Security Centric, Inc

CMMC Shared Responsibility Matrix

Practice Area CMMC Practice NIST SP 800-171 Control Practice Statement/Objective Control/Objective Status
Access Control (AC) AC.L1-3.1.1 3.1.2 Control Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). Inherited
Access Control (AC) AC.L1-3.1.2 3.1.2 Control Limit information system access to the types of transactions and functions that authorized\nusers are permitted to execute. Inherited
Access Control (AC) AC.L1-3.1.20 3.1.20 Control Verify and control/limit connections to and use of external information systems. Inherited
Access Control (AC) AC.L1-3.1.22 3.1.22 Control Control information posted or processed on publicly accessible information systems. Inherited
Access Control (AC) AC.L2-3.1.3 3.1.3 Control Control the flow of CUI in accordance with approved authorizations. Inherited
Access Control (AC) AC.L2-3.1.4 3.1.4 Control Separate the duties of individuals to reduce the risk of malevolent activity without collusion. Inherited
Access Control (AC) AC.L2-3.1.5 3.1.5 Control Employ principle of least privilege, including for specific security functions and privileged accounts. Inherited
Access Control (AC) AC.L2-3.1.6 3.1.6 Control Use non-privileged accounts or roles when accessing nonsecurity functions. Inherited
Access Control (AC) AC.L2-3.1.7 3.1.7 Control Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs. Inherited
Access Control (AC) AC.L2-3.1.8 3.1.8 Control Limit unsuccessful logon attempts. Inherited
Access Control (AC) AC.L2-3.1.9 3.1.9 Control Provide privacy and security notices consistent with CUI rules. Inherited
Access Control (AC) AC.L2-3.1.10 3.1.10 Control Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity. Inherited
Access Control (AC) AC.L2-3.1.11 3.1.11 Control Terminate (automatically) user sessions after a defined condition. Inherited
Access Control (AC) AC.L2-3.1.12 3.1.12 Control Monitor and control remote access sessions. Inherited
Access Control (AC) AC.L2-3.1.13 3.1.13 Control Employ cryptographic mechanisms to protect the confidentiality of remote access sessions. Inherited
Access Control (AC) AC.L2-3.1.14 3.1.14 Control Route remote access via managed access control points. Inherited
Access Control (AC) AC.L2-3.1.15 3.1.15 Control Authorize remote execution of privileged commands and remote access to security-relevant information. Inherited
Access Control (AC) AC.L2-3.1.16 3.1.16 Control Authorize wireless access prior to allowing such connections. Inherited
Access Control (AC) AC.L2-3.1.17 3.1.17 Control Protect wireless access using authentication and encryption. Inherited
Access Control (AC) AC.L2-3.1.18 3.1.18 Control Control connection of mobile devices. Customer Responsibility
Access Control (AC) AC.L2-3.1.19 3.1.19 Control Encrypt CUI on mobile devices and mobile computing platforms. Customer Responsibility
Access Control (AC) AC.L2-3.1.21 3.1.21 Control Limit use of portable storage devices on external systems. Inherited
Awareness and Training (AT) AT.L2-3.2.1 3.2.1 Control Ensure that managers, system administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems. Shared
Awareness and Training (AT) AT.L2-3.2.2 3.2.2 Control Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities. Shared
Awareness and Training (AT) AT.L2-3.2.3 3.2.3 Control Provide security awareness training on recognizing and reporting potential indicators of insider threat. Shared
Audit and Accountability (AU) AU.L2-3.3.1 3.3.1 Control Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity. Inherited
Audit and Accountability (AU) AU.L2-3.3.2 3.3.2 Control Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions. Inherited
Audit and Accountability (AU) AU.L2-3.3.3 3.3.3 Control Review and update logged events. Inherited
Audit and Accountability (AU) AU.L2-3.3.4 3.3.4 Control Alert in the event of an audit logging process failure. Inherited
Audit and Accountability (AU) AU.L2-3.3.5 3.3.5 Control Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity. Inherited
Audit and Accountability (AU) AU.L2-3.3.6 3.3.6 Control Provide audit record reduction and report generation to support on-demand analysis and reporting. Inherited
Audit and Accountability (AU) AU.L2-3.3.7 3.3.7 Control Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records. Inherited
Audit and Accountability (AU) AU.L2-3.3.8 3.3.8 Control Protect audit information and audit logging tools from unauthorized access, modification, and deletion. Inherited
Audit and Accountability (AU) AU.L2-3.3.9 3.3.9 Control Limit management of audit logging functionality to a subset of privileged users. Shared
Configuration Management (CM) CM.L2-3.4.1 3.4.1 Control Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles. Shared
Configuration Management (CM) CM.L2-3.4.2 3.4.2 Control Establish and enforce security configuration settings for information technology\n products employed in organizational systems. Inherited
Configuration Management (CM) CM.L2-3.4.3 3.4.3 Control Track, review, approve, or disapprove, and log changes to organizational systems. Shared
Configuration Management (CM) CM.L2-3.4.4 3.4.4 Control Analyze the security impact of changes prior to implementation. Shared
Configuration Management (CM) CM.L2-3.4.5 3.4.5 Control Define, document, approve, and enforce physical and logical access restrictions \nassociated with changes to organizational systems. Inherited
Configuration Management (CM) CM.L2-3.4.6 3.4.6 Control Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities. Inherited
Configuration Management (CM) CM.L2-3.4.7 3.4.7 Control Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services. Inherited
Configuration Management (CM) CM.L2-3.4.8 3.4.8 Control Application Execution Policy: Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (whitelisting) policy to allow the execution of authorized software Inherited
Configuration \nManagement (CM) CM.L2-3.4.9 3.4.9 Control Control and monitor user-installed software. Inherited
Identification and Authentication (IA) IA.L1-3.5.1 3.5.1 Control Identify information system users, processes acting on behalf of users, or devices. Shared
Identification and Authentication (IA) IA.L1-3.5.2 3.5.2 Control Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. Inherited
Identification and Authentication (IA) IA.L2-3.5.3 3.5.3 Control Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts. Inherited
Identification and Authentication (IA) IA.L2-3.5.4 3.5.4 Control Replay-Resistant Authentication: Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts Inherited
Identification and Authentication (IA) IA.L2-3.5.5 3.5.5 Control Prevent the reuse of identifiers for a defined period. Inherited
Identification and Authentication (IA) IA.L2-3.5.6 3.5.6 Control Disable identifiers after a defined period of inactivity. Inherited
Identification and Authentication (IA) IA.L2-3.5.7 3.5.7 Control Enforce a minimum password complexity and change of characters when new passwords are created. Inherited
Identification and Authentication (IA) IA.L2-3.5.8 3.5.8 Control Prohibit password reuse for a specified number of generations. Inherited
Identification and Authentication (IA) IA.L2-3.5.9 3.5.9 Control Temporary Passwords: Allow temporary password use for system logons with an immediate change to a permanent password. Inherited
Identification and Authentication (IA) IA.L2-3.5.10 3.5.10 Control Store and transmit only cryptographically-protected passwords. Inherited
Identification and Authentication (IA) IA.L2-3.5.11 3.5.11 Control Obscure feedback of authentication information. Inherited
Incident Response (IR) IR.L2-3.6.1 3.6.1 Control Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities. Inherited
Incident Response (IR) IR.L2-3.6.2 3.6.2 Control Track, document, and report incidents to designated officials and/or authorities both internal and external to the organization. Inherited
Incident Response (IR) IR.L2-3.6.3 3.6.3 Control Test the organizational incident response capability. Shared
Maintenance (MA) MA.L2-3.7.1 3.7.1 Control Perform maintenance on organizational systems. Inherited
Maintenance (MA) MA.L2-3.7.2 3.7.2 Control Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance. Inherited
Maintenance (MA) MA.L2-3.7.3 3.7.3 Control Ensure equipment removed for off-site maintenance is sanitized of any CUI. Inherited
Maintenance (MA) MA.L2-3.7.4 3.7.4 Control Check media containing diagnostic and test programs for malicious code before the media is used in organizational systems. Inherited
Maintenance (MA) MA.L2-3.7.5 3.7.5 Control Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete. Inherited
Maintenance (MA) MA.L2-3.7.6 3.7.6 Control Supervise the maintenance activities of personnel without required access authorization. Inherited
Media Protection (MP) MP.L1-3.8.3 3.8.3 Control Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. Inherited
Media Protection (MP) MP.L2-3.8.1 3.8.1 Control Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital. Shared
Media Protection (MP) MP.L2-3.8.2 3.8.2 Control Limit access to CUI on system media to authorized users. Shared
Media Protection (MP) MP.L2-3.8.4 3.8.4 Control Mark media with necessary CUI markings and distribution limitations. Shared
Media Protection (MP) MP.L2-3.8.5 3.8.5 Control Control access to media containing CUI and maintain accountability for media during transport outside of controlled areas. Shared
Media Protection (MP) MP.L2-3.8.6 3.8.6 Control Implement cryptographic mechanisms to protect the confidentiality of CUI stored on digital media during transport unless otherwise protected by alternative physical safeguards. Shared
Media Protection (MP) MP.L2-3.8.7 3.8.7 Control Control the use of removable media on system components. Shared
Media Protection (MP) MP.L2-3.8.8 3.8.8 Control Prohibit the use of portable storage devices when such devices have no identifiable owner. Shared
Media Protection (MP) MP.L2-3.8.9 3.8.9 Control Protect the confidentiality of backup CUI at storage locations. Shared
Personnel Security (PS) PS.L2-3.9.1 3.9.1 Control Screen individuals prior to authorizing access to organizational systems containing CUI. Shared
Personnel Security (PS) PS.L2-3.9.2 3.9.2 Control Ensure that organizational systems containing CUI are protected during and after personnel actions such as terminations and transfers. Shared
Physical Protection (PE) PE.L1-3.10.1 3.10.1 Control Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. Inherited
Physical Protection (PE) PE.L1-3.10.3 3.10.3 Control Escort visitors and monitor visitor activity. Inherited
Physical Protection (PE) PE.L1-3.10.4 3.10.4 Control Maintain audit logs of physical access. Inherited
Physical Protection (PE) PE.L1-3.10.5 3.10.5 Control Control and manage physical access devices. Inherited
Physical Protection (PE) PE.L2-3.10.2 3.10.2 Control Protect and monitor the physical facility and support infrastructure for organizational systems. Inherited
Physical Protection (PE) PE.L2-3.10.6 3.10.6 Control Enforce safeguarding measures for CUI at alternate work sites. Inherited
Risk Assessment (RM) RA.L2-3.11.1 3.11.1 Control Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI. Shared
Risk Assessment (RM) RA.L2-3.11.2 3.11.2 Control Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified. Inherited
Risk Assessment (RM) RA.L2-3.11.3 3.11.3 Control Remediate vulnerabilities in accordance with risk assessments. Inherited
Security Assessment (CA) CA.L2-3.12.1 3.12.1 Control Periodically assess the security controls in organizational systems to determine if the controls are effective in their application. Inherited
Security Assessment (CA) CA.L2-3.12.2 3.12.2 Control Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems. Inherited
Security Assessment (CA) CA.L2-3.12.3 3.12.3 Control Monitor security controls on an ongoing basis to ensure the continued effectiveness of the controls. Inherited
Security Assessment (CA) CA.L2-3.12.4 3.12.4 Control Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems. Inherited
System and Communications Protection (SC) SC.L1-3.13.1 3.13.1 Control Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. Inherited
System and Communications Protection (SC) SC.L1-3.13.5 3.13.5 Control Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. Inherited
System and Communications Protection (SC) SC.L2-3.13.2 3.13.2 Control Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems. Inherited
System and Communications Protection (SC) SC.L2-3.13.3 3.13.3 Control Separate user functionality from system management functionality. Inherited
System and Communications Protection (SC) SC.L2-3.13.4 3.13.4 Control Prevent unauthorized and unintended information transfer via shared system resources. Inherited
System and Communications Protection (SC) SC.L2-3.13.6 3.13.6 Control Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception). Inherited
System and Communications Protection (SC) SC.L2-3.13.7 3.13.7 Control Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling). Inherited
System and Communications Protection (SC) SC.L2-3.13.8 3.13.8 Control Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission\n unless otherwise protected by alternative physical safeguards. Inherited
System and Communications Protection (SC) SC.L2-3.13.9 3.13.9 Control Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity. Inherited
System and Communications Protection (SC) SC.L2-3.13.10 3.13.10 Control Establish and manage cryptographic keys for cryptography employed in organizational systems. Inherited
System and \nCommunications Protection (SC) SC.L2-3.13.11 3.13.11 Control Employ FIPS-validated cryptography when used to protect the confidentiality of CUI. Inherited
System and Communications Protection (SC) SC.L2-3.13.12 3.13.12 Control Prohibit remote activation of collaborative computing devices and provide indication of devices\n in use to users present at the device. Inherited
System and Communications Protection (SC) SC.L2-3.13.13 3.13.13 Control Control and monitor the use of mobile code. Inherited
System and Communications Protection (SC) SC.L2-3.13.14 3.13.14 Control Control and monitor the use of Voice over Internet Protocol (VoIP) technologies. Customer Responsibility
System and Communications Protection (SC) SC.L2-3.13.15 3.13.15 Control Protect the authenticity of communications sessions. Inherited
System and \nCommunications Protection (SC) SC.L2-3.13.16 3.13.16 Control Protect the confidentiality of CUI at rest. Inherited
System and Information Integrity (SI) SI.L1-3.14.1 3.14.1 Control Identify, report, and correct information and information system flaws in a timely manner. Inherited
System and Information Integrity (SI) SI.L1-3.14.2 3.14.2 Control Provide protection from malicious code at appropriate locations within organizational information systems. Inherited
System and Information Integrity (SI) SI.L1-3.14.4 3.14.4 Control Update malicious code protection mechanisms when new releases are available. Inherited
System and Information Integrity (SI) SI.L1-3.14.5 3.14.5 Control Perform periodic scans of the information system and real- time scans of files from external sources as files are downloaded, opened, or executed. Inherited
System and Information Integrity (SI) SI.L2-3.14.3 3.14.3 Control Monitor system security alerts and advisories and take action in response. Inherited
System and Information Integrity (SI) SI.L2-3.14.6 3.14.6 Control Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks. Shared
System and Information Integrity (SI) SI.L2-3.14.7 3.14.7 Control Identify unauthorized use of organizational systems Shared