Blog

Timeline of CMMC Phases and Contractor Requirements: A Quick Guide

It’s official, 48CFR has been published and the CMMC Phase 1 rollout is just 60 days away. Defense Industrial Base (DIB) contractors are understandably beginning to search for information regarding the recently finalized DFARS rule (Case 2019-D041), formally integrating the Cybersecurity Maturity Model Certification (CMMC) requirements into the DoD acquisition process.   This is a big deal—especially […]

Blog

Whitepaper: Continuous Controls Monitoring in CMMC Level 2 Compliance: An In-Depth Exploration of Control 3.12.3 

In CMMC, continuous monitoring stands as a pivotal component in safeguarding sensitive information. For organizations aiming to achieve Cybersecurity Maturity Model Certification (CMMC) Level 2 compliance, a thorough understanding and implementation of ‘continuous monitoring’ and its role in Risk Management is essential.  It is easy to conflate three closely related topics, Continuous Controls Monitoring (CCM), […]

Blog

CMMC Data Flow Diagrams Done Right: A CCA’s Perspective 

Creating a Data Flow Diagram (DFD) is a foundational step in achieving Cybersecurity Maturity Model Certification (CMMC) compliance. DFDs offer a visual representation of how Controlled Unclassified Information (CUI) traverses through an organization’s systems.  The process of identifying how FCI and CUI traverse an organization also highlights the people, processes, and technology that come in […]