Assessment3/7/2026
Total Controls312
Tasks: [Open/Total]2 / 2

CCMM(

Score of Applied Controls:
12
12 out of 312
Count of Applied Controls:
209
209 out of 312
Risk Assessment
[based on applied Controls]
33
33 out of 100
312 Cntrls
Assign Cybersecurity Responsibilities Assign Cybersecurity Responsibilities
0 / 7 Answered
Control Access Control Access
0 / 9 Answered
Control the Workforce Life Cycle Control the Workforce Life Cycle
0 / 8 Answered
Detect Cybersecurity Events Detect Cybersecurity Events
0 / 8 Answered
Develop Cybersecurity Workforce Develop Cybersecurity Workforce
0 / 9 Answered
Escalate Cybersecurity Events and Declare Incident Escalate Cybersecurity Events and Declare Incidents
0 / 9 Answered
Establish and Maintain a Common Operating Picture Establish and Maintain a Common Operating Picture
0 / 6 Answered
Establish and Maintain Cybersecurity Architecture Establish and Maintain Cybersecurity Architecture
0 / 4 Answered
Establish and Maintain Identities Establish and Maintain Identities
0 / 7 Answered
Establish Cybersecurity Program Strategy Establish Cybersecurity Program Strategy
0 / 7 Answered
Identify and Respond to Threats Identify and Respond to Threats
0 / 10 Answered
Identify Dependencies Identify Dependencies
0 / 7 Answered
Increase Cybersecurity Awareness Increase Cybersecurity Awareness
0 / 5 Answered
Manage Asset Configuration Manage Asset Configuration
0 / 5 Answered
Manage Asset Inventory Manage Asset Inventory
0 / 6 Answered
Manage Changes to Assets Manage Changes to Assets
0 / 6 Answered
Manage Dependency Risk Manage Dependency Risk
0 / 14 Answered
Management Activities Management Activities
0 / 79 Answered
Perform Logging Perform Logging
0 / 5 Answered
Perform Monitoring Perform Monitoring
0 / 11 Answered
Perform Secure Software Development Perform Secure Software Development
0 / 2 Answered
Plan for Continuity Plan for Continuity
0 / 11 Answered
Reduce Cybersecurity Vulnerabilities Reduce Cybersecurity Vulnerabilities
0 / 14 Answered
Respond to Incidents and Escalated Cybersecurity E Respond to Incidents and Escalated Cybersecurity Events
0 / 15 Answered
Risk Management Strategy Risk Management Strategy
0 / 14 Answered
Risk Mitigation Risk Mitigation
0 / 10 Answered
Share Cybersecurity Information Share Cybersecurity Information
0 / 12 Answered
Sponsor Cybersecurity Program Sponsor Cybersecurity Program
0 / 12 Answered