CMMC 2.0 Control PS L2-3.9.2 - Ensure that organizational systems containing CUI are protected
CMMC 2.0 Control PS L2-3.9.1 - Screen individuals prior to authorizing access to organizational
CMMC 2.0 Control SC.L2-3.13.9 - Terminate network connections associated with communications
CMMC 2.0 Control PE.L2-3.10.2 - Protect and monitor the physical facility and support infrastructure
CMMC 2.0 Control RA.L2-3.11.2 - Scan for vulnerabilities in organizational systems and applications
CMMC 2.0 Control AT.L1-3.2.2: Ensuring Adequate Training for Information Security Job Duties
CMMC 2.0 Control AU.L2-3.3.2 - Traceability for User Accountability: Clearing Actions
CMMC 2.0 Control SC.L2-3.13.15 - Protect the authenticity of communications sessions
CMMC 2.0 Control CA L2-3.12.1: Assessing Security Controls and Risk Management
CMMC 2.0 Control MP.L2-3.8.1 - Protect (i.e., physically control and securely store) system media
CMMC 2.0 Control MP.L2-3.8.2 - Limit access to CUI on system media to authorized users.
CMMC 2.0 Control AC.L2-3.1.17: Protect Wireless Access Using Authentication and Encryption
CMMC 2.0 Control AT L2-3.2.3: 3.2.3 Provide security awareness training on recognizing and reporting
CMMC 2.0 Control SC.L2-3.13.2 - Employ architectural designs, software development techniques, and
CMMC 2.0 Control AC.L2-3.1.19: Encrypt CUI on Mobile Devices and Platforms
CMMC 2.0 Control MP.L2-3.8.4 - Mark media with necessary CUI markings and distribution limitations
CMMC 2.0 Control RA.L2-3.11.3 - Remediate vulnerabilities in accordance with risk assessments
CMMC 2.0 Control CA L2-3.12.3 - Monitoring Security Controls for Continued Effectiveness
CMMC 2.0 Control SC.L2-3.13.8 - Implement cryptographic mechanisms to prevent unauthorized disclosur
CMMC 2.0 Control SC.L2-3.13.12 - Prohibit remote activation of collaborative computing devices and
CMMC 2.0 Control MP.L2-3.8.5 - Control access to media containing CUI and maintain accountability
CMMC 2.0 Control MA.L2-3.7.1 - Perform maintenance on organizational systems
CMMC 2.0 Control SC.L2-3.13.3 - Separate user functionality from system management functionality
CMMC 2.0 Control SC.L2-3.13.10 - Establish and manage cryptographic keys for cryptography employed
CMMC 2.0 Control IA.L2-3.5.8 - Prohibit password reuse for a specified number of generations