Discover Our NIST SP 800-171 & CMMC 2.0 Solutions:
Power through compliance. Meet and maintain your NIST SP 800-171 & CMMC 2.0 compliance requirements.
Transform your business. Create new revenue streams and provide scalability for your NIST SP 800-171 and CMMC 2.0 services.
Supply Chain Verifier
Trust is everything. Verify, monitor, and support subcontactor compliance.
CMMC 1.0 Practice - AC.1.001
Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
CMMC 1.0 Practice - AC.1.002
Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
CMMC 1.0 Practice - AC.1.003
Verify and control/limit connections to and use of external information systems.
CMMC 1.0 Practice - AC.1.004
Control information posted or processed on publicly accessible information systems.
CMMC 1.0 Practice - AC.2.005
Provide privacy and security notices consistent with applicable “Controlled Unclassified Information” (CUI) rules.
CMMC 1.0 Practice - AC.2.006
Limit use of portable storage devices on external systems.
CMMC 1.0 Practice - AC.2.007
Employ the principle of least privilege, including for specific security functions and privileged accounts.
CMMC 1.0 Practice - AC.2.008
Use non-privileged accounts or roles when accessing nonsecurity functions.
CMMC 1.0 Practice - AC.2.009
Limit unsuccessful logon attempts.
CMMC 1.0 Practice - AC.2.010
Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
CMMC 1.0 Practice - AC.2.011
Authorize wireless access prior to allowing such connections.
CMMC 1.0 Practice - AC.3.012
Protect wireless access using authentication and encryption.
CMMC 1.0 Practice - AC.2.013
Monitor and control remote access sessions.
CMMC 1.0 Practice - AC.3.014
Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
CMMC 1.0 Practice - AC.2.015
Route remote access via managed access control points.
CMMC 1.0 Practice - AC.2.016
Control the flow of Federal Contract Information in accordance with approved authorizations.
CMMC 1.0 Practice - AC.3.017
Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
CMMC 1.0 Practice - AC.3.018
Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
CMMC 1.0 Practice - AC.3.019
Terminate (automatically) user sessions after a defined condition.
CMMC 1.0 Practice - AC.3.020
Control connection of mobile devices.
CMMC 1.0 Practice - AC.3.021
Authorize remote execution of privileged commands and remote access to security relevant information.
CMMC 1.0 Practice - AC.3.022
Encrypt CUI on mobile devices and mobile computing platforms.