bmad-plus 0.4.4 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +31 -0
- package/README.md +3 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +21 -8
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,252 @@
|
|
|
1
|
+
# CIS Controls v8 — All 153 Safeguards Detail
|
|
2
|
+
|
|
3
|
+
## How to Use This Reference
|
|
4
|
+
|
|
5
|
+
Each safeguard entry shows:
|
|
6
|
+
- **Safeguard ID:** CIS Control # . Safeguard #
|
|
7
|
+
- **Title:** Official CIS safeguard name
|
|
8
|
+
- **IG:** Minimum implementation group (1, 2, or 3)
|
|
9
|
+
- **Asset Type:** Devices / Software / Data / Users / Network / Applications
|
|
10
|
+
- **Security Function:** Govern / Identify / Protect / Detect / Respond / Recover
|
|
11
|
+
- **Implementation Notes:** Practical guidance on what to do
|
|
12
|
+
|
|
13
|
+
---
|
|
14
|
+
|
|
15
|
+
## CIS Control 1: Inventory and Control of Enterprise Assets
|
|
16
|
+
|
|
17
|
+
| Safeguard | Title | IG | Asset Type | Security Function |
|
|
18
|
+
|-----------|-------|-----|-----------|------------------|
|
|
19
|
+
| 1.1 | Establish and Maintain Detailed Enterprise Asset Inventory | 1 | Devices | Identify |
|
|
20
|
+
| 1.2 | Address Unauthorized Assets | 1 | Devices | Respond |
|
|
21
|
+
| 1.3 | Utilize an Active Discovery Tool | 2 | Devices | Identify |
|
|
22
|
+
| 1.4 | Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory | 1 | Devices | Identify |
|
|
23
|
+
| 1.5 | Use a Passive Asset Discovery Tool | 3 | Devices | Identify |
|
|
24
|
+
|
|
25
|
+
**Implementation Notes:**
|
|
26
|
+
- **1.1:** Maintain inventory in a CMDB, spreadsheet, or MDM tool. Include: IP address, hostname, MAC address, owner, location, OS, asset type, acquisition date
|
|
27
|
+
- **1.2:** Define a process for handling unauthorized devices found on network — quarantine, investigate, document
|
|
28
|
+
- **1.3:** Run network scanners (Nmap, Nessus, Qualys, Tenable) on scheduled basis (weekly minimum)
|
|
29
|
+
- **1.4:** Enable DHCP server logging; correlate logs with asset inventory; flag unknown MACs
|
|
30
|
+
- **1.5:** Deploy passive network TAP or IDS/NDR sensors for continuous asset detection without active scanning
|
|
31
|
+
|
|
32
|
+
**Recommended Tools:** Microsoft Intune, CrowdStrike Falcon, Tanium, Qualys VMDR, Nessus, Axonius, ServiceNow CMDB
|
|
33
|
+
|
|
34
|
+
---
|
|
35
|
+
|
|
36
|
+
## CIS Control 2: Inventory and Control of Software Assets
|
|
37
|
+
|
|
38
|
+
| Safeguard | Title | IG | Asset Type | Security Function |
|
|
39
|
+
|-----------|-------|-----|-----------|------------------|
|
|
40
|
+
| 2.1 | Establish and Maintain a Software Inventory | 1 | Applications | Identify |
|
|
41
|
+
| 2.2 | Ensure Authorized Software is Currently Supported | 1 | Applications | Protect |
|
|
42
|
+
| 2.3 | Address Unauthorized Software | 1 | Applications | Respond |
|
|
43
|
+
| 2.4 | Utilize Automated Software Inventory Tools | 2 | Applications | Identify |
|
|
44
|
+
| 2.5 | Allowlist Authorized Software | 2 | Applications | Protect |
|
|
45
|
+
| 2.6 | Allowlist Authorized Libraries | 2 | Applications | Protect |
|
|
46
|
+
| 2.7 | Allowlist Authorized Scripts | 2 | Applications | Protect |
|
|
47
|
+
|
|
48
|
+
**Implementation Notes:**
|
|
49
|
+
- **2.1:** Track all installed software: name, version, vendor, license, install date, responsible owner
|
|
50
|
+
- **2.2:** Identify software nearing end-of-support (EOS/EOL); plan upgrades before EOS date
|
|
51
|
+
- **2.3:** Detect and remove unauthorized software; consider policy/consequence for installing unauthorized tools
|
|
52
|
+
- **2.5:** Implement application allowlisting via Windows AppLocker, WDAC, or endpoint agents
|
|
53
|
+
- **2.6:** Track approved DLL, library, and package versions; use software composition analysis (SCA) for development
|
|
54
|
+
- **2.7:** Control scripting environments (PowerShell Constrained Language Mode, Python virtual environments)
|
|
55
|
+
|
|
56
|
+
**Recommended Tools:** Microsoft Intune, SCCM, Tanium, Flexera, Snyk (SCA), Veracode, AppLocker
|
|
57
|
+
|
|
58
|
+
---
|
|
59
|
+
|
|
60
|
+
## CIS Control 3: Data Protection
|
|
61
|
+
|
|
62
|
+
| Safeguard | Title | IG | Asset Type | Security Function |
|
|
63
|
+
|-----------|-------|-----|-----------|------------------|
|
|
64
|
+
| 3.1 | Establish and Maintain a Data Management Process | 1 | Data | Govern |
|
|
65
|
+
| 3.2 | Establish and Maintain a Data Inventory | 1 | Data | Identify |
|
|
66
|
+
| 3.3 | Configure Data Access Control Lists | 1 | Data | Protect |
|
|
67
|
+
| 3.4 | Enforce Data Retention | 1 | Data | Protect |
|
|
68
|
+
| 3.5 | Securely Dispose of Data | 1 | Data | Protect |
|
|
69
|
+
| 3.6 | Encrypt Data on End-User Devices | 2 | Data | Protect |
|
|
70
|
+
| 3.7 | Establish and Maintain a Data Classification Scheme | 2 | Data | Protect |
|
|
71
|
+
| 3.8 | Document Data Flows | 2 | Data | Identify |
|
|
72
|
+
| 3.9 | Encrypt Data on Removable Media | 2 | Data | Protect |
|
|
73
|
+
| 3.10 | Encrypt Sensitive Data in Transit | 2 | Data | Protect |
|
|
74
|
+
| 3.11 | Encrypt Sensitive Data at Rest | 2 | Data | Protect |
|
|
75
|
+
| 3.12 | Segment Data Processing and Storage Based on Sensitivity | 3 | Data | Protect |
|
|
76
|
+
| 3.13 | Deploy a Data Loss Prevention Solution | 3 | Data | Protect |
|
|
77
|
+
| 3.14 | Log Sensitive Data Access | 3 | Data | Detect |
|
|
78
|
+
|
|
79
|
+
**Implementation Notes:**
|
|
80
|
+
- **3.1:** Written policy covering classification, handling, retention, disposal — reviewed annually
|
|
81
|
+
- **3.2:** Inventory must include: data type, sensitivity, location (on-prem/cloud), owner, retention period
|
|
82
|
+
- **3.3:** Implement least-privilege on file shares, databases, cloud storage; review ACLs quarterly
|
|
83
|
+
- **3.6:** Enable full-disk encryption (BitLocker for Windows, FileVault for macOS, LUKS for Linux)
|
|
84
|
+
- **3.7:** Define classification labels: e.g., Public / Internal / Confidential / Restricted
|
|
85
|
+
- **3.10:** Enforce TLS 1.2+ for all data in transit; disable older protocols (SSL, TLS 1.0/1.1)
|
|
86
|
+
- **3.11:** Encrypt databases, backups, and file stores containing sensitive data
|
|
87
|
+
- **3.13:** Deploy DLP on email, endpoints, and cloud services to prevent data exfiltration
|
|
88
|
+
|
|
89
|
+
**Recommended Tools:** Microsoft Purview, Varonis, Symantec DLP, Zscaler, BitLocker, Vera (Digital Guardian)
|
|
90
|
+
|
|
91
|
+
---
|
|
92
|
+
|
|
93
|
+
## CIS Control 4: Secure Configuration
|
|
94
|
+
|
|
95
|
+
| Safeguard | Title | IG | Asset Type | Security Function |
|
|
96
|
+
|-----------|-------|-----|-----------|------------------|
|
|
97
|
+
| 4.1 | Establish and Maintain a Secure Configuration Process | 1 | Devices | Protect |
|
|
98
|
+
| 4.2 | Establish and Maintain a Secure Configuration Process for Network Infrastructure | 1 | Network | Protect |
|
|
99
|
+
| 4.3 | Configure Automatic Session Locking on Enterprise Assets | 1 | Devices/Users | Protect |
|
|
100
|
+
| 4.4 | Implement and Manage a Firewall on Servers | 1 | Devices | Protect |
|
|
101
|
+
| 4.5 | Implement and Manage a Firewall on End-User Devices | 1 | Devices | Protect |
|
|
102
|
+
| 4.6 | Securely Manage Enterprise Assets and Software | 2 | Devices | Protect |
|
|
103
|
+
| 4.7 | Manage Default Accounts on Enterprise Assets and Software | 2 | Users | Protect |
|
|
104
|
+
| 4.8 | Uninstall or Disable Unnecessary Services on Enterprise Assets | 2 | Devices | Protect |
|
|
105
|
+
| 4.9 | Configure Trusted DNS Servers on Enterprise Assets | 2 | Devices/Network | Protect |
|
|
106
|
+
| 4.10 | Enforce Automatic Device Lockout on Portable End-User Devices | 2 | Devices | Protect |
|
|
107
|
+
| 4.11 | Enforce Remote Wipe Capability on Portable End-User Devices | 2 | Devices | Protect |
|
|
108
|
+
| 4.12 | Separate Enterprise Workspaces on Mobile End-User Devices | 3 | Devices | Protect |
|
|
109
|
+
|
|
110
|
+
**Implementation Notes:**
|
|
111
|
+
- **4.1:** Use CIS Benchmarks as configuration baseline; automate hardening via Group Policy, Ansible, Chef, Puppet
|
|
112
|
+
- **4.2:** Apply router/switch hardening; disable unused ports, protocols, and services on network devices
|
|
113
|
+
- **4.3:** Set session timeout to 15 minutes or less; enforce screensaver lock via GPO/MDM
|
|
114
|
+
- **4.4:** Enable Windows Firewall or host-based firewall on all servers; define least-privilege inbound/outbound rules
|
|
115
|
+
- **4.7:** Rename or disable default admin accounts; change all default passwords immediately upon deployment
|
|
116
|
+
- **4.8:** Disable/uninstall: Telnet, FTP, rsh, RPC where not needed; audit running services quarterly
|
|
117
|
+
|
|
118
|
+
**CIS Benchmark Resources:** Free hardening guides available at cisecurity.org/benchmark for Windows, Linux, macOS, AWS, Azure, GCP, Kubernetes, Docker, browsers
|
|
119
|
+
|
|
120
|
+
---
|
|
121
|
+
|
|
122
|
+
## CIS Control 5: Account Management
|
|
123
|
+
|
|
124
|
+
| Safeguard | Title | IG | Asset Type | Security Function |
|
|
125
|
+
|-----------|-------|-----|-----------|------------------|
|
|
126
|
+
| 5.1 | Establish and Maintain an Inventory of Accounts | 1 | Users | Identify |
|
|
127
|
+
| 5.2 | Use Unique Passwords | 1 | Users | Protect |
|
|
128
|
+
| 5.3 | Disable Dormant Accounts | 1 | Users | Protect |
|
|
129
|
+
| 5.4 | Restrict Administrator Privileges to Dedicated Administrator Accounts | 1 | Users | Protect |
|
|
130
|
+
| 5.5 | Establish and Maintain an Inventory of Service Accounts | 2 | Users | Identify |
|
|
131
|
+
| 5.6 | Centralize Account Management | 2 | Users | Protect |
|
|
132
|
+
|
|
133
|
+
**Implementation Notes:**
|
|
134
|
+
- **5.1:** Inventory: all user, admin, service, and guest accounts across all systems
|
|
135
|
+
- **5.2:** Password policy: minimum 14 characters (or MFA required); check against breached password databases (HaveIBeenPwned); use password manager
|
|
136
|
+
- **5.3:** Disable accounts unused for 90 days; automate detection via IdP reporting
|
|
137
|
+
- **5.4:** Never use admin accounts for daily work; separate admin credentials; use PAM solutions for privileged access
|
|
138
|
+
- **5.5:** Service accounts: document purpose, owner, permissions; rotate passwords regularly
|
|
139
|
+
- **5.6:** Use Active Directory, Azure AD/Entra ID, Okta, or similar IdP as single source of truth
|
|
140
|
+
|
|
141
|
+
---
|
|
142
|
+
|
|
143
|
+
## CIS Control 6: Access Control Management
|
|
144
|
+
|
|
145
|
+
| Safeguard | Title | IG | Asset Type | Security Function |
|
|
146
|
+
|-----------|-------|-----|-----------|------------------|
|
|
147
|
+
| 6.1 | Establish an Access Granting Process | 1 | Users | Protect |
|
|
148
|
+
| 6.2 | Establish an Access Revoking Process | 1 | Users | Protect |
|
|
149
|
+
| 6.3 | Require MFA for Externally-Exposed Applications | 2 | Users | Protect |
|
|
150
|
+
| 6.4 | Require MFA for Remote Network Access | 2 | Users | Protect |
|
|
151
|
+
| 6.5 | Require MFA for Administrative Access | 2 | Users | Protect |
|
|
152
|
+
| 6.6 | Establish and Maintain an Inventory of Authentication/Authorization Systems | 2 | Users | Identify |
|
|
153
|
+
| 6.7 | Centralize Access Control | 2 | Users | Protect |
|
|
154
|
+
| 6.8 | Define and Maintain Role-Based Access Control | 2 | Users | Protect |
|
|
155
|
+
|
|
156
|
+
**Implementation Notes:**
|
|
157
|
+
- **6.1/6.2:** Formal access request and approval process; link to onboarding/offboarding procedures; review quarterly
|
|
158
|
+
- **6.3:** MFA on all SaaS, web portals, VPN, RDP — phishing-resistant MFA (FIDO2/passkeys) preferred over SMS OTP
|
|
159
|
+
- **6.5:** Require MFA for all admin console access (cloud management, AD, network devices)
|
|
160
|
+
- **6.8:** Define roles in RBAC model; avoid overly broad permissions; apply least-privilege principle
|
|
161
|
+
|
|
162
|
+
---
|
|
163
|
+
|
|
164
|
+
## CIS Control 7: Continuous Vulnerability Management
|
|
165
|
+
|
|
166
|
+
| Safeguard | Title | IG | Asset Type | Security Function |
|
|
167
|
+
|-----------|-------|-----|-----------|------------------|
|
|
168
|
+
| 7.1 | Establish and Maintain a Vulnerability Management Process | 1 | Devices/Apps | Protect |
|
|
169
|
+
| 7.2 | Establish and Maintain a Remediation Process | 1 | Devices/Apps | Respond |
|
|
170
|
+
| 7.3 | Perform Automated Operating System Patch Management | 1 | Devices | Protect |
|
|
171
|
+
| 7.4 | Perform Automated Application Patch Management | 1 | Applications | Protect |
|
|
172
|
+
| 7.5 | Perform Automated Vulnerability Scans of Internal Enterprise Assets | 2 | Devices | Identify |
|
|
173
|
+
| 7.6 | Perform Automated Vulnerability Scans of Externally Exposed Enterprise Assets | 2 | Devices/Network | Identify |
|
|
174
|
+
| 7.7 | Remediate Detected Vulnerabilities | 2 | Devices/Apps | Respond |
|
|
175
|
+
|
|
176
|
+
**Remediation SLAs (common industry standards):**
|
|
177
|
+
| CVSS Severity | Recommended Remediation Time |
|
|
178
|
+
|---------------|------------------------------|
|
|
179
|
+
| Critical (9.0–10.0) | 15 days |
|
|
180
|
+
| High (7.0–8.9) | 30 days |
|
|
181
|
+
| Medium (4.0–6.9) | 90 days |
|
|
182
|
+
| Low (0.1–3.9) | 180 days or risk accepted |
|
|
183
|
+
|
|
184
|
+
**Recommended Tools:** Qualys VMDR, Tenable Nessus/io, Rapid7 InsightVM, Microsoft Defender Vulnerability Management, CrowdStrike Spotlight
|
|
185
|
+
|
|
186
|
+
---
|
|
187
|
+
|
|
188
|
+
## CIS Control 8: Audit Log Management
|
|
189
|
+
|
|
190
|
+
| Safeguard | Title | IG | Asset Type | Security Function |
|
|
191
|
+
|-----------|-------|-----|-----------|------------------|
|
|
192
|
+
| 8.1 | Establish and Maintain an Audit Log Management Process | 1 | Network/Devices | Protect |
|
|
193
|
+
| 8.2 | Collect Audit Logs | 1 | Network/Devices | Detect |
|
|
194
|
+
| 8.3 | Ensure Adequate Audit Log Storage | 2 | Network/Devices | Protect |
|
|
195
|
+
| 8.4 | Standardize Time Synchronization | 2 | Network/Devices | Protect |
|
|
196
|
+
| 8.5 | Collect Detailed Audit Logs | 2 | Network/Devices | Detect |
|
|
197
|
+
| 8.6 | Collect DNS Query Audit Logs | 2 | Network | Detect |
|
|
198
|
+
| 8.7 | Collect URL Request Audit Logs | 2 | Network | Detect |
|
|
199
|
+
| 8.8 | Collect Command-Line Audit Logs | 2 | Devices | Detect |
|
|
200
|
+
| 8.9 | Centralize Audit Logs | 2 | Network/Devices | Detect |
|
|
201
|
+
| 8.10 | Retain Audit Logs | 2 | Network/Devices | Protect |
|
|
202
|
+
| 8.11 | Conduct Audit Log Reviews | 2 | Network/Devices | Detect |
|
|
203
|
+
| 8.12 | Collect Service Provider Logs | 2 | Data/Network | Detect |
|
|
204
|
+
|
|
205
|
+
**Minimum Log Retention:** 90 days hot (searchable), 1 year cold storage (regulatory minimum varies)
|
|
206
|
+
**Recommended Tools:** Splunk, Microsoft Sentinel, Elastic SIEM, Sumo Logic, IBM QRadar
|
|
207
|
+
|
|
208
|
+
---
|
|
209
|
+
|
|
210
|
+
## CIS Controls 9–18 Summary (Selected Key Safeguards)
|
|
211
|
+
|
|
212
|
+
### Control 9: Email and Web Browser Protections
|
|
213
|
+
- 9.3 (IG1): Maintain/enforce email provider anti-spoofing (SPF, DKIM, DMARC)
|
|
214
|
+
- 9.5 (IG2): Implement DMARC policy (p=quarantine or p=reject)
|
|
215
|
+
|
|
216
|
+
### Control 10: Malware Defenses
|
|
217
|
+
- 10.1 (IG1): Deploy/maintain anti-malware on all endpoints
|
|
218
|
+
- 10.7 (IG2): Use behavior-based/next-gen anti-malware (EDR)
|
|
219
|
+
|
|
220
|
+
### Control 11: Data Recovery
|
|
221
|
+
- 11.2 (IG1): Automated backups on schedule; test restores quarterly
|
|
222
|
+
- 11.4 (IG1): Store backup copy isolated/offline (3-2-1 rule)
|
|
223
|
+
|
|
224
|
+
### Control 12: Network Infrastructure Management
|
|
225
|
+
- 12.1 (IG1): Keep network devices firmware/OS current
|
|
226
|
+
- 12.7 (IG2): Require VPN for remote access with AAA
|
|
227
|
+
|
|
228
|
+
### Control 13: Network Monitoring and Defense
|
|
229
|
+
- 13.1 (IG2): Centralize security event alerting (SIEM)
|
|
230
|
+
- 13.3 (IG2): Deploy NIDS/NIPS or NDR solution
|
|
231
|
+
- 13.7/13.8 (IG3): HIPS/NIPS for active blocking
|
|
232
|
+
|
|
233
|
+
### Control 14: Security Awareness Training
|
|
234
|
+
- 14.2 (IG1): Annual phishing awareness training; quarterly simulations (IG2+)
|
|
235
|
+
- 14.6 (IG1): Train employees to recognize and report incidents
|
|
236
|
+
|
|
237
|
+
### Control 15: Service Provider Management
|
|
238
|
+
- 15.1 (IG1): Inventory of all service providers with data access
|
|
239
|
+
- 15.4 (IG2): Contracts must include security requirements
|
|
240
|
+
- 15.5 (IG2): Annual risk assessment of critical service providers
|
|
241
|
+
|
|
242
|
+
### Control 16: Application Software Security
|
|
243
|
+
- 16.9 (IG2): Developer security training (OWASP Top 10)
|
|
244
|
+
- 16.12 (IG3): SAST/DAST/IAST integrated in CI/CD pipeline
|
|
245
|
+
|
|
246
|
+
### Control 17: Incident Response Management
|
|
247
|
+
- 17.4 (IG1): Document incident response plan; test annually
|
|
248
|
+
- 17.7 (IG2): Conduct tabletop exercises; include ransomware scenarios
|
|
249
|
+
|
|
250
|
+
### Control 18: Penetration Testing
|
|
251
|
+
- 18.2 (IG2): Annual external penetration test by qualified third party
|
|
252
|
+
- 18.5 (IG3): Quarterly internal pen tests; red team exercises
|
|
@@ -0,0 +1,170 @@
|
|
|
1
|
+
# CMMC 2.0 — Assessment Guide: SPRS Scoring, C3PAO Process & POA&M Rules
|
|
2
|
+
|
|
3
|
+
## SPRS Score Calculation
|
|
4
|
+
|
|
5
|
+
### Scoring Methodology
|
|
6
|
+
The SPRS score is calculated per the DoD Assessment Methodology for NIST SP 800-171:
|
|
7
|
+
- **Starting score**: 110 points
|
|
8
|
+
- **Each NOT MET practice**: Deduct the assigned point value
|
|
9
|
+
- **Partial implementation**: Full deduction applies (no partial credit)
|
|
10
|
+
- **Score range**: +110 (all practices met) to −203 (all not met)
|
|
11
|
+
- **Submission**: Required for all Level 2 contracts; submit at sprs.csd.disa.mil
|
|
12
|
+
|
|
13
|
+
### Point Values by Domain
|
|
14
|
+
Point values are assigned based on the practice's security impact:
|
|
15
|
+
|
|
16
|
+
| Domain | Practices | Total Points at Risk |
|
|
17
|
+
|--------|-----------|---------------------|
|
|
18
|
+
| AC (Access Control) | 22 | ~50 |
|
|
19
|
+
| AU (Audit & Accountability) | 9 | ~17 |
|
|
20
|
+
| CM (Configuration Management) | 9 | ~19 |
|
|
21
|
+
| IA (Identification & Authentication) | 11 | ~22 |
|
|
22
|
+
| IR (Incident Response) | 3 | ~5 |
|
|
23
|
+
| MA (Maintenance) | 6 | ~11 |
|
|
24
|
+
| MP (Media Protection) | 9 | ~8 |
|
|
25
|
+
| PE (Physical Protection) | 6 | ~11 |
|
|
26
|
+
| PS (Personnel Security) | 2 | ~4 |
|
|
27
|
+
| RA (Risk Assessment) | 3 | ~9 |
|
|
28
|
+
| CA (Security Assessment) | 4 | ~9 |
|
|
29
|
+
| SC (System & Communications) | 16 | ~39 |
|
|
30
|
+
| SI (System & Information Integrity) | 7 | ~14 |
|
|
31
|
+
|
|
32
|
+
*Exact point values per practice are published in the DoD Assessment Methodology document (v2.2, Nov 2020).*
|
|
33
|
+
|
|
34
|
+
### Highest-Impact Practices (Largest Point Deductions)
|
|
35
|
+
Prioritize these when remediating — they carry the heaviest scoring weight:
|
|
36
|
+
1. **AC.L2-3.1.3** — CUI flow control (5 pts)
|
|
37
|
+
2. **SC.L2-3.13.8** — Encryption in transit / FIPS validated (5 pts)
|
|
38
|
+
3. **SC.L2-3.13.11** — FIPS-validated cryptography (5 pts)
|
|
39
|
+
4. **IA.L2-3.5.3** — Multifactor authentication (5 pts)
|
|
40
|
+
5. **SI.L2-3.14.6** — Monitoring for attacks (5 pts)
|
|
41
|
+
6. **AC.L2-3.1.5** — Least privilege (3 pts)
|
|
42
|
+
7. **AU.L2-3.3.1** — Audit logging (3 pts)
|
|
43
|
+
8. **CM.L2-3.4.1** — Baseline configuration (3 pts)
|
|
44
|
+
|
|
45
|
+
---
|
|
46
|
+
|
|
47
|
+
## C3PAO Assessment Process
|
|
48
|
+
|
|
49
|
+
### Pre-Assessment (Contractor Responsibilities)
|
|
50
|
+
Before engaging a C3PAO, ensure:
|
|
51
|
+
- [ ] System Security Plan (SSP) is complete and covers all 110 practices
|
|
52
|
+
- [ ] System boundary is defined with network diagrams
|
|
53
|
+
- [ ] CUI data flows are documented
|
|
54
|
+
- [ ] POA&M lists all practices not yet met
|
|
55
|
+
- [ ] SPRS score has been self-calculated
|
|
56
|
+
- [ ] Personnel responsible for each practice are identified
|
|
57
|
+
|
|
58
|
+
### Assessment Phases
|
|
59
|
+
|
|
60
|
+
**Phase 1 — Documentation Review (Remote)**
|
|
61
|
+
- C3PAO reviews SSP, network diagrams, policies, and POA&M
|
|
62
|
+
- Requests artifact list: logs, screenshots, configuration exports, training records
|
|
63
|
+
- Duration: 2–4 weeks
|
|
64
|
+
|
|
65
|
+
**Phase 2 — Assessment Activities (On-site or Remote)**
|
|
66
|
+
- Interviews with system administrators, security personnel, and executives
|
|
67
|
+
- Technical testing: vulnerability scans, configuration reviews, access control verification
|
|
68
|
+
- Observation of processes (incident response tabletop, maintenance procedures)
|
|
69
|
+
- Duration: 1–3 weeks depending on scope
|
|
70
|
+
|
|
71
|
+
**Phase 3 — Findings and Reporting**
|
|
72
|
+
- C3PAO issues Findings Report: MET, NOT MET, or NOT APPLICABLE per practice
|
|
73
|
+
- Contractor may provide additional evidence for disputed findings (limited window)
|
|
74
|
+
- Final report submitted to CMMC-AB
|
|
75
|
+
|
|
76
|
+
**Phase 4 — Certification Decision**
|
|
77
|
+
- **All 110 practices MET**: Full certification issued; valid 3 years
|
|
78
|
+
- **Limited unmet practices (non-critical)**: Conditional certification with POA&M; must remediate within 180 days
|
|
79
|
+
- **Critical practices unmet**: No certification; remediate and reschedule
|
|
80
|
+
|
|
81
|
+
### Critical Practices (Cannot Have POA&M at Certification)
|
|
82
|
+
The following practices must be fully MET for any certification to be issued:
|
|
83
|
+
- AC.L2-3.1.3 (CUI flow control)
|
|
84
|
+
- IA.L2-3.5.3 (Multifactor authentication)
|
|
85
|
+
- SC.L2-3.13.8 (Encryption in transit)
|
|
86
|
+
- SC.L2-3.13.11 (FIPS-validated cryptography)
|
|
87
|
+
- SI.L2-3.14.6 (Attack monitoring)
|
|
88
|
+
- AU.L2-3.3.1 (Audit logging)
|
|
89
|
+
- IR.L2-3.6.1 (Incident response capability)
|
|
90
|
+
|
|
91
|
+
---
|
|
92
|
+
|
|
93
|
+
## POA&M Rules and Management
|
|
94
|
+
|
|
95
|
+
### What Can Be in a POA&M at Certification
|
|
96
|
+
- Level 2: Up to a limited number of non-critical practices may remain in POA&M at time of certification
|
|
97
|
+
- POA&M remediation deadline: **180 days** from certification date
|
|
98
|
+
- Failure to remediate = certification revocation
|
|
99
|
+
- Level 3: No POA&M at certification — all practices must be MET
|
|
100
|
+
|
|
101
|
+
### POA&M Entry Format
|
|
102
|
+
|
|
103
|
+
| Field | Description |
|
|
104
|
+
|-------|-------------|
|
|
105
|
+
| Practice ID | CMMC practice identifier (e.g., CM.L2-3.4.2) |
|
|
106
|
+
| Weakness Description | What is not implemented and why |
|
|
107
|
+
| Remediation Steps | Specific actions to achieve compliance |
|
|
108
|
+
| Milestone 1–N | Intermediate checkpoints with dates |
|
|
109
|
+
| Scheduled Completion | Target date for full implementation |
|
|
110
|
+
| Resources Required | Personnel, tools, budget |
|
|
111
|
+
| Status | Open / In Progress / Completed |
|
|
112
|
+
| Evidence of Closure | What artifacts will demonstrate completion |
|
|
113
|
+
|
|
114
|
+
### POA&M Best Practices
|
|
115
|
+
- Never list a critical practice in a POA&M if seeking certification
|
|
116
|
+
- Update monthly; stale POA&Ms raise auditor concerns
|
|
117
|
+
- Link each POA&M item to the relevant SSP section
|
|
118
|
+
- Document root cause, not just the symptom
|
|
119
|
+
|
|
120
|
+
---
|
|
121
|
+
|
|
122
|
+
## Evidence Requirements by Practice Type
|
|
123
|
+
|
|
124
|
+
### Documentary Evidence (policies, procedures, plans)
|
|
125
|
+
- Acceptable formats: PDF, Word, screenshots with metadata
|
|
126
|
+
- Must show: author, date, version, approval signature
|
|
127
|
+
- Examples: SSP, access control policy, incident response plan, training records
|
|
128
|
+
|
|
129
|
+
### Technical Evidence (system configuration, logs)
|
|
130
|
+
- Configuration exports from firewalls, Active Directory, SIEM
|
|
131
|
+
- Vulnerability scan reports (authenticated scans preferred)
|
|
132
|
+
- MFA enrollment reports showing all privileged user enrollment
|
|
133
|
+
- Patch management reports showing remediation timelines
|
|
134
|
+
|
|
135
|
+
### Interview Evidence
|
|
136
|
+
- Assessors will interview: ISSO/ISSM, system admins, end users, executives
|
|
137
|
+
- Prepare personnel to describe their security responsibilities
|
|
138
|
+
- Cannot substitute documentation for interview — both required
|
|
139
|
+
|
|
140
|
+
---
|
|
141
|
+
|
|
142
|
+
## DIBNET Incident Reporting (DFARS 7012)
|
|
143
|
+
|
|
144
|
+
DFARS 252.204-7012 mandates cyber incident reporting regardless of CMMC level:
|
|
145
|
+
- **Report to**: DIBNET portal (dibnet.dod.mil)
|
|
146
|
+
- **Deadline**: Within **72 hours** of discovering the incident
|
|
147
|
+
- **What to report**: Systems affected, CUI categories involved, attack vectors, forensic indicators
|
|
148
|
+
- **Preserve evidence**: Maintain disk images and forensic evidence for 90 days; DoD may request copies
|
|
149
|
+
- **Notify prime**: If you are a subcontractor, notify the prime who notifies DoD
|
|
150
|
+
|
|
151
|
+
### What Constitutes a Reportable Incident
|
|
152
|
+
- Unauthorized access to systems containing CUI
|
|
153
|
+
- Exfiltration of CUI (actual or suspected)
|
|
154
|
+
- Malware detected on systems that process CUI
|
|
155
|
+
- Compromise of credentials that could lead to CUI access
|
|
156
|
+
|
|
157
|
+
---
|
|
158
|
+
|
|
159
|
+
## Common Assessment Findings
|
|
160
|
+
|
|
161
|
+
| Practice | Common Finding | Typical Remediation |
|
|
162
|
+
|----------|---------------|---------------------|
|
|
163
|
+
| IA.L2-3.5.3 | MFA not enabled for all privileged accounts or remote access | Deploy MFA solution (Azure MFA, Duo, Okta); enforce via conditional access |
|
|
164
|
+
| SC.L2-3.13.11 | TLS 1.0/1.1 still enabled; non-FIPS algorithms in use | Disable TLS 1.0/1.1; enable only FIPS-validated cipher suites |
|
|
165
|
+
| AU.L2-3.3.1 | Logs not retained per policy; not all devices log to SIEM | Deploy/configure SIEM; set 3-year retention; cover all CUI-touching systems |
|
|
166
|
+
| CM.L2-3.4.1 | No formal baseline configuration document | Create baseline config docs per OS/application; store in change management |
|
|
167
|
+
| AC.L2-3.1.5 | Excessive admin rights; shared admin accounts | Implement PAM solution; audit/remove excess privileges quarterly |
|
|
168
|
+
| RA.L2-3.11.2 | Vulnerability scans not authenticated; not covering all assets | Configure credentialed scans; scan all in-scope assets monthly |
|
|
169
|
+
| CA.L2-3.12.4 | SSP outdated or incomplete | Update SSP; review and re-approve annually or after significant changes |
|
|
170
|
+
| AC.L2-3.1.3 | CUI accessible to users without need-to-know | Implement data classification labels; enforce access controls at file/folder level |
|
|
@@ -0,0 +1,113 @@
|
|
|
1
|
+
# CMMC 2.0 — Level Comparison, Assessment Types & Flow-Down Rules
|
|
2
|
+
|
|
3
|
+
## Level Comparison Table
|
|
4
|
+
|
|
5
|
+
| Attribute | Level 1 — Foundational | Level 2 — Advanced | Level 3 — Expert |
|
|
6
|
+
|-----------|----------------------|-------------------|-----------------|
|
|
7
|
+
| **Practices** | 17 (FAR 52.204-21) | 110 (NIST SP 800-171 Rev 2) | 110+ (SP 800-171 + SP 800-172 subset) |
|
|
8
|
+
| **Focus** | Federal Contract Information (FCI) | Controlled Unclassified Information (CUI) | CUI on highest-priority DoD programs; APT resilience |
|
|
9
|
+
| **Assessment type** | Annual self-assessment | Triennial C3PAO assessment (critical) OR self-assessment (non-critical) | DIBCAC-led government assessment (triennial) |
|
|
10
|
+
| **SPRS submission** | Yes | Yes | Yes |
|
|
11
|
+
| **Certification body** | Self | C3PAO (CMMC Third-Party Assessment Organization) | DIBCAC (Defense Industrial Base Cybersecurity Assessment Center) |
|
|
12
|
+
| **Conditional certification** | No | Yes (limited POA&M allowed) | No |
|
|
13
|
+
| **Who needs it** | All DoD contractors receiving/generating FCI | Contractors handling CUI on DoD contracts | Contractors on highest-priority programs (e.g., nuclear C3, certain weapons systems) |
|
|
14
|
+
|
|
15
|
+
---
|
|
16
|
+
|
|
17
|
+
## DFARS Clause Mapping
|
|
18
|
+
|
|
19
|
+
| DFARS Clause | Requirement | Level Implied |
|
|
20
|
+
|-------------|-------------|---------------|
|
|
21
|
+
| FAR 52.204-21 | Basic Safeguarding of FCI — 15 requirements | Level 1 baseline |
|
|
22
|
+
| DFARS 252.204-7012 | Safeguarding CUI; 72-hr DIBNET incident reporting; cloud = FedRAMP Moderate | Level 2 prerequisite |
|
|
23
|
+
| DFARS 252.204-7019 | NIST SP 800-171 self-assessment; SPRS submission required | Level 2 self-assessment |
|
|
24
|
+
| DFARS 252.204-7020 | DoD access to contractor assessment results in SPRS | Level 2 |
|
|
25
|
+
| DFARS 252.204-7021 | CMMC certification requirement; flow-down to subcontractors | Level 2 or 3 |
|
|
26
|
+
|
|
27
|
+
**Rule**: If your contract contains DFARS 252.204-7021, your CMMC level is specified in the contract. Check Section L or the Performance Work Statement.
|
|
28
|
+
|
|
29
|
+
---
|
|
30
|
+
|
|
31
|
+
## Assessment Process by Level
|
|
32
|
+
|
|
33
|
+
### Level 1 — Self-Assessment
|
|
34
|
+
1. Assess all 17 practices against FAR 52.204-21
|
|
35
|
+
2. Calculate and submit SPRS score (17 practices, max score = 17, each = 1 point)
|
|
36
|
+
3. Submit to SPRS at https://www.sprs.csd.disa.mil/
|
|
37
|
+
4. Senior official affirms accuracy
|
|
38
|
+
5. Repeat annually
|
|
39
|
+
|
|
40
|
+
### Level 2 — C3PAO Assessment (Critical Programs)
|
|
41
|
+
1. **Pre-assessment preparation** (6–12 months): SSP, POA&M, gap remediation
|
|
42
|
+
2. **Select a C3PAO**: Must be CMMC-AB authorized; find at cyberAB.us
|
|
43
|
+
3. **Contract with C3PAO**: Negotiate scope, timeline, NDA
|
|
44
|
+
4. **Assessment**: C3PAO reviews evidence, interviews, observes (typically 2–4 weeks on-site/remote)
|
|
45
|
+
5. **Findings**: CMMC-AB receives results; conditional certification possible with limited POA&M
|
|
46
|
+
6. **Certification**: Issued by CMMC-AB; valid for 3 years
|
|
47
|
+
7. **Annual affirmation**: Affirm continued compliance each year
|
|
48
|
+
|
|
49
|
+
### Level 2 — Self-Assessment (Non-Critical Programs)
|
|
50
|
+
- Same 110 practices as C3PAO path
|
|
51
|
+
- Self-assessed by contractor; senior official affirms in SPRS
|
|
52
|
+
- DoD reserves right to audit; false statements = False Claims Act liability
|
|
53
|
+
- Must still submit SPRS score
|
|
54
|
+
|
|
55
|
+
### Level 3 — DIBCAC Assessment
|
|
56
|
+
1. Contractor must hold a current Level 2 C3PAO certification first
|
|
57
|
+
2. DIBCAC (government team) conducts assessment — not contractor-selected
|
|
58
|
+
3. Assesses SP 800-171 practices PLUS select SP 800-172 enhanced requirements
|
|
59
|
+
4. No conditional certification — all practices must be MET
|
|
60
|
+
5. Government schedules the assessment; no commercial negotiation
|
|
61
|
+
|
|
62
|
+
---
|
|
63
|
+
|
|
64
|
+
## Flow-Down Requirements
|
|
65
|
+
|
|
66
|
+
DFARS 252.204-7021(c) requires prime contractors to:
|
|
67
|
+
- Include CMMC requirements in **all subcontracts** where the subcontractor processes, stores, or transmits CUI
|
|
68
|
+
- Specify the required CMMC level in the subcontract
|
|
69
|
+
- Verify subcontractor certification before award (Level 2/3 must appear in SPRS/CMMC-AB registry)
|
|
70
|
+
- Flow-down applies to **all tiers** — sub-subcontractors are not exempt
|
|
71
|
+
|
|
72
|
+
**Practical implication**: If you're a prime, map your CUI to each subcontractor and determine which level applies to each. Document this in your supply chain security program.
|
|
73
|
+
|
|
74
|
+
---
|
|
75
|
+
|
|
76
|
+
## Timeline and Key Dates
|
|
77
|
+
|
|
78
|
+
| Milestone | Date |
|
|
79
|
+
|-----------|------|
|
|
80
|
+
| CMMC 2.0 Final Rule (32 CFR Part 170) effective | December 16, 2024 |
|
|
81
|
+
| DFARS rule (48 CFR Parts 204, 212, 252) effective | December 16, 2024 |
|
|
82
|
+
| CMMC requirements in new contracts | Phased: began Q1 2025, full rollout through 2026 |
|
|
83
|
+
| Level 1 self-assessments required | All contracts with FAR 52.204-21, immediately |
|
|
84
|
+
| Level 2 C3PAO assessments | Required when DFARS 7021 included in solicitation |
|
|
85
|
+
|
|
86
|
+
---
|
|
87
|
+
|
|
88
|
+
## CUI Categories Most Common in Defense Contracts
|
|
89
|
+
|
|
90
|
+
| CUI Category | Examples | Typical Contract Types |
|
|
91
|
+
|-------------|----------|----------------------|
|
|
92
|
+
| Export Controlled (CTI) | Technical data, software, drawings | Engineering, manufacturing |
|
|
93
|
+
| Naval Nuclear Propulsion (NOFORN) | Propulsion design data | Shipbuilding, nuclear |
|
|
94
|
+
| Controlled Technical Information (CTI) | ITAR/EAR-controlled technical data | Weapons systems, aerospace |
|
|
95
|
+
| Privacy (PII) | Personnel records | HR, health, benefits |
|
|
96
|
+
| Law Enforcement Sensitive | Investigation data | Base security contractors |
|
|
97
|
+
| Procurement/Acquisition | Pre-award contract info | Proposal/BD teams |
|
|
98
|
+
|
|
99
|
+
---
|
|
100
|
+
|
|
101
|
+
## Key Definitions
|
|
102
|
+
|
|
103
|
+
| Term | Definition |
|
|
104
|
+
|------|-----------|
|
|
105
|
+
| **FCI** | Federal Contract Information — information provided by or generated for the Government under contract, not intended for public release |
|
|
106
|
+
| **CUI** | Controlled Unclassified Information — information the Government creates or possesses that requires safeguarding per law/regulation/policy |
|
|
107
|
+
| **SPRS** | Supplier Performance Risk System — DoD portal where self-assessment scores are submitted |
|
|
108
|
+
| **C3PAO** | CMMC Third-Party Assessment Organization — authorized to conduct Level 2 assessments |
|
|
109
|
+
| **DIBCAC** | Defense Industrial Base Cybersecurity Assessment Center — DCSA organization conducting Level 3 government assessments |
|
|
110
|
+
| **CMMC-AB** | Cyber AB — accreditation body that certifies C3PAOs, assessors, and consultants |
|
|
111
|
+
| **OSC** | Organization Seeking Certification — the defense contractor being assessed |
|
|
112
|
+
| **POA&M** | Plan of Action & Milestones — documented remediation plan for unmet practices |
|
|
113
|
+
| **SSP** | System Security Plan — describes the system boundary, CUI flows, and control implementations |
|