What the Heck is a “Key Internal Boundary”?
NIST SP 800-171 Control 3.13.1 / CMMC Practice SC.1.175 requires us to “Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational
NIST SP 800-171 Control 3.13.1 / CMMC Practice SC.1.175 requires us to “Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational
We’ve noticed some confusion from our clients stemming from the various ways the DoD uses the term “Basic” in conjunction with its supply chain cybersecurity.
The Cybersecurity Maturity Model Certification (CMMC) was designed to improve the security posture of the Defense Industrial Base. In developing the framework, Pentagon officials drew
USBs (as well as CDs, DVDs, etc.) are designed to provide removable storage for a computer. This storage includes both data files (Word documents, videos,
Totem Technologies’ Small Business CMMC Preparation Methodology This post describes Totem Technologies’ (Totem.Tech) three-phased approach and methodology to achieve CMMC Certification. We follow this Methodology
What the heck are processes acting on behalf of authorized users? Excellent question, especially since NIST SP 800-171 and CMMC discussion, guidance, examples, and “clarification”
Introduction to and Explanation of the Proposed DFARS Interim Rules In a proposal published in the Federal Register, the DoD has outlined three new DFARS
Introduction to the FAR and DFARS Rules The Federal Acquisition Regulation (FAR) provides a set of guidelines for how the US Federal Government can procure
How to Address the Totem Top 5 Cybersecurity Safeguards in NIST 800-171 and the CMMC Introduction and Revisiting the Top 5 Cybersecurity Safeguards The CMMC
(385) 492-3405
Copyright © 2024 Totem Technologies, LLC
All rights reserved. Privacy Policy.