CMMC 2.0 Roadmap and Process:

LevelUp Your Cybersecurity Compliance

CMMC 2.0 LEVELS

LEVEL 1

Foundational

  • Includes basic cybersecurity for small companies utilizing a subset of universally accepted common practices
  • 17 controls as outlined in original CMMC framework
  • Requires an annual self-assessment by company leadership
Arrow pointing down
level-2-advanced

LEVEL 2

Advanced

  • Processes are maintained and followed with a comprehensive knowledge of cyber assets
  • 110 controls as outlined in NIST 800-171
  • Must undergo an independent assessment on a triannual basis
Arrow pointing down

LEVEL 3

On-Site Solutions

  • Includes highly advanced cybersecurity practices
  • Controls will be assessed by the DoD and not by a C3PAO
  • Processes include continuous improvement and defensive responses performed at machine speed

Ready to Level Up Your
Cybersecurity Compliance?
Contact CTI Today!

CTI Logo 40 Years
LevelUp
1

Planning

Planning iconOur individualized plans include a gap assessment, which is critical to understanding the security posture of your current environment and its adherence to the CMMC standards. This information allows us to create effective recommendations to assist you with your compliance goals. This process usually takes 4-8 weeks and will set your organization up for the implementation phase.

Arrow pointing down
2

Implementation

Implementation iconOur team of Certified CMMC
Professionals
and Registered
Practitioners are experienced
at implementing specific plans and delivering the required System Security Plan (SSP) that documents each
control and tool to show requirements
are being met.

Arrow pointing down
3

Data Migration

Data migration iconThis stage includes a safe
transfer
of all your secure
data into an environment
that meets DoD standards. For the email portion, we recommend Microsoft GCC or Microsoft GCC High. This software has been designed by Microsoft to meet the DoD’s rigorous standards – and it will likely become a key tool to reach compliance.

Arrow pointing down
4

Documentation

Documentation iconWe work directly with clientsso that they can own their network and have a detailed understanding of everything they’re managing. We deliver all the documentation and knowledge transfer to go with your compliance.

Ready to Level Up Your
Cybersecurity Compliance?
Contact CTI Today!

CTI Logo 40 Years

Get Started with a CMMC 2.0 Readiness Assessment:







    What is 1 x 5?