CMMC 2.0 Control SC.L2-3.13.3 - Separate user functionality from system management functionality
CMMC 2.0 Control SC.L2-3.13.2 - Employ architectural designs, software development techniques, and
CMMC 2.0 Control SC.L2-3.13.9 - Terminate network connections associated with communications
CMMC 2.0 Control SC.L2-3.13.16 - Protect the confidentiality of CUI at rest
CMMC 2.0 Control SC.L2-3.13.15 - Protect the authenticity of communications sessions
CMMC 2.0 Control SC.L2-3.13.13 - Control and monitor the use of mobile code
CMMC 2.0 Control SC.L2-3.13.7 - Prevent remote devices from simultaneously establishing non-remote
CMMC 2.0 Control SC.L2-3.13.8 - Implement cryptographic mechanisms to prevent unauthorized disclosur
CMMC 2.0 Control SC.L2-3.13.4 - Prevent unauthorized and unintended information transfer via shared
CMMC 2.0 Control SC.L2-3.13.10 - Establish and manage cryptographic keys for cryptography employed
CMMC 2.0 Control SC.L2-3.13.12 - Prohibit remote activation of collaborative computing devices and
CMMC 2.0 Control SC.L2-3.13.11 - Employ FIPS-validated cryptography when used to protect the
CMMC 2.0 Control AT L2-3.2.3: 3.2.3 Provide security awareness training on recognizing and reporting
CMMC 2.0 Control SC.L2-3.13.14 - Control and monitor the use of Voice over Internet Protocol (VoIP)
CMMC 2.0 Control SC L2-3.13.6 - Deny network communications traffic by default and allow network
NIST 800-171 Control 3.13.3 - Separate User Functionality from System Management Functionality
CMMC 2.0 Control IR.L2-3.6.3 - Test the organizational incident response capability
CMMC 2.0 Control CA L2-3.12.3 - Monitoring Security Controls for Continued Effectiveness
CMMC 2.0 Control MP.L2-3.8.3 - Sanitize or destroy system media containing CUI before disposal or
CMMC 2.0 Control SC.L1-3.13.5 - Implement subnetworks for publicly accessible system components that
CMMC 2.0 Control RA.L2-3.11.3 - Remediate vulnerabilities in accordance with risk assessments
CMMC 2.0 Control AU.L2-3.3.1- Essential Audit Logs: Monitoring and Reporting System Activity
CMMC 2.0 Control AU.L2-3.3.7 - Synchronizing System Clocks for Audit Records
CMMC 2.0 Control SI.L2-3.14.7 - Identify unauthorized use of organizational systems
CMMC 2.0 Control MP.L2-3.8.1 - Protect (i.e., physically control and securely store) system media