CCA Blueprint: Difference between revisions
Jump to navigation
Jump to search
Line 401: | Line 401: | ||
(at a minimum the practices listed below must be evaluated for CCA candidates) | (at a minimum the practices listed below must be evaluated for CCA candidates) | ||
|- | |- | ||
|5A, 5B | |||
|4.1.3.A | |||
|A. Access Control (AC) | |A. Access Control (AC) | ||
|- | |- |
Latest revision as of 23:14, 8 May 2023
Source of Reference: The CCA blueprint document from Cybersecurity Maturity Model Certification Accreditation Body, Inc.
For inquiries and reporting errors on this wiki, please contact us. Thank you.
Domains
Upon successful completion of this exam, the candidate will be able to apply skills and knowledge to the below domains:
Domain | Exam Weight |
1. Evaluating Organizations Seeking Certification (OSC) against CMMC Level 2 requirement | 15% |
2. CMMC Level 2 Assessment Scoping | 20% |
3. CMMC Assessment Process (CAP) | 25% |
4. Assessing CMMC Level 2 Practices | 40% |
Domain 1: Evaluating Organizations Seeking Certification (OSC) against CMMC Level 2 requirements
Task 1. Assess the various environmental considerations of Organizations Seeking Certification (OSCs) against CMMC L2 practices.
Lesson Topic | Objective | Objective Description |
---|---|---|
4C | 1.1.1 | # The difference between logical (virtual) and physical locations |
4C | 1.1.2 | # The difference between professional and industrial environments |
4C | 1.1.3 | # Single and multi-site environmental constraints and Evidence requirements |
4C | 1.1.4 | # Cloud and hybrid environment constraints and Evidence requirements |
4C | 1.1.5 | # On-premises environmental constraints |
4C | 1.1.6 | # Environmental exclusions for a level 2 CMMC assessment |
Domain 2: Scoping
Task 1. Analyze the CMMC Assessment Scope of Controlled Unclassified Information (CUI) Assets as they pertain to a CMMC assessment using the five categories of CUI assets as defined in the CMMC Level 2 Assessment Scoping Guide.
Lesson Topic | Objective | Objective Description |
---|---|---|
4B | 2.1.1 | 1. Categorization of CUI data in the form of Assets that are in scope: |
4B | 2.1.1.A |
|
4B | 2.1.1.A(1) |
|
4B | 2.1.1.B |
|
4B | 2.1.1.B(1) |
|
4B | 2.1.1.C |
|
4B | 2.1.1.C(1) |
|
4B | 2.1.1.D |
|
4B | 2.1.1.D(1) |
|
4B | 2.1.1.D(2) |
|
4B | 2.1.1.E |
|
4B | 2.1.1.E(1) |
|
Task 2. Given a scenario, analyze the CMMC Assessment Scope based on the predetermined CUI categories within the CMMC Level 2 Assessment Scoping Guide.
Lesson Topic | Objective | Objective Description |
---|---|---|
4B | 2.2.1 | 1. CMMC assessment asset categories (In-scope) |
4B | 2.2.1.A |
|
4B | 2.2.1.B |
|
4B | 2.2.1.C |
|
4B | 2.2.1.D |
|
4B | 2.2.2 | 2. CMMC assessment asset categories (Out-of-scope) |
4A | 2.2.3 | 3. Separation Techniques |
4A | 2.2.3.A |
|
4A | 2.2.3.A(1) |
|
4A | 2.2.3.A(2) |
|
4A | 2.2.3.B |
|
4A | 2.2.3.B(1) |
|
4A | 2.2.3.B(2) |
|
4A | 2.2.3.B(3) |
|
4A | 2.2.3.B(4) |
|
Task 3. Evaluate CMMC assessment scope considerations based on the CMMC Level 2 Assessment Scoping Guide.
Lesson Topic | Objective | Objective Description |
---|---|---|
4E | 2.3.1 | 1. FCI and CUI within the same Assessment Scope: |
4E | 2.3.1.A |
|
4E | 2.3.1.B |
|
4E | 2.3.2 | 2. FCI and CUI NOT within the same Assessment Scope: |
4E | 2.3.2.A |
|
4E | 2.3.2.B |
|
4C, 4D | 2.3.3 | 3. External Services Providers |
4D | 2.3.3.A |
|
2C, 4E | 2.3.3.B |
|
4D | 2.3.3.C |
|
Domain 3: CMMC Assessment Process (CAP) v5.X
Task 1. Given a scenario, apply the appropriate phases and steps to plan, prepare, conduct, and report on a CMMC Level 2 Assessment.
Lesson Topic | Objective | Objective Description |
---|---|---|
3A, 3B, 3C | 3.1.1 | 1. Phase 1 - Plan and Prepare Assessments: |
3B | 3.1.1.A |
|
3C | 3.1.1.B |
|
3B | 3.1.1.C |
|
3A, 3D | 3.1.2 | 2. Phase 2 - Conduct assessment: |
3D | 3.1.2.A |
|
3D | 3.1.2.B |
|
3D | 3.1.2.C |
|
3A | 3.1.3 | 3. Phase 3 - Report Recommended Assessment Results: |
3F | 3.1.3.A |
|
Domain 4: CMMC Levels 2 Practices
Task 1. Identify evidence verification/validation methods and objects for Practices based on the CMMC Level 2 Assessment Guide and CMMC Assessment Process (CAP) documentation.
Lesson Topic | Objective | Objective Description |
---|---|---|
3D | 4.1.1 | 1. Methods and objects for determining evidence |
3D | 4.1.1.A |
|
3D | 4.1.1.B |
|
3D | 4.1.1.C |
|
3D | 4.1.2 | 2. Adequacy and sufficiency related to Evidence around all below practices |
3D | 4.1.2.A |
|
3D | 4.1.2.B |
|
3D | 4.1.2.B(1) |
|
3D | 4.1.2.B(2) |
|
3D | 4.1.2.B(3) |
|
3D | 4.1.2.B(4) |
|
3D | 4.1.2.B(5) |
|
3D | 4.1.2.C |
|
2C, 3D | 4.1.2.C(1) |
|
3D | 4.1.2.C(2) |
|
5A, 6A, 7A, 8A, 9A, 10A, 11A, 12A, 13A, 14A, 15A, 16, 17A, 18A | 4.1.3 | 3. CMMC Level 2 Assessment Practice objectives including potential methods, objects, and assessment considerations (by domain):
(at a minimum the practices listed below must be evaluated for CCA candidates) |
5A, 5B | 4.1.3.A | A. Access Control (AC) |
5A | 4.1.3.A(1) |
|
5A | 4.1.3.A(2) |
|
5A | 4.1.3.A(3) |
|
5A | 4.1.3.A(4) |
|
5A | 4.1.3.A(5) |
|
5A | 4.1.3.A(6) |
|
5A | 4.1.3.A(7) |
|
5A | 4.1.3.A(8) |
|
5A | 4.1.3.A(9) |
|
5A | 4.1.3.A(10) |
|
5A | 4.1.3.A(11) |
|
5A | 4.1.3.A(12) |
|
5A | 4.1.3.A(13) |
|
5A | 4.1.3.A(14) |
|
5A | 4.1.3.A(15) |
|
5A | 4.1.3.A(16) |
|
5A | 4.1.3.A(17) |
|
5A | 4.1.3.A(18) |
|
6A, 6B | 4.1.3.B | B. Awareness & Training (AT) |
6A | 4.1.3.B(1) |
|
6A | 4.1.3.B(2) |
|
6A | 4.1.3.B(3) |
|
7A, 7B | 4.1.3.C | C. Audit & Accountability (AU) |
7A | 4.1.3.C(1) |
|
7A | 4.1.3.C(2) |
|
7A | 4.1.3.C(3) |
|
7A | 4.1.3.C(4) |
|
7A | 4.1.3.C(5) |
|
7A | 4.1.3.C(6) |
|
7A | 4.1.3.C(7) |
|
7A | 4.1.3.C(8) |
|
7A | 4.1.3.C(9) |
|
9A, 9B | 4.1.3.D | D. Configuration Management (CM) |
9A | 4.1.3.D(1) |
|
9A | 4.1.3.D(2) |
|
9A | 4.1.3.D(3) |
|
9A | 4.1.3.D(4) |
|
9A | 4.1.3.D(5) |
|
9A | 4.1.3.D(6) |
|
9A | 4.1.3.D(7) |
|
9A | 4.1.3.D(8) |
|
9A | 4.1.3.D(9) |
|
10A, 10B | 4.1.3.E | E. Identification & Authentication (IA) |
10A | 4.1.3.E(1) |
|
10A | 4.1.3.E(2) |
|
10A | 4.1.3.E(3) |
|
10A | 4.1.3.E(4) |
|
10A | 4.1.3.E(5) |
|
10A | 4.1.3.E(6) |
|
10A | 4.1.3.E(7) |
|
10A | 4.1.3.E(8) |
|
10A | 4.1.3.E(9) |
|
11A, 11B | 4.1.3.F | F. Incident Response (IR) |
11A | 4.1.3.F(1) |
|
11A | 4.1.3.F(2) |
|
11A | 4.1.3.F(3) |
|
12A, 12B | 4.1.3.G | G. Maintenance (MA) |
12A | 4.1.3.G(1) |
|
12A | 4.1.3.G(2) |
|
12A | 4.1.3.G(3) |
|
12A | 4.1.3.G(4) |
|
12A | 4.1.3.G(5) |
|
12A | 4.1.3.G(6) |
|
13A, 13B | 4.1.3.H | H. Media Protection (MP) |
13A | 4.1.3.H(1) |
|
13A | 4.1.3.H(2) |
|
13A | 4.1.3.H(3) |
|
13A | 4.1.3.H(4) |
|
13A | 4.1.3.H(5) |
|
13A | 4.1.3.H(6) |
|
13A | 4.1.3.H(7) |
|
13A | 4.1.3.H(8) |
|
15A, 15B | 4.1.3.I | I. Personnel Security (PS) |
15A | 4.1.3.I(1) |
|
15A | 4.1.3.I(2) |
|
14A, 14B | 4.1.3.J | J. Physical Protection (PE) |
14A | 4.1.3.J(1) |
|
14A | 4.1.3.J(2) |
|
16A, 16B | 4.1.3.K | K. Risk Assessment (RA) |
16A | 4.1.3.K(1) |
|
16A | 4.1.3.K(2) |
|
16A | 4.1.3.K(3) |
|
8A, 8B | 4.1.3.L | L. Security Assessment (CA) |
8A | 4.1.3.L(1) |
|
8A | 4.1.3.L(2) |
|
8A | 4.1.3.L(3) |
|
8A | 4.1.3.L(4) |
|
17A, 17B | 4.1.3.M | M. System & Communications Protection (SC) |
17A | 4.1.3.M(1) |
|
17A | 4.1.3.M(2) |
|
17A | 4.1.3.M(3) |
|
17A | 4.1.3.M(4) |
|
17A | 4.1.3.M(5) |
|
17A | 4.1.3.M(6) |
|
17A | 4.1.3.M(7) |
|
17A | 4.1.3.M(8) |
|
17A | 4.1.3.M(9) |
|
17A | 4.1.3.M(10) |
|
17A | 4.1.3.M(11) |
|
17A | 4.1.3.M(12) |
|
17A | 4.1.3.M(13) |
|
17A | 4.1.3.M(14) |
|
18A, 18B | 4.1.3.N | N. System & Information Integrity (SI) |
18A | 4.1.3.N(1) |
|
18A | 4.1.3.N(2) |
|
18A | 4.1.3.N(3) |
|