Entrust Enables 9 of 14 Domains in Cybersecurity Maturity Model Certification Compliance for DoD Contractors

Entrust Enables 9 of 14 Domains in Cybersecurity Maturity Model Certification Compliance for DoD Contractors

This IDC Perspective addresses identity and access management as well as payment-enabling technology provider, Entrust, and how the company can prepare contracts on the path to Cybersecurity Maturity Model Certification (CMMC) compliance assessments.In March 2021, the Department of Defense (DoD) initiated an internal review of CMMC implementations, and based on over 850 public comments, decided to refine policy and program implementation. In November 2021, CMMC 2.0 was announced as an updated structure and requirements designed to achieve several key goals of internal review.IT staff and resources of DoD contractors should begin preparations for CMMC certifications either in-house or via managed services offerings. As a starter, contractors can refer to the NIST Handbook 162 self-assessment handbook that details certification requirements for NIST SP 800-171 rev 2. IDC recommends contractors leverage trusted suppliers to prepare for CMMC audits and plan to pass assessment in first attempt."Supply chain vulnerabilities and the potential impact from exploits can be seriously damaging to any organization, let alone the government of nation-states," said Amita Potnis, director, Future of Trust Global Practice. "Addressing the cyber-risk stemming from the supply chain and to safeguard national security information, the U.S. DoD launched a comprehensive framework to protect the defense industrial base from increasingly frequent and sophisticated cybersecurity attacks, called CMMC 2.0."

Please Note: Extended description available upon request.


Executive Snapshot
Situation Overview
Disruption Is All Around Us — It Spares No One
U.S. Government Mandate
CMMC 1.0: A Brief Overview
CMMC 2.0
CMMC with Entrust
Introducing Entrust
Entrust's Digital Security Product Portfolio
Certificate Solutions
Identity and Access Management
Data Protection
Advice for the Technology Buyer
Preparing for CMMC
Cybersecurity Provider Due Diligence
CMMC Compliance Checklist
Leveraging Entrust
Learn More
Related Research
Synopsis

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings