Discover Our NIST SP 800-171 & CMMC 2.0 Solutions:

 /assets/images/app/complaince_accelerator.gif

Compliance Accelerator

Power through compliance. Meet and maintain your NIST SP 800-171 & CMMC 2.0 compliance requirements.
 /assets/images/app/quantum_accelerator.gif

Quantum Assessor

Transform your business. Create new revenue streams and provide scalability for your NIST SP 800-171 and CMMC 2.0 services.
 /assets/images/app/supply_chain_verifier.gif

Supply Chain Verifier

Trust is everything. Verify, monitor, and support subcontactor compliance.
 

CMMC 1.0 Practice - CM.2.061

Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles.

CMMC 1.0 Practice - CM.2.062

Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities.

CMMC 1.0 Practice - CM.2.063

Control and monitor user-installed software.

CMMC 1.0 Practice - CM.2.064

Establish and enforce security configuration settings for information technology products employed in organizational systems

CMMC 1.0 Practice - CM.2.065

Track, review, approve, or disapprove, and log changes to organizational systems.

CMMC 1.0 Practice - CM.2.066

Analyze the security impact of changes prior to implementation.

CMMC 1.0 Practice - CM.3.067

Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems.

CMMC 1.0 Practice - CM.3.068

Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services.

CMMC 1.0 Practice - CM.3.069

Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (whitelisting) policy to allow the execution of authorized software.