When educating people on a complex, multi-dimensional topic, the best place to start is with its key, foundational information. That’s exactly what Celerium’s Certified CMMC Professional Course (CCP) does – it conveys the fundamental knowledge needed to train professionals supporting the implementation of CMMC.
Access Control (AC)
Audit & Accountability (AU)
Awareness & Training (AT)
Configuration Management (CM)
Identification & Authentication (IA)
Incident Response (IR)
Maintenance (MA)
Media Protection (MP)
Personnel Security (PS)
Physical Protection (PE)
Risk Assessment (RA)
Security Assessment (CA)
Systems & Communications Protection (SC)
System & Information Integrity (SI)
Sponsored by Celerium
Sponsored by Celerium
These online-only courses provide CMMC training to companies looking to comply with CMMC. The courses are created by an experienced team of cybersecurity implementers with years of experience on NIST standards.
Implementing CMMC will be different for every company. And with the U.S. government doubling down on cybersecurity, it's important to get it right. So where is the best place to start?
Our CMMC Insights courses were created to help companies looking to comply with CMMC understand how to implement the practices. Our team has years of experience implementing NIST 800-53.
One-year access to the learning portal is provided, and we will provide updates on changes to CMMC as clarity is provided on items such as reciprocity. Don't wait -- get started on your CMMC assessment preparation now.
DOMAIN: Risk Assessment |
Practice:RA.L2-3.11.1
|
CAPABILITY: C031 Identify and evaluate risk
|
Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI.
|
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following
· Organizational policy and procedures related to Risk Assessment to determine what is assessed and how often risk assessments are performed.
· Guidance used to implement the policy for risk assessments, and specifically the risk assessment of processing, storing, and transmission of CUI.
· Other authoritative sources of guidance the organization used such as NIST 800-30 - Guide for Conducting Risk Assessments.
Typically, risk assessments are part of an ongoing process and integrated into change control processes and procedures, thus evidence may be requested such as logs, action reports or planned activities.
Click here to see details (additional assessment notes available)
Practice:RA.L2-3.11.2
|
CAPABILITY: C031 Identify and evaluate risk
|
Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified. |
Threat Actors:
i) may use an open source scanning tool against your public-facing infrastructure in the hopes of discovering an unpatched vulnerability
ii) may exploit any unpatched vulnerabilities and therefore compromise your entire network
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following· Organizational policy and procedures related to Vulnerability Scanning to determine how often scans are run and if the results of the scans are provided to system owners in a timely manner.
· List of known vulnerabilities to determine if updated within a defined frequency and when new vulnerabilities are discovered or announced by a third party.
· Other processes that address, after actions, including the assessment of risk to organizational resources where patches or updates are not implemented.
Click here to see details (additional assessment notes available)
Copyright © 2022 Celerium. All Rights Reserved.