Request edit access
JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
Are you a CMMC Leader?
Take our quiz to find out how you stack up!
Sign in to Google
to save your progress.
Learn more
We have a complete System Security Plan (SSP).
1 point
Yes
No
Unsure
Clear selection
We provide all of our employees with cybersecurity training on at least an annual basis.
1 point
Yes
No
Unsure
Clear selection
We use either whitelisting or blacklisting to limit users to only authorized software.
1 point
Yes
No
Unsure
Clear selection
We have audit records of our systems.
1 point
Yes
No
Unsure
Clear selection
We use the principle of least access when assigning user accounts.
1 point
Yes
No
Unsure
Clear selection
We have secured our endpoints.
1 point
Yes
No
Unsure
Clear selection
We limit physical access to data and computer systems.
1 point
Yes
No
Unsure
Clear selection
We monitor and control internet access.
1 point
Yes
No
Unsure
Clear selection
We monitor and control access to our cloud systems.
1 point
Yes
No
Unsure
Clear selection
We monitor visitor access to our facilities and collect records of these visits.
1 point
Yes
No
Unsure
Clear selection
Submit
Clear form
This content is neither created nor endorsed by Google. -
Terms of Service
-
Privacy Policy
Does this form look suspicious?
Report
Forms
Help and feedback
Contact form owner
Help Forms improve
Report