CMMC Assessment

This field is hidden when viewing the form

Access Control

Level 1 AC Practices

AC.L1-3.1.1 – AUTHORIZED ACCESS CONTROL


Limit information system access to the types of transactions and functions that authorized users are permitted to execute.

Authorized users are identified.(Required)
Processes acting on behalf of authorized users are identified.(Required)
Devices (and other systems) authorized to connect to the system are identified.(Required)
System access is limited to authorized users.(Required)
System access is limited to processes acting on behalf of authorized users.(Required)
System access is limited to authorized devices (including other systems).(Required)

AC.L1-3.1.2 – TRANSACTION & FUNCTION CONTROL


Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).

The types of transactions and functions that authorized users are permitted to execute are defined.(Required)
System access is limited to the defined types of transactions and functions for authorized users.(Required)

AC.L1-3.1.20 – EXTERNAL CONNECTIONS


Verify and control/limit connections to and use of external information systems.

Connections to external systems are identified.(Required)
The use of external systems is identified.(Required)
Connections to external systems are verified.(Required)
The use of external systems is verified.(Required)
Connections to external systems are controlled/limited.(Required)
The use of external systems is controlled/limited.(Required)

AC.L1-3.1.22 – CONTROL PUBLIC INFORMATION


Control information posted or processed on publicly accessible information systems.

Individuals authorized to post or process information on publicly accessible systems are identified.(Required)
Procedures to ensure FCI is not posted or processed on publicly accessible systems are identified.(Required)
A review process is in place prior to posting of any content to publicly accessible systems.(Required)
Content on publicly accessible systems is reviewed to ensure that it does not include FCI.(Required)
Mechanisms are in place to remove and address improper posting of FCI.(Required)

Level 2 AC Practices

AC.L2-3.1.3 – CONTROL CUI FLOW


Control the flow of CUI in accordance with approved authorizations.

Information flow control policies are defined.(Required)
Methods and enforcement mechanisms for controlling the flow of CUI are defined.(Required)
Designated sources and destinations (e.g., networks, individuals, and devices) for CUI within the system and between interconnected systems are identified.(Required)
Authorizations for controlling the flow of CUI are defined.(Required)
Approved authorizations for controlling the flow of CUI are enforced.(Required)

AC.L2-3.1.4 – SEPARATION OF DUTIES


Separate the duties of individuals to reduce the risk of malevolent activity without collusion.

The duties of individuals requiring separation are defined.(Required)
Responsibilities for duties that require separation are assigned to separate individuals.(Required)
Access privileges that enable individuals to exercise the duties that require separation are granted to separate individuals.(Required)

AC.L2-3.1.5 – LEAST PRIVILEGE


Employ the principle of least privilege, including for specific security functions and privileged accounts.

Privileged accounts are identified.(Required)
Access to privileged accounts is authorized in accordance with the principle of least privilege.(Required)
Security functions are identified.(Required)
Access to security functions is authorized in accordance with the principle of least privilege.(Required)

AC.L2-3.1.6 – NON-PRIVILEGED ACCOUNT USE


Use non-privileged accounts or roles when accessing nonsecurity functions.

Nonsecurity functions are identified.(Required)
Users are required to use non-privileged accounts or roles when accessing nonsecurity functions.(Required)

AC.L2-3.1.7 – PRIVILEGED FUNCTIONS


Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.

Privileged functions are defined.(Required)
Non-privileged users are defined.(Required)
Non-privileged users are prevented from executing privileged functions.(Required)
The execution of privileged functions is captured in audit logs.(Required)

AC.L2-3.1.8 – UNSUCCESSFUL LOGON ATTEMPTS


Limit unsuccessful logon attempts.

The means of limiting unsuccessful logon attempts is defined.(Required)
The defined means of limiting unsuccessful logon attempts is implemented.(Required)

AC.L2-3.1.9 – PRIVACY & SECURITY NOTICES


Provide privacy and security notices consistent with applicable CUI rules.

Privacy and security notices required by CUI-specified rules are identified, consistent, and associated with the specific CUI category.(Required)
Privacy and security notices are displayed.(Required)

AC.L2-3.1.10 – SESSION LOCK


Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.

The period of inactivity after which the system initiates a session lock is defined.(Required)
Access to the system and viewing of data is prevented by initiating a session lock after the defined period of inactivity.(Required)
Previously visible information is concealed via a pattern-hiding display after the defined period of inactivity.(Required)

AC.L2-3.1.11 – SESSION TERMINATION


Terminate (automatically) a user session after a defined condition.

Conditions requiring a user session to terminate are defined.(Required)
A user session is automatically terminated after any of the defined conditions occur.(Required)

AC.L2-3.1.12 – CONTROL REMOTE ACCESS


Monitor and control remote access sessions.

Remote access sessions are permitted.(Required)
The types of permitted remote access are identified.(Required)
Remote access sessions are controlled.(Required)
Remote access sessions are monitored.(Required)

AC.L2-3.1.13 – REMOTE ACCESS CONFIDENTIALITY


Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.

Cryptographic mechanisms to protect the confidentiality of remote access sessions are identified.(Required)
Cryptographic mechanisms to protect the confidentiality of remote access sessions are implemented.(Required)

AC.L2-3.1.14 – REMOTE ACCESS ROUTING


Route remote access via managed access control points.

Managed access control points are identified and implemented.(Required)
Remote access is routed through managed network access control points.(Required)

AC.L2-3.1.15 – PRIVILEGED REMOTE ACCESS


Authorize remote execution of privileged commands and remote access to security-relevant information.

Privileged commands authorized for remote execution are identified.(Required)
Security-relevant information authorized to be accessed remotely is identified.(Required)
The execution of the identified privileged commands via remote access is authorized.(Required)
Access to the identified security-relevant information via remote access is authorized.(Required)

AC.L2-3.1.16 – WIRELESS ACCESS AUTHORIZATION


Authorize wireless access prior to allowing such connections.

Wireless access points are identified.(Required)
Wireless access is authorized prior to allowing such connections.(Required)

AC.L2-3.1.17 – WIRELESS ACCESS PROTECTION


Protect wireless access using authentication and encryption.

Wireless access to the system is protected using authentication.(Required)
Wireless access to the system is protected using encryption.(Required)

AC.L2-3.1.18 – MOBILE DEVICE CONNECTION


Control connection of mobile devices.

Mobile devices that process, store, or transmit CUI are identified.(Required)
Mobile device connections are authorized.(Required)
Mobile device connections are monitored and logged.(Required)

AC.L2-3.1.19 – ENCRYPT CUI ON MOBILE


Encrypt CUI on mobile devices and mobile computing platforms.

Mobile devices and mobile computing platforms that process, store, or transmit CUI are identified.(Required)
Encryption is employed to protect CUI on identified mobile devices and mobile computing platforms.(Required)

AC.L2-3.1.21 – PORTABLE STORAGE USE


Limit use of portable storage devices on external systems.

The use of portable storage devices containing CUI on external systems is identified and documented.(Required)
Limits on the use of portable storage devices containing CUI on external systems are defined.(Required)
The use of portable storage devices containing CUI on external systems is limited as defined.(Required)

Awareness and Training

Level 2 AT Practices

AT.L2-3.2.1 – ROLE-BASED RISK AWARENESS


Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems.

Security risks associated with organizational activities involving CUI are identified.(Required)
Policies, standards, and procedures related to the security of the system are identified.(Required)
Managers, systems administrators, and users of the system are made aware of the security risks associated with their activities.(Required)
Managers, systems administrators, and users of the system are made aware of the applicable policies, standards, and procedures related to the security of the system.(Required)

AT.L2-3.2.2 – ROLE-BASED TRAINING


Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities.

Information security-related duties, roles, and responsibilities are defined.(Required)
Information security-related duties, roles, and responsibilities are assigned to designated personnel.(Required)
Personnel are adequately trained to carry out their assigned information security-related duties, roles, and responsibilities.(Required)

AT.L2-3.2.3 – INSIDER THREAT AWARENESS


Provide security awareness training on recognizing and reporting potential indicators of insider threat.

Potential indicators associated with insider threats are identified.(Required)
Security awareness training on recognizing and reporting potential indicators of insider threat is provided to managers and employees.(Required)

Audit and Accountability

Level 2 AU Practices

AU.L2-3.3.1 – SYSTEM AUDITING


Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity.

Audit logs needed (i.e., event types to be logged) to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity are specified.(Required)
The content of audit records needed to support monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity is defined.(Required)
Audit records are created (generated).(Required)
Audit records, once created, contain the defined content.(Required)
Retention requirements for audit records are defined.(Required)
Audit records are retained as defined.(Required)

AU.L2-3.3.2 – USER ACCOUNTABILITY


Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.

The content of the audit records needed to support the ability to uniquely trace users to their actions is defined.(Required)
Audit records, once created, contain the defined content.(Required)

AU.L2-3.3.3 – EVENT REVIEW


Review and update logged events.

A process for determining when to review logged events is defined.(Required)
Event types being logged are reviewed in accordance with the defined review process.(Required)
Event types being logged are updated based on the review.(Required)

AU.L2-3.3.4 – AUDIT FAILURE ALERTING


Alert in the event of an audit logging process failure.

Personnel or roles to be alerted in the event of an audit logging process failure are identified.(Required)
Types of audit logging process failures for which alert will be generated are defined.(Required)
Identified personnel or roles are alerted in the event of an audit logging process failure.(Required)

AU.L2-3.3.5 – AUDIT CORRELATION


Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.

Audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity are defined.(Required)
Defined audit record review, analysis, and reporting processes are correlated.(Required)

AU.L2-3.3.6 – REDUCTION & REPORTING


Provide audit record reduction and report generation to support on-demand analysis and reporting.

An audit record reduction capability that supports on-demand analysis is provided.(Required)
A report generation capability that supports on-demand reporting is provided.(Required)

AU.L2-3.3.7 – AUTHORITATIVE TIME SOURCE


Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records.

Internal system clocks are used to generate time stamps for audit records.(Required)
An authoritative source with which to compare and synchronize internal system clocks is specified.(Required)
Internal system clocks used to generate time stamps for audit records are compared to and synchronized with the specified authoritative time source.(Required)

AU.L2-3.3.8 – AUDIT PROTECTION


Protect audit information and audit logging tools from unauthorized access, modification, and deletion.

Audit information is protected from unauthorized access.(Required)
Audit information is protected from unauthorized modification.(Required)
Audit information is protected from unauthorized deletion.(Required)
Audit logging tools are protected from unauthorized access.(Required)
Audit logging tools are protected from unauthorized modification.(Required)
Audit logging tools are protected from unauthorized deletion.(Required)

AU.L2-3.3.9 – AUDIT MANAGEMENT


Limit management of audit logging functionality to a subset of privileged users.

A subset of privileged users granted access to manage audit logging functionality is defined.(Required)
Management of audit logging functionality is limited to the defined subset of privileged users.(Required)

Configuration Management

Level 2 CM Practices

CM.L2-3.4.1 – SYSTEM BASELINING


Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles.

A baseline configuration is established.(Required)
The baseline configuration includes hardware, software, firmware, and documentation.(Required)
The baseline configuration is maintained (reviewed and updated) throughout the system development life cycle.(Required)
A system inventory is established.(Required)
The system inventory includes hardware, software, firmware, and documentation.(Required)
The inventory is maintained (reviewed and updated) throughout the system development life cycle.(Required)

CM.L2-3.4.2 – SECURITY CONFIGURATION ENFORCEMENT


Establish and enforce security configuration settings for information technology products employed in organizational systems.

Security configuration settings for information technology products employed in the system are established and included in the baseline configuration.(Required)
Security configuration settings for information technology products employed in the system are enforced.(Required)

CM.L2-3.4.3 – SYSTEM CHANGE MANAGEMENT


Track, review, approve or disapprove, and log changes to organizational systems.

Changes to the system are tracked.(Required)
Changes to the system are reviewed.(Required)
Changes to the system are approved or disapproved.(Required)
Changes to the system are logged.(Required)

CM.L2-3.4.4 – SECURITY IMPACT ANALYSIS


Analyze the security impact of changes prior to implementation.

The security impact of changes to the system is analyzed prior to implementation.(Required)

CM.L2-3.4.5 – ACCESS RESTRICTIONS FOR CHANGE


Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems.

Physical access restrictions associated with changes to the system are defined.(Required)
Physical access restrictions associated with changes to the system are documented.(Required)
Physical access restrictions associated with changes to the system are approved.(Required)
Physical access restrictions associated with changes to the system are enforced.(Required)
Logical access restrictions associated with changes to the system are defined.(Required)
Logical access restrictions associated with changes to the system are documented.(Required)
Logical access restrictions associated with changes to the system are approved.(Required)
Logical access restrictions associated with changes to the system are enforced.(Required)

CM.L2-3.4.6 – LEAST FUNCTIONALITY


Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities.

Essential system capabilities are defined based on the principle of least functionality.(Required)
The system is configured to provide only the defined essential capabilities.(Required)

CM.L2-3.4.7 – NONESSENTIAL FUNCTIONALITY


Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services.

Essential programs are defined.(Required)
The use of nonessential programs is defined.(Required)
The use of nonessential programs is restricted, disabled, or prevented as defined.(Required)
Essential functions are defined.(Required)
The use of nonessential functions is defined.(Required)
The use of nonessential functions is restricted, disabled, or prevented as defined.(Required)
Essential ports are defined.(Required)
The use of nonessential ports is defined.(Required)
The use of nonessential ports is restricted, disabled, or prevented as defined.(Required)
Essential protocols are defined.(Required)
The use of nonessential protocols is defined.(Required)
The use of nonessential protocols is restricted, disabled, or prevented as defined.(Required)
Essential services are defined.(Required)
The use of nonessential services is defined.(Required)
The use of nonessential services is restricted, disabled, or prevented as defined.(Required)

CM.L2-3.4.8 – APPLICATION EXECUTION POLICY


Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (whitelisting) policy to allow the execution of authorized software.

A policy specifying whether whitelisting or blacklisting is to be implemented is specified.(Required)
The software allowed to execute under whitelisting or denied use under blacklisting is specified.(Required)
Whitelisting to allow the execution of authorized software or blacklisting to prevent the use of unauthorized software is implemented as specified.(Required)

CM.L2-3.4.9 – USER-INSTALLED SOFTWARE


Control and monitor user-installed software.

A policy for controlling the installation of software by users is established.(Required)
Installation of software by users is controlled based on the established policy.(Required)
Installation of software by users is monitored.(Required)

Identification and Authentication

Level 1 IA Practices

IA.L1-3.5.1 – IDENTIFICATION


Identify information system users, processes acting on behalf of users, or devices.

System users are identified.(Required)
Processes acting on behalf of users are identified.(Required)
Devices accessing the system are identified.(Required)

IA.L1-3.5.2 – AUTHENTICATION


Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.

The identity of each user is authenticated or verified as a prerequisite to system access.(Required)
The identity of each process acting on behalf of a user is authenticated or verified as a prerequisite to system access.(Required)
The identity of each device accessing or connecting to the system is authenticated or verified as a prerequisite to system access.(Required)

Level 2 IA Practices

IA.L2-3.5.3 – MULTIFACTOR AUTHENTICATION


Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.

Privileged accounts are identified.(Required)
Multifactor authentication is implemented for local access to privileged accounts.(Required)
Multifactor authentication is implemented for network access to privileged accounts.(Required)
Multifactor authentication is implemented for network access to non-privileged accounts.(Required)

IA.L2-3.5.4 – REPLAY-RESISTANT AUTHENTICATION


Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.

Replay-resistant authentication mechanisms are implemented for network account access to privileged and non-privileged accounts.(Required)

IA.L2-3.5.5 – IDENTIFIER REUSE


Prevent reuse of identifiers for a defined period.

A period within which identifiers cannot be reused is defined.(Required)
Reuse of identifiers is prevented within the defined period.(Required)

IA.L2-3.5.6 – IDENTIFIER HANDLING


Disable identifiers after a defined period of inactivity.

A period of inactivity after which an identifier is disabled is defined.(Required)
Identifiers are disabled after the defined period of inactivity.(Required)

IA.L2-3.5.7 – PASSWORD COMPLEXITY


Enforce a minimum password complexity and change of characters when new passwords are created.

Password complexity requirements are defined.(Required)
Password change of character requirements are defined.(Required)
Minimum password complexity requirements as defined are enforced when new passwords are created.(Required)
Minimum password change of character requirements as defined are enforced when new passwords are created.(Required)

IA.L2-3.5.8 – PASSWORD REUSE


Prohibit password reuse for a specified number of generations.

The number of generations during which a password cannot be reused is specified.(Required)
Reuse of passwords is prohibited during the specified number of generations.(Required)

IA.L2-3.5.9 – TEMPORARY PASSWORDS


Allow temporary password use for system logons with an immediate change to a permanent password.

An immediate change to a permanent password is required when a temporary password is used for system logon.(Required)

IA.L2-3.5.10 – CRYPTOGRAPHICALLY-PROTECTED PASSWORDS


Store and transmit only cryptographically-protected passwords.

Passwords are cryptographically protected in storage.(Required)
Passwords are cryptographically protected in transit.(Required)

IA.L2-3.5.11 – OBSCURE FEEDBACK


Obscure feedback of authentication information.

Authentication information is obscured during the authentication process.(Required)

Incident Response

Level 2 IR Practices

IR.L2-3.6.1 – INCIDENT HANDLING


Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities.

An operational incident-handling capability is established.(Required)
The operational incident-handling capability includes preparation.(Required)
The operational incident-handling capability includes detection.(Required)
The operational incident-handling capability includes analysis.(Required)
The operational incident-handling capability includes containment.(Required)
The operational incident-handling capability includes recovery.(Required)
The operational incident-handling capability includes user response activities.(Required)

IR.L2-3.6.2 – INCIDENT REPORTING


Track, document, and report incidents to designated officials and/or authorities both internal and external to the organization.

Incidents are tracked.(Required)
Incidents are documented.(Required)
Authorities to whom incidents are to be reported are identified.(Required)
Organizational officials to whom incidents are to be reported are identified.(Required)
Identified authorities are notified of incidents.(Required)
Identified organizational officials are notified of incidents.(Required)

IR.L2-3.6.3 – INCIDENT RESPONSE TESTING


Test the organizational incident response capability.

The incident response capability is tested.(Required)

Maintenance

Level 2 MA Practices

MA.L2-3.7.1 – PERFORM MAINTENANCE


Perform maintenance on organizational systems.

The incident response capability is tested.(Required)

MA.L2-3.7.2 – SYSTEM MAINTENANCE CONTROL


Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance.

Tools used to conduct system maintenance are controlled.(Required)
Techniques used to conduct system maintenance are controlled.(Required)
Mechanisms used to conduct system maintenance are controlled.(Required)
Personnel used to conduct system maintenance are controlled.(Required)

MA.L2-3.7.3 – EQUIPMENT SANITIZATION


Ensure equipment removed for off-site maintenance is sanitized of any CUI.

Equipment to be removed from organizational spaces for off-site maintenance is sanitized of any CUI.(Required)

MA.L2-3.7.4 – MEDIA INSPECTION


Check media containing diagnostic and test programs for malicious code before the media are used in organizational systems.

Media containing diagnostic and test programs are checked for malicious code before being used in organizational systems that process, store, or transmit CUI.(Required)

MA.L2-3.7.5 – NONLOCAL MAINTENANCE


Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete.

Multifactor authentication is used to establish nonlocal maintenance sessions via external network connections.(Required)
Nonlocal maintenance sessions established via external network connections are terminated when nonlocal maintenance is complete.(Required)

MA.L2-3.7.6 – MAINTENANCE PERSONNEL


Supervise the maintenance activities of maintenance personnel without required access authorization.

Maintenance personnel without required access authorization are supervised during maintenance activities.(Required)

Media Protection

Level 1 MP Practices

MP.L1-3.8.3 – MEDIA DISPOSAL


Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse.

System media containing FCI is sanitized or destroyed before disposal.(Required)
System media containing FCI is sanitized before it is released for reuse.(Required)

Level 2 MP Practices

MP.L2-3.8.1 – MEDIA PROTECTION


Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital.

Paper media containing CUI is physically controlled.(Required)
Digital media containing CUI is physically controlled.(Required)
Paper media containing CUI is securely stored.(Required)
Digital media containing CUI is securely stored.(Required)

MP.L2-3.8.2 – MEDIA ACCESS


Limit access to CUI on system media to authorized users.

Access to CUI on system media is limited to authorized users.(Required)

MP.L2-3.8.4 – MEDIA MARKINGS


Mark media with necessary CUI markings and distribution limitations.

Media containing CUI is marked with applicable CUI markings.(Required)
Media containing CUI is marked with distribution limitations.(Required)

MP.L2-3.8.5 – MEDIA ACCOUNTABILITY


Control access to media containing CUI and maintain accountability for media during transport outside of controlled areas.

Access to media containing CUI is controlled.(Required)
Accountability for media containing CUI is maintained during transport outside of controlled areas.(Required)

MP.L2-3.8.6 – PORTABLE STORAGE ENCRYPTION


Implement cryptographic mechanisms to protect the confidentiality of CUI stored on digital media during transport unless otherwise protected by alternative physical safeguards.

The confidentiality of CUI stored on digital media is protected during transport using cryptographic mechanisms or alternative physical safeguards.(Required)

MP.L2-3.8.7 – REMOVEABLE MEDIA


Control the use of removable media on system components.

The use of removable media on system components is controlled.(Required)

MP.L2-3.8.8 – SHARED MEDIA


Prohibit the use of portable storage devices when such devices have no identifiable owner.

The use of portable storage devices is prohibited when such devices have no identifiable owner.(Required)

MP.L2-3.8.9 – PROTECT BACKUPS


Protect the confidentiality of backup CUI at storage locations.

The confidentiality of backup CUI is protected at storage locations.(Required)

Personnel Security

Level 2 PS Practices

PS.L2-3.9.1 – SCREEN INDIVIDUALS


Screen individuals prior to authorizing access to organizational systems containing CUI.

Individuals are screened prior to authorizing access to organizational systems containing CUI.(Required)

PS.L2-3.9.2 – PERSONNEL ACTIONS


Ensure that organizational systems containing CUI are protected during and after personnel actions such as terminations and transfers.

A policy and/or process for terminating system access and any credentials coincident with personnel actions is established.(Required)
System access and credentials are terminated consistent with personnel actions such as termination or transfer.(Required)
The system is protected during and after personnel transfer actions.(Required)

Physical Protection

Level 1 PE Practices

PE.L1-3.10.1 – LIMIT PHYSICAL ACCESS


Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.

Authorized individuals allowed physical access are identified.(Required)
Physical access to organizational systems is limited to authorized individuals.(Required)
Physical access to operating environments is limited to authorized individuals.(Required)
Physical access to equipment is limited to authorized individuals.(Required)

PE.L1-3.10.3 – ESCORT VISITORS


Escort visitors and monitor visitor activity.

Visitors are escorted.(Required)
Visitor activity is monitored.(Required)

PE.L1-3.10.4 – PHYSICAL ACCESS LOGS


Maintain audit logs of physical access.

Audit logs of physical access are maintained.(Required)

PE.L1-3.10.5 – MANAGE PHYSICAL ACCESS


Control and manage physical access devices.

Physical access devices are identified.(Required)
Physical access devices are controlled.(Required)
Physical access devices are managed.(Required)

Level 2 PE Practices

PE.L2-3.10.2 – MONITOR FACILITY


Protect and monitor the physical facility and support infrastructure for organizational systems.

The physical facility where organizational systems reside is protected.(Required)
The support infrastructure for organizational systems is protected.(Required)
The physical facility where organizational systems reside is monitored.(Required)
The support infrastructure for organizational systems is monitored.(Required)

PE.L2-3.10.6 – ALTERNATIVE WORK SITES


Enforce safeguarding measures for CUI at alternate work sites.

Safeguarding measures for CUI are defined for alternate work sites.(Required)
Safeguarding measures for CUI are enforced for alternate work sites.(Required)

Risk Assessment

Level 2 RA Practices

RA.L2-3.11.1 – RISK ASSESSMENTS


Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI.

The frequency to assess risk to organizational operations, organizational assets, and individuals is defined.(Required)
Risk to organizational operations, organizational assets, and individuals resulting from the operation of an organizational system that processes, stores, or transmits CUI is assessed with the defined frequency.(Required)

RA.L2-3.11.2 – VULNERABILITY SCAN


Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified.

The frequency to scan for vulnerabilities in organizational systems and applications is defined.(Required)
Vulnerability scans are performed on organizational systems with the defined frequency.(Required)
Vulnerability scans are performed on applications with the defined frequency.(Required)
Vulnerability scans are performed on organizational systems when new vulnerabilities are identified.(Required)
Vulnerability scans are performed on applications when new vulnerabilities are identified.(Required)

RA.L2-3.11.3 – VULNERABILITY REMEDIATION


Remediate vulnerabilities in accordance with risk assessments.

Vulnerabilities are identified.(Required)
Vulnerabilities are remediated in accordance with risk assessments.(Required)

Security Assessment

Level 2 CA Practices

CA.L2-3.12.1 – SECURITY CONTROL ASSESSMENT


Periodically assess the security controls in organizational systems to determine if the controls are effective in their application.

The frequency of security control assessments is defined.(Required)
Security controls are assessed with the defined frequency to determine if the controls are effective in their application.(Required)

CA.L2-3.12.2 – PLAN OF ACTION


Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems.

Deficiencies and vulnerabilities to be addressed by the plan of action are identified.(Required)
A plan of action is developed to correct identified deficiencies and reduce or eliminate identified vulnerabilities.(Required)
The plan of action is implemented to correct identified deficiencies and reduce or eliminate identified vulnerabilities.(Required)

CA.L2-3.12.3 – SECURITY CONTROL MONITORING


Monitor security controls on an ongoing basis to ensure the continued effectiveness of the controls.

Security controls are monitored on an ongoing basis to ensure the continued effectiveness of those controls.(Required)

CA.L2-3.12.4 – SYSTEM SECURITY PLAN


Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems.

A system security plan is developed.(Required)
The system boundary is described and documented in the system security plan.(Required)
The system environment of operation is described and documented in the system security plan.(Required)
The security requirements identified and approved by the designated authority as non-applicable are identified.(Required)
The method of security requirement implementation is described and documented in the system security plan.(Required)
The relationship with or connection to other systems is described and documented in the system security plan.(Required)
The frequency to update the system security plan is defined.(Required)
System security plan is updated with the defined frequency.(Required)

System and Communications Protection

Level 1 SC Practices

SC.L1-3.13.1 – BOUNDARY PROTECTION


Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.

The external system boundary is defined.(Required)
Key internal system boundaries are defined.(Required)
Communications are monitored at the external system boundary.(Required)
Communications are monitored at key internal boundaries.(Required)
Communications are controlled at the external system boundary.(Required)
Communications are controlled at key internal boundaries.(Required)
Communications are protected at the external system boundary.(Required)
Communications are protected at key internal boundaries.(Required)

SC.L1-3.13.5 – PUBLIC-ACCESS SYSTEM SEPARATION


Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.

Publicly accessible system components are identified.(Required)
Subnetworks for publicly accessible system components are physically or logically separated from internal networks.(Required)

Level 2 SC Practices

SC.L2-3.13.2 – SECURITY ENGINEERING


Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems.

Architectural designs that promote effective information security are identified.(Required)
Software development techniques that promote effective information security are identified.(Required)
Systems engineering principles that promote effective information security are identified.(Required)
Identified architectural designs that promote effective information security are employed.(Required)
Identified software development techniques that promote effective information security are employed.(Required)
Identified systems engineering principles that promote effective information security are employed.(Required)

SC.L2-3.13.3 – ROLE SEPARATION


Separate user functionality from system management functionality.

User functionality is identified.(Required)
System management functionality is identified.(Required)
User functionality is separated from system management functionality.(Required)

SC.L2-3.13.4 – SHARED RESOURCE CONTROL


Prevent unauthorized and unintended information transfer via shared system resources.

Unauthorized and unintended information transfer via shared system resources is prevented.(Required)

SC.L2-3.13.6 – NETWORK COMMUNICATION BY EXCEPTION


Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).

Network communications traffic is denied by default.(Required)
Network communications traffic is allowed by exception.(Required)

SC.L2-3.13.7 – SPLIT TUNNELING


Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling).

Remote devices are prevented from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks (i.e., split tunneling).(Required)

SC.L2-3.13.8 – DATA IN TRANSIT


Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards.

Cryptographic mechanisms intended to prevent unauthorized disclosure of CUI are identified.(Required)
Alternative physical safeguards intended to prevent unauthorized disclosure of CUI are identified.(Required)
Either cryptographic mechanisms or alternative physical safeguards are implemented to prevent unauthorized disclosure of CUI during transmission.(Required)

SC.L2-3.13.9 – CONNECTIONS TERMINATION


Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.

A period of inactivity to terminate network connections associated with communications sessions is defined.(Required)
Network connections associated with communications sessions are terminated at the end of the sessions.(Required)
Network connections associated with communications sessions are terminated after the defined period of inactivity.(Required)

SC.L2-3.13.10 – KEY MANAGEMENT


Establish and manage cryptographic keys for cryptography employed in organizational systems.

Cryptographic keys are established whenever cryptography is employed.(Required)
Cryptographic keys are managed whenever cryptography is employed.(Required)

SC.L2-3.13.11 – CUI ENCRYPTION


Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.

FIPS-validated cryptography is employed to protect the confidentiality of CUI.(Required)

SC.L2-3.13.12 – COLLABORATIVE DEVICE CONTROL


Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.

Collaborative computing devices are identified.(Required)
Collaborative computing devices provide indication to users of devices in use.(Required)
Remote activation of collaborative computing devices is prohibited.(Required)

SC.L2-3.13.13 – MOBILE CODE


Control and monitor the use of mobile code.

Use of mobile code is controlled.(Required)
Use of mobile code is monitored.(Required)

SC.L2-3.13.14 – VOICE OVER INTERNET PROTOCOL


Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.

Use of Voice over Internet Protocol (VoIP) technologies is controlled.(Required)
Use of Voice over Internet Protocol (VoIP) technologies is monitored.(Required)

SC.L2-3.13.15 – COMMUNICATIONS AUTHENTICITY


Protect the authenticity of communications sessions.

The authenticity of communications sessions is protected.(Required)

SC.L2-3.13.16 – DATA AT REST


Protect the confidentiality of CUI at rest.

The confidentiality of CUI at rest is protected.(Required)

System and Information Integrity

Level 1 SI Practices

SI.L1-3.14.1 – FLAW REMEDIATION


Identify, report, and correct information and information system flaws in a timely manner.

The time within which to identify system flaws is specified.(Required)
System flaws are identified within the specified time frame.(Required)
The time within which to report system flaws is specified.(Required)
System flaws are reported within the specified time frame.(Required)
The time within which to correct system flaws is specified.(Required)
System flaws are corrected within the specified time frame.(Required)

SI.L1-3.14.2 – MALICIOUS CODE PROTECTION


Provide protection from malicious code at appropriate locations within organizational information systems.

Designated locations for malicious code protection are identified.(Required)
Protection from malicious code at designated locations is provided.(Required)

SI.L1-3.14.4 – UPDATE MALICIOUS CODE PROTECTION


Update malicious code protection mechanisms when new releases are available.

Malicious code protection mechanisms are updated when new releases are available.(Required)

SI.L1-3.14.5 – SYSTEM & FILE SCANNING


Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

The frequency for malicious code scans is defined.(Required)
Malicious code scans are performed with the defined frequency.(Required)
Real-time malicious code scans of files from external sources as files are downloaded, opened, or executed are performed.(Required)

Level 2 SI Practices

SI.L2-3.14.3 – SECURITY ALERTS & ADVISORIES


Monitor system security alerts and advisories and take action in response.

Response actions to system security alerts and advisories are identified.(Required)
System security alerts and advisories are monitored.(Required)
Actions in response to system security alerts and advisories are taken.(Required)

SI.L2-3.14.6 – MONITOR COMMUNICATIONS FOR ATTACKS


Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.

The system is monitored to detect attacks and indicators of potential attacks.(Required)
Inbound communications traffic is monitored to detect attacks and indicators of potential attacks.(Required)
Outbound communications traffic is monitored to detect attacks and indicators of potential attacks.(Required)

SI.L2-3.14.7 – IDENTIFY UNAUTHORIZED USE


Identify unauthorized use of organizational systems.

Authorized use of the system is defined.(Required)
Unauthorized use of the system is identified.(Required)
Score 110
Click to access the login or register cheese