Cybersecurity in 2025: A Cheat Sheet

October is Cybersecurity Awareness Month. 2025 has been a year sprinkled with updates to security needs across federal agencies, with new rules and enforcement attempting to reshape how IT vendors and partners engage with the government. Here’s the most prominent Need to Know topics and insights across the space, starting with CMMC.
CMMC 2.0
The Department of Defense is set to begin enforcing the Cybersecurity Maturity Model Certification (CMMC) regulations on November 10, 2025.
Last December, a final rule was passed establishing the CMMC program framework. In order to enforce CMMC in contracts, however, an Amendment of Title 48 CFR, CMMC clause (DFARS 252.204‑7021) needed to be cleared by OMB-OIRA (Office of Management and Budget and the Office of Information and Regulatory Affairs). That clearance happened in September, setting the course for CMMC inclusions in contracts beginning this November.
The framework has three levels, depending on the sensitivity of information handled:
- Level 1: Self-assessed for basic contracts with Federal Contract Information (FCI).
- Level 2: Third-party assessment for contracts involving Controlled Unclassified Information (CUI).
- Level 3: DoD-led assessments for the highest-sensitivity programs.
While not every solicitation will include CMMC clauses immediately as we’ll see it just beginning in November, contractors should expect them to appear first in high-priority and sensitive acquisitions. This marks a clear shift from preparation to enforcement.
FAR Rule: CUI
In mid-January 2025, the DoD, GSA and NASA introduced a proposed FAR rule to standardize the handling of Controlled Unclassified Information (CUI). The rule implements NARA’s CUI program across all agencies, closing long-standing gaps. For contractors, this means more consistent and established expectations for safeguarding, marking, and documenting CUI.
The FAR is currently undergoing an overhaul as various portions are modified on a rolling basis. IT companies will want to keep pace with any changes, especially as it relates to cybersecurity protocols and procedures, through updates at www.acquisition.gov.
Executive Order 14306
In June, President Trump released the Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13964 and Executive Order 14144. This EO rescinded prior cybersecurity directives, including pausing software attestation requirements tied to the Secure Software Development Framework (SSDF). The EO also emphasizes a push toward government leaning on industry to develop cybersecurity practices in concert with agencies, as opposed to solely a government directive.
Vulnerability Disclosure Policy Momentum
Another development to continue watching is the Federal Contractor Cybersecurity Vulnerability Reduction Act of 2025, introduced and passed in the House in March, then reintroduced again in May awaiting final Congressional approval. The bill would require contractors above the simplified acquisition threshold, or those operating federal information systems, to establish Vulnerability Disclosure Policies (VDPs) aligned with NIST guidance. The legislation has not yet been enacted, but it does reflect a growing expectation across government that vendors should proactively identify, disclose, and remediate vulnerabilities. IT companies that adopt VDPs now will be better positioned to meet future requirements and demonstrate maturity in their cybersecurity posture.
Zero Trust and AI
Zero Trust and AI are their own behemoths of topics, and they provide the undercurrent of discussion surrounding cybersecurity as well. DoD agencies are holding steady to the 2027 deadline of zero trust protocols and standards being implemented, and AI technology is certainly finding a home at the intersection of what it may offer to aid in streamlining more security developments. Threat detection, automated incident response, monitoring, reporting and vulnerability assessments are all areas of opportunity continuing to gain speed across federal agencies.
2025 was the year cybersecurity requirements quickly became more engrained. Agencies are no longer signaling intent, but enforcing compliance. IT vendors and partners that invest now in gap assessments and proactive vulnerability management will be positioned to win as we head into FY26 and beyond.
To get more TD SYNNEX Public Sector Market Insight content, please visit our Market Intelligence microsite.
About the Author:
Susanna Patten is a senior manager on the TD SYNNEX Public Sector Market Insights team covering tech trends across the Public Sector. Susanna has over 15 years of experience in public sector IT procurement. Her responsibilities at TD SYNNEX Public Sector include driving market intelligence asset production, ensuring the quality and relevance of deliverables from the Market Insights team, and aligning these insights with sales opportunities.