Your CMMC Launchpad

This launchpad is your one-stop shop for all the links.

Here are the resources you need for SUCCESS in the program.

ONBOARDING

Start Here

How to get R.E.S.U.L.T.S.

Watch this quick video that walks you through the Keys to Success for this program.

Introductory Call

Click here to schedule your Introductory Call today to kick-start your CMMC Journey.

Quick Start Guide Here

Download the Quick Start Guide to get started on your CMMC Journey.

CYBERSECURITY MATURITY

Achieve Cybersecurity Maturity with these 4 steps:

BE SUCCESSFULL

SCOPE

Scope Matters.

Identify your Contracts.

Inventory Your assets.

Bring the Team together.

Secure Architecture.

The Journey Begins.

LEVEL 1 CONTROLS

IMPLEMENT

Start Simple.

Use our 6-step Playbook and templates & tools to

Implement the controls.

Document. Everything.

Prove your compliance.

MONITOR

MAINTAIN

Rinse and Repeat.

Follow the P&P.

Log your activities.

Audit your systems and Review with Executives.

It's that Simple.

SUBS NEED CMMC?

FLOWDOWN

Know your Subs.

Are they compliant?

Talk early and often.

Refer them and you will

Get credit on you next Month's subscription.

NEED HELP? TEAM RESOURCES

PROJECT COORDINATOR

Plan your project.

Track your progress.

Identify risks and issues.

COMPLIANCE ENGINEER

You have 8 tech calls included.

Engineers will consult with you on how to apply the controls and technology in your environment.

WEEKLY COACHING

Weekly group coaching calls Q&A

Join for the latest industry updates

We will discuss best practices and

answer your questions. Recorded.

COMMUNITY

Join the Community. Find the

weekly call replays. The Hub for

implementation, tech support, and collaborating with the best.

IMPLEMENT CMMC LEVEL 1

Complete Module 1 & 2 First

FCI Essentials

Inventory Contracts, People, Devices, Software, Locations.

FutureFeed Training & Links..

Secure Architecture

Finalize the Scope and design a secure architecture for CMMC Level 1

Foundation basics.

Physical Security

Let's Secure the facility

Manage badge access & keys.

Log and escort the visitors.

Public Posting

Review content prior to posting.

Marketing and sales materials? Review it all.

Anti-Virus/Patch

Relentless patching.

Anti-Virus up-to-date.

Real-time System Scanning

Firewall

Manage traffic at the firewall.

Block unauthorized access.

Manage external connections.

Access Security

Establish Role based access for all.

Formalized onboarding process.

Follow the processes exactly.

Media Protection

Secure destruction of digital media.

Approved shredding.

Log activities.

IMPLEMENT CMMC LEVEL 2

CUI Essentials

Inventory Contracts, People, Devices, Software, Locations.

FutureFeed Training & Links..

Change Management

Implement Change Management and Change Approval Board.

Tools

Let's get some foundational tools implemented to support the project.

Training

Implement Security Awareness Training and Training Logs

Backups

Relentless patching.

Anti-Virus up-to-date.

Real-time System Scanning

Physical Security

Manage traffic at the firewall.

Block unauthorized access.

Manage external connections.

Public Posting

Review all posts prior to posting.

Log your audits.

Anti-Virus

Anti-Virus up-to-date.

Real-time System Scanning

MFA

Implement MFA for ALL external facing access and administrators.

Incident Response

Customize your Plan, Test your capabilities.

Firewall

Manage traffic at the firewall.

Block unauthorized access.

Manage external connections.

Patching

Relentless patching.

System Scanning.

Applications

Establish Role based access for all and authorize users.

Configurations

Apply secure configurations across devices and systems.

Access Security

Establish Role based access for all.

Assign roles and responsibilities.

Administrators

Separation of Privilege

Admin Audits

Personnel Security

Formalized onboarding process, background checks, and training

.

CUI Protection

Secure destruction of digital media.

Approved shredding. Mark CUI.

Vulnerabilities

Vulnerability scanning. Remediation. Risk assessment.

Remote Access

Authorize and control remote access.

Network Security

Secure, segmented, encrypted network configurations.

Encryption

Implement and document FIPS validated encryption.

Event Logs

Collect Logs and monitor activity.

Internal Audit

Risk Management, Assessments, POAM's and the SSP.

Copyright 2024. All rights reserved. POWERED BY: