CMMC Practices RM2142; Requirements and Documentation | ChatFortress

Posted on June 19, 2021 by Benjamin Bressington

CMMC Practices RM2142; Requirements and Documentation | ChatFortress
Back to Full CMMC & NIST800-171 Requirements List

CMMC Practice Requirement:

Risk Management - RM.2.142

Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified.

Risk Management - RM.2.142- Clarification Statement

A vulnerability scanner is an application that identifies an organization’s asset vulnerabilities for which the scanner is capable of identifying. Then, the scanner creates a prioritized list of asset vulnerabilities ordered by their level of severity. The scanner also describes each vulnerability and the steps needed to fix it. Your organization should scan for vulnerabilities on all devices connected to the network. This includes servers, desktops, laptops, virtual machines, containers, firewalls, switches, and printers. All assets that have any form of connection to a wired network, Wi-Fi environment, and air-gapped labs that are associated with the CMMC assessment should be scanned.

Organizations that develop custom software should perform reviews of the software. Vulnerability analysis of a custom-made solution requires an experienced penetration testerto properly test and validate findings. Automated vulnerability scanners do not necessarily perform well against custom developed applications.

The vulnerability scanning process should be a regular activity. It should not be a single occurrence. Organizations should put in place a vulnerability scanner that updates its database each time it performs a scan. This means that the scan looks for the most current vulnerabilities. Schedule scans with consideration of the potential for impact to normal operations. Use caution when scanning critical assets. These assets do need to be scanned, but some scanning options could cause a denial of service against a critical asset. You could replicate the critical asset in a test environment and perform vulnerability scans against the replicated asset. The replicated asset vulnerability scan will produce valid reports that need to be applied to the production system only if the replicated system is an exact duplicate of the production system and has identical functionality in operation when being tested.

Need more help understanding this CMMC & NIST800-171 requirement?

ChatFortress has made available a series of tools to help you implement CMMC & NIST800-171 into your company. Here are some of the resources you might want to review.

How to Implement a CMMC Audit/Assessment using CMMC Software Tool?

How can ChatFortress help you implement CMMC?


Are you worried that your company is vulnerable to ransomware?

The Business Cybersecurity System protects you against real-world threats while building your cybersecurity culture. Using the latest in breach and attack simulation our team can show you which ransomware and malware attacks would cripple your company regardless of the cybersecurity protections you already have in place!

Who is ChatFortress

ChatFortress is a leading cybersecurity company that helps small and medium-size companies protect themselves from hacking attempts. Using Cybersecurity AI, Gamified cybersecurity awareness programs and providing virtual security analysts. Our goal is to help you create a cybersecurity aware culture.

Cybersecurity Resources

Talk to Us

Reduce your cybersecurity risk and exposure. Schedule time with your ChatFortress Specialist now
or Call 307-999-7755

Cybersecurity Education Links

Common Cybersecurity Mistakes and how you can protect yourself and your business from liability and financial loss! Instant Webinar Access!

Schedule Your Free Cybersecurity Risk Assessment Click Here to Schedule Call

Discover current hacker trends to steal your data and how you can protect yourself in 7 day FREE Email Cybersecurity crash course

Here are the 8 common types of email phishing attacks that hackers use to steal your identity. Are you protected?

Protect your business from hackersCrash Coursesmall business cybersecurity protectionHackerssmall business cybersecurity protection8typesofemailphishingscamssmall business cybersecurity protectionCMMC Compliance Check ListCybersecurity For Business