Assess Your Readiness for CMMC 2.0 Level 1 Compliance

Are you prepared to meet the Department of Defense’s (DoD) requirements for protecting Federal Contract Information (FCI)?

Carbide’s CMMC 2.0 Level 1 Self-Assessment Questionnaire is designed to help you evaluate your organization’s current security posture and identify areas for improvement.

With this assessment, you’ll:

  • Gauge your compliance with the foundational controls required by CMMC 2.0 Level 1.
  • Identify gaps that may put your DoD contracts at risk.
  • Gain clarity on next steps to strengthen your security and align with federal standards.

Start your compliance journey with confidence. Complete the assessment today and we’ll send you a report that assesses your readiness for CMMC 2.0 Level 1 compliance.

Access Control (AC)

1. Do you restrict access to your information systems to only authorized users, processes, and devices?(Required)
2. How do you limit information system access to authorized users?(Required)
3. Do you control and monitor access between your system and external systems?(Required)

Identification and Authentication (IA)

4. Do you require users to authenticate their identities before accessing systems?(Required)

Media Protection (MP)

5. Do you sanitize or destroy physical and digital media containing Federal Contract Information (FCI) before disposal or reuse?(Required)

Physical Protection (PE)

6. Do you limit physical access to your information systems and environments to authorized individuals?(Required)

System and Communications Protection (SC)

7. Do you use cryptography to protect information during transmission?(Required)
8. Do you have network rules that deny all traffic by default and allow only approved traffic?(Required)
9. Do you control the use of external systems (e.g., personal devices, external cloud services)?(Required)

System and Information Integrity (SI)

10. Do you regularly identify and patch system vulnerabilities?(Required)
11. Do you protect your systems against malicious code (e.g., antivirus, endpoint protection)?(Required)
12. Do you monitor your system for security events (e.g., logging, alerts)?(Required)

Awareness and Training (AT)

13. Do you provide training for users about cybersecurity risks and their responsibilities?(Required)

Configuration Management (CM)

14. Do you establish and enforce secure configuration settings for your systems?(Required)

Incident Response (IR)

15. Do you have a process to identify and report cybersecurity incidents?(Required)

Maintenance (MA)

16. Do you perform and document regular maintenance of your systems?(Required)

Personnel Security (PS)

17. Do you perform personnel screening (e.g., background checks) for individuals with access to FCI?(Required)

Please fill out the following to get your report.

Name(Required)

By submitting this request you consent to receive emails from Carbide. You can opt-out from receiving emails at any time.