CMMC Helpful Links
Additional CMMC Resources
112Cyber is here to help you navigate Cyber Compliance.
CUI Training
Cybersecurity Awareness
Description: Provides foundational awareness of cyber threats, vulnerabilities, and intrusion methods within government and defense environments. Using a large simulated cyber incident and support scenarios, the course teaches how attacks occur, what information is targeted, how to apply cybersecurity countermeasures, and when to report suspicious activity—showing how small events can lead to major consequences.
Description: Interactive refresher training that reinforces core security requirements from DODM 5200.01, NISPOM, and related policies to ensure continued awareness of essential safeguarding and compliance responsibilities.
Identifying and Safeguarding Personally Identifiable Information (PII)
Description: Covers what PII and PHI are, why they matter, and the laws that govern their protection. The course trains personnel to identify sensitive information, understand proper and improper handling, and follow required safeguards. It also explains the consequences of unauthorized disclosure for both individuals and organizations. Designed for DoD personnel but applicable across federal agencies.
Marking Special Categories of Classified Information
Description: Explains the rules and methods for properly marking special categories of classified information, including general marking requirements and specific guidance for unique material types and information categories.
DoD Cyber Awareness Challenge
Description: The official DoD foundational cybersecurity training. Covers core cybersecurity practices, insider threat awareness, information protection, and safe handling expectations relevant to CMMC Level 2 users.
Recognizing and reporting Insider threat (DHS / CISA Perspective)
Establishing an Insider Threat Program for Your Organization
Description: This resource provides guidance for Insider Threat Program Managers on how to design, structure, and implement an effective insider threat program. It covers required standards from Executive Order 13587, identifies key organizational disciplines that should form the insider threat team, and outlines essential training needed to meet national policy requirements.
Description: Teaches the importance of insider threat awareness within a security program, using scenarios to highlight common risk indicators. The course encourages proactive reporting of concerning behaviors to help prevent harm and support positive outcomes in the workplace.
Maximizing Organizational Trust
Description: Explains how strong organizational trust motivates employees to support security and safety efforts. Based on research across business, psychology, and communication fields, this guide outlines best practices leaders can use to build and maintain a fair, honest, and transparent workplace culture.
Description: Effective insider threat mitigation requires a holistic program that integrates physical security measures, personnel awareness, and strong information-protection practices to reduce risk across the organization.
The CUI Registry (NARA)
Description: The official authoritative source for CUI categories, markings, safeguarding requirements, and decontrol guidance.
DoD
- Cyber Awareness Challenge (2023) – Nice add for cybersec professionals and CUI users, BUT has classified information content not applicable to all DoD contractors.
- Annual Cy
- Identifying and Safeguarding Personally Identifiable Information (PII)
(Managing (or accessing) an information system with Privacy components (CUI//PRVCY, CUI//MIL, CUI//SP-PERS)) - Cyber Risk Assessment (Cyber Protect)
DHS – Cybersecurity & Infrastructure Security Agency (CISA) Training Material
- Reference Securing Critical and High-Value Assets (HVAs) – CMMC Level 3
- Intro to Investigating Logs for Incidents – CMMC Level 2
- Intro to incident Analysis
- Understanding Indicators of Compromise (IOCs) for HVAs
CISA Tabletop Exercise Packages (Test your Incident Response Plan Per CMMC Level 2)
Cyber Incident Reporting for DoD Contractors
Medium Assurance Certificate / External Certification Authority (ECA) External Certification Authorities (ECA) – DoD Cyber Exchange
Description: Contractors must report cyber incidents that impact CUI, covered contractor information systems, or operationally critical support within 72 hours as required by DFARS 252.204-7012.
CMMC Incident Response Procedures
Description: Provides guidance on the required procedures for safeguarding Covered Defense Information (CDI) and reporting cyber incidents under DFARS 204.73. These procedures outline how contracting officers and contractors must identify, mark, protect, and respond to compromises of CDI or operationally critical support, ensuring compliance with CMMC-aligned incident response and DoD reporting requirements.
Incident Response Tabletop Exercises
Description: Provides customizable tabletop exercise packages from CISA that help organizations evaluate and strengthen their incident response readiness. Each package includes scenarios, objectives, discussion questions, and reference materials to facilitate internal discussions and preparedness for various cyber threat events.
Report Cyber Incidents via the DoD DIBNet Portal
Description: This is the official DoD Cyber Crime Center (DC3) portal for reporting cyber incidents under DFARS 7012.
Alternative Resources
Defense Industrial Base Cybersecurity Information Sharing Program (dod.mil)
Defense Industrial Base Cybersecurity Information Sharing Program (dod.mil)
DHS / CISA Incident Reporting Form
FBI “Response and Report” Cyber Incidents / Internet Crime Complaint Center (IC3)
US-CERT / CISA – Cyber Threat Intelligence
Staying informed on emerging cyber threats is a requirement under both CMMC and NIST SP 800-171. One of the simplest and most effective ways to meet this requirement is to follow authoritative government threat-intelligence feeds.
U.S. Cybersecurity & Infrastructure Security Agency (CISA)
Description: CISA publishes timely alerts, advisories, and threat-intelligence bulletins for government contractors and critical-infrastructure organizations. These updates help organizations understand active threats, vulnerabilities, exploitation trends, and recommended defensive actions. To stay current, scroll to the bottom of the CISA page and use the Subscribe option to receive real-time email notifications.
Security Configuration Standards and Hardening Guides
DISA Security Technical Implementation Guides (STIGs) & SRGs
Description: The DoD’s official configuration standards for securing operating systems, applications, databases, and network devices. Commonly referenced for CMMC and high-assurance environments.
Center for Internet Security (CIS) Benchmarks
Description: Industry-standard hardening baselines for modern operating systems, cloud platforms, and applications. Widely used in commercial and federal environments.
Description: Pre-hardened AMIs, VM images, and container baselines aligned with CIS Level 1 and Level 2 controls — suitable for CUI cloud workloads.
NIST Secure Configuration Checklists (National Checklist Program)
Description: NIST’s federal repository of secure configuration checklists for federal information systems. Maps directly to NIST SP 800-70 and supports CMMC alignment.
NIST Cryptographic Module Validation Program (CMVP)
Description: Use the CMVP database to confirm whether the cryptographic modules in your environment are FIPS 140-2 or FIPS 140-3 validated. For systems handling CUI, assessors expect organizations to reference the specific validation certificates associated with the encryption mechanisms they rely on. This resource supports the CMMC requirement to implement FIPS-validated cryptography, and serves as the authoritative evidence source for verifying that your encryption products meet federal validation standards.
NIST Templates
CMMC Resources & Documentation
Core documents required for CMMC Level 2 readiness and assessment preparation.
32 CFR Part 170: Cybersecurity Maturity Model Certification (CMMC) Program
48 CFR Parts 204, 212, 217, and 252: Defense Federal Acquisition Regulation Supplement: Assessing Contractor Implementation of Cybersecurity Requirements (DFARS Case 2019-D041)
CMMC 101 Brief: CMMC 101 Brief
CMMC Overview Briefing (Audio): CMMC Overview Briefing (Audio)
CMMC Model Overview: CMMC Program Model Overview
CMMC Level 1 Scoping Guidance: CMMC Level 1 Scoping Guidance
CMMC Level 1 Self-Assessment Guide: CMMC Level 1 Self-Assessment Guide
CMMC Level 2 Scoping Guidance: CMMC Level 2 Scoping Guidance
CMMC Level 2 Assessment Guide: CMMC Level 2 Assessment Guide
CMMC Level 3 Scoping Guidance: CMMC Level 3 Scoping Guidance
CMMC Level 3 Assessment Guide: CMMC Level 3 Assessment Guide
CMMC Hashing Guide: CMMC Hashing Guide
CMMC Briefing: CMMC Alignment to NIST Standards (Feb 2025)
CMMC Briefing: DoD SPRS (Feb 2025)
CMMC Briefing: CMMC eMASS (Feb 2025)
CMMC Briefing: FedRAMP Authorization and Equivalency (Feb 2025)
CMMC Briefing: Levels Determination (Feb 2025)
CMMC Briefing: Technical Implementation of CMMC Requirements (Feb 2025)
DoD Memo: Organization-Defined Parameters for NIST SP 800-171 Rev3 (Feb 2025)
- The Cyber AB: CMMC Assessment Process (CAP)
- Department of Defense Procurement Toolbox: Implementing the Cybersecurity Maturity Model Certification (CMMC) Program
- DFARS Clause 252.204-7012: Safeguarding Covered Defense Information and Cyber Incident Reporting
- DFARS Provision 252.204-7019: Notice of NIST SP 800-171 DoD Assessment Requirements
- DFARS Clause 252.204-7020: NIST SP 800-171 DoD Assessment Requirements
- DFARS Clause 252.204-7021: TBD
- NIST SP 800-171 Rev. 2: Protecting CUI in Nonfederal Systems
- NIST SP 800-171A: Assessing Security Requirements for Controlled Unclassified Information
- NIST SP 800-172: Enhanced Security Requirements for Protecting Controlled Unclassified Information
- NIST SP 800-172A: Assessing Enhanced Security Requirements for Controlled Unclassified Information
- DoD CUI Program Website: DoD CUI Program
- Supplier Performance Risk System (SPRS): SPRS
- CMMC Accreditation Body Website: CMMC AB
- DODI 5200.48 – Controlled Unclassified Information: DODI 5200.48
- DODI 5000.90 – Cybersecurity for Acquisition Decision Authorities and Program Managers: DODI 5000.90
- Executive Order on Improving the Nation’s Cybersecurity (May 12, 2021): Executive Order
Helpful supporting documentation and compliance guidance for OSCs.
- NIST SP 800-53: Security and Privacy Controls for Information Systems and Organizations
- NIST Cybersecurity Framework (CSF): NIST Cybersecurity Framework
- Cybersecurity & Infrastructure Security Agency (CISA) Resources: CISA Resources
- Federal Risk and Authorization Management Program (FedRAMP): FedRAMP
- National Defense Industrial Association (NDIA): NDIA Cybersecurity
- Defense Acquisition University (DAU): DAU Cybersecurity Courses
- CMMC Marketplace: CMMC Marketplace
- Cybersecurity and Privacy Reference Tool (CPRT): CPRT
- Full CMMCAuthoritative Documentation
Documentation/