Cybersecurity Maturity Model Certification 2.0

DoD certification required for all prime and sub-contractors handling CUI. Level 2 maps to NIST 800-171. Hardware controls are a key differentiator in assessments.

US defense industrial base, DoD prime and sub-contractors

10

control domains mapped

10

Nitrokey products applicable

6

other frameworks cross-mapped

Official doc

Cybersecurity Maturity Model Certification 2.0

IA.L2-3.5.3 Use of multi-factor authentication for local and network access

Phishing-resistant MFA using hardware security keys. Software TOTP and SMS are explicitly excluded from "phishing-resistant" in NIST 800-63B and most modern framework guidance.

SC.L2-3.13.10 Establish and manage cryptographic keys

Hardware-bound key generation and storage. Private keys generated and stored inside a certified secure element (EAL 6+) and are non-exportable by design.

AC.L2-3.1.18 Control connection of mobile devices

Hardened mobile OS with per-app sensor controls, verified boot, and no background telemetry. Satisfies mobile device management and bring-your-own-device security requirements.

SI.L2-3.14.6 Monitor organizational systems to detect attacks

Measured boot chain verified on every power-on. Any firmware modification — supply chain implant, evil-maid attack, or malicious update — fails attestation before the OS loads.

SC.L2-3.13.3 Separate user functionality from system management functionality

VM-level compartmentalization means a compromise of one domain (e.g. browser) cannot reach another (e.g. keys, vault). No other consumer laptop provides this by default.

SC.L2-3.13.1 Monitor, control, and protect communications at external boundaries

Stateful firewall with IPS at the network perimeter. All inbound/outbound traffic inspected with Suricata rule sets. VPN gateway replaces consumer VPN dependency.

Products that satisfy this control:

SC.L2-3.13.16 Protect the confidentiality of CUI at rest

Hardware-encrypted storage and self-hosted file servers replace cloud storage with hardware you control. Encryption keys never leave your environment.

CM.L2-3.4.1 Establish and maintain baseline configurations

Open-source firmware is publicly auditable and reproducibly built. EU jurisdiction hardware is not subject to US National Security Letters. Directly addresses hardware supply chain risk in CMMC and NIS2.

PE.L1-3.10.1 Limit physical access to CUI to authorized individuals

Rated safes and vaults protect physical assets, documents, and hardware backups. UL-certified fire and burglary ratings provide auditable physical security controls.

Products that satisfy this control:

SC.L2-3.13.8 Implement cryptographic mechanisms to prevent disclosure during transmission

Verified boot ensures the TLS stack is unmodified before communication. VPN gateway encrypts all remote access traffic. Hardware-backed keys prevent interception even if endpoints are observed.