CMMC (Cybersecurity Maturity Model Certification)

A DoD framework requiring defense contractors to meet specific cybersecurity standards before being awarded federal contracts.

The Cybersecurity Maturity Model Certification (CMMC) is a unified standard for implementing cybersecurity across the defense industrial base (DIB). Developed by the U.S. Department of Defense, CMMC 2.0 consists of three levels of cybersecurity maturity, ranging from foundational cyber hygiene to advanced practices. Organizations seeking DoD contracts must achieve the appropriate CMMC level to be eligible for contract awards. The framework aligns with NIST SP 800-171 and incorporates practices from other standards such as NIST SP 800-172. CyberUp24 helps organizations navigate CMMC compliance through architecture design, gap assessments, and remediation planning.

Related terms

SOAR (Security Orchestration, Automation and Response)

Technology that automates security workflows, orchestrates tools, and accelerates incident response — transforming manual SOC tasks into intelligent, repeatable processes.
Read full description
S
s

SIEM (Security Information and Event Management)

A platform that aggregates and analyzes security data from across an organization's environment to detect threats and generate alerts in real time.
Read full description
S
s

Vulnerability Scanning

Automated identification and analysis of security weaknesses in systems, networks, and applications to prioritize remediation efforts.
Read full description
V
v

Zero Trust

A security model based on the principle of never trust always verify — requiring continuous authentication and authorization for every user device and connection regardless of location.
Read full description
Z
z

Threat Hunting

A proactive security practice where analysts actively search for hidden threats and adversaries within an organization's environment before alerts are triggered.
Read full description
T
t

SOAR (Security Orchestration Automation and Response)

Technology that automates security workflows, orchestrates tools, and accelerates incident response — transforming manual SOC tasks into intelligent, repeatable processes.
Read full description
S
s