grcacademy.io /blog/
GRC Academy - Governance, Risk, and Compliance Training!
Active Web Watch

 


We are pleased to announce that we have recently signed a partnership agreement with PECB! This partnership will deliver significant benefits to enterprises, by providing best practices of ISO standards in North America.

“GRC Academy’s partnership with PECB will greatly expand our course catalog with quality online self-paced training offerings. We are honored to partner with PECB!” said Jacob Hill, CEO of GRC Academy.

“By partnering with GRC Academy we will have the opportunity to provide our customers with the expertise they need to prepare for the future,” said Tim Rama, CEO of PECB. “Our goal in partnering with GRC Academy is to demonstrate how the skills acquired in PECB training courses can be applied to solving daily life challenges, and thereby, how they relate directly to their career interests and aspirations,” added Rama.

GRC Academy will start by offering PECB training for the following ISO/IEC standards:

  • ISO/IEC 27001 (Information Security Management)
  • ISO/IEC 20000-1 (IT Service Management)
  • ISO/IEC 9001 (Quality Management)

These courses include exams and respected certifications. GRC Academy also plans to offer discounts to veterans and others who want to transition into cybersecurity!

About PECB

PECB is a certification body which provides education and certification under ISO/IEC 17024 for individuals on a wide range of disciplines. As a global provider of training, examination, and certification services, PECB offers its expertise on multiple fields, including, but not limited to, Information Security, Privacy and Data Protection, Business Continuity, Quality and Service Management, Risk Management, Health and Safety, and Sustainability.

PECB help’s professionals show commitment and competence by providing them with valuable education, evaluation, and certification against internationally recognized standards. PECB’s mission is to provide their clients with services that inspire trust, demonstrate competence, and benefit society as a whole. For further information about PECB’s principal objectives and activities, visit www.pecb.com.

The United States Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC) 1.0 didn’t allow Plan of Actions and Milestones (POA&Ms).

According to NIST Special Publication 800-53 r5, a POA&M is “a document that identifies tasks that need to be accomplished. It details resources required to accomplish the elements of the plan, milestones for meeting the tasks, and the scheduled completion dates for the milestones.”

A common response from industry was to ask the DoD to reflect on their own systems, and to allow industry the same amount of flexibility as they do on their own.

The long awaited CMMC proposed rule was released the Friday before Christmas! The rule clearly specifies when POA&Ms are allowed and when they are not.

Assessment POA&Ms and Operational POA&Ms

The CMMC rule differentiates between an assessment POA&M and an operational POA&M.

Assessment POA&M:

For purposes of conducting a CMMC assessment and satisfying the contractual eligibility requirements for CMMC Level 1, 2, or 3, an OSA is only permitted to have a POA&M for select requirements scored as NOT MET during the CMMC assessment and only under the following conditions…

CMMC Proposed Rule – https://www.federalregister.gov/d/2023-27280/p-1384

Under CMMC 1.0 no assessment POA&Ms were allowed!

Operational POA&M:

An OSA shall maintain a POA&M, as applicable, as part of operations under the security requirement for Risk Assessments and Continuous Monitoring (CA.L2–3.12.2) for CMMC Levels 2 and 3…

CMMC Proposed Rule – https://www.federalregister.gov/d/2023-27280/p-1384

The DoD understands that issues will occur over time after the assessment, but they want the CMMC controls as compliant as possible at the time of assessment.

I think this makes a lot of sense. Although the contractor will be required to submit annual affirmations of continued compliance, CMC doesn’t have an RMF-like continuous monitoring capability where the government has at least periodic insight into the detailed security state of the system (in this case the organization).

POA&M Closeouts

If you come out of your CMMC level 2 or level 3 assessment with a POA&M, you must complete all of the findings within 6 months.

“If the POA&M is not closed out within the 180-day timeframe, the Conditional Level 2 Certification status will expire.”

CMMC Proposed Rule – https://www.federalregister.gov/d/2023-27280/p-1314

This also applies to CMMC level 2 self-assessments and CMMC level 3 certifications.

And if you have an active contract with CMMC requirements, “standard contractual remedies” will apply, and the OSC will be ineligible for additional awards” within the impacted CMMC assessment scope.

Our friend Shauna Weatherly of FedSubK.com provided context to what “standard contractual remedies” could include:

Those [standard contractual remedies] would be up to the agency, but I could see variations from a price adjustment in favor of the agency to contract termination for default (T4D), depending on how egregious the issues are, the contractor’s effort (or lack thereof) to correct, and impacts to the Government mission.

Under a Cost-plus-Award-Fee (CPAF) or Cost-plus-Incentive-Fee (CPIF) type contract it could result in a loss of fee, depending on the structure or basis of fee payments.

Under Performance-Based Contracts, maintaining compliance could be an element in the Quality Assurance Surveillance Plan (QASP) and result in reduced contract payments.

It would also most likely result in an overall negative past performance rating in CPARS, or at the very least negative ratings for specific CPARS element(s), which follows a contractor for three years for source selection purposes as they seek new awards.

Shauna Weatherly, founder of FedSubK.com, retired 35-year federal acquisition professional

Timing here is very important. If a C3PAO or DIBCAC was involved in the assessment, they have to perform a POA&M closeout with you. Depending on the controls that were POA&M’d, that might require another onsite visit and more time to accomplish the closeout.

I imagine there will be many companies that run into problems because they delayed closing out their assessment POA&M.

Controls that can be placed on a POA&M

The controls that are allowed to be POA&M’d can be easily viewed on our CMMC control explorer. They are also listed below.

CMMC Level 1

  • No POA&Ms are allowed in CMMC level 1

CMMC Level 2

POA&Ms are allowed under certain conditions:

  • Must have a minimum assessment score of 80%
  • POA&M items are required to be closed out within 180 days (C3PAO comes back to verify)
  • SC.L2–3.13.11 (FIPS-validated encryption)
    • 5-point control that can be POA&M’d if “partially implemented” (encryption is used, but it is not FIPS validated)
  • Most controls with a point value of “1” can be POA&M’d

POA&Ms are not allowed for any of the following 1-point controls:

CMMC Level 3

POA&Ms are allowed under certain conditions:

  • Must have a minimum assessment score of 80%
  • POA&M items are required to be closed out within 180 days (DIBCAC comes back to verify)

Cannot POA&M any of the following controls:

After years of waiting the CMMC proposed rule has been published on the Federal Register! This proposed rule is a HUGE milestone and is the precursor to seeing CMMC requirements in contracts.

The comment period for the rule and notice ends on 2/26/2024.

Here are the links:

GRC Academy has submitted the following comments:

You can easily download the CMMC guidance documents at the following OneDrive share:

DoD plans to phase in CMMC over 4 phases. We expect to see CMMC begin appearing in contracts earliest late 2024.

If you’d like to know more about the rulemaking process, check out these GRC Academy podcast episodes:

We are working hard to update our CMMC Overview course based on the new rule! We expect the course updates will be complete by the second week of January.

We have also updated our CMMC control explorer based on this rule!

GRC Academy is pleased to announce that our CMMC Overview Course is now available for sale to government personnel on GSA Advantage!

To date our course has received 33 5-star reviews! The course has been described as “outstanding,” “extraordinary,” and “amazing”! We are very thankful for the positive feedback!

Just like contractors in the Defense Industrial Base (DIB), government personnel in the Department of Defense (DoD) need to understand CMMC and the many contractual and cybersecurity requirements behind it.

If you serve as a Contracting Officer, Contracting Officer Representative, Program Manager, Information Systems Security Manager, or any other role that is responsible for developing requirements for DoD contracts or managing defense contractors, this course is for you!

Our founder Jacob Hill worked for the government for nearly 5 years at Marine Corps Systems Command. During that time, he supported an IT procurement shop where he worked closely with contract specialists. Jacob has completed DAU courses and achieved DAWIA level III in IT, and level I in PM, and he also served as a COR and Project Manager.

Most recently Jacob has been serving as the Director of Cyber Operations at a small business in the DIB and has been developing a cybersecurity program in preparation for NIST 800-171 and CMMC.

Jacob has seen both sides of the fence, and he believe GRC Academy’s CMMC Overview course will greatly benefit the Department of Defense as they prepare to implement CMMC into contracts.

For those that follow privacy news, you have probably noticed a trend in the United States – multiple states have proposed and passed their own privacy laws, creating a complex patchwork of compliance requirements. In fact, as of the time of writing this article, over a dozen states have passed their own privacy laws, providing residents of certain states with privacy rights, requiring businesses to have a Privacy Policy with specific disclosures and requiring businesses to follow certain rules when collecting and processing personal information.

With more privacy laws being passed every day and more requirements being imposed, it is no surprise that businesses are having difficulties meeting all of their obligations. In this article, we’ll break down how the privacy law patchwork came into place, what you need to know about these new privacy laws and how US privacy laws compare to other privacy laws such as GDPR. 

Why does the United States have a privacy law patchwork? 

Seeing that over a dozen states have their own privacy laws, one may wonder, why is that the case? Why doesn’t the United States have a federal privacy law?

The truth is that the United States has multiple federal privacy laws such as HIPAA, the Privacy Act of 1974, FERPA, the CAN SPAM Act, and FINRA. However, these federal privacy laws only protect very specific personal information such as financial information or health information and apply to very specific circumstances such as email spam, education or information collected and retained by the government. 

At the time of writing this article, there is no federal privacy law in the United States that protects information such as names, emails, phone numbers, or IP addresses that is regularly collected by businesses online.

While multiple federal privacy bills such as the American Data Privacy and Protection Act (ADPPA) have been proposed in the past, they have not been passed into law. Thus, due to pressure from consumers and consumer rights groups, increased privacy violations and concerns, and new technologies that impact privacy, many states have taken it upon themselves to propose and pass legislation to protect the privacy of residents of their states, creating the state privacy law patchwork we see today. 

Comparing US privacy laws with GDPR

Many US-based companies started their privacy compliance programs with the requirements of GDPR in mind and may be wondering how they can adapt their program to comply with the new privacy laws in the United States.

It is important to note that GDPR follows an opt-in model, meaning that personal data cannot be processed unless an individual has specifically agreed to the processing of their personal data or if another exception applies. On the other hand, the new privacy laws in the United States follow an opt-out model, where data processing can take place unless a consumer has specifically stated that they do not want it to take place or have opted out of such processing. 

In addition, it is also important to note that the new US privacy laws target specific privacy harms such as targeted advertising, the sale of personal information, use and disclosure of sensitive personal information, and profiling whereas GDPR views privacy harms in a more broad sense. Thus, your GDPR compliance program will need to adapt to avoid the specific harms enumerated in these new US privacy laws. 

Finally, while following a GDPR compliance program will help you comply with some of the requirements of these new privacy laws, it is important that you also incorporate the specific requirements of the new privacy laws into your GDPR compliance program so that you achieve full compliance. 

Which states have passed their own privacy laws? 

Due to a lack of a federal privacy law that would adequately protect consumers, the following privacy laws were passed: 

  1. California – California Online Privacy and Protection Act of 2003 and the California Consumer Privacy Act (as amended by the California Privacy Rights Act)
  2. Nevada Revised Statutes Chapter 603A
  3. Delaware Online Privacy and Protection Act
  4. Virginia Consumer Data Protection Act
  5. Colorado Privacy Act
  6. Utah Consumer Privacy Act (effective date: December 31, 2023)
  7. Connecticut SB6
  8. Iowa SF262 (effective date: January 1, 2025)
  9. Indiana SB5 (effective date: July 1, 2026)
  10. Tennessee Information Protection Act (effective date: July 1, 2025)
  11. Montana Consumer Data Privacy Act (effective date: October 1, 2024)
  12. Texas Data Privacy and Security Act (effective date: July 1, 2024)

If the above seems like a lot to keep track of, you should also be aware of the fact that over a dozen states have proposed their own privacy bills as well, which means that the patchwork will only grow in the future. The most important thing that you can do to prepare for these new privacy laws is to first determine which of these privacy laws apply to your business as that will help you determine the requirements and standards that you need to meet to comply. 

Requirements of US state privacy laws 

Each state privacy law is different, with different thresholds as to who they apply to, different Privacy Policy disclosure requirements, and different compliance obligations. For example, some privacy laws apply if you collect the personal information of residents of certain states, while others apply if you do business in those states, while others require you to meet a certain revenue or data processing threshold. However, these privacy laws also have some similarities: 

  1. Each privacy law can apply even if your business is not located in the state that passed that privacy law.
    • This is due to the fact that privacy laws are created to protect people and not businesses and individuals can submit their personal information to company websites without the business having to be located in that state.
  2. Each privacy law provides certain privacy rights to individuals.
    • These rights range from the right to delete personal information to the right to opt out of certain uses of their personal information. It is important to note that some of the privacy rights provided by these new privacy laws will have a big impact on marketing such as the right to opt out of the processing of personal information for targeted advertising, the right to opt out of the sale of personal information, and the right to not be discriminated against for exercising privacy rights.
  3. Each privacy law requires businesses to have a privacy policy.
    • Businesses are required to have a comprehensive and up to date Privacy Policy that contains the specific disclosures enumerated by that law.
    • It’s important to note here that since each privacy law has its own specific set of disclosure requirements, complying with one law may not mean compliance with other laws.
  4. Each privacy law requires 3rd-party personal data processers are compliant.
    • Businesses are required to ensure that any vendors that they use for the processing of personal information also meet the requirements of that law, which is usually accomplished through a contract.
  5. Each privacy law requires businesses ensure the security of personal information.
    • Businesses must take certain steps to ensure the security of personal information such as data minimization, data retention periods, compliance with specific standards and increased enforcement methods for data breaches.

Lastly, it is important to note that the requirements of each privacy law may change through amendments, rules and regulations so it is important to not just have a compliance program that meets the requirements of the privacy laws as they are currently in place, but to also have a strategy to keep your program up to date with future requirements. 

While many have high hopes for the ADPPA, the bill has failed in the past and is now being considered for reintroduction. Currently, that reintroduction is being stalled by the fact that some lawmakers are considering adding provisions related to artificial intelligence into the bill.

For the time being though, businesses should be aware that without a federal privacy law that preempts existing state laws, the state privacy bill patchwork in the United States is not going away any time soon.

If you do not currently have a Privacy Policy or do not have a strategy to keep it up to date with new legislation, make sure to check out the Termageddon Privacy Policy generator, which automatically updates your policies for new legislation.

Want to learn more? Check out episode 7 of the GRC Academy podcast where Donata speaks about privacy laws in detail!

We are pleased to announce that GRC Academy has partnered with Credly!

Credly digital badges will be issued to everyone who completes GRC Academy owned courses!

This is an important step to further enhance the value that our students receive and the credibility of the platform!

Students who have already completed our CMMC Overview course will receive emailed instructions from Credly with instructions to claim your CMMC Overview Course digital badge.

NIST is updating the series of special publications (SPs) dedicated to the protection of controlled unclassified information (CUI) on nonfederal systems. The first update is to NIST SP 800-171. The latest version of NIST 800-171 is revision 2, and this update would result in revision 3.

Pre-Draft Call for Comments

On July 19th, 2022, NIST issued a 90-day pre-draft call for comments that would be used to inform revisions of NIST SP 800-171, NIST SP 800-171A, NIST SP 800-172, and NIST SP 800-172A.

On November 1st, 2023, NIST released their analysis of the more than 60 individuals and organizations who submitted comments. The chart below is from the document, and shows the sectors and sizes of the commenting entities:

NIST analysis of commenters by sector and size

There were a few items in their analysis that are worth highlighting:

The most commented on security requirement was 3.13.11, “Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.” NIST will research and propose options in the forthcoming draft on how best to address feedback on the specific CUI security requirements to balance stakeholder concerns with appropriate countermeasures to protect the confidentiality of CUI.

It is interesting that they would consider offering leniency on the FIPS 140-2/3 requirement for cryptographic modules. NIST operates a program called the Cryptographic Module Validation Program (CVMP) which validates that cryptographic modules operate in accordance with the FIPS 140-2/3 standard. NIST has previously stated that they view crypto modules that are not FIPS-validated as offering no protection at all.

Commenters supported the inclusion of the NFO controls that are currently tailored out. This would result in a more comprehensive set of security requirements in a single source and provide needed foundational context and guidance for the CUI requirements

NIST tailored out 60 security controls and placed them in appendix E of NIST 800-171 r2. NIST refers to this appendix as nonfederal organization (NFO) controls. NIST believes that these controls are so obvious that all complete security program should include them.

Many believe that the appendix is not reviewed by organizations, and therefore many of these NFO the controls are not accounted for. If NIST tailors in the NFO controls, or at least a subset of them, this could drastically increase the number of NIST 800-171’s security controls from the current set of 110 requirements.

NIST wraps up the analysis document by saying that an initial public draft of NIST 800-171 r3 is planned for late Spring 2023. Additionally, they state that the following updates are planned for the forthcoming draft:

  • Update the security requirements for consistency and alignment with SP 800-53, Revision 5
    (including inclusive language updates), and the SP 800-53B moderate-impact baseline
  • Develop a CUI overlay (Supplementary Appendix to the existing security requirement catalog) to better link the CUI security requirements to the SP 800-53 controls for stakeholder feedback
  • Consider and propose options on how best to address stakeholder feedback on the NFO control tailoring

February 2023 Status Update from NIST

On February 16, 2023, NIST released a status update on the 3rd revision of NIST SP 800-171. In their statement, NIST stated many changes which are under consideration – here are the most consequential changes:

  1. Withdrawing requirements that are either outdated, no longer relevant, or redundant with other requirements
  2. Reassigning some of the NFO controls to the CUI, NCO, or FED tailoring categories
  3. Adding new requirements based on changes to the NIST moderate control baseline in SP 800-53B and the reassignment of selected NFO controls
  4. Combining requirements where appropriate for greater efficiency
  5. Adding organizationally-defined parameters to selected requirements to achieve greater specificity of control requirements
  6. Adding a CUI Overlay appendix using the controls from SP 800-53, Revision 5 and the tailored moderate baseline from SP 800-53B

The (1) withdrawing of outdated requirements will be beneficial. Some of NIST 800-171’s guidance needs to be brought up to date with NIST’s latest guidance, such as password management.

The (2) reassignment of “some of the” NFO controls to the CUI tailoring category will impact the number of security controls.

The (5) addition of organizationally-defined parameters (ODPs) will bring NIST 800-171 closer to NIST 800-53’s format. ODPs are in the text of the control, such as “Lock the computers screen after [organization defined amount of inactivity] minutes of inactivity.

ODPs allow for more control of the security controls at the organization level by allowing policies and procedures to populate the ODPs. ODPs do provide another layer of complexity when managing the security requirements, but they also offer an opportunity for automation.

The (6) CUI overlay appears to be a simple reference that is similar to the existing appendices in NIST 800-171 r2.

May 2023 Draft Release of NIST 800-171 r3

NIST released the draft of NIST 800-171 r3 on May 10, 2023. The draft was very well received by the community. Although there are still 110 controls, there are some notable changes. NIST highlighted the changes in a FAQ, and provided a detailed analysis of the changes.

Here are some additional interesting changes:

  • Addition of the “Planning” family.
  • Addition of 3.15.2, “System Security Plan.”
  • Addition of 3.12.5, “Independent Assessment.”
  • Change 3.5.3, “Multi-factor Authentication,” to be required for all accounts no matter the access method.
    • Previously it was only required for access to privileged accounts and network access to non-privileged accounts.

June 2023 Status Update from NIST

NIST held a webinar on June 10, 2023 where they highlighted the latest updates of the draft.

The slide deck is here. Here is the overview slide highlighting the significant changes:


Overview slide showing significant changes in NIST 800-171 r3

Here is the timeline slide. The slide indicates that NIST 800-171 and NIST 800-171A will be completed in Q2 of FY24.

Timeline slide for NIST 800-171 and NIST 800-172 revisions

What Does This Mean for CMMC?

The DoD’s Cybersecurity Maturity Model Certification (CMMC) is currently in the federal rulemaking process. The output of this process will either be an interim-final rule or a proposed rule.

If the rulemaking process results in an interim-final rule, then we would see CMMC requirements in contracts in 2023. If the rulemaking process results in a proposed rule, then we would likely see CMMC requirements in contracts in 2024.

The release and incorporation of NIST 800-171 r3 is a complication that the DoD doesn’t need during its CMMC rulemaking process. CMMC currently relies on NIST 800-171 r2 and NIST 800-172. The least complex solution for DoD is to push the implementation of the to-be released NIST 800-171 r3 right.

I personally believe it could be a few years before DoD requires the implementation of the to-be released NIST 800-171 r3, however, many CMMC professionals believe that the DoD will begin to require the implementation of NIST 800-171 r3 the moment NIST releases the final version.

DFARS 252.204-7012 is the current contractual driving force requiring the implementation of NIST 800-171. It requires that contractors implement the version of NIST 800-171 in effect at the time of the solicitation, OR as authorized by the contracting officer.

To perform an orderly transition, the DoD could issue guidance requiring the implementation of NIST 800-171 r3 in new CMMC certifications by a certain date, and direct contracting officers to specify NIST 800-171 r2 in contracts until that date. This would allow the bulk of organizations to obtain their initial CMMC certifications under NIST 800-171 r2, and then recertify under NIST 800-171 r3. Historically, the DoD has used this approach when new revisions of NIST SP 800-53 have been released.

To perform an orderly transition, the following documentation (among others) would need to be updated:

  • NIST updates NIST 800-171A
  • DoD updates:
    • DoD Assessment Methodology (ie SPRS scoring)
    • CMMC implementation guidance
    • CMMC assessment guidance
  • Cyber AB updates the CMMC Assessment Process (CAP)

Additionally, NIST has indicated that there will be updates to NIST 800-172 (and NIST 800-172A), the document which DoD will pull its CMMC level 3 requirements from. From what we know today, NIST has not yet begun to update NIST 800-172, so the final version of NIST 800-172 and NIST 800-172A could be released in 2024.

These NIST SP updates do complicate the situation for DoD, and it will be very interesting to see how they handle this. Once the new CMMC rule is released, they will be able to communicate how they will address this.

Bottom Line Up Front

I was trying to log into my isc2.org account, and completely bypassed the MFA I had in place – by accident.

For this vulnerability to be exploited, the following must have been in place:

  • The attacker already compromised the user’s isc2.org password
  • The user hadn’t set up SMS (text messaging) as a MFA method

The attacker could compromise the user’s (ISC)2 account by entering the user’s credentials, registering a phone number during the login flow, and then using the text messaged code.

The video below discusses and demonstrates the issue.

Video demonstrating the MFA bypass

Summary

I was logging into the isc2.org site to vote on their recent controversial bylaws amendment proposal when I accidentally discovered the MFA bypass. (ISC)2 is the organization behind the very popular CISSP certification, which is a highly regarded cybersecurity certification.

I had registered an authenticator app to use as MFA, but hadn’t registered text messaging as a method because… Well, text messaging isn’t secure (ie SIM swapping).

The site let me “Try something else” and REGISTER a NEW phone number – I was in! I just bypassed my own enrolled MFA method!

Timeline

I haven’t been able to confirm this, but it appears this issue was caused by a SSO upgrade that ISC2 made on their website on 7/27/2022.

I reported the issue to them on Tuesday, 10/25/2022, and they called me on Friday, 10/28/2022, to ensure they understood my report. It appeared that they resolved the issue in mid-November, but I finally received confirmation that the issue was resolved on 12/13/2022. I did ask for the exact date that they resolved the issue for my report, but (ISC)2 said they wouldn’t release any further information.

The Details

In case you missed it, here is the video demonstration of this issue.

Here is the configuration of my MFA methods prior to the MFA bypass. Note that I only have “Google Authenticator” enabled.

Enabled MFA methods prior to MFA bypass

Here I am at the (ISC)2 login screen.

(ISC)2 login screen

After entering my username and password, the system prompted me for me a code from the authenticator app. I didn’t have access to the code, so I clicked on “Try Another Method.”

(ISC)2 login screen MFA Prompt

I didn’t remember the methods I had set up, so I tried “SMS Authentication” (which actually wasn’t enabled at this time).

(ISC)2 login screen – “Try another method”

Here is the problem. The site allowed me to register a NEW phone number, and enable the SMS MFA method during the login flow. ANY phone number could be used.

Registering a NEW phone number during the login flow

Here is the text message I received with the code.

The SMS code I received after registering the new phone number

Entering the code I received in the text message.

Entering the code I just received

…And I’m logged in. I just bypassed my own MFA!

Logged in after bypassing the MFA method I had configured

The system did generate an alert indicating that a new MFA method had been activated.

Email alert notifying me that SMS MFA method was activated

Here are the MFA options after enabling “SMS authentication” during the login flow.

Enabled MFA methods after the MFA bypass

Lessons

1. Strong passwords still matter.

As long as we have deal to passwords, they remain an important defense layer. Even with the recent compromise of LastPass, the recommendation to use a password manager still stands:

  • Use a very strong master password
  • Generate very strong and unique passwords for each account

2. MFA isn’t a cure-all.

Unfortunately, this isn’t the first time we’ve seen improper MFA configurations on websites. We’ve also seen MFA defeated in different ways such as compromising MFA tokens.

Don’t neglect the importance of strong passwords.

We are proud to announce the CMMC control explorer!

The explorer allows you to easily view, filter, and search through the CMMC requirements. The search crawls through the control summaries and the supplemental guidance as well. It consolidates multiple sources into a single reference, and it includes links to reference documents, the associated points from the DoD assessment methodology, and the assessment procedures from NIST 800-171A.

All of this information is easily accessible – even from your phone.

We hope that you find this tool valuable! Please contact us if you have any suggestions on how to make it better!

This may surprise you, but FedRAMP does not have any US citizenship / US persons requirements.

FedRAMP is a federal program that standardizes federal security requirements for cloud service providers (CSPs). Federal agencies can leverage the CSP’s FedRAMP authorization package which makes it much easier for CSPs to work with the federal government.

You can learn more about FedRAMP by watching the “FedRAMP Overview” video below from our CMMC Overview Training for Small and Medium Businesses (SMBs).

DFARS 252.204-7012 states that cloud systems which the contractor uses to store, process, or transmit DoD CUI must meet security requirements “equivalent” to the FedRAMP-moderate baseline.

This may cause some to believe that a FedRAMP-moderate authorization checks all of the required boxes. It does NOT. If you possess export-controlled information such as International Traffic in Arms Regulations (ITAR), YOU are responsible for ensuring the CSP is staffed by US persons.

We reached out to the FedRAMP office to verify that the there are no US citizenship / US person requirements, and this was the response:

Email from the FedRAMP office stating that FedRAMP has no citizenship requirements.
Email from the FedRAMP office stating that FedRAMP has no citizenship requirements.

The FedRAMP FAQ page alludes to FedRAMP’s lack of citizenship requirements:

Q: What does FedRAMP require for personnel screening requirements from Cloud Service Providers (CSPs)?

A: FedRAMP requires CSPs to describe their organization’s personnel screening requirements. If an agency has requirements for federal background investigations, or additional screening and/or citizenship and physical location (e.g., U.S. citizens in Continental United States [CONUS] offices only), then those requirements would need to be specified in the solicitation language, which may affect bid pricing.

The FedRAMP office posted a much more direct response on GitHub:

Thank you for your question. As with all FedRAMP authorizations, FedRAMP Tailored does not specify a citizenship requirement as there is no government-wide requirement on citizenship. The only requirement is for the CSP to perform background checks, and the CSP has the freedom to determine exactly what background checks are performed. While a CSP may have non-US persons supporting their system and can still achieve an ATO with some agencies, there are several agencies that maintain their own citizenship requirements. In other words, a CSP using non-US persons is still FedRAMP compliant, but will find their market limited among Federal agencies.

We had an interesting discussion regarding this topic on LinkedIn. A gentleman stated that US citizenship was an early requirement for FedRAMP, but GSA decided to remove it.

We hope that this helps you! If you have any questions, please contact us.

ChatGPT has gone viral since it was released two weeks ago. We decided to ask it to write a story about a plumber who could not get CMMC certified, and… Well, wait for the plot twist!

We also posted this on LinkedIn. Enjoy the story!


Bob was a happy plumber. He loved his job and he was good at it. He had been in the plumbing business for many years, and he had built up a loyal customer base. But everything changed when the Department of Defense started requiring CMMC certification for its contractors.

Bob tried to get certified, but he quickly realized that it was a daunting task. The certification process was long and complicated, and it required a lot of time and money. Bob didn’t have the resources to invest in it, and he was starting to worry that he would never be able to work for the DoD again.

One day, Bob was sitting in his workshop, feeling sorry for himself, when he had an idea. Instead of trying to get CMMC certified, he would run for president. He would use his skills as a plumber to solve the nation’s problems and make the country a better place.

Bob was no stranger to hard work, and he was determined to make his dream a reality. He started campaigning in his local community, and he quickly gained support. People were impressed by his honesty and his common-sense solutions to their problems.

As the campaign progressed, Bob’s popularity grew. He was a fresh face in politics, and he was not afraid to speak his mind. He was a true outsider, and he appealed to people who were fed up with the traditional political system.

Eventually, Bob won the election and became the president of the United States. He used his knowledge of plumbing to fix the country’s infrastructure and make sure everyone had access to clean water. He also implemented new cybersecurity measures to protect the nation from threats.

Bob’s presidency was a success. He proved that anyone, even a plumber, could make a difference if they had the determination and the courage to follow their dreams.


If you are a small business who needs to achieve CMMC certification, don’t quit – check out our CMMC Overview Training!