Remove blog category CMMC
article thumbnail

[ANSWERED] Who is Responsible for Protecting CUI?

Etactics

Controlled Unclassified Information (CUI) is a category of such important data. The Policies Importance of Compliance Training How does CUI relate to CMMC? A good example of this is through the Cybersecurity Maturity Model Certification (CMMC) program. How does CUI relate to CMMC? And how should one go about it?

article thumbnail

CMMC Data Flow Diagrams: An Ultimate Guide

Etactics

The Cybersecurity Maturity Model Certification (CMMC) program protects federal information from unauthorized disclosure. This blog focuses on how organizations define those boundaries. How do you define a CMMC Level 1 authorization boundary? How do you define a CMMC Level 2 authorization boundary?

59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIST SP 800-171 Rev 3 FPD Crosswalk of Assessment Objectives (XLSX Included)

Etactics

This blog will focus on the following topics: Crosswalk methodology Key changes in the update Organizational Defined Parameters (ODPs) Applicability We’ve created a free Rev 3 Crosswalk Calculator. Technology-specific) Image Source: NIST SP 800-171r3 initial public draft The FPD introduced a new tailoring category called ORC.

article thumbnail

The Ultimate CMMC Scoping Guide: A Matrix for Every Level

Etactics

Scoping is often overlooked when preparing for a cybersecurity maturity model certification (CMMC). The purpose of this blog is to provide a resource that documents how to tailor the 320 objectives within NIST SP 800-171A to the CMMC scope. Image Source: CMMC Self-Assessment Scope Level 2. This statement isn’t definitive.

article thumbnail

CMMC-AB May Town Hall: Key Takeaways

Etactics

May’s CMMC-AB Town Hall marked the end of an era. There will be no more CMMC-AB Town Halls discussing what the accreditation body is doing to prepare the ecosystem of consultants, educators and assessors for the upcoming final CMMC rule. That’s because, in May’s Town Hall, the CMMC-AB announced their rebranding to The Cyber AB.

article thumbnail

CMMC Training: Everything You Need to Know

Etactics

Table of Contents Individuals Performing Services (IPS) Training Registered Practitioner (RP) Training Registered Provider Organization (RPO) Training Certified Third-Party Assessor Organization (C3PAO) Training CMMC Professionals (CCPs) and CMMC Assessors (CCAs) CMMC Provisional Assessor Training Conclusion.

52
article thumbnail

An In-Depth Look Into CMMC Level 3 Requirements

Etactics

Of course, what I’m referring to is the upcoming enforcement of the Cybersecurity Maturity Model Certification (CMMC). If you have any existing contracts with the DoD, you’ve probably heard the acronym “CMMC” whispered throughout your office, fueled by a general sense of fear. Maybe that’s what ultimately led you to this blog post.