AC.L2-3.1.18 Mobile Device Connection

CMMC Practice AC.L2-3.1.18 – Mobile Device Connection: Control connection of mobile devices. Links to Publicly Available Resources CIO – 7 Enterprise Mobile Security Best Practices This article from CIO provides seven best practices to help companies...

AC.L2-3.1.17 Wireless Access Protection

CMMC Practice AC.L2-3.1.17 – Wireless Access Protection: Protect wireless access using authentication and encryption. Links to Publicly Available Resources Aruba Networks – Understanding Encryption Types This webpage provides the reader a basic...

AC.L2-3.1.11 Session Termination

CMMC Practice AC.L2-3.1.11 – Session Termination: Terminate (automatically) user sessions after a defined condition. Links to Publicly Available Resources Apple – Set your Mac to log out when not in use This article shows the actual configuration that...

AC.L2-3.1.7 Privileged Functions

CMMC Practice AC.L2-3.1.7 – Privileged Functions: Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document...

AC.L2-3.1.4 Separation of Duties

CMMC Practice AC.L2-3.1.4 – Separation of Duties: Separate the duties of individuals to reduce the risk of malevolent activity without collusion. Links to Publicly Available Resources Brookhaven National Laboratory – Example Separation of Duties Policy...

AC.L2-3.1.3 Control CUI Flow

CMMC Practice AC.L2-3.1.3 – Control CUI Flow: Control the flow of CUI in accordance with approved authorizations. Links to Publicly Available Resources Boston University – Data Lifecycle Management Policy This Boston University guidance defines the...