Resources

CKSS CMMC DFARS Compliance Consultants CMMC interim rule

The CMMC Interim Rule: Bridging the Gap from DFARS to CMMC

BACKGROUND In an attempt to mitigate vital data loss from cyber-attacks targeting its 300,000 contractors, the Department of Defense in…

READ MORE
CKSS CMMC DFARS Compliance Consultants Biden's cybersecurity executive order

Repercussions of Biden’s Executive Order on Improving the Nation’s Cybersecurity for Federal Contractors

In the wake of the increasingly aggressive attacks within the cyber threat landscape, such as the 2021 Colonial Pipeline Ransomware…

READ MORE

Draft NIST Special Publication 800-172A: Assessing Enhanced Security Requirements for Controlled Unclassified Information

Draft NIST Special Publication 800-172A: Assessing Enhanced Security Requirements for Controlled Unclassified Information. Read Now.

READ MORE

POAM NIST 800-171 Plan of Action and Milestones Template

POAM NIST 800-171 (Plan of Action and Milestones) is required for DoD contractors to meet DFARS compliance requirements. If during your internal…

READ MORE
CKSS CMMC DFARS Compliance Consultants full compliance toolkit

CMMC NIST Policy Templates: What Are The Benefits?

Most people do not like reading or writing Policies, Procedures, and System Security Plans. This is understandable – most of…

READ MORE
cmmc

CMMC – Overview

Past is Future Cybersecurity Maturity Model Certification, abbreviated as “CMMC” is a new standard promulgated by US Department of Defense…

READ MORE

Cybersecurity Maturity Model Certification (CMMC) Framework

Cybersecurity Maturity Model Certification (CMMC) Framework. Read Now

READ MORE

Frequently Asked Questions (FAQs) Regarding the Implementation of DFARS.

Defense Federal Acquisition Regulation Supplement (DFARS) and Procedures, Guidance, and Information (PGI). Read Now

READ MORE

NIST Special Publication 800-171B: Protecting Controlled Unclassified Information in Non-federal Systems and Organizations

NIST Special Publication 800-171B: Protecting Controlled Unclassified Information in Non-federal Systems and Organizations. Read Now

READ MORE

Sign Up To Receive Cybersecurity Updates