Level 2 Assessment Guide: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
Line 7: | Line 7: | ||
==== AC.L1-3.1.1 - Authorized Access Control ==== | ==== AC.L1-3.1.1 - Authorized Access Control ==== | ||
{|class="wikitable" | {|class="wikitable" | ||
|'''SECURITY REQUIREMENT''' | |'''SECURITY REQUIREMENT''' | ||
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). | Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). | ||
Line 24: | Line 23: | ||
==== AC.L1-3.1.2 - Transaction & Function Control ==== | ==== AC.L1-3.1.2 - Transaction & Function Control ==== | ||
{|class="wikitable" | {|class="wikitable" | ||
|'''SECURITY REQUIREMENT''' | |'''SECURITY REQUIREMENT''' | ||
Limit information system access to the types of transactions and functions that authorized users are permitted to execute. | Limit information system access to the types of transactions and functions that authorized users are permitted to execute. | ||
Line 37: | Line 35: | ||
==== AC.L1-3.1.20 - External Connections ==== | ==== AC.L1-3.1.20 - External Connections ==== | ||
{|class="wikitable" | {|class="wikitable" | ||
|'''SECURITY REQUIREMENT''' | |'''SECURITY REQUIREMENT''' | ||
Verify and control/limit connections to and use of external information systems. | Verify and control/limit connections to and use of external information systems. | ||
Line 54: | Line 51: | ||
==== AC.L1-3.1.22 - Control Public Information ==== | ==== AC.L1-3.1.22 - Control Public Information ==== | ||
{|class="wikitable" | {|class="wikitable" | ||
|'''SECURITY REQUIREMENT''' | |'''SECURITY REQUIREMENT''' | ||
Control information posted or processed on publicly accessible information systems. | Control information posted or processed on publicly accessible information systems. |
Revision as of 00:47, 21 February 2022
Source of Reference: The official CMMC Level 2 Assessment Guide from the Office of the Under Secretary of Defense Acquisition & Sustainment.
For inquiries and reporting errors on this wiki, please contact us. Thank you.
Access Control (AC)
Level 1 AC Practices
AC.L1-3.1.1 - Authorized Access Control
SECURITY REQUIREMENT
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). |
ASSESSMENT OBJECTIVES
|
More Practice Details... |
AC.L1-3.1.2 - Transaction & Function Control
SECURITY REQUIREMENT
Limit information system access to the types of transactions and functions that authorized users are permitted to execute. |
ASSESSMENT OBJECTIVES
|
More Practice Details... |
AC.L1-3.1.20 - External Connections
SECURITY REQUIREMENT
Verify and control/limit connections to and use of external information systems. |
ASSESSMENT OBJECTIVES
|
More Practice Details... |
AC.L1-3.1.22 - Control Public Information
SECURITY REQUIREMENT
Control information posted or processed on publicly accessible information systems. |
ASSESSMENT OBJECTIVES
|
More Practice Details... |
Level 2 AC Practices
AC.L2-3.1.3 – Control CUI Flow
SECURITY REQUIREMENT
Control the flow of CUI in accordance with approved authorizations. |
ASSESSMENT OBJECTIVES
|
More Practice Details... |