CyberNeQter CMMC Compliance Guide
This comprehensive guide identifies CMMC practices that CyberNeQter can assist in meeting. CyberNeQter provides full assistance for meeting CMMC/NIST 800-171 controls.
Access Control
Access Control (AC) Requirements
01
System Access Limitation
CyberNeQter visualizes authorized users, processes, and devices in Windows, G-Suite, and Office 365 dashboards. Control Operators can filter activity, analyze raw logs, and monitor connections through the Discovery Tab.
02
Transaction Control
Monitor user transactions and functions across dashboards. Track account activity, creation/deletion events, inactive accounts, and role-based access with customizable alerts.
03
Least Privilege
Identify privileged accounts and monitor their activity. CyberNeQter restricts root access by design and provides comprehensive audit trails for quarterly privilege reviews.
04
Remote Access Monitoring
Capture and visualize VPN activity and remote sessions. Monitor all actions performed via organizational endpoints with automated alerts for suspicious access patterns.
CyberNeQter's Dashboard Tab provides real-time visualization of access control metrics, while the Reports Tab enables automated monitoring and alerting for policy violations.
Auditing
Auditing & Accountability (AU)
Comprehensive Audit Logging
CyberNeQter creates and retains system audit logs to enable monitoring, analysis, investigation, and reporting of unauthorized activity. The platform centralizes log collection from native logging devices, storing data for at least 90 days with extended archival capabilities.
Audit records are visualized in dedicated dashboards, allowing Control Operators to review security-related events, track user actions, and export documentation in CSV or JSON formats. All audit information is protected from unauthorized modification or deletion by any user, including administrators.
  • Automated audit record generation and retention
  • Unique user action tracing for accountability
  • Correlation of audit review and analysis processes
  • On-demand report generation capabilities
90+
Days
Default audit log retention period with extended archival options
24/7
Monitoring
Continuous audit logging and alert capabilities
100%
Protected
Audit data secured from unauthorized modification
Configuration
Configuration Management (CM)
Baseline Configuration
CyberNeQter's Hosts Inventory Tab tracks hardware, software, firmware, and documentation throughout the system development lifecycle. The platform maintains comprehensive device inventories and monitors configuration changes in real-time.
Change Tracking
Visualize configuration-controlled changes in Windows dashboards. Track, review, and log all system modifications with detailed audit trails accessible through the Discovery Tab.
Function Restriction
Monitor nonessential programs, functions, ports, protocols, and services. CyberNeQter visualizes activity across Vulnerability and Firewall dashboards, enabling automated alerts for unauthorized usage.
Control Operators can save custom search filters to automate monitoring and generate alerts about system changes, ensuring continuous compliance with configuration management requirements.
Authentication
Identification & Authentication (IA)
System User Identification
CyberNeQter identifies system users, processes acting on behalf of users, and devices accessing organizational systems. The platform visualizes user activity across Windows, G-Suite, and Office 365 dashboards.
Control Operators can filter and analyze system activity, monitor processes, and track device connections through the Discovery Tab. The Hosts Inventory Tool provides comprehensive device identification and monitoring capabilities.
Industry standards recommend quarterly reviews of user privileges to maintain the principle of least privilege and ensure proper access controls.
Incident Response
Incident Response (IR) & Media Protection (MP)
Detection
CyberNeQter visualizes security-related events in Windows and Firewall dashboards, enabling rapid detection of potential incidents through automated monitoring and alerting.
Analysis
Control Operators can review and analyze logs from detection systems, examining raw log data and parsing event details through the Discovery Tab for thorough investigation.
Documentation
Track and document incidents with comprehensive audit trails. Export incident data to CSV or JSON formats for reporting to internal officials and external authorities.
Portable Storage Device Control
CyberNeQter monitors portable storage device usage through Windows and Firewall dashboards. Control Operators can identify when devices are connected or denied, review usage patterns, and configure alerts for unauthorized portable storage activity. The platform helps enforce policies prohibiting devices with no identifiable owner.
Risk Management
Risk Management (RM) & Security Assessment (CA)
Vulnerability Scanning
CyberNeQter's Vulnerability Scanner provides comprehensive scanning capabilities for organizational systems and applications. Control Operators define scan frequency, and the platform automatically updates vulnerability signatures to detect new threats.
Detected vulnerabilities are visualized in dedicated dashboards with remediation guidance. The scanner enables verification of successful patches through follow-up scans.
1
Scan
Periodic vulnerability scans identify system weaknesses and security deficiencies across the network infrastructure.
2
Assess
Risk assessments prioritize vulnerabilities based on severity and potential impact to organizational systems.
3
Remediate
Implement corrective actions with guidance from CyberNeQter, then verify remediation through follow-up scanning.
4
Document
Create Plans of Action and Milestones (POA&M) in the Compliance Tab, exportable as PDF documentation.
The Compliance Tab enables development of system security plans based on CMMC and NIST frameworks, with version tracking and support for uploading documentation.
Communications
System & Communications Protection (SC)
Boundary Monitoring
Monitor and control communications at external and internal system boundaries. CyberNeQter centralizes log data from networking devices, visualizing traffic patterns in Firewall dashboards for comprehensive boundary protection.
Split Tunneling Prevention
Detect and prevent remote devices from simultaneously establishing non-remote connections. Monitor for split tunneling evidence through Windows and Firewall dashboards with automated alerting.
VoIP Control
Monitor Voice over Internet Protocol technologies through comprehensive dashboard visualization. Track VoIP device activity and configure custom alerts for unauthorized usage patterns.
Control Operators can review boundary traffic, analyze communications in raw log form, and save custom search filters to automate monitoring and alerting for communications protection requirements.
System Integrity
System & Information Integrity (SI)
Identify Flaws
Schedule vulnerability scans and visualize system flaws in Windows and Health dashboards. Monitor for software updates and security patches requiring installation.
Report Issues
Configure automated alerts for identified system flaws. Export detailed reports from the Discovery Tab documenting vulnerabilities and required corrective actions.
Correct Timely Patch Management
Install critical security patches within 30 days and non-critical patches within 90 days. Verify corrections through follow-up vulnerability scanning.
Monitor Alerts
Track system security alerts across Windows, Audit, Vulnerability, and Firewall dashboards. Detect attacks and indicators of potential threats through continuous monitoring.
Attack Detection
CyberNeQter monitors organizational systems to detect attacks and indicators of potential threats. The platform visualizes attack indicators across multiple dashboards, tracking both inbound and outbound communications traffic.
Unauthorized Use
Identify unauthorized system use by visualizing activity in Windows, G-Suite, and Office 365 dashboards. Filter and analyze system usage to detect policy violations and security incidents.
Getting Started
Implementing CyberNeQter for CMMC Compliance
Dashboard Tab
Visualize security events, user activity, and system metrics across Windows, G-Suite, Office 365, Firewall, and Vulnerability dashboards. Real-time monitoring enables rapid detection and response.
Discovery Tab
Search and filter raw logs for detailed analysis. Export audit records to CSV or JSON formats for documentation and compliance reporting requirements.
Reports Tab
Configure automated monitoring and alerting with customizable templates. Save search filters to generate scheduled reports and real-time notifications for security events.
Vulnerability Scanner
Schedule periodic scans to identify system weaknesses. Automatically updated signatures detect new vulnerabilities, with remediation guidance and verification capabilities.
Compliance Tab
Author system security plans based on CMMC and NIST frameworks. Create POA&Ms, track versions, and export documentation as PDF files for assessments.
Hosts Inventory
Maintain comprehensive device inventories tracking hardware, software, and firmware. Monitor configuration changes and system baselines throughout development lifecycles.
CyberNeQter provides Control Operators with powerful tools to meet CMMC requirements. For detailed implementation guidance, consult the user manual or contact NeQter's Support team for assistance with audit logging tools and compliance strategies.