CMMC SC.2.179 - Encrypt Sessions for Network Devices Management

CMMC SC.2.179 - Encrypt Sessions for Network Devices Management

Requirement text: SC.2.179: Use encrypted sessions for the management of network devices.

DISCUSSION FROM SOURCE: CMMC
Management of network devices is a security critical process and needs to have
confidentiality protection and authentication to protect against adversaries trying to gain
information or change the network infrastructure.

Confidentiality protection prevents an adversary from sniffing passwords or configuration
information. Authenticity protection includes, for example, protecting against man-in-the-
middle attacks, session hijacking, and the insertion of false information into communications
sessions. This requirement addresses communications protection at the session versus
packet level (e.g., sessions in service-oriented architectures providing web-based services).

CMMC CLARIFICATION
When an organization connects to and manages network devices, it should use an encrypted
session. The most common encrypted method is a Secure Shell (SSH).

Example
You are an IT administrator for your organization. You are in charge of updating devices on
your network. You access these devices over the network instead of at the device’s physical
location. When you establish a connection to these devices, you use an SSH connection. An
SSH connection protects you. For example, an adversary has installed malware on a network
device. If you use an unencrypted session (i.e., telnet into a device) the adversary can view
your username and password. But, if you use an SSH connection, the adversary cannot see
this information.

References
• CMMC
• CIS Controls v7.1 11.5
    • Related Articles

    • CMMC SC.3.186 - Terminate Unnecessary Network Sessions

      Requirement text: SC.3.186: Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 This requirement applies to ...
    • Configuration Management: SP 800-171 Security Family 3.4

      Configuration management is a collection of activities focused on establishing and maintaining the integrity of information technology products and systems through the control of processes for initializing, changing, and monitoring the configurations ...
    • CMMC SC.3.184 - Prevent Remote Devices from Split Tunneling Network Connections

      Requirement text: SC.3.184: Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling). DISCUSSION ...
    • CMMC AC.3.022 - Encrypt Mobile Devices

      Requirement text: AC.3.022: Encrypt CUI on mobile devices and mobile computing platforms. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Organizations can employ full-device encryption or container-based encryption to protect the confidentiality of ...
    • CMMC SC.3.181 - Separate User Functionality from System Management Functionality

      Requirement text: SC.3.181: Separate user functionality from system management functionality. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 System management functionality includes functions necessary to administer databases, network components, ...