Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » CMMC Assessment Scope

CMMC Assessment Scope

Determining the scope of your CMMC assessment is a need for a successful certification process. It sets the groundwork by outlining what you need to evaluate. This approach reduces the assessment’s duration and minimizes the impact of security controls on your workforce.

This is why it is essential to account for every asset, whether within or outside the scope of the assessment, that processes Controlled Unclassified Information (CUI) or is not intended for nCUI processing. Disagreements about assessment scope can lead to certification delays. 

CMMC Self-Assessment

If you’re an Organization Seeking Compliance (OSC) aiming for CMMC Level 1 or a subset of Level 2 OSCs handling non-critical national security information, you can opt for a self-assessment. This means that your organization’s CMMC lead will conduct the assessment internally.

Level 1 Self-Assessment

Level 1 assessments evaluate how the OSC safeguards Federal Contract Information (FCI) using the 17 NIST 800-171 controls that apply to Level 1. To achieve Level 1 compliance, all objectives within these 17 controls must be met.

Level 2 Self-Assessment

Level 2 OSCs must assess against NIST 800-171 (A) and meet all 110 control assessment objectives. Success at this level requires a comprehensive System Security Plan (SSP) that details how policies, procedures, and technologies align with each assessment objective.

Both Level 1 and Level 2 OSCs need to perform self-assessments annually. They must also provide an annual affirmation from a senior company official confirming compliance with all requirements. These self-assessments and affirmations must be registered in the DoD’s Supplier Performance Risk System (SPRS).

Additional reading

Cybersecurity for Critical Infrastructure: Protecting Vital Assets

There’s a saying—if you can access something remotely, so can hackers. The increasing connectivity and convergence have, on one side, diminished physical perimeters, for the good. But they have also brought an increased influx of new threat classes. When it comes to critical infrastructure, though, the stakes are much higher—disruptions can impact essential services and…

Best Incident Management Software Tools in 2026

TL;DR An incident management software automates repetitive tasks such as issue assignment, escalation, and status updates and provides the tools to fast-track resolution. Most tools listed help you with on-call schedules, incident alerting, prioritization, triage and investigation, post-incident analysis and reporting, and centralized reporting. They charge on a per-agent basis.  When choosing a tool, you…

SOC 2 for Enterprises: Implementation Steps and Key Challenges

SOC 2 (Service Organization Control 2) is a leading compliance framework created by the AICPA that checks if a company’s security controls meet the five ‘Trust Service Criteria’: Security, Availability, Processing Integrity, Confidentiality, and Privacy. A SOC 2 certification provides independent assurance that your company follows best practices to keep data secure and services reliable….

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.