|
|
{ |
|
|
"total_examples": 11279, |
|
|
"documents_processed": 381, |
|
|
"variant": "comprehensive", |
|
|
"weight_multiplier": 2, |
|
|
"cmmc_level_distribution": { |
|
|
"all": 10430, |
|
|
"1": 392, |
|
|
"3": 148, |
|
|
"2": 309 |
|
|
}, |
|
|
"domain_distribution": { |
|
|
"Planning": 2042, |
|
|
"System and Services Acquisition": 2042, |
|
|
"Physical Protection": 2043, |
|
|
"Awareness and Training": 2043, |
|
|
"Incident Response": 2042, |
|
|
"Supply Chain Risk Management": 1947, |
|
|
"Configuration Management": 1922, |
|
|
"Maintenance": 2043, |
|
|
"Security Assessment": 2043, |
|
|
"System and Communications Protection": 2042, |
|
|
"Media Protection": 2043, |
|
|
"Risk Assessment": 2043, |
|
|
"Audit and Accountability": 2042, |
|
|
"Personnel Security": 2043, |
|
|
"Identification and Authentication": 2043, |
|
|
"Access Control": 2042, |
|
|
"System and Information Integrity": 2042 |
|
|
} |
|
|
} |