Reference: CMMC 2.0
Level Introduced: 2
Title: Security Control Monitoring
Monitor security controls on an ongoing basis to ensure the continued effectiveness of the controls.
You should provide a plan for monitoring and assessing the state of security controls on a recurring basis that occurs more frequently than the periodic assessments discussed in CA.2.158. This process provides a mechanism to assess the overall security posture of your organization. As a result the process not only maintains awareness of vulnerabilities and threats, but also informs management of the effectiveness of the security controls in determining if security controls are current and for management to make an acceptable risk decision.
As the lead for cybersecurity at your organization your boss has asked you to ensure that any requirements for cybersecurity are met. Since the organization supports Department of Defense (DoD) contracts you are aware that contractors must meet specific compliance requirements. You review those requirements and the associated preventative, detective, or responsive security controls you've implemented to identify any gaps. With your list of compliance requirements and actual security controls in place you create a plan of action to evaluate each control regularly over the next year. You mark several controls to be evaluated by a third party security assessor. After reviewing the list with several colleagues in IT you assign them responsibility to evaluate controls within their area of responsibility. The remaining controls are assigned to members of the IT cybersecurity team. To ensure progress you establish recurring meetings with the accountable IT staff to assess continuous monitoring progress, review security information, evaluate risks from gaps in continuous monitoring, and produce reports for your executives.