Access Control (AC)
Audit & Accountability (AU)
Awareness & Training (AT)
Configuration Management (CM)
Identification & Authentication (IA)
Incident Response (IR)
Maintenance (MA)
Media Protection (MP)
Personnel Security (PS)
Physical Protection (PE)
Risk Assessment (RA)
Security Assessment (CA)
Systems & Communications Protection (SC)
System & Information Integrity (SI)
Sponsored by Celerium
These online-only courses provide CMMC training to companies looking to comply with CMMC. The courses are created by an experienced team of cybersecurity implementers with years of experience on NIST standards.
Implementing CMMC will be different for every company. And with the U.S. government doubling down on cybersecurity, it's important to get it right. So where is the best place to start?
Our CMMC Insights courses were created to help companies looking to comply with CMMC understand how to implement the practices. Our team has years of experience implementing NIST 800-53.
One-year access to the learning portal is provided, and we will provide updates on changes to CMMC as clarity is provided on items such as reciprocity. Don't wait -- get started on your CMMC assessment preparation now.
DOMAIN: Configuration Management |
Practice:CM.L2-3.4.1
|
CAPABILITY: C013 Establish configuration baselines
|
Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles. |
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following
· Policy and procedures to determine how the baseline configurations for information systems are implemented and maintained during the system lifecycle including validation that the integrity of the baseline configuration is not violated when new applications are installed or removed (known as impact analysis).
· Inventory of hardware, software, firmware with versions, patch level and associated network and security configuration settings.
Where baseline configurations cannot be met or where operational effectiveness is impaired, deviations must be documented, assessed for risk to the organization, and countermeasures identified and implemented.
Click here to see details
Practice:CM.L2-3.4.2
|
CAPABILITY: C014 Perform configuration and change management
|
Establish and enforce security configuration settings for information technology products employed in organizational systems. |
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following
· Configuration documentation to identify that the security settings are included with the baseline configurations.
· Configuration security settings to determine the most restrictive settings were enforced without resulting in an operational reduction of deficiency, and that any security setting changes, or deviations are documented.
The practice is part of baseline configurations but is focused on security related settings.
Click here to see details
Practice:CM.L2-3.4.3
|
CAPABILITY: C014 Perform configuration and change management
|
Track, review, approve, or disapprove, and log changes to organizational systems. |
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following
· Policy and procedures related to Configuration Management to determine if changes are audited or reviewed by authorized company personnel.
· Records of changes to systems to determine the change has been authorized and documented.
· Evidence that changes are tracked and documented in an approved services management or equivalent tracking capability.
Changes to information systems pursuant to this practice include modifications to hardware, software, or firmware components and configuration settings.
Click here to see details
Practice:CM.L2-3.4.4
|
CAPABILITY: C014 Perform configuration and change management
|
Analyze the security impact of changes prior to implementation. |
Threat Actors:
i) may take advantage of your lack of a security impact assessment and seek to exploit configuration changes that may have occurred after new software was installed.
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following· Policy and procedures related to configuration management or relevant documents to determine if changes affecting system security requirement are tested prior to implementation.
· Security Impact Analysis documentation to demonstrate where a change occurred there was an evaluation to verify compliance or minimal settings for security purposes.
To be effective and not degrade or impede system operations or performance, testing of changes are best determined and validated prior to implementation on an operational system. Auditors may also look for evidence of this type of testing and the conditions in which it was conducted.
Click here to see details
Practice:CM.L2-3.4.5
|
CAPABILITY: C014 Perform configuration and change management
|
Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems. |
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following
Configuration and Control Management Program to ensure that it addresses: the identification of employees who are approved to make physical or logical changes to the systems, such employees are authorized by system owners or IT security, and change documentation includes the name of the employee(s) making the changes.
Click here to see details
Practice:CM.L2-3.4.6
|
CAPABILITY: C013 Establish configuration baselines
|
Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities. |
Threat Actors:
i) may attempt to access a network through open or unsecured ports
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following· Configuration Management Plans, System Security Plans for evidence of evaluation conducted to determine least functionality of applications, servers, personal computers, and network devices.
· Evidence that system testing has been conducted to determine the baseline configurations.
· Policy and procedures to determine how the baseline configurations are implemented, maintained, and reviewed when changes are made to the system that could alter the minimal configuration settings.
· List of system configuration settings or security configuration checklists.
The principle of least functionality means that the system has been evaluated and configured with only those settings and configurations that are necessary for the intent or function within the organizational environment.
Click here to see details (additional assessment notes available)
Practice:CM.L2-3.4.7
|
CAPABILITY: C014 Perform configuration and change management
|
Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services. |
Threat Actors:
i) may attempt to discover/access a network through open or unsecured ports by using common scanning techniques
ii) can compromise your system through your use of unnecessary programs/software that maintain a connection to external servers for updates/diagnostics
Assessment NOTES: A CMMC assessor may want to review, observe, or test the following· System configuration files to ensure that unnecessary ports, services, or sub-systems have been removed or disabled.
· Security benchmarks (or hardening guides) and tools (such as those provide by NSA and the Center for Internet Security (CIS)) utilized to harden cyber assets.
Click here to see details
Copyright © 2022 Celerium. All Rights Reserved.