# CMMC 2.0 Level 1 Checklist β Foundational (17 Practices)
**Source:** FAR 52.204-21 / NIST SP 800-171 Rev 2
**Applies To:** Contractors handling Federal Contract Information (FCI)
**Assessment Type:** Annual Self-Assessment
> **How to use:** Mark each practice β
Implemented | π In Progress | β Not Implemented | N/A Not Applicable
---
## Domain 1: Access Control (AC)
| # | Practice ID | Requirement | Status | Notes |
|---|---|---|---|---|
| 1 | AC.L1-3.1.1 | Limit system access to authorized users, processes, and devices | β | |
| 2 | AC.L1-3.1.2 | Limit system access to the types of transactions and functions authorized users are permitted to execute | β | |
| 3 | AC.L1-3.1.20 | Verify and control all connections to external systems | β | |
| 4 | AC.L1-3.1.22 | Control CUI posted or processed on publicly accessible systems | β | |
---
## Domain 2: Identification & Authentication (IA)
| # | Practice ID | Requirement | Status | Notes |
|---|---|---|---|---|
| 5 | IA.L1-3.5.1 | Identify information system users, processes, and devices | β | |
| 6 | IA.L1-3.5.2 | Authenticate the identities of users, processes, or devices before allowing access | β | |
---
## Domain 3: Media Protection (MP)
| # | Practice ID | Requirement | Status | Notes |
|---|---|---|---|---|
| 7 | MP.L1-3.8.3 | Sanitize or destroy system media before disposal or reuse | β | |
---
## Domain 4: Physical Protection (PE)
| # | Practice ID | Requirement | Status | Notes |
|---|---|---|---|---|
| 8 | PE.L1-3.10.1 | Limit physical access to systems to authorized individuals | β | |
| 9 | PE.L1-3.10.3 | Escort visitors and monitor visitor activity | β | |
| 10 | PE.L1-3.10.4 | Maintain audit logs of physical access | β | |
| 11 | PE.L1-3.10.5 | Control and manage physical access devices | β | |
---
## Domain 5: System & Communications Protection (SC)
| # | Practice ID | Requirement | Status | Notes |
|---|---|---|---|---|
| 12 | SC.L1-3.13.1 | Monitor, control, and protect communications at external boundaries and key internal boundaries | β | |
| 13 | SC.L1-3.13.5 | Implement subnetworks for publicly accessible system components | β | |
---
## Domain 6: System & Information Integrity (SI)
| # | Practice ID | Requirement | Status | Notes |
|---|---|---|---|---|
| 14 | SI.L1-3.14.1 | Identify, report, and correct system flaws in a timely manner | β | |
| 15 | SI.L1-3.14.2 | Provide protection from malicious code at appropriate locations | β | |
| 16 | SI.L1-3.14.4 | Update malicious code protection mechanisms when new releases are available | β | |
| 17 | SI.L1-3.14.5 | Perform periodic scans and real-time scans of files from external sources | β | |
---
## Summary Score
| Status | Count |
|---|---|
| β
Implemented | /17 |
| π In Progress | /17 |
| β Not Implemented | /17 |
| N/A | /17 |
**Score:** ___/110 (using SPRS scoring methodology)
---
## Next Steps
- [ ] Document all implemented controls in your System Security Plan (SSP)
- [ ] Create POA&M entries for all gaps
- [ ] Set remediation target dates
- [ ] Submit SPRS score at [piee.eb.mil](https://piee.eb.mil)
---
*For Level 2 assessment, see `CMMC-Level-2-Checklist.md`*
*Questions? Contact FraterIT Enterprises β info@fraterit.com*
Screenshot when done, then I'll give you File 2 of 3 for cmmc-checklist.