Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » Generic » CMMC Maturity Level

CMMC Maturity Level

CMMC 2.0 has three distinct security levels: Level 1 (Foundational), Level 2 (Advanced), and Level 3 (Expert). The specific CMMC maturity level that your company needs to attain, along with the associated compliance, hinges on the sensitivity of the data set to handle. 

Level 1 (Foundational)

Level 1 emphasizes fundamental cybersecurity practices. Companies can implement these practices in an ad-hoc manner with minimal documentation. Certification at this level can be achieved through an annual self-assessment; third-party assessors do not evaluate process maturity.

Level 2 (Advanced)

Level 2 introduces a more structured approach, requiring organizations to document their processes for achieving CMMC Level 2 maturity. This documentation must enable users to replicate these processes effectively. Companies must rigorously adhere to their documented procedures to attain this level of maturity.

Level 3 (Expert)

At Level 3 of the CMMC model, the focus is on increasing the company’s defenses against advanced persistent threats (APTs). To achieve this, you must establish, maintain, and allocate resources for a comprehensive plan that oversees the implementation of cybersecurity practices. 

This plan includes various aspects, including setting goals, defining missions, managing projects, and more.

Additional reading

Security assessment

Security Assessment: Key Types and How to Get Started

Hackers today are constantly upgrading and using advanced techniques to exploit weaknesses and get their hands on data. As a CISO or founder, it is your responsibility to proactively develop countermeasures and protect your organization. The agility to respond however, comes with the understanding of your deficiencies. And that’s where security assessments come in.  Security…
Why SOC 2 for SaaS Companies is the Need of the Hour

Why SOC 2 for SaaS Companies is the Need of the Hour

$4.87 million! That’s the average cost of a cloud-based data breach with a lifecycle of over 200 days. With a cyber attack happening every 39 seconds, cybersecurity has become a widely debated subject, with security, compliance, and risk management as the top priorities going forward. That’s where SOC 2 comes in. A SOC 2 SaaS…
NIST Password Guidlines

NIST Password Guidelines: 11 Rules to Follow (Latest Version Updated)

Passwords have always been a contentious topic within the cybersecurity world and among everyday users. No one enjoys understanding the complex rules or changing passwords regularly just because the calendar says so.  Over the years, these frustrating requirements have led to poor password practices like sticky notes, password123, or reusing the same login across platforms….

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.