Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » CMMC Assessment Scope

CMMC Assessment Scope

Determining the scope of your CMMC assessment is a need for a successful certification process. It sets the groundwork by outlining what you need to evaluate. This approach reduces the assessment’s duration and minimizes the impact of security controls on your workforce.

This is why it is essential to account for every asset, whether within or outside the scope of the assessment, that processes Controlled Unclassified Information (CUI) or is not intended for nCUI processing. Disagreements about assessment scope can lead to certification delays. 

CMMC Self-Assessment

If you’re an Organization Seeking Compliance (OSC) aiming for CMMC Level 1 or a subset of Level 2 OSCs handling non-critical national security information, you can opt for a self-assessment. This means that your organization’s CMMC lead will conduct the assessment internally.

Level 1 Self-Assessment

Level 1 assessments evaluate how the OSC safeguards Federal Contract Information (FCI) using the 17 NIST 800-171 controls that apply to Level 1. To achieve Level 1 compliance, all objectives within these 17 controls must be met.

Level 2 Self-Assessment

Level 2 OSCs must assess against NIST 800-171 (A) and meet all 110 control assessment objectives. Success at this level requires a comprehensive System Security Plan (SSP) that details how policies, procedures, and technologies align with each assessment objective.

Both Level 1 and Level 2 OSCs need to perform self-assessments annually. They must also provide an annual affirmation from a senior company official confirming compliance with all requirements. These self-assessments and affirmations must be registered in the DoD’s Supplier Performance Risk System (SPRS).

Additional reading

PCI Compliant Hosting (All you need to know)

If your organization stores or transmits online payment information on the server, Payment Card Industry (PCI) compliance is a must. Your web host must also meet this standard. However, it takes some research to find the best PCI compliant web hosting companies. Some platforms only provide PCI compliance with specific plans, so it’s critical to…
AI in IAM

AI in Identity & Access Management: Will It Disrupt or Sustain?

While digging through ISO 27001 experts on LinkedIn, I came across Alexandre Blanc’s insights on AI in security. Naturally, I was intrigued. Who better to discus IAM, which forms the backbone of ISO frameworks and every security strategy? Identity & Access Management (IAM) is at the core of protecting sensitive data so that only the…
7 Best security compliance software

Top Compliance Software to Automate & Streamline Audits

Every business strives to portray a strong security posture with a significant amount of effort going into making clients feel secure. Customers are more likely to consider a company that takes cybersecurity seriously. And this appeals to both new and returning clients.  One of the aspects that helps companies achieve this level of comfort and…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.