Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Cyber Security

New Cyber Rules Hit Defense Supply Chain

Cyberinchief by Cyberinchief
November 11, 2025
Reading Time: 3 mins read
0
New Cyber Rules Hit Defense Supply Chain


Standards, Regulations & Compliance

RELATED POSTS

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

Warning: React2Shell vulnerability already being exploited by threat actors

Pentagon Formally Rolls Out Long-Awaited Cybersecurity Requirements for Vendors

Chris Riotta (@chrisriotta) •
November 10, 2025    

CMMC: New Cyber Rules Hit Defense Supply Chain
Image: Jeremy Christensen/Shutterstock

New cybersecurity certification standards for defense contractors and their subcontractors took effect Monday after years of industry debate over compliance costs, audit oversight and supply chain accountability.

See Also: Mastercard on Agentic Payments: How AI Agents, Tokenization, and Authentication Will Redefine Digital Commerce

The new Cybersecurity Maturity Model Certification rule, which amends federal defense acquisition regulations to include CMMC requirements across all new contracts, option years and extensions, also tasks prime contractors with ensuring their subcontractors meet the appropriate certification level. The phased rollout begins with Level 1 enforcement and will expand through 2028, while allowing program offices to include higher levels earlier when warranted.

Experts told Information Security Media Group that the rule formalizes long-anticipated obligations for industry while clarifying questions around how enforcement will extend to existing contracts and renewals. The new rule resolves one of the program’s biggest early ambiguities, said Thomas Graham, chair of the Cyber AB C3PAO Accreditation Committee, which serves as Department of Defense accreditation body for the CMMC program.

“One of the biggest loopholes – if you call it that – that was unclear prior to [the rule] being final is that it will apply to option years and period-of-performance extensions on current contracts,” said Graham, who is also CISO at Redspin. He added that contractors preparing for compliance should begin by updating their Supplier Performance Risk System scores and consulting with their contracting officers to determine which CMMC level their upcoming contracts will require and when.

Buy JNews
ADVERTISEMENT

“Trust is ultimately the foundation of CMMC,” Graham said. “While the program reinforces DOD’s confidence in its contractors, it also marks a collective commitment to strengthening the nation’s cyber defenses.”

Starting in the program’s first year, DOD will require contractors to complete self-assessments as a condition for all new contract awards and certain exercised options. Companies handling more sensitive data will need certification from an accredited third-party assessment organization beginning in the second year, with requirements expanding further in year three as solicitations begin to mandate validations from the defense industrial base cybersecurity assessment center.

The Pentagon introduced plans in 2019 for a unified cybersecurity standard for information that falls below the threshold of classification amid concerns that its hundreds of thousands of contractors were unevenly safeguarding data. The initiative aims to close longstanding gaps in how defense suppliers manage cyber risk across a supply chain that spans more than 300,000 vendors (see: Pentagon Releases Long-Awaited Contractor Cybersecurity Rule).

The final rule builds on years of revisions, shifting the model from a single sweeping requirement to a tiered framework aligned with guidance from the National Institute of Standards and Technology. The updated structure establishes varying levels of rigor based on the sensitivity of information a contractor handles, from basic cyber hygiene to advanced, continuously monitored protections.





Source link

Tags: ChainCyberDefenseHitRulesSupply
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security
Cyber Security

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

December 8, 2025
Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data
Cyber Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

December 8, 2025
Warning: React2Shell vulnerability already being exploited by threat actors
Cyber Security

Warning: React2Shell vulnerability already being exploited by threat actors

December 7, 2025
News brief: RCE flaws persist as top cybersecurity threat
Cyber Security

News brief: RCE flaws persist as top cybersecurity threat

December 7, 2025
Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cyber Security

Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

December 6, 2025
GOLD BLADE’s strategic evolution – Sophos News
Cyber Security

GOLD BLADE’s strategic evolution – Sophos News

December 6, 2025
Next Post
beware of cyber crime #google #cybersecurity #motivation #ai

beware of cyber crime #google #cybersecurity #motivation #ai

Problems To Start In Cybersecurity #shorts

Problems To Start In Cybersecurity #shorts

Recommended Stories

Cyber Crime पर अभिनेता Akshay Kumar का खुलासा – “बेटी को भेजे गए थे अश्लील मैसेज’ | #Shorts

Cyber Crime पर अभिनेता Akshay Kumar का खुलासा – “बेटी को भेजे गए थे अश्लील मैसेज’ | #Shorts

October 3, 2025
Why Your Business Needs Endpoint Security –

Why Your Business Needs Endpoint Security –

October 15, 2025
Just days before its data might be leaked, Qantas Airways obtained a permanent injunction – DataBreaches.Net

Just days before its data might be leaked, Qantas Airways obtained a permanent injunction – DataBreaches.Net

October 7, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested