NIST 800-171 Control 3.13.2 - Employ Designs/Techniques/Principles to Promote Effective Security
CMMC 2.0 Control SC.L2-3.13.2 - Employ architectural designs, software development techniques, and
NIST 800-171 Control 3.14.2 - Provide Protection from Malicious Code at Designated Locations
NIST 800-171 Control 3.13.15 - Protect the Authenticity of Communications Sessions
CMMC 2.0 Control SC.L2-3.13.7 - Prevent remote devices from simultaneously establishing non-remote
NIST 800-171 Control 3.13.3 - Separate User Functionality from System Management Functionality
NIST 800-171 Control 3.7.2 - Provide controls used to conduct system maintenance
CMMC 2.0 Control SC.L2-3.13.9 - Terminate network connections associated with communications
NIST 800-171 Control 3.13.7 - Prevent Split Tunneling
NIST 800-171 Control 3.13.16 - Protect the Confidentiality of CUI at Rest
CMMC 2.0 Control SC.L2-3.13.15 - Protect the authenticity of communications sessions
CMMC 2.0 Control SC L2-3.13.6 - Deny network communications traffic by default and allow network
CMMC 2.0 Control SC.L2-3.13.16 - Protect the confidentiality of CUI at rest
NIST 800-171 Control 3.13.10 - Establish/Manage Cryptographic Keys for Cryptography Employed in Syst
VoIP Security: Implementing NIST 800-171 Control 3.13.14
Shield Your Communications: NIST 800-171 Control 3.13.1 Best Practices
NIST 800-171 Control 3.12.2 – Develop and Implement Plans of Action
NIST 800-171 Control 3.10.2 - Protect and monitor the physical facility and support infrastructures
NIST 800-171 Control 3.14.7 - Identify unauthorized use of organizational systems
CMMC 2.0 Control SC.L2-3.13.13 - Control and monitor the use of mobile code