CMMC CA.2.159 - Implement Plans of Action to Address Vulnerabilities

CMMC CA.2.159 - Implement Plans of Action to Address Vulnerabilities

Requirement text: CA.2.159: Develop and implement plans of action designed to correct deficiencies
and reduce or eliminate vulnerabilities in organizational systems.

DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2
The plan of action is a key document in the information security program. Organizations
develop plans of action that describe how any unimplemented security requirements will be
met and how any planned mitigations will be implemented. Organizations can document the
system security plan and plan of action as separate or combined documents and in any
chosen format.

Federal agencies may consider the submitted system security plans and plans of action as
critical inputs to an overall risk management decision to process, store, or transmit CUI on a
system hosted by a nonfederal organization and whether it is advisable to pursue an
agreement or contract with the nonfederal organization.

CMMC CLARIFICATION
When you write a plan of action, you should define the clear goal or objective of the plan.
You may include the following in the action plan:
      • ownership of who is accountable for ensuring the plan’s performance;
      • specific steps or milestones that are clear and actionable;
      • assigned responsibility for each step or milestone;
      • milestones to measure plan progress; and
      • completion dates.

Note that receiving Cybersecurity Maturity Model Certification requires all practices and
processes to be implemented at the time of assessment. Any security requirements that
were part of a plan of action must be closed/met in order to be granted the CMMC
assessment.

Example 1
You are in charge of IT operations in your organization. Your job is to develop action plans
when you discover that your company isn’t meeting security requirements. One of your
sources of information is the output of vulnerability scans on your network. When you
receive notification of a vulnerability that needs fixing, you develop a plan to fix it. Your plan
identifies the person responsible for fixing it, how to do it, and when to do it. You will also
define how to measure that the person responsible has fixed the vulnerability. You
document this in a plan of action.

Example 2
A company that is CMMC L1 compliant seeks L3 compliance. The IT department tracks the
implementation of the additional security requirements needed for L3 in an action plan and
realizes that it will be more than 6 months before CMMC L3 requirements can be met.
Company officials refer to the action plan that indicates that CMMC L2 requirements are
currently met and decide to pursue CMMC L2 compliance instead of L3 and seek L3
certification next year.

References
• NIST SP 800-171 Rev 1 3.12.2
• CERT RMM v1.2 RISK:SG5.SP1
• NIST SP 800-53 Rev 4 CA-5
    • Related Articles

    • CMMC RM.3.146 - Implement Risk Mitigation Plans

      Requirement text: RM.3.146: Develop and implement risk mitigation plans. DISCUSSION FROM SOURCE: CERT RMM V1.2 When the consequences of risk exceed the organization’s risk thresholds and are determined to be unacceptable, the organization must act to ...
    • CMMC CA.2.157 - Develop and Periodically Update System Security Plans

      Requirement text: CA.2.157: Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to ...
    • CMMC SI.1.210 – Manage System Vulnerabilities

      Requirement text: SI.1.210: Identify, report, and correct information system flaws in a timely manner. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Organizations identify systems that are affected by announced software and firmware flaws ...
    • CMMC CA.4.164 - Conduct Penetration Testing

      Requirement text: CA.4.164: Conduct penetration testing periodically, leveraging automated scanning tools and ad hoc tests using human experts. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171B (MODIFIED) Penetration testing is a specialized type of ...
    • CMMC CA.3.161 - Monitor Security Controls

      Requirement text: CA.3.161: Monitor security controls on an ongoing basis to ensure the continued effectiveness of the controls. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Continuous monitoring programs facilitate ongoing awareness of threats, ...