0% found this document useful (0 votes)
33 views46 pages

Model Overview

The Cybersecurity Maturity Model Certification (CMMC) Model Overview outlines the framework for enhancing cybersecurity within the Department of Defense (DoD) supply chain, particularly focusing on protecting Controlled Unclassified Information (CUI) and Federal Contract Information (FCI). It details the CMMC levels (1 to 3), each with specific security requirements derived from existing regulations and standards, and emphasizes the importance of compliance to mitigate risks from cyber threats. The document serves as a guide for organizations to implement and assess their cybersecurity practices in alignment with DoD expectations.

Uploaded by

aplicant
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views46 pages

Model Overview

The Cybersecurity Maturity Model Certification (CMMC) Model Overview outlines the framework for enhancing cybersecurity within the Department of Defense (DoD) supply chain, particularly focusing on protecting Controlled Unclassified Information (CUI) and Federal Contract Information (FCI). It details the CMMC levels (1 to 3), each with specific security requirements derived from existing regulations and standards, and emphasizes the importance of compliance to mitigate risks from cyber threats. The document serves as a guide for organizations to implement and assess their cybersecurity practices in alignment with DoD expectations.

Uploaded by

aplicant
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Cybersecurity Maturity Model

Certification (CMMC) Model


Overview
Version 2.13 | September 2024
DoD-CIO-00001 (ZRIN 0790-ZA17)
NOTICES
The contents of this document do not have the force and effect of law and are not meant to
bind the public in any way. This document is intended only to provide clarity to the public
regarding existing CMMC security requirements under the law or departmental policies.

[DISTRIBUTION STATEMENT A] Approved for public release.

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 ii


TABLE OF CONTENTS
Introduction ...................................................................................................................... 1

1.1 Document Organization ......................................................................................................... 2


1.2 Supporting Documents .......................................................................................................... 2

CMMC Model .................................................................................................................... 3

2.1 Overview ................................................................................................................................ 3


2.2 CMMC Levels ......................................................................................................................... 3
2.3 CMMC Domains ..................................................................................................................... 5
2.4 CMMC Requirements............................................................................................................. 6

CMMC Model Matrix ....................................................................................... 18

Abbreviations and Acronyms............................................................................ 39

References ....................................................................................................... 41

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 iii
Introduction

Introduction
The theft of intellectual property and sensitive information from all industrial sectors because
of malicious cyber activity threatens economic security and national security. The Council of
Economic Advisors estimates that malicious cyber activity cost the U.S. economy between $57
billion and $109 billion in 2016 [1]. The Center for Strategic and International Studies
estimates that the total global cost of cybercrime was as high as $600 billion in 2017 [2]. Over
a ten-year period, that burden would equate to an estimated $570 billion to $1.09 trillion
dollars in costs.

Malicious cyber actors have targeted and continue to target the Defense Industrial Base
(DIB) sector and the Department of Defense (DoD) supply chain. These attacks not only focus
on the large prime contractors, but also target subcontractors that make up the lower tiers
of the DoD supply chain. Many of these subcontractors are small entities that provide critical
support and innovation. Overall, the DIB sector consists of over 220,000 companies1 that
process, store, or transmit Controlled Unclassified Information (CUI) or Federal Contract
Information (FCI) in support of the warfighter and contribute towards the research,
engineering, development, acquisition, production, delivery, sustainment, and operations of
DoD systems, networks, installations, capabilities, and services. The aggregate loss of
intellectual property and controlled unclassified information from the DoD supply chain can
undercut U.S. technical advantages and innovation, as well as significantly increase the risk
to national security.

As part of multiple lines of effort focused on the security and resiliency of the DIB sector, the
DoD is working with industry to enforce the safeguarding requirements of the following
types of unclassified information within the supply chain:

• Federal Contract Information (FCI): is defined in 32 CFR § 170.4 and 48 CFR 4.1901 [3].
• Controlled Unclassified Information (CUI): is defined in 32 CFR § 2002.4 (h) [4].

To this end, the Office of the Under Secretary of Defense for Acquisition and Sustainment
(OUSD(A&S)) and DoD Chief Information Officer (CIO) have developed the Cybersecurity
Maturity Model Certification (CMMC) in concert with DoD stakeholders, University Affiliated
Research Centers (UARCs), Federally Funded Research and Development Centers (FFRDCs),
and the DIB sector.

1
Based on information from the Federal Procurement Data System, the average number of unique prime contractors
is approximately 212,657 and the number of known unique subcontractors is approximately 8,309. (FPDS from
FY18-FY21).

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 1


Introduction

This document focuses on the Cybersecurity Maturity Model Certification (CMMC) Model as
set forth in section 170.14 of title 32, Code of Federal Regulations (CFR). The model
incorporates the security requirements from: 1) FAR 52.204-21, Basic Safeguarding of Covered
Contractor Information Systems, 2) NIST SP 800-171 Rev 2, Protecting Controlled Unclassified
Information in Nonfederal Systems and Organizations, and 3) a subset of the requirements from
NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified
Information: A Supplement to NIST Special Publication 800-171. The CMMC Program is
designed to provide increased assurance to the DoD that defense contractors and
subcontractors are compliant with information protection requirements for FCI and CUI, and
are protecting such information at a level commensurate with risk from cybersecurity
threats, including Advanced Persistent Threats (APTs).

When implementing the CMMC model, an organization can achieve a specific CMMC level for
its entire enterprise network or for a particular enclave(s), depending on where the
information to be protected is handled and stored.

1.1 Document Organization


Section 2 presents the CMMC Model and each of its elements in detail. Appendix A provides
the model as a matrix and maps the CMMC model to other secondary sources. Appendix B
lists the abbreviations and acronyms. Finally, Appendix C provides the references contained
in this document.

1.2 Supporting Documents


This document is supported by multiple companion documents that provide additional
information. The CMMC Assessment Guides present assessment objectives, discussion,
examples, potential assessment considerations, and key references for each CMMC security
requirement. The CMMC Scoping Guides provide additional guidance on how to correctly
scope an assessment. The CMMC Hashing Guide provides information on how to create the
hash to validate the integrity of archived assessment artifacts.

These supplemental documents are intended to provide explanatory information to assist


organizations with implementing and assessing the security requirements covered by CMMC
in 32 CFR § 170. The documents are not prescriptive and their use is optional.
Implementation of security requirements by following any examples is not a guarantee of
compliance with any CMMC security requirement or objective.

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 2


CMMC Model

CMMC Model
2.1 Overview
The CMMC Model incorporates the security requirements from: 1) FAR 52.204-21, Basic
Safeguarding of Covered Contractor Information Systems, 2) NIST SP 800-171 Rev 2,
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, and
3) a subset of the requirements from NIST SP 800-172, Enhanced Security Requirements for
Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication
800—171. These source documents may be revised in the future, however the CMMC
security requirements will remain unchanged until the CMMC final rule is published. Any
further modifications to the CMMC rule will follow appropriate rulemaking procedures.

The CMMC Model consists of domains that map to the Security Requirement Families defined
in NIST SP 800-171 Rev 2.

2.2 CMMC Levels


There are three levels within CMMC – Level 1, Level 2, and Level 3.

Descriptions

The CMMC model measures the implementation of cybersecurity requirements at three


levels. Each level is independent and consists of a set of CMMC security requirements as set
forth in 32 CFR § 170.14 (c):

• Level 1 Requirements. The security requirements in Level 1 are those set forth in FAR
clause 52.204-21(b)(1)(i) – (b)(1)(xv).
• Level 2 Requirements. The security requirements in Level 2 are identical to the
requirements in NIST SP 800-171 Rev 2.
• Level 3 Requirements. The security requirements in Level 3 are derived from NIST SP
800-172 with DoD-approved parameters where applicable, as identified in 32 CFR §
170.14(c)(4). DoD defined selections and parameters for the NIST SP 800-172
requirements are italicized, where applicable.

CMMC Overview

Figure 1 provides an overview of the CMMC Levels.

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 3


CMMC Model

Figure 1. CMMC Level Overview

Level 1

Level 1 focuses on the protection of FCI and consists of the security requirements that
correspond to the 15 basic safeguarding requirements specified in 48 CFR 52.204-21,
commonly referred to as the FAR Clause.

Level 2

Level 2 focuses on the protection of CUI and incorporates the 110 security requirements
specified in NIST SP 800-171 Rev 2.

Level 3

Level 3 focuses on the protection of CUI and encompasses a subset of the NIST SP 800-
172 security requirements [5] with DoD-approved parameters. DoD-approved
parameters are denoted with underlining in section 2.4.1 below.

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 4


CMMC Model

2.3 CMMC Domains


The CMMC model consists of 14 domains that align with the families specified in NIST
SP 800-171 Rev 2. These domains and their abbreviations are as follows:

• Access Control (AC)


• Awareness & Training (AT)
• Audit & Accountability (AU)
• Configuration Management (CM)
• Identification & Authentication (IA)
• Incident Response (IR)
• Maintenance (MA)
• Media Protection (MP)
• Personnel Security (PS)
• Physical Protection (PE)
• Risk Assessment (RA)
• Security Assessment (CA)
• System and Communications Protection (SC)
• System and Information Integrity (SI)

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 5


CMMC Model

2.4 CMMC Security Requirements


List of Security Requirements

This subsection itemizes the security requirements for each domain and at each level. Each
requirement has a requirement identification number in the format – DD.L#-REQ – where:

• DD is the two-letter domain abbreviation;


• L# is the level number; and
• REQ is the FAR Clause 52.204-21 paragraph number, NIST SP 800-171 Rev 2, or NIST SP
800-172 security requirement number.

Below the identification number, a short name identifier is provided for each requirement,
meant to be used for quick reference only. Finally, each requirement has a complete
requirement statement.

ACCESS CONTROL (AC)

Level 1
AC.L1-b.1.i Limit information system access to authorized users, processes acting on
Authorized Access Control [FCI Data] behalf of authorized users, or devices (including other information systems).
AC.L1-b.1.ii Limit information system access to the types of transactions and functions
Transaction & Function Control [FCI that authorized users are permitted to execute.
Data]
AC.L1-b.1.iii Verify and control/limit connections to and use of external information
External Connections [FCI Data] systems.
AC.L1-b.1.iv Control information posted or processed on publicly accessible information
Control Public Information [FCI Data] systems.

Level 2
AC.L2-3.1.1 Limit system access to authorized users, processes acting on behalf of
Authorized Access Control [CUI Data] authorized users, and devices (including other systems).
AC.L2-3.1.2 Limit system access to the types of transactions and functions that
Transaction & Function Control [CUI authorized users are permitted to execute.
Data]
AC.L2-3.1.3 Control the flow of CUI in accordance with approved authorizations.
Control CUI Flow
AC.L2-3.1.4 Separate the duties of individuals to reduce the risk of malevolent activity
Separation of Duties without collusion.

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 6


CMMC Model

AC.L2-3.1.5 Employ the principle of least privilege, including for specific security
Least Privilege functions and privileged accounts.
AC.L2-3.1.6 Use non-privileged accounts or roles when accessing nonsecurity functions.
Non-Privileged Account Use
AC.L2-3.1.7 Prevent non-privileged users from executing privileged functions and
Privileged Functions capture the execution of such functions in audit logs.
AC.L2-3.1.8 Limit unsuccessful logon attempts.
Unsuccessful Logon Attempts
AC.L2-3.1.9 Provide privacy and security notices consistent with applicable CUI rules.
Privacy & Security Notices
AC.L2-3.1.10 Use session lock with pattern-hiding displays to prevent access and viewing
Session Lock of data after a period of inactivity.
AC.L2-3.1.11 Terminate (automatically) a user session after a defined condition.
Session Termination
AC.L2-3.1.12 Monitor and control remote access sessions.
Control Remote Access
AC.L2-3.1.13 Employ cryptographic mechanisms to protect the confidentiality of remote
Remote Access Confidentiality access sessions.
AC.L2-3.1.14 Route remote access via managed access control points.
Remote Access Routing
AC.L2-3.1.15 Authorize remote execution of privileged commands and remote access to
Privileged Remote Access security-relevant information.
AC.L2-3.1.16 Authorize wireless access prior to allowing such connections.
Wireless Access Authorization
AC.L2-3.1.17 Protect wireless access using authentication and encryption.
Wireless Access Protection
AC.L2-3.1.18 Control connection of mobile devices.
Mobile Device Connection
AC.L2-3.1.19 Encrypt CUI on mobile devices and mobile computing platforms.
Encrypt CUI on Mobile
AC.L2-3.1.20 Verify and control/limit connections to and use of external systems.
External Connections [CUI Data]
AC.L2-3.1.21 Limit use of portable storage devices on external systems.
Portable Storage Use
AC.L2-3.1.22 Control CUI posted or processed on publicly accessible systems.
Control Public Information [CUI Data]

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 7


CMMC Model

Level 3
AC.L3-3.1.2e Restrict access to systems and system components to only those
Organizationally Controlled Assets information resources that are owned, provisioned, or issued by the
organization.
AC.L3-3.1.3e Employ secure information transfer solutions to control information
Secured Information Transfer flows between security domains on connected systems.

AWARENESS AND TRAINING (AT)

Level 2
AT.L2-3.2.1 Inform managers, systems administrators, and users of organizational
Role-Based Risk Awareness systems of the security risks associated with their activities and of the
applicable policies, standards, and procedures related to the security of
those systems.
AT.L2-3.2.2 Train personnel to carry out their assigned information security-related
Role-Based Training duties and responsibilities.
AT.L2-3.2.3 Provide security awareness training on recognizing and reporting potential
Insider Threat Awareness indicators of insider threat.

Level 3
AT.L3-3.2.1e Provide awareness training upon initial hire, following a significant cyber
Advanced Threat Awareness event, and at least annually, focused on recognizing and responding to
threats from social engineering, advanced persistent threat actors,
breaches, and suspicious behaviors; update the training at least annually or
when there are significant changes to the threat.
AT.L3-3.2.2e Include practical exercises in awareness training for all users, tailored by
Practical Training Exercises roles, to include general users, users with specialized roles, and privileged
users, that are aligned with current threat scenarios and provide feedback
to individuals involved in the training and their supervisors.

AUDIT AND ACCOUNTABILITY (AU)

Level 2
AU.L2-3.3.1 Create and retain system audit logs and records to the extent needed to
System Auditing enable the monitoring, analysis, investigation, and reporting of unlawful or
unauthorized system activity.
AU.L2-3.3.2 Uniquely trace the actions of individual system users, so they can be held
User Accountability accountable for their actions.
AU.L2-3.3.3 Review and update logged events.
Event Review

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 8


CMMC Model

AU.L2-3.3.4 Alert in the event of an audit logging process failure.


Audit Failure Alerting
AU.L2-3.3.5 Correlate audit record review, analysis, and reporting processes for
Audit Correlation investigation and response to indications of unlawful, unauthorized,
suspicious, or unusual activity.
AU.L2-3.3.6 Provide audit record reduction and report generation to support on-demand
Reduction & Reporting analysis and reporting.
AU.L2-3.3.7 Provide a system capability that compares and synchronizes internal system
Authoritative Time Source clocks with an authoritative source to generate time stamps for audit
records.
AU.L2-3.3.8 Protect audit information and audit logging tools from unauthorized access,
Audit Protection modification, and deletion.
AU.L2-3.3.9 Limit management of audit logging functionality to a subset of privileged
Audit Management users.

CONFIGURATION MANAGEMENT (CM)

Level 2
CM.L2-3.4.1 Establish and maintain baseline configurations and inventories of
System Baselining organizational systems (including hardware, software, firmware, and
documentation) throughout the respective system development life cycles.
CM.L2-3.4.2 Establish and enforce security configuration settings for information
Security Configuration Enforcement technology products employed in organizational systems.
CM.L2-3.4.3 Track, review, approve or disapprove, and log changes to organizational
System Change Management systems.
CM.L2-3.4.4 Analyze the security impact of changes prior to implementation.
Security Impact Analysis
CM.L2-3.4.5 Define, document, approve, and enforce physical and logical access
Access Restrictions for Change restrictions associated with changes to organizational systems.
CM.L2-3.4.6 Employ the principle of least functionality by configuring organizational
Least Functionality systems to provide only essential capabilities.
CM.L2-3.4.7 Restrict, disable, or prevent the use of nonessential programs, functions,
Nonessential Functionality ports, protocols, and services.
CM.L2-3.4.8 Apply deny-by-exception (blacklisting) policy to prevent the use of
Application Execution Policy unauthorized software or deny-all, permit-by-exception (whitelisting) policy
to allow the execution of authorized software.
CM.L2-3.4.9 Control and monitor user-installed software.
User-Installed Software

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 9


CMMC Model

Level 3
CM.L3-3.4.1e Establish and maintain an authoritative source and repository to provide a
Authoritative Repository trusted source and accountability for approved and implemented system
components.
CM.L3-3.4.2e Employ automated mechanisms to detect misconfigured or unauthorized
Automated Detection & Remediation system components; after detection, remove the components or place the
components in a quarantine or remediation network to facilitate patching,
re-configuration, or other mitigations.
CM.L3-3.4.3e Employ automated discovery and management tools to maintain an up-to-
Automated Inventory date, complete, accurate, and readily available inventory of system
components.

IDENTIFICATION AND AUTHENTICATION (IA)

Level 1
IA.L1-b.1.v Identify information system users, processes acting on behalf of users, or
Identification [FCI Data] devices.
IA.L1-b.1.vi Authenticate (or verify) the identities of those users, processes, or devices,
Authentication [FCI Data] as a prerequisite to allowing access to organizational information systems.

Level 2
IA.L2-3.5.1 Identify system users, processes acting on behalf of users, and devices.
Identification [CUI Data]
IA.L2-3.5.2 Authenticate (or verify) the identities of users, processes, or devices, as a
Authentication [CUI Data] prerequisite to allowing access to organizational systems.
IA.L2-3.5.3 Use multifactor authentication for local and network access to privileged
Multifactor Authentication accounts and for network access to non-privileged accounts.
IA.L2-3.5.4 Employ replay-resistant authentication mechanisms for network access to
Replay-Resistant Authentication privileged and non-privileged accounts.
IA.L2-3.5.5 Prevent reuse of identifiers for a defined period.
Identifier Reuse
IA.L2-3.5.6 Disable identifiers after a defined period of inactivity.
Identifier Handling
IA.L2-3.5.7 Enforce a minimum password complexity and change of characters when
Password Complexity new passwords are created.
IA.L2-3.5.8 Prohibit password reuse for a specified number of generations.
Password Reuse
IA.L2-3.5.9 Allow temporary password use for system logons with an immediate change
Temporary Passwords to a permanent password.

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 10


CMMC Model

IA.L2-3.5.10 Store and transmit only cryptographically protected passwords.


Cryptographically-Protected
Passwords
IA.L2-3.5.11 Obscure feedback of authentication information.
Obscure Feedback

Level 3
IA.L3-3.5.1e Identify and authenticate systems and system components, where possible,
Bidirectional Authentication before establishing a network connection using bidirectional authentication
that is cryptographically based and replay resistant.
IA.L3-3.5.3e Employ automated or manual/procedural mechanisms to prohibit system
Block Untrusted Assets components from connecting to organizational systems unless the
components are known, authenticated, in a properly configured state, or in
a trust profile.

INCIDENT RESPONSE (IR)

Level 2
IR.L2-3.6.1 Establish an operational incident-handling capability for organizational
Incident Handling systems that includes preparation, detection, analysis, containment,
recovery, and user response activities.
IR.L2-3.6.2 Track, document, and report incidents to designated officials and/or
Incident Reporting authorities both internal and external to the organization.
IR.L2-3.6.3 Test the organizational incident response capability.
Incident Response Testing

Level 3
IR.L3-3.6.1e Establish and maintain a security operations center capability that operates
Security Operations Center 24/7, with allowance for remote/on-call staff.
IR.L3-3.6.2e Establish and maintain a cyber incident response team that can be deployed
Cyber Incident Response Team by the organization within 24 hours.

MAINTENANCE (MA)

Level 2
MA.L2-3.7.1 Perform maintenance on organizational systems.
Perform Maintenance
MA.L2-3.7.2 Provide controls on the tools, techniques, mechanisms, and personnel used
System Maintenance Control to conduct system maintenance.
MA.L2-3.7.3 Sanitize equipment removed for off-site maintenance of any CUI.
Equipment Sanitization

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 11


CMMC Model

MA.L2-3.7.4 Check media containing diagnostic and test programs for malicious code
Media Inspection before the media are used in organizational systems.
MA.L2-3.7.5 Require multifactor authentication to establish nonlocal maintenance
Nonlocal Maintenance sessions via external network connections and terminate such connections
when nonlocal maintenance is complete.
MA.L2-3.7.6 Supervise the maintenance activities of maintenance personnel without
Maintenance Personnel required access authorization.

MEDIA PROTECTION (MP)

Level 1
MP.L1-b.1.vii Sanitize or destroy information system media containing Federal Contract
Media Disposal [FCI Data] Information before disposal or release for reuse.

Level 2
MP.L2-3.8.1 Protect (i.e., physically control and securely store) system media containing
Media Protection CUI, both paper and digital.
MP.L2-3.8.2 Limit access to CUI on system media to authorized users.
Media Access
MP.L2-3.8.3 Sanitize or destroy system media containing CUI before disposal or release
Media Disposal [CUI Data] for reuse.
MP.L2-3.8.4 Mark media with necessary CUI markings and distribution limitations.
Media Markings
MP.L2-3.8.5 Control access to media containing CUI and maintain accountability for
Media Accountability media during transport outside of controlled areas.
MP.L2-3.8.6 Implement cryptographic mechanisms to protect the confidentiality of CUI
Portable Storage Encryption stored on digital media during transport unless otherwise protected by
alternative physical safeguards.
MP.L2-3.8.7 Control the use of removable media on system components.
Removable Media
MP.L2-3.8.8 Prohibit the use of portable storage devices when such devices have no
Shared Media identifiable owner.
MP.L2-3.8.9 Protect the confidentiality of backup CUI at storage locations.
Protect Backups

PERSONNEL SECURITY (PS)

Level 2
PS.L2-3.9.1 Screen individuals prior to authorizing access to organizational systems
Screen Individuals containing CUI.

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 12


CMMC Model

PS.L2-3.9.2 Protect organizational systems containing CUI during and after personnel
Personnel Actions actions such as terminations and transfers.

Level 3
PS.L3-3.9.2e Protect organizational systems when adverse information develops or is
Adverse Information obtained about individuals with access to CUI.

PHYSICAL PROTECTION (PE)

Level 1
PE.L1-b.1.viii Limit physical access to organizational information systems, equipment, and
Limit Physical Access [FCI Data] the respective operating environments to authorized individuals.
PE.L1-b.1.ix Escort visitors and monitor visitor activity; maintain audit logs of physical
Manage Visitors & Physical Access access; and control and manage physical access devices.
[FCI Data]

Level 2
PE.L2-3.10.1 Limit physical access to organizational systems, equipment, and the
Limit Physical Access [CUI Data] respective operating environments to authorized individuals.
PE.L2-3.10.2 Protect and monitor the physical facility and support infrastructure for
Monitor Facility organizational systems.
PE.L2-3.10.3 Escort visitors and monitor visitor activity.
Escort Visitors [CUI Data]
PE.L2-3.10.4 Maintain audit logs of physical access.
Physical Access Logs [CUI Data]
PE.L2-3.10.5 Control and manage physical access devices.
Manage Physical Access [CUI Data]
PE.L2-3.10.6 Enforce safeguarding measures for CUI at alternate work sites.
Alternative Work Sites

RISK ASSESSMENT (RA)

Level 2
RA.L2-3.11.1 Periodically assess the risk to organizational operations (including mission,
Risk Assessments functions, image, or reputation), organizational assets, and individuals,
resulting from the operation of organizational systems and the associated
processing, storage, or transmission of CUI.
RA.L2-3.11.2 Scan for vulnerabilities in organizational systems and applications
Vulnerability Scan periodically and when new vulnerabilities affecting those systems and
applications are identified.

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 13


CMMC Model

RA.L2-3.11.3 Remediate vulnerabilities in accordance with risk assessments.


Vulnerability Remediation

Level 3
RA.L3-3.11.1e Employ threat intelligence, at a minimum from open or commercial sources,
Threat-Informed Risk Assessment and any DoD-provided sources, as part of a risk assessment to guide and
inform the development of organizational systems, security architectures,
selection of security solutions, monitoring, threat hunting, and response and
recovery activities.
RA.L3-3.11.2e Conduct cyber threat hunting activities on an on-going aperiodic basis or
Threat Hunting when indications warrant, to search for indicators of compromise in
organizational systems and detect, track, and disrupt threats that evade
existing controls.
RA.L3-3.11.3e Employ advanced automation and analytics capabilities in support of
Advanced Risk Identification analysts to predict and identify risks to organizations, systems, and system
components.
RA.L3-3.11.4e Document or reference in the system security plan the security solution
Security Solution Rationale selected, the rationale for the security solution, and the risk determination.
RA.L3-3.11.5e Assess the effectiveness of security solutions at least annually or upon
Security Solution Effectiveness receipt of relevant cyber threat information, or in response to a relevant
cyber incident, to address anticipated risk to organizational systems and the
organization based on current and accumulated threat intelligence.
RA.L3-3.11.6e Assess, respond to, and monitor supply chain risks associated with
Supply Chain Risk Response organizational systems and system components.
RA.L3-3.11.7e Develop a plan for managing supply chain risks associated with
Supply Chain Risk Plan organizational systems and system components; update the plan at least
annually, and upon receipt of relevant cyber threat information, or in
response to a relevant cyber incident.

SECURITY ASSESSMENT (CA)

Level 2
CA.L2-3.12.1 Periodically assess the security controls in organizational systems to
Security Control Assessment determine if the controls are effective in their application.
CA.L2-3.12.2 Develop and implement plans of action designed to correct deficiencies and
Operational Plan of Action reduce or eliminate vulnerabilities in organizational systems.
CA.L2-3.12.3 Monitor security controls on an ongoing basis to determine the continued
Security Control Monitoring effectiveness of the controls.
CA.L2-3.12.4 Develop, document, and periodically update system security plans that
System Security Plan describe system boundaries, system environments of operation, how
security requirements are implemented, and the relationships with or
connections to other systems.

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 14


CMMC Model

Level 3
CA.L3-3.12.1e Conduct penetration testing at least annually or when significant security
Penetration Testing changes are made to the system, leveraging automated scanning tools and
ad hoc tests using subject matter experts.

SYSTEM AND COMMUNICATIONS PROTECTION (SC)

Level 1
SC.L1-b.1.x Monitor, control, and protect organizational communications (i.e.,
Boundary Protection [FCI Data] information transmitted or received by organizational information systems)
at the external boundaries and key internal boundaries of the information
systems.
SC.L1-b.1.xi Implement subnetworks for publicly accessible system components that are
Public-Access System Separation physically or logically separated from internal networks.
[FCI Data]

Level 2
SC.L2-3.13.1 Monitor, control, and protect organizational communications (i.e.,
Boundary Protection [CUI Data] information transmitted or received by organizational information systems)
at the external boundaries and key internal boundaries of the information
systems.
SC.L2-3.13.2 Employ architectural designs, software development techniques, and
Security Engineering systems engineering principles that promote effective information security
within organizational systems.
SC.L2-3.13.3 Separate user functionality from system management functionality.
Role Separation
SC.L2-3.13.4 Prevent unauthorized and unintended information transfer via shared
Shared Resource Control system resources.
SC.L2-3.13.5 Implement subnetworks for publicly accessible system components that are
Public-Access System Separation physically or logically separated from internal networks.
[CUI Data]
SC.L2-3.13.6 Deny network communications traffic by default and allow network
Network Communication by communications traffic by exception (i.e., deny all, permit by exception).
Exception
SC.L2-3.13.7 Prevent remote devices from simultaneously establishing non-remote
Split Tunneling connections with organizational systems and communicating via some other
connection to resources in external networks (i.e., split tunneling).
SC.L2-3.13.8 Implement cryptographic mechanisms to prevent unauthorized disclosure of
Data in Transit CUI during transmission unless otherwise protected by alternative physical
safeguards.

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 15


CMMC Model

SC.L2-3.13.9 Terminate network connections associated with communications sessions at


Connections Termination the end of the sessions or after a defined period of inactivity.
SC.L2-3.13.10 Establish and manage cryptographic keys for cryptography employed in
Key Management organizational systems.
SC.L2-3.13.11 Employ FIPS-validated cryptography when used to protect the confidentiality
CUI Encryption of CUI.
SC.L2-3.13.12 Prohibit remote activation of collaborative computing devices and provide
Collaborative Device Control indication of devices in use to users present at the device.
SC.L2-3.13.13 Control and monitor the use of mobile code.
Mobile Code
SC.L2-3.13.14 Control and monitor the use of Voice over Internet Protocol (VoIP)
Voice over Internet Protocol technologies.
SC.L2-3.13.15 Protect the authenticity of communications sessions.
Communications Authenticity
SC.L2-3.13.16 Protect the confidentiality of CUI at rest.
Data at Rest

Level 3
SC.L3-3.13.4e Employ physical isolation techniques or logical isolation techniques or both
Isolation in organizational systems and system components.

SYSTEM AND INFORMATION INTEGRITY (SI)

Level 1
SI.L1-b.1.xii Identify, report, and correct information and information system flaws in a
Flaw Remediation [FCI Data] timely manner.
SI.L1-b.1.xiii Provide protection from malicious code at appropriate locations within
Malicious Code Protection [FCI Data] organizational information systems.
SI.L1-b.1.xiv Update malicious code protection mechanisms when new releases are
Update Malicious Code Protection available.
[FCI Data]
SI.L1-b.1.xv Perform periodic scans of the information system and real-time scans of files
System & File Scanning [FCI Data] from external sources as files are downloaded, opened, or executed.

Level 2
SI.L2-3.14.1 Identify, report, and correct system flaws in a timely manner.
Flaw Remediation [CUI Data]
SI.L2-3.14.2 Provide protection from malicious code at designated locations within
Malicious Code Protection [CUI organizational systems.
Data]

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 16


CMMC Model

SI.L2-3.14.3 Monitor system security alerts and advisories and take action in response.
Security Alerts & Advisories
SI.L2-3.14.4 Update malicious code protection mechanisms when new releases are
Update Malicious Code Protection available.
[CUI Data]
SI.L2-3.14.5 Perform periodic scans of organizational systems and real-time scans of files
System & File Scanning [CUI Data] from external sources as files are downloaded, opened, or executed.
SI.L2-3.14.6 Monitor organizational systems, including inbound and outbound
Monitor Communications for communications traffic, to detect attacks and indicators of potential attacks.
Attacks
SI.L2-3.14.7 Identify unauthorized use of organizational systems.
Identify Unauthorized Use

Level 3
SI.L3-3.14.1e Verify the integrity of security critical and essential software using root of
Integrity Verification trust mechanisms or cryptographic signatures.
SI.L3-3.14.3e Include specialized assets such as IoT, IIoT, OT, GFE, Restricted Information
Specialized Asset Security Systems and test equipment in the scope of the specified enhanced security
requirements or are segregated in purpose-specific networks.
SI.L3-3.14.6e Use threat indicator information and effective mitigations obtained from, at
Threat-Guided Intrusion Detection a minimum, open or commercial sources, and any DoD-provided sources, to
guide and inform intrusion detection and threat hunting.

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 17


CMMC Model Matrix

CMMC Model Matrix


This appendix presents the model in matrix form by domain. The three columns list the
associated security requirements for each CMMC level. Each level is independent and
consists of a set of CMMC security requirements:

• Level 1: the basic safeguarding requirements for FCI specified in FAR Clause 52.204-21.
• Level 2: the security requirements for CUI specified in NIST SP 800-171 Rev 2 per DFARS
Clause 252.204-7012
• Level 3: selected enhanced security requirements for CUI specified in NIST SP 800-172
with DoD-approved parameters where applicable.

Each requirement is contained in a single cell. The requirement identification number is


bolded at the top of each cell. The next line contains the requirement short name identifier,
in italics, which is meant to be used for quick reference only. Below the short name is the
complete CMMC security requirement statement. Some Level 3 requirement statements
contain a DoD-approved parameter, which is underlined. Finally, the bulleted list at the
bottom contains the FAR Clause 52.204-21, NIST SP 800-171 Rev 2, and NIST SP 800-172
reference as appropriate.

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 18


CMMC Model Matrix

ACCESS CONTROL (AC)

Level 1 Level 2 Level 3


AC.L1-b.1.i AC.L2-3.1.1 AC.L3-3.1.2e
Authorized Access Control [FCI Data] Authorized Access Control [CUI Data] Organizationally Controlled Assets
Limit information system access to Limit system access to authorized users, Restrict access to systems and system
authorized users, processes acting on behalf processes acting on behalf of authorized components to only those information
of authorized users, or devices (including users, and devices (including other systems). resources that are owned, provisioned, or
other information systems). • NIST SP 800-171 Rev 2 3.1.1 issued by the organization.
• FAR Clause 52.204-21 b.1.i • FAR Clause 52.204-21 b.1.i • NIST SP 800-172 3.1.2e
• NIST SP 800-171 Rev 2 3.1.1
AC.L1-b.1.ii AC.L2-3.1.2 AC.L3-3.1.3e
Transaction & Function Control [FCI Data] Transaction & Function Control [CUI Data] Secured Information Transfer
Limit information system access to the types Limit system access to the types of Employ secure information transfer solutions
of transactions and functions that authorized transactions and functions that authorized to control information flows between
users are permitted to execute. users are permitted to execute. security domains on connected systems.
• FAR Clause 52.204-21 b.1.ii • NIST SP 800-171 Rev 2 3.1.2 • NIST SP 800-172 3.1.3e
• NIST SP 800-171 Rev 2 3.1.2 • FAR Clause 52.204-21 b.1.ii
AC.L1-b.1.iii AC.L2-3.1.3
External Connections [FCI Data] Control CUI Flow
Verify and control/limit connections to and Control the flow of CUI in accordance with
use of external information systems. approved authorizations.
• FAR Clause 52.204-21 b.1.iii • NIST SP 800-171 Rev 2 3.1.3
• NIST SP 800-171 Rev 2 3.1.20
AC.L1-b.1.iv AC.L2-3.1.4
Control Public Information [FCI Data] Separation of Duties
Control information posted or processed on Separate the duties of individuals to reduce
publicly accessible information systems. the risk of malevolent activity without
• FAR Clause 52.204-21 b.1.iv collusion.
• NIST SP 800-171 Rev 2 3.1.22 • NIST SP 800-171 Rev 2 3.1.4
AC.L2-3.1.5
Least Privilege
Employ the principle of least privilege,
including for specific security functions and
privileged accounts.
• NIST SP 800-171 Rev 2 3.1.5
AC.L2-3.1.6
Non-Privileged Account Use
Use non-privileged accounts or roles when
accessing nonsecurity functions.
• NIST SP 800-171 Rev 2 3.1.6
AC.L2-3.1.7
Privileged Functions
Prevent non-privileged users from executing
privileged functions and capture the
execution of such functions in audit logs.
• NIST SP 800-171 Rev 2 3.1.7
AC.L2-3.1.8
Unsuccessful Logon Attempts
Limit unsuccessful logon attempts.
• NIST SP 800-171 Rev 2 3.1.8
AC.L2-3.1.9
Privacy & Security Notices
Provide privacy and security notices
consistent with applicable CUI rules.
• NIST SP 800-171 Rev 2 3.1.9

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 19


CMMC Model Matrix

Level 1 Level 2 Level 3


AC.L2-3.1.10
Session Lock
Use session lock with pattern-hiding displays
to prevent access and viewing of data after a
period of inactivity.
• NIST SP 800-171 Rev 2 3.1.10
AC.L2-3.1.11
Session Termination
Terminate (automatically) a user session
after a defined condition.
• NIST SP 800-171 Rev 2 3.1.11
AC.L2-3.1.12
Control Remote Access
Monitor and control remote access sessions.
• NIST SP 800-171 Rev 2 3.1.12
AC.L2-3.1.13
Remote Access Confidentiality
Employ cryptographic mechanisms to protect
the confidentiality of remote access sessions.
• NIST SP 800-171 Rev 2 3.1.13
AC.L2-3.1.14
Remote Access Routing
Route remote access via managed access
control points.
• NIST SP 800-171 Rev 2 3.1.14
AC.L2-3.1.15
Privileged Remote Access
Authorize remote execution of privileged
commands and remote access to security-
relevant information.
• NIST SP 800-171 Rev 2 3.1.15
AC.L2-3.1.16
Wireless Access Authorization
Authorize wireless access prior to allowing
such connections.
• NIST SP 800-171 Rev 2 3.1.16
AC.L2-3.1.17
Wireless Access Protection
Protect wireless access using authentication
and encryption.
• NIST SP 800-171 Rev 2 3.1.17
AC.L2-3.1.18
Mobile Device Connection
Control connection of mobile devices.
• NIST SP 800-171 Rev 2 3.1.18
AC.L2-3.1.19
Encrypt CUI on Mobile
Encrypt CUI on mobile devices and mobile
computing platforms.
• NIST SP 800-171 Rev 2 3.1.19
AC.L2-3.1.20
External Connections [CUI Data]
Verify and control/limit connections to and
use of external systems.
• NIST SP 800-171 Rev 2 3.1.20
• FAR Clause 52.204-21 b.1.iii

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 20


CMMC Model Matrix

Level 1 Level 2 Level 3


AC.L2-3.1.21
Portable Storage Use
Limit use of portable storage devices on
external systems.
• NIST SP 800-171 Rev 2 3.1.21
AC.L2-3.1.22
Control Public Information [CUI Data]
Control CUI posted or processed on publicly
accessible systems.
• NIST SP 800-171 Rev 2 3.1.22
• FAR Clause 52.204-21 b.1.iv

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 21


CMMC Model Matrix

AWARENESS AND TRAINING (AT)

Level 1 Level 2 Level 3


AT.L2-3.2.1 AT.L3-3.2.1e
Role-Based Risk Awareness Advanced Threat Awareness
Inform managers, systems administrators, Provide awareness training upon initial hire,
and users of organizational systems of the following a significant cyber event, and at
security risks associated with their activities least annually, focused on recognizing and
and of the applicable policies, standards, and responding to threats from social
procedures related to the security of those engineering, advanced persistent threat
systems. actors, breaches, and suspicious behaviors;
• NIST SP 800-171 Rev 2 3.2.1 update the training at least annually or when
there are significant changes to the threat.
• NIST SP 800-172 3.2.1e
AT.L2-3.2.2 AT.L3-3.2.2e
Role-Based Training Practical Training Exercises
Train personnel to carry out their assigned Include practical exercises in awareness
information security-related duties and training for all users, tailored by roles, to
responsibilities. include general users, users with specialized
• NIST SP 800-171 Rev 2 3.2.2 roles, and privileged users, that are aligned
with current threat scenarios and provide
feedback to individuals involved in the
training and their supervisors.
• NIST SP 800-172 3.2.2e
AT.L2-3.2.3
Insider Threat Awareness
Provide security awareness training on
recognizing and reporting potential indicators
of insider threat.
• NIST SP 800-171 Rev 2 3.2.3

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 22


CMMC Model Matrix

AUDIT AND ACCOUNTABILITY (AU)

Level 1 Level 2 Level 3


AU.L2-3.3.1
System Auditing
Create and retain system audit logs and
records to the extent needed to enable the
monitoring, analysis, investigation, and
reporting of unlawful or unauthorized system
activity.
• NIST SP 800-171 Rev 2 3.3.1
AU.L2-3.3.2
User Accountability
Uniquely track the actions of individual
system users, so they can be held
accountable for their actions.
• NIST SP 800-171 Rev 2 3.3.2
AU.L2-3.3.3
Event Review
Review and update logged events.
• NIST SP 800-171 Rev 2 3.3.3
AU.L2-3.3.4
Audit Failure Alerting
Alert in the event of an audit logging process
failure.
• NIST SP 800-171 Rev 2 3.3.4
AU.L2-3.3.5
Audit Correlation
Correlate audit record review, analysis, and
reporting processes for investigation and
response to indications of unlawful,
unauthorized, suspicious, or unusual activity.
• NIST SP 800-171 Rev 2 3.3.5
AU.L2-3.3.6
Reduction & Reporting
Provide audit record reduction and report
generation to support on-demand analysis
and reporting.
• NIST SP 800-171 Rev 2 3.3.6
AU.L2-3.3.7
Authoritative Time Source
Provide a system capability that compares
and synchronizes internal system clocks with
an authoritative source to generate time
stamps for audit records.
• NIST SP 800-171 Rev 2 3.3.7
AU.L2-3.3.8
Audit Protection
Protect audit information and audit logging
tools from unauthorized access, modification,
and deletion.
• NIST SP 800-171 Rev 2 3.3.8
AU.L2-3.3.9
Audit Management
Limit management of audit logging
functionality to a subset of privileged users.
• NIST SP 800-171 Rev 2 3.3.9

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 23


CMMC Model Matrix

CONFIGURATION MANAGEMENT (CM)

Level 1 Level 2 Level 3


CM.L2-3.4.1 CM.L3-3.4.1e
System Baselining Authoritative Repository
Establish and maintain baseline Establish and maintain an authoritative
configurations and inventories of source and repository to provide a trusted
organizational systems (including hardware, source and accountability for approved and
software, firmware, and documentation) implemented system components.
throughout the respective system • NIST SP 800-172 3.4.1e
development life cycles.
• NIST SP 800-171 Rev 2 3.4.1
CM.L2-3.4.2 CM.L3-3.4.2e
Security Configuration Enforcement Automated Detection & Remediation
Establish and enforce security configuration Employ automated mechanisms to detect
settings for information technology products misconfigured or unauthorized system
employed in organizational systems. components; after detection, remove the
• NIST SP 800-171 Rev 2 3.4.2 components or place the components in a
quarantine or remediation network to
facilitate patching, re-configuration, or other
mitigations.
• NIST SP 800-172 3.4.2e
CM.L2-3.4.3 CM.L3-3.4.3e
System Change Management Automated Inventory
Track, review, approve or disapprove, and log Employ automated discovery and
changes to organizational systems. management tools to maintain an up-to-
• NIST SP 800-171 Rev 2 3.4.3 date, complete, accurate, and readily
available inventory of system components.
• NIST SP 800-172 3.4.3e
CM.L2-3.4.4
Security Impact Analysis
Analyze the security impact of changes prior
to implementation.
• NIST SP 800-171 Rev 2 3.4.4
CM.L2-3.4.5
Access Restrictions for Change
Define, document, approve, and enforce
physical and logical access restrictions
associated with changes to organizational
systems.
• NIST SP 800-171 Rev 2 3.4.5
CM.L2-3.4.6
Least Functionality
Employ the principle of least functionality by
configuring organizational systems to provide
only essential capabilities.
• NIST SP 800-171 Rev 2 3.4.6
CM.L2-3.4.7
Nonessential Functionality
Restrict, disable, or prevent the use of
nonessential programs, functions, ports,
protocols, and services.
• NIST SP 800-171 Rev 2 3.4.7

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 24


CMMC Model Matrix

Level 1 Level 2 Level 3


CM.L2-3.4.8
Application Execution Policy
Apply deny-by-exception (blacklisting) policy
to prevent the use of unauthorized software
or deny-all, permit-by-exception
(whitelisting) policy to allow the execution of
authorized software.
• NIST SP 800-171 Rev 2 3.4.8
CM.L2-3.4.9
User-Installed Software
Control and monitor user-installed software.
• NIST SP 800-171 Rev 2 3.4.9

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 25


CMMC Model Matrix

IDENTIFICATION AND AUTHENTICATION (IA)

Level 1 Level 2 Level 3


IA.L1-b.1.v IA.L2-3.5.1 IA.L3-3.5.1e
Identification [FCI Data] Identification [CUI Data] Bidirectional Authentication
Identify information system users, processes Identify system users, processes acting on Identify and authenticate systems and
acting on behalf of users, or devices. behalf of users, and devices. system components, where possible, before
• FAR Clause 52.204-21 b.1.v • NIST SP 800-171 Rev 2 3.5.1 establishing a network connection using
• NIST SP 800-171 Rev 2 3.5.1 • FAR Clause 52.204-21 b.1.v bidirectional authentication that is
cryptographically based and replay resistant.
• NIST SP 800-172 3.5.1e
IA.L1-b.1.vi IA.L2-3.5.2 IA.L3-3.5.3e
Authentication [FCI Data] Authentication [CUI Data] Block Untrusted Assets
Authenticate (or verify) the identities of Authenticate (or verify) the identities of Employ automated or manual/procedural
those users, processes, or devices, as a users, processes, or devices, as a prerequisite mechanisms to prohibit system components
prerequisite to allowing access to to allowing access to organizational systems. from connecting to organizational systems
organizational information systems. • NIST SP 800-171 Rev 2 3.5.2 unless the components are known,
• FAR Clause 52.204-21 b.1.vi • FAR Clause 52.204-21 b.1.vi authenticated, in a properly configured state,
• NIST SP 800-171 Rev 2 3.5.2 or in a trust profile.
• NIST SP 800-172 3.5.3e
IA.L2-3.5.3
Multifactor Authentication
Use multifactor authentication for local and
network access to privileged accounts and for
network access to non-privileged accounts.
• NIST SP 800-171 Rev 2 3.5.3
IA.L2-3.5.4
Replay-Resistant Authentication
Employ replay-resistant authentication
mechanisms for network access to privileged
and non-privileged accounts.
• NIST SP 800-171 Rev 2 3.5.4
IA.L2-3.5.5
Identifier Reuse
Prevent reuse of identifiers for a defined
period.
• NIST SP 800-171 Rev 2 3.5.5
IA.L2-3.5.6
Identifier Handling
Disable identifiers after a defined period of
inactivity.
• NIST SP 800-171 Rev 2 3.5.6
IA.L2-3.5.7
Password Complexity
Enforce a minimum password complexity and
change of characters when new passwords
are created.
• NIST SP 800-171 Rev 2 3.5.7
IA.L2-3.5.8
Password Reuse
Prohibit password reuse for a specified
number of generations.
• NIST SP 800-171 Rev 2 3.5.8
IA.L2-3.5.9
Temporary Passwords
Allow temporary password use for system
logons with an immediate change to a
permanent password.
• NIST SP 800-171 Rev 2 3.5.9

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 26


CMMC Model Matrix

Level 1 Level 2 Level 3


IA.L2-3.5.10
Cryptographically-Protected Passwords
Store and transmit only cryptographically-
protected passwords.
• NIST SP 800-171 Rev 2 3.5.10
IA.L2-3.5.11
Obscure Feedback
Obscure feedback of authentication
information.
• NIST SP 800-171 Rev 2 3.5.11

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 27


CMMC Model Matrix

INCIDENT RESPONSE (IR)

Level 1 Level 2 Level 3


IR.L2-3.6.1 IR.L3-3.6.1e
Incident Handling Security Operations Center
Establish an operational incident-handling Establish and maintain a security operations
capability for organizational systems that center capability that operates 24/7, with
includes preparation, detection, analysis, allowance for remote/on-call staff.
containment, recovery, and user response • NIST SP 800-172 3.6.1e
activities.
• NIST SP 800-171 Rev 2 3.6.1
IR.L2-3.6.2 IR.L3-3.6.2e
Incident Reporting Cyber Incident Response Team
Track, document, and report incidents to Establish and maintain a cyber incident
designated officials and/or authorities both response team that can be deployed by the
internal and external to the organization. organization within 24 hours.
• NIST SP 800-171 Rev 2 3.6.2 • NIST SP 800-172 3.6.2e
IR.L2-3.6.3
Incident Response Testing
Test the organizational incident response
capability.
• NIST SP 800-171 Rev 2 3.6.3

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 28


CMMC Model Matrix

MAINTENANCE (MA)

Level 1 Level 2 Level 3


MA.L2-3.7.1
Perform Maintenance
Perform maintenance on organizational
systems.
• NIST SP 800-171 Rev 2 3.7.1
MA.L2-3.7.2
System Maintenance Control
Provide controls on the tools, techniques,
mechanisms, and personnel used to conduct
system maintenance.
• NIST SP 800-171 Rev 2 3.7.2
MA.L2-3.7.3
Equipment Sanitization
Sanitize equipment removed for off-site
maintenance of any CUI.
• NIST SP 800-171 Rev 2 3.7.3
MA.L2-3.7.4
Media Inspection
Check media containing diagnostic and test
programs for malicious code before the
media are used in organizational systems.
• NIST SP 800-171 Rev 2 3.7.4
MA.L2-3.7.5
Nonlocal Maintenance
Require multifactor authentication to
establish nonlocal maintenance sessions via
external network connections and terminate
such connections when nonlocal
maintenance is complete.
• NIST SP 800-171 Rev 2 3.7.5
MA.L2-3.7.6
Maintenance Personnel
Supervise the maintenance activities of
maintenance personnel without required
access authorization.
• NIST SP 800-171 Rev 2 3.7.6

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 29


CMMC Model Matrix

MEDIA PROECTION (MP)

Level 1 Level 2 Level 3


MP.L1-b.1.vii MP.L2-3.8.1
Media Disposal [FCI Data] Media Protection
Sanitize or destroy information system media Protect (i.e., physically control and securely
containing Federal Contract Information store) system media containing CUI, both
before disposal or release for reuse. paper and digital.
• FAR Clause 52.204-21 b.1.vii • NIST SP 800-171 Rev 2 3.8.1
• NIST SP 800-171 Rev 2 3.8.3
MP.L2-3.8.2
Media Access
Limit access to CUI on system media to
authorized users.
• NIST SP 800-171 Rev 2 3.8.2
MP.L2-3.8.3
Media Disposal [CUI Data]
Sanitize or destroy system media containing
CUI before disposal or release for reuse.
• NIST SP 800-171 Rev 2 3.8.3
• FAR Clause 52.204-21 b.1.vii
MP.L2-3.8.4
Media Markings
Mark media with necessary CUI markings and
distribution limitations.
• NIST SP 800-171 Rev 2 3.8.4
MP.L2-3.8.5
Media Accountability
Control access to media containing CUI and
maintain accountability for media during
transport outside of controlled areas.
• NIST SP 800-171 Rev 2 3.8.5

MP.L2-3.8.6
Portable Storage Encryption
Implement cryptographic mechanisms to
protect the confidentiality of CUI stored on
digital media during transport unless
otherwise protected by alternative physical
safeguards.
• NIST SP 800-171 Rev 2 3.8.6
MP.L2-3.8.7
Removable Media
Control the use of removable media on
system components.
• NIST SP 800-171 Rev 2 3.8.7
MP.L2-3.8.8
Shared Media
Prohibit the use of portable storage devices
when such devices have no identifiable
owner.
• NIST SP 800-171 Rev 2 3.8.8
MP.L2-3.8.9
Protect Backups
Protect the confidentiality of backup CUI at
storage locations.
• NIST SP 800-171 Rev 2 3.8.9

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 30


CMMC Model Matrix

PERSONNEL SECURITY (PS)

Level 1 Level 2 Level 3


PS.L2-3.9.1 PS.L3-3.9.2e
Screen Individuals Adverse Information
Screen individuals prior to authorizing access Protect organizational systems when adverse
to organizational systems containing CUI. information develops or is obtained about
• NIST SP 800-171 Rev 2 3.9.1 individuals with access to CUI.
• NIST SP 800-172 3.9.2e
PS.L2-3.9.2
Personnel Actions
Protect organizational systems containing
CUI during and after personnel actions such
as terminations and transfers.
• NIST SP 800-171 Rev 2 3.9.2

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 31


CMMC Model Matrix

PHYSICAL PROTECTION (PE)

Level 1 Level 2 Level 3


PE.L1-b.1.viii PE.L2-3.10.1
Limit Physical Access [FCI Data] Limit Physical Access [CUI Data]
Limit physical access to organizational Limit physical access to organizational
information systems, equipment, and the systems, equipment, and the respective
respective operating environments to operating environments to authorized
authorized individuals. individuals.
• FAR Clause 52.204-21 b.1.viii • NIST SP 800-171 Rev 2 3.10.1
• NIST SP 800-171 Rev 2 3.10.1 • FAR Clause 52.204-21 b.1.viii
PE.L1-b.1.ix PE.L2-3.10.2
Manage Visitors & Physical Access [FCI Data] Monitor Facility
Escort visitors and monitor visitor activity; Protect and monitor the physical facility and
maintain audit logs of physical access; and support infrastructure for organizational
control and manage physical access devices. systems.
• FAR Clause 52.204-21 Partial b.1.ix • NIST SP 800-171 Rev 2 3.10.2
• NIST SP 800-171 Rev 2 3.10.3
• NIST SP 800-171 Rev 2 3.10.4
• NIST SP 800-171 Rev 2 3.10.5
PE.L2-3.10.3
Escort Visitors [CUI Data]
Escort visitors and monitor visitor activity.
• NIST SP 800-171 Rev 2 3.10.3
• FAR Clause 52.204-21 Partial b.1.ix
PE.L2-3.10.4
Physical Access Logs [CUI Data]
Maintain audit logs of physical access.
• NIST SP 800-171 Rev 2 3.10.4
• FAR Clause 52.204-21 Partial b.1.ix
PE.L2-3.10.5
Manage Physical Access [CUI Data]
Control and manage physical access devices.
• NIST SP 800-171 Rev 2 3.10.5
• FAR Clause 52.204-21 Partial b.1.ix
PE.L2-3.10.6
Alternative Work Sites
Enforce safeguarding measures for CUI at
alternate work sites.
• NIST SP 800-171 Rev 2 3.10.6

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 32


CMMC Model Matrix

RISK ASSESSMENT (RA)

Level 1 Level 2 Level 3


RA.L2-3.11.1 RA.L3-3.11.1e
Risk Assessments Threat-Informed Risk Assessment
Periodically assess the risk to organizational Employ threat intelligence, at a minimum
operations (including mission, functions, from open or commercial sources, and any
image, or reputation), organizational assets, DoD-provided sources, as part of a risk
and individuals, resulting from the operation assessment to guide and inform the
of organizational systems and the associated development of organizational systems,
processing, storage, or transmission of CUI. security architectures, selection of security
• NIST SP 800-171 Rev 2 3.11.1 solutions, monitoring, threat hunting, and
response and recovery activities.
• NIST SP 800-172 3.11.1e
RA.L2-3.11.2 RA.L3-3.11.2e
Vulnerability Scan Threat Hunting
Scan for vulnerabilities in organizational Conduct cyber threat hunting activities on an
systems and applications periodically and on-going aperiodic basis or when indications
when new vulnerabilities affecting those warrant, to search for indicators of
systems and applications are identified. compromise in organizational systems and
• NIST SP 800-171 Rev 2 3.11.2 detect, track, and disrupt threats that evade
existing controls.
• NIST SP 800-172 3.11.2e
RA.L2-3.11.3 RA.L3-3.11.3e
Vulnerability Remediation Advanced Risk Identification
Remediate vulnerabilities in accordance with Employ advanced automation and analytics
risk assessments. capabilities in support of analysts to predict
• NIST SP 800-171 Rev 2 3.11.3 and identify risks to organizations, systems,
and system components.
• NIST SP 800-172 3.11.3e
RA.L3-3.11.4e
Security Solution Rationale
Document or reference in the system
security plan the security solution selected,
the rationale for the security solution, and
the risk determination.
• NIST SP 800-172 3.11.4e
RA.L3-3.11.5e
Security Solution Effectiveness
Assess the effectiveness of security solutions
at least annually or upon receipt of relevant
cyber threat information, or in response to a
relevant cyber incident, to address
anticipated risk to organizational systems and
the organization based on current and
accumulated threat intelligence.
• NIST SP 800-172 3.11.5e
RA.L3-3.11.6e
Supply Chain Risk Response
Assess, respond to, and monitor supply chain
risks associated with organizational systems
and system components.
• NIST SP 800-172 3.11.6e

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 33


CMMC Model Matrix

Level 1 Level 2 Level 3


RA.L3-3.11.7e
Supply Chain Risk Plan
Develop a plan for managing supply chain
risks associated with organizational systems
and system components; update the plan at
least annually, and upon receipt of relevant
cyber threat information, or in response to a
relevant cyber incident.
• NIST SP 800-172 3.11.7e

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 34


CMMC Model Matrix

SECURITY ASSESSMENT (CA)

Level 1 Level 2 Level 3


CA.L2-3.12.1 CA.L3-3.12.1e
Security Control Assessment Penetration Testing
Periodically assess the security controls in Conduct penetration testing at least annually
organizational systems to determine if the or when significant security changes are
controls are effective in their application. made to the system, leveraging automated
• NIST SP 800-171 Rev 2 3.12.1 scanning tools and ad hoc tests using subject
matter experts.
• NIST SP 800-172 3.12.1e
CA.L2-3.12.2
Operational Plan of Action
Develop and implement plans of action
designed to correct deficiencies and reduce
or eliminate vulnerabilities in organizational
systems.
• NIST SP 800-171 Rev 2 3.12.2
CA.L2-3.12.3
Security Control Monitoring
Monitor security controls on an ongoing basis
to determine the continued effectiveness of
the controls.
• NIST SP 800-171 Rev 2 3.12.3
CA.L2-3.12.4
System Security Plan
Develop, document, and periodically update
system security plans that describe system
boundaries, system environments of
operation, how security requirements are
implemented, and the relationships with or
connections to other systems.
• NIST SP 800-171 Rev 2 3.12.4

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 35


CMMC Model Matrix

SYSTEM AND COMMUNICATIONS PROTECTION (SC)

Level 1 Level 2 Level 3


SC.L1-b.1.x SC.L2-3.13.1 SC.L3-3.13.4e
Boundary Protection [FCI Data] Boundary Protection [CUI Data] Isolation
Monitor, control, and protect organizational Monitor, control, and protect organizational Employ physical isolation techniques or
communications (i.e., information communications (i.e., information logical isolation techniques or both in
transmitted or received by organizational transmitted or received by organizational organizational systems and system
information systems) at the external information systems) at the external components.
boundaries and key internal boundaries of boundaries and key internal boundaries of • NIST SP 800-172 3.13.4e
the information systems. the information systems.
• FAR Clause 52.204-21 b.1.x • NIST SP 800-171 Rev 2 3.13.1
• NIST SP 800-171 Rev 2 3.13.1 • FAR Clause 52.204-21 b.1.x
SC.L1-b.1.xi SC.L2-3.13.2
Public-Access System Separation [FCI Data] Security Engineering
Implement subnetworks for publicly Employ architectural designs, software
accessible system components that are development techniques, and systems
physically or logically separated from internal engineering principles that promote effective
networks. information security within organizational
• FAR Clause 52.204-21 b.1.xi systems.
• NIST SP 800-171 Rev 2 3.13.5 • NIST SP 800-171 Rev 2 3.13.2
SC.L2-3.13.3
Role Separation
Separate user functionality from system
management functionality.
• NIST SP 800-171 Rev 2 3.13.3
SC.L2-3.13.4
Shared Resource Control
Prevent unauthorized and unintended
information transfer via shared system
resources.
• NIST SP 800-171 Rev 2 3.13.4
SC.L2-3.13.5
Public-Access System Separation [CUI Data]
Implement subnetworks for publicly
accessible system components that are
physically or logically separated from internal
networks.
• NIST SP 800-171 Rev 2 3.13.5
• FAR Clause 52.204-21 b.1.xi
SC.L2-3.13.6
Network Communication by Exception
Deny network communications traffic by
default and allow network communications
traffic by exception (i.e., deny all, permit by
exception).
• NIST SP 800-171 Rev 2 3.13.6
SC.L2-3.13.7
Split Tunneling
Prevent remote devices from simultaneously
establishing non-remote connections with
organizational systems and communicating
via some other connection to resources in
external networks (i.e., split tunneling).
• NIST SP 800-171 Rev 2 3.13.7

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 36


CMMC Model Matrix

Level 1 Level 2 Level 3


SC.L2-3.13.8
Data in Transit
Implement cryptographic mechanisms to
prevent unauthorized disclosure of CUI
during transmission unless otherwise
protected by alternative physical safeguards.
• NIST SP 800-171 Rev 2 3.13.8
SC.L2-3.13.9
Connections Termination
Terminate network connections associated
with communications sessions at the end of
the sessions or after a defined period of
inactivity.
• NIST SP 800-171 Rev 2 3.13.9
SC.L2-3.13.10
Key Management
Establish and manage cryptographic keys for
cryptography employed in organizational
systems.
• NIST SP 800-171 Rev 2 3.13.10
SC.L2-3.13.11
CUI Encryption
Employ FIPS-validated cryptography when
used to protect the confidentiality of CUI.
• NIST SP 800-171 Rev 2 3.13.11
SC.L2-3.13.12
Collaborative Device Control
Prohibit remote activation of collaborative
computing devices and provide indication of
devices in use to users present at the device.
• NIST SP 800-171 Rev 2 3.13.12
SC.L2-3.13.13
Mobile Code
Control and monitor the use of mobile code.
• NIST SP 800-171 Rev 2 3.13.13
SC.L2-3.13.14
Voice over Internet Protocol
Control and monitor the use of Voice over
Internet Protocol (VoIP) technologies.
• NIST SP 800-171 Rev 2 3.13.14
SC.L2-3.13.15
Communications Authenticity
Protect the authenticity of communications
sessions.
• NIST SP 800-171 Rev 2 3.13.15
SC.L2-3.13.16
Data at Rest
Protect the confidentiality of CUI at rest.
• NIST SP 800-171 Rev 2 3.13.16

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 37


CMMC Model Matrix

SYSTEM AND INFORMATION INTEGRITY (SI)

Level 1 Level 2 Level 3


SI.L1-b.1.xii SI.L2-3.14.1 SI.L3-3.14.1e
Flaw Remediation [FCI Data] Flaw Remediation [CUI Data] Integrity Verification
Identify, report, and correct information and Identify, report, and correct system flaws in a Verify the integrity of security critical and
information system flaws in a timely manner. timely manner. essential software using root of trust
• FAR Clause 52.204-21 b.1.xii • NIST SP 800-171 Rev 2 3.14.1 mechanisms or cryptographic signatures.
• NIST SP 800-171 Rev 2 3.14.1 • FAR Clause 52.204-21 b.1.xii • NIST SP 800-172 3.14.1e

SI.L1-b.1.xiii SI.L2-3.14.2 SI.L3-3.14.3e


Malicious Code Protection [FCI Data] Malicious Code Protection [CUI Data] Specialized Asset Security
Provide protection from malicious code at Provide protection from malicious code at Include specialized assets such as IoT, IIoT,
appropriate locations within organizational designated locations within organizational OT, GFE, Restricted Information Systems and
information systems. systems. test equipment in the scope of the specified
• FAR Clause 52.204-21 b.1.xiii • NIST SP 800-171 Rev 2 3.14.2 enhanced security requirements or are
• NIST SP 800-171 Rev 2 3.14.2 • FAR Clause 52.204-21 b.1.xiii segregated in purpose-specific networks.
• NIST SP 800-172 3.14.3e
SI.L1-b.1.xiv SI.L2-3.14.3 SI.L3-3.14.6e
Update Malicious Code Protection [FCI Data] Security Alerts & Advisories Threat-Guided Intrusion Detection
Update malicious code protection Monitor system security alerts and advisories Use threat indicator information and
mechanisms when new releases are and take action in response. effective mitigations obtained from, at a
available. • NIST SP 800-171 Rev 2 3.14.3 minimum, open or commercial sources, and
• FAR Clause 52.204-21 b.1.xiv any DoD-provided sources, to guide and
• NIST SP 800-171 Rev 2 3.14.4 inform intrusion detection and threat
hunting.
• NIST SP 800-172 3.14.6e
SI.L1-b.1.xv SI.L2-3.14.4
System & File Scanning [FCI Data] Update Malicious Code Protection [CUI Data]
Perform periodic scans of the information Update malicious code protection
system and real-time scans of files from mechanisms when new releases are
external sources as files are downloaded, available.
opened, or executed. • NIST SP 800-171 Rev 2 3.14.4
• FAR Clause 52.204-21 b.1.xv • FAR Clause 52.204-21 b.1.xiv
• NIST SP 800-171 Rev 2 3.14.5
SI.L2-3.14.5
System & File Scanning [CUI Data]
Perform periodic scans of organizational
systems and real-time scans of files from
external sources as files are downloaded,
opened, or executed.
• NIST SP 800-171 Rev 2 3.14.5
• FAR Clause 52.204-21 b.1.xv
SI.L2-3.14.6
Monitor Communications for Attacks
Monitor organizational systems, including
inbound and outbound communications
traffic, to detect attacks and indicators of
potential attacks.
• NIST SP 800-171 Rev 2 3.14.6
SI.L2-3.14.7
Identify Unauthorized Use
Identify unauthorized use of organizational
systems.
• NIST SP 800-171 Rev 2 3.14.7

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 38


Abbreviations and Acronyms

Abbreviations and Acronyms


The following is a list of acronyms used in the CMMC model.
AC Access Control
APT Advanced Persistent Threat
AT Awareness and Training
AU Audit and Accountability
CA Security Assessment
CFR Code of Federal Regulations
CM Configuration Management
CMMC Cybersecurity Maturity Model Certification
CUI Controlled Unclassified Information
DFARS Defense Federal Acquisition Regulation Supplement
DIB Defense Industrial Base
DoD Department of Defense
FAR Federal Acquisition Regulation
FCI Federal Contract Information
FFRDC Federally Funded Research and Development Center
FIPS Federal Information Processing Standard
IA Identification and Authentication
IR Incident Response
L# Level Number
MA Maintenance
MP Media Protection
N/A Not Applicable (NA)
NIST National Institute of Standards and Technology
OUSD A&S Office of the Under Secretary of Defense for Acquisition and
Sustainment
PE Physical Protection
PS Personnel Security
PUB Publication
Rev Revision
RA Risk Assessment
SC System and Communications Protection
SI System and Information Integrity
SP Special Publication
UARC University Affiliated Research Center

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 39


Abbreviations and Acronyms

U.S. United States


VoIP Voice over Internet Protocol
Vol. Volume

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 40


References

References
1. U.S. Executive Office of the President, Council of Economic Advisers (CEA), The Cost of
Malicious Cyber Activity to the U.S. Economy, available online at
https://www.whitehouse.gov/wp-content/uploads/2018/02/The-Cost-of-Malicious-
Cyber-Activity-to-the-U.S.-Economy.pdf, February 2018

2. Center for Strategic and International Studies (CSIS) and McAfee, Economic Impact of
Cybercrime - No Slowing Down, February 2018

3. 48 Code of Federal Regulations (CFR) 52.204-21, Basic Safeguarding of Covered


Contractor Information Systems, Federal Acquisition Regulation (FAR), 1 Oct 2016

4. NIST Special Publication (SP) 800-171 Revision (Rev) 2, Protecting Controlled


Unclassified Information in Nonfederal Systems and Organizations, U.S. Department of
Commerce National Institute of Standards and Technology (NIST), December 2016
(updated June 2018)

5. NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified


Information: A Supplement to NIST Special Publication 800-171, U.S. Department of
Commerce National Institute of Standards and Technology (NIST), February 2021

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 41


References

This page intentionally left blank.

Cybersecurity Maturity Model Certification (CMMC) Model Overview  Version 2.13 42

You might also like