<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cooey.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Uncouth</id>
	<title>Cooey Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cooey.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Uncouth"/>
	<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Special:Contributions/Uncouth"/>
	<updated>2026-04-30T14:13:04Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.3</generator>
	<entry>
		<id>https://cooey.wiki/index.php?title=SPA_Objectives_-_Password_Manager&amp;diff=145</id>
		<title>SPA Objectives - Password Manager</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=SPA_Objectives_-_Password_Manager&amp;diff=145"/>
		<updated>2025-09-10T14:47:01Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: /* Assessment Objectives to Assess */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== When is a Password Manager an SPA? ==&lt;br /&gt;
When a password manager is organizationally managed or provisioned for use within the scope of the CUI information system then the password manager should be scoped as an SPA. &lt;br /&gt;
&lt;br /&gt;
When users choose to use a password manager (such as one built-in to their browser on their in-scope computers), then these are not considered an SPA, since the protection of the password is the responsibility of the user, not the organization.&lt;br /&gt;
&lt;br /&gt;
== Assessment Objectives to Assess ==&lt;br /&gt;
IA.L2-3.5.10 - CRYPTOGRAPHICALLY-PROTECTED PASSWORDS [a, b]&lt;br /&gt;
&lt;br /&gt;
* Password manager will need to securely store the passwords [a] and securely transmit them [b]. &lt;br /&gt;
&lt;br /&gt;
PS.L2-3.9.2 – PERSONNEL ACTIONS [a,b]&lt;br /&gt;
&lt;br /&gt;
* Ensuring that access to passwords that grant access to sensitive information are protected during and after personnel actions is likely to be a component of the evidence for [a] and [b] but will not be the only evidence for these AOs.&lt;br /&gt;
&lt;br /&gt;
SC.L2-3.13.10 - KEY MANAGEMENT [b]&lt;br /&gt;
&lt;br /&gt;
* May be used to manage cryptographic keys if password manager provides said functionality. &lt;br /&gt;
&lt;br /&gt;
== Assessment Objectives that won&#039;t likely be Assessed ==&lt;br /&gt;
IA.L2-3.5.7 – PASSWORD COMPLEXITY [c, d]&lt;br /&gt;
&lt;br /&gt;
* Password complexity is typically enforced on the system containing CUI or its identity provider, not the password manager.&lt;br /&gt;
&lt;br /&gt;
IA.L2-3.5.8 – PASSWORD REUSE [b]&lt;br /&gt;
&lt;br /&gt;
* Password reuse is typically enforced on the system containing CUI or its identity provider, not the password manager.&lt;br /&gt;
&lt;br /&gt;
IA.L2-3.5.9 – TEMPORARY PASSWORDS [a]&lt;br /&gt;
&lt;br /&gt;
* Temporary passwords are typically enforced on the system containing CUI or its identity provider, not the password manager.&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=48_CFR_Parts_204,_212,_217,_and_252_Proposed_Rule&amp;diff=139</id>
		<title>48 CFR Parts 204, 212, 217, and 252 Proposed Rule</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=48_CFR_Parts_204,_212,_217,_and_252_Proposed_Rule&amp;diff=139"/>
		<updated>2025-03-21T12:52:45Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: drafty mcdraftface&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;DRAFT. Review! I think this should also include an assumed rollout schedule, phase 1 likely beginning around Jun 2025. What contracts are affected, what types of assessments are available vs. required, etc.&lt;br /&gt;
&lt;br /&gt;
The 48 CFR Parts 204, 212, 217 and 252 are part of a &#039;&#039;&#039;proposed rule that will be added to the Defense Federal Acquisition Regulation Supplement (DFARS)&#039;&#039;&#039;. The DFARS contains the regulations for how the DoD purchases goods and services. This proposed rule outlines how CMMC requirements will be integrated into DoD contracts. This is often referred to as the &#039;&#039;&#039;48 CFR CMMC rule&#039;&#039;&#039; because the DFARS is part of Title 48 of the Code of Federal Regulations (CFR).&lt;br /&gt;
&lt;br /&gt;
Key aspects of this proposed rule:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Integrating CMMC into Contracts:&#039;&#039;&#039; This rule will enable the DoD to &#039;&#039;&#039;specify a required CMMC level in its contracts and solicitations (requests for bids)&#039;&#039;&#039;. Consequently, if a contract mandates a particular CMMC level, a company will likely need to achieve that level to be eligible for the contract award.&lt;br /&gt;
* &#039;&#039;&#039;Pre-Award Requirements:&#039;&#039;&#039; If a contract includes a CMMC requirement, the company bidding on the contract will generally need to have their &#039;&#039;&#039;CMMC status (either a formal certification or a self-assessment) confirmed in the Supplier Performance Risk System (SPRS)&#039;&#039;&#039; before the contract can be awarded. They will also be required to affirm their continuous compliance with these security requirements in SPRS. This is generally required &#039;&#039;&#039;at the time of award&#039;&#039;&#039;.&lt;br /&gt;
* &#039;&#039;&#039;Different CMMC Levels:&#039;&#039;&#039; The &#039;&#039;&#039;specific CMMC level required for a contract will be clearly stated in the contract and related solicitation documents&#039;&#039;&#039;.&lt;br /&gt;
* &#039;&#039;&#039;Handling Sensitive Information:&#039;&#039;&#039; The CMMC requirements apply to &#039;&#039;&#039;information systems that will process, store, or transmit Federal Contract Information (FCI) or Controlled Unclassified Information (CUI) during the performance of the contract&#039;&#039;&#039;. &#039;&#039;&#039;CUI is government information that requires protection&#039;&#039;&#039;.&lt;br /&gt;
* &#039;&#039;&#039;Responsibilities Post-Contract Award:&#039;&#039;&#039; Companies that are awarded contracts with CMMC requirements will need to &#039;&#039;&#039;maintain their required CMMC level for the entire duration of the contract&#039;&#039;&#039;. They are also obligated to notify the DoD of any lapses in their information security or changes in their CMMC status. Furthermore, they must complete an affirmation of continuous compliance in SPRS on an annual basis or when their CMMC compliance status changes. They should only transmit data on information systems that have the required CMMC level.&lt;br /&gt;
* &#039;&#039;&#039;Subcontractor Compliance:&#039;&#039;&#039; If a prime contractor (the main company with the DoD contract) engages subcontractors who will handle FCI or CUI, those &#039;&#039;&#039;subcontractors will also be required to meet appropriate CMMC levels&#039;&#039;&#039;. The prime contractor is responsible for ensuring that their subcontractors comply with the necessary CMMC requirements before awarding a subcontract. The required CMMC level for subcontractors will depend on the sensitivity of the information being shared with them.&lt;br /&gt;
* &#039;&#039;&#039;Exemption for Basic Commercial Items:&#039;&#039;&#039; Generally, contracts that are &#039;&#039;&#039;solely for the acquisition of Commercially Available Off-the-Shelf (COTS) items are excluded from CMMC requirements&#039;&#039;&#039;. The term &amp;quot;exclusively COTS&amp;quot; refers to awards solely for items that fall within the definition provided in the Federal Acquisition Regulation (FAR) at 2.101.&lt;br /&gt;
* &#039;&#039;&#039;Implementation Timeline:&#039;&#039;&#039; CMMC requirements will be implemented through a &#039;&#039;&#039;phased rollout over a three-year period&#039;&#039;&#039;. Initially, CMMC requirements will be included in specific contracts as directed by the CMMC Program Office. After the three-year phase-in, CMMC will apply more broadly to all relevant DoD solicitations and contracts valued above the micro-purchase threshold.&lt;br /&gt;
* &#039;&#039;&#039;Verification System:&#039;&#039;&#039; The &#039;&#039;&#039;Supplier Performance Risk System (SPRS)&#039;&#039;&#039; will serve as the system used by the DoD to &#039;&#039;&#039;verify a contractor&#039;s CMMC status&#039;&#039;&#039;. Contractors will be required to post the results of their CMMC self-assessments and, for Level 2 and 3, their certificates into this system. Apparently successful offerors will also need to provide DoD Unique Identifiers (UIDs) issued by SPRS for their information systems that will handle FCI or CUI. Contracting officers will use SPRS to verify the contractor&#039;s CMMC level and affirmation of continuous compliance prior to award, option exercise, or extension of performance.&lt;br /&gt;
* &#039;&#039;&#039;Relationship with Other Cybersecurity Requirements:&#039;&#039;&#039; CMMC assessments are &#039;&#039;&#039;not intended to duplicate efforts from other comparable DoD assessments&#039;&#039;&#039;, except in rare circumstances. The rule clarifies that &#039;&#039;&#039;DFARS clause 252.204-7012 (Safeguarding Covered Defense Information and Cyber Incident Reporting) and 252.204-7021 (CMMC Compliance) have distinct purposes and are not duplicative&#039;&#039;&#039;. Clause 252.204-7012 imposes cybersecurity requirements, while clause 252.204-7021 requires an assessment of how well a contractor is meeting those requirements.&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=138</id>
		<title>Self-Assessment and Certification</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=138"/>
		<updated>2025-03-05T01:04:26Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: re-worded a bunch in sections 1-3, section 4 and beyond should still be looked at&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In the Cybersecurity Maturity Model Certification (CMMC) framework, self-assessments and third-party certifications are two key mechanisms that organizations use to demonstrate compliance with cybersecurity requirements set by the Department of Defense (DoD). These mechanisms are designed to ensure that contractors handling Controlled Unclassified Information ([[CUI]]) and Federal Contract Information ([[FCI]]) have adequate cybersecurity measures in place.&lt;br /&gt;
&lt;br /&gt;
=== 1. CMMC Overview: === &lt;br /&gt;
&lt;br /&gt;
The CMMC framework is a tiered certification model intended to assess the cybersecurity maturity of contractors and suppliers within the Defense Industrial Base ([[DIB]]). It is divided into three levels of increasing cybersecurity rigor, from basic cyber hygiene at Level 1 to advanced protection measures at Level 3. The CMMC ensures that contractors meet specific security standards, particularly those outlined in [[NIST 800-171]] and enhanced security practices beyond that.&lt;br /&gt;
&lt;br /&gt;
=== 2. Self-Assessments in CMMC:=== &lt;br /&gt;
&lt;br /&gt;
At lower CMMC levels, specifically for Level 1 and in some cases Level 2, companies are allowed to conduct self-assessments of their cybersecurity practices and controls. Here’s how it works:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level 1 Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 1 focuses on basic cyber hygiene, covering 17 controls designed to protect Federal Contract Information (FCI), such as using antivirus software, implementing access controls, and protecting communications.&lt;br /&gt;
&lt;br /&gt;
* Self-assessment is allowed for Level 1 contractors. These companies are not required to undergo a third-party audit but must:&lt;br /&gt;
** Complete a self-assessment based on the specified practices.&lt;br /&gt;
** Submit their score (from the self-assessment) to the Supplier Performance Risk System ([[SPRS]]), a DoD-managed system.&lt;br /&gt;
** Reassess and resubmit their status annually.&lt;br /&gt;
&lt;br /&gt;
=== 3. Third-Party Certification in CMMC: ===&lt;br /&gt;
&lt;br /&gt;
For Level 2 and above, third-party assessments are required to validate compliance. Certification levels vary depending on the sensitivity of the information being protected:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 2 represents a transition between basic and more advanced cybersecurity practices, containing 110 requirements from NIST SP 800-171 rev2.&lt;br /&gt;
&lt;br /&gt;
* For contractors handling CUI, third-party certification from a C3PAO (Certified Third-Party Assessor Organization) is required, although during the phased rollout some self-assessments will be allowed.&lt;br /&gt;
* When third-party certification is mandatory, the [[CMMC-AB]] / The Cyber AB (CMMC Accreditation Body) oversees this process.&lt;br /&gt;
* Certification at this levels is valid for up to three years before re-certification is needed (unless a significant change happens in the environment, in which case, re-certification would be required).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 3 involves increasingly sophisticated cybersecurity requirements to address risks posed by Advanced Persistent Threats (APTs). 24 additional requirements from NIST SP 800-172 are included in Level 3.&lt;br /&gt;
&lt;br /&gt;
* DIBCAC performs assessments of the 24 requirements in Level 3 after completion of a C3PAO Level 2 assessment.&lt;br /&gt;
&lt;br /&gt;
* Certification at this levels is valid for up to three years before re-certification is needed (unless a significant change happens in the environment, in which case, re-certification would be required).&lt;br /&gt;
&lt;br /&gt;
=== 4. Steps in the Certification Process:===&lt;br /&gt;
&lt;br /&gt;
For companies required to undergo third-party certification, the following steps are typically involved:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Preparation:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Companies conduct a gap analysis to determine where their current cybersecurity posture aligns with the CMMC level they are aiming to achieve.&lt;br /&gt;
&lt;br /&gt;
* Many contractors hire consultants or use tools to help them prepare for the formal assessment by ensuring that their processes and systems meet the necessary standards.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Assessment by C3PAO:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified Third-Party Assessor Organizations (C3PAOs) are accredited by the The Cyber AB to conduct assessments.&lt;br /&gt;
* Assessors are guided by the CAP, [https://www.cyberab.org/Portals/0/CMMC%20Assessment%20Process%20v2.0.pdf?ver=fEk1pUK1Fg26fVtopxv_DA%3D%3D found on the Cyber AB&#039;s website here], and [[CAP|discussed on this Wiki here]].&lt;br /&gt;
&lt;br /&gt;
* The C3PAO reviews the organization&#039;s policies, procedures, security controls, and their implementation to ensure compliance with the required CMMC level.&lt;br /&gt;
&lt;br /&gt;
* The assessment may include interviews with personnel, documentation review, and technical testing of the organization&#039;s systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Certification:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* If the organization passes the assessment, the C3PAO submits its findings to The Cyber AB, which then issues the certification.&lt;br /&gt;
&lt;br /&gt;
* Certification is valid for three years at Levels 2-3, after which the organization must undergo re-certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Post-Certification Monitoring:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified companies must continue to maintain and update their cybersecurity controls throughout the certification period.&lt;br /&gt;
&lt;br /&gt;
* If significant changes occur, such as new systems or processes, companies may be subject to interim audits or additional assessments.&lt;br /&gt;
&lt;br /&gt;
==CMMC Levels Summary==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 1 (Basic Cyber Hygiene):&#039;&#039;&#039; Self-assessment allowed, focused on FCI protection.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2 (Intermediate Cyber Hygiene):&#039;&#039;&#039; Transition level, self-assessment may be allowed for FCI; third-party certification required for CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 (Good Cyber Hygiene):&#039;&#039;&#039; Third-party certification required, covers NIST SP 800-171.&lt;br /&gt;
&lt;br /&gt;
==Challenges and Considerations==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cost:&#039;&#039;&#039; Third-party assessments, particularly at higher levels, can be expensive and resource-intensive. This is a challenge for small-to-medium businesses that may struggle with the financial burden.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Choosing the right support&#039;&#039;&#039;: Some organizations might choose to work with consultants, or engage in pre-assessments to gauge their readiness prior to assessment. Choosing knowledgeable and capable organizations to support you is very important. Some guidance on picking this support is below:&lt;br /&gt;
&lt;br /&gt;
* [[Identifying a Managed Service Provider]]&lt;br /&gt;
* [[Identifying a Consultant]]&lt;br /&gt;
* [[Identifying a Certified Third Party Assessing Organization (C3PAO)]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Continuous Compliance:&#039;&#039;&#039; Certification is not a one-time event. Organizations must continuously maintain their cybersecurity posture, as lapses in compliance can lead to a loss of certification or future contract eligibility.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supply Chain Impact:&#039;&#039;&#039; Prime contractors are responsible for ensuring that their entire supply chain, including subcontractors, meet the required CMMC levels, which can make compliance across the supply chain complex.&lt;br /&gt;
&lt;br /&gt;
==CMMC 2.0 Update==&lt;br /&gt;
&lt;br /&gt;
The CMMC 2.0 model, announced in 2021, simplified the original model by reducing the number of levels from five to three. This updated version emphasizes self-assessments for lower-level contractors but retains third-party certification for higher-level contractors handling CUI. It aims to make compliance more streamlined and less burdensome while maintaining strong security requirements.&lt;br /&gt;
&lt;br /&gt;
== Conclusion==&lt;br /&gt;
&lt;br /&gt;
In the CMMC framework, self-assessments allow lower-tier contractors to meet basic security standards at a lower cost, while third-party certification is required for companies handling more sensitive data, such as CUI. This dual approach balances the need for strong cybersecurity controls with the practical realities of cost and resource constraints across the defense industrial base. Organizations aiming to do business with the DoD must understand their specific CMMC requirements and implement the necessary controls to achieve certification or self-assessment compliance.&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=CMMC_Overview&amp;diff=137</id>
		<title>CMMC Overview</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=CMMC_Overview&amp;diff=137"/>
		<updated>2025-03-05T00:52:51Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: re-wording, adding more future pages, etc.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Cybersecurity Maturity Model Certification (CMMC) is a framework designed to enhance cybersecurity practices across the Defense Industrial Base ([[DIB]]). It applies to any organization within the supply chain (receiving specific [[DFARS]] flow-down) that works on contracts with the Department of Defense ([[DoD]]), ensuring these companies can safeguard Controlled Unclassified Information ([[CUI]]) and Federal Contract Information ([[FCI]]).&lt;br /&gt;
&lt;br /&gt;
In November 2021, in response to industry feedback, CMMC 2.0 was introduced to simplify the original model, making compliance more achievable while maintaining strong security standards. This updated framework reduces the original five certification levels down to three:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Level 1:&amp;lt;/u&amp;gt; Basic cyber hygiene practices, for the protection of [[Federal Contract Information (FCI)]]. Organizations must implement 15 practices aligned with Federal Acquisition Regulation ([[FAR]]) [https://www.acquisition.gov/far/52.204-21 52.204-21].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Level 2:&amp;lt;/u&amp;gt; Aligned with NIST SP 800-171 Rev 2, this level applies to [[Covered contractor information system|covered contractor information systems]] that handle CUI. It includes 110 security controls and 320 assessment objectives required by [[NIST 800-171]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Level 3:&amp;lt;/u&amp;gt; Intended for companies with more sensitive CUI, Level 3 includes all NIST SP 800-171 requirements and enhances those requirements with 24 additional practices from [[NIST SP 800-172]], focusing on defending against advanced persistent threats ([[APT]]s).&lt;br /&gt;
&lt;br /&gt;
=== [[Self-Assessment and Certification]]: ===&lt;br /&gt;
&lt;br /&gt;
Under CMMC 2.0, organizations handling only FCI at Level 1 will be required to conduct annual self-assessments. For Level 2, companies handling critical CUI must undergo third-party assessments or self-attest depending on the criticality of the contract. Level 3 requires a CMMC Level 2 C3PAO assessment followed by a Level 3 assessment performed by the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC).&lt;br /&gt;
&lt;br /&gt;
=== Why CMMC is Important ===&lt;br /&gt;
&lt;br /&gt;
The DoD created CMMC to ensure that companies in the DIB have adequate protections in place to secure sensitive information and defend against cyber threats. Compliance with CMMC 2.0 helps protect national security, secure supply chains, and build trust between the DoD and its contractors.&lt;br /&gt;
&lt;br /&gt;
For organizations in the defense supply chain, preparing for CMMC 2.0 requires:&lt;br /&gt;
&lt;br /&gt;
* Implementing controls based on NIST 800-171 Rev 2 (for Level 2),&lt;br /&gt;
&lt;br /&gt;
* Engaging in [[continuous monitoring]] and [[security improvements]],&lt;br /&gt;
&lt;br /&gt;
* And obtaining certification through third-party or self-assessments, depending on the level of compliance required.&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=119</id>
		<title>Self-Assessment and Certification</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Self-Assessment_and_Certification&amp;diff=119"/>
		<updated>2025-02-28T16:21:53Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: /* 4. Steps in the Certification Process: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In the Cybersecurity Maturity Model Certification (CMMC) framework, self-assessments and third-party certifications are two key mechanisms that organizations (especially defense contractors) use to demonstrate compliance with cybersecurity requirements set by the Department of Defense (DoD). These mechanisms are designed to ensure that contractors handling Controlled Unclassified Information ([[CUI]]) and Federal Contract Information ([[FCI]]) have adequate cybersecurity measures in place.&lt;br /&gt;
&lt;br /&gt;
=== 1. CMMC Overview: === &lt;br /&gt;
&lt;br /&gt;
The CMMC framework is a tiered certification model intended to assess the cybersecurity maturity of contractors and suppliers within the Defense Industrial Base ([[DIB]]). It is divided into five levels of increasing cybersecurity rigor, from basic cyber hygiene at Level 1 to advanced protection measures at Level 5. The CMMC ensures that contractors meet specific security standards, particularly those outlined in [[NIST 800-171]] and enhanced security practices beyond that.&lt;br /&gt;
&lt;br /&gt;
=== 2. Self-Assessments in CMMC:=== &lt;br /&gt;
&lt;br /&gt;
At lower CMMC levels, specifically for Level 1 and in some cases Level 2, companies are allowed to conduct self-assessments of their cybersecurity practices and controls. Here’s how it works:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Level 1 Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 1 focuses on basic cyber hygiene, covering 17 controls designed to protect Federal Contract Information (FCI), such as using antivirus software, regular password changes, and access controls.&lt;br /&gt;
&lt;br /&gt;
* Self-assessment is allowed for Level 1 contractors. These companies are not required to undergo a third-party audit but must:&lt;br /&gt;
** Complete a self-assessment based on the specified practices.&lt;br /&gt;
** Submit their score (from the self-assessment) to the Supplier Performance Risk System ([[SPRS]]), a DoD-managed system.&lt;br /&gt;
** Self-assessments are valid for up to one year, meaning organizations need to reassess and resubmit their status annually.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Benefits of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Cost-Effective: Self-assessments eliminate the need to hire a third-party assessor, reducing costs for smaller companies with basic cybersecurity needs.&lt;br /&gt;
&lt;br /&gt;
*Simpler Compliance Process: The self-assessment process is less formal and less time-consuming compared to full certification audits.&lt;br /&gt;
&lt;br /&gt;
*Focus on Basic Practices: Since Level 1 focuses on basic cybersecurity practices, the controls are less complex, making it feasible for companies to evaluate themselves.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Risks of Self-Assessments:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Accuracy and Accountability: Without third-party validation, there is a risk that companies may not fully or accurately assess their compliance, leading to potential vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
*Audit Potential: The DoD can audit self-assessment results at any time, and companies found to be non-compliant may face penalties, including loss of contract eligibility.&lt;br /&gt;
&lt;br /&gt;
=== 3. Third-Party Certification in CMMC: ===&lt;br /&gt;
&lt;br /&gt;
For Level 2 and above, especially for companies handling CUI, third-party assessments are required to validate compliance. Certification levels vary depending on the type of information being protected:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 2 represents a transition between basic and more advanced cybersecurity practices, containing 110 controls (mapped to NIST SP 800-171).&lt;br /&gt;
&lt;br /&gt;
* For contractors handling CUI, third-party certification from a C3PAO (Certified Third-Party Assessor Organization) is required.&lt;br /&gt;
&lt;br /&gt;
* In cases where only Federal Contract Information (FCI) is handled, a self-assessment may suffice, but for CUI, external validation is necessary.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 and Above:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Level 3 through Level 5 involve increasingly sophisticated cybersecurity requirements to address risks posed by Advanced Persistent Threats (APTs).&lt;br /&gt;
&lt;br /&gt;
* Third-party certification is mandatory, and the [[CMMC-AB]] / The Cyber AB (CMMC Accreditation Body) oversees this process.&lt;br /&gt;
&lt;br /&gt;
* These higher levels of certification require a formal audit by a [[C3PAO]], where the assessor evaluates the organization&#039;s implementation of required cybersecurity controls.&lt;br /&gt;
&lt;br /&gt;
* Certification at these levels is valid for up to three years before re-certification is needed.&lt;br /&gt;
&lt;br /&gt;
=== 4. Steps in the Certification Process:===&lt;br /&gt;
&lt;br /&gt;
For companies required to undergo third-party certification, the following steps are typically involved:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Preparation:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Companies conduct a gap analysis to determine where their current cybersecurity posture aligns with the CMMC level they are aiming to achieve.&lt;br /&gt;
&lt;br /&gt;
* Many contractors hire consultants or use tools to help them prepare for the formal assessment by ensuring that their processes and systems meet the necessary standards.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Assessment by C3PAO:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified Third-Party Assessor Organizations (C3PAOs) are accredited by the The Cyber AB to conduct assessments.&lt;br /&gt;
* Assessors are guided by the CAP, [https://www.cyberab.org/Portals/0/CMMC%20Assessment%20Process%20v2.0.pdf?ver=fEk1pUK1Fg26fVtopxv_DA%3D%3D found on the Cyber AB&#039;s website here], and [[CAP|discussed on this Wiki here]].&lt;br /&gt;
&lt;br /&gt;
* The C3PAO reviews the organization&#039;s policies, procedures, security controls, and their implementation to ensure compliance with the required CMMC level.&lt;br /&gt;
&lt;br /&gt;
* The assessment may include interviews with personnel, documentation review, and technical testing of the organization&#039;s systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;3. Certification:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* If the organization passes the assessment, the C3PAO submits its findings to The Cyber AB, which then issues the certification.&lt;br /&gt;
&lt;br /&gt;
* Certification is valid for three years at Levels 2-5, after which the organization must undergo re-certification.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Post-Certification Monitoring:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Certified companies must continue to maintain and update their cybersecurity controls throughout the certification period.&lt;br /&gt;
&lt;br /&gt;
* If significant changes occur, such as new systems or processes, companies may be subject to interim audits or additional assessments.&lt;br /&gt;
&lt;br /&gt;
==CMMC Levels Summary==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 1 (Basic Cyber Hygiene):&#039;&#039;&#039; Self-assessment allowed, focused on FCI protection.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 2 (Intermediate Cyber Hygiene):&#039;&#039;&#039; Transition level, self-assessment may be allowed for FCI; third-party certification required for CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CMMC Level 3 (Good Cyber Hygiene):&#039;&#039;&#039; Third-party certification required, covers NIST SP 800-171.&lt;br /&gt;
&lt;br /&gt;
==Challenges and Considerations==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cost:&#039;&#039;&#039; Third-party assessments, particularly at higher levels, can be expensive and resource-intensive. This is a challenge for small-to-medium businesses that may struggle with the financial burden.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Choosing the right support&#039;&#039;&#039;: Some organizations might choose to work with consultants, or engage in pre-assessments to gauge their readiness prior to assessment. Choosing knowledgeable and capable organizations to support you is very important. Some guidance on picking this support is below:&lt;br /&gt;
&lt;br /&gt;
* [[Identifying a Managed Service Provider]]&lt;br /&gt;
* [[Identifying a Consultant]]&lt;br /&gt;
* [[Identifying a Certified Third Party Assessing Organization (C3PAO)]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Continuous Compliance:&#039;&#039;&#039; Certification is not a one-time event. Organizations must continuously maintain their cybersecurity posture, as lapses in compliance can lead to a loss of certification or future contract eligibility.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Supply Chain Impact:&#039;&#039;&#039; Prime contractors are responsible for ensuring that their entire supply chain, including subcontractors, meet the required CMMC levels, which can make compliance across the supply chain complex.&lt;br /&gt;
&lt;br /&gt;
==CMMC 2.0 Update==&lt;br /&gt;
&lt;br /&gt;
The CMMC 2.0 model, announced in 2021, simplified the original model by reducing the number of levels from five to three. This updated version emphasizes self-assessments for lower-level contractors but retains third-party certification for higher-level contractors handling CUI. It aims to make compliance more streamlined and less burdensome while maintaining strong security requirements.&lt;br /&gt;
&lt;br /&gt;
== Conclusion==&lt;br /&gt;
&lt;br /&gt;
In the CMMC framework, self-assessments allow lower-tier contractors to meet basic security standards at a lower cost, while third-party certification is required for companies handling more sensitive data, such as CUI. This dual approach balances the need for strong cybersecurity controls with the practical realities of cost and resource constraints across the defense industrial base. Organizations aiming to do business with the DoD must understand their specific CMMC requirements and implement the necessary controls to achieve certification or self-assessment compliance.&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=32_CFR_Part_170_Key_Takeaways&amp;diff=118</id>
		<title>32 CFR Part 170 Key Takeaways</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=32_CFR_Part_170_Key_Takeaways&amp;diff=118"/>
		<updated>2025-02-26T00:51:19Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
On October 15, 2024 32 CFR Part 170 also known as the &amp;quot;CMMC Final Rule&amp;quot; was published to the Federal Register. Effective 60 days later, the CMMC program became in effect.&lt;br /&gt;
&lt;br /&gt;
Below are some key considerations, changes, and details to know with this rule&#039;s publication. This page&#039;s intent is to capture key differences, address changes between the draft rule and final published version.&lt;br /&gt;
&lt;br /&gt;
Link to the PDF: https://public-inspection.federalregister.gov/2024-22905.pdf&lt;br /&gt;
&lt;br /&gt;
Link to the FAR: https://www.federalregister.gov/public-inspection/2024-22905/cybersecurity-maturity-model-certification-program&lt;br /&gt;
&lt;br /&gt;
== Timelines ==&lt;br /&gt;
The Final Rule codifies that [[Joint Surveillance Voluntary Assessment (JSVA)|Joint Surveillance Voluntary Assessments (JSVAs)]] will equate to a CMMC Level 2 certification, assuming the organization received a perfect 110 score.&lt;br /&gt;
&lt;br /&gt;
DoD projects a 7-year timeline with a 4-year phased roll-out, initially.&lt;br /&gt;
&lt;br /&gt;
In FY2025, DoD will primarily be requiring self-assessments.  There will be approximately 500 expected third-party certifications required on contracts the first year.&lt;br /&gt;
&lt;br /&gt;
CMMC self-assessments must have a score of 88 or more to &amp;quot;pass&amp;quot; and be compliant.  The [[Affirming Official]] (formerly a &amp;quot;Senior Official&amp;quot; will need to affirm that the reporting is accurate.  Affirming this score carries personal criminal fraud risk, and affirmations may be verified in a third party assessment later.&lt;br /&gt;
&lt;br /&gt;
In FY2026, that 500 grows to about 2500 and by FY2027, about 9000.  By FY2028, DoD anticipates 16,000 third-party certifications needed a year.&lt;br /&gt;
&lt;br /&gt;
By the end of the rollout, the numbers projected by DoD are 4,000 self-assessed and 76,000 assessed by a [[Certified Third Party Assessment Organization (C3PAO)]].&lt;br /&gt;
&lt;br /&gt;
Many DIB contractors (and sub-contractors) can expect to be required to self-assessment, per contract and purchase order flow-down requirements.&lt;br /&gt;
&lt;br /&gt;
It&#039;s important to note that DoD has the discretion to delay the certification requirement to an option period instead of the condition of &amp;quot;upon contract award.&amp;quot;  While it&#039;s not expected this will be taken advantage of often, this does give DoD flexibility on specific programs that may have unique challenges to supply chain partners becoming certified.&lt;br /&gt;
&lt;br /&gt;
Additionally:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&amp;quot;The CMMC Program’s assessment phase-in plan, as described in § 170.3, does not preclude entities from immediately seeking a CMMC certification assessment prior to the 48 CFR part 204 CMMC Acquisition rule being finalized and the clause being added to new or existing DoD contracts.&amp;quot;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Security Protection Data ==&lt;br /&gt;
When Cloud Service Providers (CSPs) only handle security protection data (SPD), and not CUI, the application or service would be treated like a security protection asset (SPA).&lt;br /&gt;
&lt;br /&gt;
== Security Protection Assets ==&lt;br /&gt;
The Final Rule now suggests that Security Protection Assets (SPAs) will be assessed against security requirements that are &amp;quot;relevant to the capabilities provided.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&amp;quot;If an OSA utilizes an ESP, including a Cloud Service Provider (CSP), that does not process, store, or transmit CUI, the ESP does not require its own CMMC assessment. The services provided by the ESP are assessed as part of the OSC’s assessment as Security Protection Assets.&amp;quot;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== External Service Providers ==&lt;br /&gt;
The Final Rule clarifies the difference between [[Cloud Service Provider (CSP)|Cloud Service Providers (CSPs)]], [[External Service Provider (ESP)|External Service Providers (ESPs)]], and [[Managed Service Provider (MSP)|Managed Service Providers (MSPs)]].&lt;br /&gt;
&lt;br /&gt;
The requirement for ESPs (regardless of the services it provides) to be CMMC-Certified is no longer a requirement.  However, an MSP, acting as an ESP, may choose to become CMMC-Certified.&lt;br /&gt;
&lt;br /&gt;
The Final Rule suggests that Organizations Seeking Certification (OSC) may inherit controls for External Service Providers (ESPs) in scope when the ESP is CMMC-Certified. &lt;br /&gt;
&lt;br /&gt;
== Managed Service Providers ==&lt;br /&gt;
The Final Rule clarifies that Managed Service Providers (MSPs) do not need FedRAMP Moderate to support an Organization Seeking Certification (OSC).  &lt;br /&gt;
&lt;br /&gt;
The Rule also allows MSPs to get CMMC certified to avoid being re-assessed for every client.&lt;br /&gt;
&lt;br /&gt;
== FedRAMP &amp;amp; Equivalency ==&lt;br /&gt;
[[FedRAMP Moderate]] authorization is required when CUI is stored, processed, or transmitted in a cloud service offering.&lt;br /&gt;
&lt;br /&gt;
There is still some question on the commentary and verbiage, but there is clarity in that a CSP only handles security protection data (SPD), and not CUI, therefore, the application or service would be treated like a security protection asset (SPA).&lt;br /&gt;
&lt;br /&gt;
== Virtual Desktop Infrastructure ==&lt;br /&gt;
[[Virtual Desktop Infrastructure (VDI)]] language was added to remove the endpoint from scope if the endpoint is not processing, storing, or transmitting CUI.&lt;br /&gt;
&lt;br /&gt;
Assuming appropriate technical controls prevent data transfer, the &amp;quot;dumb client&amp;quot; (or the computer you open the virtual desktop from) can be kept out of scope. It was previously assumed that they would need to be at least a [[Contractor Risk Managed Asset (CRMA)]].&lt;br /&gt;
&lt;br /&gt;
== Assessors and the Training Community ==&lt;br /&gt;
The minimum number of assessors per third-party assessment has been expanded from 2 to 3.  Additionally, at Lead [[CMMC Certified Assessor (CCA)]] is required and at least one other CCA.  This will likely increase the projected costs of assessments.&lt;br /&gt;
&lt;br /&gt;
CMMC instructors are now prohibited to also consult.  Additional clarification is expected on this.&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Contact&amp;diff=117</id>
		<title>Contact</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Contact&amp;diff=117"/>
		<updated>2025-02-25T20:38:30Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: unbreaking markdown&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Contact Us ===&lt;br /&gt;
This wiki is created and maintained by a team of volunteers who are dedicated to providing accurate and helpful insights for the Defense Industrial Base (DIB) on their CMMC journey. While we strive for accuracy, this resource is provided &#039;&#039;&#039;as-is&#039;&#039;&#039;, with &#039;&#039;&#039;no guarantees or warranty&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== Need Help? ===&lt;br /&gt;
This wiki does &#039;&#039;&#039;not&#039;&#039;&#039; offer technical support. However, if you&#039;re looking for guidance or have general CMMC-related questions, we recommend checking out these community resources:&lt;br /&gt;
&lt;br /&gt;
* [https://cooey.life Cooey CoE] – A valuable resource for collaboration and expert insights. - &lt;br /&gt;
* [https://www.reddit.com/r/cmmc r/cmmc] – A community-driven space for discussions and Q&amp;amp;A. - &lt;br /&gt;
* [https://www.cmmc-coa.com CMMC Center of Awesomeness]&lt;br /&gt;
&lt;br /&gt;
=== Questions About This Wiki? ===&lt;br /&gt;
If you have questions specifically about this wiki, the best way to get in touch is through the [https://cooey.life Cooey CoE]. Someone there will be able to direct your inquiry to the right person.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note:&#039;&#039; This wiki is not directly associated with r/CMMC or the Cooey CoE. These resources are listed solely as potential avenues for community support.&lt;br /&gt;
&lt;br /&gt;
We appreciate your engagement and contributions to improving CMMC awareness and compliance across the DIB!&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Contact&amp;diff=116</id>
		<title>Contact</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Contact&amp;diff=116"/>
		<updated>2025-02-25T20:34:39Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: Created page with &amp;quot;# Contact Us  This wiki is created and maintained by a team of volunteers who are dedicated to providing accurate and helpful insights for the Defense Industrial Base (DIB) on their CMMC journey. While we strive for accuracy, this resource is provided **as-is**, with **no guarantees or warranty**.  ### Need Help? This wiki does **not** offer technical support. However, if you&amp;#039;re looking for guidance or have general CMMC-related questions, we recommend checking out these...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;# Contact Us&lt;br /&gt;
&lt;br /&gt;
This wiki is created and maintained by a team of volunteers who are dedicated to providing accurate and helpful insights for the Defense Industrial Base (DIB) on their CMMC journey. While we strive for accuracy, this resource is provided **as-is**, with **no guarantees or warranty**.&lt;br /&gt;
&lt;br /&gt;
### Need Help?&lt;br /&gt;
This wiki does **not** offer technical support. However, if you&#039;re looking for guidance or have general CMMC-related questions, we recommend checking out these community resources:&lt;br /&gt;
&lt;br /&gt;
- [Cooey Center of Excellence (CoE)](https://cooey.life) – A valuable resource for collaboration and expert insights.&lt;br /&gt;
- [r/CMMC Subreddit](https://www.reddit.com/r/cmmc/) – A community-driven space for discussions and Q&amp;amp;A.&lt;br /&gt;
- [CMMC Center of Awesomeness](https://www.cmmc-coa.com)&lt;br /&gt;
&lt;br /&gt;
### Questions About This Wiki?&lt;br /&gt;
If you have questions specifically about this wiki, the best way to get in touch is through the [Cooey CoE](https://cooey.life). Someone there will be able to direct your inquiry to the right person.&lt;br /&gt;
&lt;br /&gt;
**Please note:** This wiki is **not directly associated** with **r/CMMC** or the **Cooey CoE**. These resources are listed solely as potential avenues for community support.&lt;br /&gt;
&lt;br /&gt;
We appreciate your engagement and contributions to improving CMMC awareness and compliance across the DIB!&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=115</id>
		<title>MediaWiki:Sidebar</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=115"/>
		<updated>2025-02-25T20:29:43Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
* navigation&lt;br /&gt;
** mainpage|mainpage-description&lt;br /&gt;
**CMMC Overview|CMMC Overview&lt;br /&gt;
**Self-Assessment and Certification|Self-Assessment and Certification&lt;br /&gt;
**CUI|CUI&lt;br /&gt;
**Resources and Tools for Compliance|Resources and Tools for Compliance&lt;br /&gt;
**Preferred Partners|Preferred Partners&lt;br /&gt;
**Training and Education|Training and Education&lt;br /&gt;
**Frequently Asked Questions|FAQ&lt;br /&gt;
**Contact|Contact&lt;br /&gt;
* SEARCH&lt;br /&gt;
* TOOLBOX&lt;br /&gt;
* LANGUAGES&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=114</id>
		<title>MediaWiki:Sidebar</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=114"/>
		<updated>2025-02-25T20:29:20Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
* navigation&lt;br /&gt;
** mainpage|mainpage-description&lt;br /&gt;
**CMMC Overview|CMMC Overview&lt;br /&gt;
**Self-Assessment and Certification|Self-Assessment and Certification&lt;br /&gt;
**CUI|CUI&lt;br /&gt;
**Resources and Tools for Compliance|Resources and Tools for Compliance&lt;br /&gt;
**Preferred Partners|Preferred Partners&lt;br /&gt;
**Training and Education|Training and Education&lt;br /&gt;
**Frequently Asked Questions|FAQ&lt;br /&gt;
**Contact&lt;br /&gt;
* SEARCH&lt;br /&gt;
* TOOLBOX&lt;br /&gt;
* LANGUAGES&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=CMMC_Overview&amp;diff=113</id>
		<title>CMMC Overview</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=CMMC_Overview&amp;diff=113"/>
		<updated>2025-02-25T20:04:42Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: Removed the 800-171 families, to be re-done at a later date&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Cybersecurity Maturity Model Certification (CMMC) is a framework designed to enhance cybersecurity practices across the Defense Industrial Base ([[DIB]]). It applies to any organization within the supply chain (receiving specific [[DFARS]] flow-down) that works on contracts with the Department of Defense ([[DoD]]), ensuring these companies can safeguard Controlled Unclassified Information ([[CUI]]) and Federal Contract Information ([[FCI]]).&lt;br /&gt;
&lt;br /&gt;
In November 2021, in response to industry feedback, CMMC 2.0 was introduced to simplify the original model, making compliance more achievable while maintaining strong security standards. This updated framework reduces the original five certification levels down to three:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Level 1:&amp;lt;/u&amp;gt; Basic cyber hygiene practices, primarily protecting FCI. Organizations must implement 17 practices aligned with Federal Acquisition Regulation ([[FAR]]) 52.204-21.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Level 2:&amp;lt;/u&amp;gt; Aligned with NIST SP 800-171 Rev 2, this level applies to companies that handle CUI. It includes 110 security controls required by [[NIST 800-171]], emphasizing areas such as access control, incident response, and system security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Level 3:&amp;lt;/u&amp;gt; Designed for companies with the highest cybersecurity requirements, Level 3 incorporates advanced practices beyond NIST SP 800-171 and will be aligned with a subset of controls from [[NIST SP 800-172]], focusing on defending against advanced persistent threats ([[APT]]s).&lt;br /&gt;
&lt;br /&gt;
=== [[Self-Assessment and Certification]]: ===&lt;br /&gt;
&lt;br /&gt;
Under CMMC 2.0, organizations handling only FCI at Level 1 can conduct annual self-assessments. For Level 2, companies handling critical CUI must undergo third-party assessments or self-attest depending on the criticality of the contract. Level 3 requires comprehensive third-party assessments by the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC).&lt;br /&gt;
&lt;br /&gt;
=== Why CMMC is Important ===&lt;br /&gt;
&lt;br /&gt;
The DoD created CMMC to ensure that companies in the DIB have adequate protections in place to secure sensitive information and defend against cyber threats. Compliance with CMMC 2.0 helps protect national security, secure supply chains, and build trust between the DoD and its contractors.&lt;br /&gt;
&lt;br /&gt;
For organizations in the defense supply chain, preparing for CMMC 2.0 requires:&lt;br /&gt;
&lt;br /&gt;
* Implementing controls based on NIST 800-171 Rev 2 (for Level 2),&lt;br /&gt;
&lt;br /&gt;
* Engaging in [[continuous monitoring]] and [[security improvements]],&lt;br /&gt;
&lt;br /&gt;
* And obtaining certification through third-party or self-assessments, depending on the level of compliance required.&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=FAQ&amp;diff=105</id>
		<title>FAQ</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=FAQ&amp;diff=105"/>
		<updated>2024-11-04T16:49:41Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: /* What should I do if my customer requests my SPRS score? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The DoD CIO has published their own FAQ here: https://dodcio.defense.gov/CMMC/FAQs/&lt;br /&gt;
&lt;br /&gt;
____________________________________________________&lt;br /&gt;
&lt;br /&gt;
The COE Discord and CMMC Reddit pages are free resources led by the community.  Some of the most common questions are listed below, along with some of the answers offered.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;NOTE: Depending on your own situation, these answers may not work for your environment.  Work with your own compliance or legal team to ensure your implementation and interpretation is acceptable for compliance.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== How much does compliance cost? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== How do I know if I have CUI? ===&lt;br /&gt;
It should be marked by the person who sent it to you.  If it&#039;s not, but if your purchase order or contract flow-down requires you to protect the data as if it were CUI, contact your buyer/customer and ask for clarification.&lt;br /&gt;
&lt;br /&gt;
Have you watched Ryan Bonner&#039;s [https://www.youtube.com/watch?v=IEy-TkmKMt8 video] on this?&lt;br /&gt;
&lt;br /&gt;
=== Are machine files (like CAD models) CUI if I create them as the manufacturer? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== How do I convince management to be compliant? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What can I expect during a CMMC assessment? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== Do all of my Security Protection Assets (SPA)s need to be CMMC-compliant? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== How do I choose a C3PAO? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What options are out there for training to become a CCP/CCA? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What should my System Security Plan (SSP) look like, what should it include, and how long should it be? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== What is the difference between Plan of Actions and Milestones (POAM) and Operational Plan of Action (OPOA)? ===&lt;br /&gt;
Items put on POAM must be closed out within 180 days, and must be one of the allowable items.&lt;br /&gt;
&lt;br /&gt;
Items on a OPOA are items that were acceptable before, but are temporarily not compliant for some reason.&lt;br /&gt;
&lt;br /&gt;
=== Is Department of Defense (DoD) the only government agency that requires CMMC? ===&lt;br /&gt;
As of right now (November 2024), yes.  Department of Energy, and others, may call out NIST 800-171, but at this time, DoD is the only government agency that is poised to require third party assessments to confirm compliance.&lt;br /&gt;
&lt;br /&gt;
=== What&#039;s the difference between a Registered Practitioner (RP) and a CCP? ===&lt;br /&gt;
ANSWERS HERE&lt;br /&gt;
&lt;br /&gt;
=== Are phones in scope of a CMMC audit? ===&lt;br /&gt;
If phones (mobile devices) are capable of accessing the information system that stores FCI or CUI, yes.&lt;br /&gt;
&lt;br /&gt;
=== What do I do if I&#039;m sent CUI by my customer? ===&lt;br /&gt;
There&#039;s not much to do when a sender doesn&#039;t follow directions pertinent to your environment.&lt;br /&gt;
&lt;br /&gt;
The best thing is to have policies in place on what to do when it actually happens.&lt;br /&gt;
&lt;br /&gt;
Arguably, small businesses that rely on big primes business have a harder time telling their customers that they&#039;re not following directions, and expecting not to become the problem child as a result.&lt;br /&gt;
&lt;br /&gt;
One small business owner says: &amp;quot;Early on in the process, we sent out a memo to all of our aerospace customers, reminding them of CUI sharing responsibilities per flow down. We did it under the guise that we just wanted them to be aware that we were compliant in our practices.&lt;br /&gt;
&lt;br /&gt;
It allowed us the opportunity to remind them on proper sharing practices.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
If some small businesses had to file a report for every single time CUI was inadvertently shared unencrypted through email, by its big customer who should arguably know better, those small businesses would have no business.&lt;br /&gt;
&lt;br /&gt;
It&#039;s helpful to consider &amp;quot;what is it that we&#039;re trying to do here?&amp;quot; It&#039;s helpful to get grounded here and there.&lt;br /&gt;
&lt;br /&gt;
You can only control your own environment, and your own team. If the best you can do is over communicate and remain hyper aware once data is in your environment, then you&#039;re light years ahead of most.&lt;br /&gt;
&lt;br /&gt;
=== What should I do if my customer requests my SPRS score? ===&lt;br /&gt;
If you are prime on the contract, your Contract Officer has the ability to see your score in SPRS, provided that you have submitted a score. If you are a subcontractor, your customer cannot see your score in SPRS. They may request you provide evidence of your submission, and may also request details of the score or even a copy of your SSP. You do not have a DoD contractual obligation to provide this information, however your mileage may vary when it comes to how much you can push back on providing this information.&lt;br /&gt;
&lt;br /&gt;
=== Do all of my applications have to be FedRAMP to be CMMC compliant? ===&lt;br /&gt;
ANSWERS HERE&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Joint_Surveillance_Voluntary_Assessment_(JSVA)&amp;diff=101</id>
		<title>Joint Surveillance Voluntary Assessment (JSVA)</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Joint_Surveillance_Voluntary_Assessment_(JSVA)&amp;diff=101"/>
		<updated>2024-10-25T14:55:53Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: Created page with &amp;quot;Joint Surveillance Voluntary Assessment (JSVA) are assessments performed by a CMMC Certified 3rd Party Assessor (C3PAO) and witnessed by DIBCAC, who also performs a DFARS compliance verification. As the name implies, these assessments are voluntary.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Joint Surveillance Voluntary Assessment (JSVA) are assessments performed by a CMMC Certified 3rd Party Assessor (C3PAO) and witnessed by DIBCAC, who also performs a DFARS compliance verification. As the name implies, these assessments are voluntary.&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=FAQ&amp;diff=100</id>
		<title>FAQ</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=FAQ&amp;diff=100"/>
		<updated>2024-10-25T14:49:32Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: Created page with &amp;quot;The DoD CIO has published their own FAQ here: https://dodcio.defense.gov/CMMC/FAQs/&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The DoD CIO has published their own FAQ here: https://dodcio.defense.gov/CMMC/FAQs/&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=32_CFR_Part_170_Key_Takeaways&amp;diff=99</id>
		<title>32 CFR Part 170 Key Takeaways</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=32_CFR_Part_170_Key_Takeaways&amp;diff=99"/>
		<updated>2024-10-14T13:54:31Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: /* Virtual Desktop Infrastructure */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
On October 15, 2024 32 CFR Part 170 also known as the &amp;quot;CMMC Final Rule&amp;quot; is published to the Federal Register. Effective 60 days later, the CMMC program is in effect.&lt;br /&gt;
&lt;br /&gt;
Below are some key considerations, changes, and details to know with this rule&#039;s publication. This page&#039;s intent is to capture key differences, address changes between the draft rule and final published version.&lt;br /&gt;
&lt;br /&gt;
Link to the PDF: https://public-inspection.federalregister.gov/2024-22905.pdf&lt;br /&gt;
&lt;br /&gt;
Link to the FAR: https://www.federalregister.gov/public-inspection/2024-22905/cybersecurity-maturity-model-certification-program&lt;br /&gt;
&lt;br /&gt;
== Timelines ==&lt;br /&gt;
The Final Rule codifies that [[Joint Surveillance Voluntary Assessment (JSVA)|Joint Surveillance Voluntary Assessments (JSVAs)]] will equate to a CMMC Level 2 certification, assuming the organization received a perfect 110 score.&lt;br /&gt;
&lt;br /&gt;
DoD projects a 7-year timeline with a 4-year phased roll-out, initially.&lt;br /&gt;
&lt;br /&gt;
In FY2025, DoD will primarily be requiring self-assessments.  There will be approximately 500 expected third-party certifications required on contracts the first year.&lt;br /&gt;
&lt;br /&gt;
CMMC self-assessments must have a score of 88 or more to &amp;quot;pass&amp;quot; and be compliant.  The [[Affirming Official]] (formerly a &amp;quot;Senior Official&amp;quot; will need to affirm that the reporting is accurate.  Affirming this score carries personal criminal fraud risk, and affirmations may be verified in a third party assessment later.&lt;br /&gt;
&lt;br /&gt;
In FY2026, that 500 grows to about 2500 and by FY2027, about 9000.  By FY2028, DoD anticipates 16,000 third-party certifications needed a year.&lt;br /&gt;
&lt;br /&gt;
By the end of the rollout, the numbers projected by DoD are 4,000 self-assessed and 76,000 assessed by a [[Certified Third Party Assessment Organization (C3PAO)]].&lt;br /&gt;
&lt;br /&gt;
Many DIB contractors (and sub-contractors) can expect to be required to self-assessment, per contract and purchase order flow-down requirements.&lt;br /&gt;
&lt;br /&gt;
It&#039;s important to note that DoD has the discretion to delay the certification requirement to an option period instead of the condition of &amp;quot;upon contract award.&amp;quot;  While it&#039;s not expected this will be taken advantage of often, this does give DoD flexibility on specific programs that may have unique challenges to supply chain partners becoming certified.&lt;br /&gt;
&lt;br /&gt;
Additionally:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&amp;quot;The CMMC Program’s assessment phase-in plan, as described in § 170.3, does not preclude entities from immediately seeking a CMMC certification assessment prior to the 48 CFR part 204 CMMC Acquisition rule being finalized and the clause being added to new or existing DoD contracts.&amp;quot;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== Security Protection Data ==&lt;br /&gt;
When Cloud Service Providers (CSPs) only handle security protection data (SPD), and not CUI, the application or service would be treated like a security protection asset (SPA).&lt;br /&gt;
&lt;br /&gt;
== Security Protection Assets ==&lt;br /&gt;
The Final Rule now suggests that Security Protection Assets (SPAs) will be assessed against security requirements that are &amp;quot;relevant to the capabilities provided.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&amp;quot;If an OSA utilizes an ESP, including a Cloud Service Provider (CSP), that does not process, store, or transmit CUI, the ESP does not require its own CMMC assessment. The services provided by the ESP are assessed as part of the OSC’s assessment as Security Protection Assets.&amp;quot;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
== External Service Providers ==&lt;br /&gt;
The Final Rule clarifies the difference between [[Cloud Service Provider (CSP)|Cloud Service Providers (CSPs)]], [[External Service Provider (ESP)|External Service Providers (ESPs)]], and [[Managed Service Provider (MSP)|Managed Service Providers (MSPs)]].&lt;br /&gt;
&lt;br /&gt;
The requirement for ESPs (regardless of the services it provides) to be CMMC-Certified is no longer a requirement.  However, an MSP, acting as an ESP, may choose to become CMMC-Certified.&lt;br /&gt;
&lt;br /&gt;
The Final Rule suggests that Organizations Seeking Certification (OSC) may inherit controls for External Service Providers (ESPs) in scope when the ESP is CMMC-Certified. &lt;br /&gt;
&lt;br /&gt;
== Managed Service Providers ==&lt;br /&gt;
The Final Rule clarifies that Managed Service Providers (MSPs) do not need FedRAMP Moderate to support an Organization Seeking Certification (OSC).  &lt;br /&gt;
&lt;br /&gt;
The Rule also allows MSPs to get CMMC certified to avoid being re-assessed for every client.&lt;br /&gt;
&lt;br /&gt;
== FedRAMP &amp;amp; Equivalency ==&lt;br /&gt;
[[FedRAMP Moderate]] authorization is required when CUI is stored, processed, or transmitted in a cloud service offering.&lt;br /&gt;
&lt;br /&gt;
There is still some question on the commentary and verbiage, but there is clarity in that a CSP only handles security protection data (SPD), and not CUI, therefore, the application or service would be treated like a security protection asset (SPA).&lt;br /&gt;
&lt;br /&gt;
== Virtual Desktop Infrastructure ==&lt;br /&gt;
[[Virtual Desktop Infrastructure (VDI)]] language was added to remove the endpoint from scope if the endpoint is not processing, storing, or transmitting CUI.&lt;br /&gt;
&lt;br /&gt;
Assuming appropriate technical controls prevent data transfer, the &amp;quot;dumb client&amp;quot; (or the computer you open the virtual desktop from) can be kept out of scope. It was previously assumed that they would need to be at least a [[Contractor Risk Managed Asset (CRMA)]].&lt;br /&gt;
&lt;br /&gt;
== Assessors and the Training Community ==&lt;br /&gt;
The minimum number of assessors per third-party assessment has been expanded from 2 to 3.  Additionally, at Lead [[CMMC Certified Assessor (CCA)]] is required and at least one other CCA.  This will likely increase the projected costs of assessments.&lt;br /&gt;
&lt;br /&gt;
CMMC instructors are now prohibited to also consult.  Additional clarification is expected on this.&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=32_CFR_Part_170_Key_Takeaways&amp;diff=95</id>
		<title>32 CFR Part 170 Key Takeaways</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=32_CFR_Part_170_Key_Takeaways&amp;diff=95"/>
		<updated>2024-10-11T22:50:49Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
On October 15, 2024 32 CFR Part 170 also known as the &amp;quot;CMMC Final Rule&amp;quot; is published to the Federal Register. Effective 60 days later, the CMMC program is in effect.&lt;br /&gt;
&lt;br /&gt;
Below are some key considerations, changes, and details to know with this rule&#039;s publication. This page&#039;s intent is to capture key differences, address changes between the draft rule and final published version.&lt;br /&gt;
&lt;br /&gt;
Link to the PDF: https://public-inspection.federalregister.gov/2024-22905.pdf&lt;br /&gt;
&lt;br /&gt;
Link to the FAR: https://www.federalregister.gov/public-inspection/2024-22905/cybersecurity-maturity-model-certification-program&lt;br /&gt;
&lt;br /&gt;
== Timelines ==&lt;br /&gt;
Phased rollout, 48 CFR, blah blah&lt;br /&gt;
&lt;br /&gt;
== Security Protection Data ==&lt;br /&gt;
lorem ipsum&lt;br /&gt;
&lt;br /&gt;
== Security Protection Assets ==&lt;br /&gt;
lorem ipsum&lt;br /&gt;
&lt;br /&gt;
== External Service Providers ==&lt;br /&gt;
lorem ipsum&lt;br /&gt;
&lt;br /&gt;
== Managed Service Providers ==&lt;br /&gt;
are great&lt;br /&gt;
&lt;br /&gt;
== FedRAMP &amp;amp; Equivalency ==&lt;br /&gt;
lorem ipsum&lt;br /&gt;
&lt;br /&gt;
== Virtual Desktop Infrastructure ==&lt;br /&gt;
CRMA? More like CROHYAY&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Main_Page&amp;diff=94</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Main_Page&amp;diff=94"/>
		<updated>2024-10-11T22:48:29Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: /* Hot Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Main Wiki Pages ==&lt;br /&gt;
*[[CMMC Overview]]&lt;br /&gt;
*[[Self-Assessment and Certification]]&lt;br /&gt;
*[[CUI]]&lt;br /&gt;
*[[Resources and Tools for Compliance]]&lt;br /&gt;
*[[Preferred Partners]]&lt;br /&gt;
*[[Training and Education]] - (for CCA/CCP/LTP)&lt;br /&gt;
*[[FAQ|Frequently Asked Questions]]&lt;br /&gt;
&lt;br /&gt;
== Hot Topics ==&lt;br /&gt;
&lt;br /&gt;
* [[32 CFR Part 170 Key Takeaways]]&lt;br /&gt;
* [[48 CFR Parts 204, 212, 217, and 252 Proposed Rule]]&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Main_Page&amp;diff=93</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Main_Page&amp;diff=93"/>
		<updated>2024-10-11T22:46:43Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Main Wiki Pages ==&lt;br /&gt;
*[[CMMC Overview]]&lt;br /&gt;
*[[Self-Assessment and Certification]]&lt;br /&gt;
*[[CUI]]&lt;br /&gt;
*[[Resources and Tools for Compliance]]&lt;br /&gt;
*[[Preferred Partners]]&lt;br /&gt;
*[[Training and Education]] - (for CCA/CCP/LTP)&lt;br /&gt;
*[[FAQ|Frequently Asked Questions]]&lt;br /&gt;
&lt;br /&gt;
== Hot Topics ==&lt;br /&gt;
&lt;br /&gt;
* [[32 CFR Part 170 Key Takeaways]]&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=32_CFR_Part_170_Key_Takeaways&amp;diff=92</id>
		<title>32 CFR Part 170 Key Takeaways</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=32_CFR_Part_170_Key_Takeaways&amp;diff=92"/>
		<updated>2024-10-11T22:45:51Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: Created page with &amp;quot;== Introduction == On October 15, 2024 32 CFR Part 170 also known as the &amp;quot;CMMC Final Rule&amp;quot; is published to the Federal Register. Effective 60 days later, the CMMC program is in effect.  Below are some key considerations, changes, and details to know with this rule&amp;#039;s publication. This page&amp;#039;s intent is to capture key differences, address changes between the draft rule and final published version.  == Timelines == Phased rollout, 48 CFR, blah blah  == Security Protection Da...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
On October 15, 2024 32 CFR Part 170 also known as the &amp;quot;CMMC Final Rule&amp;quot; is published to the Federal Register. Effective 60 days later, the CMMC program is in effect.&lt;br /&gt;
&lt;br /&gt;
Below are some key considerations, changes, and details to know with this rule&#039;s publication. This page&#039;s intent is to capture key differences, address changes between the draft rule and final published version.&lt;br /&gt;
&lt;br /&gt;
== Timelines ==&lt;br /&gt;
Phased rollout, 48 CFR, blah blah&lt;br /&gt;
&lt;br /&gt;
== Security Protection Data ==&lt;br /&gt;
lorem ipsum&lt;br /&gt;
&lt;br /&gt;
== Security Protection Assets ==&lt;br /&gt;
lorem ipsum&lt;br /&gt;
&lt;br /&gt;
== External Service Providers ==&lt;br /&gt;
lorem ipsum&lt;br /&gt;
&lt;br /&gt;
== Managed Service Providers ==&lt;br /&gt;
are great&lt;br /&gt;
&lt;br /&gt;
== FedRAMP &amp;amp; Equivalency ==&lt;br /&gt;
lorem ipsum&lt;br /&gt;
&lt;br /&gt;
== Virtual Desktop Infrastructure ==&lt;br /&gt;
CRMA? More like CROHYAY&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Main_Page&amp;diff=91</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Main_Page&amp;diff=91"/>
		<updated>2024-10-11T22:41:08Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: /* Hot Topics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== MAIN WIKI PAGES: ==&lt;br /&gt;
*[[CMMC Overview]]&lt;br /&gt;
*[[Self-Assessment and Certification]]&lt;br /&gt;
*[[CUI]]&lt;br /&gt;
*[[Resources and Tools for Compliance]]&lt;br /&gt;
*[[Preferred Partners]]&lt;br /&gt;
*[[Training and Education]] - (for CCA/CCP/LTP)&lt;br /&gt;
*[[FAQ|Frequently Asked Questions]]&lt;br /&gt;
&lt;br /&gt;
== Hot Topics ==&lt;br /&gt;
&lt;br /&gt;
* [[32 CFR Part 170 Key Takeaways]]&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Main_Page&amp;diff=90</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Main_Page&amp;diff=90"/>
		<updated>2024-10-11T22:40:49Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== MAIN WIKI PAGES: ==&lt;br /&gt;
*[[CMMC Overview]]&lt;br /&gt;
*[[Self-Assessment and Certification]]&lt;br /&gt;
*[[CUI]]&lt;br /&gt;
*[[Resources and Tools for Compliance]]&lt;br /&gt;
*[[Preferred Partners]]&lt;br /&gt;
*[[Training and Education]] - (for CCA/CCP/LTP)&lt;br /&gt;
*[[FAQ|Frequently Asked Questions]]&lt;br /&gt;
&lt;br /&gt;
== Hot Topics ==&lt;br /&gt;
&lt;br /&gt;
* 32 CFR Part 170 Key Takeaways&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Access_Control&amp;diff=89</id>
		<title>Access Control</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Access_Control&amp;diff=89"/>
		<updated>2024-10-10T01:32:34Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Access Control is one of the 14 security families in NIST 800-171 Rev 2, which provides guidelines for protecting Controlled Unclassified Information (CUI) in nonfederal systems and organizations. The Access Control family focuses on limiting access to information systems, applications, and data to authorized individuals and ensuring that only those with appropriate permissions can access sensitive information. This helps prevent unauthorized access, which is critical for maintaining the security and confidentiality of CUI.&lt;br /&gt;
&lt;br /&gt;
== Key Access Control Requirements in NIST 800-171 Rev 2:==&lt;br /&gt;
&lt;br /&gt;
The Access Control family contains 22 security requirements. These are summarized below.&lt;br /&gt;
&lt;br /&gt;
===1. Limit System Access to Authorized Users (3.1.1)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must limit access to information systems to only authorized users, processes acting on behalf of users, and devices.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Ensure that only individuals with the proper credentials and roles can access specific systems or data.&lt;br /&gt;
&lt;br /&gt;
===2. Limit Access to the Types of Transactions and Functions (3.1.2)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Basic Requirement:&#039;&#039;&#039; Organizations must limit access to only the specific transactions, systems, and functions that authorized users are permitted to perform based on their role.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Apply role-based access control (RBAC) or similar mechanisms to restrict user access to only the resources needed for their job functions.&lt;br /&gt;
&lt;br /&gt;
===3. Control the Flow of CUI (3.1.3)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must control the flow of CUI within their systems and between systems to ensure it is only accessed or transmitted by authorized entities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Implement measures like encryption, firewall rules, or traffic filtering to ensure that data is not accessible to unauthorized parties or transferred to unauthorized systems.&lt;br /&gt;
&lt;br /&gt;
===4. Separate the Duties of Individuals (3.1.4)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must implement the separation of duties to prevent individuals from having too much control or oversight over key functions, which could lead to security vulnerabilities or fraud.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Assign different responsibilities and privileges to multiple personnel to avoid conflicts of interest and reduce the risk of malicious activities.&lt;br /&gt;
&lt;br /&gt;
===5. Limit Access to CUI on System Media (3.1.5)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Access to CUI stored on system media (such as USB drives, CDs, or printed documents) should be limited to authorized users, and organizations must protect these media from unauthorized access.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Ensure physical and logical access to removable media and printed materials containing CUI is strictly controlled.&lt;br /&gt;
&lt;br /&gt;
===6. Control Access to Systems Connected to External Networks (3.1.6)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must control access to their systems, especially when they are connected to external networks or systems outside their organizational control.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Implement strong controls, such as firewalls, VPNs, or proxies, to manage how internal systems interact with external networks and protect against unauthorized access.&lt;br /&gt;
&lt;br /&gt;
===7. Use of Identification and Authentication for Remote Access (3.1.7)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must enforce the use of strong identification and authentication mechanisms (e.g., multi-factor authentication) for users accessing systems remotely.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Ensure that remote users are authenticated using more than just a password, such as through multi-factor authentication (MFA).&lt;br /&gt;
&lt;br /&gt;
===8. Authorize Remote Execution of Commands and Scripts (3.1.8)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must limit the ability to execute remote commands and scripts to authorized users.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Prevent unauthorized users from executing scripts or commands that could compromise the system or data.&lt;br /&gt;
&lt;br /&gt;
===9. Terminate Inactive Sessions (3.1.9)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Organizations must configure systems to automatically terminate or lock user sessions after a defined period of inactivity.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Reduce the risk of unauthorized access if a user leaves a session open and unattended.&lt;br /&gt;
&lt;br /&gt;
===10. Limit Concurrent Sessions (3.1.10)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Limit the number of concurrent sessions an individual can have open on a system.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Prevent misuse of multiple sessions and ensure that users do not bypass access controls through simultaneous logins.&lt;br /&gt;
&lt;br /&gt;
===11. Control Access to Mobile Devices (3.1.11)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Implement policies to control access to systems and CUI through mobile devices such as smartphones, tablets, and laptops.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Ensure that mobile device usage is secure, including the implementation of encryption and remote wipe capabilities if devices are lost or stolen.&lt;br /&gt;
&lt;br /&gt;
===12. Encrypt CUI on Mobile Devices and Removable Media (3.1.19)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Protect CUI stored on mobile devices or removable media through encryption or other security measures to prevent unauthorized access.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Encrypt CUI to protect it in case the device or media is lost, stolen, or accessed by unauthorized individuals.&lt;br /&gt;
&lt;br /&gt;
===13. Session Lock (3.1.12)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Implement a session lock capability for systems that require users to re-authenticate after the system has been idle for a period.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Automatically lock systems during idle periods to prevent unauthorized access.&lt;br /&gt;
&lt;br /&gt;
===14. Encrypt Remote Access (3.1.13)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Ensure that remote access to information systems is protected by encryption, safeguarding data from being intercepted by unauthorized parties.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Use encryption technologies like VPNs or TLS (Transport Layer Security) for remote access connections.&lt;br /&gt;
&lt;br /&gt;
===15. Restrict Access to Privileged Functions (3.1.14)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Limit access to privileged functions, such as administrative tasks, to only authorized personnel.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Ensure that users with higher privileges (such as system administrators) have restricted access to sensitive functions based on need.&lt;br /&gt;
&lt;br /&gt;
===16. Prevent Non-Privileged Users from Executing Privileged Commands (3.1.15)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Ensure that non-privileged users cannot execute privileged commands or functions.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Use strict access control to prevent unauthorized users from gaining administrative control over the system.&lt;br /&gt;
&lt;br /&gt;
===17. Control Access to Audit Information (3.1.16)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Limit access to audit logs and audit-related information to prevent tampering or unauthorized review by individuals who are not authorized to see it.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Only allow authorized personnel to view and manage audit logs to ensure data integrity and accountability.&lt;br /&gt;
&lt;br /&gt;
===18. Separation of User and Privileged Functions (3.1.17)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Enforce a separation between regular user activities and privileged operations, ensuring that users with administrative privileges do not use them for everyday tasks.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Limit the use of privileged accounts to only necessary administrative functions.&lt;br /&gt;
&lt;br /&gt;
===19. Prevent Unauthorized Use of Collaborative Computing Devices (3.1.18)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Implement controls to prevent the unauthorized use of collaborative computing devices, such as video or audio conferencing systems, within information systems.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Ensure that shared devices used for collaboration are secured and that only authorized users can access them.&lt;br /&gt;
&lt;br /&gt;
===20. Automate Control of Temporary and Emergency Accounts (3.1.20)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Automatically manage and control the use of temporary or emergency accounts to ensure they are deactivated when no longer needed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Ensure that these accounts are monitored and disabled after their purpose has been fulfilled to avoid potential misuse.&lt;br /&gt;
&lt;br /&gt;
===21. Disable Inactive Accounts (3.1.21)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Disable accounts that are inactive for a specified period to prevent unauthorized use.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Implement automated processes to detect and disable inactive user accounts.&lt;br /&gt;
&lt;br /&gt;
===22. Control the Use of External Systems (3.1.22)===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Derived Requirement:&#039;&#039;&#039; Establish policies and controls to limit the use of external systems (such as personal laptops or non-company networks) for accessing CUI.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Focus:&#039;&#039;&#039; Ensure that systems outside the organization’s control cannot access CUI unless authorized and properly secured.&lt;br /&gt;
Summary:&lt;br /&gt;
&lt;br /&gt;
Access control in NIST 800-171 Rev 2 emphasizes restricting and managing access to systems and data to ensure only authorized individuals and devices can access CUI. The controls focus on implementing strong authentication, role-based access control, session management, encryption, and least privilege principles, all aimed at minimizing the risk of unauthorized access and ensuring the protection of sensitive information within the organization.&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=86</id>
		<title>MediaWiki:Sidebar</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=86"/>
		<updated>2024-09-30T15:46:24Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
* navigation&lt;br /&gt;
** mainpage|mainpage-description&lt;br /&gt;
**CMMC Overview|CMMC Overview&lt;br /&gt;
**Self-Assessment and Certification|Self-Assessment and Certification&lt;br /&gt;
**CUI|CUI&lt;br /&gt;
**Resources and Tools for Compliance|Resources and Tools for Compliance&lt;br /&gt;
**Preferred Partners|Preferred Partners&lt;br /&gt;
**Training and Education|Training and Education&lt;br /&gt;
**Frequently Asked Questions|FAQ&lt;br /&gt;
* SEARCH&lt;br /&gt;
* TOOLBOX&lt;br /&gt;
* LANGUAGES&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=85</id>
		<title>MediaWiki:Sidebar</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=85"/>
		<updated>2024-09-30T15:45:24Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
* navigation&lt;br /&gt;
** mainpage|mainpage-description&lt;br /&gt;
**CMMC Overview|CMMC Overview&lt;br /&gt;
**Self-Assessment and Certification|Self-Assessment and Certification&lt;br /&gt;
**CUI|CUI&lt;br /&gt;
**Resources and Tools for Compliance|Resources and Tools for Compliance&lt;br /&gt;
**Preferred Partners|Preferred Partners&lt;br /&gt;
**Training and Education|Training and Education&lt;br /&gt;
**Frequently Asked Questions|FAQ&lt;br /&gt;
* Site pages&lt;br /&gt;
** recentchanges-url|recentchanges&lt;br /&gt;
** randompage-url|randompage&lt;br /&gt;
** helppage|help-mediawiki&lt;br /&gt;
* SEARCH&lt;br /&gt;
* TOOLBOX&lt;br /&gt;
* LANGUAGES&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=84</id>
		<title>MediaWiki:Sidebar</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=84"/>
		<updated>2024-09-30T15:44:52Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
* navigation&lt;br /&gt;
** mainpage|mainpage-description&lt;br /&gt;
**CMMC Overview|CMMC Overview&lt;br /&gt;
**Self-Assessment and Certification|Self-Assessment and Certification&lt;br /&gt;
**CUI|CUI&lt;br /&gt;
**Resources and Tools for Compliance|Resources and Tools for Compliance&lt;br /&gt;
**Preferred Partners|Preferred Partners&lt;br /&gt;
**Training and Education|Training and Education&lt;br /&gt;
**Frequently Asked Questions|FAQ&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
** recentchanges-url|recentchanges&lt;br /&gt;
** randompage-url|randompage&lt;br /&gt;
** helppage|help-mediawiki&lt;br /&gt;
* SEARCH&lt;br /&gt;
* TOOLBOX&lt;br /&gt;
* LANGUAGES&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=83</id>
		<title>MediaWiki:Sidebar</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=83"/>
		<updated>2024-09-30T15:43:51Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
* navigation&lt;br /&gt;
** mainpage|mainpage-description&lt;br /&gt;
**CMMC Overview|CMMC Overview&lt;br /&gt;
**Self-Assessment and Certification|Self-Assessment and Certification&lt;br /&gt;
**CUI|CUI&lt;br /&gt;
**Resources and Tools for Compliance|Resources and Tools for Compliance&lt;br /&gt;
**Preferred Partners|Preferred Partners&lt;br /&gt;
**Training and Education|Training and Education&lt;br /&gt;
**Frequently Asked Questions|FAQ&lt;br /&gt;
** recentchanges-url|recentchanges&lt;br /&gt;
** randompage-url|randompage&lt;br /&gt;
** helppage|help-mediawiki&lt;br /&gt;
* SEARCH&lt;br /&gt;
* TOOLBOX&lt;br /&gt;
* LANGUAGES&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=82</id>
		<title>MediaWiki:Sidebar</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=82"/>
		<updated>2024-09-30T15:42:58Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
* navigation&lt;br /&gt;
** mainpage|mainpage-description&lt;br /&gt;
**CMMC Overview&lt;br /&gt;
**Self-Assessment and Certification&lt;br /&gt;
**CUI&lt;br /&gt;
**Resources and Tools for Compliance&lt;br /&gt;
**Preferred Partners&lt;br /&gt;
**Training and Education&lt;br /&gt;
**FAQ|Frequently Asked Questions&lt;br /&gt;
** recentchanges-url|recentchanges&lt;br /&gt;
** randompage-url|randompage&lt;br /&gt;
** helppage|help-mediawiki&lt;br /&gt;
* SEARCH&lt;br /&gt;
* TOOLBOX&lt;br /&gt;
* LANGUAGES&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=81</id>
		<title>MediaWiki:Sidebar</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=81"/>
		<updated>2024-09-30T15:40:52Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
* navigation&lt;br /&gt;
** mainpage|mainpage-description&lt;br /&gt;
** recentchanges-url|recentchanges&lt;br /&gt;
** randompage-url|randompage&lt;br /&gt;
** helppage|help-mediawiki&lt;br /&gt;
* SEARCH&lt;br /&gt;
* TOOLBOX&lt;br /&gt;
* LANGUAGES&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=80</id>
		<title>MediaWiki:Sidebar</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=MediaWiki:Sidebar&amp;diff=80"/>
		<updated>2024-09-30T15:40:24Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: Created page with &amp;quot; * navigation ** mainpage|mainpage-description **CMMC Overview **Self-Assessment and Certification **CUI **Resources and Tools for Compliance **Preferred Partners **Training and Education - (for CCA/CCP/LTP) **Frequently Asked Questions ** recentchanges-url|recentchanges ** randompage-url|randompage ** helppage|help-mediawiki * SEARCH * TOOLBOX * LANGUAGES&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
* navigation&lt;br /&gt;
** mainpage|mainpage-description&lt;br /&gt;
**[[CMMC Overview]]&lt;br /&gt;
**[[Self-Assessment and Certification]]&lt;br /&gt;
**[[CUI]]&lt;br /&gt;
**[[Resources and Tools for Compliance]]&lt;br /&gt;
**[[Preferred Partners]]&lt;br /&gt;
**[[Training and Education]] - (for CCA/CCP/LTP)&lt;br /&gt;
**[[FAQ|Frequently Asked Questions]]&lt;br /&gt;
** recentchanges-url|recentchanges&lt;br /&gt;
** randompage-url|randompage&lt;br /&gt;
** helppage|help-mediawiki&lt;br /&gt;
* SEARCH&lt;br /&gt;
* TOOLBOX&lt;br /&gt;
* LANGUAGES&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Main_Page&amp;diff=79</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Main_Page&amp;diff=79"/>
		<updated>2024-09-30T12:25:11Z</updated>

		<summary type="html">&lt;p&gt;Uncouth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;MAIN WIKI PAGES:&lt;br /&gt;
&lt;br /&gt;
*[[CMMC Overview]]&lt;br /&gt;
*[[Self-Assessment and Certification]]&lt;br /&gt;
*[[CUI]]&lt;br /&gt;
*[[Resources and Tools for Compliance]]&lt;br /&gt;
*[[Preferred Partners]]&lt;br /&gt;
*[[Training and Education]] - (for CCA/CCP/LTP)&lt;br /&gt;
*[[FAQ|Frequently Asked Questions]]&lt;/div&gt;</summary>
		<author><name>Uncouth</name></author>
	</entry>
</feed>