CMMC Requirement SC.L2-3.13.14 – Voice over Internet Protocol: Control and monitor the use of Voice over Internet Protocol (VoIP) technologies. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document provides assessment guidance for...
CMMC Requirement SC.L2-3.13.13 – Mobile Code: Control and monitor the use of mobile code. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification...
CMMC Requirement SC.L2-3.13.10 – Key Management: Establish and manage cryptographic keys for cryptography employed in organizational systems. Links to Publicly Available Resources CMMC Level 2 Assessment Guide This document provides assessment guidance for...
CMMC Requirement SC.L2-3.13.9 – Connections Termination: Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity. Links to Publicly Available Resources CMMC Level 2 Assessment Guide...
CMMC Requirement SC.L2-3.13.8 – Data in Transit: Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards. Links to Publicly Available Resources Amazon –...
CMMC Requirement SC.L2-3.13.7 – Split Tunneling: Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling)....