Time
1 hour 17 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:02
prepping for C MMC. Now let's cross over and roller sleeves up so we can understand. See MMC draft version 0.7 framework.
00:16
So in here we're going to review the sea MMC domains,
00:22
the capabilities
00:24
and then the sea. MMC practices, which in 0.7 there is 173 and then the Sea MMC, levels of which there are five.
00:34
So a broad overview, which is not a kim from,
00:40
Let's say this 853 that cybersecurity framework or the ice Oh, or even with the Kobe it they have domains. Access controls is the first domain within the Sea MMC model, and there is a total of 17
00:57
then under each domain, their capabilities that reside within those domains. And there's a total of 43. And again this is in the draft 430.7. And as I stated before,
01:11
Version one will have the final number domains, capabilities and practices
01:19
that will be published. And will there be a big difference? I don't think so, but we have to wait and see what those differences are. A different. Additionally, there are nine processes that transcend the five cmm sea levels
01:36
that are measuring how mature
01:38
you really are with the whole cybersecurity framework.
01:45
So 17 capability domains. And like I said before, there's access control, incident, response and probably incident response is one that if I was a contractor,
02:00
I would want to look at closely because historically I have seen with commercial companies
02:07
that instant response ends up being a week area toe where they have not adequately defined their Incident Response program that people involved call trees etcetera. So make a note of that
02:25
that incident response. You should double check and look against some other standards. And look at the 801 71.
02:34
Also asset management, that is, what software do you have?
02:39
What type off hardware do you have and can you account
02:46
for your software and hardware that you have also? Then what policies and procedures do you have in place? Do you have awareness and training for your staff on cybersecurity and other security aspects of social engineering
03:05
on the emails, Fraudulent emails
03:08
Also, with the audit and accountability with it? Look at your personnel. Make sure that you have segregation of duties, making sure that you don't have one person assigning everything in charge of everything with it.
03:28
Also physical protection.
03:30
And that is one people always know what my data center I have toe have that protected. But what about the documents that you have?
03:40
What about your data?
03:43
Do you have control of your data?
03:46
Whether it's up in the cloud, whether it's on a laptop that is going in and out of the facility,
03:53
how about as far as security the data as it is going from Point A to Point B, whether managed service provider, whether it's going out to a subcontractor, are the subcontractors you're working with? Are they careful with your data?
04:13
Do they understand everything that you are going through because they subcontractors
04:19
must follow
04:21
the same guidance of CMM see that you're going through? What's going to be interesting is, if you're a Level three
04:32
contractor and do you have 50 subs?
04:39
What will be the requirement of those subs? Will they all? Because the RFP says level three, will they all have to be level three certified as well? That's one question that will be clearly defined by the D. O. D. As we go forward, because do you have a janitor
04:59
who comes in and cleans up the offices.
05:02
Well, you have paperwork weighing around
05:06
computers, etcetera around. So what level will that Janner have to attuned to?
05:14
These are things that once version one comes out, other things D o d will provide guidance for.
05:21
But what I tell a contractor right now is if you're looking at level three,
05:28
if you plan for you and all the subs to be level three,
05:33
if the requirements get lessened for the sobs,
05:38
you're in good shape and you're ready to go.
05:41
The other thing is, is that Let's go into the different levels. So the level one they talk about basic high cyber hygiene. So they want to be able to say that,
05:54
Yes, I am following good cyber hygiene. I watch my documents, I watched my laptops, I watch applications and I am performing that in my daily activities and X is a level two
06:10
and you have intermediate cyber hygiene. I documented my policies and procedures. I have those in place
06:17
so that I have a
06:20
structure
06:21
I t structure that my people in my firm follow level three. They're doing good cyber hygiene. That means that they have it managed. They have someone overlooking
06:38
the applications over your domain over the users, making sure that everything is in check.
06:46
The level four goes to proactive.
06:50
So not only are they managing it, but they're doing some pro active reviewing
06:57
there are looking for suspicious type of activity that's happening that could be on their VPN. It could be on the insight
07:09
of their network by any of the employees. It could be as faras outside. It could be as far as
07:16
physical access
07:18
access cards, people coming in and out. Are they making sure that the different vendors that they're dealing with and their suppliers, that whole supply chain that they're in is that being reviewed and making sure that if there
07:33
they're now at level four and everything in there, they're handling higher sensitive data,
07:41
and they have to make sure that up and down that supply chain and the ingress and outgoing data is very secure. And then you get to level five, which is the events the highest level toe where there is a ton sense of information within that contract,
08:01
and
08:01
they make sure that the full cyber security controls are in place.
08:07
They they have. If they have managed service providers there making sure that they're at the top level of what they can be so that that data is protected.
08:20
So in summary, you have level one
08:26
good basic cyber hygiene.
08:28
And this is where in level one,
08:33
the FARC losses federal acquisition regulation causes
08:37
have been demonstrated by that level one. And currently, in this weather one, there are 17 practices
08:48
that that they have to demonstrate adherence to level two. Is that intermediate cyber hygiene? So you have your S o. P. Standard operating procedures. You have your I D. Policy, your cyber security policy, your backup policy incident response policy
09:09
and all the plans are established for every practice within your environment.
09:16
Let's jump to level three. And now you're just demonstrating good cyber hygiene. And this is where the 801 71 is effective within your security requirements so
09:33
that you know, and you manage adherence to your policies and procedures.
09:37
And you're making sure that all the resource is our at the proper levels as faras access to the data for review and control your applications and operations,
09:50
the next two levels level four. We're getting into this highly sensitive information. So now not only do they have that good cyber hygiene there proactive with their cybersecurity program, they're making sure that the activities not only are managed,
10:07
but they're being reviewed to make sure that management is fully aware
10:13
off the adherence to the policies and procedures. And they're testing the effectiveness witness of their program and making sure it's falling. All those policies, procedures toe a T
10:28
also, if any sort of issues. As far as any cyber attacks, potential cyberattacks, anything that is out of the norm is being brought up to management and they're fully reviewing
10:43
the incidents are potential incidents to make sure that their infrastructure is safe.
10:52
And finally, level five,
10:54
they've proven
10:56
that they've optimized all their capabilities
11:01
so that they could make sure that they are
11:05
have that advanced, persistent threat capability in place. So not only are they making sure that they're protected, they're going one mawr with it. They have the not only the I. D. S on the firewall, they have the i ps with it. They're making sure
11:22
that all the standardization are being adhered to across the organization that working with their
11:30
subs to make sure that everything is secure not knowing with them but everything they hand off and also their proactive looking at approve mints
11:41
across making sure the S. L. A's are being adhere to working with the vendors as Faras updates, making sure that the patching
11:50
patching is so important to make sure that they are up to date with all their Apache and they have a standard process in place to make sure those patches are not missed on it.

Up Next

CMMC Overview

This Cybersecurity Maturity Model Certification (CMMC) training provides an overview of how to prepare for future certification, including its requirements and why it is important for contractors working with the Department of Defense.

Instructed By

Instructor Profile Image
Robert Ashcraft
IT Advisor for Regulatory / CMMC Environments at Corporate Visions
Instructor