Cybersecurity Maturity Model Certification (CMMC)
The United States Department of Defense (DoD) has implemented the Cybersecurity Maturity Model Certification (CMMC), which requires federal contractors to adhere to specific cybersecurity controls when working with Controlled Unclassified Information (CUI). At a minimum contracts may be required (at a university level) to self-attest to Foundational (Level 1) compliance and obtain third-party certification (C3PAO) for Advanced (Level 2) and Expert (Level 3). Many other Federal Agencies have adopted the CMMC framework as well. The Federal CMMC mandate includes university-based research labs and facilities as well as FFDRCs (Federally Funded Research and Development Centers) and UARCs (University Affiliated Research Centers). The requirements are subject to the mandated federal rulemaking process and the DoD published the most recent CMMC rules on October 15th 2024. The regulations are constantly under review by a request for comments process.

CMMC Model Levels
What you need to know
● CMMC is a comprehensive Department of Defense information security framework designed to protect Defense Industrial Base contractors from increasingly frequent and complex cyberattacks, specifically targeting a large class of information known as Controlled Unclassified Information (CUI) Many other Federal Agencies are adopting CMMC as well. ASU is now seeing CMMC language in contracts from multiple agencies. As Arizona State University performs both basic and applied research under DoD and other Federal agencies under contract, ASU is subject to CMMC compliance.
● CMMC Level 1, "Foundational", are the fundamental safeguards specified in 48 CFR 52.204-21, the Federal Acquisition Regulations (FAR).
● CMMC Level 2, "Advanced", is equivalent to NIST SP 800-171 Revision 2 and is implemented in ASU Knowledge Enterprise's KE Secure Cloud as a superset of CMMC Foundational regulations with additional controls defined under NIST SP 800-171 Revision 2. Other areas of ASU must comply with NIST 800-171 Revision 2 as required by sponsored research projects.
● The controls and ASU policies and standards, such as the ones asterisked in the table below, are an iterative work in progress by ASU Information Security, and will be reviewed as conditions change.