AC.L2-3.1.19 Encrypt CUI on Mobile

CMMC Practice AC.L2-3.1.19 – Encrypt CUI on Mobile: Encrypt CUI on mobile devices and mobile computing platforms. Links to Publicly Available Resources CIO – 7 Enterprise Mobile Security Best Practices This article from CIO provides seven best practices to...

AC.L2-3.1.15 Privileged Remote Access

CMMC Practice AC.L2-3.1.15 – Privileged Remote Access: Authorize remote execution of privileged commands and remote access to security-relevant information. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document provides assessment...

AC.L2-3.1.13 Remote Access Confidentiality

CMMC Practice AC.L2-3.1.13 – Remote Access Confidentiality: Employ cryptographic mechanisms to protect the confidentiality of remote access sessions. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document provides assessment guidance...

AC.L2-3.1.18 Mobile Device Connection

CMMC Practice AC.L2-3.1.18 – Mobile Device Connection: Control connection of mobile devices. Links to Publicly Available Resources CIO – 7 Enterprise Mobile Security Best Practices This article from CIO provides seven best practices to help companies...

AC.L2-3.1.17 Wireless Access Protection

CMMC Practice AC.L2-3.1.17 – Wireless Access Protection: Protect wireless access using authentication and encryption. Links to Publicly Available Resources Aruba Networks – Understanding Encryption Types This webpage provides the reader a basic...

AC.L2-3.1.11 Session Termination

CMMC Practice AC.L2-3.1.11 – Session Termination: Terminate (automatically) user sessions after a defined condition. Links to Publicly Available Resources Apple – Set your Mac to log out when not in use This article shows the actual configuration that...