Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » CMMC Assessment Scope

CMMC Assessment Scope

Determining the scope of your CMMC assessment is a need for a successful certification process. It sets the groundwork by outlining what you need to evaluate. This approach reduces the assessment’s duration and minimizes the impact of security controls on your workforce.

This is why it is essential to account for every asset, whether within or outside the scope of the assessment, that processes Controlled Unclassified Information (CUI) or is not intended for nCUI processing. Disagreements about assessment scope can lead to certification delays. 

CMMC Self-Assessment

If you’re an Organization Seeking Compliance (OSC) aiming for CMMC Level 1 or a subset of Level 2 OSCs handling non-critical national security information, you can opt for a self-assessment. This means that your organization’s CMMC lead will conduct the assessment internally.

Level 1 Self-Assessment

Level 1 assessments evaluate how the OSC safeguards Federal Contract Information (FCI) using the 17 NIST 800-171 controls that apply to Level 1. To achieve Level 1 compliance, all objectives within these 17 controls must be met.

Level 2 Self-Assessment

Level 2 OSCs must assess against NIST 800-171 (A) and meet all 110 control assessment objectives. Success at this level requires a comprehensive System Security Plan (SSP) that details how policies, procedures, and technologies align with each assessment objective.

Both Level 1 and Level 2 OSCs need to perform self-assessments annually. They must also provide an annual affirmation from a senior company official confirming compliance with all requirements. These self-assessments and affirmations must be registered in the DoD’s Supplier Performance Risk System (SPRS).

Additional reading

Minimum Baseline Security Standards: Your SMB’s First Line of Defense

Do you know what keeps compliance leaders up at night? Cybersecurity. While you focus on building new products and scaling your infrastructure, cybercriminals are also sharpening their skills with each passing day.  But worrying is natural. Data breaches exposed 7 billion records in just the first half of 2024. Most of these attacks succeed not because hackers…

How to Implement the COSO Framework for Stronger Internal Controls?

“Most of the time, security is about discipline and processes around crucial activities—like how you onboard or offboard employees or push code to production,” says Girish Redekar, co-founder at Sprinto, while highlighting a fundamental truth about building resilience. A set of structured processes and disciplined execution is the key to weaving a strong security fabric…

Integrating DORA Principles into Essential 8 Strategies

What if the tools you rely on to protect your organization’s networks are only solving part of the problem?  The Essential Eight has long been a trusted framework for securing IT systems. Still, as cyber threats grow more sophisticated, strategies that address resilience on a deeper, more dynamic level are needed.  This is where the…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.