top of page

What the Ed Snowden case can teach us about CMMC Compliance.

  • Feb 25
  • 2 min read

For more than a decade, Edward Snowden has been portrayed by many as a lone whistleblower exposing illegal domestic spying.


In a recent Bytes & Brew episode, Steven Bay, Snowden’s former manager at NSA, offers a different perspective; one grounded not in operational reality, not politics.


And that’s where the lessons for CMMC begin.


Separation of Duties: What Snowden Actually Had Access To


Bay explains something that rarely makes headlines: NSA operates under strict separation of duties.


IT administrators manage infrastructure. Intelligence analysts manage programs. Different authorities. Different training. Different oversight.


Up until April 2013, Snowden was an IT administrator. He spent roughly a month as an intelligence analyst before leaving in May 2013. According to Bay, he intentionally targeted that role knowing what he planned to do.


Bay’s argument is straightforward: Snowden did not have the operational depth or full program context required to accurately interpret the intelligence programs he later characterized publicly.


Access is not the same as understanding.


What Was Actually Disclosed?


Bay reviewed the 2013 disclosures and grouped them into three categories:


  1. Legitimate foreign intelligence conducted within NSA’s legal charter

  2. Capabilities disclosures (what NSA could technically do, without operational context)

  3. Illegal domestic surveillance


His conclusion: virtually none of the material fell into the third category. Much of what was released described authorized foreign intelligence activity. Other documents revealed technical capabilities but did not demonstrate unlawful domestic targeting. Revealing that a system can do something is not the same as proving it was used illegally.


That’s a critical distinction.


The CMMC Compliance Parallel


This is where the conversation becomes highly relevant for the Defense Industrial Base. In CMMC and NIST SP 800-171 environments, we talk constantly about controls: access control, audit logging, separation of duties, least privilege, monitoring, and oversight.


But here’s the uncomfortable truth: Controls are only as strong as the organization’s understanding of why they exist.


When personnel do not understand the legal, operational, and governance context behind a control, two risks emerge:


  1. They may misinterpret what they’re seeing

  2. They may intentionally or unintentionally bypass safeguards


CMMC compliance is not just about implementing 110 controls and checking a box. It is about building an environment where people understand the purpose behind those controls: why separation of duties exists, why logging matters, why least privilege protects both the organization and national security.


Misunderstanding a control’s intent can lead to dangerous conclusions. Misunderstanding a system’s oversight can lead to reckless decisions. The Snowden case is an extreme example of what can happen when partial visibility is mistaken for full comprehension.


The Bigger Lesson


Public narratives often favor clean storylines: hero or villain, patriot or traitor.


Operational reality is rarely that simple.


If you work in cybersecurity, insider risk, or the Defense Industrial Base, this episode offers something more valuable than outrage; it offers perspective on context, governance, and the importance of understanding complex systems before passing judgment.


Because in both intelligence programs and CMMC enclaves, the same principle applies:


Access is not understanding.

Capability is not misconduct.


And controls only work when people respect their purpose.


Watch the full episode:

The Snowden Leak: What His Former Manager Learned About Insider Risks and Recovery

Recent Posts

See All
How to Choose the Right CMMC Consultant

As CMMC enforcement moves from policy to practice, defense contractors are facing a simple but uncomfortable reality: choosing the wrong CMMC consultant can cost more than doing nothing at all . The r

 
 
 

Comments


bottom of page