Building a Healthy Body of Evidence

Preparing for the Cybersecurity Maturity Model Certification (CMMC) assessment is a considerable investment from both time and money perspectives. Organizations handling Controlled Unclassified Information (CUI) within the defense industrial base should expect to have an authorized CMMC 3rd Party Assessment Organization (C3PAO) certify their implementation of NIST SP 800-171 security requirements. Assessors will evaluate how the contractor implements each of the 320 objectives across all applicable assets within scope, to include people, facilities and technologies.

K2 Compliance for CMMC

 

For Organizations Seeking Certification (OSC)

The assessment process is expected to involve a review of artifacts, interviews of key personnel and tests of the technical, administrative and physical controls. As organizations prepare their body of evidence, they should establish a relationship between the artifacts, the security requirement objectives, and assets within scope.

Helpful CMMC Resources

FOR CONSULTANTS AND MANAGED SERVICE PROVIDERS

Many small businesses in the defense industrial base rely on information security subject matter experts and managed service providers to assist them in the implementation and documentation NIST SP 800-171 controls. Our platform was designed with a multi tenant architecture, allowing for consultants to navigate to client datasets using a single logon.

K2 Compliance for CMMC Pricing

 

Preparedness Through Innovative Technology

K2 Compliance was initially developed to document our own implementation of the HIPAA Security Rule. As our compliance requirements evolved, we expanded it to document other frameworks such as SOC 2. During a Type II audit, our assessors noticed how efficient we were compared to other organizations struggling to keep up with tasks and organize documentation. During their presentation to our leadership team, they recommended we consider bringing K2 Compliance to market and suggested evaluating CMMC as a potential market to explore. Since then, we’ve made a series of enhancements specific to CMMC and we’re constantly working with our customers to improve its capabilities.

K2 Compliance for CMMC

Sophisticated Security

Integrate your existing Security Assertion Markup Language (SAML) Single Sign-On (SSO) for improved user experience and simplified administration.

API Integration

Application Programming Interfaces (APIs) allow for integration with your existing technology stack. Automate the input of artifacts or update Plans of Action and Milestones (POA&Ms) from your ticketing system.

Assessable Objectives

CMMC is assessed at the objective level for all assets within scope. Our tool calculates Level 2 compliance from the 320 objectives across all assets within scope.

AWS Cloud-Hosted

Every instance generated through K2 Compliance for CMMC exists within an AWS environment. For those with a lower risk tolerance, our interface can be built in an AWS FedRamp Moderate environment.

EXPORTABLE SSP

Export a system security plan (SSP) using the widely accepted FedRamp Moderate template tailored to meet requirement 3.12.4 from NIST SP 800-171.

MULTIPLE FRAMEWORKS SUPPORTED

Looking to go beyond the confidentiality requirements of NIST SP 800-171? We include other frameworks as well including HIPAA, NIST SP 800-172, NIST SP 800-53, and the NIST Cybersecurity Framework.


Schedule a demo to learn more about K2 Compliance for CMMC!

A Different Type of Deliverable

Small businesses are increasingly reliant on contracted information security professionals to assist them in understanding, implementing, and documenting the requirements of NIST SP 800-171. At the end of a ‘successful’ engagement, the deliverable is often an assortment of policies, procedures, artifacts and plans. However, policies should be updated annually, procedures, artifacts and plans change over time, and the responsibility is often on the small business to update the documentation. What if there was a better way…

K2 Compliance For Consultants and MSPs

Expiring Evidence

Specify the period of time an artifact is valid before it expires. Expirations can prompt reviews of procedures and artifacts before reaffirming that an objective is met for an asset within scope.

Delegated Assignments

Assign ownership at the practice and task levels to authorized users. Send electronic information requests to solicit input from non-system users.

Enhanced GAP Assessment

From a single workflow, assess NIST SP 800-171 at the objective level, generate a POA&M and SSP and calculate a Supplier Performance Risk System (SPRS) Score.

Meet New Prospects

When we have customers and prospects who need consulting services, we introduce them to a referral partner that is best suited to meet their needs.

Custom Templates

Jumpstart progress on new engagements by creating a template that references standard policies, procedures and technologies that are most commonly used by your customers.

Referral Model

If our tool helps you and your clients, we’ll share in the revenue you help us generate or pass the same percentage discount along to your customer.

 

Schedule a demo to learn more about K2 Compliance for CMMC!

Downloadable CMMC Resources

Regardless of your role in the ecosystem, we’ve curated a series of free resources to help further the cause of understanding and implementing NIST SP 800-171 in the defense industrial base.