Whether the Defense Industrial Base (DIB) is self-attesting or pursing a certification, their cyber posture boils down to Identity -- monitoring and controlling remote access to sensitive data.
Download the factsheet to learn best practices and pitfalls to avoid for two of 14 critical domains: Access Control (AC) and Identification and Authentication (IA).
You can also view Okta's full Cybersecurity Maturity Model Certification (CMMC) 2.0 mapping for specific Identity-first functions that Okta enables and keeps secure.