I’ll bet you didn’t know the Security Requirements in NIST SP 800-171 have relationships.

We see people just jumping into NIST SP 800-171 compliance helping organizations and even CMMC Certified Assessors failing to understand how one requirement may be shaped by a preceding one and, in turn, influence subsequent requirements.

In this As the CMMC Churns, we look at how getting tunnel vision can negatively impact your implementation of the requirements. Likewise, we look at 5 use cases to demonstrate how the requirements are meant to fit together like a jigsaw puzzle. While not an exhaustive dissertation on Security Requirement relationships, these five do tell viewers where we see the relationship breaking down, which may result in a NOT MET.


Peak InfoSec Homepage: http://peakinfosec.com

As the CMMC Churns Episodes: http://peakinfosec.com/as-the-cmmc-churns/

Contact Peak InfoSec for Support: http://peakinfosec.com/contact/

Email: [email protected]


Key CMMC Sites

Key References

Key Acquisition References

Other Key Sites