CMMC Mini-Learning Series

Subscribe to our YouTube Page for more content.

.

Subscribe to our YouTube Page for more content. .

BLOG POSTS

John Igbokwe John Igbokwe

Ongoing Cyber Monitoring

Ongoing monitoring is an important piece of any organization’s cybersecurity and cyber compliance investments. The SolarWinds hack was discovered, partly because of ongoing monitoring; someone noticed that a user account signed in with an unusual/different device.

Read More
John Igbokwe John Igbokwe

Cybersecurity ≠ Regulatory Cyber Compliance

Cybersecurity and regulatory cyber compliance are different and complementary. Cybersecurity is the art and practice of protecting systems and ensuring confidentiality, integrity, and availability of information. Regulatory cyber compliance refers to meeting the assessment objectives of specific cyber frameworks or standards.

Read More
John Igbokwe John Igbokwe

CMMC 2.0 - Delta 20 Practices

While CMMC 2.0 eliminates the 20 additional practices that was part of CMMC 1.0 - aka the Delta 20 practices, it is important that OSCs realize that some of the Delta 20 practices are already a part of the 110 practices of NIST 800-171.

Read More
John Igbokwe John Igbokwe

CMMC 2.0 - NFO Controls

“NFO” Controls: Important Distinction for Organizations Seeking Certification (OSC)

There is a little known aspect of NIST SP 800-171 known as "NFO" controls. "NFO" controls are found in appendix E of the NIST SP 800-171 documentation. "NFO" is one of the tailoring criteria used in deriving CUI controls/practices from NIST SP 800-53 for NIST SP 800-171 and it refers to practices that are "expected to be routinely satisfied by nonfederal organizations without specification". So, it is assumed and expected that OSCs are implementing these "NFO" controls. The challenge is that many OSCs are not aware of the "NFO" controls and are not implementing these controls.

Read More
John Igbokwe John Igbokwe

CMMC 2.0

Here is the summary of CMMC 2.0 released on November 4th 2021: In CMMC 2.0, there are changes to the administrative management (program) of CMMC but the fundamentals of the CMMC security requirements (model) remains the same.

Read More
John Igbokwe John Igbokwe

Data Spillage Playbook 2

Do you have a plan on how to permanently delete sensitive data accidentally delivered to your organization through email? If you do not, buckle up and read on.

Read More
John Igbokwe John Igbokwe

Data Spillage Playbook Part 1

Do you have a plan on how to permanently delete sensitive data accidentally delivered to your organization through email? If you do not, buckle up, read on and you are welcome!

Read More
John Igbokwe John Igbokwe

CMMC L3-IA.3.083

CMMC – Level 3 - IA.3.083 - “Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.”

Read More
John Igbokwe John Igbokwe

Microsoft Product Placemat for CMMC

The Microsoft Product Placemat for CMMC is an interactive view representing how Microsoft cloud products and services satisfy requirements for CMMC practices.

Read More
John Igbokwe John Igbokwe

M365 CMMC Assessment Templates Now Available

July 2021 Update: Compliance Manager premium assessment templates will no longer require a Microsoft 365 E5 or Office 365 E5 license as a prerequisite.

January 2021 Update: “The Compliance Manager is now available in all Microsoft 365 cloud offerings, including GCC and GCC High!”

Read More
John Igbokwe John Igbokwe

Moving to GCC High

Microsoft provides multiple Microsoft 365 Government offerings to address the compliance requirements of various US government agencies and contractors sponsored to hold controlled, unclassified information.

Read More