SME, Inc.

  • Home
  • About Us
  • Services
    • Cloud Solutions
    • Compliance Solutions
      • ALTA Best Practices
      • CMMC
      • DFARS
      • HIPAA
      • PCI DSS
      • Security Awareness Training
    • Data Center Services
      • Hosting
      • Monitoring
      • Hands & Eyes
    • Managed Security Services
      • Asset Management
      • Nextwall™ Managed Firewall
      • IDS/IPS
      • Managed Anti-Virus
      • VPN/Remote Access
      • Vulnerability Assessment Services
        • External Vulnerability Assessment
        • Internal Vulnerability Assessment
        • Web Application Testing
    • Technical Support
      • The SME Tech
      • Backups
      • Remote Support
  • Blog
  • Contact Us

November 18, 2024 By Rich Westbrook

Security Implementation Program: A Comprehensive Guide to CMMC L2 Compliance

Security Program Implementation Program: A Comprehensive Guide to CMMC L2 Compliance

Implementing a robust security program for Cybersecurity Maturity Model Certification (CMMC) Level 2 compliance can seem complex, but it is essential for organizations managing Controlled Unclassified Information (CUI). This is a high-priority consideration for companies who work with or are contractors for the Department of Defense (DoD). Following a phased approach ensures each step is strategically organized, making the journey to compliance smooth, structured, and sustainable. Below, we break down each phase of the security program implementation, detailing the purpose and key tasks involved to achieve a compliant and secure operational environment.

Phase 1: Assess

CMMC L2 Scoping Exercise

The first step in implementing a CMMC Level 2-compliant security program is to understand where CUI resides within your organization and how it flows. CUI encompasses sensitive data that requires controlled access, and this information might be handled by various people, systems, and devices within your network. The CMMC L2 Scoping Exercise identifies all assets that interact with CUI, establishing a clear scope for the assessment. This phase ends with the creation of an Assessment Scope document, which categorizes assets based on their interactions with CUI, laying the groundwork for a focused and accurate assessment.

CMMC L2 Assessment

Utilizing a Compliance Management Platform (CMP), we assess the organization’s current security posture against CMMC L2 standards. The CMP enables a streamlined approach to the entire security program lifecycle, including documentation, evidence collection, task management, and reporting. Through this assessment, we identify gaps and generate necessary documents such as the System Security Plan (SSP), the Plan of Action and Milestones (POA&M), and calculate the Supplier Performance Risk System (SPRS) score—crucial for demonstrating compliance with contractual obligations.

Phase 2: Plan

CMMC L2 Program Documentation

Once the assessment is complete, we move to the planning phase, where program documentation is drafted. During this phase, we work closely with your team to create a comprehensive set of policies, procedures, checklists, and monitoring practices tailored to meet CMMC Level 2 requirements. This documentation forms the backbone of your security program, setting a structured approach to compliance activities. Notably, you’ll need to license the documentation package from our preferred vendor, ensuring standardized and reliable documentation.

The objective is not only to fulfill compliance requirements but also to maintain ongoing evidence of your security practices. By establishing clear documentation, your organization gains a clear, actionable roadmap for maintaining compliance and tracking key security activities over time.

Phase 3: Build

CMMC L2 CUI Enclave

Building a secure environment for managing CUI is critical for compliance. Microsoft’s Cloud platform is leveraged to establish a secure enclave, designed specifically for handling sensitive information. The CUI Enclave consists of Microsoft 365 GCC (Government Community Cloud) for collaboration tools such as Exchange, SharePoint, Teams, and OneDrive. Additionally, Azure Government is employed to create a Virtual Desktop Environment that is securely partitioned.

We configure supplementary services such as Entra ID, Defender, Purview, Sentinel, and Intune, applying security policies that align with the documentation created in the planning phase. This secure enclave becomes the operational hub for all CUI activities, ensuring that sensitive data is protected at every access point.

Phase 4: Onboarding

Onboarding, Training, and Testing

As the technical foundation is built, the onboarding phase brings users into the secure CUI Enclave. We establish a Security Awareness Training program that includes risk-based, role-based, and insider threat awareness sessions to meet CMMC L2 requirements.

User Acceptance Testing (UAT) is also conducted, a critical step that validates the system’s functionality in real-world scenarios. This process confirms that the security controls are correctly implemented and capable of handling CUI securely. Through comprehensive testing, we ensure that the CUI Enclave is not only functional but ready for ongoing use in a compliant and secure manner.

Maintenance Checklists and Change Approval Board (CAB) Meetings

With the system operational, we establish a regular maintenance routine. The CMP assists in creating and managing recurring tasks tied to the upkeep of the CMMC L2 Security Program. These tasks include vulnerability report reviews, threat intelligence assessments, audit log evaluations, asset patching, and incident response testing, conducted on a structured weekly, monthly, quarterly, and annual cadence.

The Change Approval Board (CAB) meets during this phase to review any adjustments or updates to the security program. Through CAB meetings, we ensure that all changes are meticulously approved, documented, and executed in alignment with compliance standards. At this stage, the System Security Plan (SSP) is finalized, capturing all security practices in one unified document.

Phase 5: Manage

Ongoing Program Management

The final phase emphasizes the importance of sustained management to maintain CMMC L2 compliance. This includes conducting regular CAB meetings, reviewing any non-compliant systems, managing change requests, and monitoring privileged activities. A proactive approach to security control reviews ensures that all practices remain aligned with compliance requirements as regulations and threats evolve.

Cybersecurity Maintenance Process

Effective program management means implementing continuous reviews and updates. Tasks include ongoing vulnerability assessments, threat intelligence review, asset patching, and risk evaluations. Comprehensive management of documentation is also vital; we maintain a record of all activities to provide a detailed audit trail. User and device onboarding and offboarding are closely managed to ensure that only authorized users access CUI, and hardware/software inventories are consistently updated.

The Manage phase ensures that your security program remains agile, responsive, and aligned with compliance requirements. By fostering a culture of continuous improvement, we help organizations stay secure and compliant in a dynamic cybersecurity landscape.

Sounds Like a Plan

Implementing a CMMC Level 2-compliant security program requires a meticulous, phased approach. From assessing your current state and planning a structured response to building a secure environment and managing ongoing operations, each phase builds upon the last to create a cohesive, compliant, and sustainable security program. Through collaboration and strategic implementation, we make navigating the path to CMMC L2 compliance achievable and maintainable, empowering your organization to handle CUI securely and confidently.

Filed Under: General

October 2, 2014 By SME, Inc.

National Cyber Security Awareness Month

October is National Cyber Security Awareness Month.  Take the time this month to review the security posture of your organization.  Every business has something they need to protect, whether it is client data, business intellectual property, finances, etc. your network needs to be secure.  Review the current policies in place and make sure they are up to date and your employees have recently been trained on them.

Not sure where to start? Call SME and we can assist you in getting your network as secure as possible, updating your policies, and training your employees!

Simply Making IT Easier!

ncsam_googleplus_cover_photo_2014[1]

Filed Under: General

July 29, 2014 By SME, Inc.

ALTA Board Encourages Members to Conduct a Self-Assessment by September 2014

During the June 19th Board of Governors meeting, ALTA approved a motion encouraging members to conduct a self-assessment of their adoption of ALTA’s “Title Insurance and Settlement Company Best Practices” no later than September 2014.  “An ongoing compliance management program is essential to protecting the integrity of the real estate transaction,” said Michelle Korsmo, ALTA’s chief executive officer. “Reducing settlement risk and safeguarding consumer money has always been a keystone of the title and settlement business.”

SME’s first step in working towards Best Practice 3 compliance is performing a pre-assessment, which coincides with the approach ALTA’s Board of Governers is encouraging.  SME will forward a comprehensive questionnaire to the agent, when the agent has completed the questionnaire SME will review and prepare the beginning of a road-map towards Best Practice 3 compliance.  Once the road-map is in place the agent will have a better understanding of what needs to be done and how to budget.  Each agent I have worked with says that completing this questionnaire and having a plan in place has made all the difference for them.

Call SME TODAY to get started!

Filed Under: General

July 1, 2014 By SME, Inc.

Just Get Started

After sponsoring the VLTA, DCLTA, and several agency seminars over the last month, the message being sent to Title Agents and Settlement Services Companies is to “Just Get Started” on the path towards compliance.  ALTA released an updated version of the Best Practices framework in July of 2013 and over 90 days ago Wells Fargo announced that they were endorsing ALTA’s Best Practices, this is not going away.  It is expected that well before the August 1, 2015 deadline  lenders will be reaching out to agents asking where they are in the process of becoming compliant, what will your answer be?  SME has simplified the approach to Best Practice 3, which is centered around securing Non Public Personal Information (NPI), making it more cost-effective and manageable for agents.  Call SME to “Just Get Started’ on the path towards compliance!

Filed Under: General

June 5, 2014 By SME, Inc.

SME sponsors First American ‘Knowledge is Power’ Seminar

SME is also in Annapolis today sponsoring First American’s ‘Knowledge is Power’ Seminar.  Be sure to stop by our table to learn more about SME’s services and how we can assist your agency on meeting ALTA Best Practice 3 compliance.

We look forward to seeing you there!!  Simply Making IT Easier!

Filed Under: General

June 5, 2014 By SME, Inc.

SME is the Welcome Sponsor at VLTA’s 2014 Annual Convention

SME is the welcome sponsor at this years VLTA convention at the Hyatt in Herdon, VA, starting today June 5th and ending on Saturday June 7th.  Be sure to stop by our booth to learn more about SME’s services and how we can assist your agency on meeting ALTA Best Practice 3 compliance.

We look forward to seeing you there!!  Simply Making IT Easier!

http://www.vlta.org/displaycommon.cfm?an=1&subarticlenbr=55

 

 

Filed Under: General

May 27, 2014 By SME, Inc.

“We are in the middle of a cyber-war”

“We are in the middle of a cyber-war” as stated by Congressman Rogers, at last week’s Cyber Risk Summit in DC. Many small businesses believe that they are ‘too small’ for hackers to care about, that is incorrect.  Hackers do not discriminate based on size of who they attack, the easier the target the better.  Many would be surprised to hear that hacking is a full time job for individuals and/or organizations.  They work their 10 – 12 hour days trying to get into systems and steal financial information, intellectual property, trade secrets, etc.  They will identify an industry, target a weak link, and patiently work until they are successful at getting what they want.  Nothing is 100%, however small businesses can put layers of protection in place that will help mitigate their exposure.

Don’t wait, CALL SME TODAY to review your security program!

Filed Under: General

May 19, 2014 By SME, Inc.

SME to Attend Cyber Risk Summit

SME is attending the Cyber Risk Summit on May 22nd in Washington D.C. where Congressman Mike Rogers, Chairman of the House Intelligence Committee, is the Keynote speaker.  SME is looking to expand our knowledge on how to better mitigate the risk of cyber-related exposures facing our clients everyday!

http://www.businessinsurance.com/article/20140228/CYBERRISKSUMMIT/140229834

SME is Simply Making IT Easier!

Filed Under: General

May 13, 2014 By SME, Inc.

Is your business prepared for data loss?

Did you know?

  • A hard drive fails every 15 seconds
  • 60% of companies that lose their data will go out of business within 6 months
  • 32% of data loss is caused by accidental deletion by employees
  • 40% of small to medium sized businesses don’t back up their data at all
  • Of those who do back their data up 34% fail to test that their data is recoverable, and 77% of those who do test find there are issues recovering the data
  • 2,000 laptops with company data are lost or stolen each day
  • Recreating data from scratch is estimated to cost between $2,000 and $8,000 per MB

SME offers a secure and cost effective solution for your business.  Don’t wait until disaster strikes; contact us today to get started with SME Online Backup!

Filed Under: General

May 8, 2014 By SME, Inc.

Thank You First American Title

SME would like to thank First American Title for inviting us to sponsor the 2014 ‘Tales of Terror’ seminars.  We had a great time listening to the ‘tales’ and met a lot of nice people.  We are looking forward to working with everyone on ALTA Best Practice 3 compliance!

Filed Under: General

  • 1
  • 2
  • Next Page »

Contact Us

    Your Name

    Your Email

    Subject

    Your Message

    Recent Post

    With the recent federal government shutdown beginning on October 1 and no clear end in sight, many defense … More »

    What Our Clients Say

    "SME handles all of our internet hosting needs, providing a reliable, high-performance, secure and cost-effective platform for us to host web-based systems for biotech companies. We have been consistently impressed with the responsive, knowledgeable and professional service we receive."

    Simply Making IT Easier!TM
    Local: 703-378-4110
    Toll Free: 855-2-SMEINC
    Email: info [at] smeinc.net

    Copyright © 2025 · Systems Management Enterprises, Inc. · Privacy Policy · Terms of Service