While examining a contractor's audit and accountability policy, you realize they have documented types of events to be logged and defined content of audit records needed to support monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activities. After the logs are analyzed, the results are fed into a system that automatically generates audit records stored for 30 days. However, mechanisms implementing system audit logging are lacking after several tests because they produce audit logs that are too limited. You find that generated logs cannot be independently used to identify the event they resulted from because the defined content specified therein is too limited. Additionally, you realize the logs are retained for 24 hours before they are automatically deleted. Which of the following is a potential assessment method for AU.L2-3.3.1 -- System Auditing?
Comprehensive and Detailed In-Depth Explanatio n:
AU.L2-3.3.1 requires 'creating and retaining audit records with sufficient content.' Examining procedures (A) verifies if defined content meets requirements, addressing the scenario's deficiency (limited logs). Testing procedures (B) isn't standard, testing configs (C) is secondary, and examining mechanisms (D) isn't a method---testing them is. The CMMC guide lists procedural examination as key.
Extract from Official CMMC Documentation:
CMMC Assessment Guide Level 2 (v2.0), AU.L2-3.3.1: 'Examine procedures addressing audit record generation.'
NIST SP 800-171A, 3.3.1: 'Examine documented processes for content sufficiency.'
Resources:
https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level2_MasterV2.0_FINAL_202112016_508.pdf
When assessing a contractor's implementation of CMMC practices, you examine its SystemSecurity Plan (SSP) to identify its documented measures for audit reduction and reporting. They have a dedicated section in their SSP addressing the Audit and Accountability requirements. You proceed to interview their information security personnel, who informed you that the contractor has a dedicated Security Operations Center (SOC) and uses Splunk to reduce and report audit logs. What key features regarding the deployment of Splunk for AU.L2-3.3.6 -- Reduction & Reporting would you be interested in assessing?
Comprehensive and Detailed In-Depth Explanatio n:
AU.L2-3.3.6 requires 'audit reduction and report generation capabilities.' Key features to assess in Splunk are filtering to reduce logs and analysis/reporting (C), directly meeting objectives [a] and [b]. RBAC (A) relates to AU.L2-3.3.8, retention (B) to AU.L2-3.3.2, and dashboards (D) aren't required, per CMMC focus.
Extract from Official CMMC Documentation:
CMMC Assessment Guide Level 2 (v2.0), AU.L2-3.3.6: 'Assess tools for [a] reducing logs via filters, [b] generating reports with analysis.'
NIST SP 800-171A, 3.3.6: 'Examine reduction and reporting functions.'
Resources:
https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level2_MasterV2.0_FINAL_202112016_508.pdf
An OSC is preparing for a CMMC assessment. It has multiple information systems, some of which process CUI and others that do not. The OSC has identified a specific system that processes CUI and defined this as its system boundary. However, this system is connected to other systems within the OSC that are separately authorized and do not process CUI. As a Certified CMMC Assessor, which of the following best describes your approach to defining the CMMC Certification Boundary and Assessment Scope for the OSC?
Comprehensive and Detailed
The CMMC Assessment Process (CAP) distinguishes the Certification Boundary (the CUI-processing system) from the Assessment Scope (all components needing authorization, excluding separately authorized connected systems). The scoping guide and glossary confirm that separately authorized systems are out of scope, aligning with Option D. Option A is too broad, Option B too narrow, and Option C reverses the definitions. D is correct.
CMMC Assessment Process (CAP) v1.0, Section 2.1 (Certification Boundary), p. 8: 'The Assessment Scope excludes separately authorized systems.'
You are the Lead Assessor for a CMMC assessment of an OSC that has previously obtained ISO 27001 certification for its information security management system. During the initial discussions, the OSC requests that you consider their ISO 27001 certification and grant them credit toward their CMMC certification. They believe there is a significant overlap between CMMC and ISO 27001. What should your response to the OSC be?
Comprehensive and Detailed in Depth
The CAP explicitly states that other certifications like ISO 27001 do not grant automatic CMMC credit unless DoD policy allows (Option C). Options A, B, and D suggest potential credit without basis.
Extract from Official Document (CAP v1.0):
Section 1.1 -- Purpose (pg. 7):'Alternative cybersecurity certifications do not automatically bestow any status or credit towards CMMC certification unless DoD publishes non-duplication policies.'
CMMC Assessment Process (CAP) v1.0, Section 1.1.
SecureNet is a mid-sized company that designs and manufactures access control systems for government buildings. These systems utilize Internet of Things (IoT) devices embedded within the access control panels for real-time remote monitoring. SecureNet is undergoing a CMMC Level 2 assessment to comply with new government contracting requirements. During the scope validation stage, the Certified CMMC Assessor (CCA) will review SecureNet's proposed assessment scope with the IT team. The scope includes all servers, workstations, and laptops within SecureNet's network. However, there is no mention of the IoT devices within the access control panels. Which of the following asset categories is most likely to encompass the in-scope IoT devices used in SecureNet's access control systems?
Comprehensive and Detailed
IoT devices in access control panels are Specialized Assets per the CMMC Assessment Scope - Level 2, as they are non-standard equipment tied to contract performance. They may process or transmit CUI-related data (e.g., security monitoring), making them in scope, but they don't inherently provide security functions (Option A) or fit as CRMAs (Option D). ''Hardware Assets'' (Option C) is not a CMMC category. B is correct, and the IoT devices should be added to the scope.
CMMC Assessment Scope - Level 2, Section 2.3.4 (Specialized Assets), p. 6: 'IoT devices are Specialized Assets.'
Currently there are no comments in this discussion, be the first to comment!