NIST 800-171 Control 3.13.5 - Implement Subnetworks for Publicly Accessible System Components
CMMC 2.0 Control SC.L1-3.13.5 - Implement subnetworks for publicly accessible system components that
NIST 800-171 Control 3.13.10 - Establish/Manage Cryptographic Keys for Cryptography Employed in Syst
NIST 800-171 Control 3.13.15 - Protect the Authenticity of Communications Sessions
Public-Access System Separation (SC.L1-3.13.5)
NIST 800-171 Control 3.13.13 - Control and Monitor the Use of Mobile Code
NIST 800-171 Control 3.13.6 - Deny All, Permit by Exception
NIST 800-171 Control 3.13.7 - Prevent Split Tunneling
NIST 800-171 Control 3.13.9 - Terminate Network Connections After a Defined Period of Inactivity
NIST 800-171 Control 3.14.5 - Perform Periodic Scans of Systems and Real-Time Scans of Files
VoIP Security: Implementing NIST 800-171 Control 3.13.14
NIST 800-171 Control 3.14.7 - Identify unauthorized use of organizational systems
NIST 800-171 Control 3.11.1 - Periodically Assess the Risk to Operations, Assets, and Individuals
NIST 800-171 Control 3.13.16 - Protect the Confidentiality of CUI at Rest
NIST 800-171 Control 3.8.5 - Control access to media containing CUI and maintain accountability
NIST 800-171 Control 3.14.2 - Provide Protection from Malicious Code at Designated Locations
NIST 800-171 Control 3.13.8 - Implement cryptographic mechanisms to prevent unauthorized disclosure
NIST SP 800-171 - 3.5.5 Understanding Identifiers
Shield Your Communications: NIST 800-171 Control 3.13.1 Best Practices
NIST 800-171 Control 3.10.5 - Control and manage physical access devices