To transfer CUI between a government client and its internal systems, a defense contractor uses a Secure File-Sharing Application provided by the DoD. However, all data traversing this boundary must pass through a next-generation firewall (NGFW) managed by the contractor’s Network Admin. All CUI is stored on a Solid State Drive (SSD) and accessed through a laptop. What type of asset is the Network Admin?
When discussing the OSC’s proposed assessment scope, the Lead Assessor learned that some laptops and workstations share a network with CUI assets, but their users do not work with CUI. These assets do not store CUI or run applications that process CUI. Reviewing the OSC’s SSP, the implemented risk-based security policies, procedures, and practices raised questions and were found to be deficient. What can the Lead Assessor do in this scenario?
An OSC has submitted an assessment scope that includes some CUI and security protection assets. As a Lead Assessor, you are validating the CMMC assessment scope in preparation for a CMMC assessment for the OSC. How should you handle CUI and Security Protection Assets during the actual CMMC assessment?
An OSC is planning to have a C3PAO perform a CMMC Level 2 assessment. When validating the OSC’s proposed assessment scope, you realize they use an ESP for various cybersecurity services. What action must you, as a CCA, take regarding the ESP?
When validating an OSC’s assessment scope, an Assessment Team learns that the proposed scope is too narrow and their asset categorization is mixed up. What should the Assessment Team do?
To transfer CUI between a government client and its internal systems, a defense contractor uses a Secure File-Sharing Application provided by the DoD. However, all data traversing this boundary must pass through a next-generation firewall (NGFW) managed by the contractor’s Network Admin. All CUI is stored on a Solid State Drive (SSD) and accessed through a laptop. What type of asset is the Secure File-Sharing Application?
A software development company is applying for a CMMC Level 2 assessment. As the Lead Assessor, you request access to the company’s System Security Plan (SSP) as part of the initial objective evidence for validating the scope. Which of the following is true about the software development company’s obligations in honoring the request?
A software development company uses a cloud-based source code repository and continuous integration/continuous deployment (CI/CD) platform to manage its software development lifecycle. The cloud service provider hosts and manages the source code repository and CI/CD platform. Which of the following statements accurately describes how the OSC should handle the cloud service provider’s assets in the CMMC Assessment Scope?
An aerospace company has requested a CMMC assessment for an enclave only. Your team has verified that the company has a valid CAGE code and is registered with SAM.gov. However, the enclave has no separate CAGE code or SAM registration. Can the assessor proceed with the CMMC assessment solely for the enclave, or is an assessment of the entire aerospace company’s network required?
An OSC has produced two assessment scopes. When the Lead Assessor questioned the OSC PoC why, they detailed that they process, store, or transmit FCI within one assessment scope and CUI in another. Which scope will the OSC obtain a CMMC Level 2 certification for?