Systems and Communication Protection - Level 5
CMMC SC.5.208 - Employ Advances Boundary Protections
Requirement text: SC.5.208: Employ organizationally defined and tailored boundary protections in addition to commercially available solutions. DISCUSSION FROM SOURCE: CMMC Advanced adversaries study and analyze standard commercial security solutions ...
CMMC SC.5.230 - Enforce port and Protocol Compliance
Requirement text: SC.5.230: Enforce port and protocol compliance. DISCUSSION FROM SOURCE: CMMC Malicious actors are able to perform command and control and exfiltration of data by running their own protocols over well-known ports or by hijacking ...
CMMC SC.5.198 - Configure Monitoring Systems to Record Network Packets
Requirement text: SC.5.198: Configure monitoring systems to record packets passing through the organization's Internet network boundaries and other organizational-defined boundaries. DISCUSSION FROM SOURCE: CIS CONTROLS V7.1 Configure monitoring ...