SC — System and Communications Protection
Stokes Frederick Co
SPRS Score: -131
Objective Progress
12 / 41
(29.3%)
CMMC Practices MET
1 / 16
Domain Score Impact
-37
CMMC scoring changes when all assessment objectives for a practice are MET; objective progress updates as each objective is assessed.
SC.L2-3.13.1
DoD Weight: 5
Deduction: -5
Basic
NOT MET
Requirement: Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems.
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.1[b] = Not Yet Assessed;
3.13.1[c] = Not Yet Assessed;
3.13.1[d] = Not Yet Assessed;
3.13.1[e] = Not Yet Assessed;
3.13.1[f] = Not Yet Assessed;
3.13.1[g] = Not Yet Assessed
; and 1 more
Assessment Objectives (8)
-
3.13.1[a]METDetermine if: the external system boundary is defined.
Update objective finding / evidence
-
3.13.1[b]Not Yet AssessedDetermine if: key internal system boundaries are defined.
Update objective finding / evidence
-
3.13.1[c]Not Yet AssessedDetermine if: communications are monitored at the external system boundary.
Update objective finding / evidence
-
3.13.1[d]Not Yet AssessedDetermine if: communications are monitored at key internal boundaries.
Update objective finding / evidence
-
3.13.1[e]Not Yet AssessedDetermine if: communications are controlled at the external system boundary.
Update objective finding / evidence
-
3.13.1[f]Not Yet AssessedDetermine if: communications are controlled at key internal boundaries.
Update objective finding / evidence
-
3.13.1[g]Not Yet AssessedDetermine if: communications are protected at the external system boundary.
Update objective finding / evidence
-
3.13.1[h]Not Yet AssessedDetermine if: communications are protected at key internal boundaries.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing boundary protection; security plan; list of key internal boundaries of the system; system design documentation; boundary protection hardware and software; enterprise security architecture documentation; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; system developer; personnel with boundary protection responsibilities].
Test: [SELECT FROM: Mechanisms implementing boundary protection capability].
SC.L2-3.13.2
DoD Weight: 5
Deduction: -5
Basic
NOT MET
Requirement: Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems.
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.2[b] = Not Yet Assessed;
3.13.2[c] = Not Yet Assessed;
3.13.2[d] = Not Yet Assessed;
3.13.2[e] = Not Yet Assessed;
3.13.2[f] = Not Yet Assessed
Assessment Objectives (6)
-
3.13.2[a]METDetermine if: architectural designs that promote effective information security are identified.
Update objective finding / evidence
-
3.13.2[b]Not Yet AssessedDetermine if: software development techniques that promote effective information security are identified.
Update objective finding / evidence
-
3.13.2[c]Not Yet AssessedDetermine if: systems engineering principles that promote effective information security are identified.
Update objective finding / evidence
-
3.13.2[d]Not Yet AssessedDetermine if: identified architectural designs that promote effective information security are employed.
Update objective finding / evidence
-
3.13.2[e]Not Yet AssessedDetermine if: identified software development techniques that promote effective information security are employed.
Update objective finding / evidence
-
3.13.2[f]Not Yet AssessedDetermine if: identified systems engineering principles that promote effective information security are employed.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: Security planning policy; procedures addressing security plan development and implementation; procedures addressing security plan reviews and updates; enterprise architecture documentation; security plan; records of security plan reviews and updates; other relevant documents or records].
Interview: [SELECT FROM: Personnel with security planning and plan implementation responsibilities; personnel with information security responsibilities].
Test: [SELECT FROM: Organizational processes for security plan development, review, update, and approval; mechanisms supporting the system security plan].
SC.L2-3.13.3
DoD Weight: 1
Deduction: -1
Basic
NOT MET
Requirement: Separate user functionality from system management functionality.
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.3[b] = Not Yet Assessed;
3.13.3[c] = Not Yet Assessed
Assessment Objectives (3)
-
3.13.3[a]METDetermine if: user functionality is identified.
Update objective finding / evidence
-
3.13.3[b]Not Yet AssessedDetermine if: system management functionality is identified.
Update objective finding / evidence
-
3.13.3[c]Not Yet AssessedDetermine if: user functionality is separated from system management functionality.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing application partitioning; system design documentation; system configuration settings and associated documentation; security plan; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; system developer].
Test: [SELECT FROM: Separation of user functionality from system management functionality].
SC.L2-3.13.4
DoD Weight: 1
Deduction: -1
Basic
NOT MET
Requirement: Prevent unauthorized and unintended information transfer via shared system resources.
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.4 = Not Yet Assessed
Assessment Objectives (1)
-
3.13.4Not Yet AssessedDetermine if: unauthorized and unintended information transfer via shared system resources is prevented.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing application partitioning; security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; system developer].
Test: [SELECT FROM: Separation of user functionality from system management functionality].
SC.L2-3.13.5
DoD Weight: 5
Deduction: -5
Basic
NOT MET
Requirement: Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.5[b] = Not Yet Assessed
Assessment Objectives (2)
-
3.13.5[a]METDetermine if: publicly accessible system components are identified.
Update objective finding / evidence
-
3.13.5[b]Not Yet AssessedDetermine if: subnetworks for publicly accessible system components are physically or logically separated from internal networks.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing boundary protection; security plan; list of key internal boundaries of the system; system design documentation; boundary protection hardware and software; system configuration settings and associated documentation; enterprise security architecture documentation; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; system developer; personnel with boundary protection responsibilities].
Test: [SELECT FROM: Mechanisms implementing boundary protection capability].
SC.L2-3.13.6
DoD Weight: 5
Deduction: -5
Basic
NOT MET
Requirement: Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.6[b] = Not Yet Assessed
Assessment Objectives (2)
-
3.13.6[a]METDetermine if: network communications traffic is denied by default.
Update objective finding / evidence
-
3.13.6[b]Not Yet AssessedDetermine if: network communications traffic is allowed by exception.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing boundary protection; security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; system developer; personnel with boundary protection responsibilities].
Test: [SELECT FROM: Mechanisms implementing traffic management at managed interfaces].
SC.L2-3.13.7
DoD Weight: 1
Deduction: -1
Basic
NOT MET
Requirement: Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling).
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.7 = Not Yet Assessed
Assessment Objectives (1)
-
3.13.7Not Yet AssessedDetermine if: remote devices are prevented from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks (i.e., split tunneling).
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing boundary protection; security plan; system design documentation; system hardware and software; system architecture; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; system developer; personnel with boundary protection responsibilities].
Test: [SELECT FROM: Mechanisms implementing boundary protection capability; mechanisms supporting or restricting non-remote connections].
SC.L2-3.13.8
DoD Weight: 3
Deduction: -3
Basic
NOT MET
Requirement: Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards.
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.8[b] = Not Yet Assessed;
3.13.8[c] = Not Yet Assessed
Assessment Objectives (3)
-
3.13.8[a]METDetermine if: cryptographic mechanisms intended to prevent unauthorized disclosure of CUI are identified.
Update objective finding / evidence
-
3.13.8[b]Not Yet AssessedDetermine if: alternative physical safeguards intended to prevent unauthorized disclosure of CUI are identified.
Update objective finding / evidence
-
3.13.8[c]Not Yet AssessedDetermine if: either cryptographic mechanisms or alternative physical safeguards are implemented to prevent unauthorized disclosure of CUI during transmission.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing transmission confidentiality and integrity; security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; system developer].
Test: [SELECT FROM: Cryptographic mechanisms or mechanisms supporting or implementing transmission confidentiality; organizational processes for defining and implementing alternative physical safeguards].
SC.L2-3.13.9
DoD Weight: 1
Deduction: -1
Basic
NOT MET
Requirement: Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.9[b] = Not Yet Assessed;
3.13.9[c] = Not Yet Assessed
Assessment Objectives (3)
-
3.13.9[a]METDetermine if: a period of inactivity to terminate network connections associated with communications sessions is defined.
Update objective finding / evidence
-
3.13.9[b]Not Yet AssessedDetermine if: network connections associated with communications sessions are terminated at the end of the sessions.
Update objective finding / evidence
-
3.13.9[c]Not Yet AssessedDetermine if: network connections associated with communications sessions are terminated after the defined period of inactivity.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing network disconnect; system design documentation; security plan; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; system developer].
Test: [SELECT FROM: Mechanisms supporting or implementing network disconnect capability].
SC.L2-3.13.10
DoD Weight: 1
Deduction: -1
Basic
NOT MET
Requirement: Establish and manage cryptographic keys for cryptography employed in organizational systems.
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.10[b] = Not Yet Assessed
Assessment Objectives (2)
-
3.13.10[a]METDetermine if: cryptographic keys are established whenever cryptography is employed.
Update objective finding / evidence
-
3.13.10[b]Not Yet AssessedDetermine if: cryptographic keys are managed whenever cryptography is employed.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing cryptographic key establishment and management; security plan; system design documentation; cryptographic mechanisms; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; personnel with responsibilities for cryptographic key establishment and management].
Test: [SELECT FROM: Mechanisms supporting or implementing cryptographic key establishment and management].
SC.L2-3.13.11
DoD Weight: 5
Earned: 5
Derived
MET
Requirement: Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.
Assessment Objectives (1)
-
3.13.11METDetermine if: FIPS-validated cryptography is employed to protect the confidentiality of CUI.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing cryptographic protection; security plan; system design documentation; system configuration settings and associated documentation; cryptographic module validation certificates; list of FIPS-validated cryptographic modules; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; system developer; personnel with responsibilities for cryptographic protection].
Test: [SELECT FROM: Mechanisms supporting or implementing cryptographic protection].
SC.L2-3.13.12
DoD Weight: 1
Deduction: -1
Basic
NOT MET
Requirement: Security Requirement 3.13.12
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.12[b] = Not Yet Assessed;
3.13.12[c] = Not Yet Assessed
Assessment Objectives (3)
-
3.13.12[a]METDetermine if: collaborative computing devices are identified.
Update objective finding / evidence
-
3.13.12[b]Not Yet AssessedDetermine if: collaborative computing devices provide indication to users of devices in use.
Update objective finding / evidence
-
3.13.12[c]Not Yet AssessedDetermine if: remote activation of collaborative computing devices is prohibited.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing collaborative computing; access control policy and procedures; security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; system developer; personnel with responsibilities for managing collaborative computing devices].
Test: [SELECT FROM: Mechanisms supporting or implementing management of remote activation of collaborative computing devices; mechanisms providing an indication of use of collaborative computing devices].
SC.L2-3.13.13
DoD Weight: 1
Deduction: -1
Basic
NOT MET
Requirement: Control and monitor the use of mobile code.
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.13[b] = Not Yet Assessed
Assessment Objectives (2)
-
3.13.13[a]METDetermine if: use of mobile code is controlled.
Update objective finding / evidence
-
3.13.13[b]Not Yet AssessedDetermine if: use of mobile code is monitored.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing mobile code; mobile code usage restrictions, mobile code implementation policy and procedures; security plan; list of acceptable mobile code and mobile code technologies; list of unacceptable mobile code and mobile technologies; authorization records; system monitoring records; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; personnel with responsibilities for managing mobile code].
Test: [SELECT FROM: Organizational process for controlling, authorizing, monitoring, and restricting mobile code; mechanisms supporting or implementing the management of mobile code; mechanisms supporting or implementing the monitoring of mobile code].
SC.L2-3.13.14
DoD Weight: 1
Deduction: -1
Basic
NOT MET
Requirement: Control and monitor the use of Voice over Internet Protocol (VoIP) technologies
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.14[b] = Not Yet Assessed
Assessment Objectives (2)
-
3.13.14[a]METDetermine if: use of Voice over Internet Protocol (VoIP) technologies is controlled.
Update objective finding / evidence
-
3.13.14[b]Not Yet AssessedDetermine if: use of Voice over Internet Protocol (VoIP) technologies is monitored.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing VoIP; VoIP usage restrictions; VoIP implementation guidance; security plan; system design documentation; system configuration settings and associated documentation; system monitoring records; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; personnel with responsibilities for managing VoIP].
Test: [SELECT FROM: Organizational process for authorizing, monitoring, and controlling VoIP; mechanisms supporting or implementing authorizing, monitoring, and controlling VoIP].
SC.L2-3.13.15
DoD Weight: 5
Deduction: -5
Basic
NOT MET
Requirement: Protect the authenticity of communications sessions
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.15 = Not Yet Assessed
Assessment Objectives (1)
-
3.13.15Not Yet AssessedDetermine if: the authenticity of communications sessions is protected.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing session authenticity; security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities].
Test: [SELECT FROM: Mechanisms supporting or implementing session authenticity].
SC.L2-3.13.16
DoD Weight: 1
Deduction: -1
Basic
NOT MET
Requirement: Protect the confidentiality of CUI at rest.
MET gate: This control cannot be marked MET until every child objective is MET.
Blocking objective statuses:
3.13.16 = Not Yet Assessed
Assessment Objectives (1)
-
3.13.16Not Yet AssessedDetermine if: the confidentiality of CUI at rest is protected.
Update objective finding / evidence
📝 Assessment Methods (Examine / Interview / Test)
Examine: [SELECT FROM: System and communications protection policy; procedures addressing protection of information at rest; security plan; system design documentation; list of information at rest requiring confidentiality protections; system configuration settings and associated documentation; cryptographic mechanisms and associated configuration documentation; other relevant documents or records].
Interview: [SELECT FROM: System or network administrators; personnel with information security responsibilities; system developer].
Test: [SELECT FROM: Mechanisms supporting or implementing confidentiality protections for information at rest].