Request edit access
Are you a CMMC Leader?
Take our quiz to find out how you stack up!
Sign in to Google to save your progress. Learn more
We have a complete System Security Plan (SSP).
1 point
Clear selection
We provide all of our employees with cybersecurity training on at least an annual basis.
1 point
Clear selection
We use either whitelisting or blacklisting to limit users to only authorized software.
1 point
Clear selection
We have audit records of our systems.
1 point
Clear selection
We use the principle of least access when assigning user accounts.
1 point
Clear selection
We have secured our endpoints.
1 point
Clear selection
We limit physical access to data and computer systems.
1 point
Clear selection
We monitor and control internet access.
1 point
Clear selection
We monitor and control access to our cloud systems.
1 point
Clear selection
We monitor visitor access to our facilities and collect records of these visits.
1 point
Clear selection
Submit
Clear form
This content is neither created nor endorsed by Google. - Terms of Service - Privacy Policy

Does this form look suspicious? Report