Afraid that CMMC compliance certification
is too much for your team?

Don’t be. 

How do you eat an elephant? One spoon at a time!

How do you become CMMC compliant and certified?

One Capability Domain and One Practice at a time!

We can get you to CMMC level 1 in 3 weeks!

We take care of getting your people, processes and technology ready

Cybersecurity Maturity Model Certification Preparation

17 capability domains, 171 practices

Reach CMMC Level 4
in just 6 months!

We help IT departments transform the way they administer their infrastructure to match the cybersecurity requirements of the CMMC model

We help you build and certify your maturity in 17 Capability Domains:

Access Control

When you're fully compliant with the Access Control domain, you should master 26 practices and as a result, handle System Access, Internal System Access, Remote System Access, and limit data access to authorized users and processes.

Incident Response

After mastering 13 practices, you should be able to:
Plan your incident response activities; Detect and report events; Develop and implement a response to a declared incident; Perform post incident reviews, and Test your Incident Response.

Risk Management

There are 12 practices in the Risk Management capability domain, but this one is likely going to be a challenging one for most small & medium businesses. We are here to help!

Asset Management

Microsoft 365 has 280+ security settings. Amazon Web Services and Azure have hundreds of security configuration options, too - your virtual CISO will take care of ALL of them!

Maintenance

We help our customers transform their IT infrastructure security by implementing Server & Network Device Hardening, Desktop Hardening, Network & Web Service security, Data Security, Backups, and more!

Security Assessment

How many vulnerable machines/apps can a company have in its network? Through the Virtual CISO service, we help our customers establish and manage a Vulnerability management program, which will gradually reduce their network vulnerabilities.

Awareness and Training

Getting access to a corporate account may grant a hacker access to all internal systems. We protect our customers by implementing secure authentication, ensuring the integrity and confidentiality of your communications.

Media Protection

Breach simulation is an integral part of every Information Security Program. Our customers can rely on us to support them in the initiation, execution, and conclusion of a Penetration Test. ​

Situational Awareness

Software development should be a rapid, efficient, and secure process. We help our customers integrate security into the design, development, testing, integration, and deployment of their code.

Audit and Accountability

Policies and Procedures are the governing laws of a company's business. The ones we create are living and breathing documents bringing order and structure to our customers' security practices.

Personnel Security

Secure Work From Home is one aspect of remote access, but we also take care of third party partners and outsourced employees, vendors, and guests. Remote access to data is not limited to VPN.

System and Communications Protection

And this is why we expand your defense beyond VPN and add Zero-Trust as your primary defense principle.

Configuration Management

Antivirus is just one of the 12 controls we implement to defend endpoints from advanced hacking attacks. We prevent the exploitation of these devices via malicious documents, scripts, 0day vulnerabilities, and more. ​

Physical Protection

We will help you transform your IT infrastructure security by implementing Server & Network Device Hardening, Desktop Hardening, Network & Web Service security, Data Security, Backups, and more!

System and Information Security

Every Information Security Program we build and execute for our clients is different. Their teams, infrastructure, applications used, and business objectives are different, and we often expand our services to serve them better.

Identification and Authentication

Antivirus is just one of the 12 controls we implement to defend endpoints from advanced hacking attacks. We prevent the exploitation of these devices via malicious documents, scripts, 0day vulnerabilities, and more. ​

Recovery

We will help you transform your IT infrastructure security by implementing Server & Network Device Hardening, Desktop Hardening, Network & Web Service security, Data Security, Backups, and more!

And More

Every Information Security Program we build and execute for our clients is different. Their teams, infrastructure, applications used, and business objectives are different, and we often expand our services to serve them better.

Access Control

The most important of the 17 domains in CMMC, Access Control is the one we start with in every company.

For level one, you have to: 

  • Limit information system access to authorized users, processes acting on behalf of authorized users, or devices.
  • Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
  • Verify and control/limit connections to and use of external information systems.
  • Control information posted or processed on publicly accessible information systems.

A critical part of this project is to educate your team on the importance of not reusing passwords and how to use a password manager efficiently.

One of the objectives we will aim to achieve is passwordless authentication – something we deliver with a combination of services from Google (FIDO2), Microsoft (passwordless authentication), Yubico and utilizing biometrics and physical security.

cmmc access control

Incident Response

Achieving CMMC Level 1 for the Incident Response capability is one of your easiest tasks. You only need to:

  1. Declare them
  2. Resolve them
But the devil is in the details! Moving up the CMMC ladder to Levels 2-5 you will need to improve your incident response maturity significantly, including developing your own investigation and forensics capabilities or getting outside help. 
Risk Management

Todo: list the CMMC Risk management requirements

Asset Management

Todo: list the CMMC Asset management requirements

Maintenance

Todo: list CMMC Maintenance requirements

Security Assessment

Todo: list CMMC Security Assessment requirements

Awareness and Training

Todo: list CMMC awareness and training requirements

Media Protection

Todo: list cmmc Media Protection requirements

Situational Awareness

Todo: explain and list cmmc situational awareness requirements

Audit and Accountability

Todo: audit and accountability requirements

Personnel Security

Todo: personnel security requirements

Systems and Communications Protection

Todo: systems and communications protection requirements

Configuration Management

Todo: configuration management requirements

Physical Security

Todo: physical security requirements

System and Information Security

Todo: list system and information security cmmc requirements

Identification and Authentication

Todo: list cmmc identification and authentication requirements

Recovery

Todo: list CMMC recovery requirements for level 1

Schedule a Virtual Coffee With Us

Let's get to work together!

We serve very few clients and take pride in our work. Can we become a great team and achieve amazing things together?

cyber security consultant

© 2020 All rights reserved