Model Overview: Difference between revisions

From CMMC Toolkit Wiki
Jump to navigation Jump to search
Importing content from PDF File: https://dodcio.defense.gov/Portals/0/Documents/CMMC/ModelOverviewv2.pdf
 
(83 intermediate revisions by the same user not shown)
Line 1: Line 1:
'''Source of Reference: The official [https://dodcio.defense.gov/CMMC/Documentation/ Model Overview] from the Department of Defense Chief Information Officer (DoD CIO).'''
'''Source of Reference: The official [https://dodcio.defense.gov/cmmc/Resources-Documentation/ CMMC Model Overview Version 2.13, September 2024] from the Department of Defense Chief Information Officer (DoD CIO).'''


For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you.
For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you.


== Access Control (AC) ==
== NOTICES ==
{|class="wikitable" style="width: 85%;"
! style="width: 33%"| Level 1
! style="width: 33%"| Level 2
! style="width: 33%"| Level 3 (TBD)
|-
|'''[[Practice_AC.L1-3.1.1_Details|AC.L1-3.1.1]]'''
''Authorized Access Control''


Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
The contents of this document do not have the force and effect of law and are not meant to bind the public in any way. This document is intended only to provide clarity to the public regarding existing CMMC security requirements under the law or departmental policies.
* FAR Clause 52.204-21 b.1.i
* NIST SP 800-171 Rev 2 3.1.1
|'''[[Practice_AC.L2-3.1.3_Details|AC.L2-3.1.3]]'''
''Control CUI Flow''


Control the flow of CUI in accordance with approved authorizations.
DISTRIBUTION STATEMENT A. Approved for public release. Distribution is unlimited.
* NIST SP 800-171 Rev 2 3.1.3
|
|-
|'''[[Practice_AC.L1-3.1.2_Details|AC.L1-3.1.2]]'''
''Transaction & Function Control''


Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
== 1. Introduction ==
* FAR Clause 52.204-21 b.1.ii
The theft of intellectual property and sensitive information from all industrial sectors because of malicious cyber activity threatens economic security and national security. The Council of Economic Advisors estimates that malicious cyber activity cost the U.S. economy between $57 billion and $109 billion in 2016 [1]. The Center for Strategic and International Studies estimates that the total global cost of cybercrime was as high as $600 billion in 2017 [2]. Over a ten-year period, that burden would equate to an estimated $570 billion to $1.09 trillion dollars in costs.
* NIST SP 800-171 Rev 2 3.1.2
|'''[[Practice_AC.L2-3.1.4_Details|AC.L2-3.1.4]]'''
''Separation of Duties''


Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
Malicious cyber actors have targeted and continue to target the Defense Industrial Base (DIB) sector and the Department of Defense (DoD) supply chain. These attacks not only focus on the large prime contractors, but also target subcontractors that make up the lower tiers of the DoD supply chain. Many of these subcontractors are small entities that provide critical support and innovation. Overall, the DIB sector consists of over 220,000 companies<ref>Based on information from the Federal Procurement Data System, the average number of unique prime contractors is approximately 212,657 and the number of known unique subcontractors is approximately 8,309. (FPDS from FY18-FY21).</ref> that process, store, or transmit Controlled Unclassified Information (CUI) or Federal Contract Information (FCI) in support of the warfighter and contribute towards the research, engineering, development, acquisition, production, delivery, sustainment, and operations of DoD systems, networks, installations, capabilities, and services. The aggregate loss of intellectual property and controlled unclassified information from the DoD supply chain can undercut U.S. technical advantages and innovation, as well as significantly increase the risk to national security.
* NIST SP 800-171 Rev 2 3.1.4
|
|-
|'''[[Practice_AC.L1-3.1.20_Details|AC.L1-3.1.20]]'''
''External Connections''


Verify and control/limit connections to and use of external information systems.
As part of multiple lines of effort focused on the security and resiliency of the DIB sector, the DoD is working with industry to enforce the safeguarding requirements of the following types of unclassified information within the supply chain:
* FAR Clause 52.204-21 b.1.iii
* ''Federal Contract Information (FCI):'' is defined in 32 CFR § 170.4 and 48 CFR 4.1901 [3].
* NIST SP 800-171 Rev 2 3.1.20
* ''Controlled Unclassified Information (CUI):'' is defined in 32 CFR § 2002.4 (h) [4].
|'''[[Practice_AC.L2-3.1.5_Details|AC.L2-3.1.5]]'''
''Least Privilege''


Employ the principle of least privilege, including for specific security functions and privileged accounts.
To this end, the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&amp;S)) and DoD Chief Information Officer (CIO) have developed the Cybersecurity Maturity Model Certification (CMMC) in concert with DoD stakeholders, University Affiliated Research Centers (UARCs), Federally Funded Research and Development Centers (FFRDCs), and the DIB sector.
* NIST SP 800-171 Rev 2 3.1.5
|
|-
|'''[[Practice_AC.L1-3.1.22_Details|AC.L1-3.1.22]]'''
''Control Public Information''


Control information posted or processed on publicly accessible information systems.
This document focuses on the Cybersecurity Maturity Model Certification (CMMC) Model as set forth in section 170.14 of title 32, Code of Federal Regulations (CFR). The model incorporates the security requirements from: 1) FAR 52.204-21, ''Basic Safeguarding of Covered Contractor Information Systems'', 2) NIST SP 800-171 Rev 2, ''Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations'', and 3) a subset of the requirements from NIST SP 800-172, ''Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171''. The CMMC Program is designed to provide increased assurance to the DoD that defense contractors and subcontractors are compliant with information protection requirements for FCI and CUI, and are protecting such information at a level commensurate with risk from cybersecurity threats, including Advanced Persistent Threats (APTs).
* FAR Clause 52.204-21 b.1.iv
* NIST SP 800-171 Rev 2 3.1.22
|'''[[Practice_AC.L2-3.1.6_Details|AC.L2-3.1.6]]'''
''Non-Privileged Account Use''


Use non-privileged accounts or roles when accessing nonsecurity functions.
When implementing the CMMC model, an organization can achieve a specific CMMC level for its entire enterprise network or for a particular enclave(s), depending on where the information to be protected is handled and stored.
* NIST SP 800-171 Rev 2 3.1.6
 
|
=== 1.1 Document Organization ===
|-
Section 2 presents the CMMC Model and each of its elements in detail.[[Model Overview#Appendix A|Appendix A]] provides the model as a matrix and maps the CMMC model to other secondary sources. [[Model Overview#Appendix B|Appendix B]] lists the abbreviations and acronyms. Finally, [[Model Overview#Appendix C|Appendix C]] provides the references contained in this document.
|
|'''[[Practice_AC.L2-3.1.7_Details|AC.L2-3.1.7]]'''
''Privileged Functions''


Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
=== 1.2 Supporting Documents ===
* NIST SP 800-171 Rev 2 3.1.7
This document is supported by multiple companion documents that provide additional information. The ''CMMC Assessment Guides'' present assessment objectives, discussion, examples, potential assessment considerations, and key references for each CMMC security requirement. The ''CMMC Scoping Guides'' provide additional guidance on how to correctly scope an assessment. The ''CMMC Hashing Guide'' provides information on how to create the hash to validate the integrity of archived assessment artifacts.
|
|-
|
|'''[[Practice_AC.L2-3.1.8_Details|AC.L2-3.1.8]]'''
''Unsuccessful Logon Attempts''


Limit unsuccessful logon attempts.
These supplemental documents are intended to provide explanatory information to assist organizations with implementing and assessing the security requirements covered by CMMC in 32 CFR § 170. The documents are not prescriptive and their use is optional. Implementation of security requirements by following any examples is not a guarantee of compliance with any CMMC security requirement or objective.
* NIST SP 800-171 Rev 2 3.1.8
|
|-
|
|'''[[Practice_AC.L2-3.1.9_Details|AC.L2-3.1.9]]'''
''Privacy & Security Notices''


Provide privacy and security notices consistent with applicable CUI rules.
== 2. CMMC Model ==
* NIST SP 800-171 Rev 2 3.1.9
=== 2.1 Overview ===
|
The CMMC Model incorporates the security requirements from: 1) FAR 52.204-21, ''Basic Safeguarding of Covered Contractor Information Systems'', 2) NIST SP 800-171 Rev 2, ''Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations'', and 3) a subset of the requirements from NIST SP 800-172, ''Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800—171.'' These source documents may be revised in the future, however the CMMC security requirements will remain unchanged until the CMMC final rule is published. Any further modifications to the CMMC rule will follow appropriate rulemaking procedures.
|-
|
|'''[[Practice_AC.L2-3.1.10_Details|AC.L2-3.1.10]]'''
''Session Lock''


Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
The CMMC Model consists of domains that map to the Security Requirement Families defined in NIST SP 800-171 Rev 2.
* NIST SP 800-171 Rev 2 3.1.10
|
|-
|
|'''[[Practice_AC.L2-3.1.11_Details|AC.L2-3.1.11]]'''
''Session Termination''


Terminate (automatically) a user session after a defined condition.
=== 2.2 CMMC Levels ===
* NIST SP 800-171 Rev 2 3.1.11
There are three levels within CMMC – Level 1, Level 2, and Level 3.
|
 
|-
==== 2.2.1 Descriptions ====
|
The CMMC model measures the implementation of cybersecurity requirements at three levels. Each level is independent and consists of a set of CMMC security requirements as set forth in 32 CFR § 170.14 (c):
|'''[[Practice_AC.L2-3.1.12_Details|AC.L2-3.1.12]]'''
* Level 1 Requirements. The security requirements in Level 1 are those set forth in FAR clause 52.204-21(b)(1)(i) – (b)(1)(xv).
''Control Remote Access''
* Level 2 Requirements. The security requirements in Level 2 are identical to the requirements in NIST SP 800-171 Rev 2.
* Level 3 Requirements. The security requirements in Level 3 are derived from NIST SP 800-172 with DoD-approved parameters where applicable, as identified in 32 CFR § 170.14(c)(4). DoD defined selections and parameters for the NIST SP 800-172 requirements are italicized, where applicable.
 
==== 2.2.2 CMMC Overview ====
'''Figure 1. CMMC Level Overview'''


Monitor and control remote access sessions.
==== 2.2.3 Level 1 ====
* NIST SP 800-171 Rev 2 3.1.12
Level 1 focuses on the protection of FCI and consists of the security requirements that correspond to the 15 basic safeguarding requirements specified in 48 CFR 52.204-21, commonly referred to as the FAR Clause.
|
|-
|
|'''[[Practice_AC.L2-3.1.13_Details|AC.L2-3.1.13]]'''
''Remote Access Confidentiality''


Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
==== 2.2.4 Level 2 ====
* NIST SP 800-171 Rev 2 3.1.13
Level 2 focuses on the protection of CUI and incorporates the 110 security requirements specified in NIST SP 800-171 Rev 2.  
|
|-
|
|'''[[Practice_AC.L2-3.1.14_Details|AC.L2-3.1.14]]'''
''Remote Access Routing''


Route remote access via managed access
==== 2.2.5 Level 3 ====
control points.
Level 3 focuses on the protection of CUI and encompasses a subset of the NIST SP 800-172 security requirements [5] with DoD-approved parameters. DoD-approved parameters are denoted with <u>underlining</u> in section 2.4.1 below.
* NIST SP 800-171 Rev 2 3.1.14
|
|-
|
|'''[[Practice_AC.L2-3.1.15_Details|AC.L2-3.1.15]]'''
''Privileged Remote Access''


Authorize remote execution of privileged commands and remote access to security-relevant information.
=== 2.3 CMMC Domains ===
* NIST SP 800-171 Rev 2 3.1.15
The CMMC model consists of 14 domains that align with the families specified in NIST SP 800-171 Rev 2. These domains and their abbreviations are as follows:
|
* Access Control (AC)
|-
* Awareness & Training (AT)
|
* Audit & Accountability (AU)
|'''[[Practice_AC.L2-3.1.16_Details|AC.L2-3.1.16]]'''
* Configuration Management (CM)
''Wireless Access Authorization''
* Identification & Authentication (IA)
* Incident Response (IR)
* Maintenance (MA)
* Media Protection (MP)
* Personnel Security (PS)
* Physical Protection (PE)
* Risk Assessment (RA)
* Security Assessment (CA)
* System and Communications Protection (SC)
* System and Information Integrity (SI)


Authorize wireless access prior to allowing
=== 2.4 CMMC Security Requirements ===
such connections.
==== 2.4.1. List of Security Requirements ====
* NIST SP 800-171 Rev 2 3.1.16
This subsection itemizes the security requirements for each domain and at each level. Each requirement has a requirement identification number in the format – '''DD.L#-REQ''' – where:
|
* DD is the two-letter domain abbreviation;
|-
* L# is the level number; and
|
* REQ is the FAR Clause 52.204-21 paragraph number, NIST SP 800-171 Rev 2, or NIST SP800-172 security requirement number.
|'''[[Practice_AC.L2-3.1.17_Details|AC.L2-3.1.17]]'''
 
''Wireless Access Protection''
Below the identification number, a short name identifier is provided for each requirement, meant to be used for quick reference only. Finally, each requirement has a complete requirement statement.


Protect wireless access using authentication and encryption.
==== Access Control (AC) ====
* NIST SP 800-171 Rev 2 3.1.17
{| class="wikitable" style="margin:auto"
|
|+ '''ACCESS CONTROL (AC)'''
|-
|-
|
! style="width: 25%;text-align:left" | '''Level 1'''
|'''[[Practice_AC.L2-3.1.18_Details|AC.L2-3.1.18]]'''
! style="width: 75%;text-align:left" | '''Description'''
''Mobile Device Connection''
 
Control connection of mobile devices.
* NIST SP 800-171 Rev 2 3.1.18
|
|-
|-
|
|'''[[ Practice_AC.L2-3.1.1_Details | AC.L1-b.1.i ]]'''<br>''Authorized Access Control [FCI Data]''
|'''[[Practice_AC.L2-3.1.19_Details|AC.L2-3.1.19]]'''
|Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
''Encrypt CUI on Mobile''
 
Encrypt CUI on mobile devices and mobile computing platforms.
* NIST SP 800-171 Rev 2 3.1.19
|
|-
|-
|
|'''[[ Practice_AC.L2-3.1.2_Details | AC.L1-b.1.ii ]]'''<br>''Transaction &amp; Function Control [FCI Data]''
|'''[[Practice_AC.L2-3.1.21_Details|AC.L2-3.1.21]]'''
|Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
''Portable Storage Use''
Limit use of portable storage devices on external systems.
* NIST SP 800-171 Rev 2 3.1.21
|
|}
 
== Awareness and Training (AT) ==
{|class="wikitable" style="width: 85%;"
! style="width: 33%"| Level 1
! style="width: 33%"| Level 2
! style="width: 33%"| Level 3 (TBD)
|-
|-
|
|'''[[ Practice_AC.L2-3.1.20_Details | AC.L1-b.1.iii ]]'''<br>''External Connections [FCI Data]''
|'''[[Practice_AT.L2-3.2.1_Details|AT.L2-3.2.1]]'''
|Verify and control/limit connections to and use of external information systems.
''Role-Based Risk Awareness''
 
Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and  
procedures related to the security of those systems.
* NIST SP 800-171 Rev 2 3.2.1
|
|-
|-
|
|'''[[ Practice_AC.L2-3.1.22_Details | AC.L1-b.1.iv ]]'''<br>''Control Public Information [FCI Data]''
|'''[[Practice_AT.L2-3.2.2_Details|AT.L2-3.2.2]]'''
|Control information posted or processed on publicly accessible information systems.
''Role-Based Training''
 
Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities.
* NIST SP 800-171 Rev 2 3.2.2
|
|-
|-
|
|| '''Level 2''' || '''Description'''
|'''[[Practice_AT.L2-3.2.3_Details|AT.L2-3.2.3]]'''
''Insider Threat Awareness''
 
Provide security awareness training on recognizing and reporting potential indicators of insider threat.
* NIST SP 800-171 Rev 2 3.2.3
|
|}
 
== Audit and Accountability (AU) ==
{|class="wikitable" style="width: 85%;"
! style="width: 33%"| Level 1
! style="width: 33%"| Level 2
! style="width: 33%"| Level 3 (TBD)
|-
|-
|
|'''[[ Practice_AC.L2-3.1.1_Details | AC.L2-3.1.1 ]]'''<br>''Authorized Access Control [CUI Data]''
|'''[[Practice_AU.L2-3.3.1_Details|AU.L2-3.3.1]]'''
|Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems).
''System Auditing''
 
Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity.
* NIST SP 800-171 Rev 2 3.3.1
|
|-
|-
|
|'''[[ Practice_AC.L2-3.1.2_Details | AC.L2-3.1.2 ]]'''<br>''Transaction &amp; Function Control [CUI Data]''
|'''[[Practice_AU.L2-3.3.2_Details|AU.L2-3.3.2]]'''
|Limit system access to the types of transactions and functions that authorized users are permitted to execute.
''User Accountability''
 
Ensure that the actions of individual system users can be uniquely traced to those users, so they can be held accountable for their actions.
• NIST SP 800-171 Rev 2 3.3.2
|
|-
|-
|
|'''[[ Practice_AC.L2-3.1.3_Details | AC.L2-3.1.3 ]]'''<br>''Control CUI Flow''
|'''[[Practice_AU.L2-3.3.3_Details|AU.L2-3.3.3]]'''
|Control the flow of CUI in accordance with approved authorizations.
''Event Review''
|-
 
|'''[[ Practice_AC.L2-3.1.4_Details | AC.L2-3.1.4 ]]'''<br>''Separation of Duties''
Review and update logged events.
|Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
* NIST SP 800-171 Rev 2 3.3.3
|
|-
|-
|
|'''[[ Practice_AC.L2-3.1.5_Details | AC.L2-3.1.5 ]]'''<br>''Least Privilege''
|'''[[Practice_AU.L2-3.3.4_Details|AU.L2-3.3.4]]'''
|Employ the principle of least privilege, including for specific security functions and privileged accounts.
''Audit Failure Alerting''
 
Alert in the event of an audit logging process failure.
* NIST SP 800-171 Rev 2 3.3.4
|
|-
|-
|
|'''[[ Practice_AC.L2-3.1.6_Details | AC.L2-3.1.6 ]]'''<br>''Non-Privileged Account Use''
|'''[[Practice_AU.L2-3.3.5_Details|AU.L2-3.3.5]]'''
|Use non-privileged accounts or roles when accessing nonsecurity functions.
''Audit Correlation''
 
Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.
* NIST SP 800-171 Rev 2 3.3.5
|
|-
|-
|
|'''[[ Practice_AC.L2-3.1.7_Details | AC.L2-3.1.7 ]]'''<br>''Privileged Functions''
|'''[[Practice_AU.L2-3.3.6_Details|AU.L2-3.3.6]]'''
|Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
''Reduction & Reporting''
 
Provide audit record reduction and report generation to support on-demand analysis and reporting.
* NIST SP 800-171 Rev 2 3.3.6
|
|-
|-
|
|'''[[ Practice_AC.L2-3.1.8_Details | AC.L2-3.1.8 ]]'''<br>''Unsuccessful Logon Attempts''
|'''[[Practice_AU.L2-3.3.7_Details|AU.L2-3.3.7]]'''
|Limit unsuccessful logon attempts.
''Authoritative Time Source''
 
Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records.
* NIST SP 800-171 Rev 2 3.3.7
|
|-
|-
|
|'''[[ Practice_AC.L2-3.1.9_Details | AC.L2-3.1.9 ]]'''<br>''Privacy & Security Notices''
|'''[[Practice_AU.L2-3.3.8_Details|AU.L2-3.3.8]]'''
|Provide privacy and security notices consistent with applicable CUI rules.
''Audit Protection''
|-
|'''[[ Practice_AC.L2-3.1.10_Details | AC.L2-3.1.10 ]]'''<br>''Session Lock''
|Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
|-
|'''[[ Practice_AC.L2-3.1.11_Details | AC.L2-3.1.11 ]]'''<br>''Session Termination''
|Terminate (automatically) a user session after a defined condition.
|-
|'''[[ Practice_AC.L2-3.1.12_Details | AC.L2-3.1.12 ]]'''<br>''Control Remote Access''
|Monitor and control remote access sessions.
|-
|'''[[ Practice_AC.L2-3.1.13_Details | AC.L2-3.1.13 ]]'''<br>''Remote Access Confidentiality''
|Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
|-
|'''[[ Practice_AC.L2-3.1.14_Details | AC.L2-3.1.14 ]]'''<br>''Remote Access Routing''
|Route remote access via managed access control points.
|-
|'''[[ Practice_AC.L2-3.1.15_Details | AC.L2-3.1.15 ]]'''<br>''Privileged Remote Access''
|Authorize remote execution of privileged commands and remote access to security-relevant information.
|-
|'''[[ Practice_AC.L2-3.1.16_Details | AC.L2-3.1.16 ]]'''<br>''Wireless Access Authorization''
|Authorize wireless access prior to allowing such connections.
|-
|'''[[ Practice_AC.L2-3.1.17_Details | AC.L2-3.1.17 ]]'''<br>''Wireless Access Protection''
|Protect wireless access using authentication and encryption.
|-
|'''[[ Practice_AC.L2-3.1.18_Details | AC.L2-3.1.18 ]]'''<br>''Mobile Device Connection''
|Control connection of mobile devices.
|-
|'''[[ Practice_AC.L2-3.1.19_Details | AC.L2-3.1.19 ]]'''<br>''Encrypt CUI on Mobile''
|Encrypt CUI on mobile devices and mobile computing platforms.
|-
|'''[[ Practice_AC.L2-3.1.20_Details | AC.L2-3.1.20 ]]'''<br>''External Connections [CUI Data]''
|Verify and control/limit connections to and use of external systems.
|-
|'''[[ Practice_AC.L2-3.1.21_Details | AC.L2-3.1.21 ]]'''<br>''Portable Storage Use''
|Limit use of portable storage devices on external systems.
|-
|'''[[ Practice_AC.L2-3.1.22_Details | AC.L2-3.1.22 ]]'''<br>''Control Public Information [CUI Data] ''
|Control CUI posted or processed on publicly accessible systems.
|-
|| '''Level 3''' || '''Description'''
|-
|'''[[ Practice_AC.L3-3.1.2e_Details | AC.L3-3.1.2e ]]'''<br>''Organizationally Controlled Assets''
|Restrict access to systems and system components to only those information resources that are owned, provisioned, or issued by the organization.
|-
|'''[[ Practice_AC.L3-3.1.3e_Details | AC.L3-3.1.3e ]]'''<br>''Secured Information Transfer''
|Employ <u>secure information transfer solutions</u> to control information flows between security domains on connected systems.
|}


Protect audit information and audit logging tools from unauthorized access, modification, and deletion.
==== Awareness & Training (AT) ====
* NIST SP 800-171 Rev 2 3.3.8
{| class="wikitable" style="margin:auto"
|+ '''AWARENESS AND TRAINING (AT)'''
|-
! style="width: 25%;text-align:left" | '''Level 2'''
! style="width: 75%;text-align:left" | '''Description'''
|-
|
|
'''[[ Practice_AT.L2-3.2.1_Details | AT.L2-3.2.1 ]]'''<br>''Role-Based Risk Awareness''
|Inform managers, systems administrators, and users of organizational systems of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems.
|-
|-
|
|
|'''[[Practice_AU.L2-3.3.9_Details|AU.L2-3.3.9]]'''
'''[[ Practice_AT.L2-3.2.2_Details | AT.L2-3.2.2 ]]'''<br>''Role-Based Training''
''Audit Management''
 
Limit management of audit logging functionality to a subset of privileged users.
* NIST SP 800-171 Rev 2 3.3.9
|
|
|}
Train personnel to carry out their assigned information security-related duties and responsibilities.
 
== Configuration Management (CM) ==
{|class="wikitable" style="width: 85%;"
! style="width: 33%"| Level 1
! style="width: 33%"| Level 2
! style="width: 33%"| Level 3 (TBD)
|-
|-
|
|
|'''[[Practice_CM.L2-3.4.1_Details|CM.L2-3.4.1]]'''
'''[[ Practice_AT.L2-3.2.3_Details | AT.L2-3.2.3 ]]'''<br>''Insider Threat Awareness''
''System Baselining''
|
 
Provide security awareness training on recognizing and reporting potential indicators of insider threat.
Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles.
|-
* NIST SP 800-171 Rev 2 3.4.1
|| '''Level 3 ''' || '''Description'''
|
|-
|-
|
|
|'''[[Practice_CM.L2-3.4.2_Details|CM.L2-3.4.2]]'''
'''[[ Practice_AT.L3-3.2.1e_Details | AT.L3-3.2.1e ]]'''<br>''Advanced Threat Awareness''
''Security Configuration Enforcement''
 
Establish and enforce security configuration settings for information technology products employed in organizational systems.
* NIST SP 800-171 Rev 2 3.4.2
|
|
Provide awareness training <u>upon initial hire, following a significant cyber event, and at least annually</u>, focused on recognizing and responding to threats from social engineering, advanced persistent threat actors, breaches, and suspicious behaviors; update the training at least annually or when there are significant changes to the threat.
|-
|-
|
|
|'''[[Practice_CM.L2-3.4.3_Details|CM.L2-3.4.3]]'''
'''[[ Practice_AT.L3-3.2.2e_Details | AT.L3-3.2.2e ]]'''<br>''Practical Training Exercises''
''System Change Management''
|
Include practical exercises in awareness training for <u>all users, tailored by roles, to include general users, users with specialized roles, and privileged users</u>, that are aligned with current threat scenarios and provide feedback to individuals involved in the training and their supervisors.
|}


Track, review, approve or disapprove, and log changes to organizational systems.
==== Audit & Accountability (AU) ====
* NIST SP 800-171 Rev 2 3.4.3
{| class="wikitable" style="margin:auto"
|
|+ '''AUDIT AND ACCOUNTABILITY (AU)'''
|-
! style="width: 25%;text-align:left" | '''Level 2'''
! style="width: 75%;text-align:left" | '''Description'''
|-
|-
|
|
|'''[[Practice_CM.L2-3.4.4_Details|CM.L2-3.4.4]]'''
'''[[ Practice_AU.L2-3.3.1_Details | AU.L2-3.3.1 ]]'''<br>''System Auditing''
''Security Impact Analysis''
 
Analyze the security impact of changes prior to implementation.
* NIST SP 800-171 Rev 2 3.4.4
|
|
Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity.
|-
|-
|
|
|'''[[Practice_CM.L2-3.4.5_Details|CM.L2-3.4.5]]'''
'''[[ Practice_AU.L2-3.3.2_Details | AU.L2-3.3.2 ]]'''<br>''User Accountability''
''Access Restrictions for Change''
 
Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems.
* NIST SP 800-171 Rev 2 3.4.5
|
|
Uniquely trace the actions of individual system users, so they can be held accountable for their actions.
|-
|-
|
|
|'''[[Practice_CM.L2-3.4.6_Details|CM.L2-3.4.6]]'''
'''[[ Practice_AU.L2-3.3.3_Details | AU.L2-3.3.3 ]]'''<br>''Event Review''
''Least Functionality''
 
Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities.
* NIST SP 800-171 Rev 2 3.4.6
|
|
Review and update logged events.
|-
|-
|
|
|'''[[Practice_CM.L2-3.4.7_Details|CM.L2-3.4.7]]'''
'''[[ Practice_AU.L2-3.3.4_Details | AU.L2-3.3.4 ]]'''<br>''Audit Failure Alerting''
''Nonessential Functionality''
|
 
Alert in the event of an audit logging process failure.
Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services.
|-
* NIST SP 800-171 Rev 2 3.4.7
|
'''[[ Practice_AU.L2-3.3.5_Details | AU.L2-3.3.5 ]]'''<br>''Audit Correlation''
|
Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.
|-
|
'''[[ Practice_AU.L2-3.3.6_Details | AU.L2-3.3.6 ]]'''<br>''Reduction &amp; Reporting''
|
Provide audit record reduction and report generation to support on-demand analysis and reporting.
|-
|
'''[[ Practice_AU.L2-3.3.7_Details | AU.L2-3.3.7 ]]'''<br>''Authoritative Time Source''
|
|
Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records.
|-
|-
|
|
|'''[[Practice_CM.L2-3.4.8_Details|CM.L2-3.4.8]]'''
'''[[ Practice_AU.L2-3.3.8_Details | AU.L2-3.3.8 ]]'''<br>''Audit Protection''
''Application Execution Policy''
 
Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (whitelisting) policy to allow the execution of authorized software.
* NIST SP 800-171 Rev 2 3.4.8
|
|
Protect audit information and audit logging tools from unauthorized access, modification, and deletion.
|-
|-
|
|
|'''[[Practice_CM.L2-3.4.9_Details|CM.L2-3.4.9]]'''
'''[[ Practice_AU.L2-3.3.9_Details | AU.L2-3.3.9 ]]'''<br>''Audit Management''
''User-Installed Software''
 
Control and monitor user-installed software.
* NIST SP 800-171 Rev 2 3.4.9
|
|
Limit management of audit logging functionality to a subset of privileged users.
|}
|}


== Identification and Authentication (IA) ==
==== Configuration Management (CM) ====
{|class="wikitable" style="width: 85%;"
{| class="wikitable" style="margin:auto"
! style="width: 33%"| Level 1
|+ '''CONFIGURATION MANAGEMENT (CM)'''
! style="width: 33%"| Level 2
|-
! style="width: 33%"| Level 3 (TBD)
! style="width: 25%;text-align:left" | '''Level 2'''
! style="width: 75%;text-align:left" | '''Description'''
|-
|-
|'''[[Practice_IA.L1-3.5.1_Details|IA.L1-3.5.1]]'''
''Identification''
Identify information system users, processes acting on behalf of users, or devices.
* FAR Clause 52.204-21 b.1.v
* NIST SP 800-171 Rev 2 3.5.1
|'''[[Practice_IA.L2-3.5.3_Details|IA.L2-3.5.3]]'''
''Multifactor Authentication''
Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.
* NIST SP 800-171 Rev 2 3.5.3
|
|
'''[[ Practice_CM.L2-3.4.1_Details | CM.L2-3.4.1 ]]'''<br>''System Baselining''
|
Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles.
|-
|-
|'''[[Practice_IA.L1-3.5.2_Details|IA.L1-3.5.2]]'''
''Authentication''
Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.
* FAR Clause 52.204-21 b.1.vi
* NIST SP 800-171 Rev 2 3.5.2
|'''[[Practice_IA.L2-3.5.4_Details|IA.L2-3.5.4]]'''
''Replay-Resistant Authentication''
Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.
* NIST SP 800-171 Rev 2 3.5.4
|
|
'''[[ Practice_CM.L2-3.4.2_Details | CM.L2-3.4.2 ]]'''<br>''Security Configuration Enforcement''
|
Establish and enforce security configuration settings for information technology products employed in organizational systems.
|-
|-
|
|
|'''[[Practice_IA.L2-3.5.5_Details|IA.L2-3.5.5]]'''
'''[[ Practice_CM.L2-3.4.3_Details | CM.L2-3.4.3 ]]'''<br>''System Change Management''
''Identifier Reuse''
 
Prevent reuse of identifiers for a defined period.
* NIST SP 800-171 Rev 2 3.5.5
|
|
Track, review, approve or disapprove, and log changes to organizational systems.
|-
|-
|
|
|'''[[Practice_IA.L2-3.5.6_Details|IA.L2-3.5.6]]'''
'''[[ Practice_CM.L2-3.4.4_Details | CM.L2-3.4.4 ]]'''<br>''Security Impact Analysis''
''Identifier Handling''
 
Disable identifiers after a defined period of inactivity.
* NIST SP 800-171 Rev 2 3.5.6
|
|
Analyze the security impact of changes prior to implementation.
|-
|-
|
|
|'''[[Practice_IA.L2-3.5.7_Details|IA.L2-3.5.7]]'''
'''[[ Practice_CM.L2-3.4.5_Details | CM.L2-3.4.5 ]]'''<br>''Access Restrictions for Change''
''Password Complexity''
 
Enforce a minimum password complexity and change of characters when new passwords are created.
* NIST SP 800-171 Rev 2 3.5.7
|
|
Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems.
|-
|-
|
|
|'''[[Practice_IA.L2-3.5.8_Details|IA.L2-3.5.8]]'''
'''[[ Practice_CM.L2-3.4.6_Details | CM.L2-3.4.6 ]]'''<br>''Least Functionality''
''Password Reuse''
 
Prohibit password reuse for a specified number of generations.
* NIST SP 800-171 Rev 2 3.5.8
|
|
Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities.
|-
|-
|
|
|'''[[Practice_IA.L2-3.5.9_Details|IA.L2-3.5.9]]'''
'''[[ Practice_CM.L2-3.4.7_Details | CM.L2-3.4.7 ]]'''<br>''Nonessential Functionality''
''Temporary Passwords''
 
Allow temporary password use for system logons with an immediate change to a permanent password.
* NIST SP 800-171 Rev 2 3.5.9
|
|
Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services.
|-
|-
|
|
|'''[[Practice_IA.L2-3.5.10_Details|IA.L2-3.5.10]]'''
'''[[ Practice_CM.L2-3.4.8_Details | CM.L2-3.4.8 ]]'''<br>''Application Execution Policy''
''Cryptographically-Protected Passwords''
 
Store and transmit only cryptographically protected passwords.
* NIST SP 800-171 Rev 2 3.5.10
|
|
Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (whitelisting) policy to allow the execution of authorized software.
|-
|-
|
|
|'''[[Practice_IA.L2-3.5.11_Details|IA.L2-3.5.11]]'''
'''[[ Practice_CM.L2-3.4.9_Details | CM.L2-3.4.9 ]]'''<br>''User-Installed Software''
''Obscure Feedback''
 
Obscure feedback of authentication information.
* NIST SP 800-171 Rev 2 3.5.11
|
|
|}
Control and monitor user-installed software.
 
|-
== Incident Response (IR) ==
|| '''Level 3''' || '''Description'''
{|class="wikitable" style="width: 85%;"
! style="width: 33%"| Level 1
! style="width: 33%"| Level 2
! style="width: 33%"| Level 3 (TBD)
|-
|-
|
|
|'''[[Practice_IR.L2-3.6.1_Details|IR.L2-3.6.1]]'''
'''[[ Practice_CM.L3-3.4.1e_Details | CM.L3-3.4.1e ]]'''<br>''Authoritative Repository''
''Incident Handling''
 
Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities.
* NIST SP 800-171 Rev 2 3.6.1
|
|
Establish and maintain an authoritative source and repository to provide a trusted source and accountability for approved and implemented system components.
|-
|-
|
|
|'''[[Practice_IR.L2-3.6.2_Details|IR.L2-3.6.2]]'''
'''[[ Practice_CM.L3-3.4.2e_Details | CM.L3-3.4.2e ]]'''<br>''Automated Detection &amp; Remediation''
''Incident Reporting''
|
 
Employ automated mechanisms to detect misconfigured or unauthorized system components; after detection, <u>remove the components or place the components in a quarantine or remediation network</u> to facilitate patching, re-configuration, or other mitigations.
Track, document, and report incidents to designated officials and/or authorities both internal and external to the organization.
* NIST SP 800-171 Rev 2 3.6.2
|
|-
|-
|
|
|'''[[Practice_IR.L2-3.6.3_Details|IR.L2-3.6.3]]'''
'''[[ Practice_CM.L3-3.4.3e_Details | CM.L3-3.4.3e ]]'''<br>''Automated Inventory''
''Incident Response Testing''
 
Test the organizational incident response capability.
* NIST SP 800-171 Rev 2 3.6.3
|
|
Employ automated discovery and management tools to maintain an up-to-date, complete, accurate, and readily available inventory of system components.
|}
|}


== Maintenance (MA) ==
==== Identification & Authentication (IA) ====
{|class="wikitable" style="width: 85%;"
{| class="wikitable" style="margin:auto"
! style="width: 33%"| Level 1
|+ '''IDENTIFICATION AND AUTHENTICATION (IA)'''
! style="width: 33%"| Level 2
|-
! style="width: 33%"| Level 3 (TBD)
! style="width: 25%;text-align:left" | '''Level 1'''
! style="width: 75%;text-align:left" | '''Description'''
|-
|-
|
|
|'''[[Practice_MA.L2-3.7.1_Details|MA.L2-3.7.1]]'''
'''[[ Practice_IA.L2-3.5.1_Details | IA.L1-b.1.v ]]'''<br>''Identification [FCI Data]''  
''Perform Maintenance''
 
Perform maintenance on organizational systems.
* NIST SP 800-171 Rev 2 3.7.1
|
|
Identify information system users, processes acting on behalf of users, or devices.
|-
|-
|
|
|'''[[Practice_MA.L2-3.7.2_Details|MA.L2-3.7.2]]'''
'''[[ Practice_IA.L2-3.5.2_Details | IA.L1-b.1.vi ]]'''<br>''Authentication [FCI Data]''
''System Maintenance Control''
 
Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance.
* NIST SP 800-171 Rev 2 3.7.2
|
|
Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.
|-
|| '''Level 2''' || '''Description'''
|-
|-
|
|
|'''[[Practice_MA.L2-3.7.3_Details|MA.L2-3.7.3]]'''
'''[[ Practice_IA.L2-3.5.1_Details | IA.L2-3.5.1 ]]'''<br>''Identification [CUI Data]''
''Equipment Sanitization''
 
Ensure equipment removed for off-site maintenance is sanitized of any CUI.
* NIST SP 800-171 Rev 2 3.7.3
|
|
Identify system users, processes acting on behalf of users, and devices.
|-
|-
|
|
|'''[[Practice_MA.L2-3.7.4_Details|MA.L2-3.7.4]]'''
'''[[ Practice_IA.L2-3.5.2_Details | IA.L2-3.5.2 ]]'''<br>''Authentication [CUI Data]''
''Media Inspection''
 
Check media containing diagnostic and test programs for malicious code before the media are used in organizational systems.
* NIST SP 800-171 Rev 2 3.7.4
|
|
Authenticate (or verify) the identities of users, processes, or devices, as a prerequisite to allowing access to organizational systems.
|-
|-
|
|
|'''[[Practice_MA.L2-3.7.5_Details|MA.L2-3.7.5]]'''
'''[[ Practice_IA.L2-3.5.3_Details | IA.L2-3.5.3 ]]'''<br>''Multifactor Authentication''
''Nonlocal Maintenance''
|
 
Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.
Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete.
|-
* NIST SP 800-171 Rev 2 3.7.5
|
'''[[ Practice_IA.L2-3.5.4_Details | IA.L2-3.5.4 ]]'''<br>''Replay-Resistant Authentication''
|
|
Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.
|-
|-
|
|
|'''[[Practice_MA.L2-3.7.6_Details|MA.L2-3.7.6]]'''
'''[[ Practice_IA.L2-3.5.5_Details | IA.L2-3.5.5 ]]'''<br>''Identifier Reuse''
''Maintenance Personnel''
 
Supervise the maintenance activities of maintenance personnel without required access authorization.
* NIST SP 800-171 Rev 2 3.7.6
|
|
|}
Prevent reuse of identifiers for a defined period.
 
== Media Protection (MP) ==
{|class="wikitable" style="width: 85%;"
! style="width: 33%"| Level 1
! style="width: 33%"| Level 2
! style="width: 33%"| Level 3 (TBD)
|-
|-
|'''[[Practice_MP.L1-3.8.3_Details|MP.L1-3.8.3]]'''
''Media Disposal''
Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse.
* FAR Clause 52.204-21 b.1.vii
* NIST SP 800-171 Rev 2 3.8.3
|'''[[Practice_MP.L2-3.8.1_Details|MP.L2-3.8.1]]'''
''Media Protection''
Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital.
* NIST SP 800-171 Rev 2 3.8.1
|
|
'''[[ Practice_IA.L2-3.5.6_Details | IA.L2-3.5.6 ]]'''<br>''Identifier Handling''
|
Disable identifiers after a defined period of inactivity.
|-
|-
|
|
|'''[[Practice_MP.L2-3.8.2_Details|MP.L2-3.8.2]]'''
'''[[ Practice_IA.L2-3.5.7_Details | IA.L2-3.5.7 ]]'''<br>''Password Complexity''
''Media Access''
 
Limit access to CUI on system media to authorized users.
* NIST SP 800-171 Rev 2 3.8.2
|
|
Enforce a minimum password complexity and change of characters when new passwords are created.
|-
|-
|
|
|'''[[Practice_MP.L2-3.8.4_Details|MP.L2-3.8.4]]'''
'''[[ Practice_IA.L2-3.5.8_Details | IA.L2-3.5.8 ]]'''<br>''Password Reuse''
''Media Markings''
|
 
Prohibit password reuse for a specified number of generations.
Mark media with necessary CUI markings and distribution limitations.
* NIST SP 800-171 Rev 2 3.8.4
|
|-
|-
|
|
|'''[[Practice_MP.L2-3.8.5_Details|MP.L2-3.8.5]]'''
'''[[ Practice_IA.L2-3.5.9_Details | IA.L2-3.5.9 ]]'''<br>''Temporary Passwords''
''Media Accountability''
 
Control access to media containing CUI and maintain accountability for media during transport outside of controlled areas.
* NIST SP 800-171 Rev 2 3.8.5
|
|
Allow temporary password use for system logons with an immediate change to a permanent password.
|-
|-
|
|
|'''[[Practice_MP.L2-3.8.6_Details|MP.L2-3.8.6]]'''
'''[[ Practice_IA.L2-3.5.10_Details | IA.L2-3.5.10 ]]'''<br>''Cryptographically-Protected Passwords''
''Portable Storage Encryption''
 
Implement cryptographic mechanisms to protect the confidentiality of CUI stored on digital media during transport unless otherwise protected by alternative physical safeguards.
* NIST SP 800-171 Rev 2 3.8.6
|
|
Store and transmit only cryptographically protected passwords.
|-
|-
|
|
|'''[[Practice_MP.L2-3.8.7_Details|MP.L2-3.8.7]]'''
'''[[ Practice_IA.L2-3.5.11_Details | IA.L2-3.5.11 ]]'''<br>''Obscure Feedback''
''Removable Media''
 
Control the use of removable media on system components.
* NIST SP 800-171 Rev 2 3.8.7
|
|
Obscure feedback of authentication information.
|-
|| '''Level 3''' || '''Description'''
|-
|-
|
|
|'''[[Practice_MP.L2-3.8.8_Details|MP.L2-3.8.8]]'''
'''[[ Practice_IA.L3-3.5.1e_Details | IA.L3-3.5.1e ]]'''<br>''Bidirectional Authentication''
''Shared Media''
 
Prohibit the use of portable storage devices when such devices have no identifiable owner.
* NIST SP 800-171 Rev 2 3.8.8
|
|
Identify and authenticate <u>systems and system components, where possible</u>, before establishing a network connection using bidirectional authentication that is cryptographically based and replay resistant.
|-
|-
|
|
|'''[[Practice_MP.L2-3.8.9_Details|MP.L2-3.8.9]]'''
'''[[ Practice_IA.L3-3.5.3e_Details | IA.L3-3.5.3e ]]'''<br>''Block Untrusted Assets''
''Protect Backups''
 
Protect the confidentiality of backup CUI at storage locations.
* NIST SP 800-171 Rev 2 3.8.9
|
|
Employ automated or manual/procedural mechanisms to prohibit system components from connecting to organizational systems unless the components are known, authenticated, in a properly configured state, or in a trust profile.
|}
|}


== Personnel Security (PS) ==
==== Incident Response (IR) ====
{|class="wikitable" style="width: 85%;"
{| class="wikitable" style="margin:auto"
! style="width: 33%"| Level 1
|+ '''INCIDENT RESPONSE (IR)'''
! style="width: 33%"| Level 2
|-
! style="width: 33%"| Level 3 (TBD)
! style="width: 25%; text-align:left" | '''Level 2'''
! style="width: 75%; text-align:left" | '''Description'''
|-
|
'''[[ Practice_IR.L2-3.6.1_Details | IR.L2-3.6.1 ]]'''<br>''Incident Handling''
|
Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities.
|-
|-
|
|
|'''[[Practice_PS.L2-3.9.1_Details|PS.L2-3.9.1]]'''
'''[[ Practice_IR.L2-3.6.2_Details | IR.L2-3.6.2 ]]'''<br>''Incident Reporting''
''Screen Individuals''
 
Screen individuals prior to authorizing access to organizational systems containing CUI.
* NIST SP 800-171 Rev 2 3.9.1
|
|
Track, document, and report incidents to designated officials and/or authorities both internal and external to the organization.
|-
|-
|
|
|'''[[Practice_PS.L2-3.9.2_Details|PS.L2-3.9.2]]'''
'''[[ Practice_IR.L2-3.6.3_Details | IR.L2-3.6.3 ]]'''<br>''Incident Response Testing''
''Personnel Actions''
 
Ensure that organizational systems containing CUI are protected during and after personnel actions such as terminations and transfers.
* NIST SP 800-171 Rev 2 3.9.2
|
|
|}
Test the organizational incident response capability.
 
|-
== Physical Protection (PE) ==
|| '''Level 3''' || '''Description'''
{|class="wikitable" style="width: 85%;"
! style="width: 33%"| Level 1
! style="width: 33%"| Level 2
! style="width: 33%"| Level 3 (TBD)
|-
|-
|'''[[Practice_PE.L1-3.10.1_Details|PE.L1-3.10.1]]'''
''Limit Physical Access''
Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.
* FAR Clause 52.204-21 b.1.viii
* NIST SP 800-171 Rev 2 3.10.1
|'''[[Practice_PE.L2-3.10.2_Details|PE.L2-3.10.2]]'''
''Monitor Facility''
Protect and monitor the physical facility and support infrastructure for organizational systems.
* NIST SP 800-171 Rev 2 3.10.2
|
|
'''[[ Practice_IR.L3-3.6.1e_Details | IR.L3-3.6.1e ]]'''<br>''Security Operations Center''
|
Establish and maintain a security operations center capability that operates <u>24/7, with allowance for remote/on-call staff</u>.
|-
|-
|'''[[Practice_PE.L1-3.10.3_Details|PE.L1-3.10.3]]'''
|
''Escort Visitors''
'''[[ Practice_IR.L3-3.6.2e_Details | IR.L3-3.6.2e ]]'''<br>''Cyber Incident Response Team''
|
Establish and maintain a cyber incident response team that can be deployed by the organization within <u>24 hours</u>.
|}


Escort visitors and monitor visitor activity.
==== Maintenance (MA) ====
* FAR Clause 52.204-21 Partial b.1.ix
{| class="wikitable" style="margin:auto"
* NIST SP 800-171 Rev 2 3.10.3
|+ '''MAINTENANCE (MA)'''
|'''[[Practice_PE.L2-3.10.6_Details|PE.L2-3.10.6]]'''
|-
''Alternative Work Sites''
! style="width: 25%;text-align:left" | '''Level 2'''
 
! style="width: 75%;text-align:left" | '''Description'''
Enforce safeguarding measures for CUI at alternate work sites.
* NIST SP 800-171 Rev 2 3.10.6
|
|-
|-
|'''[[Practice_PE.L1-3.10.4_Details|PE.L1-3.10.4]]'''
''Physical Access Logs''
Maintain audit logs of physical access.
* FAR Clause 52.204-21 Partial b.1.ix
* NIST SP 800-171 Rev 2 3.10.4
|
|
'''[[ Practice_MA.L2-3.7.1_Details | MA.L2-3.7.1 ]]'''<br>''Perform Maintenance''
|
|
Perform maintenance on organizational systems.
|-
|-
|'''[[Practice_PE.L1-3.10.5_Details|PE.L1-3.10.5]]'''
''Manage Physical Access''
Control and manage physical access devices.
* FAR Clause 52.204-21 Partial b.1.ix
* NIST SP 800-171 Rev 2 3.10.5
|
|
'''[[ Practice_MA.L2-3.7.2_Details | MA.L2-3.7.2 ]]'''<br>''System Maintenance Control''
|
|
|}
Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance.
 
== Risk Assessment (RA) ==
{|class="wikitable" style="width: 85%;"
! style="width: 33%"| Level 1
! style="width: 33%"| Level 2
! style="width: 33%"| Level 3 (TBD)
|-
|-
|
|
|'''[[Practice_RA.L2-3.11.1_Details|RA.L2-3.11.1]]'''
'''[[ Practice_MA.L2-3.7.3_Details | MA.L2-3.7.3 ]]'''<br>''Equipment Sanitization''
''Risk Assessments''
 
Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI.
* NIST SP 800-171 Rev 2 3.11.1
|
|
Sanitize equipment removed for off-site maintenance of any CUI.
|-
|-
|
|
|'''[[Practice_RA.L2-3.11.2_Details|RA.L2-3.11.2]]'''
'''[[ Practice_MA.L2-3.7.4_Details | MA.L2-3.7.4 ]]'''<br>''Media Inspection''
''Vulnerability Scan''
 
Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified.
* NIST SP 800-171 Rev 2 3.11.2
|
|
Check media containing diagnostic and test programs for malicious code before the media are used in organizational systems.
|-
|-
|
|
|'''[[Practice_RA.L2-3.11.3_Details|RA.L2-3.11.3]]'''
'''[[ Practice_MA.L2-3.7.5_Details | MA.L2-3.7.5 ]]'''<br>''Nonlocal Maintenance''
''Vulnerability Remediation''
|
 
Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete.
Remediate vulnerabilities in accordance with risk assessments.
|-
* NIST SP 800-171 Rev 2 3.11.3
|
'''[[ Practice_MA.L2-3.7.6_Details | MA.L2-3.7.6 ]]'''<br>''Maintenance Personnel''
|
|
Supervise the maintenance activities of maintenance personnel without required access authorization.
|}
|}


== Security Assessment (CA) ==
==== Media Protection (MP) ====
{|class="wikitable" style="width: 85%;"
{| class="wikitable" style="margin:auto"
! style="width: 33%"| Level 1
|+ '''MEDIA PROTECTION (MP)'''
! style="width: 33%"| Level 2
|-
! style="width: 33%"| Level 3 (TBD)
! style="width: 25%;text-align:left" | '''Level 1'''
! style="width: 75%;text-align:left" | '''Description'''
|-
|-
|
|
|'''[[Practice_CA.L2-3.12.1_Details|CA.L2-3.12.1]]'''
'''[[ Practice_MP.L2-3.8.3_Details | MP.L1-b.1.vii ]]'''<br>''Media Disposal [FCI Data]''
''Security Control Assessment''
 
Periodically assess the security controls in organizational systems to determine if the controls are effective in their application.
* NIST SP 800-171 Rev 2 3.12.1
|
|
Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse.
|-
|| '''Level 2''' || '''Description'''
|-
|-
|
|
|'''[[Practice_CA.L2-3.12.2_Details|CA.L2-3.12.2]]'''
'''[[ Practice_MP.L2-3.8.1_Details | MP.L2-3.8.1 ]]'''<br>''Media Protection''
''Plan of Action''
 
Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems.
* NIST SP 800-171 Rev 2 3.12.2
|
|
Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital.
|-
|-
|
|
|'''[[Practice_CA.L2-3.12.3_Details|CA.L2-3.12.3]]'''
'''[[ Practice_MP.L2-3.8.2_Details | MP.L2-3.8.2 ]]'''<br>''Media Access''
''Security Control Monitoring''
 
Monitor security controls on an ongoing basis to ensure the continued effectiveness of the controls.
* NIST SP 800-171 Rev 2 3.12.3
|
|
Limit access to CUI on system media to authorized users.
|-
|-
|
|
|'''[[Practice_CA.L2-3.12.4_Details|CA.L2-3.12.4]]'''
'''[[ Practice_MP.L2-3.8.3_Details | MP.L2-3.8.3 ]]'''<br>''Media Disposal [CUI Data]''
''System Security Plan''
 
Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems.
* NIST SP 800-171 Rev 2 3.12.4
|
|
|}
Sanitize or destroy system media containing CUI before disposal or release for reuse.
 
== System and Communications Protection (SC) ==
{|class="wikitable" style="width: 85%;"
! style="width: 33%"| Level 1
! style="width: 33%"| Level 2
! style="width: 33%"| Level 3 (TBD)
|-
|-
|'''[[Practice_SC.L1-3.13.1_Details|SC.L1-3.13.1]]'''
''Boundary Protection''
Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.
* FAR Clause 52.204-21 b.1.x
* NIST SP 800-171 Rev 2 3.13.1
|'''[[Practice_SC.L2-3.13.2_Details|SC.L2-3.13.2]]'''
''Security Engineering''
Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems.
* NIST SP 800-171 Rev 2 3.13.2
|
|
|-
'''[[ Practice_MP.L2-3.8.4_Details | MP.L2-3.8.4 ]]'''<br>''Media Markings''
|'''[[Practice_SC.L1-3.13.5_Details|SC.L1-3.13.5]]'''
''Public-Access System Separation''
 
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
* FAR Clause 52.204-21 b.1.xi
* NIST SP 800-171 Rev 2 3.13.5
|'''[[Practice_SC.L2-3.13.3_Details|SC.L2-3.13.3]]'''
''Role Separation''
 
Separate user functionality from system management functionality.
* NIST SP 800-171 Rev 2 3.13.3
|
|
Mark media with necessary CUI markings and distribution limitations.
|-
|-
|
|
|'''[[Practice_SC.L2-3.13.4_Details|SC.L2-3.13.4]]'''
'''[[ Practice_MP.L2-3.8.5_Details | MP.L2-3.8.5 ]]'''<br>''Media Accountability''
''Shared Resource Control''
 
Prevent unauthorized and unintended information transfer via shared system resources.
* NIST SP 800-171 Rev 2 3.13.4
|
|
Control access to media containing CUI and maintain accountability for media during transport outside of controlled areas.
|-
|-
|
|
|'''[[Practice_SC.L2-3.13.6_Details|SC.L2-3.13.6]]'''
'''[[ Practice_MP.L2-3.8.6_Details | MP.L2-3.8.6 ]]'''<br>''Portable Storage Encryption''
''Network Communication by Exception''
 
Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
* NIST SP 800-171 Rev 2 3.13.6
|
|
Implement cryptographic mechanisms to protect the confidentiality of CUI stored on digital media during transport unless otherwise protected by alternative physical safeguards.
|-
|-
|
|
|'''[[Practice_SC.L2-3.13.7_Details|SC.L2-3.13.7]]'''
'''[[ Practice_MP.L2-3.8.7_Details | MP.L2-3.8.7 ]]'''<br>''Removable Media''
''Split Tunneling''
 
Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling).
* NIST SP 800-171 Rev 2 3.13.7
|
|
Control the use of removable media on system components.
|-
|-
|
|
|'''[[Practice_SC.L2-3.13.8_Details|SC.L2-3.13.8]]'''
'''[[ Practice_MP.L2-3.8.8_Details | MP.L2-3.8.8 ]]'''<br>''Shared Media''
''Data in Transit''
 
Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards.
* NIST SP 800-171 Rev 2 3.13.8
|
|
Prohibit the use of portable storage devices when such devices have no identifiable owner.
|-
|-
|
|
|'''[[Practice_SC.L2-3.13.9_Details|SC.L2-3.13.9]]'''
'''[[ Practice_MP.L2-3.8.9_Details | MP.L2-3.8.9 ]]'''<br>''Protect Backups''
''Connections Termination''
|
Protect the confidentiality of backup CUI at storage locations.
|}


Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.
==== Personnel Security (PS) ====
* NIST SP 800-171 Rev 2 3.13.9
{| class="wikitable" style="margin:auto"
|
|+ '''PERSONNEL SECURITY (PS)'''
|-
! style="width: 25%;text-align:left" | '''Level 2'''
! style="width: 75%;text-align:left" | '''Description'''
|-
|-
|
|
|'''[[Practice_SC.L2-3.13.10_Details|SC.L2-3.13.10]]'''
'''[[ Practice_PS.L2-3.9.1_Details | PS.L2-3.9.1 ]]'''<br>''Screen Individuals''
''Key Management''
 
Establish and manage cryptographic keys for cryptography employed in organizational systems.
* NIST SP 800-171 Rev 2 3.13.10
|
|
Screen individuals prior to authorizing access to organizational systems containing CUI.
|-
|-
|
|
|'''[[Practice_SC.L2-3.13.11_Details|SC.L2-3.13.11]]'''
'''[[ Practice_PS.L2-3.9.2_Details | PS.L2-3.9.2 ]]'''<br>''Personnel Actions''
''CUI Encryption''
 
Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.
* NIST SP 800-171 Rev 2 3.13.11
|
|
Protect organizational systems containing CUI during and after personnel actions such as terminations and transfers.
|-
|| '''Level 3''' || '''Description'''
|-
|-
|
|
|'''[[Practice_SC.L2-3.13.12_Details|SC.L2-3.13.12]]'''
'''[[ Practice_PS.L3-3.9.2e_Details | PS.L3-3.9.2e ]]'''<br>''Adverse Information''
''Collaborative Device Control''
|
Protect organizational systems when adverse information develops or is obtained about individuals with access to CUI.
|}


Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.
==== Physical Protection (PE) ====
* NIST SP 800-171 Rev 2 3.13.12
{| class="wikitable" style="margin:auto"
|+ '''PHYSICAL PROTECTION (PE)'''
|-
! style="width: 25%;text-align:left" | '''Level 1'''
! style="width: 75%;text-align:left" | '''Description'''
|-
|
'''[[ Practice_PE.L2-3.10.1_Details | PE.L1-b.1.viii ]]'''<br>''Limit Physical Access [FCI Data]''
|
|
Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.
|-
|-
|
|
|'''[[Practice_SC.L2-3.13.13_Details|SC.L2-3.13.13]]'''
'''PE.L1-b.1.ix'''<br>
''Mobile Code''
'''[[ Practice_PE.L2-3.10.3_Details | First Phase ]]'''<br>
 
'''[[ Practice_PE.L2-3.10.4_Details | Second Phase ]]'''<br>
Control and monitor the use of mobile code.
'''[[ Practice_PE.L2-3.10.5_Details | Third Phase ]]'''<br>
* NIST SP 800-171 Rev 2 3.13.13
''Manage Visitors &amp; Physical Access [FCI Data]''
|
|
Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices.
|-
|| '''Level 2''' || '''Description'''
|-
|-
|
|
|'''[[Practice_SC.L2-3.13.14_Details|SC.L2-3.13.14]]'''
'''[[ Practice_PE.L2-3.10.1_Details | PE.L2-3.10.1 ]]'''<br>''Limit Physical Access [CUI Data]''
''Voice over Internet Protocol''
 
Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.
* NIST SP 800-171 Rev 2 3.13.14
|
|
Limit physical access to organizational systems, equipment, and the respective operating environments to authorized individuals.
|-
|-
|
|
|'''[[Practice_SC.L2-3.13.15_Details|SC.L2-3.13.15]]'''
'''[[ Practice_PE.L2-3.10.2_Details | PE.L2-3.10.2 ]]'''<br>''Monitor Facility''
''Communications Authenticity''
 
Protect the authenticity of communications sessions.
* NIST SP 800-171 Rev 2 3.13.15
|
|
Protect and monitor the physical facility and support infrastructure for organizational systems.
|-
|-
|
|
|'''[[Practice_SC.L2-3.13.16_Details|SC.L2-3.13.16]]'''
'''[[ Practice_PE.L2-3.10.3_Details | PE.L2-3.10.3 ]]'''<br>''Escort Visitors [CUI Data]''
''Data at Rest''
 
Protect the confidentiality of CUI at rest.
* NIST SP 800-171 Rev 2 3.13.16
|
|
|}
Escort visitors and monitor visitor activity.
 
|-
== System and Information Integrity (SI) ==
|
{|class="wikitable" style="width: 85%;"
'''[[ Practice_PE.L2-3.10.4_Details | PE.L2-3.10.4 ]]'''<br>''Physical Access Logs [CUI Data]''
! style="width: 33%"| Level 1
|
! style="width: 33%"| Level 2
Maintain audit logs of physical access.
! style="width: 33%"| Level 3 (TBD)
|-
|-
|'''[[Practice_SI.L1-3.14.1_Details|SI.L1-3.14.1]]'''
''Flaw Remediation''
Identify, report, and correct information and information system flaws in a timely manner.
* FAR Clause 52.204-21 b.1.xii
* NIST SP 800-171 Rev 2 3.14.1
|'''[[Practice_SI.L2-3.14.3_Details|SI.L2-3.14.3]]'''
''Security Alerts & Advisories''
Monitor system security alerts and advisories and take action in response.
* NIST SP 800-171 Rev 2 3.14.3
|
|
|-
'''[[ Practice_PE.L2-3.10.5_Details | PE.L2-3.10.5 ]]'''<br>''Manage Physical Access [CUI Data]''
|'''[[Practice_SI.L1-3.14.2_Details|SI.L1-3.14.2]]'''
''Malicious Code Protection''
 
Provide protection from malicious code at appropriate locations within organizational information systems.
* FAR Clause 52.204-21 b.1.xiii
* NIST SP 800-171 Rev 2 3.14.2
|'''[[Practice_SI.L2-3.14.6_Details|SI.L2-3.14.6]]'''
''Monitor Communications for Attacks''
 
Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.
* NIST SP 800-171 Rev 2 3.14.6
|
|
Control and manage physical access devices.
|-
|-
|'''[[Practice_SI.L1-3.14.4_Details|SI.L1-3.14.4]]'''
''Update Malicious Code Protection''
Update malicious code protection mechanisms when new releases are available.
* FAR Clause 52.204-21 b.1.xiv
* NIST SP 800-171 Rev 2 3.14.4
|'''[[Practice_SI.L2-3.14.7_Details|SI.L2-3.14.7]]'''
''Identify Unauthorized Use''
Identify unauthorized use of organizational systems.
* NIST SP 800-171 Rev 2 3.14.7
|
|
|-
'''[[ Practice_PE.L2-3.10.6_Details | PE.L2-3.10.6 ]]'''<br>''Alternative Work Sites''
|'''[[Practice_SI.L1-3.14.5_Details|SI.L1-3.14.5]]'''
''System & File Scanning''
 
Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
* FAR Clause 52.204-21 b.1.xv
* NIST SP 800-171 Rev 2 3.14.5
|
|
Enforce safeguarding measures for CUI at alternate work sites.
|}
|}


==== Risk Assessment (RA) ====
{| class="wikitable" style="margin:auto"
|+ '''RISK ASSESSMENT (RA)'''
|-
! style="width: 25%;text-align:left" | '''Level 2'''
! style="width: 75%;text-align:left" | '''Description'''
|-
|
'''[[ Practice_RA.L2-3.11.1_Details | RA.L2-3.11.1 ]]'''<br>''Risk Assessments''
|
Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI.
|-
|
'''[[ Practice_RA.L2-3.11.2_Details | RA.L2-3.11.2 ]]'''<br>''Vulnerability Scan''
|
Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified.
|-
|
'''[[ Practice_RA.L2-3.11.3_Details | RA.L2-3.11.3 ]]'''<br>''Vulnerability Remediation''
|
Remediate vulnerabilities in accordance with risk assessments.
|-
|| '''Level 3''' || '''Description'''
|-
|
'''[[ Practice_RA.L3-3.11.1e_Details | RA.L3-3.11.1e ]]'''<br>''Threat-Informed Risk Assessment''
|
Employ <u>threat intelligence, at a minimum from open or commercial sources, and any DoD-provided sources</u>, as part of a risk assessment to guide and inform the development of organizational systems, security architectures, selection of security solutions, monitoring, threat hunting, and response and recovery activities.
|-
|
'''[[ Practice_RA.L3-3.11.2e_Details | RA.L3-3.11.2e ]]'''<br>''Threat Hunting''
|
Conduct cyber threat hunting activities <u>on an on-going aperiodic basis or when indications warrant</u>, to search for indicators of compromise in <u>organizational systems</u> and detect, track, and disrupt threats that evade existing controls.
|-
|
'''[[ Practice_RA.L3-3.11.3e_Details | RA.L3-3.11.3e ]]'''<br>''Advanced Risk Identification''
|
Employ advanced automation and analytics capabilities in support of analysts to predict and identify risks to organizations, systems, and system components.
|-
|
'''[[ Practice_RA.L3-3.11.4e_Details | RA.L3-3.11.4e ]]'''<br>''Security Solution Rationale''
|
Document or reference in the system security plan the security solution selected, the rationale for the security solution, and the risk determination.
|-
|
'''[[ Practice_RA.L3-3.11.5e_Details | RA.L3-3.11.5e ]]'''<br>''Security Solution Effectiveness''
|
Assess the effectiveness of security solutions <u>at least annually or upon receipt of relevant cyber threat information, or in response to a relevant cyber incident</u>, to address anticipated risk to organizational systems and the organization based on current and accumulated threat intelligence.
|-
|
'''[[ Practice_RA.L3-3.11.6e_Details | RA.L3-3.11.6e ]]'''<br>''Supply Chain Risk Response''
|
Assess, respond to, and monitor supply chain risks associated with organizational systems and system components.
|-
|
'''[[ Practice_RA.L3-3.11.7e_Details | RA.L3-3.11.7e ]]'''<br>''Supply Chain Risk Plan''
|
Develop a plan for managing supply chain risks associated with organizational systems and system components; update the plan <u>at least annually, and upon receipt of relevant cyber threat information, or in response to a relevant cyber incident</u>.
|}


==== Security Assessment (CA) ====
{| class="wikitable" style="margin:auto"
|+ '''SECURITY ASSESSMENT (CA)'''
|-
! style="width: 25%;text-align:left" | '''Level 2'''
! style="width: 75%;text-align:left" | '''Description'''
|-
|
'''[[ Practice_CA.L2-3.12.1_Details | CA.L2-3.12.1 ]]'''<br>''Security Control Assessment''
|
Periodically assess the security controls in organizational systems to determine if the controls are effective in their application.
|-
|
'''[[ Practice_CA.L2-3.12.2_Details | CA.L2-3.12.2 ]]'''<br>''Operational Plan of Action''
|
Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems.
|-
|
'''[[ Practice_CA.L2-3.12.3_Details | CA.L2-3.12.3 ]]'''<br>''Security Control Monitoring''
|
Monitor security controls on an ongoing basis to determine the continued effectiveness of the controls.
|-
|
'''[[ Practice_CA.L2-3.12.4_Details | CA.L2-3.12.4 ]]'''<br>''System Security Plan''
|
Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems.
|-
|| '''Level 3''' || '''Description'''
|-
|
'''[[ Practice_CA.L3-3.12.1e_Details | CA.L3-3.12.1e ]]'''<br>''Penetration Testing''
|
Conduct penetration testing <u>at least annually or when significant security changes are made to the system</u>, leveraging automated scanning tools and ad hoc tests using subject matter experts.
|}


==== System and Communications Protection (SC) ====
{| class="wikitable" style="margin:auto"
|+ '''SYSTEM AND COMMUNICATIONS PROTECTION (SC)'''
|-
! style="width: 25%;text-align:left" | '''Level 1'''
! style="width: 75%;text-align:left" | '''Description'''
|-
|
'''[[ Practice_SC.L2-3.13.1_Details | SC.L1-b.1.x ]]'''<br>''Boundary Protection [FCI Data]''
|
Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.
|-
|
'''[[ Practice_SC.L2-3.13.5_Details | SC.L1-b.1.xi ]]'''<br>''Public-Access System Separation [FCI Data]''
|
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
|-
|| '''Level 2''' || '''Description'''
|-
|
'''[[ Practice_SC.L2-3.13.1_Details | SC.L2-3.13.1 ]]'''<br>''Boundary Protection [CUI Data]''
|
Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.
|-
|
'''[[ Practice_SC.L2-3.13.2_Details | SC.L2-3.13.2 ]]'''<br>''Security Engineering''
|
Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems.
|-
|
'''[[ Practice_SC.L2-3.13.3_Details | SC.L2-3.13.3 ]]'''<br>''Role Separation''
|
Separate user functionality from system management functionality.
|-
|
'''[[ Practice_SC.L2-3.13.4_Details | SC.L2-3.13.4 ]]'''<br>''Shared Resource Control''
|
Prevent unauthorized and unintended information transfer via shared system resources.
|-
|
'''[[ Practice_SC.L2-3.13.5_Details | SC.L2-3.13.5 ]]'''<br>''Public-Access System Separation [CUI Data]''
|
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
|-
|
'''[[ Practice_SC.L2-3.13.6_Details | SC.L2-3.13.6 ]]'''<br>''Network Communication by Exception''
|
Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
|-
|
'''[[ Practice_SC.L2-3.13.7_Details | SC.L2-3.13.7 ]]'''<br>''Split Tunneling''
|
Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling).
|-
|
'''[[ Practice_SC.L2-3.13.8_Details | SC.L2-3.13.8 ]]'''<br>''Data in Transit''
|
Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards.
|-
|
'''[[ Practice_SC.L2-3.13.9_Details | SC.L2-3.13.9 ]]'''<br>''Connections Termination''
|
Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.
|-
|
'''[[ Practice_SC.L2-3.13.10_Details | SC.L2-3.13.10 ]]'''<br>''Key Management''
|
Establish and manage cryptographic keys for cryptography employed in organizational systems.
|-
|
'''[[ Practice_SC.L2-3.13.11_Details | SC.L2-3.13.11 ]]'''<br>''CUI Encryption''
|
Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.
|-
|
'''[[ Practice_SC.L2-3.13.12_Details | SC.L2-3.13.12 ]]'''<br>''Collaborative Device Control''
|
Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.
|-
|
'''[[ Practice_SC.L2-3.13.13_Details | SC.L2-3.13.13 ]]'''<br>''Mobile Code''
|
Control and monitor the use of mobile code.
|-
|
'''[[ Practice_SC.L2-3.13.14_Details | SC.L2-3.13.14 ]]'''<br>''Voice over Internet Protocol''
|
Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.
|-
|
'''[[ Practice_SC.L2-3.13.15_Details | SC.L2-3.13.15 ]]'''<br>''Communications Authenticity''
|
Protect the authenticity of communications sessions.
|-
|
'''[[ Practice_SC.L2-3.13.16_Details | SC.L2-3.13.16 ]]'''<br>''Data at Rest''
|
Protect the confidentiality of CUI at rest.
|-
|| '''Level 3''' || '''Description'''
|-
|
'''[[ Practice_SC.L3-3.13.4e_Details | SC.L3-3.13.4e ]]'''<br>''Isolation''
|
Employ physical isolation techniques or logical isolation techniques or both in organizational systems and system components.
|}


==== System and Information Integrity (SI) ====
{| class="wikitable" style="margin:auto"
|+ '''SYSTEM AND INFORMATION INTEGRITY (SI)'''
|-
! style="width: 25%;text-align:left" | '''Level 1'''
! style="width: 75%;text-align:left" | '''Description'''
|-
|
'''[[ Practice_SI.L2-3.14.1_Details | SI.L1-b.1.xii ]]'''<br>''Flaw Remediation [FCI Data]''
|
Identify, report, and correct information and information system flaws in a timely manner.
|-
|
'''[[ Practice_SI.L2-3.14.2_Details | SI.L1-b.1.xiii ]]'''<br>''Malicious Code Protection [FCI Data]''
|
Provide protection from malicious code at appropriate locations within organizational information systems.
|-
|
'''[[ Practice_SI.L2-3.14.4_Details | SI.L1-b.1.xiv ]]'''<br>''Update Malicious Code Protection [FCI Data]''
|
Update malicious code protection mechanisms when new releases are available.
|-
|
'''[[ Practice_SI.L2-3.14.5_Details | SI.L1-b.1.xv ]]'''<br>''System & File Scanning [FCI Data]''
|
Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
|-
|| '''Level 2''' || '''Description'''
|-
|
'''[[ Practice_SI.L2-3.14.1_Details | SI.L2-3.14.1 ]]'''<br>''Flaw Remediation [CUI Data]''
|
Identify, report, and correct system flaws in a timely manner.
|-
|
'''[[ Practice_SI.L2-3.14.2_Details | SI.L2-3.14.2 ]]'''<br>''Malicious Code Protection [CUI Data]''
|
Provide protection from malicious code at designated locations within organizational systems.
|-
|
'''[[ Practice_SI.L2-3.14.3_Details | SI.L2-3.14.3 ]]'''<br>''Security Alerts & Advisories''
|
Monitor system security alerts and advisories and take action in response.
|-
|
'''[[ Practice_SI.L2-3.14.4_Details | SI.L2-3.14.4 ]]'''<br>''Update Malicious Code Protection [CUI Data]''
|
Update malicious code protection mechanisms when new releases are available.
|-
|
'''[[ Practice_SI.L2-3.14.5_Details | SI.L2-3.14.5 ]]'''<br>''System &amp; File Scanning [CUI Data]''
|
Perform periodic scans of organizational systems and real-time scans of files from external sources as files are downloaded, opened, or executed.
|-
|
'''[[ Practice_SI.L2-3.14.6_Details | SI.L2-3.14.6 ]]'''<br>''Monitor Communications for Attacks''
|
Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.
|-
|
'''[[ Practice_SI.L2-3.14.7_Details | SI.L2-3.14.7 ]]'''<br>''Identify Unauthorized Use''
|
Identify unauthorized use of organizational systems.
|-
|| '''Level 3''' || '''Description'''
|-
|
'''[[ Practice_SI.L3-3.14.1e_Details | SI.L3-3.14.1e ]]'''<br>''Integrity Verification''
|
Verify the integrity of security critical and essential software using root of trust mechanisms or cryptographic signatures.
|-
|
'''[[ Practice_SI.L3-3.14.3e_Details | SI.L3-3.14.3e ]]'''<br>''Specialized Asset Security''
|
Include specialized assets such as IoT, IIoT, OT, GFE, Restricted Information Systems and test equipment in the scope of the specified enhanced security requirements or are segregated in purpose-specific networks.
|-
|
'''[[ Practice_SI.L3-3.14.6e_Details | SI.L3-3.14.6e ]]'''<br>''Threat-Guided Intrusion Detection''
|
Use threat indicator information and effective mitigations obtained from, at a minimum, open or commercial sources, and any DoD-provided sources, to guide and inform intrusion detection and threat hunting.
|}


== Appendix A. ==
CMMC Model Matrix This appendix presents the model in matrix form by domain. The three columns list the associated security requirements for each CMMC level. Each level is independent and consists of a set of CMMC security requirements:
* Level 1: the ''basic safeguarding requirements'' for FCI specified in FAR Clause 52.204-21.
* Level 2: the ''security requirements'' for CUI specified in NIST SP 800-171 Rev 2 per DFARS Clause 252.204-7012
* Level 3: selected ''enhanced'' ''security requirements'' for CUI specified in NIST SP 800-172 with DoD-approved parameters where applicable.


Each requirement is contained in a single cell. The requirement identification number is bolded at the top of each cell. The next line contains the requirement short name identifier, in ''italics'', which is meant to be used for quick reference only. Below the short name is the complete CMMC security requirement statement. Some Level 3 requirement statements contain a DoD-approved parameter, which is <u>underlined</u>. Finally, the bulleted list at the bottom contains the FAR Clause 52.204-21, NIST SP 800-171 Rev 2, and NIST SP 800-172 reference as appropriate.


Version 2.13 | September 2024
=== Access Control (AC) ===
 
{|class="wikitable" style="margin:auto;"
DoD-CIO-00001 (ZRIN 0790-ZA17)
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
'''Cybersecurity Maturity Model '''
! style="width: 33%"| Level 3
 
|-
'''Certification (CMMC) Model '''
|'''[[Practice_AC.L2-3.1.1_Details|AC.L1-b.1.i]]'''
 
''Authorized Access Control [FCI Data]''<br>
'''Overview '''
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
 
* FAR Clause 52.204-21 b.1.i
24-T-2765
* NIST SP 800-171 Rev 2 3.1.1
 
|'''[[Practice_AC.L2-3.1.1_Details|AC.L2-3.1.1]]'''
 
''Authorized Access Control [CUI Data]''<br>
 
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
 
* NIST SP 800-171 Rev 2 3.1.1
 
* FAR Clause 52.204-21 b.1.i
 
|'''[[Practice_AC.L3-3.1.2e_Details|AC.L3-3.1.2e]]'''
 
''Organizationally Controlled Assets''<br>
 
Restrict access to systems and system components to only those information resources that are owned, provisioned, or issued by the organization.
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
* NIST SP 800-172 3.1.2e
 
|-
ii
|'''[[Practice_AC.L2-3.1.2_Details|AC.L1-b.1.ii]]'''
 
''Transaction & Function Control [FCI Data]''<br>
NOTICES
Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
 
* FAR Clause 52.204-21 b.1.ii
The contents of this document do not have the force and effect of law and are not meant to
* NIST SP 800-171 Rev 2 3.1.2
 
|'''[[Practice_AC.L2-3.1.2_Details|AC.L2-3.1.2]]'''
bind the public in any way. This document is intended only to provide clarity to the public
''Transaction & Function Control [CUI Data]''<br>
 
Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
regarding existing CMMC security requirements under the law or departmental policies.  
* NIST SP 800-171 Rev 2 3.1.2
 
* FAR Clause 52.204-21 b.1.ii
DISTRIBUTION STATEMENT A. Approved for public release. Distribution is unlimited.
|'''[[Practice_AC.L3-3.1.3e_Details|AC.L3-3.1.3e]]'''
 
''Secured Information Transfer''<br>
 
Employ <u>secure information transfer solutions</u> to control information flows between security domains on connected systems.
 
* NIST SP 800-172 3.1.3e
 
|-
 
|'''[[Practice_AC.L2-3.1.20_Details|AC.L1-b.1.iii]]'''
 
''External Connections [FCI Data]''<br>
 
Verify and control/limit connections to and use of external information systems.
 
* FAR Clause 52.204-21 b.1.iii
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
* NIST SP 800-171 Rev 2 3.1.20
 
|'''[[Practice_AC.L2-3.1.3_Details|AC.L2-3.1.3]]'''
iii
''Control CUI Flow [CUI Data]''<br>
 
Control the flow of CUI in accordance with approved authorizations.
TABLE OF CONTENTS
* NIST SP 800-171 Rev 2 3.1.3
 
|
[[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#4|'''1. Introduction ........................................................................................................................ 1''' ]]
|-
 
|'''[[Practice_AC.L2-3.1.22_Details|AC.L1-b.1.iv]]'''
[[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#5|1.1 Document Organization ....................................................................................................... 2 <br />
''Control Public Information [FCI Data]''<br>
1.2 Supporting Documents ........................................................................................................ 2 ]]
Control information posted or processed on publicly accessible information systems.
 
* FAR Clause 52.204-21 b.1.iv
[[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#6|'''2. CMMC Model ...................................................................................................................... 3''' ]]
* NIST SP 800-171 Rev 2 3.1.22
 
|'''[[Practice_AC.L2-3.1.4_Details|AC.L2-3.1.4]]'''
[[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#6|2.1 Overview .............................................................................................................................. 3 <br />
''Separation of Duties''<br>
2.2 CMMC Levels ........................................................................................................................ 3 <br />
Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
]][[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#8|2.3 CMMC Domains ................................................................................................................... 5 <br />
* NIST SP 800-171 Rev 2 3.1.4
]][[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#9|2.4 CMMC Security Requirements ............................................................................................. 6 ]]
|
 
|-
[[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#21|'''Appendix A. CMMC Model Matrix ......................................................................................... 18''' ]]
|
 
|'''[[Practice_AC.L2-3.1.5_Details|AC.L2-3.1.5]]'''
[[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#42|'''Appendix B. Abbreviations and Acronyms ............................................................................. 39''' ]]
''Least Privilege''<br>
 
Employ the principle of least privilege, including for specific security functions and privileged accounts.
[[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#44|'''Appendix C. References ......................................................................................................... 41''' ]]
* NIST SP 800-171 Rev 2 3.1.5
 
|
 
|-
 
|
 
|'''[[Practice_AC.L2-3.1.6_Details|AC.L2-3.1.6]]'''
 
''Non-Privileged Account Use''<br>
 
Use non-privileged accounts or roles when accessing nonsecurity functions.
 
* NIST SP 800-171 Rev 2 3.1.6
 
|
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
|-
 
|
1
|'''[[Practice_AC.L2-3.1.7_Details|AC.L2-3.1.7]]'''
 
''Privileged Functions''<br>
1. Introduction
Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
 
* NIST SP 800-171 Rev 2 3.1.7
The theft of intellectual property and sensitive information from all industrial sectors because
|
 
|-
of malicious cyber activity threatens economic security and national security. The Council of
|
 
|'''[[Practice_AC.L2-3.1.8_Details|AC.L2-3.1.8]]'''
Economic Advisors estimates that malicious cyber activity cost the U.S. economy between $57
''Unsuccessful Logon Attempts''<br>
 
Limit unsuccessful logon attempts.
billion and $109  billion in 2016 [1]. The Center for Strategic and International Studies
* NIST SP 800-171 Rev 2 3.1.8
 
|
estimates that the total global cost of cybercrime was as high as $600 billion in 2017 [2]. Over
|-
 
|
a ten-year period, that burden would equate to an estimated $570 billion to $1.09 trillion
|'''[[Practice_AC.L2-3.1.9_Details|AC.L2-3.1.9]]'''
 
''Privacy & Security Notices''<br>
dollars in costs.
Provide privacy and security notices consistent with applicable CUI rules.
 
* NIST SP 800-171 Rev 2 3.1.9
Malicious cyber actors have targeted  and continue to target the Defense Industrial Base
|
 
|-
(DIB) sector and the Department of Defense (DoD) supply chain. These attacks not only focus
|
 
|'''[[Practice_AC.L2-3.1.10_Details|AC.L2-3.1.10]]'''
on the large prime contractors, but also target subcontractors that make up the lower tiers
''Session Lock''<br>
 
Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
of the DoD supply chain. Many of these subcontractors are small entities that provide critical
* NIST SP 800-171 Rev 2 3.1.10
 
|
support and innovation. Overall, the DIB sector consists of over 220,000 companies[[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#4|1]] that
|-
 
|
process, store, or transmit Controlled Unclassified Information (CUI) or Federal Contract
|'''[[Practice_AC.L2-3.1.11_Details|AC.L2-3.1.11]]'''
 
''Session Termination''<br>
Information (FCI)  in support of  the warfighter and contribute towards the research,
Terminate (automatically) a user session after a defined condition.
 
* NIST SP 800-171 Rev 2 3.1.11
engineering, development, acquisition, production, delivery, sustainment, and operations of
|
 
|-
DoD systems, networks, installations, capabilities, and services. The aggregate loss of
|
 
|'''[[Practice_AC.L2-3.1.12_Details|AC.L2-3.1.12]]'''
intellectual property and controlled unclassified information from the DoD supply chain can
''Control Remote Access''<br>
 
Monitor and control remote access sessions.
undercut U.S. technical advantages and innovation, as well as significantly increase the risk
* NIST SP 800-171 Rev 2 3.1.12
 
|
to national security.
|-
 
|
As part of multiple lines of effort focused on the security and resiliency of the DIB sector, the
|'''[[Practice_AC.L2-3.1.13_Details|AC.L2-3.1.13]]'''
 
''Remote Access Confidentiality''<br>
DoD is working with industry to enforce the safeguarding requirements of the following
Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
 
* NIST SP 800-171 Rev 2 3.1.13
types of unclassified information within the supply chain:
|
 
|-
|
 
|'''[[Practice_AC.L2-3.1.14_Details|AC.L2-3.1.14]]'''
''Federal Contract Information (FCI''): is defined in 32 CFR § 170.4 and 48 CFR 4.1901 [3].
''Remote Access Routing''<br>
 
Route remote access via managed access
control points.
 
* NIST SP 800-171 Rev 2 3.1.14
''Controlled Unclassified Information (CUI):'' is defined in 32 CFR § 2002.4 (h) [4].
|
 
|-
To this end, the Office of the Under Secretary of Defense for Acquisition and Sustainment
|
 
|'''[[Practice_AC.L2-3.1.15_Details|AC.L2-3.1.15]]'''
(OUSD(A&amp;S)) and DoD Chief Information Officer (CIO) have developed the Cybersecurity
''Privileged Remote Access''<br>
 
Authorize remote execution of privileged commands and remote access to security-relevant information.
Maturity Model Certification (CMMC) in concert with DoD stakeholders, University Affiliated
* NIST SP 800-171 Rev 2 3.1.15
 
|
Research Centers (UARCs), Federally Funded Research and Development Centers (FFRDCs),
|-
 
|
and the DIB sector.
|'''[[Practice_AC.L2-3.1.16_Details|AC.L2-3.1.16]]'''
 
''Wireless Access Authorization''<br>
This document focuses on the Cybersecurity Maturity Model Certification (CMMC) Model as
Authorize wireless access prior to allowing
 
such connections.
set forth in section 170.14  of title 32, Code of Federal Regulations  (CFR).  The model
* NIST SP 800-171 Rev 2 3.1.16
 
|
1
|-
 
|
Based on information from the Federal Procurement Data System, the average number of unique prime contractors
|'''[[Practice_AC.L2-3.1.17_Details|AC.L2-3.1.17]]'''
 
''Wireless Access Protection''<br>
is approximately 212,657 and the number of known unique subcontractors is approximately 8,309. (FPDS from
Protect wireless access using authentication and encryption.
 
* NIST SP 800-171 Rev 2 3.1.17
FY18-FY21).
|
 
|-
 
|
 
|'''[[Practice_AC.L2-3.1.18_Details|AC.L2-3.1.18]]'''
 
''Mobile Device Connection''<br>
 
Control connection of mobile devices.
 
* NIST SP 800-171 Rev 2 3.1.18
 
|
 
|-
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
|
 
|'''[[Practice_AC.L2-3.1.19_Details|AC.L2-3.1.19]]'''
2
''Encrypt CUI on Mobile''<br>
 
Encrypt CUI on mobile devices and mobile computing platforms.
incorporates the security requirements from: 1) FAR 52.204-21, ''Basic Safeguarding of Covered <br />
* NIST SP 800-171 Rev 2 3.1.19
Contractor Information Systems'', 2) NIST SP 800-171 Rev 2, ''Protecting Controlled Unclassified <br />
|
Information in Nonfederal Systems and Organizations'', and 3) a subset of the requirements from
|-
 
|
NIST SP 800-172,  ''Enhanced Security Requirements for Protecting Controlled Unclassified <br />
|'''[[Practice_AC.L2-3.1.20_Details|AC.L2-3.1.20]]'''
Information: A Supplement to NIST Special Publication 800-171''.  The CMMC Program is
''External Connections''<br>
 
Verify and control/limit connections to and use of external information systems.
designed to provide increased assurance to the DoD that defense contractors and
* NIST SP 800-171 Rev 2 3.1.20
 
* FAR Clause 52.204-21 b.1.iii
subcontractors are compliant with information protection requirements for FCI and CUI, and
|
 
|-
are protecting such information at a level commensurate with risk from cybersecurity
|
 
|'''[[Practice_AC.L2-3.1.21_Details|AC.L2-3.1.21]]'''
threats, including Advanced Persistent Threats (APTs).
''Portable Storage Use''<br>
 
Limit use of portable storage devices on external systems.
When implementing the CMMC model, an organization can achieve a specific CMMC level for
* NIST SP 800-171 Rev 2 3.1.21
 
|
its entire enterprise network or for  a  particular enclave(s), depending on where the
|-
 
|
information to be protected is handled and stored.
|'''[[Practice_AC.L2-3.1.22_Details|AC.L2-3.1.22]]'''
 
''Control Public Information''<br>
1.1
Control information posted or processed on publicly accessible information systems.
 
* NIST SP 800-171 Rev 2 3.1.22
Document Organization
* FAR Clause 52.204-21 b.1.iv
 
|
Section[[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#6| 2 ]]presents the CMMC Model and each of its elements in detail.[[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#21| Appendix A ]]provides
|}
 
the model as a matrix and maps the CMMC model to other secondary sources[[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#42|. Appendix B ]]
 
lists the abbreviations and acronyms. Finally,[[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#44| Appendix C ]]provides the references contained
 
in this document.
 
1.2
 
Supporting Documents
 
This document is supported by multiple companion  documents  that  provide  additional
 
information.  The  ''CMMC''  ''Assessment Guides''  present assessment objectives, discussion,
 
examples, potential assessment considerations, and key references for each CMMC security
 
requirement. The  ''CMMC Scoping Guides''  provide additional guidance on how to correctly
 
scope an assessment. The ''CMMC Hashing Guide'' provides information on how to create the
 
hash to validate the integrity of archived assessment artifacts.
 
These supplemental documents are intended to provide explanatory information to assist
 
organizations with implementing and assessing the security requirements covered by CMMC
 
in 32 CFR  § 170. The  documents are not prescriptive and their use is optional.
 
Implementation of security requirements by following any examples is not a guarantee of
 
compliance with any CMMC security requirement or objective.
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
3
 
2. CMMC Model
 
2.1 Overview
 
The CMMC Model incorporates the security requirements from: 1) FAR 52.204-21,  ''Basic ''
 
''Safeguarding of Covered Contractor Information Systems'', 2) NIST SP 800-171  Rev 2,
 
''Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations'', and
 
3) a subset of the requirements from NIST SP 800-172, ''Enhanced Security Requirements for''
 
''Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication<br />
800—171.  ''These source documents may be revised in the future, however the CMMC
 
security requirements will remain unchanged until the CMMC final rule is published. Any
 
further modifications to the CMMC rule will follow appropriate rulemaking procedures.
 
The CMMC Model consists of domains that map to the Security Requirement Families defined
 
in NIST SP 800-171 Rev 2.
 
2.2 CMMC Levels
 
There are three levels within CMMC – Level 1, Level 2, and Level 3.
 
2.2.1 Descriptions
 
The CMMC model measures  the implementation of  cybersecurity  requirements at  three
 
levels. Each level is independent and consists of a set of CMMC security requirements as set
 
forth in 32 CFR § 170.14 (c):
 
• Level 1 Requirements. The security requirements in Level 1 are those set forth in FAR
 
clause 52.204-21(b)(1)(i) – (b)(1)(xv).
 
• Level  2 Requirements.  The security requirements in Level  2 are identical to the
 
requirements in NIST SP 800-171 Rev 2.
 
• Level 3 Requirements. The security requirements in Level 3 are derived from NIST SP
 
800-172 with DoD-approved parameters where applicable, as identified in 32 CFR §
 
170.14(c)(4).  DoD defined selections and parameters for the NIST SP 800-172
 
requirements are italicized, where applicable.
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
4
 
2.2.2 CMMC Overview
 
[[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#7|Figure 1 ]]provides an overview of the CMMC Levels.
 
'''Figure 1. CMMC Level Overview '''
 
2.2.3 Level 1
 
Level 1 focuses on the protection of FCI and consists of the security requirements that
 
correspond to the 15 basic safeguarding requirements specified in 48 CFR 52.204-21,
 
commonly referred to as the FAR Clause.
 
2.2.4 Level 2
 
Level 2 focuses on the protection of CUI and incorporates the 110 security requirements
 
specified in NIST SP 800-171 Rev 2.
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
5
 
2.2.5. Level 3
 
Level 3 focuses on the protection of CUI and encompasses a subset of the NIST SP 800-
 
172  security  requirements  [5]  with DoD-approved  parameters.  DoD-approved
 
parameters are denoted with underlining in section 2.4.1 below.
 
2.3 CMMC Domains
 
The CMMC model consists of 14  domains  that align with the families specified in NIST
 
SP 800-171 Rev 2. These domains and their abbreviations are as follows:
 
• Access Control (AC)<br />
• Awareness &amp; Training (AT)<br />
• Audit &amp; Accountability (AU)<br />
• Configuration Management (CM)<br />
• Identification &amp; Authentication (IA)<br />
• Incident Response (IR)<br />
• Maintenance (MA)<br />
• Media Protection (MP)<br />
• Personnel Security (PS)<br />
• Physical Protection (PE)<br />
• Risk Assessment (RA)<br />
• Security Assessment (CA)<br />
• System and Communications Protection (SC)<br />
• System and Information Integrity (SI)
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
6
 
2.4 CMMC Security Requirements
 
2.4.1. List of Security Requirements
 
This subsection itemizes the security requirements for each domain and at each level. Each
 
requirement has a requirement identification number in the format''' '''–''' DD.L#-REQ '''–''' '''where:
 
• DD is the two-letter domain abbreviation;<br />
• L# is the level number; and<br />
• REQ is the FAR Clause 52.204-21 paragraph number, NIST SP 800-171 Rev 2, or NIST SP
 
800-172 security requirement number.
 
Below the identification number, a short name identifier is provided for each requirement,
 
meant to be used for quick reference only. Finally, each requirement  has a complete
 
requirement statement.
 
'''ACCESS CONTROL (AC)'''
 
'''Level 1 '''
 
'''Description '''
 
'''AC.L1-b.1.i '''
 
''Authorized Access Control [FCI Data]''
 
''' '''
 
Limit information system access to authorized users, processes acting on
 
behalf of authorized users, or devices (including other information systems).
 
'''AC.L1-b.1.ii '''
 
''Transaction &amp; Function Control [FCI ''
 
''Data]''
 
''' '''
 
Limit information system access to the types of transactions and functions
 
that authorized users are permitted to execute.
 
'''AC.L1-b.1.iii '''
 
''External Connections [FCI Data]''
 
''' '''
 
Verify and control/limit connections to and use of external information
 
systems.
 
'''AC.L1-b.1.iv '''
 
''Control Public Information [FCI Data]''
 
''' '''
 
Control information posted or processed on publicly accessible information
 
systems.  
 
'''Level 2 '''
 
'''Description '''


'''AC.L2-3.1.1''''' ''
=== Awareness and Training (AT) ===
 
{|class="wikitable" style="margin:auto;"
''Authorized Access Control [CUI Data] ''
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
Limit system access to authorized users, processes acting on behalf of
! style="width: 33%"| Level 3
 
|-
authorized users, and devices (including other systems).
|
 
|'''[[Practice_AT.L2-3.2.1_Details|AT.L2-3.2.1]]'''
''' '''
''Role-Based Risk Awareness''<br>
Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems.
* NIST SP 800-171 Rev 2 3.2.1
|'''[[Practice_AT.L3-3.2.1e_Details|AT.L3-3.2.1e]]'''
''Advanced Threat Awareness''<br>
Provide awareness training <u>upon initial hire, following a significant cyber event, and at least annually</u>, focused on recognizing and responding to threats from social engineering, advanced persistent threat actors, breaches, and suspicious behaviors; update the training <u>at least annually</u> or when there are significant changes to the threat.
* NIST SP 800-172 3.2.1e
|-
|
|'''[[Practice_AT.L2-3.2.2_Details|AT.L2-3.2.2]]'''
''Role-Based Training''<br>
Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities.
* NIST SP 800-171 Rev 2 3.2.2
|'''[[Practice_AT.L3-3.2.2e_Details|AT.L3-3.2.2e]]'''
''Practical Training Exercises''<br>
Include practical exercises in awareness training for <u>all users, tailored by roles, to include general users, users with specialized roles, and privileged users</u>, that are aligned with current threat scenarios and provide feedback to individuals involved in the training and their supervisors.
* NIST SP 800-172 3.2.2e
|-
|
|'''[[Practice_AT.L2-3.2.3_Details|AT.L2-3.2.3]]'''
''Insider Threat Awareness''<br>
Provide security awareness training on recognizing and reporting potential indicators of insider threat.
* NIST SP 800-171 Rev 2 3.2.3
|
|}


'''AC.L2-3.1.2 '''
=== Audit and Accountability (AU) ===
 
{|class="wikitable" style="margin:auto;"
''Transaction &amp; Function Control [CUI ''
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
''Data]''
! style="width: 33%"| Level 3
 
|-
''' '''
|
 
|'''[[Practice_AU.L2-3.3.1_Details|AU.L2-3.3.1]]'''
Limit system access to the types of transactions and functions that
''System Auditing''<br>
 
Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity.
authorized users are permitted to execute.
* NIST SP 800-171 Rev 2 3.3.1
 
|
''' '''
|-
 
|
'''AC.L2-3.1.3 '''
|'''[[Practice_AU.L2-3.3.2_Details|AU.L2-3.3.2]]'''
 
''User Accountability''<br>
''Control CUI Flow''
Ensure that the actions of individual system users can be uniquely traced to those users, so they can be held accountable for their actions.
 
* NIST SP 800-171 Rev 2 3.3.2
''' '''
|
 
|-
Control the flow of CUI in accordance with approved authorizations.  
|
 
|'''[[Practice_AU.L2-3.3.3_Details|AU.L2-3.3.3]]'''
'''AC.L2-3.1.4 '''
''Event Review''<br>
 
Review and update logged events.
''Separation of Duties''
* NIST SP 800-171 Rev 2 3.3.3
 
|
''' '''
|-
 
|
Separate the duties of individuals to reduce the risk of malevolent activity
|'''[[Practice_AU.L2-3.3.4_Details|AU.L2-3.3.4]]'''
 
''Audit Failure Alerting''<br>
without collusion.  
Alert in the event of an audit logging process failure.
 
* NIST SP 800-171 Rev 2 3.3.4
 
|
 
|-
 
|
 
|'''[[Practice_AU.L2-3.3.5_Details|AU.L2-3.3.5]]'''
 
''Audit Correlation''<br>
 
Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.
 
* NIST SP 800-171 Rev 2 3.3.5
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
|
 
|-
7
|
 
|'''[[Practice_AU.L2-3.3.6_Details|AU.L2-3.3.6]]'''
'''AC.L2-3.1.5 '''
''Reduction & Reporting''<br>
Provide audit record reduction and report generation to support on-demand analysis and reporting.
* NIST SP 800-171 Rev 2 3.3.6
|
|-
|
|'''[[Practice_AU.L2-3.3.7_Details|AU.L2-3.3.7]]'''
''Authoritative Time Source''<br>
Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records.
* NIST SP 800-171 Rev 2 3.3.7
|
|-
|
|'''[[Practice_AU.L2-3.3.8_Details|AU.L2-3.3.8]]'''
''Audit Protection''<br>
Protect audit information and audit logging tools from unauthorized access, modification, and deletion.
* NIST SP 800-171 Rev 2 3.3.8
|
|-
|
|'''[[Practice_AU.L2-3.3.9_Details|AU.L2-3.3.9]]'''
''Audit Management''<br>
Limit management of audit logging functionality to a subset of privileged users.
* NIST SP 800-171 Rev 2 3.3.9
|
|}


''Least Privilege''
=== Configuration Management (CM) ===
 
{|class="wikitable" style="margin:auto;"
''' '''
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
Employ the principle of least privilege, including for specific security
! style="width: 33%"| Level 3
 
|-
functions and privileged accounts.  
|
 
|'''[[Practice_CM.L2-3.4.1_Details|CM.L2-3.4.1]]'''
'''AC.L2-3.1.6 '''
''System Baselining''<br>
 
Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles.
''Non-Privileged Account Use''
* NIST SP 800-171 Rev 2 3.4.1
 
|'''[[Practice_CM.L3-3.4.1e_Details|CM.L3-3.4.1e]]'''
''' '''
''Authoritative Repository''
 
Establish and maintain an authoritative source and repository to provide a trusted source and accountability for approved and implemented system components.
Use non-privileged accounts or roles when accessing nonsecurity functions.
* NIST SP 800-172 3.4.1e
 
|-
'''AC.L2-3.1.7 '''
|
 
|'''[[Practice_CM.L2-3.4.2_Details|CM.L2-3.4.2]]'''
''Privileged Functions''
''Security Configuration Enforcement''<br>
 
Establish and enforce security configuration settings for information technology products employed in organizational systems.
''' '''
* NIST SP 800-171 Rev 2 3.4.2
 
|'''[[Practice_CM.L3-3.4.2e_Details|CM.L3-3.4.2e]]'''
Prevent non-privileged users from executing privileged functions and
Automated Detection & Remediation Employ automated mechanisms to detect misconfigured or unauthorized system components; after detection, <u>remove the components or place the components in a quarantine or remediation network</u> to facilitate patching, re-configuration, or other mitigations.
 
* NIST SP 800-172 3.4.2e
capture the execution of such functions in audit logs.
|-
 
|
'''AC.L2-3.1.8 '''
|'''[[Practice_CM.L2-3.4.3_Details|CM.L2-3.4.3]]'''
 
''System Change Management''<br>
''Unsuccessful Logon Attempts''
Track, review, approve or disapprove, and log changes to organizational systems.
 
* NIST SP 800-171 Rev 2 3.4.3
''' '''
|'''[[Practice_CM.L3-3.4.3e_Details|CM.L3-3.4.3e]]'''
 
''Automated Inventory''
Limit unsuccessful logon attempts.  
Employ automated discovery and management tools to maintain an up-to date, complete, accurate, and readily available inventory of system components.
 
* NIST SP 800-172 3.4.3e
'''AC.L2-3.1.9 '''
|-
 
|
''Privacy &amp; Security Notices''
|'''[[Practice_CM.L2-3.4.4_Details|CM.L2-3.4.4]]'''
 
''Security Impact Analysis''<br>
''' '''
Analyze the security impact of changes prior to implementation.
 
* NIST SP 800-171 Rev 2 3.4.4
Provide privacy and security notices consistent with applicable CUI rules.  
|
 
|-
'''AC.L2-3.1.10 '''
|
 
|'''[[Practice_CM.L2-3.4.5_Details|CM.L2-3.4.5]]'''
''Session Lock''
''Access Restrictions for Change''<br>
 
Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems.
''' '''
* NIST SP 800-171 Rev 2 3.4.5
 
|
Use session lock with pattern-hiding displays to prevent access and viewing
|-
 
|
of data after a period of inactivity.
|'''[[Practice_CM.L2-3.4.6_Details|CM.L2-3.4.6]]'''
 
''Least Functionality''<br>
'''AC.L2-3.1.11 '''
Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities.
 
* NIST SP 800-171 Rev 2 3.4.6
''Session Termination''
|
 
|-
''' '''
|
 
|'''[[Practice_CM.L2-3.4.7_Details|CM.L2-3.4.7]]'''
Terminate (automatically) a user session after a defined condition.
''Nonessential Functionality''<br>
 
Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services.
'''AC.L2-3.1.12 '''
* NIST SP 800-171 Rev 2 3.4.7
 
|
''Control Remote Access''
|-
 
|
''' '''
|'''[[Practice_CM.L2-3.4.8_Details|CM.L2-3.4.8]]'''
 
''Application Execution Policy''<br>
Monitor and control remote access sessions.
Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (whitelisting) policy to allow the execution of authorized software.
* NIST SP 800-171 Rev 2 3.4.8
|
|-
|
|'''[[Practice_CM.L2-3.4.9_Details|CM.L2-3.4.9]]'''
''User-Installed Software''<br>
Control and monitor user-installed software.
* NIST SP 800-171 Rev 2 3.4.9
|
|}


'''AC.L2-3.1.13 '''
=== Identification and Authentication (IA) ===
 
{|class="wikitable" style="margin:auto;"
''Remote Access Confidentiality''
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
''' '''
! style="width: 33%"| Level 3
 
|-
Employ cryptographic mechanisms to protect the confidentiality of remote
|'''[[Practice_IA.L2-3.5.1_Details|IA.L1-b.1.v]]'''
 
''Identification [FCI Data]''<br>
access sessions.  
Identify information system users, processes acting on behalf of users, or devices.
 
* FAR Clause 52.204-21 b.1.v
'''AC.L2-3.1.14 '''
* NIST SP 800-171 Rev 2 3.5.1
 
|'''[[Practice_IA.L2-3.5.1_Details|IA.L2-3.5.1]]'''
''Remote Access Routing''
''Identification [CUI Data]''<br>
 
Identify information system users, processes acting on behalf of users, or devices.
''' '''
* NIST SP 800-171 Rev 2 3.5.1
 
* FAR Clause 52.204-21 b.1.v
Route remote access via managed access control points.  
|'''[[Practice_IA.L3-3.5.1e_Details|IA.L3-3.5.1e]]'''
 
''Bidirectional Authentication''<br>
'''AC.L2-3.1.15 '''
Identify and authenticate <u>systems and system components, where possible</u>, before establishing a network connection using bidirectional authentication that is cryptographically based and replay resistant.
 
* NIST SP 800-172 3.5.1e
''Privileged Remote Access''
|-
 
|'''[[Practice_IA.L2-3.5.2_Details|IA.L1-b.1.vi]]'''
''' '''
''Authentication [FCI Data]''<br>
 
Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.
Authorize remote execution of privileged commands and remote access to  
* FAR Clause 52.204-21 b.1.vi
 
* NIST SP 800-171 Rev 2 3.5.2
security-relevant information.  
|'''[[Practice_IA.L2-3.5.2_Details|IA.L2-3.5.2]]'''
 
''Authentication [CUI Data]''<br>
'''AC.L2-3.1.16 '''
Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.
 
* NIST SP 800-171 Rev 2 3.5.2
''Wireless Access Authorization''
* FAR Clause 52.204-21 b.1.vi
 
|'''[[Practice_IA.L3-3.5.3e_Details|IA.L3-3.5.3e]]'''
''' '''
''Block Untrusted Assets''<br>
 
Employ automated or manual/procedural mechanisms to prohibit system components from connecting to organizational systems unless the components are known, authenticated, in a properly configured state, or in a trust profile.
Authorize wireless access prior to allowing such connections.  
* NIST SP 800-172 3.5.3e
 
|-
'''AC.L2-3.1.17 '''
|
 
|'''[[Practice_IA.L2-3.5.3_Details|IA.L2-3.5.3]]'''
''Wireless Access Protection''
''Multifactor Authentication''<br>
 
Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.
''' '''
* NIST SP 800-171 Rev 2 3.5.3
 
|
Protect wireless access using authentication and encryption.
|-
 
|
'''AC.L2-3.1.18 '''
|'''[[Practice_IA.L2-3.5.4_Details|IA.L2-3.5.4]]'''
 
''Replay-Resistant Authentication''<br>
''Mobile Device Connection''
Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.
 
* NIST SP 800-171 Rev 2 3.5.4
''' '''
|
 
|-
Control connection of mobile devices.  
|
 
|'''[[Practice_IA.L2-3.5.5_Details|IA.L2-3.5.5]]'''
'''AC.L2-3.1.19 '''
''Identifier Reuse''<br>
 
Prevent reuse of identifiers for a defined period.
''Encrypt CUI on Mobile''
* NIST SP 800-171 Rev 2 3.5.5
 
|
''' '''
|-
 
|
Encrypt CUI on mobile devices and mobile computing platforms.
|'''[[Practice_IA.L2-3.5.6_Details|IA.L2-3.5.6]]'''
 
''Identifier Handling''<br>
'''AC.L2-3.1.20 '''
Disable identifiers after a defined period of inactivity.
 
* NIST SP 800-171 Rev 2 3.5.6
''External Connections [CUI Data]''
|
 
|-
''' '''
|
 
|'''[[Practice_IA.L2-3.5.7_Details|IA.L2-3.5.7]]'''
Verify and control/limit connections to and use of external systems.
''Password Complexity''<br>
 
Enforce a minimum password complexity and change of characters when new passwords are created.
'''AC.L2-3.1.21 '''
* NIST SP 800-171 Rev 2 3.5.7
 
|
''Portable Storage Use''
|-
 
|
''' '''
|'''[[Practice_IA.L2-3.5.8_Details|IA.L2-3.5.8]]'''
 
''Password Reuse''<br>
Limit use of portable storage devices on external systems.
Prohibit password reuse for a specified number of generations.
 
* NIST SP 800-171 Rev 2 3.5.8
'''AC.L2-3.1.22''''' ''
|
 
|-
''Control Public Information [CUI Data] ''
|
 
|'''[[Practice_IA.L2-3.5.9_Details|IA.L2-3.5.9]]'''
Control CUI posted or processed on publicly accessible systems.  
''Temporary Passwords''<br>
 
Allow temporary password use for system logons with an immediate change to a permanent password.
 
* NIST SP 800-171 Rev 2 3.5.9
 
|
 
|-
 
|
 
|'''[[Practice_IA.L2-3.5.10_Details|IA.L2-3.5.10]]'''
 
''Cryptographically-Protected Passwords''
 
Store and transmit only cryptographically protected passwords.
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
* NIST SP 800-171 Rev 2 3.5.10
 
|
8
|-
 
|
'''Level 3 '''
|'''[[Practice_IA.L2-3.5.11_Details|IA.L2-3.5.11]]'''
 
''Obscure Feedback''<br>
'''Description '''
Obscure feedback of authentication information.
 
* NIST SP 800-171 Rev 2 3.5.11
'''AC.L3-3.1.2e '''
|
|}


''Organizationally Controlled Assets''
=== Incident Response (IR) ===
 
{|class="wikitable" style="margin:auto;"
''' '''
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
Restrict access to systems and system components to only those
! style="width: 33%"| Level 3
 
|-
information resources that are owned, provisioned, or issued by the  
|
 
|'''[[Practice_IR.L2-3.6.1_Details|IR.L2-3.6.1]]'''
organization.  
''Incident Handling''<br>
 
Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities.
'''AC.L3-3.1.3e '''
* NIST SP 800-171 Rev 2 3.6.1
 
|'''[[Practice_IR.L3-3.6.1e_Details|IR.L3-3.6.1e]]'''
''Secured Information Transfer''
''Security Operations Center''<br>
Establish and maintain a security operations center capability that operates <u>24/7, with allowance for remote/on-call staff</u>.
* NIST SP 800-172 3.6.1e
|-
|
|'''[[Practice_IR.L2-3.6.2_Details|IR.L2-3.6.2]]'''
''Incident Reporting''<br>
Track, document, and report incidents to designated officials and/or authorities both internal and external to the organization.
* NIST SP 800-171 Rev 2 3.6.2
|'''[[Practice_IR.L3-3.6.2e_Details|IR.L3-3.6.2e]]'''
''Cyber Incident Response Team''<br>
Establish and maintain a cyber incident response team that can be deployed by the organization within <u>24 hours</u>.
* NIST SP 800-172 3.6.2e
|-
|
|'''[[Practice_IR.L2-3.6.3_Details|IR.L2-3.6.3]]'''
''Incident Response Testing''<br>
Test the organizational incident response capability.
* NIST SP 800-171 Rev 2 3.6.3
|
|}


''' '''
=== Maintenance (MA) ===
 
{|class="wikitable" style="margin:auto;"
Employ  secure information transfer solutions  to control information
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
flows between security domains on connected systems.  
! style="width: 33%"| Level 3
 
|-
'''AWARENESS AND TRAINING (AT)'''  
|
 
|'''[[Practice_MA.L2-3.7.1_Details|MA.L2-3.7.1]]'''
'''Level 2 '''
''Perform Maintenance''<br>
 
Perform maintenance on organizational systems.
'''Description '''
* NIST SP 800-171 Rev 2 3.7.1
 
|
'''AT.L2-3.2.1 '''
|-
 
|
''Role-Based Risk Awareness''  
|'''[[Practice_MA.L2-3.7.2_Details|MA.L2-3.7.2]]'''
 
''System Maintenance Control''<br>
Inform  managers, systems  administrators, and users of organizational
Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance.
 
* NIST SP 800-171 Rev 2 3.7.2
systems of the security risks associated with their activities and of the
|
 
|-
applicable policies, standards, and procedures related to the security of
|
|'''[[Practice_MA.L2-3.7.3_Details|MA.L2-3.7.3]]'''
''Equipment Sanitization''<br>
Ensure equipment removed for off-site maintenance is sanitized of any CUI.
* NIST SP 800-171 Rev 2 3.7.3
|
|-
|
|'''[[Practice_MA.L2-3.7.4_Details|MA.L2-3.7.4]]'''
''Media Inspection''<br>
Check media containing diagnostic and test programs for malicious code before the media are used in organizational systems.
* NIST SP 800-171 Rev 2 3.7.4
|
|-
|
|'''[[Practice_MA.L2-3.7.5_Details|MA.L2-3.7.5]]'''
''Nonlocal Maintenance''<br>
Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete.
* NIST SP 800-171 Rev 2 3.7.5
|
|-
|
|'''[[Practice_MA.L2-3.7.6_Details|MA.L2-3.7.6]]'''
''Maintenance Personnel''<br>
Supervise the maintenance activities of maintenance personnel without required access authorization.
* NIST SP 800-171 Rev 2 3.7.6
|
|}


those systems.
=== Media Protection (MP) ===
 
{|class="wikitable" style="margin:auto;"
'''AT.L2-3.2.2 '''
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
''Role-Based Training''  
! style="width: 33%"| Level 3
 
|-
Train  personnel  to carry out their assigned information security-related
|'''[[Practice_MP.L2-3.8.3_Details|MP.L1-b.1.vii]]'''
 
''Media Disposal [FCI Data]''<br>
duties and responsibilities.  
Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse.
 
* FAR Clause 52.204-21 b.1.vii
'''AT.L2-3.2.3 '''
* NIST SP 800-171 Rev 2 3.8.3
 
|'''[[Practice_MP.L2-3.8.1_Details|MP.L2-3.8.1]]'''
''Insider Threat Awareness''
''Media Protection''<br>
 
Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital.
''' '''
* NIST SP 800-171 Rev 2 3.8.1
 
|
Provide security awareness training on recognizing and reporting potential
|-
 
|
indicators of insider threat.
|'''[[Practice_MP.L2-3.8.2_Details|MP.L2-3.8.2]]'''
 
''Media Access''<br>
'''Level 3 '''
Limit access to CUI on system media to authorized users.
 
* NIST SP 800-171 Rev 2 3.8.2
'''Description '''
|
 
|-
'''AT.L3-3.2.1e '''
|
 
|'''[[Practice_MP.L2-3.8.3_Details|MP.L2-3.8.3]]'''
''Advanced Threat Awareness''
''Media Disposal [CUI Data]''<br>
 
Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse.
''' '''
* NIST SP 800-171 Rev 2 3.8.3
 
* FAR Clause 52.204-21 b.1.vii
Provide awareness training upon initial hire, following a significant cyber
|
 
|-
event, and at least annually, focused on recognizing and responding to
|
 
|'''[[Practice_MP.L2-3.8.4_Details|MP.L2-3.8.4]]'''
threats from social engineering, advanced persistent threat actors,
''Media Markings''<br>
 
Mark media with necessary CUI markings and distribution limitations.
breaches, and suspicious behaviors; update the training at least annually or
* NIST SP 800-171 Rev 2 3.8.4
 
|
when there are significant changes to the threat.
|-
 
|
'''AT.L3-3.2.2e '''
|'''[[Practice_MP.L2-3.8.5_Details|MP.L2-3.8.5]]'''
 
''Media Accountability''<br>
''Practical Training Exercises''
Control access to media containing CUI and maintain accountability for media during transport outside of controlled areas.
 
* NIST SP 800-171 Rev 2 3.8.5
''' '''
|
 
|-
Include practical exercises in awareness training for all users, tailored by
|
 
|'''[[Practice_MP.L2-3.8.6_Details|MP.L2-3.8.6]]'''
roles, to include general users, users with specialized roles, and privileged
''Portable Storage Encryption''<br>
 
Implement cryptographic mechanisms to protect the confidentiality of CUI stored on digital media during transport unless otherwise protected by alternative physical safeguards.
users, that are aligned with current threat scenarios and provide feedback
* NIST SP 800-171 Rev 2 3.8.6
 
|
to individuals involved in the training and their supervisors.
|-
 
|
'''AUDIT AND ACCOUNTABILITY (AU)'''  
|'''[[Practice_MP.L2-3.8.7_Details|MP.L2-3.8.7]]'''
 
''Removable Media''<br>
'''Level 2 '''
Control the use of removable media on system components.
 
* NIST SP 800-171 Rev 2 3.8.7
'''Description '''
|
 
|-
'''AU.L2-3.3.1 '''
|
 
|'''[[Practice_MP.L2-3.8.8_Details|MP.L2-3.8.8]]'''
''System Auditing''
''Shared Media''<br>
 
Prohibit the use of portable storage devices when such devices have no identifiable owner.
''' '''
* NIST SP 800-171 Rev 2 3.8.8
 
|
Create and retain system audit logs and records to the extent needed to
|-
|
|'''[[Practice_MP.L2-3.8.9_Details|MP.L2-3.8.9]]'''
''Protect Backups''<br>
Protect the confidentiality of backup CUI at storage locations.
* NIST SP 800-171 Rev 2 3.8.9
|
|}


enable the monitoring, analysis, investigation, and reporting of unlawful or  
=== Personnel Security (PS) ===
 
{|class="wikitable" style="margin:auto;"
unauthorized system activity.
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
'''AU.L2-3.3.2 '''
! style="width: 33%"| Level 3
 
|-
''User Accountability''
|
|'''[[Practice_PS.L2-3.9.1_Details|PS.L2-3.9.1]]'''
''Screen Individuals''<br>
Screen individuals prior to authorizing access to organizational systems containing CUI.
* NIST SP 800-171 Rev 2 3.9.1
|'''[[Practice_PS.L3-3.9.2e_Details|PS.L3-3.9.2e]]'''
''Adverse Information''<br>
Protect organizational systems when adverse information develops or is obtained about individuals with access to CUI.
* NIST SP 800-172 3.9.2e
|-
|
|'''[[Practice_PS.L2-3.9.2_Details|PS.L2-3.9.2]]'''
''Personnel Actions''<br>
Ensure that organizational systems containing CUI are protected during and after personnel actions such as terminations and transfers.
* NIST SP 800-171 Rev 2 3.9.2
|
|}


''' '''
=== Physical Protection (PE) ===
 
{|class="wikitable" style="margin:auto;"
Uniquely trace the actions of individual system users, so they can be held
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
accountable for their actions.  
! style="width: 33%"| Level 3
 
|-
'''AU.L2-3.3.3 '''
|'''[[Practice_PE.L2-3.10.1_Details|PE.L1-b.1.viii]]'''
 
''Limit Physical Access [FCI Data]''<br>
''Event Review''
Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.
 
* FAR Clause 52.204-21 b.1.viii
''' '''
* NIST SP 800-171 Rev 2 3.10.1
 
|'''[[Practice_PE.L2-3.10.1_Details|PE.L2-3.10.1]]'''
Review and update logged events.  
''Limit Physical Access [CUI Data]''<br>
 
Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.
 
* NIST SP 800-171 Rev 2 3.10.1
 
* FAR Clause 52.204-21 b.1.viii
 
|
 
|-
 
|'''PE.L1-b.1.ix'''
 
'''[[Practice_PE.L2-3.10.3_Details|First Phase]]'''<br>
 
'''[[Practice_PE.L2-3.10.4_Details|Second Phase]]'''<br>
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
'''[[Practice_PE.L2-3.10.5_Details|Third Phase]]'''<br>
 
''Manage Visitors & Physical Access [FCI Data]''<br>
9
Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices.
 
* FAR Clause 52.204-21 Partial b.1.ix
'''AU.L2-3.3.4 '''
* NIST SP 800-171 Rev 2 3.10.3
 
* NIST SP 800-171 Rev 2 3.10.4
''Audit Failure Alerting''
* NIST SP 800-171 Rev 2 3.10.5
 
|'''[[Practice_PE.L2-3.10.2_Details|PE.L2-3.10.2]]'''
''' '''
''Monitor Facility''<br>
 
Protect and monitor the physical facility and support infrastructure for organizational systems.
Alert in the event of an audit logging process failure.  
* NIST SP 800-171 Rev 2 3.10.2
 
|
'''AU.L2-3.3.5 '''
|-
 
|
''Audit Correlation''
|'''[[Practice_PE.L2-3.10.3_Details|PE.L2-3.10.3]]'''
 
''Escort Visitors''<br>
''' '''
Escort visitors and monitor visitor activity.
 
* FAR Clause 52.204-21 Partial b.1.ix
Correlate audit record  review, analysis, and reporting processes for
* NIST SP 800-171 Rev 2 3.10.3
 
|
investigation and response to indications of unlawful, unauthorized,
|-
 
|
suspicious, or unusual activity.
|'''[[Practice_PE.L2-3.10.4_Details|PE.L2-3.10.4]]'''
 
''Physical Access Logs''<br>
'''AU.L2-3.3.6 '''
Maintain audit logs of physical access.
 
* FAR Clause 52.204-21 Partial b.1.ix
''Reduction &amp; Reporting''
* NIST SP 800-171 Rev 2 3.10.4
|
|-
|
|'''[[Practice_PE.L2-3.10.5_Details|PE.L2-3.10.5]]'''
''Manage Physical Access''<br>
Control and manage physical access devices.
* FAR Clause 52.204-21 Partial b.1.ix
* NIST SP 800-171 Rev 2 3.10.5
|
|-
|
|'''[[Practice_PE.L2-3.10.6_Details|PE.L2-3.10.6]]'''
''Alternative Work Sites''<br>
Enforce safeguarding measures for CUI at alternate work sites.
* NIST SP 800-171 Rev 2 3.10.6
|
|}


''' '''
=== Risk Assessment (RA) ===
 
{|class="wikitable" style="margin:auto;"
Provide audit record reduction and report generation to support on-demand
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
analysis and reporting.  
! style="width: 33%"| Level 3
 
|-
'''AU.L2-3.3.7 '''
|
 
|'''[[Practice_RA.L2-3.11.1_Details|RA.L2-3.11.1]]'''
''Authoritative Time Source''
''Risk Assessments''<br>
 
Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI.
''' '''
* NIST SP 800-171 Rev 2 3.11.1
 
|'''[[Practice_RA.L3-3.11.1e_Details|RA.L3-3.11.1e]]'''
Provide a system capability that compares and synchronizes internal system  
''Threat-Informed Risk Assessment''<br>
 
Employ <u>threat intelligence, at a minimum from open or commercial sources</u>, and any DoD-provided sources, as part of a risk assessment to guide and inform the development of organizational systems, security architectures, selection of security solutions, monitoring, threat hunting, and response and recovery activities.
clocks with an authoritative source to generate time stamps for audit
* NIST SP 800-172 3.11.1e
|-
|
|'''[[Practice_RA.L2-3.11.2_Details|RA.L2-3.11.2]]'''
''Vulnerability Scan''<br>
Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified.
* NIST SP 800-171 Rev 2 3.11.2
|'''[[Practice_RA.L3-3.11.2e_Details|RA.L3-3.11.2e]]'''
''Threat Hunting''<br>
Conduct cyber threat hunting activities <u>on an on-going aperiodic basis or when indications warrant</u>, to search for indicators of compromise in <u>organizational systems</u> and detect, track, and disrupt threats that evade existing controls.
* NIST SP 800-172 3.11.2e
|-
|
|'''[[Practice_RA.L2-3.11.3_Details|RA.L2-3.11.3]]'''
''Vulnerability Remediation''<br>
Remediate vulnerabilities in accordance with risk assessments.
* NIST SP 800-171 Rev 2 3.11.3
|'''[[Practice_RA.L3-3.11.3e_Details|RA.L3-3.11.3e]]'''
''Advanced Risk Identification''<br>
Employ advanced automation and analytics capabilities in support of analysts to predict and identify risks to organizations, systems, and system components.
* NIST SP 800-172 3.11.3e
|-
|
|
|'''[[Practice_RA.L3-3.11.4e_Details|RA.L3-3.11.4e]]'''
''Security Solution Rationale''<br>
Document or reference in the system security plan the security solution selected, the rationale for the security solution, and the risk determination.
* NIST SP 800-172 3.11.4e
|-
|
|
|'''[[Practice_RA.L3-3.11.5e_Details|RA.L3-3.11.5e]]'''
''Security Solution Effectiveness''<br>
Assess the effectiveness of security solutions <u>at least annually or upon receipt of relevant cyber threat information, or in response to a relevant cyber incident</u>, to address anticipated risk to organizational systems and the organization based on current and accumulated threat intelligence.
* NIST SP 800-172 3.11.5e
|-
|
|
|'''[[Practice_RA.L3-3.11.6e_Details|RA.L3-3.11.6e]]'''
''Supply Chain Risk Response''<br>
Assess, respond to, and monitor supply chain risks associated with organizational systems and system components.
* NIST SP 800-172 3.11.6e
|-
|
|
|'''[[Practice_RA.L3-3.11.7e_Details|RA.L3-3.11.7e]]'''
''Supply Chain Risk Plan''<br>
Develop a plan for managing supply chain risks associated with organizational systems and system components; update the plan <u>at least annually, and upon receipt of relevant cyber threat information, or in response to a relevant cyber incident</u>.
* NIST SP 800-172 3.11.7e
|}


records.  
=== Security Assessment (CA) ===
 
{|class="wikitable" style="margin:auto;"
'''AU.L2-3.3.8 '''
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
''Audit Protection''
! style="width: 33%"| Level 3
 
|-
''' '''
|
 
|'''[[Practice_CA.L2-3.12.1_Details|CA.L2-3.12.1]]'''
Protect audit information and audit logging tools from unauthorized access,  
''Security Control Assessment''<br>
 
Periodically assess the security controls in organizational systems to determine if the controls are effective in their application.
modification, and deletion.  
* NIST SP 800-171 Rev 2 3.12.1
|'''[[Practice_CA.L3-3.12.1e_Details|CA.L3-3.12.1e]]'''
''Penetration Testing''<br>
Conduct penetration testing <u>at least annually or when significant security changes are made to the system</u>, leveraging automated scanning tools and ad hoc tests using subject matter experts.
* NIST SP 800-172 3.12.1e
|-
|
|'''[[Practice_CA.L2-3.12.2_Details|CA.L2-3.12.2]]'''
''Plan of Action''<br>
Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems.
* NIST SP 800-171 Rev 2 3.12.2
|
|-
|
|'''[[Practice_CA.L2-3.12.3_Details|CA.L2-3.12.3]]'''
''Security Control Monitoring''<br>
Monitor security controls on an ongoing basis to ensure the continued effectiveness of the controls.
* NIST SP 800-171 Rev 2 3.12.3
|
|-
|
|'''[[Practice_CA.L2-3.12.4_Details|CA.L2-3.12.4]]'''
''System Security Plan''<br>
Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems.
* NIST SP 800-171 Rev 2 3.12.4
|
|}


'''AU.L2-3.3.9'''  
=== System and Communications Protection (SC) ===
 
{|class="wikitable" style="margin:auto;"
''Audit Management''  
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
Limit management of audit logging functionality to a subset of privileged
! style="width: 33%"| Level 3
 
|-
users.  
|'''[[Practice_SC.L2-3.13.1_Details|SC.L1-b.1.x]]'''
 
''Boundary Protection [FCI Data]''<br>
'''CONFIGURATION MANAGEMENT (CM)'''  
Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.
 
* FAR Clause 52.204-21 b.1.x
'''Level 2 '''
* NIST SP 800-171 Rev 2 3.13.1
 
|'''[[Practice_SC.L2-3.13.1_Details|SC.L2-3.13.1]]'''
'''Description '''
''Boundary Protection [CUI Data]''<br>
 
Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.
'''CM.L2-3.4.1'''
* NIST SP 800-171 Rev 2 3.13.1
 
* FAR Clause 52.204-21 b.1.x
''System Baselining''
|'''[[Practice_SC.L3-3.13.4e_Details|SC.L3-3.13.4e]]'''
 
''Isolation''<br>
Establish and maintain baseline configurations and inventories of
Employ <u>physical isolation techniques or logical isolation techniques or both</u> in organizational systems and system components.
 
* NIST SP 800-172 3.13.4e
organizational systems (including hardware, software, firmware, and
|-
 
|'''[[Practice_SC.L2-3.13.5_Details|SC.L1-b.1.xi]]'''
documentation) throughout the respective system development life cycles.  
''Public-Access System Separation [FCI Data]''<br>
 
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
'''CM.L2-3.4.2'''
* FAR Clause 52.204-21 b.1.xi
 
* NIST SP 800-171 Rev 2 3.13.5
''Security Configuration Enforcement''
|'''[[Practice_SC.L2-3.13.2_Details|SC.L2-3.13.2]]'''
 
''Security Engineering''<br>
Establish and enforce security configuration settings for information
Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems.
 
* NIST SP 800-171 Rev 2 3.13.2
technology products employed in organizational systems.  
|
 
|-
'''CM.L2-3.4.3'''
|
 
|'''[[Practice_SC.L2-3.13.3_Details|SC.L2-3.13.3]]'''
''System Change Management''
''Role Separation''<br>
 
Separate user functionality from system management functionality.
Track, review, approve or disapprove, and log changes to organizational
* NIST SP 800-171 Rev 2 3.13.3
 
|
systems.
|-
 
|
'''CM.L2-3.4.4'''
|'''[[Practice_SC.L2-3.13.4_Details|SC.L2-3.13.4]]'''
 
''Shared Resource Control''<br>
''Security Impact Analysis''
Prevent unauthorized and unintended information transfer via shared system resources.
 
* NIST SP 800-171 Rev 2 3.13.4
Analyze the security impact of changes prior to implementation.  
|
 
|-
'''CM.L2-3.4.5'''
|
 
|'''[[Practice_SC.L2-3.13.5_Details|SC.L2-3.13.5]]'''
''Access Restrictions for Change''
''Public-Access System Separation [CUI Data]''<br>
 
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
Define, document, approve, and enforce physical and logical access
* NIST SP 800-171 Rev 2 3.13.5
 
* FAR Clause 52.204-21 b.1.xi
restrictions associated with changes to organizational systems.
|
 
|-
'''CM.L2-3.4.6'''
|
 
|'''[[Practice_SC.L2-3.13.6_Details|SC.L2-3.13.6]]'''
''Least Functionality''
''Network Communication by Exception''<br>
 
Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
Employ the principle of least functionality by configuring organizational
* NIST SP 800-171 Rev 2 3.13.6
 
|
systems to provide only essential capabilities.
|-
 
|
'''CM.L2-3.4.7'''
|'''[[Practice_SC.L2-3.13.7_Details|SC.L2-3.13.7]]'''
 
''Split Tunneling''<br>
''Nonessential Functionality''
Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling).
 
* NIST SP 800-171 Rev 2 3.13.7
Restrict, disable, or prevent the use of nonessential programs, functions,
|
 
|-
ports, protocols, and services.
|
 
|'''[[Practice_SC.L2-3.13.8_Details|SC.L2-3.13.8]]'''
'''CM.L2-3.4.8'''
''Data in Transit''<br>
 
Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards.
''Application Execution Policy''
* NIST SP 800-171 Rev 2 3.13.8
 
|
Apply deny-by-exception (blacklisting) policy to prevent the use of  
|-
 
|
unauthorized software or deny-all, permit-by-exception (whitelisting) policy
|'''[[Practice_SC.L2-3.13.9_Details|SC.L2-3.13.9]]'''
 
''Connections Termination''<br>
to allow the execution of authorized software.  
Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.
 
* NIST SP 800-171 Rev 2 3.13.9
'''CM.L2-3.4.9'''
|
 
|-
''User-Installed Software''
|
 
|'''[[Practice_SC.L2-3.13.10_Details|SC.L2-3.13.10]]'''
Control and monitor user-installed software.  
''Key Management''<br>
 
Establish and manage cryptographic keys for cryptography employed in organizational systems.
 
* NIST SP 800-171 Rev 2 3.13.10
 
|
 
|-
 
|
 
|'''[[Practice_SC.L2-3.13.11_Details|SC.L2-3.13.11]]'''
 
''CUI Encryption''<br>
 
Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13  
* NIST SP 800-171 Rev 2 3.13.11
 
|
10
|-
 
|
'''Level 3 '''
|'''[[Practice_SC.L2-3.13.12_Details|SC.L2-3.13.12]]'''
 
''Collaborative Device Control''<br>
'''Description '''
Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.
 
* NIST SP 800-171 Rev 2 3.13.12
'''CM.L3-3.4.1e'''
|
 
|-
''Authoritative Repository''
|
 
|'''[[Practice_SC.L2-3.13.13_Details|SC.L2-3.13.13]]'''
Establish and maintain an authoritative source and repository to provide a
''Mobile Code''<br>
 
Control and monitor the use of mobile code.
trusted source and accountability for approved and implemented system
* NIST SP 800-171 Rev 2 3.13.13
 
|
components.
|-
 
|
'''CM.L3-3.4.2e'''
|'''[[Practice_SC.L2-3.13.14_Details|SC.L2-3.13.14]]'''
 
''Voice over Internet Protocol''<br>
''Automated Detection &amp; Remediation''
Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.
 
* NIST SP 800-171 Rev 2 3.13.14
Employ automated mechanisms to detect misconfigured or unauthorized
|
 
|-
system components; after detection, remove the components or place the
|
 
|'''[[Practice_SC.L2-3.13.15_Details|SC.L2-3.13.15]]'''
components in a quarantine or remediation network to facilitate patching,
''Communications Authenticity''<br>
 
Protect the authenticity of communications sessions.
re-configuration, or other mitigations.  
* NIST SP 800-171 Rev 2 3.13.15
 
|
'''CM.L3-3.4.3e'''
|-
 
|
''Automated Inventory''
|'''[[Practice_SC.L2-3.13.16_Details|SC.L2-3.13.16]]'''
 
''Data at Rest''<br>
Employ automated discovery and management tools to maintain an up-to-
Protect the confidentiality of CUI at rest.
* NIST SP 800-171 Rev 2 3.13.16
|
|}


date, complete, accurate, and readily available inventory of system
=== System and Information Integrity (SI) ===
 
{|class="wikitable" style="margin:auto;"
components.
! style="width: 33%"| Level 1
 
! style="width: 33%"| Level 2
'''IDENTIFICATION AND AUTHENTICATION (IA)'''
! style="width: 33%"| Level 3
 
|-
'''Level 1 '''
|'''[[Practice_SI.L2-3.14.1_Details|SI.L1-b.1.xii]]'''
 
''Flaw Remediation [FCI Data]''<br>
'''Description '''
Identify, report, and correct information and information system flaws in a timely manner.
 
* FAR Clause 52.204-21 b.1.xii
'''IA.L1-b.1.v '''
* NIST SP 800-171 Rev 2 3.14.1
 
|'''[[Practice_SI.L2-3.14.1_Details|SI.L2-3.14.1]]'''
''Identification [FCI Data]''  
''Flaw Remediation [CUI Data]''<br>
 
Identify, report, and correct information and information system flaws in a timely manner.
Identify information system users, processes acting on behalf of users, or
* NIST SP 800-171 Rev 2 3.14.1
 
* FAR Clause 52.204-21 b.1.xii
devices.  
|'''[[Practice_SI.L3-3.14.1e_Details|SI.L3-3.14.1e]]'''
 
''Integrity Verification''<br>
'''IA.L1-b.1.vi '''
Verify the integrity of security critical and essential software using root of trust mechanisms or cryptographic signatures.
 
* NIST SP 800-172 3.14.1e
''Authentication [FCI Data]''  
|-
 
|'''[[Practice_SI.L2-3.14.2_Details|SI.L1-b.1.xiii]]'''
Authenticate (or verify) the identities of those users, processes, or devices,  
''Malicious Code Protection [FCI Data]''<br>
 
Provide protection from malicious code at appropriate locations within organizational information systems.
as a prerequisite to allowing access to organizational information systems.  
* FAR Clause 52.204-21 b.1.xiii
 
* NIST SP 800-171 Rev 2 3.14.2
'''Level 2 '''
|'''[[Practice_SI.L2-3.14.2_Details|SI.L2-3.14.2]]'''
 
''Malicious Code Protection [CUI Data]''<br>
'''Description '''
Provide protection from malicious code at appropriate locations within organizational information systems.
 
* NIST SP 800-171 Rev 2 3.14.2
'''IA.L2-3.5.1 '''
* FAR Clause 52.204-21 b.1.xiii
 
|'''[[Practice_SI.L3-3.14.3e_Details|SI.L3-3.14.3e]]'''
''Identification [CUI Data]''
''Specialized Asset Security''<br>
 
Include <u>specialized assets such as IoT, IIoT, OT, GFE, Restricted Information Systems and test equipment</u> in the scope of the specified enhanced security requirements or are segregated in purpose-specific networks.
''' '''
* NIST SP 800-172 3.14.3e
 
|-
Identify system users, processes acting on behalf of users, and devices.  
|'''[[Practice_SI.L2-3.14.4_Details|SI.L1-b.1.xiv]]'''
 
''Update Malicious Code Protection [FCI Data]''<br>
'''IA.L2-3.5.2 '''
Update malicious code protection mechanisms when new releases are available.
 
* FAR Clause 52.204-21 b.1.xiv
''Authentication [CUI Data]''
* NIST SP 800-171 Rev 2 3.14.4
 
|'''[[Practice_SI.L2-3.14.3_Details|SI.L2-3.14.3]]'''
''' '''
''Security Alerts & Advisories''<br>
 
Monitor system security alerts and advisories and take action in response.
Authenticate (or verify) the identities of users, processes, or devices, as a
* NIST SP 800-171 Rev 2 3.14.3
 
|'''[[Practice_SI.L3-3.14.6e_Details|SI.L3-3.14.6e]]'''
prerequisite to allowing access to organizational systems.
''Threat-Guided Intrusion Detection''<br>
 
Use threat indicator information and effective mitigations obtained from, <u>at a minimum, open or commercial sources, and any DoD-provided sources</u>, to guide and inform intrusion detection and threat hunting.
''' '''
* NIST SP 800-172 3.14.6e
 
|-
'''IA.L2-3.5.3 '''
|'''[[Practice_SI.L2-3.14.5_Details|SI.L1-b.1.xv]]'''
 
''System & File Scanning [FCI Data]''<br>
''Multifactor Authentication''
Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
 
* FAR Clause 52.204-21 b.1.xv
''' '''
* NIST SP 800-171 Rev 2 3.14.5
 
|'''[[Practice_SI.L2-3.14.4_Details|SI.L2-3.14.4]]'''
Use multifactor authentication for local and network access to privileged
''Update Malicious Code Protection [CUI Data]''<br>
 
Update malicious code protection mechanisms when new releases are available.
accounts and for network access to non-privileged accounts.  
* NIST SP 800-171 Rev 2 3.14.4
 
* FAR Clause 52.204-21 b.1.xiv
'''IA.L2-3.5.4 '''
|
 
|-
''Replay-Resistant Authentication''
|
 
|'''[[Practice_SI.L2-3.14.5_Details|SI.L2-3.14.5]]'''
''' '''
''System & File Scanning [CUI Data]''<br>
 
Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.
Employ replay-resistant authentication mechanisms for network access to
* FAR Clause 52.204-21 b.1.xv
 
* NIST SP 800-171 Rev 2 3.14.5
privileged and non-privileged accounts.  
|
 
|-
'''IA.L2-3.5.5 '''
|
 
|'''[[Practice_SI.L2-3.14.6_Details|SI.L2-3.14.6]]'''
''Identifier Reuse''
''Monitor Communications for Attacks''<br>
 
Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.
''' '''
* NIST SP 800-171 Rev 2 3.14.6
 
|
Prevent reuse of identifiers for a defined period.  
|-
 
|
'''IA.L2-3.5.6 '''
|'''[[Practice_SI.L2-3.14.7_Details|SI.L2-3.14.7]]'''
 
''Identify Unauthorized Use''<br>
''Identifier Handling''
Identify unauthorized use of organizational systems.
 
* NIST SP 800-171 Rev 2 3.14.7
''' '''
|
 
|}
Disable identifiers after a defined period of inactivity.  
 
'''IA.L2-3.5.7 '''
 
''Password Complexity''
 
''' '''
 
Enforce a minimum password complexity and change of characters when
 
new passwords are created.  
 
'''IA.L2-3.5.8 '''
 
''Password Reuse''
 
''' '''
 
Prohibit password reuse for a specified number of generations.  
 
'''IA.L2-3.5.9 '''
 
''Temporary Passwords''
 
''' '''
 
Allow temporary password use for system logons with an immediate change
 
to a permanent password.
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
11
 
'''IA.L2-3.5.10 '''
 
''Cryptographically-Protected ''
 
''Passwords''
 
''' '''
 
Store and transmit only cryptographically protected passwords.
 
'''IA.L2-3.5.11 '''
 
''Obscure Feedback''
 
''' '''
 
Obscure feedback of authentication information.  
 
'''Level 3 '''
 
'''Description '''
 
'''IA.L3-3.5.1e '''
 
''Bidirectional Authentication''
 
''' '''
 
Identify and authenticate systems and system components, where possible,
 
before establishing a network connection using bidirectional authentication
 
that is cryptographically based and replay resistant.  
 
'''IA.L3-3.5.3e '''
 
''Block Untrusted Assets''
 
''' '''
 
Employ automated or manual/procedural mechanisms to prohibit system  
 
components from connecting to organizational systems unless the
 
components are known, authenticated, in a properly configured state, or in
 
a trust profile.  
 
'''INCIDENT RESPONSE (IR)'''
 
'''Level 2 '''
 
'''Description '''
 
'''IR.L2-3.6.1 '''
 
''Incident Handling''  
 
Establish an operational incident-handling capability for organizational  
 
systems that includes preparation, detection, analysis, containment,
 
recovery, and user response activities.  
 
'''IR.L2-3.6.2 '''
 
''Incident Reporting''
 
''' '''
 
Track,  document, and report incidents to designated officials and/or
 
authorities both internal and external to the organization.  
 
'''IR.L2-3.6.3 '''
 
''Incident Response Testing''
 
''' '''
 
Test the organizational incident response capability.
 
'''Level 3 '''
 
'''Description '''
 
'''IR.L3-3.6.1e '''
 
''Security Operations Center''
 
''' '''
 
Establish and maintain a security operations center capability that operates
 
24/7, with allowance for remote/on-call staff.
 
'''IR.L3-3.6.2e '''
 
''Cyber Incident Response Team''
 
''' '''
 
Establish and maintain a cyber incident response team that can be deployed
 
by the organization within 24 hours.
 
'''MAINTENANCE (MA)'''
 
'''Level 2 '''
 
'''Description '''
 
'''MA.L2-3.7.1 '''
 
''Perform Maintenance''
 
Perform maintenance on organizational systems.
 
'''MA.L2-3.7.2 '''
 
''System Maintenance Control''
 
Provide controls on the tools, techniques, mechanisms, and personnel used
 
to conduct system maintenance.
 
'''MA.L2-3.7.3 '''
 
''Equipment Sanitization''
 
''' '''
 
Sanitize equipment removed for off-site maintenance of any CUI.
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
12
 
'''MA.L2-3.7.4 '''
 
''Media Inspection''
 
''' '''
 
Check media containing diagnostic and test programs for malicious code
 
before the media are used in organizational systems.
 
'''MA.L2-3.7.5 '''
 
''Nonlocal Maintenance''
 
''' '''
 
Require multifactor authentication to establish nonlocal maintenance
 
sessions via external network connections and terminate such connections
 
when nonlocal maintenance is complete.
 
'''MA.L2-3.7.6 '''
 
''Maintenance Personnel''
 
''' '''
 
Supervise the maintenance activities of maintenance personnel without
 
required access authorization.
 
'''MEDIA PROTECTION (MP)'''
 
'''Level 1 '''
 
'''Description '''
 
'''MP.L1-b.1.vii '''
 
''Media Disposal [FCI Data]''
 
Sanitize or destroy information system media containing Federal Contract
 
Information before disposal or release for reuse.
 
'''Level 2 '''
 
'''Description '''
 
'''MP.L2-3.8.1 '''
 
''Media Protection''
 
Protect (i.e., physically control and securely store) system media containing
 
CUI, both paper and digital.
 
'''MP.L2-3.8.2 '''
 
''Media Access''
 
Limit access to CUI on system media to authorized users.
 
'''MP.L2-3.8.3 '''
 
''Media Disposal [CUI Data]''
 
''' '''
 
Sanitize or destroy system media containing CUI before disposal or release
 
for reuse.
 
'''MP.L2-3.8.4 '''
 
''Media Markings''
 
''' '''
 
Mark media with necessary CUI markings and distribution limitations.
 
'''MP.L2-3.8.5 '''
 
''Media Accountability''
 
''' '''
 
Control access to media containing CUI and maintain accountability for
 
media during transport outside of controlled areas.
 
'''MP.L2-3.8.6 '''
 
''Portable Storage Encryption''
 
''' '''
 
Implement cryptographic mechanisms to protect the confidentiality of CUI
 
stored on digital media during transport unless otherwise protected by
 
alternative physical safeguards.
 
'''MP.L2-3.8.7 '''
 
''Removable Media''
 
Control the use of removable media on system components.
 
'''MP.L2-3.8.8 '''
 
''Shared Media''
 
''' '''
 
Prohibit the use of portable storage devices when such devices have no
 
identifiable owner.
 
'''MP.L2-3.8.9 '''
 
''Protect Backups''
 
''' '''
 
Protect the confidentiality of backup CUI at storage locations.
 
'''PERSONNEL SECURITY (PS)'''
 
'''Level 2 '''
 
'''Description '''
 
'''PS.L2-3.9.1 '''
 
''Screen Individuals''
 
Screen individuals prior to authorizing access to organizational systems
 
containing CUI.
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
13
 
'''PS.L2-3.9.2 '''
 
''Personnel Actions''
 
Protect organizational systems containing CUI during and after personnel
 
actions such as terminations and transfers.
 
'''Level 3 '''
 
'''Description '''
 
'''PS.L3-3.9.2e '''
 
''Adverse Information''
 
''' '''
 
Protect  organizational systems when  adverse information develops or is
 
obtained about individuals with access to CUI.
 
'''PHYSICAL PROTECTION (PE)'''
 
'''Level 1 '''
 
'''Description '''
 
'''PE.L1-b.1.viii '''
 
''Limit Physical Access [FCI Data]''
 
Limit physical access to organizational information systems, equipment, and
 
the respective operating environments to authorized individuals.
 
'''PE.L1-b.1.ix '''
 
''Manage Visitors &amp; Physical Access ''
 
''[FCI Data]''
 
Escort visitors and monitor visitor activity; maintain audit logs of physical
 
access; and control and manage physical access devices.
 
'''Level 2 '''
 
'''Description '''
 
'''PE.L2-3.10.1 '''
 
''Limit Physical Access [CUI Data]''
 
''' '''
 
Limit physical access to organizational systems, equipment, and the
 
respective operating environments to authorized individuals.
 
''' '''
 
'''PE.L2-3.10.2 '''
 
''Monitor Facility''
 
Protect and monitor the physical facility and support infrastructure for
 
organizational systems.
 
'''PE.L2-3.10.3 '''
 
''Escort Visitors [CUI Data]''
 
''' '''
 
Escort visitors and monitor visitor activity.
 
'''PE.L2-3.10.4 '''
 
''Physical Access Logs [CUI Data]''
 
''' '''
 
Maintain audit logs of physical access.
 
'''PE.L2-3.10.5 '''
 
''Manage Physical Access [CUI Data]''
 
''' '''
 
Control and manage physical access devices.
 
'''PE.L2-3.10.6 '''
 
''Alternative Work Sites''
 
''' '''
 
Enforce safeguarding measures for CUI at alternate work sites.
 
'''RISK ASSESSMENT (RA)'''
 
'''Level 2 '''
 
'''Description '''
 
'''RA.L2-3.11.1 '''
 
''Risk Assessments''
 
Periodically assess the risk to organizational operations (including mission,
 
functions, image, or reputation), organizational assets, and individuals,
 
resulting from the operation of organizational systems and the associated
 
processing, storage, or transmission of CUI.
 
'''RA.L2-3.11.2 '''
 
''Vulnerability Scan''
 
Scan for vulnerabilities in organizational systems and applications
 
periodically and when new vulnerabilities affecting those systems and
 
applications are identified.
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
14
 
'''RA.L2-3.11.3 '''
 
''Vulnerability Remediation''
 
Remediate vulnerabilities in accordance with risk assessments.
 
'''Level 3 '''
 
'''Description '''
 
'''RA.L3-3.11.1e '''
 
''Threat-Informed Risk Assessment''
 
''' '''
 
Employ threat intelligence, at a minimum from open or commercial sources,
 
and any DoD-provided sources, as part of a risk assessment to guide and
 
inform the development of organizational systems, security architectures,
 
selection of security solutions, monitoring, threat hunting, and response and
 
recovery activities.
 
'''RA.L3-3.11.2e '''
 
''Threat Hunting''
 
''' '''
 
Conduct cyber threat hunting activities on an on-going aperiodic basis or
 
when indications warrant, to search for indicators of compromise in
 
organizational systems  and detect, track, and disrupt threats that evade
 
existing controls.
 
'''RA.L3-3.11.3e '''
 
''Advanced Risk Identification''
 
''' '''
 
Employ advanced automation and analytics capabilities in support of
 
analysts to predict and identify risks to organizations, systems, and system
 
components.
 
'''RA.L3-3.11.4e '''
 
''Security Solution Rationale''
 
''' '''
 
Document or reference in the system security plan the security solution
 
selected, the rationale for the security solution, and the risk determination.
 
'''RA.L3-3.11.5e '''
 
''Security Solution Effectiveness''
 
''' '''
 
Assess the effectiveness of security solutions at least annually or upon
 
receipt of relevant cyber threat information, or in response to a relevant
 
cyber incident, to address anticipated risk to organizational systems and the
 
organization based on current and accumulated threat intelligence.
 
'''RA.L3-3.11.6e '''
 
''Supply Chain Risk Response''
 
''' '''
 
Assess, respond to, and monitor supply chain risks associated with
 
organizational systems and system components.
 
'''RA.L3-3.11.7e '''
 
''Supply Chain Risk Plan''
 
''' '''
 
Develop a plan for managing supply chain risks associated with
 
organizational systems and system components; update the plan at least
 
annually, and upon receipt of relevant cyber threat information, or in
 
response to a relevant cyber incident.
 
'''SECURITY ASSESSMENT (CA)'''
 
'''Level 2 '''
 
'''Description '''
 
'''CA.L2-3.12.1 '''
 
''Security Control Assessment''
 
Periodically assess the security controls in organizational systems to
 
determine if the controls are effective in their application.
 
'''CA.L2-3.12.2 '''
 
''Operational Plan of Action''
 
Develop and implement plans of action designed to correct deficiencies and
 
reduce or eliminate vulnerabilities in organizational systems.
 
'''CA.L2-3.12.3 '''
 
''Security Control Monitoring''
 
''' '''
 
Monitor security controls on an ongoing basis to determine the continued
 
effectiveness of the controls.
 
'''CA.L2-3.12.4 '''
 
''System Security Plan''
 
''' '''
 
Develop, document, and periodically update system security plans that
 
describe system boundaries, system environments of operation, how
 
security requirements are implemented, and the relationships with or
 
connections to other systems.
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
15
 
'''Level 3 '''
 
'''Description '''
 
'''CA.L3-3.12.1e '''
 
''Penetration Testing''
 
''' '''
 
Conduct penetration testing at least annually or when significant security
 
changes are made to the system, leveraging automated scanning tools and
 
ad hoc tests using subject matter experts.
 
'''SYSTEM AND COMMUNICATIONS PROTECTION (SC)'''
 
'''Level 1 '''
 
'''Description '''
 
'''SC.L1-b.1.x '''
 
''Boundary Protection [FCI Data]''
 
Monitor, control, and protect organizational communications (i.e.,
 
information transmitted or received by organizational information systems)
 
at the external boundaries and key internal boundaries of the information
 
systems.
 
'''SC.L1-b.1.xi '''
 
''Public-Access System Separation ''
 
''[FCI Data]''
 
Implement subnetworks for publicly accessible system components that are
 
physically or logically separated from internal networks.
 
'''Level 2 '''
 
'''Description '''
 
'''SC.L2-3.13.1 '''
 
''Boundary Protection [CUI Data]''
 
''' '''
 
Monitor, control, and protect organizational communications (i.e.,
 
information transmitted or received by organizational information systems)
 
at the external boundaries and key internal boundaries of the information
 
systems.
 
''' '''
 
'''SC.L2-3.13.2 '''
 
''Security Engineering''
 
Employ architectural designs, software development techniques, and
 
systems engineering principles that promote effective information security
 
within organizational systems.
 
'''SC.L2-3.13.3 '''
 
''Role Separation''
 
Separate user functionality from system management functionality.
 
'''SC.L2-3.13.4 '''
 
''Shared Resource Control''
 
Prevent unauthorized and unintended information transfer via shared
 
system resources.
 
'''SC.L2-3.13.5 '''
 
''Public-Access System Separation ''
 
''[CUI Data]''
 
''' '''
 
Implement subnetworks for publicly accessible system components that are
 
physically or logically separated from internal networks.
 
'''SC.L2-3.13.6 '''
 
''Network Communication by ''
 
''Exception''
 
Deny network communications traffic by default and allow network
 
communications traffic by exception (i.e., deny all, permit by exception).
 
'''SC.L2-3.13.7 '''
 
''Split Tunneling''
 
Prevent remote devices from simultaneously establishing non-remote
 
connections with organizational systems and communicating via some other
 
connection to resources in external networks (i.e., split tunneling).
 
'''SC.L2-3.13.8 '''
 
''Data in Transit''
 
Implement cryptographic mechanisms to prevent unauthorized disclosure of
 
CUI during transmission unless otherwise protected by alternative physical
 
safeguards.
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
16
 
'''SC.L2-3.13.9 '''
 
''Connections Termination''
 
Terminate network connections associated with communications sessions at
 
the end of the sessions or after a defined period of inactivity.
 
'''SC.L2-3.13.10 '''
 
''Key Management''
 
Establish and manage cryptographic keys for cryptography employed in
 
organizational systems.
 
'''SC.L2-3.13.11 '''
 
''CUI Encryption''
 
''' '''
 
Employ FIPS-validated cryptography when used to protect the confidentiality
 
of CUI.
 
'''SC.L2-3.13.12 '''
 
''Collaborative Device Control''
 
''' '''
 
Prohibit remote activation of collaborative computing devices and provide
 
indication of devices in use to users present at the device.
 
'''SC.L2-3.13.13 '''
 
''Mobile Code''
 
Control and monitor the use of mobile code.
 
'''SC.L2-3.13.14 '''
 
''Voice over Internet Protocol''
 
Control and monitor the use of Voice over Internet Protocol (VoIP)
 
technologies.
 
'''SC.L2-3.13.15 '''
 
''Communications Authenticity''
 
Protect the authenticity of communications sessions.
 
'''SC.L2-3.13.16 '''
 
''Data at Rest''
 
Protect the confidentiality of CUI at rest.
 
'''Level 3 '''
 
'''Description '''
 
'''SC.L3-3.13.4e '''
 
''Isolation''
 
''' '''
 
Employ physical isolation techniques or logical isolation techniques or both
 
in organizational systems and system components.
 
'''SYSTEM AND INFORMATION INTEGRITY (SI)'''
 
'''Level 1 '''
 
'''Description '''
 
'''SI.L1-b.1.xii '''
 
''Flaw Remediation [FCI Data]''
 
Identify, report, and correct information and information system flaws in a
 
timely manner.
 
'''SI.L1-b.1.xiii '''
 
''Malicious Code Protection [FCI Data]''
 
Provide protection from malicious code at appropriate locations within
 
organizational information systems.
 
'''SI.L1-b.1.xiv '''
 
''Update Malicious Code Protection ''
 
''[FCI Data]''
 
Update malicious code protection mechanisms when new releases are
 
available.
 
'''SI.L1-b.1.xv '''
 
''System &amp; File Scanning [FCI Data]''
 
Perform periodic scans of the information system and real-time scans of files
 
from external sources as files are downloaded, opened, or executed.
 
'''Level 2 '''
 
'''Description '''
 
'''SI.L2-3.14.1 '''
 
''Flaw Remediation [CUI Data]''
 
''' '''
 
Identify, report, and correct system flaws in a timely manner.
 
'''SI.L2-3.14.2 '''
 
''Malicious Code Protection [CUI ''
 
''Data] ''
 
Provide protection from malicious code at designated locations within
 
organizational systems.
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
17
 
'''SI.L2-3.14.3 '''
 
''Security Alerts &amp; Advisories''
 
Monitor system security alerts and advisories and take action in response.
 
'''SI.L2-3.14.4 '''
 
''Update Malicious Code Protection ''
 
''[CUI Data]''
 
''' '''
 
Update malicious code protection mechanisms when new releases are
 
available.
 
'''SI.L2-3.14.5 '''
 
''System &amp; File Scanning [CUI Data]''
 
''' '''
 
Perform periodic scans of organizational systems and real-time scans of files
 
from external sources as files are downloaded, opened, or executed.
 
'''SI.L2-3.14.6 '''
 
''Monitor Communications for ''
 
''Attacks''
 
Monitor organizational systems, including inbound and outbound
 
communications traffic, to detect attacks and indicators of potential attacks.
 
'''SI.L2-3.14.7 '''
 
''Identify Unauthorized Use''
 
Identify unauthorized use of organizational systems.
 
'''Level 3 '''
 
'''Description '''
 
'''SI.L3-3.14.1e '''
 
''Integrity Verification''
 
''' '''
 
Verify the integrity of security critical and essential software using root of
 
trust mechanisms or cryptographic signatures.
 
'''SI.L3-3.14.3e '''
 
''Specialized Asset Security''
 
''' '''
 
Include specialized assets such as IoT, IIoT, OT, GFE, Restricted Information
 
Systems and test equipment in the scope of the specified enhanced security
 
requirements or are segregated in purpose-specific networks.
 
'''SI.L3-3.14.6e '''
 
''Threat-Guided Intrusion Detection''
 
''' '''
 
Use threat indicator information and effective mitigations obtained from, at
 
a minimum, open or commercial sources, and any DoD-provided sources, to
 
guide and inform intrusion detection and threat hunting.
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
18
 
Appendix A. CMMC Model Matrix
 
This appendix presents the model in matrix form by domain. The three columns list the
 
associated  security  requirements  for each CMMC  level.  Each level is independent and
 
consists of a set of CMMC security requirements:
 
• Level 1: the ''basic safeguarding requirements'' for FCI specified in FAR Clause 52.204-21.<br />
• Level 2: the ''security requirements'' for CUI specified in NIST SP 800-171 Rev 2 per DFARS
 
Clause 252.204-7012
 
• Level 3: selected ''enhanced'' ''security requirements'' for CUI specified in NIST SP 800-172
 
with DoD-approved parameters where applicable.
 
Each requirement is contained in a single cell. The requirement identification number is
 
bolded at the top of each cell. The next line contains the requirement short name identifier,
 
in ''italics'', which is meant to be used for quick reference only. Below the short name is the
 
complete CMMC security  requirement  statement.  Some Level 3 requirement  statements
 
contain a DoD-approved  parameter, which is underlined.  Finally, the bulleted list at the
 
bottom contains the FAR Clause 52.204-21, NIST SP 800-171 Rev 2, and NIST SP 800-172
 
reference as appropriate.
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
19
 
'''ACCESS CONTROL (AC)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''AC.L1-b.1.i'''
 
''Authorized Access Control [FCI Data]''
 
Limit information system access to
 
authorized users, processes acting on behalf
 
of authorized users, or devices (including
 
other information systems).
 
• FAR Clause 52.204-21 b.1.i
 
• NIST SP 800-171 Rev 2 3.1.1
 
'''AC.L2-3.1.1'''
 
''Authorized Access Control [CUI Data]''
 
Limit system access to authorized users,
 
processes acting on behalf of authorized
 
users, and devices (including other systems).
 
• NIST SP 800-171 Rev 2 3.1.1
 
• FAR Clause 52.204-21 b.1.i
 
'''AC.L3-3.1.2e'''
 
''Organizationally Controlled Assets''
 
Restrict access to systems and system
 
components to only those information
 
resources that are owned, provisioned, or
 
issued by the organization.
 
• NIST SP 800-172 3.1.2e
 
'''AC.L1-b.1.ii'''
 
 
''Transaction &amp; Function Control [FCI Data]''
 
Limit information system access to the types
 
of transactions and functions that authorized
 
users are permitted to execute.
 
• FAR Clause 52.204-21 b.1.ii
 
• NIST SP 800-171 Rev 2 3.1.2
 
'''AC.L2-3.1.2'''
 
''Transaction &amp; Function Control [CUI Data]''
 
Limit system access to the types of
 
transactions and functions that authorized
 
users are permitted to execute.
 
• NIST SP 800-171 Rev 2 3.1.2
 
• FAR Clause 52.204-21 b.1.ii
 
'''AC.L3-3.1.3e'''
 
''Secured Information Transfer''
 
Employ secure information transfer solutions
 
to control information flows between
 
security domains on connected systems.
 
• NIST SP 800-172 3.1.3e
 
'''AC.L1-b.1.iii'''
 
''External Connections [FCI Data]''
 
Verify and control/limit connections to and
 
use of external information systems. 
 
• FAR Clause 52.204-21 b.1.iii
 
• NIST SP 800-171 Rev 2 3.1.20
 
'''AC.L2-3.1.3'''
 
''Control CUI Flow''
 
Control the flow of CUI in accordance with
 
approved authorizations. 
 
• NIST SP 800-171 Rev 2 3.1.3
 
'''AC.L1-b.1.iv'''
 
''Control Public Information [FCI Data]''
 
Control information posted or processed on
 
publicly accessible information systems.
 
• FAR Clause 52.204-21 b.1.iv
 
• NIST SP 800-171 Rev 2 3.1.22
 
'''AC.L2-3.1.4'''
 
''Separation of Duties''
 
Separate the duties of individuals to reduce
 
the risk of malevolent activity without
 
collusion.
 
• NIST SP 800-171 Rev 2 3.1.4<br />
'''AC.L2-3.1.5'''
 
''Least Privilege''
 
Employ the principle of least privilege,
 
including for specific security functions and
 
privileged accounts.
 
• NIST SP 800-171 Rev 2 3.1.5<br />
'''AC.L2-3.1.6'''
 
''Non-Privileged Account Use''
 
Use non-privileged accounts or roles when
 
accessing nonsecurity functions.
 
• NIST SP 800-171 Rev 2 3.1.6<br />
'''AC.L2-3.1.7'''
 
''Privileged Functions''
 
Prevent non-privileged users from executing
 
privileged functions and capture the
 
execution of such functions in audit logs.
 
• NIST SP 800-171 Rev 2 3.1.7<br />
'''AC.L2-3.1.8'''
 
''Unsuccessful Logon Attempts''
 
Limit unsuccessful logon attempts. 
 
• NIST SP 800-171 Rev 2 3.1.8 <br />
'''AC.L2-3.1.9'''
 
''Privacy &amp; Security Notices''
 
Provide privacy and security notices
 
consistent with applicable CUI rules.
 
• NIST SP 800-171 Rev 2 3.1.9
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
20
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''AC.L2-3.1.10'''
 
''Session Lock''
 
Use session lock with pattern-hiding displays
 
to prevent access and viewing of data after a
 
period of inactivity. 
 
• NIST SP 800-171 Rev 2 3.1.10<br />
'''AC.L2-3.1.11'''
 
''Session Termination''
 
Terminate (automatically) a user session
 
after a defined condition.
 
• NIST SP 800-171 Rev 2 3.1.11<br />
'''AC.L2-3.1.12'''
 
''Control Remote Access''
 
Monitor and control remote access sessions.
 
• NIST SP 800-171 Rev 2 3.1.12<br />
'''AC.L2-3.1.13'''
 
''Remote Access Confidentiality''
 
Employ cryptographic mechanisms to protect
 
the confidentiality of remote access sessions.
 
• NIST SP 800-171 Rev 2 3.1.13<br />
'''AC.L2-3.1.14'''
 
''Remote Access Routing''
 
Route remote access via managed access
 
control points.
 
• NIST SP 800-171 Rev 2 3.1.14<br />
'''AC.L2-3.1.15'''
 
''Privileged Remote Access''
 
Authorize remote execution of privileged
 
commands and remote access to security-
 
relevant information.
 
• NIST SP 800-171 Rev 2 3.1.15<br />
'''AC.L2-3.1.16'''
 
''Wireless Access Authorization''
 
Authorize wireless access prior to allowing
 
such connections.
 
• NIST SP 800-171 Rev 2 3.1.16<br />
'''AC.L2-3.1.17'''
 
''Wireless Access Protection''
 
Protect wireless access using authentication
 
and encryption.
 
• NIST SP 800-171 Rev 2 3.1.17<br />
'''AC.L2-3.1.18'''
 
''Mobile Device Connection''
 
Control connection of mobile devices.
 
• NIST SP 800-171 Rev 2 3.1.18<br />
'''AC.L2-3.1.19'''
 
''Encrypt CUI on Mobile''
 
Encrypt CUI on mobile devices and mobile
 
computing platforms.
 
• NIST SP 800-171 Rev 2 3.1.19<br />
'''AC.L2-3.1.20'''
 
''External Connections [CUI Data]''
 
Verify and control/limit connections to and
 
use of external systems.
 
• NIST SP 800-171 Rev 2 3.1.20
 
• FAR Clause 52.204-21 b.1.iii
 
''' '''
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
21
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''AC.L2-3.1.21'''
 
''Portable Storage Use''
 
Limit use of portable storage devices on
 
external systems.
 
• NIST SP 800-171 Rev 2 3.1.21<br />
'''AC.L2-3.1.22'''
 
''Control Public Information [CUI Data]''
 
Control CUI posted or processed on publicly
 
accessible systems.
 
• NIST SP 800-171 Rev 2 3.1.22
 
• FAR Clause 52.204-21 b.1.iv
 
''' '''
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
22
 
'''AWARENESS AND TRAINING (AT)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''AT.L2-3.2.1'''
 
''Role-Based Risk Awareness''
 
Inform managers, systems administrators,
 
and users of organizational systems of the
 
security risks associated with their activities
 
and of the applicable policies, standards, and
 
procedures related to the security of those
 
systems.
 
• NIST SP 800-171 Rev 2 3.2.1
 
'''AT.L3-3.2.1e'''
 
''Advanced Threat Awareness''
 
Provide awareness training upon initial hire,
 
following a significant cyber event, and at
 
least annually, focused on recognizing and
 
responding to threats from social
 
engineering, advanced persistent threat
 
actors, breaches, and suspicious behaviors;
 
update the training at least annually
 
''' '''or when
 
there are significant changes to the threat.
 
• NIST SP 800-172 3.2.1e
 
'''AT.L2-3.2.2'''
 
''Role-Based Training''
 
Train personnel to carry out their assigned
 
information security-related duties and
 
responsibilities.
 
• NIST SP 800-171 Rev 2 3.2.2
 
'''AT.L3-3.2.2e'''
 
''Practical Training Exercises''
 
Include practical exercises in awareness
 
training for all users, tailored by roles, to
 
include general users, users with specialized
 
roles, and privileged users, that are aligned
 
with current threat scenarios and provide
 
feedback to individuals involved in the
 
training and their supervisors.
 
• NIST SP 800-172 3.2.2e
 
'''AT.L2-3.2.3'''
 
''Insider Threat Awareness''
 
Provide security awareness training on
 
recognizing and reporting potential indicators
 
of insider threat.
 
• NIST SP 800-171 Rev 2 3.2.3
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
23
 
'''AUDIT AND ACCOUNTABILITY (AU)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''AU.L2-3.3.1'''
 
''System Auditing''
 
Create and retain system audit logs and
 
records to the extent needed to enable the
 
monitoring, analysis, investigation, and
 
reporting of unlawful or unauthorized system
 
activity.
 
• NIST SP 800-171 Rev 2 3.3.1<br />
'''AU.L2-3.3.2'''
 
''User Accountability''
 
Uniquely track the actions of individual
 
system users, so they can be held
 
accountable for their actions.
 
• NIST SP 800-171 Rev 2 3.3.2<br />
'''AU.L2-3.3.3'''
 
''Event Review''
 
Review and update logged events.
 
• NIST SP 800-171 Rev 2 3.3.3<br />
'''AU.L2-3.3.4'''
 
''Audit Failure Alerting''
 
Alert in the event of an audit logging process
 
failure.
 
• NIST SP 800-171 Rev 2 3.3.4<br />
'''AU.L2-3.3.5'''
 
''Audit Correlation''
 
Correlate audit record review, analysis, and
 
reporting processes for investigation and
 
response to indications of unlawful,
 
unauthorized, suspicious, or unusual activity.
 
• NIST SP 800-171 Rev 2 3.3.5<br />
'''AU.L2-3.3.6'''
 
''Reduction &amp; Reporting''
 
Provide audit record reduction and report
 
generation to support on-demand analysis
 
and reporting.
 
• NIST SP 800-171 Rev 2 3.3.6<br />
'''AU.L2-3.3.7'''
 
''Authoritative Time Source''
 
Provide a system capability that compares
 
and synchronizes internal system clocks with
 
an authoritative source to generate time
 
stamps for audit records.
 
• NIST SP 800-171 Rev 2 3.3.7<br />
'''AU.L2-3.3.8'''
 
''Audit Protection''
 
Protect audit information and audit logging
 
tools from unauthorized access, modification,
 
and deletion.
 
• NIST SP 800-171 Rev 2 3.3.8<br />
'''AU.L2-3.3.9'''
 
''Audit Management''
 
Limit management of audit logging
 
functionality to a subset of privileged users.
 
• NIST SP 800-171 Rev 2 3.3.9
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
24
 
'''CONFIGURATION MANAGEMENT (CM)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''CM.L2-3.4.1'''
 
''System Baselining''
 
Establish and maintain baseline
 
configurations and inventories of
 
organizational systems (including hardware,
 
software, firmware, and documentation)
 
throughout the respective system
 
development life cycles.
 
• NIST SP 800-171 Rev 2 3.4.1
 
'''CM.L3-3.4.1e'''
 
''Authoritative Repository''
 
Establish and maintain an authoritative
 
source and repository to provide a trusted
 
source and accountability for approved and
 
implemented system components.
 
• NIST SP 800-172 3.4.1e
 
'''CM.L2-3.4.2'''
 
''Security Configuration Enforcement''
 
Establish and enforce security configuration
 
settings for information technology products
 
employed in organizational systems.
 
• NIST SP 800-171 Rev 2 3.4.2
 
'''CM.L3-3.4.2e'''
 
''Automated Detection &amp; Remediation''
 
Employ automated mechanisms to detect
 
misconfigured or unauthorized system
 
components; after detection, remove the
 
components or place the components in a
 
quarantine or remediation network to
 
facilitate patching, re-configuration, or other
 
mitigations.
 
• NIST SP 800-172 3.4.2e
 
'''CM.L2-3.4.3'''
 
''System Change Management''
 
Track, review, approve or disapprove, and log
 
changes to organizational systems.
 
• NIST SP 800-171 Rev 2 3.4.3
 
'''CM.L3-3.4.3e'''
 
''Automated Inventory''
 
Employ automated discovery and
 
management tools to maintain an up-to-
 
date, complete, accurate, and readily
 
available inventory of system components.
 
• NIST SP 800-172 3.4.3e
 
'''CM.L2-3.4.4'''
 
''Security Impact Analysis''
 
Analyze the security impact of changes prior
 
to implementation.
 
• NIST SP 800-171 Rev 2 3.4.4<br />
'''CM.L2-3.4.5'''
 
''Access Restrictions for Change''
 
Define, document, approve, and enforce
 
physical and logical access restrictions
 
associated with changes to organizational
 
systems.
 
• NIST SP 800-171 Rev 2 3.4.5<br />
'''CM.L2-3.4.6'''
 
''Least Functionality''
 
Employ the principle of least functionality by
 
configuring organizational systems to provide
 
only essential capabilities.
 
• NIST SP 800-171 Rev 2 3.4.6<br />
'''CM.L2-3.4.7'''
 
''Nonessential Functionality''
 
Restrict, disable, or prevent the use of
 
nonessential programs, functions, ports,
 
protocols, and services.
 
• NIST SP 800-171 Rev 2 3.4.7
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
25
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''CM.L2-3.4.8'''
 
''Application Execution Policy''
 
Apply deny-by-exception (blacklisting) policy
 
to prevent the use of unauthorized software
 
or deny-all, permit-by-exception
 
(whitelisting) policy to allow the execution of
 
authorized software.
 
• NIST SP 800-171 Rev 2 3.4.8<br />
'''CM.L2-3.4.9'''
 
''User-Installed Software''
 
Control and monitor user-installed software.
 
• NIST SP 800-171 Rev 2 3.4.9
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
26
 
'''IDENTIFICATION AND AUTHENTICATION (IA)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''IA.L1-b.1.v'''
 
''Identification [FCI Data]''
 
Identify information system users, processes
 
acting on behalf of users, or devices.
 
• FAR Clause 52.204-21 b.1.v
 
• NIST SP 800-171 Rev 2 3.5.1
 
'''IA.L2-3.5.1'''
 
''Identification [CUI Data]''
 
Identify system users, processes acting on
 
behalf of users, and devices.
 
• NIST SP 800-171 Rev 2 3.5.1
 
• FAR Clause 52.204-21 b.1.v
 
'''IA.L3-3.5.1e'''
 
''Bidirectional Authentication''
 
Identify and authenticate systems and
 
system components, where possible, before
 
establishing a network connection using
 
bidirectional authentication that is
 
cryptographically based and replay resistant.
 
• NIST SP 800-172 3.5.1e
 
'''IA.L1-b.1.vi'''
 
''Authentication [FCI Data]''
 
Authenticate (or verify) the identities of
 
those users, processes, or devices, as a
 
prerequisite to allowing access to
 
organizational information systems.
 
• FAR Clause 52.204-21 b.1.vi
 
• NIST SP 800-171 Rev 2 3.5.2
 
'''IA.L2-3.5.2'''
 
''Authentication [CUI Data]''
 
Authenticate (or verify) the identities of
 
users, processes, or devices, as a prerequisite
 
to allowing access to organizational systems.
 
• NIST SP 800-171 Rev 2 3.5.2
 
• FAR Clause 52.204-21 b.1.vi
 
'''IA.L3-3.5.3e'''
 
''Block Untrusted Assets''
 
Employ automated or manual/procedural
 
mechanisms to prohibit system components
 
from connecting to organizational systems
 
unless the components are known,
 
authenticated, in a properly configured state,
 
or in a trust profile.
 
• NIST SP 800-172 3.5.3e
 
'''IA.L2-3.5.3'''
 
''Multifactor Authentication''
 
Use multifactor authentication for local and
 
network access to privileged accounts and for
 
network access to non-privileged accounts.
 
• NIST SP 800-171 Rev 2 3.5.3<br />
'''IA.L2-3.5.4'''
 
''Replay-Resistant Authentication''
 
Employ replay-resistant authentication
 
mechanisms for network access to privileged
 
and non-privileged accounts.
 
• NIST SP 800-171 Rev 2 3.5.4<br />
'''IA.L2-3.5.5'''
 
''Identifier Reuse''
 
Prevent reuse of identifiers for a defined
 
period.
 
• NIST SP 800-171 Rev 2 3.5.5<br />
'''IA.L2-3.5.6'''
 
''Identifier Handling''
 
Disable identifiers after a defined period of
 
inactivity.
 
• NIST SP 800-171 Rev 2 3.5.6<br />
'''IA.L2-3.5.7'''
 
''Password Complexity''
 
Enforce a minimum password complexity and
 
change of characters when new passwords
 
are created.
 
• NIST SP 800-171 Rev 2 3.5.7<br />
'''IA.L2-3.5.8'''
 
''Password Reuse''
 
Prohibit password reuse for a specified
 
number of generations.
 
• NIST SP 800-171 Rev 2 3.5.8<br />
'''IA.L2-3.5.9'''
 
''Temporary Passwords''
 
Allow temporary password use for system
 
logons with an immediate change to a
 
permanent password.
 
• NIST SP 800-171 Rev 2 3.5.9
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
27
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''IA.L2-3.5.10'''
 
''Cryptographically-Protected Passwords''
 
Store and transmit only cryptographically-
 
protected passwords.
 
• NIST SP 800-171 Rev 2 3.5.10<br />
'''IA.L2-3.5.11'''
 
''Obscure Feedback''
 
Obscure feedback of authentication
 
information.
 
• NIST SP 800-171 Rev 2 3.5.11
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
28
 
'''INCIDENT RESPONSE (IR)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''IR.L2-3.6.1'''
 
''Incident Handling''
 
Establish an operational incident-handling
 
capability for organizational systems that
 
includes preparation, detection, analysis,
 
containment, recovery, and user response
 
activities.
 
• NIST SP 800-171 Rev 2 3.6.1
 
'''IR.L3-3.6.1e'''
 
''Security Operations Center''
 
Establish and maintain a security operations
 
center capability that operates 24/7, with
 
allowance for remote/on-call staff.
 
• NIST SP 800-172 3.6.1e
 
'''IR.L2-3.6.2'''
 
''Incident Reporting''
 
Track, document, and report incidents to
 
designated officials and/or authorities both
 
internal and external to the organization.
 
• NIST SP 800-171 Rev 2 3.6.2
 
'''IR.L3-3.6.2e'''
 
''Cyber Incident Response Team''
 
Establish and maintain a cyber incident
 
response team that can be deployed by the
 
organization within 24 hours.
 
• NIST SP 800-172 3.6.2e
 
'''IR.L2-3.6.3'''
 
''Incident Response Testing''
 
Test the organizational incident response
 
capability.
 
• NIST SP 800-171 Rev 2 3.6.3
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
29
 
'''MAINTENANCE (MA)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''MA.L2-3.7.1'''
 
''Perform Maintenance''
 
Perform maintenance on organizational
 
systems.
 
• NIST SP 800-171 Rev 2 3.7.1<br />
'''MA.L2-3.7.2'''
 
''System Maintenance Control''
 
Provide controls on the tools, techniques,
 
mechanisms, and personnel used to conduct
 
system maintenance.
 
• NIST SP 800-171 Rev 2 3.7.2<br />
'''MA.L2-3.7.3'''
 
''Equipment Sanitization''
 
Sanitize equipment removed for off-site
 
maintenance of any CUI.
 
• NIST SP 800-171 Rev 2 3.7.3<br />
'''MA.L2-3.7.4'''
 
''Media Inspection''
 
Check media containing diagnostic and test
 
programs for malicious code before the
 
media are used in organizational systems.
 
• NIST SP 800-171 Rev 2 3.7.4<br />
'''MA.L2-3.7.5'''
 
''Nonlocal Maintenance''
 
Require multifactor authentication to
 
establish nonlocal maintenance sessions via
 
external network connections and terminate
 
such connections when nonlocal
 
maintenance is complete.
 
• NIST SP 800-171 Rev 2 3.7.5<br />
'''MA.L2-3.7.6'''
 
''Maintenance Personnel''
 
Supervise the maintenance activities of
 
maintenance personnel without required
 
access authorization.
 
• NIST SP 800-171 Rev 2 3.7.6
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
30
 
'''MEDIA PROECTION (MP)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''MP.L1-b.1.vii'''
 
''Media Disposal [FCI Data]''
 
Sanitize or destroy information system media
 
containing Federal Contract Information
 
before disposal or release for reuse.
 
• FAR Clause 52.204-21 b.1.vii
 
• NIST SP 800-171 Rev 2 3.8.3
 
'''MP.L2-3.8.1'''
 
''Media Protection''
 
Protect (i.e., physically control and securely
 
store) system media containing CUI, both
 
paper and digital.
 
• NIST SP 800-171 Rev 2 3.8.1
 
'''MP.L2-3.8.2'''
 
''Media Access''
 
Limit access to CUI on system media to
 
authorized users.
 
• NIST SP 800-171 Rev 2 3.8.2<br />
'''MP.L2-3.8.3'''
 
''Media Disposal [CUI Data]''
 
Sanitize or destroy system media containing
 
CUI before disposal or release for reuse.
 
• NIST SP 800-171 Rev 2 3.8.3
 
• FAR Clause 52.204-21 b.1.vii<br />
'''MP.L2-3.8.4'''
 
''Media Markings''
 
Mark media with necessary CUI markings and
 
distribution limitations.
 
• NIST SP 800-171 Rev 2 3.8.4<br />
'''MP.L2-3.8.5'''
 
''Media Accountability''
 
Control access to media containing CUI and
 
maintain accountability for media during
 
transport outside of controlled areas.
 
• NIST SP 800-171 Rev 2 3.8.5
 
'''MP.L2-3.8.6'''
 
''Portable Storage Encryption''
 
Implement cryptographic mechanisms to
 
protect the confidentiality of CUI stored on
 
digital media during transport unless
 
otherwise protected by alternative physical
 
safeguards.
 
• NIST SP 800-171 Rev 2 3.8.6<br />
'''MP.L2-3.8.7'''
 
''Removable Media''
 
Control the use of removable media on
 
system components.
 
• NIST SP 800-171 Rev 2 3.8.7<br />
'''MP.L2-3.8.8'''
 
''Shared Media''
 
Prohibit the use of portable storage devices
 
when such devices have no identifiable
 
owner.
 
• NIST SP 800-171 Rev 2 3.8.8<br />
'''MP.L2-3.8.9'''
 
''Protect Backups''
 
Protect the confidentiality of backup CUI at
 
storage locations. 
 
• NIST SP 800-171 Rev 2 3.8.9
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
31
 
'''PERSONNEL SECURITY (PS)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''PS.L2-3.9.1'''
 
''Screen Individuals''
 
Screen individuals prior to authorizing access
 
to organizational systems containing CUI.
 
• NIST SP 800-171 Rev 2 3.9.1
 
'''PS.L3-3.9.2e'''
 
''Adverse Information''
 
Protect organizational systems when adverse
 
information develops or is obtained about
 
individuals with access to CUI.
 
• NIST SP 800-172 3.9.2e
 
'''PS.L2-3.9.2'''
 
''Personnel Actions''
 
Protect organizational systems containing
 
CUI during and after personnel actions such
 
as terminations and transfers.
 
• NIST SP 800-171 Rev 2 3.9.2
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
32
 
'''PHYSICAL PROTECTION (PE)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''PE.L1-b.1.viii'''
 
''Limit Physical Access [FCI Data]''
 
Limit physical access to organizational
 
information systems, equipment, and the
 
respective operating environments to
 
authorized individuals.
 
• FAR Clause 52.204-21 b.1.viii
 
• NIST SP 800-171 Rev 2 3.10.1
 
'''PE.L2-3.10.1'''
 
''Limit Physical Access [CUI Data]''
 
Limit physical access to organizational
 
systems, equipment, and the respective
 
operating environments to authorized
 
individuals.
 
• NIST SP 800-171 Rev 2 3.10.1
 
• FAR Clause 52.204-21 b.1.viii
 
'''PE.L1-b.1.ix'''
 
''Manage Visitors &amp; Physical Access [FCI Data]''
 
Escort visitors and monitor visitor activity;
 
maintain audit logs of physical access; and
 
control and manage physical access devices. 
 
• FAR Clause 52.204-21 Partial b.1.ix
 
• NIST SP 800-171 Rev 2 3.10.3
 
• NIST SP 800-171 Rev 2 3.10.4
 
• NIST SP 800-171 Rev 2 3.10.5
 
'''PE.L2-3.10.2'''
 
''Monitor Facility''
 
Protect and monitor the physical facility and
 
support infrastructure for organizational
 
systems.
 
• NIST SP 800-171 Rev 2 3.10.2
 
'''PE.L2-3.10.3'''
 
''Escort Visitors [CUI Data]''
 
Escort visitors and monitor visitor activity.
 
• NIST SP 800-171 Rev 2 3.10.3
 
• FAR Clause 52.204-21 Partial b.1.ix<br />
'''PE.L2-3.10.4'''
 
''Physical Access Logs [CUI Data]''
 
Maintain audit logs of physical access.
 
• NIST SP 800-171 Rev 2 3.10.4
 
• FAR Clause 52.204-21 Partial b.1.ix<br />
'''PE.L2-3.10.5'''
 
''Manage Physical Access [CUI Data]''
 
Control and manage physical access devices.
 
• NIST SP 800-171 Rev 2 3.10.5
 
• FAR Clause 52.204-21 Partial b.1.ix<br />
'''PE.L2-3.10.6'''
 
''Alternative Work Sites''
 
Enforce safeguarding measures for CUI at
 
alternate work sites.
 
• NIST SP 800-171 Rev 2 3.10.6
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
33
 
'''RISK ASSESSMENT (RA)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''RA.L2-3.11.1'''
 
''Risk Assessments''
 
Periodically assess the risk to organizational
 
operations (including mission, functions,
 
image, or reputation), organizational assets,
 
and individuals, resulting from the operation
 
of organizational systems and the associated
 
processing, storage, or transmission of CUI.
 
• NIST SP 800-171 Rev 2 3.11.1
 
'''RA.L3-3.11.1e'''
 
''Threat-Informed Risk Assessment''
 
Employ threat intelligence, at a minimum
 
from open or commercial sources, and any
 
DoD-provided sources, as part of a risk
 
assessment to guide and inform the
 
development of organizational systems,
 
security architectures, selection of security
 
solutions, monitoring, threat hunting, and
 
response and recovery activities.
 
• NIST SP 800-172 3.11.1e
 
'''RA.L2-3.11.2'''
 
''Vulnerability Scan''
 
Scan for vulnerabilities in organizational
 
systems and applications periodically and
 
when new vulnerabilities affecting those
 
systems and applications are identified.
 
• NIST SP 800-171 Rev 2 3.11.2
 
'''RA.L3-3.11.2e'''
 
''Threat Hunting''
 
Conduct cyber threat hunting activities on an
 
on-going aperiodic basis or when indications
 
warrant, to search for indicators of
 
compromise in organizational systems and
 
detect, track, and disrupt threats that evade
 
existing controls.
 
• NIST SP 800-172 3.11.2e
 
'''RA.L2-3.11.3'''
 
''Vulnerability Remediation''
 
Remediate vulnerabilities in accordance with
 
risk assessments.
 
• NIST SP 800-171 Rev 2 3.11.3
 
'''RA.L3-3.11.3e'''
 
''Advanced Risk Identification''
 
Employ advanced automation and analytics
 
capabilities in support of analysts to predict
 
and identify risks to organizations, systems,
 
and system components.
 
• NIST SP 800-172 3.11.3e<br />
'''RA.L3-3.11.4e'''
 
''Security Solution Rationale''
 
Document or reference in the system
 
security plan the security solution selected,
 
the rationale for the security solution, and
 
the risk determination.
 
• NIST SP 800-172 3.11.4e<br />
'''RA.L3-3.11.5e'''
 
''Security Solution Effectiveness''
 
Assess the effectiveness of security solutions
 
at least annually or upon receipt of relevant
 
cyber threat information, or in response to a
 
relevant cyber incident, to address
 
anticipated risk to organizational systems and
 
the organization based on current and
 
accumulated threat intelligence.
 
• NIST SP 800-172 3.11.5e<br />
'''RA.L3-3.11.6e'''
 
''Supply Chain Risk Response''
 
Assess, respond to, and monitor supply chain
 
risks associated with organizational systems
 
and system components.
 
• NIST SP 800-172 3.11.6e
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
34
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''RA.L3-3.11.7e'''
 
''Supply Chain Risk Plan''
 
Develop a plan for managing supply chain
 
risks associated with organizational systems
 
and system components; update the plan at
 
least annually, and upon receipt of relevant
 
cyber threat information, or in response to a
 
relevant cyber incident.
 
• NIST SP 800-172 3.11.7e
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
35
 
'''SECURITY ASSESSMENT (CA)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''CA.L2-3.12.1'''
 
''Security Control Assessment''
 
Periodically assess the security controls in
 
organizational systems to determine if the
 
controls are effective in their application.
 
• NIST SP 800-171 Rev 2 3.12.1
 
'''CA.L3-3.12.1e'''
 
''Penetration Testing''
 
Conduct penetration testing at least annually
 
or when significant security changes are
 
made to the system, leveraging automated
 
scanning tools and ad hoc tests using subject
 
matter experts.
 
• NIST SP 800-172 3.12.1e
 
'''CA.L2-3.12.2'''
 
''Operational Plan of Action''
 
Develop and implement plans of action
 
designed to correct deficiencies and reduce
 
or eliminate vulnerabilities in organizational
 
systems.
 
• NIST SP 800-171 Rev 2 3.12.2<br />
'''CA.L2-3.12.3'''
 
''Security Control Monitoring''
 
Monitor security controls on an ongoing basis
 
to determine the continued effectiveness of
 
the controls.
 
• NIST SP 800-171 Rev 2 3.12.3<br />
'''CA.L2-3.12.4'''
 
''System Security Plan''
 
Develop, document, and periodically update
 
system security plans that describe system
 
boundaries, system environments of
 
operation, how security requirements are
 
implemented, and the relationships with or
 
connections to other systems.
 
• NIST SP 800-171 Rev 2 3.12.4
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
36
 
'''SYSTEM AND COMMUNICATIONS PROTECTION (SC)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''SC.L1-b.1.x'''
 
''Boundary Protection [FCI Data]''
 
Monitor, control, and protect organizational
 
communications (i.e., information
 
transmitted or received by organizational
 
information systems) at the external
 
boundaries and key internal boundaries of
 
the information systems.
 
• FAR Clause 52.204-21 b.1.x
 
• NIST SP 800-171 Rev 2 3.13.1
 
'''SC.L2-3.13.1'''
 
''Boundary Protection [CUI Data]''
 
Monitor, control, and protect organizational
 
communications (i.e., information
 
transmitted or received by organizational
 
information systems) at the external
 
boundaries and key internal boundaries of
 
the information systems.
 
• NIST SP 800-171 Rev 2 3.13.1
 
• FAR Clause 52.204-21 b.1.x
 
'''SC.L3-3.13.4e'''
 
''Isolation''
 
Employ physical isolation techniques or
 
logical isolation techniques or both in
 
organizational systems and system
 
components.
 
• NIST SP 800-172 3.13.4e
 
'''SC.L1-b.1.xi'''
 
''Public-Access System Separation [FCI Data]''
 
Implement subnetworks for publicly
 
accessible system components that are
 
physically or logically separated from internal
 
networks.
 
• FAR Clause 52.204-21 b.1.xi
 
• NIST SP 800-171 Rev 2 3.13.5
 
'''SC.L2-3.13.2'''
 
''Security Engineering''
 
Employ architectural designs, software
 
development techniques, and systems
 
engineering principles that promote effective
 
information security within organizational
 
systems.
 
• NIST SP 800-171 Rev 2 3.13.2<br />
'''SC.L2-3.13.3'''
 
''Role Separation''
 
Separate user functionality from system
 
management functionality.
 
• NIST SP 800-171 Rev 2 3.13.3<br />
'''SC.L2-3.13.4'''
 
''Shared Resource Control''
 
Prevent unauthorized and unintended
 
information transfer via shared system
 
resources.
 
• NIST SP 800-171 Rev 2 3.13.4<br />
'''SC.L2-3.13.5'''
 
''Public-Access System Separation [CUI Data]''
 
Implement subnetworks for publicly
 
accessible system components that are
 
physically or logically separated from internal
 
networks.
 
• NIST SP 800-171 Rev 2 3.13.5
 
• FAR Clause 52.204-21 b.1.xi<br />
'''SC.L2-3.13.6'''
 
''Network Communication by Exception''
 
Deny network communications traffic by
 
default and allow network communications
 
traffic by exception (i.e., deny all, permit by
 
exception).
 
• NIST SP 800-171 Rev 2 3.13.6<br />
'''SC.L2-3.13.7'''
 
''Split Tunneling''
 
Prevent remote devices from simultaneously
 
establishing non-remote connections with
 
organizational systems and communicating
 
via some other connection to resources in
 
external networks (i.e., split tunneling).
 
• NIST SP 800-171 Rev 2 3.13.7
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
37
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''SC.L2-3.13.8'''
 
''Data in Transit''
 
Implement cryptographic mechanisms to
 
prevent unauthorized disclosure of CUI
 
during transmission unless otherwise
 
protected by alternative physical safeguards.
 
• NIST SP 800-171 Rev 2 3.13.8<br />
'''SC.L2-3.13.9'''
 
''Connections Termination''
 
Terminate network connections associated
 
with communications sessions at the end of
 
the sessions or after a defined period of
 
inactivity.
 
• NIST SP 800-171 Rev 2 3.13.9<br />
'''SC.L2-3.13.10'''
 
''Key Management''
 
Establish and manage cryptographic keys for
 
cryptography employed in organizational
 
systems.
 
• NIST SP 800-171 Rev 2 3.13.10<br />
'''SC.L2-3.13.11'''
 
''CUI Encryption''
 
Employ FIPS-validated cryptography when
 
used to protect the confidentiality of CUI.
 
• NIST SP 800-171 Rev 2 3.13.11<br />
'''SC.L2-3.13.12'''
 
''Collaborative Device Control''
 
Prohibit remote activation of collaborative
 
computing devices and provide indication of
 
devices in use to users present at the device.
 
• NIST SP 800-171 Rev 2 3.13.12<br />
'''SC.L2-3.13.13'''
 
''Mobile Code''
 
Control and monitor the use of mobile code.
 
• NIST SP 800-171 Rev 2 3.13.13<br />
'''SC.L2-3.13.14'''
 
''Voice over Internet Protocol''
 
Control and monitor the use of Voice over
 
Internet Protocol (VoIP) technologies.
 
• NIST SP 800-171 Rev 2 3.13.14<br />
'''SC.L2-3.13.15'''
 
''Communications Authenticity''
 
Protect the authenticity of communications
 
sessions.
 
• NIST SP 800-171 Rev 2 3.13.15<br />
'''SC.L2-3.13.16'''
 
''Data at Rest''
 
Protect the confidentiality of CUI at rest.
 
• NIST SP 800-171 Rev 2 3.13.16
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
38
 
'''SYSTEM AND INFORMATION INTEGRITY (SI)'''
 
'''Level 1 '''
 
'''Level 2 '''
 
'''Level 3 '''
 
'''SI.L1-b.1.xii'''
 
''Flaw Remediation [FCI Data]''
 
Identify, report, and correct information and
 
information system flaws in a timely manner.
 
• FAR Clause 52.204-21 b.1.xii
 
• NIST SP 800-171 Rev 2 3.14.1
 
'''SI.L2-3.14.1'''
 
''Flaw Remediation [CUI Data]''
 
Identify, report, and correct system flaws in a
 
timely manner.
 
• NIST SP 800-171 Rev 2 3.14.1
 
• FAR Clause 52.204-21 b.1.xii
 
'''SI.L3-3.14.1e'''
 
''Integrity Verification''
 
Verify the integrity of security critical and
 
essential software using root of trust
 
mechanisms or cryptographic signatures.
 
• NIST SP 800-172 3.14.1e
 
'''SI.L1-b.1.xiii'''
 
''Malicious Code Protection [FCI Data]''
 
Provide protection from malicious code at
 
appropriate locations within organizational
 
information systems.
 
• FAR Clause 52.204-21 b.1.xiii
 
• NIST SP 800-171 Rev 2 3.14.2
 
'''SI.L2-3.14.2'''
 
''Malicious Code Protection [CUI Data]''
 
Provide protection from malicious code at
 
designated locations within organizational
 
systems.
 
• NIST SP 800-171 Rev 2 3.14.2
 
• FAR Clause 52.204-21 b.1.xiii
 
'''SI.L3-3.14.3e'''
 
''Specialized Asset Security''
 
Include specialized assets such as IoT, IIoT,
 
OT, GFE, Restricted Information Systems and
 
test equipment in the scope of the specified
 
enhanced security requirements or are
 
segregated in purpose-specific networks. 
 
• NIST SP 800-172 3.14.3e
 
'''SI.L1-b.1.xiv'''
 
''Update Malicious Code Protection [FCI Data]''
 
Update malicious code protection
 
mechanisms when new releases are
 
available.
 
• FAR Clause 52.204-21 b.1.xiv
 
• NIST SP 800-171 Rev 2 3.14.4
 
'''SI.L2-3.14.3'''
 
''Security Alerts &amp; Advisories''
 
Monitor system security alerts and advisories
 
and take action in response.
 
• NIST SP 800-171 Rev 2 3.14.3
 
'''SI.L3-3.14.6e'''
 
''Threat-Guided Intrusion Detection''
 
Use threat indicator information and
 
effective mitigations obtained from, at a
 
minimum, open or commercial sources, and
 
any DoD-provided sources, to guide and
 
inform intrusion detection and threat
 
hunting.
 
• NIST SP 800-172 3.14.6e
 
'''SI.L1-b.1.xv'''
 
''System &amp; File Scanning [FCI Data]''
 
Perform periodic scans of the information
 
system and real-time scans of files from
 
external sources as files are downloaded,
 
opened, or executed.
 
• FAR Clause 52.204-21 b.1.xv
 
• NIST SP 800-171 Rev 2 3.14.5
 
'''SI.L2-3.14.4'''
 
''Update Malicious Code Protection [CUI Data]''
 
Update malicious code protection
 
mechanisms when new releases are
 
available.
 
• NIST SP 800-171 Rev 2 3.14.4
 
• FAR Clause 52.204-21 b.1.xiv
 
'''SI.L2-3.14.5'''
 
''System &amp; File Scanning [CUI Data]''
 
Perform periodic scans of organizational
 
systems and real-time scans of files from
 
external sources as files are downloaded,
 
opened, or executed.
 
• NIST SP 800-171 Rev 2 3.14.5
 
• FAR Clause 52.204-21 b.1.xv <br />
'''SI.L2-3.14.6'''
 
''Monitor Communications for Attacks''
 
Monitor organizational systems, including
 
inbound and outbound communications
 
traffic, to detect attacks and indicators of
 
potential attacks.
 
• NIST SP 800-171 Rev 2 3.14.6<br />
'''SI.L2-3.14.7'''
 
''Identify Unauthorized Use''
 
Identify unauthorized use of organizational
 
systems. 
 
• NIST SP 800-171 Rev 2 3.14.7
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
39
 
Appendix B. Abbreviations and Acronyms
 
The following is a list of acronyms used in the CMMC model. <br />
AC
 
Access Control
 
APT
 
Advanced Persistent Threat
 
AT
 
Awareness and Training
 
AU
 
Audit and Accountability
 
CA
 
Security Assessment
 
CFR
 
Code of Federal Regulations
 
CM
 
Configuration Management
 
CMMC
 
Cybersecurity Maturity Model Certification
 
CUI
 
Controlled Unclassified Information
 
DFARS
 
Defense Federal Acquisition Regulation Supplement
 
DIB
 
Defense Industrial Base
 
DoD
 
Department of Defense
 
FAR
 
Federal Acquisition Regulation
 
FCI
 
Federal Contract Information
 
FFRDC
 
Federally Funded Research and Development Center
 
FIPS
 
Federal Information Processing Standard
 
IA
 
Identification and Authentication
 
IR
 
Incident Response
 
L#
 
Level Number
 
MA
 
Maintenance
 
MP
 
Media Protection
 
N/A
 
Not Applicable (NA)
 
NIST
 
National Institute of Standards and Technology
 
OUSD A&amp;S
 
Office of the Under Secretary of Defense for Acquisition and
 
Sustainment
 
PE
 
Physical Protection
 
PS
 
Personnel Security
 
PUB
 
Publication
 
Rev
 
Revision
 
RA
 
Risk Assessment
 
SC
 
System and Communications Protection
 
SI
 
System and Information Integrity
 
SP
 
Special Publication
 
UARC
 
University Affiliated Research Center
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
40
 
U.S.
 
United States
 
VoIP
 
Voice over Internet Protocol
 
Vol.
 
Volume
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
41
 
Appendix C. References
 
1. U.S. Executive Office of the President, Council of Economic Advisers (CEA), ''The Cost of''
 
''Malicious Cyber Activity to the U.S. Economy'', available online at
 
https://www.whitehouse.gov/wp-content/uploads/2018/02/The-Cost-of-Malicious-
 
Cyber-Activity-to-the-U.S.-Economy.pdf, February 2018
 
2. Center for Strategic and International Studies (CSIS) and McAfee, ''Economic Impact of''
 
''Cybercrime - No Slowing Down'', February 2018
 
3. 48 Code of Federal Regulations (CFR) 52.204-21, ''Basic Safeguarding of Covered''
 
''Contractor Information Systems'', Federal Acquisition Regulation (FAR), 1 Oct 2016
 
4. NIST Special Publication (SP) 800-171 Revision (Rev) 2, ''Protecting Controlled''
 
''Unclassified Information in Nonfederal Systems and Organizations'', U.S. Department of
 
Commerce National Institute of Standards and Technology (NIST), December 2016
 
(updated June 2018)
 
5. NIST SP 800-172, ''Enhanced Security Requirements for Protecting Controlled Unclassified''
 
''Information: A Supplement to NIST Special Publication 800-171'', U.S. Department of
 
Commerce National Institute of Standards and Technology (NIST), February 2021
 
 
 
 
 
 
 
 
Cybersecurity Maturity Model Certification (CMMC) Model Overview | Version 2.13
 
42
 
''This page intentionally left blank. ''
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
= Document Outline =
 
* [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#4|1. Introduction]]
** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#5|1.1 Document Organization]]
** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#5|1.2 Supporting Documents]]
* [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#6|2. CMMC Model]]
** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#6|2.1 Overview]]
** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#6|2.2 CMMC Levels]]
*** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#6|2.2.1 Descriptions]]
*** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#7|2.2.2 CMMC Overview]]
*** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#7|2.2.3 Level 1]]
*** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#7|2.2.4 Level 2]]
*** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#8|2.2.5. Level 3]]
** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#8|2.3 CMMC Domains]]
** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#9|2.4 CMMC Security Requirements]]
*** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#9|2.4.1. List of Security Requirements]]
**** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#21|Appendix A. CMMC Model Matrix]]
**** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#42|Appendix B. Abbreviations and Acronyms]]
**** [[1dce2d5a871a06301b3b98b554dfccecca1987d9.html#44|Appendix C. References]]


== Appendix B. Abbreviations and Acronyms ==
The following is a list of acronyms used in the CMMC model.
{| class="wikitable" style="margin:auto"
|-
|| AC || Access Control
|-
|| APT || Advanced Persistent Threat
|-
|| AT || Awareness and Training
|-
|| AU || Audit and Accountability
|-
|| CA || Security Assessment
|-
|| CFR || Code of Federal Regulations
|-
|| CM || Configuration Management
|-
|| CMMC || Cybersecurity Maturity Model Certification
|-
|| CUI || Controlled Unclassified Information
|-
|| DFARS || Defense Federal Acquisition Regulation Supplement
|-
|| DIB || Defense Industrial Base
|-
|| DoD || Department of Defense FAR Federal Acquisition Regulation
|-
|| FCI || Federal Contract Information
|-
|| FFRDC || Federally Funded Research and Development Center
|-
|| FIPS || Federal Information Processing Standard
|-
|| IA || Identification and Authentication
|-
|| IR || Incident Response
|-
|| L# || Level Number
|-
|| MA || Maintenance
|-
|| MP || Media Protection
|-
|| N/A || Not Applicable (NA)
|-
|| NIST || National Institute of Standards and Technology
|-
|| OUSD A&S || Office of the Under Secretary of Defense for Acquisition and Sustainment
|-
|| PE || Physical Protection
|-
|| PS || Personnel Security
|-
|| PUB || Publication
|-
|| Rev || Revision
|-
|| RA || Risk Assessment
|-
|| SC || System and Communications Protection
|-
|| SI || System and Information Integrity
|-
|| SP || Special Publication
|-
|| UARC || University Affiliated Research Center
|}


-----
== Appendix C. References ==
# U.S. Executive Office of the President, Council of Economic Advisers (CEA), ''The Cost of Malicious Cyber Activity to the U.S. Economy'', available online at https://www.whitehouse.gov/wp-content/uploads/2018/02/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf, February 2018
# Center for Strategic and International Studies (CSIS) and McAfee, ''Economic Impact of Cybercrime - No Slowing Down'', February 2018
# 48 Code of Federal Regulations (CFR) 52.204-21, ''Basic Safeguarding of Covered Contractor Information Systems'', Federal Acquisition Regulation (FAR), 1 Oct 2016
# NIST Special Publication (SP) 800-171 Revision (Rev) 2, ''Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations'', U.S. Department of Commerce National Institute of Standards and Technology (NIST), December 2016 (updated June 2018)
# NIST SP 800-172, ''Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171'', U.S. Department of Commerce National Institute of Standards and Technology (NIST), February 2021


Original source: https://dodcio.defense.gov/Portals/0/Documents/CMMC/ModelOverviewv2.pdf
== Notes ==
<references />

Latest revision as of 03:51, 25 March 2025

Source of Reference: The official CMMC Model Overview Version 2.13, September 2024 from the Department of Defense Chief Information Officer (DoD CIO).

For inquiries and reporting errors on this wiki, please contact us. Thank you.

NOTICES

The contents of this document do not have the force and effect of law and are not meant to bind the public in any way. This document is intended only to provide clarity to the public regarding existing CMMC security requirements under the law or departmental policies.

DISTRIBUTION STATEMENT A. Approved for public release. Distribution is unlimited.

1. Introduction

The theft of intellectual property and sensitive information from all industrial sectors because of malicious cyber activity threatens economic security and national security. The Council of Economic Advisors estimates that malicious cyber activity cost the U.S. economy between $57 billion and $109 billion in 2016 [1]. The Center for Strategic and International Studies estimates that the total global cost of cybercrime was as high as $600 billion in 2017 [2]. Over a ten-year period, that burden would equate to an estimated $570 billion to $1.09 trillion dollars in costs.

Malicious cyber actors have targeted and continue to target the Defense Industrial Base (DIB) sector and the Department of Defense (DoD) supply chain. These attacks not only focus on the large prime contractors, but also target subcontractors that make up the lower tiers of the DoD supply chain. Many of these subcontractors are small entities that provide critical support and innovation. Overall, the DIB sector consists of over 220,000 companies[1] that process, store, or transmit Controlled Unclassified Information (CUI) or Federal Contract Information (FCI) in support of the warfighter and contribute towards the research, engineering, development, acquisition, production, delivery, sustainment, and operations of DoD systems, networks, installations, capabilities, and services. The aggregate loss of intellectual property and controlled unclassified information from the DoD supply chain can undercut U.S. technical advantages and innovation, as well as significantly increase the risk to national security.

As part of multiple lines of effort focused on the security and resiliency of the DIB sector, the DoD is working with industry to enforce the safeguarding requirements of the following types of unclassified information within the supply chain:

  • Federal Contract Information (FCI): is defined in 32 CFR § 170.4 and 48 CFR 4.1901 [3].
  • Controlled Unclassified Information (CUI): is defined in 32 CFR § 2002.4 (h) [4].

To this end, the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)) and DoD Chief Information Officer (CIO) have developed the Cybersecurity Maturity Model Certification (CMMC) in concert with DoD stakeholders, University Affiliated Research Centers (UARCs), Federally Funded Research and Development Centers (FFRDCs), and the DIB sector.

This document focuses on the Cybersecurity Maturity Model Certification (CMMC) Model as set forth in section 170.14 of title 32, Code of Federal Regulations (CFR). The model incorporates the security requirements from: 1) FAR 52.204-21, Basic Safeguarding of Covered Contractor Information Systems, 2) NIST SP 800-171 Rev 2, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, and 3) a subset of the requirements from NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171. The CMMC Program is designed to provide increased assurance to the DoD that defense contractors and subcontractors are compliant with information protection requirements for FCI and CUI, and are protecting such information at a level commensurate with risk from cybersecurity threats, including Advanced Persistent Threats (APTs).

When implementing the CMMC model, an organization can achieve a specific CMMC level for its entire enterprise network or for a particular enclave(s), depending on where the information to be protected is handled and stored.

1.1 Document Organization

Section 2 presents the CMMC Model and each of its elements in detail.Appendix A provides the model as a matrix and maps the CMMC model to other secondary sources. Appendix B lists the abbreviations and acronyms. Finally, Appendix C provides the references contained in this document.

1.2 Supporting Documents

This document is supported by multiple companion documents that provide additional information. The CMMC Assessment Guides present assessment objectives, discussion, examples, potential assessment considerations, and key references for each CMMC security requirement. The CMMC Scoping Guides provide additional guidance on how to correctly scope an assessment. The CMMC Hashing Guide provides information on how to create the hash to validate the integrity of archived assessment artifacts.

These supplemental documents are intended to provide explanatory information to assist organizations with implementing and assessing the security requirements covered by CMMC in 32 CFR § 170. The documents are not prescriptive and their use is optional. Implementation of security requirements by following any examples is not a guarantee of compliance with any CMMC security requirement or objective.

2. CMMC Model

2.1 Overview

The CMMC Model incorporates the security requirements from: 1) FAR 52.204-21, Basic Safeguarding of Covered Contractor Information Systems, 2) NIST SP 800-171 Rev 2, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, and 3) a subset of the requirements from NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800—171. These source documents may be revised in the future, however the CMMC security requirements will remain unchanged until the CMMC final rule is published. Any further modifications to the CMMC rule will follow appropriate rulemaking procedures.

The CMMC Model consists of domains that map to the Security Requirement Families defined in NIST SP 800-171 Rev 2.

2.2 CMMC Levels

There are three levels within CMMC – Level 1, Level 2, and Level 3.

2.2.1 Descriptions

The CMMC model measures the implementation of cybersecurity requirements at three levels. Each level is independent and consists of a set of CMMC security requirements as set forth in 32 CFR § 170.14 (c):

  • Level 1 Requirements. The security requirements in Level 1 are those set forth in FAR clause 52.204-21(b)(1)(i) – (b)(1)(xv).
  • Level 2 Requirements. The security requirements in Level 2 are identical to the requirements in NIST SP 800-171 Rev 2.
  • Level 3 Requirements. The security requirements in Level 3 are derived from NIST SP 800-172 with DoD-approved parameters where applicable, as identified in 32 CFR § 170.14(c)(4). DoD defined selections and parameters for the NIST SP 800-172 requirements are italicized, where applicable.

2.2.2 CMMC Overview

Figure 1. CMMC Level Overview

2.2.3 Level 1

Level 1 focuses on the protection of FCI and consists of the security requirements that correspond to the 15 basic safeguarding requirements specified in 48 CFR 52.204-21, commonly referred to as the FAR Clause.

2.2.4 Level 2

Level 2 focuses on the protection of CUI and incorporates the 110 security requirements specified in NIST SP 800-171 Rev 2.

2.2.5 Level 3

Level 3 focuses on the protection of CUI and encompasses a subset of the NIST SP 800-172 security requirements [5] with DoD-approved parameters. DoD-approved parameters are denoted with underlining in section 2.4.1 below.

2.3 CMMC Domains

The CMMC model consists of 14 domains that align with the families specified in NIST SP 800-171 Rev 2. These domains and their abbreviations are as follows:

  • Access Control (AC)
  • Awareness & Training (AT)
  • Audit & Accountability (AU)
  • Configuration Management (CM)
  • Identification & Authentication (IA)
  • Incident Response (IR)
  • Maintenance (MA)
  • Media Protection (MP)
  • Personnel Security (PS)
  • Physical Protection (PE)
  • Risk Assessment (RA)
  • Security Assessment (CA)
  • System and Communications Protection (SC)
  • System and Information Integrity (SI)

2.4 CMMC Security Requirements

2.4.1. List of Security Requirements

This subsection itemizes the security requirements for each domain and at each level. Each requirement has a requirement identification number in the format – DD.L#-REQ – where:

  • DD is the two-letter domain abbreviation;
  • L# is the level number; and
  • REQ is the FAR Clause 52.204-21 paragraph number, NIST SP 800-171 Rev 2, or NIST SP800-172 security requirement number.

Below the identification number, a short name identifier is provided for each requirement, meant to be used for quick reference only. Finally, each requirement has a complete requirement statement.

Access Control (AC)

ACCESS CONTROL (AC)
Level 1 Description
AC.L1-b.1.i
Authorized Access Control [FCI Data]
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
AC.L1-b.1.ii
Transaction & Function Control [FCI Data]
Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
AC.L1-b.1.iii
External Connections [FCI Data]
Verify and control/limit connections to and use of external information systems.
AC.L1-b.1.iv
Control Public Information [FCI Data]
Control information posted or processed on publicly accessible information systems.
Level 2 Description
AC.L2-3.1.1
Authorized Access Control [CUI Data]
Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems).
AC.L2-3.1.2
Transaction & Function Control [CUI Data]
Limit system access to the types of transactions and functions that authorized users are permitted to execute.
AC.L2-3.1.3
Control CUI Flow
Control the flow of CUI in accordance with approved authorizations.
AC.L2-3.1.4
Separation of Duties
Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
AC.L2-3.1.5
Least Privilege
Employ the principle of least privilege, including for specific security functions and privileged accounts.
AC.L2-3.1.6
Non-Privileged Account Use
Use non-privileged accounts or roles when accessing nonsecurity functions.
AC.L2-3.1.7
Privileged Functions
Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
AC.L2-3.1.8
Unsuccessful Logon Attempts
Limit unsuccessful logon attempts.
AC.L2-3.1.9
Privacy & Security Notices
Provide privacy and security notices consistent with applicable CUI rules.
AC.L2-3.1.10
Session Lock
Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
AC.L2-3.1.11
Session Termination
Terminate (automatically) a user session after a defined condition.
AC.L2-3.1.12
Control Remote Access
Monitor and control remote access sessions.
AC.L2-3.1.13
Remote Access Confidentiality
Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
AC.L2-3.1.14
Remote Access Routing
Route remote access via managed access control points.
AC.L2-3.1.15
Privileged Remote Access
Authorize remote execution of privileged commands and remote access to security-relevant information.
AC.L2-3.1.16
Wireless Access Authorization
Authorize wireless access prior to allowing such connections.
AC.L2-3.1.17
Wireless Access Protection
Protect wireless access using authentication and encryption.
AC.L2-3.1.18
Mobile Device Connection
Control connection of mobile devices.
AC.L2-3.1.19
Encrypt CUI on Mobile
Encrypt CUI on mobile devices and mobile computing platforms.
AC.L2-3.1.20
External Connections [CUI Data]
Verify and control/limit connections to and use of external systems.
AC.L2-3.1.21
Portable Storage Use
Limit use of portable storage devices on external systems.
AC.L2-3.1.22
Control Public Information [CUI Data]
Control CUI posted or processed on publicly accessible systems.
Level 3 Description
AC.L3-3.1.2e
Organizationally Controlled Assets
Restrict access to systems and system components to only those information resources that are owned, provisioned, or issued by the organization.
AC.L3-3.1.3e
Secured Information Transfer
Employ secure information transfer solutions to control information flows between security domains on connected systems.

Awareness & Training (AT)

AWARENESS AND TRAINING (AT)
Level 2 Description

AT.L2-3.2.1
Role-Based Risk Awareness

Inform managers, systems administrators, and users of organizational systems of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems.

AT.L2-3.2.2
Role-Based Training

Train personnel to carry out their assigned information security-related duties and responsibilities.

AT.L2-3.2.3
Insider Threat Awareness

Provide security awareness training on recognizing and reporting potential indicators of insider threat.

Level 3 Description

AT.L3-3.2.1e
Advanced Threat Awareness

Provide awareness training upon initial hire, following a significant cyber event, and at least annually, focused on recognizing and responding to threats from social engineering, advanced persistent threat actors, breaches, and suspicious behaviors; update the training at least annually or when there are significant changes to the threat.

AT.L3-3.2.2e
Practical Training Exercises

Include practical exercises in awareness training for all users, tailored by roles, to include general users, users with specialized roles, and privileged users, that are aligned with current threat scenarios and provide feedback to individuals involved in the training and their supervisors.

Audit & Accountability (AU)

AUDIT AND ACCOUNTABILITY (AU)
Level 2 Description

AU.L2-3.3.1
System Auditing

Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity.

AU.L2-3.3.2
User Accountability

Uniquely trace the actions of individual system users, so they can be held accountable for their actions.

AU.L2-3.3.3
Event Review

Review and update logged events.

AU.L2-3.3.4
Audit Failure Alerting

Alert in the event of an audit logging process failure.

AU.L2-3.3.5
Audit Correlation

Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.

AU.L2-3.3.6
Reduction & Reporting

Provide audit record reduction and report generation to support on-demand analysis and reporting.

AU.L2-3.3.7
Authoritative Time Source

Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records.

AU.L2-3.3.8
Audit Protection

Protect audit information and audit logging tools from unauthorized access, modification, and deletion.

AU.L2-3.3.9
Audit Management

Limit management of audit logging functionality to a subset of privileged users.

Configuration Management (CM)

CONFIGURATION MANAGEMENT (CM)
Level 2 Description

CM.L2-3.4.1
System Baselining

Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles.

CM.L2-3.4.2
Security Configuration Enforcement

Establish and enforce security configuration settings for information technology products employed in organizational systems.

CM.L2-3.4.3
System Change Management

Track, review, approve or disapprove, and log changes to organizational systems.

CM.L2-3.4.4
Security Impact Analysis

Analyze the security impact of changes prior to implementation.

CM.L2-3.4.5
Access Restrictions for Change

Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems.

CM.L2-3.4.6
Least Functionality

Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities.

CM.L2-3.4.7
Nonessential Functionality

Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services.

CM.L2-3.4.8
Application Execution Policy

Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (whitelisting) policy to allow the execution of authorized software.

CM.L2-3.4.9
User-Installed Software

Control and monitor user-installed software.

Level 3 Description

CM.L3-3.4.1e
Authoritative Repository

Establish and maintain an authoritative source and repository to provide a trusted source and accountability for approved and implemented system components.

CM.L3-3.4.2e
Automated Detection & Remediation

Employ automated mechanisms to detect misconfigured or unauthorized system components; after detection, remove the components or place the components in a quarantine or remediation network to facilitate patching, re-configuration, or other mitigations.

CM.L3-3.4.3e
Automated Inventory

Employ automated discovery and management tools to maintain an up-to-date, complete, accurate, and readily available inventory of system components.

Identification & Authentication (IA)

IDENTIFICATION AND AUTHENTICATION (IA)
Level 1 Description

IA.L1-b.1.v
Identification [FCI Data]

Identify information system users, processes acting on behalf of users, or devices.

IA.L1-b.1.vi
Authentication [FCI Data]

Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.

Level 2 Description

IA.L2-3.5.1
Identification [CUI Data]

Identify system users, processes acting on behalf of users, and devices.

IA.L2-3.5.2
Authentication [CUI Data]

Authenticate (or verify) the identities of users, processes, or devices, as a prerequisite to allowing access to organizational systems.

IA.L2-3.5.3
Multifactor Authentication

Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.

IA.L2-3.5.4
Replay-Resistant Authentication

Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.

IA.L2-3.5.5
Identifier Reuse

Prevent reuse of identifiers for a defined period.

IA.L2-3.5.6
Identifier Handling

Disable identifiers after a defined period of inactivity.

IA.L2-3.5.7
Password Complexity

Enforce a minimum password complexity and change of characters when new passwords are created.

IA.L2-3.5.8
Password Reuse

Prohibit password reuse for a specified number of generations.

IA.L2-3.5.9
Temporary Passwords

Allow temporary password use for system logons with an immediate change to a permanent password.

IA.L2-3.5.10
Cryptographically-Protected Passwords

Store and transmit only cryptographically protected passwords.

IA.L2-3.5.11
Obscure Feedback

Obscure feedback of authentication information.

Level 3 Description

IA.L3-3.5.1e
Bidirectional Authentication

Identify and authenticate systems and system components, where possible, before establishing a network connection using bidirectional authentication that is cryptographically based and replay resistant.

IA.L3-3.5.3e
Block Untrusted Assets

Employ automated or manual/procedural mechanisms to prohibit system components from connecting to organizational systems unless the components are known, authenticated, in a properly configured state, or in a trust profile.

Incident Response (IR)

INCIDENT RESPONSE (IR)
Level 2 Description

IR.L2-3.6.1
Incident Handling

Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities.

IR.L2-3.6.2
Incident Reporting

Track, document, and report incidents to designated officials and/or authorities both internal and external to the organization.

IR.L2-3.6.3
Incident Response Testing

Test the organizational incident response capability.

Level 3 Description

IR.L3-3.6.1e
Security Operations Center

Establish and maintain a security operations center capability that operates 24/7, with allowance for remote/on-call staff.

IR.L3-3.6.2e
Cyber Incident Response Team

Establish and maintain a cyber incident response team that can be deployed by the organization within 24 hours.

Maintenance (MA)

MAINTENANCE (MA)
Level 2 Description

MA.L2-3.7.1
Perform Maintenance

Perform maintenance on organizational systems.

MA.L2-3.7.2
System Maintenance Control

Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance.

MA.L2-3.7.3
Equipment Sanitization

Sanitize equipment removed for off-site maintenance of any CUI.

MA.L2-3.7.4
Media Inspection

Check media containing diagnostic and test programs for malicious code before the media are used in organizational systems.

MA.L2-3.7.5
Nonlocal Maintenance

Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete.

MA.L2-3.7.6
Maintenance Personnel

Supervise the maintenance activities of maintenance personnel without required access authorization.

Media Protection (MP)

MEDIA PROTECTION (MP)
Level 1 Description

MP.L1-b.1.vii
Media Disposal [FCI Data]

Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse.

Level 2 Description

MP.L2-3.8.1
Media Protection

Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital.

MP.L2-3.8.2
Media Access

Limit access to CUI on system media to authorized users.

MP.L2-3.8.3
Media Disposal [CUI Data]

Sanitize or destroy system media containing CUI before disposal or release for reuse.

MP.L2-3.8.4
Media Markings

Mark media with necessary CUI markings and distribution limitations.

MP.L2-3.8.5
Media Accountability

Control access to media containing CUI and maintain accountability for media during transport outside of controlled areas.

MP.L2-3.8.6
Portable Storage Encryption

Implement cryptographic mechanisms to protect the confidentiality of CUI stored on digital media during transport unless otherwise protected by alternative physical safeguards.

MP.L2-3.8.7
Removable Media

Control the use of removable media on system components.

MP.L2-3.8.8
Shared Media

Prohibit the use of portable storage devices when such devices have no identifiable owner.

MP.L2-3.8.9
Protect Backups

Protect the confidentiality of backup CUI at storage locations.

Personnel Security (PS)

PERSONNEL SECURITY (PS)
Level 2 Description

PS.L2-3.9.1
Screen Individuals

Screen individuals prior to authorizing access to organizational systems containing CUI.

PS.L2-3.9.2
Personnel Actions

Protect organizational systems containing CUI during and after personnel actions such as terminations and transfers.

Level 3 Description

PS.L3-3.9.2e
Adverse Information

Protect organizational systems when adverse information develops or is obtained about individuals with access to CUI.

Physical Protection (PE)

PHYSICAL PROTECTION (PE)
Level 1 Description

PE.L1-b.1.viii
Limit Physical Access [FCI Data]

Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.

PE.L1-b.1.ix
First Phase
Second Phase
Third Phase
Manage Visitors & Physical Access [FCI Data]

Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices.

Level 2 Description

PE.L2-3.10.1
Limit Physical Access [CUI Data]

Limit physical access to organizational systems, equipment, and the respective operating environments to authorized individuals.

PE.L2-3.10.2
Monitor Facility

Protect and monitor the physical facility and support infrastructure for organizational systems.

PE.L2-3.10.3
Escort Visitors [CUI Data]

Escort visitors and monitor visitor activity.

PE.L2-3.10.4
Physical Access Logs [CUI Data]

Maintain audit logs of physical access.

PE.L2-3.10.5
Manage Physical Access [CUI Data]

Control and manage physical access devices.

PE.L2-3.10.6
Alternative Work Sites

Enforce safeguarding measures for CUI at alternate work sites.

Risk Assessment (RA)

RISK ASSESSMENT (RA)
Level 2 Description

RA.L2-3.11.1
Risk Assessments

Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI.

RA.L2-3.11.2
Vulnerability Scan

Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified.

RA.L2-3.11.3
Vulnerability Remediation

Remediate vulnerabilities in accordance with risk assessments.

Level 3 Description

RA.L3-3.11.1e
Threat-Informed Risk Assessment

Employ threat intelligence, at a minimum from open or commercial sources, and any DoD-provided sources, as part of a risk assessment to guide and inform the development of organizational systems, security architectures, selection of security solutions, monitoring, threat hunting, and response and recovery activities.

RA.L3-3.11.2e
Threat Hunting

Conduct cyber threat hunting activities on an on-going aperiodic basis or when indications warrant, to search for indicators of compromise in organizational systems and detect, track, and disrupt threats that evade existing controls.

RA.L3-3.11.3e
Advanced Risk Identification

Employ advanced automation and analytics capabilities in support of analysts to predict and identify risks to organizations, systems, and system components.

RA.L3-3.11.4e
Security Solution Rationale

Document or reference in the system security plan the security solution selected, the rationale for the security solution, and the risk determination.

RA.L3-3.11.5e
Security Solution Effectiveness

Assess the effectiveness of security solutions at least annually or upon receipt of relevant cyber threat information, or in response to a relevant cyber incident, to address anticipated risk to organizational systems and the organization based on current and accumulated threat intelligence.

RA.L3-3.11.6e
Supply Chain Risk Response

Assess, respond to, and monitor supply chain risks associated with organizational systems and system components.

RA.L3-3.11.7e
Supply Chain Risk Plan

Develop a plan for managing supply chain risks associated with organizational systems and system components; update the plan at least annually, and upon receipt of relevant cyber threat information, or in response to a relevant cyber incident.

Security Assessment (CA)

SECURITY ASSESSMENT (CA)
Level 2 Description

CA.L2-3.12.1
Security Control Assessment

Periodically assess the security controls in organizational systems to determine if the controls are effective in their application.

CA.L2-3.12.2
Operational Plan of Action

Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems.

CA.L2-3.12.3
Security Control Monitoring

Monitor security controls on an ongoing basis to determine the continued effectiveness of the controls.

CA.L2-3.12.4
System Security Plan

Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems.

Level 3 Description

CA.L3-3.12.1e
Penetration Testing

Conduct penetration testing at least annually or when significant security changes are made to the system, leveraging automated scanning tools and ad hoc tests using subject matter experts.

System and Communications Protection (SC)

SYSTEM AND COMMUNICATIONS PROTECTION (SC)
Level 1 Description

SC.L1-b.1.x
Boundary Protection [FCI Data]

Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.

SC.L1-b.1.xi
Public-Access System Separation [FCI Data]

Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.

Level 2 Description

SC.L2-3.13.1
Boundary Protection [CUI Data]

Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.

SC.L2-3.13.2
Security Engineering

Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems.

SC.L2-3.13.3
Role Separation

Separate user functionality from system management functionality.

SC.L2-3.13.4
Shared Resource Control

Prevent unauthorized and unintended information transfer via shared system resources.

SC.L2-3.13.5
Public-Access System Separation [CUI Data]

Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.

SC.L2-3.13.6
Network Communication by Exception

Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).

SC.L2-3.13.7
Split Tunneling

Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling).

SC.L2-3.13.8
Data in Transit

Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards.

SC.L2-3.13.9
Connections Termination

Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.

SC.L2-3.13.10
Key Management

Establish and manage cryptographic keys for cryptography employed in organizational systems.

SC.L2-3.13.11
CUI Encryption

Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.

SC.L2-3.13.12
Collaborative Device Control

Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.

SC.L2-3.13.13
Mobile Code

Control and monitor the use of mobile code.

SC.L2-3.13.14
Voice over Internet Protocol

Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.

SC.L2-3.13.15
Communications Authenticity

Protect the authenticity of communications sessions.

SC.L2-3.13.16
Data at Rest

Protect the confidentiality of CUI at rest.

Level 3 Description

SC.L3-3.13.4e
Isolation

Employ physical isolation techniques or logical isolation techniques or both in organizational systems and system components.

System and Information Integrity (SI)

SYSTEM AND INFORMATION INTEGRITY (SI)
Level 1 Description

SI.L1-b.1.xii
Flaw Remediation [FCI Data]

Identify, report, and correct information and information system flaws in a timely manner.

SI.L1-b.1.xiii
Malicious Code Protection [FCI Data]

Provide protection from malicious code at appropriate locations within organizational information systems.

SI.L1-b.1.xiv
Update Malicious Code Protection [FCI Data]

Update malicious code protection mechanisms when new releases are available.

SI.L1-b.1.xv
System & File Scanning [FCI Data]

Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

Level 2 Description

SI.L2-3.14.1
Flaw Remediation [CUI Data]

Identify, report, and correct system flaws in a timely manner.

SI.L2-3.14.2
Malicious Code Protection [CUI Data]

Provide protection from malicious code at designated locations within organizational systems.

SI.L2-3.14.3
Security Alerts & Advisories

Monitor system security alerts and advisories and take action in response.

SI.L2-3.14.4
Update Malicious Code Protection [CUI Data]

Update malicious code protection mechanisms when new releases are available.

SI.L2-3.14.5
System & File Scanning [CUI Data]

Perform periodic scans of organizational systems and real-time scans of files from external sources as files are downloaded, opened, or executed.

SI.L2-3.14.6
Monitor Communications for Attacks

Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.

SI.L2-3.14.7
Identify Unauthorized Use

Identify unauthorized use of organizational systems.

Level 3 Description

SI.L3-3.14.1e
Integrity Verification

Verify the integrity of security critical and essential software using root of trust mechanisms or cryptographic signatures.

SI.L3-3.14.3e
Specialized Asset Security

Include specialized assets such as IoT, IIoT, OT, GFE, Restricted Information Systems and test equipment in the scope of the specified enhanced security requirements or are segregated in purpose-specific networks.

SI.L3-3.14.6e
Threat-Guided Intrusion Detection

Use threat indicator information and effective mitigations obtained from, at a minimum, open or commercial sources, and any DoD-provided sources, to guide and inform intrusion detection and threat hunting.

Appendix A.

CMMC Model Matrix This appendix presents the model in matrix form by domain. The three columns list the associated security requirements for each CMMC level. Each level is independent and consists of a set of CMMC security requirements:

  • Level 1: the basic safeguarding requirements for FCI specified in FAR Clause 52.204-21.
  • Level 2: the security requirements for CUI specified in NIST SP 800-171 Rev 2 per DFARS Clause 252.204-7012
  • Level 3: selected enhanced security requirements for CUI specified in NIST SP 800-172 with DoD-approved parameters where applicable.

Each requirement is contained in a single cell. The requirement identification number is bolded at the top of each cell. The next line contains the requirement short name identifier, in italics, which is meant to be used for quick reference only. Below the short name is the complete CMMC security requirement statement. Some Level 3 requirement statements contain a DoD-approved parameter, which is underlined. Finally, the bulleted list at the bottom contains the FAR Clause 52.204-21, NIST SP 800-171 Rev 2, and NIST SP 800-172 reference as appropriate.

Access Control (AC)

Level 1 Level 2 Level 3
AC.L1-b.1.i

Authorized Access Control [FCI Data]
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).

  • FAR Clause 52.204-21 b.1.i
  • NIST SP 800-171 Rev 2 3.1.1
AC.L2-3.1.1

Authorized Access Control [CUI Data]
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).

  • NIST SP 800-171 Rev 2 3.1.1
  • FAR Clause 52.204-21 b.1.i
AC.L3-3.1.2e

Organizationally Controlled Assets
Restrict access to systems and system components to only those information resources that are owned, provisioned, or issued by the organization.

  • NIST SP 800-172 3.1.2e
AC.L1-b.1.ii

Transaction & Function Control [FCI Data]
Limit information system access to the types of transactions and functions that authorized users are permitted to execute.

  • FAR Clause 52.204-21 b.1.ii
  • NIST SP 800-171 Rev 2 3.1.2
AC.L2-3.1.2

Transaction & Function Control [CUI Data]
Limit information system access to the types of transactions and functions that authorized users are permitted to execute.

  • NIST SP 800-171 Rev 2 3.1.2
  • FAR Clause 52.204-21 b.1.ii
AC.L3-3.1.3e

Secured Information Transfer
Employ secure information transfer solutions to control information flows between security domains on connected systems.

  • NIST SP 800-172 3.1.3e
AC.L1-b.1.iii

External Connections [FCI Data]
Verify and control/limit connections to and use of external information systems.

  • FAR Clause 52.204-21 b.1.iii
  • NIST SP 800-171 Rev 2 3.1.20
AC.L2-3.1.3

Control CUI Flow [CUI Data]
Control the flow of CUI in accordance with approved authorizations.

  • NIST SP 800-171 Rev 2 3.1.3
AC.L1-b.1.iv

Control Public Information [FCI Data]
Control information posted or processed on publicly accessible information systems.

  • FAR Clause 52.204-21 b.1.iv
  • NIST SP 800-171 Rev 2 3.1.22
AC.L2-3.1.4

Separation of Duties
Separate the duties of individuals to reduce the risk of malevolent activity without collusion.

  • NIST SP 800-171 Rev 2 3.1.4
AC.L2-3.1.5

Least Privilege
Employ the principle of least privilege, including for specific security functions and privileged accounts.

  • NIST SP 800-171 Rev 2 3.1.5
AC.L2-3.1.6

Non-Privileged Account Use
Use non-privileged accounts or roles when accessing nonsecurity functions.

  • NIST SP 800-171 Rev 2 3.1.6
AC.L2-3.1.7

Privileged Functions
Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.

  • NIST SP 800-171 Rev 2 3.1.7
AC.L2-3.1.8

Unsuccessful Logon Attempts
Limit unsuccessful logon attempts.

  • NIST SP 800-171 Rev 2 3.1.8
AC.L2-3.1.9

Privacy & Security Notices
Provide privacy and security notices consistent with applicable CUI rules.

  • NIST SP 800-171 Rev 2 3.1.9
AC.L2-3.1.10

Session Lock
Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.

  • NIST SP 800-171 Rev 2 3.1.10
AC.L2-3.1.11

Session Termination
Terminate (automatically) a user session after a defined condition.

  • NIST SP 800-171 Rev 2 3.1.11
AC.L2-3.1.12

Control Remote Access
Monitor and control remote access sessions.

  • NIST SP 800-171 Rev 2 3.1.12
AC.L2-3.1.13

Remote Access Confidentiality
Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.

  • NIST SP 800-171 Rev 2 3.1.13
AC.L2-3.1.14

Remote Access Routing
Route remote access via managed access control points.

  • NIST SP 800-171 Rev 2 3.1.14
AC.L2-3.1.15

Privileged Remote Access
Authorize remote execution of privileged commands and remote access to security-relevant information.

  • NIST SP 800-171 Rev 2 3.1.15
AC.L2-3.1.16

Wireless Access Authorization
Authorize wireless access prior to allowing such connections.

  • NIST SP 800-171 Rev 2 3.1.16
AC.L2-3.1.17

Wireless Access Protection
Protect wireless access using authentication and encryption.

  • NIST SP 800-171 Rev 2 3.1.17
AC.L2-3.1.18

Mobile Device Connection
Control connection of mobile devices.

  • NIST SP 800-171 Rev 2 3.1.18
AC.L2-3.1.19

Encrypt CUI on Mobile
Encrypt CUI on mobile devices and mobile computing platforms.

  • NIST SP 800-171 Rev 2 3.1.19
AC.L2-3.1.20

External Connections
Verify and control/limit connections to and use of external information systems.

  • NIST SP 800-171 Rev 2 3.1.20
  • FAR Clause 52.204-21 b.1.iii
AC.L2-3.1.21

Portable Storage Use
Limit use of portable storage devices on external systems.

  • NIST SP 800-171 Rev 2 3.1.21
AC.L2-3.1.22

Control Public Information
Control information posted or processed on publicly accessible information systems.

  • NIST SP 800-171 Rev 2 3.1.22
  • FAR Clause 52.204-21 b.1.iv

Awareness and Training (AT)

Level 1 Level 2 Level 3
AT.L2-3.2.1

Role-Based Risk Awareness
Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems.

  • NIST SP 800-171 Rev 2 3.2.1
AT.L3-3.2.1e

Advanced Threat Awareness
Provide awareness training upon initial hire, following a significant cyber event, and at least annually, focused on recognizing and responding to threats from social engineering, advanced persistent threat actors, breaches, and suspicious behaviors; update the training at least annually or when there are significant changes to the threat.

  • NIST SP 800-172 3.2.1e
AT.L2-3.2.2

Role-Based Training
Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities.

  • NIST SP 800-171 Rev 2 3.2.2
AT.L3-3.2.2e

Practical Training Exercises
Include practical exercises in awareness training for all users, tailored by roles, to include general users, users with specialized roles, and privileged users, that are aligned with current threat scenarios and provide feedback to individuals involved in the training and their supervisors.

  • NIST SP 800-172 3.2.2e
AT.L2-3.2.3

Insider Threat Awareness
Provide security awareness training on recognizing and reporting potential indicators of insider threat.

  • NIST SP 800-171 Rev 2 3.2.3

Audit and Accountability (AU)

Level 1 Level 2 Level 3
AU.L2-3.3.1

System Auditing
Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity.

  • NIST SP 800-171 Rev 2 3.3.1
AU.L2-3.3.2

User Accountability
Ensure that the actions of individual system users can be uniquely traced to those users, so they can be held accountable for their actions.

  • NIST SP 800-171 Rev 2 3.3.2
AU.L2-3.3.3

Event Review
Review and update logged events.

  • NIST SP 800-171 Rev 2 3.3.3
AU.L2-3.3.4

Audit Failure Alerting
Alert in the event of an audit logging process failure.

  • NIST SP 800-171 Rev 2 3.3.4
AU.L2-3.3.5

Audit Correlation
Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.

  • NIST SP 800-171 Rev 2 3.3.5
AU.L2-3.3.6

Reduction & Reporting
Provide audit record reduction and report generation to support on-demand analysis and reporting.

  • NIST SP 800-171 Rev 2 3.3.6
AU.L2-3.3.7

Authoritative Time Source
Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records.

  • NIST SP 800-171 Rev 2 3.3.7
AU.L2-3.3.8

Audit Protection
Protect audit information and audit logging tools from unauthorized access, modification, and deletion.

  • NIST SP 800-171 Rev 2 3.3.8
AU.L2-3.3.9

Audit Management
Limit management of audit logging functionality to a subset of privileged users.

  • NIST SP 800-171 Rev 2 3.3.9

Configuration Management (CM)

Level 1 Level 2 Level 3
CM.L2-3.4.1

System Baselining
Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles.

  • NIST SP 800-171 Rev 2 3.4.1
CM.L3-3.4.1e

Authoritative Repository Establish and maintain an authoritative source and repository to provide a trusted source and accountability for approved and implemented system components.

  • NIST SP 800-172 3.4.1e
CM.L2-3.4.2

Security Configuration Enforcement
Establish and enforce security configuration settings for information technology products employed in organizational systems.

  • NIST SP 800-171 Rev 2 3.4.2
CM.L3-3.4.2e

Automated Detection & Remediation Employ automated mechanisms to detect misconfigured or unauthorized system components; after detection, remove the components or place the components in a quarantine or remediation network to facilitate patching, re-configuration, or other mitigations.

  • NIST SP 800-172 3.4.2e
CM.L2-3.4.3

System Change Management
Track, review, approve or disapprove, and log changes to organizational systems.

  • NIST SP 800-171 Rev 2 3.4.3
CM.L3-3.4.3e

Automated Inventory Employ automated discovery and management tools to maintain an up-to date, complete, accurate, and readily available inventory of system components.

  • NIST SP 800-172 3.4.3e
CM.L2-3.4.4

Security Impact Analysis
Analyze the security impact of changes prior to implementation.

  • NIST SP 800-171 Rev 2 3.4.4
CM.L2-3.4.5

Access Restrictions for Change
Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems.

  • NIST SP 800-171 Rev 2 3.4.5
CM.L2-3.4.6

Least Functionality
Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities.

  • NIST SP 800-171 Rev 2 3.4.6
CM.L2-3.4.7

Nonessential Functionality
Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services.

  • NIST SP 800-171 Rev 2 3.4.7
CM.L2-3.4.8

Application Execution Policy
Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (whitelisting) policy to allow the execution of authorized software.

  • NIST SP 800-171 Rev 2 3.4.8
CM.L2-3.4.9

User-Installed Software
Control and monitor user-installed software.

  • NIST SP 800-171 Rev 2 3.4.9

Identification and Authentication (IA)

Level 1 Level 2 Level 3
IA.L1-b.1.v

Identification [FCI Data]
Identify information system users, processes acting on behalf of users, or devices.

  • FAR Clause 52.204-21 b.1.v
  • NIST SP 800-171 Rev 2 3.5.1
IA.L2-3.5.1

Identification [CUI Data]
Identify information system users, processes acting on behalf of users, or devices.

  • NIST SP 800-171 Rev 2 3.5.1
  • FAR Clause 52.204-21 b.1.v
IA.L3-3.5.1e

Bidirectional Authentication
Identify and authenticate systems and system components, where possible, before establishing a network connection using bidirectional authentication that is cryptographically based and replay resistant.

  • NIST SP 800-172 3.5.1e
IA.L1-b.1.vi

Authentication [FCI Data]
Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.

  • FAR Clause 52.204-21 b.1.vi
  • NIST SP 800-171 Rev 2 3.5.2
IA.L2-3.5.2

Authentication [CUI Data]
Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.

  • NIST SP 800-171 Rev 2 3.5.2
  • FAR Clause 52.204-21 b.1.vi
IA.L3-3.5.3e

Block Untrusted Assets
Employ automated or manual/procedural mechanisms to prohibit system components from connecting to organizational systems unless the components are known, authenticated, in a properly configured state, or in a trust profile.

  • NIST SP 800-172 3.5.3e
IA.L2-3.5.3

Multifactor Authentication
Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.

  • NIST SP 800-171 Rev 2 3.5.3
IA.L2-3.5.4

Replay-Resistant Authentication
Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.

  • NIST SP 800-171 Rev 2 3.5.4
IA.L2-3.5.5

Identifier Reuse
Prevent reuse of identifiers for a defined period.

  • NIST SP 800-171 Rev 2 3.5.5
IA.L2-3.5.6

Identifier Handling
Disable identifiers after a defined period of inactivity.

  • NIST SP 800-171 Rev 2 3.5.6
IA.L2-3.5.7

Password Complexity
Enforce a minimum password complexity and change of characters when new passwords are created.

  • NIST SP 800-171 Rev 2 3.5.7
IA.L2-3.5.8

Password Reuse
Prohibit password reuse for a specified number of generations.

  • NIST SP 800-171 Rev 2 3.5.8
IA.L2-3.5.9

Temporary Passwords
Allow temporary password use for system logons with an immediate change to a permanent password.

  • NIST SP 800-171 Rev 2 3.5.9
IA.L2-3.5.10

Cryptographically-Protected Passwords Store and transmit only cryptographically protected passwords.

  • NIST SP 800-171 Rev 2 3.5.10
IA.L2-3.5.11

Obscure Feedback
Obscure feedback of authentication information.

  • NIST SP 800-171 Rev 2 3.5.11

Incident Response (IR)

Level 1 Level 2 Level 3
IR.L2-3.6.1

Incident Handling
Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities.

  • NIST SP 800-171 Rev 2 3.6.1
IR.L3-3.6.1e

Security Operations Center
Establish and maintain a security operations center capability that operates 24/7, with allowance for remote/on-call staff.

  • NIST SP 800-172 3.6.1e
IR.L2-3.6.2

Incident Reporting
Track, document, and report incidents to designated officials and/or authorities both internal and external to the organization.

  • NIST SP 800-171 Rev 2 3.6.2
IR.L3-3.6.2e

Cyber Incident Response Team
Establish and maintain a cyber incident response team that can be deployed by the organization within 24 hours.

  • NIST SP 800-172 3.6.2e
IR.L2-3.6.3

Incident Response Testing
Test the organizational incident response capability.

  • NIST SP 800-171 Rev 2 3.6.3

Maintenance (MA)

Level 1 Level 2 Level 3
MA.L2-3.7.1

Perform Maintenance
Perform maintenance on organizational systems.

  • NIST SP 800-171 Rev 2 3.7.1
MA.L2-3.7.2

System Maintenance Control
Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance.

  • NIST SP 800-171 Rev 2 3.7.2
MA.L2-3.7.3

Equipment Sanitization
Ensure equipment removed for off-site maintenance is sanitized of any CUI.

  • NIST SP 800-171 Rev 2 3.7.3
MA.L2-3.7.4

Media Inspection
Check media containing diagnostic and test programs for malicious code before the media are used in organizational systems.

  • NIST SP 800-171 Rev 2 3.7.4
MA.L2-3.7.5

Nonlocal Maintenance
Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete.

  • NIST SP 800-171 Rev 2 3.7.5
MA.L2-3.7.6

Maintenance Personnel
Supervise the maintenance activities of maintenance personnel without required access authorization.

  • NIST SP 800-171 Rev 2 3.7.6

Media Protection (MP)

Level 1 Level 2 Level 3
MP.L1-b.1.vii

Media Disposal [FCI Data]
Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse.

  • FAR Clause 52.204-21 b.1.vii
  • NIST SP 800-171 Rev 2 3.8.3
MP.L2-3.8.1

Media Protection
Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital.

  • NIST SP 800-171 Rev 2 3.8.1
MP.L2-3.8.2

Media Access
Limit access to CUI on system media to authorized users.

  • NIST SP 800-171 Rev 2 3.8.2
MP.L2-3.8.3

Media Disposal [CUI Data]
Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse.

  • NIST SP 800-171 Rev 2 3.8.3
  • FAR Clause 52.204-21 b.1.vii
MP.L2-3.8.4

Media Markings
Mark media with necessary CUI markings and distribution limitations.

  • NIST SP 800-171 Rev 2 3.8.4
MP.L2-3.8.5

Media Accountability
Control access to media containing CUI and maintain accountability for media during transport outside of controlled areas.

  • NIST SP 800-171 Rev 2 3.8.5
MP.L2-3.8.6

Portable Storage Encryption
Implement cryptographic mechanisms to protect the confidentiality of CUI stored on digital media during transport unless otherwise protected by alternative physical safeguards.

  • NIST SP 800-171 Rev 2 3.8.6
MP.L2-3.8.7

Removable Media
Control the use of removable media on system components.

  • NIST SP 800-171 Rev 2 3.8.7
MP.L2-3.8.8

Shared Media
Prohibit the use of portable storage devices when such devices have no identifiable owner.

  • NIST SP 800-171 Rev 2 3.8.8
MP.L2-3.8.9

Protect Backups
Protect the confidentiality of backup CUI at storage locations.

  • NIST SP 800-171 Rev 2 3.8.9

Personnel Security (PS)

Level 1 Level 2 Level 3
PS.L2-3.9.1

Screen Individuals
Screen individuals prior to authorizing access to organizational systems containing CUI.

  • NIST SP 800-171 Rev 2 3.9.1
PS.L3-3.9.2e

Adverse Information
Protect organizational systems when adverse information develops or is obtained about individuals with access to CUI.

  • NIST SP 800-172 3.9.2e
PS.L2-3.9.2

Personnel Actions
Ensure that organizational systems containing CUI are protected during and after personnel actions such as terminations and transfers.

  • NIST SP 800-171 Rev 2 3.9.2

Physical Protection (PE)

Level 1 Level 2 Level 3
PE.L1-b.1.viii

Limit Physical Access [FCI Data]
Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.

  • FAR Clause 52.204-21 b.1.viii
  • NIST SP 800-171 Rev 2 3.10.1
PE.L2-3.10.1

Limit Physical Access [CUI Data]
Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.

  • NIST SP 800-171 Rev 2 3.10.1
  • FAR Clause 52.204-21 b.1.viii
PE.L1-b.1.ix

First Phase
Second Phase
Third Phase
Manage Visitors & Physical Access [FCI Data]
Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices.

  • FAR Clause 52.204-21 Partial b.1.ix
  • NIST SP 800-171 Rev 2 3.10.3
  • NIST SP 800-171 Rev 2 3.10.4
  • NIST SP 800-171 Rev 2 3.10.5
PE.L2-3.10.2

Monitor Facility
Protect and monitor the physical facility and support infrastructure for organizational systems.

  • NIST SP 800-171 Rev 2 3.10.2
PE.L2-3.10.3

Escort Visitors
Escort visitors and monitor visitor activity.

  • FAR Clause 52.204-21 Partial b.1.ix
  • NIST SP 800-171 Rev 2 3.10.3
PE.L2-3.10.4

Physical Access Logs
Maintain audit logs of physical access.

  • FAR Clause 52.204-21 Partial b.1.ix
  • NIST SP 800-171 Rev 2 3.10.4
PE.L2-3.10.5

Manage Physical Access
Control and manage physical access devices.

  • FAR Clause 52.204-21 Partial b.1.ix
  • NIST SP 800-171 Rev 2 3.10.5
PE.L2-3.10.6

Alternative Work Sites
Enforce safeguarding measures for CUI at alternate work sites.

  • NIST SP 800-171 Rev 2 3.10.6

Risk Assessment (RA)

Level 1 Level 2 Level 3
RA.L2-3.11.1

Risk Assessments
Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI.

  • NIST SP 800-171 Rev 2 3.11.1
RA.L3-3.11.1e

Threat-Informed Risk Assessment
Employ threat intelligence, at a minimum from open or commercial sources, and any DoD-provided sources, as part of a risk assessment to guide and inform the development of organizational systems, security architectures, selection of security solutions, monitoring, threat hunting, and response and recovery activities.

  • NIST SP 800-172 3.11.1e
RA.L2-3.11.2

Vulnerability Scan
Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified.

  • NIST SP 800-171 Rev 2 3.11.2
RA.L3-3.11.2e

Threat Hunting
Conduct cyber threat hunting activities on an on-going aperiodic basis or when indications warrant, to search for indicators of compromise in organizational systems and detect, track, and disrupt threats that evade existing controls.

  • NIST SP 800-172 3.11.2e
RA.L2-3.11.3

Vulnerability Remediation
Remediate vulnerabilities in accordance with risk assessments.

  • NIST SP 800-171 Rev 2 3.11.3
RA.L3-3.11.3e

Advanced Risk Identification
Employ advanced automation and analytics capabilities in support of analysts to predict and identify risks to organizations, systems, and system components.

  • NIST SP 800-172 3.11.3e
RA.L3-3.11.4e

Security Solution Rationale
Document or reference in the system security plan the security solution selected, the rationale for the security solution, and the risk determination.

  • NIST SP 800-172 3.11.4e
RA.L3-3.11.5e

Security Solution Effectiveness
Assess the effectiveness of security solutions at least annually or upon receipt of relevant cyber threat information, or in response to a relevant cyber incident, to address anticipated risk to organizational systems and the organization based on current and accumulated threat intelligence.

  • NIST SP 800-172 3.11.5e
RA.L3-3.11.6e

Supply Chain Risk Response
Assess, respond to, and monitor supply chain risks associated with organizational systems and system components.

  • NIST SP 800-172 3.11.6e
RA.L3-3.11.7e

Supply Chain Risk Plan
Develop a plan for managing supply chain risks associated with organizational systems and system components; update the plan at least annually, and upon receipt of relevant cyber threat information, or in response to a relevant cyber incident.

  • NIST SP 800-172 3.11.7e

Security Assessment (CA)

Level 1 Level 2 Level 3
CA.L2-3.12.1

Security Control Assessment
Periodically assess the security controls in organizational systems to determine if the controls are effective in their application.

  • NIST SP 800-171 Rev 2 3.12.1
CA.L3-3.12.1e

Penetration Testing
Conduct penetration testing at least annually or when significant security changes are made to the system, leveraging automated scanning tools and ad hoc tests using subject matter experts.

  • NIST SP 800-172 3.12.1e
CA.L2-3.12.2

Plan of Action
Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems.

  • NIST SP 800-171 Rev 2 3.12.2
CA.L2-3.12.3

Security Control Monitoring
Monitor security controls on an ongoing basis to ensure the continued effectiveness of the controls.

  • NIST SP 800-171 Rev 2 3.12.3
CA.L2-3.12.4

System Security Plan
Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems.

  • NIST SP 800-171 Rev 2 3.12.4

System and Communications Protection (SC)

Level 1 Level 2 Level 3
SC.L1-b.1.x

Boundary Protection [FCI Data]
Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.

  • FAR Clause 52.204-21 b.1.x
  • NIST SP 800-171 Rev 2 3.13.1
SC.L2-3.13.1

Boundary Protection [CUI Data]
Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.

  • NIST SP 800-171 Rev 2 3.13.1
  • FAR Clause 52.204-21 b.1.x
SC.L3-3.13.4e

Isolation
Employ physical isolation techniques or logical isolation techniques or both in organizational systems and system components.

  • NIST SP 800-172 3.13.4e
SC.L1-b.1.xi

Public-Access System Separation [FCI Data]
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.

  • FAR Clause 52.204-21 b.1.xi
  • NIST SP 800-171 Rev 2 3.13.5
SC.L2-3.13.2

Security Engineering
Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems.

  • NIST SP 800-171 Rev 2 3.13.2
SC.L2-3.13.3

Role Separation
Separate user functionality from system management functionality.

  • NIST SP 800-171 Rev 2 3.13.3
SC.L2-3.13.4

Shared Resource Control
Prevent unauthorized and unintended information transfer via shared system resources.

  • NIST SP 800-171 Rev 2 3.13.4
SC.L2-3.13.5

Public-Access System Separation [CUI Data]
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.

  • NIST SP 800-171 Rev 2 3.13.5
  • FAR Clause 52.204-21 b.1.xi
SC.L2-3.13.6

Network Communication by Exception
Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).

  • NIST SP 800-171 Rev 2 3.13.6
SC.L2-3.13.7

Split Tunneling
Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling).

  • NIST SP 800-171 Rev 2 3.13.7
SC.L2-3.13.8

Data in Transit
Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards.

  • NIST SP 800-171 Rev 2 3.13.8
SC.L2-3.13.9

Connections Termination
Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.

  • NIST SP 800-171 Rev 2 3.13.9
SC.L2-3.13.10

Key Management
Establish and manage cryptographic keys for cryptography employed in organizational systems.

  • NIST SP 800-171 Rev 2 3.13.10
SC.L2-3.13.11

CUI Encryption
Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.

  • NIST SP 800-171 Rev 2 3.13.11
SC.L2-3.13.12

Collaborative Device Control
Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.

  • NIST SP 800-171 Rev 2 3.13.12
SC.L2-3.13.13

Mobile Code
Control and monitor the use of mobile code.

  • NIST SP 800-171 Rev 2 3.13.13
SC.L2-3.13.14

Voice over Internet Protocol
Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.

  • NIST SP 800-171 Rev 2 3.13.14
SC.L2-3.13.15

Communications Authenticity
Protect the authenticity of communications sessions.

  • NIST SP 800-171 Rev 2 3.13.15
SC.L2-3.13.16

Data at Rest
Protect the confidentiality of CUI at rest.

  • NIST SP 800-171 Rev 2 3.13.16

System and Information Integrity (SI)

Level 1 Level 2 Level 3
SI.L1-b.1.xii

Flaw Remediation [FCI Data]
Identify, report, and correct information and information system flaws in a timely manner.

  • FAR Clause 52.204-21 b.1.xii
  • NIST SP 800-171 Rev 2 3.14.1
SI.L2-3.14.1

Flaw Remediation [CUI Data]
Identify, report, and correct information and information system flaws in a timely manner.

  • NIST SP 800-171 Rev 2 3.14.1
  • FAR Clause 52.204-21 b.1.xii
SI.L3-3.14.1e

Integrity Verification
Verify the integrity of security critical and essential software using root of trust mechanisms or cryptographic signatures.

  • NIST SP 800-172 3.14.1e
SI.L1-b.1.xiii

Malicious Code Protection [FCI Data]
Provide protection from malicious code at appropriate locations within organizational information systems.

  • FAR Clause 52.204-21 b.1.xiii
  • NIST SP 800-171 Rev 2 3.14.2
SI.L2-3.14.2

Malicious Code Protection [CUI Data]
Provide protection from malicious code at appropriate locations within organizational information systems.

  • NIST SP 800-171 Rev 2 3.14.2
  • FAR Clause 52.204-21 b.1.xiii
SI.L3-3.14.3e

Specialized Asset Security
Include specialized assets such as IoT, IIoT, OT, GFE, Restricted Information Systems and test equipment in the scope of the specified enhanced security requirements or are segregated in purpose-specific networks.

  • NIST SP 800-172 3.14.3e
SI.L1-b.1.xiv

Update Malicious Code Protection [FCI Data]
Update malicious code protection mechanisms when new releases are available.

  • FAR Clause 52.204-21 b.1.xiv
  • NIST SP 800-171 Rev 2 3.14.4
SI.L2-3.14.3

Security Alerts & Advisories
Monitor system security alerts and advisories and take action in response.

  • NIST SP 800-171 Rev 2 3.14.3
SI.L3-3.14.6e

Threat-Guided Intrusion Detection
Use threat indicator information and effective mitigations obtained from, at a minimum, open or commercial sources, and any DoD-provided sources, to guide and inform intrusion detection and threat hunting.

  • NIST SP 800-172 3.14.6e
SI.L1-b.1.xv

System & File Scanning [FCI Data]
Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • FAR Clause 52.204-21 b.1.xv
  • NIST SP 800-171 Rev 2 3.14.5
SI.L2-3.14.4

Update Malicious Code Protection [CUI Data]
Update malicious code protection mechanisms when new releases are available.

  • NIST SP 800-171 Rev 2 3.14.4
  • FAR Clause 52.204-21 b.1.xiv
SI.L2-3.14.5

System & File Scanning [CUI Data]
Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • FAR Clause 52.204-21 b.1.xv
  • NIST SP 800-171 Rev 2 3.14.5
SI.L2-3.14.6

Monitor Communications for Attacks
Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.

  • NIST SP 800-171 Rev 2 3.14.6
SI.L2-3.14.7

Identify Unauthorized Use
Identify unauthorized use of organizational systems.

  • NIST SP 800-171 Rev 2 3.14.7

Appendix B. Abbreviations and Acronyms

The following is a list of acronyms used in the CMMC model.

AC Access Control
APT Advanced Persistent Threat
AT Awareness and Training
AU Audit and Accountability
CA Security Assessment
CFR Code of Federal Regulations
CM Configuration Management
CMMC Cybersecurity Maturity Model Certification
CUI Controlled Unclassified Information
DFARS Defense Federal Acquisition Regulation Supplement
DIB Defense Industrial Base
DoD Department of Defense FAR Federal Acquisition Regulation
FCI Federal Contract Information
FFRDC Federally Funded Research and Development Center
FIPS Federal Information Processing Standard
IA Identification and Authentication
IR Incident Response
L# Level Number
MA Maintenance
MP Media Protection
N/A Not Applicable (NA)
NIST National Institute of Standards and Technology
OUSD A&S Office of the Under Secretary of Defense for Acquisition and Sustainment
PE Physical Protection
PS Personnel Security
PUB Publication
Rev Revision
RA Risk Assessment
SC System and Communications Protection
SI System and Information Integrity
SP Special Publication
UARC University Affiliated Research Center

Appendix C. References

  1. U.S. Executive Office of the President, Council of Economic Advisers (CEA), The Cost of Malicious Cyber Activity to the U.S. Economy, available online at https://www.whitehouse.gov/wp-content/uploads/2018/02/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf, February 2018
  2. Center for Strategic and International Studies (CSIS) and McAfee, Economic Impact of Cybercrime - No Slowing Down, February 2018
  3. 48 Code of Federal Regulations (CFR) 52.204-21, Basic Safeguarding of Covered Contractor Information Systems, Federal Acquisition Regulation (FAR), 1 Oct 2016
  4. NIST Special Publication (SP) 800-171 Revision (Rev) 2, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, U.S. Department of Commerce National Institute of Standards and Technology (NIST), December 2016 (updated June 2018)
  5. NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171, U.S. Department of Commerce National Institute of Standards and Technology (NIST), February 2021

Notes

  1. Based on information from the Federal Procurement Data System, the average number of unique prime contractors is approximately 212,657 and the number of known unique subcontractors is approximately 8,309. (FPDS from FY18-FY21).