Cybersecurity Maturity Model Certification – Level 3

The following table contains the required 58 Practices, including controls mapping from NIST SP 800-171 Rev 2 ,for Cybersecurity Maturity Model Certification (CMMC) Level 3 (L3) systems.

Systems categorized as CMMC L3 must also implement the 17 L1 and 55 L2 Practices.

DOMAIN CAPABILITY LEVEL 3
1 ACCESS CONTROL (AC) C001 – Establish system access requirements N/A
C002 – Control internal system access AC.3.017 – Separate the duties of individuals to reduce the risk of malevolent activity without collusion: NIST SP 800-171 Rev 2 3.1.4
AC.3.018 – Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs: NIST SP 800-171 Rev 2 3.1.7
AC.3.019 – Terminate (automatically) user sessions after a defined condition: NIST SP 800-171 Rev 2 3.1.11
AC.3.012 – Protect wireless access using authentication and encryption: NIST SP 800-171 Rev 2 3.1.17
AC.3.020- Control connection of mobile devices: NIST SP 800-171 Rev 2 3.1.18
C003 – Control remote system access AC.3.014 – Employ cryptographic mechanisms to protect the confidentiality of remote access sessions: NIST SP 800-171 Rev 2 3.1.13
AC.3.021 – Authorize remote execution of privileged commands and remote access to security-relevant information: NIST SP 800-171 Rev 2 3.1.15
C004 – Limit data access to authorized users and processes AC.3.022 – Encrypt CUI on mobile devices and mobile computing platforms: NIST SP 800-171 Rev 2 3.1.19
2 ASSET MANAGEMENT (AM) C005 – Identify and document assets AM.3.036 – Define procedures for the handling of CUI data.
C006 – Manage asset inventory N/A
3 AUDIT AND ACCOUNTABILITY (AU) C007 – Define audit requirements AU.3.045 – Review and update logged events: NIST SP 800-171 Rev 2 3.3.3
AU.3.046 – Alert in the event of an audit logging process failure: NIST SP 800-171 Rev 2 3.3.4
C008 – Perform auditing AU.3.048 – Collect audit information (e.g., logs) into one or more central repositories.
C009 – Identify and protect audit information AU.3.049 – Protect audit information and audit logging tools from unauthorized access, modification, and deletion: NIST SP 800-171 Rev 2 3.3.8
AU.3.050 – Limit management of audit logging functionality to a subset of privileged users: NIST SP 800-171 Rev 2 3.3.9
C010 – Review and manage audit logs AU.3.051 – Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity: NIST SP 800-171 Rev 2 3.3.5
AU.3.052 – Provide audit record reduction and report generation to support on-demand analysis and reporting: NIST SP 800-171 Rev 2 3.3.6
4 AWARENESS AND TRAINING (AT) C011 – Conduct security awareness activities AT.3.058 – Provide security awareness training on recognizing and reporting potential indicators of insider threat: NIST SP 800-171 Rev 2 3.2.3
C012 – Conduct training N/A
5 CONFIGURATION MANAGEMENT (CM) C013 – Establish configuration baselines N/A
C014 – Perform configuration and change management CM.3.067 – Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems: NIST SP 800-171 Rev 2 3.4.5
CM.3.068 -Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services: NIST SP 800-171 Rev 2 3.4.7
CM.3.069 – Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (whitelisting) policy to allow the execution of authorized software: NIST SP 800-171 Rev 2 3.4.8
6 IDENTIFICATION AND AUTHENTICATION (IA) C015 – Grant access to authenticated entities IA.3.083 – Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts: NIST SP 800-171 Rev 2 3.5.3
IA.3.084 – Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts: NIST SP 800-171 Rev 2 3.5.4
IA.3.085 – Prevent the reuse of identifiers for a defined period: NIST SP 800-171 Rev 2 3.5.5
IA.3.086 – Disable identifiers after a defined period of inactivity: NIST SP 800-171 Rev 2 3.5.6
7 INCIDENT RESPONSE (IR) C016 – Plan incident response N/A
C017 – Detect and report events N/A
C018 – Develop and implement a response to a declared incident IR.3.098 – Track, document, and report incidents to designated officials and/or authorities both internal and external to the organization: NIST SP 800-171 Rev 2 3.6.2
C019 – Perform post incident reviews N/A
C020 – Test incident response IR.3.099 – Test the organizational incident response capability: NIST SP 800-171 Rev 2 3.6.3
8 MAINTENANCE (MA) C021 – Manage maintenance MA.3.115 – Ensure equipment removed for off-site maintenance is sanitized of any CUI: NIST SP 800-171 Rev 2 3.7.3
MA.3.116 – Check media containing diagnostic and test programs for malicious code before the media are used in organizational systems: NIST SP 800-171 Rev 2 3.7.4
9 MEDIA PROTECTION (MP) C022 – Identify and mark media MP.3.122 – Mark media with necessary CUI markings and distribution limitations: NIST SP 800-171 Rev 2 3.8.4
C023 – Protect and control media MP.3.123 – Prohibit the use of portable storage devices when such devices have no identifiable owner: NIST SP 800-171 Rev 2 3.8.8
C024 – Sanitize media N/A
C025 – Protect media during transport MP.3.124 – Control access to media containing CUI and maintain accountability for media during transport outside of controlled areas: NIST SP 800-171 Rev 2 3.8.5
MP.3.125 – Implement cryptographic mechanisms to protect the confidentiality of CUI stored on digital media during transport unless otherwise protected by alternative physical safeguards: NIST SP 800-171 Rev 2 3.8.6
10 PERSONNEL SECURITY (PS) C026 – Screen personnel N/A
C027 – Protect CUI during personnel actions N/A
11 PHYSICAL PROTECTION (PE) C028 – Limit physical access PE.3.136 – Enforce safeguarding measures for CUI at alternate work sites: NIST SP 800-171 Rev 2 3.10.6
12 RECOVERY (RE) C029 – Manage backups RE.3.139 – Regularly perform complete, comprehensive, and resilient data backups as organizationally defined.
C030 – Manage information security continuity N/A
13 RISK MANAGEMENT (RM) C031 – Identify and evaluate risk RM.3.144 – Periodically perform risk assessments to identify and prioritize risks according to the defined risk categories, risk sources, and risk measurement criteria.
C032 – Manage risk RM.3.146 – Develop and implement risk mitigation plans.
RM.3.147 – Manage non-vendor- supported products (e.g., end of life) separately and restrict as necessary to reduce risk.
C033 – Manage supply chain risk N/A
14 SECURITY ASSESSMENT (CA) C034 – Develop and manage a system security plan N/A
C035 – Define and manage controls CA.3.161 – Monitor security controls on an ongoing basis to ensure the continued effectiveness of the controls: NIST SP 800-171 Rev 2 3.12.3
C036 – Perform code reviews CA.3.162 – Employ a security assessment of enterprise software that has been developed internally, for internal use, and that has been organizationally defined as an area of risk.
15 SITUATIONAL AWARENESS (SA) C037 – Implement threat monitoring SA.3.169 – Receive and respond to cyber threat intelligence from information sharing forums and sources and communicate to stakeholders.
16 SYSTEM AND COMMUNICATIONS PROTECTION (SC) C038 – Define security requirements for systems and communications SC.3.177 – Employ FIPS-validated cryptography when used to protect the confidentiality of CUI: NIST SP 800-171 Rev 2 3.13.11
SC.3.180 – Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems: NIST SP 800-171 Rev 2 3.13.2
SC.3.181 – Separate user functionality from system management functionality: NIST SP 800-171 Rev 2 3.13.3
SC.3.182 – Prevent unauthorized and unintended information transfer via shared system resources: NIST SP 800-171 Rev 2 3.13.4
SC.3.183 – Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception): NIST SP 800-171 Rev 2 3.13.6
SC.3.184 – Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling): NIST SP 800-171 Rev 2 3.13.7
SC.3.185 – Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards: NIST SP 800-171 Rev 2 3.13.8
SC.3.186 – Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity: NIST SP 800-171 Rev 2 3.13.9
SC.3.187 – Establish and manage cryptographic keys for cryptography employed in organizational systems: NIST SP 800-171 Rev 2 3.13.10
SC.3.188 – Control and monitor the use of mobile code: NIST SP 800-171 Rev 2 3.13.13
SC.3.189 – Control and monitor the use of Voice over Internet Protocol (VoIP) technologies: NIST SP 800-171 Rev 2 3.13.14
SC.3.190 – Protect the authenticity of communications sessions: NIST SP 800-171 Rev 2 3.13.15
SC.3.191 – Protect the confidentiality of CUI at rest: NIST SP 800-171 Rev 2 3.13.16
C039 – Control communications at system boundaries SC.3.192 – Implement Domain Name System (DNS) filtering services.
SC.3.193 – Implement a policy restricting the publication of CUI on externally owned, publicly accessible websites (e.g., forums, LinkedIn, Facebook, Twitter).
17 SYSTEM AND INFORMATION INTEGRITY (SI) C040 – Identify and manage information system flaws N/A
C041 – Identify malicious content N/A
C042 – Perform network and system monitoring SI.3.218 – Employ spam protection mechanisms at information system access entry and exit points.
C043 – Implement advanced email protections SI.3.219 – Implement email forgery protections
SI.3.220 – Utilize sandboxing to detect or block potentially malicious email.