CCP Lesson 5 Flashcards

1
Q

Scope

A

The scale or extent of what will be evaluated for conformity, which includes those assets (people, facilities, technology) within the OSC’s environment that are targeted for CMMC Assessment because they interact with sensitive information - for example, by containing it, touching it in transit, or operating on the same network as it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scoping

A

The process of setting or determining the scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Headquarters (HQ) Organization

A

The legal entity that will be delivering services or products under the terms of a DoD contract

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Host Unit

A

The specific people, procedures, and technology within an HQ Organization that would be applied to the DoD contract and that are to be considered as the OSC for CMMC Assessment purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Supporting Organization/Units

A

The people, procedures, and technology external to the HQ Organization that support the Host Unit. The affiliated asset may need to be included as part of the CMMC Assessment Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Out-of-Scope Assets

A

Assets that cannot process, store or transmit FCI or CUI because they are physically or logically separated from CUI assets or are inherently unable to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

System

A

A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shared Responsibility Matrix

A

A mechanism that identifies the person(s) or team(s) in the OSC or the ESP responsible for the implementation and sustainment of the technical controls, as reflected in the terms of service between the EST as provider and the OSC as customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Control Inheritance

A

A situation in which an information system or application receives protection from security controls (or portions of security controls) that are developed, implemented, assessed, authorized, and monitored by entities other than those responsible for the system or application; either internal or external to the organization where the system or application resides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CMMC Certification Boundary

A

Defines the assets to which an assessor will evaluate conformity with applicable CMMC practices. This is the boundary to which a CMMC Certificate will be applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assessment Boundary

A

Identifies all assets in the contractor’s environment for the Assessment engagement. Assets within the Assessment Boundary can be part of the CMMC Certification Boundary or Enabling Assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

System Security Plan

A

The formal document prepared by the information system owner (or common security controls owner for inherited controls) that provides an overview of the security requirements for the system and describes the security controls in place or planned for meeting those requirements. The plan can also contain as supporting appendices or as references, other key security-related documents such as a risk assessment, privacy impact assessment, system interconnection agreements, contingency plan, security configuration management plan, and incident response plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Enclave

A

A segmentation of an organization’s network or data that is intended to “wall off” that network or database from all other networks or systems. A CMMC Assessment scope can be within the Assessment scope of an enclave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cybersecurity Maturity Model Certification (CMMC) Level 1 Scoping Guidance

A

Cybersecurity Maturity Model Certification (CMMC) Self-assessment Scope must be done before Level 1 Cybersecurity Maturity Model Certification (CMMC) Self-Assessment

Informs which assets will be assessed

Informs the details of the Self-Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cybersecurity Maturity Model Certification (CMMC) Level 2 Scoping Guidance

A

Prior to an assessment, contractor assets must be categorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data at use

A

Processing

When Controlled Unclassified Information (CUI) or Federal Contract Information (FCI) is actively being used by a system component

17
Q

Data at rest

A

Storage

When Controlled Unclassified Information (CUI) or Federal Contract Information (FCI) is inactive

18
Q

Data in Motion

A

When Controlled Unclassified Information (CUI) or Federal Contract Information (FCI) is transferred from one information system or one location to another

19
Q

Level 1 scoping considerations

A

People

Technology

Facilities

External Service providers

20
Q

Cloud-based External Service Providers

A

Virtualized

Save on capital and operational expenses

21
Q

Security Protection Assets

A

Cybersecurity Maturity Mode Certification (CMMC) Level 2

Provide security functions or capabilities to the Office seeking Certification (OSC)

22
Q

Contractor Risk Managed Assets

A

Managed using contractor’s risk-based information security policy, procedures, and practices

23
Q

Specialized Assets

A

Part of Cybersecurity Maturity Certification (CMMC) Level 2
- Government Propery
- Internet of Things (IoT) or Industial Internet of Things (IIoT)
- Operational Technology
- Restricted Information Systems
- Test Equipment

24
Q

Specialized Assets - Government Property

A

All property owned or leased by the government

25
Specialized Assets - Internet of Things (IoT) or Industial Internet of Things (IIoT)
Interconnected devices having physical or virtual representation in the digital world
26
Specialized Assets - Operational Technology (OT)
Used in manufacturing systems, Industrial Control Systems (ICS), or Supervisory Control and Data Aquisition (SCADA) Systems
27
Specialized Assets - Restricted Information Systems
Systems that are configured based entirely on government requirements and used to support the contract
28
Specialized Assets - Test Equipment
Used in testing of products, system components, and contract deliverables
29
Controlled Unclassified Information (CUI) Asset Contractor Requirements
Document asset inventory Document System Security Plan (SSP) Document Network Diagram Prepare to be assessed against Level 2 Practices
30
Security Protection Assets Contractor Requirements
Document asset inventory Document System Security Plan (SSP) Document Network Diagram Prepare to be assessed against Level 2 Practices
31
Contractor Risk Managed Assests Contractor Requirements
Document asset inventory Document System Security Plan (SSP) Document Network Diagram Prepare to be assessed against CA.L2-3.12.4
32
Specialized Assets Contractor Requirements
Document asset inventory Document System Security Plan (SSP) Document Network Diagram Prepare to be assessed against CA.L2-3.12.4
33
Follow the Information Strategy
Used to determine scope
34
Scoping Methodology
Identify Sensitive Information Identify business processes that use that information identify systems that directly support those processes Identify enabling systems
35
Categories of Cloud Services
Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS)
36
Shared Responsibility Matrix
Identifies who is responsible for each Assessment Objective
37
Responsible, Accountable, Consulted, Informed (RACI) Chart
A way to document a shared responsibility matrix
38
Establishing Scope
Inventory all systems Catalog Sensitive Information Determine how sensitive information moves Identify Systems and enabling systems in scope