Select Page
Back to Full CMMC & NIST800-171 Requirements List

CMMC Practice Requirement:

System and Information Integrity – SI.2.217

Identify unauthorized use of organizational systems.

System and Information Integrity – SI.2.217- Clarification Statement

Organizations should define authorized use of their systems. First, have an acceptable-use policy for your system. This policy establishes the baseline for how users access devices and the internet. You define authorized use by specific roles within the organization. Examples of these roles include user, administrator, and technician. After you define authorized use, identify unauthorized use of systems.

Organizations can monitor systems by observing audit activities. You can do this in real time or by other manual means, such as access patterns. To identify unauthorized use, leverage existing tools and techniques, such as:

  • intrusion detection systems;
  • intrusion prevention systems;
  • malicious code protection software;
  • scanning tools;
  • audit record monitoring software; and
  • network monitoring software.

​​

Need more help understanding this CMMC & NIST800-171 requirement?

ChatFortress has made available a series of tools to help you implement CMMC & NIST800-171 into your company. Here are some of the resources you might want to review.

How to Implement a CMMC Audit/Assessment using CMMC Software Tool?

How can ChatFortress help you implement CMMC?

Are you worried that your company is vulnerable to ransomware?

The Business Cybersecurity System protects you against real-world threats while building your cybersecurity culture. Using the latest in breach and attack simulation our team can show you which ransomware and malware attacks would cripple your company regardless of the cybersecurity protections you already have in place!

Who is ChatFortress

ChatFortress is a leading cybersecurity company that helps small and medium-size companies protect themselves from hacking attempts. Using Cybersecurity AI, Gamified cybersecurity awareness programs and providing virtual security analysts. Our goal is to help you create a cybersecurity aware culture.