Posts about CMMC
Northrop Grumman Signals a New Era of Cyber Requirements
Over the last few months, a pattern has emerged across the Defense Industrial Base (DIB): major primes and ...
Control 3.1.20: Verifying and Controlling Connections to External Systems Trust Is Earned, Not Assumed
“Verify and control/limit connections to and use of external systems.” — NIST SP 800-171 Rev. 2, 3.1.20 If ...
Control 3.12.1 — Periodic Assessment of Security Controls
“Periodically assess the security controls in organizational systems to determine if the controls are ...
Control 3.1.2 – Limiting Access to Authorized Functions: Why “Everyone’s an Admin” Breaks Compliance
“Limit information system access to the types of transactions and functions that authorized users are ...
Control 3.1.1 — Identifying Authorized Users (It’s Not Entra ID)
One of the simplest requirements in CMMC is also one of the most misunderstood. Control 3.1.1 says: ...
Webcast | A Leadership Perspective: Ensuring, Managing and Leveraging CMMC Compliance
Join Us to Learn How Smart GovCons Are Positioning Themselves to Win. Tuesday, December 2nd, 12:30 ET ...
Shared Responsibility Matrix: Everyone Has a Role— The OSC Leads
For many leaders in the Defense Industrial Base, CMMC feels like a maze of rules, consultants, and acronyms. ...
Webinar Replay: The Enclave as a Tool, Not a Ticket Building a Strong CMMC Compliance Program
This is a webinar replay from a recent event hosted by our partners, Carahsoft. Webinar Overview For many ...
The DoW’s Drone Swarm: Can Cybersecurity Keep Pace?
The Pentagon isn’t dabbling in drones anymore; it’s scaling them. And rapidly. Since Deputy Secretary ...
