CMMC 2.0 Control MP.L2-3.8.7 - Control the use of removable media on system components
CMMC 2.0 Control MP.L2-3.8.1 - Protect (i.e., physically control and securely store) system media
CMMC 2.0 Control MP.L2-3.8.5 - Control access to media containing CUI and maintain accountability
CMMC 2.0 Control MP.L2-3.8.2 - Limit access to CUI on system media to authorized users.
CMMC 2.0 Control MP.L2-3.8.4 - Mark media with necessary CUI markings and distribution limitations
CMMC 2.0 Control MP.L2-3.8.3 - Sanitize or destroy system media containing CUI before disposal or
CMMC 2.0 Control MP.L2-3.8.9 - Protect the confidentiality of backup CUI at storage locations
CMMC 2.0 Control MP.L2-3.8.6 - Implement cryptographic mechanisms to protect the confidentiality of
CMMC 2.0 Control MP.L2-3.8.8 - Prohibit the use of portable storage devices when such devices have
CMMC 2.0 Control MA L2-3.7.2 - Provide controls on the tools, techniques, mechanisms, and personnel
CMMC 2.0 Controls AC.L2-3.1.6 | Use Non Privileged Accounts
CMMC 2.0 Control MA.L2-3.7.1 - Perform maintenance on organizational systems
CMMC 2.0 Control SI.L2-3.14.6 - Monitor organizational systems, including inbound and outbound comm
CMMC 2.0 Control PE.L2-3.10.6 - Enforce safeguarding measures for CUI at alternate work sites
CMMC 2.0 Control PS L2-3.9.2 - Ensure that organizational systems containing CUI are protected
CMMC 2.0 Control CM L2-3.4.9 - Control and monitor user-installed software
CMMC 2.0 Control RA.L2-3.11.1 - Periodically assess the risk to organizational operations
CMMC 2.0 Control MA.L2-3.7.6 - Supervise the maintenance activities of maintenance personnel without
CMMC 2.0 Control AT.L1-3.2.2: Ensuring Adequate Training for Information Security Job Duties
CMMC 2.0 Control MA.L2-3.7.4 - Check media containing diagnostic and test programs for malicious
CMMC 2.0 Control CA L2-3.12.3 - Monitoring Security Controls for Continued Effectiveness
CMMC 2.0 Control CM.L2-3.4.8 - Apply deny-by-exception (blacklisting) policy to prevent the use of
CMMC 2.0 Control AU.L2-3.3.7 - Synchronizing System Clocks for Audit Records
CMMC 2.0 Control AC.L2-3.1.17: Protect Wireless Access Using Authentication and Encryption
CMMC 2.0 Control RA.L2-3.11.2 - Scan for vulnerabilities in organizational systems and applications