Skip to the main content.

Modernize & Transform

Built to help you reimagine IT operations, empower your workforce, and leverage AI-powered tools to stay ahead of the curve.

Untitled design (3)

Empower My Team

We bring together the best of Microsoft’s cloud ecosystem and productivity tools to help your people thrive.

Untitled design (3)

Build My Infrastructure

We offer a comprehensive suite of infrastructure services tailored to support your business goals today and scale for the future

Untitled design (3)

IT Services

Our managed and co-managed IT service plans deliver a responsive and innovative engagement to support your IT needs, improve employee experience, and drive growth for your business. 

Untitled design (3)

Cybersecurity Services

Sourcepass offers innovative solutions, including SOC, GRC, Security Assessments, and more to protect your business.

Untitled design (3)

Professional Services

Grow your business with cloud migrations, infrastructure refreshes, M&A integrations, staff augmentation, technical assessments, and more.

Untitled design (3)

Resource Library

Stay ahead, stay connected, and discover the future of IT with Sourcepass.

Untitled design (3)

Events & Webinars

Dive into a dynamic calendar of webinars and in-person gatherings designed to illuminate the latest in managed IT services, cybersecurity, and automation.

Untitled design (3)

Resources by Role

Explore key resources, eBooks, video trainings, and more curated for CEOs, CFOs, CIOs, CISOs, and technology leaders!

Untitled design (3)

The Sourcepass Story

Sourcepass aims to be different. It is owned and operated by technology, security, and managed services experts who are passionate about delivering an IT experience that clients love.

Untitled design (3)

The Sourcepass Experience

At Sourcepass, we’re rewriting the IT and cybersecurity experience by helping businesses focus on what they do best, while we deliver the infrastructure, insights, and innovation to help them thrive.

Untitled design (3)

 

Understanding CMMC 2.0 Level One: What It Is and Who Should Pay Attention

 
Understanding CMMC 2.0 Level One: What It Is and Who Should Pay Attention

In November 2021, the Department of Defense (DoD) announced the transition from CMMC 1.0 to CMMC 2.0, streamlining the certification process and reducing compliance burdens for contractors.

The updated framework introduces three levels of cybersecurity maturity, with Level One serving as the foundational tier. Here’s an in-depth look at CMMC 2.0 Level One, its key components, and the industries that need to take note. 

What Is CMMC 2.0 Level One?

 

CMMC 2.0 Level One, also known as “Foundational,” focuses on safeguarding Federal Contract Information (FCI). FCI is information not intended for public release that is provided or generated under a government contract.

This level is designed to ensure that contractors implement basic cybersecurity practices to protect sensitive but unclassified information. 

 

Key Components of CMMC 2.0 Level One

 

CMMC 2.0 Level One encompasses 17 cybersecurity practices aligned with the FAR (Federal Acquisition Regulation) 52.204-21, which outlines the minimum standards for safeguarding FCI. These practices focus on basic cyber hygiene and include: 

  • Access Control: Limit access to systems and information to authorized users only.
  • Identification and Authentication: Require unique identifiers and secure authentication methods for users.
  • Media Protection: Safeguard sensitive data stored on removable media or devices.
  • Physical Protection: Restrict physical access to information systems and facilities.
  • System and Communications Protection: Protect data during transmission and ensure secure communication protocols.
  • Incident Response: Develop procedures to detect, report, and respond to cybersecurity incidents.
  • Maintenance: Perform routine maintenance on systems while ensuring sensitive data is protected.
  • Personnel Security: Verify individuals’ trustworthiness before granting system access.
  • System and Information Integrity: Identify and manage system flaws to prevent unauthorized access or data breaches. 

 

Simplified Compliance 

Unlike the higher levels of CMMC, Level One does not require third-party certification. Instead, organizations can perform annual self-assessments and attest to their compliance.

This shift reduces the financial and administrative burden, particularly for small businesses. 

 

Who Should Pay Attention to CMMC 2.0 Level One? 

While CMMC 2.0 Level One primarily applies to defense contractors handling FCI, its relevance extends beyond the defense industrial base. Industries and organizations that frequently interact with government contracts or sensitive information should be aware of these requirements. These include: 

  • Manufacturing: Companies producing components or materials for DoD projects. 
  • Professional Services: Legal, accounting, and consulting firms supporting government contracts. 
  • Information Technology: Providers of software, hardware, or managed IT services to government entities. 
  • Logistics and Supply Chain: Businesses involved in transporting or managing goods for defense operations. 

 

Why CMMC 2.0 Level One Matters 

 

CMMC 2.0 Level One establishes a baseline for cybersecurity, addressing common vulnerabilities that adversaries exploit. By adhering to these practices, organizations can: 

  • Protect sensitive information and intellectual property. 
  • Build trust with the DoD and other government agencies. 
  • Enhance their competitive edge when bidding on contracts. 

CMMC 2.0 Level One represents a critical step toward improving cybersecurity across the defense supply chain and beyond.

Its emphasis on basic cyber hygiene ensures that even small organizations can contribute to the security of sensitive information.

As cyber threats continue to evolve, adopting these foundational practices is not just a requirement but a necessity for organizations aiming to safeguard their operations and maintain compliance in today’s interconnected landscape.