User contributions for David

A user with 899 edits. Account created on 24 February 2025.
Jump to navigation Jump to search
Search for contributionsExpandCollapse
⧼contribs-top⧽
⧼contribs-date⧽
(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)

29 March 2025

28 March 2025

  • 16:0316:03, 28 March 2025 diff hist +146 Commonly Accepted and Practiced CMMC Operation Matrix No edit summary
  • 04:5604:56, 28 March 2025 diff hist +110 Main Page Site Update Notices
  • 04:5004:50, 28 March 2025 diff hist −33 Commonly Accepted and Practiced CMMC Operation Matrix Commonly Accepted and Practiced CMMC Operating Model
  • 04:4804:48, 28 March 2025 diff hist +3,349 N LLMResponse AC.L2-3.1.1.f Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [f] == === Ranking of Evidence Types for Assessment Objective [f] === For the assessment objective "[f] system access is limited to authorized devices (including other systems)," I recommend prioritizing evidence types in this order: 1. **Artifacts**: These provide the strongest evidence for this device-focused objective, including: - Network access control system logs showing blocked..." current
  • 04:4804:48, 28 March 2025 diff hist +320 N LLMPrompt AC.L2-3.1.1.f Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[f] system access is limited to authorized devices (including other systems)," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
  • 04:4704:47, 28 March 2025 diff hist +2,970 N LLMResponse AC.L2-3.1.1.e Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [e] == === Ranking of Evidence Types for Assessment Objective [e] === For the assessment objective "[e] system access is limited to processes acting on behalf of authorized users," I recommend prioritizing evidence types in this order: 1. **Artifacts**: These provide the strongest evidence for this process-focused objective, including: - System logs showing process execution with user..." current
  • 04:4704:47, 28 March 2025 diff hist +322 N LLMPrompt AC.L2-3.1.1.e Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[e] system access is limited to processes acting on behalf of authorized users," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
  • 04:4704:47, 28 March 2025 diff hist +3,132 N LLMResponse AC.L2-3.1.1.d Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [d] == === Ranking of Evidence Types for Assessment Objective [d] === For the assessment objective "[d] system access is limited to authorized users," I recommend prioritizing evidence types in this order: 1. **Artifacts**: These provide the strongest evidence for this control-focused objective, including: - System login attempt logs showing rejected unauthorized access attempts - A..." current
  • 04:4604:46, 28 March 2025 diff hist +292 N LLMPrompt AC.L2-3.1.1.d Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[d] system access is limited to authorized users," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
  • 04:4504:45, 28 March 2025 diff hist +3,010 N LLMResponse AC.L2-3.1.1.c Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [c] == === Ranking of Evidence Types for Assessment Objective [c] === For the assessment objective "[c] devices (and other systems) authorized to connect to the system are identified," I recommend prioritizing evidence types in this order: 1. **Artifacts**: These provide the strongest evidence for this objective, including: - Network device inventories and asset management databases..." current
  • 04:4504:45, 28 March 2025 diff hist +326 N LLMPrompt AC.L2-3.1.1.c Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[c] devices (and other systems) authorized to connect to the system are identified," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
  • 04:4404:44, 28 March 2025 diff hist +2,619 N LLMResponse AC.L2-3.1.1.b Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [b] == === Ranking of Evidence Types for Assessment Objective [b] === For the assessment objective "[b] processes acting on behalf of authorized users are identified," I recommend prioritizing evidence types in this order: 1. **Artifacts**: System-generated lists of automated processes, service accounts, scheduled tasks, and process ownership records provide the strongest direct evidence..." current
  • 04:4404:44, 28 March 2025 diff hist +309 N LLMPrompt AC.L2-3.1.1.b Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[b] processes acting on behalf of authorized users are identified," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
  • 04:4304:43, 28 March 2025 diff hist +22 LLMResponse AC.L2-3.1.1.a No edit summary current
  • 04:4204:42, 28 March 2025 diff hist −8 LLMResponse AC.L2-3.1.1.a No edit summary
  • 04:4104:41, 28 March 2025 diff hist +2,208 N LLMResponse AC.L2-3.1.1.a Created page with "# Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [a] ## Ranking of Evidence Types for Assessment Objective [a] For the assessment objective "[a] authorized users are identified," I recommend prioritizing evidence types in this order: 1. **Documents**: User authorization lists, access control policies, and account management procedures provide the most direct evidence that authorized users are formally identified. 2. **Artifacts**: Syste..."
  • 04:4004:40, 28 March 2025 diff hist +217 N LLMPrompt AC.L2-3.1.1.a Created page with "For the assessment objective, ""[a] authorized users are identified,"" rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?"" current
  • 04:4004:40, 28 March 2025 diff hist +7,251 N LLMPrompt AC.L2-3.1.1 Created page with ""I am a cybersecurity manager working for an organization that is a DoD contractor. I need to implement various security practices that conform to DoD's CMMC program at level 2. The CMMC program stipulates security practices that are based on NIST Special Publication 800-171 R2. For each security practice of CMMC Level 2, I need to show evidence that my organization is in compliance with CMMC. Each security practice has a security requirement and several assessment objec..."
  • 04:3804:38, 28 March 2025 diff hist +458 Commonly Accepted and Practiced CMMC Operation Matrix No edit summary
  • 04:3104:31, 28 March 2025 diff hist +1,824 Commonly Accepted and Practiced CMMC Operation Matrix No edit summary
  • 04:0004:00, 28 March 2025 diff hist −5 Evidence Collection Approach AC.L2-3.1.1 – Authorized Access Control [CUI Data]
  • 03:5703:57, 28 March 2025 diff hist −17 Evidence Collection Approach AC.L2-3.1.1 – Authorized Access Control [CUI Data]
  • 03:5503:55, 28 March 2025 diff hist +21 Evidence Collection Approach AC.L2-3.1.1 – Authorized Access Control [CUI Data]
  • 03:5403:54, 28 March 2025 diff hist +115 Evidence Collection Approach AC.L2-3.1.1 – Authorized Access Control [CUI Data]
  • 03:1703:17, 28 March 2025 diff hist +162 Level 3 Assessment Guide Appendix A – Acronyms and Abbreviations current
  • 03:0703:07, 28 March 2025 diff hist +7,377 N Practice SI.L3-3.14.6e Details Created page with "'''Source of Reference: The official [https://dodcio.defense.gov/cmmc/Resources-Documentation/ CMMC Level 3 Assessment Guide] from the Department of Defense Chief Information Officer (DoD CIO).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == SI.L3-3.14.6E – THREAT-GUIDED INTRUSION DETECTION == === SECURITY REQUIREMENT === Use threat indicator information and effective mitigations obtained from, <u>..." current
  • 03:0703:07, 28 March 2025 diff hist +7,562 N Practice SI.L3-3.14.3e Details Created page with "'''Source of Reference: The official [https://dodcio.defense.gov/cmmc/Resources-Documentation/ CMMC Level 3 Assessment Guide] from the Department of Defense Chief Information Officer (DoD CIO).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == SI.L3-3.14.3E – SPECIALIZED ASSET SECURITY === === SECURITY REQUIREMENT === Ensure that <u>specialized assets including IoT, IIoT, OT, GFE, Restricted Informat..." current
  • 03:0603:06, 28 March 2025 diff hist +8,191 N Practice SI.L3-3.14.1e Details Created page with "'''Source of Reference: The official [https://dodcio.defense.gov/cmmc/Resources-Documentation/ CMMC Level 3 Assessment Guide] from the Department of Defense Chief Information Officer (DoD CIO).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == SI.L3-3.14.1E – INTEGRITY VERIFICATION === === SECURITY REQUIREMENT === Verify the integrity of <u>security critical and essential software</u> using root of t..." current
  • 03:0603:06, 28 March 2025 diff hist +1,849 Level 3 Assessment Guide System and Information Integrity (SI)
  • 02:4802:48, 28 March 2025 diff hist +8,251 N Practice SC.L3-3.13.4e Details Created page with "'''Source of Reference: The official [https://dodcio.defense.gov/cmmc/Resources-Documentation/ CMMC Level 3 Assessment Guide] from the Department of Defense Chief Information Officer (DoD CIO).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == SC.L3-3.13.4E – ISOLATION == === SECURITY REQUIREMENT === Employ <u>physical isolation techniques or logical isolation techniques or both</u> in organizational..." current
  • 02:4402:44, 28 March 2025 diff hist +539 Level 3 Assessment Guide SC.L3-3.13.4e – isolation
  • 02:4002:40, 28 March 2025 diff hist +29 Practice CA.L3-3.12.1e Details No edit summary current
  • 02:3902:39, 28 March 2025 diff hist +6,270 N Practice CA.L3-3.12.1e Details Created page with "'''Source of Reference: The official [https://dodcio.defense.gov/cmmc/Resources-Documentation/ CMMC Level 3 Assessment Guide] from the Department of Defense Chief Information Officer (DoD CIO).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == CA.L3-3.12.1E – PENETRATION TESTING === Conduct penetration testing <u>at least annually or when significant security changes are made to the system</u>, lever..."
  • 02:3502:35, 28 March 2025 diff hist +534 Level 3 Assessment Guide CA.L3-3.12.1e – Penetration Testing
  • 02:3202:32, 28 March 2025 diff hist +5,246 N Practice RA.L3-3.11.7e Details Created page with "'''Source of Reference: The official [https://dodcio.defense.gov/cmmc/Resources-Documentation/ CMMC Level 3 Assessment Guide] from the Department of Defense Chief Information Officer (DoD CIO).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == RA.L3-3.11.7E – SUPPLY CHAIN RISK PLAN == === SECURITY REQUIREMENT === Develop a plan for managing supply chain risks associated with organizational systems an..." current
  • 02:3002:30, 28 March 2025 diff hist +4,678 N Practice RA.L3-3.11.6e Details Created page with "'''Source of Reference: The official [https://dodcio.defense.gov/cmmc/Resources-Documentation/ CMMC Level 3 Assessment Guide] from the Department of Defense Chief Information Officer (DoD CIO).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == RA.L3-3.11.6E – SUPPLY CHAIN RISK RESPONSE == === SECURITY REQUIREMENT === Assess, respond to, and monitor supply chain risks associated with organizational sy..." current
  • 02:2702:27, 28 March 2025 diff hist +5,726 N Practice RA.L3-3.11.5e Details Created page with "'''Source of Reference: The official [https://dodcio.defense.gov/cmmc/Resources-Documentation/ CMMC Level 3 Assessment Guide] from the Department of Defense Chief Information Officer (DoD CIO).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == RA.L3-3.11.5E – SECURITY SOLUTION EFFECTIVENESS == === SECURITY REQUIREMENT === Assess the effectiveness of security solutions <u>at least annually or upon rec..." current
  • 02:2302:23, 28 March 2025 diff hist +6,532 N Practice RA.L3-3.11.4e Details Created page with "'''Source of Reference: The official [https://dodcio.defense.gov/cmmc/Resources-Documentation/ CMMC Level 3 Assessment Guide] from the Department of Defense Chief Information Officer (DoD CIO).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == RA.L3-3.11.4E – SECURITY SOLUTION RATIONALE === === SECURITY REQUIREMENT === Document or reference in the system security plan the security solution selected,..." current
  • 02:1702:17, 28 March 2025 diff hist +7,934 N Practice RA.L3-3.11.3e Details Created page with "'''Source of Reference: The official [https://dodcio.defense.gov/cmmc/Resources-Documentation/ CMMC Level 3 Assessment Guide] from the Department of Defense Chief Information Officer (DoD CIO).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == RA.L3-3.11.3E – ADVANCED RISK IDENTIFICATION == === SECURITY REQUIREMENT === Employ advanced automation and analytics capabilities in support of analysts to pr..." current
  • 02:1602:16, 28 March 2025 diff hist +8,773 N Practice RA.L3-3.11.2e Details Created page with "'''Source of Reference: The official [https://dodcio.defense.gov/cmmc/Resources-Documentation/ CMMC Level 3 Assessment Guide] from the Department of Defense Chief Information Officer (DoD CIO).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == RA.L3-3.11.2E – THREAT HUNTING == === SECURITY REQUIREMENT === Conduct cyber threat hunting activities <u>on an on-going aperiodic basis or when indications wa..." current
  • 01:4901:49, 28 March 2025 diff hist +7,337 N Practice RA.L3-3.11.1e Details Created page with "'''Source of Reference: The official [https://dodcio.defense.gov/cmmc/Resources-Documentation/ CMMC Level 3 Assessment Guide] from the Department of Defense Chief Information Officer (DoD CIO).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == RA.L3-3.11.1E – THREAT-INFORMED RISK ASSESSMENT == === SECURITY REQUIREMENT === Employ <u>threat intelligence, at a minimum from open or commercial sources, an..." current
  • 01:4501:45, 28 March 2025 diff hist +14 Level 3 Assessment Guide RA.L3-3.11.7e – Supply Chain Risk Plan
(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)