<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/it-risk/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #IT Risk</title><description>Cloud 9 Advisers - News #IT Risk</description><link>https://www.cloud9advisers.com/News/tag/it-risk</link><lastBuildDate>Wed, 25 Feb 2026 07:16:00 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[The Day the Cloud Blinked]]></title><link>https://www.cloud9advisers.com/News/post/the-day-the-cloud-blinked</link><description><![CDATA[The massive AWS US-EAST-1 outage wasn't a technical failure, but a strategic one. We define Concentration Risk, illustrate its real-world impact on global companies, and explain why your mid-market business is just as vulnerable to the dangerous single point of failure.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_PJmOR10wQBWdkQ8Jylc-1w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MaX1imXKTjmgrnwhvIcW6A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_wypFVlWAQL6rdLst6RUl-A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_j8AJtuNYTtGXeKeOsfegqA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Why the AWS Outage Exposes Your Single Point of Failure</span></h1></div>
<div data-element-id="elm_zIGR0MDKoyTdRYLRuF7iJw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_zIGR0MDKoyTdRYLRuF7iJw"] .zpimage-container figure img { width: 1110px ; height: 566.79px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/The%20cloud%20is%20currently%20down.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_mw2BdpBHQiuNU3U3omv9-A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>When a single human error in a Northern Virginia data center brings down cloud giants like Zoom, Slack, and Athena, your biggest IT risk isn't the technology—it's governance and Concentration Risk.</span></p></div>
</div><div data-element-id="elm_vmoVDGipLHbW-DTet6rALQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_vmoVDGipLHbW-DTet6rALQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_vmoVDGipLHbW-DTet6rALQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_IdGINNb5bvm-xTaG4573Rw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Pf3ehSMNJ8XyEISRNDObjg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_GIh4NJSJ6qNoHMFztcHwig" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Your Most Trusted Vendor is Also Your Biggest Concentration Risk</span></h2></div>
<div data-element-id="elm_dn1gHt94M1PCkPKT6R5EGg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>The massive AWS US-EAST-1 outage was the kind of event that stops entire industries in their tracks. It wasn't just a brief inconvenience; it was a global paralysis. For roughly fifteen hours, services we rely on daily—collaboration tools, logistics platforms, financial institutions, and countless mid-market businesses—were frozen.</p><p><br/></p><p>It’s natural for the headlines to blame the vendor, and it’s tempting to treat the event as a rare, random technological flaw. But as <strong>advisers</strong> focused on reducing risk, we see something far more critical: the outage wasn't fundamentally a technical failure. It was a failure of <strong>governance and strategy</strong> that exposed a massive, invisible risk hiding in plain sight.</p><p><br/></p><p>No technology is perfect, and human error is inevitable—even for the world’s most sophisticated cloud providers. Our job is to build a strategy that expects, and survives, the inevitable. This is the definition of true <strong>business resilience</strong>.</p><h2>The Core Issue: What is Concentration Risk?</h2><p><br/></p><p>The real enemy revealed by the outage is <strong>Concentration Risk</strong>.</p><p><br/></p><p>In simple terms, Concentration Risk is the danger of having <strong>all critical operational dependencies</strong> tied to a single vendor, a single platform, or a single geographic region. When you consolidate your mission-critical applications—your UCaaS, your CRM, your analytics, and your entire DR/Backup environment—all within one vendor’s ecosystem and, critically, in a single region like US-EAST-1, you’ve built yourself a beautiful, modern <strong>Single Point of Failure</strong>.</p><p><br/></p><p>In the era of on-premise IT, your single point of failure was often a server in your closet. You could see it, touch it, and often smell it if it was overheating. Today, that single point of failure is disguised. It’s cleaner, more distributed, and far more complex to manage, but it remains one: <strong>one regional data center, one human error, or one localized major weather event can bring down your entire operation.</strong></p><p><br/></p><p>This wasn't an isolated incident, either. While the scale of the US-EAST-1 event was unprecedented, smaller, similar-issue outages are relatively common across <em>all</em> major cloud platforms. The reality is that the internet itself is a system of interconnected failure points. The problem isn't the cloud; the problem is the lack of strategic diversification within the cloud.</p><h2><br/></h2><h2>Why Governance is the Weakest Link</h2><p>The most common question we hear is: &quot;Why did so many companies expose themselves this way?&quot;</p><p><br/></p><p>The answer lies in two critical organizational pressures: <strong>Complexity Fatigue</strong> and <strong>Decision Paralysis</strong>.</p><ol><li><p><strong>Complexity Fatigue:</strong> When moving to the cloud, the sheer volume of choices, configurations, and pricing models can be overwhelming. It feels easier—less fatiguing—to just go &quot;all-in&quot; on one hyper-scale vendor and simplify the contract. This quick-fix simplicity, however, breeds a far more serious, long-term risk. You trade short-term convenience for long-term vulnerability.</p></li><li><p><strong>Decision Paralysis:</strong> The pressure to move fast often leads to the implementation of the first viable solution rather than the <em>most</em> resilient one. The governance and strategic review process often fails to keep pace with the technical deployment, resulting in an accidental architecture where core services are unknowingly dependent on a single physical location.</p></li></ol><p>The AWS event demonstrated that you can spend billions on the world's best engineering, but if your strategy doesn't account for the possibility of human error or a region-wide failure, you have not adequately reduced your risk.</p><h2><br/></h2><h2>Are You Exposed? An Honest Look at Mid-Market Vulnerability</h2><p>While the major news focused on the massive companies impacted, the lesson for the mid-market is even more urgent. A large enterprise might have the internal resources and budget to switch vendors quickly or weather a multi-day financial loss; a mid-sized business may find itself in an existential crisis after such a period of downtime.</p><p><br/></p><p>To translate this technological event into clear business outcomes, consider the operational cost of the outage:</p><ul><li><p><strong>Financial &amp; Operational Paralysis:</strong> If your core ERP, supply chain, or payment processing application lives in that single, affected region, you’re not just offline—you’re financially paralyzed. You can’t process payments, manage inventory, or close your books. The revenue stops, but the expenses don't.</p></li><li><p><strong>Customer Experience &amp; Brand Damage:</strong> Your collaboration tools are down. Your customer support team can’t communicate internally or access the CRM system to track tickets. Customer trust—hard-won over years—can erode in hours when they see your core services are unreliable.</p></li><li><p><strong>The Contingency Illusion:</strong> This is perhaps the most dangerous exposure. If your disaster recovery (DR) or backup environment is strategically tied to the <em>same single region</em> as your production environment, you have an illusion of resilience, not the real thing. When the primary location fails, the DR fails with it, leaving you without a workable contingency plan.</p></li></ul><p><br/></p><p>The most pragmatic step you can take right now is to honestly assess your exposure with two simple questions:</p><ol><li><p><strong>Where do your mission-critical applications (CX, ERP, Data Analytics) actually reside?</strong> (Specifically, which cloud, and which geographical region within that cloud?)</p></li><li><p><strong>Are your production and Disaster Recovery/Business Continuity strategies tied to the same geographic region?</strong></p></li></ol><p><br/></p><p>If the answer to that second question is yes, you are currently operating with an unnecessary and unacceptable level of <strong>Concentration Risk</strong>.</p><h2><br/></h2><h2>The Strategy-First Approach to Resilience</h2><p>The goal here isn't to fear-monger or advocate leaving the cloud. The cloud offers too much agility, scalability, and value to abandon. Our purpose is to provide clear-eyed, pragmatic advice: <strong>Cloud strategy must be strategy-first, not vendor-first.</strong></p><p><br/></p><p>The only way to genuinely manage Concentration Risk is through intentional strategic sourcing. This requires moving from an accidental, &quot;Single-Cloud&quot; dependency—which breeds risk—to an intentional <strong>Strategy-Cloud</strong> architecture that builds resilience by design.</p><p><br/></p><p>The AWS outage was a gift: a free, massive, and expensive lesson in risk management paid for by the industry as a whole. The next step is moving from realization to <strong>resilient design</strong>.</p><h3><br/></h3><h3>What's Next?</h3><p>Realizing the risk is the essential first step. It is the decision to move from a reactive position to a strategic one.</p><p><br/></p><p>In <strong>Part 2</strong> of this series, we will break down the practical, low-cost architectural shifts—specifically <strong>Multi-Region</strong> and <strong>Hybrid-Cloud</strong> strategies—that move your business from accidental dependency to intentional resilience. These are not massive IT overhauls; they are clear, strategic sourcing decisions that reduce risk and simplify complexity, giving you the peace of mind you deserve.</p></div><p></p></div>
</div></div><div data-element-id="elm_13v8rBwmqkCTq40KO4Z9OQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_LxBRfLW-DnG5hbn9WlPcVg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_LxBRfLW-DnG5hbn9WlPcVg"] div.zpspacer { height:109px; } @media (max-width: 768px) { div[data-element-id="elm_LxBRfLW-DnG5hbn9WlPcVg"] div.zpspacer { height:calc(109px / 3); } } </style><div class="zpspacer " data-height="109"></div>
</div><div data-element-id="elm_SYlsK4L2jLTMMwcV9AZOKg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-right zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-weight:bold;">Read more about cloud in our other posts:</span></p><p></p><div></div><p></p><div><a href="https://www.cloud9advisers.com/News/post/cloud-failure-double-punch" title="Cloud Failure Double Punch" rel="">Cloud Failure Double Punch</a></div><p></p><div><p><a href="https://www.cloud9advisers.com/News/post/Multi-Cloud-Strategy" rel="">Multi-Cloud Strategy: Pros, cons and tips</a></p><p><a href="https://www.cloud9advisers.com/News/post/Google-an-alternative" rel="">Google: an alternative</a></p></div><p><a href="https://www.cloud9advisers.com/News/post/cloud-migration" title="Cloud Migration: The 6 Rs" target="_blank" rel="">Cloud Migration: The 6 Rs</a></p></div>
</div><div data-element-id="elm_XZkSiqeuWT6MjO4EeaTkdA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/solutions"><span class="zpbutton-content">More Cloud options</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 27 Oct 2025 16:31:52 -0500</pubDate></item><item><title><![CDATA[CMMC: 6 Key Takeaways]]></title><link>https://www.cloud9advisers.com/News/post/cmmc-6-key-takeaways</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cloud9advisers.com/Blog images/CMMCNIST.jpg"/>The CMMC final rule is here, and it's full of surprises. Cut through the noise: learn the 6 counter-intuitive takeaways that change how you approach compliance, secure contracts, and manage your IT risk. It's time to stop stressing and start executing.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_CrKfT6_LQPmBSTjx5KOfnQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_5B1clkVKTB2wxTYeDqd3Pw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ydTkdgvVQKSiZfYwV9tnNw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Z3iypXRyTHuhr6NgvP-HCA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>What Everyone Gets Wrong About CMMC: 6 Key Takeaways from the Final Rule</span></h1></div>
<div data-element-id="elm_JQYyNwpXdfEiERmpoq5Fpw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span style="font-weight:bold;">What Everyone Gets Wrong About CMMC: 6 Key Takeaways from the Final Rule </span></p><p>The Cybersecurity Maturity Model Certification (CMMC) final rule is here, and it challenges everything the Defense Industrial Base (DIB) thought it knew about compliance, cost, and contract eligibility.</p></div><p></p></div>
</div><div data-element-id="elm_9urmD805bUpGGXc185yCDA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_9urmD805bUpGGXc185yCDA"] .zpimage-container figure img { width: 1110px ; height: 312.19px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/DOD%20CMMC%20Smallbiz.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_7fMLqjXkRSWFBIfYzvTuDg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p>Unlocking clarity in the complex world of CMMC compliance.</p></div><p></p></div>
</div><div data-element-id="elm_WdKX5GDyarMTEEHvk6SJrg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_WdKX5GDyarMTEEHvk6SJrg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_WdKX5GDyarMTEEHvk6SJrg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_bFTwYM27zyZPkgYR8hZx9g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Kf7LpkbeHUM3yLOrdNLfYg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_t3kIWSemnePpyIeSPvC9eg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><h3>The CMMC Final Rule: What You Thought You Knew Just Changed</h3><p>For government contractors, the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) program has been a source of complexity, cost, and considerable anxiety. Since its inception, the regulation has evolved, leaving many in the Defense Industrial Base (DIB) struggling to keep up with its requirements and implications. The goal is clear: to secure the DIB against evolving cybersecurity threats and protect sensitive government information.</p><p><br/></p><p>Beneath the dense regulatory language of the final rule, however, are several surprising, counter-intuitive, and impactful realities that every business in the DIB needs to understand. These aren't minor details; they are fundamental aspects of the program that challenge common assumptions and have significant strategic implications for contract bidding, IT investment, and risk management.</p><p><br/></p><p>This article distills the official CMMC rule documents into a clear, scannable list of the most critical takeaways. It cuts through the noise to reveal what the Pentagon’s new cybersecurity rules really say and what they mean for your business. <strong>Our goal is to give you clarity and confidence to make quick, informed decisions.</strong></p><h3><br/></h3><h3>Takeaway 1: &quot;Self-Attestation&quot; Isn't Dead—It Just Evolved</h3><p>A core motivation behind the original CMMC program was to move the DIB away from the &quot;self-attestation&quot; model of security that the DoD had previously relied on for NIST SP 800-171 compliance. The perception was that self-reporting wasn't effective enough, necessitating a shift toward third-party verification.</p><p><br/></p><p>The surprising twist is that the revised CMMC Program (often called CMMC 2.0) streamlined the model and <strong>reintroduced self-assessments as a valid compliance pathway.</strong> The final rule confirms that companies at <strong>Level 1</strong> and a subset of companies at <strong>Level 2</strong> are allowed to demonstrate compliance through annual self-assessments rather than a mandatory third-party audit.</p><p><br/></p><p>This is a significant and <strong>pragmatic change</strong> that alleviates the immediate, immense cost and logistical burden a universal audit requirement would have placed on the DIB, especially on small businesses. This evolution represents a calculated, risk-based decision by the DoD, which has determined that for contracts involving less sensitive information, the risk of unverified compliance is acceptable when weighed against the practical realities and costs imposed on the defense industrial marketplace.</p><h3><br/></h3><h3>Takeaway 2: Perfection Isn't Required to Win a Contract</h3><p>A common misconception about CMMC is that a contractor must have a perfect cybersecurity assessment score to be eligible for a contract award. This assumption has been a major source of stress for companies working toward compliance, as achieving 100% implementation of all security controls is a formidable task.</p><p><br/></p><p>The final rule clarifies that this is not the case. An organization can be awarded a contract by achieving a <strong>&quot;Conditional Level 2&quot; or &quot;Conditional Level 3&quot;</strong> CMMC status. To qualify, a company must achieve a minimum score equal to 80% of the maximum score on a CMMC Level 2 or Level 3 assessment. All unmet requirements must be documented in a Plan of Action and Milestones (POA&amp;M).</p><p><br/></p><p>Critically, the organization has a <strong>180-day deadline</strong> from the date of the conditional assessment to close out the POA&amp;M and meet all remaining requirements. This is a significant and practical concession from the DoD, allowing companies to <strong>win business while still finalizing their compliance efforts</strong>.</p><h3><br/></h3><h3>Takeaway 3: The Government Won't Tell You Exactly What to Protect</h3><p>One of the most persistent areas of confusion for contractors is determining what information, exactly, constitutes Controlled Unclassified Information (CUI). Many have asked the government for clearer definitions, guidance, and contract-specific lists to help define the scope of their CMMC efforts.</p><p><br/></p><p>The counter-intuitive reality is that the DoD has officially stated this is outside the scope of the CMMC rule, placing the primary responsibility for identifying CUI <strong>squarely on the contractor</strong>. The rule's commentary includes a direct and unambiguous response to industry requests for guidance:</p><blockquote><p><em><br/></em></p><p><em>The CMMC Program will not provide CUI guidance materials to industry as it is outside the scope of this CMMC rule.</em></p></blockquote><p><br/></p><p>The document further clarifies that official DoD policy states, &quot;The authorized holder of a document or material is responsible for determining, at the time of creation, whether information in a document or material falls into a CUI category.&quot; This places a significant burden on contractors, who must become experts in <strong>data classification</strong> to accurately define the scope of their own CMMC assessments.</p><h3><br/></h3><h3>Takeaway 4: The Biggest Costs of CMMC Aren't Considered &quot;CMMC Costs&quot;</h3><p>The high cost of CMMC compliance is a major concern across the DIB. However, the DoD's official position on what constitutes a &quot;CMMC cost&quot; may come as a surprise. The costs to <strong>implement</strong> the required security controls for Level 1 (from FAR 52.204-21) and Level 2 (from NIST SP 800-171) are <strong>not</strong> considered costs attributable to the CMMC rule.</p><p><br/></p><p>The government's rationale is that these implementation requirements were mandated years earlier, with a deadline to implement the NIST SP 800-171 controls set back in December 2017. Therefore, from the DoD's perspective, companies should have already incurred these implementation costs. The only new costs officially attributed to CMMC Levels 1 and 2 are for the <strong>assessment and affirmation</strong> activities required to verify that those pre-existing requirements have been met. The DoD reinforces its perspective on the necessity of these costs with a powerful statement:</p><blockquote><p><em><br/></em></p><p><em>The cost of lost technological advantage over potential adversaries is greater than the costs of such enforcement.</em></p></blockquote><h3><br/></h3><h3>Takeaway 5: Your Cloud Provider Is Part of Your Audit</h3><p>A company’s CMMC compliance boundary does not end with its own on-premises servers and workstations. If an organization uses an external Cloud Service Provider (CSP) to process, store, or transmit CUI, that CSP is <strong>unequivocally part of the CMMC assessment scope</strong>.</p><p><br/></p><p>The final rule specifies a clear and impactful requirement for these providers: the CSP must meet the <strong>FedRAMP Moderate baseline</strong> or an equivalent standard. The rule documents are explicit on this point, stating the following:</p><blockquote><p><em><br/></em></p><p><em>...the DoD is not willing to assume all the risk of non-FedRAMP Moderate Equivalent CSOs when the CSO is used to process, store, or transmit CUI.</em></p></blockquote><p><br/></p><p>This effectively makes <strong>vendor selection a compliance decision</strong>, not just an IT one. The contractor is ultimately responsible for ensuring its entire CUI data chain—including services provided by third parties—meets DoD's stringent security standards.</p><h3><br/></h3><h3>Takeaway 6: The &quot;COTS Exception&quot; Is Narrower Than You Think</h3><p>The CMMC rule provides a well-known exemption for contracts that are <strong>solely</strong> for the acquisition of Commercially Available Off-the-Shelf (COTS) items. This has led some to believe that if they sell COTS products, they are exempt from CMMC entirely.</p><p><br/></p><p>However, there is a critical and surprising nuance in this rule. The source text clarifies: <strong>&quot;The exemption does not apply to a contractor's use of COTS products within its information systems that process, store, or transmit CUI.&quot;</strong></p><p><br/></p><p>A simple example illustrates this crucial distinction:</p><ul><li><p>A company whose contract is <em>solely</em> to sell COTS laptops directly to the DoD might be exempt from CMMC for that specific contract.</p></li><li><p>However, if that same company uses those same COTS laptops <strong>in its own corporate network</strong> to perform work on a different DoD contract that involves CUI, then its network <strong>is</strong> subject to CMMC requirements.</p></li></ul><p><br/></p><p>The exemption applies to <strong>what is being sold</strong>, not to <strong>what is being used to perform contract work involving sensitive data</strong>. This is a crucial detail that could easily lead to a failed assessment if misinterpreted.</p><h3><br/></h3><h3>Conclusion: A New Era of Accountability and Pragmatism</h3><p>The Cybersecurity Maturity Model Certification program represents a fundamental shift in the DoD's approach to securing its supply chain. It moves the DIB from a model based on trust and self-attestation to one centered on verification and accountability. Yet, as these takeaways reveal, the final rule is not a rigid, one-size-fits-all mandate. It includes pragmatic allowances—such as self-assessments and conditional certifications—that acknowledge the business realities faced by the thousands of companies that support the U.S. warfighter.</p><p><br/></p><p>The rules are now set, and the phased implementation is underway. With this new era of accountability beginning, the true test now begins: will this landmark regulation successfully raise the DIB's security baseline to protect against advanced threats, or will it create unforeseen obstacles for the very innovators the DoD relies on? The path forward requires clarity, and recognizing these six realities is the first step toward confident compliance.</p></div><p></p></div>
</div></div><div data-element-id="elm_u4jtLHuu95aVqoSw57_pGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_5YETy6OdEpzOZhUe2TZVIQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_5YETy6OdEpzOZhUe2TZVIQ"].zpelem-divider{ margin-block-start:47px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_a8ThMKJKSJW5zjjmqAgPDA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/assessments" target="_blank"><span class="zpbutton-content">3rd-Party Assessments</span></a></div>
</div><div data-element-id="elm_z63eqdvp1fudtxaZpzjCzA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/security-readiness" target="_blank"><span class="zpbutton-content">Initial Evaluation</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 20 Oct 2025 09:49:47 -0500</pubDate></item></channel></rss>