCDC]

DL: What other resources would be helpful for our audience?

TL:

Cybersecurity

Dan Lohrmann

Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.

See More Stories by Dan Lohrmann

*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: https://www.govtech.com/blogs/lohrmann-on-cybersecurity/cmmc-is-finalized-how-will-it-impact-state-and-local-government


文章来源: https://securityboulevard.com/2025/10/cmmc-is-finalized-how-will-it-impact-state-and-local-government/
如有侵权请联系:admin#unsafe.sh