Reporting Features

Reporting Features

The entire NUDG system is made up of hundreds of reports, everything from the reference and mapping of the Identifier card itself, as well as the Quandrant.  NUDG itself is the report, and ideally upon request, we can issue a "read only" account for Auditors to assess your current infrastructure via the system rather than sorting through hundreds of pages of reports.  It's entirely up to you.

To prepare these reports, Standards, Controls, and Weaknesses need to be added into the card:




Once added to the card, and Identifier only report can be done by clicking the card, and clicking Print or PDF if you want to directly save it.




It will contain everything about the Identifier and it's relationship to CMMC and NIST 800-171.

It is required to add these Standards, Controls, and Weaknesses if you wish for them to show up in any report.  If you're only doing CMMC, you do not need to add Weaknesses to the card.  If you wish to leave certain controls out, you may.  It's up to you to decide which items should show.


In the reports section are the BROAD reports.


They are broken down in a couple different fashions.

For example, if you're looking to just print certain CMMC levels, or NIST specific items, you can just click reports and you will be presented with this screen:



For example, we will click CMMC Level 1.  Click the three top bars on the upper right, click print, and print as summary to get a full report of CMMC Level 1:



The next major report is the Plan of Action and Milestones report, specific to NIST 800-171.  This will print out all weaknesses and milestones.

The last is the System Security Plan.  This is a FULL report of the entire system regardless and is large, so it will take time to load fully.  Same concept as the other reports, Three bars on the top right, then print as summary.  


    • Related Articles

    • NUDG Introduction

      Welcome to NUDG Systems.  This guide is meant to give you a brief overview of how we recommend starting your journey on cyber security compliance. While there's no right order to manage things, setting up the foundation correctly at the beginning can ...
    • Users, Groups, & Roles

      Users, Groups, & Roles, similar to Inventory and Partners, are optional but available in the system.   You should be familiar with users and groups if you've ever worked with Active Directory.  They are the most important part of your infrastructure ...
    • The Quadrant

      The Quadrant is where you'll spend the majority of your time identifying, documenting, and tracking remediation for each identifier you intent to implement. Some of it has been filled out for you, but you are free to change, remove, add, and pretty ...
    • Basic Troubleshooting & System Status

      NUDG has just recently been completely redesigned in this release, and we have been working diligently to migrate legacy data over to the new system.  Given that NUDG is also in active development, you may experience hiccups along the way.  Please do ...