Category: Uncategorized

Home / Uncategorized
Example System Security Plan SSP
Post

How to Write a CMMC Level 2 SSP: What Assessors Actually Look For

System Security Plans Your SSP Is Your Organization’sSecurity Story.It’s Your Security Program on Paper. A field guide to writing implementation statements that actually hold up under assessment. If your cybersecurity program had a pulse, the System Security Plan would be it. Without it, your organization cannot begin a CMMC Level 2 assessment. With a weak...

Introducing the CMMC Compliance Engine: A Practical System for Getting Assessment-Ready
Post

Introducing the CMMC Compliance Engine: A Practical System for Getting Assessment-Ready

During almost every CMMC readiness engagement, there is a moment when the organization realizes something important. They have many of the right security tools in place. The network is segmented. Multifactor authentication is deployed. Logging exists. Endpoint protection is running. But when it comes time to show how all of that supports the CMMC requirements,...

Deny inbound and outbound traffic by default and allow by exception
Post

CMMC – You Probably Think You Meet 3.13.6. Your Assessor Might Not Agree.

SC.L2-3.13.6 is a commonly missed practice in CMMC Level 2 assessments. Not because organizations ignore it, but because they genuinely believe they’ve satisfied it when they haven’t. 3.13.6 Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).  ASSESSMENT OBJECTIVE  3.13.6[a]  network communications traffic is denied by...

When ITAR Data Is CUI and When It Is Not
Post

When ITAR Data Is CUI and When It Is Not

If you handle defense work, you already know that ITAR (International Traffic in Arms Regulations) and CUI (Controlled Unclassified Information) often come up in the same conversation. They overlap, but they are not the same thing. This post explains when ITAR-controlled information must also be handled as CUI and when it stands alone under export control. Oh yeah — I...

Meeting CMMC Standards – 10 Major Challenges to Overcome for Success
Post

Meeting CMMC Standards – 10 Major Challenges to Overcome for Success

The purpose of the CMMC program is to verify that contractors have proper safeguards for Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) by moving from self-assessment to third-party or government assessments. This marks a significant change for DoD contractors, aimed at increasing accountability and ensuring the implementation of cybersecurity controls across the defense...

Social Share Buttons and Icons powered by Ultimatelysocial