DIB SCC CyberAssist
  • Getting Started
    • Cybersecurity Fundamentals
    • Vulnerability and Threat Information
    • Cybersecurity Regulations and Standards
  • CMMC
    • CMMC Home
    • CMMC Training
    • By Level
    • By Domain
  • CCRA
  • About CyberAssist
    • Contact Us
    • DIB SCC
  • Search
Select Page

YouTube – CMMC 2.0 Control CM L2-3.4.5 – Define, document, approve, and enforce physical and logical access

Prosci – Best Practices in Change Management

US-CERT – Risk Management Resource Guide

netwrix – What a Baseline Configuration Is and How to Prevent Configuration Drift

Help Desk Geek – How to Find Open and Blocked TCP/UDP Ports

netwrix – How Insecure and Vulnerable Open Ports Pose Serious Security Risks

Wright Brained – CMMC Practice 3.4.7 – Ports, Protocols, Programs Functions, and Services

Georgetown University – Restricted List of Ports, Protocols, and/or Services

DoD Instruction 8551.01 – Ports, Protocols, and Services Management (PPSM)

Reach – Security-Focused Configuration Management: Getting Beyond the Checkbox