Microsoft CMMC Acceleration Program Update – January 2021

Published 01-08-2021 11:12 AM 12.5K Views
Microsoft

Compliance Score.png

 

We are actively building out our program by developing resources for both partners and Defense Industrial Base (DIB) companies to leverage in their Cybersecurity Maturity Model Certification (CMMC) journey. These tools cannot guarantee a positive CMMC adjudication, but they may assist candidate organizations by improving their CMMC posture going into a formal CMMC review in accordance with CMMC Accreditation Body (AB) standards. While we plan to release resources and guidance in waves, please keep in mind we are dependent upon the CMMC AB finalizing the CMMC guidance itself.

 

Here is a summary of current resources to help get you started:

 

 

 

Update.pngMicrosoft Product Placemat for CMMC

The Microsoft Product Placemat for CMMC is an interactive view representing how Microsoft cloud products and services satisfy requirements for CMMC practices.  The user interface resembles a periodic table of CMMC Practice Families.  The default view illustrates the practices with Microsoft Coverage that are inherited from the underlying cloud platform.  It also depicts practices for Shared Coverage where the underlying cloud platform contributes coverage for specific practices but requires additional customer configuration to satisfy requirements for full coverage.  For each practice that aligns with Microsoft Coverage or Shared Coverage, verbal customer implementation guidance and practice implementation details are documented.  This enables you to drill down into each practice and discover details on inheritance and prescriptive guidance for actions to be taken by the customer to meet practice requirements in the shared scope of responsibility for compliance with CMMC.

 

In addition to the default view, you may select and include products, features and suite SKUs to adjust how each cloud product is placed with CMMC.  For example, you may select the Microsoft 365 E5 SKU for maximum coverage of CMMC where 18 of the CMMC practices are Microsoft Coverage and 74 practices are Shared Coverage.  This is extraordinary as nearly 80% of the practices for CMMC Level 3 have coverage leveraging the spectrum of capabilities on the Microsoft cloud with the E5 SKU!

 

Microsoft CMMC Product Placemat Public Preview.png

 

The Microsoft Product Placemat for CMMC is currently in public preview.  You may download a copy at:

 

              https://aka.ms/cmmc/productplacemat

 

Please share feedback at https://aka.ms/cmmc/productplacematfeedback.

 

 

Update.pngAzure Sentinel: Cloud-Native SIEM

 

See and stop threats before they cause harm, with SIEM reinvented for a modern world. Azure Sentinel is your birds-eye view across the enterprise. Put the cloud and large-scale intelligence from decades of Microsoft security experience to work. Make your threat detection and response smarter and faster with artificial intelligence (AI). Eliminate security infrastructure setup and maintenance, and elastically scale to meet your security needs—while reducing IT costs.

 

  • Collect data at cloud scale—across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds
  • Detect previously uncovered threats and minimize false positives using analytics and unparalleled threat intelligence from Microsoft
  • Investigate threats with AI and hunt suspicious activities at scale, tapping into decades of cybersecurity work at Microsoft
  • Respond to incidents rapidly with built-in orchestration and automation of common tasks

 

Invest in security, not infrastructure setup and maintenance with the first cloud-native SIEM from a major cloud provider. Never again let a storage limit or a query limit prevent you from protecting your enterprise. Start using Azure Sentinel immediately, automatically scale to meet your organizational needs, and only pay for the resources you need.

 

For more information, please see https://azure.microsoft.com/en-us/services/azure-sentinel

 

Sentinel.png

Collect data at cloud scale—across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds

Update.pngAzure Sentinel: CMMC Workbook

 

The Azure Sentinel CMMC Workbook provides a mechanism for viewing log queries aligned to CMMC controls across the Microsoft portfolio including Microsoft security offerings, Office 365, Teams, Intune, Windows Virtual Desktop and many more. This workbook enables Security Architects, Engineers, SecOps Analysts, Managers, and IT Pros to gain situational awareness visibility for the security posture of cloud workloads. There are also recommendations for selecting, designing, deploying, and configuring Microsoft offerings for alignment with respective CMMC requirements and practices.

 

Sentinel CMMC.png

Note:  The Azure Sentinel CMMC Workbook is currently in Private Preview and will release in a Public Preview in early February 2021.

 

 

Update.pngQuickly deploy DoD STIG-compliant images and visualize compliance using Azure

At Microsoft, our security and compliance story is one of our greatest differentiators. Microsoft recognizes the criticality of security compliance accreditations for DIB and DoD customers. Maintaining Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) compliance is critical and often time consuming. STIGs are secure configuration standards for installation and maintenance of DoD Information Assurance (IA) and IA-enabled devices and systems. Azure provides automation and compliance dashboarding capabilities at cloud speed and scale, allowing customers to reduce the heavy costs of compliance when they choose Azure.

 

The Azure Team has created sample solutions using first-party Azure tooling to deliver STIG automation and compliance reporting. The STIG Automation GitHub Repository, enables customers to: Automate STIG implementation and baseline updates with Azure Image Builder visualize compliance with Azure Monitor Log Analytics or Sentinel.

 

Available for use with Azure commercial today and coming soon to Azure Government.  You can read more about the solution here:  Quickly deploy DoD STIG-compliant images and visualize compliance using Azure.

 

 

Microsoft Compliance Manager with Assessment Templates

 

Compliance Manager

Microsoft Compliance Manager is a feature in the Microsoft 365 compliance center that helps you manage your organization’s compliance requirements with greater ease and convenience. Compliance Manager may help you throughout your compliance journey, from taking inventory of your apparent data protection risks to managing the complexities of implementing controls, staying current with regulations and certifications, and reporting to auditors.

 

Compliance Manager helps simplify compliance and reduces risk by providing:

 

  • Pre-built assessments for common industry and regional standards and regulations, or custom assessments to meet your unique compliance needs. 
    • The Assessment Templates include NIST SP 800-171 and projected requirements for CMMC Levels 1-5.
    • The Assessment Templates that are available to your organization depend on your licensing agreement. Review the detailsHINT:  You will need an E5 SKU.
  • Workflow capabilities to help you efficiently complete your risk assessments through a single tool.
  • Detailed step-by-step guidance on suggested improvement actions to help you comply with known CMMC standards and regulations that are most relevant for your organization. For actions that are managed by Microsoft, you’ll see implementation details and audit results.
  • A projected risk-based compliance score to help you understand your compliance posture by measuring your progress in completing improvement actions.

 

Your Compliance Manager dashboard shows your current projected CMMC compliance score, helps you see what needs attention, and guides you to key improvement actions. Below is an example of what your Compliance Manager dashboard will look like:

 

Compliance Manager.png

 

Please note,  the Compliance Manager dashboard is a projection of your organization’s CMMC compliance profile based on all available information to date—Microsoft is not an accrediting body under the CMMC, and thus cannot guarantee any outcome under the formal CMMC review process.

 

Understanding your compliance score

Compliance Manager awards you points for completing improvement actions taken to comply with a regulation, standard, or policy, and combines those points into an overall compliance score. Each action has a different impact on your score depending on the potential risks involved. Your compliance score helps you prioritize which actions to focus on to improve your overall compliance posture.

 

Compliance Manager gives you an initial score based on the Microsoft 365 data protection baseline. This baseline is a set of controls that includes key regulations and standards for data protection and general data governance.

 

Update.pngCompliance Manager Availability in GCC and GCC High

 

The Compliance Manager is now available in all Microsoft 365 cloud offerings, including GCC and GCC High!

 

However, the Secure Score feature is still in preview within Commercial and GCC.  Secure Score will not release in GCC High until it becomes Generally Available.  As a result, automated testing does not work in GCC High.  GCC High customers will need to manually implement and test their improvement actions in the Compliance Manager.  For more information, please see Settings for automated testing and user history.

 

 

Azure Security Center with Azure Blueprints

 

Azure Security Center

Microsoft uses a wide variety of physical, infrastructure, and operational controls to help secure Azure, but there are additional actions you need to take to help safeguard your workloads. You may turn on the Azure Security Center to strengthen your cloud security posture:

 

  • Assess and visualize the security state of your resources in Azure, on-premises, and in other clouds with Azure Secure Score;
  • Simplify enterprise compliance and view your compliance against regulatory requirements such as NIST SP 800-171 and CMMC;
  • Protect all your hybrid cloud workloads with Azure Defender, which is integrated with Security Center; and
  • Use AI and automation to cut through false alarms, quickly identify threats, and streamline threat investigation.

You may assess the security state of all your cloud resources, including servers, storage, SQL, networks, applications, and workloads that are running in Azure, on-premises, and in other clouds. This includes the ability to visualize your security state and improve your security posture by using Azure Secure Score recommendations.  You may view your compliance against a wide variety of regulatory requirements or company security requirements by centrally managing security policies to perform ongoing assessment and get rich, actionable insights and reports to simplify compliance.

 

Azure Security Center 1.png

 

Azure Security Center 2.png

 

Note:  The Azure Security Center is available today in both Commercial and in Azure Government.

 

Azure Blueprints

Just as a blueprint allows an engineer or an architect to sketch a project's design parameters, Azure Blueprints enables cloud architects and central information technology groups to define a repeatable set of Azure resources that implements and adheres to an organization's standards, patterns, and requirements. Azure Blueprints makes it possible for development teams to rapidly build and stand up new environments with trust they're building within organizational compliance with a set of built-in components, such as networking, to speed up development and delivery.

 

Blueprints are a declarative way to orchestrate the deployment of various resource templates and other artifacts such as:

 

  • Role Assignments
  • Policy Assignments
  • Azure Resource Manager templates (ARM templates)
  • Resource Groups

 

The Azure Blueprints service is designed to help with environment setup. This setup often consists of a set of resource groups, policies, role assignments, and ARM template deployments. A blueprint is a package to bring each of these artifact types together and allow you to compose and version that package, including through a continuous integration and continuous delivery (CI/CD) pipeline. Ultimately, each is assigned to a subscription in a single operation that can be audited and tracked.

 

With Azure Blueprints, the relationship between the blueprint definition (what should be deployed) and the blueprint assignment (what was deployed) is preserved. This connection supports improved tracking and auditing of deployments. Azure Blueprints can also upgrade several subscriptions at once that are governed by the same blueprint.

 

Update.pngAzure Policy and Blueprint Sample for CMMC Level 3

 

An Azure Policy and Blueprint allows organizations to easily establish compliant environments. Azure Policy is implemented via a centrally managed policy initiative that helps ensure cloud compliance, avoid misconfigurations, and practice consistent resource governance. An Azure blueprint simplifies large scale Azure deployments by packaging key artifacts such as policy initiatives, Azure Resource Manager (ARM) templates, and role-based access controls.

 

A new Azure policy initiative and blueprint sample for CMMC Level 3 are currently in development. The CMMC policy initiative builds upon the existing NIST SP 800-171 policy initiative/blueprint sample with the addition of 110 new policies. Any relevant new policies will be back-ported into the NIST SP 800-171 sample after the CMMC sample is finalized.

 

The CMMC policy initiative and blueprint sample is currently in Private Preview. It will transition to Public Preview in February 2021 with availability in both Azure Commercial and Government clouds.

 

 

Compliance Manager and the Azure Security Center

You may observe there are two different compliance tools depending on the use of Microsoft 365 or Microsoft Azure.  While there are currently two different tools, they are not mutually exclusive in use.  Holistic compliance with CMMC requires the use of both the Compliance Manager and the Azure Security Center.  You deploy the Compliance Manager with the Assessment Template for CMMC for coverage of Microsoft 365 products and features, such as Office 365 and Enterprise Mobility & Security.  Generally speaking, this includes coverage for most SaaS offerings.  You will also want to deploy the Azure Security Center with the Azure Blueprint sample for CMMC (roadmap) for coverage of Azure IaaS and PaaS offerings.  We are working on integration between the two tools along with integration with Azure Sentinel in the future roadmap.  In the meantime, you will need to leverage both panes of glass for CMMC compliance.

 

 

 

Zero Trust Architecture with Azure Blueprints

 

Zero Trust Architecture

Today, many of our customers in regulated industries are adopting a Zero Trust architecture - moving to a security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they’re located.

 

Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to “never trust, always verify.” In a Zero Trust model, every access request is strongly authenticated, authorized within policy constraints, and inspected for anomalies before granting access. This approach aids the process of achieving compliance for industries that use NIST-based controls including the DIB and government.

 

A Zero Trust approach should extend throughout the entire digital estate and serve as an integrated security philosophy and end-to-end strategy, across three primary principles: (1) verify explicitly, (2) enforce least privilege access, and (3) assume breach.

 

Update.pngAzure blueprint for the Azure Security Benchmark Foundation

 

We have developed a GitHub Repo for an Azure Blueprint sample enabling Configuration-as-Code for Azure subscriptions.  The Azure Blueprint for Azure Security Benchmark Foundation (formerly “Zero Trust”) enables application developers and security administrators to more easily create hardened environments for their application workloads. Essentially, the blueprint will help you implement Zero Trust controls across six foundational elements: identities, devices, applications, data, infrastructure, and networks.

 

Using the Azure Security Center and Azure Blueprints service, the blueprint sample will first configure your VNET to deny all network traffic by default, enabling you to extend it and/or set rules for selective traffic based on your business needs. In addition, the blueprint enforces and maintains Azure resource behaviors and configuration in compliance with specific NIST SP 800-53 security control requirements using Azure Policy.

 

The blueprint includes Azure Resource Manager templates to deploy and configure Azure resources such as Virtual Network, Network Security Groups, Azure Key Vault, Azure Monitor, Azure Security Center, and more. If you’re working with applications that need to comply with FedRAMP High or DoD Impact Level 4 requirements or just want to improve the security posture of your cloud deployment, the blueprint for Zero Trust is designed to help you get there faster.

 

The ASBF blueprint is currently in preview with limited support. To learn more and find instructions to deploy into Azure, see the ASBF repo. For more information, questions, and feedback, please contact us at ASBF feedback.

 

We are also working on updates in support of NIST SP 800-171 and CMMC for availability in the first half of calendar year 2021.

 

 

CMMC Documentation

 

CMMC Compliance Documentation

There are several artifacts we are working on for release this year 2021, to include:

 

  • SSP: System Security Plan with customer scope of responsibility detailed
  • CIS: Control Implementation Summary per environment (IaaS, PaaS and SaaS)
  • SAR: Security Assessment Report from Microsoft’s C3PAO engagement
  • Documented auditor observations based on pre-defined tenant configuration

 

Microsoft Cybersecurity Reference Architecture

 

The Microsoft Cybersecurity Reference Architecture (MCRA) describes Microsoft’s cybersecurity capabilities and how they integrate with existing security architectures. We have seen this document used for several purposes by our customers to include:

 

  • Starting template for a security architecture - The most common use case we see is that organizations use the document to help define a target state for cybersecurity capabilities. Organizations find this architecture useful because it covers capabilities across the modern enterprise estate that now spans on-premises, mobile devices, many clouds, and IoT / Operational Technology.
  • Comparison reference for security capabilities - We know of several organizations that have marked up a printed copy with what capabilities they already own from various Microsoft license suites (many customers don't know they own quite a bit of this technology), which ones they already have in place (from Microsoft or partner/3rd party), and which ones are new and could fill a need.
  • Learn about Microsoft capabilities - In presentation mode, each capability has a "ScreenTip" with a short description of each capability + a link to documentation on that capability to learn more.
  • Learn about Microsoft's integration investments - The architecture includes visuals of key integration points with partner capabilities (e.g. SIEM/Log integration, Security Appliances in Azure, DLP integration, and more) and within our own product capabilities among (e.g. Advanced Threat Protection, Conditional Access, and more).
  • Learn about Cybersecurity - We have also heard reports of folks new to cybersecurity using this as a learning tool as they prepare for their first career or a career change.

Microsoft Cybersecurity Reference Architecture.png

 

The Microsoft Cybersecurity Reference Architecture is available here. Additional training resources are available here.

 

An update will be released early this year 2021 to include the branding updates announced at Ignite 2020.  Most notably, the use of the Microsoft Defender branding will be incorporated in the update to MCRA.

 

Microsoft Blog Posts on CMMC

 

Program Scaffolding for Managed Service Providers

Behind the scenes, we are actively working with our partner community, and in particular the Managed Service Providers (MSP), to deliver scaffolding in the construction of CMMC offerings.  The CMMC Acceleration Program is comprised of many different components as described above, and several that are yet unannounced.  The intent is to provide building blocks, or what we call “scaffolding”, to our partners in support of their CMMC offers.  Our partners will be enabled in our partner marketplace with advance specializations for CMMC and their concentration on the Defense Industrial Base.  In alignment with the commitments made in our original CMMC Announcement, our MSP partners will implement reference architectures and compliance solutions for CMMC.

 

Into the Future

Microsoft is actively engaged with customers, partners, the CMMC Accreditation Body, and multiple industry working groups to refine what resources we should develop and make available as part of the CMMC Acceleration Program.  We have many grand ideas, and welcome to feedback from the community at large.  Please fill out this short survey to join our CMMC feedback loop if you are interested in learning more about the program.

 

For general comments on the CMMC Acceleration Program: Contact Us

 

Appendix

 

Please follow me here and on LinkedIn. Here are my additional blog articles:

 

Blog Title

Aka Link

Accelerating CMMC compliance for Microsoft cloud (in depth review)

https://aka.ms/CMMCResponse

Updated! Microsoft CMMC Acceleration Program Update – January 2021 (This One)

http://aka.ms/CMMCAccelerationProgramUpdate

History of Microsoft Cloud Service Offerings leading to the US Sovereign Cloud for Government

https://aka.ms/AA632wo

Gold Standard! Understanding Compliance Between Microsoft 365 Commercial, GCC, GCC-High and DoD Offerings 

https://aka.ms/MSGovCompliance

The Microsoft 365 Government (GCC High) Conundrum - DIB Data Enclave vs Going All In

https://aka.ms/AA6frar

Microsoft US Sovereign Cloud Myth Busters - A Global Address List (GAL) Can Span Multiple Tenants

https://aka.ms/AA6seih

Microsoft US Sovereign Cloud Myth Busters - A Single Domain Should Not Span Multiple Tenants

https://aka.ms/AA6vf3n

Microsoft US Sovereign Cloud Myth Busters - Active Directory Does Not Require Restructuring

https://aka.ms/AA6xn69

Microsoft US Sovereign Cloud Myth Busters - CUI Effectively Requires Data Sovereignty

https://aka.ms/CUISovereignty

New! Microsoft expands qualification of contractors for government cloud offerings

https://aka.ms/GovCloudEligibility 

 

10 Comments
Occasional Visitor

Excellent collection Richard. Just what I have been looking for.

 

Occasional Visitor

Hello, Do you know around when in February the blueprints will be released? and are there any requirements to access them? thanks!

Microsoft

@jcrodriguez-Gulf The CMMC Level 3 Policy Initiative Public Preview is now live in Commercial, and will be available in Gov within the next 1-2 weeks.  The Blueprint will track 1-2 weeks behind the Policy initiative releases, so expect Commercial Blueprint availability by 2/19.

Occasional Visitor

This stuff is game changing! Thank you so much. Now, I have one grievance - that the Government-related standards templates (i.e. CMMC, SP 800-171, DFARS) are not available by default when a customer is in the GCC.

Senior Member

Any timeline on when the “SSP: System Security Plan with customer scope of responsibility detailed” will be released?

Senior Member

@RichardWakeman and @adimopoulos 

 

I am eagerly waiting for the release of “SSP: System Security Plan with customer scope of responsibility detailed”. Do you have an approximate timeline for this?

 

Thanks for your time in advance.

Microsoft

@HBlack007 Thank you for the feedback!  We are now proud to announce the CMMC Assessment Templates for the M365 Compliance Manager are available by default for GCC and GCC High.  The only prerequisite is to unlock access to the Assessment Templates, you will need at least one E5 SKU in your tenant.  But no additional cost beyond that!

Microsoft

@Srinivas Rautwar We can provide you access to our SSPs that are based on NIST SP 800-53 and include the Customer Responsibility Matrix.  Our customers going through DIBCAC and CMMC assessments will need these to establish Microsoft scope of responsibility and inheritance using reciprocity with FedRAMP.  As we roll out updates for documentation to align with the schema for CMMC, the SSP you mention will include customer statements for your SSP.  You can see this emerging already in the Product Placemat down at the bottom of the page with the "Practice Implementation Details".  We will have a refresh with much more detail coming this summer timeframe.  I do encourage you to look at the Placemat today and provide us with any feedback you have at https://aka.ms/cmmc/productplacematfeedback.

Senior Member

@RichardWakeman Thanks a lot for your prompt response. I did look at the Placemat and it is amazing!


Can you please provide me access to your SSPs that are based on NIST SP 800-53?


Once again, I appreciate your help. 

Microsoft

@Srinivas Rautwar All but the GCC High SSP are found here:  Service Trust Portal for FedRAMP Audit Reports (must authenticate).  For the GCC High SSP, you must be an existing customer to get access to the FedRAMP Portal.

%3CLINGO-SUB%20id%3D%22lingo-sub-2033499%22%20slang%3D%22en-US%22%3EMicrosoft%20CMMC%20Acceleration%20Program%20Update%20%E2%80%93%20January%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2033499%22%20slang%3D%22en-US%22%3E%3CH2%20id%3D%22toc-hId--553864006%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--553864036%22%20id%3D%22toc-hId--554727786%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Compliance%20Score.png%22%20style%3D%22width%3A%20564px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F229706i47564F16A739E883%2Fimage-dimensions%2F564x339%3Fv%3D1.0%22%20width%3D%22564%22%20height%3D%22339%22%20role%3D%22button%22%20title%3D%22Compliance%20Score.png%22%20alt%3D%22Compliance%20Score.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20are%20actively%20building%20out%20our%20program%20by%20developing%20resources%20for%20both%20partners%20and%20Defense%20Industrial%20Base%20(DIB)%20companies%20to%20leverage%20in%20their%20Cybersecurity%20Maturity%20Model%20Certification%20(CMMC)%20journey.%20These%20tools%20cannot%20guarantee%20a%20positive%20CMMC%20adjudication%2C%20but%20they%20may%20assist%20candidate%20organizations%20by%20improving%20their%20CMMC%20posture%20going%20into%20a%20formal%20CMMC%20review%20in%20accordance%20with%20CMMC%20Accreditation%20Body%20(AB)%20standards.%20While%20we%20plan%20to%20release%20resources%20and%20guidance%20in%20waves%2C%20please%20keep%20in%20mind%20we%20are%20dependent%20upon%20the%20CMMC%20AB%20finalizing%20the%20CMMC%20guidance%20itself.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHere%20is%20a%20summary%20of%20current%20resources%20to%20help%20get%20you%20started%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorRichardWakeman_0%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-136697468%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-136697438%22%20id%3D%22toc-hId-135833688%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22Update.png%22%20style%3D%22width%3A%20110px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244331i7B77095BD9502C7C%2Fimage-size%2Fsmall%3Fv%3D1.0%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22Update.png%22%20alt%3D%22Update.png%22%20%2F%3E%3C%2FSPAN%3EMicrosoft%20Product%20Placemat%20for%20CMMC%3C%2FH3%3E%0A%3CP%3EThe%20Microsoft%20Product%20Placemat%20for%20CMMC%20is%20an%20interactive%20view%20representing%20how%20Microsoft%20cloud%20products%20and%20services%20satisfy%20requirements%20for%20CMMC%20practices.%26nbsp%3B%20The%20user%20interface%20resembles%20a%20periodic%20table%20of%20CMMC%20Practice%20Families.%26nbsp%3B%20The%20default%20view%20illustrates%20the%20practices%20with%20Microsoft%20Coverage%20that%20are%20inherited%20from%20the%20underlying%20cloud%20platform.%26nbsp%3B%20It%20also%20depicts%20practices%20for%20Shared%20Coverage%20where%20the%20underlying%20cloud%20platform%20contributes%20coverage%20for%20specific%20practices%20but%20requires%20additional%20customer%20configuration%20to%20satisfy%20requirements%20for%20full%20coverage.%26nbsp%3B%20For%20each%20practice%20that%20aligns%20with%20Microsoft%20Coverage%20or%20Shared%20Coverage%2C%20verbal%20customer%20implementation%20guidance%20and%20practice%20implementation%20details%20are%20documented.%26nbsp%3B%20This%20enables%20you%20to%20drill%20down%20into%20each%20practice%20and%20discover%20details%20on%20inheritance%20and%20prescriptive%20guidance%20for%20actions%20to%20be%20taken%20by%20the%20customer%20to%20meet%20practice%20requirements%20in%20the%20shared%20scope%20of%20responsibility%20for%20compliance%20with%20CMMC.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20addition%20to%20the%20default%20view%2C%20you%20may%20select%20and%20include%20products%2C%20features%20and%20suite%20SKUs%20to%20adjust%20how%20each%20cloud%20product%20is%20placed%20with%20CMMC.%26nbsp%3B%20For%20example%2C%20you%20may%20select%20the%20Microsoft%20365%20E5%20SKU%20for%20maximum%20coverage%20of%20CMMC%20where%2018%20of%20the%20CMMC%20practices%20are%20Microsoft%20Coverage%20and%2074%20practices%20are%20Shared%20Coverage.%26nbsp%3B%20This%20is%20extraordinary%20as%20nearly%2080%25%20of%20the%20practices%20for%20CMMC%20Level%203%20have%20coverage%20leveraging%20the%20spectrum%20of%20capabilities%20on%20the%20Microsoft%20cloud%20with%20the%20E5%20SKU!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Microsoft%20CMMC%20Product%20Placemat%20Public%20Preview.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244788i7D649C1F4B94257C%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Microsoft%20CMMC%20Product%20Placemat%20Public%20Preview.png%22%20alt%3D%22Microsoft%20CMMC%20Product%20Placemat%20Public%20Preview.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Microsoft%20Product%20Placemat%20for%20CMMC%20is%20currently%20in%20public%20preview.%26nbsp%3B%20You%20may%20download%20a%20copy%20at%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fcmmc%2Fproductplacemat%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fcmmc%2Fproductplacemat%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPlease%20share%20feedback%20at%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fcmmc%2Fproductplacematfeedback%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fcmmc%2Fproductplacematfeedback%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-126194364%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-126194334%22%20id%3D%22toc-hId-125330584%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22Update.png%22%20style%3D%22width%3A%20110px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244321i9251139D22F28875%2Fimage-size%2Fsmall%3Fv%3D1.0%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22Update.png%22%20alt%3D%22Update.png%22%20%2F%3E%3C%2FSPAN%3EAzure%20Sentinel%3A%20Cloud-Native%20SIEM%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESee%20and%20stop%20threats%20before%20they%20cause%20harm%2C%20with%20SIEM%20reinvented%20for%20a%20modern%20world.%20Azure%20Sentinel%20is%20your%20birds-eye%20view%20across%20the%20enterprise.%20Put%20the%20cloud%20and%20large-scale%20intelligence%20from%20decades%20of%20Microsoft%20security%20experience%20to%20work.%20Make%20your%20threat%20detection%20and%20response%20smarter%20and%20faster%20with%20artificial%20intelligence%20(AI).%20Eliminate%20security%20infrastructure%20setup%20and%20maintenance%2C%20and%20elastically%20scale%20to%20meet%20your%20security%20needs%E2%80%94while%20reducing%20IT%20costs.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ECollect%20data%20at%20cloud%20scale%E2%80%94across%20all%20users%2C%20devices%2C%20applications%2C%20and%20infrastructure%2C%20both%20on-premises%20and%20in%20multiple%20clouds%3C%2FLI%3E%0A%3CLI%3EDetect%20previously%20uncovered%20threats%20and%20minimize%20false%20positives%20using%20analytics%20and%20unparalleled%20threat%20intelligence%20from%20Microsoft%3C%2FLI%3E%0A%3CLI%3EInvestigate%20threats%20with%20AI%20and%20hunt%20suspicious%20activities%20at%20scale%2C%20tapping%20into%20decades%20of%20cybersecurity%20work%20at%20Microsoft%3C%2FLI%3E%0A%3CLI%3ERespond%20to%20incidents%20rapidly%20with%20built-in%20orchestration%20and%20automation%20of%20common%20tasks%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EInvest%20in%20security%2C%20not%20infrastructure%20setup%20and%20maintenance%20with%20the%20first%20cloud-native%20SIEM%20from%20a%20major%20cloud%20provider.%20Never%20again%20let%20a%20storage%20limit%20or%20a%20query%20limit%20prevent%20you%20from%20protecting%20your%20enterprise.%20Start%20using%20Azure%20Sentinel%20immediately%2C%20automatically%20scale%20to%20meet%20your%20organizational%20needs%2C%20and%20only%20pay%20for%20the%20resources%20you%20need.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20more%20information%2C%20please%20see%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fazure-sentinel%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fazure-sentinel%3C%2FA%3E%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorRichardWakeman_1%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Sentinel.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244323iD275893218B76D9C%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Sentinel.png%22%20alt%3D%22Sentinel.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CEM%3ECollect%20data%20at%20cloud%20scale%E2%80%94across%20all%20users%2C%20devices%2C%20applications%2C%20and%20infrastructure%2C%20both%20on-premises%20and%20in%20multiple%20clouds%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1681260099%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1681260129%22%20id%3D%22toc-hId--1682123879%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22Update.png%22%20style%3D%22width%3A%20110px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244324iEAE93AD3BFDBDF5B%2Fimage-size%2Fsmall%3Fv%3D1.0%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22Update.png%22%20alt%3D%22Update.png%22%20%2F%3E%3C%2FSPAN%3EAzure%20Sentinel%3A%20CMMC%20Workbook%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Azure%20Sentinel%20CMMC%20Workbook%20provides%20a%20mechanism%20for%20viewing%20log%20queries%20aligned%20to%20CMMC%20controls%20across%20the%20Microsoft%20portfolio%20including%20Microsoft%20security%20offerings%2C%20Office%20365%2C%20Teams%2C%20Intune%2C%20Windows%20Virtual%20Desktop%20and%20many%20more.%20This%20workbook%20enables%20Security%20Architects%2C%20Engineers%2C%20SecOps%20Analysts%2C%20Managers%2C%20and%20IT%20Pros%20to%20gain%20situational%20awareness%20visibility%20for%20the%20security%20posture%20of%20cloud%20workloads.%20There%20are%20also%20recommendations%20for%20selecting%2C%20designing%2C%20deploying%2C%20and%20configuring%20Microsoft%20offerings%20for%20alignment%20with%20respective%20CMMC%20requirements%20and%20practices.%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorRichardWakeman_3%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Sentinel%20CMMC.png%22%20style%3D%22width%3A%20726px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244325i7A5308CA5B8C0CB6%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Sentinel%20CMMC.png%22%20alt%3D%22Sentinel%20CMMC.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CEM%20style%3D%22font-family%3A%20inherit%3B%22%3ENote%3A%26nbsp%3B%20The%20Azure%20Sentinel%20CMMC%20Workbook%20is%20currently%20in%20Private%20Preview%20and%20will%20release%20in%20a%20Public%20Preview%20in%20early%20February%202021.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-806252734%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-806252704%22%20id%3D%22toc-hId-805388954%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22Update.png%22%20style%3D%22width%3A%20110px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244969i9A3C5D21C802FBDE%2Fimage-size%2Fsmall%3Fv%3D1.0%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22Update.png%22%20alt%3D%22Update.png%22%20%2F%3E%3C%2FSPAN%3EQuickly%20deploy%20DoD%20STIG-compliant%20images%20and%20visualize%20compliance%20using%20Azure%3C%2FH2%3E%0A%3CP%3EAt%20Microsoft%2C%20our%20security%20and%20compliance%20story%20is%20one%20of%20our%20greatest%20differentiators.%20Microsoft%20recognizes%20the%20criticality%20of%20security%20compliance%20accreditations%20for%20DIB%20and%20DoD%20customers.%20Maintaining%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fpublic.cyber.mil%2Fstigs%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EDefense%20Information%20Systems%20Agency%20(DISA)%20Security%20Technical%20Implementation%20Guides%20(STIGs)%3C%2FA%3E%26nbsp%3Bcompliance%20is%20critical%20and%20often%20time%20consuming.%20STIGs%20are%20secure%20configuration%20standards%20for%20installation%20and%20maintenance%20of%20DoD%20Information%20Assurance%20(IA)%20and%20IA-enabled%20devices%20and%20systems.%20Azure%20provides%20automation%20and%20compliance%20dashboarding%20capabilities%20at%20cloud%20speed%20and%20scale%2C%20allowing%20customers%20to%20reduce%20the%20heavy%20costs%20of%20compliance%20when%20they%20choose%20Azure.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Azure%20Team%20has%20created%20sample%20solutions%20using%20first-party%20Azure%20tooling%20to%20deliver%20STIG%20automation%20and%20compliance%20reporting.%20The%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FAAakti2%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESTIG%20Automation%20GitHub%20Repository%3C%2FA%3E%2C%20enables%20customers%20to%3A%20Automate%20STIG%20implementation%20and%20baseline%20updates%20with%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fvirtual-machines%2Fwindows%2Fimage-builder-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Image%20Builder%3C%2FA%3E%26nbsp%3Bvisualize%20compliance%20with%20Azure%20Monitor%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-monitor%2Flog-query%2Flog-analytics-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ELog%20Analytics%3C%2FA%3E%26nbsp%3Bor%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fazure-sentinel%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESentinel%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAvailable%20for%20use%20with%20Azure%20commercial%20today%20and%20coming%20soon%20to%20Azure%20Government.%26nbsp%3B%20You%20can%20read%20more%20about%20the%20solution%20here%3A%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fquickly-deploy-dod-stig-compliant-images-and-visualize-compliance-using-azure%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EQuickly%20deploy%20DoD%20STIG-compliant%20images%20and%20visualize%20compliance%20using%20Azure%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1001201729%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1001201759%22%20id%3D%22toc-hId--1002065509%22%3EMicrosoft%20Compliance%20Manager%20with%20Assessment%20Templates%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--310640255%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--310640285%22%20id%3D%22toc-hId--311504035%22%3ECompliance%20Manager%3C%2FH3%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fcompliance.microsoft.com%2Fcompliancemanager%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Compliance%20Manager%3C%2FA%3E%26nbsp%3Bis%20a%20feature%20in%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fmicrosoft-365-compliance-center%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20365%20compliance%20center%3C%2FA%3E%26nbsp%3Bthat%20helps%20you%20manage%20your%20organization%E2%80%99s%20compliance%20requirements%20with%20greater%20ease%20and%20convenience.%20Compliance%20Manager%20may%20help%20you%20throughout%20your%20compliance%20journey%2C%20from%20taking%20inventory%20of%20your%20apparent%20data%20protection%20risks%20to%20managing%20the%20complexities%20of%20implementing%20controls%2C%20staying%20current%20with%20regulations%20and%20certifications%2C%20and%20reporting%20to%20auditors.%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECompliance%20Manager%20helps%20simplify%20compliance%20and%20reduces%20risk%20by%20providing%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EPre-built%20assessments%20for%20common%20industry%20and%20regional%20standards%20and%20regulations%2C%20or%20custom%20assessments%20to%20meet%20your%20unique%20compliance%20needs.%26nbsp%3B%3CUL%3E%0A%3CLI%3EThe%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fcompliance-manager-templates-list%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAssessment%20Templates%3C%2FA%3E%20include%20NIST%20SP%20800-171%20and%20projected%20requirements%20for%20CMMC%20Levels%201-5.%3C%2FLI%3E%0A%3CLI%3EThe%20Assessment%20Templates%20that%20are%20available%20to%20your%20organization%20depend%20on%20your%20licensing%20agreement.%20%3CA%20href%3D%22https%3A%2F%2Fgo.microsoft.com%2Ffwlink%2F%3Flinkid%3D2132371%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EReview%20the%20details%3C%2FA%3E.%26nbsp%3B%20%3CEM%3EHINT%3A%26nbsp%3B%20You%20will%20need%20an%20E5%20SKU.%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3EWorkflow%20capabilities%20to%20help%20you%20efficiently%20complete%20your%20risk%20assessments%20through%20a%20single%20tool.%3C%2FLI%3E%0A%3CLI%3EDetailed%20step-by-step%20guidance%20on%20suggested%20improvement%20actions%20to%20help%20you%20comply%20with%20known%20CMMC%20standards%20and%20regulations%20that%20are%20most%20relevant%20for%20your%20organization.%20For%20actions%20that%20are%20managed%20by%20Microsoft%2C%20you%E2%80%99ll%20see%20implementation%20details%20and%20audit%20results.%3C%2FLI%3E%0A%3CLI%3EA%20projected%20risk-based%20compliance%20score%20to%20help%20you%20understand%20your%20compliance%20posture%20by%20measuring%20your%20progress%20in%20completing%20improvement%20actions.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYour%20Compliance%20Manager%20dashboard%20shows%20your%20current%20projected%20CMMC%20compliance%20score%2C%20helps%20you%20see%20what%20needs%20attention%2C%20and%20guides%20you%20to%20key%20improvement%20actions.%20Below%20is%20an%20example%20of%20what%20your%20Compliance%20Manager%20dashboard%20will%20look%20like%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Compliance%20Manager.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F229709i6612CD1A252AF710%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Compliance%20Manager.png%22%20alt%3D%22Compliance%20Manager.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CEM%3EPlease%20note%2C%20%26nbsp%3Bthe%20Compliance%20Manager%20dashboard%20is%20a%20projection%20of%20your%20organization%E2%80%99s%20CMMC%20compliance%20profile%20based%20on%20all%20available%20information%20to%20date%E2%80%94Microsoft%20is%20not%20an%20accrediting%20body%20under%20the%20CMMC%2C%20and%20thus%20cannot%20guarantee%20any%20outcome%20under%20the%20formal%20CMMC%20review%20process.%3C%2FEM%3E%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--2118094718%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118094748%22%20id%3D%22toc-hId--2118958498%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId-369418115%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-369418085%22%20id%3D%22toc-hId-368554335%22%3EUnderstanding%20your%20compliance%20score%3C%2FH3%3E%0A%3CP%3ECompliance%20Manager%20awards%20you%20points%20for%20completing%20improvement%20actions%20taken%20to%20comply%20with%20a%20regulation%2C%20standard%2C%20or%20policy%2C%20and%20combines%20those%20points%20into%20an%20overall%20compliance%20score.%20Each%20action%20has%20a%20different%20impact%20on%20your%20score%20depending%20on%20the%20potential%20risks%20involved.%20Your%20compliance%20score%20helps%20you%20prioritize%20which%20actions%20to%20focus%20on%20to%20improve%20your%20overall%20compliance%20posture.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECompliance%20Manager%20gives%20you%20an%20initial%20score%20based%20on%20the%20Microsoft%20365%20data%20protection%20baseline.%20This%20baseline%20is%20a%20set%20of%20controls%20that%20includes%20key%20regulations%20and%20standards%20for%20data%20protection%20and%20general%20data%20governance.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--1438036348%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438036378%22%20id%3D%22toc-hId--1438900128%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22Update.png%22%20style%3D%22width%3A%20110px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244326iB729253E13688A0D%2Fimage-size%2Fsmall%3Fv%3D1.0%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22Update.png%22%20alt%3D%22Update.png%22%20%2F%3E%3C%2FSPAN%3ECompliance%20Manager%20Availability%20in%20GCC%20and%20GCC%20High%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Compliance%20Manager%20is%20now%20available%20in%20all%20Microsoft%20365%20cloud%20offerings%2C%20including%20GCC%20and%20GCC%20High!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHowever%2C%20the%20Secure%20Score%20feature%20is%20still%20in%20preview%20within%20Commercial%20and%20GCC.%26nbsp%3B%20Secure%20Score%20will%20not%20release%20in%20GCC%20High%20until%20it%20becomes%20Generally%20Available.%26nbsp%3B%20As%20a%20result%2C%20automated%20testing%20does%20not%20work%20in%20GCC%20High.%26nbsp%3B%20GCC%20High%20customers%20will%20need%20to%20manually%20implement%20and%20test%20their%20improvement%20actions%20in%20the%20Compliance%20Manager.%26nbsp%3B%20For%20more%20information%2C%20please%20see%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fcompliance-manager-setup%3Fview%3Do365-worldwide%23settings-for-automated-testing-and-user-history%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESettings%20for%20automated%20testing%20and%20user%20history%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-225230287%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-225230257%22%20id%3D%22toc-hId-224366507%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1582224176%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1582224206%22%20id%3D%22toc-hId--1583087956%22%3EAzure%20Security%20Center%20with%20Azure%20Blueprints%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1034371376%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1034371346%22%20id%3D%22toc-hId-1033507596%22%3EAzure%20Security%20Center%3C%2FH3%3E%0A%3CP%3EMicrosoft%20uses%20a%20wide%20variety%20of%20physical%2C%20infrastructure%2C%20and%20operational%20controls%20to%20help%20secure%20Azure%2C%20but%20there%20are%20additional%20actions%20you%20need%20to%20take%20to%20help%20safeguard%20your%20workloads.%20You%20may%20turn%20on%20the%20Azure%20Security%20Center%20to%20strengthen%20your%20cloud%20security%20posture%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EAssess%20and%20visualize%20the%20security%20state%20of%20your%20resources%20in%20Azure%2C%20on-premises%2C%20and%20in%20other%20clouds%20with%20Azure%20Secure%20Score%3B%3C%2FLI%3E%0A%3CLI%3ESimplify%20enterprise%20compliance%20and%20view%20your%20compliance%20against%20regulatory%20requirements%20such%20as%20NIST%20SP%20800-171%20and%20CMMC%3B%3C%2FLI%3E%0A%3CLI%3EProtect%20all%20your%20hybrid%20cloud%20workloads%20with%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fazure-defender%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Defender%3C%2FA%3E%2C%20which%20is%20integrated%20with%20Security%20Center%3B%20and%3C%2FLI%3E%0A%3CLI%3EUse%20AI%20and%20automation%20to%20cut%20through%20false%20alarms%2C%20quickly%20identify%20threats%2C%20and%20streamline%20threat%20investigation.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EYou%20may%20assess%20the%20security%20state%20of%20all%20your%20cloud%20resources%2C%20including%20servers%2C%20storage%2C%20SQL%2C%20networks%2C%20applications%2C%20and%20workloads%20that%20are%20running%20in%20Azure%2C%20on-premises%2C%20and%20in%20other%20clouds.%20This%20includes%20the%20ability%20to%20visualize%20your%20security%20state%20and%20improve%20your%20security%20posture%20by%20using%20Azure%20Secure%20Score%20recommendations.%26nbsp%3B%20You%20may%20view%20your%20compliance%20against%20a%20wide%20variety%20of%20regulatory%20requirements%20or%20company%20security%20requirements%20by%20centrally%20managing%20security%20policies%20to%20perform%20ongoing%20assessment%20and%20get%20rich%2C%20actionable%20insights%20and%20reports%20to%20simplify%20compliance.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Azure%20Security%20Center%201.png%22%20style%3D%22width%3A%20720px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F229711i52A84EBD898928B2%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Azure%20Security%20Center%201.png%22%20alt%3D%22Azure%20Security%20Center%201.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Azure%20Security%20Center%202.png%22%20style%3D%22width%3A%20720px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F229712iB80FF38EA73C0B8B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Azure%20Security%20Center%202.png%22%20alt%3D%22Azure%20Security%20Center%202.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CEM%3ENote%3A%26nbsp%3B%20The%20Azure%20Security%20Center%20is%20available%20today%20in%20both%20Commercial%20and%20in%20Azure%20Government.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--773083087%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773083117%22%20id%3D%22toc-hId--773946867%22%3EAzure%20Blueprints%3C%2FH3%3E%0A%3CP%3EJust%20as%20a%20blueprint%20allows%20an%20engineer%20or%20an%20architect%20to%20sketch%20a%20project's%20design%20parameters%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fgovernance%2Fblueprints%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Blueprints%3C%2FA%3E%20enables%20cloud%20architects%20and%20central%20information%20technology%20groups%20to%20define%20a%20repeatable%20set%20of%20Azure%20resources%20that%20implements%20and%20adheres%20to%20an%20organization's%20standards%2C%20patterns%2C%20and%20requirements.%20Azure%20Blueprints%20makes%20it%20possible%20for%20development%20teams%20to%20rapidly%20build%20and%20stand%20up%20new%20environments%20with%20trust%20they're%20building%20within%20organizational%20compliance%20with%20a%20set%20of%20built-in%20components%2C%20such%20as%20networking%2C%20to%20speed%20up%20development%20and%20delivery.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBlueprints%20are%20a%20declarative%20way%20to%20orchestrate%20the%20deployment%20of%20various%20resource%20templates%20and%20other%20artifacts%20such%20as%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ERole%20Assignments%3C%2FLI%3E%0A%3CLI%3EPolicy%20Assignments%3C%2FLI%3E%0A%3CLI%3EAzure%20Resource%20Manager%20templates%20(ARM%20templates)%3C%2FLI%3E%0A%3CLI%3EResource%20Groups%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Azure%20Blueprints%20service%20is%20designed%20to%20help%20with%20environment%20setup.%20This%20setup%20often%20consists%20of%20a%20set%20of%20resource%20groups%2C%20policies%2C%20role%20assignments%2C%20and%20ARM%20template%20deployments.%20A%20blueprint%20is%20a%20package%20to%20bring%20each%20of%20these%20artifact%20types%20together%20and%20allow%20you%20to%20compose%20and%20version%20that%20package%2C%20including%20through%20a%20continuous%20integration%20and%20continuous%20delivery%20(CI%2FCD)%20pipeline.%20Ultimately%2C%20each%20is%20assigned%20to%20a%20subscription%20in%20a%20single%20operation%20that%20can%20be%20audited%20and%20tracked.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20Azure%20Blueprints%2C%20the%20relationship%20between%20the%20blueprint%20definition%20(what%20should%20be%20deployed)%20and%20the%20blueprint%20assignment%20(what%20was%20deployed)%20is%20preserved.%20This%20connection%20supports%20improved%20tracking%20and%20auditing%20of%20deployments.%20Azure%20Blueprints%20can%20also%20upgrade%20several%20subscriptions%20at%20once%20that%20are%20governed%20by%20the%20same%20blueprint.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1714429746%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1714429716%22%20id%3D%22toc-hId-1713565966%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22Update.png%22%20style%3D%22width%3A%20110px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244329i2F2F35AE9C3A7AFA%2Fimage-size%2Fsmall%3Fv%3D1.0%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22Update.png%22%20alt%3D%22Update.png%22%20%2F%3E%3C%2FSPAN%3EAzure%20Policy%20and%20Blueprint%20Sample%20for%20CMMC%20Level%203%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAn%20Azure%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fazure-policy%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EPolicy%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fblueprints%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EBlueprint%3C%2FA%3E%20allows%20organizations%20to%20easily%20establish%20compliant%20environments.%20Azure%20Policy%20is%20implemented%20via%20a%20centrally%20managed%20policy%20initiative%20that%20helps%20ensure%20cloud%20compliance%2C%20avoid%20misconfigurations%2C%20and%20practice%20consistent%20resource%20governance.%20An%20Azure%20blueprint%20simplifies%20large%20scale%20Azure%20deployments%20by%20packaging%20key%20artifacts%20such%20as%20policy%20initiatives%2C%20Azure%20Resource%20Manager%20(ARM)%20templates%2C%20and%20role-based%20access%20controls.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EA%20new%20Azure%20policy%20initiative%20and%20blueprint%20sample%20for%20CMMC%20Level%203%20are%20currently%20in%20development.%20The%20CMMC%20policy%20initiative%20builds%20upon%20the%20existing%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fgovernance%2Fblueprints%2Fsamples%2Fnist-sp-800-171-r2%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ENIST%20SP%20800-171%3C%2FA%3E%20policy%20initiative%2Fblueprint%20sample%20with%20the%20addition%20of%20110%20new%20policies.%20Any%20relevant%20new%20policies%20will%20be%20back-ported%20into%20the%20NIST%20SP%20800-171%20sample%20after%20the%20CMMC%20sample%20is%20finalized.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20CMMC%20policy%20initiative%20and%20blueprint%20sample%20is%20currently%20in%20Private%20Preview.%20It%20will%20transition%20to%20Public%20Preview%20in%20February%202021%20with%20availability%20in%20both%20Azure%20Commercial%20and%20Government%20clouds.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--222107436%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222107466%22%20id%3D%22toc-hId--222971216%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--2029561899%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2029561929%22%20id%3D%22toc-hId--2030425679%22%3ECompliance%20Manager%20and%20the%20Azure%20Security%20Center%3C%2FH2%3E%0A%3CP%3EYou%20may%20observe%20there%20are%20two%20different%20compliance%20tools%20depending%20on%20the%20use%20of%20Microsoft%20365%20or%20Microsoft%20Azure.%26nbsp%3B%20While%20there%20are%20currently%20two%20different%20tools%2C%20they%20are%20not%20mutually%20exclusive%20in%20use.%26nbsp%3B%20Holistic%20compliance%20with%20CMMC%20requires%20the%20use%20of%20both%20the%20Compliance%20Manager%20and%20the%20Azure%20Security%20Center.%26nbsp%3B%20You%20deploy%20the%20Compliance%20Manager%20with%20the%20Assessment%20Template%20for%20CMMC%20for%20coverage%20of%20Microsoft%20365%20products%20and%20features%2C%20such%20as%20Office%20365%20and%20Enterprise%20Mobility%20%26amp%3B%20Security.%26nbsp%3B%20Generally%20speaking%2C%20this%20includes%20coverage%20for%20most%20SaaS%20offerings.%26nbsp%3B%20You%20will%20also%20want%20to%20deploy%20the%20Azure%20Security%20Center%20with%20the%20Azure%20Blueprint%20sample%20for%20CMMC%20(roadmap)%20for%20coverage%20of%20Azure%20IaaS%20and%20PaaS%20offerings.%26nbsp%3B%20We%20are%20working%20on%20integration%20between%20the%20two%20tools%20along%20with%20integration%20with%20Azure%20Sentinel%20in%20the%20future%20roadmap.%26nbsp%3B%20In%20the%20meantime%2C%20you%20will%20need%20to%20leverage%20both%20panes%20of%20glass%20for%20CMMC%20compliance.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-457950934%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457950904%22%20id%3D%22toc-hId-457087154%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1349503529%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1349503559%22%20id%3D%22toc-hId--1350367309%22%3EZero%20Trust%20Architecture%20with%20Azure%20Blueprints%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1267092023%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1267091993%22%20id%3D%22toc-hId-1266228243%22%3EZero%20Trust%20Architecture%3C%2FH3%3E%0A%3CP%3EToday%2C%20many%20of%20our%20customers%20in%20regulated%20industries%20are%20adopting%20a%20%3CA%20href%3D%22https%3A%2F%2Fwww.nist.gov%2Fpublications%2Fzero-trust-architecture%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EZero%20Trust%20architecture%3C%2FA%3E%20-%20moving%20to%20a%20security%20model%20that%20more%20effectively%20adapts%20to%20the%20complexity%20of%20the%20modern%20environment%2C%20embraces%20the%20mobile%20workforce%2C%20and%20protects%20people%2C%20devices%2C%20applications%2C%20and%20data%20wherever%20they%E2%80%99re%20located.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERegardless%20of%20where%20the%20request%20originates%20or%20what%20resource%20it%20accesses%2C%20Zero%20Trust%20teaches%20us%20to%20%E2%80%9Cnever%20trust%2C%20always%20verify.%E2%80%9D%20In%20a%20Zero%20Trust%20model%2C%20every%20access%20request%20is%20strongly%20authenticated%2C%20authorized%20within%20policy%20constraints%2C%20and%20inspected%20for%20anomalies%20before%20granting%20access.%20This%20approach%20aids%20the%20process%20of%20achieving%20compliance%20for%20industries%20that%20use%20NIST-based%20controls%20including%20the%20DIB%20and%20government.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EA%20Zero%20Trust%20approach%20should%20extend%20throughout%20the%20entire%20digital%20estate%20and%20serve%20as%20an%20integrated%20security%20philosophy%20and%20end-to-end%20strategy%2C%20across%20three%20primary%20principles%3A%20(1)%20verify%20explicitly%2C%20(2)%20enforce%20least%20privilege%20access%2C%20and%20(3)%20assume%20breach.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-157799501%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-157799471%22%20id%3D%22toc-hId-156935721%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-left%22%20image-alt%3D%22Update.png%22%20style%3D%22width%3A%20110px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F244330iBEE6E79CD87FEB56%2Fimage-size%2Fsmall%3Fv%3D1.0%26amp%3Bpx%3D200%22%20role%3D%22button%22%20title%3D%22Update.png%22%20alt%3D%22Update.png%22%20%2F%3E%3C%2FSPAN%3EAzure%20blueprint%20for%26nbsp%3Bthe%20Azure%20Security%20Benchmark%20Foundation%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20have%20developed%20a%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fzerotrust-blueprint%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EGitHub%20Repo%3C%2FA%3E%20for%20an%20Azure%20Blueprint%20sample%20enabling%20Configuration-as-Code%20for%20Azure%20subscriptions.%26nbsp%3B%20The%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fautomating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Blueprint%20for%20Azure%20Security%20Benchmark%20Foundation%3C%2FA%3E%20(formerly%20%E2%80%9CZero%20Trust%E2%80%9D)%20enables%20application%20developers%20and%20security%20administrators%20to%20more%20easily%20create%20hardened%20environments%20for%20their%20application%20workloads.%20Essentially%2C%20the%20blueprint%20will%20help%20you%20implement%20Zero%20Trust%20controls%20across%20six%20foundational%20elements%3A%20identities%2C%20devices%2C%20applications%2C%20data%2C%20infrastructure%2C%20and%20networks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUsing%20the%20Azure%20Security%20Center%20and%20Azure%20Blueprints%20service%2C%20the%20blueprint%20sample%20will%20first%20configure%20your%20VNET%20to%20deny%20all%20network%20traffic%20by%20default%2C%20enabling%20you%20to%20extend%20it%20and%2For%20set%20rules%20for%20selective%20traffic%20based%20on%20your%20business%20needs.%20In%20addition%2C%20the%20blueprint%20enforces%20and%20maintains%20Azure%20resource%20behaviors%20and%20configuration%20in%20compliance%20with%20specific%20NIST%20SP%20800-53%20security%20control%20requirements%20using%20Azure%20Policy.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20blueprint%20includes%20Azure%20Resource%20Manager%20templates%20to%20deploy%20and%20configure%20Azure%20resources%20such%20as%20Virtual%20Network%2C%20Network%20Security%20Groups%2C%20Azure%20Key%20Vault%2C%20Azure%20Monitor%2C%20Azure%20Security%20Center%2C%20and%20more.%20If%20you%E2%80%99re%20working%20with%20applications%20that%20need%20to%20comply%20with%20FedRAMP%20High%20or%20DoD%20Impact%20Level%204%20requirements%20or%20just%20want%20to%20improve%20the%20security%20posture%20of%20your%20cloud%20deployment%2C%20the%20blueprint%20for%20Zero%20Trust%20is%20designed%20to%20help%20you%20get%20there%20faster.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20ASBF%20blueprint%20is%20currently%20in%20preview%20with%20limited%20support.%20To%20learn%20more%20and%20find%20instructions%20to%20deploy%20into%20Azure%2C%20see%20the%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fzerotrust-blueprint%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EASBF%20repo%3C%2FA%3E.%20For%20more%20information%2C%20questions%2C%20and%20feedback%2C%20please%20contact%20us%20at%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fzerotrust-blueprint-feedback%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EASBF%20feedback%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20are%20also%20working%20on%20updates%20in%20support%20of%20NIST%20SP%20800-171%20and%20CMMC%20for%20availability%20in%20the%20first%20half%20of%20calendar%20year%202021.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1778737681%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1778737711%22%20id%3D%22toc-hId--1779601461%22%3ECMMC%20Documentation%3C%2FH2%3E%0A%3CH3%20id%3D%22toc-hId-837857871%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-837857841%22%20id%3D%22toc-hId-836994091%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId--969596592%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--969596622%22%20id%3D%22toc-hId--970460372%22%3ECMMC%20Compliance%20Documentation%3C%2FH3%3E%0A%3CP%3EThere%20are%20several%20artifacts%20we%20are%20working%20on%20for%20release%20this%20year%202021%2C%20to%20include%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3ESSP%3C%2FSTRONG%3E%3A%20System%20Security%20Plan%20with%20customer%20scope%20of%20responsibility%20detailed%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ECIS%3C%2FSTRONG%3E%3A%20Control%20Implementation%20Summary%20per%20environment%20(IaaS%2C%20PaaS%20and%20SaaS)%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ESAR%3C%2FSTRONG%3E%3A%20Security%20Assessment%20Report%20from%20Microsoft%E2%80%99s%20C3PAO%20engagement%3C%2FLI%3E%0A%3CLI%3EDocumented%3CSTRONG%3E%20auditor%20observations%3C%2FSTRONG%3E%20based%20on%20pre-defined%20tenant%20configuration%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH3%20id%3D%22toc-hId-1517916241%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517916211%22%20id%3D%22toc-hId-1517052461%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId--289538222%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--289538252%22%20id%3D%22toc-hId--290402002%22%3EMicrosoft%20Cybersecurity%20Reference%20Architecture%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Microsoft%20Cybersecurity%20Reference%20Architecture%20(MCRA)%20describes%20Microsoft%E2%80%99s%20cybersecurity%20capabilities%20and%20how%20they%20integrate%20with%20existing%20security%20architectures.%20We%20have%20seen%20this%20document%20used%20for%20several%20purposes%20by%20our%20customers%20to%20include%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EStarting%20template%20for%20a%20security%20architecture%3C%2FSTRONG%3E%20-%20The%20most%20common%20use%20case%20we%20see%20is%20that%20organizations%20use%20the%20document%20to%20help%20define%20a%20target%20state%20for%20cybersecurity%20capabilities.%20Organizations%20find%20this%20architecture%20useful%20because%20it%20covers%20capabilities%20across%20the%20modern%20enterprise%20estate%20that%20now%20spans%20on-premises%2C%20mobile%20devices%2C%20many%20clouds%2C%20and%20IoT%20%2F%20Operational%20Technology.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EComparison%20reference%20for%20security%20capabilities%3C%2FSTRONG%3E%20-%20We%20know%20of%20several%20organizations%20that%20have%20marked%20up%20a%20printed%20copy%20with%20what%20capabilities%20they%20already%20own%20from%20various%20Microsoft%20license%20suites%20(many%20customers%20don't%20know%20they%20own%20quite%20a%20bit%20of%20this%20technology)%2C%20which%20ones%20they%20already%20have%20in%20place%20(from%20Microsoft%20or%20partner%2F3rd%20party)%2C%20and%20which%20ones%20are%20new%20and%20could%20fill%20a%20need.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ELearn%20about%20Microsoft%20capabilities%3C%2FSTRONG%3E%20-%20In%20presentation%20mode%2C%20each%20capability%20has%20a%20%22ScreenTip%22%20with%20a%20short%20description%20of%20each%20capability%20%2B%20a%20link%20to%20documentation%20on%20that%20capability%20to%20learn%20more.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ELearn%20about%20Microsoft's%20integration%20investments%3C%2FSTRONG%3E%20-%20The%20architecture%20includes%20visuals%20of%20key%20integration%20points%20with%20partner%20capabilities%20(e.g.%20SIEM%2FLog%20integration%2C%20Security%20Appliances%20in%20Azure%2C%20DLP%20integration%2C%20and%20more)%20and%20within%20our%20own%20product%20capabilities%20among%20(e.g.%20Advanced%20Threat%20Protection%2C%20Conditional%20Access%2C%20and%20more).%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ELearn%20about%20Cybersecurity%3C%2FSTRONG%3E%20-%20We%20have%20also%20heard%20reports%20of%20folks%20new%20to%20cybersecurity%20using%20this%20as%20a%20learning%20tool%20as%20they%20prepare%20for%20their%20first%20career%20or%20a%20career%20change.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Microsoft%20Cybersecurity%20Reference%20Architecture.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F229718i57F575EF142BDCF3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Microsoft%20Cybersecurity%20Reference%20Architecture.png%22%20alt%3D%22Microsoft%20Cybersecurity%20Reference%20Architecture.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Microsoft%20Cybersecurity%20Reference%20Architecture%20is%20available%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fmcra%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%20Additional%20training%20resources%20are%20available%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fsecurity%2Fciso-workshop%2Fciso-workshop%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAn%20update%20will%20be%20released%20early%20this%20year%202021%20to%20include%20the%20branding%20updates%20announced%20at%20Ignite%202020.%26nbsp%3B%20Most%20notably%2C%20the%20use%20of%20the%20Microsoft%20Defender%20branding%20will%20be%20incorporated%20in%20the%20update%20to%20MCRA.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--2096992685%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2096992715%22%20id%3D%22toc-hId--2097856465%22%3EMicrosoft%20Blog%20Posts%20on%20CMMC%3C%2FH3%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FCMMCResponse%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAccelerating%20CMMC%20compliance%20for%20Microsoft%20cloud%20(in%20depth%20review)%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3ECMMC%20Blog%20Series%3COL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fcmmc-with-microsoft-azure-access-control-1-of-10%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAccess%20Control%20Maturity%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fcmmc-with-microsoft-azure-audit-accountability-management-2-of-10%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAudit%20%26amp%3B%20Accountability%20Maturity%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fcmmc-with-microsoft-azure-asset-configuration-management-3-of-10%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAsset%20%26amp%3B%20Configuration%20Management%20Maturity%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fcmmc-with-microsoft-azure-identification-authentication-maturity-4-of-10%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EIdentification%20%26amp%3B%20Authentication%20Maturity%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fcmmc-with-microsoft-azure-incident-response-maturity-5-of-10%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EIncident%20Response%20Maturity%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fcmmc-with-microsoft-azure-maintenance-media-protection-6-of-10%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMaintenance%20%26amp%3B%20Media%20Protection%20Maturity%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fcmmc-with-microsoft-azure-recovery-risk-management-7-of-10%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ERecovery%20%26amp%3B%20Risk%20Management%20Maturity%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fcmmc-with-microsoft-azure-security-assessment-situational-awareness-8-of-10%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESecurity%20Assessment%20%26amp%3B%20Situational%20Awareness%20Maturity%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fcmmc-with-microsoft-azure-system-communications-protection-9-of-10%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESystem%20%26amp%3B%20Communications%20Protection%20Maturity%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdevblogs.microsoft.com%2Fazuregov%2Fcmmc-with-microsoft-azure-system-information-integrity-10-of-10%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESystem%20%26amp%3B%20Information%20Integrity%20Maturity%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-261437429%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-261437399%22%20id%3D%22toc-hId-260573649%22%3EProgram%20Scaffolding%20for%20Managed%20Service%20Providers%3C%2FH2%3E%0A%3CP%3EBehind%20the%20scenes%2C%20we%20are%20actively%20working%20with%20our%20partner%20community%2C%20and%20in%20particular%20the%20Managed%20Service%20Providers%20(MSP)%2C%20to%20deliver%20scaffolding%20in%20the%20construction%20of%20CMMC%20offerings.%26nbsp%3B%20The%20CMMC%20Acceleration%20Program%20is%20comprised%20of%20many%20different%20components%20as%20described%20above%2C%20and%20several%20that%20are%20yet%20unannounced.%26nbsp%3B%20The%20intent%20is%20to%20provide%20building%20blocks%2C%20or%20what%20we%20call%20%E2%80%9Cscaffolding%E2%80%9D%2C%20to%20our%20partners%20in%20support%20of%20their%20CMMC%20offers.%26nbsp%3B%20Our%20partners%20will%20be%20enabled%20in%20our%20partner%20marketplace%20with%20advance%20specializations%20for%20CMMC%20and%20their%20concentration%20on%20the%20Defense%20Industrial%20Base.%26nbsp%3B%20In%20alignment%20with%20the%20commitments%20made%20in%20our%20original%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMSGovCompliance%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ECMMC%20Announcement%3C%2FA%3E%2C%20our%20MSP%20partners%20will%20implement%20reference%20architectures%20and%20compliance%20solutions%20for%20CMMC.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1546017034%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546017064%22%20id%3D%22toc-hId--1546880814%22%3EInto%20the%20Future%3C%2FH2%3E%0A%3CP%3EMicrosoft%20is%20actively%20engaged%20with%20customers%2C%20partners%2C%20the%20CMMC%20Accreditation%20Body%2C%20and%20multiple%20industry%20working%20groups%20to%20refine%20what%20resources%20we%20should%20develop%20and%20make%20available%20as%20part%20of%20the%20CMMC%20Acceleration%20Program.%26nbsp%3B%20We%20have%20many%20grand%20ideas%2C%20and%20welcome%20to%20feedback%20from%20the%20community%20at%20large.%26nbsp%3B%20Please%20fill%20out%20this%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fcmmc-welcome-survey%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3Eshort%20survey%3C%2FA%3E%20to%20join%20our%20CMMC%20feedback%20loop%20if%20you%20are%20interested%26nbsp%3Bin%20learning%20more%20about%20the%20program.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20general%20comments%20on%20the%20CMMC%20Acceleration%20Program%3A%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fcmmc-contactus%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EContact%20Us%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-941495799%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-941495769%22%20id%3D%22toc-hId-940632019%22%3EAppendix%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPlease%20follow%20me%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fv2%2Fviewprofilepage%2Fuser-id%2F276160%22%20target%3D%22_blank%22%3Ehere%3C%2FA%3E%26nbsp%3Band%20on%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fin%2Fwakeman%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ELinkedIn%3C%2FA%3E.%26nbsp%3BHere%20are%20my%20additional%20blog%20articles%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20class%3D%22%20lia-align-left%22%20style%3D%22width%3A%20100%25%3B%22%20width%3D%2299.86187845303868%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250.27624309392266%25%22%3E%3CH3%20id%3D%22toc-hId--38714004%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--38714034%22%20id%3D%22toc-hId--39577784%22%3E%3CFONT%20color%3D%22%23000080%22%3E%3CSTRONG%3EBlog%20Title%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FH3%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2249.58563535911602%25%22%3E%3CH3%20id%3D%22toc-hId--1846168467%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1846168497%22%20id%3D%22toc-hId--1847032247%22%3E%3CFONT%20color%3D%22%23000080%22%3E%3CSTRONG%3EAka%20Link%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FH3%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250.27624309392266%25%22%3E%3CP%3EAccelerating%20CMMC%20compliance%20for%20Microsoft%20cloud%20(in%20depth%20review)%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2249.58563535911602%25%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FCMMCResponse%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FCMMCResponse%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250.27624309392266%25%22%3E%3CP%3E%3CFONT%20color%3D%22%23FF0000%22%3E%3CEM%3E%3CSTRONG%3EUpdated!%26nbsp%3B%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3EMicrosoft%20CMMC%20Acceleration%20Program%20Update%20%E2%80%93%20January%202021%20(%3CEM%3EThis%20One%3C%2FEM%3E)%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2249.58563535911602%25%22%3E%3CP%3E%3CA%20href%3D%22http%3A%2F%2Faka.ms%2FCMMCAccelerationProgramUpdate%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttp%3A%2F%2Faka.ms%2FCMMCAccelerationProgramUpdate%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250.27624309392266%25%22%3E%3CP%3EHistory%20of%20Microsoft%20Cloud%20Service%20Offerings%20leading%20to%20the%20US%20Sovereign%20Cloud%20for%20Government%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2249.58563535911602%25%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FAA632wo%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FAA632wo%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250.27624309392266%25%22%3E%3CP%3E%3CSTRONG%3E%3CFONT%20color%3D%22%23FFCC00%22%3E%3CI%3EGold%20Standard!%3C%2FI%3E%26nbsp%3B%3C%2FFONT%3E%3C%2FSTRONG%3EUnderstanding%20Compliance%20Between%20Microsoft%20365%20Commercial%2C%20GCC%2C%20GCC-High%20and%20DoD%20Offerings%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2249.58563535911602%25%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMSGovCompliance%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FMSGovCompliance%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250.27624309392266%25%22%3E%3CP%3EThe%20Microsoft%20365%20Government%20(GCC%20High)%20Conundrum%20-%20DIB%20Data%20Enclave%20vs%20Going%20All%20In%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2249.58563535911602%25%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FAA6frar%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FAA6frar%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250.27624309392266%25%22%3E%3CP%3EMicrosoft%20US%20Sovereign%20Cloud%20Myth%20Busters%20-%20A%20Global%20Address%20List%20(GAL)%20Can%20Span%20Multiple%20Tenants%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2249.58563535911602%25%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FAA6seih%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FAA6seih%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250.27624309392266%25%22%3E%3CP%3EMicrosoft%20US%20Sovereign%20Cloud%20Myth%20Busters%20-%20A%20Single%20Domain%20Should%20Not%20Span%20Multiple%20Tenants%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2249.58563535911602%25%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FAA6vf3n%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FAA6vf3n%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250.27624309392266%25%22%3E%3CP%3EMicrosoft%20US%20Sovereign%20Cloud%20Myth%20Busters%20-%20Active%20Directory%20Does%20Not%20Require%20Restructuring%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2249.58563535911602%25%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FAA6xn69%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FAA6xn69%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250.27624309392266%25%22%3E%3CP%3EMicrosoft%20US%20Sovereign%20Cloud%20Myth%20Busters%20-%20CUI%20Effectively%20Requires%20Data%20Sovereignty%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2249.58563535911602%25%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FCUISovereignty%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FCUISovereignty%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250.27624309392266%25%22%3E%3CP%3E%3CFONT%20color%3D%22%23FF0000%22%3E%3CEM%3E%3CSTRONG%3ENew!%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FFONT%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3EMicrosoft%20expands%20qualification%20of%20contractors%20for%20government%20cloud%20offerings%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%2249.58563535911602%25%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FGovCloudEligibility%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FGovCloudEligibility%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2033499%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Compliance%20Score.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F229706i47564F16A739E883%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Compliance%20Score.png%22%20alt%3D%22Compliance%20Score.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EThis%20is%20an%20update%20of%20the%20Microsoft%20CMMC%20Acceleration%20Program%20for%20the%20Defense%20Industrial%20Base%20(DIB)%20regarding%20compliance%20with%20the%20Cybersecurity%20Maturity%20Model%20Certification%20(CMMC)%20from%20the%20U.S.%20Department%20of%20Defense%20(DOD).%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2033499%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECMMC%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECompliance%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Edefense%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EPublic%20Sector%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2120421%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20CMMC%20Acceleration%20Program%20Update%20%E2%80%93%20January%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2120421%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F962390%22%20target%3D%22_blank%22%3E%40jcrodriguez-Gulf%3C%2FA%3E%26nbsp%3BThe%20CMMC%20Level%203%20Policy%20Initiative%20Public%20Preview%20is%20now%20live%20in%20Commercial%2C%20and%20will%20be%20available%20in%20Gov%20within%20the%20next%201-2%20weeks.%26nbsp%3B%20The%20Blueprint%20will%20track%201-2%20weeks%20behind%20the%20Policy%20initiative%20releases%2C%20so%20expect%20Commercial%20Blueprint%20availability%20by%202%2F19.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2121229%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20CMMC%20Acceleration%20Program%20Update%20%E2%80%93%20January%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2121229%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20stuff%20is%20game%20changing!%20Thank%20you%20so%20much.%20Now%2C%20I%20have%20one%20grievance%20-%20that%20the%20Government-related%20standards%20templates%20(i.e.%20CMMC%2C%20SP%20800-171%2C%20DFARS)%20are%20not%20available%20by%20default%20when%20a%20customer%20is%20in%20the%20GCC.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2067232%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20CMMC%20Acceleration%20Program%20Update%20%E2%80%93%20January%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2067232%22%20slang%3D%22en-US%22%3E%3CP%3EExcellent%20collection%20Richard.%20Just%20what%20I%20have%20been%20looking%20for.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2120402%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20CMMC%20Acceleration%20Program%20Update%20%E2%80%93%20January%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2120402%22%20slang%3D%22en-US%22%3E%3CP%3EHello%2C%20Do%20you%20know%20around%20when%20in%20February%20the%20blueprints%20will%20be%20released%3F%20and%20are%20there%20any%20requirements%20to%20access%20them%3F%20thanks!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2248127%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20CMMC%20Acceleration%20Program%20Update%20%E2%80%93%20January%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2248127%22%20slang%3D%22en-US%22%3E%3CP%3EAny%20timeline%20on%20when%20the%20%E2%80%9C%3CSTRONG%3ESSP%3C%2FSTRONG%3E%3A%20System%20Security%20Plan%20with%20customer%20scope%20of%20responsibility%20detailed%E2%80%9D%20will%20be%20released%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2248153%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20CMMC%20Acceleration%20Program%20Update%20%E2%80%93%20January%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2248153%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F276160%22%20target%3D%22_blank%22%3E%40RichardWakeman%3C%2FA%3E%26nbsp%3Band%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F284979%22%20target%3D%22_blank%22%3E%40adimopoulos%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20am%20eagerly%20waiting%20for%20the%20release%20of%20%E2%80%9C%3CSTRONG%3ESSP%3C%2FSTRONG%3E%3CSPAN%3E%3A%20System%20Security%20Plan%20with%20customer%20scope%20of%20responsibility%20detailed%E2%80%9D.%20Do%20you%20have%20an%20approximate%20timeline%20for%20this%3F%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EThanks%20for%20your%20time%20in%20advance.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2248967%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20CMMC%20Acceleration%20Program%20Update%20%E2%80%93%20January%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2248967%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F962989%22%20target%3D%22_blank%22%3E%40HBlack007%3C%2FA%3E%26nbsp%3BThank%20you%20for%20the%20feedback!%26nbsp%3B%20We%20are%20now%20proud%20to%20announce%20the%20CMMC%20Assessment%20Templates%20for%20the%20M365%20Compliance%20Manager%20are%20available%20by%20default%20for%20GCC%20and%20GCC%20High.%26nbsp%3B%20The%20only%20prerequisite%20is%20to%20unlock%20access%20to%20the%20Assessment%20Templates%2C%20you%20will%20need%20at%20least%20one%20E5%20SKU%20in%20your%20tenant.%26nbsp%3B%20But%20no%20additional%20cost%20beyond%20that!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2248980%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20CMMC%20Acceleration%20Program%20Update%20%E2%80%93%20January%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2248980%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F17002%22%20target%3D%22_blank%22%3E%40Srinivas%20Rautwar%3C%2FA%3E%26nbsp%3BWe%20can%20provide%20you%20access%20to%20our%20SSPs%20that%20are%20based%20on%20NIST%20SP%20800-53%20and%20include%20the%20Customer%20Responsibility%20Matrix.%26nbsp%3B%20Our%20customers%20going%20through%20DIBCAC%20and%20CMMC%20assessments%20will%20need%20these%20to%20establish%20Microsoft%20scope%20of%20responsibility%20and%20inheritance%20using%20reciprocity%20with%20FedRAMP.%26nbsp%3B%20As%20we%20roll%20out%20updates%20for%20documentation%20to%20align%20with%20the%20schema%20for%20CMMC%2C%20the%20SSP%20you%20mention%20will%20include%20customer%20statements%20for%20your%20SSP.%26nbsp%3B%20You%20can%20see%20this%20emerging%20already%20in%20the%20Product%20Placemat%20down%20at%20the%20bottom%20of%20the%20page%20with%20the%20%22Practice%20Implementation%20Details%22.%26nbsp%3B%20We%20will%20have%20a%20refresh%20with%20much%20more%20detail%20coming%20this%20summer%20timeframe.%26nbsp%3B%20I%20do%20encourage%20you%20to%20look%20at%20the%20Placemat%20today%20and%20provide%20us%20with%20any%20feedback%20you%20have%20at%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fcmmc%2Fproductplacematfeedback%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fcmmc%2Fproductplacematfeedback%3C%2FA%3E%3CSPAN%3E.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2249637%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20CMMC%20Acceleration%20Program%20Update%20%E2%80%93%20January%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2249637%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F276160%22%20target%3D%22_blank%22%3E%40RichardWakeman%3C%2FA%3E%26nbsp%3BThanks%20a%20lot%20for%20your%20prompt%20response.%20I%20did%20look%20at%20the%26nbsp%3B%3CSPAN%3EPlacemat%20and%20it%20is%20amazing!%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3E%3CBR%20%2F%3ECan%20you%20please%20provide%20me%20access%20to%20your%20SSPs%20that%20are%20based%20on%20NIST%20SP%20800-53%3F%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3E%3CBR%20%2F%3EOnce%20again%2C%20I%20appreciate%20your%20help.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2249645%22%20slang%3D%22en-US%22%3ERe%3A%20Microsoft%20CMMC%20Acceleration%20Program%20Update%20%E2%80%93%20January%202021%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2249645%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F17002%22%20target%3D%22_blank%22%3E%40Srinivas%20Rautwar%3C%2FA%3E%26nbsp%3BAll%20but%20the%20GCC%20High%20SSP%20are%20found%20here%3A%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fservicetrust.microsoft.com%2FViewPage%2FMSComplianceGuideV3%3FdocTab%3D7027ead0-3d6b-11e9-b9e1-290b1eb4cdeb_FedRAMP_Reports%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EService%20Trust%20Portal%20for%20FedRAMP%20Audit%20Reports%3C%2FA%3E%20(must%20authenticate).%26nbsp%3B%20For%20the%20GCC%20High%20SSP%2C%20you%20must%20be%20an%20existing%20customer%20to%20get%20access%20to%20the%20FedRAMP%20Portal.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Version history
Last update:
‎Jan 08 2021 01:56 PM
Updated by: