Create user rules of access to all internal networks and systems with a detailed up to date list of users and their privileges within the system.
The U.S. Congress has recently set new requirements (CMMC) for companies with the Department of Defense (DOD). The company must now report any security breach in their networks to the Department of Homeland Security and be CMMC compliant.
That is an interesting move, as we have all heard of the breaches in many big business networks, which result in the theft of the personal information of millions of users. The policy change is because it is much easier to get to the source of the breach as opposed to the compromised information itself.
The DOD has recently had a spate of network security breaches that have compromised the information of individuals but not the data itself.
The recent case of the Department of Justice (DOJ) and the FBI also highlights that the FBI has access to any information stored in the cloud. This is one more reason why it is critical for companies to keep an eye on the security of their networks.
CMMC (Cybersecurity Maturity Model Certification) was first published in 2020; CMMC will slowly be implemented over the coming five years. CMMC will be a core part of all future bidding processes for DoD contracts.
Create user rules of access to all internal networks and systems with a detailed up to date list of users and their privileges within the system.
Know what hardware, software, other technologies have access to the system. Create and document processes from daily backups to disposal of old equipment and destruction of stored data
Track, log and timestamp user access, actions and information contact to CUI assets.
Cybersecurity training must be included in all levels of training incorporating how the employee interacts with the CUI data within their role.
Unique identification of all users, devices, and every process.
Strong user identification process with a minimum complexity of passwords.
Everything needs maintenance. Create a schedule for systems, hardware, and devices maintenance.
Document system updates and patches to software, hardware, and firmware.
Restricted access to the building and all servers. Maintain a detailed list of employees with their access areas.
Establish processes to identify new risks and threats to the system.
Track external cybersecurity threats
There are a number of different levels of compliance. Identify data you will need to use within the contract as it can require different types of compliance.
The National Institute of Standards and Technology (NIST) established NIST 800-172 & NIST 800-171 enhanced security requirements for protecting data government data and incorporated them as part of the certificate.
FCI Federal Contract Information – Data not ever intended for general or public release. You will require CMMC 5 levels certification.
CUI Controlled Unclassified Information – Data is sensitive but not classified. You will require CMMC 3 Levels certification.
Does the running of your business include several repetitive tasks? If there’s no guidance or procedure in place, it’s possible for some of the steps in the process to get forgotten. This is why checklists are important.
People get distracted, and when something gets forgotten, it’s much harder to recover than if they’d completed the task right in the first place.
Guidance every step of the way makes sure something is completed perfectly every time.
Read More: Why is a Checklist Important?
We all carry enormous knowledge and experience that we want to apply effectively, but we are all prone to make mistakes. There’s only so much we can store in our heads without forgetting something. How to maximise our use of knowledge?
The simple answer to this problem is to use checklists.
How many types of checklists are there? Two. What are the two types of checklists? Read-Do and Do-Confirm checklists are about how you use checklists.
Read More: Types of checklist: What are the two most powerful Checklist Types?
A checklist is a way to document each step needed to complete a task. A detailed set of instructions, a guide of how something is done.
Checklist software allows you to document every step of a process to be used over and over again.
Read More: Checklist Software