SlideShare a Scribd company logo
Supporting your CMMC initiatives with Sumo Logic
What are we going to talk about?
• Overview of the Cybsersecurity Maturity Model Certification (CMMC)
o Its history
o Its direction
o Who it impacts
o The gap that it fills
• Demonstrate how CloudHesive uses Sumo Logic to:
o Address customer's needs in preparing for their CMMC audit from the perspective of
a gap analysis
o Generating evidence during the initial audit
o Demonstration of ongoing compliance
(A brief) United States Government Refresher
• United States Government
o Executive Branch
• Department of Defense
o Office of the Under Secretary of Defense for Acquisition and Sustainment
• Carnegie Mellon University/Johns Hopkins University
• Developed the Program
• Defense Industrial Base/Defense Supply Chain
o Contractors – 100,000 of them, generating 768 Billion USD (3.2% of GDP) Annually
• Their Subcontractors
o Eventually phased into the Program
• CMMC AB -> Cyber AB
o Oversees the Program
What data may be (sub)contractors obligated to protect?
• (F)ederal (C)ontract (I)nformation
o Federal contract information means information, not intended for public release,
that is provided by or generated for the Government under a contract to develop or
deliver a product or service to the Government, but not including information
provided by the Government to the public (such as on public websites) or simple
transactional information, such as necessary to process payments
• (C)ontrolled (U)nclassified (I)nformation
o Information the Government creates or possesses, or that an entity creates or
possesses for or on behalf of the Government, that a law, regulation, or
Government-wide policy requires or permits an agency to handle using
safeguarding or dissemination controls
CMMC Timeline
• In 2016 DFARS 7012 clause goes into in effect requiring all contract holders to self assess to meeting the security
requirements of NIST-SP-800-171
• In 2019 the Department of Defense announced the creation of the Cybersecurity Maturity Model Certification (CMMC)
to transition from a mechanism of self-attestation of an organization's basic cyber hygiene which was used to govern
the Defense Industrial Base
• In 2019 interim rule authorizing the inclusion of CMMC in procurement contracts, Defense Federal Acquisition
Regulation Supplement (DFARS) 2019-D041, was published on September 29, 2020, with an effective date of
November 30, 2020
• On December 8, 2020, the CMMC Accreditation Board and the Department of Defense released an updated timeline
that has the model fully implemented by September 2021
• On November 4, 2021, the Department of Defense announced the release of CMMC 2.0
• In March 2023, Final Rule Making will be complete
• On 60 days after March 2023, CMMC requirements will be included in new contracts
CMMC Ecosystem
• Cyber (A)ccredidation (B)ody (formerly CMMC AB)
o (O)rganization (S)eeking (C)ertification
o (R)egistered (P)ractitioner (O)rganizations
• (R)egistered (P)ractitioners
• (R)egistered (P)racitioners - Advanced
o (C)ertified (3)rd (P)arty (A)ssessment (O)rganizations
• (C)ertified (C)MMC (P)rofessionals
• (C)ertified (C)MMC (A)ssessors
• (Provisional (A)ssessors
• (C)MMC (Q)uality (A)ssurance (P)rofessional
o (L)icensed (T)raining (P)roviders
• (C)ertified (C)MMC (I)nstructors
• (P)rovisional (I)nstructor
o (L)icensed (P)ublishing (P)artners
CMMC 1.0 vs. CMMC 2.0
• Streamlined Model
o Focused on the most critical requirements: Streamlines the model from 5 to 3 compliance levels
o Aligned with widely accepted standards: Uses National Institute of Standards and Technology (NIST)
cybersecurity standards
• Reliable Assessments
o Reduced assessment costs: Allows all companies at Level 1 (Foundational), and a subset of
companies at Level 2 (Advanced) to demonstrate compliance through self-assessments
o Higher accountability: Increases oversight of professional and ethical standards of third-party
assessors
• Flexible Implementation
o Spirit of collaboration: Allows companies, under certain limited circumstances, to make Plans of
Action & Milestones (POA&Ms) to achieve certification
o Added flexibility and speed: Allows waivers to CMMC requirements under certain limited
circumstances
CMMC 2.0 Level 2 Summary
• Access Control (AC)
• Awareness & Training (AT)
• Audit & Accountability (AU)
• Configuration Management (CM)
• Identification & Authentication (IA)
• Incident Response (IR)
• Maintenance (MA)
• Media Protection (MP)
• Personnel Security (PS)
• Physical Protection (PE)
• Risk Assessment (RA)
• Security Assessment (CA)
• System and Communications Protection (SC)
• System and Information Integrity (SI)
Preparing for Audit
• Organizational Readiness
o History
o Current state
o Sustainability of the current state
Sample Artifacts
• (S)ystem (S)ecurity (P)lan
• (P)lan (O)f (A)ctions & (M)ilestones
• Self Assessment with SIPR Score
• (S)ystem (D)esign (D)ocument
• General
o Policies
o Procedures
o Diagrams
o Configuration Settings
o Mechanisms
o Operational Logs
o Audit Logs
o Monitoring
o Locations
o Strategies
Sample Policies
• Access control policy
• Audit and accountability policy
• Configuration management policy
• Identification and Authentication policy
• Incident response policy
• Personnel security policy
• Risk management policy
• Security awareness and training policy
• Security planning policy
• System and communications protection policy
• System and information integrity policy
• System maintenance policy
• Third party hosting policy
• Vendor management policy
Sample Processes
• Access/Firewall Review
• Audit Log Review
• Backup/Restore Testing
• Configuration/Change Review
• Credential Rotation/Credential Audit
• Incident Response Testing
• Monitoring Review
• Patching
• Personnel (Training, Background Check) Review
• Policy Review
• Risk Review
• Vendor Review
• Vulnerability/Penetration Testing
Organizations in the DIB have a challenge
• What do many of these organizations own from a tech perspective?
o Not much
• Computers, Files, E-Mail…
o Simple needs (somewhere to work, store, retrieve, process, transmit) to deliver product
• What infrastructure do they have to support these requirements?
o Not much
• Physical sites, People, Computers…
o Operationally Capable (e.g., delivering a product), but may not be Cyber Capable
• Where can they get help?
o CMMC Ecosystem
o People Considerations
o (C)loud (S)ervice (P)roviders
AWS (CSP) Shared Responsibility Model
Third Party Solutions
• Virtual Desktop (AWS)
• Directory Service (AWS)
• Endpoint Security Package
• Vulnerability Management Package
• NGFW, DLP (AWS)
• E-Mail, Collaboration Suite
• Monitoring Platform (Sumo Logic)
• Governance, Risk and Compliance Platform
• Training Platform
• Background Check Platform
Organizations in the DIB have a solution to their challenge
Organizations in the DIB Become Responsible For
• Data generation, processing, storage, retrieval
o Understand the flow
• Scope Reduction
o Use an enclave
• If the data can’t leave, it’s secure
o Descope where possible – organization, people, domains, access
• If the data can’t be accessed, it’s secure
• People Considerations
o Employees
o Contractors
o Vendors
• Software Considerations
o Vary based on COTS versus Custom
Continuous Monitoring
Continuous Monitoring with Sumo Logic
• We have all these sources of data we are responsible for – Events and States
o Data derived from the third-party solutions
• We need to be able to tell current state and review historically
o To support the sample processes
• We need to be able to react to the high priority items
o Push versus Pull
• We need to demonstrate we are doing this
o It’s part of the process
Windows and Other Events
Cloud Events
AWS Events
Event Response
Conclusion
• In conclusion, leveraging a Cloud Service Provider, and Managed Services Provider
can help to reduce your organizational burden in preparing for and maintaining
CMMC defined controls.
• A significant component to maintaining these controls is monitoring and response,
in which Sumo Logic can be used to funnel these various sources of data and state,
correlate, query and reduce for human consumption at a planned and unplanned
levels of priority.
Supporting your CMMC initiatives with Sumo Logic

More Related Content

PDF
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
PPTX
CMMC DFARS/NIST SP 800-171
PPTX
CMMC rollout: How CMMC will impact your organization
PPTX
PPTX
A Clear Path to NIST & CMMC Compliance_ISSA.pptx
PPTX
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
PPTX
Government Webinar: Preparing for CMMC Compliance Roundtable
PPTX
CMMC 2.0 Explained: Impact for SMBs
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
CMMC DFARS/NIST SP 800-171
CMMC rollout: How CMMC will impact your organization
A Clear Path to NIST & CMMC Compliance_ISSA.pptx
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Government Webinar: Preparing for CMMC Compliance Roundtable
CMMC 2.0 Explained: Impact for SMBs

Similar to Supporting your CMMC initiatives with Sumo Logic (20)

PPTX
Webinar: Critical Steps For NIST Compliance
PPTX
CMMC for Contractors and Manufacturers – What to Know for 2023
PDF
The CMMC Has Arrived. Are You Ready?
PDF
Cybersecurity Maturity Model Certification
PDF
How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...
PPTX
CMMC Certification
PPTX
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
PPTX
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
PDF
CMMC case study: Inside a CMMC assessment
PPTX
[ON-DEMAND RECORDING] Deep Impact: Is Your Manufacturing Company On A Collisi...
 
PPTX
CTEK Summer Series Session 3: Understanding CMMC Requirements for Healthcare ...
PPTX
Government Contracting- The Dawn of the CMMC - Win Federal Contracts
PPTX
Webinar - CMMC Certification.pptx
PDF
Cybersecurity Maturity Model Certification
PPTX
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
PPTX
Demystifying CMMC: Real-World Insights from ControlCase Experts
PDF
Securing the Supply Chain
PDF
Cmmc overview arrington_20200903
PDF
CMMC Overview Arrington_20200903
PDF
CMMC briefing
Webinar: Critical Steps For NIST Compliance
CMMC for Contractors and Manufacturers – What to Know for 2023
The CMMC Has Arrived. Are You Ready?
Cybersecurity Maturity Model Certification
How the DoD’s Cyber Security Maturity Model (CMMC) will impact your business ...
CMMC Certification
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
How CMMC Auditors Recommend You Defend Your Organization - Completed March, 2...
CMMC case study: Inside a CMMC assessment
[ON-DEMAND RECORDING] Deep Impact: Is Your Manufacturing Company On A Collisi...
 
CTEK Summer Series Session 3: Understanding CMMC Requirements for Healthcare ...
Government Contracting- The Dawn of the CMMC - Win Federal Contracts
Webinar - CMMC Certification.pptx
Cybersecurity Maturity Model Certification
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Demystifying CMMC: Real-World Insights from ControlCase Experts
Securing the Supply Chain
Cmmc overview arrington_20200903
CMMC Overview Arrington_20200903
CMMC briefing
Ad

More from CloudHesive (20)

PPTX
CloudHesive x Datadog Multi Generational Observability
PPTX
Modernization of your AWS based SaaS platform - Short
PPTX
Modernization of your AWS based SaaS platform
PPTX
Serverless Generative AI on AWS, AWS User Groups of Florida
PPTX
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
PPTX
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
PPTX
Accelerating Business and Research Through Automation and Artificial Intellig...
PPTX
Amazon Connect Rethink Your Contact Center with CloudHesive.pptx
PPTX
ConnectPath Introduction
PDF
Modernize your contact center with ConnectPath CX v2.pdf
PDF
Modernize your contact center with ConnectPath CX — Chart.pdf
PPTX
End User Computing at CloudHesive.pptx
PPTX
Analytics at CloudHesive
PDF
Best Practices and Resources to Effectively Manage and Optimize Your AWS Costs
PPTX
Serverless data and analytics on AWS for operations
PPTX
reInvent reCap 2022
PPTX
Serverless without Code (Lambda)
PDF
AWS Advanced Analytics Automation Toolkit (AAA)
PDF
AWS Control Tower
PPTX
Security on AWS, 2021 Edition Meetup
CloudHesive x Datadog Multi Generational Observability
Modernization of your AWS based SaaS platform - Short
Modernization of your AWS based SaaS platform
Serverless Generative AI on AWS, AWS User Groups of Florida
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
Accelerating Business and Research Through Automation and Artificial Intellig...
Amazon Connect Rethink Your Contact Center with CloudHesive.pptx
ConnectPath Introduction
Modernize your contact center with ConnectPath CX v2.pdf
Modernize your contact center with ConnectPath CX — Chart.pdf
End User Computing at CloudHesive.pptx
Analytics at CloudHesive
Best Practices and Resources to Effectively Manage and Optimize Your AWS Costs
Serverless data and analytics on AWS for operations
reInvent reCap 2022
Serverless without Code (Lambda)
AWS Advanced Analytics Automation Toolkit (AAA)
AWS Control Tower
Security on AWS, 2021 Edition Meetup
Ad

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
GamePlan Trading System Review: Professional Trader's Honest Take
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Understanding_Digital_Forensics_Presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Supporting your CMMC initiatives with Sumo Logic

  • 2. What are we going to talk about? • Overview of the Cybsersecurity Maturity Model Certification (CMMC) o Its history o Its direction o Who it impacts o The gap that it fills • Demonstrate how CloudHesive uses Sumo Logic to: o Address customer's needs in preparing for their CMMC audit from the perspective of a gap analysis o Generating evidence during the initial audit o Demonstration of ongoing compliance
  • 3. (A brief) United States Government Refresher • United States Government o Executive Branch • Department of Defense o Office of the Under Secretary of Defense for Acquisition and Sustainment • Carnegie Mellon University/Johns Hopkins University • Developed the Program • Defense Industrial Base/Defense Supply Chain o Contractors – 100,000 of them, generating 768 Billion USD (3.2% of GDP) Annually • Their Subcontractors o Eventually phased into the Program • CMMC AB -> Cyber AB o Oversees the Program
  • 4. What data may be (sub)contractors obligated to protect? • (F)ederal (C)ontract (I)nformation o Federal contract information means information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government, but not including information provided by the Government to the public (such as on public websites) or simple transactional information, such as necessary to process payments • (C)ontrolled (U)nclassified (I)nformation o Information the Government creates or possesses, or that an entity creates or possesses for or on behalf of the Government, that a law, regulation, or Government-wide policy requires or permits an agency to handle using safeguarding or dissemination controls
  • 5. CMMC Timeline • In 2016 DFARS 7012 clause goes into in effect requiring all contract holders to self assess to meeting the security requirements of NIST-SP-800-171 • In 2019 the Department of Defense announced the creation of the Cybersecurity Maturity Model Certification (CMMC) to transition from a mechanism of self-attestation of an organization's basic cyber hygiene which was used to govern the Defense Industrial Base • In 2019 interim rule authorizing the inclusion of CMMC in procurement contracts, Defense Federal Acquisition Regulation Supplement (DFARS) 2019-D041, was published on September 29, 2020, with an effective date of November 30, 2020 • On December 8, 2020, the CMMC Accreditation Board and the Department of Defense released an updated timeline that has the model fully implemented by September 2021 • On November 4, 2021, the Department of Defense announced the release of CMMC 2.0 • In March 2023, Final Rule Making will be complete • On 60 days after March 2023, CMMC requirements will be included in new contracts
  • 6. CMMC Ecosystem • Cyber (A)ccredidation (B)ody (formerly CMMC AB) o (O)rganization (S)eeking (C)ertification o (R)egistered (P)ractitioner (O)rganizations • (R)egistered (P)ractitioners • (R)egistered (P)racitioners - Advanced o (C)ertified (3)rd (P)arty (A)ssessment (O)rganizations • (C)ertified (C)MMC (P)rofessionals • (C)ertified (C)MMC (A)ssessors • (Provisional (A)ssessors • (C)MMC (Q)uality (A)ssurance (P)rofessional o (L)icensed (T)raining (P)roviders • (C)ertified (C)MMC (I)nstructors • (P)rovisional (I)nstructor o (L)icensed (P)ublishing (P)artners
  • 7. CMMC 1.0 vs. CMMC 2.0 • Streamlined Model o Focused on the most critical requirements: Streamlines the model from 5 to 3 compliance levels o Aligned with widely accepted standards: Uses National Institute of Standards and Technology (NIST) cybersecurity standards • Reliable Assessments o Reduced assessment costs: Allows all companies at Level 1 (Foundational), and a subset of companies at Level 2 (Advanced) to demonstrate compliance through self-assessments o Higher accountability: Increases oversight of professional and ethical standards of third-party assessors • Flexible Implementation o Spirit of collaboration: Allows companies, under certain limited circumstances, to make Plans of Action & Milestones (POA&Ms) to achieve certification o Added flexibility and speed: Allows waivers to CMMC requirements under certain limited circumstances
  • 8. CMMC 2.0 Level 2 Summary • Access Control (AC) • Awareness & Training (AT) • Audit & Accountability (AU) • Configuration Management (CM) • Identification & Authentication (IA) • Incident Response (IR) • Maintenance (MA) • Media Protection (MP) • Personnel Security (PS) • Physical Protection (PE) • Risk Assessment (RA) • Security Assessment (CA) • System and Communications Protection (SC) • System and Information Integrity (SI)
  • 9. Preparing for Audit • Organizational Readiness o History o Current state o Sustainability of the current state
  • 10. Sample Artifacts • (S)ystem (S)ecurity (P)lan • (P)lan (O)f (A)ctions & (M)ilestones • Self Assessment with SIPR Score • (S)ystem (D)esign (D)ocument • General o Policies o Procedures o Diagrams o Configuration Settings o Mechanisms o Operational Logs o Audit Logs o Monitoring o Locations o Strategies
  • 11. Sample Policies • Access control policy • Audit and accountability policy • Configuration management policy • Identification and Authentication policy • Incident response policy • Personnel security policy • Risk management policy • Security awareness and training policy • Security planning policy • System and communications protection policy • System and information integrity policy • System maintenance policy • Third party hosting policy • Vendor management policy
  • 12. Sample Processes • Access/Firewall Review • Audit Log Review • Backup/Restore Testing • Configuration/Change Review • Credential Rotation/Credential Audit • Incident Response Testing • Monitoring Review • Patching • Personnel (Training, Background Check) Review • Policy Review • Risk Review • Vendor Review • Vulnerability/Penetration Testing
  • 13. Organizations in the DIB have a challenge • What do many of these organizations own from a tech perspective? o Not much • Computers, Files, E-Mail… o Simple needs (somewhere to work, store, retrieve, process, transmit) to deliver product • What infrastructure do they have to support these requirements? o Not much • Physical sites, People, Computers… o Operationally Capable (e.g., delivering a product), but may not be Cyber Capable • Where can they get help? o CMMC Ecosystem o People Considerations o (C)loud (S)ervice (P)roviders
  • 14. AWS (CSP) Shared Responsibility Model
  • 15. Third Party Solutions • Virtual Desktop (AWS) • Directory Service (AWS) • Endpoint Security Package • Vulnerability Management Package • NGFW, DLP (AWS) • E-Mail, Collaboration Suite • Monitoring Platform (Sumo Logic) • Governance, Risk and Compliance Platform • Training Platform • Background Check Platform
  • 16. Organizations in the DIB have a solution to their challenge
  • 17. Organizations in the DIB Become Responsible For • Data generation, processing, storage, retrieval o Understand the flow • Scope Reduction o Use an enclave • If the data can’t leave, it’s secure o Descope where possible – organization, people, domains, access • If the data can’t be accessed, it’s secure • People Considerations o Employees o Contractors o Vendors • Software Considerations o Vary based on COTS versus Custom
  • 19. Continuous Monitoring with Sumo Logic • We have all these sources of data we are responsible for – Events and States o Data derived from the third-party solutions • We need to be able to tell current state and review historically o To support the sample processes • We need to be able to react to the high priority items o Push versus Pull • We need to demonstrate we are doing this o It’s part of the process
  • 24. Conclusion • In conclusion, leveraging a Cloud Service Provider, and Managed Services Provider can help to reduce your organizational burden in preparing for and maintaining CMMC defined controls. • A significant component to maintaining these controls is monitoring and response, in which Sumo Logic can be used to funnel these various sources of data and state, correlate, query and reduce for human consumption at a planned and unplanned levels of priority.