The Cybersecurity Maturity Model Certification (CMMC) is the latest security framework mandated by the Department of Defense (DoD) for any contractor that sells into the DoD.
The CMMC framework specifies a range of security maturity processes and cybersecurity best practices from multiple cybersecurity standards, frameworks and other references, as well inputs from the Defense Industrial Base (DIB) and Department of Defense (DoD).
The CMMC model consists of 14 domains, or key sets of capabilities for cybersecurity. Many of these CMMC domains originated from the Federal Information Processing Standards (FIPS) 200 security-related areas and the NIST SP 800-171 control families.
Read on to learn more about each domain and how Ntiva can help government contractors prepare for and comply with each domain area of CMMC, using our CMMC compliance checklist below.
CMMC Compliance Checklist - Learn the domain requirements
Access Control
How to Comply
Establish who has access to your systems, control internal system access, and limit data access to authorized users and processes.
How Ntiva Helps
We will establish and maintain a domain structure which uniquely identifies users, enforces security and CUI policies, and controls local and remote access. We handle the IT onboarding and offboarding of employees and grant and revoke access to your information and systems, whether on-premises or in the cloud.
Audit & Accountability
How to Comply
Have a process in place to track users that have access to your CUI and perform secure audits of those logs to ensure accountability.
How Ntiva Helps
We will define your audit requirements, perform the audit, identify and protect your audit information, as well as review and manage your audit logs. We will maintain audited events for as long as you subscribe to the service.
Awareness & Training
How to Comply
Put security awareness training programs in place for all employees.
How Ntiva Helps
We provide monthly phishing prevention training and regular employee security awareness activities.
Configuration Management
How to Comply
Establish configuration baselines as a measure to judge the efficiency of your systems.
How Ntiva Helps
We will establish your baseline configuration and perform configuration and change management tasks on an ongoing basis.
Identification & Authentication
How to Comply
Ensure the proper roles within your organization have the correct level of access and can be authenticated for reporting and accountability purposes.
How Ntiva Helps
We can ensure only users authorized by you have the credentials to access data and systems. We also handle all aspects of user account creation and maintenance.
Incident Response
How to Comply
Establish an incident response plan that detects and reports events, implement responses to a declared incident, post-incident reviews and test responses to measure your preparedness in the event of an attack.
How Ntiva Helps
We will create an incident response plan, test the incident response plan, detect and report ongoing events, develop responses to declared incidents and perform post incident reviews.
Maintenance
How to Comply
Have a maintenance system in place to effectively operate your systems.
How Ntiva Helps
System patches will be pushed on recurring weekly and monthly schedules. Zero-day vulnerabilities will be pushed within 24 hours.
Media Protection
How to Comply
Provide proof that your media is identified and marked for ease of access. Additionally, provide evidence that a media protection protocol, sanitation protocol and transportation protection is in place.
How Ntiva Helps
We can help identify and mark all media, put processes in place to protect and control media, and sanitize and protect media for transport.
Personnel Security
How to Comply
Ensure all personnel will be properly screened and have background checks completed. Provide evidence that CUI is protected during personnel activity such as employee turnover or transfer.
How Ntiva Helps
We provide customized onboarding and offboarding checklists to ensure your business process is reflected in user account management. Only designated client POCs can request changes to access.
Physical Protection
How to Comply
Provide evidence of the physical security surrounding your assets and prove they are protected.
How Ntiva Helps
While mainly a client activity, we can assist with system maintenance, vendor coordination, and best practice consulting.
Risk Management
How to Comply
Identify and evaluate the risk that affects your company using periodic risk assessments and vulnerability scanning - both yours and your vendors.
How Ntiva Helps
We can create Risk Management Plans and offer custom consulting for specific risk mitigations strategies and actions.
Security Assessment
How to Comply
Put a system security plan (SSP) in place, define and manage controls and perform code reviews.
How Ntiva Helps
We can create or update your SSP/POAM as part of a CMMC Readiness Assessment, during a discovery phase and/or as part of your on-boarding to Ntiva services.
System & Communications Protection
How to Comply
Define the security requirements of each system and communication channel you use to provide evidence that you have control of communications at system boundaries.
How Ntiva Helps
We help define your requirements and then implement the tools, technologies, and processes to protect your systems whether on-prem or in the cloud - especially important in today's remote workforce.
System & Information Integrity
How to Comply
Identify and manage flaws with your system, identify hazardous and malicious content in-system, implement email protections and monitor your network and systems.
How Ntiva Helps
Vulnerability scans and remediation, EDR, IDR and cloud-based email protections block malicious content, monitor your network, and alert our 24/7 SOC and Service Desk of any suspicious behavior.