Control name | Control description |
---|
Control name | Control description |
---|
Control name | Control description |
---|
Control name | Control description |
---|
Control name | Control description |
---|
This checklist will help you prepare for an NIST SP 800-53 audit. Please do a self assessment for each area. You can read the detailed specification here.
Control name | Readiness score |
---|
Use this checklist to determine whether you’re ready for your Cybersecurity Maturity Model Certification (CMMC) audit:
If you maintain CUI, make sure you’ve checked these boxes:
- All external and internal issues that affect your ISMS
- Information security stakeholders and their information security requirements
- Dependencies on other organizations that must be considered when determining what needs to be protected and where?
- What information & how information should be protected
- How roles, responsibilities & authorities required for information security will be established
- How the vision will be made available, communicated, maintained and understood by all parties?
- Carried out operational planning and control processes
- Confirmed information security risk assessments were conducted as planned
- Confirmed information security risk treatment plans were documented and implemented?
- A process for management review of the ISMS
- You have conducted internal audits to determine the information security management process complies with your organization’s requirements
- The ability to track security metrics?
- Cloud provider SOC Reports (SOC 1, SOC 2, SOC 3)
- Service Level Agreements (SLAs)
- Business Associates’ Agreements (BAA)
- Encryption
- Access Control
- Network and Firewall
- Backup Settings
- Intrusion Detection
- Vulnerability Scanning and Patching
- Determine whether and audit will cover SOC 2 Type I or SOC 2 Type II report.
- Determine which Trust Service Criteria (TSC) will be evaluated in the SOC 2 report.
- A process for management review of the ISMS
- You have conducted internal audits to determine the information security management process complies with your organization’s requirements
- The ability to track security metrics?