CCP Lesson 6 Flashcards

1
Q

Organizational Culture

A

Personality of an organization.

Employees develop an organization’s culture:
-As it becomes more ingrained, it can be difficult to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Organizational Culture - Values

A

Some values may be written:
-Mission statement

Many values will be unwritten and assumed:
-Learned through observation and informal communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cybersecurity Culture

A

Stong cybersecurity culture involves alignment between:
-Organizational elements (e.g., policy, leadership, social norms).
-Individual employee’s attitudes, knowledge, and assumptions about cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybersecurity Culture: Organization

A

Cybersecurity needs to be a company-wide focus (not just IT).

People make organization secure, not technology:
-Everyone needs to be trained and conscious of risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybersecurity Culture: Individual

A

Employees must recognize they play a role in protecting critical information from digital attacks.

Employees must participate in regular training.

Employees must actively engage in behaviors and habits outlined by their cybersecurity program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Institutionalization

A

Cybersecurity practices should become ingrained within the company culture.
-Are the correct technology controls implemented?
-Do all employees understand the risks?
-Are senior executives on board?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Maturity Stages

A
  1. Focusing on compliance.
  2. Establishing governance.
  3. Implementing cultural change.
  4. Establishing quantitative framework.
  5. Optimizing for long-term sustainment.

As organizations move through the maturity stages, they will institutionalize cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Governance

A

Should provide balance between strategic planning and day-to-day operationalized approach.
-Allocation of personnel and resources
-Active monitoring of SLAs, KPIs, risk management activities.

Effective communication is paramount.

Internal/external assessments provide objective means to identify and address weaknesses and strengthen controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Minimum Attributes of a Policy

A

Policies should:
-Clearly state purpose.
-Clearly define scope.
-Identify roles and responsibilities (to include authority and ownership of activities).
-Identify procedures used to meet the intent of the policy.
-Include regulatory guidelines.
-Be endorsed my management and disseminated to stakeholders.
-Be periodically reviewed and updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Minimum Attributes of a Procedure

A

Procedures should minimally specify:
-Purpose
-Objective
-Description of roles, responsibilities, and authorities.
-Description of inputs/outputs.
-Criteria that must be met in support of procedure.
-Any tools, information, and/or supporting resources.
-Definition of key terminology.
-Detailed steps of how to perform the procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Minimum Attributes of a Plan

A

Plans should include:
-Mission and/or vision statement.
-Strategic goals and objectives.
-Relevant standards and procedures.
-Project timelines and plans.
-Resources requirements for people and tools.
-Required training.
-Stakeholders necessary to implement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Governance Establishment

A

As part of governance, in order to retain their efficacy, cybersecurity policies, procedures, and controls must be maintained through a plan.
-Unmanaged assets introduce higher risk.

Plans should include mechanisms for ongoing monitoring of the systems and associated controls to ensure continued effectiveness.
-Are all changes documented?
-Is the plan still functioning as intended?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cultural Change Implementation

A

To ensure a mature culture of cybersecurity, companies need to create a cultural change management plan.
-Secure executive support.
-Connect cybersecurity risks to other operational, financial, and legal risks.
-Establish clear business goals/KPIs.
-Establish a clear systematic culture management plan with a cross-functional team (Management, Info Security, IT, HR, Legal, and Marketing).
-Identify employees’ views/understandings of cybersecurity culture or guidelines.
-Keep policy and procedure communications user-friendly.
-Implement regular hands-on awareness training.
-Implement a relentless and consistent message that helps employees understand exactly how their daily behaviors have the potential to protect or threaten the security of corporate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Quantitative Framework Establishment

A

Provides for day-to-day measurement and control of the procedures in order to.

Metrics may be qualitative or quantitative.

Measurements examples:
-Actual vs. planned (performance of procedure).
-Identification and evaluation of significant deviations.
-Results of corrective actions.

Reviews with “higher level management” are critical to the success of the organization’s cybersecurity program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Optimization for Long-Term Sustainment

A

Standardization provides for consistency in the implementation of policies, practices, and controls across the organization.

A standardized organizational practice typically provides:
-Ample description of practices and objectives.
-Process flow diagrams.
-Specified performance metrics.
-Procedures for incorporation of lessons learned and improvements.

Optimization is contingent upon practice stability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identify the Desired CMMC Level

A

CUI information not found or expected – CMMC Level 1 is likely sufficient.

CUI information is found or expected – CMMC Level 2 is required.

17
Q

Identify the Scope

A

Scoping is information driven.

Understand organizational context and requirements.

Identify people, technology, facilities, and external service providers.

Identify assets involved in creating and receving FCI/CUI.

Determine context and categorization of FCI/CUI.

Determine system functionality.

Determine connectivity to FCI/CUI environments.

18
Q

Gap Analysis

A

Helps to guide initial understanding of current OSC capabilities and controls.

Helps to identify insufficiencies in the implementation of critical controls and practices.

Encourages engagement of OSC stakeholders earlier in the Assessment process.

Gap analysis is conducted by OSC or optionally by a RP or CCP as a consultant; or a provider outside of the CMMC ecosystem.

19
Q

Closing Gaps

A

When gaps in implementation are identified, it’s critical to not only understand the present issue, but also to create a meaningful plan for resolution of these issues.

20
Q

Closing Gaps (As a CCP working as a consultant)

A

-Describe the nature and impact of the issues (current state).
-Propose actions to help resolve gaps (future state).
-Identify changes to existing policies, plans, practices, resources, and artifacts.
-Develop a resourced plan to address approved gap action items.
-Verify that gaps are properly closed, and that corresponding implementation demonstrates that the control/objective is met.
-Articulate any issues in a timely manner with leadership and POCs.
-Communicate preliminary readiness with OSC.

21
Q

Evidence Validation

A

Means for OSC to engage in preparatory steps for formal Level 2 Assessment.

Goal is to create a set of evidence as preparation for formal assessment.

This may include creating and/or developing:
-An inventory report of all evidence for the target CMMC level.
-A list of all policies and related plans in scope for the target CMMC level.
-A list of all personnel who will need to participate in the assessment.
-All the above mapped to in-scope CMMC practices and levels.

22
Q

Benefits of Evidence Validation

A

Earlier validation of scope and evidence sufficiency.

Increased identification and understanding of implementation and compliance issues.

Earlier detection and resolution of issues that can impact the assessment and assessment timing.

Proactive engagement of project teams, supporting staff, and external stakeholders.

23
Q

Assessment Methods - Forms of Evidence

A

Examine: The process of reviewing, inspecting, observing, studying, or analyzing assessment objects.

Interview: The process of holding discussions with individuals or groups of individuals to facilitate understanding, achieve clarification, or obtain evidence.

Test: The process of exercising assessment objects under specified conditions to compare actual with expected behavior.

24
Q

Evidence Validation Preparation Guidelines

A

The number and type of evidence collected is up to the lead assessor’s discretion.

Plan to have two pieces of evidence from two different assessment methods for thoroughness.
-Examine and Interview.
-Examine and Test.
-Interview and Test.

Multiple pieces of evidence can be used within an assessment method.

Comprehensiveness will be determined by OSC.

25
Q

Exam Preparation

A

Collect all documentation for the CMMC Level 1 and Level 2 practices.

Documents need to be in their final form.

Common types of documents that can be used as evidence include:
-Policy, process, and procedure documentation.
-Training materials.
-Plans.
-System-level, network, and data flow diagrams.

This list of documents is not exhaustive or prescriptive.

26
Q

Interview Preparation

A

Identify individuals likely to be interviewed.
-Staff who perform the tasks that will be assessed in a Level 2 Assessment.
-Staff might be at different organization levels.

Verify that staff have adequate resourcing, training, and planning to perform the practices.

27
Q

Test Preparation

A

Identify potential tests.
-Determined by lead assessor.

Some practices may be best assessed by checking that safeguards are in place.
-Observing staff following a process.

Testing is an important part of the Assessment process.
-Interviews tell the lead assessor and CCAs what the OSC staff believe to be true.
-Documentation artifacts provide evidence of intent.
-Testing demonstrates what has or has not been done.

For example, for IA.L1-3.5.1:
-OSC staff may talk about how users are identified.
-Documentation may provide details on how users are identified.
-Seeing a demonstration of identifying users provides evidence that the practice is met.

28
Q

Guidelines for Evaluating Readiness

A

Seek first to understand, then continuously validate this understanding.

Ensure alignment of preparation activities to the CMMC Assessment Guides.

Engage the expertise of those directly responsible for performance of the control/practice.

Utilize applicable standards and guidelines.

Identify and record opportunities for improvement.

Encourage preparation as a means to build a shared understanding of the Assessment process.