<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cooey.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Marieramsay</id>
	<title>Cooey Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cooey.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Marieramsay"/>
	<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Special:Contributions/Marieramsay"/>
	<updated>2026-05-01T08:42:26Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.3</generator>
	<entry>
		<id>https://cooey.wiki/index.php?title=Resources_and_Tools_for_Compliance&amp;diff=136</id>
		<title>Resources and Tools for Compliance</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Resources_and_Tools_for_Compliance&amp;diff=136"/>
		<updated>2025-03-02T01:33:29Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To support organizations in achieving CMMC (Cybersecurity Maturity Model Certification) compliance, several resources and tools are available from government sources. These resources help organizations understand the requirements of the CMMC framework, assess their cybersecurity posture, and implement the necessary controls to protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI).&lt;br /&gt;
&lt;br /&gt;
==Here is a list of key government-provided tools and resources that can help with CMMC compliance:==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;1. NIST Special Publications (SP)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf NIST SP 800-171:] This is the foundational document for CMMC, specifically for Level 2 (Advanced) compliance. It outlines the 110 security controls that organizations must implement to protect CUI. The publication provides detailed descriptions of the required security practices across 14 families.&lt;br /&gt;
&lt;br /&gt;
[https://csrc.nist.gov/publications/detail/sp/800-171a/final NIST SP 800-171A:] This document provides assessment procedures for evaluating the effectiveness of security controls described in NIST SP 800-171. It helps organizations conduct self-assessments to ensure they meet the required controls.&lt;br /&gt;
&lt;br /&gt;
[https://csrc.nist.gov/publications/detail/sp/800-172/final NIST SP 800-172:] Provides enhanced security controls for protecting CUI in critical systems. It is useful for organizations aiming for CMMC Level 3 (Expert) or those dealing with high-risk information.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;2. National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The [https://www.nist.gov/cyberframework NIST Cybersecurity Framework] provides a voluntary framework of standards, guidelines, and best practices to manage and reduce cybersecurity risks. Many organizations use it in conjunction with NIST 800-171 to strengthen their cybersecurity posture.&lt;br /&gt;
&lt;br /&gt;
The CSF is particularly helpful in assessing and enhancing cybersecurity practices as they relate to the requirements in the CMMC model.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;3. Cybersecurity &amp;amp; Infrastructure Security Agency (CISA) Resources&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
CISA offers a wide range of cybersecurity tools, guidance, and best practices that are relevant for organizations working toward CMMC compliance. Key resources include:&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/resources-tools/services/cyber-resilience-review-crr Cyber Resilience Review (CRR):] A self-assessment tool that helps organizations evaluate their operational resilience and cybersecurity capabilities, including risk management, incident response, and vulnerability management. It’s aligned with cybersecurity best practices that support CMMC objectives.&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/news-events/alerts/2021/06/30/cisas-cset-tool-sets-sights-ransomware-threat Ransomware Readiness Assessment (RRA):] A specialized tool that helps organizations evaluate their readiness against ransomware attacks.&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/resources-tools/resources/cyber-essentials Cyber Essentials:] Provides basic guidelines for small businesses to adopt foundational cybersecurity measures.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;4. Supplier Performance Risk System ([[SPRS]])&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
SPRS is the DoD system where contractors must submit their [[NIST 800-171]] self-assessment scores as part of CMMC compliance. The system allows the DoD to track contractors&#039; cybersecurity posture and use that information to evaluate suppliers when awarding contracts.&lt;br /&gt;
&lt;br /&gt;
Organizations are required to:&lt;br /&gt;
&lt;br /&gt;
*Conduct a NIST 800-171 self-assessment.&lt;br /&gt;
&lt;br /&gt;
*Submit their score to [https://www.sprs.csd.disa.mil/ SPRS], which helps determine their readiness for handling [[CUI]].&lt;br /&gt;
&lt;br /&gt;
*Maintain accurate scores and update them as they improve their security controls.&lt;br /&gt;
Here is the SPRS &#039;[https://www.sprs.csd.disa.mil/pdf/NISTSP800-171QuickEntryGuide.pdf Quick Entry Guide],&#039; developed by DoD.&lt;br /&gt;
&lt;br /&gt;
SPRS also has [https://www.sprs.csd.disa.mil/ training available here].&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;5. DoD Cybersecurity Maturity Model Certification (CMMC) Resources&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The CMMC Accreditation Body ([https://cyberab.org/ Cyber-AB]) provides critical resources related to the CMMC assessment process and compliance. These resources include:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Assessment Guides&#039;&#039;&#039;: Detailed guidance for preparing for a CMMC assessment at different levels (Level 1, Level 2).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Training Resources&#039;&#039;&#039;: Information on Licensed Training Providers ([[LTP]]s), Certified CMMC Professionals ([[CCP]]s), and Certified CMMC Assessors ([[CCA]]s).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;FAQs and Documentation:&#039;&#039;&#039; FAQs, white papers, and other documentation that explain CMMC in detail, as well as guidance on how to comply with specific security practices.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;6. Defense Federal Acquisition Regulation Supplement ([[DFARS]])&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The DFARS 252.204-7012 clause outlines the requirements for protecting CUI and mandates compliance with NIST 800-171. Understanding DFARS is essential for defense contractors since it forms the legal basis for many of the cybersecurity requirements.&lt;br /&gt;
&lt;br /&gt;
DFARS 252.204-7019 and 252.204-7020 require contractors to submit their NIST 800-171 assessment scores to SPRS.&lt;br /&gt;
The DoD uses these DFARS clauses as part of their contracting requirements, and organizations must be familiar with them to ensure compliance.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;7. National Initiative for Cybersecurity Education (NICE)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://www.nist.gov/itl/applied-cybersecurity/nice NICE] is a NIST-led initiative that provides resources for educating and training individuals in cybersecurity. It offers guidelines, frameworks, and resources to help organizations build their cybersecurity workforce, which is crucial for achieving and maintaining CMMC compliance.&lt;br /&gt;
&lt;br /&gt;
NICE also provides a workforce framework that helps organizations understand the skills and roles necessary for cybersecurity, which can guide hiring, training, and team development to meet CMMC requirements.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;8. [https://dodprocurementtoolbox.com/uploads/Cybersecurity_FAQ_update_12_19_22_ba047be683.pdf Department of Defense (DoD) Procurement Toolbox FAQ:]&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
DoD offers a collection of tools and services to help you and your organization manage, enable, and share procurement information across the Department of Defense.&lt;br /&gt;
&lt;br /&gt;
NOTE: This resource may not be updated.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;9. Federal Risk and Authorization Management Program (FedRAMP)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://marketplace.fedramp.gov/products FedRAMP] provides a standardized approach to security assessment, authorization, and monitoring for cloud products and services used by federal agencies, including the DoD. FedRAMP compliance is particularly important for contractors using cloud services to store or process CUI, as it provides government-approved security controls.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;10. National Vulnerability Database (NVD)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The [https://nvd.nist.gov/ NVD] is a U.S. government repository of standards-based vulnerability management data that can be used to evaluate software and systems for known security vulnerabilities. Organizations working on CMMC compliance can use NVD to track vulnerabilities in their software and address them as part of their vulnerability management efforts.&lt;br /&gt;
&lt;br /&gt;
=== 11.NIST Glossary ===&lt;br /&gt;
Looking for the definition for certain terms?  Check [https://csrc.nist.gov/glossary this resource] for help.&lt;br /&gt;
&lt;br /&gt;
== Here are other reliable tools and open source resources to use in your CMMC compliance journey: (use at your own risk!) ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/Arudjreis/awesome-security-GRC Awesome Security GRC] - A GitHub repo, knowledge bank for GRC&lt;br /&gt;
* [https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-controls-reference.html AWS Security Hub] controls reference&lt;br /&gt;
* [https://aws.amazon.com/compliance/itar/ AWSGovCloud] - ITAR&lt;br /&gt;
* [https://it.uw.edu/policies-guidelines/compliance/cybersecurity-maturity-model-certification-cmmc/ Basic Systems Security Plan (SSP), with guide, created by University of Washington - click here and scroll to &amp;quot;Resources&amp;quot;]&lt;br /&gt;
* [https://github.com/bitwarden/ Bitwarden] - GitHub&lt;br /&gt;
* [https://downloads.cisecurity.org/#/ Center for Internet Security (CIS) Benchmarks]&lt;br /&gt;
* [https://www.cmmcaudit.org/ CMMC Audit Prep] from Amira Armond: Resources, Scoping Guides, Templates, and More&lt;br /&gt;
* [https://github.com/SecurityBagel/CMMC-Bagel CMMC Bagel - GitHub]&lt;br /&gt;
* [https://cmmc-coa.com/ CMMC Center of Awesomeness] - Documentation, CMMC Kill Chain, Resources, and More&lt;br /&gt;
* [https://defcert.com/wp-content/uploads/2022/02/CMMC-and-Split-Tunnels_Feb2022.pdf CMMC and Split Tunnels] - Solutions for the Cybersecurity Maturity Model Certification Practice SC.L2-3.13.7 &lt;br /&gt;
* [https://github.com/cooeycomrades/cooey-tools Cooey Tools GitHub]&lt;br /&gt;
* [https://public.cyber.mil/stigs/ DoD Cyber Exchange - Security Technical Implementation Guides], DODI 8500.01&lt;br /&gt;
* [https://www.fedramp.gov/2024-02-16-rev-5-additional-documents-released/ FedRAMP - Rev 5 Documents Released]&lt;br /&gt;
* [https://web-gapps.pages.dev/ Gapps] - Open Source Security Governance, Compliance Platform&lt;br /&gt;
* [https://invgate.com/ Invgate] - Service Management and Asset Management solution&lt;br /&gt;
* [https://mha.azurewebsites.net/ Message Header Analyzer Tool]&lt;br /&gt;
* [https://www.cisa.gov/resources-tools/resources/microsoft-expanded-cloud-logs-implementation-playbook Microsoft Expanded Cloud Logs Implementation Playbook (via CISA)]&lt;br /&gt;
* [https://techcommunity.microsoft.com/blog/publicsectorblog/understanding-compliance-between-commercial-government-dod--secret-offerings---f/4225436 Microsoft Tech Blog: &amp;quot;Understanding Compliance Between Commercial, Government, DoD &amp;amp; Secret Offerings&amp;quot;]&lt;br /&gt;
* [https://www.realciso.io/defense-industrial-base/sprs-calculator/ RealCISO]: SPRS Calculator for NIST 800-171&lt;br /&gt;
* [https://devolutions.net/remote-desktop-manager/ Remote Desktop Manager]&lt;br /&gt;
* [https://www.dafcio.af.mil/ SAF/CN - Office of the CIO] - Strategy, Objectives, Reference Architecture, and More&lt;br /&gt;
* [https://securityonionsolutions.com/ Security Onion Solutions, LLC] - Open Platform for threat hunting, network security monitoring, and log management.&lt;br /&gt;
* [https://securitytxt.org/ Security Policy Text]&lt;br /&gt;
* [https://www.helpnetsecurity.com/2024/02/12/sicat-open-source-exploit-finder/ SiCat]: Open Source Exploit Finder&lt;br /&gt;
* [https://start.me/p/OmOrJb/threat-hunting Threat Hunting]&lt;br /&gt;
* [https://wazuh.com/ Wazuh] - Open Source Security Platform, Unified XDR and SIEM Protection&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
For defense contractors working toward CMMC compliance, several government resources and tools can help guide them through the process. Key resources include NIST publications, the Cyber Accreditation Body, SPRS, and guidelines provided by CISA and the DoD. These resources provide essential information for conducting assessments, managing risks, implementing controls, and ensuring compliance with NIST 800-171 and the CMMC framework. They also support organizations in improving their overall cybersecurity posture, which is crucial for handling sensitive DoD information securely.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=135</id>
		<title>Identifying a Certified Third Party Assessing Organization (C3PAO)</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=135"/>
		<updated>2025-03-02T01:31:30Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It is worth taking some time to find the right C3PAO for an organization.&lt;br /&gt;
&lt;br /&gt;
The community is invited to use this guide and matrix released by the ND-ISAC: [https://ndisac.org/defense-news/nd-isac-releases-c3pao-shopping-guide-for-small-medium-sized-businesses/ C3PAO Shopping Guide], and encouraged to ask questions of a potential assessor to find the right fit for their environment:&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;SPA Categorization&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Some assessors believe that a Security Protection Asset (SPA) includes any systems components that are used in an organizations Systems Security Plan (SSP) for supporting evidence.  Other assessors only identify an SPA as systems that provide protection to components as stated in the NIST 800-171 publication.  Talk to your assessor about what they will expect to see from you in an environment like yours.&lt;br /&gt;
# Ask your C3PAO if they expect systems mentioned in the SSP for the purpose of providing evidence to meeting an assessment objective an example of an SPA?   Do they believe an SPA has to provide a security function such as a SIEM or EDR?  This will impact the level of effort to provide evidence for an assessment.  NIST 800-171 states that “The requirements apply to all components of nonfederal systems and organizations that process, store, and/or transmit CUI, or that provide protection for such components”.  &lt;br /&gt;
# You may simply ask: &amp;quot;Which controls will you assess for SPAs?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Browser used to Access CUI&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Many organizations are accessing and modifying CUI documents through a web browser but have restricted the ability to download and print. Some DOD components also use the browser for accessing Government information. One example is the Navy using &amp;quot;Flank Speed.&amp;quot; When opening a document in a browser, it does process information on the endpoint. If that endpoint is not part of the organization information system and controlled then it could be a finding. Some assessors will fail an organization if they are using a browser on an asset that is not controlled, others will not. As an alternative there are solutions such as VDI or technologies that provide a pixel representation of a browser that would pass assessment. If you are using a VDI browser application to access CUI, ask your assessor if they would fail the organization.  &lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;CUI at Alternate Worksites - Work From Home (WFH)&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# When CUI physically exists at alternate work sites, the CUI must be physically protected. The physical protections of the CUI may include locked filing cabinets, safes, or locked briefcases, for example. Some organizations even allow WFH users to print to corporate-issued printers in their home. At some level, the physical security of your home is providing safeguarding for that CUI. Some assessors will assess the WFH environment remotely, relying on policy and training, user interview, or maybe even demonstration on camera by a WFH user. Other assessors will require an in-person site visit to a representative WFH environment. Other assessors won&#039;t assess you if you have CUI at home. If you allow physical CUI at your user&#039;s homes, ask your assessor how they plan to assess your WFH environment, or if they will assess it at all.&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Other more specific questions to consider, depending on your environment:&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Do you believe that Security Protection Data (SPD) is CUI? &lt;br /&gt;
# Is it acceptable to store FIPS 140-2 encrypted CUI in a non-FRME cloud? &lt;br /&gt;
# What do you believe is a Cloud Service Provider and requires FedRAMP? &lt;br /&gt;
# How do you define logical separation? &lt;br /&gt;
# Is OneDrive in scope if local CUI folders are excluded? &lt;br /&gt;
# Which controls do you believe need to be applied to Contractor Risk Managed Assets (CRMA)? &lt;br /&gt;
# Would you accept N/A for a control without a waiver from DoD?&lt;br /&gt;
# What are the risk management practices considered minimum for Specialized Assets (like CNC machines, lab equipment, test equipment)? Do they need to be segmented?&lt;br /&gt;
&lt;br /&gt;
=== C3PAO Stakeholders Forum ===&lt;br /&gt;
Many assessors are involved in a voluntary, informal group that is not associated with the AB.  They post [https://www.c3paoforum.org/position-papers/ position papers] that may also provide insight into how assessments may be run in your environment.  Not all assessors are a part of the group, but the community is well-respected and very active in the industry.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=134</id>
		<title>Identifying a Certified Third Party Assessing Organization (C3PAO)</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=134"/>
		<updated>2025-03-02T01:30:21Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It is worth taking some time to find the right C3PAO for an organization.&lt;br /&gt;
&lt;br /&gt;
The community is invited to use this guide and matrix released by the ND-ISAC: [https://ndisac.org/defense-news/nd-isac-releases-c3pao-shopping-guide-for-small-medium-sized-businesses/ C3PAO Shopping Guide], and encouraged to ask questions of a potential assessor to find the right fit for their environment:&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;SPA Categorization&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Some assessors believe that a Security Protection Asset (SPA) includes any systems components that are used in an organizations Systems Security Plan (SSP) for supporting evidence.  Other assessors only identify an SPA as systems that provide protection to components as stated in the NIST 800-171 publication.  Talk to your assessor about what they will expect to see from you in an environment like yours.&lt;br /&gt;
# Ask your C3PAO if they expect systems mentioned in the SSP for the purpose of providing evidence to meeting an assessment objective an example of an SPA?   Do they believe an SPA has to provide a security function such as a SIEM or EDR?  This will impact the level of effort to provide evidence for an assessment.  NIST 800-171 states that “The requirements apply to all components of nonfederal systems and organizations that process, store, and/or transmit CUI, or that provide protection for such components”.  &lt;br /&gt;
# You may simply ask: &amp;quot;Which controls will you assess for SPAs?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Browser used to Access CUI&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Many organizations are accessing and modifying CUI documents through a web browser but have restricted the ability to download and print. Some DOD components also use the browser for accessing Government information. One example is the Navy using &amp;quot;Flank Speed.&amp;quot; When opening a document in a browser, it does process information on the endpoint. If that endpoint is not part of the organization information system and controlled then it could be a finding. Some assessors will fail an organization if they are using a browser on an asset that is not controlled, others will not. As an alternative there are solutions such as VDI or technologies that provide a pixel representation of a browser that would pass assessment. If you are using a VDI browser application to access CUI, ask your assessor if they would fail the organization.  &lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;CUI at Alternate Worksites - Work From Home (WFH)&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# When CUI is physically at alternate work sites, the CUI still must be physically protected. The physical protections may include locked filing cabinets, safes, or locked briefcases, for example. Some organizations even allow WFH users to print to corporate-issued printers in their home. At some level, the physical security of your home is providing safeguarding for that CUI. Some assessors will assess the WFH environment remotely, relying on policy and training, user interview, or maybe even demonstration on camera by a WFH user. Other assessors will require an in-person site visit to a representative WFH environment. Other assessors won&#039;t assess you if you have CUI at home. If you allow physical CUI at your user&#039;s homes, ask your assessor how they plan to assess your WFH environment, or if they will assess it at all.&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Other more specific questions to consider, depending on your environment:&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Do you believe that Security Protection Data (SPD) is CUI? &lt;br /&gt;
# Is it acceptable to store FIPS 140-2 encrypted CUI in a non-FRME cloud? &lt;br /&gt;
# What do you believe is a Cloud Service Provider and requires FedRAMP? &lt;br /&gt;
# How do you define logical separation? &lt;br /&gt;
# Is OneDrive in scope if local CUI folders are excluded? &lt;br /&gt;
# Which controls do you believe need to be applied to Contractor Risk Managed Assets (CRMA)? &lt;br /&gt;
# Would you accept N/A for a control without a waiver from DoD?&lt;br /&gt;
# What are the risk management practices considered minimum for Specialized Assets (like CNC machines, lab equipment, test equipment)? Do they need to be segmented?&lt;br /&gt;
&lt;br /&gt;
=== C3PAO Stakeholders Forum ===&lt;br /&gt;
Many assessors are involved in a voluntary, informal group that is not associated with the AB.  They post [https://www.c3paoforum.org/position-papers/ position papers] that may also provide insight into how assessments may be run in your environment.  Not all assessors are a part of the group, but the community is well-respected and very active in the industry.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=133</id>
		<title>Identifying a Certified Third Party Assessing Organization (C3PAO)</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=133"/>
		<updated>2025-03-02T01:29:05Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It is worth taking some time to find the right C3PAO for an organization.&lt;br /&gt;
&lt;br /&gt;
The community is invited to use this guide and matrix released by the ND-ISAC: [https://ndisac.org/defense-news/nd-isac-releases-c3pao-shopping-guide-for-small-medium-sized-businesses/ C3PAO Shopping Guide], and encouraged to ask questions of a potential assessor to find the right fit for their environment:&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;SPA Categorization&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Some assessors believe that a Security Protection Asset (SPA) includes any systems components that are used in an organizations Systems Security Plan (SSP) for supporting evidence.  Other assessors only identify an SPA as systems that provide protection to components as stated in the NIST 800-171 publication.  Talk to your assessor about what they will expect to see from you in an environment like yours.&lt;br /&gt;
# Ask your C3PAO if they expect systems mentioned in the SSP for the purpose of providing evidence to meeting an assessment objective an example of an SPA?   Do they believe an SPA has to provide a security function such as a SIEM or EDR?  This will impact the level of effort to provide evidence for an assessment.  NIST 800-171 states that “The requirements apply to all components of nonfederal systems and organizations that process, store, and/or transmit CUI, or that provide protection for such components”.  &lt;br /&gt;
# You may simply ask: &amp;quot;Which controls will you assess for SPAs?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Browser used to Access CUI&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Many organizations are accessing and modifying CUI documents through a web browser but have restricted the ability to download and print. Some DOD components also use the browser for accessing Government information. One example is the Navy using Flank Speed. However, when opening a document in a browser it does process information on the endpoint. If that endpoint is not part of the organization information system and controlled then it could be a finding. Some assessors will fail an organization if they are using a browser on an asset that is not controlled others will not. As an alternative there are solutions such as VDI or technologies that provide a pixel representation of a browser that would pass assessment. If you are using a VDI browser application to access CUI, ask your assessor if they would fail the organization.  &lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;CUI at Alternate Worksites - Work From Home (WFH)&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# When CUI is physically at alternate work sites, the CUI still must be physically protected. The physical protections may include locked filing cabinets, safes, or locked briefcases, for example. Some organizations even allow WFH users to print to corporate-issued printers in their home. At some level, the physical security of your home is providing safeguarding for that CUI. Some assessors will assess the WFH environment remotely, relying on policy and training, user interview, or maybe even demonstration on camera by a WFH user. Other assessors will require an in-person site visit to a representative WFH environment. Other assessors won&#039;t assess you if you have CUI at home. If you allow physical CUI at your user&#039;s homes, ask your assessor how they plan to assess your WFH environment, or if they will assess it at all.&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Other more specific questions to consider, depending on your environment:&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Do you believe that Security Protection Data (SPD) is CUI? &lt;br /&gt;
# Is it acceptable to store FIPS 140-2 encrypted CUI in a non-FRME cloud? &lt;br /&gt;
# What do you believe is a Cloud Service Provider and requires FedRAMP? &lt;br /&gt;
# How do you define logical separation? &lt;br /&gt;
# Is OneDrive in scope if local CUI folders are excluded? &lt;br /&gt;
# Which controls do you believe need to be applied to Contractor Risk Managed Assets (CRMA)? &lt;br /&gt;
# Would you accept N/A for a control without a waiver from DoD?&lt;br /&gt;
# What are the risk management practices considered minimum for Specialized Assets (like CNC machines, lab equipment, test equipment)? Do they need to be segmented?&lt;br /&gt;
&lt;br /&gt;
=== C3PAO Stakeholders Forum ===&lt;br /&gt;
Many assessors are involved in a voluntary, informal group that is not associated with the AB.  They post [https://www.c3paoforum.org/position-papers/ position papers] that may also provide insight into how assessments may be run in your environment.  Not all assessors are a part of the group, but the community is well-respected and very active in the industry.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=CUI&amp;diff=132</id>
		<title>CUI</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=CUI&amp;diff=132"/>
		<updated>2025-03-02T01:25:14Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Controlled Unclassified Information (CUI) refers to sensitive information that, while not classified, requires safeguarding or dissemination controls in accordance with laws, regulations, or government-wide policies. The CUI program was established by Executive Order 13556 in 2010 to standardize the way the federal government and its contractors handle this type of information, reducing inconsistencies and improving information security across agencies.&lt;br /&gt;
&lt;br /&gt;
On January 15, 2025, the [https://www.federalregister.gov/documents/2025/01/15/2024-30437/federal-acquisition-regulation-controlled-unclassified-information?utm_campaign=subscription+mailing+list&amp;amp;utm_medium=email&amp;amp;utm_source=federalregister.gov FAR CUI Proposed Rule was posted.]  Public Comment will be accepted through March 17, 2025.&lt;br /&gt;
&lt;br /&gt;
===Key Aspects of CUI===&lt;br /&gt;
&lt;br /&gt;
Definition:&lt;br /&gt;
&lt;br /&gt;
CUI encompasses information that is sensitive but not classified. This includes data such as personally identifiable information ([[PII]]), intellectual property, legal documents, proprietary business information, and anything that could potentially harm national or economic security if improperly handled.&lt;br /&gt;
&lt;br /&gt;
Examples of CUI:&lt;br /&gt;
&lt;br /&gt;
*Health Information (e.g., HIPAA-protected data)&lt;br /&gt;
*Financial Information&lt;br /&gt;
*Export Control Information (e.g., subject to ITAR or EAR regulations)&lt;br /&gt;
*Critical Infrastructure Information&lt;br /&gt;
*Proprietary Business Information (e.g., trade secrets)&lt;br /&gt;
*Defense Information that does not qualify as classified (e.g., design specs or performance data for defense systems).&lt;br /&gt;
&lt;br /&gt;
Categories of CUI: &lt;br /&gt;
&lt;br /&gt;
CUI is categorized into two main types -&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CUI Basic&#039;&#039;&#039;: Information that requires protection but is governed by relatively standard rules and procedures. Safeguarding is generally based on NIST SP 800-171 standards.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CUI Specified&#039;&#039;&#039;: Information that has stricter safeguarding or dissemination controls due to specific laws or regulations (e.g., Export Control laws like ITAR).&lt;br /&gt;
&lt;br /&gt;
CUI vs. Classified Information: CUI is different from classified information (Confidential, Secret, Top Secret), which is subject to much higher levels of protection. However, CUI must still be handled carefully to prevent unauthorized access, modification, or destruction.&lt;br /&gt;
&lt;br /&gt;
===Safeguarding CUI===&lt;br /&gt;
&lt;br /&gt;
Organizations that handle CUI must comply with specific security requirements, particularly those outlined in NIST SP 800-171 Rev 2. &lt;br /&gt;
&lt;br /&gt;
===The CUI Program===&lt;br /&gt;
&lt;br /&gt;
The National Archives and Records Administration ([[NARA]]) is responsible for overseeing the CUI program. NARA provides guidance, establishes categories and markings for CUI, and ensures that agencies follow consistent procedures for safeguarding information.&lt;br /&gt;
&lt;br /&gt;
1. CUI Registry:&lt;br /&gt;
NARA maintains a CUI Registry, which outlines all categories and subcategories of CUI, along with the associated authorities (laws, regulations, or government policies) that require safeguarding.&lt;br /&gt;
&lt;br /&gt;
2. Marking CUI:&lt;br /&gt;
CUI must be marked appropriately to signal that it requires protection. The marking typically includes the designation &amp;quot;CUI&amp;quot; at the top and bottom of each page containing such information, along with any specific category (e.g., CUI//SP-PROPRIETARY for proprietary business information).&lt;br /&gt;
&lt;br /&gt;
3. Handling and Sharing: CUI may only be shared with authorized individuals who have a &amp;quot;lawful government purpose&amp;quot; for accessing it. The dissemination of CUI must follow the specific rules for each category and include measures to protect it during transit (e.g., encryption, password protection).&lt;br /&gt;
&lt;br /&gt;
===CUI in Government Contracts===&lt;br /&gt;
&lt;br /&gt;
Many federal contracts, particularly with the Department of Defense (DoD) and other security-sensitive agencies, involve handling CUI. Contractors working with the DoD are often required to comply with DFARS 252.204-7012 and NIST SP 800-171 Rev 2 to safeguard CUI.&lt;br /&gt;
&lt;br /&gt;
Under the Cybersecurity Maturity Model Certification (CMMC) framework, defense contractors handling CUI must obtain a CMMC Level 2 certification (or higher, depending on contract requirements), ensuring that they have implemented the necessary security controls to protect CUI.&lt;br /&gt;
&lt;br /&gt;
===Importance of CUI Compliance===&lt;br /&gt;
&lt;br /&gt;
Failing to properly safeguard CUI can lead to serious consequences, such as:&lt;br /&gt;
&lt;br /&gt;
*Breaches of sensitive information&lt;br /&gt;
*National security risks&lt;br /&gt;
*Legal penalties or loss of contracts&lt;br /&gt;
&lt;br /&gt;
For organizations that handle CUI, ensuring compliance with all applicable laws and standards is critical to maintaining trust with the federal government and avoiding the potential fallout from cybersecurity incidents.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Resources_and_Tools_for_Compliance&amp;diff=131</id>
		<title>Resources and Tools for Compliance</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Resources_and_Tools_for_Compliance&amp;diff=131"/>
		<updated>2025-03-02T01:24:59Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Lots of links added, pulled from Discord shares&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To support organizations in achieving CMMC (Cybersecurity Maturity Model Certification) compliance, several resources and tools are available from government sources. These resources help organizations understand the requirements of the CMMC framework, assess their cybersecurity posture, and implement the necessary controls to protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI).&lt;br /&gt;
&lt;br /&gt;
==Here is a list of key government-provided tools and resources that can help with CMMC compliance:==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;1. NIST Special Publications (SP)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf NIST SP 800-171:] This is the foundational document for CMMC, specifically for Level 2 (Advanced) compliance. It outlines the 110 security controls that organizations must implement to protect CUI. The publication provides detailed descriptions of the required security practices across 14 families.&lt;br /&gt;
&lt;br /&gt;
[https://csrc.nist.gov/publications/detail/sp/800-171a/final NIST SP 800-171A:] This document provides assessment procedures for evaluating the effectiveness of security controls described in NIST SP 800-171. It helps organizations conduct self-assessments to ensure they meet the required controls.&lt;br /&gt;
&lt;br /&gt;
[https://csrc.nist.gov/publications/detail/sp/800-172/final NIST SP 800-172:] Provides enhanced security controls for protecting CUI in critical systems. It is useful for organizations aiming for CMMC Level 3 (Expert) or those dealing with high-risk information.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;2. National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The [https://www.nist.gov/cyberframework NIST Cybersecurity Framework] provides a voluntary framework of standards, guidelines, and best practices to manage and reduce cybersecurity risks. Many organizations use it in conjunction with NIST 800-171 to strengthen their cybersecurity posture.&lt;br /&gt;
&lt;br /&gt;
The CSF is particularly helpful in assessing and enhancing cybersecurity practices as they relate to the requirements in the CMMC model.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;3. Cybersecurity &amp;amp; Infrastructure Security Agency (CISA) Resources&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
CISA offers a wide range of cybersecurity tools, guidance, and best practices that are relevant for organizations working toward CMMC compliance. Key resources include:&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/resources-tools/services/cyber-resilience-review-crr Cyber Resilience Review (CRR):] A self-assessment tool that helps organizations evaluate their operational resilience and cybersecurity capabilities, including risk management, incident response, and vulnerability management. It’s aligned with cybersecurity best practices that support CMMC objectives.&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/news-events/alerts/2021/06/30/cisas-cset-tool-sets-sights-ransomware-threat Ransomware Readiness Assessment (RRA):] A specialized tool that helps organizations evaluate their readiness against ransomware attacks.&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/resources-tools/resources/cyber-essentials Cyber Essentials:] Provides basic guidelines for small businesses to adopt foundational cybersecurity measures.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;4. Supplier Performance Risk System ([[SPRS]])&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
SPRS is the DoD system where contractors must submit their [[NIST 800-171]] self-assessment scores as part of CMMC compliance. The system allows the DoD to track contractors&#039; cybersecurity posture and use that information to evaluate suppliers when awarding contracts.&lt;br /&gt;
&lt;br /&gt;
Organizations are required to:&lt;br /&gt;
&lt;br /&gt;
*Conduct a NIST 800-171 self-assessment.&lt;br /&gt;
&lt;br /&gt;
*Submit their score to [https://www.sprs.csd.disa.mil/ SPRS], which helps determine their readiness for handling [[CUI]].&lt;br /&gt;
&lt;br /&gt;
*Maintain accurate scores and update them as they improve their security controls.&lt;br /&gt;
Here is the SPRS &#039;[https://www.sprs.csd.disa.mil/pdf/NISTSP800-171QuickEntryGuide.pdf Quick Entry Guide],&#039; developed by DoD.&lt;br /&gt;
&lt;br /&gt;
SPRS also has [https://www.sprs.csd.disa.mil/ training available here].&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;5. DoD Cybersecurity Maturity Model Certification (CMMC) Resources&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The CMMC Accreditation Body ([https://cyberab.org/ Cyber-AB]) provides critical resources related to the CMMC assessment process and compliance. These resources include:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Assessment Guides&#039;&#039;&#039;: Detailed guidance for preparing for a CMMC assessment at different levels (Level 1, Level 2).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Training Resources&#039;&#039;&#039;: Information on Licensed Training Providers ([[LTP]]s), Certified CMMC Professionals ([[CCP]]s), and Certified CMMC Assessors ([[CCA]]s).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;FAQs and Documentation:&#039;&#039;&#039; FAQs, white papers, and other documentation that explain CMMC in detail, as well as guidance on how to comply with specific security practices.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;6. Defense Federal Acquisition Regulation Supplement ([[DFARS]])&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The DFARS 252.204-7012 clause outlines the requirements for protecting CUI and mandates compliance with NIST 800-171. Understanding DFARS is essential for defense contractors since it forms the legal basis for many of the cybersecurity requirements.&lt;br /&gt;
&lt;br /&gt;
DFARS 252.204-7019 and 252.204-7020 require contractors to submit their NIST 800-171 assessment scores to SPRS.&lt;br /&gt;
The DoD uses these DFARS clauses as part of their contracting requirements, and organizations must be familiar with them to ensure compliance.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;7. National Initiative for Cybersecurity Education (NICE)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://www.nist.gov/itl/applied-cybersecurity/nice NICE] is a NIST-led initiative that provides resources for educating and training individuals in cybersecurity. It offers guidelines, frameworks, and resources to help organizations build their cybersecurity workforce, which is crucial for achieving and maintaining CMMC compliance.&lt;br /&gt;
&lt;br /&gt;
NICE also provides a workforce framework that helps organizations understand the skills and roles necessary for cybersecurity, which can guide hiring, training, and team development to meet CMMC requirements.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;8. [https://dodprocurementtoolbox.com/uploads/Cybersecurity_FAQ_update_12_19_22_ba047be683.pdf Department of Defense (DoD) Procurement Toolbox FAQ:]&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
DoD offers a collection of tools and services to help you and your organization manage, enable, and share procurement information across the Department of Defense.&lt;br /&gt;
&lt;br /&gt;
NOTE: This resource may not be updated.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;9. Federal Risk and Authorization Management Program (FedRAMP)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://marketplace.fedramp.gov/products FedRAMP] provides a standardized approach to security assessment, authorization, and monitoring for cloud products and services used by federal agencies, including the DoD. FedRAMP compliance is particularly important for contractors using cloud services to store or process CUI, as it provides government-approved security controls.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;10. National Vulnerability Database (NVD)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The [https://nvd.nist.gov/ NVD] is a U.S. government repository of standards-based vulnerability management data that can be used to evaluate software and systems for known security vulnerabilities. Organizations working on CMMC compliance can use NVD to track vulnerabilities in their software and address them as part of their vulnerability management efforts.&lt;br /&gt;
&lt;br /&gt;
=== 11.NIST Glossary ===&lt;br /&gt;
Looking for the definition for certain terms?  Check [https://csrc.nist.gov/glossary this resource] for help.&lt;br /&gt;
&lt;br /&gt;
== Here are other reliable tools and open source resources to use in your CMMC compliance journey: (use at your own risk!) ==&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/Arudjreis/awesome-security-GRC Awesome Security GRC] - A GitHub repo, knowledge bank for GRC&lt;br /&gt;
* [https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-controls-reference.html AWS Security Hub] controls reference&lt;br /&gt;
* [https://aws.amazon.com/compliance/itar/ AWSGovCloud] - ITAR&lt;br /&gt;
* [https://it.uw.edu/policies-guidelines/compliance/cybersecurity-maturity-model-certification-cmmc/ Basic Systems Security Plan (SSP), with guide, created by University of Washington - click here and scroll to &amp;quot;Resources&amp;quot;]&lt;br /&gt;
* [https://github.com/bitwarden/ Bitwarden] - GitHub&lt;br /&gt;
* [https://downloads.cisecurity.org/#/ Center for Internet Security (CIS) Benchmarks]&lt;br /&gt;
* [https://www.cmmcaudit.org/ CMMC Audit Prep] from Amira Armond: Resources, Scoping Guides, Templates, and More&lt;br /&gt;
* [https://github.com/SecurityBagel/CMMC-Bagel CMMC Bagel - GitHub]&lt;br /&gt;
* [https://cmmc-coa.com/ CMMC Center of Awesomeness] - Documentation, CMMC Kill Chain, Resources, and More&lt;br /&gt;
* [https://defcert.com/wp-content/uploads/2022/02/CMMC-and-Split-Tunnels_Feb2022.pdf CMMC and Split Tunnels] - Solutions for the Cybersecurity Maturity Model Certification Practice SC.L2-3.13.7 &lt;br /&gt;
* [https://github.com/cooeycomrades/cooey-tools Cooey Tools GitHub]&lt;br /&gt;
* [https://public.cyber.mil/stigs/ DoD Cyber Exchange - Security Technical Implementation Guides], DODI 8500.01&lt;br /&gt;
* [https://www.fedramp.gov/2024-02-16-rev-5-additional-documents-released/ FedRAMP - Rev 5 Documents Released]&lt;br /&gt;
* [https://web-gapps.pages.dev/ Gapps] - Open Source Security Governance, Compliance Platform&lt;br /&gt;
* [https://invgate.com/ Invgate] - Service Management and Asset Management solution&lt;br /&gt;
* [https://mha.azurewebsites.net/ Message Header Analyzer Tool]&lt;br /&gt;
* [https://www.cisa.gov/resources-tools/resources/microsoft-expanded-cloud-logs-implementation-playbook Microsoft Expanded Cloud Logs Implementation Playbook (via CISA)]&lt;br /&gt;
* [https://techcommunity.microsoft.com/blog/publicsectorblog/understanding-compliance-between-commercial-government-dod--secret-offerings---f/4225436 Microsoft Tech Blog: &amp;quot;Understanding Compliance Between Commercial, Government, DoD &amp;amp; Secret Offerings&amp;quot;]&lt;br /&gt;
* [https://devolutions.net/remote-desktop-manager/ Remote Desktop Manager]&lt;br /&gt;
* [https://www.dafcio.af.mil/ SAF/CN - Office of the CIO] - Strategy, Objectives, Reference Architecture, and More&lt;br /&gt;
* [https://securityonionsolutions.com/ Security Onion Solutions, LLC] - Open Platform for threat hunting, network security monitoring, and log management.&lt;br /&gt;
* [https://securitytxt.org/ Security Policy Text]&lt;br /&gt;
* [https://start.me/p/OmOrJb/threat-hunting Threat Hunting]&lt;br /&gt;
* [https://wazuh.com/ Wazuh] - Open Source Security Platform, Unified XDR and SIEM Protection&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
For defense contractors working toward CMMC compliance, several government resources and tools can help guide them through the process. Key resources include NIST publications, the Cyber Accreditation Body, SPRS, and guidelines provided by CISA and the DoD. These resources provide essential information for conducting assessments, managing risks, implementing controls, and ensuring compliance with NIST 800-171 and the CMMC framework. They also support organizations in improving their overall cybersecurity posture, which is crucial for handling sensitive DoD information securely.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=130</id>
		<title>Identifying a Certified Third Party Assessing Organization (C3PAO)</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=130"/>
		<updated>2025-03-02T00:49:56Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Added reference and link to C3PAO Stakeholders Forum, plus link to position papers&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It is worth taking some time to find the right C3PAO for an organization.&lt;br /&gt;
&lt;br /&gt;
The community is invited to use this guide and matrix released by the ND-ISAC: [https://ndisac.org/defense-news/nd-isac-releases-c3pao-shopping-guide-for-small-medium-sized-businesses/ C3PAO Shopping Guide], and encouraged to ask questions of a potential assessor to find the right fit for their environment:&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;SPA Categorization&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Some assessors believe that a Security Protection Asset (SPA) includes any systems components that are used in an organizations Systems Security Plan (SSP) for supporting evidence.  Other assessors only identify an SPA a systems that provide protection to components as stated in the NIST 800-171 publication.  Talk to your assessor about what they will expect to see from you in an environment like yours.&lt;br /&gt;
# Ask your C3PAO if they expect systems mentioned in the SSP for the purpose of providing evidence to meeting an assessment objective an example of an SPA?   Do they believe an SPA has to provide a security function such as a SIEM or EDR?  This will impact the level of effort to provide evidence for an assessment.  NIST 800-171 states that “The requirements apply to all components of nonfederal systems and organizations that process, store, and/or transmit CUI, or that provide protection for such components”.  &lt;br /&gt;
# You may simply ask: &amp;quot;Which controls will you assess for SPAs?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Browser used to Access CUI&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Many organizations are accessing and modifying CUI documents through a web browser but have restricted the ability to download and print. Some DOD components also use the browser for accessing Government information. One example is the Navy using Flank Speed. However, when opening a document in a browser it does process information on the endpoint. If that endpoint is not part of the organization information system and controlled then it could be a finding. Some assessors will fail an organization if they are using a browser on an asset that is not controlled others will not. As an alternative there are solutions such as VDI or technologies that provide a pixel representation of a browser that would pass assessment. If you are using a VDI browser application to access CUI, ask your assessor if they would fail the organization.  &lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;CUI at Alternate Worksites - Work From Home (WFH)&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# When CUI is physically at alternate work sites, the CUI still must be physically protected. The physical protections may include locked filing cabinets, safes, or locked briefcases, for example. Some organizations even allow WFH users to print to corporate-issued printers in their home. At some level, the physical security of your home is providing safeguarding for that CUI. Some assessors will assess the WFH environment remotely, relying on policy and training, user interview, or maybe even demonstration on camera by a WFH user. Other assessors will require an in-person site visit to a representative WFH environment. Other assessors won&#039;t assess you if you have CUI at home. If you allow physical CUI at your user&#039;s homes, ask your assessor how they plan to assess your WFH environment, or if they will assess it at all.&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Other more specific questions to consider, depending on your environment:&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Do you believe that Security Protection Data (SPD) is CUI? &lt;br /&gt;
# Is it acceptable to store FIPS 140-2 encrypted CUI in a non-FRME cloud? &lt;br /&gt;
# What do you believe is a Cloud Service Provider and requires FedRAMP? &lt;br /&gt;
# How do you define logical separation? &lt;br /&gt;
# Is OneDrive in scope if local CUI folders are excluded? &lt;br /&gt;
# Which controls do you believe need to be applied to Contractor Risk Managed Assets (CRMA)? &lt;br /&gt;
# Would you accept N/A for a control without a waiver from DoD?&lt;br /&gt;
# What are the risk management practices considered minimum for Specialized Assets (like CNC machines, lab equipment, test equipment)? Do they need to be segmented?&lt;br /&gt;
&lt;br /&gt;
=== C3PAO Stakeholders Forum ===&lt;br /&gt;
Many assessors are involved in a voluntary, informal group that is not associated with the AB.  They post [https://www.c3paoforum.org/position-papers/ position papers] that may also provide insight into how assessments may be run in your environment.  Not all assessors are a part of the group, but the community is well-respected and very active in the industry.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Resources_and_Tools_for_Compliance&amp;diff=129</id>
		<title>Resources and Tools for Compliance</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Resources_and_Tools_for_Compliance&amp;diff=129"/>
		<updated>2025-03-02T00:17:08Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &amp;quot;other tools&amp;quot; list added, started&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To support organizations in achieving CMMC (Cybersecurity Maturity Model Certification) compliance, several resources and tools are available from government sources. These resources help organizations understand the requirements of the CMMC framework, assess their cybersecurity posture, and implement the necessary controls to protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI).&lt;br /&gt;
&lt;br /&gt;
==Here is a list of key government-provided tools and resources that can help with CMMC compliance:==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;1. NIST Special Publications (SP)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf NIST SP 800-171:] This is the foundational document for CMMC, specifically for Level 2 (Advanced) compliance. It outlines the 110 security controls that organizations must implement to protect CUI. The publication provides detailed descriptions of the required security practices across 14 families.&lt;br /&gt;
&lt;br /&gt;
[https://csrc.nist.gov/publications/detail/sp/800-171a/final NIST SP 800-171A:] This document provides assessment procedures for evaluating the effectiveness of security controls described in NIST SP 800-171. It helps organizations conduct self-assessments to ensure they meet the required controls.&lt;br /&gt;
&lt;br /&gt;
[https://csrc.nist.gov/publications/detail/sp/800-172/final NIST SP 800-172:] Provides enhanced security controls for protecting CUI in critical systems. It is useful for organizations aiming for CMMC Level 3 (Expert) or those dealing with high-risk information.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;2. National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The [https://www.nist.gov/cyberframework NIST Cybersecurity Framework] provides a voluntary framework of standards, guidelines, and best practices to manage and reduce cybersecurity risks. Many organizations use it in conjunction with NIST 800-171 to strengthen their cybersecurity posture.&lt;br /&gt;
&lt;br /&gt;
The CSF is particularly helpful in assessing and enhancing cybersecurity practices as they relate to the requirements in the CMMC model.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;3. Cybersecurity &amp;amp; Infrastructure Security Agency (CISA) Resources&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
CISA offers a wide range of cybersecurity tools, guidance, and best practices that are relevant for organizations working toward CMMC compliance. Key resources include:&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/resources-tools/services/cyber-resilience-review-crr Cyber Resilience Review (CRR):] A self-assessment tool that helps organizations evaluate their operational resilience and cybersecurity capabilities, including risk management, incident response, and vulnerability management. It’s aligned with cybersecurity best practices that support CMMC objectives.&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/news-events/alerts/2021/06/30/cisas-cset-tool-sets-sights-ransomware-threat Ransomware Readiness Assessment (RRA):] A specialized tool that helps organizations evaluate their readiness against ransomware attacks.&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/resources-tools/resources/cyber-essentials Cyber Essentials:] Provides basic guidelines for small businesses to adopt foundational cybersecurity measures.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;4. Supplier Performance Risk System ([[SPRS]])&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
SPRS is the DoD system where contractors must submit their [[NIST 800-171]] self-assessment scores as part of CMMC compliance. The system allows the DoD to track contractors&#039; cybersecurity posture and use that information to evaluate suppliers when awarding contracts.&lt;br /&gt;
&lt;br /&gt;
Organizations are required to:&lt;br /&gt;
&lt;br /&gt;
*Conduct a NIST 800-171 self-assessment.&lt;br /&gt;
&lt;br /&gt;
*Submit their score to [https://www.sprs.csd.disa.mil/ SPRS], which helps determine their readiness for handling [[CUI]].&lt;br /&gt;
&lt;br /&gt;
*Maintain accurate scores and update them as they improve their security controls.&lt;br /&gt;
Here is the SPRS &#039;[https://www.sprs.csd.disa.mil/pdf/NISTSP800-171QuickEntryGuide.pdf Quick Entry Guide],&#039; developed by DoD.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;5. DoD Cybersecurity Maturity Model Certification (CMMC) Resources&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The CMMC Accreditation Body ([https://cyberab.org/ Cyber-AB]) provides critical resources related to the CMMC assessment process and compliance. These resources include:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Assessment Guides&#039;&#039;&#039;: Detailed guidance for preparing for a CMMC assessment at different levels (Level 1, Level 2).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Training Resources&#039;&#039;&#039;: Information on Licensed Training Providers ([[LTP]]s), Certified CMMC Professionals ([[CCP]]s), and Certified CMMC Assessors ([[CCA]]s).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;FAQs and Documentation:&#039;&#039;&#039; FAQs, white papers, and other documentation that explain CMMC in detail, as well as guidance on how to comply with specific security practices.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;6. Defense Federal Acquisition Regulation Supplement ([[DFARS]])&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The DFARS 252.204-7012 clause outlines the requirements for protecting CUI and mandates compliance with NIST 800-171. Understanding DFARS is essential for defense contractors since it forms the legal basis for many of the cybersecurity requirements.&lt;br /&gt;
&lt;br /&gt;
DFARS 252.204-7019 and 252.204-7020 require contractors to submit their NIST 800-171 assessment scores to SPRS.&lt;br /&gt;
The DoD uses these DFARS clauses as part of their contracting requirements, and organizations must be familiar with them to ensure compliance.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;7. National Initiative for Cybersecurity Education (NICE)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://www.nist.gov/itl/applied-cybersecurity/nice NICE] is a NIST-led initiative that provides resources for educating and training individuals in cybersecurity. It offers guidelines, frameworks, and resources to help organizations build their cybersecurity workforce, which is crucial for achieving and maintaining CMMC compliance.&lt;br /&gt;
&lt;br /&gt;
NICE also provides a workforce framework that helps organizations understand the skills and roles necessary for cybersecurity, which can guide hiring, training, and team development to meet CMMC requirements.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;8. [https://dodprocurementtoolbox.com/uploads/Cybersecurity_FAQ_update_12_19_22_ba047be683.pdf Department of Defense (DoD) Procurement Toolbox FAQ:]&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
DoD offers a collection of tools and services to help you and your organization manage, enable, and share procurement information across the Department of Defense.&lt;br /&gt;
&lt;br /&gt;
NOTE: This resource may not be updated.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;9. Federal Risk and Authorization Management Program (FedRAMP)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://marketplace.fedramp.gov/products FedRAMP] provides a standardized approach to security assessment, authorization, and monitoring for cloud products and services used by federal agencies, including the DoD. FedRAMP compliance is particularly important for contractors using cloud services to store or process CUI, as it provides government-approved security controls.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;10. National Vulnerability Database (NVD)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The [https://nvd.nist.gov/ NVD] is a U.S. government repository of standards-based vulnerability management data that can be used to evaluate software and systems for known security vulnerabilities. Organizations working on CMMC compliance can use NVD to track vulnerabilities in their software and address them as part of their vulnerability management efforts.&lt;br /&gt;
&lt;br /&gt;
== Here are other reliable tools and open source resources to use in your CMMC compliance journey: ==&lt;br /&gt;
&lt;br /&gt;
* [https://it.uw.edu/policies-guidelines/compliance/cybersecurity-maturity-model-certification-cmmc/ Basic Systems Security Plan (SSP), with guide, created by University of Washington - click here and scroll to &amp;quot;Resources&amp;quot;]&lt;br /&gt;
* [https://www.cmmcaudit.org/ CMMC Audit Prep] from Amira Armond: Resources, Scoping Guides, Templates, and More&lt;br /&gt;
* [https://cmmc-coa.com/ CMMC Center of Awesomeness] - Documentation, CMMC Kill Chain, Resources, and More&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
For defense contractors working toward CMMC compliance, several government resources and tools can help guide them through the process. Key resources include NIST publications, the Cyber Accreditation Body, SPRS, and guidelines provided by CISA and the DoD. These resources provide essential information for conducting assessments, managing risks, implementing controls, and ensuring compliance with NIST 800-171 and the CMMC framework. They also support organizations in improving their overall cybersecurity posture, which is crucial for handling sensitive DoD information securely.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=128</id>
		<title>Identifying a Certified Third Party Assessing Organization (C3PAO)</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=128"/>
		<updated>2025-03-02T00:09:52Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It is worth taking some time to find the right C3PAO for an organization.&lt;br /&gt;
&lt;br /&gt;
The community is invited to use this guide and matrix released by the ND-ISAC: [https://ndisac.org/defense-news/nd-isac-releases-c3pao-shopping-guide-for-small-medium-sized-businesses/ C3PAO Shopping Guide], and encouraged to ask questions of a potential assessor to find the right fit for their environment:&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;SPA Categorization&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Some assessors believe that a Security Protection Asset (SPA) includes any systems components that are used in an organizations Systems Security Plan (SSP) for supporting evidence.  Other assessors only identify an SPA a systems that provide protection to components as stated in the NIST 800-171 publication.  Talk to your assessor about what they will expect to see from you in an environment like yours.&lt;br /&gt;
# Ask your C3PAO if they expect systems mentioned in the SSP for the purpose of providing evidence to meeting an assessment objective an example of an SPA?   Do they believe an SPA has to provide a security function such as a SIEM or EDR?  This will impact the level of effort to provide evidence for an assessment.  NIST 800-171 states that “The requirements apply to all components of nonfederal systems and organizations that process, store, and/or transmit CUI, or that provide protection for such components”.  &lt;br /&gt;
# You may simply ask: &amp;quot;Which controls will you assess for SPAs?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Browser used to Access CUI&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Many organizations are accessing and modifying CUI documents through a web browser but have restricted the ability to download and print. Some DOD components also use the browser for accessing Government information. One example is the Navy using Flank Speed. However, when opening a document in a browser it does process information on the endpoint. If that endpoint is not part of the organization information system and controlled then it could be a finding. Some assessors will fail an organization if they are using a browser on an asset that is not controlled others will not. As an alternative there are solutions such as VDI or technologies that provide a pixel representation of a browser that would pass assessment. If you are using a VDI browser application to access CUI, ask your assessor if they would fail the organization.  &lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;CUI at Alternate Worksites - Work From Home (WFH)&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# When CUI is physically at alternate work sites, the CUI still must be physically protected. The physical protections may include locked filing cabinets, safes, or locked briefcases, for example. Some organizations even allow WFH users to print to corporate-issued printers in their home. At some level, the physical security of your home is providing safeguarding for that CUI. Some assessors will assess the WFH environment remotely, relying on policy and training, user interview, or maybe even demonstration on camera by a WFH user. Other assessors will require an in-person site visit to a representative WFH environment. Other assessors won&#039;t assess you if you have CUI at home. If you allow physical CUI at your user&#039;s homes, ask your assessor how they plan to assess your WFH environment, or if they will assess it at all.&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Other more specific questions to consider, depending on your environment:&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Do you believe that Security Protection Data (SPD) is CUI? &lt;br /&gt;
# Is it acceptable to store FIPS 140-2 encrypted CUI in a non-FRME cloud? &lt;br /&gt;
# What do you believe is a Cloud Service Provider and requires FedRAMP? &lt;br /&gt;
# How do you define logical separation? &lt;br /&gt;
# Is OneDrive in scope if local CUI folders are excluded? &lt;br /&gt;
# Which controls do you believe need to be applied to Contractor Risk Managed Assets (CRMA)? &lt;br /&gt;
# Would you accept N/A for a control without a waiver from DoD?&lt;br /&gt;
# What are the risk management practices considered minimum for Specialized Assets (like CNC machines, lab equipment, test equipment)? Do they need to be segmented?&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=127</id>
		<title>Identifying a Certified Third Party Assessing Organization (C3PAO)</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=127"/>
		<updated>2025-03-02T00:09:25Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It is worth taking some time to find the right C3PAO for an organization.&lt;br /&gt;
&lt;br /&gt;
The community is invited to use this guide and matrix released by the ND-ISAC: [https://ndisac.org/defense-news/nd-isac-releases-c3pao-shopping-guide-for-small-medium-sized-businesses/ C3PAO Shopping Guide], and encouraged to ask questions of a potential assessor to find the right fit for their environment:&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;SPA Categorization&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Some assessors believe that a Security Protection Asset (SPA) includes any systems components that are used in an organizations Systems Security Plan (SSP) for supporting evidence.  Other assessors only identify an SPA a systems that provide protection to components as stated in the NIST 800-171 publication.  Talk to your assessor about what they will expect to see from you in an environment like yours.&lt;br /&gt;
# Ask your C3PAO if they expect systems mentioned in the SSP for the purpose of providing evidence to meeting an assessment objective an example of an SPA?   Do they believe an SPA has to provide a security function such as a SIEM or EDR?  This will impact the level of effort to provide evidence for an assessment.  NIST 800-171 states that “The requirements apply to all components of nonfederal systems and organizations that process, store, and/or transmit CUI, or that provide protection for such components”.  &lt;br /&gt;
# You may simply ask: &amp;quot;Which controls will you assess for SPAs?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Browser used to Access CUI&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Many organizations are accessing and modifying CUI documents through a web browser but have restricted the ability to download and print. Some DOD components also use the browser for accessing Government information. One example is the Navy using Flank Speed. However, when opening a document in a browser it does process information on the endpoint. If that endpoint is not part of the organization information system and controlled then it could be a finding. Some assessors will fail an organization if they are using a browser on an asset that is not controlled others will not. As an alternative there are solutions such as VDI or technologies that provide a pixel representation of a browser that would pass assessment. If you are using a VDI browser application to access CUI, ask your assessor if they would fail the organization.  &lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;CUI at Alternate Worksites - Work From Home (WFH)&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# When CUI is physically at alternate work sites, the CUI still must be physically protected. The physical protections may include locked filing cabinets, safes, or locked briefcases, for example. Some organizations even allow WFH users to print to corporate-issued printers in their home. At some level, the physical security of your home is providing safeguarding for that CUI. Some assessors will assess the WFH environment remotely, relying on policy and training, user interview, or maybe even demonstration on camera by a WFH user. Other assessors will require an in-person site visit to a representative WFH environment. Other assessors won&#039;t assess you if you have CUI at home. If you allow physical CUI at your user&#039;s homes, ask your assessor how they plan to assess your WFH environment, or if they will assess it at all.&lt;br /&gt;
&lt;br /&gt;
==== Other more specific questions to consider, depending on your environment: ====&lt;br /&gt;
&lt;br /&gt;
# Do you believe that Security Protection Data (SPD) is CUI? &lt;br /&gt;
# Is it acceptable to store FIPS 140-2 encrypted CUI in a non-FRME cloud? &lt;br /&gt;
# What do you believe is a Cloud Service Provider and requires FedRAMP? &lt;br /&gt;
# How do you define logical separation? &lt;br /&gt;
# Is OneDrive in scope if local CUI folders are excluded? &lt;br /&gt;
# Which controls do you believe need to be applied to Contractor Risk Managed Assets (CRMA)? &lt;br /&gt;
# Would you accept N/A for a control without a waiver from DoD?&lt;br /&gt;
# What are the risk management practices considered minimum for Specialized Assets (like CNC machines, lab equipment, test equipment)? Do they need to be segmented?&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=126</id>
		<title>Self-Assessment and Certification</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=126"/>
		<updated>2025-03-02T00:07:55Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In the Cybersecurity Maturity Model Certification (CMMC) framework, self-assessments and third-party certifications are two key mechanisms that organizations (especially defense contractors) use to demonstrate compliance with cybersecurity requirements set by the Department of Defense (DoD). These mechanisms are designed to ensure that contractors handling Controlled Unclassified Information ([[CUI]]) and Federal Contract Information ([[FCI]]) have adequate cybersecurity measures in place.&lt;br /&gt;
&lt;br /&gt;
=== 1. CMMC Overview: === &lt;br /&gt;
&lt;br /&gt;
The CMMC framework is a tiered certification model intended to assess the cybersecurity maturity of contractors and suppliers within the Defense Industrial Base ([[DIB]]). It is divided into three levels of increasing cybersecurity rigor, from basic cyber hygiene at Level 1 to advanced protection measures at Level 3. The CMMC ensures that contractors meet specific security standards, particularly those outlined in [[NIST 800-171]] and enhanced security practices beyond that.&lt;br /&gt;
&lt;br /&gt;
=== 2. Self-Assessments in CMMC:=== &lt;br /&gt;
&lt;br /&gt;
At lower CMMC levels, specifically for Level 1 and in some cases Level 2, companies are allowed to conduct self-assessments of their cybersecurity practices and controls. Here’s how it works:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level 1 Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 1 focuses on basic cyber hygiene, covering 17 controls designed to protect Federal Contract Information (FCI), such as using antivirus software, regular password changes, and access controls.&lt;br /&gt;
&lt;br /&gt;
* Self-assessment is allowed for Level 1 contractors. These companies are not required to undergo a third-party audit but must:&lt;br /&gt;
** Complete a self-assessment based on the specified practices.&lt;br /&gt;
** Submit their score (from the self-assessment) to the Supplier Performance Risk System ([[SPRS]]), a DoD-managed system.&lt;br /&gt;
** Self-assessments are valid for up to one year, meaning organizations need to reassess and resubmit their status annually.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Benefits of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Cost-Effective: Self-assessments eliminate the need to hire a third-party assessor, reducing costs for smaller companies with basic cybersecurity needs.&lt;br /&gt;
&lt;br /&gt;
*Simpler Compliance Process: The self-assessment process is less formal and less time-consuming compared to full certification audits.&lt;br /&gt;
&lt;br /&gt;
*Focus on Basic Practices: Since Level 1 focuses on basic cybersecurity practices, the controls are less complex, making it feasible for companies to evaluate themselves.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Risks of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Accuracy and Accountability: Without third-party validation, there is a risk that companies may not fully or accurately assess their compliance, leading to potential vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
*Audit Potential: The DoD can audit self-assessment results at any time, and companies found to be non-compliant may face penalties, including loss of contract eligibility.&lt;br /&gt;
&lt;br /&gt;
=== 3. Third-Party Certification in CMMC: ===&lt;br /&gt;
&lt;br /&gt;
For Level 2 and above, especially for companies handling CUI, third-party assessments are required to validate compliance. Certification levels vary depending on the type of information being protected:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 2 represents a transition between basic and more advanced cybersecurity practices, containing 110 controls (mapped to NIST SP 800-171).&lt;br /&gt;
&lt;br /&gt;
* For contractors handling CUI, third-party certification from a C3PAO (Certified Third-Party Assessor Organization) is required.&lt;br /&gt;
&lt;br /&gt;
* In cases where only Federal Contract Information (FCI) is handled, a self-assessment may suffice, but for CUI, external validation is necessary.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 3 involves increasingly sophisticated cybersecurity requirements to address risks posed by Advanced Persistent Threats (APTs).&lt;br /&gt;
&lt;br /&gt;
* Third-party certification is mandatory, and the [[CMMC-AB]] / The Cyber AB (CMMC Accreditation Body) oversees this process.&lt;br /&gt;
&lt;br /&gt;
* These higher levels of certification require a formal audit by a [[C3PAO]], where the assessor evaluates the organization&#039;s implementation of required cybersecurity controls.&lt;br /&gt;
&lt;br /&gt;
* Certification at this levels is valid for up to three years before re-certification is needed (unless a significant change happens in the environment, in which case, re-certification would be required).&lt;br /&gt;
&lt;br /&gt;
=== 4. Steps in the Certification Process:===&lt;br /&gt;
&lt;br /&gt;
For companies required to undergo third-party certification, the following steps are typically involved:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Preparation:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Companies conduct a gap analysis to determine where their current cybersecurity posture aligns with the CMMC level they are aiming to achieve.&lt;br /&gt;
&lt;br /&gt;
* Many contractors hire consultants or use tools to help them prepare for the formal assessment by ensuring that their processes and systems meet the necessary standards.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Assessment by C3PAO:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified Third-Party Assessor Organizations (C3PAOs) are accredited by the The Cyber AB to conduct assessments.&lt;br /&gt;
* Assessors are guided by the CAP, [https://www.cyberab.org/Portals/0/CMMC%20Assessment%20Process%20v2.0.pdf?ver=fEk1pUK1Fg26fVtopxv_DA%3D%3D found on the Cyber AB&#039;s website here], and [[CAP|discussed on this Wiki here]].&lt;br /&gt;
&lt;br /&gt;
* The C3PAO reviews the organization&#039;s policies, procedures, security controls, and their implementation to ensure compliance with the required CMMC level.&lt;br /&gt;
&lt;br /&gt;
* The assessment may include interviews with personnel, documentation review, and technical testing of the organization&#039;s systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Certification:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* If the organization passes the assessment, the C3PAO submits its findings to The Cyber AB, which then issues the certification.&lt;br /&gt;
&lt;br /&gt;
* Certification is valid for three years at Levels 2-3, after which the organization must undergo re-certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Post-Certification Monitoring:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified companies must continue to maintain and update their cybersecurity controls throughout the certification period.&lt;br /&gt;
&lt;br /&gt;
* If significant changes occur, such as new systems or processes, companies may be subject to interim audits or additional assessments.&lt;br /&gt;
&lt;br /&gt;
==CMMC Levels Summary==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 1 (Basic Cyber Hygiene):&#039;&#039;&#039; Self-assessment allowed, focused on FCI protection.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2 (Intermediate Cyber Hygiene):&#039;&#039;&#039; Transition level, self-assessment may be allowed for FCI; third-party certification required for CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 (Good Cyber Hygiene):&#039;&#039;&#039; Third-party certification required, covers NIST SP 800-171.&lt;br /&gt;
&lt;br /&gt;
==Challenges and Considerations==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cost:&#039;&#039;&#039; Third-party assessments, particularly at higher levels, can be expensive and resource-intensive. This is a challenge for small-to-medium businesses that may struggle with the financial burden.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Choosing the right support&#039;&#039;&#039;: Some organizations might choose to work with consultants, or engage in pre-assessments to gauge their readiness prior to assessment. Choosing knowledgeable and capable organizations to support you is very important. Some guidance on picking this support is below:&lt;br /&gt;
&lt;br /&gt;
* [[Identifying a Managed Service Provider]]&lt;br /&gt;
* [[Identifying a Consultant]]&lt;br /&gt;
* [[Identifying a Certified Third Party Assessing Organization (C3PAO)]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Continuous Compliance:&#039;&#039;&#039; Certification is not a one-time event. Organizations must continuously maintain their cybersecurity posture, as lapses in compliance can lead to a loss of certification or future contract eligibility.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supply Chain Impact:&#039;&#039;&#039; Prime contractors are responsible for ensuring that their entire supply chain, including subcontractors, meet the required CMMC levels, which can make compliance across the supply chain complex.&lt;br /&gt;
&lt;br /&gt;
==CMMC 2.0 Update==&lt;br /&gt;
&lt;br /&gt;
The CMMC 2.0 model, announced in 2021, simplified the original model by reducing the number of levels from five to three. This updated version emphasizes self-assessments for lower-level contractors but retains third-party certification for higher-level contractors handling CUI. It aims to make compliance more streamlined and less burdensome while maintaining strong security requirements.&lt;br /&gt;
&lt;br /&gt;
== Conclusion==&lt;br /&gt;
&lt;br /&gt;
In the CMMC framework, self-assessments allow lower-tier contractors to meet basic security standards at a lower cost, while third-party certification is required for companies handling more sensitive data, such as CUI. This dual approach balances the need for strong cybersecurity controls with the practical realities of cost and resource constraints across the defense industrial base. Organizations aiming to do business with the DoD must understand their specific CMMC requirements and implement the necessary controls to achieve certification or self-assessment compliance.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=125</id>
		<title>Identifying a Certified Third Party Assessing Organization (C3PAO)</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=125"/>
		<updated>2025-03-02T00:02:08Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Added Question per Glenda&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It is worth taking some time to find the right C3PAO for an organization.&lt;br /&gt;
&lt;br /&gt;
The community is invited to use this guide and matrix released by the ND-ISAC: [https://ndisac.org/defense-news/nd-isac-releases-c3pao-shopping-guide-for-small-medium-sized-businesses/ C3PAO Shopping Guide], and encouraged to ask questions of a potential assessor to find the right fit for their environment:&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;SPA Categorization&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Some assessors believe that a Security Protection Asset (SPA) includes any systems components that are used in an organizations Systems Security Plan (SSP) for supporting evidence.  Other assessors only identify an SPA a systems that provide protection to components as stated in the NIST 800-171 publication.  Talk to your assessor about what they will expect to see from you in an environment like yours.&lt;br /&gt;
# Ask your C3PAO if they expect systems mentioned in the SSP for the purpose of providing evidence to meeting an assessment objective an example of an SPA?   Do they believe an SPA has to provide a security function such as a SIEM or EDR?  This will impact the level of effort to provide evidence for an assessment.  NIST 800-171 states that “The requirements apply to all components of nonfederal systems and organizations that process, store, and/or transmit CUI, or that provide protection for such components”.  &lt;br /&gt;
# You may simply ask: &amp;quot;Which controls will you assess for SPAs?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Browser used to Access CUI&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Many organizations are accessing and modifying CUI documents through a web browser but have restricted the ability to download and print. Some DOD components also use the browser for accessing Government information. One example is the Navy using Flank Speed. However, when opening a document in a browser it does process information on the endpoint. If that endpoint is not part of the organization information system and controlled then it could be a finding. Some assessors will fail an organization if they are using a browser on an asset that is not controlled others will not. As an alternative there are solutions such as VDI or technologies that provide a pixel representation of a browser that would pass assessment. If you are using a VDI browser application to access CUI, ask your assessor if they would fail the organization.  &lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;CUI at Alternate Worksites - Work From Home (WFH)&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# When CUI is physically at alternate work sites, the CUI still must be physically protected. The physical protections may include locked filing cabinets, safes, or locked briefcases, for example. Some organizations even allow WFH users to print to corporate-issued printers in their home. At some level, the physical security of your home is providing safeguarding for that CUI. Some assessors will assess the WFH environment remotely, relying on policy and training, user interview, or maybe even demonstration on camera by a WFH user. Other assessors will require an in-person site visit to a representative WFH environment. Other assessors won&#039;t assess you if you have CUI at home. If you allow physical CUI at your user&#039;s homes, ask your assessor how they plan to assess your WFH environment, or if they will assess it at all.&lt;br /&gt;
&lt;br /&gt;
==== Other more specific questions to consider, depending on your environment: ====&lt;br /&gt;
&lt;br /&gt;
# Do you believe that Security Protection Data (SPD) is CUI? &lt;br /&gt;
# Is it acceptable to store FIPS 140-2 encrypted CUI in a non-FRME cloud? &lt;br /&gt;
# What do you believe is a Cloud Service Provider and requires FedRAMP? &lt;br /&gt;
# How do you define logical separation? &lt;br /&gt;
# Is OneDrive in scope if local CUI folders are excluded? &lt;br /&gt;
# Which controls do you believe need to be applied to Contractor Risk Managed Assets (CRMA)? &lt;br /&gt;
# Would you accept N/A for a control without a waiver from DoD?&lt;br /&gt;
# What are the risk management practices considered minimum for Security Assessment? Do they need to be segmented?&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=124</id>
		<title>Identifying a Certified Third Party Assessing Organization (C3PAO)</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=124"/>
		<updated>2025-03-01T21:42:11Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Added an intro, edited to created subheader2s, formatted Terry H.&amp;#039;s additions, and added Glenda&amp;#039;s questions.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It is worth taking some time to find the right C3PAO for an organization.&lt;br /&gt;
&lt;br /&gt;
The community is invited to use this guide and matrix released by the ND-ISAC: [https://ndisac.org/defense-news/nd-isac-releases-c3pao-shopping-guide-for-small-medium-sized-businesses/ C3PAO Shopping Guide], and encouraged to ask questions of a potential assessor to find the right fit for their environment:&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;SPA Categorization&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Some assessors believe that a Security Protection Asset (SPA) includes any systems components that are used in an organizations Systems Security Plan (SSP) for supporting evidence.  Other assessors only identify an SPA a systems that provide protection to components as stated in the NIST 800-171 publication.  Talk to your assessor about what they will expect to see from you in an environment like yours.&lt;br /&gt;
# Ask your C3PAO if they expect systems mentioned in the SSP for the purpose of providing evidence to meeting an assessment objective an example of an SPA?   Do they believe an SPA has to provide a security function such as a SIEM or EDR?  This will impact the level of effort to provide evidence for an assessment.  NIST 800-171 states that “The requirements apply to all components of nonfederal systems and organizations that process, store, and/or transmit CUI, or that provide protection for such components”.  &lt;br /&gt;
# You may simply ask: &amp;quot;Which controls will you assess for SPAs?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Browser used to Access CUI&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# Many organizations are accessing and modifying CUI documents through a web browser but have restricted the ability to download and print. Some DOD components also use the browser for accessing Government information. One example is the Navy using Flank Speed. However, when opening a document in a browser it does process information on the endpoint. If that endpoint is not part of the organization information system and controlled then it could be a finding. Some assessors will fail an organization if they are using a browser on an asset that is not controlled others will not. As an alternative there are solutions such as VDI or technologies that provide a pixel representation of a browser that would pass assessment. If you are using a VDI browser application to access CUI, ask your assessor if they would fail the organization.  &lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;CUI at Alternate Worksites - Work From Home (WFH)&#039;&#039;&#039; ====&lt;br /&gt;
&lt;br /&gt;
# When CUI is physically at alternate work sites, the CUI still must be physically protected. The physical protections may include locked filing cabinets, safes, or locked briefcases, for example. Some organizations even allow WFH users to print to corporate-issued printers in their home. At some level, the physical security of your home is providing safeguarding for that CUI. Some assessors will assess the WFH environment remotely, relying on policy and training, user interview, or maybe even demonstration on camera by a WFH user. Other assessors will require an in-person site visit to a representative WFH environment. Other assessors won&#039;t assess you if you have CUI at home. If you allow physical CUI at your user&#039;s homes, ask your assessor how they plan to assess your WFH environment, or if they will assess it at all.&lt;br /&gt;
&lt;br /&gt;
==== Other more specific questions to consider, depending on your environment: ====&lt;br /&gt;
&lt;br /&gt;
# Do you believe that Security Protection Data (SPD) is CUI? &lt;br /&gt;
# Is it acceptable to store FIPS 140-2 encrypted CUI in a non-FRME cloud? &lt;br /&gt;
# What do you believe is a Cloud Service Provider and requires FedRAMP? &lt;br /&gt;
# How do you define logical separation? &lt;br /&gt;
# Is OneDrive in scope if local CUI folders are excluded? &lt;br /&gt;
# Which controls do you believe need to be applied to Contractor Risk Managed Assets (CRMA)? &lt;br /&gt;
# Would you accept N/A for a control without a waiver from DoD?&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Preferred_Partners&amp;diff=123</id>
		<title>Preferred Partners</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Preferred_Partners&amp;diff=123"/>
		<updated>2025-03-01T20:00:47Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Updated, added Atlantic Digital at the request of Matt&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These are Preferred Partners that our community has used and would recommend.&lt;br /&gt;
&lt;br /&gt;
The community does not guarantee the services on behalf of the vendors, but services have been used (and continue to be used) and preferred by many in our community.&lt;br /&gt;
&lt;br /&gt;
===Assessors, Compliance Consultants &amp;amp; Managed Service Providers (MSP)s===&lt;br /&gt;
&lt;br /&gt;
*[https://www.adiit.com/ Atlantic Digital, Inc.]&lt;br /&gt;
*[https://www.bdo.com/services/bdo-digital/cybersecurity BDO USA]&lt;br /&gt;
&lt;br /&gt;
*[https://www.berylliuminfosec.com/ Beryllium InfoSec Collaboration]&lt;br /&gt;
&lt;br /&gt;
*[https://complianceforge.com/ Compliance Forge]&lt;br /&gt;
&lt;br /&gt;
*[https://defcert.com/ DEFCERT]&lt;br /&gt;
&lt;br /&gt;
*[https://www.kieri.com/ Kieri]&lt;br /&gt;
&lt;br /&gt;
*[https://theneteffect.com/ The Net Effect, LLC]&lt;br /&gt;
*[https://securithink.com/ SecuriThink]&lt;br /&gt;
&lt;br /&gt;
*[https://www.sentinelblue.com/ Sentinel Blue]&lt;br /&gt;
&lt;br /&gt;
===Suppliers, Manufacturers, and More ===&lt;br /&gt;
&lt;br /&gt;
*[https://www.centurum.com/ Centurum]&lt;br /&gt;
&lt;br /&gt;
*[https://win-tech.net/ Win-Tech, Inc.]&lt;br /&gt;
&lt;br /&gt;
===Technology Providers===&lt;br /&gt;
&lt;br /&gt;
*[https://www.microsoft.com/en-us/ Microsoft]&lt;br /&gt;
&lt;br /&gt;
*[https://neqterlabs.com/ NeQter Labs]&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Preferred_Partners&amp;diff=122</id>
		<title>Preferred Partners</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Preferred_Partners&amp;diff=122"/>
		<updated>2025-03-01T04:56:20Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Added SecuriThink per Linda&amp;#039;s request&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;These are Preferred Partners that our community has used and would recommend.&lt;br /&gt;
&lt;br /&gt;
The community does not guarantee the services on behalf of the vendors, but services have been used (and continue to be used) and preferred by many in our community.&lt;br /&gt;
&lt;br /&gt;
===Assessors, Compliance Consultants &amp;amp; Managed Service Providers (MSP)s===&lt;br /&gt;
&lt;br /&gt;
*[https://www.bdo.com/services/bdo-digital/cybersecurity BDO USA]&lt;br /&gt;
&lt;br /&gt;
*[https://www.berylliuminfosec.com/ Beryllium InfoSec Collaboration]&lt;br /&gt;
&lt;br /&gt;
*[https://complianceforge.com/ Compliance Forge]&lt;br /&gt;
&lt;br /&gt;
*[https://defcert.com/ DEFCERT]&lt;br /&gt;
&lt;br /&gt;
*[https://www.kieri.com/ Kieri]&lt;br /&gt;
&lt;br /&gt;
*[https://theneteffect.com/ The Net Effect, LLC]&lt;br /&gt;
*[https://securithink.com/ SecuriThink]&lt;br /&gt;
&lt;br /&gt;
*[https://www.sentinelblue.com/ Sentinel Blue]&lt;br /&gt;
&lt;br /&gt;
===Suppliers, Manufacturers, and More ===&lt;br /&gt;
&lt;br /&gt;
*[https://www.centurum.com/ Centurum]&lt;br /&gt;
&lt;br /&gt;
*[https://win-tech.net/ Win-Tech, Inc.]&lt;br /&gt;
&lt;br /&gt;
===Technology Providers===&lt;br /&gt;
&lt;br /&gt;
*[https://www.microsoft.com/en-us/ Microsoft]&lt;br /&gt;
&lt;br /&gt;
*[https://neqterlabs.com/ NeQter Labs]&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Main_Page&amp;diff=112</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Main_Page&amp;diff=112"/>
		<updated>2024-12-23T22:58:37Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: /* Hot Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Main Wiki Pages ==&lt;br /&gt;
*[[CMMC Overview]]&lt;br /&gt;
*[[Self-Assessment and Certification]] (includes summary of the CAP v2.0!)&lt;br /&gt;
*[[CUI]]&lt;br /&gt;
*[[Resources and Tools for Compliance]]&lt;br /&gt;
*[[Preferred Partners]]&lt;br /&gt;
*[[Training and Education]] - (for CCA/CCP/LTP)&lt;br /&gt;
*[[FAQ|Frequently Asked Questions]]&lt;br /&gt;
&lt;br /&gt;
== Hot Topics ==&lt;br /&gt;
&lt;br /&gt;
* [[32 CFR Part 170 Key Takeaways]] (aka &amp;quot;The CMMC Final Rule&amp;quot;)&lt;br /&gt;
* [[48 CFR Parts 204, 212, 217, and 252 Proposed Rule]]&lt;br /&gt;
* CMMC Assessment Procedure (CAP) v2.0&lt;br /&gt;
* ESPs, MSPs, CSPs&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Main_Page&amp;diff=111</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Main_Page&amp;diff=111"/>
		<updated>2024-12-23T22:56:02Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Main Wiki Pages ==&lt;br /&gt;
*[[CMMC Overview]]&lt;br /&gt;
*[[Self-Assessment and Certification]] (includes summary of the CAP v2.0!)&lt;br /&gt;
*[[CUI]]&lt;br /&gt;
*[[Resources and Tools for Compliance]]&lt;br /&gt;
*[[Preferred Partners]]&lt;br /&gt;
*[[Training and Education]] - (for CCA/CCP/LTP)&lt;br /&gt;
*[[FAQ|Frequently Asked Questions]]&lt;br /&gt;
&lt;br /&gt;
== Hot Topics ==&lt;br /&gt;
&lt;br /&gt;
* [[32 CFR Part 170 Key Takeaways]] (aka &amp;quot;The CMMC Final Rule&amp;quot;)&lt;br /&gt;
* [[48 CFR Parts 204, 212, 217, and 252 Proposed Rule]]&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=CAP&amp;diff=110</id>
		<title>CAP</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=CAP&amp;diff=110"/>
		<updated>2024-12-23T22:55:32Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &amp;quot;CAP&amp;quot; or CMMC Assessment Process v2.0 was released in December 2024.&lt;br /&gt;
&lt;br /&gt;
=== Selecting a C3PAO ===&lt;br /&gt;
&lt;br /&gt;
* If you are an Organization Seeking Certification (OSC) or an Organization Seeking Assessment (OSA), first ensure that the Assessor is part of a CMMC Third-Party Assessment Organization ([[C3PAO]]) listed as &amp;quot;authorized&amp;quot; or &amp;quot;accredited&amp;quot; on the [https://cyberab.org/Catalog#!/c/s/Results/Format/list/Page/1/Size/9/Sort/NameAscending CMMC Marketplace].&lt;br /&gt;
* Then, verify that the C3PAO is in good standing and eligibility to conduct the Level 2 certification assessment. &lt;br /&gt;
&lt;br /&gt;
=== Preparations ===&lt;br /&gt;
&lt;br /&gt;
* If you are an Organization Seeking Certification (OSC) or an Organization Seeking Assessment (OSA), confirm your organizations unique CAGE code(s), as assessments cannot happen without at least one.&lt;br /&gt;
* Establish the assessment scope by defining all in-scope assets, which align with the organization&#039;s System Security Plan (SSP) and [[NIST SP 800-172|NIST SP 800-171]] R2 requirements.  In some cases, this scoping will be part of the quoting process with a C3PAO, but it&#039;s helpful to have a generic idea as to your environment to be assessed in advance of submitting requests for bids to C3PAOs.&lt;br /&gt;
&lt;br /&gt;
=== Conflict of Interest (COI) Management ===&lt;br /&gt;
&lt;br /&gt;
* The C3PAO must manage impartiality and identify potential conflicts of interest (COI) in compliance with ISO/IEC 17020:2012 and the CMMC Code of Professional Conduct.  This includes making sure they are not also a consult to the organization they are to assess.&lt;br /&gt;
* The OSC/OSA and the C3PAO must agree on the Lead Certified Assessor (CCA), ensuring no COIs exist.&lt;br /&gt;
&lt;br /&gt;
=== Contractual Agreements and Assessment Team Composition ===&lt;br /&gt;
&lt;br /&gt;
* Once OSC/OSA has chosen a C3PAO, it signs a contract that includes mutual non-disclosure agreements (NDA)s and any provisions prohibiting any guarantees or outcome-based incentives.&lt;br /&gt;
* Confirm the credentials of the assessment team members.&lt;br /&gt;
&lt;br /&gt;
=== Evidence and Readiness ===&lt;br /&gt;
Once signed up with a C3PAO and scheduled for an assessment, the OSC/OSA should begin to gather the documentation necessary for the assessment (guided by the assessor), and determine what necessary personnel and resources will be required to support the assessment.  Physical or virtual access to evidence and systems may be required, depending on the scope of the assessment.&lt;br /&gt;
&lt;br /&gt;
== Assessment Phases Overview ==&lt;br /&gt;
&lt;br /&gt;
==== Phase 1: Pre-Assessment ====&lt;br /&gt;
&lt;br /&gt;
* The C3PAO reviews your SSP and readiness.&lt;br /&gt;
* Pre-assessment forms are uploaded into the CMMC eMASS system.&lt;br /&gt;
&lt;br /&gt;
==== Phase 2: Security Implementation Assessment ====&lt;br /&gt;
&lt;br /&gt;
* Security requirements are evaluated through examination, interviews, and testing.&lt;br /&gt;
* Sampling methods are applied to achieve depth and coverage.&lt;br /&gt;
&lt;br /&gt;
==== Phase 3: Reporting Results ====&lt;br /&gt;
&lt;br /&gt;
* The C3PAO compiles results and conducts a quality assurance review.&lt;br /&gt;
* Results are presented during an out-brief meeting.&lt;br /&gt;
&lt;br /&gt;
==== Phase 4: Certification and Plans of Action and Milestones (POA&amp;amp;M) Closeout ====&lt;br /&gt;
&lt;br /&gt;
* Certificates of Status are issued based on the results.&lt;br /&gt;
* Any POA&amp;amp;Ms are addressed for conditional certifications.&lt;br /&gt;
&lt;br /&gt;
=== Post-Assessment ===&lt;br /&gt;
&lt;br /&gt;
* The hashed artifacts should be retained as evidence for six years.&lt;br /&gt;
* A different C3PAO may be used for closing out POA&amp;amp;Ms.&lt;br /&gt;
&lt;br /&gt;
=== Appeals Process ===&lt;br /&gt;
An OSC/OSA should understand its rights to appeal an assessment result and understand the process involved with both the C3PAO and The Cyber AB.  This information can be found in the CAP.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=109</id>
		<title>Self-Assessment and Certification</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=109"/>
		<updated>2024-12-23T22:53:26Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Found &amp;quot;CMMB-AB&amp;quot; and replaced with &amp;quot;The Cyber AB&amp;quot; where possible&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In the Cybersecurity Maturity Model Certification (CMMC) framework, self-assessments and third-party certifications are two key mechanisms that organizations (especially defense contractors) use to demonstrate compliance with cybersecurity requirements set by the Department of Defense (DoD). These mechanisms are designed to ensure that contractors handling Controlled Unclassified Information ([[CUI]]) and Federal Contract Information ([[FCI]]) have adequate cybersecurity measures in place.&lt;br /&gt;
&lt;br /&gt;
=== 1. CMMC Overview: === &lt;br /&gt;
&lt;br /&gt;
The CMMC framework is a tiered certification model intended to assess the cybersecurity maturity of contractors and suppliers within the Defense Industrial Base ([[DIB]]). It is divided into five levels of increasing cybersecurity rigor, from basic cyber hygiene at Level 1 to advanced protection measures at Level 5. The CMMC ensures that contractors meet specific security standards, particularly those outlined in [[NIST 800-171]] and enhanced security practices beyond that.&lt;br /&gt;
&lt;br /&gt;
=== 2. Self-Assessments in CMMC:=== &lt;br /&gt;
&lt;br /&gt;
At lower CMMC levels, specifically for Level 1 and in some cases Level 2, companies are allowed to conduct self-assessments of their cybersecurity practices and controls. Here’s how it works:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level 1 Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 1 focuses on basic cyber hygiene, covering 17 controls designed to protect Federal Contract Information (FCI), such as using antivirus software, regular password changes, and access controls.&lt;br /&gt;
&lt;br /&gt;
* Self-assessment is allowed for Level 1 contractors. These companies are not required to undergo a third-party audit but must:&lt;br /&gt;
** Complete a self-assessment based on the specified practices.&lt;br /&gt;
** Submit their score (from the self-assessment) to the Supplier Performance Risk System ([[SPRS]]), a DoD-managed system.&lt;br /&gt;
** Self-assessments are valid for up to one year, meaning organizations need to reassess and resubmit their status annually.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Benefits of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Cost-Effective: Self-assessments eliminate the need to hire a third-party assessor, reducing costs for smaller companies with basic cybersecurity needs.&lt;br /&gt;
&lt;br /&gt;
*Simpler Compliance Process: The self-assessment process is less formal and less time-consuming compared to full certification audits.&lt;br /&gt;
&lt;br /&gt;
*Focus on Basic Practices: Since Level 1 focuses on basic cybersecurity practices, the controls are less complex, making it feasible for companies to evaluate themselves.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Risks of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Accuracy and Accountability: Without third-party validation, there is a risk that companies may not fully or accurately assess their compliance, leading to potential vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
*Audit Potential: The DoD can audit self-assessment results at any time, and companies found to be non-compliant may face penalties, including loss of contract eligibility.&lt;br /&gt;
&lt;br /&gt;
=== 3. Third-Party Certification in CMMC: ===&lt;br /&gt;
&lt;br /&gt;
For Level 2 and above, especially for companies handling CUI, third-party assessments are required to validate compliance. Certification levels vary depending on the type of information being protected:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 2 represents a transition between basic and more advanced cybersecurity practices, containing 110 controls (mapped to NIST SP 800-171).&lt;br /&gt;
&lt;br /&gt;
* For contractors handling CUI, third-party certification from a C3PAO (Certified Third-Party Assessor Organization) is required.&lt;br /&gt;
&lt;br /&gt;
* In cases where only Federal Contract Information (FCI) is handled, a self-assessment may suffice, but for CUI, external validation is necessary.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 and Above:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 3 through Level 5 involve increasingly sophisticated cybersecurity requirements to address risks posed by Advanced Persistent Threats (APTs).&lt;br /&gt;
&lt;br /&gt;
* Third-party certification is mandatory, and the [[CMMC-AB]] / The Cyber AB (CMMC Accreditation Body) oversees this process.&lt;br /&gt;
&lt;br /&gt;
* These higher levels of certification require a formal audit by a [[C3PAO]], where the assessor evaluates the organization&#039;s implementation of required cybersecurity controls.&lt;br /&gt;
&lt;br /&gt;
* Certification at these levels is valid for up to three years before re-certification is needed.&lt;br /&gt;
&lt;br /&gt;
=== 4. Steps in the Certification Process:===&lt;br /&gt;
&lt;br /&gt;
For companies required to undergo third-party certification, the following steps are typically involved:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Preparation:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Companies conduct a gap analysis to determine where their current cybersecurity posture aligns with the CMMC level they are aiming to achieve.&lt;br /&gt;
&lt;br /&gt;
* Many contractors hire consultants or use tools to help them prepare for the formal assessment by ensuring that their processes and systems meet the necessary standards.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Assessment by C3PAO:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified Third-Party Assessor Organizations (C3PAOs) are accredited by the The Cyber AB to conduct assessments.&lt;br /&gt;
* Assessors are guided by the CAP, [https://www.cyberab.org/Portals/0/CMMC%20Assessment%20Process%20v2.0.pdf?ver=fEk1pUK1Fg26fVtopxv_DA%3D%3D found on the Cyber AB&#039;s website here], and [[CAP|discussed on this Wiki here]].&lt;br /&gt;
&lt;br /&gt;
* The C3PAO reviews the organization&#039;s policies, procedures, security controls, and their implementation to ensure compliance with the required CMMC level.&lt;br /&gt;
&lt;br /&gt;
* The assessment may include interviews with personnel, documentation review, and technical testing of the organization&#039;s systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Certification:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* If the organization passes the assessment, the C3PAO submits its findings to The Cyber AB, which then issues the certification.&lt;br /&gt;
&lt;br /&gt;
* Certification is valid for three years at Levels 2-5, after which the organization must undergo re-certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Post-Certification Monitoring:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified companies must continue to maintain and update their cybersecurity controls throughout the certification period.&lt;br /&gt;
&lt;br /&gt;
* If significant changes occur, such as new systems or processes, companies may be subject to interim audits or additional assessments.&lt;br /&gt;
&lt;br /&gt;
==CMMC Levels Summary:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 1 (Basic Cyber Hygiene):&#039;&#039;&#039; Self-assessment allowed, focused on FCI protection.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2 (Intermediate Cyber Hygiene):&#039;&#039;&#039; Transition level, self-assessment may be allowed for FCI; third-party certification required for CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 (Good Cyber Hygiene):&#039;&#039;&#039; Third-party certification required, covers NIST SP 800-171.&lt;br /&gt;
&lt;br /&gt;
==Challenges and Considerations:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cost:&#039;&#039;&#039; Third-party assessments, particularly at higher levels, can be expensive and resource-intensive. This is a challenge for small-to-medium businesses that may struggle with the financial burden.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Continuous Compliance:&#039;&#039;&#039; Certification is not a one-time event. Organizations must continuously maintain their cybersecurity posture, as lapses in compliance can lead to a loss of certification or future contract eligibility.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supply Chain Impact:&#039;&#039;&#039; Prime contractors are responsible for ensuring that their entire supply chain, including subcontractors, meet the required CMMC levels, which can make compliance across the supply chain complex.&lt;br /&gt;
&lt;br /&gt;
==CMMC 2.0 Update:==&lt;br /&gt;
&lt;br /&gt;
The CMMC 2.0 model, announced in 2021, simplified the original model by reducing the number of levels from five to three. This updated version emphasizes self-assessments for lower-level contractors but retains third-party certification for higher-level contractors handling CUI. It aims to make compliance more streamlined and less burdensome while maintaining strong security requirements.&lt;br /&gt;
&lt;br /&gt;
== Conclusion:==&lt;br /&gt;
&lt;br /&gt;
In the CMMC framework, self-assessments allow lower-tier contractors to meet basic security standards at a lower cost, while third-party certification is required for companies handling more sensitive data, such as CUI. This dual approach balances the need for strong cybersecurity controls with the practical realities of cost and resource constraints across the defense industrial base. Organizations aiming to do business with the DoD must understand their specific CMMC requirements and implement the necessary controls to achieve certification or self-assessment compliance.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=CAP&amp;diff=108</id>
		<title>CAP</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=CAP&amp;diff=108"/>
		<updated>2024-12-23T22:50:07Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Completed summary of CAP&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &amp;quot;CAP&amp;quot; or CMMC Assessment Process v2.0 was released in December 2024.&lt;br /&gt;
&lt;br /&gt;
=== Selecting a C3PAO ===&lt;br /&gt;
&lt;br /&gt;
* If you are an Organization Seeking Certification (OSC) or an Organization Seeking Assessment (OSA), first ensure that the Assessor is part of a CMMC Third-Party Assessment Organization (C3PAO) listed as &amp;quot;authorized&amp;quot; or &amp;quot;accredited&amp;quot; on the [https://cyberab.org/Catalog#!/c/s/Results/Format/list/Page/1/Size/9/Sort/NameAscending CMMC Marketplace].&lt;br /&gt;
* Then, verify that the C3PAO is in good standing and eligibility to conduct the Level 2 certification assessment. &lt;br /&gt;
&lt;br /&gt;
=== Preparations ===&lt;br /&gt;
&lt;br /&gt;
* If you are an Organization Seeking Certification (OSC) or an Organization Seeking Assessment (OSA), confirm your organizations unique CAGE code(s), as assessments cannot happen without at least one.&lt;br /&gt;
* Establish the assessment scope by defining all in-scope assets, which align with the organization&#039;s System Security Plan (SSP) and NIST SP 800-171 R2 requirements.  In some cases, this scoping will be part of the quoting process with a C3PAO, but it&#039;s helpful to have a generic idea as to your environment to be assessed in advance of submitting requests for bids to C3PAOs.&lt;br /&gt;
&lt;br /&gt;
=== Conflict of Interest (COI) Management ===&lt;br /&gt;
&lt;br /&gt;
* The C3PAO must manage impartiality and identify potential conflicts of interest (COI) in compliance with ISO/IEC 17020:2012 and the CMMC Code of Professional Conduct.  This includes making sure they are not also a consult to the organization they are to assess.&lt;br /&gt;
* The OSC/OSA and the C3PAO must agree on the Lead Certified Assessor (CCA), ensuring no COIs exist.&lt;br /&gt;
&lt;br /&gt;
=== Contractual Agreements and Assessment Team Composition ===&lt;br /&gt;
&lt;br /&gt;
* Once OSC/OSA has chosen a C3PAO, it signs a contract that includes mutual non-disclosure agreements (NDA)s and any provisions prohibiting any guarantees or outcome-based incentives.&lt;br /&gt;
* Confirm the credentials of the assessment team members.&lt;br /&gt;
&lt;br /&gt;
=== Evidence and Readiness ===&lt;br /&gt;
Once signed up with a C3PAO and scheduled for an assessment, the OSC/OSA should begin to gather the documentation necessary for the assessment (guided by the assessor), and determine what necessary personnel and resources will be required to support the assessment.  Physical or virtual access to evidence and systems may be required, depending on the scope of the assessment.&lt;br /&gt;
&lt;br /&gt;
== Assessment Phases Overview ==&lt;br /&gt;
&lt;br /&gt;
==== Phase 1: Pre-Assessment ====&lt;br /&gt;
&lt;br /&gt;
* The C3PAO reviews your SSP and readiness.&lt;br /&gt;
* Pre-assessment forms are uploaded into the CMMC eMASS system.&lt;br /&gt;
&lt;br /&gt;
==== Phase 2: Security Implementation Assessment ====&lt;br /&gt;
&lt;br /&gt;
* Security requirements are evaluated through examination, interviews, and testing.&lt;br /&gt;
* Sampling methods are applied to achieve depth and coverage.&lt;br /&gt;
&lt;br /&gt;
==== Phase 3: Reporting Results ====&lt;br /&gt;
&lt;br /&gt;
* The C3PAO compiles results and conducts a quality assurance review.&lt;br /&gt;
* Results are presented during an out-brief meeting.&lt;br /&gt;
&lt;br /&gt;
==== Phase 4: Certification and Plans of Action and Milestones (POA&amp;amp;M) Closeout ====&lt;br /&gt;
&lt;br /&gt;
* Certificates of Status are issued based on the results.&lt;br /&gt;
* Any POA&amp;amp;Ms are addressed for conditional certifications.&lt;br /&gt;
&lt;br /&gt;
=== Post-Assessment ===&lt;br /&gt;
&lt;br /&gt;
* The hashed artifacts should be retained as evidence for six years.&lt;br /&gt;
* A different C3PAO may be used for closing out POA&amp;amp;Ms.&lt;br /&gt;
&lt;br /&gt;
=== Appeals Process ===&lt;br /&gt;
An OSC/OSA should understand its rights to appeal an assessment result and understand the process involved with both the C3PAO and The Cyber AB.  This information can be found in the CAP.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=CAP&amp;diff=107</id>
		<title>CAP</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=CAP&amp;diff=107"/>
		<updated>2024-12-23T22:40:37Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Original creation of page, starting to populate information&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &amp;quot;CAP&amp;quot; or CMMC Assessment Process v2.0 was released in December 2024.&lt;br /&gt;
&lt;br /&gt;
=== Selecting a C3PAO ===&lt;br /&gt;
&lt;br /&gt;
* If you are an Organization Seeking Certification (OSC) or an Organization Seeking Assessment (OSA), first ensure that the Assessor is part of a CMMC Third-Party Assessment Organization (C3PAO) listed as &amp;quot;authorized&amp;quot; or &amp;quot;accredited&amp;quot; on the [https://cyberab.org/Catalog#!/c/s/Results/Format/list/Page/1/Size/9/Sort/NameAscending CMMC Marketplace].&lt;br /&gt;
* Then, verify that the C3PAO is in good standing and eligibility to conduct the Level 2 certification assessment. &lt;br /&gt;
&lt;br /&gt;
=== Preparations ===&lt;br /&gt;
&lt;br /&gt;
* If you are an Organization Seeking Certification (OSC) or an Organization Seeking Assessment (OSA), confirm your organizations unique CAGE code(s), as assessments cannot happen without at least one.&lt;br /&gt;
* Establish the assessment scope by defining all in-scope assets, which align with the organization&#039;s System Security Plan (SSP) and NIST SP 800-171 R2 requirements.  In some cases, this scoping will be part of the quoting process with a C3PAO, but it&#039;s helpful to have a generic idea as to your environment to be assessed in advance of submitting requests for bids to C3PAOs.&lt;br /&gt;
&lt;br /&gt;
=== Conflict of Interest (COI) Management ===&lt;br /&gt;
If you are an Organization Seeking Certification (OSC) or an Organization Seeking Assessment (OSA), confirm your organizations unique CAGE code(s), as assessments cannot happen without at least one.&lt;br /&gt;
&lt;br /&gt;
Establish the asse&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=106</id>
		<title>Self-Assessment and Certification</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=106"/>
		<updated>2024-12-23T22:32:05Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Referenced the CAP under section &amp;quot;Steps in the Certification Process&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In the Cybersecurity Maturity Model Certification (CMMC) framework, self-assessments and third-party certifications are two key mechanisms that organizations (especially defense contractors) use to demonstrate compliance with cybersecurity requirements set by the Department of Defense (DoD). These mechanisms are designed to ensure that contractors handling Controlled Unclassified Information ([[CUI]]) and Federal Contract Information ([[FCI]]) have adequate cybersecurity measures in place.&lt;br /&gt;
&lt;br /&gt;
=== 1. CMMC Overview: === &lt;br /&gt;
&lt;br /&gt;
The CMMC framework is a tiered certification model intended to assess the cybersecurity maturity of contractors and suppliers within the Defense Industrial Base ([[DIB]]). It is divided into five levels of increasing cybersecurity rigor, from basic cyber hygiene at Level 1 to advanced protection measures at Level 5. The CMMC ensures that contractors meet specific security standards, particularly those outlined in [[NIST 800-171]] and enhanced security practices beyond that.&lt;br /&gt;
&lt;br /&gt;
=== 2. Self-Assessments in CMMC:=== &lt;br /&gt;
&lt;br /&gt;
At lower CMMC levels, specifically for Level 1 and in some cases Level 2, companies are allowed to conduct self-assessments of their cybersecurity practices and controls. Here’s how it works:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level 1 Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 1 focuses on basic cyber hygiene, covering 17 controls designed to protect Federal Contract Information (FCI), such as using antivirus software, regular password changes, and access controls.&lt;br /&gt;
&lt;br /&gt;
* Self-assessment is allowed for Level 1 contractors. These companies are not required to undergo a third-party audit but must:&lt;br /&gt;
** Complete a self-assessment based on the specified practices.&lt;br /&gt;
** Submit their score (from the self-assessment) to the Supplier Performance Risk System ([[SPRS]]), a DoD-managed system.&lt;br /&gt;
** Self-assessments are valid for up to one year, meaning organizations need to reassess and resubmit their status annually.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Benefits of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Cost-Effective: Self-assessments eliminate the need to hire a third-party assessor, reducing costs for smaller companies with basic cybersecurity needs.&lt;br /&gt;
&lt;br /&gt;
*Simpler Compliance Process: The self-assessment process is less formal and less time-consuming compared to full certification audits.&lt;br /&gt;
&lt;br /&gt;
*Focus on Basic Practices: Since Level 1 focuses on basic cybersecurity practices, the controls are less complex, making it feasible for companies to evaluate themselves.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Risks of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Accuracy and Accountability: Without third-party validation, there is a risk that companies may not fully or accurately assess their compliance, leading to potential vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
*Audit Potential: The DoD can audit self-assessment results at any time, and companies found to be non-compliant may face penalties, including loss of contract eligibility.&lt;br /&gt;
&lt;br /&gt;
=== 3. Third-Party Certification in CMMC: ===&lt;br /&gt;
&lt;br /&gt;
For Level 2 and above, especially for companies handling CUI, third-party assessments are required to validate compliance. Certification levels vary depending on the type of information being protected:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 2 represents a transition between basic and more advanced cybersecurity practices, containing 110 controls (mapped to NIST SP 800-171).&lt;br /&gt;
&lt;br /&gt;
* For contractors handling CUI, third-party certification from a C3PAO (Certified Third-Party Assessor Organization) is required.&lt;br /&gt;
&lt;br /&gt;
* In cases where only Federal Contract Information (FCI) is handled, a self-assessment may suffice, but for CUI, external validation is necessary.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 and Above:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 3 through Level 5 involve increasingly sophisticated cybersecurity requirements to address risks posed by Advanced Persistent Threats (APTs).&lt;br /&gt;
&lt;br /&gt;
* Third-party certification is mandatory, and the [[CMMC-AB]] (CMMC Accreditation Body) oversees this process.&lt;br /&gt;
&lt;br /&gt;
* These higher levels of certification require a formal audit by a [[C3PAO]], where the assessor evaluates the organization&#039;s implementation of required cybersecurity controls.&lt;br /&gt;
&lt;br /&gt;
* Certification at these levels is valid for up to three years before re-certification is needed.&lt;br /&gt;
&lt;br /&gt;
=== 4. Steps in the Certification Process:===&lt;br /&gt;
&lt;br /&gt;
For companies required to undergo third-party certification, the following steps are typically involved:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Preparation:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Companies conduct a gap analysis to determine where their current cybersecurity posture aligns with the CMMC level they are aiming to achieve.&lt;br /&gt;
&lt;br /&gt;
* Many contractors hire consultants or use tools to help them prepare for the formal assessment by ensuring that their processes and systems meet the necessary standards.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Assessment by C3PAO:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified Third-Party Assessor Organizations (C3PAOs) are accredited by the CMMC-AB to conduct assessments.&lt;br /&gt;
* Assessors are guided by the CAP, [https://www.cyberab.org/Portals/0/CMMC%20Assessment%20Process%20v2.0.pdf?ver=fEk1pUK1Fg26fVtopxv_DA%3D%3D found on the Cyber AB&#039;s website here], and [[CAP|discussed on this Wiki here]].&lt;br /&gt;
&lt;br /&gt;
* The C3PAO reviews the organization&#039;s policies, procedures, security controls, and their implementation to ensure compliance with the required CMMC level.&lt;br /&gt;
&lt;br /&gt;
* The assessment may include interviews with personnel, documentation review, and technical testing of the organization&#039;s systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Certification:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* If the organization passes the assessment, the C3PAO submits its findings to the CMMC-AB, which then issues the certification.&lt;br /&gt;
&lt;br /&gt;
* Certification is valid for three years at Levels 2-5, after which the organization must undergo re-certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Post-Certification Monitoring:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified companies must continue to maintain and update their cybersecurity controls throughout the certification period.&lt;br /&gt;
&lt;br /&gt;
* If significant changes occur, such as new systems or processes, companies may be subject to interim audits or additional assessments.&lt;br /&gt;
&lt;br /&gt;
==CMMC Levels Summary:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 1 (Basic Cyber Hygiene):&#039;&#039;&#039; Self-assessment allowed, focused on FCI protection.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2 (Intermediate Cyber Hygiene):&#039;&#039;&#039; Transition level, self-assessment may be allowed for FCI; third-party certification required for CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 (Good Cyber Hygiene):&#039;&#039;&#039; Third-party certification required, covers NIST SP 800-171.&lt;br /&gt;
&lt;br /&gt;
==Challenges and Considerations:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cost:&#039;&#039;&#039; Third-party assessments, particularly at higher levels, can be expensive and resource-intensive. This is a challenge for small-to-medium businesses that may struggle with the financial burden.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Continuous Compliance:&#039;&#039;&#039; Certification is not a one-time event. Organizations must continuously maintain their cybersecurity posture, as lapses in compliance can lead to a loss of certification or future contract eligibility.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supply Chain Impact:&#039;&#039;&#039; Prime contractors are responsible for ensuring that their entire supply chain, including subcontractors, meet the required CMMC levels, which can make compliance across the supply chain complex.&lt;br /&gt;
&lt;br /&gt;
==CMMC 2.0 Update:==&lt;br /&gt;
&lt;br /&gt;
The CMMC 2.0 model, announced in 2021, simplified the original model by reducing the number of levels from five to three. This updated version emphasizes self-assessments for lower-level contractors but retains third-party certification for higher-level contractors handling CUI. It aims to make compliance more streamlined and less burdensome while maintaining strong security requirements.&lt;br /&gt;
&lt;br /&gt;
== Conclusion:==&lt;br /&gt;
&lt;br /&gt;
In the CMMC framework, self-assessments allow lower-tier contractors to meet basic security standards at a lower cost, while third-party certification is required for companies handling more sensitive data, such as CUI. This dual approach balances the need for strong cybersecurity controls with the practical realities of cost and resource constraints across the defense industrial base. Organizations aiming to do business with the DoD must understand their specific CMMC requirements and implement the necessary controls to achieve certification or self-assessment compliance.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=FAQ&amp;diff=104</id>
		<title>FAQ</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=FAQ&amp;diff=104"/>
		<updated>2024-11-03T23:13:43Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The DoD CIO has published their own FAQ here: https://dodcio.defense.gov/CMMC/FAQs/&lt;br /&gt;
&lt;br /&gt;
____________________________________________________&lt;br /&gt;
&lt;br /&gt;
The COE Discord and CMMC Reddit pages are free resources led by the community.  Some of the most common questions are listed below, along with some of the answers offered.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;NOTE: Depending on your own situation, these answers may not work for your environment.  Work with your own compliance or legal team to ensure your implementation and interpretation is acceptable for compliance.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== How much does compliance cost? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== How do I know if I have CUI? ===&lt;br /&gt;
It should be marked by the person who sent it to you.  If it&#039;s not, but if your purchase order or contract flow-down requires you to protect the data as if it were CUI, contact your buyer/customer and ask for clarification.&lt;br /&gt;
&lt;br /&gt;
Have you watched Ryan Bonner&#039;s [https://www.youtube.com/watch?v=IEy-TkmKMt8 video] on this?&lt;br /&gt;
&lt;br /&gt;
=== Are machine files (like CAD models) CUI if I create them as the manufacturer? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== How do I convince management to be compliant? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What can I expect during a CMMC assessment? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== Do all of my Security Protection Assets (SPA)s need to be CMMC-compliant? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== How do I choose a C3PAO? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What options are out there for training to become a CCP/CCA? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What should my System Security Plan (SSP) look like, what should it include, and how long should it be? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What is the difference between Plan of Actions and Milestones (POAM) and Operational Plan of Action (OPOA)? ===&lt;br /&gt;
Items put on POAM must be closed out within 180 days, and must be one of the allowable items.&lt;br /&gt;
&lt;br /&gt;
Items on a OPOA are items that were acceptable before, but are temporarily not compliant for some reason.&lt;br /&gt;
&lt;br /&gt;
=== Is Department of Defense (DoD) the only government agency that requires CMMC? ===&lt;br /&gt;
As of right now (November 2024), yes.  Department of Energy, and others, may call out NIST 800-171, but at this time, DoD is the only government agency that is poised to require third party assessments to confirm compliance.&lt;br /&gt;
&lt;br /&gt;
=== What&#039;s the difference between a Registered Practitioner (RP) and a CCP? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== Are phones in scope of a CMMC audit? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What do I do if I&#039;m sent CUI by my customer? ===&lt;br /&gt;
There&#039;s not much to do when a sender doesn&#039;t follow directions pertinent to your environment.&lt;br /&gt;
&lt;br /&gt;
The best thing is to have policies in place on what to do when it actually happens.&lt;br /&gt;
&lt;br /&gt;
Arguably, small businesses that rely on big primes business have a harder time telling their customers that they&#039;re not following directions, and expecting not to become the problem child as a result.&lt;br /&gt;
&lt;br /&gt;
One small business owner says: &amp;quot;Early on in the process, we sent out a memo to all of our aerospace customers, reminding them of CUI sharing responsibilities per flow down. We did it under the guise that we just wanted them to be aware that we were compliant in our practices.&lt;br /&gt;
&lt;br /&gt;
It allowed us the opportunity to remind them on proper sharing practices.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
If some small businesses had to file a report for every single time CUI was inadvertently shared unencrypted through email, by its big customer who should arguably know better, those small businesses would have no business.&lt;br /&gt;
&lt;br /&gt;
It&#039;s helpful to consider &amp;quot;what is it that we&#039;re trying to do here?&amp;quot; It&#039;s helpful to get grounded here and there.&lt;br /&gt;
&lt;br /&gt;
You can only control your own environment, and your own team. If the best you can do is over communicate and remain hyper aware once data is in your environment, then you&#039;re light years ahead of most.&lt;br /&gt;
&lt;br /&gt;
=== What should I do if my customer requests my SPRS score? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== Do all of my applications have to be FedRAMP to be CMMC compliant? ===&lt;br /&gt;
ANSWERS HERE&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=FAQ&amp;diff=103</id>
		<title>FAQ</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=FAQ&amp;diff=103"/>
		<updated>2024-11-03T23:11:27Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The DoD CIO has published their own FAQ here: https://dodcio.defense.gov/CMMC/FAQs/&lt;br /&gt;
&lt;br /&gt;
____________________________________________________&lt;br /&gt;
&lt;br /&gt;
The COE Discord and CMMC Reddit pages are free resources led by the community.  Some of the most common questions are listed below, along with some of the answers offered.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;NOTE: Depending on your own situation, these answers may not work for your environment.  Work with your own compliance or legal team to ensure your implementation and interpretation is acceptable for compliance.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== How much does compliance cost? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== How do I know if I have CUI? ===&lt;br /&gt;
It should be marked by the person who sent it to you.  If it&#039;s not, but if your purchase order or contract flow-down requires you to protect the data as if it were CUI, contact your buyer/customer and ask for clarification.&lt;br /&gt;
&lt;br /&gt;
Have you watched Ryan Bonner&#039;s [https://www.youtube.com/watch?v=IEy-TkmKMt8 video] on this?&lt;br /&gt;
&lt;br /&gt;
=== Are machine files (like CAD models) CUI if I create them as the manufacturer? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== How do I convince management to be compliant? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What can I expect during a CMMC assessment? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== Do all of my Security Protection Assets (SPA)s need to be CMMC-compliant? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== How do I choose a C3PAO? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What options are out there for training to become a CCP/CCA? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What should my System Security Plan (SSP) look like, what should it include, and how long should it be? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What is the difference between Plan of Actions and Milestones (POAM) and Operational Plan of Action (OPOA)? ===&lt;br /&gt;
Items put on POAM must be closed out within 180 days, and must be one of the allowable items.&lt;br /&gt;
&lt;br /&gt;
Items on a OPOA are items that were acceptable before, but are temporarily not compliant for some reason.&lt;br /&gt;
&lt;br /&gt;
=== Is Department of Defense (DoD) the only government agency that requires CMMC? ===&lt;br /&gt;
As of right now (November 2024), yes.  Department of Energy, and others, may call out NIST 800-171, but at this time, DoD is the only government agency that is poised to require third party assessments to confirm compliance.&lt;br /&gt;
&lt;br /&gt;
=== What&#039;s the difference between a Registered Practitioner (RP) and a CCP? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== Are phones in scope of a CMMC audit? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What do I do if I&#039;m sent CUI by my customer? ===&lt;br /&gt;
There&#039;s not much to do when a sender doesn&#039;t follow directions pertinent to your environment.&lt;br /&gt;
&lt;br /&gt;
The best thing is to have policies in place on what to do when it actually happens.&lt;br /&gt;
&lt;br /&gt;
Arguably, small businesses that rely on big primes business have a harder time telling their customers that they&#039;re not following directions, and expecting not to become the problem child as a result.&lt;br /&gt;
&lt;br /&gt;
One small business owner says: &amp;quot;Early on in the process, we sent out a memo to all of our aerospace customers, reminding them of CUI sharing responsibilities per flow down. We did it under the guise that we just wanted them to be aware that we were compliant in our practices.&lt;br /&gt;
&lt;br /&gt;
It allowed us the opportunity to remind them on proper sharing practices.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
If some small businesses had to file a report for every single time CUI was inadvertently shared unencrypted through email, by its big customer who should arguably know better, those small businesses would have no business.&lt;br /&gt;
&lt;br /&gt;
It&#039;s helpful to consider &amp;quot;what is it that we&#039;re trying to do here?&amp;quot; It&#039;s helpful to get grounded here and there.&lt;br /&gt;
&lt;br /&gt;
You can only control your own environment, and your own team. If the best you can do is over communicate and remain hyper aware once data is in your environment, then you&#039;re light years ahead of most.&lt;br /&gt;
&lt;br /&gt;
=== What should I do if my customer requests my SPRS score? ===&lt;br /&gt;
ANSWERS HERE&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=FAQ&amp;diff=102</id>
		<title>FAQ</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=FAQ&amp;diff=102"/>
		<updated>2024-11-03T22:36:46Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The DoD CIO has published their own FAQ here: https://dodcio.defense.gov/CMMC/FAQs/&lt;br /&gt;
&lt;br /&gt;
____________________________________________________&lt;br /&gt;
&lt;br /&gt;
The COE Discord and CMMC Reddit pages are free resources led by the community.  Some of the most common questions are listed below, along with some of the answers offered.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;NOTE: Depending on your own situation, these answers may not work for your environment.  Work with your own compliance or legal team to ensure your implementation and interpretation is acceptable for compliance.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== How much does compliance cost? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== How do I know if I have CUI? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== Are machine files (like CAD models) CUI if I create them as the manufacturer? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== How do I convince management to be compliant? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What can I expect during a CMMC assessment? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== Do all of my Security Protection Assets (SPA)s need to be CMMC-compliant? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== How do I choose a C3PAO? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What options are out there for training to become a CCP/CCA? ===&lt;br /&gt;
ANSWERS HERE&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Main_Page&amp;diff=98</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Main_Page&amp;diff=98"/>
		<updated>2024-10-12T23:59:59Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: /* Main Wiki Pages */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Main Wiki Pages ==&lt;br /&gt;
*[[CMMC Overview]]&lt;br /&gt;
*[[Self-Assessment and Certification]]&lt;br /&gt;
*[[CUI]]&lt;br /&gt;
*[[Resources and Tools for Compliance]]&lt;br /&gt;
*[[Preferred Partners]]&lt;br /&gt;
*[[Training and Education]] - (for CCA/CCP/LTP)&lt;br /&gt;
*[[FAQ|Frequently Asked Questions]]&lt;br /&gt;
&lt;br /&gt;
== Hot Topics ==&lt;br /&gt;
&lt;br /&gt;
* [[32 CFR Part 170 Key Takeaways]] (aka &amp;quot;The CMMC Final Rule&amp;quot;)&lt;br /&gt;
* [[48 CFR Parts 204, 212, 217, and 252 Proposed Rule]]&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=32_CFR_Part_170_Key_Takeaways&amp;diff=97</id>
		<title>32 CFR Part 170 Key Takeaways</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=32_CFR_Part_170_Key_Takeaways&amp;diff=97"/>
		<updated>2024-10-12T23:00:34Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
On October 15, 2024 32 CFR Part 170 also known as the &amp;quot;CMMC Final Rule&amp;quot; is published to the Federal Register. Effective 60 days later, the CMMC program is in effect.&lt;br /&gt;
&lt;br /&gt;
Below are some key considerations, changes, and details to know with this rule&#039;s publication. This page&#039;s intent is to capture key differences, address changes between the draft rule and final published version.&lt;br /&gt;
&lt;br /&gt;
Link to the PDF: https://public-inspection.federalregister.gov/2024-22905.pdf&lt;br /&gt;
&lt;br /&gt;
Link to the FAR: https://www.federalregister.gov/public-inspection/2024-22905/cybersecurity-maturity-model-certification-program&lt;br /&gt;
&lt;br /&gt;
== Timelines ==&lt;br /&gt;
The Final Rule codifies that Joint Surveillance Voluntary Assessments (JSVAs) will equate to a CMMC Level 2 certification, assuming the organization received a perfect 110 score.&lt;br /&gt;
&lt;br /&gt;
DoD projects a 7-year timeline with a 4-year phased roll-out, initially.&lt;br /&gt;
&lt;br /&gt;
In FY2025, DoD will primarily be requiring self-assessments.  There will be approximately 500 expected third-party certifications required on contracts the first year.&lt;br /&gt;
&lt;br /&gt;
CMMC self-assessments must have a score of 88 or more to &amp;quot;pass&amp;quot; and be compliant.  The Affirming Official (formerly a &amp;quot;Senior Official&amp;quot; will need to affirm that the reporting is accurate.  Affirming this score carries personal criminal fraud risk, and affirmations may be verified in a third party assessment later.&lt;br /&gt;
&lt;br /&gt;
In FY2026, that 500 grows to about 2500 and by FY2027, about 9000.  By FY2028, DoD anticipates 16,000 third-party certifications needed a year.&lt;br /&gt;
&lt;br /&gt;
By the end of the rollout, the numbers projected by DoD are 4,000 self-assessed and 76,000 assessed by a Certified Third Party Assessment Organization (C3PAO).&lt;br /&gt;
&lt;br /&gt;
Many DIB contractors (and sub-contractors) can expect to be required to self-assessment, per contract and purchase order flow-down requirements.&lt;br /&gt;
&lt;br /&gt;
It&#039;s important to note that DoD has the discretion to delay the certification requirement to an option period instead of the condition of &amp;quot;upon contract award.&amp;quot;  While it&#039;s not expected this will be taken advantage of often, this does give DoD flexibility on specific programs that may have unique challenges to supply chain partners becoming certified.&lt;br /&gt;
&lt;br /&gt;
Additionally:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&amp;quot;The CMMC Program’s assessment phase-in plan, as described in § 170.3, does not preclude entities from immediately seeking a CMMC certification assessment prior to the 48 CFR part 204 CMMC Acquisition rule being finalized and the clause being added to new or existing DoD contracts.&amp;quot;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Security Protection Data ==&lt;br /&gt;
When Cloud Service Providers (CSPs) only handle security protection data (SPD), and not CUI, the application or service would be treated like a security protection asset (SPA).&lt;br /&gt;
&lt;br /&gt;
== Security Protection Assets ==&lt;br /&gt;
The Final Rule now suggests that Security Protection Assets (SPAs) will be assessed against security requirements that are &amp;quot;relevant to the capabilities provided.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&amp;quot;If an OSA utilizes an ESP, including a Cloud Service Provider (CSP), that does not process, store, or transmit CUI, the ESP does not require its own CMMC assessment. The services provided by the ESP are assessed as part of the OSC’s assessment as Security Protection Assets.&amp;quot;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== External Service Providers ==&lt;br /&gt;
The Final Rule clarifies the difference between Cloud Service Providers (CSPs), External Service Providers (ESPs), and Managed Service Providers (MSPs).&lt;br /&gt;
&lt;br /&gt;
The requirement for ESPs (regardless of the services it provides) to be CMMC-Certified is no longer a requirement.  However, an MSP, acting as an ESP, may choose to become CMMC-Certified.&lt;br /&gt;
&lt;br /&gt;
The Final Rule suggests that Organizations Seeking Certification (OSC) may inherit controls for External Service Providers (ESPs) in scope when the ESP is CMMC-Certified. &lt;br /&gt;
&lt;br /&gt;
== Managed Service Providers ==&lt;br /&gt;
The Final Rule clarifies that Managed Service Providers (MSPs) do not need FedRAMP Moderate to support an Organization Seeking Certification (OSC).  &lt;br /&gt;
&lt;br /&gt;
The Rule also allows MSPs to get CMMC certified to avoid being re-assessed for every client.&lt;br /&gt;
&lt;br /&gt;
== FedRAMP &amp;amp; Equivalency ==&lt;br /&gt;
FedRAMP Moderate is required when CUI is stored, processed, or transmitted.&lt;br /&gt;
&lt;br /&gt;
There is still some question on the commentary and verbiage, but there is clarity in that a CSP only handles security protection data (SPD), and not CUI, therefore, the application or service would be treated like a security protection asset (SPA).&lt;br /&gt;
&lt;br /&gt;
== Virtual Desktop Infrastructure ==&lt;br /&gt;
Virtual Desktop Infrastructure (VDI) language was added to remove the endpoint from scope if the endpoint is not processing, storing, or transmitting CUI.&lt;br /&gt;
&lt;br /&gt;
Assuming appropriate technical controls prevent data transfer, the &amp;quot;dumb client&amp;quot; (or the computer you open the virtual desktop from) can be kept out of scope.&lt;br /&gt;
&lt;br /&gt;
== Assessors and the Training Community ==&lt;br /&gt;
The minimum number of assessors per third-party assessment has been expanded from 2 to 3.  Additionally, at Lead CMMC Certified Assessor (CCA) is required and at least one other CCA.  This will likely increase the projected costs of assessments.&lt;br /&gt;
&lt;br /&gt;
CMMC instructors are now prohibited to also consult.  Additional clarification is expected on this.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=32_CFR_Part_170_Key_Takeaways&amp;diff=96</id>
		<title>32 CFR Part 170 Key Takeaways</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=32_CFR_Part_170_Key_Takeaways&amp;diff=96"/>
		<updated>2024-10-12T22:41:15Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: /* Security Protection Assets */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
On October 15, 2024 32 CFR Part 170 also known as the &amp;quot;CMMC Final Rule&amp;quot; is published to the Federal Register. Effective 60 days later, the CMMC program is in effect.&lt;br /&gt;
&lt;br /&gt;
Below are some key considerations, changes, and details to know with this rule&#039;s publication. This page&#039;s intent is to capture key differences, address changes between the draft rule and final published version.&lt;br /&gt;
&lt;br /&gt;
Link to the PDF: https://public-inspection.federalregister.gov/2024-22905.pdf&lt;br /&gt;
&lt;br /&gt;
Link to the FAR: https://www.federalregister.gov/public-inspection/2024-22905/cybersecurity-maturity-model-certification-program&lt;br /&gt;
&lt;br /&gt;
== Timelines ==&lt;br /&gt;
The Final Rule codifies that Joint Surveillance Voluntary Assessments (JSVAs) will equate to a CMMC Level 2 certification, assuming the organization received a perfect 110 score.&lt;br /&gt;
&lt;br /&gt;
DoD projects a 7-year timeline with a 4-year phased roll-out, initially.&lt;br /&gt;
&lt;br /&gt;
In FY2025, DoD will primarily be requiring self-assessments.  There will be approximately 500 expected third-party certifications required on contracts.&lt;br /&gt;
&lt;br /&gt;
CMMC self-assessments must have a score of 88 or more to &amp;quot;pass&amp;quot; and be compliant.  The Affirming Official (formerly a &amp;quot;Senior Official&amp;quot; will need to affirm that the reporting is accurate.  Affirming this score carries personal criminal fraud risk, and affirmations may be verified in a third party assessment later.&lt;br /&gt;
&lt;br /&gt;
In FY2026, that 500 grows to about 2500 and by FY2027, about 9000.  By FY2028, DoD anticipates 16,000 third-party certifications needed a year.&lt;br /&gt;
&lt;br /&gt;
By the end of the rollout, the numbers projected by DoD are 4,000 self-assessed and 76,000 assessed by a Certified Third Party Assessment Organization (C3PAO).&lt;br /&gt;
&lt;br /&gt;
Many DIB contractors (and sub-contractors) can expect to be required to self-assessment, per contract and purchase order flow-down requirements.&lt;br /&gt;
&lt;br /&gt;
It&#039;s important to note that DoD has the discretion to delay the certification requirement to an option period instead of the condition of &amp;quot;upon contract award.&amp;quot;  While it&#039;s not expected this will be taken advantage of often, this does give DoD flexibility on specific programs that may have unique challenges to supply chain partners becoming certified.&lt;br /&gt;
&lt;br /&gt;
== Security Protection Data ==&lt;br /&gt;
lorem ipsum&lt;br /&gt;
&lt;br /&gt;
== Security Protection Assets ==&lt;br /&gt;
The Final Rule now suggests that Security Protection Assets (SPAs) will be assessed against security requirements that are &amp;quot;relevant to the capabilities provided.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&amp;quot;If an OSA utilizes an ESP, including a Cloud Service Provider (CSP), that does not process, store, or transmit CUI, the ESP does not require its own CMMC assessment. The services provided by the ESP are assessed as part of the OSC’s assessment as Security Protection Assets.&amp;quot;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== External Service Providers ==&lt;br /&gt;
The Final Rule clarifies the difference between Cloud Service Providers (CSPs), External Service Providers (ESPs), and Managed Service Providers (MSPs).&lt;br /&gt;
&lt;br /&gt;
The requirement for ESPs (regardless of the services it provides) to be CMMC-Certified is no longer a requirement.  However, an MSP, acting as an ESP, may choose to become CMMC-Certified.&lt;br /&gt;
&lt;br /&gt;
The Final Rule suggests that Organizations Seeking Certification (OSC) may inherit controls for External Service Providers (ESPs) in scope when the ESP is CMMC-Certified. &lt;br /&gt;
&lt;br /&gt;
== Managed Service Providers ==&lt;br /&gt;
The Final Rule clarifies that Managed Service Providers (MSPs) do not need FedRAMP Moderate to support an Organization Seeking Certification (OSC).  &lt;br /&gt;
&lt;br /&gt;
The Rule also allows MSPs to get CMMC certified to avoid being re-assessed for every client.&lt;br /&gt;
&lt;br /&gt;
== FedRAMP &amp;amp; Equivalency ==&lt;br /&gt;
FedRAMP Moderate is required when CUI is stored, processed, or transmitted.&lt;br /&gt;
&lt;br /&gt;
There is still some question on the commentary and verbiage, but there is clarity in that a CSP only handles security protection data (SPD), and not CUI, therefore, the application or service would be treated like a security protection asset (SPA).&lt;br /&gt;
&lt;br /&gt;
== Virtual Desktop Infrastructure ==&lt;br /&gt;
Virtual Desktop Infrastructure (VDI) language was added to remove the endpoint from scope if the endpoint is not processing, storing, or transmitting CUI.&lt;br /&gt;
&lt;br /&gt;
Assuming appropriate technical controls prevent data transfer, the &amp;quot;dumb client&amp;quot; (or the computer you open the virtual desktop from) can be kept out of scope.&lt;br /&gt;
&lt;br /&gt;
== Assessors ==&lt;br /&gt;
The minimum number of assessors per third-party assessment has been expanded from 2 to 3.  This will likely increase the projected costs of assessments.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=88</id>
		<title>Self-Assessment and Certification</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=88"/>
		<updated>2024-09-30T17:26:53Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In the Cybersecurity Maturity Model Certification (CMMC) framework, self-assessments and third-party certifications are two key mechanisms that organizations (especially defense contractors) use to demonstrate compliance with cybersecurity requirements set by the Department of Defense (DoD). These mechanisms are designed to ensure that contractors handling Controlled Unclassified Information ([[CUI]]) and Federal Contract Information ([[FCI]]) have adequate cybersecurity measures in place.&lt;br /&gt;
&lt;br /&gt;
=== 1. CMMC Overview: === &lt;br /&gt;
&lt;br /&gt;
The CMMC framework is a tiered certification model intended to assess the cybersecurity maturity of contractors and suppliers within the Defense Industrial Base ([[DIB]]). It is divided into five levels of increasing cybersecurity rigor, from basic cyber hygiene at Level 1 to advanced protection measures at Level 5. The CMMC ensures that contractors meet specific security standards, particularly those outlined in [[NIST 800-171]] and enhanced security practices beyond that.&lt;br /&gt;
&lt;br /&gt;
=== 2. Self-Assessments in CMMC:=== &lt;br /&gt;
&lt;br /&gt;
At lower CMMC levels, specifically for Level 1 and in some cases Level 2, companies are allowed to conduct self-assessments of their cybersecurity practices and controls. Here’s how it works:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level 1 Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 1 focuses on basic cyber hygiene, covering 17 controls designed to protect Federal Contract Information (FCI), such as using antivirus software, regular password changes, and access controls.&lt;br /&gt;
&lt;br /&gt;
* Self-assessment is allowed for Level 1 contractors. These companies are not required to undergo a third-party audit but must:&lt;br /&gt;
** Complete a self-assessment based on the specified practices.&lt;br /&gt;
** Submit their score (from the self-assessment) to the Supplier Performance Risk System ([[SPRS]]), a DoD-managed system.&lt;br /&gt;
** Self-assessments are valid for up to one year, meaning organizations need to reassess and resubmit their status annually.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Benefits of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Cost-Effective: Self-assessments eliminate the need to hire a third-party assessor, reducing costs for smaller companies with basic cybersecurity needs.&lt;br /&gt;
&lt;br /&gt;
*Simpler Compliance Process: The self-assessment process is less formal and less time-consuming compared to full certification audits.&lt;br /&gt;
&lt;br /&gt;
*Focus on Basic Practices: Since Level 1 focuses on basic cybersecurity practices, the controls are less complex, making it feasible for companies to evaluate themselves.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Risks of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Accuracy and Accountability: Without third-party validation, there is a risk that companies may not fully or accurately assess their compliance, leading to potential vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
*Audit Potential: The DoD can audit self-assessment results at any time, and companies found to be non-compliant may face penalties, including loss of contract eligibility.&lt;br /&gt;
&lt;br /&gt;
=== 3. Third-Party Certification in CMMC: ===&lt;br /&gt;
&lt;br /&gt;
For Level 2 and above, especially for companies handling CUI, third-party assessments are required to validate compliance. Certification levels vary depending on the type of information being protected:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 2 represents a transition between basic and more advanced cybersecurity practices, containing 110 controls (mapped to NIST SP 800-171).&lt;br /&gt;
&lt;br /&gt;
* For contractors handling CUI, third-party certification from a C3PAO (Certified Third-Party Assessor Organization) is required.&lt;br /&gt;
&lt;br /&gt;
* In cases where only Federal Contract Information (FCI) is handled, a self-assessment may suffice, but for CUI, external validation is necessary.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 and Above:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 3 through Level 5 involve increasingly sophisticated cybersecurity requirements to address risks posed by Advanced Persistent Threats (APTs).&lt;br /&gt;
&lt;br /&gt;
* Third-party certification is mandatory, and the [[CMMC-AB]] (CMMC Accreditation Body) oversees this process.&lt;br /&gt;
&lt;br /&gt;
* These higher levels of certification require a formal audit by a [[C3PAO]], where the assessor evaluates the organization&#039;s implementation of required cybersecurity controls.&lt;br /&gt;
&lt;br /&gt;
* Certification at these levels is valid for up to three years before re-certification is needed.&lt;br /&gt;
&lt;br /&gt;
=== 4. Steps in the Certification Process:===&lt;br /&gt;
&lt;br /&gt;
For companies required to undergo third-party certification, the following steps are typically involved:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Preparation:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Companies conduct a gap analysis to determine where their current cybersecurity posture aligns with the CMMC level they are aiming to achieve.&lt;br /&gt;
&lt;br /&gt;
* Many contractors hire consultants or use tools to help them prepare for the formal assessment by ensuring that their processes and systems meet the necessary standards.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Assessment by C3PAO:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified Third-Party Assessor Organizations (C3PAOs) are accredited by the CMMC-AB to conduct assessments.&lt;br /&gt;
&lt;br /&gt;
* The C3PAO reviews the organization&#039;s policies, procedures, security controls, and their implementation to ensure compliance with the required CMMC level.&lt;br /&gt;
&lt;br /&gt;
* The assessment may include interviews with personnel, documentation review, and technical testing of the organization&#039;s systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Certification:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* If the organization passes the assessment, the C3PAO submits its findings to the CMMC-AB, which then issues the certification.&lt;br /&gt;
&lt;br /&gt;
* Certification is valid for three years at Levels 2-5, after which the organization must undergo re-certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Post-Certification Monitoring:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified companies must continue to maintain and update their cybersecurity controls throughout the certification period.&lt;br /&gt;
&lt;br /&gt;
* If significant changes occur, such as new systems or processes, companies may be subject to interim audits or additional assessments.&lt;br /&gt;
&lt;br /&gt;
==CMMC Levels Summary:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 1 (Basic Cyber Hygiene):&#039;&#039;&#039; Self-assessment allowed, focused on FCI protection.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2 (Intermediate Cyber Hygiene):&#039;&#039;&#039; Transition level, self-assessment may be allowed for FCI; third-party certification required for CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 (Good Cyber Hygiene):&#039;&#039;&#039; Third-party certification required, covers NIST SP 800-171.&lt;br /&gt;
&lt;br /&gt;
==Challenges and Considerations:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cost:&#039;&#039;&#039; Third-party assessments, particularly at higher levels, can be expensive and resource-intensive. This is a challenge for small-to-medium businesses that may struggle with the financial burden.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Continuous Compliance:&#039;&#039;&#039; Certification is not a one-time event. Organizations must continuously maintain their cybersecurity posture, as lapses in compliance can lead to a loss of certification or future contract eligibility.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supply Chain Impact:&#039;&#039;&#039; Prime contractors are responsible for ensuring that their entire supply chain, including subcontractors, meet the required CMMC levels, which can make compliance across the supply chain complex.&lt;br /&gt;
&lt;br /&gt;
==CMMC 2.0 Update:==&lt;br /&gt;
&lt;br /&gt;
The CMMC 2.0 model, announced in 2021, simplified the original model by reducing the number of levels from five to three. This updated version emphasizes self-assessments for lower-level contractors but retains third-party certification for higher-level contractors handling CUI. It aims to make compliance more streamlined and less burdensome while maintaining strong security requirements.&lt;br /&gt;
&lt;br /&gt;
== Conclusion:==&lt;br /&gt;
&lt;br /&gt;
In the CMMC framework, self-assessments allow lower-tier contractors to meet basic security standards at a lower cost, while third-party certification is required for companies handling more sensitive data, such as CUI. This dual approach balances the need for strong cybersecurity controls with the practical realities of cost and resource constraints across the defense industrial base. Organizations aiming to do business with the DoD must understand their specific CMMC requirements and implement the necessary controls to achieve certification or self-assessment compliance.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=87</id>
		<title>Self-Assessment and Certification</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=87"/>
		<updated>2024-09-30T17:25:36Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In the Cybersecurity Maturity Model Certification (CMMC) framework, self-assessments and third-party certifications are two key mechanisms that organizations (especially defense contractors) use to demonstrate compliance with cybersecurity requirements set by the Department of Defense (DoD). These mechanisms are designed to ensure that contractors handling Controlled Unclassified Information ([[CUI]]) and Federal Contract Information ([[FCI]]) have adequate cybersecurity measures in place.&lt;br /&gt;
&lt;br /&gt;
=== 1. CMMC Overview: === &lt;br /&gt;
&lt;br /&gt;
The CMMC framework is a tiered certification model intended to assess the cybersecurity maturity of contractors and suppliers within the Defense Industrial Base ([[DIB]]). It is divided into five levels of increasing cybersecurity rigor, from basic cyber hygiene at Level 1 to advanced protection measures at Level 5. The CMMC ensures that contractors meet specific security standards, particularly those outlined in [[NIST 800-171]] and enhanced security practices beyond that.&lt;br /&gt;
&lt;br /&gt;
=== 2. Self-Assessments in CMMC:=== &lt;br /&gt;
&lt;br /&gt;
At lower CMMC levels, specifically for Level 1 and in some cases Level 2, companies are allowed to conduct self-assessments of their cybersecurity practices and controls. Here’s how it works:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level 1 Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 1 focuses on basic cyber hygiene, covering 17 controls designed to protect Federal Contract Information (FCI), such as using antivirus software, regular password changes, and access controls.&lt;br /&gt;
&lt;br /&gt;
* Self-assessment is allowed for Level 1 contractors. These companies are not required to undergo a third-party audit but must:&lt;br /&gt;
** Complete a self-assessment based on the specified practices.&lt;br /&gt;
** Submit their score (from the self-assessment) to the Supplier Performance Risk System ([[SPRS]]), a DoD-managed system.&lt;br /&gt;
** Self-assessments are valid for up to one year, meaning organizations need to reassess and resubmit their status annually.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Benefits of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Cost-Effective: Self-assessments eliminate the need to hire a third-party assessor, reducing costs for smaller companies with basic cybersecurity needs.&lt;br /&gt;
&lt;br /&gt;
*Simpler Compliance Process: The self-assessment process is less formal and less time-consuming compared to full certification audits.&lt;br /&gt;
&lt;br /&gt;
*Focus on Basic Practices: Since Level 1 focuses on basic cybersecurity practices, the controls are less complex, making it feasible for companies to evaluate themselves.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Risks of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Accuracy and Accountability: Without third-party validation, there is a risk that companies may not fully or accurately assess their compliance, leading to potential vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
*Audit Potential: The DoD can audit self-assessment results at any time, and companies found to be non-compliant may face penalties, including loss of contract eligibility.&lt;br /&gt;
&lt;br /&gt;
=== 3. Third-Party Certification in CMMC: ===&lt;br /&gt;
&lt;br /&gt;
For Level 2 and above, especially for companies handling CUI, third-party assessments are required to validate compliance. Certification levels vary depending on the type of information being protected:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 2 represents a transition between basic and more advanced cybersecurity practices, containing 110 controls (mapped to NIST SP 800-171).&lt;br /&gt;
&lt;br /&gt;
* For contractors handling CUI, third-party certification from a C3PAO (Certified Third-Party Assessor Organization) is required.&lt;br /&gt;
&lt;br /&gt;
* In cases where only Federal Contract Information (FCI) is handled, a self-assessment may suffice, but for CUI, external validation is necessary.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 and Above:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 3 through Level 5 involve increasingly sophisticated cybersecurity requirements to address risks posed by Advanced Persistent Threats (APTs).&lt;br /&gt;
&lt;br /&gt;
* Third-party certification is mandatory, and the [[CMMC-AB]] (CMMC Accreditation Body) oversees this process.&lt;br /&gt;
&lt;br /&gt;
* These higher levels of certification require a formal audit by a [[C3PAO]], where the assessor evaluates the organization&#039;s implementation of required cybersecurity controls.&lt;br /&gt;
&lt;br /&gt;
* Certification at these levels is valid for up to three years before re-certification is needed.&lt;br /&gt;
&lt;br /&gt;
=== 4. Steps in the Certification Process:===&lt;br /&gt;
&lt;br /&gt;
For companies required to undergo third-party certification, the following steps are typically involved:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Preparation:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Companies conduct a gap analysis to determine where their current cybersecurity posture aligns with the CMMC level they are aiming to achieve.&lt;br /&gt;
&lt;br /&gt;
* Many contractors hire consultants or use tools to help them prepare for the formal assessment by ensuring that their processes and systems meet the necessary standards.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Assessment by C3PAO:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified Third-Party Assessor Organizations (C3PAOs) are accredited by the CMMC-AB to conduct assessments.&lt;br /&gt;
&lt;br /&gt;
* The C3PAO reviews the organization&#039;s policies, procedures, security controls, and their implementation to ensure compliance with the required CMMC level.&lt;br /&gt;
&lt;br /&gt;
* The assessment may include interviews with personnel, documentation review, and technical testing of the organization&#039;s systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Certification:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* If the organization passes the assessment, the C3PAO submits its findings to the CMMC-AB, which then issues the certification.&lt;br /&gt;
&lt;br /&gt;
* Certification is valid for three years at Levels 2-5, after which the organization must undergo re-certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Post-Certification Monitoring:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified companies must continue to maintain and update their cybersecurity controls throughout the certification period.&lt;br /&gt;
&lt;br /&gt;
* If significant changes occur, such as new systems or processes, companies may be subject to interim audits or additional assessments.&lt;br /&gt;
&lt;br /&gt;
===CMMC Levels Summary:===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 1 (Basic Cyber Hygiene):&#039;&#039;&#039; Self-assessment allowed, focused on FCI protection.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2 (Intermediate Cyber Hygiene):&#039;&#039;&#039; Transition level, self-assessment may be allowed for FCI; third-party certification required for CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 (Good Cyber Hygiene):&#039;&#039;&#039; Third-party certification required, covers NIST SP 800-171.&lt;br /&gt;
&lt;br /&gt;
===Challenges and Considerations:===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cost:&#039;&#039;&#039; Third-party assessments, particularly at higher levels, can be expensive and resource-intensive. This is a challenge for small-to-medium businesses that may struggle with the financial burden.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Continuous Compliance:&#039;&#039;&#039; Certification is not a one-time event. Organizations must continuously maintain their cybersecurity posture, as lapses in compliance can lead to a loss of certification or future contract eligibility.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supply Chain Impact:&#039;&#039;&#039; Prime contractors are responsible for ensuring that their entire supply chain, including subcontractors, meet the required CMMC levels, which can make compliance across the supply chain complex.&lt;br /&gt;
&lt;br /&gt;
===CMMC 2.0 Update:===&lt;br /&gt;
&lt;br /&gt;
The CMMC 2.0 model, announced in 2021, simplified the original model by reducing the number of levels from five to three. This updated version emphasizes self-assessments for lower-level contractors but retains third-party certification for higher-level contractors handling CUI. It aims to make compliance more streamlined and less burdensome while maintaining strong security requirements.&lt;br /&gt;
&lt;br /&gt;
=== Conclusion:===&lt;br /&gt;
&lt;br /&gt;
In the CMMC framework, self-assessments allow lower-tier contractors to meet basic security standards at a lower cost, while third-party certification is required for companies handling more sensitive data, such as CUI. This dual approach balances the need for strong cybersecurity controls with the practical realities of cost and resource constraints across the defense industrial base. Organizations aiming to do business with the DoD must understand their specific CMMC requirements and implement the necessary controls to achieve certification or self-assessment compliance.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=78</id>
		<title>Self-Assessment and Certification</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=78"/>
		<updated>2024-09-30T02:22:40Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In the Cybersecurity Maturity Model Certification (CMMC) framework, self-assessments and third-party certifications are two key mechanisms that organizations (especially defense contractors) use to demonstrate compliance with cybersecurity requirements set by the Department of Defense (DoD). These mechanisms are designed to ensure that contractors handling Controlled Unclassified Information ([[CUI]]) and Federal Contract Information ([[FCI]]) have adequate cybersecurity measures in place.&lt;br /&gt;
&lt;br /&gt;
=== 1. CMMC Overview: === &lt;br /&gt;
&lt;br /&gt;
The CMMC framework is a tiered certification model intended to assess the cybersecurity maturity of contractors and suppliers within the Defense Industrial Base ([[DIB]]). It is divided into five levels of increasing cybersecurity rigor, from basic cyber hygiene at Level 1 to advanced protection measures at Level 5. The CMMC ensures that contractors meet specific security standards, particularly those outlined in [[NIST 800-171]] and enhanced security practices beyond that.&lt;br /&gt;
&lt;br /&gt;
=== 2. Self-Assessments in CMMC:=== &lt;br /&gt;
&lt;br /&gt;
At lower CMMC levels, specifically for Level 1 and in some cases Level 2, companies are allowed to conduct self-assessments of their cybersecurity practices and controls. Here’s how it works:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level 1 Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 1 focuses on basic cyber hygiene, covering 17 controls designed to protect Federal Contract Information (FCI), such as using antivirus software, regular password changes, and access controls.&lt;br /&gt;
&lt;br /&gt;
* Self-assessment is allowed for Level 1 contractors. These companies are not required to undergo a third-party audit but must:&lt;br /&gt;
** Complete a self-assessment based on the specified practices.&lt;br /&gt;
** Submit their score (from the self-assessment) to the Supplier Performance Risk System ([[SPRS]]), a DoD-managed system.&lt;br /&gt;
** Self-assessments are valid for up to one year, meaning organizations need to reassess and resubmit their status annually.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Benefits of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Cost-Effective: Self-assessments eliminate the need to hire a third-party assessor, reducing costs for smaller companies with basic cybersecurity needs.&lt;br /&gt;
&lt;br /&gt;
*Simpler Compliance Process: The self-assessment process is less formal and less time-consuming compared to full certification audits.&lt;br /&gt;
&lt;br /&gt;
*Focus on Basic Practices: Since Level 1 focuses on basic cybersecurity practices, the controls are less complex, making it feasible for companies to evaluate themselves.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Risks of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Accuracy and Accountability: Without third-party validation, there is a risk that companies may not fully or accurately assess their compliance, leading to potential vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
*Audit Potential: The DoD can audit self-assessment results at any time, and companies found to be non-compliant may face penalties, including loss of contract eligibility.&lt;br /&gt;
&lt;br /&gt;
=== 3. Third-Party Certification in CMMC: ===&lt;br /&gt;
&lt;br /&gt;
For Level 2 and above, especially for companies handling CUI, third-party assessments are required to validate compliance. Certification levels vary depending on the type of information being protected:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 2 represents a transition between basic and more advanced cybersecurity practices, containing 110 controls (mapped to NIST SP 800-171).&lt;br /&gt;
&lt;br /&gt;
* For contractors handling CUI, third-party certification from a C3PAO (Certified Third-Party Assessor Organization) is required.&lt;br /&gt;
&lt;br /&gt;
* In cases where only Federal Contract Information (FCI) is handled, a self-assessment may suffice, but for CUI, external validation is necessary.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 and Above:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 3 through Level 5 involve increasingly sophisticated cybersecurity requirements to address risks posed by Advanced Persistent Threats (APTs).&lt;br /&gt;
&lt;br /&gt;
* Third-party certification is mandatory, and the [[CMMC-AB]] (CMMC Accreditation Body) oversees this process.&lt;br /&gt;
&lt;br /&gt;
* These higher levels of certification require a formal audit by a [[C3PAO]], where the assessor evaluates the organization&#039;s implementation of required cybersecurity controls.&lt;br /&gt;
&lt;br /&gt;
* Certification at these levels is valid for up to three years before re-certification is needed.&lt;br /&gt;
&lt;br /&gt;
=== 4. Steps in the Certification Process:===&lt;br /&gt;
&lt;br /&gt;
For companies required to undergo third-party certification, the following steps are typically involved:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Preparation:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Companies conduct a gap analysis to determine where their current cybersecurity posture aligns with the CMMC level they are aiming to achieve.&lt;br /&gt;
&lt;br /&gt;
* Many contractors hire consultants or use tools to help them prepare for the formal assessment by ensuring that their processes and systems meet the necessary standards.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Assessment by C3PAO:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified Third-Party Assessor Organizations (C3PAOs) are accredited by the CMMC-AB to conduct assessments.&lt;br /&gt;
&lt;br /&gt;
* The C3PAO reviews the organization&#039;s policies, procedures, security controls, and their implementation to ensure compliance with the required CMMC level.&lt;br /&gt;
&lt;br /&gt;
* The assessment may include interviews with personnel, documentation review, and technical testing of the organization&#039;s systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Certification:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* If the organization passes the assessment, the C3PAO submits its findings to the CMMC-AB, which then issues the certification.&lt;br /&gt;
&lt;br /&gt;
* Certification is valid for three years at Levels 2-5, after which the organization must undergo re-certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Post-Certification Monitoring:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified companies must continue to maintain and update their cybersecurity controls throughout the certification period.&lt;br /&gt;
&lt;br /&gt;
* If significant changes occur, such as new systems or processes, companies may be subject to interim audits or additional assessments.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;5. CMMC Levels Summary:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 1 (Basic Cyber Hygiene):&#039;&#039;&#039; Self-assessment allowed, focused on FCI protection.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2 (Intermediate Cyber Hygiene):&#039;&#039;&#039; Transition level, self-assessment may be allowed for FCI; third-party certification required for CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 (Good Cyber Hygiene):&#039;&#039;&#039; Third-party certification required, covers NIST SP 800-171.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;6. Challenges and Considerations:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cost:&#039;&#039;&#039; Third-party assessments, particularly at higher levels, can be expensive and resource-intensive. This is a challenge for small-to-medium businesses that may struggle with the financial burden.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Continuous Compliance:&#039;&#039;&#039; Certification is not a one-time event. Organizations must continuously maintain their cybersecurity posture, as lapses in compliance can lead to a loss of certification or future contract eligibility.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supply Chain Impact:&#039;&#039;&#039; Prime contractors are responsible for ensuring that their entire supply chain, including subcontractors, meet the required CMMC levels, which can make compliance across the supply chain complex.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;7. CMMC 2.0 Update:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The CMMC 2.0 model, announced in 2021, simplified the original model by reducing the number of levels from five to three. This updated version emphasizes self-assessments for lower-level contractors but retains third-party certification for higher-level contractors handling CUI. It aims to make compliance more streamlined and less burdensome while maintaining strong security requirements.&lt;br /&gt;
&lt;br /&gt;
=== Conclusion:===&lt;br /&gt;
&lt;br /&gt;
In the CMMC framework, self-assessments allow lower-tier contractors to meet basic security standards at a lower cost, while third-party certification is required for companies handling more sensitive data, such as CUI. This dual approach balances the need for strong cybersecurity controls with the practical realities of cost and resource constraints across the defense industrial base. Organizations aiming to do business with the DoD must understand their specific CMMC requirements and implement the necessary controls to achieve certification or self-assessment compliance.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=CCP&amp;diff=77</id>
		<title>CCP</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=CCP&amp;diff=77"/>
		<updated>2024-09-30T02:21:29Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;A Certified CMMC Professional (CCP) is an entry-level certification within the Cybersecurity Maturity Model Certification (CMMC) ecosystem. Individuals who earn the CCP designation have the foundational knowledge of the CMMC framework and are equipped to assist organizations in understanding, preparing for, and achieving CMMC compliance. CCPs are often involved in helping defense contractors implement the necessary cybersecurity practices required to protect Controlled U...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A Certified CMMC Professional (CCP) is an entry-level certification within the Cybersecurity Maturity Model Certification (CMMC) ecosystem. Individuals who earn the CCP designation have the foundational knowledge of the CMMC framework and are equipped to assist organizations in understanding, preparing for, and achieving CMMC compliance. CCPs are often involved in helping defense contractors implement the necessary cybersecurity practices required to protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI), particularly in the context of CMMC 2.0.&lt;br /&gt;
&lt;br /&gt;
==Key Responsibilities of a CCP:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Advising Organizations on CMMC Compliance:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A CCP helps organizations navigate the CMMC framework by advising on cybersecurity best practices, compliance requirements, and how to meet the specific controls outlined in the CMMC model, particularly at Level 1 (Foundational) and Level 2 (Advanced).&lt;br /&gt;
&lt;br /&gt;
They help organizations implement the NIST 800-171 security controls that are essential for protecting CUI, especially in preparation for a formal assessment by a Certified Third-Party Assessment Organization (C3PAO).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Supporting CMMC Preparation:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCPs assist organizations in preparing for CMMC certification by conducting pre-assessments and gap analyses to determine where their cybersecurity practices fall short of CMMC requirements.&lt;br /&gt;
&lt;br /&gt;
They help develop Plans of Action and Milestones (POAMs) to remediate any identified deficiencies, ensuring the organization is fully prepared for a formal CMMC assessment.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Working with Certified Assessors (CCAs):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
While CCPs are not authorized to lead formal CMMC assessments themselves, they often work closely with Certified CMMC Assessors (CCAs). A CCP may support an organization as it undergoes a third-party assessment by a CCA, helping ensure that all necessary documentation and practices are in place.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - Educating and Training:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A CCP may also play a role in educating and training employees within an organization on cybersecurity practices that align with CMMC requirements. This might include helping the organization develop policies and procedures, implement training programs, or raise awareness about the importance of security controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;5 - Ensuring Compliance with CMMC Levels:&lt;br /&gt;
&lt;br /&gt;
A CCP helps organizations determine which level of CMMC certification they need, based on the type of contracts they handle and the information they process (FCI or CUI). They then assist in implementing the appropriate security controls and documentation to meet that level.&lt;br /&gt;
&lt;br /&gt;
* Level 1 (Foundational): Basic cyber hygiene practices to protect Federal Contract Information (FCI).&lt;br /&gt;
&lt;br /&gt;
* Level 2 (Advanced): Compliance with the 110 security controls outlined in NIST 800-171 to protect Controlled Unclassified Information (CUI).&lt;br /&gt;
&lt;br /&gt;
==CMMC Levels CCPs Work With:==&lt;br /&gt;
&lt;br /&gt;
* CMMC Level 1 (Foundational):&lt;br /&gt;
CCPs help organizations implement the 17 basic cybersecurity practices required for Level 1. These practices focus on basic cyber hygiene to protect FCI and include controls related to access control, system monitoring, and the management of system configurations.&lt;br /&gt;
&lt;br /&gt;
* CMMC Level 2 (Advanced):&lt;br /&gt;
CCPs assist organizations in meeting the more advanced requirements of Level 2, which aligns with the 110 security controls in NIST SP 800-171. This level is critical for contractors that handle CUI and involves more comprehensive cybersecurity practices such as encryption, multifactor authentication, incident response, and continuous monitoring.&lt;br /&gt;
&lt;br /&gt;
==Path to Becoming a CCP:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Prerequisites:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To become a CCP, individuals should have a background in cybersecurity, IT, or compliance. While there are no strict prerequisites, it is beneficial to have experience working with cybersecurity frameworks (such as NIST SP 800-171, ISO 27001, or the NIST Cybersecurity Framework) and some knowledge of the defense industry or federal contracting.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Training through Licensed Training Providers (LTPs):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Prospective CCPs must complete formal training provided by Licensed Training Providers (LTPs). LTPs are organizations authorized by the Cyber-AB to deliver official CMMC training. This training provides foundational knowledge of the CMMC framework, the assessment process, and how to support organizations in meeting cybersecurity requirements.&lt;br /&gt;
&lt;br /&gt;
The training covers essential topics such as:&lt;br /&gt;
&lt;br /&gt;
* The CMMC model and certification process.&lt;br /&gt;
* Cybersecurity practices and controls required at each CMMC level.&lt;br /&gt;
* NIST SP 800-171 controls and how they are applied within the CMMC framework.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Certification Exam:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
After completing the required training, individuals must pass a certification exam administered by the Cyber-AB. This exam tests the candidate’s understanding of the CMMC framework, the specific practices and processes required for certification, and how to guide organizations through the compliance process.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - Certification Maintenance:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCPs must renew their certification periodically, ensuring they remain up to date with any changes to the CMMC framework or cybersecurity best practices. This may involve ongoing education or completing additional training modules as the CMMC ecosystem evolves.&lt;br /&gt;
&lt;br /&gt;
==Career Opportunities for CCPs:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - CMMC Consultants:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Many CCPs work as consultants, providing advisory services to multiple defense contractors that need to achieve CMMC certification. They help these contractors implement the necessary security controls, prepare for formal assessments, and maintain compliance with DoD cybersecurity requirements.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - In-House Compliance Specialists:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCPs may also work within defense contractors or subcontractors as in-house compliance specialists. In this role, they help ensure that their organization meets the required CMMC standards and maintain cybersecurity best practices across the company.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Working with Certified Third-Party Assessment Organizations (C3PAOs):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCPs may support C3PAOs by assisting Certified CMMC Assessors (CCAs) during formal assessments. They can help with pre-assessment activities, documentation review, and preparing organizations for the final assessment process.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - Cybersecurity Roles in the Defense Industrial Base (DIB):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCPs are in demand within the Defense Industrial Base (DIB) as more companies seek certification to remain eligible for DoD contracts. Organizations handling CUI or FCI must have personnel with the skills to implement and maintain the necessary cybersecurity measures, making CCPs valuable assets.&lt;br /&gt;
&lt;br /&gt;
==Benefits of Becoming a CCP:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - In-Demand Skills:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As the Department of Defense (DoD) continues to implement CMMC across its supply chain, there is a growing demand for individuals with expertise in CMMC compliance. CCP certification demonstrates foundational knowledge of the CMMC model, positioning individuals to take advantage of these opportunities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Pathway to CMMC Assessor (CCA):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Becoming a CCP is often a stepping stone toward more advanced certifications within the CMMC ecosystem, such as becoming a Certified CMMC Assessor (CCA). For individuals interested in conducting formal assessments, starting as a CCP can provide valuable experience and understanding of the framework.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Contributing to National Security:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
By helping organizations comply with the CMMC framework, CCPs play a direct role in strengthening the cybersecurity posture of the defense supply chain, which is essential for protecting sensitive national security information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - Flexible Career Options:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Whether working as an independent consultant, an in-house compliance professional, or part of a C3PAO, CCPs have a wide range of career options in the growing field of cybersecurity compliance.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
A Certified CMMC Professional (CCP) is an entry-level certification in the CMMC ecosystem designed for individuals who help defense contractors and subcontractors navigate the CMMC compliance process. CCPs are trained in the fundamentals of the CMMC framework, NIST SP 800-171, and cybersecurity best practices. They assist organizations in preparing for CMMC certification by conducting pre-assessments, identifying gaps in cybersecurity practices, and helping implement necessary controls. CCPs are vital in ensuring that organizations are ready for formal assessments and compliant with DoD requirements, particularly for handling Controlled Unclassified Information (CUI) and Federal Contract Information (FCI).&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=CCA&amp;diff=76</id>
		<title>CCA</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=CCA&amp;diff=76"/>
		<updated>2024-09-30T02:15:11Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;A Certified CMMC Assessor (CCA) is an individual who has been trained, certified, and authorized to conduct official Cybersecurity Maturity Model Certification (CMMC) assessments on behalf of a Certified Third-Party Assessment Organization (C3PAO). CCAs play a critical role in the CMMC ecosystem by evaluating defense contractors’ compliance with the CMMC framework to ensure they meet the required cybersecurity standards necessary to handle Controlled Unclassified Infor...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A Certified CMMC Assessor (CCA) is an individual who has been trained, certified, and authorized to conduct official Cybersecurity Maturity Model Certification (CMMC) assessments on behalf of a Certified Third-Party Assessment Organization (C3PAO). CCAs play a critical role in the CMMC ecosystem by evaluating defense contractors’ compliance with the CMMC framework to ensure they meet the required cybersecurity standards necessary to handle Controlled Unclassified Information (CUI) or Federal Contract Information (FCI).&lt;br /&gt;
&lt;br /&gt;
==Key Responsibilities of a CCA:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Conducting CMMC Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The primary role of a CCA is to perform formal CMMC assessments on organizations seeking certification. These assessments are done in alignment with the CMMC 2.0 model, which includes evaluating contractors&#039; cybersecurity practices at Level 1 (Foundational), Level 2 (Advanced), or Level 3 (Expert).&lt;br /&gt;
&lt;br /&gt;
CCAs assess whether the organization has implemented the necessary security controls, practices, and processes required by the CMMC framework, particularly those aligned with NIST SP 800-171 for Level 2.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Evaluating and Validating Security Controls:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCAs are responsible for reviewing the organization&#039;s security controls to ensure they are effectively protecting sensitive information, such as CUI. This includes examining documentation, interviewing personnel, testing systems, and observing the actual implementation of security practices.&lt;br /&gt;
&lt;br /&gt;
The assessment covers areas such as access control, incident response, encryption, and risk management. The assessor ensures that the organization meets all the requirements for the specific CMMC level they are seeking.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Providing Assessment Reports:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
After conducting an assessment, CCAs prepare detailed reports outlining their findings. These reports include whether the organization meets the required CMMC level, any deficiencies identified, and recommendations for remediation if necessary.&lt;br /&gt;
&lt;br /&gt;
The assessment report is submitted to the C3PAO for review and is ultimately used by the Cyber-AB to determine whether the organization will be awarded CMMC certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - Maintaining Independence and Objectivity:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCAs must maintain independence from the organizations they assess to ensure the objectivity of their evaluations. They cannot provide consulting services to the organizations they assess to avoid conflicts of interest.&lt;br /&gt;
&lt;br /&gt;
This independence ensures that assessments are unbiased and conducted according to the standardized processes defined by the Cyber-AB and the Department of Defense (DoD).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;5 - Updating and Maintaining Certification:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCAs are required to stay up to date with any changes in the CMMC model, regulations, and cybersecurity standards. They must also renew their certification periodically to ensure they maintain the qualifications and skills needed to conduct assessments.&lt;br /&gt;
&lt;br /&gt;
==CCA Certification Process:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Prerequisites:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Individuals seeking to become a CCA must meet specific prerequisites, such as having prior experience in cybersecurity, risk management, or information technology. The level of experience required depends on the level of CCA certification (e.g., Level 1, 2, or 3).&lt;br /&gt;
&lt;br /&gt;
Relevant certifications, such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM), can enhance a candidate’s qualifications for becoming a CCA.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Training:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Prospective CCAs must complete formal training provided by Licensed Training Providers (LTPs). This training covers the CMMC framework, NIST 800-171 controls, the assessment process, and the procedures for evaluating organizations against CMMC standards.&lt;br /&gt;
The training prepares candidates to understand the full scope of CMMC requirements and equips them with the skills needed to perform assessments.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Certification Exam:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
After completing the required training, candidates must pass a certification exam administered by the Cyber-AB. The exam tests their knowledge of the CMMC model, assessment methodologies, and the specific security controls they will be responsible for evaluating.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - Affiliation with a C3PAO:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCAs must be affiliated with an accredited Certified Third-Party Assessment Organization (C3PAO) to conduct assessments. C3PAOs are responsible for managing the assessment process and submitting the final reports to the Cyber-AB.&lt;br /&gt;
CCAs can work with one or more C3PAOs, depending on their role and the demand for assessments within the CMMC ecosystem.&lt;br /&gt;
&lt;br /&gt;
==Levels of CCA Certification:==&lt;br /&gt;
&lt;br /&gt;
There are different levels of CCA certification based on the complexity of the assessments and the level of CMMC compliance being evaluated:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CCA Level 1:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Focuses on CMMC Level 1 (Foundational) assessments, which cover basic cyber hygiene practices for handling Federal Contract Information (FCI). Level 1 CCAs assess the implementation of 17 basic security practices.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CCA Level 2:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Focuses on CMMC Level 2 (Advanced), which aligns with the 110 security controls outlined in NIST SP 800-171. This level is required for contractors handling Controlled Unclassified Information (CUI) and involves more in-depth assessments.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CCA Level 3:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Focuses on CMMC Level 3 (Expert), which is the most advanced level of certification. It involves assessing organizations that need to demonstrate highly advanced cybersecurity practices to protect CUI from sophisticated adversaries.&lt;br /&gt;
&lt;br /&gt;
==Benefits of Becoming a CCA:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - High Demand in the Defense Industrial Base (DIB):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As the Department of Defense (DoD) implements CMMC 2.0 across the DIB, there is significant demand for qualified assessors to evaluate contractors for compliance. Becoming a CCA positions individuals to play a crucial role in helping contractors achieve certification and continue doing business with the DoD.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Career Advancement:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCAs are recognized experts in cybersecurity and compliance. Achieving CCA certification demonstrates a high level of competence and expertise, opening up opportunities for career advancement in the cybersecurity field, particularly within government contracting and the defense sector.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Contribution to National Security:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCAs contribute to the security of the U.S. defense supply chain by ensuring that contractors meet the stringent cybersecurity requirements necessary to protect sensitive information from cyber threats and adversaries.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - Competitive Advantage:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Certified CCAs have a competitive advantage in the marketplace, especially as the need for CMMC certification increases across the DoD supply chain. Organizations that employ or partner with CCAs are more likely to succeed in navigating the CMMC process.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
A Certified CMMC Assessor (CCA) is a highly trained professional responsible for conducting official CMMC assessments of defense contractors to determine their compliance with cybersecurity requirements under the CMMC 2.0 framework. CCAs assess the implementation of security controls, validate an organization&#039;s cybersecurity practices, and submit their findings to Certified Third-Party Assessment Organizations (C3PAOs) and the Cyber-AB for certification approval. To become a CCA, individuals must undergo formal training, pass certification exams, and maintain strict ethical standards to ensure independent and objective assessments. CCAs play a critical role in ensuring that contractors handling CUI and FCI meet the DoD’s cybersecurity requirements, contributing to the security of the U.S. defense supply chain.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=LTP&amp;diff=75</id>
		<title>LTP</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=LTP&amp;diff=75"/>
		<updated>2024-09-30T02:09:44Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Licensed Training Providers (LTPs) in the Cybersecurity Maturity Model Certification (CMMC) ecosystem are organizations authorized by the Cyber-AB (CMMC Accreditation Body) to deliver official training programs for individuals seeking CMMC-related certifications. LTPs play a crucial role in ensuring that professionals working within the CMMC ecosystem—such as Certified CMMC Professionals (CCPs) and Certified CMMC Assessors (CCAs)—receive high-quality, standardized training that aligns with the requirements of the CMMC framework.&lt;br /&gt;
&lt;br /&gt;
==Key Roles and Responsibilities of LTPs:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Delivering Official CMMC Training Programs:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
LTPs are authorized to deliver official CMMC training courses to individuals seeking to become Certified CMMC Professionals (CCPs) or Certified CMMC Assessors (CCAs). These training programs are designed and approved by the Cyber-AB, ensuring they cover all necessary topics related to the CMMC framework and the NIST 800-171 security controls.&lt;br /&gt;
&lt;br /&gt;
LTPs deliver courses using approved Licensed Partner Publishers (LPPs) materials. These LPPs are responsible for developing and maintaining the curriculum that LTPs use for CMMC training.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Certifying CMMC Professionals and Assessors:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
LTPs provide the training required for individuals to become Certified CMMC Professionals (CCPs) and Certified CMMC Assessors (CCAs). The training covers key areas such as understanding the CMMC model, how to assess and implement security controls, and preparing organizations for CMMC certification.&lt;br /&gt;
&lt;br /&gt;
After completing the training provided by an LTP, candidates are eligible to sit for the CMMC certification exams administered by the Cyber-AB.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Supporting the Growth of CMMC Expertise:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
By offering official CMMC training, LTPs help grow the pool of qualified professionals within the Defense Industrial Base (DIB) who can support defense contractors in achieving CMMC compliance. This includes both internal personnel (who work within a contracting organization) and external consultants (who advise multiple organizations).&lt;br /&gt;
&lt;br /&gt;
LTPs ensure that individuals receive standardized, high-quality education that aligns with the latest updates to the CMMC model, including the transition to CMMC 2.0.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - Providing Training for Different CMMC Levels:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
LTPs offer training for CMMC Level 1 (Foundational) and Level 2 (Advanced), as well as guidance for Level 3 (Expert), which focuses on more advanced cybersecurity practices.&lt;br /&gt;
&lt;br /&gt;
The training is tailored to the specific CMMC levels, helping candidates understand the requirements and how to implement or assess the necessary cybersecurity practices for each level.&lt;br /&gt;
&lt;br /&gt;
==Key Certifications Supported by LTPs:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Certified CMMC Professional (CCP):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The CCP is an entry-level certification for individuals who want to assist organizations with understanding and implementing the CMMC framework. A CCP is qualified to work as a consultant or within an organization to help prepare for CMMC certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Training:&#039;&#039;&#039; LTPs offer official CCP courses that cover the fundamentals of the CMMC framework, NIST 800-171 controls, and the roles and responsibilities of a CCP. This training helps candidates understand how to assess and implement the necessary controls to achieve CMMC compliance.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Certified CMMC Assessor (CCA):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCAs are individuals certified to perform formal CMMC assessments on behalf of Certified Third-Party Assessment Organizations (C3PAOs). CCAs assess defense contractors’ compliance with the CMMC requirements at various levels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Training:&#039;&#039;&#039; LTPs offer more advanced courses for those seeking CCA certification. These courses include the assessment methodologies, auditing procedures, and compliance requirements necessary to perform third-party assessments at CMMC Levels 1, 2, or 3.&lt;br /&gt;
&lt;br /&gt;
==Benefits of Using LTPs for CMMC Training:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Accredited and Trusted Source of Knowledge:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
LTPs are vetted and licensed by the Cyber-AB, ensuring that the training provided is of high quality and aligns with the official standards of the CMMC framework. This ensures that individuals trained by LTPs are well-prepared for their certification exams and for working within the CMMC ecosystem.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Access to Approved Training Materials:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
LTPs use training materials developed by Licensed Partner Publishers (LPPs), which are approved by the Cyber-AB. This ensures that the curriculum is up-to-date, accurate, and relevant to current CMMC requirements and best practices.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Training for Both New and Experienced Professionals:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
LTPs provide training that is suitable for a wide range of professionals, from those new to cybersecurity and compliance to seasoned cybersecurity experts seeking CMMC certification. This flexibility allows individuals and organizations to tailor their training needs to their level of experience.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Continuous Learning and Updates:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As the CMMC framework evolves, LTPs provide updated training materials to reflect any changes in requirements, assessment procedures, or cybersecurity standards. This ensures that individuals trained by LTPs remain current with the latest developments in CMMC.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Pathway to CMMC Certification:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For individuals seeking to work in CMMC-related roles, LTPs offer a structured and official pathway to achieving certification. This is critical for anyone looking to become a Certified CMMC Professional (CCP) or Certified CMMC Assessor (CCA), as these certifications are increasingly in demand as the DoD implements CMMC requirements across the Defense Industrial Base.&lt;br /&gt;
&lt;br /&gt;
==How to Find an LTP:==&lt;br /&gt;
&lt;br /&gt;
The Cyber-AB maintains a [https://cyberab.org/Catalog#!/c/s/Results/Format/list/Page/1/Size/9/Sort/NameAscending directory of approved Licensed Training Providers (LTPs) on their official website]. This directory allows individuals and organizations to find LTPs that offer CMMC training programs in various formats, including in-person and online courses.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
Licensed Training Providers (LTPs) are essential to the CMMC ecosystem. They are accredited by the Cyber-AB to deliver official CMMC training to individuals seeking certification as Certified CMMC Professionals (CCPs) or Certified CMMC Assessors (CCAs). By using approved training materials and offering courses aligned with the CMMC framework, LTPs help ensure that individuals working with or within defense contractors are well-prepared to implement, assess, and maintain cybersecurity practices that meet the CMMC requirements. For anyone aiming to enter the CMMC consulting space or perform assessments, LTPs provide the necessary training and support for achieving these certifications.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=LTP&amp;diff=74</id>
		<title>LTP</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=LTP&amp;diff=74"/>
		<updated>2024-09-30T02:08:43Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;Licensed Training Providers (LTPs) in the Cybersecurity Maturity Model Certification (CMMC) ecosystem are organizations authorized by the Cyber-AB (CMMC Accreditation Body) to deliver official training programs for individuals seeking CMMC-related certifications. LTPs play a crucial role in ensuring that professionals working within the CMMC ecosystem—such as Certified CMMC Professionals (CCPs) and Certified CMMC Assessors (CCAs)—receive high-quality, standardized tr...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Licensed Training Providers (LTPs) in the Cybersecurity Maturity Model Certification (CMMC) ecosystem are organizations authorized by the Cyber-AB (CMMC Accreditation Body) to deliver official training programs for individuals seeking CMMC-related certifications. LTPs play a crucial role in ensuring that professionals working within the CMMC ecosystem—such as Certified CMMC Professionals (CCPs) and Certified CMMC Assessors (CCAs)—receive high-quality, standardized training that aligns with the requirements of the CMMC framework.&lt;br /&gt;
&lt;br /&gt;
==Key Roles and Responsibilities of LTPs:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Delivering Official CMMC Training Programs:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
LTPs are authorized to deliver official CMMC training courses to individuals seeking to become Certified CMMC Professionals (CCPs) or Certified CMMC Assessors (CCAs). These training programs are designed and approved by the Cyber-AB, ensuring they cover all necessary topics related to the CMMC framework and the NIST 800-171 security controls.&lt;br /&gt;
&lt;br /&gt;
LTPs deliver courses using approved Licensed Partner Publishers (LPPs) materials. These LPPs are responsible for developing and maintaining the curriculum that LTPs use for CMMC training.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Certifying CMMC Professionals and Assessors:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
LTPs provide the training required for individuals to become Certified CMMC Professionals (CCPs) and Certified CMMC Assessors (CCAs). The training covers key areas such as understanding the CMMC model, how to assess and implement security controls, and preparing organizations for CMMC certification.&lt;br /&gt;
&lt;br /&gt;
After completing the training provided by an LTP, candidates are eligible to sit for the CMMC certification exams administered by the Cyber-AB.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Supporting the Growth of CMMC Expertise:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
By offering official CMMC training, LTPs help grow the pool of qualified professionals within the Defense Industrial Base (DIB) who can support defense contractors in achieving CMMC compliance. This includes both internal personnel (who work within a contracting organization) and external consultants (who advise multiple organizations).&lt;br /&gt;
&lt;br /&gt;
LTPs ensure that individuals receive standardized, high-quality education that aligns with the latest updates to the CMMC model, including the transition to CMMC 2.0.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - Providing Training for Different CMMC Levels:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
LTPs offer training for CMMC Level 1 (Foundational) and Level 2 (Advanced), as well as guidance for Level 3 (Expert), which focuses on more advanced cybersecurity practices.&lt;br /&gt;
&lt;br /&gt;
The training is tailored to the specific CMMC levels, helping candidates understand the requirements and how to implement or assess the necessary cybersecurity practices for each level.&lt;br /&gt;
&lt;br /&gt;
==Key Certifications Supported by LTPs:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Certified CMMC Professional (CCP):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The CCP is an entry-level certification for individuals who want to assist organizations with understanding and implementing the CMMC framework. A CCP is qualified to work as a consultant or within an organization to help prepare for CMMC certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Training:&#039;&#039;&#039; LTPs offer official CCP courses that cover the fundamentals of the CMMC framework, NIST 800-171 controls, and the roles and responsibilities of a CCP. This training helps candidates understand how to assess and implement the necessary controls to achieve CMMC compliance.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Certified CMMC Assessor (CCA):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCAs are individuals certified to perform formal CMMC assessments on behalf of Certified Third-Party Assessment Organizations (C3PAOs). CCAs assess defense contractors’ compliance with the CMMC requirements at various levels.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Training:&#039;&#039;&#039; LTPs offer more advanced courses for those seeking CCA certification. These courses include the assessment methodologies, auditing procedures, and compliance requirements necessary to perform third-party assessments at CMMC Levels 1, 2, or 3.&lt;br /&gt;
&lt;br /&gt;
==Benefits of Using LTPs for CMMC Training:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Accredited and Trusted Source of Knowledge:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
LTPs are vetted and licensed by the Cyber-AB, ensuring that the training provided is of high quality and aligns with the official standards of the CMMC framework. This ensures that individuals trained by LTPs are well-prepared for their certification exams and for working within the CMMC ecosystem.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Access to Approved Training Materials:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
LTPs use training materials developed by Licensed Partner Publishers (LPPs), which are approved by the Cyber-AB. This ensures that the curriculum is up-to-date, accurate, and relevant to current CMMC requirements and best practices.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Training for Both New and Experienced Professionals:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
LTPs provide training that is suitable for a wide range of professionals, from those new to cybersecurity and compliance to seasoned cybersecurity experts seeking CMMC certification. This flexibility allows individuals and organizations to tailor their training needs to their level of experience.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Continuous Learning and Updates:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As the CMMC framework evolves, LTPs provide updated training materials to reflect any changes in requirements, assessment procedures, or cybersecurity standards. This ensures that individuals trained by LTPs remain current with the latest developments in CMMC.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Pathway to CMMC Certification:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
For individuals seeking to work in CMMC-related roles, LTPs offer a structured and official pathway to achieving certification. This is critical for anyone looking to become a Certified CMMC Professional (CCP) or Certified CMMC Assessor (CCA), as these certifications are increasingly in demand as the DoD implements CMMC requirements across the Defense Industrial Base.&lt;br /&gt;
&lt;br /&gt;
==How to Find an LTP:==&lt;br /&gt;
&lt;br /&gt;
The Cyber-AB maintains a directory of approved Licensed Training Providers (LTPs) on their official website. This directory allows individuals and organizations to find LTPs that offer CMMC training programs in various formats, including in-person and online courses.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
Licensed Training Providers (LTPs) are essential to the CMMC ecosystem. They are accredited by the Cyber-AB to deliver official CMMC training to individuals seeking certification as Certified CMMC Professionals (CCPs) or Certified CMMC Assessors (CCAs). By using approved training materials and offering courses aligned with the CMMC framework, LTPs help ensure that individuals working with or within defense contractors are well-prepared to implement, assess, and maintain cybersecurity practices that meet the CMMC requirements. For anyone aiming to enter the CMMC consulting space or perform assessments, LTPs provide the necessary training and support for achieving these certifications.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Resources_and_Tools_for_Compliance&amp;diff=73</id>
		<title>Resources and Tools for Compliance</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Resources_and_Tools_for_Compliance&amp;diff=73"/>
		<updated>2024-09-30T02:02:48Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To support organizations in achieving CMMC (Cybersecurity Maturity Model Certification) compliance, several resources and tools are available from government sources. These resources help organizations understand the requirements of the CMMC framework, assess their cybersecurity posture, and implement the necessary controls to protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI).&lt;br /&gt;
&lt;br /&gt;
==Here is a list of key government-provided tools and resources that can help with CMMC compliance:==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;1. NIST Special Publications (SP)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf NIST SP 800-171:] This is the foundational document for CMMC, specifically for Level 2 (Advanced) compliance. It outlines the 110 security controls that organizations must implement to protect CUI. The publication provides detailed descriptions of the required security practices across 14 families.&lt;br /&gt;
&lt;br /&gt;
[https://csrc.nist.gov/publications/detail/sp/800-171a/final NIST SP 800-171A:] This document provides assessment procedures for evaluating the effectiveness of security controls described in NIST SP 800-171. It helps organizations conduct self-assessments to ensure they meet the required controls.&lt;br /&gt;
&lt;br /&gt;
[https://csrc.nist.gov/publications/detail/sp/800-172/final NIST SP 800-172:] Provides enhanced security controls for protecting CUI in critical systems. It is useful for organizations aiming for CMMC Level 3 (Expert) or those dealing with high-risk information.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;2. National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The [https://www.nist.gov/cyberframework NIST Cybersecurity Framework] provides a voluntary framework of standards, guidelines, and best practices to manage and reduce cybersecurity risks. Many organizations use it in conjunction with NIST 800-171 to strengthen their cybersecurity posture.&lt;br /&gt;
&lt;br /&gt;
The CSF is particularly helpful in assessing and enhancing cybersecurity practices as they relate to the requirements in the CMMC model.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;3. Cybersecurity &amp;amp; Infrastructure Security Agency (CISA) Resources&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
CISA offers a wide range of cybersecurity tools, guidance, and best practices that are relevant for organizations working toward CMMC compliance. Key resources include:&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/resources-tools/services/cyber-resilience-review-crr Cyber Resilience Review (CRR):] A self-assessment tool that helps organizations evaluate their operational resilience and cybersecurity capabilities, including risk management, incident response, and vulnerability management. It’s aligned with cybersecurity best practices that support CMMC objectives.&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/news-events/alerts/2021/06/30/cisas-cset-tool-sets-sights-ransomware-threat Ransomware Readiness Assessment (RRA):] A specialized tool that helps organizations evaluate their readiness against ransomware attacks.&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/resources-tools/resources/cyber-essentials Cyber Essentials:] Provides basic guidelines for small businesses to adopt foundational cybersecurity measures.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;4. Supplier Performance Risk System ([[SPRS]])&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
SPRS is the DoD system where contractors must submit their [[NIST 800-171]] self-assessment scores as part of CMMC compliance. The system allows the DoD to track contractors&#039; cybersecurity posture and use that information to evaluate suppliers when awarding contracts.&lt;br /&gt;
&lt;br /&gt;
Organizations are required to:&lt;br /&gt;
&lt;br /&gt;
*Conduct a NIST 800-171 self-assessment.&lt;br /&gt;
&lt;br /&gt;
*Submit their score to [https://www.sprs.csd.disa.mil/ SPRS], which helps determine their readiness for handling [[CUI]].&lt;br /&gt;
&lt;br /&gt;
*Maintain accurate scores and update them as they improve their security controls.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;5. DoD Cybersecurity Maturity Model Certification (CMMC) Resources&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The CMMC Accreditation Body ([https://cyberab.org/ Cyber-AB]) provides critical resources related to the CMMC assessment process and compliance. These resources include:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Assessment Guides&#039;&#039;&#039;: Detailed guidance for preparing for a CMMC assessment at different levels (Level 1, Level 2).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Training Resources&#039;&#039;&#039;: Information on Licensed Training Providers ([[LTP]]s), Certified CMMC Professionals ([[CCP]]s), and Certified CMMC Assessors ([[CCA]]s).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;FAQs and Documentation:&#039;&#039;&#039; FAQs, white papers, and other documentation that explain CMMC in detail, as well as guidance on how to comply with specific security practices.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;6. Defense Federal Acquisition Regulation Supplement ([[DFARS]])&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The DFARS 252.204-7012 clause outlines the requirements for protecting CUI and mandates compliance with NIST 800-171. Understanding DFARS is essential for defense contractors since it forms the legal basis for many of the cybersecurity requirements.&lt;br /&gt;
&lt;br /&gt;
DFARS 252.204-7019 and 252.204-7020 require contractors to submit their NIST 800-171 assessment scores to SPRS.&lt;br /&gt;
The DoD uses these DFARS clauses as part of their contracting requirements, and organizations must be familiar with them to ensure compliance.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;7. National Initiative for Cybersecurity Education (NICE)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://www.nist.gov/itl/applied-cybersecurity/nice NICE] is a NIST-led initiative that provides resources for educating and training individuals in cybersecurity. It offers guidelines, frameworks, and resources to help organizations build their cybersecurity workforce, which is crucial for achieving and maintaining CMMC compliance.&lt;br /&gt;
&lt;br /&gt;
NICE also provides a workforce framework that helps organizations understand the skills and roles necessary for cybersecurity, which can guide hiring, training, and team development to meet CMMC requirements.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;8. [https://dodprocurementtoolbox.com/uploads/Cybersecurity_FAQ_update_12_19_22_ba047be683.pdf Department of Defense (DoD) Procurement Toolbox FAQ:]&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
DoD offers a collection of tools and services to help you and your organization manage, enable, and share procurement information across the Department of Defense.&lt;br /&gt;
&lt;br /&gt;
NOTE: This resource may not be updated.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;9. Federal Risk and Authorization Management Program (FedRAMP)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://marketplace.fedramp.gov/products FedRAMP] provides a standardized approach to security assessment, authorization, and monitoring for cloud products and services used by federal agencies, including the DoD. FedRAMP compliance is particularly important for contractors using cloud services to store or process CUI, as it provides government-approved security controls.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;10. National Vulnerability Database (NVD)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The [https://nvd.nist.gov/ NVD] is a U.S. government repository of standards-based vulnerability management data that can be used to evaluate software and systems for known security vulnerabilities. Organizations working on CMMC compliance can use NVD to track vulnerabilities in their software and address them as part of their vulnerability management efforts.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
For defense contractors working toward CMMC compliance, several government resources and tools can help guide them through the process. Key resources include NIST publications, the Cyber Accreditation Body, SPRS, and guidelines provided by CISA and the DoD. These resources provide essential information for conducting assessments, managing risks, implementing controls, and ensuring compliance with NIST 800-171 and the CMMC framework. They also support organizations in improving their overall cybersecurity posture, which is crucial for handling sensitive DoD information securely.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Resources_and_Tools_for_Compliance&amp;diff=72</id>
		<title>Resources and Tools for Compliance</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Resources_and_Tools_for_Compliance&amp;diff=72"/>
		<updated>2024-09-30T02:02:21Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;To support organizations in achieving CMMC (Cybersecurity Maturity Model Certification) compliance, several resources and tools are available from government sources. These resources help organizations understand the requirements of the CMMC framework, assess their cybersecurity posture, and implement the necessary controls to protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI).  ==Here is a list of key government-provided tools and r...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To support organizations in achieving CMMC (Cybersecurity Maturity Model Certification) compliance, several resources and tools are available from government sources. These resources help organizations understand the requirements of the CMMC framework, assess their cybersecurity posture, and implement the necessary controls to protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI).&lt;br /&gt;
&lt;br /&gt;
==Here is a list of key government-provided tools and resources that can help with CMMC compliance:==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;1. NIST Special Publications (SP)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf NIST SP 800-171:] This is the foundational document for CMMC, specifically for Level 2 (Advanced) compliance. It outlines the 110 security controls that organizations must implement to protect CUI. The publication provides detailed descriptions of the required security practices across 14 families.&lt;br /&gt;
&lt;br /&gt;
[https://csrc.nist.gov/publications/detail/sp/800-171a/final NIST SP 800-171A:] This document provides assessment procedures for evaluating the effectiveness of security controls described in NIST SP 800-171. It helps organizations conduct self-assessments to ensure they meet the required controls.&lt;br /&gt;
&lt;br /&gt;
[https://csrc.nist.gov/publications/detail/sp/800-172/final NIST SP 800-172:] Provides enhanced security controls for protecting CUI in critical systems. It is useful for organizations aiming for CMMC Level 3 (Expert) or those dealing with high-risk information.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;2. National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The [https://www.nist.gov/cyberframework NIST Cybersecurity Framework] provides a voluntary framework of standards, guidelines, and best practices to manage and reduce cybersecurity risks. Many organizations use it in conjunction with NIST 800-171 to strengthen their cybersecurity posture.&lt;br /&gt;
&lt;br /&gt;
The CSF is particularly helpful in assessing and enhancing cybersecurity practices as they relate to the requirements in the CMMC model.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;3. Cybersecurity &amp;amp; Infrastructure Security Agency (CISA) Resources&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
CISA offers a wide range of cybersecurity tools, guidance, and best practices that are relevant for organizations working toward CMMC compliance. Key resources include:&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/resources-tools/services/cyber-resilience-review-crr Cyber Resilience Review (CRR):] A self-assessment tool that helps organizations evaluate their operational resilience and cybersecurity capabilities, including risk management, incident response, and vulnerability management. It’s aligned with cybersecurity best practices that support CMMC objectives.&lt;br /&gt;
&lt;br /&gt;
* [[https://www.cisa.gov/news-events/alerts/2021/06/30/cisas-cset-tool-sets-sights-ransomware-threat Ransomware Readiness Assessment (RRA):] A specialized tool that helps organizations evaluate their readiness against ransomware attacks.&lt;br /&gt;
&lt;br /&gt;
* [https://www.cisa.gov/resources-tools/resources/cyber-essentials Cyber Essentials:] Provides basic guidelines for small businesses to adopt foundational cybersecurity measures.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;4. Supplier Performance Risk System ([[SPRS]])&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
SPRS is the DoD system where contractors must submit their [[NIST 800-171]] self-assessment scores as part of CMMC compliance. The system allows the DoD to track contractors&#039; cybersecurity posture and use that information to evaluate suppliers when awarding contracts.&lt;br /&gt;
&lt;br /&gt;
Organizations are required to:&lt;br /&gt;
&lt;br /&gt;
*Conduct a NIST 800-171 self-assessment.&lt;br /&gt;
&lt;br /&gt;
*Submit their score to [https://www.sprs.csd.disa.mil/ SPRS], which helps determine their readiness for handling [[CUI]].&lt;br /&gt;
&lt;br /&gt;
*Maintain accurate scores and update them as they improve their security controls.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;5. DoD Cybersecurity Maturity Model Certification (CMMC) Resources&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The CMMC Accreditation Body ([https://cyberab.org/ Cyber-AB]) provides critical resources related to the CMMC assessment process and compliance. These resources include:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Assessment Guides&#039;&#039;&#039;: Detailed guidance for preparing for a CMMC assessment at different levels (Level 1, Level 2).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Training Resources&#039;&#039;&#039;: Information on Licensed Training Providers ([[LTP]]s), Certified CMMC Professionals ([[CCP]]s), and Certified CMMC Assessors ([[CCA]]s).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;FAQs and Documentation:&#039;&#039;&#039; FAQs, white papers, and other documentation that explain CMMC in detail, as well as guidance on how to comply with specific security practices.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;6. Defense Federal Acquisition Regulation Supplement ([[DFARS]])&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The DFARS 252.204-7012 clause outlines the requirements for protecting CUI and mandates compliance with NIST 800-171. Understanding DFARS is essential for defense contractors since it forms the legal basis for many of the cybersecurity requirements.&lt;br /&gt;
&lt;br /&gt;
DFARS 252.204-7019 and 252.204-7020 require contractors to submit their NIST 800-171 assessment scores to SPRS.&lt;br /&gt;
The DoD uses these DFARS clauses as part of their contracting requirements, and organizations must be familiar with them to ensure compliance.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;7. National Initiative for Cybersecurity Education (NICE)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://www.nist.gov/itl/applied-cybersecurity/nice NICE] is a NIST-led initiative that provides resources for educating and training individuals in cybersecurity. It offers guidelines, frameworks, and resources to help organizations build their cybersecurity workforce, which is crucial for achieving and maintaining CMMC compliance.&lt;br /&gt;
&lt;br /&gt;
NICE also provides a workforce framework that helps organizations understand the skills and roles necessary for cybersecurity, which can guide hiring, training, and team development to meet CMMC requirements.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;8. [https://dodprocurementtoolbox.com/uploads/Cybersecurity_FAQ_update_12_19_22_ba047be683.pdf Department of Defense (DoD) Procurement Toolbox FAQ:]&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
DoD offers a collection of tools and services to help you and your organization manage, enable, and share procurement information across the Department of Defense.&lt;br /&gt;
&lt;br /&gt;
NOTE: This resource may not be updated.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;9. Federal Risk and Authorization Management Program (FedRAMP)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
[https://marketplace.fedramp.gov/products FedRAMP] provides a standardized approach to security assessment, authorization, and monitoring for cloud products and services used by federal agencies, including the DoD. FedRAMP compliance is particularly important for contractors using cloud services to store or process CUI, as it provides government-approved security controls.&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;&#039;10. National Vulnerability Database (NVD)&#039;&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
The [https://nvd.nist.gov/ NVD] is a U.S. government repository of standards-based vulnerability management data that can be used to evaluate software and systems for known security vulnerabilities. Organizations working on CMMC compliance can use NVD to track vulnerabilities in their software and address them as part of their vulnerability management efforts.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
For defense contractors working toward CMMC compliance, several government resources and tools can help guide them through the process. Key resources include NIST publications, the Cyber Accreditation Body, SPRS, and guidelines provided by CISA and the DoD. These resources provide essential information for conducting assessments, managing risks, implementing controls, and ensuring compliance with NIST 800-171 and the CMMC framework. They also support organizations in improving their overall cybersecurity posture, which is crucial for handling sensitive DoD information securely.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Training_and_Education&amp;diff=71</id>
		<title>Training and Education</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Training_and_Education&amp;diff=71"/>
		<updated>2024-09-30T01:43:56Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If someone is interested in consulting for CMMC (Cybersecurity Maturity Model Certification), it is important to have a solid understanding of the CMMC framework, the associated requirements, and the NIST 800-171 controls, which are at the core of CMMC. Additionally, training, certifications, and ongoing education are critical components to being a trusted and effective CMMC consultant. Below is a breakdown of the key areas of knowledge, education, and training required to be a successful CMMC consultant.&lt;br /&gt;
&lt;br /&gt;
==1. Foundational Knowledge of CMMC and NIST 800-171==&lt;br /&gt;
&lt;br /&gt;
A consultant must have a deep understanding of both the CMMC framework and NIST 800-171, which serves as the foundation for CMMC requirements, particularly at Level 2 (Advanced).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Framework:&#039;&#039;&#039; The consultant needs to be well-versed in CMMC 2.0, which simplifies the original framework into three levels:&lt;br /&gt;
&lt;br /&gt;
*Level 1 (Foundational): Basic cyber hygiene practices, focused on Federal Contract Information (FCI).&lt;br /&gt;
*Level 2 (Advanced): Aligns with the 110 security controls of NIST 800-171, focused on protecting Controlled Unclassified Information (CUI).&lt;br /&gt;
*Level 3 (Expert): Advanced cybersecurity practices, requiring government-led assessments.&lt;br /&gt;
NIST 800-171: A strong understanding of the 110 security controls within NIST 800-171 is necessary, as these controls are central to Level 2 compliance. Consultants must understand the requirements for protecting CUI, including controls related to access management, incident response, encryption, and risk management.&lt;br /&gt;
&lt;br /&gt;
==2. Certifications and Credentials==&lt;br /&gt;
&lt;br /&gt;
Becoming a qualified CMMC consultant typically requires earning specific credentials that validate your knowledge of the framework and your ability to assist clients in preparing for certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Certified CMMC Professional (CCP):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The Certified CMMC Professional (CCP) is the entry-level certification for individuals who want to consult or work in the CMMC ecosystem. CCPs are trained to understand the CMMC framework and assist organizations in preparing for certification.&lt;br /&gt;
&lt;br /&gt;
* Training Requirements: Candidates must complete formal training provided by a Licensed Training Provider (LTP), followed by passing a certification exam.&lt;br /&gt;
&lt;br /&gt;
* Roles: CCPs cannot lead assessments but can support Certified Assessors, provide consulting, and help defense contractors implement and prepare for CMMC.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Certified CMMC Assessor (CCA):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The Certified CMMC Assessor (CCA) certification is for professionals who intend to conduct formal CMMC assessments on behalf of Certified Third-Party Assessment Organizations (C3PAOs). CCAs need a more advanced understanding of the CMMC requirements and assessment methodology.&lt;br /&gt;
&lt;br /&gt;
* Training and Experience Requirements: Candidates must complete extensive training, have prior cybersecurity experience, and pass a certification exam. CCAs at higher levels (e.g., Level 2 or 3) require more extensive cybersecurity experience and deeper knowledge of technical controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Additional Cybersecurity Certifications:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
While not required, other cybersecurity certifications can enhance a consultant’s credibility and demonstrate their technical expertise. Common certifications include:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Certified Information Systems Security Professional (CISSP):&#039;&#039;&#039; A widely recognized certification that demonstrates knowledge in managing and implementing information security programs.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Certified Information Security Manager (CISM):&#039;&#039;&#039; Focuses on managing and governing enterprise information security.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Certified Information Systems Auditor (CISA):&#039;&#039;&#039; Focuses on auditing, controlling, and securing enterprise systems.&lt;br /&gt;
&lt;br /&gt;
==3. Understanding the CMMC Ecosystem==&lt;br /&gt;
&lt;br /&gt;
A CMMC consultant needs to have a strong understanding of the roles, processes, and organizations within the CMMC ecosystem, including:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Cyber-AB (CMMC Accreditation Body):&#039;&#039;&#039; The nonprofit organization that oversees the accreditation of Certified Third-Party Assessment Organizations ([[C3PAO]]s), Certified CMMC Professionals ([[CCP]]s), and Certified CMMC Assessors ([[CCA]]s).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Certified Third-Party Assessment Organizations (C3PAOs):&#039;&#039;&#039; These organizations are responsible for performing official CMMC assessments. Consultants working with C3PAOs or contractors seeking certification need to understand the role C3PAOs play in the process.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Plan of Action and Milestones (POAM):&#039;&#039;&#039; A POAM is developed when an organization needs to address gaps in compliance. Consultants must help clients develop effective POAMs and prioritize remediation efforts.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Supplier Performance Risk System ([[SPRS]]):&#039;&#039;&#039; Familiarity with SPRS is critical, as contractors must upload their NIST 800-171 self-assessment scores to SPRS before they can be considered for DoD contracts. Consultants should help clients calculate and submit these scores.&lt;br /&gt;
&lt;br /&gt;
==4. Consulting Skills and Experience==&lt;br /&gt;
&lt;br /&gt;
In addition to technical knowledge, a CMMC consultant must have strong consulting skills and experience working with clients to implement cybersecurity best practices. This includes:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Client Engagement:&#039;&#039;&#039; Being able to clearly communicate and educate clients on complex cybersecurity concepts and requirements, including how to implement specific security controls and meet CMMC compliance.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Gap Analysis:&#039;&#039;&#039; Conducting detailed gap assessments to identify where an organization’s current cybersecurity practices fall short of CMMC requirements. This includes analyzing systems, policies, and procedures against NIST 800-171 controls.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Developing Policies and Procedures:&#039;&#039;&#039; Many organizations will need help creating or refining their security policies and procedures to align with CMMC requirements. A consultant must have experience writing, reviewing, and implementing security documentation.&lt;br /&gt;
&lt;br /&gt;
==5. Continuous Learning and Staying Current==&lt;br /&gt;
&lt;br /&gt;
CMMC requirements and the cybersecurity landscape evolve constantly, so consultants need to stay current with:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;CMMC 2.0 Developments:&#039;&#039;&#039; CMMC is still evolving, particularly with the rollout of CMMC 2.0. A consultant must be aware of any updates to the framework, especially regarding self-assessments, third-party assessments, and certification requirements for different levels.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Cybersecurity Threat Landscape:&#039;&#039;&#039; New vulnerabilities, attack vectors, and cybersecurity best practices emerge regularly. Keeping up with these trends through ongoing education, industry certifications, and attending cybersecurity conferences is crucial.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Regulatory Updates:&#039;&#039;&#039; Changes to DoD regulations, particularly related to DFARS (Defense Federal Acquisition Regulation Supplement), can impact how CMMC is implemented. A consultant should stay informed on these developments and how they affect contractors.&lt;br /&gt;
&lt;br /&gt;
==6. Soft Skills and Communication==&lt;br /&gt;
&lt;br /&gt;
Effective CMMC consultants also need strong soft skills to manage client relationships and communicate complex cybersecurity requirements clearly:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Communication:&#039;&#039;&#039; Explaining technical concepts and the importance of cybersecurity practices to non-technical stakeholders is a critical skill. Consultants need to translate compliance jargon into actionable steps that organizations can follow.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Project Management:&#039;&#039;&#039; Implementing CMMC controls and preparing for an assessment requires careful planning and organization. Consultants should be able to lead a team through the process of identifying, remediating, and documenting cybersecurity controls.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Training and Awareness:&#039;&#039;&#039; A key part of consulting involves training and educating an organization’s staff about security policies and CMMC requirements. This may include developing and delivering training programs focused on cybersecurity hygiene, incident response, and handling CUI.&lt;br /&gt;
&lt;br /&gt;
==7. Practical Experience with Cybersecurity Tools==&lt;br /&gt;
&lt;br /&gt;
Hands-on experience with cybersecurity tools and systems is essential for advising clients on how to implement specific controls required by CMMC. Familiarity with tools in areas such as:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Vulnerability Scanning:&#039;&#039;&#039; Tools like Tenable, Qualys, or OpenVAS help organizations detect and remediate vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Endpoint Protection:&#039;&#039;&#039; Solutions like CrowdStrike, Symantec, or McAfee that provide protection against malware and ransomware.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Encryption Tools:&#039;&#039;&#039; Understanding how to implement and manage encryption for protecting CUI in transit and at rest.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;SIEM Systems:&#039;&#039;&#039; Tools like Splunk or LogRhythm to monitor, detect, and respond to security incidents.&lt;br /&gt;
&lt;br /&gt;
==8. Ethical Considerations and Conflicts of Interest==&lt;br /&gt;
&lt;br /&gt;
Consultants working in the CMMC ecosystem must maintain high ethical standards:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Independence:&#039;&#039;&#039; CMMC consultants, particularly those aiming to become certified assessors, must be independent from any formal assessments they are involved in. Consultants cannot conduct assessments on clients they have previously advised on CMMC preparation to avoid conflicts of interest.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Confidentiality:&#039;&#039;&#039; Consulting often involves access to sensitive data, and maintaining the confidentiality of client information, especially when handling CUI, is critical.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
To consult for CMMC, individuals need a deep understanding of the CMMC framework, NIST 800-171 controls, and the overall cybersecurity landscape. Obtaining certifications like Certified CMMC Professional (CCP) or Certified CMMC Assessor (CCA) is essential, along with developing strong consulting and communication skills. Consultants must also stay up to date on regulatory changes, the evolving CMMC 2.0 model, and cybersecurity threats. Ethical conduct, client management, and the ability to help organizations implement technical controls are key to success in this role.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Training_and_Education&amp;diff=70</id>
		<title>Training and Education</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Training_and_Education&amp;diff=70"/>
		<updated>2024-09-30T01:42:22Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;If someone is interested in consulting for CMMC (Cybersecurity Maturity Model Certification), it is important to have a solid understanding of the CMMC framework, the associated requirements, and the NIST 800-171 controls, which are at the core of CMMC. Additionally, training, certifications, and ongoing education are critical components to being a trusted and effective CMMC consultant. Below is a breakdown of the key areas of knowledge, education, and training required...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If someone is interested in consulting for CMMC (Cybersecurity Maturity Model Certification), it is important to have a solid understanding of the CMMC framework, the associated requirements, and the NIST 800-171 controls, which are at the core of CMMC. Additionally, training, certifications, and ongoing education are critical components to being a trusted and effective CMMC consultant. Below is a breakdown of the key areas of knowledge, education, and training required to be a successful CMMC consultant.&lt;br /&gt;
&lt;br /&gt;
==1. Foundational Knowledge of CMMC and NIST 800-171==&lt;br /&gt;
&lt;br /&gt;
A consultant must have a deep understanding of both the CMMC framework and NIST 800-171, which serves as the foundation for CMMC requirements, particularly at Level 2 (Advanced).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Framework:&#039;&#039;&#039; The consultant needs to be well-versed in CMMC 2.0, which simplifies the original framework into three levels:&lt;br /&gt;
&lt;br /&gt;
*Level 1 (Foundational): Basic cyber hygiene practices, focused on Federal Contract Information (FCI).&lt;br /&gt;
*Level 2 (Advanced): Aligns with the 110 security controls of NIST 800-171, focused on protecting Controlled Unclassified Information (CUI).&lt;br /&gt;
*Level 3 (Expert): Advanced cybersecurity practices, requiring government-led assessments.&lt;br /&gt;
NIST 800-171: A strong understanding of the 110 security controls within NIST 800-171 is necessary, as these controls are central to Level 2 compliance. Consultants must understand the requirements for protecting CUI, including controls related to access management, incident response, encryption, and risk management.&lt;br /&gt;
&lt;br /&gt;
==2. Certifications and Credentials==&lt;br /&gt;
&lt;br /&gt;
Becoming a qualified CMMC consultant typically requires earning specific credentials that validate your knowledge of the framework and your ability to assist clients in preparing for certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Certified CMMC Professional (CCP):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The Certified CMMC Professional (CCP) is the entry-level certification for individuals who want to consult or work in the CMMC ecosystem. CCPs are trained to understand the CMMC framework and assist organizations in preparing for certification.&lt;br /&gt;
&lt;br /&gt;
* Training Requirements: Candidates must complete formal training provided by a Licensed Training Provider (LTP), followed by passing a certification exam.&lt;br /&gt;
&lt;br /&gt;
* Roles: CCPs cannot lead assessments but can support Certified Assessors, provide consulting, and help defense contractors implement and prepare for CMMC.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Certified CMMC Assessor (CCA):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The Certified CMMC Assessor (CCA) certification is for professionals who intend to conduct formal CMMC assessments on behalf of Certified Third-Party Assessment Organizations (C3PAOs). CCAs need a more advanced understanding of the CMMC requirements and assessment methodology.&lt;br /&gt;
&lt;br /&gt;
* Training and Experience Requirements: Candidates must complete extensive training, have prior cybersecurity experience, and pass a certification exam. CCAs at higher levels (e.g., Level 2 or 3) require more extensive cybersecurity experience and deeper knowledge of technical controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Additional Cybersecurity Certifications:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
While not required, other cybersecurity certifications can enhance a consultant’s credibility and demonstrate their technical expertise. Common certifications include:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Certified Information Systems Security Professional (CISSP):&#039;&#039;&#039; A widely recognized certification that demonstrates knowledge in managing and implementing information security programs.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Certified Information Security Manager (CISM):&#039;&#039;&#039; Focuses on managing and governing enterprise information security.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Certified Information Systems Auditor (CISA):&#039;&#039;&#039; Focuses on auditing, controlling, and securing enterprise systems.&lt;br /&gt;
&lt;br /&gt;
==3. Understanding the CMMC Ecosystem==&lt;br /&gt;
&lt;br /&gt;
A CMMC consultant needs to have a strong understanding of the roles, processes, and organizations within the CMMC ecosystem, including:&lt;br /&gt;
&lt;br /&gt;
* Cyber-AB (CMMC Accreditation Body): The nonprofit organization that oversees the accreditation of Certified Third-Party Assessment Organizations ([[C3PAO]]s), Certified CMMC Professionals ([[CCP]]s), and Certified CMMC Assessors ([[CCA]]s).&lt;br /&gt;
&lt;br /&gt;
* Certified Third-Party Assessment Organizations (C3PAOs): These organizations are responsible for performing official CMMC assessments. Consultants working with C3PAOs or contractors seeking certification need to understand the role C3PAOs play in the process.&lt;br /&gt;
&lt;br /&gt;
* Plan of Action and Milestones (POAM): A POAM is developed when an organization needs to address gaps in compliance. Consultants must help clients develop effective POAMs and prioritize remediation efforts.&lt;br /&gt;
&lt;br /&gt;
* Supplier Performance Risk System ([[SPRS]]): Familiarity with SPRS is critical, as contractors must upload their NIST 800-171 self-assessment scores to SPRS before they can be considered for DoD contracts. Consultants should help clients calculate and submit these scores.&lt;br /&gt;
&lt;br /&gt;
==4. Consulting Skills and Experience==&lt;br /&gt;
&lt;br /&gt;
In addition to technical knowledge, a CMMC consultant must have strong consulting skills and experience working with clients to implement cybersecurity best practices. This includes:&lt;br /&gt;
&lt;br /&gt;
* Client Engagement: Being able to clearly communicate and educate clients on complex cybersecurity concepts and requirements, including how to implement specific security controls and meet CMMC compliance.&lt;br /&gt;
&lt;br /&gt;
* Gap Analysis: Conducting detailed gap assessments to identify where an organization’s current cybersecurity practices fall short of CMMC requirements. This includes analyzing systems, policies, and procedures against NIST 800-171 controls.&lt;br /&gt;
&lt;br /&gt;
* Developing Policies and Procedures: Many organizations will need help creating or refining their security policies and procedures to align with CMMC requirements. A consultant must have experience writing, reviewing, and implementing security documentation.&lt;br /&gt;
&lt;br /&gt;
==5. Continuous Learning and Staying Current==&lt;br /&gt;
&lt;br /&gt;
CMMC requirements and the cybersecurity landscape evolve constantly, so consultants need to stay current with:&lt;br /&gt;
&lt;br /&gt;
* CMMC 2.0 Developments: CMMC is still evolving, particularly with the rollout of CMMC 2.0. A consultant must be aware of any updates to the framework, especially regarding self-assessments, third-party assessments, and certification requirements for different levels.&lt;br /&gt;
&lt;br /&gt;
* Cybersecurity Threat Landscape: New vulnerabilities, attack vectors, and cybersecurity best practices emerge regularly. Keeping up with these trends through ongoing education, industry certifications, and attending cybersecurity conferences is crucial.&lt;br /&gt;
&lt;br /&gt;
* Regulatory Updates: Changes to DoD regulations, particularly related to DFARS (Defense Federal Acquisition Regulation Supplement), can impact how CMMC is implemented. A consultant should stay informed on these developments and how they affect contractors.&lt;br /&gt;
&lt;br /&gt;
==6. Soft Skills and Communication==&lt;br /&gt;
&lt;br /&gt;
Effective CMMC consultants also need strong soft skills to manage client relationships and communicate complex cybersecurity requirements clearly:&lt;br /&gt;
&lt;br /&gt;
* Communication: Explaining technical concepts and the importance of cybersecurity practices to non-technical stakeholders is a critical skill. Consultants need to translate compliance jargon into actionable steps that organizations can follow.&lt;br /&gt;
&lt;br /&gt;
* Project Management: Implementing CMMC controls and preparing for an assessment requires careful planning and organization. Consultants should be able to lead a team through the process of identifying, remediating, and documenting cybersecurity controls.&lt;br /&gt;
&lt;br /&gt;
* Training and Awareness: A key part of consulting involves training and educating an organization’s staff about security policies and CMMC requirements. This may include developing and delivering training programs focused on cybersecurity hygiene, incident response, and handling CUI.&lt;br /&gt;
&lt;br /&gt;
==7. Practical Experience with Cybersecurity Tools==&lt;br /&gt;
&lt;br /&gt;
Hands-on experience with cybersecurity tools and systems is essential for advising clients on how to implement specific controls required by CMMC. Familiarity with tools in areas such as:&lt;br /&gt;
&lt;br /&gt;
* Vulnerability Scanning: Tools like Tenable, Qualys, or OpenVAS help organizations detect and remediate vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
* Endpoint Protection: Solutions like CrowdStrike, Symantec, or McAfee that provide protection against malware and ransomware.&lt;br /&gt;
&lt;br /&gt;
* Encryption Tools: Understanding how to implement and manage encryption for protecting CUI in transit and at rest.&lt;br /&gt;
&lt;br /&gt;
* SIEM Systems: Tools like Splunk or LogRhythm to monitor, detect, and respond to security incidents.&lt;br /&gt;
&lt;br /&gt;
==8. Ethical Considerations and Conflicts of Interest==&lt;br /&gt;
&lt;br /&gt;
Consultants working in the CMMC ecosystem must maintain high ethical standards:&lt;br /&gt;
&lt;br /&gt;
* Independence: CMMC consultants, particularly those aiming to become certified assessors, must be independent from any formal assessments they are involved in. Consultants cannot conduct assessments on clients they have previously advised on CMMC preparation to avoid conflicts of interest.&lt;br /&gt;
&lt;br /&gt;
* Confidentiality: Consulting often involves access to sensitive data, and maintaining the confidentiality of client information, especially when handling CUI, is critical.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
To consult for CMMC, individuals need a deep understanding of the CMMC framework, NIST 800-171 controls, and the overall cybersecurity landscape. Obtaining certifications like Certified CMMC Professional (CCP) or Certified CMMC Assessor (CCA) is essential, along with developing strong consulting and communication skills. Consultants must also stay up to date on regulatory changes, the evolving CMMC 2.0 model, and cybersecurity threats. Ethical conduct, client management, and the ability to help organizations implement technical controls are key to success in this role.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=C3PAO&amp;diff=69</id>
		<title>C3PAO</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=C3PAO&amp;diff=69"/>
		<updated>2024-09-30T01:31:47Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;C3PAOs (Certified Third-Party Assessment Organizations) are critical entities within the Cybersecurity Maturity Model Certification (CMMC) ecosystem. These organizations are accredited by the Cyber-AB (Cybersecurity Maturity Model Certification Accreditation Body) to perform official CMMC assessments for companies that seek certification, especially those that handle Controlled Unclassified Information (CUI) as part of contracts with the Department of Defense (DoD). C3PA...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;C3PAOs (Certified Third-Party Assessment Organizations) are critical entities within the Cybersecurity Maturity Model Certification (CMMC) ecosystem. These organizations are accredited by the Cyber-AB (Cybersecurity Maturity Model Certification Accreditation Body) to perform official CMMC assessments for companies that seek certification, especially those that handle Controlled Unclassified Information (CUI) as part of contracts with the Department of Defense (DoD). C3PAOs ensure that defense contractors comply with the required security practices based on the level of CMMC certification needed for their work with the DoD.&lt;br /&gt;
&lt;br /&gt;
==Role of C3PAOs in the CMMC Process:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Conducting CMMC Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
C3PAOs are authorized to conduct formal CMMC assessments for organizations within the Defense Industrial Base (DIB). These assessments evaluate whether a defense contractor or subcontractor meets the necessary cybersecurity requirements outlined in the CMMC framework.&lt;br /&gt;
&lt;br /&gt;
The C3PAO assesses the organization’s compliance with CMMC standards at Level 1 (Foundational), Level 2 (Advanced), or Level 3 (Expert), depending on the nature of the information they handle and the level of security required.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Assessing Against CMMC Requirements:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The C3PAO uses a Certified CMMC Assessor (CCA) to examine an organization’s implementation of specific cybersecurity practices and processes aligned with the NIST 800-171 controls and other requirements laid out by CMMC.&lt;br /&gt;
&lt;br /&gt;
Assessments may include verifying security controls, reviewing documentation, conducting interviews with staff, and testing security measures to ensure they are functioning as intended.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Providing Assessment Reports:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once an assessment is complete, the C3PAO generates a detailed assessment report that documents the organization’s cybersecurity posture. This report includes the level of certification achieved (based on how well the organization meets the requirements) and any gaps that may need remediation.&lt;br /&gt;
&lt;br /&gt;
The C3PAO submits this report to the Cyber-AB, which reviews the findings and issues the official CMMC certification to the organization if it meets the required standards.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - Ensuring CMMC Certification Compliance:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
C3PAOs are responsible for conducting assessments that are consistent, thorough, and compliant with the guidelines set by the Cyber-AB. The assessments must follow a standardized process to ensure fairness and accuracy.&lt;br /&gt;
&lt;br /&gt;
If an organization fails to meet the CMMC requirements during the assessment, the C3PAO provides feedback on deficiencies. The contractor then develops a Plan of Action and Milestones (POAM) to address these gaps and can schedule a reassessment once the necessary improvements have been made.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;5 - Supporting Ongoing CMMC Certification:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CMMC certifications are valid for three years, and C3PAOs play a role in conducting reassessments for organizations to ensure they maintain compliance with evolving cybersecurity requirements over time.&lt;br /&gt;
&lt;br /&gt;
==Accreditation of C3PAOs:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Cyber-AB Accreditation:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To become a C3PAO, an organization must be accredited by the Cyber-AB. This accreditation process includes a rigorous evaluation to ensure that the C3PAO has the necessary expertise, qualified assessors, and internal controls to perform accurate and unbiased CMMC assessments.&lt;br /&gt;
&lt;br /&gt;
C3PAOs must meet specific criteria regarding their capabilities, cybersecurity maturity, and experience in conducting assessments for security frameworks like NIST 800-171.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - C3PAO Qualifications:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
C3PAOs must employ Certified CMMC Assessors (CCAs), who are individuals trained and certified by the Cyber-AB to perform assessments. The CCA evaluates whether an organization meets the CMMC level it seeks.&lt;br /&gt;
&lt;br /&gt;
C3PAOs are also subject to periodic reviews and audits by the Cyber-AB to ensure they continue to meet the standards for accreditation and maintain the integrity of the CMMC assessment process.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - DoD and CMMC Certification Requirements:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Department of Defense (DoD) requires many contractors and subcontractors to achieve CMMC certification as a condition for bidding on and fulfilling DoD contracts that involve Federal Contract Information (FCI) or Controlled Unclassified Information (CUI).&lt;br /&gt;
&lt;br /&gt;
C3PAOs are the authorized entities that can perform the third-party assessments required for certification, particularly for Level 2 and Level 3 certifications, which mandate third-party assessments (as opposed to the Level 1 self-assessment option).&lt;br /&gt;
&lt;br /&gt;
==Role in the CMMC 2.0 Transition:==&lt;br /&gt;
&lt;br /&gt;
With the rollout of CMMC 2.0, the role of C3PAOs has been refined:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level 1 (Foundational):&#039;&#039;&#039; Contractors handling Federal Contract Information (FCI) will continue to perform self-assessments and submit results to the Supplier Performance Risk System (SPRS). C3PAOs are generally not involved in Level 1 certifications.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level 2 (Advanced):&#039;&#039;&#039; For contractors handling Controlled Unclassified Information (CUI), Level 2 certifications typically require a third-party assessment performed by a C3PAO. In some cases, a self-assessment may suffice, but for contracts involving more sensitive CUI, the DoD requires third-party validation from a C3PAO.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level 3 (Expert):&#039;&#039;&#039; For the most sensitive contracts, Level 3 will involve government-led assessments and may not require C3PAOs. However, C3PAOs will still play a key role in validating lower levels of cybersecurity compliance within the contractor community.&lt;br /&gt;
&lt;br /&gt;
==Key Responsibilities of C3PAOs:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Assessment Execution:&#039;&#039;&#039; C3PAOs execute formal CMMC assessments to determine if a contractor’s cybersecurity controls are in line with the CMMC model and associated requirements.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Verification of Compliance:&#039;&#039;&#039; C3PAOs verify that organizations have implemented the appropriate controls and processes to protect sensitive information, including controls related to access management, incident response, encryption, and risk management.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Maintaining Ethical Standards:&#039;&#039;&#039; C3PAOs must adhere to strict ethical guidelines to ensure impartiality and avoid conflicts of interest. They must not provide consulting services to the organizations they assess to avoid influencing the outcome of an assessment.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Reporting to the Cyber-AB:&#039;&#039;&#039; C3PAOs report their findings and assessment results to the Cyber-AB, which determines whether the organization seeking certification meets the requirements for a particular CMMC level.&lt;br /&gt;
&lt;br /&gt;
==Benefits of C3PAOs:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Impartial and Independent Assessments:&#039;&#039;&#039; C3PAOs provide an unbiased evaluation of an organization’s cybersecurity maturity. Their assessments are conducted independently of the contractors they assess, ensuring a fair and objective review of cybersecurity practices.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Trusted Expertise:&#039;&#039;&#039; C3PAOs are accredited based on their cybersecurity expertise and their ability to conduct thorough assessments, providing defense contractors with confidence that their certification process is handled by experienced professionals.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Facilitating Compliance:&#039;&#039;&#039; By conducting formal assessments, C3PAOs help defense contractors meet the DoD’s strict cybersecurity requirements, which are necessary to participate in the defense supply chain and handle sensitive DoD data.&lt;br /&gt;
&lt;br /&gt;
==CMMC Assessment Process by C3PAOs:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Pre-Assessment Preparation:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Contractors prepare for a CMMC assessment by reviewing the requirements for their desired CMMC level and implementing the necessary controls. Some organizations may engage Certified CMMC Professionals (CCPs) to help them prepare.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Formal Assessment:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The C3PAO sends a Certified CMMC Assessor (CCA) to conduct the formal assessment. The assessor evaluates whether the organization has implemented the required practices and processes, reviews documentation, and conducts interviews with personnel.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Assessment Report:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
After completing the assessment, the C3PAO generates a report detailing the findings. This report includes whether the contractor meets the required CMMC level and highlights any deficiencies that need to be addressed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - Certification Decision:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The assessment report is submitted to the Cyber-AB, which reviews the findings and issues the official certification if the contractor meets the required CMMC level. If gaps are identified, the contractor may need to address them before receiving certification.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
Certified Third-Party Assessment Organizations (C3PAOs) are essential to the CMMC ecosystem, providing independent and accredited assessments of defense contractors’ cybersecurity practices. Accredited by the Cyber-AB, C3PAOs ensure that defense contractors comply with the DoD’s stringent cybersecurity standards, particularly when handling Controlled Unclassified Information (CUI). They play a critical role in the CMMC 2.0 certification process by assessing contractors’ cybersecurity maturity and verifying compliance with required controls, thus helping secure the broader Defense Industrial Base (DIB) against cyber threats.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=SPRS&amp;diff=68</id>
		<title>SPRS</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=SPRS&amp;diff=68"/>
		<updated>2024-09-30T01:24:39Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;The Supplier Performance Risk System (SPRS) is a Department of Defense (DoD) platform used to assess and evaluate the performance, risks, and security posture of DoD suppliers. SPRS plays a critical role in the DoD’s acquisition process, providing procurement officials with performance ratings, risk assessments, and supplier compliance information, especially in relation to cybersecurity standards like NIST 800-171 and the Cybersecurity Maturity Model Certification (CM...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Supplier Performance Risk System (SPRS) is a Department of Defense (DoD) platform used to assess and evaluate the performance, risks, and security posture of DoD suppliers. SPRS plays a critical role in the DoD’s acquisition process, providing procurement officials with performance ratings, risk assessments, and supplier compliance information, especially in relation to cybersecurity standards like NIST 800-171 and the Cybersecurity Maturity Model Certification (CMMC). SPRS is a key component in ensuring that defense contractors meet the required security and performance standards when handling Controlled Unclassified Information (CUI) and Federal Contract Information (FCI).&lt;br /&gt;
&lt;br /&gt;
==Key Functions and Features of SPRS:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Supplier Performance Ratings:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SPRS allows the DoD to evaluate a supplier’s past performance based on data from government contracts. These performance ratings help contracting officers make informed decisions when awarding new contracts.&lt;br /&gt;
Performance ratings may cover aspects such as delivery timeliness, product quality, and contract fulfillment. The system aggregates performance data and provides a score that helps DoD personnel assess whether a supplier is reliable and meets the required standards.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Cybersecurity Compliance:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
One of the most important features of SPRS is its ability to track and verify suppliers&#039; compliance with cybersecurity requirements. This includes self-assessments for compliance with NIST 800-171 controls, which are critical for protecting CUI.&lt;br /&gt;
Defense contractors handling CUI must submit their NIST 800-171 self-assessment scores through SPRS, indicating their level of compliance with the 110 security controls outlined in the NIST 800-171 standard.&lt;br /&gt;
Contractors are required to assess their security posture, calculate a score, and submit it to SPRS. The score is based on the number of controls fully implemented, partially implemented, or not implemented. The perfect score is 110, and deductions are made for controls that are not yet fully in place.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Risk-Based Decision Making:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SPRS helps DoD procurement officials assess the overall risk of working with a particular supplier. This includes evaluating potential cybersecurity risks, performance risks, and any other issues that might impact the success of a project or contract.&lt;br /&gt;
SPRS generates a risk score for each supplier, based on their performance history, cybersecurity compliance, and other relevant factors. This risk score is considered when determining contract awards, giving preference to suppliers with lower risk profiles.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - CMMC Integration:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SPRS is expected to play a significant role in the Cybersecurity Maturity Model Certification (CMMC) process. As the DoD moves to implement CMMC 2.0, contractors will need to either self-assess or undergo third-party assessments depending on their CMMC level.&lt;br /&gt;
The SPRS platform will track the CMMC certification levels of defense contractors, allowing contracting officers to verify a supplier’s CMMC status and ensure that they meet the required cybersecurity standards for a given contract.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;5 - Supplier Risk Scoring:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In addition to performance and cybersecurity compliance, SPRS tracks various risk factors that could impact a supplier’s ability to fulfill contracts. These include financial stability, delivery risks, and operational risks that could affect contract execution.&lt;br /&gt;
SPRS assigns risk scores that reflect the likelihood of a supplier successfully delivering on a contract while adhering to DoD standards.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;6 - Information Access for Contracting Officers:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SPRS is accessible to DoD contracting officers, who use the system to gather critical information about suppliers during the procurement process. This allows them to make more informed, risk-based decisions about which suppliers to work with.&lt;br /&gt;
Contracting officers can review a supplier’s performance history, cybersecurity compliance, risk assessments, and CMMC certifications through SPRS when evaluating proposals and awarding contracts.&lt;br /&gt;
&lt;br /&gt;
==SPRS and NIST 800-171 Self-Assessment:==&lt;br /&gt;
&lt;br /&gt;
One of the critical uses of SPRS is the submission of NIST 800-171 self-assessment scores by defense contractors. Under DFARS 252.204-7019 and 252.204-7020, defense contractors are required to:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Perform a Self-Assessment:&#039;&#039;&#039; Contractors handling CUI must conduct a self-assessment of their cybersecurity practices based on the NIST 800-171 framework. This self-assessment measures the contractor’s compliance with the 110 security controls that aim to protect CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Submit the Score to SPRS:&#039;&#039;&#039; Once the self-assessment is complete, contractors calculate their score based on the degree to which they have implemented the 110 security controls. The score is submitted to SPRS, and contracting officers use this score to assess whether the contractor meets the required security standards.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Develop a Plan of Action (POAM):&#039;&#039;&#039; If there are gaps in compliance, contractors are expected to develop a Plan of Action and Milestones (POAM) to address those gaps and implement missing or incomplete controls over time. This plan is part of the assessment and is considered when determining the contractor&#039;s readiness for handling CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Scoring Scale:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The highest score is 110, which indicates full implementation of all NIST 800-171 controls.&lt;br /&gt;
* Contractors lose points based on how many controls are not fully implemented, with each control assigned a point value based on its importance to system security.&lt;br /&gt;
* Contractors must have their scores updated at least every three years, or more frequently if there are significant changes to their security posture.&lt;br /&gt;
&lt;br /&gt;
==SPRS and the Procurement Process:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Pre-Award Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Before awarding a contract, DoD contracting officers use SPRS to evaluate a supplier’s past performance and cybersecurity posture. This includes reviewing NIST 800-171 compliance scores and CMMC certification status.&lt;br /&gt;
&lt;br /&gt;
* Suppliers with high cybersecurity scores and strong performance histories are more likely to be awarded contracts, especially when the contract involves handling sensitive information such as CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Post-Award Monitoring:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SPRS continues to be used after a contract is awarded to monitor supplier performance and risk. Contractors are expected to maintain high cybersecurity standards throughout the life of the contract.&lt;br /&gt;
&lt;br /&gt;
* If a contractor’s cybersecurity posture deteriorates (e.g., by failing to address vulnerabilities or allowing their score to drop), this may impact their ability to win future contracts or lead to contract termination.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Benefits of SPRS:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Enhances Cybersecurity:&#039;&#039;&#039; By requiring contractors to submit cybersecurity compliance scores, SPRS helps improve the overall security of the Defense Industrial Base. Contractors are incentivized to implement and maintain strong cybersecurity practices to remain competitive in the DoD contracting process.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supports Risk-Based Decisions:&#039;&#039;&#039; SPRS provides DoD contracting officers with valuable data to assess supplier risks, helping them make informed, risk-based decisions during the procurement process.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Promotes Accountability:&#039;&#039;&#039; SPRS holds contractors accountable for their performance and cybersecurity practices, ensuring that only reliable, secure suppliers are awarded contracts to handle sensitive DoD projects.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
The Supplier Performance Risk System (SPRS) is a critical tool used by the Department of Defense (DoD) to evaluate the performance, cybersecurity posture, and risk profile of defense contractors. It plays a key role in ensuring compliance with cybersecurity standards like NIST 800-171 and supports the broader goals of the Cybersecurity Maturity Model Certification (CMMC) framework. SPRS helps DoD procurement officials make informed, risk-based decisions about which contractors to engage with, particularly when sensitive Controlled Unclassified Information (CUI) is involved, enhancing the overall security of the Defense Industrial Base.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=CMMC-AB&amp;diff=67</id>
		<title>CMMC-AB</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=CMMC-AB&amp;diff=67"/>
		<updated>2024-09-30T01:18:20Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;The Cyber-AB (Cybersecurity Maturity Model Certification Accreditation Body) is an independent, nonprofit organization responsible for overseeing the Cybersecurity Maturity Model Certification (CMMC) ecosystem. The Cyber-AB plays a crucial role in ensuring the effective implementation of the CMMC framework, which is designed to enhance cybersecurity practices across the Defense Industrial Base (DIB) by ensuring that contractors meet specific security requirements for...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Cyber-AB (Cybersecurity Maturity Model Certification Accreditation Body) is an independent, nonprofit organization responsible for overseeing the Cybersecurity Maturity Model Certification (CMMC) ecosystem. The Cyber-AB plays a crucial role in ensuring the effective implementation of the CMMC framework, which is designed to enhance cybersecurity practices across the Defense Industrial Base ([[DIB]]) by ensuring that contractors meet specific security requirements for handling Controlled Unclassified Information ([[CUI]]).&lt;br /&gt;
&lt;br /&gt;
==Key Roles and Responsibilities of the Cyber-AB:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Accreditation and Certification:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Cyber-AB is responsible for accrediting third-party organizations that conduct CMMC assessments, known as Certified Third-Party Assessment Organizations ([[C3PAOs]]).&lt;br /&gt;
&lt;br /&gt;
The Cyber-AB ensures that C3PAOs adhere to strict standards and are qualified to perform audits and assessments of contractors seeking CMMC certification.&lt;br /&gt;
&lt;br /&gt;
It also certifies Certified CMMC Assessors (CCAs), who are individual professionals trained and qualified to perform CMMC assessments.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Oversight of the CMMC Ecosystem:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Cyber-AB manages and oversees the entire CMMC ecosystem, ensuring that all parties involved—such as C3PAOs, certified assessors, and organizations seeking certification—comply with the established guidelines and processes of the CMMC framework.&lt;br /&gt;
It acts as the governing authority that provides the official procedures and guidance for how the CMMC process should be carried out across the DIB.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Training and Credentialing:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Cyber-AB develops and maintains the training programs for CMMC professionals, including Certified CMMC Assessors ([[CCAs]]) and Certified CMMC Professionals ([[CCPs]]).&lt;br /&gt;
&lt;br /&gt;
The training ensures that individuals involved in the CMMC process are fully knowledgeable of the CMMC model, NIST 800-171, and the requirements for assessing organizations for cybersecurity maturity.&lt;br /&gt;
&lt;br /&gt;
The Cyber-AB also oversees credentialing programs for individuals involved in CMMC assessments, such as assessors and support personnel.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - CMMC Assessment and Certification Framework:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Cyber-AB is responsible for the CMMC assessment process, including defining the procedures for how assessments are conducted, how results are verified, and how certification decisions are made.&lt;br /&gt;
&lt;br /&gt;
It ensures that certified organizations meet the appropriate level of security maturity based on the CMMC 2.0 levels (1 through 3).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;5 - Liaison Between Government and Industry:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Cyber-AB acts as a liaison between the Department of Defense (DoD) and the industry. It communicates updates, policy changes, and feedback from the DoD to C3PAOs, certified assessors, and defense contractors.&lt;br /&gt;
The organization works closely with the DoD’s Office of the Under Secretary of Defense for Acquisition &amp;amp; Sustainment (OUSD(A&amp;amp;S)), which oversees the implementation of CMMC requirements for federal contractors.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;6 - Protecting the Integrity of CMMC:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Cyber-AB is responsible for protecting the integrity of the CMMC certification process by ensuring that assessments are conducted fairly, consistently, and in accordance with the CMMC guidelines.&lt;br /&gt;
It monitors and enforces ethical standards among certified assessors and C3PAOs, ensuring that certifications are credible and valid.&lt;br /&gt;
&lt;br /&gt;
==Structure of the Cyber-AB:==&lt;br /&gt;
&lt;br /&gt;
The Cyber-AB operates as a nonprofit organization and has a board of directors and an executive leadership team that provide strategic direction and oversight. The board is made up of cybersecurity professionals, industry experts, and representatives from the DIB who help shape the policies and initiatives of the organization.&lt;br /&gt;
&lt;br /&gt;
The Cyber-AB also works closely with advisory groups and committees that provide input and feedback on the CMMC framework and its implementation across different industries.&lt;br /&gt;
&lt;br /&gt;
==Key Components of the CMMC Ecosystem Managed by the Cyber-AB:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1 - Certified Third-Party Assessment Organizations (C3PAOs):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
C3PAOs are independent organizations accredited by the Cyber-AB to perform CMMC assessments. These organizations are qualified to assess contractors seeking CMMC certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2 - Certified CMMC Assessors (CCAs):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCAs are individual professionals who have been trained and certified by the Cyber-AB to conduct CMMC assessments. These assessors are typically affiliated with C3PAOs and are responsible for evaluating contractors against the CMMC requirements.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3 - Certified CMMC Professionals (CCPs):&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
CCPs are individuals trained in the CMMC framework who support the assessment process and provide guidance to organizations seeking certification. While they are not authorized to lead assessments, they are critical in helping prepare organizations for the CMMC process.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4 - Certified Organizations:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Organizations in the Defense Industrial Base (DIB) that are required to obtain CMMC certification to handle Controlled Unclassified Information (CUI) or Federal Contract Information (FCI) work with certified assessors and C3PAOs to obtain the appropriate CMMC level of certification.&lt;br /&gt;
&lt;br /&gt;
==CMMC 2.0 and the Cyber-AB’s Role:==&lt;br /&gt;
&lt;br /&gt;
With the transition to CMMC 2.0, the Cyber-AB plays a critical role in implementing the updated model, which simplifies the original five levels of CMMC to three levels. Key elements of CMMC 2.0 include:&lt;br /&gt;
&lt;br /&gt;
* Level 1 (Foundational): Self-assessments for contractors handling Federal Contract Information (FCI).&lt;br /&gt;
* Level 2 (Advanced): Third-party assessments for contractors handling CUI.&lt;br /&gt;
* Level 3 (Expert): Advanced security controls with government-led assessments for the highest level of cybersecurity maturity.&lt;br /&gt;
The Cyber-AB is tasked with overseeing the changes and ensuring that the assessment process under CMMC 2.0 remains effective, while also ensuring that contractors adhere to the new self-assessment options or third-party assessment requirements.&lt;br /&gt;
&lt;br /&gt;
==Benefits of the Cyber-AB’s Role:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Standardization of Cybersecurity Assessments:&#039;&#039;&#039; The Cyber-AB ensures that assessments are standardized and consistently applied across all defense contractors, leading to greater cybersecurity resilience within the DIB.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Quality Control:&#039;&#039;&#039; By accrediting assessors and C3PAOs, the Cyber-AB ensures that only qualified professionals conduct assessments, thereby maintaining the credibility and integrity of the CMMC process.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Industry Support and Guidance:&#039;&#039;&#039; The Cyber-AB provides training, resources, and guidance to help organizations within the DIB understand and meet CMMC requirements, reducing confusion and easing the certification process.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Bridge Between Government and Industry:&#039;&#039;&#039; Acting as the liaison between the DoD and defense contractors, the Cyber-AB facilitates communication, feedback, and updates related to cybersecurity requirements and CMMC policies.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
The Cyber-AB (Cybersecurity Maturity Model Certification Accreditation Body) plays a critical role in the successful implementation of the CMMC framework. It oversees the accreditation of third-party assessors and organizations, manages the training and certification of CMMC professionals, and ensures that cybersecurity assessments are conducted consistently and fairly across the Defense Industrial Base (DIB). Through its efforts, the Cyber-AB helps enhance the security of organizations handling Controlled Unclassified Information (CUI) and improves the overall cybersecurity posture of the DIB, ensuring compliance with Department of Defense (DoD) requirements.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Risk_Assessment&amp;diff=66</id>
		<title>Risk Assessment</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Risk_Assessment&amp;diff=66"/>
		<updated>2024-09-30T01:08:34Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;The Risk Assessment family in NIST 800-171 Rev 2 focuses on ensuring that organizations have a structured process for identifying, assessing, and managing risks to their information systems and Controlled Unclassified Information (CUI). The goal is to help organizations understand their security risks, prioritize mitigation efforts, and protect sensitive information from potential threats and vulnerabilities.  ==Key Risk Assessment Requirements in NIST 800-171 Rev 2:==...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Risk Assessment family in NIST 800-171 Rev 2 focuses on ensuring that organizations have a structured process for identifying, assessing, and managing risks to their information systems and Controlled Unclassified Information (CUI). The goal is to help organizations understand their security risks, prioritize mitigation efforts, and protect sensitive information from potential threats and vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Key Risk Assessment Requirements in NIST 800-171 Rev 2:==&lt;br /&gt;
&lt;br /&gt;
The Risk Assessment family consists of three security requirements designed to guide organizations in identifying risks, assessing their potential impact, and taking steps to mitigate those risks.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Periodically Assess the Risk to Organizational Operations (3.11.1)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must periodically assess the risk to their operations, organizational assets, and individuals, resulting from the operation of their information systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conduct regular risk assessments to identify threats, vulnerabilities, and the potential impact of security incidents on CUI and organizational operations.&lt;br /&gt;
&lt;br /&gt;
* Ensure that risk assessments are performed consistently and at defined intervals (e.g., annually) or when significant changes occur, such as new systems or changes in the threat landscape.&lt;br /&gt;
&lt;br /&gt;
* The assessment should consider both internal and external threats, including cyberattacks, human errors, and environmental hazards.&lt;br /&gt;
&lt;br /&gt;
Example: Conducting an annual risk assessment that evaluates the organization’s exposure to ransomware, insider threats, and vulnerabilities in legacy systems, and prioritizing mitigation strategies based on the severity of the risks.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Scan for Vulnerabilities in Information Systems (3.11.2)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must regularly scan their information systems for vulnerabilities and remediate identified vulnerabilities to reduce their exposure to risks.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use vulnerability scanning tools to identify security weaknesses, such as unpatched software, misconfigurations, or open ports that could be exploited by attackers.&lt;br /&gt;
&lt;br /&gt;
* Ensure that vulnerability scans are performed regularly (e.g., monthly or quarterly) and after significant system changes (e.g., updates, new deployments).&lt;br /&gt;
&lt;br /&gt;
* Prioritize the remediation of identified vulnerabilities based on their risk level and potential impact on CUI.&lt;br /&gt;
&lt;br /&gt;
Example: Running automated vulnerability scans on the organization’s network and systems every quarter, then addressing high-risk vulnerabilities like outdated software or improperly configured servers.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Remediate Identified Risks (3.11.3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Derived Requirement: Organizations must take corrective actions to mitigate the risks identified during risk assessments or vulnerability scans.&lt;br /&gt;
&lt;br /&gt;
Key Focus:&lt;br /&gt;
&lt;br /&gt;
* After assessing risks, develop and implement a plan to address and mitigate them. This may include applying patches, updating software, reconfiguring systems, or implementing additional security controls.&lt;br /&gt;
&lt;br /&gt;
* Prioritize mitigation efforts based on the severity and potential impact of the identified risks, ensuring that high-risk vulnerabilities are addressed promptly.&lt;br /&gt;
&lt;br /&gt;
Example: After a vulnerability scan reveals critical security flaws in the organization’s firewall configuration, the IT team updates the firewall rules and applies patches within a specified time frame to minimize exposure.&lt;br /&gt;
&lt;br /&gt;
==Importance of Risk Assessment in Cybersecurity:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Proactive Risk Management:&#039;&#039;&#039; Risk assessments help organizations proactively identify potential threats and vulnerabilities before they are exploited, allowing them to address issues before they lead to security incidents.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Informed Decision-Making:&#039;&#039;&#039; By regularly assessing and understanding the organization’s risk landscape, leaders can make informed decisions about how to allocate resources to address high-priority risks and protect CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Compliance:&#039;&#039;&#039; Conducting regular risk assessments is a key component of compliance with NIST 800-171, which requires organizations to have a structured approach to identifying and managing security risks. Risk assessments also support compliance with other security frameworks and regulations.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Continuous Improvement:&#039;&#039;&#039; Ongoing risk assessments help organizations improve their cybersecurity posture over time by identifying new risks, monitoring the effectiveness of existing controls, and adapting to changes in the threat landscape.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Reduces Vulnerabilities:&#039;&#039;&#039; Regular vulnerability scanning and risk assessments ensure that organizations are aware of security gaps and can take action to mitigate vulnerabilities that could be exploited by attackers.&lt;br /&gt;
&lt;br /&gt;
==Best Practices for Risk Assessment:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Develop a Formal Risk Assessment Process:&#039;&#039;&#039; Establish a documented risk assessment process that includes the frequency of assessments, the scope of systems and data to be evaluated, and the methodology used to identify and assess risks.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Automated Vulnerability Scanning Tools:&#039;&#039;&#039; Implement automated tools to regularly scan for vulnerabilities and misconfigurations. Use these tools to detect both known vulnerabilities and newly emerging threats.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Prioritize Risks Based on Impact:&#039;&#039;&#039; After identifying risks, prioritize mitigation efforts based on the potential impact of each risk on CUI and organizational operations. Address high-severity risks first to minimize exposure.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Incorporate Risk Assessments into System Changes:&#039;&#039;&#039; Conduct risk assessments whenever significant changes are made to systems, such as adding new software, migrating to the cloud, or updating critical infrastructure. This helps identify any new vulnerabilities that may arise from changes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Maintain an Up-to-Date Risk Register:&#039;&#039;&#039; Keep a risk register that documents identified risks, the likelihood and impact of each risk, and the actions taken to mitigate them. Regularly review and update this register as part of the risk management process.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Remediate Risks Promptly:&#039;&#039;&#039; Once risks are identified, take immediate action to remediate them. Develop and implement mitigation strategies, such as applying patches, updating security configurations, or implementing additional controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Engage Cross-Functional Teams:&#039;&#039;&#039; Ensure that risk assessments involve cross-functional teams, including IT, security, management, and other relevant stakeholders. This ensures that risks are identified from multiple perspectives and that mitigation efforts are aligned with organizational goals.&lt;br /&gt;
&lt;br /&gt;
==Key Phases of Risk Assessment:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Risk Identification:&#039;&#039;&#039; Identify potential risks that could affect the organization’s information systems and CUI. This includes identifying threats, vulnerabilities, and the potential impact of different security incidents.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Risk Analysis:&#039;&#039;&#039; Assess the likelihood and potential impact of each identified risk. This phase helps prioritize which risks need to be addressed based on their severity and the potential consequences for the organization.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Risk Mitigation:&#039;&#039;&#039; Develop and implement mitigation strategies to address high-priority risks. This may involve applying security patches, configuring systems more securely, or adding new security controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Monitoring and Review:&#039;&#039;&#039; Continuously monitor the effectiveness of risk mitigation efforts and update the risk assessment as new risks emerge or systems change. This ensures that the organization’s security posture remains strong over time.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
The Risk Assessment family in NIST 800-171 Rev 2 is essential for helping organizations identify, assess, and manage security risks to Controlled Unclassified Information (CUI). By conducting regular risk assessments, scanning for vulnerabilities, and addressing identified risks through prompt remediation, organizations can reduce their exposure to threats and improve their overall cybersecurity posture. Implementing a structured and continuous risk assessment process helps organizations stay compliant with NIST 800-171, protect sensitive information, and proactively manage emerging threats.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=System_and_Information_Integrity&amp;diff=65</id>
		<title>System and Information Integrity</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=System_and_Information_Integrity&amp;diff=65"/>
		<updated>2024-09-30T01:04:06Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;The System and Information Integrity family in NIST 800-171 Rev 2 focuses on ensuring that an organization’s information systems can detect, respond to, and correct issues that may compromise the integrity and security of Controlled Unclassified Information (CUI). This family emphasizes the importance of monitoring systems for vulnerabilities, applying security patches promptly, and ensuring that malicious software and unauthorized system changes are detected and addre...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The System and Information Integrity family in NIST 800-171 Rev 2 focuses on ensuring that an organization’s information systems can detect, respond to, and correct issues that may compromise the integrity and security of Controlled Unclassified Information (CUI). This family emphasizes the importance of monitoring systems for vulnerabilities, applying security patches promptly, and ensuring that malicious software and unauthorized system changes are detected and addressed.&lt;br /&gt;
&lt;br /&gt;
==Key System and Information Integrity Requirements in NIST 800-171 Rev 2:==&lt;br /&gt;
&lt;br /&gt;
The System and Information Integrity family contains seven security requirements designed to help organizations protect their information systems from vulnerabilities, malware, and unauthorized modifications while ensuring the integrity of CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Identify, Report, and Correct Information System Flaws (3.14.1)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must identify, report, and correct flaws in information systems in a timely manner.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Regularly scan systems for security vulnerabilities and flaws.&lt;br /&gt;
&lt;br /&gt;
* Develop a process for reporting and addressing identified flaws, such as missing patches, software bugs, or misconfigurations.&lt;br /&gt;
&lt;br /&gt;
* Apply patches and updates promptly to reduce exposure to known vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Example: Using vulnerability scanning tools to identify outdated software or missing patches and applying security updates within a defined timeframe.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Provide Protection from Malicious Code (3.14.2)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must protect their information systems from malicious code (e.g., viruses, malware, ransomware) by implementing appropriate defensive measures.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Deploy and maintain antivirus software, anti-malware tools, and other technologies to detect, prevent, and mitigate malicious code.&lt;br /&gt;
&lt;br /&gt;
* Ensure that these tools are updated regularly to detect the latest threats.&lt;br /&gt;
&lt;br /&gt;
Example: Installing and regularly updating antivirus software across all endpoints and scanning incoming files, emails, and web downloads for malware.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Monitor System Security Alerts and Take Action (3.14.3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must monitor security alerts, advisories, and directives from various sources (e.g., security vendors, threat intelligence feeds) and take action to protect their systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Regularly review alerts and advisories from sources such as software vendors, the Cybersecurity and Infrastructure Security Agency (CISA), or other trusted organizations.&lt;br /&gt;
&lt;br /&gt;
* Implement corrective actions based on the severity and relevance of the alerts to ensure system security.&lt;br /&gt;
&lt;br /&gt;
Example: Subscribing to a threat intelligence feed and applying critical security patches when new vulnerabilities are discovered in widely used software.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Update Malicious Code Protection Mechanisms (3.14.4)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must regularly update mechanisms that protect against malicious code (e.g., antivirus software, firewalls) to ensure they remain effective against evolving threats.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Ensure that all anti-malware tools are configured to automatically update virus definitions and security signatures to stay protected against the latest malware threats.&lt;br /&gt;
&lt;br /&gt;
Example: Configuring antivirus software to receive automatic updates from the vendor to ensure it detects new malware strains.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;5. Perform Periodic System Scans for Vulnerabilities (3.14.5)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must regularly perform vulnerability scans of their information systems to identify potential weaknesses or security gaps.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Schedule regular scans (e.g., monthly or quarterly) using vulnerability scanning tools to identify unpatched software, misconfigurations, or other system vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
* Ensure that scan results are reviewed and corrective actions are taken to address identified issues.&lt;br /&gt;
&lt;br /&gt;
Example: Running a network-wide vulnerability scan every month to detect and fix missing security patches or open ports that could be exploited by attackers.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;6. Perform Real-Time Monitoring of System and Network Activities (3.14.6)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must implement mechanisms to monitor system and network activities in real time to detect and respond to security events and anomalies.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use real-time monitoring tools, such as intrusion detection systems (IDS), security information and event management (SIEM) systems, and network traffic monitoring tools, to detect unusual activities and potential security breaches.&lt;br /&gt;
&lt;br /&gt;
Example: Using a SIEM system to analyze logs and network traffic in real time and generate alerts if suspicious activities are detected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;7. Identify Unauthorized Use of Information Systems (3.14.7)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must implement measures to identify the unauthorized use of information systems and respond accordingly.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Monitor systems for any unauthorized access attempts, privilege escalations, or the use of accounts that do not have the proper permissions.&lt;br /&gt;
&lt;br /&gt;
* Take corrective action when unauthorized activities are detected, such as disabling compromised accounts or blocking malicious IP addresses.&lt;br /&gt;
&lt;br /&gt;
Example: Implementing user behavior analytics (UBA) to detect unusual login patterns that might indicate unauthorized access, such as repeated login attempts from unusual geographic locations.&lt;br /&gt;
&lt;br /&gt;
==Importance of System and Information Integrity in Cybersecurity:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Prevents Security Incidents:&#039;&#039;&#039; Regularly scanning for vulnerabilities, applying patches, and monitoring system activity helps prevent security incidents like data breaches, malware infections, and unauthorized access to CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Protects Against Malicious Software:&#039;&#039;&#039; Implementing and maintaining up-to-date malware protection mechanisms such as antivirus software and intrusion detection systems helps prevent the spread of malicious code that could compromise sensitive data.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ensures System Reliability:&#039;&#039;&#039; Maintaining the integrity of information systems ensures they function as intended without being compromised by flaws or unauthorized modifications. This helps prevent system downtime and ensures CUI remains secure.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Enables Timely Detection of Threats:&#039;&#039;&#039; Continuous monitoring of systems and real-time analysis of security alerts allows organizations to detect and respond to security threats before they can cause significant damage.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supports Compliance:&#039;&#039;&#039; Organizations must ensure the integrity of their systems to comply with NIST 800-171 and other regulations governing the protection of CUI. Failing to address system vulnerabilities or allowing malware infections to occur could result in regulatory penalties.&lt;br /&gt;
&lt;br /&gt;
==Best Practices for System and Information Integrity:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Automate Vulnerability Scanning and Patching:&#039;&#039;&#039; Use automated tools to scan for vulnerabilities and apply security patches as soon as they are released. Schedule scans at regular intervals to ensure your systems are always up to date.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Real-Time Monitoring Tools:&#039;&#039;&#039; Implement SIEM systems, IDS/IPS, and other monitoring tools that provide real-time visibility into system and network activity, allowing you to quickly detect and respond to suspicious behavior.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Deploy and Update Antivirus and Anti-Malware Software:&#039;&#039;&#039; Ensure that all endpoints and servers are protected by up-to-date antivirus and anti-malware software that automatically receives the latest virus definitions and updates.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Implement Threat Intelligence Feeds:&#039;&#039;&#039; Subscribe to threat intelligence feeds and stay informed about the latest security advisories and directives from trusted sources like CISA, NIST, or software vendors.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Train Employees on System Security:&#039;&#039;&#039; Educate employees about the importance of system integrity, how to recognize potential security threats (e.g., phishing emails or malware infections), and how to report suspicious activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Respond Quickly to Alerts:&#039;&#039;&#039; When security alerts are received from monitoring systems or threat intelligence sources, take immediate action to investigate and mitigate any identified risks.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Review and Remediate Vulnerability Scan Results:&#039;&#039;&#039; After performing vulnerability scans, review the results carefully and implement corrective actions for any identified issues, such as applying patches or adjusting system configurations.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
The System and Information Integrity family in NIST 800-171 Rev 2 emphasizes the importance of maintaining the security, integrity, and functionality of an organization’s information systems. By regularly scanning for vulnerabilities, applying security patches, protecting against malicious code, and monitoring system activities, organizations can ensure that Controlled Unclassified Information (CUI) remains protected from security threats. Implementing these controls helps prevent security incidents, ensures compliance with regulatory requirements, and supports the overall integrity and reliability of information systems.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=System_and_Communications_Protection&amp;diff=64</id>
		<title>System and Communications Protection</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=System_and_Communications_Protection&amp;diff=64"/>
		<updated>2024-09-30T00:56:10Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;The System and Communications Protection family in NIST 800-171 Rev 2 addresses the safeguards necessary to protect the security and confidentiality of Controlled Unclassified Information (CUI) as it is processed, transmitted, or stored within an organization&amp;#039;s information systems. This family emphasizes the need to secure both system boundaries and communication channels to prevent unauthorized access, tampering, or data leakage.  ==Key System and Communications Protect...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The System and Communications Protection family in NIST 800-171 Rev 2 addresses the safeguards necessary to protect the security and confidentiality of Controlled Unclassified Information (CUI) as it is processed, transmitted, or stored within an organization&#039;s information systems. This family emphasizes the need to secure both system boundaries and communication channels to prevent unauthorized access, tampering, or data leakage.&lt;br /&gt;
&lt;br /&gt;
==Key System and Communications Protection Requirements in NIST 800-171 Rev 2:==&lt;br /&gt;
&lt;br /&gt;
The System and Communications Protection family contains 16 security requirements that focus on ensuring the confidentiality and integrity of data in transit, protecting system boundaries, and preventing unauthorized access to systems and communications.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Monitor and Control Communications at System Boundaries (3.13.1)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must monitor and control communications at external boundaries and key internal boundaries of the information system.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use firewalls, gateways, and intrusion detection/prevention systems (IDS/IPS) to monitor and control traffic entering and leaving the network.&lt;br /&gt;
&lt;br /&gt;
* Ensure that only authorized communications and traffic are allowed to cross system boundaries.&lt;br /&gt;
&lt;br /&gt;
Example: Implementing firewalls to block unauthorized incoming traffic and using IDS/IPS to detect and respond to potential security threats.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Implement Subnetworks for Publicly Accessible System Components (3.13.2)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must implement demilitarized zones (DMZs) or subnetworks to separate publicly accessible system components (e.g., web servers) from internal systems where CUI is stored.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Isolate publicly accessible systems (e.g., public websites, external servers) from internal networks to protect sensitive systems and data from external threats.&lt;br /&gt;
&lt;br /&gt;
Example: Placing a company’s web server in a DMZ to limit access to internal systems, ensuring that external users cannot directly access the internal network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Deny Network Communications Traffic by Default and Allow Only Authorized Traffic (3.13.3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must configure systems to deny network communications traffic by default and allow only authorized traffic.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement a default deny policy, where all traffic is blocked unless explicitly permitted by firewall or system rules.&lt;br /&gt;
&lt;br /&gt;
* This reduces the attack surface and ensures only necessary and authorized traffic is allowed.&lt;br /&gt;
&lt;br /&gt;
Example: Configuring firewalls to block all inbound traffic except for specific IP addresses or ports needed for authorized services.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Control the Flow of CUI Between System Components (3.13.4)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must control the flow of CUI within and between system components to prevent unauthorized access, modification, or leakage.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement internal controls to restrict how CUI moves across systems, ensuring that only authorized systems and users can access or transfer CUI.&lt;br /&gt;
&lt;br /&gt;
Example: Using network segmentation to limit access to CUI to specific parts of the network, ensuring that only authorized systems can access sensitive data.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;5. Separate User Functionality from Administrative Functions (3.13.5)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must ensure that user functionality is separate from administrative functions.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Regular users should not have access to administrative controls or tools, which could be exploited to alter system configurations or access sensitive data.&lt;br /&gt;
&lt;br /&gt;
Example: Using separate accounts for administrative tasks, ensuring that day-to-day user accounts do not have elevated privileges or access to system administration functions.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;6. Prevent Unauthorized and Unintended Information Transfer (3.13.6)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must implement measures to prevent unauthorized and unintended transfer of CUI via shared resources or services, such as cloud storage or file-sharing systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Prevent unauthorized information transfer by securing shared systems, ensuring that only authorized users can access shared resources that handle CUI.&lt;br /&gt;
&lt;br /&gt;
Example: Configuring access controls on shared network drives to prevent unauthorized users from viewing or copying CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;7. Implement Cryptographic Protection for CUI (3.13.7)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must use cryptographic mechanisms to protect the confidentiality of CUI when transmitted across networks and stored on systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Ensure that CUI is encrypted during transmission (e.g., using TLS for web traffic or IPsec for VPNs) and at rest (e.g., using AES encryption for stored data).&lt;br /&gt;
&lt;br /&gt;
* Encryption should meet federal standards, such as FIPS 140-2.&lt;br /&gt;
&lt;br /&gt;
Example: Encrypting sensitive emails using S/MIME or encrypting files stored in cloud storage using AES-256.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;8. Terminate Network Connections After Periods of Inactivity (3.13.8)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must automatically terminate network sessions or connections after defined periods of inactivity to prevent unauthorized access.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement session timeout mechanisms to automatically log off or disconnect users after a specific period of inactivity.&lt;br /&gt;
&lt;br /&gt;
Example: Automatically terminating remote desktop sessions after 15 minutes of inactivity.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;9. Establish a Trusted Communications Path (3.13.9)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must ensure that secure and trusted communications paths are used for critical system functions, such as authentication and data transmission.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use secure communication channels (e.g., SSL/TLS, VPNs) to protect sensitive data and ensure secure user interactions with the system.&lt;br /&gt;
&lt;br /&gt;
Example: Requiring SSL/TLS encryption for all internal web applications that handle CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;10. Separate Communications of Users from Those of Processes (3.13.10)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must ensure that user communications (e.g., emails, instant messaging) are kept separate from system-level communications or processes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Prevent interference or exposure of system communications by isolating user-level interactions from core system functions.&lt;br /&gt;
&lt;br /&gt;
Example: Configuring separate communication channels for internal administrative functions versus user access to system resources.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;11. Prevent Remote Activation of Collaborative Computing Devices (3.13.11)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must prevent the unauthorized or remote activation of collaborative computing devices, such as video or audio conferencing systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Ensure that collaborative tools, such as webcams and microphones, cannot be activated remotely without proper authorization.&lt;br /&gt;
&lt;br /&gt;
Example: Disabling remote access to video conferencing systems unless explicitly authorized by the system administrator.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;12. Control and Protect Cryptographic Keys (3.13.12)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must control and securely manage cryptographic keys used for protecting CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement secure key management practices, such as using hardware security modules (HSMs) or key vaults to store and protect encryption keys.&lt;br /&gt;
&lt;br /&gt;
Example: Storing cryptographic keys in an HSM and ensuring they are rotated and backed up securely.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;13. Implement DNS Filtering and Protection (3.13.13)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must implement Domain Name System (DNS) filtering and protection mechanisms to prevent unauthorized or malicious domain resolution requests.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use DNS filtering services to block access to known malicious domains, protecting the network from malware or phishing attacks.&lt;br /&gt;
&lt;br /&gt;
Example: Using a DNS filtering service to block access to websites known to host malware or phishing campaigns.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;14. Control Wireless Access (3.13.14)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must control wireless access to systems that handle CUI to prevent unauthorized connections.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use encryption (e.g., WPA2 or WPA3) to secure wireless networks and limit wireless access to authorized users and devices.&lt;br /&gt;
&lt;br /&gt;
Example: Requiring multi-factor authentication (MFA) for wireless network access in areas where CUI is processed or stored.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;15. Protect the Confidentiality of CUI Using Secure Remote Access (3.13.15)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must ensure the confidentiality of CUI when it is accessed remotely by implementing secure remote access methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use secure remote access tools such as VPNs or encrypted tunnels to protect CUI during remote access sessions.&lt;br /&gt;
&lt;br /&gt;
* Ensure remote access is granted only to authorized users with strong authentication mechanisms, such as multi-factor authentication (MFA).&lt;br /&gt;
&lt;br /&gt;
Example: Requiring all remote workers to use a VPN with multi-factor authentication to access the organization&#039;s network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;16. Route Remote Access Connections Through Managed Access Control Points (3.13.16)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; All remote access connections to internal systems must pass through managed access control points, such as firewalls, VPN gateways, or other access control systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Ensure that remote access is filtered, monitored, and secured by routing all connections through centralized access control points that enforce security policies.&lt;br /&gt;
&lt;br /&gt;
Example: Routing all VPN traffic through a central firewall for inspection and logging before it can access internal systems.&lt;br /&gt;
&lt;br /&gt;
==Importance of System and Communications Protection in Cybersecurity:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Prevents Data Leaks:&#039;&#039;&#039; Implementing cryptographic protections and controlling communications flow ensures that sensitive CUI is not exposed to unauthorized individuals, reducing the risk of data breaches.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Protects System Boundaries:&#039;&#039;&#039; By monitoring and controlling communications at system boundaries, organizations can protect against external threats, such as hackers or malware, that attempt to exploit network vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ensures Secure Data Transmission:&#039;&#039;&#039; Encrypting data in transit and at rest helps ensure that CUI is protected from interception, tampering, or unauthorized access as it moves across networks or is stored on systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Prevents Unauthorized Access:&#039;&#039;&#039; By controlling remote access, wireless access, and internal communications, organizations can prevent unauthorized users or devices from accessing systems that handle CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supports Compliance:&#039;&#039;&#039; System and communications protection controls help organizations comply with NIST 800-171 requirements and other regulations that mandate the protection of sensitive information from unauthorized access or disclosure.&lt;br /&gt;
&lt;br /&gt;
==Best Practices for System and Communications Protection:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Encrypt Data in Transit and at Rest:&#039;&#039;&#039; Always use encryption to protect CUI when it is transmitted over networks or stored on devices. Ensure that encryption methods meet federal standards, such as FIPS 140-2.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Firewalls and IDS/IPS:&#039;&#039;&#039; Deploy firewalls and intrusion detection/prevention systems to monitor and control traffic at system boundaries, ensuring that only authorized traffic is allowed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Segment Networks:&#039;&#039;&#039; Implement network segmentation to isolate sensitive systems from publicly accessible or less secure systems, reducing the attack surface.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Remote Access:&#039;&#039;&#039; Use VPNs, MFA, and strong encryption for remote access to ensure that only authorized users can access systems handling CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Implement DNS Filtering:&#039;&#039;&#039; Use DNS filtering to block access to known malicious domains and prevent users from accidentally visiting sites that could compromise system security.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Control Wireless Access:&#039;&#039;&#039; Use strong encryption protocols (e.g., WPA2 or WPA3) for wireless networks and ensure that wireless access is limited to authorized users.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Manage Cryptographic Keys Securely:&#039;&#039;&#039; Implement key management solutions to protect cryptographic keys from unauthorized access, ensuring that they are stored securely and rotated regularly.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
The System and Communications Protection family in NIST 800-171 Rev 2 is critical for ensuring the security of communications and protecting Controlled Unclassified Information (CUI) as it moves through an organization’s systems and networks. By implementing controls such as encryption, firewalls, network segmentation, and secure remote access, organizations can safeguard the confidentiality and integrity of CUI, prevent unauthorized access, and comply with regulatory requirements. Proper system and communications protection is essential for maintaining a strong and resilient cybersecurity posture.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Security_Assessment&amp;diff=63</id>
		<title>Security Assessment</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Security_Assessment&amp;diff=63"/>
		<updated>2024-09-30T00:46:39Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;The Security Assessment family in NIST 800-171 Rev 2 focuses on ensuring that organizations regularly evaluate and improve their information system security controls and practices to protect Controlled Unclassified Information (CUI). The purpose of this family is to establish a formal process for assessing security controls, conducting regular system reviews, and ensuring continuous monitoring to identify and address potential vulnerabilities or weaknesses in security....&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Security Assessment family in NIST 800-171 Rev 2 focuses on ensuring that organizations regularly evaluate and improve their information system security controls and practices to protect Controlled Unclassified Information (CUI). The purpose of this family is to establish a formal process for assessing security controls, conducting regular system reviews, and ensuring continuous monitoring to identify and address potential vulnerabilities or weaknesses in security.&lt;br /&gt;
&lt;br /&gt;
==Key Security Assessment Requirements in NIST 800-171 Rev 2:==&lt;br /&gt;
&lt;br /&gt;
The Security Assessment family contains three security requirements that emphasize the need to assess and monitor the security posture of an organization’s systems, ensuring compliance with security requirements and continuous improvement of security measures.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Develop, Document, and Assess Security Controls (3.12.1)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Basic Requirement: Organizations must develop, document, and assess the security controls employed within their information systems to determine their effectiveness and ensure they meet the required standards for protecting CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create and maintain a security assessment plan that outlines the procedures for evaluating the effectiveness of security controls.&lt;br /&gt;
&lt;br /&gt;
* Regularly assess whether security controls (e.g., access control, encryption, monitoring) are functioning as intended and are sufficient to protect CUI.&lt;br /&gt;
&lt;br /&gt;
* Document the results of security assessments to ensure that the organization can identify weaknesses and take corrective actions.&lt;br /&gt;
&lt;br /&gt;
Example: Conducting an annual review of all security controls, such as firewalls, encryption methods, and access control systems, to ensure they are aligned with the latest security requirements and threats.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Develop and Implement Plans of Action (3.12.2)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must develop and implement plans of action designed to address weaknesses or deficiencies identified during security assessments or through continuous monitoring efforts.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* After identifying vulnerabilities or weaknesses, develop actionable plans to mitigate risks, implement security patches, or make configuration changes to strengthen the security posture.&lt;br /&gt;
&lt;br /&gt;
* The plan of action should include timelines for completing remediation and assigning responsibilities for addressing each issue.&lt;br /&gt;
&lt;br /&gt;
* Continuously update and track progress on the action plans to ensure that identified weaknesses are addressed in a timely manner.&lt;br /&gt;
&lt;br /&gt;
Example: After a security assessment reveals a vulnerability in an outdated software version, developing a plan to upgrade the software and applying necessary security patches within 30 days.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Monitor Security Controls on an Ongoing Basis (3.12.3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Basic Requirement: Organizations must monitor their security controls on an ongoing basis to ensure they continue to be effective and to detect and respond to any changes that could impact system security.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement continuous monitoring of security controls, including real-time monitoring tools, periodic audits, and reviews to assess the ongoing effectiveness of controls.&lt;br /&gt;
&lt;br /&gt;
* Continuously track and respond to changes in the organization’s environment, such as new threats, configuration changes, or software updates, that may impact security controls.&lt;br /&gt;
&lt;br /&gt;
* Ensure that continuous monitoring provides visibility into potential security issues and ensures timely detection and response to any new vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Example: Using a Security Information and Event Management (SIEM) system to continuously monitor network traffic for anomalies and potential security incidents.&lt;br /&gt;
&lt;br /&gt;
==Importance of Security Assessment in Cybersecurity:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ensures Compliance:&#039;&#039;&#039; Regular security assessments help ensure that the organization complies with security requirements like those outlined in NIST 800-171 and other regulations governing the protection of CUI. This helps prevent non-compliance issues, which could result in fines or loss of business.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Identifies Vulnerabilities Early:&#039;&#039;&#039; By regularly assessing security controls, organizations can identify and address vulnerabilities before they are exploited by attackers. This proactive approach helps reduce the likelihood of data breaches or other security incidents.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Improves Security Posture:&#039;&#039;&#039; Ongoing security assessments and continuous monitoring ensure that the organization’s security posture remains strong and adaptive to new threats. This allows organizations to keep pace with evolving cybersecurity challenges and address weaknesses as they arise.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supports Risk Management:&#039;&#039;&#039; Security assessments provide critical information needed for effective risk management. By identifying risks, assessing their potential impact, and developing action plans to mitigate them, organizations can manage security risks more effectively.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Enables Continuous Improvement:&#039;&#039;&#039; Regular assessments provide opportunities for continuous improvement in security practices. By evaluating the effectiveness of existing controls, organizations can fine-tune their security measures and improve their defenses over time.&lt;br /&gt;
&lt;br /&gt;
==Best Practices for Security Assessments:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Develop a Security Assessment Plan:&#039;&#039;&#039; Create a detailed plan that defines how and when security assessments will be conducted, including the scope, frequency, and methodology for evaluating security controls.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Conduct Regular Audits and Reviews:&#039;&#039;&#039; Perform periodic audits of security controls, such as quarterly or annual reviews, to evaluate whether the controls are still effective in protecting CUI and meeting security requirements.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Automated Monitoring Tools:&#039;&#039;&#039; Leverage automated tools like SIEM systems, vulnerability scanners, and intrusion detection/prevention systems (IDS/IPS) to continuously monitor security controls and detect potential weaknesses in real-time.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Respond Quickly to Identified Weaknesses:&#039;&#039;&#039; When vulnerabilities or deficiencies are identified during assessments or monitoring, take swift action to mitigate the risks. Develop a plan of action with clear deadlines and assign responsibility for remediation.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Maintain Documentation:&#039;&#039;&#039; Keep comprehensive records of all security assessments, findings, and corrective actions. This documentation is essential for tracking progress, demonstrating compliance, and conducting post-incident reviews.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Incorporate Lessons Learned:&#039;&#039;&#039; After security incidents or assessments, review the results and incorporate lessons learned into the security program. Update security policies, controls, and procedures to reflect these improvements.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Coordinate Assessments with Other Security Functions:&#039;&#039;&#039; Align security assessments with other cybersecurity functions such as incident response, vulnerability management, and risk assessments to provide a comprehensive view of the organization’s security posture.&lt;br /&gt;
&lt;br /&gt;
==Phases of Security Assessment:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Planning:&#039;&#039;&#039; Develop a security assessment plan that includes the objectives, scope, and methodology for assessing security controls. Identify the systems, controls, and processes to be evaluated.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Execution:&#039;&#039;&#039; Perform the security assessment, using tools such as vulnerability scanners, penetration testing, or manual reviews of controls. Collect and analyze data to identify any weaknesses or gaps.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Analysis:&#039;&#039;&#039; Analyze the findings from the assessment to determine the effectiveness of security controls and identify any areas where improvements are needed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Reporting:&#039;&#039;&#039; Document the results of the assessment, including any vulnerabilities, deficiencies, or security gaps that were identified. Provide recommendations for addressing the issues.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Remediation:&#039;&#039;&#039; Develop and implement plans of action to address the identified weaknesses. This may involve applying security patches, changing configurations, updating software, or implementing additional security measures.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Continuous Monitoring:&#039;&#039;&#039; After the assessment, continuously monitor security controls to ensure they remain effective and to detect any new vulnerabilities or threats.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
The Security Assessment family in NIST 800-171 Rev 2 emphasizes the importance of regularly assessing, monitoring, and improving an organization’s security controls to protect Controlled Unclassified Information (CUI). By developing a formal assessment plan, addressing identified weaknesses with actionable plans, and continuously monitoring security controls, organizations can maintain a strong security posture, ensure compliance with regulatory requirements, and reduce the risk of data breaches or security incidents. Regular security assessments and continuous monitoring are key components of a proactive and resilient cybersecurity strategy.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Physical_Protection&amp;diff=62</id>
		<title>Physical Protection</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Physical_Protection&amp;diff=62"/>
		<updated>2024-09-30T00:41:51Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;The Physical Protection family in NIST 800-171 Rev 2 focuses on safeguarding Controlled Unclassified Information (CUI) by implementing physical security measures that protect information systems and their associated facilities from unauthorized physical access, tampering, or destruction. This family addresses the need to control physical access to systems, devices, and media that contain CUI, ensuring that only authorized personnel can access sensitive information.  ==Ke...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Physical Protection family in NIST 800-171 Rev 2 focuses on safeguarding Controlled Unclassified Information (CUI) by implementing physical security measures that protect information systems and their associated facilities from unauthorized physical access, tampering, or destruction. This family addresses the need to control physical access to systems, devices, and media that contain CUI, ensuring that only authorized personnel can access sensitive information.&lt;br /&gt;
&lt;br /&gt;
==Key Physical Protection Requirements in NIST 800-171 Rev 2:==&lt;br /&gt;
&lt;br /&gt;
The Physical Protection family consists of six security requirements designed to control and monitor physical access to facilities and systems, secure sensitive areas, and manage the handling and storage of CUI-related media.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Limit Physical Access to Systems Containing CUI (3.10.1)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must limit physical access to information systems, equipment, and the areas where they are located to only authorized individuals.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Restrict physical access to systems, workstations, and storage areas that house CUI to individuals who have a legitimate need to access those areas.&lt;br /&gt;
&lt;br /&gt;
* Use mechanisms such as locks, keycards, or biometric access controls to enforce physical security.&lt;br /&gt;
&lt;br /&gt;
Example: Installing keycard readers on doors leading to server rooms or secure areas where CUI is processed or stored, ensuring that only authorized employees can enter.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Protect and Monitor the Physical Access to Facilities (3.10.2)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Basic Requirement: Organizations must protect and monitor physical access to facilities where CUI is stored or processed, ensuring that unauthorized individuals cannot gain entry.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement security measures such as surveillance cameras, security guards, or alarms to monitor and control access to sensitive areas.&lt;br /&gt;
&lt;br /&gt;
* Monitor physical access to facilities by maintaining logs or using automated systems to track who enters and exits secure areas.&lt;br /&gt;
&lt;br /&gt;
Example: Using CCTV cameras to monitor entry points and keeping an access log that records when individuals enter and exit secure areas.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Escort Visitors and Monitor Visitor Activity (3.10.3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must ensure that visitors are escorted and that their activities are monitored when they are granted access to areas where CUI is processed or stored.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Visitors (such as contractors, vendors, or auditors) who require access to secure areas should be accompanied by authorized personnel at all times.&lt;br /&gt;
&lt;br /&gt;
* Monitor and document the activities of visitors to ensure that they do not access or tamper with CUI or sensitive systems.&lt;br /&gt;
&lt;br /&gt;
Example: Escorting a third-party technician while they perform maintenance on systems in a secure area and ensuring that they do not access unauthorized systems or data.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Maintain Audit Logs of Physical Access (3.10.4)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must maintain audit logs of physical access to areas where CUI is stored or processed to ensure that all access is tracked and can be reviewed if necessary.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Keep detailed records of who accesses secure areas, including employees and visitors, by maintaining access logs (either manually or through an automated system).&lt;br /&gt;
&lt;br /&gt;
* Ensure these logs are reviewed periodically to detect any suspicious or unauthorized access attempts.&lt;br /&gt;
&lt;br /&gt;
Example: Using a keycard access control system that automatically logs the entry and exit of individuals, along with timestamps, for future review.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;5. Control and Manage Physical Access Devices (3.10.5)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must control and manage physical access devices, such as keys, keycards, badges, and other mechanisms used to gain access to secure areas.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Ensure that physical access devices are only issued to authorized personnel and are promptly deactivated or recovered when no longer needed (e.g., when an employee leaves the organization or changes roles).&lt;br /&gt;
&lt;br /&gt;
* Keep records of who has been issued physical access devices and perform regular reviews to ensure the devices are still in use by authorized personnel.&lt;br /&gt;
&lt;br /&gt;
Example: Issuing keycards to employees and immediately deactivating the keycard when an employee is terminated, or when they no longer need access to the secure area.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;6. Enforce Safeguards for CUI on Physical Media (3.10.6)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Derived Requirement: Organizations must ensure that physical media (e.g., paper documents, USB drives, CDs) containing CUI are protected from unauthorized access, loss, or theft.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement physical security measures to protect physical media, such as storing paper documents and removable media in locked cabinets or safes when not in use.&lt;br /&gt;
&lt;br /&gt;
* Control access to areas where physical media is stored, ensuring that only authorized personnel can retrieve or handle it.&lt;br /&gt;
&lt;br /&gt;
Example: Storing printed documents containing CUI in a locked filing cabinet that is only accessible to authorized staff, or using safes to store removable drives containing sensitive information.&lt;br /&gt;
&lt;br /&gt;
==Importance of Physical Protection in Cybersecurity:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Prevents Unauthorized Physical Access:&#039;&#039;&#039; Limiting physical access to information systems and sensitive areas ensures that only authorized individuals can interact with systems that process or store CUI. This reduces the risk of insider threats, theft, tampering, or unauthorized access.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Protects Sensitive Information:&#039;&#039;&#039; By implementing physical safeguards for both digital and non-digital media, organizations can ensure that sensitive information is not exposed to unauthorized individuals. This is particularly important for securing printed documents or removable media containing CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Maintains Compliance with Regulations:&#039;&#039;&#039; Physical protection is essential for complying with NIST 800-171 and other regulations that govern the handling and storage of CUI. Failure to implement proper physical security measures can result in regulatory penalties or loss of business.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supports Accountability and Auditability:&#039;&#039;&#039; By maintaining logs and records of physical access to sensitive areas, organizations can trace any unauthorized attempts to access systems or facilities, supporting accountability and enabling forensic analysis in the event of a security incident.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Reduces the Risk of Data Breaches:&#039;&#039;&#039; Physical access controls, combined with monitoring and auditing mechanisms, can help prevent data breaches caused by the theft or mishandling of physical media, such as USB drives or printed documents containing CUI.&lt;br /&gt;
&lt;br /&gt;
==Best Practices for Physical Protection:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Implement Access Control Mechanisms:&#039;&#039;&#039; Use access control systems such as keycards, biometric scanners, or PIN codes to restrict access to areas where CUI is stored or processed. Ensure that only authorized personnel have access.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Monitor and Record Physical Access:&#039;&#039;&#039; Use surveillance cameras, physical access logs, and automated systems to monitor who enters and exits secure areas. Regularly review these records to detect any unauthorized activity.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Escort Visitors:&#039;&#039;&#039; Ensure that all visitors are accompanied by authorized personnel when in sensitive areas. Require visitors to sign in and out and track their activities while they are on-site.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Secure Physical Media:&#039;&#039;&#039; Store physical media such as paper documents, USB drives, and backup tapes in locked cabinets or safes when not in use. Ensure that only authorized personnel can access or retrieve media containing CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Deactivate Access Devices When No Longer Needed:&#039;&#039;&#039; Promptly deactivate or recover access devices (e.g., keycards, badges, or keys) when an employee leaves the organization or no longer needs access to secure areas. Maintain an inventory of all access devices issued.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Conduct Regular Physical Security Audits:&#039;&#039;&#039; Periodically audit your physical security measures, including access control systems, surveillance equipment, and secure storage areas, to ensure they are functioning correctly and meet organizational security standards.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
The Physical Protection family in NIST 800-171 Rev 2 focuses on ensuring the physical security of systems, facilities, and media containing Controlled Unclassified Information (CUI). By limiting physical access to authorized personnel, monitoring access points, protecting media, and controlling physical access devices, organizations can prevent unauthorized access to sensitive information. These measures help safeguard CUI, reduce the risk of data breaches, and ensure compliance with regulatory requirements. Proper physical protection is critical to maintaining the confidentiality, integrity, and availability of CUI across both digital and physical environments.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Personnel_Security&amp;diff=61</id>
		<title>Personnel Security</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Personnel_Security&amp;diff=61"/>
		<updated>2024-09-30T00:35:37Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;The Personnel Security family in NIST 800-171 Rev 2 focuses on ensuring that individuals who have access to Controlled Unclassified Information (CUI) are properly vetted and that access to CUI is restricted when personnel no longer require it due to changes in employment status. The primary goal of this family is to prevent unauthorized access to CUI by ensuring that only trustworthy individuals are granted access, and that access is promptly revoked when personnel leave...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Personnel Security family in NIST 800-171 Rev 2 focuses on ensuring that individuals who have access to Controlled Unclassified Information (CUI) are properly vetted and that access to CUI is restricted when personnel no longer require it due to changes in employment status. The primary goal of this family is to prevent unauthorized access to CUI by ensuring that only trustworthy individuals are granted access, and that access is promptly revoked when personnel leave the organization or change roles.&lt;br /&gt;
&lt;br /&gt;
The Personnel Security family has two key security requirements, which emphasize the need to manage access to CUI based on personnel status and ensure proper procedures are in place for when personnel leave or transition within an organization.&lt;br /&gt;
&lt;br /&gt;
==Key Personnel Security Requirements in NIST 800-171 Rev 2:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Screen Individuals Before Authorizing Access to CUI (3.9.1)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must screen individuals before granting them access to CUI to ensure they are trustworthy and qualified to handle sensitive information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conduct background checks and other forms of vetting to assess the trustworthiness and reliability of individuals who will have access to CUI.&lt;br /&gt;
&lt;br /&gt;
* Screening processes should be consistent with organizational policies, regulatory requirements, and any contractual obligations related to the handling of CUI.&lt;br /&gt;
&lt;br /&gt;
Example: Performing criminal background checks, credit checks, and reference checks for employees, contractors, or third parties who will have access to CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Ensure Timely Revocation of Access to CUI When Employment Status Changes (3.9.2)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must ensure that access to CUI is promptly revoked when an individual’s employment status changes (e.g., when they leave the organization, transfer to a new role, or no longer require access to CUI).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Develop procedures to revoke access to systems, devices, and physical spaces that store CUI as soon as an individual’s employment ends or their role changes.&lt;br /&gt;
&lt;br /&gt;
* Ensure that all access points, including system credentials, physical access (e.g., badges or keys), and any removable storage media, are disabled or recovered.&lt;br /&gt;
&lt;br /&gt;
Example: Immediately deactivating system accounts and retrieving access badges when an employee resigns or is terminated, or changing access permissions for employees moving to a non-sensitive role.&lt;br /&gt;
&lt;br /&gt;
==Importance of Personnel Security in Cybersecurity:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Prevents Insider Threats:&#039;&#039;&#039; Screening personnel before granting access helps reduce the risk of insider threats, whether intentional (e.g., malicious actions) or accidental (e.g., mishandling of CUI by unqualified personnel). This ensures that only trustworthy individuals have access to sensitive information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ensures Timely Revocation of Access:&#039;&#039;&#039; Promptly revoking access when personnel leave or change roles prevents former employees or individuals in different roles from retaining access to CUI, which reduces the risk of unauthorized data breaches or misuse of information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supports Compliance with Regulations:&#039;&#039;&#039; Personnel security is a crucial component of compliance with regulations like NIST 800-171, which requires organizations to ensure that individuals with access to CUI are properly vetted and that access is carefully managed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Minimizes the Risk of Data Exposure:&#039;&#039;&#039; When personnel who no longer need access to CUI retain credentials or access, the risk of data exposure increases. Timely revocation of access helps prevent unauthorized access and data leakage.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Maintains Accountability:&#039;&#039;&#039; By screening individuals and controlling access based on employment status, organizations can maintain a clear record of who has access to CUI at any given time, ensuring greater accountability and transparency.&lt;br /&gt;
&lt;br /&gt;
==Best Practices for Personnel Security:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Conduct Thorough Pre-Employment Screenings:&#039;&#039;&#039; Implement a consistent and thorough screening process that includes background checks, credit checks, and verification of past employment and references for all individuals who will have access to CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Establish Clear Access Policies:&#039;&#039;&#039; Define policies that specify who is authorized to access CUI and under what conditions. These policies should align with security requirements and be clearly communicated to employees.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Automate the Deactivation Process:&#039;&#039;&#039; Use automated systems where possible to deactivate system accounts, access badges, and other permissions when an employee leaves or changes roles. This ensures that access revocation is prompt and minimizes the risk of delays.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Perform Regular Access Audits:&#039;&#039;&#039; Conduct periodic audits of access privileges to ensure that only current, authorized personnel have access to CUI. Review and update access permissions as roles and responsibilities change.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ensure Clear Communication During Offboarding:&#039;&#039;&#039; Have a well-defined offboarding process that includes revoking all access to CUI and systems, recovering organizational property (e.g., laptops, mobile devices, and removable storage), and providing a record of actions taken to ensure full revocation.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Limit Access Based on Roles:&#039;&#039;&#039; Implement the principle of least privilege, ensuring that personnel have access only to the CUI that is necessary for their specific role. This reduces the risk of accidental or intentional exposure of sensitive information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Train Personnel on Security Policies:&#039;&#039;&#039; Ensure that all employees, including new hires and contractors, are trained on organizational security policies related to CUI, including how access is granted, monitored, and revoked.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
The Personnel Security family in NIST 800-171 Rev 2 emphasizes the importance of screening individuals before granting them access to Controlled Unclassified Information (CUI) and revoking access promptly when personnel no longer need it. By carefully managing who has access to CUI and ensuring timely revocation when roles change, organizations can reduce the risk of insider threats, unauthorized access, and potential data breaches. Proper personnel security practices are critical for maintaining the integrity and confidentiality of CUI and ensuring compliance with security regulations.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Media_Protection&amp;diff=60</id>
		<title>Media Protection</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Media_Protection&amp;diff=60"/>
		<updated>2024-09-30T00:32:03Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Media Protection family in NIST 800-171 Rev 2 outlines the security controls necessary to protect Controlled Unclassified Information ([[CUI]]) that is stored on both digital and non-digital media. The goal is to ensure that media containing sensitive information is properly handled, stored, and disposed of to prevent unauthorized access, loss, or theft.&lt;br /&gt;
&lt;br /&gt;
This family covers various forms of media, including physical storage devices like hard drives and USB drives, paper documents, and electronic storage media, and addresses how organizations should manage and protect these media throughout their lifecycle.&lt;br /&gt;
&lt;br /&gt;
==Key Media Protection Requirements in NIST 800-171 Rev 2:==&lt;br /&gt;
&lt;br /&gt;
The Media Protection family consists of seven security requirements, which focus on protecting media containing CUI during its storage, transportation, use, and disposal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Protect System Media Containing CUI (3.8.1)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must protect both digital and non-digital media (e.g., USB drives, CDs, paper documents) that contain CUI, ensuring they are secure at all times.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement physical and logical controls to protect media containing CUI.&lt;br /&gt;
&lt;br /&gt;
* Ensure that only authorized personnel can access media storing sensitive information.&lt;br /&gt;
&lt;br /&gt;
Example: Storing USB drives containing CUI in a locked cabinet when not in use, or using encryption on external storage devices.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Limit Access to Media Containing CUI to Authorized Users (3.8.2)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Access to media containing CUI should be limited to individuals who are authorized to view or handle the information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Establish role-based access control to ensure that only individuals with a legitimate need can access media containing sensitive information.&lt;br /&gt;
&lt;br /&gt;
* Maintain strict oversight and documentation of who accesses or handles such media.&lt;br /&gt;
&lt;br /&gt;
Example: Only allowing authorized employees with proper clearance to access paper files or removable storage devices that store CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Sanitize or Destroy Media Containing CUI (3.8.3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Media containing CUI must be sanitized (cleared of all sensitive data) or destroyed when it is no longer needed to ensure that sensitive information cannot be recovered.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement approved methods for sanitizing media (e.g., degaussing, overwriting, or encryption) or physically destroying it (e.g., shredding, pulverizing) to render data irrecoverable.&lt;br /&gt;
&lt;br /&gt;
* Maintain records of the sanitization or destruction process to ensure accountability.&lt;br /&gt;
&lt;br /&gt;
Example: Shredding paper documents containing CUI or using specialized software to overwrite data on a hard drive before disposal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Mark Media Containing CUI (3.8.4)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Media containing CUI should be appropriately labeled to clearly identify that it contains sensitive information, helping to ensure proper handling and security.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Label physical media such as CDs, USB drives, and paper documents with appropriate CUI markings.&lt;br /&gt;
&lt;br /&gt;
*This labeling helps remind employees to handle the media with extra care and follow security protocols.&lt;br /&gt;
&lt;br /&gt;
Example: Applying &amp;quot;CUI&amp;quot; or similar labels to USB drives or CDs that contain sensitive information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;5. Control the Transport of Media Containing CUI (3.8.5)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must control the physical and digital transport of media containing CUI to prevent unauthorized access or exposure during transit.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* When physically transporting media (e.g., shipping hard drives or paper files), ensure that it is securely packaged and only trusted personnel are involved in the transportation.&lt;br /&gt;
&lt;br /&gt;
* For digital transport, use secure transfer methods such as encryption or VPNs to prevent data interception.&lt;br /&gt;
&lt;br /&gt;
Example: Using encrypted email or secure file transfer services to send files containing CUI, or using a secure courier service to transport paper documents or hard drives.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;6. Protect Media During Transport Outside of Controlled Areas (3.8.6)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Media containing CUI must be adequately protected when transported outside of controlled areas (i.e., secure environments) to prevent unauthorized access or loss.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement additional security measures, such as encryption for digital media or using secure containers for physical transport, when CUI is moved outside of secure areas.&lt;br /&gt;
&lt;br /&gt;
* Ensure that transport is performed by authorized personnel and is documented to maintain accountability.&lt;br /&gt;
&lt;br /&gt;
Example: Encrypting data on a USB drive when it is being transported outside the organization’s offices, or using a secure shipping service for transporting hard drives.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;7. Implement Cryptographic Protection for CUI on Digital Media (3.8.7)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must use encryption to protect CUI that is stored on digital media when appropriate, ensuring that unauthorized individuals cannot access the data even if the media is lost or stolen.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement encryption algorithms that meet federal standards (such as FIPS 140-2) to protect sensitive information stored on digital devices like hard drives, USBs, or cloud storage.&lt;br /&gt;
&lt;br /&gt;
Example: Encrypting sensitive files on a laptop’s hard drive to ensure that CUI is protected if the device is lost or stolen.&lt;br /&gt;
&lt;br /&gt;
==Importance of Media Protection in Cybersecurity:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Prevents Data Leaks:&#039;&#039;&#039; By protecting both digital and physical media containing CUI, organizations reduce the risk of data breaches caused by lost, stolen, or improperly disposed of media.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ensures Data Confidentiality:&#039;&#039;&#039; Limiting access to media containing sensitive information and implementing encryption ensures that only authorized personnel can access the data, thereby protecting confidentiality.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Compliance with Regulations:&#039;&#039;&#039; Media protection is essential for complying with regulations like NIST 800-171, which require organizations to handle and store CUI securely. Non-compliance could result in penalties or the loss of government contracts.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supports Secure Data Disposal:&#039;&#039;&#039; Proper sanitization and destruction of media ensure that sensitive information is not recoverable after it is no longer needed, reducing the risk of unauthorized disclosure.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Reduces Insider Threat Risks:&#039;&#039;&#039; Limiting access to media to only authorized personnel and implementing proper labeling and oversight helps minimize the risk of insider threats or accidental exposure of CUI.&lt;br /&gt;
&lt;br /&gt;
==Best Practices for Media Protection:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Implement Encryption for Digital Media:&#039;&#039;&#039; Always use encryption to protect sensitive information stored on digital media, such as hard drives, USB drives, and laptops. This ensures that even if the media is lost or stolen, the data remains protected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Control Physical Access to Media:&#039;&#039;&#039; Store media containing CUI in locked cabinets or other secure storage locations when not in use. Only authorized personnel should have physical access to these storage areas.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Secure Transportation Methods:&#039;&#039;&#039; When transporting media, either digitally or physically, use secure methods like encryption, VPNs, or secure couriers to minimize the risk of interception or theft.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Establish a Media Disposal Policy:&#039;&#039;&#039; Develop a policy for the sanitization and destruction of media that is no longer needed. Use appropriate methods, such as shredding or degaussing, and document all destruction activities for accountability.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Train Employees on Media Handling:&#039;&#039;&#039; Provide training to employees on how to handle, label, and store media containing CUI. Emphasize the importance of securing media both in transit and at rest.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regularly Review Access to Media:&#039;&#039;&#039; Periodically review who has access to media containing CUI and ensure that access is limited to individuals who have a legitimate need. Revoke access for personnel who no longer require it.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
The Media Protection family in NIST 800-171 Rev 2 emphasizes the secure handling, storage, transport, and disposal of media containing CUI. By limiting access to authorized individuals, using encryption, controlling transportation, and ensuring proper disposal, organizations can protect sensitive information from unauthorized access, theft, and exposure. These controls are essential for maintaining the confidentiality and integrity of CUI, preventing data breaches, and ensuring compliance with security regulations.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Media_Protection&amp;diff=59</id>
		<title>Media Protection</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Media_Protection&amp;diff=59"/>
		<updated>2024-09-30T00:31:44Z</updated>

		<summary type="html">&lt;p&gt;Marieramsay: Created page with &amp;quot;The Media Protection family in NIST 800-171 Rev 2 outlines the security controls necessary to protect Controlled Unclassified Information (CUI) that is stored on both digital and non-digital media. The goal is to ensure that media containing sensitive information is properly handled, stored, and disposed of to prevent unauthorized access, loss, or theft.  This family covers various forms of media, including physical storage devices like hard drives and USB drives, paper...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Media Protection family in NIST 800-171 Rev 2 outlines the security controls necessary to protect Controlled Unclassified Information (CUI) that is stored on both digital and non-digital media. The goal is to ensure that media containing sensitive information is properly handled, stored, and disposed of to prevent unauthorized access, loss, or theft.&lt;br /&gt;
&lt;br /&gt;
This family covers various forms of media, including physical storage devices like hard drives and USB drives, paper documents, and electronic storage media, and addresses how organizations should manage and protect these media throughout their lifecycle.&lt;br /&gt;
&lt;br /&gt;
==Key Media Protection Requirements in NIST 800-171 Rev 2:==&lt;br /&gt;
&lt;br /&gt;
The Media Protection family consists of seven security requirements, which focus on protecting media containing CUI during its storage, transportation, use, and disposal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Protect System Media Containing CUI (3.8.1)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must protect both digital and non-digital media (e.g., USB drives, CDs, paper documents) that contain CUI, ensuring they are secure at all times.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement physical and logical controls to protect media containing CUI.&lt;br /&gt;
&lt;br /&gt;
* Ensure that only authorized personnel can access media storing sensitive information.&lt;br /&gt;
&lt;br /&gt;
Example: Storing USB drives containing CUI in a locked cabinet when not in use, or using encryption on external storage devices.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Limit Access to Media Containing CUI to Authorized Users (3.8.2)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Access to media containing CUI should be limited to individuals who are authorized to view or handle the information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Establish role-based access control to ensure that only individuals with a legitimate need can access media containing sensitive information.&lt;br /&gt;
&lt;br /&gt;
* Maintain strict oversight and documentation of who accesses or handles such media.&lt;br /&gt;
&lt;br /&gt;
Example: Only allowing authorized employees with proper clearance to access paper files or removable storage devices that store CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Sanitize or Destroy Media Containing CUI (3.8.3)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Media containing CUI must be sanitized (cleared of all sensitive data) or destroyed when it is no longer needed to ensure that sensitive information cannot be recovered.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement approved methods for sanitizing media (e.g., degaussing, overwriting, or encryption) or physically destroying it (e.g., shredding, pulverizing) to render data irrecoverable.&lt;br /&gt;
&lt;br /&gt;
* Maintain records of the sanitization or destruction process to ensure accountability.&lt;br /&gt;
&lt;br /&gt;
Example: Shredding paper documents containing CUI or using specialized software to overwrite data on a hard drive before disposal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Mark Media Containing CUI (3.8.4)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Media containing CUI should be appropriately labeled to clearly identify that it contains sensitive information, helping to ensure proper handling and security.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Label physical media such as CDs, USB drives, and paper documents with appropriate CUI markings.&lt;br /&gt;
&lt;br /&gt;
*This labeling helps remind employees to handle the media with extra care and follow security protocols.&lt;br /&gt;
&lt;br /&gt;
Example: Applying &amp;quot;CUI&amp;quot; or similar labels to USB drives or CDs that contain sensitive information.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;5. Control the Transport of Media Containing CUI (3.8.5)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must control the physical and digital transport of media containing CUI to prevent unauthorized access or exposure during transit.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* When physically transporting media (e.g., shipping hard drives or paper files), ensure that it is securely packaged and only trusted personnel are involved in the transportation.&lt;br /&gt;
&lt;br /&gt;
* For digital transport, use secure transfer methods such as encryption or VPNs to prevent data interception.&lt;br /&gt;
&lt;br /&gt;
Example: Using encrypted email or secure file transfer services to send files containing CUI, or using a secure courier service to transport paper documents or hard drives.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;6. Protect Media During Transport Outside of Controlled Areas (3.8.6)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Media containing CUI must be adequately protected when transported outside of controlled areas (i.e., secure environments) to prevent unauthorized access or loss.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement additional security measures, such as encryption for digital media or using secure containers for physical transport, when CUI is moved outside of secure areas.&lt;br /&gt;
&lt;br /&gt;
* Ensure that transport is performed by authorized personnel and is documented to maintain accountability.&lt;br /&gt;
&lt;br /&gt;
Example: Encrypting data on a USB drive when it is being transported outside the organization’s offices, or using a secure shipping service for transporting hard drives.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;7. Implement Cryptographic Protection for CUI on Digital Media (3.8.7)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must use encryption to protect CUI that is stored on digital media when appropriate, ensuring that unauthorized individuals cannot access the data even if the media is lost or stolen.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Implement encryption algorithms that meet federal standards (such as FIPS 140-2) to protect sensitive information stored on digital devices like hard drives, USBs, or cloud storage.&lt;br /&gt;
&lt;br /&gt;
Example: Encrypting sensitive files on a laptop’s hard drive to ensure that CUI is protected if the device is lost or stolen.&lt;br /&gt;
&lt;br /&gt;
==Importance of Media Protection in Cybersecurity:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Prevents Data Leaks:&#039;&#039;&#039; By protecting both digital and physical media containing CUI, organizations reduce the risk of data breaches caused by lost, stolen, or improperly disposed of media.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ensures Data Confidentiality:&#039;&#039;&#039; Limiting access to media containing sensitive information and implementing encryption ensures that only authorized personnel can access the data, thereby protecting confidentiality.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Compliance with Regulations:&#039;&#039;&#039; Media protection is essential for complying with regulations like NIST 800-171, which require organizations to handle and store CUI securely. Non-compliance could result in penalties or the loss of government contracts.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supports Secure Data Disposal:&#039;&#039;&#039; Proper sanitization and destruction of media ensure that sensitive information is not recoverable after it is no longer needed, reducing the risk of unauthorized disclosure.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Reduces Insider Threat Risks:&#039;&#039;&#039; Limiting access to media to only authorized personnel and implementing proper labeling and oversight helps minimize the risk of insider threats or accidental exposure of CUI.&lt;br /&gt;
&lt;br /&gt;
==Best Practices for Media Protection:==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Implement Encryption for Digital Media:&#039;&#039;&#039; Always use encryption to protect sensitive information stored on digital media, such as hard drives, USB drives, and laptops. This ensures that even if the media is lost or stolen, the data remains protected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Control Physical Access to Media:&#039;&#039;&#039; Store media containing CUI in locked cabinets or other secure storage locations when not in use. Only authorized personnel should have physical access to these storage areas.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Use Secure Transportation Methods:&#039;&#039;&#039; When transporting media, either digitally or physically, use secure methods like encryption, VPNs, or secure couriers to minimize the risk of interception or theft.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Establish a Media Disposal Policy:&#039;&#039;&#039; Develop a policy for the sanitization and destruction of media that is no longer needed. Use appropriate methods, such as shredding or degaussing, and document all destruction activities for accountability.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Train Employees on Media Handling:&#039;&#039;&#039; Provide training to employees on how to handle, label, and store media containing CUI. Emphasize the importance of securing media both in transit and at rest.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regularly Review Access to Media:&#039;&#039;&#039; Periodically review who has access to media containing CUI and ensure that access is limited to individuals who have a legitimate need. Revoke access for personnel who no longer require it.&lt;br /&gt;
&lt;br /&gt;
==Summary:==&lt;br /&gt;
&lt;br /&gt;
The Media Protection family in NIST 800-171 Rev 2 emphasizes the secure handling, storage, transport, and disposal of media containing CUI. By limiting access to authorized individuals, using encryption, controlling transportation, and ensuring proper disposal, organizations can protect sensitive information from unauthorized access, theft, and exposure. These controls are essential for maintaining the confidentiality and integrity of CUI, preventing data breaches, and ensuring compliance with security regulations.&lt;/div&gt;</summary>
		<author><name>Marieramsay</name></author>
	</entry>
</feed>