Engineering Trust By Building Better Together With Microsoft

A Guide to Engineering a CMMC 2.0 Level 2 System with Microsoft 365's Shared Responsibility Model

Introduction to Security and Compliance with Microsoft 365

"IndieWebCamp Berlin | Organizers' Meetup" flickr photo by tollwerk shared under a Creative Commons (BY-NC-SA) license

In this module you will learn how Microsoft helps you engineer trustworthiness into your Systems that protect Federal Contract Information and Controlled Unclassified Information. Participants will learn how to to Systems Security Engineering from a Risk Management Framework to meet the security requirements of CMMC with Microsoft 365's Shared Responsibility Model

Unit One: What is Risk Management Framework

Learn the basics of building risk pased security policies and procedures

Unit Two: What is CMMC?

An Overview of the Cybersecurity Maturity Model Certification

Unit Three: What is Systems Security Engineering

Learn how to apply a lifecyle approach utilizing the Microsoft's Compliance Ecosystem to engineer and autmoate the trustworthiness in your ability to meet CMMC security requirements.

Unit Four: The SSP and POAM

CMMC requires two key documents. The System Security Plan and Plan of Action and Milestones

Introduction to the Cybersecurity Maturity Model Certification Program

"IndieWeb Summit 2019 | flickr photo by aparecki shared under a Creative Commons (BY) license

In this module you will learn how Microsoft fits into the CMMC ecosystem and how you Microsoft 365 can empower you andh help meet the security requirements of NIST-SP-800-171 measured on a CMMC assessment

Unit Six: CMMC Ecosystem

Learn the authorities,organizations, and players of CMMC

History of CMMC

Unit Seven: Learn about the Government's efforts to Protect the National Supply Chain

Unite Eight: CMMC Code of Ethics

Unit Nine: Learn the history and ehtical expectations of the CMMC Ecosystem

Lesson Nine: CMMC Assessment Process

Currently NDAd

Lesson Ten: Failure for Compliance

Learn how Microsoft 365 can help[ you avoid costly penalties and lost contracts through the advatages of the Cloud and Shared Resposnibility

Securing Microsoft 365 and CMMC

Lesson Ten: What is the Cloud and FedRAMP?

Learn how Microsft 365 meets the requirements as a cloud provider for Government Contractors

Sensitive Data and Microsoft 365

Learn how to best protect FCI and CUI through the Cloud and Microsoft's 365 Shared Responsibility Module

Module Four: Working with Microsoft 365 Partners

Lesson Thirteen: Who is your IT team and What is shared responsibility?

Learn how to identify your techncial team who helps secure the confidentiality of FCI and CUI

Lesson Fourteen: Evaluating your Microsoft Partner

Learn how to choose a Managed Service Provider who serves as a Complinace Partner

Lesson Fifteen: Utilizing a shared responsibility matrix with Azure Active Directory

Cybersecurity begins with Identity and Asset Management. Learn how MSPs and your company work togrhter through the cloud based shared responsibility matrix

Lesson Sixteen: Creating network and data flow diagram in Visio

Learn how to document key boundaries and a CMMC assessment scope using Microsoft Visio

Module Four: Compliance Management and Microsoft 365

Lesson Thirteen: Who is your IT team and What is shared responsibility?

Learn how to identify your techncial team who helps secure the confidentiality of FCI and CUI

Lesson Fourteen: Evaluating your Microsoft Partner

Learn how to choose a Managed Service Provider who serves as a Complinace Partner

Lesson Fifteen: Utilizing a shared responsibility matrix with Azure Active Directory

Cybersecurity begins with Identity and Asset Management. Learn how MSPs and your company work togrhter through the cloud based shared responsibility matrix