From f19ab8dce5b1e9629f58689f779a318c636751dc Mon Sep 17 00:00:00 2001 From: Garry Ing Date: Fri, 16 Aug 2024 12:14:41 -0400 Subject: [PATCH] Fix CMMC links (#1773) --- .../software-security/compliance/cmmc-2/cmmc-2-levels/index.md | 2 +- content/software-security/compliance/cmmc-2/intro-cmmc-2.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/content/software-security/compliance/cmmc-2/cmmc-2-levels/index.md b/content/software-security/compliance/cmmc-2/cmmc-2-levels/index.md index 8e0e2215a3..03bcf8c5e7 100644 --- a/content/software-security/compliance/cmmc-2/cmmc-2-levels/index.md +++ b/content/software-security/compliance/cmmc-2/cmmc-2-levels/index.md @@ -68,7 +68,7 @@ At the time of publication, specific Level 3 practices are still being determine Each CMMC level builds upon the previous one, ensuring that as organizations progress through the levels, their cybersecurity posture becomes more robust and capable of addressing increasingly sophisticated threats. This tiered approach allows organizations of varying sizes and capabilities to incrementally improve their cybersecurity measures while meeting the specific requirements necessary to handle sensitive information. -To learn more about the specific required practices of CMMC 2.0, continue to the [Overview of CMMC 2.0 Practice/Control Groups](./cmmc-practices.md). +To learn more about the specific required practices of CMMC 2.0, continue to the [Overview of CMMC 2.0 Practice/Control Groups](/software-security/compliance/cmmc-2/cmmc-practices/). ## Browse all CMMC 2.0 Articles diff --git a/content/software-security/compliance/cmmc-2/intro-cmmc-2.md b/content/software-security/compliance/cmmc-2/intro-cmmc-2.md index 5e72af7921..31aea5bc63 100644 --- a/content/software-security/compliance/cmmc-2/intro-cmmc-2.md +++ b/content/software-security/compliance/cmmc-2/intro-cmmc-2.md @@ -45,7 +45,7 @@ Failure to comply with CMMC 2.0 can have several significant impacts: - **Legal and Financial Penalties**: Organizations may face legal actions and financial penalties, especially if a security breach occurs involving sensitive information. - **Increased Risk**: Non-compliance increases the risk of data breaches and cyberattacks, which can compromise organizational and client data. -Achieving compliance with CMMC 2.0 is not just a regulatory requirement but a critical step in safeguarding national security and contracting with the DoD. To prepare your organization for CMMC 2.0, continue on to the next section of our guide, [CMMC 2.0 Maturity Levels](./cmmc-2-levels.md), or read about [how Chainguard Images can help simplify fulfilling CMMC 2.0 requirements](./cmmc-chainguard.md). +Achieving compliance with CMMC 2.0 is not just a regulatory requirement but a critical step in safeguarding national security and contracting with the DoD. To prepare your organization for CMMC 2.0, continue on to the next section of our guide, [CMMC 2.0 Maturity Levels](/software-security/compliance/cmmc-2/cmmc-2-levels/), or read about [how Chainguard Images can help simplify fulfilling CMMC 2.0 requirements](/software-security/compliance/cmmc-2/cmmc-chainguard/). ## Browse all CMMC 2.0 Articles