TroutTrout

Matriz de Responsabilidad Compartida CMMC.

87 de 110 controles NIST 800-171 aplicados a nivel de red. Los 23 restantes son controles de proceso del cliente.

¿Qué es una Matriz de Responsabilidad Compartida CMMC?

Una Matriz de Responsabilidad Compartida (SRM) mapea cada control NIST 800-171 a la parte responsable de aplicarlo. Para entornos on-premise con Access Gate, la SRM divide 110 controles en tres categorías: controles aplicados por Access Gate, controles del cliente, y controles compensatorios para activos OT.

87Controls enforced by Access Gate
23Controls owned by the customer
6Control families with TAG coverage
110Total NIST 800-171 controls
Matriz de Responsabilidad

Desglose por Familia de Controles.

Cada fila muestra una familia de controles NIST 800-171, cuántos aplica Access Gate, y qué debe poseer el cliente.

Access Control (AC)20/22
Access Gate

Identity-based access control, RBAC, session-level enforcement, least-privilege policies. All enforced at network proxy layer.

Customer

Physical access control policies (PE overlap), mobile device policies.

Audit & Accountability (AU)9/9
Access Gate

Tamper-evident session logs, user identity attribution, SIEM forwarding, log retention, automated alerting.

Customer

None. Full coverage.

Configuration Management (CM)7/9
Access Gate

Baseline configuration enforcement, change tracking, overlay network topology versioning.

Customer

Software inventory processes, configuration change approval workflows.

Identification & Authentication (IA)11/11
Access Gate

MFA enforcement at proxy boundary, identity gateway, credential management, replay-resistant authentication.

Customer

None. Full coverage.

System & Communications Protection (SC)14/16
Access Gate

TLS/FIPS encryption on CUI paths, deny-by-default, microsegmentation, overlay isolation, session boundary enforcement.

Customer

Endpoint DLP for removable media (SC 3.13.16), public-access system separation policies.

Incident Response (IR)2/3
Access Gate

Automated incident detection from session anomalies, alert correlation, forensic session replay.

Customer

Incident response plan documentation, reporting chain, external notification procedures.

Physical Protection (PE)0/5
Access Gate

Not applicable. Network-layer enforcement does not cover physical security.

Customer

Facility access control, visitor logs, physical perimeter, environmental controls, delivery/removal procedures.

Personnel Security (PS)0/2
Access Gate

Not applicable. Personnel screening is an organizational process.

Customer

Background checks, termination procedures, personnel screening.

Media Protection (MP)0/9
Access Gate

Not applicable. Physical media handling is outside network enforcement scope.

Customer

Removable media policies, sanitization, marking, storage, transport, disposal.

Risk Assessment (RA)0/3
Access Gate

Passive asset discovery supports risk visibility. Active vulnerability scanning of OT assets documented as NA with rationale.

Customer

Risk assessment processes, vulnerability scanning (documented NA for OT with compensating controls).

Controles Compensatorios OT

Controles que los PLC No Pueden Cumplir.

Los activos OT como PLCs, CNCs y HMIs no pueden ejecutar agentes, aplicar MFA o generar logs de auditoría. Access Gate proporciona controles compensatorios a nivel de red.

IA 3.5.3

Multi-Factor Authentication

Production machines, CNC controllers, and quality inspection stations have no native identity stack. Access Gate enforces MFA at the proxy layer before any session reaches the equipment.

AU 3.3.1/3.3.2

Audit Logging

Legacy production equipment generates no audit logs. Access Gate captures tamper-evident session logs with user identity, timestamp, protocol, and payload for every connection.

SC 3.13.8

Encryption in Transit

Industrial protocols on CNC cutters, labeling systems, and factory controllers transmit in plaintext. Access Gate enforces TLS/FIPS encryption on CUI paths.

AC 3.1.1/3.1.2

Access Control

Shop floor equipment accepts any connection on its open port. Access Gate enforces RBAC at the proxy boundary per user, asset, protocol, and time window.

SC 3.13.6

Deny by Default

Production machines and quality scanners have no connection filtering. Access Gate enforces deny-all with explicit allowlist exceptions.

Related Hub

CMMC Compliance for On-Premise

Case studies, blog posts, and solution pages for CMMC compliance on existing networks.

CMMC on-premise compliance hub
Related Resource

DoD Zero-Trust OT Alignment

DTM 25-003 pillar mapping for Access Gate across all 7 DoD OT-ZT pillars.

DoD Zero-Trust OT alignment guide
Open Source · Apache-2.0

Pair With Open-CMMC for the CUI Enclave Side.

The Matrix maps each NIST 800-171 control to a responsible party. Open-CMMC is the open-source implementation of the enclave side — per-control posture and gap-analysis docs ready to paste into your SSP.

Explore Open-CMMC
FAQ

FAQ Matriz de Responsabilidad Compartida.

87

de 110 controles NIST 800-171 aplicados por Access Gate a nivel de red.

A Shared Responsibility Matrix maps every NIST 800-171 control required for CMMC Level 2 to the party responsible for enforcing it.

PLCs, CNCs, and HMIs typically cannot meet controls requiring multi-factor authentication (IA 3.5.3), audit logging (AU 3.3.1/3.3.2), encryption in transit (SC 3.13.8), access control with least privilege (AC 3.1.1/3.1.2), and deny-by-default network communications (SC 3.13.6).

A compensating control is an alternative security measure that provides equivalent protection when the standard control cannot be implemented on the asset.

Access Gate enforces 87 of 110 NIST 800-171 controls at the network layer. Full coverage in Audit (9/9) and Identification and Authentication (11/11).

Customer-owned controls fall into four categories: Physical Protection (PE), Personnel Security (PS), Media Protection (MP), and Risk Assessment (RA).

Provide the SRM to your assessor before the assessment begins. It establishes which controls are enforced by Access Gate with technical evidence.

Yes. The base SRM covers the standard Access Gate deployment. Your specific environment may shift some controls.

The SRM is versioned alongside Access Gate releases. When new enforcement capabilities are added, the SRM is updated.

Obtenga Su Matriz de Responsabilidad Compartida.

El equipo Trout adaptará la SRM a su instalación, activos y cronograma de cumplimiento.

Contáctenos