The priority is to assess enterprises, 1', 2' and 3' vendors who have access to CUI data. A criminal thinks, "I can't break directly into a Fortune 500 company with a fully staffed IT department, but I do have access to xxx Vendor(s)".
Basic Cyber Hygiene
Assess Security Controls CMMC- RM.2.143 and RM.2.141
Apply Risk Management Framework
CMMC-C-031, RM.3.141 and RM.3.144
System Security Plans CMMC-CA.2.157
Establishing Baseline Configurations CMMC-CM.2.061
End-User Training CMMC-AT.3.058
Maintain data and artifacts securely
DEFENSENDEPTH
defensendepth@gmail.com
NAICS-541611,541512, 541519, 541990, 611691, 541618, 611699, 541690, 611710
SIC-874201
PSC-R420, R424, R406, R408
Copyright © 2014 DEFENSENDEPTH
All Rights Reserved