{"id":4724,"date":"2020-03-26T13:21:00","date_gmt":"2020-03-26T18:21:00","guid":{"rendered":"https:\/\/ndisac.org\/dibscc\/?p=4724"},"modified":"2025-02-27T09:51:10","modified_gmt":"2025-02-27T14:51:10","slug":"level-2","status":"publish","type":"post","link":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/","title":{"rendered":"CMMC Level 2"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_menu menu_id=&#8221;550&#8243; _builder_version=&#8221;4.4.3&#8243;][\/et_pb_menu][et_pb_text _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221;]<\/p>\n<h2><strong>CMMC Level 2<\/strong><\/h2>\n<p>[\/et_pb_text][et_pb_testimonial quote_icon=&#8221;off&#8221; _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; hover_enabled=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; author_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; author_text_shadow_vertical_length_tablet=&#8221;0px&#8221; author_text_shadow_blur_strength_tablet=&#8221;1px&#8221; position_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; position_text_shadow_vertical_length_tablet=&#8221;0px&#8221; position_text_shadow_blur_strength_tablet=&#8221;1px&#8221; company_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; company_text_shadow_vertical_length_tablet=&#8221;0px&#8221; company_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; body_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; body_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; box_shadow_horizontal_image_tablet=&#8221;0px&#8221; box_shadow_vertical_image_tablet=&#8221;0px&#8221; box_shadow_blur_image_tablet=&#8221;40px&#8221; box_shadow_spread_image_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Level 2 focuses on the protection of CUI and encompasses the 110 requirements from NIST SP 800-171 R2 required by DFARS clause 252.204-7012<\/p>\n<p><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/ScopingGuideL2v2.pdf\">Level 2 Scoping Guidance<\/a><br \/><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL2v2.pdf\">Level 2 Assessment Guide<\/a>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.2.2&#8243; custom_margin=&#8221;33px|auto||auto||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.2.2&#8243;][et_pb_text _builder_version=&#8221;4.2.2&#8243;]<\/p>\n<p>\n<style type='text\/css' media='all'>#rt-tpg-container-3681449085 .rt-holder .rt-woo-info .price{color:#0367bf;}body .rt-tpg-container .rt-tpg-isotope-buttons .selected,\n\t\t\t\t\t#rt-tpg-container-3681449085 .layout12 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-3681449085 .isotope8 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-3681449085 .carousel8 .rt-holder:hover .rt-detail,\n\t\t\t\t\t#rt-tpg-container-3681449085 .layout13 .rt-holder .overlay .post-info,\n\t\t\t\t\t#rt-tpg-container-3681449085 .isotope9 .rt-holder .overlay .post-info,\n\t\t\t\t\t#rt-tpg-container-3681449085.rt-tpg-container .layout4 .rt-holder .rt-detail,\n\t\t\t\t\t.rt-modal-3681449085 .md-content,\n\t\t\t\t\t.rt-modal-3681449085 .md-content > .rt-md-content-holder .rt-md-content,\n\t\t\t\t\t.rt-popup-wrap-3681449085.rt-popup-wrap .rt-popup-navigation-wrap,\n\t\t\t\t\t#rt-tpg-container-3681449085 .carousel9 .rt-holder .overlay .post-info{background-color:#0367bf;}#rt-tpg-container-3681449085 .layout5 .rt-holder .overlay, #rt-tpg-container-3681449085 .isotope2 .rt-holder .overlay, #rt-tpg-container-3681449085 .carousel2 .rt-holder .overlay,#rt-tpg-container-3681449085 .layout15 .rt-holder h3, #rt-tpg-container-3681449085 .isotope11 .rt-holder h3, #rt-tpg-container-3681449085 .carousel11 .rt-holder h3, #rt-tpg-container-3681449085 .layout16 .rt-holder h3,\n\t\t\t\t\t#rt-tpg-container-3681449085 .isotope12 .rt-holder h3, #rt-tpg-container-3681449085 .carousel12 .rt-holder h3 {background-color:rgba(3,103,191,0.8);}#rt-tpg-container-3681449085 .read-more a{border-radius:px;}#rt-tpg-container-3681449085 .rt-img-holder img.rt-img-responsive,#rt-tpg-container-3681449085 .rt-img-holder,\n\t\t\t\t\t#rt-tpg-container-3681449085 .rt-post-overlay .post-img,\n\t\t\t\t\t#rt-tpg-container-3681449085 .post-sm .post-img,\n\t\t\t\t\t#rt-tpg-container-3681449085 .rt-post-grid .post-img,\n\t\t\t\t\t#rt-tpg-container-3681449085 .post-img img {border-radius:px;}<\/style><div class='rt-container-fluid rt-tpg-container tpg-shortcode-main-wrapper ' id='rt-tpg-container-3681449085'   data-layout='layout1' data-grid-style='even' data-desktop-col='4'  data-tab-col='2'  data-mobile-col='1' data-sc-id='5216'><div data-title='Loading ...' class='rt-row rt-content-loader   layout1 tpg-even '><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5052\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5052\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-1\/\">AC.L2-3.1.1 Authorized Access Control<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5066\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5066\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-2\/\">AC.L2-3.1.2 Transaction &amp; Function Control<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5242\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5242\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-3\/\">AC.L2-3.1.3 Control CUI Flow<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5249\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5249\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-4\/\">AC.L2-3.1.4 Separation of Duties<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5006\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5006\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-5\/\">AC.L2-3.1.5 Least Privilege<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5014\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5014\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-6\/\">AC.L2-3.1.6 Non-Privileged Account Use<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5277\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5277\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-7\/\">AC.L2-3.1.7 Privileged Functions<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5020\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5020\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-8\/\">AC.L2-3.1.8 Unsuccessful Logon Attempts<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4865\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4865\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-9\/\">AC.L2-3.1.9 Privacy &amp; Security Notices<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5024\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5024\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-10\/\">AC.L2-3.1.10 Session Lock<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5281\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5281\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-11\/\">AC.L2-3.1.11 Session Termination<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5040\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5040\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-12\/\">AC.L2-3.1.12 Control Remote Access<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5296\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5296\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-13\/\">AC.L2-3.1.13 Remote Access Confidentiality<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5046\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5046\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-14\/\">AC.L2-3.1.14 Remote Access Routing<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5301\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5301\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-15\/\">AC.L2-3.1.15 Privileged Remote Access<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5034\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5034\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-16\/\">AC.L2-3.1.16 Wireless Access Authorization<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5286\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5286\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-17\/\">AC.L2-3.1.17 Wireless Access Protection<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5291\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5291\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-18\/\">AC.L2-3.1.18 Mobile Device Connection<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5306\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5306\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-19\/\">AC.L2-3.1.19 Encrypt CUI on Mobile<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5070\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5070\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-20\/\">AC.L2-3.1.20 External Connections<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"4992\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"4992\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-21\/\">AC.L2-3.1.21 Portable Storage Use<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5074\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5074\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-22\/\">AC.L2-3.1.22 Control Public Information<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5415\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5415\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/at-l2-3-2-1\/\">AT.L2-3.2.1 Role-Based Risk Awareness<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5422\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5422\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/at-l2-3-2-2\/\">AT.L2-3.2.2 Role-Based Training<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5428\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5428\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/at-l2-3-2-3\/\">AT.L2-3.2.3 Insider Threat Awareness<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5344\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5344\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/au-l2-3-3-1\/\">AU.L2-3.3.1 System Auditing<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5338\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5338\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/au-l2-3-3-2\/\">AU.L2-3.3.2 User Accountability<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5360\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5360\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/au-l2-3-3-3\/\">AU.L2-3.3.3 Event Review<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5365\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5365\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/au-l2-3-3-4\/\">AU.L2-3.3.4 Audit Failure Alerting<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5384\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5384\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/au-l2-3-3-5\/\">AU.L2-3.3.5 Audit Correlation<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5390\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5390\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/au-l2-3-3-6\/\">AU.L2-3.3.6 Reduction &amp; Reporting<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5350\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5350\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/au-l2-3-3-7\/\">AU.L2-3.3.7 Authoritative Time Source<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5375\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5375\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/au-l2-3-3-8\/\">AU.L2-3.3.8 Audit Protection<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5380\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5380\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/au-l2-3-3-9\/\">AU.L2-3.3.9 Audit Management<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5441\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5441\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-1\/\">CM.L2-3.4.1 System Baselining<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5461\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5461\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-2\/\">CM.L2-3.4.2 Security Configuration Enforcement<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5467\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5467\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-3\/\">CM.L2-3.4.3 System Change Management<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5472\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5472\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-4\/\">CM.L2-3.4.4 Security Impact Analysis<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5477\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5477\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-5\/\">CM.L2-3.4.5 Access Restrictions for Change<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5450\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5450\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-6\/\">CM.L2-3.4.6 Least Functionality<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5482\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5482\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-7\/\">CM.L2-3.4.7 Nonessential Functionality<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5488\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5488\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-8\/\">CM.L2-3.4.8 Application Execution Policy<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5454\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5454\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/cm-l2-3-4-9\/\">CM.L2-3.4.9 User-Installed Software<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5505\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5505\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ia-l2-3-5-1\/\">IA.L2-3.5.1 Identification<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5510\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5510\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ia-l2-3-5-2\/\">IA.L2-3.5.2 Authentication<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5540\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5540\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ia-l2-3-5-3\/\">IA.L2-3.5.3 Multifactor Authentication<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5547\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5547\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ia-l2-3-5-4\/\">IA.L2-3.5.4 Replay-Resistant Authentication<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5552\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5552\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ia-l2-3-5-5\/\">IA.L2-3.5.5 Identifier Reuse<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5556\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5556\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ia-l2-3-5-6\/\">IA.L2-3.5.6 Identifier Handling<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5515\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5515\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ia-l2-3-5-7\/\">IA.L2-3.5.7 Password Complexity<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5520\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5520\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ia-l2-3-5-8\/\">IA.L2-3.5.8 Password Reuse<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5525\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5525\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ia-l2-3-5-9\/\">IA.L2-3.5.9 Temporary Passwords<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5531\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5531\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ia-l2-3-5-10\/\">IA.L2-3.5.10 Cryptographically-Protected Passwords<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5535\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5535\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ia-l2-3-5-11\/\">IA.L2-3.5.11 Obscure Feedback<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5570\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5570\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ir-l2-3-6-1\/\">IR.L2-3.6.1 Incident Handling<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5607\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5607\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ir-l2-3-6-2\/\">IR.L2-3.6.2 Incident Reporting<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5611\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5611\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ir-l2-3-6-3\/\">IR.L2-3.6.3 Incident Response Testing<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5623\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5623\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ma-l2-3-7-1\/\">MA.L2-3.7.1 Perform Maintenance<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5628\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5628\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ma-l2-3-7-2\/\">MA.L2-3.7.2 System Maintenance Control<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5645\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5645\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ma-l2-3-7-3\/\">MA.L2-3.7.3 Equipment Sanitization<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5650\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5650\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ma-l2-3-7-4\/\">MA.L2-3.7.4 Media Inspection<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5633\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5633\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ma-l2-3-7-5\/\">MA.L2-3.7.5 Nonlocal Maintenance<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5639\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5639\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ma-l2-3-7-6\/\">MA.L2-3.7.6 Maintenance Personnel<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5688\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5688\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/mp-l2-3-8-1\/\">MP.L2-3.8.1 Media Protection<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5693\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5693\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/mp-l2-3-8-2\/\">MP.L2-3.8.2 Media Access<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5682\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5682\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/mp-l2-3-8-3\/\">MP.L2-3.8.3 Media Disposal<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5704\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5704\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/mp-l2-3-8-4\/\">MP.L2-3.8.4 Media Markings<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5715\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5715\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/mp-l2-3-8-5\/\">MP.L2-3.8.5 Media Accountability<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5720\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5720\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/mp-l2-3-8-6\/\">MP.L2-3.8.6 Portable Storage Encryption<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5699\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5699\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/mp-l2-3-8-7\/\">MP.L2-3.8.7 Removable Media<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5709\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5709\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/mp-l2-3-8-8\/\">MP.L2-3.8.8 Shared Media<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5781\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5781\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/mp-l2-3-8-9\/\">MP.L2-3.8.9 Protect Backups<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5665\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5665\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ps-l2-3-9-1\/\">PS.L2-3.9.1 Screen Individuals<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5669\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5669\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ps-l2-3-9-2\/\">PS.L2-3.9.2 Personnel Actions<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5736\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5736\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/pe-l2-3-10-1\/\">PE.L2-3.10.1 Limit Physical Access<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5756\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5756\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/pe-l2-3-10-2\/\">PE.L2-3.10.2 Monitor Facility<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5741\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5741\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/pe-l2-3-10-3\/\">PE.L2-3.10.3 Escort Visitors<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5746\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5746\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/pe-l2-3-10-4\/\">PE.L2-3.10.4 Physical Access Logs<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5751\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5751\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/pe-l2-3-10-5\/\">PE.L2-3.10.5 Manage Physical Access<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5761\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5761\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/pe-l2-3-10-6\/\">PE.L2-3.10.6 Alternative Work Sites<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5801\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5801\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ra-l2-3-11-1\/\">RA.L2-3.11.1 Risk Assessments<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5806\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5806\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ra-l2-3-11-2\/\">RA.L2-3.11.2 Vulnerability Scan<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5814\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5814\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ra-l2-3-11-3\/\">RA.L2-3.11.3 Vulnerability Remediation<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5847\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5847\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ca-l2-3-12-1\/\">CA.L2-3.12.1 Security Control Assessment<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5851\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5851\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ca-l2-3-12-2\/\">CA.L2-3.12.2 Plan of Action<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5858\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5858\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ca-l2-3-12-3\/\">CA.L2-3.12.3 Security Control Monitoring<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5842\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5842\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ca-l2-3-12-4\/\">CA.L2-3.12.4 System Security Plan<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5888\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5888\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-1\/\">SC.L2-3.13.1 Boundary Protection<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5914\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5914\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-2\/\">SC.L2-3.13.2 Security Engineering<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5920\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5920\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-3\/\">SC.L2-3.13.3 Role Separation<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5925\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5925\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-4\/\">SC.L2-3.13.4 Shared Resource Control<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5892\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5892\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-5\/\">SC.L2-3.13.5 Public-Access System Separation<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5931\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5931\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-6\/\">SC.L2-3.13.6 Network Communication by Exception<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5936\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5936\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-7\/\">SC.L2-3.13.7 Split Tunneling<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5940\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5940\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-8\/\">SC.L2-3.13.8 Data in Transit<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5945\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5945\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-9\/\">SC.L2-3.13.9 Connections Termination<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5950\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5950\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-10\/\">SC.L2-3.13.10 Key Management<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5909\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5909\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-11\/\">SC.L2-3.13.11 CUI Encryption<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5898\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5898\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-12\/\">SC.L2-3.13.12 Collaborative Device Control<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5955\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5955\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-13\/\">SC.L2-3.13.13 Mobile Code<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5960\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5960\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-14\/\">SC.L2-3.13.14 Voice over Internet Protocol<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5965\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5965\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-15\/\">SC.L2-3.13.15 Communications Authenticity<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5970\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5970\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/sc-l2-3-13-16\/\">SC.L2-3.13.16 Data at Rest<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"5997\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"5997\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/si-l2-3-14-1\/\">SI.L2-3.14.1 Flaw Remediation<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"6001\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"6001\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/si-l2-3-14-2\/\">SI.L2-3.14.2 Malicious Code Protection<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"6018\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"6018\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/si-l2-3-14-3\/\">SI.L2-3.14.3 Security Alerts &amp; Advisories<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"6007\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"6007\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/si-l2-3-14-4\/\">SI.L2-3.14.4 Update Malicious Code Protection<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"6012\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"6012\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/si-l2-3-14-5\/\">SI.L2-3.14.5 System &amp; File Scanning<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"6023\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"6023\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/si-l2-3-14-6\/\">SI.L2-3.14.6 Monitor Communications for Attacks<\/a><\/h2><\/div><\/div><\/div><div class=\"rt-col-md-3 rt-col-sm-6 rt-col-xs-12 even-grid-item rt-grid-item\" data-id=\"6029\"><div class=\"rt-holder\"><div class='rt-detail'><h2 class=\"entry-title\"><a data-id=\"6029\" class=\"\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/si-l2-3-14-7\/\">SI.L2-3.14.7 Identify Unauthorized Use<\/a><\/h2><\/div><\/div><\/div><\/div><\/div><br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.2.2&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.2.2&#8243;][et_pb_button button_url=&#8221;https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/&#8221; button_text=&#8221;CMMC Level 1&#8243; _builder_version=&#8221;4.4.3&#8243; custom_button=&#8221;on&#8221; button_bg_color=&#8221;#00208a&#8221; button_icon=&#8221;%%27%%&#8221; button_icon_placement=&#8221;left&#8221; button_on_hover=&#8221;off&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.2.2&#8243;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.2.2&#8243;][et_pb_button button_url=&#8221;https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-3\/&#8221; button_text=&#8221;CMMC Level 3&#8243; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.4.3&#8243; custom_button=&#8221;on&#8221; button_bg_color=&#8221;#00208a&#8221; button_icon=&#8221;%%28%%&#8221; button_on_hover=&#8221;off&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_menu menu_id=&#8221;550&#8243; _builder_version=&#8221;4.4.3&#8243;][\/et_pb_menu][et_pb_text _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>CMMC Level 2<\/p><p>Processes: Documented<br \/>Level 2 requires that an organization establish and document practices and policies to guide the implementation of their CMMC efforts. The documentation of practices enables individuals to perform them in a repeatable manner. Organizations develop mature capabilities by documenting their processes and then practicing them as documented.<\/p><p>Practices: Intermediate Cyber Hygiene<br \/>Level 2 serves as a progression from Level 1 to Level 3 and consists of a subset of the security requirements specified in NIST SP 800-171 as well as practices from other standards and references. Because this level represents a transitional stage, a subset of the practices reference the protection of CUI.<\/p><p><a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-1\/\">CMMC Level 1 Controls<\/a><\/p>","_et_gb_content_width":"","footnotes":""},"categories":[327],"tags":[],"class_list":["post-4724","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-maturity-model-certification"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CMMC Level 2 - DIB SCC CyberAssist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CMMC Level 2 - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_menu menu_id=&#8221;550&#8243; _builder_version=&#8221;4.4.3&#8243;][\/et_pb_menu][et_pb_text _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-26T18:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-27T14:51:10+00:00\" \/>\n<meta name=\"author\" content=\"markcarr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"markcarr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/\",\"name\":\"CMMC Level 2 - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"datePublished\":\"2020-03-26T18:21:00+00:00\",\"dateModified\":\"2025-02-27T14:51:10+00:00\",\"author\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\"},\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CMMC Level 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\",\"name\":\"markcarr\",\"url\":\"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CMMC Level 2 - DIB SCC CyberAssist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/","og_locale":"en_US","og_type":"article","og_title":"CMMC Level 2 - DIB SCC CyberAssist","og_description":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_menu menu_id=&#8221;550&#8243; _builder_version=&#8221;4.4.3&#8243;][\/et_pb_menu][et_pb_text _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; [&hellip;]","og_url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/","og_site_name":"DIB SCC CyberAssist","article_published_time":"2020-03-26T18:21:00+00:00","article_modified_time":"2025-02-27T14:51:10+00:00","author":"markcarr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"markcarr","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/","url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/","name":"CMMC Level 2 - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"datePublished":"2020-03-26T18:21:00+00:00","dateModified":"2025-02-27T14:51:10+00:00","author":{"@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0"},"breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"CMMC Level 2"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0","name":"markcarr","url":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"markcarr","author_link":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/ndisac.org\/dibscc\/category\/cyberassist\/cybersecurity-maturity-model-certification\/\" rel=\"category tag\">CMMC<\/a>","rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_menu menu_id=&#8221;550&#8243; _builder_version=&#8221;4.4.3&#8243;][\/et_pb_menu][et_pb_text _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; [&hellip;]","_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/4724"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=4724"}],"version-history":[{"count":87,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/4724\/revisions"}],"predecessor-version":[{"id":15762,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/4724\/revisions\/15762"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=4724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/categories?post=4724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tags?post=4724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}