Strunk
  • Compliance
  • Profitability
    • Pricing Manager
    • Overdraft Privilege
    • Econocheck
  • Connect
    • The Strunk Perspective
    • Contact Us
  • Login
  • DEMO
  • Menu Menu
  • X
  • LinkedIn

Cybersecurity Maturity Model Certification (CMMC) Audits Made Easy

January 8, 2020/in Risk Manager, SOC2/by Noah Rosenberg

Recently the US Federal Government announced plans to impose a cybersecurity audit and certificate program referred to as the Cybersecurity Maturity Model Certification (CMMC), which will be used as a standard requirement for all firms dealing with DoD data.  The CMMC closely follows established frameworks pulling heavily from the NIST CMF and 800-171 publications.  The obvious advantages of using a ubiquitous framework and assessment to ensure compliance with these new regulations helps to reinforce many of the best practices that firms in this space should have already been following.

Each firm must record their policies, procedures, and controls related to the NIST frameworks, showing a clearly delineated map of these relationships for auditors to follow, test, and critique.  The DoD recently announced that they plan to start the audit process in 2020 with more than 60% of firms expected to have completed their requirements by the end of the year.  This leaves firms with sparse time to evaluate and immortalize their processes, with a narrow window to fix non-compliant or lacking areas of their cybersecurity framework.

These moves by the Federal Government and the DoD are being widely celebrated by the cyber defense industry as a win against unintentional release of classified information, and as strong guidance for the industry to help ensure a curb in the currently vulnerable industry.  With a long history of leaks, and hacks, the government consulting and data analytics firms, that make up much of the cyber defense of the country, will be helping to ensure our enemies have one less tool to utilize.

With StrunkAccess Risk and Policy Manager consulting firms are finding a tool that can help navigate through the complicated process of becoming compliant with risk frameworks, helping to protect their companies and clients.  From SOC 2 to NIST to any risk framework, StrunkAccess is an elegant solution utilized to help hundreds of companies evaluate, record, and manage their risks.

Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail
https://strunkaccess.com/wp-content/uploads/2019/12/cybersecurity.png 675 1200 Noah Rosenberg https://strunkaccess.com/wp-content/uploads/2022/03/Strunk-Original-300x100.png Noah Rosenberg2020-01-08 05:54:252020-02-27 05:05:26Cybersecurity Maturity Model Certification (CMMC) Audits Made Easy

Recent Articles

  • Banks Can Increase Customer Satisfaction & Fee Income at the Same TimeMay 7, 2025 - 10:00 am
  • Options for ODP Manager AccessApril 24, 2025 - 10:00 am
  • How can Strunk’s Vendor Manager software support your organization’s Third-Party Risk Management process?April 9, 2025 - 10:00 am
  • Bankers Look for Ways to Make More MoneyApril 2, 2025 - 10:00 am

GRC Topics

  • Banks
  • COCC
  • Compliance
  • Credit Unions
  • Financial Services
  • FINSYNC
  • Markets
  • Overdraft Privilege
  • Perspectives
  • Policy Manager
  • Pricing Manager
  • Risk Manager
  • Sales
  • Secure Checking
  • SOC2
  • Tips
  • Uncategorized
  • Vendor Manager
  • WBA
Schedule A Demo

An independent certified public accountant has examined Strunk’s operations and found them to be in compliance with the AICPA’s Trust Service Principles. It was determined that Strunk meets the Security, Availability, Processing Integrity, Confidentiality, and Privacy criteria for SOC 2 established by the AICPA.

© Copyright - Strunk | Privacy Policy | Security Policy | Business Continuity Policy
Scroll to top