Remove blog cmmc-scoping-guide
article thumbnail

CMMC Data Flow Diagrams: An Ultimate Guide

Etactics

The Cybersecurity Maturity Model Certification (CMMC) program protects federal information from unauthorized disclosure. This blog focuses on how organizations define those boundaries. How do you define a CMMC Level 1 authorization boundary? How do you define a CMMC Level 2 authorization boundary?

59
article thumbnail

Implementing 3.1.1 from NIST SP 800-171 Rev 2: Everything You Need to Know

Etactics

The following blog explores in detail the first security requirement 3.1.1 The following blog explores in detail the first security requirement 3.1.1 The proposed cybersecurity maturity model certification (CMMC) rule verifies SP 800-171. under CMMC 2.0. As of 12/22/23, CMMC 2.1 CMMC Level 2 uses the label AC.L2-3.1.1.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Ultimate CMMC Scoping Guide: A Matrix for Every Level

Etactics

Scoping is often overlooked when preparing for a cybersecurity maturity model certification (CMMC). The scope includes assets that provide security or process, store or send sensitive information. Oftentimes, though, you'll see and hear the phrase "scope applicability matrix". The (ir)relevance of scoping for level 1.

article thumbnail

The Go-To CMMC Policy Templates According to NIST

Etactics

Written policies document nearly one-third of the 320 assessment objectives within CMMC. In fact, there are 281 results if you search for “policy” or “policies” in the CMMC Assessment Guide - Level 2. CMMC Guidance on Policies. CMMC Version 1 had specific requirements for each domain policy. CMMC Version 2.0

article thumbnail

CMMC-AB November 30 Town Hall: Key Takeaways and Unanswered Questions

Etactics

Table of Contents Town Hall Overview Credits for Exam Vouchers C3PAO Assessment Vouchers Renewals On Proposed Changes in CMMC 2.0 Concerns of CMMC 2.0 Benefits of CMMC 2.0 Town Hall Overview On November 30, 2021, the CMMC-AB held a scheduled Town Hall meeting to update the CMMC Ecosystem and defense industrial base (DIB).

article thumbnail

NIST SP 800-171 vs 800-53: Everything You Need to Know

Etactics

In this blog, we look at two of their well known special publications (SP) and discuss: How to derive CMMC Strategies from the RMF NIST SP 800-53 Explained NIST SP 800-171 Explained Conclusion How to derive CMMC Strategies from the RMF This blog will explain the role SP 800-53 plays within the Risk Management Framework (RMF).

article thumbnail

Everything You Need to Know About CUI Designations

Etactics

As organizations prepare for CMMC, the first question they need to answer is what controlled unclassified information (CUI) they have. This will determine the scope of information systems that process, store, or transmit CUI. This blog takes a closer look at the regulations, manuals, policies, and instructions guiding CUI designation.