How to use this checklist
For each practice, score your implementation using the DoD Assessment Methodology scoring:
- Fully Implemented. Control is in place and operating
- Partially Implemented. Some aspects in place, others missing
- Not Implemented. Control not yet in place
- Not Applicable. Genuinely does not apply (document the reason)
Your CMMC Level 2 score must be 110 out of 110 at the time of the C3PAO assessment. Limited Plan of Action and Milestones (POA&M) items are allowed post-assessment for specific lower- risk practices; most practices cannot be deferred via POA&M.
Access Control (AC). 22 practices
- 3.1.1. Limit system access to authorized users, processes, devices
- 3.1.2. Limit transactions and functions to authorized uses
- 3.1.3. Control CUI flow per approved authorizations
- 3.1.4. Separate duties to reduce collusion risk
- 3.1.5. Principle of least privilege
- 3.1.6. Use non-privileged accounts for non-security functions
- 3.1.7. Prevent non-privileged users from executing privileged functions
- 3.1.8. Limit unsuccessful logon attempts
- 3.1.9. System use notification
- 3.1.10. Session lock with pattern-hiding display after inactivity
- 3.1.11. Terminate sessions after defined conditions
- 3.1.12. Remote access sessions monitored and controlled
- 3.1.13. Cryptographic protection of remote access sessions
- 3.1.14. Route remote access through managed access control points
- 3.1.15. Authorize remote execution of privileged commands
- 3.1.16. Authorize wireless access connections
- 3.1.17. Protect wireless access with authentication and encryption
- 3.1.18. Control connection of mobile devices
- 3.1.19. Encrypt CUI on mobile devices and mobile computing platforms
- 3.1.20. Verify and control connections to external systems
- 3.1.21. Limit portable storage device use on external systems
- 3.1.22. Control CUI posted on publicly accessible systems
Awareness and Training (AT). 3 practices
- 3.2.1. Ensure users aware of security risks
- 3.2.2. Ensure personnel trained for their roles
- 3.2.3. Provide insider threat awareness training
Audit and Accountability (AU). 9 practices
- 3.3.1. Create and retain system audit logs
- 3.3.2. Trace actions to individual users
- 3.3.3. Review and update logged events
- 3.3.4. Alert on audit logging process failures
- 3.3.5. Correlate audit record review, analysis, and reporting
- 3.3.6. Provide audit record reduction and report generation
- 3.3.7. Provide system capability to synchronize internal system clocks
- 3.3.8. Protect audit information and tools from unauthorized access
- 3.3.9. Limit management of audit logging to privileged users
Configuration Management (CM). 9 practices
- 3.4.1. Establish and maintain baseline configurations
- 3.4.2. Establish and enforce security configuration settings
- 3.4.3. Track, review, approve, and log changes to systems
- 3.4.4. Analyze security impact of changes before implementation
- 3.4.5. Define, document, approve, and enforce physical and logical access restrictions
- 3.4.6. Employ principle of least functionality
- 3.4.7. Restrict nonessential programs, functions, ports, protocols
- 3.4.8. Apply deny-by-exception policy for unauthorized software
- 3.4.9. Control and monitor user-installed software
Identification and Authentication (IA). 11 practices
- 3.5.1. Identify users, processes, and devices
- 3.5.2. Authenticate identities as prerequisite to system access
- 3.5.3. Use MFA for local and network access to privileged accounts and network access to non-privileged accounts
- 3.5.4. Replay-resistant authentication mechanisms for privileged and non-privileged network access
- 3.5.5. Prevent reuse of identifiers for a defined period
- 3.5.6. Disable identifiers after a defined period of inactivity
- 3.5.7. Enforce password complexity (minimum strength when passwords are used)
- 3.5.8. Prohibit password reuse for a specified number of generations
- 3.5.9. Permit temporary password with immediate change
- 3.5.10. Store and transmit only cryptographically protected passwords
- 3.5.11. Obscure feedback of authentication information
Incident Response (IR). 3 practices
- 3.6.1. Operational incident-handling capability
- 3.6.2. Track, document, and report incidents
- 3.6.3. Test incident response capability
Remaining domains (summary)
- Maintenance (MA). 6 practices covering system maintenance, maintenance tools, non-local maintenance, personnel conducting maintenance
- Media Protection (MP). 9 practices covering CUI on digital and non-digital media, access, marking, transport, sanitization
- Personnel Security (PS). 2 practices covering personnel screening and protection of CUI during personnel actions
- Physical Protection (PE). 6 practices covering physical facility access, visitor access, physical access logs, equipment siting and protection
- Risk Assessment (RA). 3 practices covering risk assessment, vulnerability scanning, mitigation of vulnerabilities
- Security Assessment (CA). 4 practices covering security control assessment, plan of action, system security plan, continuous monitoring
- System and Communications Protection (SC). 16 practices covering boundary protection, subnetwork separation, denial-of-service protection, cryptographic key management, collaborative computing devices, mobile code
- System and Information Integrity (SI). 7 practices covering flaw remediation, malicious code protection, system monitoring, security alerts and advisories, email forgery protection, sandbox
POA&M eligibility
Under CMMC 2.0, a limited set of NIST 800-171 practices can be POA&M items at the time of the C3PAO assessment. The most critical practices (MFA, encryption, boundary protection, audit logging) must be implemented. The Cyber AB publishes a POA&M eligible practices list. Check the current version before relying on POA&M for any specific practice.
