This section emphasizes confidentiality, integrity, and availability of CUI. The guidance outlines requirements for access control, system monitoring, incident response, and supply chain management, among others. It aims to provide a unified cybersecurity framework for organizations handling sensitive government data, ensuring compliance and strengthening overall security posture.
Official PDF (nvlpubs.nist.gov) NIST Special Publication 800 NIST SP 800-171r3: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
Many Control Families are ITAR related.
Example Section 3.0 Requirements - in this example, the physical controls have been identified. This should assist in isolating those that are are tied to net electronic storage of CUI. Family Controls for Physical Compliance Only
CMMC 2.0 Level 1
What is the Differences Between CMMC 2.0 Levels 1,2,3 (JCP and ITAR)
03 Control Families (CF)
This section emphasizes confidentiality, integrity, and availability of CUI. The guidance outlines requirements...
- ‣
03.01 Access Control (AC)
- ‣
03.02 Awareness and Training (AT)
- ‣
03.03 Audit and Accountability (AU)
- ‣
03.04 Configuration Management (CM)
- ‣
03.05 Identification and Authentication (IA)
- ‣
03.06 Incident Response (IR)
- ‣
03.07 Maintenance (MA)
- ‣
03.08 Media Protection (MP)
- ‣
03.09 Personnel Security (PS)
- ‣
03.10 Physical Protection (PE)
- ‣
03.11 Risk Assessment (RA)
- ‣
03.12 Security Assessment and Monitoring (CA)
- ‣
03.13 System and Communications Protection (SC)
- ‣
03.14 System and Information Integrity (SI)
- ‣
03.15 Planning (PL)
- ‣
03.16 System and Services Acquisition (SA)
- ‣
03.17 Supply Chain Risk Management (SR)
Allow Members to Add Personal Content (disabled)
03.01 Access Control (AC)
NIST 800-171 Revision 3, Family Control "Access Control" (AC) outlines the requirements for controlling system access to protect Controlled Unclassified Information (CUI). It emphasizes limiting information system access to authorized users with official needs, and it details proper user access management, including identity management, authentication, and authorization. ITAR Related: Mandates strict access control to prevent unauthorized access to controlled technical data. CMMC 2.0 Level 1: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. See"03.01 Access Control (AC) ➔ CMMC 2.0 LEVEL 1"Comment By wno***@q4q.com
Wednesday 19th of February 2025
03.03 Audit and Accountability (AU)
NIST 800-171 Revision 3's "Audit and Accountability" family ensures the proper handling of Controlled Unclassified Information (CUI) by mandating comprehensive audit trails, robust log management, and regular monitoring of system activity. This helps organizations pinpoint unauthorized access, suspicious behavior, and potential security breaches, ensuring accountability and facilitating incident response. ITAR Related: Requires maintaining records of access to controlled technical data. CMMC 2.0 Level 1: (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. See"03.03 Audit and Accountability (AU) ➔ CMMC 2.0 LEVEL 1"Comment By wno***@q4q.com
Sunday 16th of February 2025
03.05 Identification and Authentication (IA)
NIST 800-171 Revision 3, Family Control "Identification and Authentication" focuses on verifying the identities of those accessing systems and controlling their access to CUI. It mandates multi-factor authentication, strong password policies, and identity management to prevent unauthorized access. ITAR Related: Requires strong authentication measures to verify the identity of individuals accessing controlled technical data. CMMC 2.0 Level 1: (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. See"03.05 Identification and Authentication (IA) ➔ CMMC 2.0 LEVEL 1"Comment By wno***@q4q.com
Sunday 16th of February 2025
03.08 Media Protection (MP)
NIST 800-171 Revision 3, Family Control "Media Protection" focuses on safeguarding the confidentiality and integrity of Controlled Unclassified Information (CUI) stored on various media. It emphasizes controlling access to media, protecting it during transport, and securely sanitizing or destroying it when no longer needed. This ensures that CUI remains protected throughout its lifecycle, whether it's on hard drives, removable storage, or other media forms. CMMC 2.0 Level 1: (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. See"03.08 Media Protection (MP) ➔ CMMC 2.0 LEVEL 1"Comment By wno***@q4q.com
Sunday 16th of February 2025
03.10 Physical Protection (PE)
NIST 800-171 Revision 3, Family Control "Physical Protection" safeguards Controlled Unclassified Information (CUI) by restricting physical access to facilities and hardware. It mandates physical security measures like access control systems, visitor logs, and secure storage of equipment and media. These measures prevent unauthorized access, tampering, and theft, ensuring CUI confidentiality and integrity. ITAR Related: Requires that physical access to areas where controlled technical data is stored is restricted. PE controls, such as access badges and surveillance systems, help prevent unauthorized physical access to sensitive information. CMMC 2.0 Level 1: (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. See"03.10 Physical Protection (PE) ➔ CMMC 2.0 LEVEL 1"Comment By wno***@q4q.com
Sunday 16th of February 2025
03.13 System and Communications Protection (SC)
NIST SP 800-171 Revision 3's System and Communications Protection family focuses on safeguarding the confidentiality of Controlled Unclassified Information (CUI) by securing system access, managing communications, and protecting the infrastructure transmitting CUI. It emphasizes boundary defense, denial-of-service protection, and secure network configurations. ITAR Related: Requires that systems and communications networks are protected from unauthorized access. SC controls, such as firewalls and intrusion detection systems, help secure systems and networks that process, store, or transmit controlled technical data CMMC 2.0 Level 1: (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. See"03.13 System and Communications Protection (SC) ➔ CMMC 2.0 LEVEL 1"Comment By wno***@q4q.com
Sunday 16th of February 2025
03.14 System and Information Integrity (SI)
NIST 800-171 Revision 3, Family Control "System and Information Integrity" focuses on ensuring the trustworthiness and reliability of Controlled Unclassified Information (CUI) processing systems. It emphasizes protecting these systems from unauthorized modification, preventing malicious code, and using trusted sources for information and software. ITAR Related: Requires that systems and information are protected from unauthorized modification or corruption. SI controls, such as anti-virus software and integrity checks, help ensure that controlled technical data is not compromised. CMMC 2.0 Level 1: (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed. See"03.14 System and Information Integrity (SI) ➔ CMMC 2.0 LEVEL 1"Comment By wno***@q4q.com
Sunday 16th of February 2025
What is XNETD?
XNETD is a developer of tools that assist in maintaining your network infrastructure. Every network to function properly it needs the right tools — we develop those tools.

Developer:
William Noble Phone:
814-580-8767Email:
wnoble2005@gmail.com Address:
6766 Old Ridge Rd, Fairview, PA 16415About Me:
whoiswilliamnoble.com