0 Reviews

CMMC Level 1 Policies & Standards (CMMC 1)

Email Delivery Within 1-2 Business Days

file types are bmp, gif, jpg, jpeg, jpe, jif, jfif, jfi, png, wbmp, xbm, tiff

NIST Cybersecurity Framework (NIST CSF) & FAR 52.204-21 Based Cybersecurity Policies & Standards for CMMC Level 1

The NIST Cybersecurity Framework (CSF) and FAR 52.204-21-based Written Information Security Program (WISP) is a set of cybersecurity policies and standards that is tailored for Cybersecurity Maturity Model Certification (CMMC) Level 1 organizations that do not need to address more rigorous requirements that are found in NIST 800-171 or more advanced CMMC levels. This product is ideal for organizations that need to align with a cybersecurity framework and meet CMMC Level 1 requirements, but do not have multiple statutory, regulatory and contractual obligations that are better addressed by a more robust cybersecurity framework.  


The FAR 52.204-21 cybersecurity requirements form the basis for what CMMC Level 1 practices require:

  1. Limit access to authorized users.
  2. Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
  3. Verify controls on connections to external information systems.
  4. Impose controls on information that is posted or processed on publicly accessible information systems.
  5. Identify information system users and processes acting on behalf of users or devices.
  6. Authenticate or verify the identities of users, processes, and devices before allowing access to an information system.
  7. Sanitize or destroy information system media containing Federal contract information before disposal, release, or reuse.
  8. Limit physical access to information systems, equipment, and operating environments to authorized individuals.
  9. Escort visitors and monitor visitor activity, maintain audit logs of physical access, control and manage physical access devices.
  10. Monitor, control, and protect organizational communications at external boundaries and key internal boundaries of information systems.
  11. Implement sub networks for publicly accessible system components that are physically or logically separated from internal networks.
  12. Identify, report, and correct information and information system flaws in a timely manner.
  13. Provide protection from malicious code at appropriate locations within organizational information systems.
  14. Update malicious code protection mechanisms when new releases are available.
  15. Perform periodic scans of the information system and real-time scans of files from scans of files from external sources as files are downloaded, opened, or executed.

Product Example - NIST Cybersecurity Framework WISP - Cybersecurity Policies & Standards

This version of the Written Information Security Program (WISP) is specifically designed for Organizations Seeking Certification (OSC) that need to comply with CMMC Level 1 certification requirements. This is based on the NIST Cybersecurity Framework (CSF) framework but contains FAR 52.204-21 cybersecurity controls, which are what CMMC Level 1 practices are based on. This is a good solution for organizations that need to demonstrate alignment with a leading cybersecurity framework and have documented policies and standards for a CMMC Level 1 audit. You get fully-editable Microsoft Word and Excel documents that you can customize for your specific needs.

2020-product-written-information-security-program-nist-csf-far-52.204-21-cmmc-cybersecurity-policy-2020.1.jpg   Watch Our Product Walkthrough Video   View Product Example



Example Mapping

Cost Savings Estimate - Written Information Security Program (WISP)

When you look at the costs associated with either (1) hiring an external consultant to write cybersecurity documentation for you or (2) tasking your internal staff to write it, the cost comparisons paint a clear picture that buying from ComplianceForge is the logical option. Compared to hiring a consultant, you can save months of wait time and tens of thousands of dollars. Whereas, compared to writing your own documentation, you can potentially save hundreds of work hours and the associated cost of lost productivity. Purchasing the WISP from ComplianceForge offers these fundamental advantages when compared to the other options for obtaining quality cybersecurity documentation:

  • For your internal staff to generate comparable documentation, it would take them an estimated 360 internal staff work hours, which equates to a cost of approximately $25,000 in staff-related expenses. This is about 3-6 months of development time where your staff would be diverted from other work.
  • If you hire a consultant to generate this documentation, it would take them an estimated 200 consultant work hours, which equates to a cost of approximately $58,000. This is about 2-3 months of development time for a contractor to provide you with the deliverable.
  • The WISP is approximately 2% of the cost for a consultant or 4% of the cost of your internal staff to generate equivalent documentation.
  • We process most orders the same business day so you can potentially start working with the WISP the same day you place your order.


The process of writing cybersecurity documentation can take an internal team many months and it involves pulling your most senior and experienced cybersecurity experts away from operational duties to assist in the process, which is generally not the most efficient use of their time. In addition to the immense cost of hiring a cybersecurity consultant at $300/hr+ to write this documentation for you, the time to schedule a consultant, provide guidance and get the deliverable product can take months. Even when you bring in a consultant, this also requires involvement from your internal team for quality control and answering questions, so the impact is not limited to just the consultant's time being consumed. 


Comprehensive NIST Cybersecurity Framework & FAR 52.204-21-Based Documentation

Unlike some of our competition that sell “bronze, silver and gold” levels of documentation, we understand that a standard is a standard for a reason. We take out the guesswork associated with picking an appropriate package level - we focus on providing documentation that offers a straightforward solution to provide the appropriate coverage you need. This focus on providing the best solution for our clients makes us proud that we are providing the best set of IT security policies and standards available. Saving a few dollars on a cheap solution can easily leave you with a false sense of security and gaping holes in your documentation that can leave you liable.




The FAR-based WISP can serve as a foundational element in your organization's cybersecurity program. It can stand alone or be paired with other specialized products we offer. This product is an editable, easily implemented document that contains the policies, standards and guidelines that your company can use to establish a leading framework-based cybersecurity security program. Being Microsoft Word documentation, you have the ability to make edits to the documentation.

Our documentation is meant to address your requirements from strategic concepts all the way down to day-to-day deliverables you need to demonstrate compliance with common statutory, regulatory and contractual obligations. We offer up to 40% discounts on our documentation bundles, so please be aware that you have benefit from significant savings by bundling the documentation you need. You can see the available bundles here

We are here to help make comprehensive cybersecurity documentation as easy and as affordable as possible. We serve businesses of all sizes, from the Fortune 500 all the way down to small businesses, since our cybersecurity documentation products are designed to scale for organizations of any size or level of complexity. Our affordable solutions range from cybersecurity policies & standards documentation, to NIST 800-171 compliance checklists, to program-level documentation, such as "turn key" incident responserisk management or vulnerability management program documents. Our focus is on helping you become audit ready!


What Is The NIST CSF & FAR 52.204-21 Written Information Security Program (WISP)?

Our products are one-time purchases with no software to install - you are buying Microsoft Office-based documentation templates that you can edit for your specific needs. If you can use Microsoft Office or OpenOffice, you can use this product! The WISP contains NIST Cybersecurity Framework (NIST CSF) based cybersecurity policies & standards in an editable Microsoft Word format:

  • The WISP contains NIST Cybersecurity Framework (CSF) & FAR 52.204-21-based cybersecurity policies & standards in an editable Microsoft Word format.
  • Each of the NIST Cybersecurity Framework, FAR 52.204-21 and CMMC Level 1 controls are mapped to a standard within the WISP and each of those standards is mapped to a policy statement.
  • The WISP addresses the “why?” and “what?” questions in an audit, since policies and standards form the foundation for your cybersecurity program.
  • The WISP provides the underlying cybersecurity standards that must be in place, as stipulated by statutory, regulatory and contractual requirements.
  • Just as Human Resources publishes an “employee handbook” to let employees know what is expected for employees from a HR perspective, the WISP does this from a cybersecurity perspective.

What Problem Does The WISP Solve?

  • Lack of In House Security Experience - Writing security documentation is a skill that many good cybersecurity professionals simple are not proficient at and avoid the task at all cost. Tasking your security analysts and engineers to write comprehensive documentation means you are actively taking them away from protecting and defending your network, which is not a wise use of their time. The WISP is an efficient method to obtain comprehensive NIST CSF based security policies and standards for your organization!
  • Compliance Requirements - Nearly every organization, regardless of industry, is required to have formally-documented security policies and standards. The NIST CSF WISP is designed for smaller organizations and focuses on leading security frameworks to address reasonably-expected security requirements. The WISP maps to several leading compliance requirements so you can clearly see what is required!
  • Audit Failures - Security documentation does not age gracefully like a fine wine. Outdated documentation leads to gaps that expose organizations to audit failures and system compromises. The WISP's standards provides mapping to leading security frameworks to show you exactly what is required to both stay secure and compliant.  
  • Vendor Requirements - It is very common for clients and partners to request evidence of a security program and this includes policies and standards. The WISP provides this evidence!

How Does The Wisp Solve It

  • Clear Documentation - The WISP provides comprehensive documentation to prove that your security program exists. This equates to a time saving of hundreds of hours and tens of thousands of dollars in staff and consultant expenses!
  • Time Savings - The WISP can provide your organization with a semi-customized solution that requires minimal resources to fine tune for your organization's specific needs. 
  • Alignment With Leading Practices - The NIST-based WISP is written to align your organization with the NIST Cybersecurity Framework! 


This Is How Good Cybersecurity Documentation Is Meant To Be Structured!

ComplianceForge provides businesses with exactly what they need to protect themselves - professionally written policies, procedures, standards and guidelines at a very affordable cost. Similar documentation standards can be found in Fortune 500 company that have dedicated IT Security staff. All information security policies and standards are backed up by documented best practices.


Hierarchical Approach - Built To Scale & Evolve With Your Business 

Our experience has proven that when it comes to Information Security policies, a standard is a standard for a reason. With that in mind, our Written Information Security Program (WISP) is based on industry-recognized best practices and Information Security standards so that you can meet your legal requirements. Unlike some competitor sites that offer “Bronze, Silver or Gold” packages that may leave you critically exposed, we offer a comprehensive Information Security solution to meet your specific compliance requirements. Why is this? It is simple - in the real world, compliance is penalty-centric. Courts have established a track record of punishing businesses for failing to perform “reasonably expected” steps to meet compliance with known standards. 

The Written Information Security Program (WISP) follows a hierarchical approach to how the structure is designed so that standards map to control objectives and control objectives map to policies. This allows for the standards to be logically grouped to support the policies.


Example Content  
comprehensive-cybersecurity-documentation.jpg   comprehensive-cybersecurity-documentation-example.jpg

Policies are “high level” statements of management’s intent and are intended to guide decisions to achieve rational outcomes. Policies are not meant to be prescriptive, but provide an overall direction for the organization.

Control Objectives support policy by identifying applicable requirements that the organization needs to address. These applicable requirements can be best practices, laws or other legal obligations.

Standards establish formal requirements in regards to processes, actions and configurations. Standards are entirely focused on providing narrowly-focused, prescriptive requirements that are quantifiable.

Procedures are formal methods of performing a task, based on a series of actions conducted in a defined and repeatable manner.

Controls are technical or administrative safeguards that may prevent, detect or lessen the ability of the threat actor to exploit a vulnerability.

Metrics are designed to facilitate decision-making, improve performance, and improve accountability through the collection, analysis, and reporting of relevant performance-related data.



Videos Hide Videos Show Videos

Related Products

Related Products


Find Out Exclusive Information On Cybersecurity