CCA Blueprint: Difference between revisions
Jump to navigation
Jump to search
Line 164: | Line 164: | ||
|- | |- | ||
|D. Configuration Management (CM) | |D. Configuration Management (CM) | ||
(1) CM.L2-3.4.1 – System Baselining | :(1) CM.L2-3.4.1 – System Baselining | ||
(2) CM.L2-3.4.2 – Security Configuration Enforcement | :(2) CM.L2-3.4.2 – Security Configuration Enforcement | ||
(3) CM.L2-3.4.3 – System Change Management | :(3) CM.L2-3.4.3 – System Change Management | ||
(4) CM.L2-3.4.4 – Security Impact Analysis | :(4) CM.L2-3.4.4 – Security Impact Analysis | ||
(5) CM.L2-3.4.5 – Access Restrictions for Change | :(5) CM.L2-3.4.5 – Access Restrictions for Change | ||
(6) CM.L2-3.4.6 – Least Functionality | :(6) CM.L2-3.4.6 – Least Functionality | ||
(7) CM.L2-3.4.7 – Nonessential Functionality | :(7) CM.L2-3.4.7 – Nonessential Functionality | ||
(8) CM.L2-3.4.8 – Application Execution Policy | :(8) CM.L2-3.4.8 – Application Execution Policy | ||
(9) CM.L2-3.4.9 – User-Installed Software | :(9) CM.L2-3.4.9 – User-Installed Software | ||
|- | |||
|E. Identification & Authentication (IA) | |||
:(1) IA.L2-3.5.3 – Multifactor Authentication | |||
E. Identification & Authentication (IA) | :(2) IA.L2-3.5.4 – Replay-Resistant Authentication | ||
(1) IA.L2-3.5.3 – Multifactor Authentication | :(3) IA.L2-3.5.5 – Identifier Reuse | ||
(2) IA.L2-3.5.4 – Replay-Resistant Authentication | :(4) IA.L2-3.5.6 – Identifier Handling | ||
(3) IA.L2-3.5.5 – Identifier Reuse | :(5) IA.L2-3.5.7 – Password Complexity | ||
(4) IA.L2-3.5.6 – Identifier Handling | :(6) IA.L2-3.5.8 – Password Reuse | ||
(5) IA.L2-3.5.7 – Password Complexity | :(7) IA.L2-3.5.9 – Temporary Passwords | ||
(6) IA.L2-3.5.8 – Password Reuse | :(8) IA.L2-3.5.10 – Cryptographically-Protected Passwords | ||
(7) IA.L2-3.5.9 – Temporary Passwords | :(9) IA.L2-3.5.11 – Obscure Feedback | ||
(8) IA.L2-3.5.10 – Cryptographically-Protected Passwords | |- | ||
(9) IA.L2-3.5.11 – Obscure Feedback | |F. Incident Response (IR) | ||
:(1) IR.L2-3.6.1 – Incident Handling | |||
:(2) IR.L2-3.6.2 – Incident Reporting | |||
:(3) IR.L2-3.6.3 – Incident Response Testing | |||
|- | |||
|G. Maintenance (MA) | |||
:(1) MA.L2-3.7.1 – Perform Maintenance | |||
:(2) MA.L2-3.7.2 – System Maintenance Control | |||
:(3) MA.L2-3.7.3 – Equipment Sanitization | |||
:(4) MA.L2-3.7.4 – Media Inspection | |||
:(5) MA.L2-3.7.5 – Nonlocal Maintenance | |||
:(6) MA.L2-3.7.6 – Maintenance Personnel | |||
F. Incident Response (IR) | |- | ||
(1) IR.L2-3.6.1 – Incident Handling | |H. Media Protection (MP) | ||
(2) IR.L2-3.6.2 – Incident Reporting | :(1) MP.L2-3.8.1 – Media Protection | ||
(3) IR.L2-3.6.3 – Incident Response Testing | :(2) MP.L2-3.8.2 – Media Access | ||
:(3) MP.L2-3.8.4 – Media Markings | |||
:(4) MP.L2-3.8.5 – Media Accountability | |||
:(5) MP.L2-3.8.6 – Portable Storage Encryption | |||
G. Maintenance (MA) | :(6) MP.L2-3.8.7 – Removeable Media | ||
(1) MA.L2-3.7.1 – Perform Maintenance | :(7) MP.L2-3.8.8 – Shared Media | ||
(2) MA.L2-3.7.2 – System Maintenance Control | :(8) MP.L2-3.8.9 – Protect Backups | ||
(3) MA.L2-3.7.3 – Equipment Sanitization | |- | ||
(4) MA.L2-3.7.4 – Media Inspection | |I. Personnel Security (PS) | ||
(5) MA.L2-3.7.5 – Nonlocal Maintenance | :(1) PS.L2-3.9.1 – Screen Individuals | ||
(6) MA.L2-3.7.6 – Maintenance Personnel | :(2) PS.L2-3.9.2 – Personnel Actions | ||
|- | |||
|J. Physical Protection (PE) | |||
:(1) PE.L2-3.10.2 – Monitor Facility | |||
H. Media Protection (MP) | :(2) PE.L2-3.10.6 – Alternative Work Sites | ||
(1) MP.L2-3.8.1 – Media Protection | |- | ||
(2) MP.L2-3.8.2 – Media Access | |K. Risk Assessment (RA) | ||
(3) MP.L2-3.8.4 – Media Markings | :(1) RA.L2-3.11.1 – Risk Assessments | ||
(4) MP.L2-3.8.5 – Media Accountability | :(2) RA.L2-3.11.2 – Vulnerability Scan | ||
(5) MP.L2-3.8.6 – Portable Storage Encryption | :(3) RA.L2-3.11.3 – Vulnerability Remediation | ||
(6) MP.L2-3.8.7 – Removeable Media | |- | ||
(7) MP.L2-3.8.8 – Shared Media | |L. Security Assessment (CA) | ||
(8) MP.L2-3.8.9 – Protect Backups | :(1) CA.L2-3.12.1 – Security Control Assessment | ||
:(2) CA.L2-3.12.2 – Plan of Action | |||
:(3) CA.L2-3.12.3 – Security Control Monitoring | |||
:(4) CA.L2-3.12.4 – System Security Plan | |||
I. Personnel Security (PS) | |- | ||
(1) PS.L2-3.9.1 – Screen Individuals | |M. System & Communications Protection (SC) | ||
(2) PS.L2-3.9.2 – Personnel Actions | :(1) SC.L2-3.13.2 – Security Engineering | ||
:(2) SC.L2-3.13.3 – Role Separation | |||
:(3) SC.L2-3.13.4 – Shared Resource Control | |||
:(4) SC.L2-3.13.6 – Network Communication by Exception | |||
J. Physical Protection (PE) | :(5) SC.L2-3.13.7 – Split Tunneling | ||
(1) PE.L2-3.10.2 – Monitor Facility | :(6) SC.L2-3.13.8 – Data in Transit | ||
(2) PE.L2-3.10.6 – Alternative Work Sites | :(7) SC.L2-3.13.9 – Connections Termination | ||
:(8) SC.L2-3.13.10 – Key Management | |||
:(9) SC.L2-3.13.11 – CUI Encryption | |||
:(10) SC.L2-3.13.12 – Collaborative Device Control | |||
K. Risk Assessment (RA) | :(11) SC.L2-3.13.13 – Mobile Code | ||
(1) RA.L2-3.11.1 – Risk Assessments | :(12) SC.L2-3.13.14 – Voice over Internet Protocol | ||
(2) RA.L2-3.11.2 – Vulnerability Scan | :(13) SC.L2-3.13.15 – Communications Authenticity | ||
(3) RA.L2-3.11.3 – Vulnerability Remediation | :(14) SC.L2-3.13.16 – Data at Rest | ||
|- | |||
|N. System & Information Integrity (SI) | |||
:(1) SI.L2-3.14.3 – Security Alerts & Advisories | |||
L. Security Assessment (CA) | :(2) SI.L2-3.14.6 – Monitor Communications for Attacks | ||
(1) CA.L2-3.12.1 – Security Control Assessment | :(3) SI.L2-3.14.7 – Identify Unauthorized Use | ||
(2) CA.L2-3.12.2 – Plan of Action | |||
(3) CA.L2-3.12.3 – Security Control Monitoring | |||
(4) CA.L2-3.12.4 – System Security Plan | |||
M. System & Communications Protection (SC) | |||
(1) SC.L2-3.13.2 – Security Engineering | |||
(2) SC.L2-3.13.3 – Role Separation | |||
(3) SC.L2-3.13.4 – Shared Resource Control | |||
(4) SC.L2-3.13.6 – Network Communication by Exception | |||
(5) SC.L2-3.13.7 – Split Tunneling | |||
(6) SC.L2-3.13.8 – Data in Transit | |||
(7) SC.L2-3.13.9 – Connections Termination | |||
(8) SC.L2-3.13.10 – Key Management | |||
(9) SC.L2-3.13.11 – CUI Encryption | |||
(10) SC.L2-3.13.12 – Collaborative Device Control | |||
(11) SC.L2-3.13.13 – Mobile Code | |||
(12) SC.L2-3.13.14 – Voice over Internet Protocol | |||
(13) SC.L2-3.13.15 – Communications Authenticity | |||
(14) SC.L2-3.13.16 – Data at Rest | |||
N. System & Information Integrity (SI) | |||
(1) SI.L2-3.14.3 – Security Alerts & Advisories | |||
(2) SI.L2-3.14.6 – Monitor Communications for Attacks | |||
(3) SI.L2-3.14.7 – Identify Unauthorized Use | |||
|} | |} |
Revision as of 21:34, 4 August 2022
Source of Reference: The CCA blueprint from Cybersecurity Maturity Model Certification Accreditation Body, Inc.
For inquiries and reporting errors on this wiki, please contact us. Thank you.
Domains
Upon successful completion of this exam, the candidate will be able to apply skills and knowledge to the below domains:
Domain | Exam Weight |
1. Evaluating Organizations Seeking Certification (OSC) against CMMC Level 2 requirement | 15% |
2. CMMC Level 2 Assessment Scoping | 20% |
3. CMMC Assessment Process (CAP) | 25% |
4. Assessing CMMC Level 2 Practices | 40% |
Domain 1: Evaluating Organizations Seeking Certification (OSC) against CMMC Level 2 requirements
Task 1. Assess the various environmental considerations of Organizations Seeking Certification (OSCs) against CMMC L2 practices.
|
Domain 2: Scoping
Task 1. Analyze the CMMC Assessment Scope of Controlled Unclassified Information (CUI) Assets as they pertain to a CMMC assessment using the five categories of CUI assets as defined in the CMMC Level 2 Assessment Scoping Guide.
1. Categorization of CUI data in the form of Assets that are in scope:
|
Task 2. Given a scenario, analyze the CMMC Assessment Scope based on the predetermined CUI categories within the CMMC Level 2 Assessment Scoping Guide.
1. CMMC assessment asset categories (In-scope)
|
2. CMMC assessment asset categories (Out-of-scope) |
3. Separation Techniques
|
Task 3. Evaluate CMMC assessment scope considerations based on the CMMC Level 2 Assessment Scoping Guide.
1. FCI and CUI within the same Assessment Scope:
|
2. FCI and CUI NOT within the same Assessment Scope:
|
3. External Services Providers
|
Domain 3: CMMC Assessment Process (CAP) v5.X
Task 1. Given a scenario, apply the appropriate phases and steps to plan, prepare, conduct, and report on a CMMC Level 2 Assessment.
1. Phase 1—Plan and Prepare Assessments:
|
2. Phase 2—Conduct assessment:
|
3. Phase 3—Report recommended assessment results:
|
Domain 4: CMMC Levels 2 Practices
Task 1. Identify evidence verification/validation methods and objects for Practices based on the CMMC Level 2 Assessment Guide and CMMC Assessment Process (CAP) documentation.
1. Methods and objects for determining evidence
|
2. Adequacy and sufficiency related to evidence around all below practices
|
3. CMMC Level 2 Assessment Practice objectives including potential methods, objects, and assessment considerations (by domain):
(at a minimum the practices listed below must be evaluated for CCA candidates) |
A. Access Control (AC)
|
B. Awareness & Training (AT)
|
C. Audit & Accountability (AU)
|
D. Configuration Management (CM)
|
E. Identification & Authentication (IA)
|
F. Incident Response (IR)
|
G. Maintenance (MA)
|
H. Media Protection (MP)
|
I. Personnel Security (PS)
|
J. Physical Protection (PE)
|
K. Risk Assessment (RA)
|
L. Security Assessment (CA)
|
M. System & Communications Protection (SC)
|
N. System & Information Integrity (SI)
|