CMMC 2.0 Control PE.L2-3.10.2 - Protect and monitor the physical facility and support infrastructure
CMMC 2.0 Control PE L2-3.10.1 - Limit physical access to organizational systems, equipment, and the
CMMC 2.0 Control PE.L1-3.10.5 - Control and manage physical access devices
CMMC 2.0 Control PE.L2-3.10.6 - Enforce safeguarding measures for CUI at alternate work sites
CMMC 2.0 Control PE.L1-3.10.4 - Maintain audit logs of physical access
CMMC 2.0 Control RA.L2-3.11.2 - Scan for vulnerabilities in organizational systems and applications
CMMC 2.0 Control PS L2-3.9.2 - Ensure that organizational systems containing CUI are protected
CMMC 2.0 Control AC.L2-3.1.12: Monitor & Control Remote Access Sessions
CMMC 2.0 Control MP.L2-3.8.2 - Limit access to CUI on system media to authorized users.
CMMC 2.0 Control AU.L2-3.3.1- Essential Audit Logs: Monitoring and Reporting System Activity
CMMC 2.0 Control CA L2-3.12.1: Assessing Security Controls and Risk Management
CMMC 2.0 Control AC.L2-3.1.21: Restrict Portable Storage Use on External Systems
CMMC 1.0 Control PE.L1-3.10.3 - Escort visitors and monitor visitor activity
CMMC 2.0 Control CA L2-3.12.3 - Monitoring Security Controls for Continued Effectiveness
CMMC 2.0 Control SC.L2-3.13.10 - Establish and manage cryptographic keys for cryptography employed
CMMC 2.0 Control AT.L1-3.2.2: Ensuring Adequate Training for Information Security Job Duties
CMMC 2.0 Control MP.L2-3.8.4 - Mark media with necessary CUI markings and distribution limitations
CMMC 2.0 Control PS L2-3.9.1 - Screen individuals prior to authorizing access to organizational
CMMC 2.0 Control SC.L2-3.13.2 - Employ architectural designs, software development techniques, and
CMMC 2.0 Control IA.L2-3.5.10 - Store and transmit only cryptographically-protected passwords.