User contributions for David

A user with 919 edits. Account created on 24 February 2025.
Jump to navigation Jump to search
Search for contributionsExpandCollapse
⧼contribs-top⧽
⧼contribs-date⧽
(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)

30 March 2025

29 March 2025

28 March 2025

  • 16:0316:03, 28 March 2025 diff hist +146 Commonly Accepted and Practiced CMMC Operation Matrix No edit summary
  • 04:5604:56, 28 March 2025 diff hist +110 Main Page Site Update Notices
  • 04:5004:50, 28 March 2025 diff hist −33 Commonly Accepted and Practiced CMMC Operation Matrix Commonly Accepted and Practiced CMMC Operating Model
  • 04:4804:48, 28 March 2025 diff hist +3,349 N LLMResponse AC.L2-3.1.1.f Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [f] == === Ranking of Evidence Types for Assessment Objective [f] === For the assessment objective "[f] system access is limited to authorized devices (including other systems)," I recommend prioritizing evidence types in this order: 1. **Artifacts**: These provide the strongest evidence for this device-focused objective, including: - Network access control system logs showing blocked..." current
  • 04:4804:48, 28 March 2025 diff hist +320 N LLMPrompt AC.L2-3.1.1.f Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[f] system access is limited to authorized devices (including other systems)," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
  • 04:4704:47, 28 March 2025 diff hist +2,970 N LLMResponse AC.L2-3.1.1.e Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [e] == === Ranking of Evidence Types for Assessment Objective [e] === For the assessment objective "[e] system access is limited to processes acting on behalf of authorized users," I recommend prioritizing evidence types in this order: 1. **Artifacts**: These provide the strongest evidence for this process-focused objective, including: - System logs showing process execution with user..." current
  • 04:4704:47, 28 March 2025 diff hist +322 N LLMPrompt AC.L2-3.1.1.e Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[e] system access is limited to processes acting on behalf of authorized users," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
  • 04:4704:47, 28 March 2025 diff hist +3,132 N LLMResponse AC.L2-3.1.1.d Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [d] == === Ranking of Evidence Types for Assessment Objective [d] === For the assessment objective "[d] system access is limited to authorized users," I recommend prioritizing evidence types in this order: 1. **Artifacts**: These provide the strongest evidence for this control-focused objective, including: - System login attempt logs showing rejected unauthorized access attempts - A..." current
  • 04:4604:46, 28 March 2025 diff hist +292 N LLMPrompt AC.L2-3.1.1.d Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[d] system access is limited to authorized users," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
  • 04:4504:45, 28 March 2025 diff hist +3,010 N LLMResponse AC.L2-3.1.1.c Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [c] == === Ranking of Evidence Types for Assessment Objective [c] === For the assessment objective "[c] devices (and other systems) authorized to connect to the system are identified," I recommend prioritizing evidence types in this order: 1. **Artifacts**: These provide the strongest evidence for this objective, including: - Network device inventories and asset management databases..." current
  • 04:4504:45, 28 March 2025 diff hist +326 N LLMPrompt AC.L2-3.1.1.c Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[c] devices (and other systems) authorized to connect to the system are identified," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
  • 04:4404:44, 28 March 2025 diff hist +2,619 N LLMResponse AC.L2-3.1.1.b Created page with "== Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [b] == === Ranking of Evidence Types for Assessment Objective [b] === For the assessment objective "[b] processes acting on behalf of authorized users are identified," I recommend prioritizing evidence types in this order: 1. **Artifacts**: System-generated lists of automated processes, service accounts, scheduled tasks, and process ownership records provide the strongest direct evidence..." current
  • 04:4404:44, 28 March 2025 diff hist +309 N LLMPrompt AC.L2-3.1.1.b Created page with "Using the previous conversations on the practice AC.L2-3.1.1 and for the assessment objective, "[b] processes acting on behalf of authorized users are identified," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?" current
  • 04:4304:43, 28 March 2025 diff hist +22 LLMResponse AC.L2-3.1.1.a No edit summary current
  • 04:4204:42, 28 March 2025 diff hist −8 LLMResponse AC.L2-3.1.1.a No edit summary
  • 04:4104:41, 28 March 2025 diff hist +2,208 N LLMResponse AC.L2-3.1.1.a Created page with "# Evidence Types and Assessment Approaches for AC.L2-3.1.1 Assessment Objective [a] ## Ranking of Evidence Types for Assessment Objective [a] For the assessment objective "[a] authorized users are identified," I recommend prioritizing evidence types in this order: 1. **Documents**: User authorization lists, access control policies, and account management procedures provide the most direct evidence that authorized users are formally identified. 2. **Artifacts**: Syste..."
  • 04:4004:40, 28 March 2025 diff hist +217 N LLMPrompt AC.L2-3.1.1.a Created page with "For the assessment objective, ""[a] authorized users are identified,"" rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?"" current
  • 04:4004:40, 28 March 2025 diff hist +7,251 N LLMPrompt AC.L2-3.1.1 Created page with ""I am a cybersecurity manager working for an organization that is a DoD contractor. I need to implement various security practices that conform to DoD's CMMC program at level 2. The CMMC program stipulates security practices that are based on NIST Special Publication 800-171 R2. For each security practice of CMMC Level 2, I need to show evidence that my organization is in compliance with CMMC. Each security practice has a security requirement and several assessment objec..."
  • 04:3804:38, 28 March 2025 diff hist +458 Commonly Accepted and Practiced CMMC Operation Matrix No edit summary
  • 04:3104:31, 28 March 2025 diff hist +1,824 Commonly Accepted and Practiced CMMC Operation Matrix No edit summary
  • 04:0004:00, 28 March 2025 diff hist −5 Evidence Collection Approach AC.L2-3.1.1 – Authorized Access Control [CUI Data]
  • 03:5703:57, 28 March 2025 diff hist −17 Evidence Collection Approach AC.L2-3.1.1 – Authorized Access Control [CUI Data]
(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)