Level 2 Assessment Guide: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
'''Reference: The official [https://www.acq.osd.mil/cmmc/documentation.html CMMC Level 2 Assessment Guide] from the Office of the Under Secretary of Defense Acquisition & Sustainment.''' | '''Source of Reference: The official [https://www.acq.osd.mil/cmmc/documentation.html CMMC Level 2 Assessment Guide] from the Office of the Under Secretary of Defense Acquisition & Sustainment.''' | ||
For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. | |||
== Access Control (AC) == | == Access Control (AC) == | ||
Line 67: | Line 69: | ||
=== Level 2 AC Practices === | === Level 2 AC Practices === | ||
==== AC.L2-3.1.3 – Control CUI Flow ==== | |||
{|class="wikitable" | |||
|- | |||
|'''SECURITY REQUIREMENT''' | |||
Control the flow of CUI in accordance with approved authorizations. | |||
|'''ASSESSMENT OBJECTIVES''' | |||
: [a] information flow control policies are defined; | |||
: [b] methods and enforcement mechanisms for controlling the flow of CUI are defined; | |||
: [c] designated sources and destinations (e.g., networks, individuals, and devices) for CUI within the system and between interconnected systems are identified; | |||
: [d] authorizations for controlling the flow of CUI are defined; and | |||
: [e] approved authorizations for controlling the flow of CUI are enforced. | |||
|- | |||
|[[Practice_AC.L2-3.1.3_Details|More Practice Details...]] | |||
|} | |||
== Awareness and Training (AT) == | == Awareness and Training (AT) == |
Revision as of 00:38, 21 February 2022
Source of Reference: The official CMMC Level 2 Assessment Guide from the Office of the Under Secretary of Defense Acquisition & Sustainment.
For inquiries and reporting errors on this wiki, please contact us. Thank you.
Access Control (AC)
Level 1 AC Practices
AC.L1-3.1.1 - Authorized Access Control
SECURITY REQUIREMENT
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). |
ASSESSMENT OBJECTIVES
|
More Practice Details... |
AC.L1-3.1.2 - Transaction & Function Control
SECURITY REQUIREMENT
Limit information system access to the types of transactions and functions that authorized users are permitted to execute. |
ASSESSMENT OBJECTIVES
|
More Practice Details... |
AC.L1-3.1.20 - External Connections
SECURITY REQUIREMENT
Verify and control/limit connections to and use of external information systems. |
ASSESSMENT OBJECTIVES
|
More Practice Details... |
AC.L1-3.1.22 - Control Public Information
SECURITY REQUIREMENT
Control information posted or processed on publicly accessible information systems. |
ASSESSMENT OBJECTIVES
|
More Practice Details... |
Level 2 AC Practices
AC.L2-3.1.3 – Control CUI Flow
SECURITY REQUIREMENT
Control the flow of CUI in accordance with approved authorizations. |
ASSESSMENT OBJECTIVES
|
More Practice Details... |