User contributions for David
Jump to navigation
Jump to search
30 March 2025
- 03:0403:04, 30 March 2025 diff hist +12 Evidence Collection Approach →Physical Protection (PE)
- 03:0203:02, 30 March 2025 diff hist 0 Evidence Collection Approach →Personnel Security (PS)
- 03:0103:01, 30 March 2025 diff hist 0 Evidence Collection Approach →Media Protection (MP)
- 02:5902:59, 30 March 2025 diff hist 0 Evidence Collection Approach →Maintenance (MA)
- 02:5702:57, 30 March 2025 diff hist 0 Evidence Collection Approach →Incident Response (IR)
- 02:5602:56, 30 March 2025 diff hist +2 Evidence Collection Approach →Identification and Authentication (IA)
- 02:5302:53, 30 March 2025 diff hist 0 Evidence Collection Approach →Configuration Management (CM)
29 March 2025
- 16:3616:36, 29 March 2025 diff hist −2 Commonly Accepted and Practiced CMMC Operation Matrix →CAPCOM
- 16:3416:34, 29 March 2025 diff hist −52 Commonly Accepted and Practiced CMMC Operation Matrix →Commonly Accepted and Practiced CMMC Operating Model (CAPCOM)
- 03:2103:21, 29 March 2025 diff hist 0 Evidence Collection Approach →Audit and Accountability (AU)
- 03:1803:18, 29 March 2025 diff hist 0 Evidence Collection Approach →Awareness and Training (AT)
- 03:1403:14, 29 March 2025 diff hist +26 Evidence Collection Approach →Access Control (AC)
- 03:0703:07, 29 March 2025 diff hist −27,493 Evidence Collection Approach No edit summary
- 01:5801:58, 29 March 2025 diff hist +13 Evidence Collection Approach →AC.L2-3.1.2 – Transaction & Function Control [CUI Data]
- 01:5601:56, 29 March 2025 diff hist +13 Evidence Collection Approach →AC.L2-3.1.1 – Authorized Access Control [CUI Data]
- 01:5301:53, 29 March 2025 diff hist +135 Evidence Collection Approach →AC.L2-3.1.2 – Transaction & Function Control [CUI Data]
- 01:5001:50, 29 March 2025 diff hist −13 Evidence Collection Approach →AC.L2-3.1.1 – Authorized Access Control [CUI Data]
- 01:4801:48, 29 March 2025 diff hist +53 Main Page →Site Update Notices
- 01:4601:46, 29 March 2025 diff hist 0 m Commonly Accepted and Practiced CMMC Operation Matrix David moved page Commonly Accepted and Practiced CMMC Operating Model to Commonly Accepted and Practiced CMMC Operation Matrix without leaving a redirect
- 01:4501:45, 29 March 2025 diff hist +65 MediaWiki:Sidebar No edit summary
- 01:3401:34, 29 March 2025 diff hist −16 Evidence Collection Approach →AC.L2-3.1.1 – Authorized Access Control [CUI Data]
- 01:3301:33, 29 March 2025 diff hist +58 Evidence Collection Approach →AC.L2-3.1.1 – Authorized Access Control [CUI Data]
- 01:3001:30, 29 March 2025 diff hist +1 Evidence Collection Approach No edit summary
- 01:3001:30, 29 March 2025 diff hist −54 Evidence Collection Approach No edit summary
- 01:2901:29, 29 March 2025 diff hist +281 Evidence Collection Approach No edit summary
- 01:2501:25, 29 March 2025 diff hist −488 Evidence Collection Approach No edit summary
- 01:1401:14, 29 March 2025 diff hist +96 Evidence Collection Approach →Access Control (AC)
28 March 2025
- 16:0316:03, 28 March 2025 diff hist +146 Commonly Accepted and Practiced CMMC Operation Matrix No edit summary
- 04:5604:56, 28 March 2025 diff hist +110 Main Page →Site Update Notices
- 04:5004:50, 28 March 2025 diff hist −33 Commonly Accepted and Practiced CMMC Operation Matrix →Commonly Accepted and Practiced CMMC Operating Model
- 04:4804:48, 28 March 2025 diff hist +3,349 N LLMResponse AC.L2-3.1.1.f Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [f] == === Ranking of Evidence Types for Assessment Objective [f] === For the assessment objective "[f] system access is limited to authorized devices (including other systems)," I recommend prioritizing evidence types in this order: 1. **Artifacts**: These provide the strongest evidence for this device-focused objective, including: - Network access control system logs showing blocked..." current
- 04:4804:48, 28 March 2025 diff hist +320 N LLMPrompt AC.L2-3.1.1.f Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[f] system access is limited to authorized devices (including other systems)," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
- 04:4704:47, 28 March 2025 diff hist +2,970 N LLMResponse AC.L2-3.1.1.e Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [e] == === Ranking of Evidence Types for Assessment Objective [e] === For the assessment objective "[e] system access is limited to processes acting on behalf of authorized users," I recommend prioritizing evidence types in this order: 1. **Artifacts**: These provide the strongest evidence for this process-focused objective, including: - System logs showing process execution with user..." current
- 04:4704:47, 28 March 2025 diff hist +322 N LLMPrompt AC.L2-3.1.1.e Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[e] system access is limited to processes acting on behalf of authorized users," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
- 04:4704:47, 28 March 2025 diff hist +3,132 N LLMResponse AC.L2-3.1.1.d Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [d] == === Ranking of Evidence Types for Assessment Objective [d] === For the assessment objective "[d] system access is limited to authorized users," I recommend prioritizing evidence types in this order: 1. **Artifacts**: These provide the strongest evidence for this control-focused objective, including: - System login attempt logs showing rejected unauthorized access attempts - A..." current
- 04:4604:46, 28 March 2025 diff hist +292 N LLMPrompt AC.L2-3.1.1.d Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[d] system access is limited to authorized users," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
- 04:4504:45, 28 March 2025 diff hist +3,010 N LLMResponse AC.L2-3.1.1.c Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [c] == === Ranking of Evidence Types for Assessment Objective [c] === For the assessment objective "[c] devices (and other systems) authorized to connect to the system are identified," I recommend prioritizing evidence types in this order: 1. **Artifacts**: These provide the strongest evidence for this objective, including: - Network device inventories and asset management databases..." current
- 04:4504:45, 28 March 2025 diff hist +326 N LLMPrompt AC.L2-3.1.1.c Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[c] devices (and other systems) authorized to connect to the system are identified," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
- 04:4404:44, 28 March 2025 diff hist +2,619 N LLMResponse AC.L2-3.1.1.b Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [b] == === Ranking of Evidence Types for Assessment Objective [b] === For the assessment objective "[b] processes acting on behalf of authorized users are identified," I recommend prioritizing evidence types in this order: 1. **Artifacts**: System-generated lists of automated processes, service accounts, scheduled tasks, and process ownership records provide the strongest direct evidence..." current
- 04:4404:44, 28 March 2025 diff hist +309 N LLMPrompt AC.L2-3.1.1.b Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[b] processes acting on behalf of authorized users are identified," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
- 04:4304:43, 28 March 2025 diff hist +22 LLMResponse AC.L2-3.1.1.a No edit summary current
- 04:4204:42, 28 March 2025 diff hist −8 LLMResponse AC.L2-3.1.1.a No edit summary
- 04:4104:41, 28 March 2025 diff hist +2,208 N LLMResponse AC.L2-3.1.1.a Created page with "# Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [a] ## Ranking of Evidence Types for Assessment Objective [a] For the assessment objective "[a] authorized users are identified," I recommend prioritizing evidence types in this order: 1. **Documents**: User authorization lists, access control policies, and account management procedures provide the most direct evidence that authorized users are formally identified. 2. **Artifacts**: Syste..."
- 04:4004:40, 28 March 2025 diff hist +217 N LLMPrompt AC.L2-3.1.1.a Created page with "For the assessment objective, ""[a] authorized users are identified,"" rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?"" current
- 04:4004:40, 28 March 2025 diff hist +7,251 N LLMPrompt AC.L2-3.1.1 Created page with ""I am a cybersecurity manager working for an organization that is a DoD contractor. I need to implement various security practices that conform to DoD's CMMC program at level 2. The CMMC program stipulates security practices that are based on NIST Special Publication 800-171 R2. For each security practice of CMMC Level 2, I need to show evidence that my organization is in compliance with CMMC. Each security practice has a security requirement and several assessment objec..."
- 04:3804:38, 28 March 2025 diff hist +458 Commonly Accepted and Practiced CMMC Operation Matrix No edit summary
- 04:3104:31, 28 March 2025 diff hist +1,824 Commonly Accepted and Practiced CMMC Operation Matrix No edit summary
- 04:0004:00, 28 March 2025 diff hist −5 Evidence Collection Approach →AC.L2-3.1.1 – Authorized Access Control [CUI Data]
- 03:5703:57, 28 March 2025 diff hist −17 Evidence Collection Approach →AC.L2-3.1.1 – Authorized Access Control [CUI Data]
- 03:5503:55, 28 March 2025 diff hist +21 Evidence Collection Approach →AC.L2-3.1.1 – Authorized Access Control [CUI Data]