CMMC Requirement CM.L3-3.4.2E – Automated Detection & Remediation: Employ automated mechanisms to detect misconfigured or unauthorized system components; after detection, remove the components or place the components in a quarantine or remediation network to...
CMMC Requirement CM.L3-3.4.1E – Authoritative Repository: Establish and maintain an authoritative source and repository to provide a trusted source and accountability for approved and implemented system components. Links to Publicly Available Resources – Coming...
CMMC Requirement AT.L3-3.2.2E – Practical Training Exercises: Include practical exercises in awareness training for all users, tailored by roles, to include general users, users with specialized roles, and privileged users, that are aligned with current threat...
CMMC Requirement AT.L3-3.2.1E – Advanced Threat Awareness: Provide awareness training upon initial hire, following a significant cyber event, and at least annually, focused on recognizing and responding to threats from social engineering, advanced persistent...
CMMC Requirement AC.L3-3.1.3E – Secured Information Transfer: Employ secure information transfer solutions to control information flows between security domains on connected systems. Links to Publicly Available Resources – Coming Soon All of your links...
CMMC Requirement AC.L3-3.1.2E – Organizationally Controlled Assets: Restrict access to systems and system components to only those information resources that are owned, provisioned, or issued by the organization. Links to Publicly Available Resources –...