User contributions for Marieramsay

A user with 104 edits. Account created on 24 September 2024.
Search for contributionsExpandCollapse
⧼contribs-top⧽
⧼contribs-date⧽
(newest | oldest) View (newer 50 | ) (20 | 50 | 100 | 250 | 500)

2 March 2025

1 March 2025

23 December 2024

3 November 2024

12 October 2024

30 September 2024

  • 17:2617:26, 30 September 2024 diff hist −8 Self-Assessment and CertificationNo edit summary
  • 17:2517:25, 30 September 2024 diff hist −9 Self-Assessment and CertificationNo edit summary
  • 02:2202:22, 30 September 2024 diff hist −307 Self-Assessment and CertificationNo edit summary
  • 02:2102:21, 30 September 2024 diff hist +8,514 N CCPCreated page with "A Certified CMMC Professional (CCP) is an entry-level certification within the Cybersecurity Maturity Model Certification (CMMC) ecosystem. Individuals who earn the CCP designation have the foundational knowledge of the CMMC framework and are equipped to assist organizations in understanding, preparing for, and achieving CMMC compliance. CCPs are often involved in helping defense contractors implement the necessary cybersecurity practices required to protect Controlled U..." current
  • 02:1502:15, 30 September 2024 diff hist +7,574 N CCACreated page with "A Certified CMMC Assessor (CCA) is an individual who has been trained, certified, and authorized to conduct official Cybersecurity Maturity Model Certification (CMMC) assessments on behalf of a Certified Third-Party Assessment Organization (C3PAO). CCAs play a critical role in the CMMC ecosystem by evaluating defense contractors’ compliance with the CMMC framework to ensure they meet the required cybersecurity standards necessary to handle Controlled Unclassified Infor..." current
  • 02:0902:09, 30 September 2024 diff hist +89 LTPNo edit summary current
  • 02:0802:08, 30 September 2024 diff hist +6,571 N LTPCreated page with "Licensed Training Providers (LTPs) in the Cybersecurity Maturity Model Certification (CMMC) ecosystem are organizations authorized by the Cyber-AB (CMMC Accreditation Body) to deliver official training programs for individuals seeking CMMC-related certifications. LTPs play a crucial role in ensuring that professionals working within the CMMC ecosystem—such as Certified CMMC Professionals (CCPs) and Certified CMMC Assessors (CCAs)—receive high-quality, standardized tr..."
  • 02:0202:02, 30 September 2024 diff hist −1 Resources and Tools for ComplianceNo edit summary
  • 02:0202:02, 30 September 2024 diff hist +7,462 N Resources and Tools for ComplianceCreated page with "To support organizations in achieving CMMC (Cybersecurity Maturity Model Certification) compliance, several resources and tools are available from government sources. These resources help organizations understand the requirements of the CMMC framework, assess their cybersecurity posture, and implement the necessary controls to protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI). ==Here is a list of key government-provided tools and r..."
  • 01:4301:43, 30 September 2024 diff hist +114 Training and EducationNo edit summary current
  • 01:4201:42, 30 September 2024 diff hist +9,577 N Training and EducationCreated page with "If someone is interested in consulting for CMMC (Cybersecurity Maturity Model Certification), it is important to have a solid understanding of the CMMC framework, the associated requirements, and the NIST 800-171 controls, which are at the core of CMMC. Additionally, training, certifications, and ongoing education are critical components to being a trusted and effective CMMC consultant. Below is a breakdown of the key areas of knowledge, education, and training required..."
  • 01:3101:31, 30 September 2024 diff hist +9,040 N C3PAOCreated page with "C3PAOs (Certified Third-Party Assessment Organizations) are critical entities within the Cybersecurity Maturity Model Certification (CMMC) ecosystem. These organizations are accredited by the Cyber-AB (Cybersecurity Maturity Model Certification Accreditation Body) to perform official CMMC assessments for companies that seek certification, especially those that handle Controlled Unclassified Information (CUI) as part of contracts with the Department of Defense (DoD). C3PA..." current
  • 01:2401:24, 30 September 2024 diff hist +8,051 N SPRSCreated page with "The Supplier Performance Risk System (SPRS) is a Department of Defense (DoD) platform used to assess and evaluate the performance, risks, and security posture of DoD suppliers. SPRS plays a critical role in the DoD’s acquisition process, providing procurement officials with performance ratings, risk assessments, and supplier compliance information, especially in relation to cybersecurity standards like NIST 800-171 and the Cybersecurity Maturity Model Certification (CM..." current
  • 01:1801:18, 30 September 2024 diff hist +7,533 N CMMC-ABCreated page with "The Cyber-AB (Cybersecurity Maturity Model Certification Accreditation Body) is an independent, nonprofit organization responsible for overseeing the Cybersecurity Maturity Model Certification (CMMC) ecosystem. The Cyber-AB plays a crucial role in ensuring the effective implementation of the CMMC framework, which is designed to enhance cybersecurity practices across the Defense Industrial Base (DIB) by ensuring that contractors meet specific security requirements for..." current
  • 01:0801:08, 30 September 2024 diff hist +8,087 N Risk AssessmentCreated page with "The Risk Assessment family in NIST 800-171 Rev 2 focuses on ensuring that organizations have a structured process for identifying, assessing, and managing risks to their information systems and Controlled Unclassified Information (CUI). The goal is to help organizations understand their security risks, prioritize mitigation efforts, and protect sensitive information from potential threats and vulnerabilities. ==Key Risk Assessment Requirements in NIST 800-171 Rev 2:==..." current
  • 01:0401:04, 30 September 2024 diff hist +9,073 N System and Information IntegrityCreated page with "The System and Information Integrity family in NIST 800-171 Rev 2 focuses on ensuring that an organization’s information systems can detect, respond to, and correct issues that may compromise the integrity and security of Controlled Unclassified Information (CUI). This family emphasizes the importance of monitoring systems for vulnerabilities, applying security patches promptly, and ensuring that malicious software and unauthorized system changes are detected and addre..." current
  • 00:5600:56, 30 September 2024 diff hist +12,754 N System and Communications ProtectionCreated page with "The System and Communications Protection family in NIST 800-171 Rev 2 addresses the safeguards necessary to protect the security and confidentiality of Controlled Unclassified Information (CUI) as it is processed, transmitted, or stored within an organization's information systems. This family emphasizes the need to secure both system boundaries and communication channels to prevent unauthorized access, tampering, or data leakage. ==Key System and Communications Protect..." current
  • 00:4600:46, 30 September 2024 diff hist +8,770 N Security AssessmentCreated page with "The Security Assessment family in NIST 800-171 Rev 2 focuses on ensuring that organizations regularly evaluate and improve their information system security controls and practices to protect Controlled Unclassified Information (CUI). The purpose of this family is to establish a formal process for assessing security controls, conducting regular system reviews, and ensuring continuous monitoring to identify and address potential vulnerabilities or weaknesses in security...." current
  • 00:4100:41, 30 September 2024 diff hist +8,755 N Physical ProtectionCreated page with "The Physical Protection family in NIST 800-171 Rev 2 focuses on safeguarding Controlled Unclassified Information (CUI) by implementing physical security measures that protect information systems and their associated facilities from unauthorized physical access, tampering, or destruction. This family addresses the need to control physical access to systems, devices, and media that contain CUI, ensuring that only authorized personnel can access sensitive information. ==Ke..." current
  • 00:3500:35, 30 September 2024 diff hist +6,256 N Personnel SecurityCreated page with "The Personnel Security family in NIST 800-171 Rev 2 focuses on ensuring that individuals who have access to Controlled Unclassified Information (CUI) are properly vetted and that access to CUI is restricted when personnel no longer require it due to changes in employment status. The primary goal of this family is to prevent unauthorized access to CUI by ensuring that only trustworthy individuals are granted access, and that access is promptly revoked when personnel leave..." current
  • 00:3200:32, 30 September 2024 diff hist +4 Media ProtectionNo edit summary current
  • 00:3100:31, 30 September 2024 diff hist +8,423 N Media ProtectionCreated page with "The Media Protection family in NIST 800-171 Rev 2 outlines the security controls necessary to protect Controlled Unclassified Information (CUI) that is stored on both digital and non-digital media. The goal is to ensure that media containing sensitive information is properly handled, stored, and disposed of to prevent unauthorized access, loss, or theft. This family covers various forms of media, including physical storage devices like hard drives and USB drives, paper..."
(newest | oldest) View (newer 50 | ) (20 | 50 | 100 | 250 | 500)