Last 24 hours · Apr 11, 2026 00:00 – Apr 12, 2026 00:00 UTC Demonstration Mode (synthetic data) Generated: 2026-04-12 00:00:32 UTC

CMMC Level 2 — Compliance Overview

CMMC Level 2 requires implementation of 110 NIST SP 800-171 Rev 2 practices across 14 control families. This report maps Rockfish NDR evidence to the network-relevant controls. Controls marked <b>Monitored</b> have automated evidence from network telemetry. Controls marked <b>Partial</b> have supporting data but require additional organizational processes. Controls marked <b>Manual</b> require policy documentation outside NDR scope.

29
Network Controls Mapped
22
Monitored by NDR
7
Partial Evidence
0
Manual / Policy
76%
Automated Coverage

NIST 800-171 Control Mapping

Network-relevant controls from NIST SP 800-171 Rev 2 mapped to Rockfish NDR evidence sources. Each control shows the evidence type and current monitoring status.

ControlFamilyRequirementEvidence SourceStatus
3.1.1Access ControlLimit system access to authorized usersFlow records, connection pairsMonitored
3.1.2Access ControlLimit system access to authorized functionsPort/protocol analysis, app identificationMonitored
3.1.3Access ControlControl the flow of CUI per authorizationsFlow orientation (ii/ie/ei/ee), boundary monitoringMonitored
3.1.5Access ControlEmploy least privilegePort/service enumeration per hostPartial
3.1.12Access ControlMonitor and control remote access sessionsExternal connection tracking, VPN/RDP detectionMonitored
3.1.14Access ControlRoute remote access via managed access control pointsFlow orientation, boundary traversal analysisMonitored
3.3.1Audit & AccountabilityCreate and retain system audit recordsFlow, alert, DNS, TLS Parquet recordsMonitored
3.3.2Audit & AccountabilityEnsure traceability of user actionsTimestamped flows with src/dst, port, protocolMonitored
3.3.3Audit & AccountabilityReview and update logged eventsAutomated report generation, scheduled reportsMonitored
3.3.4Audit & AccountabilityAlert on audit logging process failuresProbe health monitoring, data gap detectionPartial
3.3.5Audit & AccountabilityCorrelate audit record review and reportingNDR report dashboard, cross-source correlationMonitored
3.4.1Config ManagementEstablish and maintain baseline configsDevice inventory, baseline deviation detectionPartial
3.4.9Config ManagementControl and monitor user-installed softwarenDPI application identification, port scanningMonitored
3.6.1Incident ResponseEstablish incident-handling capabilityIDS alerts, MITRE ATT&CK mapping, threat findingsMonitored
3.6.2Incident ResponseTrack, document, and report incidentsAlert timeline, severity tracking, hunt findingsMonitored
3.11.2Risk AssessmentScan for vulnerabilities periodicallynDPI risk scoring, anomaly detectionPartial
3.11.3Risk AssessmentRemediate vulnerabilities per assessmentsThreat findings with severity, IP reputation scoresPartial
3.13.1System & Comms ProtectionMonitor and protect communications at boundariesFlow orientation, boundary traffic analysisMonitored
3.13.2System & Comms ProtectionEmploy architectural designs to protect CUINetwork graph, subnet segmentation analysisPartial
3.13.5System & Comms ProtectionImplement subnetworks for publicly accessible componentsFlow orientation, VLAN tracking, subnet analysisMonitored
3.13.6System & Comms ProtectionDeny network traffic by defaultBlocked flow detection, firewall rule evidencePartial
3.13.8System & Comms ProtectionImplement cryptographic mechanisms for CUI in transitTLS version compliance, encryption analysisMonitored
3.13.11System & Comms ProtectionEmploy FIPS-validated cryptographyTLS 1.2+ enforcement, cipher suite analysisMonitored
3.13.15System & Comms ProtectionProtect authenticity of communications sessionsJA4 fingerprinting, TLS certificate validationMonitored
3.14.1System & Info IntegrityIdentify, report, and correct system flawsIDS alerts, nDPI risk scoringMonitored
3.14.2System & Info IntegrityProvide protection from malicious codeSuricata signature matching, threat detectionMonitored
3.14.3System & Info IntegrityMonitor security alerts and advisoriesIP reputation, threat intel integrationMonitored
3.14.6System & Info IntegrityMonitor organizational systemsContinuous flow capture, anomaly detection, beaconingMonitored
3.14.7System & Info IntegrityIdentify unauthorized use of systemsBehavioral anomalies, new connection pairs, DGA detectionMonitored

Evidence Detail

AU — Audit Record Coverage

Volume of audit records by event type during the reporting period (NIST 3.3.1, 3.3.2).

Event Type Records %
Flow Records 1,482,391 45.6
DNS Queries 1,023,847 31.5
TLS Sessions 578,416 17.8
IDS Alerts 8,655 0.3

SC — Encryption Compliance (TLS)

TLS version distribution across encrypted connections. NIST 3.13.8 and 3.13.11 require FIPS-validated cryptography — TLS 1.2+ with approved cipher suites satisfies this requirement.

TLS Version Connections %
TLSv1.3 412,847 71.4
TLSv1.2 148,293 25.6
TLSv1.1 12,384 2.1
TLSv1.0 4,892 0.9

SC — Network Boundary Monitoring

Traffic flow orientation showing internal/external boundary crossings. Evidences NIST 3.13.1 (boundary monitoring) and 3.1.3 (CUI flow control).

Direction Flows Traffic (GB) Sources Destinations
ii 842,193 284.70 187 203
ie 384,712 142.30 164 4,847
ei 218,493 87.60 2,384 82
ee 36,993 8.20 847 1,203

SI — Intrusion Detection

IDS alert distribution by severity. Evidences NIST 3.14.1 (flaw identification), 3.14.2 (malicious code protection), 3.14.6 (system monitoring), 3.14.7 (unauthorized use detection).

Severity Alerts Sources Targets %
Critical 23 7 12 0.3
High 847 42 128 9.8
Medium 4,892 187 634 56.5
Low 2,893 124 412 33.4

IR — Incident Categories

Alert categories mapped for incident handling (NIST 3.6.1, 3.6.2).

Category Incidents Max Severity Affected Hosts
Attempted Information Leak 2,184 Critical 47
A Network Trojan was Detected 847 Critical 12
Potentially Bad Traffic 1,892 High 89
Misc Attack 1,247 High 34
Attempted Administrator Privilege Gain 384 Critical 8
Policy Violation 892 High 67
Potential Corporate Privacy Violation 472 High 42
Attempted Denial of Service 247 High 6
Web Application Attack 312 High 18
Not Suspicious Traffic 178 Low 124

Gap Analysis

CMMC Level 2 includes 110 total practices. The controls below are outside NDR scope and require organizational policy, physical security, or HR processes.

FamilyControlsRequirementStatus
AT — Awareness & Training3.2.1–3.2.3Security awareness training, role-based training programsOut of Scope
IA — Identification & Authentication3.5.1–3.5.11Multi-factor auth, password policies, identity managementOut of Scope
MA — Maintenance3.7.1–3.7.6System maintenance procedures, maintenance tools, remote maintenanceOut of Scope
MP — Media Protection3.8.1–3.8.9CUI media handling, sanitization, transport, storage, markingOut of Scope
PE — Physical Protection3.10.1–3.10.6Facility access, visitor management, physical access logsOut of Scope
PS — Personnel Security3.9.1–3.9.2Personnel screening, CUI access on termination/transferOut of Scope