CMMC PS.2.128 - Protect CUI during Personnel Terminations and Transfers

CMMC PS.2.128 - Protect CUI during Personnel Terminations and Transfers

Requirement text: PS.2.128: Ensure that organizational systems containing CUI are protected during
and after personnel actions such as terminations and transfers.

DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2
Protecting CUI during and after personnel actions may include returning system-related
property and conducting exit interviews. System-related property includes hardware
authentication tokens, identification cards, system administration technical manuals, keys,
and building passes. Exit interviews ensure that individuals who have been terminated
understand the security constraints imposed by being former employees and that proper
accountability is achieved for system-related property. Security topics of interest at exit
interviews can include reminding terminated individuals of nondisclosure agreements and
potential limitations on future employment. Exit interviews may not be possible for some
terminated individuals, for example, in cases related to job abandonment, illnesses, and non-
availability of supervisors. For termination actions, timely execution is essential for
individuals terminated for cause. In certain situations, organizations consider disabling the
system accounts of individuals that are being terminated prior to the individuals being
notified.

This requirement applies to reassignments or transfers of individuals when the personnel
action is permanent or of such extended durations as to require protection. Organizations
define the CUI protections appropriate for the types of reassignments or transfers, whether
permanent or extended. Protections that may be required for transfers or reassignments to
other positions within organizations include returning old and issuing new keys,
identification cards, and building passes; changing system access authorizations (i.e.,
privileges); closing system accounts and establishing new accounts; and providing for access
to official records to which individuals had access at previous work locations and in previous
system accounts.

CMMC CLARIFICATION
Make sure employees no longer have access to CUI when they change jobs or leave the
company. Confirm that when an employee leaves:
      • all company IT equipment (e.g., laptops, cell phones, storage devices) is returned;
      • all of their identification/access cards and/or keys are returned; and
      • an exit interview is conducted to remind the employee of their obligations to not
        discuss CUI, even after employment.

The organization will do the following:
      • erase all equipment before reuse;
      • remove access to all accounts granting access to CUI;
      • disable or close employee accounts; and
      • limit access to physical spaces with CUI.

Example
You are in charge of IT operations at your company. When someone leaves the company,
you remove them from any physical CUI access lists. You contact them immediately, and ask
them to:
      • turn in their computers for proper handling which includes IT disabling all accounts;
      • return all their identification and access cards; and
      • attend an exit interview where you remind them of their obligations to not discuss
        CUI.

References
• NIST SP 800-171 Rev 1 3.9.2
• NIST CSF v1.1 PR.AC-1
• CERT RMM v1.2 HRM:SG4.SP2
• NIST SP 800-53 Rev 4 PS-4, PS-5
    • Related Articles

    • Personnel Security: SP 800-171 Security Family 3.9

      Users play a vital role in protecting a system as many important issues in information security involve users, designers, implementers, and managers. How these individuals interact with the system and the level of access they need to do their jobs ...
    • CMMC PS.2.127 - Screen Individual for System Access

      Requirement text: PS.2.127: Screen individuals prior to authorizing access to organizational systems containing CUI. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Personnel security screening (vetting) activities involve the evaluation/assessment ...
    • CMMC SC.3.191 - Protect CUI at Rest

      Requirement text: SC.3.191: Protect the confidentiality of CUI at rest. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-17 R2 Information at rest refers to the state of information when it is not in process or in transit and is located on storage devices ...
    • CMMC RE.2.138 - Protect CUI at Storage Locations

      Requirement text: RE.2.138: Protect the confidentiality of backup CUI at storage locations. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Organizations can employ cryptographic mechanisms or alternative physical controls to protect the ...
    • CMMC SC.3.177 - Employ FIPS-Validated Cryptography to Protect CUI

      Requirement text: SC.3.177: Employ FIPS-validated cryptography when used to protect the confidentiality of CUI. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Cryptography can be employed to support many security solutions including the protection ...