CMMC 2.0 Control MP.L2-3.8.9 - Protect the confidentiality of backup CUI at storage locations
CMMC 2.0 Control MP.L2-3.8.1 - Protect (i.e., physically control and securely store) system media
CMMC 2.0 Control MP.L2-3.8.7 - Control the use of removable media on system components
CMMC 2.0 Control MP.L2-3.8.2 - Limit access to CUI on system media to authorized users.
CMMC 2.0 Control CM L2-3.4.9 - Control and monitor user-installed software
CMMC 2.0 Control MP.L2-3.8.4 - Mark media with necessary CUI markings and distribution limitations
CMMC 2.0 Control MP.L2-3.8.8 - Prohibit the use of portable storage devices when such devices have
CMMC 2.0 Control MP.L2-3.8.3 - Sanitize or destroy system media containing CUI before disposal or
CMMC 2.0 Control MP.L2-3.8.5 - Control access to media containing CUI and maintain accountability
CMMC 2.0 Control MP.L2-3.8.6 - Implement cryptographic mechanisms to protect the confidentiality of
CMMC 2.0 Control SC.L2-3.13.9 - Terminate network connections associated with communications
CMMC 2.0 Control AC.L2-3.1.18: Control Connection of Mobile Devices
CMMC 2.0 Control CM.L2-3.4.8 - Apply deny-by-exception (blacklisting) policy to prevent the use of
CMMC 2.0 Control AU.L2-3.3.7 - Synchronizing System Clocks for Audit Records
CMMC 2.0 Control RA.L2-3.11.3 - Remediate vulnerabilities in accordance with risk assessments
CMMC 2.0 Control RA.L2-3.11.1 - Periodically assess the risk to organizational operations
CMMC 2.0 Controls AC.L2-3.1.6 | Use Non Privileged Accounts
CMMC 2.0 Control PE L2-3.10.1 - Limit physical access to organizational systems, equipment, and the
CMMC 2.0 Control AC.L2-3.1.19: Encrypt CUI on Mobile Devices and Platforms
CMMC 2.0 Control CA L2-3.12.1: Assessing Security Controls and Risk Management