These pages cover the CMMC Level 2 practices that I’ve seen cause the most problems in real assessments. Most of them aren’t technically complex. They’re just hard to articulate when you’re sitting across from an assessor.

Each page follows the same structure: what the assessor is actually looking for, what a realistic SSP definition looks like, how to present your evidence, what gets flagged, and how shared responsibility works if you use an MSP or MSSP.

I’m adding new practices regularly. If you hit an acronym you don’t recognize, the glossary has you covered.

AC.L2-3.1.1
Who Has Access to CUI? How to Pass AC.L2-3.1.1
Limit system access to authorized users, processes acting on behalf of authorized users, and devices, and explain how you prove it.
hard
AC.L2-3.1.2
AC.L2-3.1.2: Transaction & Function Control
Limit user actions to only what their job function requires
moderate
AC.L2-3.1.3
AC.L2-3.1.3: Control CUI Flow
Prevent CUI from moving to unauthorized systems, users, or locations
hard
AC.L2-3.1.4
Separation of Duties for Small Contractors: AC.L2-3.1.4 Guide
Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
hard
AC.L2-3.1.5
AC.L2-3.1.5: Least Privilege
Employ the principle of least privilege, including for specific security functions and privileged accounts.
hard
AC.L2-3.1.6
AC.L2-3.1.6: Non-Privileged Account Use
Require privileged users to use non-privileged accounts or roles when accessing nonsecurity functions.
hard
AC.L2-3.1.7
AC.L2-3.1.7: Privileged Functions
Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
moderate
AC.L2-3.1.8
AC.L2-3.1.8: Unsuccessful Logon Attempts
Limit unsuccessful logon attempts to protect against brute-force password attacks.
moderate
AC.L2-3.1.9
AC.L2-3.1.9: Privacy and Security Notices
Provide privacy and security notices consistent with applicable CUI rules before granting access to the system.
moderate
AC.L2-3.1.10
AC.L2-3.1.10: Session Lock
Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
moderate
AC.L2-3.1.11
AC.L2-3.1.11: Session Termination
Lock sessions after a defined inactivity period to prevent unattended access to active user accounts.
moderate
AC.L2-3.1.12
AC.L2-3.1.12: Control Remote Access
Monitor and control all remote access sessions to systems handling CUI with an auditable log trail.
hard
AC.L2-3.1.13
AC.L2-3.1.13: Remote Access Confidentiality
Employ cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
moderate
AC.L2-3.1.14
AC.L2-3.1.14: Remote Access Routing
Route remote access sessions through managed access control points and apply restrictions before reaching CUI systems.
moderate
AC.L2-3.1.15
AC.L2-3.1.15: Privileged Remote Access
Authorize remote execution of privileged commands through defined approval processes and maintain detailed audit trails.
hard
AC.L2-3.1.16
AC.L2-3.1.16: Wireless Access Authorization
Authorize wireless access prior to allowing connections, and explain how you control who gets on your network.
moderate
AC.L2-3.1.17
AC.L2-3.1.17: Wireless Access Protection
Protect wireless access using authentication and encryption, and demonstrate that your wireless network actually requires both.
moderate
AC.L2-3.1.18
Mobile Device Access to CUI Systems: AC.L2-3.1.18 Guide
Control the connection of mobile devices to your systems, and demonstrate that you know which mobile devices can access what.
moderate
AC.L2-3.1.19
AC.L2-3.1.19: Encrypt CUI on Mobile Devices
Encrypt CUI stored on mobile devices and mobile computing platforms, and prove that encryption is actually enforced.
moderate
AC.L2-3.1.20
AC.L2-3.1.20: External Connections
Verify and control connections to external information systems, and explain how you prevent unauthorized data flow.
hard
AC.L2-3.1.21
AC.L2-3.1.21: Portable Storage Use
Limit the use of portable storage devices on external systems, and explain how you prevent data leakage via USB, SD cards, and other removable media.
moderate
AC.L2-3.1.22
AC.L2-3.1.22: Control Public Information
Control information posted on publicly accessible systems, and explain how you prevent CUI from being exposed.
moderate
AU.L2-3.3.1
AU.L2-3.3.1: System Auditing
Create and retain system audit logs and records to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity.
hard
AU.L2-3.3.2
AU.L2-3.3.2: User Accountability
Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.
moderate
AU.L2-3.3.3
AU.L2-3.3.3: Audit Review, Analysis, and Reporting
Regularly review and analyze audit logs to identify security events, then report findings to management.
medium
AU.L2-3.3.4
Alerting When Audit Logging Fails: AU.L2-3.3.4 Guide
Alert system administrators and security personnel immediately when audit logging or analysis failures occur.
medium
AU.L2-3.3.5
Log Correlation Across Systems: AU.L2-3.3.5 Guide
Correlate audit data from multiple sources to identify patterns and complex attack sequences that individual logs cannot detect.
hard
AU.L2-3.3.6
Audit Log Filtering and Reporting: AU.L2-3.3.6 Guide
Create tools and processes to filter audit logs and generate reports that focus on security-relevant events rather than routine system activity.
medium
AU.L2-3.3.7
AU.L2-3.3.7: Authoritative Time Source
Synchronize all system clocks to a reliable, authoritative time source so audit logs are trustworthy and events can be correlated accurately.
easy
AU.L2-3.3.8
Protecting Audit Logs from Tampering: AU.L2-3.3.8 Guide
Protect audit logs from unauthorized access, modification, and deletion to preserve their integrity as evidence.
medium
AU.L2-3.3.9
AU.L2-3.3.9: Audit Management
Limit audit log management functions (configuration, deletion, archival) to authorized individuals to prevent tampering.
medium
SC.L2-3.13.1
SC.L2-3.13.1: Boundary Protection
Monitor, control, and protect communications at the external boundaries and key internal boundaries of organizational systems.
hard
SC.L2-3.13.2
SC.L2-3.13.2: Security Engineering Principles
Build security into your systems from the start, not as an afterthought
moderate
SC.L2-3.13.3
SC.L2-3.13.3: Security Function Isolation
Separate user functionality from system management.
medium
SC.L2-3.13.4
SC.L2-3.13.4: Shared Resource Control
Prevent unauthorized or unintended information transfer via shared resources.
medium
SC.L2-3.13.5
SC.L2-3.13.5: Public-Access System Separation
Deny network communications traffic by default on external interfaces.
hard
SC.L2-3.13.6
SC.L2-3.13.6: Network Communication by Exception
Deny network communications by default, allow by exception.
hard
SC.L2-3.13.7
Split Tunneling and VPN Requirements: SC.L2-3.13.7 Guide
Prevent remote devices from simultaneously establishing non-remote connections.
medium
SC.L2-3.13.8
SC.L2-3.13.8: CUI in Transit
Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission.
moderate
SC.L2-3.13.9
SC.L2-3.13.9: Network Disconnect
Terminate network connections at end of session or after inactivity.
easy
SC.L2-3.13.10
SC.L2-3.13.10: Key Management
Establish and manage cryptographic keys.
medium
SC.L2-3.13.11
SC.L2-3.13.11: CUI Encryption
Employ FIPS-validated cryptography for CUI.
hard
SC.L2-3.13.12
Controlling Teams, Zoom, and Webcams: SC.L2-3.13.12 Guide
Prohibit remote activation of collaborative computing devices.
easy
SC.L2-3.13.13
SC.L2-3.13.13: Mobile Code
Control and monitor the use of mobile code.
medium
SC.L2-3.13.14
SC.L2-3.13.14: Voice over Internet Protocol
Control and monitor the use of VoIP.
easy
SC.L2-3.13.15
SC.L2-3.13.15: Communications Authenticity
Protect the authenticity of communications sessions.
medium
SC.L2-3.13.16
SC.L2-3.13.16: Data at Rest
Protect CUI at rest.
medium