CMMC 2.0 Compliance Mapping for Sensitive Content Communications
How Kiteworks Supports Nearly 90% of Level 2 Requirements Out of the Box
Introduction to CMMC
The U.S. Department of Defense (DoD) takes a supply-chain risk-management approach to improving cybersecurity by requiring all third-party partners to obtain the Cybersecurity Maturity Model Certification (CMMC). The CMMC is designed to ensure the protection of sensitive national security information such as Controlled Unclassified Information (CUI) and Federal Contract information (FCI). The certification applies to all DoD contractors and subcontractors, and a contractor that fails to maintain compliance will be unable to bid for DoD contracts.
Under DFARS and DoD rules and policies, the DoD implemented cybersecurity controls in the CMMC standard to protect CUI and FCI. Thus, the CMMC measures an organization’s ability to protect FCI and CUI. FCI is information not intended for public release and is provided by or generated for the goverrnment under a contract to develop or deliver a product or service to the government. CUI is information that requires safeguarding or dissemination controls according to and consistent with federal laws, regulations, and government-wide policies.
Figure 1. Comparison of CMMC 1.0 and 2.0.
CMMC 2.0
CMMC 2.0 is the updated and comprehensive framework to protect the defense industrial base from frequent and complex cyberattacks. This streamlined version was released in late 2021 to focus on the most critical security and compliance requirements. It reduced compliance levels from five to three, and third-party assessments are only required for Level 2 and 3 partners that manage critical national security information. The model aligns with the widely accepted Federal Information Processing Standards (FIPS) 200 security-related areas and the National Institute of Standards & Technology (NIST) SP 800-171 and 800-172 control families.
The Kiteworks Platform
Kiteworks’ FedRAMP- and FIPS-140-2-compliant platform for privacy and compliance governance enables organizations to send, share, receive, and store sensitive content. Integrating communication channels such as secure email, file sharing, file transfer, managed file transfer, web forms, and application programming interfaces (APIs), the Kiteworks platform creates private content networks that track, control, and secure confidential digital communications while unifying visibility and metadata. Capabilities in the Kiteworks platform include:
Secure Email
Kiteworks locks down private email communications and ensures regulatory compliance. Users simply send emails and attachments from any location or device, and the Kiteworks platform automatically protects them.
Secure File Sharing
Kiteworks enables government employees and federal contractors to access and share CUI securely, reducing the risk of data breahes, malware attacks, and data loss.
Managed File Transfer
Government agencies and businesses transferring confidential files can streamline, automate, and secure large- scale file transfers and establish policy controls to prevent compliance violations.
Web Forms
Government agency employees and contractors and third-party business users can upload sensitive information that is governed by privacy and compliance policies.
Application Programming Interfaces (APIs)
Organizations can develop custom content applications and integrations on the Kiteworks platform that enable them to manage the risk of data breaches and compliance violations.
The following analysis of CMMC 2.0 reveals that Kiteworks supports nearly 90% of CMMC 2.0 Level 2 requirements out of the box (see Appendix).
For contractors and subcontractors doing business with the U.S. DoD, this translates into dramatically faster compliance audits and even expanded revenue opportunities. Further, once CMMC 2.0 goes into effect, businesses unable to demonstrate sensitive content communications compliance with CMMC 2.0 cannot compete for and work on DoD projects.
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 1 AC.L1-3.1.1 | 3.1.1 | Access Control | Limit | Yes, supports compliance | The Kiteworks platform |
Level 1 AC.L1-3.1.2 | 3.1.2 | Access Control | Limit information system access | Yes, supports compliance | System |
Level 1 AC.L1-3.1.20 | 3.1.20 | Access Control | Verify and control/limit connections to and use of | Yes, supports compliance | The systems like Google Drive, |
Level 1 AC.L1-3.1.22 | 3.1.22 | Access Control | Control information posted | Yes, supports compliance | The Kiteworks platform can be deployed as a private or hybrid cloud in an isolated environment or AWS, per FedRAMP requirements. |
Level 2 AC.L2-3.1.3 | 3.1.3 | Access Control | Control the | Yes, supports compliance | Administrators |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 AC.L2-3.1.4 | 3.1.4 | Access Control | Separate the duties of individuals to reduce the risk of | Yes, supports compliance | Administrators can define different roles and access levels for |
Level 2 AC.L2-3.1.5 | 3.1.5 | Access Control | Employ the | Yes, supports compliance | The Kiteworks platform supports a range of user |
Level 2 AC.L2-3.1.6 | 3.1.6 | Access Control | Use non-privileged accounts or roles when accessing non-security functions | Yes, supports compliance | The Kiteworks platform prevents non-privileged users from |
Level 2 AC.L2-3.1.7 | 3.1.7 | Access Control | Prevent | Yes, supports compliance | The Kiteworks platform enables administrators privileges, ensuring that non-privileged users never |
Level 2 AC.L2-3.1.8 | 3.1.8 | Access Control | Limit unsuccessful logon attempts | Yes, supports compliance | The Kiteworks platform enables system administrators to set |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 AC.L2-3.1.9 | 3.1.9 | Access Control | Provide privacy and security notices consistent with applicable CUI rules | Yes, supports compliance | The Kiteworks platform can be customized to display privacy |
Level 2 AC.L2-3.1.10 | 3.1.10 | Access Control | Use session lock | Partially supports compliance | The |
Level 2 AC.L2-3.1.11 | 3.1.11 | Access Control | Terminate (automatically) a user session after a defined condition | Yes, supports compliance | The |
Level 2 AC.L2-3.1.12 | 3.1.12 | Access Control | Monitor and control | Yes, supports compliance | The Kiteworks platform |
Level 2 AC.L2-3.1.13 | 3.1.13 | Access Control | Employ cryptographic mechanisms to protect the | Yes, supports compliance | The Kiteworks platform encrypts all transmission of |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 AC.L2-3.1.14 | 3.1.14 | Access Control | Route remote access | Yes, supports compliance | The Kiteworks platform enables system administrators to control |
Level 2 AC.L2-3.1.15 | 3.1.15 | Access Control | Authorize remote execution | Yes, supports compliance | The Kiteworks platform provides a separate |
Level 2 AC.L2-3.1.16 | 3.1.16 | Access Control | Authorize | Out of Scope | N/A |
Level 2 AC.L2-3.1.17 | 3.1.17 | Access Control | Protect wireless access using authentication and encryption | Out of Scope | N/A |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 AC.L2-3.1.18 | 3.1.18 | Access Control | Control connection of mobile devices | Yes, supports compliance | The Kiteworks platform enables and disables access from the Kiteworks mobile app. System administrators |
Level 2 AC.L2-3.1.19 | 3.1.19 | Access Control | Encrypt CUI on mobile | Yes, supports compliance | The from |
Level 2 AC.L2-3.1.21 | 3.1.21 | Access Control | Limit use of portable storage devices on external systems | Out of scope | N/A |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 AT.L2-3.2.1 | 3.2.1 | Awareness and Training | Ensure that managers, system administrators, and users of organizational systems of the applicable policies, standards, and procedures related to the security of those systems | Yes, supports compliance | Kiteworks FedRAMP operations managers and administration personnel are trained in the security |
Level 2 AT.L2-3.2.2 | 3.2.2 | Awareness and Training | Ensure | Partially supports compliance | Kiteworks |
Level 2 AT.L2-3.2.3 | 3.2.3 | Awareness and Training | Provide security awareness training on recognizing and reporting potential | Partially supports | Kiteworks FedRAMP operations personnel must |
Audit and Accountability
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 AU.L2-3.3.1 | 3.3.1 | Audit and Accountability | Create and retain | Yes, supports compliance | The Kiteworks platform logs all access to and sharing of content. Administrators and managers can generate reports for use in security investigations. |
Level 2 AU.L2-3.3.2 | 3.3.2 | Audit and Accountability | Ensure | Yes, supports compliance | The |
Level 2 AU.L2-3.3.3 | 3.3.3 | Audit and Accountability | Review and update logged | Yes, supports compliance | The logs can be reviewed but not updated or deleted. |
Level 2 AU.L2-3.3.4 | 3.3.4 | Audit and Accountability | Alert in the | Yes, supports compliance | The Kiteworks |
Level 2 AU.L2-3.3.5 | 3.3.5 | Audit and Accountability | Correlate audit record unauthorized, suspicious, or unusual activity | Yes, supports compliance | Logs generated by analysis platforms for event correlation and threat hunting. The |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 AU.L2-3.3.6 | 3.3.6 | Audit and Accountability | Provide audit | Yes, supports compliance | The Kiteworks platform provides comprehensive audit logs that can be exported readable, visual presentation of activity and anomalous behavior. |
Level 2 AU.L2-3.3.7 | 3.3.7 | Audit and Accountability | Provide a system | Yes, supports compliance | The Kiteworks platform integrates with Network Time |
Level 2 AU.L2-3.3.8 | 3.3.8 | Audit and Accountability | Protect | Yes, supports compliance | Logs generated by the Kiteworks platform can be exported to SIEM systems and other security analysis platforms for event correlation and threat hunting. |
Level 2 AU.L2-3.3.9 | 3.3.9 | Audit and Accountability | Limit management of | Yes, supports compliance | Logs in the |
Configuration Management
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 CM.L2-3.4.1 | 3.4.1 | Configuration Management | Establish and | Yes, supports compliance | The Kiteworks platform provides one-click compliance |
Level 2 CM.L2-3.4.2 | 3.4.2 | Configuration Management | Establish and enforce | Yes, supports compliance | System administrators on the |
Level 2 CM.L2-3.4.3 | 3.4.3 | Configuration Management | Track, review, approve or disapprove, and log changes to organizational systems | Yes, supports compliance | The Kiteworks platform enables system administrators to track, review, and control all changes made to the platform. |
Level 2 CM.L2-3.4.4 | 3.4.4 | Configuration Management | Analyze | Yes, supports compliance | The Kiteworks platform provides compliance audits that report configuration changes that degrade |
Configuration Management (cont.)
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 CM.L2-3.4.5 | 3.4.5 | Configuration Management | Define, | Yes, supports compliance | The Kiteworks platform enforces and logs all logical |
Level 2 CM.L2-3.4.6 | 3.4.6 | Configuration Management | Employ | Yes, supports compliance | The Kiteworks hardened appliance exposes only a few |
Level 2 CM.L2-3.4.7 | 3.4.7 | Configuration Management | Restrict, | Yes, supports compliance | The Kiteworks platform ships as a hardened |
Level 2 CM.L2-3.4.8 | 3.4.8 | Configuration Management | Apply | Yes, supports compliance | The |
Level 2 CM.L2-3.4.9 | 3.4.9 | Configuration Management | Control and monitor user-installed software | Yes, supports compliance | The Kiteworks platform allows you to control what plugins and apps are made available to the end-user. |
Identification and Authentication
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description | Kiteworks Support Compliance |
Kiteworks Solution |
Level 1 IA.L1-3.5.1 | 3.5.1 | Identification and Authentication | Identify information system users, processes acting on behalf of users, or devices | Yes, supports compliance | The Kiteworks platform assigns individual users |
Level 1 IA.L1-3.5.2 | 3.5.2 | Identification and Authentication | Authenticate (or verify) the identities | Yes, supports compliance | The Kiteworks platform assigns individual users unique IDs and uses those IDs to track user activity on |
Level 2 IA.L2-3.5.3 | 3.5.3 | Identification and Authentication | Use multi-factor authentication for local and network access to privileged accounts and for network access to non-privileged accounts | Yes, supports compliance | The Kiteworks platform can be configured to require multi- factor authentication for any administrative session. Multi-factor authentication is also enforced through |
Level 2 IA.L2-3.5.4 | 3.5.4 | Identification and Authentication | Employ replay-resistant authentication | Yes, supports compliance | The Kiteworks platform can be configured to require multi- factor authentication for any administrative session. Multi-factor authentication is also enforced through one-time passcodes via email. Alternatively, multi-factor authentication is enforced through integration with third-party authentication out those sessions after a threshold of idle time has been reached. |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 IA.L2-3.5.5 | 3.5.5 | Identification and Authentication | Prevent reuse of identifiers for a defined period | Yes, supports compliance | The Kiteworks platform assigns each user a unique ID and tracks |
Level 2 IA.L2-3.5.6 | 3.5.6 | Identification and Authentication | Disable | Yes, supports compliance | The Kiteworks |
Level 2 IA.L2-3.5.7 | 3.5.7 | Identification and Authentication | Enforce a minimum password complexity and change of | Yes, supports compliance | The platform enables managers and system administrators to define |
Level 2 IA.L2-3.5.8 | 3.5.8 | Identification and Authentication | Prohibit | Yes, supports compliance | The |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 IA.L2-3.5.9 | 3.5.9 | Identification and Authentication | Allow | Yes, supports compliance | The Kiteworks platform enables system administrators to reset |
Level 2 IA.L2-3.5.10 | 3.5.10 | Identification and Authentication | Store and | Yes, supports compliance | The |
Level 2 IA.L2-3.5.11 | 3.5.11 | Identification and Authentication | Obscure feedback of authentication information | Yes, supports compliance | The Kiteworks platform transmits all authentication information using secure Transport Layer Security |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level | 3.6.1 | Incident Response | Establish | Partially supports compliance | Logs generated by the Kiteworks platform can be exported to SIEM systems and other security analysis platforms for event correlation and threat hunting. |
Level | 3.6.2 | Incident Response | Track, document, and report incidents to designated officials and/or authorities both internal and external | Yes, supports compliance | Logs generated by the Kiteworks platform can be exported to SIEM systems and other security analysis platforms for event correlation and threat hunting. |
Level | 3.6.3 | Incident Response | Test the organizational incident response capability | Out of scope | N/A |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 MA.L2-3.7.1 | 3.7.1 | Maintenance | Perform maintenance on organizational systems | Yes, supports compliance | Kiteworks personnel perform maintenance on FedRAMP Kiteworks systems per documented and audited processes and procedures. |
Level 2 MA.L2-3.7.2 | 3.7.2 | Maintenance | Provide controls on the | Yes, supports compliance | Customer personnel can only perform maintenance using the secure, audited administrative user |
Level 2 MA.L2-3.7.3 | 3.7.3 | Maintenance | Ensure | Yes, supports compliance | The Kiteworks platform can perform a remote wipe of the |
Level 2 MA.L2-3.7.4 | 3.7.4 | Maintenance | Check | Yes, supports compliance | The Kiteworks platform scans CUI for viruses and other malware Anti-Virus software. The platform integrates with Check Point SandBlast and APIs enable integration with |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 MA.L2-3.7.5 | 3.7.5 | Maintenance | Require multi-factor authentication to establish non-local maintenance sessions via external network connections and | Yes, supports compliance | The Kiteworks platform can be configured to require is enforced through integration with third-party authentication solutions that be configured to time out those sessions after a threshold of idle time has been reached. |
Level 2 MA.L2-3.7.6 | 3.7.6 | Maintenance | Supervise | Yes, supports compliance | The |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 1 MP.L1-3.8.3 | 3.8.3 | Media Protection | Sanitize or destroy information system media containing | Yes, supports compliance | The Kiteworks platform can perform a remote wipe of CUI |
Level 2 MP.L2-3.8.1 | 3.8.1 | Media Protection | Protect | Yes, supports compliance | Kiteworks |
Level 2 MP.L2-3.8.2 | 3.8.2 | Media Protection | Limit access to CUI on system media to authorized users | Yes, supports compliance | The Kiteworks platform protects CUI by encrypting |
Level 2 MP.L2-3.8.4 | 3.8.4 | Media Protection | Mark media | Yes, supports compliance | Users can mark |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 MP.L2-3.8.5 | 3.8.5 | Media Protection | Control access to media containing CUI and maintain accountability for media | Yes, supports compliance | The |
Level 2 MP.L2-3.8.6 | 3.8.6 | Media Protection | Implement unless | Yes, supports compliance | The |
Level 2 MP.L2-3.8.7 | 3.8.7 | Media Protection | Control | Out of scope | N/A |
Level 2 MP.L2-3.8.8 | 3.8.8 | Media Protection | Prohibit the use of portable storage devices when such | Out of scope | N/A |
Level 2 MP.L2-3.8.9 | 3.8.9 | Media Protection | Protect the confidentiality of backup CUI at storage locations | Yes, supports compliance | Kiteworks protects the |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 PS.L2-3.9.1 | 3.9.1 | Personnel Security | Screen individuals prior to authorizing access to | Yes, supports compliance | Kiteworks |
Level 2 PS.L2-3.9.2 | 3.9.2 | Personnel Security | Ensure | Yes, supports compliance | The Kiteworks platform protects CUI even when employees or contractors are |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 1 PE.L1-3.10.1 | 3.10.1 | Physical Protection | Limit physical access to orgranizational information systems, equipment, and the respective operating environments | Yes, supports compliance | Kiteworks FedRAMP systems are deployed in controlled |
Level 1 PE.L1-3.10.3 | 3.10.3 | Physical Protection | Escort visitors and | Yes, supports compliance | Kiteworks |
Level 1 PE.L1-3.10.4 | 3.10.4 | Physical Protection | Maintain audit logs of | Yes, supports compliance | Kiteworks maintains audit logs of all physical access of FedRAMP systems. |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 1 PE.L1-3.10.5 | 3.10.5 | Physical Protection | Control and | Yes, supports compliance | Kiteworks |
Level 2 PE.L2-3.10.2 | 3.10.2 | Physical Protection | Protect | Yes, supports compliance | Kiteworks FedRAMP systems |
Level 2 PE.L2-3.10.6 | 3.10.6 | Physical Protection | Enforce safeguarding measures for CUI at | Yes, supports compliance | The |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 RA.L2-3.11.1 | 3.11.1 | Risk Assessment | Periodically assess the risk to organizational operations | Out of scope | N/A |
Level 2 RA.L2-3.11.2 | 3.11.2 | Risk Assessment | Scan for vulnerabilities in | Yes, supports compliance | Kiteworks |
Level 2 RA.L2-3.11.3 | 3.11.3 | Risk Assessment | Remediate | Yes, supports compliance | Kiteworks security engineers prioritize and release fixes per a documented secure software development life cycle. Kiteworks updates and apply |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 CA.L2-3.12.1 | 3.12.1 | Security Assessment | Periodically assess the security controls in organizational systems to determine if | Yes, supports compliance | Kiteworks is SOC-2 |
Level 2 CA.L2-3.12.2 | 3.12.2 | Security Assessment | Develop and implement plans | Yes, supports compliance | Kiteworks is SOC-2 certified, FedRAMP Authorized, |
Level 2 CA.L2-3.12.3 | 3.12.3 | Security Assessment | Monitor security controls on an ongoing basis to ensure the continued effectiveness of the controls | Yes, supports compliance | Kiteworks FedRAMP security controls and incidents are |
Level 2 CA.L2-3.12.4 | 3.12.4 | Security Assessment | Develop, | Yes, supports compliance | Kiteworks is SOC-2 certified, FedRAMP Authorized, |
System and Communications Protection
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 1 SC.L1-3.13.1 | 3.13.1 | System and Communications Protection | Monitor, control, and protect organizational communications (i.e., information | Yes, supports compliance | The Kiteworks platform monitors, controls, and protects |
Level 1 SC.L1-3.13.5 | 3.13.5 | System and Communications | Implement | Yes, supports compliance | The Kiteworks |
Level 2 SC.L2-3.13.2 | 3.13.2 | System and Communications Protection | Employ architectural designs, software development techniques, and systems engineering principles that promote | Yes, supports compliance | The Kiteworks platform has been designed and developed with information security in The platform’s tiered architecture separates on a private |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 SC.L2-3.13.3 | 3.13.3 | System and Communications Protection | Separate | Yes, supports compliance | The Kiteworks platform enforces security controls specific to user roles, Unprivileged users never |
Level 2 SC.L2-3.13.4 | 3.13.4 | System and Communications | Prevent unauthorized and | Yes, supports compliance | Only authorized users and processes can access and share |
Level 2 SC.L2-3.13.6 | 3.13.6 | System and Communications Protection | Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, | Yes, supports compliance | The Kiteworks platform supports the whitelisting and blacklisting of IP addresses and can be configured to deny network traffic |
Level 2 SC.L2-3.13.7 | 3.13.7 | System and Communications | Prevent | Out of scope | N/A |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 SC.L2-3.13.8 | 3.13.8 | System and Communications Protection | Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI | Yes, supports compliance | The Kiteworks platform encrypts CUI in transit using Transport Layer administrators can configure the platform not to accept |
Level 2 SC.L2-3.13.9 | 3.13.9 | System and Communications | Terminate | Yes, supports compliance | The of inactivity. |
Level 2 SC.L2-3.13.10 | 3.13.10 | System and Communications Protection | Establish and manage cryptographic keys for cryptography | Yes, supports compliance | The Kiteworks platform uses keys to encrypt content in transit and at rest. Keys can be managed directly within the Kiteworks platform or stored in a |
Level 2 SC.L2-3.13.11 | 3.13.11 | System and Communications | Employ FIPS-validated cryptography when used to protect the confidentiality | Yes, supports compliance | The Kiteworks |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 SC.L2-3.13.12 | 3.13.12 | System and Communications Protection | Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users | Out of scope | N/A |
Level 2 SC.L2-3.13.13 | 3.13.13 | System and Communications | Control and | Yes, supports compliance | Kiteworks FedRAMP, |
Level 2 SC.L2-3.13.14 | 3.13.14 | System and Communications Protection | Control and monitor the use of Voice over Internet | Out of scope | N/A |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 SC.L2-3.13.15 | 3.13.15 | System and Communications | Protect the | Yes, supports compliance | The Kiteworks platform protects the |
Level 2 SC.L2-3.13.16 | 3.13.16 | System and Communications Protection | Protect the confidentiality of CUI at rest | Yes, supports compliance | The Kiteworks platform protects the confidentiality of CUI at rest through |
System and Information Integrity
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 1 SI.L1-3.14.1 | 3.14.1 | System and Information Integrity | Identify, report, and | Yes, supports compliance | Kiteworks |
Level 1 SI.L1-3.14.2 | 3.14.2 | System and Information Integrity | Provide protection from malicious code at appropriate locations within organizational information systems | Yes, supports compliance | The Kiteworks platform protects against malicious code by scanning CUI |
Level 1 SI.L1-3.14.4 | 3.14.4 | System and Information Integrity | Update | Yes, supports compliance | The Kiteworks platform automatically applies updates to integrated and embedded anti-malware solutions |
Level 1 SI.L1-3.14.5 | 3.14.5 | System and Information Integrity | Perform periodic scans of the information system and | Yes, supports compliance | The Kiteworks platform scans all uploaded files for infections of malware and |
CMMC 2.0 |
NIST SP 800-171 |
Domain |
Practice Description |
Kiteworks Support |
Kiteworks Solution |
Level 2 SI.L2-3.14.3 | 3.14.3 | System and Information Integrity | Monitor system security | Yes, supports compliance | The Kiteworks platform can |
Level 2 SI.L2-3.14.6 | 3.14.6 | System and Information Integrity | Monitor organizational systems, including | Yes, supports compliance | The |
Level 2 SI.L2-3.14.7 | 3.14.7 | System and Information Integrity | Identify unauthorized use of organizational systems | Yes, supports compliance | The Kiteworks platform identifies access attempts by |
Appendix: Kiteworks Alignment
With CMMC 2.0 Level 2 Practices
Practice Area |
Kiteworks Compliant |
Shared Responsibility |
Out of Scope |
Total |
Access Control | 18 | 1 | 3 | 22 |
Awareness and Training | 1 | 2 |
| 3 |
Audit and Accountability | 9 |
|
| 9 |
Configuration Management | 9 |
|
| 9 |
Identification and Authentication | 11 |
|
| 11 |
Incident Response | 1 | 1 | 1 | 3 |
Maintenance | 6 |
|
| 6 |
Media Protection | 7 |
| 2 | 9 |
Personnel Security | 2 |
|
| 2 |
Physical Protection | 6 |
|
| 6 |
Risk Assessment | 2 |
| 1 | 3 |
Security Assessment | 4 |
|
| 4 |
System and Communications Protection | 13 |
| 3 | 16 |
System and Information Integrity | 7 |
|
| 7 |
Total | 96 | 4 | 10 | 110 |