0 Reviews
$26,240.00 $15,744.00
(You save $10,496.00)

CMMC Bundle 2: Enhanced Coverage (CMMC 1-4)

SKU:
CMMC-B2
Availability:
Email Delivery Within 1-2 Business Days

file types are bmp, gif, jpg, jpeg, jpe, jif, jfif, jfi, png, wbmp, xbm, tiff

NIST 800-171 & Cybersecurity Maturity Model Certification (CMMC) Compliance Bundle #2 (40% discount)

This bundle is designed for organizations that need to comply with NIST 800-171 and CMMC Levels 1-4. This is beyond just the cybersecurity policies and standards and addresses the unique compliance needs for NIST 800-171 and CMMC. The end result is a comprehensive, customizable, easily implemented set of documentation that your company needs to establish an NIST 800-53-based cybersecurity program. Being Microsoft Word documents, you have the ability to make edits, as needed. 

Focused on NIST 800-171 & CMMC Level 1-4 Compliance - ENHANCED DOCUMENTATION COVERAGE

In the downloadable CMMC requirements mapping matrix shown below, you can see how all CMMC Level 1, 2, 3 & 4 requirements are supported by the NIST 800-53 Low/Moderate/High Baseline Version of the Written Information Security Program (WISP-LMH).

 2020-02-03-cmmc-v1.0-requirements-matrix-download.jpg

2020-cybersecurity-goldilocks-spectrum-comparison-nist-800-171-cmmc.jpg

Cost Savings Estimate - NIST 800-171 Bundle #2

When you look at the costs associated with either (1) hiring an external consultant to write cybersecurity documentation for you or (2) tasking your internal staff to write it, the cost comparisons paint a clear picture that buying from ComplianceForge is the logical option. Compared to hiring a consultant, you can save months of wait time and tens of thousands of dollars. Whereas, compared to writing your own documentation, you can potentially save hundreds of work hours and the associated cost of lost productivity. Purchasing this bundle from ComplianceForge offers these fundamental advantages when compared to the other options for obtaining quality cybersecurity documentation:

  • For your internal staff to generate comparable documentation, it would take them an estimated 2,260 internal staff work hours, which equates to a cost of approximately $169,500 in staff-related expenses. This is about 20-30 months of development time where your staff would be diverted from other work.
  • If you hire a consultant to generate this documentation, it would take them an estimated 1,465 contractor work hours, which equates to a cost of approximately $439,500. This is about 12-15 months of development time for a contractor to provide you with the deliverable.
  • This bundle is approximately 6% of the cost for a consultant or 15% of the cost of your internal staff to generate equivalent documentation.
  • We process most orders the same business day so you can potentially start working with the documentation the same day you place your order.

2020-pricing-bundle-cmmc-b2-2.jpg

Products Included in NIST 800-171 Bundle #2 (WISP-LMH version)

The NIST 800-171 bundles #2 and #3 contain the same documentation, except for the policies and standards. Bundle #2 uses the NIST 800-53-based Written Information Security Program (WISP) and Bundle #3 uses the Digital Security Program (DSP). The DSP is targeted for larger, enterprise environments, but more differences between the WISP and DSP can be read about here.

2020-logo-written-information-security-program-wisp-.jpg

Written Information Security Program (WISP) - NIST 800-53 rev4 (LOW/MODERATE/HIGH BASELINES)

NIST 800-53-based cybersecurity policies & standards in an editable Microsoft Word format.

  • The WISP addresses the “why?” and “what?” questions in an audit, since policies and standards form the foundation for your cybersecurity program.
  • Under each of the policies are standards that support those policy statements.
  • WISP contains many useful supplemental documentation templates:
    • Business Impact Analysis (BIA) template
    • Data classification & handling guidelines
    • Data retention guidelines
    • Rules of behavior (acceptable use)
    • Bring Your Own Device (BYOD) usage guidelines
    • Risk management guidelines
    • System hardening guidelines
    • and more templates
2020-logo-nist-800-171-cmmc-compliance-criteria-nc3-.jpg NIST 800-171 & CMMC Compliance Criteria (NC3)
This is our “consultant in a box” NIST 800-171 checklist in an editable Microsoft Excel format to provide usable guidance on what is expected to reasonably address NIST 800-171 and CMMC controls.
  • Each of the NIST 800-171 controls for Controlled Unclassified Information (CUI) from Appendix D is mapped to its corresponding NIST 800-53 control.
  • In addition to CUI controls, Non-Federal Organization (NFO) controls from Appendix E.
  • Each of the NIST 800-171 controls are broken down to identify:
    • Reasonably-expected criteria to address the control.
    • Applicable compliance guidance;
    • Methods to address the requirement; and
    • Status of compliance for each control so you can use it for a self-assessment.
    • The NC3 maps into the WISP and DSP products, so they work in concert together for helping you comply with NIST 800-171.
2020-logo-nist-800-171-system-security-plan-ssp-template.jpg System Security Plan (SSP) & Plan of Action & Milestones (POA&M) Templates 
These are fully editable templates to address a compliance need for NIST 800-171 and CMMC.
  • One template is a Microsoft Word-based System Security Plan (SSP) that contains all the criteria necessary to have your SSP documented to meet NIST 800-171 compliance expectations.
  • One template is a Microsoft Excel-based Plan of Action & Milestones (POA&M) that contains fields necessary to track control deficiencies from identification through remediation.
2020-logo-cybersecurity-standardized-operating-procedures-csop-.jpg

Cybersecurity Standardized Operating Procedures Template (CSOP) - WISP version
The WISP version of the CSOP is a template for procedures. This is an expectation that companies have to demonstrate HOW cybersecurity controls are actually implemented. 

  • This is an editable Microsoft Word document.
  • Given the difficult nature of writing templated procedure statements, we aimed for approximately a "80% solution" since it is impossible write a 100% complete cookie cutter procedure statement that can be equally applied across multiple organizations. What this means is ComplianceForge did the heavy lifting and you just need to fine-tune the procedure with the specifics that only you would know to make it applicable to your organization. It is pretty much filling in the blanks and following the helpful guidance that we provide to identify the who/what/when/where/why/how to make it complete.
  • The CSOP is mapped to leading frameworks to help with mapping compliance requirements.
2020-logo-integrated-incident-response-program-iirp-.jpg Integrated Incident Response Program (IIRP)
The IIRP addresses the “how?” questions for how your company manages cybersecurity incidents.
  • This is primarily an editable Microsoft Word document, but it comes with Microsoft Excel and Microsoft Visio templates.
  • In summary, this addresses fundamental needs when it comes to incident response requirements:
    • Defines the hierarchical approach to handling incidents.
    • Categorizes eleven different types of incidents and four different classifications of incident severity.
    • Defines the phases of incident response operations, including deliverables expected for each phase.
    • Defines the Integrated Security Incident Response Team (ISIRT) to enable a unified approach to incident response operations.
    • Defines the scientific method approach to incident response operations.
    • Provides guidance on how to write up incident reports (e.g., lessons learned).
    • Provides guidance on forensics evidence acquisition.
    • Identifies and defines Indicators of Compromise (IoC).
    • Identifies and defines sources of evidence.  
    • The IIRP contains “tabletop exercise” scenarios, based on the categories of incidents.
    • This helps provide evidence of due care in how your company handles cybersecurity incidents.
    • The IIRP is based on industry-leading practices for incident response.
2020-logo-product-risk-management-program-rmp-.jpg Risk Management Program (RMP)
The RMP addresses the “how?” questions for how your company manages risk.
  • This is an editable Microsoft Word document that provides program-level guidance to directly supports the WISP and DSP policies and standards for managing cybersecurity risk.
  • In summary, this addresses fundamental needs when it comes to risk management requirements:
    • How risk is defined.
    • Who can accept risk.
    • How risk is calculated by defining potential impact and likelihood.
    • Necessary steps to reduce risk.
    • Risk considerations for vulnerability management.
    • The RMP is based on leading frameworks, such as NIST 800-37, NIST 800-39, ISO 31010 and COSO 2013.
2020-logo-cybersecurity-risk-assessment-cra-template.jpg Cybersecurity Risk Assessment (CRA) Template
The CRA supports the RMP product in answering the “how?” questions for how your company manages risk.
  • This contains both an editable Microsoft Word document and Microsoft Excel spreadsheet that allows for professional-quality risk assessments.
  • The CRA directly supports the Risk Management Program (RMP), as well as the WISP/DSP's policies and standards, for managing cybersecurity risk. It does this by enabling your company to produce risk assessment reports.
2020-logo-vulnerability-patch-management-program.jpg Vulnerability & Patch Management Program (VPMP)
The VPMP addresses the “how?” questions for how your company manages technical vulnerabilities and patch management operations.
  • This is an editable Microsoft Word document that provides program-level guidance to directly supports the WISP and DSP policies and standards for managing vulnerabilities.
  • In summary, this addresses fundamental needs when it comes to vulnerability management requirements:
    • Who is responsible for managing vulnerabilities.
    • What is in scope for patching and vulnerability management.
    • Defines the vulnerability management methodology.
    • Defines timelines for conducting patch management operations.
    • Considerations for assessing risk with vulnerability management.
    • Vulnerability scanning and penetration testing guidance.
2020-logo-vendor-compliance-program.jpg Vendor Compliance Program (VCP)
The VCP addresses the “how?” questions for how your company manages risk with third parties (e.g., service provides, vendors, contractors, etc.).
  • This is an editable Microsoft Word document that is essentially a “mini-WISP” document that is intended to be shared with third parties, as compared to sharing detailed policies and standards.
  • The VCP contains concise cybersecurity-related expectations that your company expects your third parties to abide by.
  • The text from the VCP can be used in a contract addendum or shared as a stand-alone document.
  • The VCP helps provide evidence of due care in how your company informs third parties about their cybersecurity obligations.
2020-logo-security-privacy-by-design-spbd-.jpg Security & Privacy by Design (SPBD)
The SPBD addresses the “how?” questions for how your company ensures both security and privacy principles are operationalized.
  • This is an editable Microsoft Word document that provides program-level guidance to directly supports the WISP and DSP policies and standards for ensuring secure engineering and privacy principles are operationalized on a daily basis.
  • The concept of “secure engineering” is mandatory in numerous statutory, regulatory and contractual requirements. The SPBD provides a “paint by numbers” approach to ensure your company has evidence of both due care and due diligence for operationalizing security and privacy principles.
  • The SPBD is based on numerous industry frameworks, but the core is NIST 800-160, which is the de facto standard on secure engineering.
2020-logo-continuity-of-operations-program.jpg Continuity of Operations Program (COOP)
The COOP addresses the “how?” questions for how your company plans to respond to disasters to maintain business continuity.
  • This is an editable Microsoft Word document that provides program-level guidance to directly supports the WISP's policies and standards for disaster recovery and business continuity operations.
  • The concept of “continuity operations” spans incident response to disaster recovery to business continuity operations. This is a very common requirement in numerous statutory, regulatory and contractual requirements. The COOP provides your organization with the documentation to prove it addresses both disaster recovery and business continuity.
  • The COOP is based on numerous frameworks to provide a holistic approach to DR and BC operations. 
2020-logo-secure-baseline-configurations.jpg Secure Baseline Configurations (SBC)
The SBC addresses the “how?” questions for how your company securely configures its technology assets, such as system hardening according to CIS Benchmarks, DISA STIGs or vendor recommendations.
  • This is an editable Microsoft Word document that provides program-level guidance to direct systems administrators, third-parties and other asset custodians on the expectation to harden operating systems, applications and services.
  • The hardening of systems is a basic requirement, but most organization struggle with a way to document the requirements they are using to secure their assets. This is where the SBC comes into play.
  • The SBC leverages multiple sources for "industry best practices" and you are able to select what works best for your organization. 
2020-logo-information-assurance-program-iap-.jpg Information Assurance Program (IAP)
The IAP addresses the “how?” questions for how your company performs pre-production testing to ensure that both cybersecurity and privacy principles are built-in by default.
  • This is an editable Microsoft Word document that provides program-level guidance to conduct pre-production testing that ties in with existing SDLC/PDLC processes.
  • The IAP leverages multiple sources for "industry best practices" and is based on practices used by the US Government for Information Assurance (IA) and Security Testing & Evaluation (ST&E).
2020-logo-cybersecurity-business-plan.jpg Cybersecurity Business Plan (CBP)
The CBP is a cybersecurity-focused business planning template to document your organization's cybersecurity strategy and roadmap.
  • This is an editable Microsoft Word document that provides an easy-to-follow template to build out a cybersecurity strategy and a roadmap to improve the cybersecurity practices of your organization. 
  • CMMC requirement CA.4.163 requires organizations to "create, maintain and leverage a security strategy and roadmap for organizational cybersecurity improvement" that is a requirement for all CMMC 4 & 5 organizations.

What ComplianceForge Products Apply To NIST 800-171 Compliance?

Based on the requirements from DFARS, we made this bundle to simplify the efforts to comply. When you break down the requirements to comply with DFARS / NIST 800-171, you will see how the products address a specific compliance need:

ComplianceForge Product DFARS Requirement
Written Information Security Program (WISP) NIST 800-53 rev4 low/mod/high baselines 252.204-7008
252.204-7012
NIST 800-171 (multiple NFO controls)
Vendor Compliance Program (VCP) 252.204-7008
252.204-7012
NIST 800-171 NFO PS-7
Cybersecurity Risk Management Program (RMP) 252.204-7008
252.204-7012
NIST 800-171 NFO RA-1
Cybersecurity Risk Assessment Template (CRA) 252.204-7008
252.204-7012
NIST 800-171 3.11.1
Vulnerability & Patch Management Program (VPMP) 252.204-7008
252.204-7012
NIST 800-171 3.11.2
Integrated Incident Response Program (IIRP) 252.204-7008
252.204-7009
252.204-7010
252.204-7012
NIST 800-171 3.6.1
Security & Privacy By Design (SPBD) 252.204-7008
252.204-7012
NIST 800-171 NFO SA-3
System Security Plan (SSP) 252.204-7008
252.204-7012
NIST 800-171 3.12.4
Cybersecurity Standardized Operating Procedures (CSOP) 252.204-7008
252.204-7012
NIST 800-171 (multiple NFO controls)
Continuity of Operations Plan (COOP) 252.204-7008
252.204-7012
NIST 800-171 3.6.1
Secure Baseline Configurations (SBC) 252.204-7008
252.204-7012
NIST 800-171 3.4.1
Information Assurance Program (IAP) 252.204-7008
252.204-7012
NIST 800-171 NFO CA-1
Cybersecurity Business Plan (CBP) CMMC - CA.4.163

Please note that if you want a customized bundle, we are happy to create one for you. Just contact us with your needs and we will generate a quote for you.

Related Products

Related Products

Reviews


Find Out Exclusive Information On Cybersecurity