an AUTHORIZED C3PAO and ISO 17020 ACCREDITED company

Uncategorized

#11: Different Strokes for Different Folks

Identity and Access Management (IAM) is a pivotal element in fortifying an organization's cybersecurity posture. Any IAM solution must encompass the policies, processes, and technologies that orchestrate digital identities and govern access to information within a network. Implementing an effective IAM system requires a strategic approach to ensure individuals have legitimate access to the right

By |2024-10-18T22:05:28+00:00October 17th, 2024|Uncategorized|0 Comments

#10: Tailoring & Managing Access Controls

In the intricate landscape of cybersecurity, access controls stand as vigilant gatekeepers, regulating entry to sensitive data and critical systems. These controls are the cornerstone of safeguarding digital assets against unauthorized access and potential breaches. Let's explore the pivotal role of access controls, delving into their significance and impact on bolstering cybersecurity defenses. AC.L2-3.1.10: Use

By |2024-10-18T22:07:09+00:00October 16th, 2024|Uncategorized|0 Comments

#9: Level 2 Baseline Controls

NIST 800-171 provides a roadmap of 16 level 2 controls that are specifically tailored to bolster situational awareness. These controls are broken down by family below: Access Control (AC) Limit use of portable storage devices on external systems (AC.L2-3.1.21): Use endpoint security solutions to enforce policies restricting or monitoring the use of USB drives

By |2024-10-18T22:07:37+00:00October 16th, 2024|Uncategorized|0 Comments

#8: Enhancing Situational Awareness

Achieving an in-depth understanding of activities within your IT enclave is crucial for effective cybersecurity. NIST 800-171 provides a roadmap of nine controls specifically tailored to bolster situational awareness. These controls include: 3.3.1 Create and retain system audit logs: These logs enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity. 3.3.2

By |2024-10-18T22:08:10+00:00October 16th, 2024|Uncategorized|0 Comments

#7: Incident Response Requirements

Did you know that your organization is required to have an incidence response plan and routinely exercise it? NIST 800-171 provides three incident response controls that organizations must comply with: 3.6.1 Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities. 3.6.2 Track, document, and report

By |2024-10-18T22:08:34+00:00October 16th, 2024|Uncategorized|0 Comments

#6: Change Management Hiccups

In this edition, we aim to shed light on the critical role of proper Change Management in maintaining cybersecurity standards and achieving compliance. Change Management serves as a cornerstone in ensuring organizational adherence to CMMC standards, safeguarding Controlled Unclassified Information (CUI) data, and bolstering cyber resilience. Change Management, also known as Configuration Management or Continuous

By |2024-10-18T22:09:51+00:00October 16th, 2024|Uncategorized|0 Comments

#5: Media Protection Whoopsie’s

In this nugget, we discuss the procedures and rules of behavior controls, so you know the full depth of the requirement. We also include some common examples of failure that your organization might not have thought of. MP.L2-3.8.1 - Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital:

By |2024-10-18T22:13:28+00:00October 16th, 2024|Uncategorized|0 Comments

#4: Secure Architecture Pitfalls

In this nugget, we discuss the most common pitfalls to complying with all of the secure architecture controls. We are presenting them in order of most frequent so you can address the most common failures first. Unpatched Systems and Software: Failing to apply patches and updates promptly increases system vulnerability. Unpatched vulnerabilities are often exploited

By |2024-10-18T22:13:50+00:00October 16th, 2024|Uncategorized|0 Comments

#3: Documentation Gotcha’s

In this nugget, we are delving into some common mistakes that organizations make which ultimately will cause them to fail a CMMC audit. Often organizations don’t fully understand the breadth of documentation and completeness required to properly meet the control. Improper documentation can lead to compliance failures in various areas. Here are some common pitfalls:

By |2024-10-18T22:14:20+00:00October 15th, 2024|Uncategorized|0 Comments

#2: Shared Responsibility Models

In this nugget, we are delving into the concept of Shared Responsibility as it pertains to Cloud Service Providers (CSPs) and Managed Service Providers (MSPs) in association with organizations leveraging these service providers to meet CMMC requirements. As more and more organizations are looking to CSPs or MSPs to support their compliance and handling

By |2024-10-18T22:14:48+00:00October 15th, 2024|Uncategorized|0 Comments
Go to Top