Cybersecurity Maturity Model Certification – Level 2

The following table contains the required 55 Practices, including controls mapping from NIST SP 800-171 Rev 2 ,for Cybersecurity Maturity Model Certification (CMMC) Level 2 (L2) systems.

Systems categorized as CMMC L2 must also implement the 17 L1 Practices.

1 ACCESS CONTROL (AC) C001 – Establish system access requirements AC.2.005 – Provide privacy and security notices consistent with applicable CUI rules: NIST SP 800-171 Rev 2 3.1.9
AC.2.006 – Limit use of portable storage devices on external systems: NIST SP 800-171 Rev 2 3.1.21
C002 – Control internal system access AC.2.007 – Employ the principle of least privilege, including for specific security functions and privileged accounts: NIST SP 800-171 Rev 2 3.1.5
AC.2.008 – Use non-privileged accounts or roles when accessing nonsecurity functions: NIST SP 800-171 Rev 2 3.1.6
AC.2.009 – Limit unsuccessful logon attempts: NIST SP 800-171 Rev 2 3.1.8
AC.2.010 – Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity: NIST SP 800-171 Rev 2 3.1.10
AC.2.011 – Authorize wireless access prior to allowing such connections: NIST SP 800-171 Rev 2 3.1.16
C003 – Control remote system access AC.2.013 – Monitor and control remote access sessions: NIST SP 800-171 Rev 2 3.1.12
AC.2.015 – Route remote access via managed access control points: NIST SP 800-171 Rev 2 3.1.14
C004 – Limit data access to authorized users and processes AC.2.016 – Control the flow of CUI in accordance with approved authorizations: NIST SP 800-171 Rev 2 3.1.3
2 ASSET MANAGEMENT (AM) C005 – Identify and document assets N/A
C006 – Manage asset inventory N/A
3 AUDIT AND ACCOUNTABILITY (AU) C007 – Define audit requirements AU.2.041 – Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions: NIST SP 800-171 Rev 2 3.3.2
C008 – Perform auditing AU.2.042 – Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity: NIST SP 800-171 Rev 2 3.3.1
AU.2.043 – Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records: NIST SP 800-171 Rev 2 3.3.7
C009 – Identify and protect audit information N/A
C010 – Review and manage audit logs AU.2.044 – Review audit logs.
4 AWARENESS AND TRAINING (AT) C011 – Conduct security awareness activities AT.2.056 – Ensure that managers, system administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems: NIST SP 800-171 Rev 2 3.2.1
C012 – Conduct training AT.2.057 – Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities: NIST SP 800-171 Rev 2 3.2.2
5 CONFIGURATION MANAGEMENT (CM) C013 – Establish configuration baselines CM.2.061 – Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles: NIST SP 800-171 Rev 2 3.4.1
CM.2.062 – Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities: NIST SP 800-171 Rev 2 3.4.6
CM.2.063 – Control and monitor user-installed software: NIST SP 800-171 Rev 2 3.4.9
C014 – Perform configuration and change management CM.2.064 – Establish and enforce security configuration settings for information technology products employed in organizational systems: NIST SP 800-171 Rev 2 3.4.2
CM.2.065 – Track, review, approve, or disapprove, and log changes to organizational systems: NIST SP 800-171 Rev 2 3.4.3
CM.2.066 – Analyze the security impact of changes prior to implementation: NIST SP 800-171 Rev 2 3.4.4
6 IDENTIFICATION AND AUTHENTICATION (IA) C015 – Grant access to authenticated entities IA.2.078 – Enforce a minimum password complexity and change of characters when new passwords are created: NIST SP 800-171 Rev 2 3.5.7
IA.2.079 – Prohibit password reuse for a specified number of generations: NIST SP 800-171 Rev 2 3.5.8
IA.2.080 – Allow temporary password use for system logons with an immediate change to a permanent password: NIST SP 800-171 Rev 2 3.5.9
IA.2.081 – Store and transmit only cryptographically-protected passwords: NIST SP 800-171 Rev 2 3.5.10
IA.2.082 – Obscure feedback of authentication information: NIST SP 800-171 Rev 2 3.5.11
7 INCIDENT RESPONSE (IR) C016 – Plan incident response IR.2.092 – Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities: NIST SP 800-171 Rev 2 3.6.1
C017 – Detect and report events IR.2.093 – Detect and report events.
IR.2.094 – Analyze and triage events to support event resolution and incident declaration.
C018 – Develop and implement a response to a declared incident IR.2.096 – Develop and implement responses to declared incidents according to pre- defined procedures.
C019 – Perform post incident reviews IR.2.097 – Perform root cause analysis on incidents to determine underlying causes.
C020 – Test incident response N/A
8 MAINTENANCE (MA) C021 – Manage maintenance MA.2.111 – Perform maintenance on organizational systems: NIST SP 800-171 Rev 2 3.7.1
MA.2.112 – Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance: NIST SP 800-171 Rev 2 3.7.2
MA.2.113 – Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete: NIST SP 800-171 Rev 2 3.7.5
MA.2.114 – Supervise the maintenance activities of personnel without required access authorization: NIST SP 800-171 Rev 2 3.7.6
9 MEDIA PROTECTION (MP) C022 – Identify and mark media N/A
C023 – Protect and control media MP.2.119 – Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital: NIST SP 800-171 Rev 2 3.8.1
MP.2.120 – Limit access to CUI on system media to authorized users: NIST SP 800-171 Rev 2 3.8.2
MP.2.121 – Control the use of removable media on system components: NIST SP 800-171 Rev 2 3.8.7
C024 – Sanitize media N/A
C025 – Protect media during transport N/A
10 PERSONNEL SECURITY (PS) C026 – Screen personnel PS.2.127 – Screen individuals prior to authorizing access to organizational systems containing CUI: NIST SP 800-171 Rev 2 3.9.1
C027 – Protect CUI during personnel actions PS.2.128 – Ensure that organizational systems containing CUI are protected during and after personnel actions such as terminations and transfers: NIST SP 800-171 Rev 2 3.9.2
11 PHYSICAL PROTECTION (PE) C028 – Limit physical access PE.2.135 – Protect and monitor the physical facility and support infrastructure for organizational systems: NIST SP 800-171 Rev 2 3.10.2
12 RECOVERY (RE) C029 – Manage backups RE.2.137 – Regularly perform and test data backups.
RE.2.138 – Protect the confidentiality of backup CUI at storage locations: NIST SP 800-171 Rev 2 3.8.9
C030 – Manage information security continuity N/A
13 RISK MANAGEMENT (RM) C031 – Identify and evaluate risk RM.2.141 – Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI: NIST SP 800-171 Rev 2 3.11.1
RM.2.142 – Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified: NIST SP 800-171 Rev 2 3.11.2
C032 – Manage risk RM.2.143 – Remediate vulnerabilities in accordance with risk assessments: NIST SP 800-171 Rev 2 3.11.3
C033 – Manage supply chain risk N/A
14 SECURITY ASSESSMENT (CA) C034 – Develop and manage a system security plan CA.2.157 – Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems: NIST SP 800-171 Rev 2 3.12.4
C035 – Define and manage controls CA.2.158 – Periodically assess the security controls in organizational systems to determine if the controls are effective in their application: NIST SP 800-171 Rev 2 3.12.1
CA.2.159 – Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems: NIST SP 800-171 Rev 2 3.12.2
C036 – Perform code reviews N/A
15 SITUATIONAL AWARENESS (SA) C037 – Implement threat monitoring N/A
16 SYSTEM AND COMMUNICATIONS PROTECTION (SC) C038 – Define security requirements for systems and communications SC.2.178 – Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device: NIST SP 800-171 Rev 2 3.13.12
SC.2.179 – Use encrypted sessions for the management of network devices.
C039 – Control communications at system boundaries N/A
17 SYSTEM AND INFORMATION INTEGRITY (SI) C040 – Identify and manage information system flaws SI.2.214 – Monitor system security alerts and advisories and take action in response: NIST SP 800-171 Rev 2 3.14.3
C041 – Identify malicious content N/A
C042 – Perform network and system monitoring SI.2.216 – Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks: NIST SP 800-171 Rev 2 3.14.6
SI.2.217 – Identify unauthorized use of organizational systems: NIST SP 800-171 Rev 2 3.14.7
C043 – Implement advanced email protections N/A