When educating people on a complex, multi-dimensional topic, the best place to start is with its key, foundational information. That’s exactly what Celerium’s Certified CMMC Professional Course (CCP) does – it conveys the fundamental knowledge needed to train professionals supporting the implementation of CMMC.
Access Control (AC)
Audit & Accountability (AU)
Awareness & Training (AT)
Configuration Management (CM)
Identification & Authentication (IA)
Incident Response (IR)
Maintenance (MA)
Media Protection (MP)
Personnel Security (PS)
Physical Protection (PE)
Risk Assessment (RA)
Security Assessment (CA)
Systems & Communications Protection (SC)
System & Information Integrity (SI)
Sponsored by Celerium
Sponsored by Celerium
These online-only courses provide CMMC training to companies looking to comply with CMMC. The courses are created by an experienced team of cybersecurity implementers with years of experience on NIST standards.
Implementing CMMC will be different for every company. And with the U.S. government doubling down on cybersecurity, it's important to get it right. So where is the best place to start?
Our CMMC Insights courses were created to help companies looking to comply with CMMC understand how to implement the practices. Our team has years of experience implementing NIST 800-53.
One-year access to the learning portal is provided, and we will provide updates on changes to CMMC as clarity is provided on items such as reciprocity. Don't wait -- get started on your CMMC assessment preparation now.
DOMAIN: System and Information Integrity |
Practice:SI.L2-3.14.3
|
CAPABILITY: C040 Identify and manage information flaws
|
Monitor system security alerts and advisories and take action in response. |
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following
· Procedures to identify how the organizations receive security alerts, advisories, and directives from external organizations and how internal alerts of similar nature are generated and effectively communicated.
· Procedures and processes to ensure an appropriate action is taken in response to the alerts and advisories with relevant external entities, such as supply chain partners.
Click here to see details
Practice:SI.L2-3.14.6
|
CAPABILITY: C042 Perform network and system monitoring
|
Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks. |
Threat Actors:
i) may take advantage of a poor network monitoring capability and use intrusion techniques to gain persistent access to your network
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following· Procedures that addresses system monitoring tools and methods used to detect potential threats for all inbound and outbound communications, as well as, unauthorized local, network or remote connectivity.
· Supporting documentation that identifies network monitoring tools, security detection and monitoring systems, roles and responsibilities of individuals that monitor and respond to potential threats, or any third-party services supporting this practice.
· If emails are scanned for malicious code, links, or attachments.
Click here to see details (additional assessment notes available)
Copyright © 2022 Celerium. All Rights Reserved.