Remove blog cmmc-data-flow-diagrams
article thumbnail

CMMC Data Flow Diagrams: An Ultimate Guide

Etactics

The Cybersecurity Maturity Model Certification (CMMC) program protects federal information from unauthorized disclosure. This blog focuses on how organizations define those boundaries. They offered their own take on creating a data flow diagram. How do you define a CMMC Level 1 authorization boundary?

59
article thumbnail

CMMC Level 1 Continuous Monitoring: Everything You Need to Know

Etactics

This blog discusses strategies for monitoring the effectiveness of security requirements. Once developed, the following tasks help maintain the authorized account list: System Access Briefings Review of Account Access Review of Account Types Maintaining an authorized account list helps meet the following CMMC Level 1 objectives: AC.L1-b.1.i(a)

article thumbnail

CMMC-AB December Town Hall: Key Takeaways

Etactics

Changing of The Guard December’s CMMC-AB Town Hall event ushered in a changing of the guard within the accreditation body's board of directors. Mr. Johnson was the first Chairman elected at the CMMC-AB in January 2021. via CMMC-AB. via CMMC Level 2 Scoping Guide. It categorizes assets into five groups.