{"id":5443,"date":"2022-10-17T15:32:29","date_gmt":"2022-10-17T20:32:29","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=5443"},"modified":"2022-10-17T15:32:29","modified_gmt":"2022-10-17T20:32:29","slug":"cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/","title":{"rendered":"CMMC compliance Q&#038;A: Who needs the Cybersecurity Maturity Model Certification (CMMC)?"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-5444\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept-300x188.jpg\" alt=\"A magnifying glass placed over the word &quot;compliance&quot; against a blue background.\" width=\"300\" height=\"188\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept-300x188.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept-1024x640.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept-768x480.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept-1536x960.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept-2048x1280.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept-200x125.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>These days, cybercriminals bombard organizations of all sizes and across all industries with ransomware attacks, phishing emails, and other tactics to infiltrate IT networks and access sensitive information. No one is safe \u2013 and that includes the government.<\/p>\n<p>For that reason, the Department of Defense (DoD) has implemented compliance requirements for all contractors and entities it partners with in the form of the Cybersecurity Maturity Model Certification (CMMC). You might have heard about CMMC compliance and wondered what it is and whether it applies to your business. Here are the answers to some common questions about the certification.<\/p>\n<h2>1. What is the purpose of the CMMC?<\/h2>\n<p>The CMMC model ensures that defense industrial base (DIB) partners meet DoD information security requirements, according to the <a href=\"https:\/\/www.acq.osd.mil\/cmmc\/about-us.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">website<\/a> for the Office of the Under Secretary of Defense for Acquisition &amp; Sustainment (OUSD (A&amp;S)). The program protects federal contract information (FCI) and controlled unclassified information (CUI) handled by DoD contractors and subcontractors via acquisition programs.<\/p>\n<p>\u201cIt is designed to enforce protection of sensitive unclassified information that is shared by the Department with its contractors and subcontractors,\u201d the site states. \u201cThe program provides the Department increased assurance that contractors and subcontractors are meeting the cybersecurity requirements that apply to acquisition programs and systems that process controlled unclassified information.\u201d<\/p>\n<h2>2. What is CMMC 2.0?<\/h2>\n<p>Based on feedback from the industry, U.S. Congress, and other stakeholders concerning the interim rule creating CMMC 1.0, the DoD introduced CMMC 2.0 in November 2021. The updated program structure encompasses three increasingly progressive levels, while CMMC 1.0 has five levels. CMMC 2.0 hasn\u2019t yet been codified through rulemaking.<\/p>\n<h2>3. Do I have to comply with the CMMC?<\/h2>\n<p>DoD contractors and subcontractors through the entire supply chain will need to comply with the CMMC. Once CMMC 2.0 is implemented, the DoD will include the required CMMC compliance level in solicitations. Depending on the type of FCI and CUI each entity handles, the necessary CMMC compliance level might differ for the prime contractor and subcontractor \u2013 e.g., if the prime only \u201cflows down\u201d certain information to the subcontractors.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-5445\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/cybersecurity-quote-1024x446.jpg\" alt=\"&quot;It's no secret that the U.S. is at cyber war every day.&quot; - Ellen Lord, Undersecretary of Defense for Acquisition and Sustainment.\" width=\"800\" height=\"349\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/cybersecurity-quote-1024x446.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/cybersecurity-quote-300x131.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/cybersecurity-quote-768x335.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/cybersecurity-quote-1536x670.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/cybersecurity-quote-200x87.jpg 200w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/cybersecurity-quote.jpg 2000w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<h2>4. When is CMMC compliance required?<\/h2>\n<p>The CMMC program dates back to September 2020, when the DoD published an interim rule to the Defense Federal Acquisition Regulation Supplement (DFARS) detailing the initial idea for the program. The official <a href=\"https:\/\/www.acq.osd.mil\/cmmc\/faq.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">CMMC FAQ<\/a> on the site states that the interim DFARS rule (which officially went into effect on November 30, 2020) began a 5-year phase-in process for CMMC compliance, during which CMMC compliance is only included in select pilot contracts as approved by the OUSD (A&amp;S).<\/p>\n<p>The <a href=\"https:\/\/www.federalregister.gov\/documents\/2020\/09\/29\/2020-21123\/defense-federal-acquisition-regulation-supplement-assessing-contractor-implementation-of\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">interim rule<\/a> stated that \u201cCMMC will apply to all DoD solicitations and contracts, including those for the acquisition of commercial items (except those exclusively COTS items) valued at greater than the micro-purchase threshold, starting on or after October 1, 2025.\u201d<\/p>\n<p>However, considering the CMMC program updates in progress, the OUSD (A&amp;S) site specifies that the DoD does not plan to require compliance for any contracts until after the completion of the CMMC 2.0 rulemaking process, which could take anywhere from 9 to 24 months. Watch the <a href=\"https:\/\/www.acq.osd.mil\/cmmc\/index.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">CMMC site<\/a> for updates.<\/p>\n<p>While the DoD has suspended CMMC piloting during the rulemaking process, the Department still encourages DIB companies to enhance cybersecurity through <a href=\"https:\/\/www.projectspectrum.io\/#\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Project Spectrum<\/a>.<\/p>\n<h2>5. How do I get CMMC compliant?<\/h2>\n<p>Once the CMMC 2.0 is implemented, contractors that don\u2019t handle information critical to national security (Level 1 and a subset of Level 2) will be required to perform annual self-assessments.<\/p>\n<p>Meanwhile, contractors that handle information critical to national security (Level 2) will undergo assessments by CMMC Third Party Assessment Organizations (C3PAOs) as designated by the CMMC Accreditation Body (The Cyber AB). These assessments will take place every three years. You\u2019ll be able to find accredited C3PAOs via The Cyber AB marketplace.<\/p>\n<p>CMMC Level 3 compliance will require assessments conducted by government officials every three years. More information is available on the <a href=\"https:\/\/www.acq.osd.mil\/cmmc\/assessments.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">assessments section<\/a> of the CMMC website.<\/p>\n<h2>6. What is the difference between NIST 800-171 and CMMC compliance?<\/h2>\n<p>The CMMC 2.0 Level 2 (i.e., the \u201cAdvanced\u201d level) will be the same as NIST SP 800-171. The DoD is developing Level 3, a.k.a. the \u201cExpert\u201d level, from a subset of NIST SP 800-172 requirements. \u00a0<strong><br \/>\n<\/strong><br \/>\nIf you\u2019d like more information about achieving compliance with the CMMC and other regulations, our <a href=\"https:\/\/www.stratospherenetworks.com\/trusted-advisor.html\" target=\"_blank\" rel=\"noopener\">technology advisors<\/a> can assist you and connect you with leading <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"noopener\">managed cybersecurity<\/a> service providers in our partner network. Our partners can conduct security risk assessments and provide managed compliance as a service to help you meet and maintain adherence to industry standards.<\/p>\n<p>Start your compliance journey today by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>These days, cybercriminals bombard organizations of all sizes and across all industries with ransomware attacks, phishing emails, and other tactics to infiltrate IT networks and access sensitive information. No one is safe \u2013 and that includes the government. For that &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":5444,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-5443","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>6 common CMMC compliance questions answered<\/title>\n<meta name=\"description\" content=\"In this blog entry, we answer common questions about the Cybersecurity Maturity Model Certification (CMMC) program.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 common CMMC compliance questions answered\" \/>\n<meta property=\"og:description\" content=\"In this blog entry, we answer common questions about the Cybersecurity Maturity Model Certification (CMMC) program.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-17T20:32:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2190\" \/>\n\t<meta property=\"og:image:height\" content=\"1369\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"CMMC compliance Q&#038;A: Who needs the Cybersecurity Maturity Model Certification (CMMC)?\",\"datePublished\":\"2022-10-17T20:32:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/\"},\"wordCount\":771,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/\",\"name\":\"6 common CMMC compliance questions answered\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept.jpg\",\"datePublished\":\"2022-10-17T20:32:29+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"In this blog entry, we answer common questions about the Cybersecurity Maturity Model Certification (CMMC) program.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept.jpg\",\"width\":2190,\"height\":1369,\"caption\":\"A magnifying glass placed over the word \\\"compliance\\\" against a blue background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CMMC compliance Q&#038;A: Who needs the Cybersecurity Maturity Model Certification (CMMC)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"6 common CMMC compliance questions answered","description":"In this blog entry, we answer common questions about the Cybersecurity Maturity Model Certification (CMMC) program.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/","og_locale":"en_US","og_type":"article","og_title":"6 common CMMC compliance questions answered","og_description":"In this blog entry, we answer common questions about the Cybersecurity Maturity Model Certification (CMMC) program.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2022-10-17T20:32:29+00:00","og_image":[{"width":2190,"height":1369,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"CMMC compliance Q&#038;A: Who needs the Cybersecurity Maturity Model Certification (CMMC)?","datePublished":"2022-10-17T20:32:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/"},"wordCount":771,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/","name":"6 common CMMC compliance questions answered","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept.jpg","datePublished":"2022-10-17T20:32:29+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"In this blog entry, we answer common questions about the Cybersecurity Maturity Model Certification (CMMC) program.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2022\/10\/magnifying-glass-compliance-concept.jpg","width":2190,"height":1369,"caption":"A magnifying glass placed over the word \"compliance\" against a blue background."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/cmmc-compliance-qa-who-needs-the-cybersecurity-maturity-model-certification-cmmc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CMMC compliance Q&#038;A: Who needs the Cybersecurity Maturity Model Certification (CMMC)?"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5443"}],"version-history":[{"count":4,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5443\/revisions"}],"predecessor-version":[{"id":5448,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5443\/revisions\/5448"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/5444"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}