SI.L1-3.14.1 Flaw Remediation

CMMC Practice SI.L1-3.14.1 – Flaw Remediation: Identify, report, and correct information and information system flaws in a timely manner. Links to Publicly Available Resources BrightTALK – Is Your Vulnerability Management Program Vulnerable? In this two...

SC.L2-3.13.16 Data at Rest

CMMC Practice SC.L2-3.13.16 – Data at Rest: Protect the confidentiality of CUI at rest. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification...

SC.L2-3.13.15 Communications Authenticity

CMMC Practice SC.L2-3.13.15 – Communications Authenticity: Protect the authenticity of communications sessions. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document provides assessment guidance for conducting Cybersecurity Maturity...

SC.L2-3.13.14 Voice over Internet Protocol

CMMC Practice SC.L2-3.13.14 – Voice over Internet Protocol: Control and monitor the use of Voice over Internet Protocol (VoIP) technologies. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document provides assessment guidance for...

SC.L2-3.13.13 Mobile Code

CMMC Practice SC.L2-3.13.13 – Mobile Code: Control and monitor the use of mobile code. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC)...

SC.L2-3.13.10 Key Management

CMMC Practice SC.L2-3.13.10 – Key Management: Establish and manage cryptographic keys for cryptography employed in organizational systems. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document provides assessment guidance for...