2.0

CMMC 2.0 SC.3.187 Establish and manage cryptographic keys for cryptography employed in organizational systems.
Level 2 Description: Cryptographic key management and establishment can be performed using manual procedures or mechanisms supported by manual procedures....
Wed, 26 Jul, 2023 at 8:56 AM
CMMC 2.0 SC.3.177 Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.
Level 2 Description: Cryptography can be employed to support many security solutions including the protection of controlled unclassified information, the ...
Wed, 26 Jul, 2023 at 9:06 AM
CMMC 2.0 SC.2.178 Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.
Level 2 Description: Collaborative computing devices include networked white boards, cameras, and microphones. Indication of use includes signals to user...
Wed, 26 Jul, 2023 at 9:17 AM
CMMC 2.0 SC.3.188 Control and monitor the use of mobile code.
Level 2 Description: Mobile code technologies include Java, JavaScript, ActiveX, Postscript, PDF, Flash animations, and VBScript. Decisions regarding the ...
Wed, 26 Jul, 2023 at 9:25 AM
CMMC 2.0 SC.3.189 Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.
Level 2 Description: VoIP has different requirements, features, functionality, availability, and service limitations when compared with the Plain Old Tele...
Wed, 26 Jul, 2023 at 9:38 AM
CMMC 2.0 Protect the authenticity of communications sessions.
Level 2 Description: Authenticity protection includes protecting against man-in-the-middle attacks, session hijacking, and the insertion of false informat...
Thu, 27 Jul, 2023 at 4:50 AM