logo

Database

CMMC

Last updated: 2023/09/18
logo

The Cybersecurity Maturity Model Certification (CMMC) program enhances cyber protection standards for companies in the Defense Industrial Base (DIB). It is aimed at measuring the maturity of an organization's cybersecurity processes (process institutionalization). The version used in this section is CMMC 2.0.

Control-Requirement Mapping

DefinitionRequirements
AC_L1-3_1_1. Authorized access control
AC_L1-3_1_2. Transaction & function control
AC_L1-3_1_20. External connections
AC_L1-3_1_22. Control public information
AC_L2-3_1_3. Control CUI flow
AC_L2-3_1_4. Separation of duties
AC_L2-3_1_5. Least privilege
AC_L2-3_1_6. Non-privileged account use
AC_L2-3_1_7. Privileged functions
AC_L2-3_1_8. Unsuccessful logon attempts
AC_L2-3_1_9. Privacy & security notices
AC_L2-3_1_10. Session lock
AC_L2-3_1_11. Session termination
AC_L2-3_1_12. Control remote access
AC_L2-3_1_13. Remote access confidentiality
AC_L2-3_1_14. Remote access routing
AC_L2-3_1_15. Privileged remote access
AC_L2-3_1_16. Wireless access authorization
AC_L2-3_1_17. Wireless access protection
AC_L2-3_1_18. Mobile device connection
AC_L2-3_1_19. Encrypt CUI on mobile
AC_L2-3_1_21. Portable storage use
AT_L2-3_2_1. Role-based risk awareness
AU_L2-3_3_1. System audit
AU_L2-3_3_2. User accountability
AU_L2-3_3_3. Event review
AU_L2-3_3_4. Audit failure alerting
AU_L2-3_3_7. Authoritative time source
AU_L2-3_3_8. Audit protection
AU_L2-3_3_9. Audit management
CM_L2-3_4_2. Security configuration enforcement
CM_L2-3_4_3. System change management
CM_L2-3_4_5. Access restrictions for change
CM_L2-3_4_6. Least functionality
CM_L2-3_4_7. Nonessential functionality
CM_L2-3_4_8. Application execution policy
CM_L2-3_4_9. User-installed software
IA_L1-3_5_2. Authentication
IA_L2-3_5_3. Multifactor authentication
IA_L2-3_5_4. Replay-resistant authentication
IA_L2-3_5_5. Identifier reuse
IA_L2-3_5_6. Identifier handling
IA_L2-3_5_7. Password complexity
IA_L2-3_5_8. Password reuse
IA_L2-3_5_9. Temporary passwords
IA_L2-3_5_10. Cryptographically-protected passwords
MA_L2-3_7_3. Equipment sanitization
MA_L2-3_7_4. Media inspection
MA_L2-3_7_5. Nonlocal maintenance
MP_L1-3_8_3. Media disposal
MP_L2-3_8_1. Media protection
MP_L2-3_8_2. Media access
MP_L2-3_8_5. Media accountability
MP_L2-3_8_6. Portable storage encryption
MP_L2-3_8_7. Removable media
MP_L2-3_8_8. Shared media
PE_L1-3_10_1. Limit physical access
PE_L1-3_10_4. Physical access logs
PE_L1-3_10_5. Manage physical access
PE_L2-3_10_6. Alternative work sites
RA_L2-3_11_2. Vulnerability scan
CA_L2-3_12_2. Plan of action
CA_L2-3_12_3. Security control monitoring
SC_L1-3_13_1. Boundary protection
SC_L1-3_13_5. Public-access system separation
SC_L2-3_13_3. Role separation
SC_L2-3_13_4. Shared resource control
SC_L2-3_13_6. Network communication by exception
SC_L2-3_13_7. Split tunneling
SC_L2-3_13_8. Data in transit
SC_L2-3_13_9. Connections termination
SC_L2-3_13_10. Key management
SC_L2-3_13_13. Mobile code
SC_L2-3_13_15. Communications authenticity
SC_L2-3_13_16. Data at rest
SI_L1-3_14_2. Malicious code protection
SI_L1-3_14_4. Update malicious code protection
SI_L1-3_14_5. System & file scanning
SI_L2-3_14_3. Security alerts & advisories
SI_L2-3_14_7. Identify unauthorized use