skip to content
 
 

What is CMMC compliance?

The Cybersecurity Maturity Model Certification (CMMC) is a framework developed by the U.S. Department of Defense (DoD) to enhance cybersecurity across the Defense Industrial Base (DIB). It mandates that DoD contractors and subcontractors implement cybersecurity controls to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).

CMMC has three levels of certification, with increasing security requirements based on the sensitivity of the information handled. Compliance is mandatory for all DoD contractors, subcontractors, and vendors seeking to bid on or perform DoD contracts.

Related Content

How does EventLog Analyzer fulfill CMMC requirements?

User activity monitoring

User activity monitoring

With EventLog Analyzer, you can monitor access to terminal servers, Windows workstations, Linux and Unix servers, network devices, and database servers, and get notified in real time when suspicious events are detected. You can also get detailed, out-of-the-box reports on user logon and logoff activities, privileges assigned to new logons, failed logons along with the cause of failure, usage of removable disks, tampering of sensitive data stored in databases, VPN logon activities, and more.

Network device monitoring

Network device monitoring

Detect security threats and get real-time notifications by auditing your network devices using EventLog Analyzer. It provides out-of-the-box support for firewalls, next-generation firewalls, intrusion detection systems, and intrusion prevention systems from leading vendors. Apart from monitoring allowed and denied traffic, logon activities, policy modifications, configuration changes, and more on your network devices, EventLog Analyzer also provides exhaustive information about it all in the form of intuitive, graphical reports to help you keep track of network activity.

Auditing database actions

Auditing database actions

Track access to confidential information stored in database servers using EventLog Analyzer. By collecting and analyzing logs from database servers such as Microsoft SQL servers, Oracle servers, and MySQL servers, EventLog Analyzer generates comprehensive reports that can help you monitor database activities such as logons, DDL and DML queries executed on the database, password modifications, permission changes, privilege escalations, role changes, and more. Get alerted instantly when any suspicious activity occurs in your database server.

Incident detection and response

>Manage database logs

EventLog Analyzer's end-to-end incident management system includes incident response workflows that can be used to automate quick responsive actions like disabling compromised accounts or terminating processes when a threat is detected in the organization network. Tickets can also be generated automatically when an alert is raised, and these tickets can be assigned to the appropriate security administrator for quick incident resolution. EventLog Analyzer's intuitive security incident dashboard can also help you keep track of the status of an incident from detection to resolution.

Be CMMC compliance ready with EventLog Analyzer

CMMC sections Description of requirement Some of EventLog Analyzer's reports that can help fulfill the CMMC's requirements
C001 - AC.1.001

Limit information system access to authorized users, processes acting on behalf of authorized users or devices (including other information systems).

Detailed Windows Logon Reports
  • Windows User Access
  • User Account Changes
  • Computer Account Changes
  • User Group Changes
  • Unix User Access
Windows Logoff Reports
  • Windows Successful User Logoffs
  • User Initiated Logoffs
  • Interactive Logoffs
  • Remote Interactive Logoffs
  • Network Logoff
Windows Failed Logon Reports
  • Windows UnSuccessful User Logons
  • Failed Interactive Logons
  • Failed Remote Interactive Logons
  • Failed Network Logons
  • Failed logons due to password expiry
  • Failed logons due to account expiry
  • Failed logons due to account lock outs
  • Failed logons due to disabled accounts
  • Failed logons during non-working hours
  • Failed Logons due to Bad Password
  • Failed Logons due to Bad UserName

Other features offered by EventLog Analyzer

In-depth auditing and reporting  

EventLog Analyzer includes over 1,000 predefined reports that are updated instantly upon log collection, helping you analyze your network efficiently in real time.

A powerful correlation engine  

EventLog Analyzer's more than 30 predefined correlation rules can help you detect suspicious attack patterns in your organization network.

Augmented threat intelligence  

EventLog Analyzer's built-in threat intelligence capabilities can detect and flag suspicious sources, such malicious domains, IPs, and URLs intruding in a network.

Integration with external ticketing systems  

With EventLog Analyzer, you can integrate with third-party ticketing systems such as Jira Service Desk, Zendesk, and ServiceNow to assign tickets to security administrators and manage security incidents efficiently.

Frequently asked questions

  • Level 1: Basic safeguarding of FCI with 15 security requirements from Federal Acquisition Regulation (FAR) 52.204-21.
  • Level 2: Advanced protection of CUI with 110 controls from NIST SP 800-171 R2.
  • Level 3: Enhanced security against APTs with 24 additional requirements from NIST SP 800-172.

CMMC implementation begins 60 days after the publication of the final Title 48 CFR CMMC acquisition rule. A phased rollout over three years will gradually include CMMC requirements in DoD contracts.

Yes, all DoD contractors and subcontractors that handle FCI or CUI must achieve and maintain the required CMMC level to bid on or perform DoD contracts.

  • Level 1: Annual self-assessment.
  • Level 2: Self-assessment or C3PAO assessment every three years.
  • Level 3: DIBCAC assessment every three years.

Easily achieve CMMC compliance using Eventlog Analyzer.

Download

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management