Don’t ignore NIST 800-171 while waiting on CMMC
Rick Palermo Rick Palermo

Don’t ignore NIST 800-171 while waiting on CMMC

The DFARS 252.204-7012 rule has been around since 2016 and the Government fully expects contractors to already be in compliance with the 110 security controls established in NIST SP 800-171. As the Defense Industrial Base awaits the results of the rulemaking process and the adoption of DFARS rule 252.204-7021 that will require third-party CMMC certification, we all should have implemented the 110 controls by now. The only new requirement CMMC adds is the third-party assessment and certification requirement.

Read More
CMMC Scoping
Rick Palermo Rick Palermo

CMMC Scoping

Knowing what CUI you have, where it’s located and how it flows through your network will allow you to focus limited resources on hardening those assets. Attempting to harden and certify your entire network strains already overtaxed resources and exposes you to the additional, unnecessary challenges, of protecting them to NIST SP 800-171 standards. Only harden and certify those assets that process, store, and transmit CUI. By doing so you reduce your costs and your attack surfaces.

Read More
Writing Solid Implementation Procedures
Rick Palermo Rick Palermo

Writing Solid Implementation Procedures

How do you go about writing solid implementation procedures? The first step is to understand what the control objective requirements are and then to ensure you answer all the requirements with enough information to allow a stranger to pick up the procedures and recreate your original environment.

Read More
Documenting NIST 800-171 and CMMC
Rick Palermo Rick Palermo

Documenting NIST 800-171 and CMMC

When it’s all said and done, you’re looking at a minimum of over 240 pages of documentation. That’s only a few weeks’ worth of writing, coordinating, and staffing. I hope you’re not starting from scratch!

Read More
Improving your Zero-Trust Security with Cloudflare Access and HashiCorp Boundary
Brian Boswell Brian Boswell

Improving your Zero-Trust Security with Cloudflare Access and HashiCorp Boundary

In this article, we will show how you can take a standard VPN-protected private network and implement these two tools to amplify your zero-trust practices. We’ll start by handling external threats with Cloudflare Access, where we will remove our VPN edge device; eliminating standard internet ingress to our network while still allowing authorized users in. Next, we’ll protect our internal network resources by using Hashicorp’s Boundary to restrict network visibility, better contain threats, and add strict identify-based access to individual resources.

Read More