When educating people on a complex, multi-dimensional topic, the best place to start is with its key, foundational information. That’s exactly what Celerium’s Certified CMMC Professional Course (CCP) does – it conveys the fundamental knowledge needed to train professionals supporting the implementation of CMMC.
Access Control (AC)
Audit & Accountability (AU)
Awareness & Training (AT)
Configuration Management (CM)
Identification & Authentication (IA)
Incident Response (IR)
Maintenance (MA)
Media Protection (MP)
Personnel Security (PS)
Physical Protection (PE)
Risk Assessment (RA)
Security Assessment (CA)
Systems & Communications Protection (SC)
System & Information Integrity (SI)
Sponsored by Celerium
Sponsored by Celerium
These online-only courses provide CMMC training to companies looking to comply with CMMC. The courses are created by an experienced team of cybersecurity implementers with years of experience on NIST standards.
Implementing CMMC will be different for every company. And with the U.S. government doubling down on cybersecurity, it's important to get it right. So where is the best place to start?
Our CMMC Insights courses were created to help companies looking to comply with CMMC understand how to implement the practices. Our team has years of experience implementing NIST 800-53.
One-year access to the learning portal is provided, and we will provide updates on changes to CMMC as clarity is provided on items such as reciprocity. Don't wait -- get started on your CMMC assessment preparation now.
DOMAIN: Security Assessment |
Practice:CA.L2-3.12.4
|
CAPABILITY: C034 Develop and manage a system security plan
|
Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems. |
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following
· System Security Plan (SSP) to determine if system boundaries and operational environments are defined.
· SSP security controls that have been implemented, not implemented or planned for implementation.
· SSP to determine any relationship or dependency with other internal systems, or external systems in the supply chain.
· Evidence that the SSP is reviewed and accepted by management, and integrated into the organization's risk management framework.
System security plans and plans of actions are critical to the organizations risk management process and the overall security of organizational systems.
Click here to see details (additional assessment notes available)
Practice:CA.L2-3.12.1
|
CAPABILITY: C035 Define and manage controls
|
Periodically assess the security controls in organizational systems to determine if the controls are effective in their application. |
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following
· Security Assessment documentation to determine the frequency and scope of the security assessments.
· Evidence that Security Assessments are conducted to determine if performed internally or by an independent auditor/consultant.
· Evidence that Security Assessment results are provided to management.
The assessment of security controls, identified in the SSPs, is necessary to ensure that the controls are implemented as intended and producing expected results in security and risk management.
Click here to see details (additional assessment notes available)
Copyright © 2022 Celerium. All Rights Reserved.