| Domain | Requirements | Objectives |
|---|---|---|
| Access Control (AC) | 4 | 19 |
| Identification and Authentication (IA) | 2 | 5 |
| Media Protection (MP) | 1 | 2 |
| Physical Protection (PE) | 2 | 10 |
| System and Communications Protection (SC) | 2 | 10 |
| System and Information Integrity (SI) | 4 | 12 |
| Requirement | Obj | Summary | Examples |
|---|---|---|---|
| ac.l1-b.1.i Authorized Access Control [FCI Data] |
a | This objective requires you to identify and document who is authorized to access your systems that handle Federal Contract Information (FCI). To demonstrate compliance, you need to have a list or process that clearly identifies authorized users and how that list is used to grant access to systems. | Here are three concrete compliance examples for the CMMC Level 1 objective AC.L1-B.1.I, tailored to a real estate consulting firm working with government clients: **Example 1:** Scenario: A real estate consultant, Sarah, is assigned to a project involving the assessment of government-o... |
| ac.l1-b.1.i Authorized Access Control [FCI Data] |
b | This objective requires that you can identify which processes are running on your systems on behalf of authorized users. To demonstrate compliance, you need to show that you have a way to determine which processes are linked to specific authorized users, for example, through process monitoring, logging, or access control lists. | Here are three concrete, realistic compliance examples for the AC.L1-B.1.I objective, tailored to a real estate consulting firm working with government clients: **Example 1:** Access to Government Property Database via API * **Scenario:** The consulting firm uses a custom-built appli... |
| ac.l1-b.1.i Authorized Access Control [FCI Data] |
c | This objective requires organizations to identify and document which devices and systems are authorized to connect to their network and access Federal Contract Information (FCI). To demonstrate compliance, an organization should maintain a list or inventory of authorized devices and systems, and have a process in place to review and approve new devices before they are granted network access. This helps ensure only trusted devices can access sensitive information. | Here are three concrete examples of how the real estate consulting firm could satisfy the CMMC Level 1 objective AC.L1-B.1.I, specifically focusing on identifying authorized devices connecting to the system: **Example 1:** Scenario: A new consultant, Sarah, joins the firm to work on a project... |
| ac.l1-b.1.i Authorized Access Control [FCI Data] |
d | This objective requires that access to systems handling Federal Contract Information (FCI) is restricted only to individuals who have been explicitly authorized. To demonstrate compliance, an organization needs to show they have a process for authorizing users and that this authorization is enforced when granting access to the system. | Here are three concrete, realistic compliance examples for the CMMC Level 1 objective AC.L1-B.1.I, tailored to a real estate consulting firm working with federal and local government clients: **Example 1:** Scenario: The consulting firm uses a cloud-based project management system (e.g... |
| ac.l1-b.1.i Authorized Access Control [FCI Data] |
e | This objective requires that system access is restricted to only authorized users and the processes they initiate. To demonstrate compliance, you need to show that your systems are configured to prevent unauthorized access and that processes running on the system are acting on behalf of authorized users (e.g., through authentication and authorization mechanisms). This can be shown through documented access control policies, system configurations, and access logs. | Here are three concrete, realistic compliance examples for the CMMC Level 1 objective AC.L1-B.1.I, tailored to a real estate consulting firm advising government clients: **Example 1:** *Restricting Access to Government Property Databases* Scenario: The consulting firm uses a cloud-base... |
| ac.l1-b.1.i Authorized Access Control [FCI Data] |
f | This objective requires that only authorized devices (including other systems) are allowed to access the system. To demonstrate compliance, an organization must implement controls that prevent unauthorized devices from connecting to the system and have a process for authorizing new devices before they are granted access. This could involve network access control lists, device authentication, and a documented authorization process. | Here are three concrete compliance examples for the consulting firm, tailored to the CMMC Level 1 objective AC.L1-B.1.I, focusing on authorized device access to FCI: **Example 1:** Scenario: A real estate consultant, Jane, needs to access a secure, cloud-based project management system... |
| ac.l1-b.1.ii Transaction & Function Control [FCI Data] |
a | This objective requires organizations to define the types of actions (transactions and functions) each authorized user is allowed to perform on systems handling Federal Contract Information (FCI). To demonstrate compliance, organizations must show they have documented these defined permissions and that system access is limited based on these definitions, ensuring users can only perform actions appropriate to their role. | Here are three concrete compliance examples for AC.L1-B.1.II, tailored to a real estate consulting firm working with federal and local government clients and handling FCI: **Example 1:** Scenario: The firm uses a cloud-based project management system to store all project-related docume... |
| ac.l1-b.1.ii Transaction & Function Control [FCI Data] |
b | This objective requires that access to systems is limited to only the transactions and functions that authorized users are allowed to perform. To demonstrate compliance, an organization must show that they have defined the types of transactions and functions each user is permitted to execute and that the system enforces these limitations. This can be achieved through access control policies, procedures, system configurations, and audit logs. | Here are three concrete compliance examples for AC.L1-B.1.II, tailored to a real estate consulting firm working with government clients: **Example 1:** A new analyst, Sarah, is hired to assist with facility assessments for a DoD client. Her initial role focuses on data entry and basic ... |
| ac.l1-b.1.iii External Connections [FCI Data] |
a | This objective requires organizations to identify all connections to external systems that process, store, or transmit Federal Contract Information (FCI). To demonstrate compliance, an organization needs to document and maintain a list of these external connections and have a process for verifying and controlling/limiting these connections. | Here are three concrete, realistic compliance examples for the consulting firm, addressing the CMMC Level 1 objective AC.L1-B.1.III: External Connections [FCI Data]: **Example 1:** External Cloud Storage for Project Collaboration * **Scenario:** The firm uses a cloud storage service ... |
| ac.l1-b.1.iii External Connections [FCI Data] |
b | This objective requires organizations to identify all external systems that connect to their network and could potentially access, process, store, or transmit Federal Contract Information (FCI). To demonstrate compliance, an organization needs to document a list of these external systems and show that they are aware of how these systems are being used. This could be achieved through a documented inventory or diagram showing external connections. | Here are three concrete examples of how the real estate consulting firm can satisfy the CMMC Level 1 objective AC.L1-B.1.III, focusing on identifying the use of external systems when handling FCI data: **Example 1:** * **Scenario:** A consultant is performing a site selection study f... |
| ac.l1-b.1.iii External Connections [FCI Data] |
c | This objective requires organizations to verify the security of connections to external systems that process, store, or transmit Federal Contract Information (FCI). To demonstrate compliance, an organization needs to show evidence that they have a process for verifying the security of these connections, potentially through assessments, attestations, or other means, and that they control/limit these connections. This ensures that external systems don't compromise the organization's systems or FCI. | Here are three concrete compliance examples for the CMMC Level 1 requirement AC.L1-B.1.III, tailored to a real estate consulting firm working with government clients: Example 1: **Secure Access to Cloud-Based Project Management System:** Scenario: The consulting firm uses a cloud-based pro... |
| ac.l1-b.1.iii External Connections [FCI Data] |
d | This objective requires organizations to verify the security of external systems that connect to their internal systems and process, store, or transmit Federal Contract Information (FCI). To demonstrate compliance, organizations need to show they have a process to verify the security posture of these external connections, potentially through assessments, attestations, or other methods, ensuring they don't compromise the organization's FCI. This verification process should be documented and consistently applied. | Here are three concrete compliance examples for AC.L1-B.1.III relevant to a real estate consulting firm handling FCI for government clients: **Example 1:** Remote Access to the Firm's Project Management System. * **Scenario:** A consultant is working remotely from their home office o... |
| ac.l1-b.1.iii External Connections [FCI Data] |
e | This objective requires organizations to control and limit connections to external systems that process, store, or transmit Federal Contract Information (FCI). To demonstrate compliance, organizations must show they have implemented policies and procedures to manage these connections, potentially including restrictions on external system use or verification of security controls on those systems. This can be achieved through methods like third-party assessments or attestations. | Here are three concrete compliance examples for the consulting firm, addressing the "External Connections [FCI Data]" requirement, AC.L1-B.1.III: Example 1: **Restricting Personal Device Access to FCI**. Scenario: Consultants frequently use their personal laptops and tablets ... |
| ac.l1-b.1.iii External Connections [FCI Data] |
f | This objective requires organizations to control and limit the use of external systems (including cloud services and personal devices) when processing, storing, or transmitting Federal Contract Information (FCI). To demonstrate compliance, an organization must have policies and procedures in place that define acceptable use of external systems, and enforce those policies to prevent unauthorized access or processing of FCI on unapproved systems. This can be shown through documentation of policies, employee training, and enforcement mechanisms like technical controls or regular audits. | Here are three concrete compliance examples for the consulting firm, addressing the CMMC Level 1 requirement AC.L1-B.1.III, focusing on controlling/limiting external connections when handling FCI: **Example 1:** Scenario: A real estate consultant is conducting a site selection study fo... |
| ac.l1-b.1.iv Control Public Information [FCI Data] |
a | This objective requires you to identify individuals authorized to post or process information on publicly accessible systems. To demonstrate compliance, you need to document who is authorized to post information and ideally have a process in place to ensure only authorized individuals can perform this action. This helps prevent unauthorized disclosure of FCI. | Here are three concrete examples of how the real estate consulting firm can satisfy the CMMC Level 1 objective AC.L1-B.1.IV, controlling public information (FCI data) on publicly accessible systems: **Example 1:** *Scenario:* The consulting firm maintains a public-facing website that s... |
| ac.l1-b.1.iv Control Public Information [FCI Data] |
b | This objective requires organizations to control what information, specifically FCI, is posted on publicly accessible systems. To demonstrate compliance, an organization needs documented procedures that ensure FCI is not inadvertently or intentionally made public, including designating authorized personnel and reviewing content before posting. | Here are three concrete examples of how a real estate consulting firm working with government clients can comply with CMMC Level 1 requirement AC.L1-B.1.iv: Example 1: **Website Content Review for FCI** Scenario: The consulting firm maintains a public-facing website to showcase its exp... |
| ac.l1-b.1.iv Control Public Information [FCI Data] |
c | This objective requires organizations to have a review process in place before posting content to publicly accessible systems to prevent the unintentional disclosure of Federal Contract Information (FCI). To demonstrate compliance, an organization needs to show evidence of a documented review process and that it is being followed before any content is posted publicly. | Here are three concrete compliance examples for the CMMC Level 1 objective AC.L1-B.1.IV, tailored to a real estate consulting firm working with government clients: **Example 1:** *Scenario:* The firm is contracted by the General Services Administration (GSA) to conduct a site selection... |
| ac.l1-b.1.iv Control Public Information [FCI Data] |
d | This objective requires organizations to review content before it's posted on publicly accessible systems (like websites) to ensure it doesn't contain Federal Contract Information (FCI). To demonstrate compliance, an organization should have a documented review process in place, designate authorized personnel for posting, and maintain records of these reviews. | Here are three concrete compliance examples for the consulting firm, addressing the CMMC Level 1 objective AC.L1-B.1.IV: **Example 1:** Scenario: The firm maintains a public-facing website showcasing its expertise and past projects. A recent project involved a site selection study for ... |
| ac.l1-b.1.iv Control Public Information [FCI Data] |
e | This objective requires organizations to have mechanisms in place to prevent and correct the improper posting of FCI (Federal Contract Information) on publicly accessible systems. To demonstrate compliance, organizations need to show they have procedures for reviewing content before it's posted and for removing/addressing any accidental disclosures of FCI on public platforms. | Here are three concrete, realistic compliance examples for the consulting firm, addressing CMMC Level 1 requirement AC.L1-B.1.IV: Example 1: **Website Content Review Process:** The consulting firm maintains a publicly accessible website showcasing its expertise and past projects. Before any n... |
| ia.l1-b.1.v Identification [FCI Data] |
a | This objective requires you to identify all users, processes acting on behalf of users, and devices that access your systems. To demonstrate compliance, you need to show that each user, process, and device has a unique identifier (like a username or device name) and that you have a documented process for managing these identifiers. This ensures accountability and supports access control. | Here are three concrete compliance examples for the CMMC Level 1 objective IA.L1-B.1.V, tailored to a real estate consulting firm working with government clients and handling FCI: **Example 1:** Scenario: Our firm utilizes a cloud-based project management system (e.g., Monday.com, Asan... |
| ia.l1-b.1.v Identification [FCI Data] |
b | This objective requires that system access is limited to only the types of transactions and functions that authorized users are permitted to execute. To demonstrate compliance, an organization must define the types of transactions and functions each authorized user can perform and then implement technical controls to enforce those limitations. This ensures users can only access what they need to perform their job, protecting FCI. | Here are three concrete, realistic compliance examples for the CMMC Level 1 objective IA.L1-B.1.V, tailored to a real estate consulting firm working with federal government clients: **Example 1:** The firm utilizes a project management system (e.g., a cloud-based application like Asana... |
| ia.l1-b.1.vi Authentication [FCI Data] |
a | This objective requires that you verify the identity of anyone (user, process, or device) before they are allowed to access your organization's information systems that handle Federal Contract Information (FCI). To demonstrate compliance, you need to show that you have implemented a method of authentication, such as passwords, key cards, or multi-factor authentication, and that these methods are consistently applied before granting access to FCI-containing systems. This includes resetting default passwords and ensuring authentication is enforced for cloud services. | Here are three concrete compliance examples for CMMC Level 1 objective IA.L1-B.1.VI, tailored to a real estate consulting firm working with government clients: **Example 1:** Scenario: Our firm uses a cloud-based project management system (e.g., Asana, Monday.com) to manage projects in... |
| ia.l1-b.1.vi Authentication [FCI Data] |
b | This objective requires you to ensure that every process running on behalf of a user is authenticated before it can access the system. To demonstrate compliance, you need to show that your system verifies the identity of each process, likely through mechanisms like user login credentials or other authentication methods, before granting access to organizational information systems. | Here are three concrete, realistic compliance examples for the CMMC Level 1 assessment objective IA.L1-B.1.VI, tailored to a real estate consulting firm working with government clients and handling FCI: **Example 1:** Accessing Government Property Databases Containing FCI **Scenario:**... |
| ia.l1-b.1.vi Authentication [FCI Data] |
c | This objective requires that you verify the identity of every device before it's allowed to access your system, especially if that system handles Federal Contract Information (FCI). To demonstrate compliance, you need to show that you have a process in place to authenticate devices (like using passwords, certificates, or other methods) before they can connect and access FCI. | Here are three concrete examples of how the real estate consulting firm can satisfy the CMMC Level 1 objective IA.L1-B.1.VI, focusing on authentication of devices accessing FCI data: **Example 1:** Scenario: A real estate consultant is conducting a site selection study for a new GSA of... |
| mp.l1-b.1.vii Media Disposal [FCI Data] |
a | This objective requires you to properly sanitize or destroy any physical or digital media (like hard drives, CDs, or even paper) that contains Federal Contract Information (FCI) before getting rid of it or reusing it. To demonstrate compliance, you need to show evidence that you have a process in place to identify FCI-containing media and then sanitize or destroy it using approved methods (like shredding, degaussing, or overwriting). | Here are three concrete compliance examples for the given CMMC Level 1 objective, tailored to a real estate consulting firm working with government clients: **Example 1:** Scenario: A consultant completes a facility assessment report for a GSA-leased building. The report contains FCI, ... |
| mp.l1-b.1.vii Media Disposal [FCI Data] |
b | This objective requires you to sanitize or destroy any system media (digital or physical) that contains Federal Contract Information (FCI) before you get rid of it or reuse it. To demonstrate compliance, you need to document and implement procedures for sanitizing or destroying media, and maintain records showing that these procedures were followed when media was disposed of or reused. | Here are three concrete, realistic compliance examples for the "MP.L1-B.1.VII – MEDIA DISPOSAL [FCI DATA]" requirement, tailored to a real estate consulting firm advising government clients: **Example 1:** Physical Disposal of Printed Lease Documents and Facility Reports * ... |
| pe.l1-b.1.viii Limit Physical Access [FCI Data] |
a | This objective requires you to identify who is authorized to access areas where Federal Contract Information (FCI) is stored or processed. To demonstrate compliance, you need to show how you identify authorized individuals (e.g., through badges, access lists, or other credentials) and that these controls are in place to limit physical access to only those individuals. | Here are three concrete examples of how the real estate consulting firm can meet the CMMC Level 1 objective PE.L1-B.1.VIII – Limit Physical Access [FCI Data]: Example 1: **Securing the Server Room Containing Government Property Data** Scenario: The firm maintains a dedicated server roo... |
| pe.l1-b.1.viii Limit Physical Access [FCI Data] |
b | This objective requires organizations to restrict physical access to systems, equipment, and environments containing Federal Contract Information (FCI) to only authorized personnel. Compliance can be demonstrated by implementing controls like locked rooms, keycard access, or monitored locations, and ensuring only authorized individuals have access credentials (keys, badges, etc.) to these areas. | Here are three concrete compliance examples for the CMMC Level 1 objective PE.L1-B.1.VIII, tailored to a real estate consulting firm working with government clients: **Example 1:** *Scenario:* The firm maintains a secure server room containing servers that store FCI related to a DoD ba... |
| pe.l1-b.1.viii Limit Physical Access [FCI Data] |
c | This objective requires you to restrict physical access to systems and equipment that process, store, or transmit Federal Contract Information (FCI) to only authorized personnel. To demonstrate compliance, you need to implement physical security measures like locked doors, key cards, or monitored locations, and ensure only authorized individuals have access to these areas. | Here are three concrete, realistic compliance examples for the consulting firm, addressing the CMMC Level 1 objective PE.L1-B.1.VIII: **Example 1:** Scenario: The consulting firm maintains a secure server room where it stores electronic copies of facility assessments containing FCI rel... |
| pe.l1-b.1.viii Limit Physical Access [FCI Data] |
d | This objective requires that physical access to areas where Federal Contract Information (FCI) is stored, processed, or transmitted is restricted to only authorized personnel. To demonstrate compliance, you need to show that measures are in place, like locks and access control, to prevent unauthorized individuals from physically accessing these areas and the equipment within them. This could involve keycards, locked rooms, or monitored areas. | Here are three concrete, realistic compliance examples for the consulting firm, directly related to limiting physical access to FCI data, based on the provided CMMC Level 1 objective: **Example 1:** Scenario: The consulting firm is conducting a site selection study for a new GSA region... |
| pe.l1-b.1.ix Manage Visitors & Physical Access [FCI Data] |
a | This objective requires that all visitors to areas where Federal Contract Information (FCI) is stored or processed are escorted while on-site. To demonstrate compliance, organizations must implement procedures to ensure visitors are accompanied and monitored, and provide evidence of these procedures in practice, such as visitor logs or incident reports. | Here are three concrete, realistic compliance examples for the consulting firm, addressing the CMMC Level 1 requirement PE.L1-B.1.IX: **Example 1:** A government client (e.g., a representative from the GSA) visits the consulting firm's office to review a draft facility assessment report conta... |
| pe.l1-b.1.ix Manage Visitors & Physical Access [FCI Data] |
b | This objective requires organizations to monitor the activities of visitors who have access to areas where Federal Contract Information (FCI) is stored or processed. To demonstrate compliance, an organization needs to show evidence that visitor activity is being tracked, such as through a visitor log, automated access control system, or other monitoring methods. This ensures that unauthorized access to FCI is prevented. | Here are three concrete, realistic compliance examples for the consulting firm, addressing the CMMC Level 1 objective PE.L1-B.1.IX, focusing on monitoring visitor activity: Example 1: **Visitor Log and Escort Policy for Client Meetings Involving CUI** *Scenario:* A consultant is hostin... |
| pe.l1-b.1.ix Manage Visitors & Physical Access [FCI Data] |
c | This objective requires maintaining records of physical access to areas where Federal Contract Information (FCI) is stored or processed. To comply, an organization must implement and retain audit logs (either manual or automated) that track who enters and exits these areas, demonstrating a record of physical access activity. This could involve visitor sign-in sheets, badge access logs, or a combination of methods. | Here are three concrete, realistic compliance examples for the CMMC Level 1 objective PE.L1-B.1.IX, tailored to a real estate consulting firm working with government clients: **Example 1:** Scenario: The firm's office houses a secure room where sensitive government property databases (cont... |
| pe.l1-b.1.ix Manage Visitors & Physical Access [FCI Data] |
d | This objective requires the organization to identify all physical access devices used to control access to facilities and systems where Federal Contract Information (FCI) is stored or processed. To demonstrate compliance, the organization needs to document and maintain a list of all such devices, including keys, locks, combinations, and card readers, and ensure this list is readily available for assessment. | Here are three concrete compliance examples for the consulting firm, addressing the CMMC Level 1 objective PE.L1-B.1.IX, focusing on identifying physical access devices: **Example 1:** Scenario: The firm uses a combination of keycard access and traditional keyed locks to secure its off... |
| pe.l1-b.1.ix Manage Visitors & Physical Access [FCI Data] |
e | This objective requires you to control physical access devices like keys, locks, and card readers to protect FCI data. To demonstrate compliance, you need to show that you have mechanisms in place to manage and secure these devices, preventing unauthorized access to areas where FCI data is stored or processed. This could involve procedures for issuing, tracking, and revoking access credentials, as well as physical security measures to protect the devices themselves. | Here are three concrete, realistic compliance examples for the consulting firm, addressing the CMMC Level 1 requirement PE.L1-B.1.IX: **Example 1:** Scenario: A federal client representative from the GSA (General Services Administration) is visiting the consulting firm's office to revi... |
| pe.l1-b.1.ix Manage Visitors & Physical Access [FCI Data] |
f | This objective requires organizations to manage physical access devices (keys, locks, card readers, etc.) to protect FCI data. To demonstrate compliance, organizations must show they have processes in place to control and track these devices, ensuring only authorized personnel have access and that devices are properly managed (e.g., revoked upon termination). This could involve maintaining records of issued devices, tracking their return, and ensuring they are appropriately secured. | Here are three concrete compliance examples for the CMMC Level 1 requirement PE.L1-B.1.IX, tailored to a real estate consulting firm working with government clients: **Example 1:** A consultant is assigned to a project involving the assessment of a GSA-leased property containing FCI related t... |
| sc.l1-b.1.x Boundary Protection [FCI Data] |
a | This objective requires you to define the boundary of your system that handles Federal Contract Information (FCI). To demonstrate compliance, you need to document and maintain a clear definition of where your system begins and ends, including all external connections. This could be a network diagram or written description outlining the system's perimeter. | Here are three concrete, realistic compliance examples for the consulting firm, directly relevant to CMMC Level 1 requirement SC.L1-B.1.X, focusing on boundary protection of FCI data: **Example 1:** *Scenario:* The consulting firm utilizes a cloud-based project management system (e.g.,... |
| sc.l1-b.1.x Boundary Protection [FCI Data] |
b | This objective requires organizations to identify and define the key internal boundaries within their systems that handle Federal Contract Information (FCI). To demonstrate compliance, an organization needs to document these defined boundaries, likely through network diagrams or similar documentation, showing where internal network segments are separated and protected. | Here are three concrete, realistic compliance examples for the real estate consulting firm, focusing on CMMC Level 1 requirement SC.L1-B.1.X (Boundary Protection [FCI Data]): **Example 1:** *Scenario:* The firm uses a cloud-based project management system (e.g., Asana, Monday.com) to m... |
| sc.l1-b.1.x Boundary Protection [FCI Data] |
c | This objective requires organizations to monitor communications at the boundary of their systems to protect Federal Contract Information (FCI). To demonstrate compliance, an organization should show evidence of monitoring communications at the external system boundary, such as firewall logs or reports of blocked malicious activity, and that these monitoring activities are in place to detect and prevent unauthorized access to FCI. | Here are three concrete, realistic compliance examples for the consulting firm related to CMMC Level 1 requirement SC.L1-B.1.X: **Example 1:** *Scenario:* The consulting firm uses a cloud-based project management system (e.g., Asana, Monday.com) to manage projects involving FCI, such a... |
| sc.l1-b.1.x Boundary Protection [FCI Data] |
d | This objective requires monitoring communications at key internal boundaries within your system to detect and respond to potential threats. To demonstrate compliance, you need to show that you have mechanisms in place (like logging and review processes) to track communication activity at these internal boundaries and that you are actively reviewing this data for suspicious activity. This could involve analyzing logs from firewalls, intrusion detection systems, or other security tools. | Here are three concrete, realistic compliance examples for the consulting firm, addressing the CMMC Level 1 requirement SC.L1-B.1.X, Boundary Protection [FCI Data]: Example 1: **Monitoring Email Communications Containing FCI** Scenario: The consulting firm uses Microsoft 365 for email ... |
| sc.l1-b.1.x Boundary Protection [FCI Data] |
e | This objective requires organizations to control communications at the boundary of their systems to protect Federal Contract Information (FCI). To demonstrate compliance, an organization needs to show that they have implemented a mechanism, like a firewall, to monitor and control network traffic entering and leaving their systems, and that this mechanism is configured to block potentially malicious traffic. Evidence could include firewall configuration logs, network diagrams showing the boundary, and documentation of the firewall's capabilities. | Here are three concrete, realistic compliance examples for the consulting firm, directly addressing the CMMC Level 1 objective SC.L1-B.1.X: Example 1: **Firewall Configuration for Government Property Database Access:** The consulting firm uses a cloud-based government property database (e.g.,... |
| sc.l1-b.1.x Boundary Protection [FCI Data] |
f | This objective requires organizations to control and monitor communications at key internal boundaries within their systems to protect Federal Contract Information (FCI). Compliance can be demonstrated by implementing security measures like firewalls, routers, or intrusion detection systems at these internal boundaries and documenting the rules and configurations that control traffic flow. Evidence should show that these controls are actively monitoring and restricting unauthorized communication attempts. | Here are three concrete, realistic compliance examples for the CMMC Level 1 requirement SC.L1-B.1.X, tailored to a real estate consulting firm working with government clients: **Example 1: Internal Network Segmentation for CUI Data** *Scenario:* The consulting firm uses a shared networ... |
| sc.l1-b.1.x Boundary Protection [FCI Data] |
g | This objective requires that you protect communications entering and leaving your system at its boundaries (like your network's edge). To demonstrate compliance, you need to show that you have implemented controls like firewalls and intrusion detection systems and that you are monitoring and controlling network traffic to prevent unauthorized access and malicious activity. This includes things like blocking access to known malicious websites. | Here are three concrete, realistic compliance examples for the consulting firm, addressing the CMMC Level 1 requirement SC.L1-B.1.X related to boundary protection of FCI data: **Example 1:** *Scenario:* The consulting firm uses a cloud-based project management system (e.g., Asana, Mond... |
| sc.l1-b.1.x Boundary Protection [FCI Data] |
h | This objective requires organizations to protect sensitive information (FCI) by monitoring, controlling, and securing communications at critical points within their network. Compliance can be demonstrated by implementing security measures like firewalls, intrusion detection systems, and access controls at internal network boundaries, and by showing evidence of their configuration and monitoring. | Here are three concrete, realistic compliance examples for the CMMC Level 1 assessment objective SC.L1-B.1.X, tailored to a real estate consulting firm working with government clients: **Example 1:** *Scenario:* The consulting firm utilizes a shared network drive to store and collabora... |
| sc.l1-b.1.xi Public-Access System Separation [FCI Data] |
a | This objective requires you to identify all system components that are accessible to the public. To demonstrate compliance, you need to show that you've identified these components and that they are separated from your internal network (where FCI is stored) using a firewall or other similar technology, effectively creating a DMZ. | Here are three examples of how the real estate consulting firm could satisfy the CMMC Level 1 objective SC.L1-B.1.XI, focusing on realistic scenarios: **Example 1:** Scenario: The firm hosts a public-facing website to showcase its real estate expertise and services to potential governm... |
| sc.l1-b.1.xi Public-Access System Separation [FCI Data] |
b | This objective requires you to isolate any publicly accessible system components (like a website) from your internal network where Federal Contract Information (FCI) is stored. To demonstrate compliance, you need to show that you've implemented a physical or logical separation (like a DMZ using a firewall) between the public-facing system and the internal network containing FCI, ensuring no direct access is possible. | Here are three concrete compliance examples for SC.L1-B.1.XI, tailored to a real estate consulting firm working with government clients: **Example 1:** *Scenario:* The firm hosts a public-facing web portal to allow government agencies to access non-sensitive information about available... |
| si.l1-b.1.xii Flaw Remediation [FCI Data] |
a | This objective requires organizations to define a timeframe for identifying flaws in systems that process Federal Contract Information (FCI). To demonstrate compliance, an organization must have a documented policy or procedure that specifies how often they check for system flaws (e.g., weekly, monthly) and be able to show evidence that they are adhering to that defined timeframe. | Here are three concrete, realistic compliance examples for SI.L1-B.1.XII – FLAW REMEDIATION [FCI DATA], tailored to a real estate consulting firm advising government clients: **Example 1:** The firm uses a cloud-based project management system (e.g., Asana, Monday.com) to track all client ... |
| si.l1-b.1.xii Flaw Remediation [FCI Data] |
b | This objective requires you to identify system flaws (vulnerabilities) affecting FCI data within a reasonable timeframe. To demonstrate compliance, you need to show that you have processes in place to regularly check for and identify these flaws, such as monitoring vendor websites or using vulnerability scanning tools. You also need to have a defined timeframe for identifying these flaws. | Here are three concrete, realistic compliance examples for the consulting firm, demonstrating how they would satisfy the CMMC Level 1 objective SI.L1-B.1.XII – Flaw Remediation [FCI Data]: **Example 1:** Scenario: The firm uses a cloud-based project management system (e.g., Asana, Mond... |
| si.l1-b.1.xii Flaw Remediation [FCI Data] |
c | This objective requires you to specify a timeframe for reporting system flaws. To demonstrate compliance, you need to have a documented policy or procedure that outlines how quickly identified flaws are reported to the appropriate personnel responsible for information security. This timeframe should be reasonable and consider the potential impact of the flaw. | Here are three concrete, realistic compliance examples for the given CMMC Level 1 objective, tailored to a real estate consulting firm working with government clients: **Example 1:** Scenario: The firm uses a cloud-based project management system (e.g., Asana, Monday.com, or a custom solut... |
| si.l1-b.1.xii Flaw Remediation [FCI Data] |
d | This objective requires you to report identified system flaws (vulnerabilities) affecting Federal Contract Information (FCI) within a defined timeframe. To demonstrate compliance, you need to show that you have a process for identifying flaws, reporting them to the appropriate personnel, and that these reports are made within the timeframes you've established (and justified). | Here are three concrete, realistic compliance examples for the consulting firm, addressing the CMMC Level 1 objective SI.L1-B.1.XII (Flaw Remediation): Example 1: **Vulnerability Scanning of Real Estate Portfolio Management Software:** The firm uses a cloud-based real estate portfolio ... |
| si.l1-b.1.xii Flaw Remediation [FCI Data] |
e | This objective requires organizations to define and document the timeframe within which they will correct identified flaws in systems processing Federal Contract Information (FCI). To demonstrate compliance, an organization needs to have a documented policy or procedure specifying these timeframes, which may vary based on the severity of the flaw and the system's criticality. The organization must also be able to show evidence that they adhere to these defined timeframes when addressing identified flaws. | Here are three compliance examples for the CMMC Level 1 objective SI.L1-B.1.XII, tailored for a real estate consulting firm working with government clients: **Example 1:** Scenario: The firm uses a cloud-based project management system (e.g., Asana, Monday.com) to track all real estate... |
| si.l1-b.1.xii Flaw Remediation [FCI Data] |
f | This objective requires you to fix identified flaws in your systems that handle Federal Contract Information (FCI) within a reasonable timeframe. To demonstrate compliance, you need to show that you have a process for identifying flaws (e.g., checking vendor websites), a defined timeframe for correcting them based on severity, and evidence that you're actually implementing those fixes according to your schedule. | Here are three concrete examples of how the real estate consulting firm could comply with CMMC Level 1's SI.L1-B.1.XII requirement, specifically focusing on the "Flaw Remediation [FCI Data]" objective: **Example 1:** The firm uses a cloud-based project management system (e.g.... |
| si.l1-b.1.xiii Malicious Code ProTection [FCI Data] |
a | This objective requires organizations to identify specific locations within their systems where malicious code protection measures are implemented. To demonstrate compliance, an organization needs to document and provide evidence of these designated locations, such as firewalls, servers, and workstations, where anti-malware software or other protective measures are in place to safeguard Federal Contract Information (FCI). | Here are three concrete compliance examples for SI.L1-B.1.XIII tailored to a real estate consulting firm working with government clients: **Example 1:** A consultant is preparing a comprehensive facility assessment report for a GSA-leased property containing FCI related to the building's secu... |
| si.l1-b.1.xiii Malicious Code ProTection [FCI Data] |
b | This objective requires organizations to implement and maintain protection against malicious code (like viruses and spyware) at key locations within their systems that handle Federal Contract Information (FCI). To demonstrate compliance, organizations need to show they have deployed and are actively using anti-malware solutions (like antivirus software) on systems such as workstations, servers, and mobile devices that process, store, or transmit FCI. | Here are three concrete examples of how the real estate consulting firm could satisfy the CMMC Level 1 objective SI.L1-B.1.XIII, focusing on protection from malicious code when handling FCI data: **Example 1:** *Scenario:* The firm's real estate analysts frequently download property da... |
| si.l1-b.1.xiv Update Malicious Code Protection [FCI Data] |
a | This objective requires you to keep your anti-malware software up-to-date with the latest releases and definitions. To demonstrate compliance, you need to show that your systems are configured to automatically check for and install updates for your malicious code protection mechanisms (like anti-virus) on a regular basis. This ensures your systems are protected against the latest threats. | Here are three compliance examples tailored to the real estate consulting firm, addressing the SI.L1-B.1.XIV requirement: **Example 1:** The firm utilizes laptops to conduct on-site facility assessments and generate inspection reports containing FCI, such as identifying vulnerabilities within... |
| si.l1-b.1.xv System & File Scanning [FCI Data] |
a | This objective requires you to define how often you scan your systems for malicious code. To demonstrate compliance, you need to document the defined frequency (e.g., daily, weekly) and show evidence that these scans are actually being performed according to that schedule, such as logs from your antivirus software. | Here are three concrete, realistic compliance examples for the CMMC Level 1 objective SI.L1-B.1.XV, tailored to a real estate consulting firm specializing in government clients: **Example 1:** Scenario: Handling Facility Assessment Reports Containing FCI The firm conducts facility asse... |
| si.l1-b.1.xv System & File Scanning [FCI Data] |
b | This objective requires you to regularly scan your systems for malicious code (like viruses) and to scan files from external sources (like downloads or USB drives) when they are accessed. To demonstrate compliance, you need to show evidence that these scans are happening at a defined frequency (e.g., daily antivirus scans) and that you have a process in place to handle suspicious files (e.g., quarantine and notification). | Here are three concrete compliance examples for the CMMC Level 1 requirement SI.L1-B.1.XV, tailored to a real estate consulting firm working with government clients: **Example 1:** *Scenario:* The firm's project team is conducting a site selection study for a new GSA office building. T... |
| si.l1-b.1.xv System & File Scanning [FCI Data] |
c | This objective requires implementing real-time scanning of files originating from external sources (like the internet or USB drives) as they are downloaded, opened, or executed. To demonstrate compliance, you need to show evidence that your system actively scans these files for malicious code upon access, and that suspicious files are quarantined or flagged for further investigation. This could involve demonstrating the configuration of antivirus software or email security solutions. | Here are three concrete, realistic compliance examples for the consulting firm, addressing the SI.L1-B.1.XV requirement: **Example 1:** *Real-time Scanning of Downloaded Government Property Data* Scenario: A real estate consultant is tasked with performing a site selection study for a ... |
Policy templates associated with each requirement and objective.
| Req | Obj | Examine | Interview | Test |
|---|---|---|---|---|
| ac.l1-b.1.i | a | Access control policy; procedures addressing account management; system security plan45; system design documentation; system configuration settings and associated documentation; list of active system accounts and the name of the individual associated with each account; notifications or records of recently transferred, separated, or terminated employees; list of conditions for group and role membership; list of recently disabled system accounts along with the name of the individual associated with each account; access authorization records; account management compliance reviews; system monitoring records; system audit logs and records; list of devices and systems authorized to connect to organizational systems; other relevant documents or records |
Personnel with account management responsibilities; system or network administrators; personnel with information security responsibilities]. 3 NIST SP 800-171A, p. 9 4 It is recommended that an OSA develop a SSP as a best practice at Level 1, however, it is not required in order to obtain a Level 1 self-assessment. CMMC Assessment Guide – Level 1 Version 2.13 12 AC.L1-b.1.i – Authorized Access Control [FCI Data |
Organizational processes for managing system accounts; mechanisms for implementing account management |
| ac.l1-b.1.i | b | Access control policy; procedures addressing account management; system security plan45; system design documentation; system configuration settings and associated documentation; list of active system accounts and the name of the individual associated with each account; notifications or records of recently transferred, separated, or terminated employees; list of conditions for group and role membership; list of recently disabled system accounts along with the name of the individual associated with each account; access authorization records; account management compliance reviews; system monitoring records; system audit logs and records; list of devices and systems authorized to connect to organizational systems; other relevant documents or records |
Personnel with account management responsibilities; system or network administrators; personnel with information security responsibilities]. 3 NIST SP 800-171A, p. 9 4 It is recommended that an OSA develop a SSP as a best practice at Level 1, however, it is not required in order to obtain a Level 1 self-assessment. CMMC Assessment Guide – Level 1 Version 2.13 12 AC.L1-b.1.i – Authorized Access Control [FCI Data |
Organizational processes for managing system accounts; mechanisms for implementing account management |
| ac.l1-b.1.i | c | Access control policy; procedures addressing account management; system security plan45; system design documentation; system configuration settings and associated documentation; list of active system accounts and the name of the individual associated with each account; notifications or records of recently transferred, separated, or terminated employees; list of conditions for group and role membership; list of recently disabled system accounts along with the name of the individual associated with each account; access authorization records; account management compliance reviews; system monitoring records; system audit logs and records; list of devices and systems authorized to connect to organizational systems; other relevant documents or records |
Personnel with account management responsibilities; system or network administrators; personnel with information security responsibilities]. 3 NIST SP 800-171A, p. 9 4 It is recommended that an OSA develop a SSP as a best practice at Level 1, however, it is not required in order to obtain a Level 1 self-assessment. CMMC Assessment Guide – Level 1 Version 2.13 12 AC.L1-b.1.i – Authorized Access Control [FCI Data |
Organizational processes for managing system accounts; mechanisms for implementing account management |
| ac.l1-b.1.i | d | Access control policy; procedures addressing account management; system security plan45; system design documentation; system configuration settings and associated documentation; list of active system accounts and the name of the individual associated with each account; notifications or records of recently transferred, separated, or terminated employees; list of conditions for group and role membership; list of recently disabled system accounts along with the name of the individual associated with each account; access authorization records; account management compliance reviews; system monitoring records; system audit logs and records; list of devices and systems authorized to connect to organizational systems; other relevant documents or records |
Personnel with account management responsibilities; system or network administrators; personnel with information security responsibilities]. 3 NIST SP 800-171A, p. 9 4 It is recommended that an OSA develop a SSP as a best practice at Level 1, however, it is not required in order to obtain a Level 1 self-assessment. CMMC Assessment Guide – Level 1 Version 2.13 12 AC.L1-b.1.i – Authorized Access Control [FCI Data |
Organizational processes for managing system accounts; mechanisms for implementing account management |
| ac.l1-b.1.i | e | Access control policy; procedures addressing account management; system security plan45; system design documentation; system configuration settings and associated documentation; list of active system accounts and the name of the individual associated with each account; notifications or records of recently transferred, separated, or terminated employees; list of conditions for group and role membership; list of recently disabled system accounts along with the name of the individual associated with each account; access authorization records; account management compliance reviews; system monitoring records; system audit logs and records; list of devices and systems authorized to connect to organizational systems; other relevant documents or records |
Personnel with account management responsibilities; system or network administrators; personnel with information security responsibilities]. 3 NIST SP 800-171A, p. 9 4 It is recommended that an OSA develop a SSP as a best practice at Level 1, however, it is not required in order to obtain a Level 1 self-assessment. CMMC Assessment Guide – Level 1 Version 2.13 12 AC.L1-b.1.i – Authorized Access Control [FCI Data |
Organizational processes for managing system accounts; mechanisms for implementing account management |
| ac.l1-b.1.i | f | Access control policy; procedures addressing account management; system security plan45; system design documentation; system configuration settings and associated documentation; list of active system accounts and the name of the individual associated with each account; notifications or records of recently transferred, separated, or terminated employees; list of conditions for group and role membership; list of recently disabled system accounts along with the name of the individual associated with each account; access authorization records; account management compliance reviews; system monitoring records; system audit logs and records; list of devices and systems authorized to connect to organizational systems; other relevant documents or records |
Personnel with account management responsibilities; system or network administrators; personnel with information security responsibilities]. 3 NIST SP 800-171A, p. 9 4 It is recommended that an OSA develop a SSP as a best practice at Level 1, however, it is not required in order to obtain a Level 1 self-assessment. CMMC Assessment Guide – Level 1 Version 2.13 12 AC.L1-b.1.i – Authorized Access Control [FCI Data |
Organizational processes for managing system accounts; mechanisms for implementing account management |
| ac.l1-b.1.ii | a | Access control policy; procedures addressing access enforcement; system security plan; system design documentation; list of approved authorizations including remote access authorizations; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records |
Personnel with access enforcement responsibilities; system or network administrators; personnel with information security responsibilities; system developers |
Mechanisms implementing access control policy |
| ac.l1-b.1.ii | b | Access control policy; procedures addressing access enforcement; system security plan; system design documentation; list of approved authorizations including remote access authorizations; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records |
Personnel with access enforcement responsibilities; system or network administrators; personnel with information security responsibilities; system developers |
Mechanisms implementing access control policy |
| ac.l1-b.1.iii | a | Access control policy; procedures addressing the use of external systems; terms and conditions for external systems; system security plan; list of applications accessible from external systems; system configuration settings and associated documentation; system connection or processing agreements; account management documents; other relevant documents or records |
Personnel with responsibilities for defining terms and conditions for use of external systems to access organizational systems; system or network administrators; personnel with information security responsibilities |
Mechanisms implementing terms and conditions on use of external systems |
| ac.l1-b.1.iii | b | Access control policy; procedures addressing the use of external systems; terms and conditions for external systems; system security plan; list of applications accessible from external systems; system configuration settings and associated documentation; system connection or processing agreements; account management documents; other relevant documents or records |
Personnel with responsibilities for defining terms and conditions for use of external systems to access organizational systems; system or network administrators; personnel with information security responsibilities |
Mechanisms implementing terms and conditions on use of external systems |
| ac.l1-b.1.iii | c | Access control policy; procedures addressing the use of external systems; terms and conditions for external systems; system security plan; list of applications accessible from external systems; system configuration settings and associated documentation; system connection or processing agreements; account management documents; other relevant documents or records |
Personnel with responsibilities for defining terms and conditions for use of external systems to access organizational systems; system or network administrators; personnel with information security responsibilities |
Mechanisms implementing terms and conditions on use of external systems |
| ac.l1-b.1.iii | d | Access control policy; procedures addressing the use of external systems; terms and conditions for external systems; system security plan; list of applications accessible from external systems; system configuration settings and associated documentation; system connection or processing agreements; account management documents; other relevant documents or records |
Personnel with responsibilities for defining terms and conditions for use of external systems to access organizational systems; system or network administrators; personnel with information security responsibilities |
Mechanisms implementing terms and conditions on use of external systems |
| ac.l1-b.1.iii | e | Access control policy; procedures addressing the use of external systems; terms and conditions for external systems; system security plan; list of applications accessible from external systems; system configuration settings and associated documentation; system connection or processing agreements; account management documents; other relevant documents or records |
Personnel with responsibilities for defining terms and conditions for use of external systems to access organizational systems; system or network administrators; personnel with information security responsibilities |
Mechanisms implementing terms and conditions on use of external systems |
| ac.l1-b.1.iii | f | Access control policy; procedures addressing the use of external systems; terms and conditions for external systems; system security plan; list of applications accessible from external systems; system configuration settings and associated documentation; system connection or processing agreements; account management documents; other relevant documents or records |
Personnel with responsibilities for defining terms and conditions for use of external systems to access organizational systems; system or network administrators; personnel with information security responsibilities |
Mechanisms implementing terms and conditions on use of external systems |
| ac.l1-b.1.iv | a | Access control policy; procedures addressing publicly accessible content; system security plan; list of users authorized to post publicly accessible content on organizational systems; training materials and/or records; records of publicly accessible information reviews; records of response to nonpublic information on public websites; system audit logs and records; security awareness training records; other relevant documents or records |
Personnel with responsibilities for managing publicly accessible information posted on organizational systems; personnel with information security responsibilities |
Mechanisms implementing management of publicly accessible content |
| ac.l1-b.1.iv | b | Access control policy; procedures addressing publicly accessible content; system security plan; list of users authorized to post publicly accessible content on organizational systems; training materials and/or records; records of publicly accessible information reviews; records of response to nonpublic information on public websites; system audit logs and records; security awareness training records; other relevant documents or records |
Personnel with responsibilities for managing publicly accessible information posted on organizational systems; personnel with information security responsibilities |
Mechanisms implementing management of publicly accessible content |
| ac.l1-b.1.iv | c | Access control policy; procedures addressing publicly accessible content; system security plan; list of users authorized to post publicly accessible content on organizational systems; training materials and/or records; records of publicly accessible information reviews; records of response to nonpublic information on public websites; system audit logs and records; security awareness training records; other relevant documents or records |
Personnel with responsibilities for managing publicly accessible information posted on organizational systems; personnel with information security responsibilities |
Mechanisms implementing management of publicly accessible content |
| ac.l1-b.1.iv | d | Access control policy; procedures addressing publicly accessible content; system security plan; list of users authorized to post publicly accessible content on organizational systems; training materials and/or records; records of publicly accessible information reviews; records of response to nonpublic information on public websites; system audit logs and records; security awareness training records; other relevant documents or records |
Personnel with responsibilities for managing publicly accessible information posted on organizational systems; personnel with information security responsibilities |
Mechanisms implementing management of publicly accessible content |
| ac.l1-b.1.iv | e | Access control policy; procedures addressing publicly accessible content; system security plan; list of users authorized to post publicly accessible content on organizational systems; training materials and/or records; records of publicly accessible information reviews; records of response to nonpublic information on public websites; system audit logs and records; security awareness training records; other relevant documents or records |
Personnel with responsibilities for managing publicly accessible information posted on organizational systems; personnel with information security responsibilities |
Mechanisms implementing management of publicly accessible content |
| ia.l1-b.1.v | a | Access control policy; procedures addressing access enforcement; system security plan; system design documentation; list of approved authorizations including remote access authorizations; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records |
Personnel with access enforcement responsibilities; system or network administrators; personnel with information security responsibilities; system developers |
Mechanisms implementing access control policy |
| ia.l1-b.1.v | b | Access control policy; procedures addressing access enforcement; system security plan; system design documentation; list of approved authorizations including remote access authorizations; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records |
Personnel with access enforcement responsibilities; system or network administrators; personnel with information security responsibilities; system developers |
Mechanisms implementing access control policy |
| ia.l1-b.1.vi | a | Identification and authentication policy; system security plan; procedures addressing authenticator management; procedures addressing user identification and authentication; system design documentation; list of system authenticator types; system configuration settings and associated documentation; change control records associated with managing system authenticators; system audit logs and records; other relevant documents or records |
Personnel with authenticator management responsibilities; personnel with information security responsibilities; system or network administrators |
Mechanisms supporting or implementing authenticator management capability |
| ia.l1-b.1.vi | b | Identification and authentication policy; system security plan; procedures addressing authenticator management; procedures addressing user identification and authentication; system design documentation; list of system authenticator types; system configuration settings and associated documentation; change control records associated with managing system authenticators; system audit logs and records; other relevant documents or records |
Personnel with authenticator management responsibilities; personnel with information security responsibilities; system or network administrators |
Mechanisms supporting or implementing authenticator management capability |
| ia.l1-b.1.vi | c | Identification and authentication policy; system security plan; procedures addressing authenticator management; procedures addressing user identification and authentication; system design documentation; list of system authenticator types; system configuration settings and associated documentation; change control records associated with managing system authenticators; system audit logs and records; other relevant documents or records |
Personnel with authenticator management responsibilities; personnel with information security responsibilities; system or network administrators |
Mechanisms supporting or implementing authenticator management capability |
| mp.l1-b.1.vii | a | System media protection policy; procedures addressing media sanitization and disposal; applicable standards and policies addressing media sanitization; system security plan; media sanitization records; system audit logs and records; system design documentation; system configuration settings and associated documentation; other relevant documents or records |
Personnel with media sanitization responsibilities; personnel with information security responsibilities; system or network administrators |
Organizational processes for media sanitization; mechanisms supporting or implementing media sanitization |
| mp.l1-b.1.vii | b | System media protection policy; procedures addressing media sanitization and disposal; applicable standards and policies addressing media sanitization; system security plan; media sanitization records; system audit logs and records; system design documentation; system configuration settings and associated documentation; other relevant documents or records |
Personnel with media sanitization responsibilities; personnel with information security responsibilities; system or network administrators |
Organizational processes for media sanitization; mechanisms supporting or implementing media sanitization |
| pe.l1-b.1.viii | a | Physical and environmental protection policy; procedures addressing physical access authorizations; system security plan; authorized personnel access list; authorization credentials; physical access list reviews; physical access termination records and associated documentation; other relevant documents or records |
Personnel with physical access authorization responsibilities; personnel with physical access to system facility; personnel with information security responsibilities |
Organizational processes for physical access authorizations; mechanisms supporting or implementing physical access authorizations |
| pe.l1-b.1.viii | b | Physical and environmental protection policy; procedures addressing physical access authorizations; system security plan; authorized personnel access list; authorization credentials; physical access list reviews; physical access termination records and associated documentation; other relevant documents or records |
Personnel with physical access authorization responsibilities; personnel with physical access to system facility; personnel with information security responsibilities |
Organizational processes for physical access authorizations; mechanisms supporting or implementing physical access authorizations |
| pe.l1-b.1.viii | c | Physical and environmental protection policy; procedures addressing physical access authorizations; system security plan; authorized personnel access list; authorization credentials; physical access list reviews; physical access termination records and associated documentation; other relevant documents or records |
Personnel with physical access authorization responsibilities; personnel with physical access to system facility; personnel with information security responsibilities |
Organizational processes for physical access authorizations; mechanisms supporting or implementing physical access authorizations |
| pe.l1-b.1.viii | d | Physical and environmental protection policy; procedures addressing physical access authorizations; system security plan; authorized personnel access list; authorization credentials; physical access list reviews; physical access termination records and associated documentation; other relevant documents or records |
Personnel with physical access authorization responsibilities; personnel with physical access to system facility; personnel with information security responsibilities |
Organizational processes for physical access authorizations; mechanisms supporting or implementing physical access authorizations |
| pe.l1-b.1.ix | a | Physical and environmental protection policy; procedures addressing physical access control; system security plan; physical access control logs or records; inventory records of physical access control devices; system entry and exit points; records of key and lock combination changes; storage locations for physical access control devices; physical access control devices; list of security safeguards controlling access to designated publicly accessible areas within facility; other relevant documents or records |
Personnel with physical access control responsibilities; personnel with information security responsibilities |
Organizational processes for physical access control; mechanisms supporting or implementing physical access control; physical access control devices |
| pe.l1-b.1.ix | b | Physical and environmental protection policy; procedures addressing physical access control; system security plan; physical access control logs or records; inventory records of physical access control devices; system entry and exit points; records of key and lock combination changes; storage locations for physical access control devices; physical access control devices; list of security safeguards controlling access to designated publicly accessible areas within facility; other relevant documents or records |
Personnel with physical access control responsibilities; personnel with information security responsibilities |
Organizational processes for physical access control; mechanisms supporting or implementing physical access control; physical access control devices |
| pe.l1-b.1.ix | c | Physical and environmental protection policy; procedures addressing physical access control; system security plan; physical access control logs or records; inventory records of physical access control devices; system entry and exit points; records of key and lock combination changes; storage locations for physical access control devices; physical access control devices; list of security safeguards controlling access to designated publicly accessible areas within facility; other relevant documents or records |
Personnel with physical access control responsibilities; personnel with information security responsibilities |
Organizational processes for physical access control; mechanisms supporting or implementing physical access control; physical access control devices |
| pe.l1-b.1.ix | d | Physical and environmental protection policy; procedures addressing physical access control; system security plan; physical access control logs or records; inventory records of physical access control devices; system entry and exit points; records of key and lock combination changes; storage locations for physical access control devices; physical access control devices; list of security safeguards controlling access to designated publicly accessible areas within facility; other relevant documents or records |
Personnel with physical access control responsibilities; personnel with information security responsibilities |
Organizational processes for physical access control; mechanisms supporting or implementing physical access control; physical access control devices |
| pe.l1-b.1.ix | e | Physical and environmental protection policy; procedures addressing physical access control; system security plan; physical access control logs or records; inventory records of physical access control devices; system entry and exit points; records of key and lock combination changes; storage locations for physical access control devices; physical access control devices; list of security safeguards controlling access to designated publicly accessible areas within facility; other relevant documents or records |
Personnel with physical access control responsibilities; personnel with information security responsibilities |
Organizational processes for physical access control; mechanisms supporting or implementing physical access control; physical access control devices |
| pe.l1-b.1.ix | f | Physical and environmental protection policy; procedures addressing physical access control; system security plan; physical access control logs or records; inventory records of physical access control devices; system entry and exit points; records of key and lock combination changes; storage locations for physical access control devices; physical access control devices; list of security safeguards controlling access to designated publicly accessible areas within facility; other relevant documents or records |
Personnel with physical access control responsibilities; personnel with information security responsibilities |
Organizational processes for physical access control; mechanisms supporting or implementing physical access control; physical access control devices |
| sc.l1-b.1.x | a | System and communications protection policy; procedures addressing boundary protection; system security plan; list of key internal boundaries of the system; system design documentation; boundary protection hardware and software; enterprise security architecture documentation; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; system developers; personnel with boundary protection responsibilities |
Mechanisms implementing boundary protection capability]. 25 NIST SP 800-171A, p. 53 CMMC Assessment Guide – Level 1 Version 2.13 34 SC.L1-b.1.x – Boundary Protection [FCI Data |
| sc.l1-b.1.x | b | System and communications protection policy; procedures addressing boundary protection; system security plan; list of key internal boundaries of the system; system design documentation; boundary protection hardware and software; enterprise security architecture documentation; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; system developers; personnel with boundary protection responsibilities |
Mechanisms implementing boundary protection capability]. 25 NIST SP 800-171A, p. 53 CMMC Assessment Guide – Level 1 Version 2.13 34 SC.L1-b.1.x – Boundary Protection [FCI Data |
| sc.l1-b.1.x | c | System and communications protection policy; procedures addressing boundary protection; system security plan; list of key internal boundaries of the system; system design documentation; boundary protection hardware and software; enterprise security architecture documentation; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; system developers; personnel with boundary protection responsibilities |
Mechanisms implementing boundary protection capability]. 25 NIST SP 800-171A, p. 53 CMMC Assessment Guide – Level 1 Version 2.13 34 SC.L1-b.1.x – Boundary Protection [FCI Data |
| sc.l1-b.1.x | d | System and communications protection policy; procedures addressing boundary protection; system security plan; list of key internal boundaries of the system; system design documentation; boundary protection hardware and software; enterprise security architecture documentation; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; system developers; personnel with boundary protection responsibilities |
Mechanisms implementing boundary protection capability]. 25 NIST SP 800-171A, p. 53 CMMC Assessment Guide – Level 1 Version 2.13 34 SC.L1-b.1.x – Boundary Protection [FCI Data |
| sc.l1-b.1.x | e | System and communications protection policy; procedures addressing boundary protection; system security plan; list of key internal boundaries of the system; system design documentation; boundary protection hardware and software; enterprise security architecture documentation; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; system developers; personnel with boundary protection responsibilities |
Mechanisms implementing boundary protection capability]. 25 NIST SP 800-171A, p. 53 CMMC Assessment Guide – Level 1 Version 2.13 34 SC.L1-b.1.x – Boundary Protection [FCI Data |
| sc.l1-b.1.x | f | System and communications protection policy; procedures addressing boundary protection; system security plan; list of key internal boundaries of the system; system design documentation; boundary protection hardware and software; enterprise security architecture documentation; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; system developers; personnel with boundary protection responsibilities |
Mechanisms implementing boundary protection capability]. 25 NIST SP 800-171A, p. 53 CMMC Assessment Guide – Level 1 Version 2.13 34 SC.L1-b.1.x – Boundary Protection [FCI Data |
| sc.l1-b.1.x | g | System and communications protection policy; procedures addressing boundary protection; system security plan; list of key internal boundaries of the system; system design documentation; boundary protection hardware and software; enterprise security architecture documentation; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; system developers; personnel with boundary protection responsibilities |
Mechanisms implementing boundary protection capability]. 25 NIST SP 800-171A, p. 53 CMMC Assessment Guide – Level 1 Version 2.13 34 SC.L1-b.1.x – Boundary Protection [FCI Data |
| sc.l1-b.1.x | h | System and communications protection policy; procedures addressing boundary protection; system security plan; list of key internal boundaries of the system; system design documentation; boundary protection hardware and software; enterprise security architecture documentation; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; system developers; personnel with boundary protection responsibilities |
Mechanisms implementing boundary protection capability]. 25 NIST SP 800-171A, p. 53 CMMC Assessment Guide – Level 1 Version 2.13 34 SC.L1-b.1.x – Boundary Protection [FCI Data |
| sc.l1-b.1.xi | a | System and communications protection policy; procedures addressing boundary protection; system security plan; list of key internal boundaries of the system; system design documentation; boundary protection hardware and software; system configuration settings and associated documentation; enterprise security architecture documentation; system audit logs and records; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; system developers; personnel with boundary protection responsibilities |
Mechanisms implementing boundary protection capability |
| sc.l1-b.1.xi | b | System and communications protection policy; procedures addressing boundary protection; system security plan; list of key internal boundaries of the system; system design documentation; boundary protection hardware and software; system configuration settings and associated documentation; enterprise security architecture documentation; system audit logs and records; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; system developers; personnel with boundary protection responsibilities |
Mechanisms implementing boundary protection capability |
| si.l1-b.1.xii | a | System and information integrity policy; procedures addressing flaw remediation; procedures addressing configuration management; system security plan; list of flaws and vulnerabilities potentially affecting the system; list of recent security flaw remediation actions performed on the system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct system flaws); |
System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for flaw remediation; personnel with configuration management responsibility |
Organizational processes for identifying, reporting, and correcting system flaws; organizational process for installing software and firmware updates; mechanisms 29 NIST SP 800-171A, p. 60 CMMC Assessment Guide – Level 1 Version 2.13 39 SI.L1-b.1.xii – Flaw Remediation [FCI Data] supporting or implementing reporting, and correcting system flaws; mechanisms supporting or implementing testing software and firmware updates |
| si.l1-b.1.xii | b | System and information integrity policy; procedures addressing flaw remediation; procedures addressing configuration management; system security plan; list of flaws and vulnerabilities potentially affecting the system; list of recent security flaw remediation actions performed on the system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct system flaws); |
System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for flaw remediation; personnel with configuration management responsibility |
Organizational processes for identifying, reporting, and correcting system flaws; organizational process for installing software and firmware updates; mechanisms 29 NIST SP 800-171A, p. 60 CMMC Assessment Guide – Level 1 Version 2.13 39 SI.L1-b.1.xii – Flaw Remediation [FCI Data] supporting or implementing reporting, and correcting system flaws; mechanisms supporting or implementing testing software and firmware updates |
| si.l1-b.1.xii | c | System and information integrity policy; procedures addressing flaw remediation; procedures addressing configuration management; system security plan; list of flaws and vulnerabilities potentially affecting the system; list of recent security flaw remediation actions performed on the system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct system flaws); |
System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for flaw remediation; personnel with configuration management responsibility |
Organizational processes for identifying, reporting, and correcting system flaws; organizational process for installing software and firmware updates; mechanisms 29 NIST SP 800-171A, p. 60 CMMC Assessment Guide – Level 1 Version 2.13 39 SI.L1-b.1.xii – Flaw Remediation [FCI Data] supporting or implementing reporting, and correcting system flaws; mechanisms supporting or implementing testing software and firmware updates |
| si.l1-b.1.xii | d | System and information integrity policy; procedures addressing flaw remediation; procedures addressing configuration management; system security plan; list of flaws and vulnerabilities potentially affecting the system; list of recent security flaw remediation actions performed on the system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct system flaws); |
System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for flaw remediation; personnel with configuration management responsibility |
Organizational processes for identifying, reporting, and correcting system flaws; organizational process for installing software and firmware updates; mechanisms 29 NIST SP 800-171A, p. 60 CMMC Assessment Guide – Level 1 Version 2.13 39 SI.L1-b.1.xii – Flaw Remediation [FCI Data] supporting or implementing reporting, and correcting system flaws; mechanisms supporting or implementing testing software and firmware updates |
| si.l1-b.1.xii | e | System and information integrity policy; procedures addressing flaw remediation; procedures addressing configuration management; system security plan; list of flaws and vulnerabilities potentially affecting the system; list of recent security flaw remediation actions performed on the system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct system flaws); |
System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for flaw remediation; personnel with configuration management responsibility |
Organizational processes for identifying, reporting, and correcting system flaws; organizational process for installing software and firmware updates; mechanisms 29 NIST SP 800-171A, p. 60 CMMC Assessment Guide – Level 1 Version 2.13 39 SI.L1-b.1.xii – Flaw Remediation [FCI Data] supporting or implementing reporting, and correcting system flaws; mechanisms supporting or implementing testing software and firmware updates |
| si.l1-b.1.xii | f | System and information integrity policy; procedures addressing flaw remediation; procedures addressing configuration management; system security plan; list of flaws and vulnerabilities potentially affecting the system; list of recent security flaw remediation actions performed on the system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct system flaws); |
System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for flaw remediation; personnel with configuration management responsibility |
Organizational processes for identifying, reporting, and correcting system flaws; organizational process for installing software and firmware updates; mechanisms 29 NIST SP 800-171A, p. 60 CMMC Assessment Guide – Level 1 Version 2.13 39 SI.L1-b.1.xii – Flaw Remediation [FCI Data] supporting or implementing reporting, and correcting system flaws; mechanisms supporting or implementing testing software and firmware updates |
| si.l1-b.1.xiii | a | System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; records of malicious code protection updates; malicious code protection mechanisms; system security plan; system configuration settings and associated documentation; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; scan results from malicious code protection mechanisms; system design documentation; system audit logs and records; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility |
Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing employing, updating, and configuring malicious code protection mechanisms; mechanisms supporting or implementing malicious code scanning and subsequent actions |
| si.l1-b.1.xiii | b | System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; records of malicious code protection updates; malicious code protection mechanisms; system security plan; system configuration settings and associated documentation; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; scan results from malicious code protection mechanisms; system design documentation; system audit logs and records; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility |
Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing employing, updating, and configuring malicious code protection mechanisms; mechanisms supporting or implementing malicious code scanning and subsequent actions |
| si.l1-b.1.xiv | a | System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; system security plan; system design documentation; system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; system audit logs and records; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility |
Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing malicious code protection mechanisms (including updates and configurations); mechanisms supporting or implementing malicious code scanning and subsequent actions |
| si.l1-b.1.xv | a | System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; system security plan; system design documentation; system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; system audit logs and records; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility |
Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing malicious code protection mechanisms (including updates and configurations); mechanisms supporting or implementing malicious code scanning and subsequent actions |
| si.l1-b.1.xv | b | System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; system security plan; system design documentation; system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; system audit logs and records; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility |
Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing malicious code protection mechanisms (including updates and configurations); mechanisms supporting or implementing malicious code scanning and subsequent actions |
| si.l1-b.1.xv | c | System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; system security plan; system design documentation; system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; system audit logs and records; other relevant documents or records |
System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility |
Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing malicious code protection mechanisms (including updates and configurations); mechanisms supporting or implementing malicious code scanning and subsequent actions |