CM.L3-3.4.2E Automated Detection & Remediation

CMMC Requirement CM.L3-3.4.2E – Automated Detection & Remediation: Employ automated mechanisms to detect misconfigured or unauthorized system components; after detection, remove the components or place the components in a quarantine or remediation network to...

CM.L3-3.4.1E Authoritative Repository

CMMC Requirement CM.L3-3.4.1E – Authoritative Repository: Establish and maintain an authoritative source and repository to provide a trusted source and accountability for approved and implemented system components. Links to Publicly Available Resources – Coming...

AT.L3-3.2.2E Practical Training Exercises

CMMC Requirement AT.L3-3.2.2E – Practical Training Exercises: Include practical exercises in awareness training for all users, tailored by roles, to include general users, users with specialized roles, and privileged users, that are aligned with current threat...

AT.L3-3.2.1E Advanced Threat Awareness

CMMC Requirement AT.L3-3.2.1E – Advanced Threat Awareness: Provide awareness training upon initial hire, following a significant cyber event, and at least annually, focused on recognizing and responding to threats from social engineering, advanced persistent...

AC.L3-3.1.3E Secured Information Transfer

CMMC Requirement AC.L3-3.1.3E – Secured Information Transfer: Employ secure information transfer solutions to control information flows between security domains on connected systems. Links to Publicly Available Resources – Coming Soon All of your links...

AC.L3-3.1.2E Organizationally Controlled Assets

CMMC Requirement AC.L3-3.1.2E – Organizationally Controlled Assets: Restrict access to systems and system components to only those information resources that are owned, provisioned, or issued by the organization. Links to Publicly Available Resources –...