Reference: CMMC 2.0
Level Introduced: 2
Title: Security Control Assessment
Periodically assess the security controls in organizational systems to determine if the controls are effective in their application.
As organizations implement security controls, they should avoid a "set it and forget it" mentality. The security landscape is constantly changing. Reassess existing controls at periodic intervals in order to validate their usefulness in organizational systems. This will let you determine if the control is still meeting the needs of the organization. Set the assessment schedule according to organizational needs. Consider regulatory obligations and internal policies when assessing the controls.
Typical outputs of the practice include:
• documented assessment results;
• proposed new controls, or updates to existing controls;
• remediation plans; and
• new identified risks.
You are in charge of IT operations in your company. You ensure that security controls are achieving their objectives. After you implement the controls, you monitor their performance. You should perform this review as often as necessary to meet:
• your organization's risk planning needs; and
• any regulations or policies you must follow.
When you assess the controls, document what you find. When you find your controls are not
meeting your requirements, you should act and make changes. You can:
• propose updated or new controls;
• develop a plan to improve the control; and
• document new risks that you find.
You should also document these actions.