Discover the requirements for different CMMC levels and how they’re calculated in your SPRS score.
LEVEL1
ID
AC.L1-b.1.i
DOMAIN
AC
NAME OF SECURITY REQUIREMENT
Authorized Access Control [FCI Data]
SECURITY REQUIREMENT
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
LEVEL1
ID
AC.L1-b.1.ii
DOMAIN
AC
NAME OF SECURITY REQUIREMENT
Transaction & Function Control [FCI Data]
SECURITY REQUIREMENT
Limit system access to the types of transactions and functions that authorized users are permitted to execute.
LEVEL1
ID
AC.L1-b.1.iii
DOMAIN
AC
NAME OF SECURITY REQUIREMENT
External Connections [FCI Data]
SECURITY REQUIREMENT
Verify and control/limit connections to and use of external information systems.
LEVEL1
ID
AC.L1-b.1.iv
DOMAIN
AC
NAME OF SECURITY REQUIREMENT
Control Public Information [FCI Data]
SECURITY REQUIREMENT
Control information posted or processed on publicly accessible information systems.
LEVEL1
ID
IA.L1-b.1.v
DOMAIN
IA
NAME OF SECURITY REQUIREMENT
Identification [FCI Data]
SECURITY REQUIREMENT
Identify information system users, processes acting on behalf of users, or devices.
LEVEL1
ID
IA.L1-b.1.vi
DOMAIN
IA
NAME OF SECURITY REQUIREMENT
Authentication [FCI Data]
SECURITY REQUIREMENT
Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.
LEVEL1
ID
MP.L1-b.1.vii
DOMAIN
MP
NAME OF SECURITY REQUIREMENT
Media Disposal [FCI Data]
SECURITY REQUIREMENT
Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse.
LEVEL1
ID
PE.L1-b.1.ix
DOMAIN
PE
NAME OF SECURITY REQUIREMENT
Manage Visitors & Physical Access [FCI Data]
SECURITY REQUIREMENT
Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.
LEVEL1
ID
PE.L1-b.1.viii
DOMAIN
PE
NAME OF SECURITY REQUIREMENT
Limit Physical Access [FCI Data]
SECURITY REQUIREMENT
Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices.
LEVEL1
ID
SC.L1-b.1.x
DOMAIN
SC
NAME OF SECURITY REQUIREMENT
Boundary Protection [FCI Data]
SECURITY REQUIREMENT
Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.
LEVEL1
ID
SC.L1-b.1.xi
DOMAIN
SC
NAME OF SECURITY REQUIREMENT
Public-Access System Separation [FCI Data]
SECURITY REQUIREMENT
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
LEVEL1
ID
SI.L1-b.1.xii
DOMAIN
SI
NAME OF SECURITY REQUIREMENT
Flaw Remediation [FCI Data]
SECURITY REQUIREMENT
Identify, report, and correct information and information system flaws in a timely manner.
LEVEL1
ID
SI.L1-b.1.xiii
DOMAIN
SI
NAME OF SECURITY REQUIREMENT
Malicious Code Protection [FCI Data]
SECURITY REQUIREMENT
Provide protection from malicious code at appropriate locations within organizational information systems.
LEVEL1
ID
SI.L1-b.1.xiv
DOMAIN
SI
NAME OF SECURITY REQUIREMENT
Update Malicious Code Protection [FCI Data]
SECURITY REQUIREMENT
Update malicious code protection mechanisms when new releases are available.
LEVEL1
ID
SI.L1-b.1.xv
DOMAIN
SI
NAME OF SECURITY REQUIREMENT
System & File Scanning [FCI Data]
SECURITY REQUIREMENT
Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.