CMMC 1.0 Practice SC.3.190 Requirement:
Protect the authenticity of communications sessions.
CMMC 1.0 SC.3.190 Requirement Explanation:
This requirement addresses communications protection at the session level. The requirement intends to protect against man-in-the-middle-attacks.
Example CMMC 1.0 SC.3.190 Implementation:
Configure TLS on your web servers and VPN connections. Use digital certificates on your web servers and keep them updated. Any web interface you log into should have green lock in the address bar (TLS with valid certificate). When users authenticate to a web service or other service over the network they should use two factor authentication.
CMMC 1.0 SC.3.190 Scenario(s):
- Scenario 1:
You have a time sheet server on your local network. When users access the login page they notice the URL of the server includes HTTPS, meaning that is protected by TLS. It also has a green lock in the URL bar indicating that it has a valid certificate. Both of these security controls protect the authenticity of the users connection to the time sheet server. When the user logs into the time sheet they log in using two factor authentication.
Discover Our NIST SP 800-171 & CMMC 2.0 Solutions:
Power through compliance. Meet and maintain your NIST SP 800-171 & CMMC 2.0 compliance requirements.
Transform your business. Create new revenue streams and provide scalability for your NIST SP 800-171 and CMMC 2.0 services.
Supply Chain Verifier
Trust is everything. Verify, monitor, and support subcontactor compliance.