CMMC Update by Glenda R. Snodgrass for The Net Effect
[ View this email in your web browser ] [ Visit our archives ] [ Sign Up for this Newsletter ]

December 3, 2025

Understanding External Connections

Here's another one of the most misunderstood controls in CMMC, and this is a requirement for both L1 and L2! Let's start with the control and its associated assessment objectives (AOs) from the L1 and L2 Assessment Guides:



AC.L1-B.1.III – EXTERNAL CONNECTIONS [FCI DATA]
AC.L2-3.1.20 – EXTERNAL CONNECTIONS [CUI DATA]

Verify and control/limit connections to and use of external systems.
ASSESSMENT OBJECTIVES [NIST SP 800-171A]
Determine if:
[a] connections to external systems are identified;
[b] the use of external systems is identified;
[c] connections to external systems are verified;
[d] the use of external systems is verified;
[e] connections to external systems are controlled/limited; and
[f] the use of external systems is controlled/limited.


First, what exactly is an external system?

External systems are systems or components of systems for which organizations typically have no direct supervision and authority over the application of security requirements.... This requirement also addresses the use of external systems for the processing, storage, or transmission of FCI/CUI, including accessing cloud services (e.g., infrastructure as a service, platform as a service, or software as a service) from organizational systems.

Ah, interesting. I've seen SSPs that claim there are no external connections, but it's because they misunderstood, thinking it had to be something like a VPN to a third-party network. I've also seen people complaining "We have to list every website?!!?" Nope, you're going too far the other way. (Hint: The whole lnternet is *never* in scope. Run when someone says this. It means they don't understand the controls.)

So what really qualifies as an external system for this control and how?

It's about the data. Does this external system process, store or transmit (p/s/t) protected data (FCI or CUI)?

So you need to look at all the authorized cloud services in your organization and decide which ones are used to p/s/t your data, and which ones are used for which types of data (e.g., Public, Company Proprietary, Customer Data, FCI, CUI, PHI, PII)

Common examples of external systems are Adobe CS, Dropbox, AutoCAD, ERP, Accounting, etc.

To meet this control and its AOs, you need to:

  • conduct security assessments on all external systems to determine which data type(s) may be p/s/t there
  • maintain a list of approved external systems and which data type(s) may be p/s/t there
  • post the list in a place where all employees can reference it
  • include the contents and location of this list in employee training
  • demonstrate how you control/limit connections to and use of these external systems (firewall, anyone?)

Et voilà! Now you understand external connections.

Still not sure? Ping me!

A Lead CCA’s Breakdown of How to Prepare for a Level 2 Assessment

If you missed this webinar, the recording is available on YouTube

A practical discussion on what organizations can do to prepare for CMMC Level 2 assessments — directly from a Lead CCA’s perspective.

Key Takeaways:

  • How to structure and organize your readiness efforts before engaging with a C3PAO
  • Common pitfalls that slow down assessment progress (and how to avoid them)
  • Real-world tips to make your assessment process more efficient and effective

    Glenda R. Snodgrass Sincerely,

    Glenda R. Snodgrass, CCP/CCA/Lead CCA
    grs@theneteffect.com
    The Net Effect, LLC
    www.theneteffect.com
    251-433-0196 x107

Speak with an Expert

Contact

The Net Effect, L.L.C.
Post Office Box 885
Mobile, Alabama 36601-0885 (US)
phone: (251) 433-0196
email: sales at theneteffect dot com
Secure Payment Center






The Net Effect, LLC

Copyright 1996-2025 The Net Effect, L.L.C. All rights reserved. Read our privacy policy