Solution: CybersecurityMaturityModelCertification(CMMC)2.0
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Publisher | Microsoft Corporation |
| Support Tier | Microsoft |
| Support Link | https://support.microsoft.com |
| Categories | domains |
| Version | 3.1.0 |
| Author | Microsoft - support@microsoft.com |
| First Published | 2022-01-06 |
| Last Updated | 2026-01-14 |
| Solution Folder | CybersecurityMaturityModelCertification(CMMC)2.0 |
| Marketplace | Azure Marketplace · Popularity: 🟢 High (80%) |
The Microsoft Sentinel Cybersecurity Maturity Model Certification (CMMC) 2.0 solution provides a mechanism for viewing log queries aligned to CMMC 2.0 requirements across the Microsoft portfolio. This solution enables governance and compliance teams to design, build, monitor, and respond to CMMC 2.0 requirements across 25+ Microsoft products. While only Microsoft Sentinel is required to get started, the solution is enhanced with numerous Microsoft offerings. This solution enables Security Architects, Engineers, SecOps Analysts, Managers, and IT Pros to gain situational awareness visibility for the security posture of cloud workloads. There are also recommendations for selecting, designing, deploying, and configuring Microsoft offerings for alignment with respective security best practice.
This solution does not include data connectors.
This solution may contain other components such as analytics rules, workbooks, hunting queries, or playbooks.
This solution queries 18 table(s) from its content items:
| Table | Used By Content |
|---|---|
AADManagedIdentitySignInLogs |
Workbooks |
AADNonInteractiveUserSignInLogs |
Workbooks |
AADServicePrincipalSignInLogs |
Workbooks |
AADUserRiskEvents |
Workbooks |
AuditLogs |
Workbooks |
AzureActivity |
Workbooks |
AzureDiagnostics |
Workbooks |
ConfigurationChange |
Workbooks |
DeviceEvents |
Workbooks |
DeviceFileEvents |
Workbooks |
Event |
Workbooks |
InformationProtectionLogs_CL |
Workbooks |
OfficeActivity |
Workbooks |
SecurityBaseline |
Workbooks |
SecurityRecommendation |
Workbooks |
SecurityRegulatoryCompliance |
Analytics, Workbooks |
SigninLogs |
Workbooks |
Usage |
Workbooks |
The following 4 table(s) are used internally by this solution's content items:
| Table | Used By Content |
|---|---|
BehaviorAnalytics |
Workbooks |
IdentityInfo |
Workbooks |
SecurityAlert |
Workbooks |
SecurityIncident |
Workbooks |
This solution includes 6 content item(s):
| Content Type | Count |
|---|---|
| Playbooks | 3 |
| Analytic Rules | 2 |
| Workbooks | 1 |
| Name | Severity | Tactics | Tables Used |
|---|---|---|---|
| CMMC 2.0 Level 1 (Foundational) Readiness Posture | Medium | Discovery | SecurityRegulatoryCompliance |
| CMMC 2.0 Level 2 (Advanced) Readiness Posture | Medium | Discovery | SecurityRegulatoryCompliance |
| Name | Description | Tables Used |
|---|---|---|
| Create Jira Issue | This playbook will open a Jira Issue when a new incident is opened in Microsoft Sentinel. | - |
| Create-AzureDevOpsTask | This playbook will create the Azure DevOps task filled with the Microsoft Sentinel incident details. | - |
| Notify_GovernanceComplianceTeam | This playbook will create the Azure DevOps task filled with the Microsoft Sentinel incident details. | - |
📄 Source: CybersecurityMaturityModelCertification(CMMC)2.0/README.md
Welcome to the Microsoft Sentinel: Cybersecurity Maturity Model Certification (CMMC) 2.0 Solution. This solution enables Compliance Teams, Architects, SecOps Analysts, and Consultants to gain situational awareness for cloud workload security posture. This solution is designed to augment staffing through automation, visibility, assessment, monitoring and remediation. This solution includes (1) Workbook for build/design/assessment/reporting, (2) Analytics rules for monitoring and (3) Playbooks for response/remediation. CMMC 2.0 model consists of maturity processes and cybersecurity best practices from multiple cybersecurity standards, frameworks, and other references, as well as inputs from the Defense Industrial Base (DIB) and Department of Defense (DoD stakeholders. "CMMC 2.0 is the next iteration of the Department's CMMC cybersecurity model. It streamlines requirements to three levels of cybersecurity - Foundational, Advanced and Expert - and aligns the requirements at each level with well-known and widely accepted NIST cybersecurity standards." For more information, see💡CMMC 2.0
You can deploy the solution by clicking on the buttons below:
2.0/Workbooks/Images/CybersecurityMaturityModelCertification(CMMC)Black1.png?raw=true)
| Roles | Rights |
|---|---|
| Security Reader | View Workbooks, Analytics, Hunting, Security Recommendations |
| Security Contributor | Deploy/Modify Workbooks, Analytics, Hunting Queries, Apply Security Recommendations |
| Owner | Assign Regulatory Compliance Initiatives |
[Content truncated...]
| Version | Date Modified (DD-MM-YYYY) | Change History |
|---|---|---|
| 3.1.1 | 13-01-2026 | Updated non-functional links from Workbook. |
| 3.1.0 | 09-09-2025 | Removed the network map from the Workbook |
| 3.0.0 | 29-01-2024 | Updated the solution to fix Analytic Rules deployment issue |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊