Here are the biggest takeaways from the CMMC-AB’s last Town Hall meeting in 2021.

December’s CMMC-AB Town Hall event ushered in a changing of the guard within the accreditation body's board of directors. Karlton Johnson, the previous Chairman of the Board, turned over his chairman position to the vice-chairman, Jeff Dalton.
Mr. Johnson was the first Chairman elected at the CMMC-AB in January 2021. His tenure came to an end in December 2021 after stating that he would not seek a second term. Paul Michaels has become the vice-chairman, taking the position vacated by the new Chairman, Jeff Dalton.
Following Karlton Johnson’s farewell address, Matt Travis, the CMMC-AB CEO, reviewed some of the guidance recently released by the CMMC Project Management Office (PMO).
These documents included…
Matthew Travis briefly walked through the Level 2 Scoping Guidance document. It categorizes assets into five groups.

Before we talk about the five categories of assets, it's important to mention the Level 2 Assessment Guide. It uses a broad definition for the term organizational asset:

A supporting table in the Level 2 Scoping Guide lists three specific types of security protection assets…
Asset Types will all apply to all Asset Categories and not just security protection assets. That's our deduction based on the broad definition of organizational assets.

The purpose of the scoping guide is to establish a boundary for the assessment.
The full breadth of CMMC practices applies only to CUI Assets and Security Protection Assets. Understanding these definitions and identifying this boundary is critical. They help ensure the assessment scope is properly defined.
NIST SP 800-53A, the underlying framework of NIST SP 800-171, identifies items assessed within the assessment boundary as Assessment Objects. Assessment objects can be organizational assets (as described above) or processes and activities performed by an organization relevant to assets within the CMMC Assessment Scope.

An assessment procedure will apply an assessment method (examine/interview/test) to an assessment object during the evaluation of an assessment objective. Assessment objectives can be relevant to one or more types of assessment objects.
For example, AT.L2-3.2.1 (c) and (d) would be relevant to the scope of managers, systems administrators, and users (people) of organizational systems and their training (processes & activities). But, AT.L2-3.2.1 (a) and (b) would be relevant to identifying risks and enforcing policies (processes).
Now that we’ve identified assessment objects, let’s look at the specific categories provided in the Level 2 Scoping Guide.
Looking at the first category, CUI Assets process, store, or transmit CUI.
The examples provided during the Town Hall included computers, data files, and employees.

CUI stored is at rest. If the CUI is digital, then the electronic media or system memory storing the data is a CUI asset. If the CUI is physical, then the paper document is a CUI asset.
When CUI is in process, it is being used. If the CUI is digital, then the systems accessing the data, such as a computer, server, application, user, printer are CUI assets. If the CUI is physical, then the user viewing or editing the data are CUI assets.
When transmitting CUI, it’s moving from one location to another.
If it’s digital, then systems sending, receiving, and facilitating the transfer are all considered CUI assets.
If it’s physical, the sender, receiver and potentially the transporter (if they have access to the information) are CUI assets.

Security Protection Assets provide security functions to the CMMC Assessment Scope.
The examples provided during the town hall included the…
NIST Special Publication (SP) 800-171 introduced the concept of security protection assets. Initially, this definition focused only on assets providing security to CUI Assets.

The new CMMC Assessment Scope Level 2 Version 2.0 defines security protection assets as providing security to any assets within the CMMC Assessment Scope, irrespective of whether or not they process, store, or transmit CUI. The key difference here is that now we are looking at assets protecting the CMMC Assessment Scope and not just CUI assets.

The CMMC Assessment Scope includes the majority of assets. It doesn't include those that are physically or logically separated from CUI assets. Those cannot process, store or transmit CUI.

This expanded definition will now include assets that provide security. This includes CUI Assets and contractor risk-managed assets and specialized assets as well.
Going back to the general definition of organizational assets as anything that has value. Under this guidance, OSCs will need to incorporate locks, cabinets, and similar security protection assets for CUI. These need to exist in their asset inventory, facility diagram and system security plan (SSP).
This brings us to a discussion that occurred on LinkedIn regarding the implications of this decision.
The first concern raised was the new requirement to expand the scope of assets inventoried.
The second concern is that cloud-based security tools must be compliant with all CMMC Level 2 practice requirements.
Developers of SaaS tools and hosted solutions may decide it’s not worth the investment to achieve CMMC themselves. Some of the tools I’m specifically referring to are…
Software-as-a-service (SaaS) creates an increased risk for compliant security to degrade actual security.
We anticipate that the DoD and CMMC-AB have some work to do on finalizing how to assess security protection assets. But for now, the guidance published is that all CMMC practices will apply to security protection assets.
Assets that don’t process, store, or transmit CUI because of policy, procedure, or practice but are not physically or logically separated from CUI Assets are contractor risk managed assets (CRMA).
CMMC 2.0 generated some discussion regarding the removal of maturity processes. These included documenting written policies, procedures and resourced plans for each domain.
We discussed a popular opinion in a previous blog post. In a nutshell, it was that the removal of these requirements from CMMC didn’t negate the requirement to have these. NIST SP 800-171 Rev 2 still requires them under Appendix E.
For those who heed this advice, your reward is the ability to now remove assets from the more rigorous assessment scope. This happens by classifying assets as contractor risk managed through policy and procedures.
Amira Armond, one of the provisional CMMC instructors, has been publishing scoping scenarios. She's been doing so since the release of the scoping guidance.
In scenario 6, she posed an example with an email server and cell phone that, by policy, should not contain CUI. The scenario explores a situation wherein the Government sends CUI to the email server of the OSC. In turn it synchronizes automatically with the OSC’s cell phone.
Even though the assets in this example processed and stored CUI, she categorized them as CRMA. They’re CRMA because, by policy, neither asset should have CUI. She goes on to list what the OSC should do to remove the CUI and prevent this from happening again. But, the scenario illustrates a big takeaway. Just because an asset can or does process, transmit or store CUI, doesn’t mean you should automatically categorize these as CUI Assets.
The benefit for an OSC to categorize assets as CRMA is that instead of assessing these assets to the full rigor of NIST SP 800-171, they would only need to appropriately document them in the system security plan (SSP).
If the assessor has questions about these assets after reviewing the policy, procedure, and practice documentation, they’ll define a limited spot check in the assessment scope.
Specialized assets may or may not process, store, or transmit CUI but they aren’t assessed by all CMMC requirements.
The OSC should…
The scoping guide lists several types of specialized assets and we will discuss each in more detail.
Government Furnished Equipment (GFE) is equipment owned by the government but made available to a contractor. Since the government provided the equipment, it should be set up according to a security technical implementation guide (STIG) authorized by the DoD.
Internet of Things (IoT) are devices that contain the hardware, software, firmware, and actuators that allow the devices to connect, interact, and freely exchange data and information. This category of assets includes devices like wireless inventory trackers, wearable technology, connected appliances, the list goes on. NIST has released guidance and standards for the IoT landscape.
Operational Technology (OT) includes programmable systems or devices that interact with the physical environment. This would include computer numerical control (CNC) systems, scientific equipment, transportation systems, etc. An interesting article by Gartner from July 2021, predicted that by 2025 cyber attackers will have weaponized OT environments.
Restricted Information Systems include systems configured by government requirements and used to support a contract. Examples from the Scoping Guide include…
Test Equipment includes hardware or components used in the testing of products, system components, and contract deliverables. Examples from the Scoping Guide include…

Matt Travis mentioned the Level 2 Scoping Guide’s discussion of logical and physical separation techniques. He also mentioned use cases when FCI and CUI might be within the same or different assessment scopes and considerations for external service providers. Unfortunately, Matt did not spend much time on these portions so we’ll explore each here with a little more detail.
Separation Techniques
To categorize an asset as Out-of-Scope, it must be logically or physically separated from CUI Assets. The Scoping Guide points to section 1.1 of NIST SP 800-171 Rev 2 for creating a separate security domain:

Logical Separation occurs when software configuration prevents data from flowing along a physically connected path. Examples of mechanisms provided by the Scoping Guide include firewalls and Virtual Local Area Network (VLANs).
Data is physically separated when the only way to transfer it is manually using human controls (e.g. USB drive).
Examples of mechanisms that control physical access provided by the Scoping Guide include…
Use Cases
The first use case assumes the OSC is processing, storing, or transmitting federal contract information (FCI) and CUI within the same assessment scope.
However, looking at the CMMC Self-Assessment Scope Level 1, we find the following cautionary statement: “Because FCI is a broad category of information, the contractor will likely focus the self-assessment on their entire environment”.
In this scenario, the OSC would define a single assessment scope. An assessor would certify the implementation of Level 1 and 2 practices to the assets within it. Although not explicitly stated, we assume if this Level 2 certification allows for self-attestation, the OSC could self-assess Levels 1 and 2 for this single scope as well.
A second, more likely scenario posited that FCI and CUI have separate assessment scopes. Here, the OSC may conduct two separate CMMC activities…
External Service Providers
The CMMC Self-Assessment Scope Level 1 defines external service providers (ESPs):

An ESP is within the Level 1 scope if it meets FCI Asset criteria (process, store, or transmit FCI). An ESP is within the Level 2 scope if it meets CUI Asset criteria (process, store, or transmit CUI) or if it provides security functions to any OSC assets within the CMMC Assessment Scope.
For example, an ESP providing security information and event management (SIEM) services may not process CUI. Although it’s logically separated from CUI Assets, it’s still within scope as a security protection asset because it provides security functions to CMMC Assessment Scope assets.
The Level 2 Scoping guide lists several special considerations regarding ESPs…
The AB took the time to answer some pre-submitted questions ahead of December’s meeting...
Matt Travis expects 2022 to start with great news when the first voluntary assessments get started.
But, he affirmed his commitment to more proactive communications from the AB to promote OSCs getting certified.
The rulemaking process (9 to 24 month period) shouldn’t stop any OSC from going ahead and getting assessed now. He believes DoD will reward early movers. Lastly, the CMMC-AB plans on updating its website in early 2022 with a brand refresh and enhanced marketplace.
In nec dictum adipiscing pharetra enim etiam scelerisque dolor purus ipsum egestas cursus vulputate arcu egestas ut eu sed mollis consectetur mattis pharetra curabitur et maecenas in mattis fames consectetur ipsum quis risus mauris aliquam ornare nisl purus at ipsum nulla accumsan consectetur vestibulum suspendisse aliquam condimentum scelerisque lacinia pellentesque vestibulum condimentum turpis ligula pharetra dictum sapien facilisis sapien at sagittis et cursus congue.
Convallis pellentesque ullamcorper sapien sed tristique fermentum proin amet quam tincidunt feugiat vitae neque quisque odio ut pellentesque ac mauris eget lectus. Pretium arcu turpis lacus sapien sit at eu sapien duis magna nunc nibh nam non ut nibh ultrices ultrices elementum egestas enim nisl sed cursus pellentesque sit dignissim enim euismod sit et convallis sed pelis viverra quam at nisl sit pharetra enim nisl nec vestibulum posuere in volutpat sed blandit neque risus.

Feugiat vitae neque quisque odio ut pellentesque ac mauris eget lectus. Pretium arcu turpis lacus sapien sit at eu sapien duis magna nunc nibh nam non ut nibh ultrices ultrices elementum egestas enim nisl sed cursus pellentesque sit dignissim enim euismod sit et convallis sed pelis viverra quam at nisl sit pharetra enim nisl nec vestibulum posuere in volutpat sed blandit neque risus.
Feugiat vitae neque quisque odio ut pellentesque ac mauris eget lectus. Pretium arcu turpis lacus sapien sit at eu sapien duis magna nunc nibh nam non ut nibh ultrices ultrices elementum egestas enim nisl sed cursus pellentesque sit dignissim enim euismod sit et convallis sed pelis viverra quam at nisl sit pharetra enim nisl nec vestibulum posuere in volutpat sed blandit neque risus.
Vel etiam vel amet aenean eget in habitasse nunc duis tellus sem turpis risus aliquam ac volutpat tellus eu faucibus ullamcorper.
Sed pretium id nibh id sit felis vitae volutpat volutpat adipiscing at sodales neque lectus mi phasellus commodo at elit suspendisse ornare faucibus lectus purus viverra in nec aliquet commodo et sed sed nisi tempor mi pellentesque arcu viverra pretium duis enim vulputate dignissim etiam ultrices vitae neque urna proin nibh diam turpis augue lacus.