- Products
- Learn
- Local User Groups
- Partners
- More
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
Join our TechTalk: Malware 2021 to Present Day
Building a Preventative Cyber Program
Be a CloudMate!
Check out our cloud security exclusive space!
Check Point's Cyber Park is Now Open
Let the Games Begin!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
What is CMMC?
The Cybersecurity Maturity Model Certification (CMMC) is a certification and compliance process developed by the Department of Defense (DoD). It is designed to certify that contractors have the controls in place to protect sensitive data.
The CMMC establishes five certification levels that reflect the maturity and reliability of a company's cyber security infrastructure to safeguard sensitive government information on contractors' information systems. The five levels are tiered and build upon each other's technical requirements. Each level requires compliance with the lower-level requirements and institutionalization of additional processes to implement specific cyber security based practices.
Target Audience?
DoD contractors, required to learn the standard and follow the required guidelines and comply.
How can Check Point help?
Check Point Compliance Software Blade monitors the customer’s Check Point environment against a library of security best practices, highlighting poor configuration settings and security weaknesses. Security best practices are mapped to major regulations (like CMMC), translating complex regulatory requirements into security terms. This enables network security managers to easily generate detailed audit-ready compliance reports, allowing them to focus on security improvements and increasing compliance level.
The following blades and configurations need to be enabled to get the full Standard coverage:
The Check Point DLP blade can enable the below controls and Check Point Compliance controls has the proper validation process for it.
In addition, there are few other Check Point solutions (i.e.: endpoint suite), which can also be of assistance to enterprises in need to comply with this standard.
How do I apply CMMC support to my Compliance Blade?
Additional details can be found on CP_Cyber Security Maturity Model Certification.pdf (attached)
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY