3.1 — Access Control 22 requirements
Who can get in, and what they can touch
This is the largest family. It covers who has access to your systems, what they're authorized to do, and how access is controlled and monitored. The principle of least privilege is central: users and processes should only have access to what they need to do their job. Remote access, mobile devices, and shared accounts all fall here.
User access controls
Least privilege
Remote access
Wireless access
Mobile devices
3.2 — Awareness and Training 3 requirements
Does your team know how to recognize and respond to threats?
Security tools don't prevent phishing. Trained people do. This family requires that everyone with access to your systems understands their security responsibilities and the risks they face. That means documented, recurring security awareness training and role-specific training for people with elevated privileges or access.
Security awareness training
Role-based training
Insider threat awareness
3.3 — Audit and Accountability 9 requirements
Can you tell what happened and who did it?
Every significant action on your systems should be logged, and those logs should be protected and reviewed. If you experience an incident, audit logs are what investigators use to understand what happened, when, how far the attacker got, and what they accessed. This family also requires that users know their activity is being monitored.
Audit log creation
Log protection
Log review
User activity tracking
3.4 — Configuration Management 9 requirements
Are your systems set up securely from the start?
Default configurations on software and hardware are almost always insecure. This family requires baseline configurations for systems, documented and enforced, with changes tracked and controlled. In manufacturing, this includes production systems and any equipment with a digital interface. Unauthorized software, open ports, and default passwords all represent failures here.
Baseline configurations
Change control
Software inventory
Least functionality
3.5 — Identification and Authentication 11 requirements
Do you know for certain who is accessing your systems?
Every user, device, and process that accesses your systems must be uniquely identified and authenticated. This family covers password policies, multi-factor authentication, and how shared or service accounts are managed. Weak or reused passwords are among the most common entry points for manufacturing ransomware and BEC. MFA for privileged accounts is explicitly required.
Multi-factor authentication
Password complexity
Service accounts
Device authentication
3.6 — Incident Response 3 requirements
Do you have a plan that your team has actually practiced?
This family requires a documented incident response capability: a plan, defined roles, a process for containing and recovering from incidents, and evidence that you've tested it. In Michigan, this connects to the MC3 (Michigan Cyber Command Center) reporting process and, soon, to CIRCIA's 72-hour federal reporting requirement. A plan that exists only in a document doesn't satisfy this family.
Incident response plan
Response testing
Incident tracking
3.7 — Maintenance 6 requirements
Is maintenance of your systems done securely?
System maintenance, including vendor remote access for support, must be controlled and monitored. This is especially relevant for manufacturers whose OT equipment is maintained remotely by vendors. Uncontrolled vendor access is one of the most exploited entry points in manufacturing environments. This family requires that maintenance is authorized, logged, and reviewed.
Maintenance controls
Remote maintenance
Maintenance logging
Equipment sanitization
3.8 — Media Protection 9 requirements
How do you handle physical and digital media containing CUI?
CUI isn't just on servers. It can be on USB drives, printed documents, laptops, portable drives, and decommissioned equipment. This family requires that media containing CUI is controlled, labeled, protected during transport, and sanitized or destroyed before disposal. This is a common gap in manufacturing environments where portable media moves between systems regularly.
Media access controls
Media marking
Media transport
Media sanitization
Media disposal
3.9 — Personnel Security 2 requirements
Are the people with access to CUI appropriately screened?
This is the smallest family by requirement count, but it covers a meaningful risk. Personnel with access to CUI should be vetted before that access is granted, and access should be terminated promptly and completely when someone leaves. The insider threat risk to manufacturing organizations is real, and this family requires that organizations address it systematically.
Personnel screening
Access termination
3.10 — Physical Protection 6 requirements
Can unauthorized people physically access your systems or CUI?
Physical security is part of 800-171. Systems, equipment, and environments that process or store CUI must be physically protected from unauthorized access. This includes facility access controls, visitor management, and monitoring of physical environments. For manufacturers, this extends to the shop floor when production systems process or store contract-related data.
Physical access controls
Visitor management
Physical monitoring
Equipment protection
3.11 — Risk Assessment 3 requirements
Do you understand and document your risk?
Organizations must periodically assess the risk to their operations, assets, and individuals from the operation of their systems. This means identifying threats, evaluating vulnerabilities, and making informed decisions about what to address first. An undocumented risk assessment doesn't satisfy this family. A STACK gap analysis directly addresses these requirements.
Risk assessment process
Vulnerability scanning
Risk remediation
3.12 — Security Assessment 4 requirements
Do you regularly evaluate whether your controls are working?
Implementing controls isn't enough. You need to verify they're working as intended, identify and remediate deficiencies, and maintain a System Security Plan (SSP) that documents your security posture. The SSP is one of the most critical artifacts for CMMC assessment. It must be current, accurate, and reference every 800-171 requirement with evidence of how it's met.
System Security Plan (SSP)
Control testing
Plan of Action (POAM)
Ongoing monitoring
3.13 — System and Communications Protection 16 requirements
Is CUI protected in transit and across system boundaries?
The second-largest family. This covers how information is protected as it moves across your network, between systems, and outside your organization. Network segmentation, encryption of data in transit, monitoring of communications at external boundaries, and protection against network attacks all fall here. For manufacturers with connected OT environments, segmentation between IT and OT is directly addressed by this family.
Network segmentation
Data-in-transit encryption
Boundary protection
Network monitoring
Session encryption
3.14 — System and Information Integrity 7 requirements
Can you identify and respond to threats in your environment?
This family covers the detection side: antimalware, security alerts, monitoring for anomalous activity, and patching known vulnerabilities in a timely manner. The CISA Known Exploited Vulnerabilities catalog is directly relevant here. If a vulnerability in your environment appears on the CISA KEV list, 800-171 requires you to address it. Manufacturers with legacy systems and infrequent patching cycles are often significantly exposed in this family.
Anti-malware
Security alerts
Patch management
Anomaly detection