Splunk Services
Co-Managed Services
Professional Services
Security Workshops
Splunk Health Checks
Splunk Observability and ITSI
Risk-Based Alerting
Fraud Detection and Prevention
Splunk Enterprise Security Upgrade
Splunk License Management
Custom Dashboard Development
Cyber Compliance
CMMC / DFARS Advisory Services
CUI Data Mapping
Security Gap Assessments
CMMC Remediation Services
C3PAO Assessment Support
Compliance As A Service (CaaS)
Compliance Automation Software
Resources
Case Studies
Blog
CMMC Helpful Links
CMMC 2.0 Guidance
Company
Why SP6
SP6 Events
Careers
Leadership & Core Values
Social Responsibility
Search
Menu
Splunk Services
Co-Managed Services
Professional Services
Security Workshops
Splunk Health Checks
Splunk Observability and ITSI
Risk-Based Alerting
Fraud Detection and Prevention
Splunk Enterprise Security Upgrade
Splunk License Management
Custom Dashboard Development
Cyber Compliance
CMMC / DFARS Advisory Services
CUI Data Mapping
Security Gap Assessments
CMMC Remediation Services
C3PAO Assessment Support
Compliance As A Service (CaaS)
Compliance Automation Software
Resources
Case Studies
Blog
CMMC Helpful Links
CMMC 2.0 Guidance
Company
Why SP6
SP6 Events
Careers
Leadership & Core Values
Social Responsibility
Search
Contact Us
CMMC Guidance
Practice
AC.L1-3.1.1
AC.L1-3.1.2
AC.L2-3.1.3
AC.L2-3.1.4
AC.L2-3.1.5
AC.L2-3.1.6
AC.L2-3.1.7
AC.L2-3.1.8
AC.L2-3.1.9
AC.L2-3.1.10
AC.L2-3.1.11
AC.L2-3.1.12
AC.L2-3.1.13
AC.L2-3.1.14
AC.L2-3.1.15
AC.L2-3.1.16
AC.L2-3.1.17
AC.L2-3.1.18
AC.L2-3.1.19
AC.L1-3.1.20
AC.L2-3.1.21
AC.L1-3.1.22
AU.L2-3.3.1
AU.L2-3.3.2
AU.L2-3.3.3
AU.L2-3.3.4
AU.L2-3.3.5
AU.L2-3.3.6
AU.L2-3.3.7
AU.L2-3.3.8
AU.L2-3.3.9
AT.L2-3.2.1
AT.L2-3.2.2
AT.L2-3.2.3
CM.L2-3.4.1
CM.L2-3.4.2
CM.L2-3.4.3
CM.L2-3.4.4
CM.L2-3.4.5
CM.L2-3.4.6
CM.L2-3.4.7
CM.L2-3.4.8
CM.L2-3.4.9
IA.L1-3.5.1
IA.L1-3.5.2
IA.L2-3.5.3
IA.L2-3.5.4
IA.L2-3.5.5
IA.L2-3.5.6
IA.L2-3.5.7
IA.L2-3.5.8
IA.L2-3.5.9
IA.L2-3.5.10
IA.L2-3.5.11
IR.L2-3.6.1
IR.L2-3.6.2
IR.L2-3.6.3
MA.L2-3.7.1
MA.L2-3.7.2
MA.L2-3.7.3
MA.L2-3.7.4
MA.L2-3.7.5
MA.L2-3.7.6
MP.L2-3.8.1
MP.L2-3.8.2
MP.L1-3.8.3
MP.L2-3.8.4
MP.L2-3.8.5
MP.L2-3.8.6
MP.L2-3.8.7
MP.L2-3.8.8
MP.L2-3.8.9
PS.L2-3.9.1
PS.L2-3.9.2
PE.L1-3.10.1
PE.L2-3.10.2
PE.L1-3.10.3
PE.L1-3.10.4
PE.L1-3.10.5
PE.L2-3.10.6
RA.L2-3.11.1
RA.L2-3.11.2
RA.L2-3.11.3
CA.L2-3.12.1
CA.L2-3.12.2
CA.L2-3.12.3
CA.L2-3.12.4
SC.L1-3.13.1
SC.L2-3.13.2
SC.L2-3.13.3
SC.L2-3.13.4
SC.L1-3.13.5
SC.L2-3.13.6
SC.L2-3.13.7
SC.L2-3.13.8
SC.L2-3.13.9
SC.L2-3.13.10
SC.L2-3.13.11
SC.L2-3.13.12
SC.L2-3.13.13
SC.L2-3.13.14
SC.L2-3.13.15
SC.L2-3.13.16
SI.L1-3.14.1
SI.L1-3.14.2
SI.L2-3.14.3
SI.L1-3.14.4
SI.L1-3.14.5
SI.L2-3.14.6
SI.L2-3.14.7
AC.1.001 SP6 Guidance
CMMC Practice Description
-
Discussion from Source
-
Assessment Objectives
-
Potential Assessment Methods
-
Potential Assessment Considerations
-
Further Discussion
-
Mappings
CERT RMM v1.2:
-
CIS Controls v7.1:
-
FAR Clause:
-
NIST CSF v1.1:
-
NIST SP 800-171 Rev 1:
-
NIST SP 800-171 B:
-
NIST SP 800-53 Rev 4:
-
NIST SP 800-53 Rev 5:
-
ISO 27002:
-
Secure Controls Framework:
-
AU ACSC Essential Eight:
-
UK NCSC Cyber Essentials:
-
Search for:
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
Ok