User contributions for Marieramsay

A user with 82 edits. Account created on 24 September 2024.
Search for contributionsExpandCollapse
⧼contribs-top⧽
⧼contribs-date⧽
(newest | oldest) View (newer 50 | ) (20 | 50 | 100 | 250 | 500)

3 November 2024

12 October 2024

30 September 2024

  • 17:2617:26, 30 September 2024 diff hist −8 Self-Assessment and CertificationNo edit summary current
  • 17:2517:25, 30 September 2024 diff hist −9 Self-Assessment and CertificationNo edit summary
  • 02:2202:22, 30 September 2024 diff hist −307 Self-Assessment and CertificationNo edit summary
  • 02:2102:21, 30 September 2024 diff hist +8,514 N CCPCreated page with "A Certified CMMC Professional (CCP) is an entry-level certification within the Cybersecurity Maturity Model Certification (CMMC) ecosystem. Individuals who earn the CCP designation have the foundational knowledge of the CMMC framework and are equipped to assist organizations in understanding, preparing for, and achieving CMMC compliance. CCPs are often involved in helping defense contractors implement the necessary cybersecurity practices required to protect Controlled U..." current
  • 02:1502:15, 30 September 2024 diff hist +7,574 N CCACreated page with "A Certified CMMC Assessor (CCA) is an individual who has been trained, certified, and authorized to conduct official Cybersecurity Maturity Model Certification (CMMC) assessments on behalf of a Certified Third-Party Assessment Organization (C3PAO). CCAs play a critical role in the CMMC ecosystem by evaluating defense contractors’ compliance with the CMMC framework to ensure they meet the required cybersecurity standards necessary to handle Controlled Unclassified Infor..." current
  • 02:0902:09, 30 September 2024 diff hist +89 LTPNo edit summary current
  • 02:0802:08, 30 September 2024 diff hist +6,571 N LTPCreated page with "Licensed Training Providers (LTPs) in the Cybersecurity Maturity Model Certification (CMMC) ecosystem are organizations authorized by the Cyber-AB (CMMC Accreditation Body) to deliver official training programs for individuals seeking CMMC-related certifications. LTPs play a crucial role in ensuring that professionals working within the CMMC ecosystem—such as Certified CMMC Professionals (CCPs) and Certified CMMC Assessors (CCAs)—receive high-quality, standardized tr..."
  • 02:0202:02, 30 September 2024 diff hist −1 Resources and Tools for ComplianceNo edit summary current
  • 02:0202:02, 30 September 2024 diff hist +7,462 N Resources and Tools for ComplianceCreated page with "To support organizations in achieving CMMC (Cybersecurity Maturity Model Certification) compliance, several resources and tools are available from government sources. These resources help organizations understand the requirements of the CMMC framework, assess their cybersecurity posture, and implement the necessary controls to protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI). ==Here is a list of key government-provided tools and r..."
  • 01:4301:43, 30 September 2024 diff hist +114 Training and EducationNo edit summary current
  • 01:4201:42, 30 September 2024 diff hist +9,577 N Training and EducationCreated page with "If someone is interested in consulting for CMMC (Cybersecurity Maturity Model Certification), it is important to have a solid understanding of the CMMC framework, the associated requirements, and the NIST 800-171 controls, which are at the core of CMMC. Additionally, training, certifications, and ongoing education are critical components to being a trusted and effective CMMC consultant. Below is a breakdown of the key areas of knowledge, education, and training required..."
  • 01:3101:31, 30 September 2024 diff hist +9,040 N C3PAOCreated page with "C3PAOs (Certified Third-Party Assessment Organizations) are critical entities within the Cybersecurity Maturity Model Certification (CMMC) ecosystem. These organizations are accredited by the Cyber-AB (Cybersecurity Maturity Model Certification Accreditation Body) to perform official CMMC assessments for companies that seek certification, especially those that handle Controlled Unclassified Information (CUI) as part of contracts with the Department of Defense (DoD). C3PA..." current
  • 01:2401:24, 30 September 2024 diff hist +8,051 N SPRSCreated page with "The Supplier Performance Risk System (SPRS) is a Department of Defense (DoD) platform used to assess and evaluate the performance, risks, and security posture of DoD suppliers. SPRS plays a critical role in the DoD’s acquisition process, providing procurement officials with performance ratings, risk assessments, and supplier compliance information, especially in relation to cybersecurity standards like NIST 800-171 and the Cybersecurity Maturity Model Certification (CM..." current
  • 01:1801:18, 30 September 2024 diff hist +7,533 N CMMC-ABCreated page with "The Cyber-AB (Cybersecurity Maturity Model Certification Accreditation Body) is an independent, nonprofit organization responsible for overseeing the Cybersecurity Maturity Model Certification (CMMC) ecosystem. The Cyber-AB plays a crucial role in ensuring the effective implementation of the CMMC framework, which is designed to enhance cybersecurity practices across the Defense Industrial Base (DIB) by ensuring that contractors meet specific security requirements for..." current
  • 01:0801:08, 30 September 2024 diff hist +8,087 N Risk AssessmentCreated page with "The Risk Assessment family in NIST 800-171 Rev 2 focuses on ensuring that organizations have a structured process for identifying, assessing, and managing risks to their information systems and Controlled Unclassified Information (CUI). The goal is to help organizations understand their security risks, prioritize mitigation efforts, and protect sensitive information from potential threats and vulnerabilities. ==Key Risk Assessment Requirements in NIST 800-171 Rev 2:==..." current
  • 01:0401:04, 30 September 2024 diff hist +9,073 N System and Information IntegrityCreated page with "The System and Information Integrity family in NIST 800-171 Rev 2 focuses on ensuring that an organization’s information systems can detect, respond to, and correct issues that may compromise the integrity and security of Controlled Unclassified Information (CUI). This family emphasizes the importance of monitoring systems for vulnerabilities, applying security patches promptly, and ensuring that malicious software and unauthorized system changes are detected and addre..." current
  • 00:5600:56, 30 September 2024 diff hist +12,754 N System and Communications ProtectionCreated page with "The System and Communications Protection family in NIST 800-171 Rev 2 addresses the safeguards necessary to protect the security and confidentiality of Controlled Unclassified Information (CUI) as it is processed, transmitted, or stored within an organization's information systems. This family emphasizes the need to secure both system boundaries and communication channels to prevent unauthorized access, tampering, or data leakage. ==Key System and Communications Protect..." current
  • 00:4600:46, 30 September 2024 diff hist +8,770 N Security AssessmentCreated page with "The Security Assessment family in NIST 800-171 Rev 2 focuses on ensuring that organizations regularly evaluate and improve their information system security controls and practices to protect Controlled Unclassified Information (CUI). The purpose of this family is to establish a formal process for assessing security controls, conducting regular system reviews, and ensuring continuous monitoring to identify and address potential vulnerabilities or weaknesses in security...." current
  • 00:4100:41, 30 September 2024 diff hist +8,755 N Physical ProtectionCreated page with "The Physical Protection family in NIST 800-171 Rev 2 focuses on safeguarding Controlled Unclassified Information (CUI) by implementing physical security measures that protect information systems and their associated facilities from unauthorized physical access, tampering, or destruction. This family addresses the need to control physical access to systems, devices, and media that contain CUI, ensuring that only authorized personnel can access sensitive information. ==Ke..." current
  • 00:3500:35, 30 September 2024 diff hist +6,256 N Personnel SecurityCreated page with "The Personnel Security family in NIST 800-171 Rev 2 focuses on ensuring that individuals who have access to Controlled Unclassified Information (CUI) are properly vetted and that access to CUI is restricted when personnel no longer require it due to changes in employment status. The primary goal of this family is to prevent unauthorized access to CUI by ensuring that only trustworthy individuals are granted access, and that access is promptly revoked when personnel leave..." current
  • 00:3200:32, 30 September 2024 diff hist +4 Media ProtectionNo edit summary current
  • 00:3100:31, 30 September 2024 diff hist +8,423 N Media ProtectionCreated page with "The Media Protection family in NIST 800-171 Rev 2 outlines the security controls necessary to protect Controlled Unclassified Information (CUI) that is stored on both digital and non-digital media. The goal is to ensure that media containing sensitive information is properly handled, stored, and disposed of to prevent unauthorized access, loss, or theft. This family covers various forms of media, including physical storage devices like hard drives and USB drives, paper..."
  • 00:2500:25, 30 September 2024 diff hist +7,355 N MaintenanceCreated page with "The Maintenance family in NIST 800-171 Rev 2 focuses on ensuring that organizations perform appropriate and secure maintenance on information systems while protecting Controlled Unclassified Information (CUI). This includes managing the maintenance of both physical and virtual components, whether performed on-site or remotely, in a way that prevents unauthorized access or tampering during maintenance activities. ==Key Maintenance Requirements in NIST 800-171 Rev 2:== T..." current
  • 00:1700:17, 30 September 2024 diff hist +8,946 N Incident ResponseCreated page with "The Incident Response family in NIST 800-171 Rev 2 outlines the processes and controls that organizations must implement to detect, report, respond to, and recover from cybersecurity incidents, particularly those that may affect Controlled Unclassified Information (CUI). The goal of these requirements is to ensure that organizations have the capability to effectively manage security incidents, minimize damage, and recover swiftly while preserving evidence for future inve..." current
  • 00:0900:09, 30 September 2024 diff hist +8,493 N Identification and AuthenticationCreated page with "The Identification and Authentication family in NIST 800-171 Rev 2 focuses on ensuring that information systems can correctly identify and authenticate users, devices, and processes before granting access to systems and data, particularly Controlled Unclassified Information (CUI). This family helps protect against unauthorized access by verifying that only legitimate users or systems can access information resources. ==Key Identification and Authentication Requirements..." current
  • 00:0300:03, 30 September 2024 diff hist +9,367 N Configuration ManagementCreated page with "The Configuration Management family in NIST 800-171 Rev 2 focuses on ensuring that organizations establish and maintain a secure state for their information systems by controlling changes to hardware, software, and firmware. This helps organizations reduce vulnerabilities, maintain a secure baseline configuration, and prevent unauthorized modifications that could compromise the security of Controlled Unclassified Information (CUI). ==Key Configuration Management Req..." current

29 September 2024

  • 23:5623:56, 29 September 2024 diff hist +249 Audit and AccountabilityNo edit summary current
  • 23:5123:51, 29 September 2024 diff hist +8,801 N Audit and AccountabilityCreated page with "The Audit and Accountability family in NIST 800-171 Rev 2 is designed to ensure that organizations have the ability to track, monitor, and analyze activities within their information systems. By logging events and auditing system activity, organizations can detect unauthorized access, identify anomalies, and maintain accountability for user actions, which is critical for protecting Controlled Unclassified Information (CUI). This family includes requirements for logging..."
  • 23:4323:43, 29 September 2024 diff hist +6,582 N Awareness and TrainingCreated page with "The Awareness and Training family in NIST 800-171 Rev 2 is one of the 14 security control families that focuses on ensuring that employees and users of an organization’s systems are well-informed about cybersecurity risks and know how to protect Controlled Unclassified Information (CUI). This family emphasizes the importance of educating and training users to recognize and respond appropriately to potential security threats, thus helping to minimize human-related s..." current
  • 23:3623:36, 29 September 2024 diff hist −1 Access ControlNo edit summary
  • 23:3623:36, 29 September 2024 diff hist −1 Access ControlNo edit summary
  • 23:3423:34, 29 September 2024 diff hist +339 Access ControlNo edit summary
  • 23:3023:30, 29 September 2024 diff hist +119 Access ControlNo edit summary
  • 23:2823:28, 29 September 2024 diff hist +8,690 N Access ControlCreated page with "Access Control is one of the 14 security families in NIST 800-171 Rev 2, which provides guidelines for protecting Controlled Unclassified Information (CUI) in nonfederal systems and organizations. The Access Control family focuses on limiting access to information systems, applications, and data to authorized individuals and ensuring that only those with appropriate permissions can access sensitive information. This helps prevent unauthorized access, which is critical fo..."
  • 23:1823:18, 29 September 2024 diff hist −2 Self-Assessment and CertificationNo edit summary
  • 23:1723:17, 29 September 2024 diff hist +28 Self-Assessment and CertificationNo edit summary
  • 23:1623:16, 29 September 2024 diff hist +7,955 N Self-Assessment and CertificationCreated page with "In the Cybersecurity Maturity Model Certification (CMMC) framework, self-assessments and third-party certifications are two key mechanisms that organizations (especially defense contractors) use to demonstrate compliance with cybersecurity requirements set by the Department of Defense (DoD). These mechanisms are designed to ensure that contractors handling Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) have adequate cybersecurity measure..."
  • 23:0223:02, 29 September 2024 diff hist +84 Continuous monitoringNo edit summary current
  • 23:0123:01, 29 September 2024 diff hist +2 Continuous monitoringNo edit summary
  • 23:0123:01, 29 September 2024 diff hist +2 Continuous monitoringNo edit summary
  • 23:0023:00, 29 September 2024 diff hist +7,394 N Continuous monitoringCreated page with "Continuous monitoring is a cybersecurity practice that involves the ongoing, real-time assessment and analysis of an organization's systems, networks, and data to identify potential vulnerabilities, threats, or unauthorized access. The goal of continuous monitoring is to maintain visibility into the security posture of an organization at all times, allowing for faster detection and response to cybersecurity incidents. === Key Components of Continuous Monitoring: === '..."
  • 22:5522:55, 29 September 2024 diff hist +5,999 N APTCreated page with "Advanced Persistent Threats (APTs) refer to highly sophisticated and persistent cyberattacks typically launched by well-funded and skilled adversaries, such as nation-states, organized cybercriminal groups, or advanced hacking collectives. Unlike typical cyberattacks that focus on immediate gains or disruption, APTs aim to infiltrate a network, remain undetected for long periods, and continuously gather intelligence or data over time. === Key Characteristics of APTs: ==..." current
  • 22:4522:45, 29 September 2024 diff hist +4,323 N NIST SP 800-172Created page with "[https://csrc.nist.gov/pubs/sp/800/172/final NIST SP 800-172], titled "Enhanced Security Requirements for Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations," builds on the foundation of NIST SP 800-171. It provides additional security controls and enhancements for organizations that handle highly sensitive Controlled Unclassified Information (CUI), particularly when the risk of advanced persistent threats (APTs) is a concern. H..." current
  • 22:3922:39, 29 September 2024 diff hist +1 NIST 800-171No edit summary current
(newest | oldest) View (newer 50 | ) (20 | 50 | 100 | 250 | 500)