CMMC Compliance With Smallstep SSH

Smallstep SSH delivers on CMMC compliance and audits. Use the table below to identify the DoD Cybersecurity Maturity Model Certification numbers Smalstep SSH can solve for you today.

Talk with smallstep
Capacity#PracticeCMMC 1CMMC 3CMMC 5NIST 800-53 R5DSP 2020.4
C001 Establish system access requirementsAC.1.001Limit information system access to authorized users, processes acting on behalf of authorized users or devices (including other information systems).AC_2, AC-3, AC-17IAC-20
C002 Control internal system access AC.1.002Limit information system access to the types of transactions and functions that authorized users are permitted to execute.AC_2, AC-3, AC-17IAC-15
C002 Control internal system access AC.2.007Employ the principle of least privilege, including for specific security functions and privileged accounts. N/AAC-6, AC-6(1), AC-6(5)IAC-21
C002 Control internal system access AC.2.008Use non-privileged accounts or roles when accessing nonsecurity functions.N/AAC-6(2)IAC-21.2
C002 Control internal system access AC.2.009Limit unsuccessful logon attempts.N/AAC-7IAC-22
C002 Control internal system access AC.3.017Separate the duties of individuals to reduce the risk of malevolent activity without collusion.N/AAC-5HRS-11
C002 Control internal system access AC.3.018Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.N/AAC-6(9), AC-6(10)IAC-21.5
C002 Control internal system access AC.3.019Terminate (automatically) user sessions after a defined condition.N/AAC-12IAC-25
C003 Control remote system accessAC.2.013Monitor and control remote access sessions.N/AAC-17(1)NET-14.1
C003 Control remote system accessAC.3.014Employ cryptographic mechanisms to protect the confidentiality of remote access sessions. N/AAC-17(2)NET-14.2
C004 Limit data access to authorized users and processes AC.1.003Verify and control/limit connections to and use of external information systems.AC-20, AC-20(1)DCH-13
C007 Define audit requirementsAU.2.041Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.N/AAU-2, AU-3, AU-3(1), AU-6, AU-11, AU-12MON-03
C007 Define audit requirementsAU.3.045Review and update logged events.N/AAU-2MON-01.8
C008 Perform auditingAU.2.042Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation and reporting of unlawful or unauthorized system activity.N/AAU-2, AU-3, AU-3(1), AU-6, AU-11, AU-12MON-10
C008 Perform auditingAU.2.043Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records.N/AAU-8, SC-45(1)MON-07.1
C008 Perform auditingAU.3.048Collect audit information (e.g., logs) into one or more central repositories.N/AAU-6(4)MON-02
C013 Establish configuration baselinesCM.2.061Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware and documentation) throughout the respective system development life cycles.N/ACM-2, CM-6, CM-8, CM-8(1)AST-02
C015 Grant access to authenticated entities IA.1.076Identify information system users, processes acting on behalf of users or devices.IA-2, IA-3, IA-6IAC-02
C015 Grant access to authenticated entities IA.1.077Authenticate (or verify) the identities of those users, processes or devices, as a prerequisite to allowing access to organizational information systems.IA-2, IA-3, IA-5IAC-02
C015 Grant access to authenticated entities IA.2.078Enforce a minimum password complexity and change of characters when new passwords are created.N/AIA-5(1)IAC-10.1
C015 Grant access to authenticated entities IA.2.079Prohibit password reuse for a specified number of generations.N/AIA-5(1)IAC-10
C015 Grant access to authenticated entities IA.2.080 Allow temporary password use for system logons with an immediate change to a permanent password.N/AIA-5(1)IAC-10
C015 Grant access to authenticated entities IA.2.081Store and transmit only cryptographicallyprotected passwords.N/AIA-5(1)IAC-10.5
C015 Grant access to authenticated entities IA.2.082Obscure feedback of authentication information.N/AIA-6IAC-11
C015 Grant access to authenticated entities IA.3.083Use multi-factor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.N/AIA-2(1), IA-2(2) IAC-06
C015 Grant access to authenticated entities IA.3.084Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.N/AIA-2(8)IAC-02.2
C015 Grant access to authenticated entities IA.3.085Prevent the reuse of identifiers for a defined period.N/AIA-4IAC-09
C015 Grant access to authenticated entities IA.3.086Disable identifiers after a defined period of inactivity.N/AIA-4IAC-15.3
C017 Detect and report eventsIR.2.093Detect and report events.N/AAR-4, AU-13, IA-10, IR-4, IR-5, IR-6, PE-6, RA-6IRO-09
C019 Perform post incident reviewsIR.2.097Perform root cause analysis on incidents to determine underlying causes.N/AAU-2, IR-4IRO-13
C020 Test incident responseIR.3.099Test the organizational incident response capability.N/AIR-3IRO-06
C020 Test incident responseIR.5.110Perform unannounced operational exercises to demonstrate technical and procedural responses.N/AN/AIR-2IRO-06
C021 Manage maintenanceMA.2.112Provide controls on the tools, techniques, mechanisms and personnel used to conduct system maintenance.N/AMA-2, MA-3, MA-3(1), MA-3(2)MNT-04
C021 Manage maintenanceMA.2.113Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete.N/AMA-4MNT-05
C027 Protect federal contract information during personnel actionsPS.2.128Ensure that organizational systems containing CUI are protected during and after personnel actions such as terminations and transfers.N/APS-3, PS-4, PS-5HRS-08, HRS-09
C031 Identify and evaluate riskRM.2.141Periodically assess the risk to organizational operations (including mission, functions, image or reputation), organizational assets and individuals, resulting from the operation of organizational systems and the associated processing, storage or transmission of CUI.N/ARA-3RSK-04
C038 Define security requirements for systems and communicationsSC.3.177Use encrypted sessions for the management of network devices.N/ACRY-03
C038 Define security requirements for systems and communicationsSC.2.179Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.N/ASC-13CRY-001
C038 Define security requirements for systems and communicationsSC.3.180Employ architectural designs, software development techniques and systems engineering principles that promote effective information security within organizational systems.N/ASC-7, SA-8SEA-01
C038 Define security requirements for systems and communicationsSC.3.181Separate user functionality from system management functionality.N/ASC-2SEA-03.2
C038 Define security requirements for systems and communicationsSC.3.185Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards.N/ASC-8, SC-8(1)CRY-01.1
C038 Define security requirements for systems and communicationsSC.3.186Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.N/ASC-10NET-07
C038 Define security requirements for systems and communicationsSC.3.187Establish and manage cryptographic keys for cryptography employed in organizational systems.N/ASC-12CRY-08
C038 Define security requirements for systems and communicationsSC.3.190Protect the authenticity of communications sessions.N/ASC-23NET-09
C038 Define security requirements for systems and communicationsSC.4.197Employ physical and logical isolation techniques in the system and security architecture and/or and where deemed appropriate by the organization.N/AN/ANET-03
C038 Define security requirements for systems and communicationsSC.5.198Configure monitoring systems to record packets passing through the organization’s Internet network boundaries and other organizational-defined boundaries.N/AN/ASC-7(8)MON-01.9
C038 Define security requirements for systems and communicationsSC.5.230Enforce port and protocol compliance.N/AN/ACM-2, CM-6, CM-7, SA-4(9), SA-8, SC-7(17)CFG-02
C039 Control communications at system boundariesSC.1.175Monitor, control and protect organizational communications (e.g., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems.SC-7, SA-8NET-03
C039 Control communications at system boundariesSC.1.176Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.SC-7NET-06
C039 Control communications at system boundariesSC.5.208Employ organizationally-defined and tailored boundary protections in addition to commercially-available solutions.N/AN/ASC-7, SC-7(9), SC-7(11)NET-02
C039 Control communications at system boundariesSI.2.214Monitor system security alerts and advisories and take action in response.N/ASI-2, SI-3, SI-5MON-01.8
C039 Control communications at system boundariesSI.4.221Use threat indicator information relevant to the information and systems being protected and effective mitigations obtained from external organizations to inform intrusion detection and threat hunting.N/AN/ASI-5, SI-5(1)MON-11.3
C042 Perform network and system monitoringSI.2.216Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.N/AAU-2, AU-2, AU-6, SI-4, SI-4(4)MON-01.3

This table is used under the Creative Commons Attribution license from CMMC Center of Awesomeness (CMMC-COA) © 2021

Smallstep logo

Create your private hosted Certificate Authority in less than five minutes

Sign up