CMMC 2.0 Control CA.L2-3.12.4 - Developing Effective System Security Plans
CMMC 2.0 Control CA L2-3.12.2 - Developing Effective Plans of Action for Compliance Success
CMMC 2.0 Control CA L2-3.12.1: Assessing Security Controls and Risk Management
CMMC 2.0 Control CA L2-3.12.3 - Monitoring Security Controls for Continued Effectiveness
CMMC 2.0 Control CM.L2-3.4.4: Analyze the security impact of changes prior to implementation
CMMC 2.0 Control MA.L2-3.7.4 - Check media containing diagnostic and test programs for malicious
CMMC 2.0 Control IA.L2-3.5.4 - Employ replay-resistant authentication mechanisms for network access
CMMC 2.0 Control MP.L2-3.8.1 - Protect (i.e., physically control and securely store) system media
CMMC 2.0 Control SI.L1-3.14-4 - Update malicious code protection mechanisms when new releases are
CMMC 2.0 Control AC.L2-3.1.21: Restrict Portable Storage Use on External Systems
CMMC 2.0 Control RA.L2-3.11.1 - Periodically assess the risk to organizational operations
CMMC 2.0 Control MP.L2-3.8.2 - Limit access to CUI on system media to authorized users.
CMMC 2.0 Control RA.L2-3.11.2 - Scan for vulnerabilities in organizational systems and applications
CMMC 2.0 Control AT.L2-3.2.1: Raise Awareness of Security Risks and Policies
CMMC 2.0 Control SI.L1-3.14.5 - Perform periodic scans of organizational systems and real-time scans
CMMC 2.0 Control PE.L1-3.10.4 - Maintain audit logs of physical access
CMMC 2.0 Control SI.L2-3.14.7 - Identify unauthorized use of organizational systems
CMMC 2.0 Control RA.L2-3.11.3 - Remediate vulnerabilities in accordance with risk assessments
CMMC 2.0 Control AT.L1-3.2.2: Ensuring Adequate Training for Information Security Job Duties
CMMC 2.0 Control MA.L2-3.7.5 - Require multifactor authentication to establish nonlocal maintenance