IA.L2-3.5.3 Multifactor Authentication

CMMC Requirement IA.L2-3.5.3 – Multifactor Authentication: Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts. Links to Publicly Available Resources BrightTALK – FIDO...

IA.L2-3.5.11 Obscure Feedback

CMMC Requirement IA.L2-3.5.11 – Obscure Feedback: Obscure feedback of authentication information. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document provides assessment guidance for conducting Cybersecurity Maturity Model...

IA.L2-3.5.10 Cryptographically-Protected Passwords

CMMC Requirement IA.L2-3.5.10 – Cryptographically-Protected Passwords: Store and transmit only cryptographically-protected passwords. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document provides assessment guidance for conducting...

IA.L2-3.5.9 Temporary Passwords

CMMC Requirement IA.L2-3.5.9 – Temporary Passwords: Allow temporary password use for system logons with an immediate change to a permanent password. Links to Publicly Available Resources CIRT.net – Default Password Database Consolidation of default passwords for...

IA.L2-3.5.8 Password Reuse

CMMC Requirement IA.L2-3.5.8 – Password Reuse: Prohibit password reuse for a specified number of generations. Links to Publicly Available Resources CIRT.net – Default Password Database Consolidation of default passwords for commercial software and hardware...

IA.L2-3.5.7 Password Complexity

CMMC Requirement IA.L2-3.5.7 – Password Complexity: Enforce a minimum password complexity and change of characters when new passwords are created. Links to Publicly Available Resources CIRT.net – Default Password Database Consolidation of default passwords for...

IA.L2-3.5.2 Authentication

CMMC Requirement IA.L2-3.5.2 – Authentication: Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. Links to Publicly Available Resources BrightTALK –...

IA.L2-3.5.1 Identification

CMMC Requirement IA.L2-3.5.1 – Identification: Identify information system users, processes acting on behalf of users, or devices. Links to Publicly Available Resources CMMC Level 1 Self-Assessment Guide This document provides self-assessment guidance for...

CM.L2-3.4.8 Application Execution Policy

CMMC Requirement CM.L2-3.4.8 – Application Execution Policy: Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (whitelisting) policy to allow the execution of authorized software. Links to...

CM.L2-3.4.7 Nonessential Functionality

CMMC Requirement CM.L2-3.4.7 – Nonessential Functionality: Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document provides...