Control name Control description
Control name Control description
Control name Control description
Control name Control description
Control name Control description

This checklist will help you prepare for an NIST SP 800-53 audit. Please do a self assessment for each area. You can read the detailed specification here.

Control name Readiness score

Use this checklist to determine whether you’re ready for your Cybersecurity Maturity Model Certification (CMMC) audit:

If you maintain CUI, make sure you’ve checked these boxes:

  1. All external and internal issues that affect your ISMS
  2. Information security stakeholders and their information security requirements
  3. Dependencies on other organizations that must be considered when determining what needs to be protected and where?
  1. What information & how information should be protected
  2. How roles, responsibilities & authorities required for information security will be established
  3. How the vision will be made available, communicated, maintained and understood by all parties?
  1. Carried out operational planning and control processes
  2. Confirmed information security risk assessments were conducted as planned
  3. Confirmed information security risk treatment plans were documented and implemented?
  1. A process for management review of the ISMS
  2. You have conducted internal audits to determine the information security management process complies with your organization’s requirements
  3. The ability to track security metrics?
  • Cloud provider SOC Reports (SOC 1, SOC 2, SOC 3)
  • Service Level Agreements (SLAs)
  • Business Associates’ Agreements (BAA)
  • Encryption
  • Access Control
  • Network and Firewall
  • Backup Settings
  • Intrusion Detection
  • Vulnerability Scanning and Patching
  • Determine whether and audit will cover SOC 2 Type I or SOC 2 Type II report.
  • Determine which Trust Service Criteria (TSC) will be evaluated in the SOC 2 report.
  • A process for management review of the ISMS
  • You have conducted internal audits to determine the information security management process complies with your organization’s requirements
  • The ability to track security metrics?