Skip to Videos
  • CMMC Scoping: Part 1: Asset Discovery

    CMMC Scoping: Part 1: Asset Discovery

    Scoping starts with knowing what you have. In this video, we explore how to identify the systems, infrastructure, and technologies that could impact the protection of Controlled Unclassified Information (CUI). You’ll learn how to approach asset discovery with a focus on systems and components that handle, store, transmit, or secure CUI—laying the groundwork for defining your assessment boundary.

  • CMMC Scoping Part 2: Network Diagram

    CMMC Scoping Part 2: Network Diagram

    A well-documented network diagram is a critical part of your System Security Plan (SSP) and your scoping package. This session covers how to create a network diagram that reflects your organization’s logical and physical architecture, highlights security boundaries, and shows where CUI is processed. You’ll also learn how to external connections, and boundary protection elements.

  • CMMC Scoping Part 3: Data Flow

    CMMC Scoping Part 3: Data Flow

    Understanding how CUI flows through your environment is essential to validating your assessment scope. In this session, we look at how to identify entry points, processing nodes, storage locations, and outbound flows of CUI. This session also shows how to use that information to update your network diagram, refine your boundary, and ensure your controls align with how CUI actually moves across your systems.

  • CMMC Scoping Part 4: External Service Providers

    CMMC Scoping Part 4: External Service Providers

    Many organizations rely on cloud platforms, managed service providers, or SaaS tools that could affect the security of CUI. In this final session, we examine how to identify and document your External Service Providers (ESPs) and determine whether they are part of your CMMC assessment scope. You’ll learn how to define ESP responsibilities, document relationships, and support shared responsibility decisions in your SSP.