CMMC Practice Requirement:

Control the flow of Federal Contract Information in accordance with approved authorizations.

CMMC Requirement Explanation:

By placing a firewall or other proxy between your network and the internet you prevent direct access to your systems from the internet. You can also prevent certain types of information from exiting your network.

Example CMMC Implementation:

Use a firewall to control traffic coming in and out of your network. Configure the firewall to only allowed authorized connections out of your network. Use the firewall or proxy device to ensure that sensitive information is only allowed to exit your network if encrypted.

Scenario(s):

- Scenario 1:

You setup a firewall on your network. This prevents traffic from flowing directly from your internal network to the internet. Your firewall analyzes traffic and only allows authorized traffic through.
 

Discover Our NIST SP 800-171 Solutions:

 /assets/images/compliance_accelerator_white.png

Compliance Accelerator

For contractors seeking compliance
 /assets/images/quantum_assessor_white.png

Quantum Assessor

For IT service providers
 /assets/images/supply_chain_logo_white.png

Supply Chain Verifier

For contractors seeking to verify partner compliance