Cybersecurity Maturity Model Certification (CMMC) 2.0

Solution: CybersecurityMaturityModelCertification(CMMC)2.0

CybersecurityMaturityModelCertification(CMMC)2.0 Logo

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Solutions Index


Attribute Value
Publisher Microsoft Corporation
Support Tier Microsoft
Support Link https://support.microsoft.com
Categories domains
Version 3.1.0
Author Microsoft - support@microsoft.com
First Published 2022-01-06
Last Updated 2026-01-14
Solution Folder CybersecurityMaturityModelCertification(CMMC)2.0
Marketplace Azure Marketplace · Popularity: 🟢 High (80%)

The Microsoft Sentinel Cybersecurity Maturity Model Certification (CMMC) 2.0 solution provides a mechanism for viewing log queries aligned to CMMC 2.0 requirements across the Microsoft portfolio. This solution enables governance and compliance teams to design, build, monitor, and respond to CMMC 2.0 requirements across 25+ Microsoft products. While only Microsoft Sentinel is required to get started, the solution is enhanced with numerous Microsoft offerings. This solution enables Security Architects, Engineers, SecOps Analysts, Managers, and IT Pros to gain situational awareness visibility for the security posture of cloud workloads. There are also recommendations for selecting, designing, deploying, and configuring Microsoft offerings for alignment with respective security best practice.

Contents

Data Connectors

This solution does not include data connectors.

This solution may contain other components such as analytics rules, workbooks, hunting queries, or playbooks.

Tables Used

This solution queries 18 table(s) from its content items:

Table Used By Content
AADManagedIdentitySignInLogs Workbooks
AADNonInteractiveUserSignInLogs Workbooks
AADServicePrincipalSignInLogs Workbooks
AADUserRiskEvents Workbooks
AuditLogs Workbooks
AzureActivity Workbooks
AzureDiagnostics Workbooks
ConfigurationChange Workbooks
DeviceEvents Workbooks
DeviceFileEvents Workbooks
Event Workbooks
InformationProtectionLogs_CL Workbooks
OfficeActivity Workbooks
SecurityBaseline Workbooks
SecurityRecommendation Workbooks
SecurityRegulatoryCompliance Analytics, Workbooks
SigninLogs Workbooks
Usage Workbooks

Internal Tables

The following 4 table(s) are used internally by this solution's content items:

Table Used By Content
BehaviorAnalytics Workbooks
IdentityInfo Workbooks
SecurityAlert Workbooks
SecurityIncident Workbooks

Content Items

This solution includes 6 content item(s):

Content Type Count
Playbooks 3
Analytic Rules 2
Workbooks 1

Analytic Rules

Name Severity Tactics Tables Used
CMMC 2.0 Level 1 (Foundational) Readiness Posture Medium Discovery SecurityRegulatoryCompliance
CMMC 2.0 Level 2 (Advanced) Readiness Posture Medium Discovery SecurityRegulatoryCompliance

Workbooks

Name Tables Used
CybersecurityMaturityModelCertification_CMMCV2 AADManagedIdentitySignInLogs
AADNonInteractiveUserSignInLogs
AADServicePrincipalSignInLogs
AADUserRiskEvents
AuditLogs
AzureActivity
AzureDiagnostics
ConfigurationChange
DeviceEvents
DeviceFileEvents
Event
InformationProtectionLogs_CL
OfficeActivity
SecurityBaseline
SecurityRecommendation
SecurityRegulatoryCompliance
SigninLogs
Usage
Internal use:
BehaviorAnalytics
IdentityInfo
SecurityAlert
SecurityIncident

Playbooks

Name Description Tables Used
Create Jira Issue This playbook will open a Jira Issue when a new incident is opened in Microsoft Sentinel. -
Create-AzureDevOpsTask This playbook will create the Azure DevOps task filled with the Microsoft Sentinel incident details. -
Notify_GovernanceComplianceTeam This playbook will create the Azure DevOps task filled with the Microsoft Sentinel incident details. -

Additional Documentation

📄 Source: CybersecurityMaturityModelCertification(CMMC)2.0/README.md

Overview


Welcome to the Microsoft Sentinel: Cybersecurity Maturity Model Certification (CMMC) 2.0 Solution. This solution enables Compliance Teams, Architects, SecOps Analysts, and Consultants to gain situational awareness for cloud workload security posture. This solution is designed to augment staffing through automation, visibility, assessment, monitoring and remediation. This solution includes (1) Workbook for build/design/assessment/reporting, (2) Analytics rules for monitoring and (3) Playbooks for response/remediation. CMMC 2.0 model consists of maturity processes and cybersecurity best practices from multiple cybersecurity standards, frameworks, and other references, as well as inputs from the Defense Industrial Base (DIB) and Department of Defense (DoD stakeholders. "CMMC 2.0 is the next iteration of the Department's CMMC cybersecurity model. It streamlines requirements to three levels of cybersecurity - Foundational, Advanced and Expert - and aligns the requirements at each level with well-known and widely accepted NIST cybersecurity standards." For more information, see💡CMMC 2.0

Try on Portal

You can deploy the solution by clicking on the buttons below:

Workbook Overview

Roles Rights
Security Reader View Workbooks, Analytics, Hunting, Security Recommendations
Security Contributor Deploy/Modify Workbooks, Analytics, Hunting Queries, Apply Security Recommendations
Owner Assign Regulatory Compliance Initiatives

Prerequisites

[Content truncated...]

Release Notes

Version Date Modified (DD-MM-YYYY) Change History
3.1.1 13-01-2026 Updated non-functional links from Workbook.
3.1.0 09-09-2025 Removed the network map from the Workbook
3.0.0 29-01-2024 Updated the solution to fix Analytic Rules deployment issue

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Solutions Index