<img src="https://ws.zoominfo.com/pixel/4CagHYMZMRWAjWFEK36G" width="1" height="1" style="display: none;">
Request Demo

Manufacturing, Cybersecurity Frameworks

Cybersecurity Maturity Model Certification Domains Explained

down-arrow

The Department of Defense (DoD)’s Cybersecurity Maturity Model Certification (CMMC) is the newest iteration of the DoD’s effort to protect controlled unclassified information (CUI) the defense industrial base (DIB) and the DoD’s supply chain. Building on the NIST SP 800-171 control set, the CMMC is a tiered scoring system ranging from basic cyber hygiene to dynamic and adaptive cybersecurity programs. The CMMC framework is composed of 17 domains, with each tier layering in more practices and processes for each domain. In this infographic, we’ll be taking a high-level view of each of the domains and what to expect when working to meet your CMMC requirements.

inforgraphic

CMMC Domain Name

Domain Description

Access Control This domain requires your organization to establish who has access to your systems and what their requirements are to operate effectively. As well who has remote access, internal system access, and the limitations of their roles in system.
Asset Management This domain asks that you locate, identify, and log inventory of the assets to your organization.
Audit & Accountability This domain requires that you have a process in place for tracking users that have access to your organization’s CUI and performing audits of those logs to ensure they are held accountable for their behavior. You will need to define the requirements of each audit, have a method to perform the audit, protect and secure the results of that audit and manage audit logs.
Awareness & Training This domain requires that you have training programs in place for all personnel and conduct security awareness activities.
Configuration Management This domain asks that you establish configuration baselines as a measure to judge the efficiency of your systems. This is necessary to conduct audits and accurately measure the posture of your systems.
Identification & Authentication This domain ensures the proper roles within your organization have the correct level of access and can be authenticated for reporting and accountability purposes.
Incident Response For this domain, your organization will need an Incident Response Plan. The ability to detect and report events, develop and implement response to a declared incident, perform post-incident reviews and test your response in an effort to measure your entity’s preparedness in the event of a cyber attack.
Maintenance This domain requires you have a maintenance system in place to maintain and effectively operate your systems.
Media Protection For this domain, your organization will need to prove it has its media identified and appropriately marked for ease of access. Additionally, it asks that you provide evidence of a media protection protocol, sanitation protocol, and transportation protection in place.
Personnel Security Your personnel will have to have been properly screened and have background checks run. Also, you will need to provide evidence that your CUI is protected during personnel activity such as employee turnover or transfer.
Physical Protection Your organization will need to provide evidence of the physical security surrounding your assets and prove that they are protected.
Recovery This domain requires that you keep and log backups of media necessary to your organization, these need to be logged for the purpose of continuity among backups and mitigate lost data.
Risk Management Risk Management is the process of identifying and evaluating the risk that affects your company using periodic risk assessments and vulnerability scanning. This includes your own organization’s risk as well as that of your vendors.
Security Assessment For this domain, you will need a system security plan in place. Additionally, you will need to define and manage controls and perform code reviews for your organization.
Situational Awareness You will need evidence of a threat monitoring system. This helps supplement other domains and keeps your organization secure in the event of a cyber incident.
System & Communication Protection You will need to define the security requirements of each system and communication channel your organization uses to provide evidence your organization has control of communications at system boundaries.
System & Information integrity System and information integrity require you to identify and manage flaws within your system, identify hazardous and malicious content in-system, implement email protections and monitor your network and system.

 

 

See why leading DoD contractors are choosing CyberStrong to prepare for CMMC compliance: 

You may also like

Why You Need CIS Controls for ...
on June 17, 2022

The Center for Internet Security (CIS) is a non-profit organization that helps public sectors and private sectors improve their cybersecurity. The organization aims to help small, ...

Small Business Cybersecurity ...
on June 15, 2022

To achieve peace of mind in the modern threat landscape, small business owners must have a solid security strategy and budget in place. VIPRE’s SMB Security Trends report state ...

Do Small Businesses and Startups ...
on June 10, 2022

Did you know that about 60% of small businesses shut down within 6 months by falling victim to a data breach or cyber-attack, where the average global breach cost hovers at $3.62 ...

A Pocket Guide to ISO 27001
on June 9, 2022

Let’s begin with the complete title of what’s referred to as ISO 27001. It is officially known as “ISO/IEC 27001." If you're looking to have your company certified, you'll need to ...

Benefits Of An Automated Security ...
on June 6, 2022

Proactive recognition, remediation, and mitigation of security threats are rising challenges for global businesses today. Security risk assessment is an integral part of this ...

Kyndall Elliott
The Top 5 Automated Risk ...
on June 1, 2022

Automated risk assessment tools help you assess information security risks and related metrics in real-time based on the available data internally and externally. Connecting the ...