Tag: cmmc

Home / cmmc
Example System Security Plan SSP
Post

How to Write a CMMC Level 2 SSP: What Assessors Actually Look For

System Security Plans Your SSP Is Your Organization’sSecurity Story.It’s Your Security Program on Paper. A field guide to writing implementation statements that actually hold up under assessment. If your cybersecurity program had a pulse, the System Security Plan would be it. Without it, your organization cannot begin a CMMC Level 2 assessment. With a weak...

Introducing the CMMC Compliance Engine: A Practical System for Getting Assessment-Ready
Post

Introducing the CMMC Compliance Engine: A Practical System for Getting Assessment-Ready

During almost every CMMC readiness engagement, there is a moment when the organization realizes something important. They have many of the right security tools in place. The network is segmented. Multifactor authentication is deployed. Logging exists. Endpoint protection is running. But when it comes time to show how all of that supports the CMMC requirements,...

Oh Shit, I Need CMMC – A Subcontractor’s Survival Guide
Post

Oh Shit, I Need CMMC – A Subcontractor’s Survival Guide

If you are reading this, you are probably a subcontractor in the Defense Industrial Base (DIB), and there is a good chance your prime contractor has dropped a bombshell: you need to be compliant with CMMC. Maybe they asked for your System Security Plan (SSP). Maybe they requested your Supplier Performance Risk System (SPRS) score....

CMMC IS a Real Boy!
Post

CMMC IS a Real Boy!

What Contractors Need to Know About the 48 CFR Final Rule On November 10, 2025, the Department of Defense will cross the line from policy to enforcement. The 48 CFR Final Rule will go into effect, and the Cybersecurity Maturity Model Certification (CMMC) will be a contractual requirement. If you want to win or extend...

Security Protection Assets and Security Protection Data in CMMC
Post

Security Protection Assets and Security Protection Data in CMMC

What Are Security Protection Assets (SPAs)? SPAs are the tools, systems, and personnel that provide security functions or capabilities within the CMMC assessment scope of an Organization Seeking Certification (OSC). They protect CUI assets and the broader infrastructure that supports them. A Few Examples of SPAs: Firewalls: Devices or software that regulate network traffic, blocking...

Ports, Protocols, Programs Functions, and Services
Post

CMMC Practice 3.4.7 – Ports, Protocols, Programs Functions, and Services

TL;DR: Simplifying Essential Features for Compliance The Goal: Restrict and disable nonessential programs, ports, protocols, functions, and services to reduce your system’s attack surface and improve security. Challenges: Documentation—not implementation—is where most companies fall short. You must define “essential” clearly and apply it consistently. What to Do: • Inventory: Identify everything running on your systems....

The CMMC Rule and Plans of Action & Milestones (POA&M)
Post

The CMMC Rule and Plans of Action & Milestones (POA&M)

One of the things that I wanted to see in the CMMC Rule was more clarity on utilizing Plans of Action and Milestones (POA&M) for companies that do not fully meet all 110 requirements during their assessment. I’m continuing to dive into the CMMC rule…it’s freaking long. Here is what it says about POA&Ms, the...

Social Share Buttons and Icons powered by Ultimatelysocial