The 21 Most Common CMMC Technology Projects

nist-800-171

Are you getting ready to start down the path of getting your CMMC certification?

Based on our recent NIST 800-171 / CMMC projects, here are the 21 most common technology projects that we see companies needing to implement in order to comply.

  1. Windows 10 on all PCs where possible.  In-support versions of all server OS and software (e.g., SQL Server).
  2. If older computers are still required (e.g., to drive equipment), very strict network segmentation and no/limited Internet access.
  3. All computers and servers configured (at least partially) to the appropriate STIGs
  4. There will be a TON of new GPOs that need to be added.  If you’re not on a domain, plan to add one.
  5. 2FA everywhere: local access, VPN/remote access, OWA, etc.
  6. More refined network segmentation.  Some companies opt to deploy a NAC.
  7. Secure file sharing system (if they’re sharing data internally or with external parties)
  8. Tons of physical security controls (cameras, locks, sometimes badges, systems for tracking visitors, etc.)
  9. Managed encryption everywhere
  10. Mobile device management — definitely on phones and tablets, ideally on workstations too
  11. Generally, no cloud services handling CUI unless you’re in Microsoft 365 GCC High
  12. Wifi access points using FIPS 140-2 encryption
  13. HDD shredding, usually through a NAID-certified service
  14. Business-class firewall with security services enabled and reviewed
  15. At a minimum, firewall logging to a SIEM, with either a SOC service or anomaly detection algorithms
  16. EDR solution or MDR solution on top of the antivirus that you should already have.
  17. Blocking file sharing services / apps
  18. Migrating all users to Standard accounts
  19. USB lockdown and other DLP measures
  20. Offsite backup
  21. Segregation of data in the ERP system and in shared drives

Want help with your NIST 800-171 / CMMC project?  Learn more about what we do here.

Table of Contents

Tag(s):
Picture of Josh Ablett

Josh Ablett

Josh Ablett, CISSP, has been meeting regulations and stopping hackers for 20 years. He has rolled out cybersecurity programs that have successfully passed rigorous audits by the SEC, the FDIC, the OCC, HHS, and scores of customer auditors. He has also built programs that comply with a wide range of privacy and security regulations such as CMMC, HIPAA, GLBA, SEC/FINRA, and state privacy laws. He has worked with companies ranging from 5 people to 55,000 people.

Share

Related Posts

So, you need to write an information security policy. And you’re totally overwhelmed. Where do you

Third-party vendor risk management, or the process of reviewing your third-party vendors, is getting more and

When working with clients on cybersecurity tasks, or addressing security vulnerabilities, they sometimes ask, “how do

Do you think we might be a good match?