SC.L2-3.13.1[a] – Identify boundary protection methods.

This objective requires your organization to identify the methods, technologies, and practices used to protect system boundaries—particularly where Controlled Unclassified Information (CUI) flows between internal and external networks or systems.

SC.L2-3.13.2[c] – Determine if system connections are authorized.

This objective verifies that your organization has formally authorized all system connections that process, store, or transmit Controlled Unclassified Information (CUI). You must ensure each connection is approved before it becomes operational and that authorization is documented and traceable.

🍪 We Use Cookies

To enhance your experience and analyze site usage, we use cookies. By continuing to use our site, you agree to our use of cookies in accordance with our Privacy Policy.