Time
1 hour 17 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:01
prepping for C MMC now.
00:04
So let's roller sleeves up one more time and look at the structure off the draft. See MMC version 10.7 framework.
00:15
Well, we will review the CMA. See distribution at each level, the capabilities at each level,
00:24
the practices that are under each of the capabilities, and then how the access level controls can be demonstrated.
00:36
So
00:37
this graph shows you at level one, at least within the 10.7 framework. There are a total off 17 practices
00:48
and
00:50
right now, 15 of those of all from Fars or what they call the CFR 52 2 of 4-21
01:00
then with the NIST 801 71 17 of the controls can be related back to all 17 practices.
01:08
When you get to level two now you have 15 controls
01:14
off which you have the 48 of the nest 801 71 related back to the practices
01:23
then with level three, have an additional 59 practices, 45 arising from 1 71
01:32
Now, at this point, you wonder Well,
01:34
where'd they get the other information from? If not if they aren't in far, they aren't in 801. 71 you'll see is we go through that They used additional cybersecurity frameworks. One was from Australia,
01:52
Another was the UK. They also walked at the Carnegie Mellon structure and C I s
01:59
so level four Now there's only 26
02:05
practices that were added and 13 came from the 800 deaths, 71 Bravo and then level 5 16 practices were added. Only five came from the 1 71 Bravo.
02:22
So when we look at the domains, we had laid them out before, where we talked about the access controls.
02:29
You get an incident response, the infrastructure etcetera in the here he have a layout off the capabilities and practices under each one, and you'll notice that
02:43
some may only have one. Others have mobile with in them.
02:49
So let's look at access control as an example of how you can envision what version one will look like. And this is the draft the 10.0 dot seven.
03:04
So on it, you have the access control. And so the I capabilities that you have are established system access requirements.
03:14
You have You want to control your internal system access,
03:19
then you want to control remote system access and then number four limit access to authorize users and processes. And typically, when I go into a client or commercial company or agency,
03:38
this is probably the one area that an assessor and I know I always stringently look at,
03:47
because as people are hired
03:52
and as their terminated,
03:54
this is a well known potential area where authorized users may not be removed timely. Also authorized users as they get promoted or move from one department to another.
04:13
Their access may not be appropriately
04:16
constrained
04:18
or removed from a certain application or area.
04:25
So
04:26
in access control, this is a critical area because this is about your users. How do you control your users? Because remember,
04:35
we talked a little bit about the insider threat,
04:40
and that's where you can have a disgruntled employ could be going through divorce bad times at home or just is going through rough times in general. And they decided to take it out on you, your company
04:59
and this is where a person may have been, and there have been plenty of stories where 10 15 years unemployed, been with a company that all of a sudden
05:12
whammo
05:13
something happened and they decide to get back at the company or maybe somebody else within the company. And this is why you gonna make sure your user access controls or type
05:27
so again, looking at the first
05:31
practice P 101
05:35
Limit information Access to authorize users processes acting on behalf of authorized users such as an application will go and be acting on behalf unauthorized Use their just for protection
05:50
to the application and other devices that you have out there. You could have monitoring devices back up devices. So you want to make sure that all of those users are authorized, making sure that when you put a new system or device in
06:09
making sure the old one was removed so that no one can capture that user
06:14
off that device or system and use it for
06:19
a hacker purpose. And if you notice P one on one, they will list
06:28
the various other cyber frameworks out there that they used to make up. He won over one, so there's the far cause
06:38
they have been this 801 71 then they have the Australian framework that they looked at all three to be able to come up with that practice. And if you go over toe level two,
06:53
it's P 105 And that's provide privacy and security notices
06:58
consistent with the application federal contract information rules.
07:02
And that comes directly out of the 801 71. And if you notice they're joined together
07:11
to wear that, you have 11 them 105 So at level one, they have the women access. If you're liable to. Not only women access that, have those notices
07:23
present
07:24
and then also level two. They add another one limit use of portable storage devices on external systems. So are the USB ports controlled, and again that comes out of the mist 801 71.
07:42
So you'll see as you migrate up from level one
07:46
toe level two to level three, Form five. Some of the practices can be unique to the bubble.
07:55
Some convey build on a
07:58
practice from a lower level.
08:00
You'll see somewhere there's a level one level two level three level for on level five practice that builds from the base all the way up to being proactive

Up Next

CMMC Overview

This Cybersecurity Maturity Model Certification (CMMC) course provides an overview of how to prepare for future certification training, including its requirements and why it is important for contractors working with the Department of Defense.

Instructed By

Instructor Profile Image
Robert Ashcraft
IT Advisor for Regulatory / CMMC Environments at Corporate Visions
Instructor