User contributions for David
Jump to navigation
Jump to search
31 March 2025
- 02:0702:07, 31 March 2025 diff hist +61 Commonly Accepted and Practiced CMMC Operation Matrix →AT.L2-3.2.2 – Role-Based Training
- 02:0602:06, 31 March 2025 diff hist +1,438 Commonly Accepted and Practiced CMMC Operation Matrix No edit summary
- 02:0302:03, 31 March 2025 diff hist +100 Commonly Accepted and Practiced CMMC Operation Matrix →AU.L2-3.3.8 – Audit Protection
- 02:0202:02, 31 March 2025 diff hist +100 Commonly Accepted and Practiced CMMC Operation Matrix →AU.L2-3.3.4 – Audit Failure Alerting
- 02:0102:01, 31 March 2025 diff hist +100 Commonly Accepted and Practiced CMMC Operation Matrix →AU.L2-3.3.2 – User Accountability
- 02:0102:01, 31 March 2025 diff hist +100 Commonly Accepted and Practiced CMMC Operation Matrix →AU.L2-3.3.1 – System Auditing
- 01:5901:59, 31 March 2025 diff hist +100 Commonly Accepted and Practiced CMMC Operation Matrix →AT.L2-3.2.3 – Insider Threat Awareness
- 01:5901:59, 31 March 2025 diff hist +61 Commonly Accepted and Practiced CMMC Operation Matrix →AT.L2-3.2.2 – Role-Based Training
- 01:5801:58, 31 March 2025 diff hist +101 Commonly Accepted and Practiced CMMC Operation Matrix →AC.L2-3.1.14 – Remote Access Routing
- 01:5701:57, 31 March 2025 diff hist +16,872 Commonly Accepted and Practiced CMMC Operation Matrix No edit summary
- 01:2201:22, 31 March 2025 diff hist −13 Commonly Accepted and Practiced CMMC Operation Matrix No edit summary
- 01:2101:21, 31 March 2025 diff hist +94,917 Commonly Accepted and Practiced CMMC Operation Matrix No edit summary
30 March 2025
- 19:3519:35, 30 March 2025 diff hist +1,120 Evidence Collection Approach →System and Information Integrity (SI) current
- 19:3119:31, 30 March 2025 diff hist +2,877 Evidence Collection Approach →System and Communications Protection (SC)
- 19:2119:21, 30 March 2025 diff hist +444 Evidence Collection Approach →Security Assessment (CA)
- 19:1719:17, 30 March 2025 diff hist +646 Evidence Collection Approach →Risk Assessment (RA)
- 19:1419:14, 30 March 2025 diff hist +1,411 Evidence Collection Approach →Physical Protection (PE)
- 19:0819:08, 30 March 2025 diff hist +230 Evidence Collection Approach →Personnel Security (PS)
- 19:0519:05, 30 March 2025 diff hist +2,638 Evidence Collection Approach →Media Protection (MP)
- 18:5818:58, 30 March 2025 diff hist +1,550 Evidence Collection Approach →Maintenance (MA)
- 18:5518:55, 30 March 2025 diff hist +948 Evidence Collection Approach →Incident Response (IR)
- 18:5218:52, 30 March 2025 diff hist +4,424 Evidence Collection Approach →Identification and Authentication (IA)
- 18:4218:42, 30 March 2025 diff hist +3,995 Evidence Collection Approach →Configuration Management (CM)
- 18:0918:09, 30 March 2025 diff hist +2,855 Evidence Collection Approach →Audit and Accountability (AU)
- 18:0118:01, 30 March 2025 diff hist +887 Evidence Collection Approach →Awareness and Training (AT)
- 17:5817:58, 30 March 2025 diff hist +4,329 Evidence Collection Approach →Access Control (AC)
- 17:3817:38, 30 March 2025 diff hist +36 Main Page →Site Update Notices
- 17:3717:37, 30 March 2025 diff hist −52 Main Page →Site Update Notices
- 17:3617:36, 30 March 2025 diff hist −63 MediaWiki:Sidebar No edit summary
- 17:3517:35, 30 March 2025 diff hist +694 Evidence Collection Approach →Access Control (AC)
- 17:3017:30, 30 March 2025 diff hist +2,286 Evidence Collection Approach →Access Control (AC)
- 04:5004:50, 30 March 2025 diff hist +247 Evidence Collection Approach No edit summary
- 04:4204:42, 30 March 2025 diff hist +40 Evidence Collection Approach →System and Information Integrity (SI)
- 04:4104:41, 30 March 2025 diff hist +75 Evidence Collection Approach →System and Communications Protection (SC)
- 04:3804:38, 30 March 2025 diff hist 0 Evidence Collection Approach →Security Assessment (CA)
- 04:3704:37, 30 March 2025 diff hist +15 Evidence Collection Approach →Risk Assessment (RA)
- 04:3604:36, 30 March 2025 diff hist +77 Evidence Collection Approach →Physical Protection (PE)
- 04:3404:34, 30 March 2025 diff hist 0 Evidence Collection Approach →Personnel Security (PS)
- 04:3404:34, 30 March 2025 diff hist +28 Evidence Collection Approach →Media Protection (MP)
- 04:3204:32, 30 March 2025 diff hist +15 Evidence Collection Approach →Maintenance (MA)
- 04:3104:31, 30 March 2025 diff hist +4 Evidence Collection Approach →Incident Response (IR)
- 04:3004:30, 30 March 2025 diff hist +81 Evidence Collection Approach →Identification and Authentication (IA)
- 04:2704:27, 30 March 2025 diff hist +43 Evidence Collection Approach →Configuration Management (CM)
- 04:2404:24, 30 March 2025 diff hist +60 Evidence Collection Approach →Audit and Accountability (AU)
- 04:2204:22, 30 March 2025 diff hist 0 Evidence Collection Approach →Awareness and Training (AT)
- 03:3803:38, 30 March 2025 diff hist +124 Evidence Collection Approach →Access Control (AC)
- 03:1303:13, 30 March 2025 diff hist +14 Evidence Collection Approach →System and Information Integrity (SI)
- 03:1103:11, 30 March 2025 diff hist +46 Evidence Collection Approach →System and Communications Protection (SC)
- 03:0603:06, 30 March 2025 diff hist +8 Evidence Collection Approach →Security Assessment (CA)
- 03:0503:05, 30 March 2025 diff hist +6 Evidence Collection Approach →Risk Assessment (RA)