{"id":511,"date":"2024-12-04T07:18:28","date_gmt":"2024-12-04T07:18:28","guid":{"rendered":"https:\/\/devserver.knstek.com\/sysaudits\/?page_id=511"},"modified":"2024-12-06T07:35:07","modified_gmt":"2024-12-06T07:35:07","slug":"dod-ccri","status":"publish","type":"page","link":"https:\/\/devserver.knstek.com\/sysaudits\/dod-ccri\/","title":{"rendered":"DOD CCRI"},"content":{"rendered":"\n<h4 class=\"wp-block-heading has-text-color has-link-color wp-elements-c2089743a2dc386b01d15420dee82207\" style=\"color:#22529c\">DOD Command Cyber Readiness Inspection (CCRI)<\/h4>\n\n\n\n<p>SysAudits can support DOD organizations who desire a CCRI pre-assessment. USCYBERCOM directed Command Cyber Readiness Inspections. USCYBERCOM sets \u201cCyber policy\u201d for the entire DoD enterprise. Cyber Policy and Standards are issued from DoD, DoN, DISA (Defense Information Systems Agency), NIST (National Institute of Standards &amp; Technology). To ensure DoD networks are in compliance with directives and guidance, the Cyber Security Inspection (CSI) was created. CCRI assess the DOD organization\u2019s Operational Behavior (OB) defined as \u201cDay to Day Operations\u201d of the network at the User and System Administrator levels. OB is a direct reflection of \u201ccommand culture\u201d as it relates to Information Assurance and Cyber Security. The following are examples OB:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Completion and documentation of Annual IA training for All Hands<\/li>\n\n\n\n<li>Completion of security investigations for CSWF personnel<\/li>\n\n\n\n<li>Network configuration and control<\/li>\n\n\n\n<li>Correct permissions granted (control access to Personally Identifiable Information, PII)<\/li>\n\n\n\n<li>Adequate Internet access controls<\/li>\n\n\n\n<li>Maintenance of inactive user accounts<\/li>\n\n\n\n<li>Password policy and protection<\/li>\n\n\n\n<li>Logs. Reviewed as directed and stored.<\/li>\n\n\n\n<li>Only authorized web browsing<\/li>\n\n\n\n<li>Prevention of unauthorized devices from connecting to network (flash media)<\/li>\n\n\n\n<li>Malware detection and treatment (Incident Response Plan) to deal with threats<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>DOD Command Cyber Readiness Inspection (CCRI) SysAudits can support DOD organizations who desire a CCRI pre-assessment. USCYBERCOM directed Command Cyber Readiness Inspections. USCYBERCOM sets \u201cCyber<a href=\"https:\/\/devserver.knstek.com\/sysaudits\/dod-ccri\/\" class=\"read-more\">&nbsp;read more&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":395,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"tpl-inner-page.php","meta":{"footnotes":""},"class_list":["post-511","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/devserver.knstek.com\/sysaudits\/wp-json\/wp\/v2\/pages\/511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devserver.knstek.com\/sysaudits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/devserver.knstek.com\/sysaudits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/devserver.knstek.com\/sysaudits\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/devserver.knstek.com\/sysaudits\/wp-json\/wp\/v2\/comments?post=511"}],"version-history":[{"count":2,"href":"https:\/\/devserver.knstek.com\/sysaudits\/wp-json\/wp\/v2\/pages\/511\/revisions"}],"predecessor-version":[{"id":620,"href":"https:\/\/devserver.knstek.com\/sysaudits\/wp-json\/wp\/v2\/pages\/511\/revisions\/620"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devserver.knstek.com\/sysaudits\/wp-json\/wp\/v2\/media\/395"}],"wp:attachment":[{"href":"https:\/\/devserver.knstek.com\/sysaudits\/wp-json\/wp\/v2\/media?parent=511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}