Compass IT Compliance Blog / CMMC

CMMC & the Executive Order: A New Era for Shipbuilders

Shipbuilders CMMC

America’s shipbuilding renaissance is underway. On April 9, 2025, President Trump signed a sweeping executive order aimed at revitalizing the U.S. shipbuilding industrial base—an industry long seen as vital to both economic strength and national defense. At the same time, shipbuilders …

Read Story

Subcontractor Survival: Meeting Prime Contractor CMMC Requirements

CMMC Factory

The cybersecurity landscape for the defense industrial base (DIB) has shifted. With the Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC) 2.0 moving swiftly toward full enforcement, subcontractors are finding themselves under growing pressure — not only f …

Read Story

What Is a C3PAO in CMMC?

CMMC C3PAO

In today’s cybersecurity landscape, organizations that work with the U.S. Department of Defense (DoD) must adhere to stringent security standards to protect sensitive information. A critical component of achieving compliance with the Cybersecurity Maturity Model Certification (CMMC) i …

Read Story

Transitioning to CMMC 2.0 – The Five Stages of Grief

Transitioning to CMMC 2.0 – The Five Stages of Grief

Late last week, the Pentagon put out a memo that stuck a knife in the heart of CMMC 1.0, to replace it with the new and shiny CMMC 2.0! CMMC is dead, long live CMMC!

Read Story

An Introduction to CMMC Compliance

An Introduction to CMMC Compliance

On January 31st, 2020, the Department of Defense (DoD) announced the release of the Cybersecurity Maturity Model Certification (CMMC), a framework aimed at assessing and enhancing the cybersecurity posture of the Defense Industrial Base (DIB), as it relates to Controlled Unclassified …

Read Story

CMMC: Moving Away from Self-Assessments

A woman takes notes next to a laptop

The Cybersecurity Maturity Model Certification (CMMC) is a certification procedure developed by the Department of Defense (DoD) to certify that contractors working with the DoD have the controls in place to protect sensitive data, also referred to as controlled unclassified informatio …

Read Story

Subscribe by email