During a CMMC journey, the self-assessor must meet objective requirements using “specifications”. Specifications are document-based artifacts that contain a company’s written decisions for how they will address objectives outlined in the framework. These are usually expressed through written policies and procedures, typically documented in a system security plan.
Here, we face another CMMC flaw: expecting self-assessors to know and understand how to write effective policies and procedures. RADICL has got you covered.
A policy is a statement of self-governance where a business must decide how it will meet objectives outlined in a framework. The policy is a written expression of these decisions and explains what objectives and points have been accepted and adopted.
While CMMC is mandated, the individual objectives inside the framework require discernment to determine if and how they are relevant to the FCI/CUI environment. A company working towards CMMC will write a policy and procedure when they have decided to elect objective requirements and implement the recommended cybersecurity best practices.
A company can decide not to adopt an assessment objective where a reasonable explanation considers residual risks, risk transfer, mitigations, and risk acceptance. CMMC and all cybersecurity frameworks require documentation of risk acceptance within the system security plan. It's common for a company to adopt most controls and choose a select few where risk acceptance is applicable.
According to NIST SP 800-39, Managing Information Security Risk, here are a few reasons a company may choose not to adopt an objective.
Therefore, a company can decide not to adopt a control if it hinders the mission objective, ineffectively reduces risk, is an unsustainable financial burden to implement, compensating controls exist, or the risk is minimal based on predetermined conditions.
Writing a policy takes finesse, and if you have ever downloaded a template policy from the internet, you will quickly realize they often do not fit. They require thought and a tailor to adopt the control into the company's purview. A policy should answer the following questions:
Procedures are the follow-up to the outlines defined in each respective policy. Procedures should consider and include the following.
Writing policies and procedures correctly can be daunting, and it's no surprise that challenges exist when working toward cybersecurity compliance. The following are commonly observed issues with documented policies and procedures.
For each CMMC objective, an assessor must write down their respective policy and procedures. Although not outlined in CMMC, these companies should document them in a System Security Plan, maintained in a central location. Companies working towards CMMC will face challenges throughout their compliance journey. Often, these challenges show up in their documentation efforts due to the complex nature of self-governance. By responding to each policy and procedure question discussed above, a company can write much more effective policies and procedures that are sure to pass compliance audits.
If you’d like to find out how RADICL can help you on your CMMC journey, Let’s Talk