When educating people on a complex, multi-dimensional topic, the best place to start is with its key, foundational information. That’s exactly what Celerium’s Certified CMMC Professional Course (CCP) does – it conveys the fundamental knowledge needed to train professionals supporting the implementation of CMMC.
Access Control (AC)
Audit & Accountability (AU)
Awareness & Training (AT)
Configuration Management (CM)
Identification & Authentication (IA)
Incident Response (IR)
Maintenance (MA)
Media Protection (MP)
Personnel Security (PS)
Physical Protection (PE)
Risk Assessment (RA)
Security Assessment (CA)
Systems & Communications Protection (SC)
System & Information Integrity (SI)
Sponsored by Celerium
Sponsored by Celerium
These online-only courses provide CMMC training to companies looking to comply with CMMC. The courses are created by an experienced team of cybersecurity implementers with years of experience on NIST standards.
Implementing CMMC will be different for every company. And with the U.S. government doubling down on cybersecurity, it's important to get it right. So where is the best place to start?
Our CMMC Insights courses were created to help companies looking to comply with CMMC understand how to implement the practices. Our team has years of experience implementing NIST 800-53.
One-year access to the learning portal is provided, and we will provide updates on changes to CMMC as clarity is provided on items such as reciprocity. Don't wait -- get started on your CMMC assessment preparation now.
DOMAIN: Maintenance |
Practice:MA.L2-3.7.1
|
CAPABILITY: C021 Manage maintenance
|
Perform maintenance on organizational systems. |
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following
· List of approved maintenance tools
· Procedures that address scheduled and emergency maintenance operations, how maintenance is performed and how maintenance activities are approved.
· Evidence of maintenance records
Click here to see details
Practice:MA.L2-3.7.2
|
CAPABILITY: C021 Manage maintenance
|
Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance. |
Threat Actors:
i) may infect a network through the use of a third party diagnostics tool used to perform maintenance such as software and firmware updates
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following· Maintenance methods and tools used to control and restrict access to authorized personnel that support system maintenance activities.
· Process for inspecting maintenance tools.
The tools and supporting procedures may not be a part of the accreditation boundary of the system but need to be identified.
Click here to see detailsCopyright © 2022 Celerium. All Rights Reserved.