🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create a Practical Implementation Checklist for Monitoring and Controlling Communications for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.1

Practical step-by-step checklist to monitor, control, and protect organizational communications to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control SC.L2-3.13.1 with real-world examples for small businesses.

March 27, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to build a practical, auditable implementation checklist to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control SC.L2-3.13.1 — “Monitor, control, and protect organizational communications (e.g., voice, email, instant messaging) at external boundaries and key internal boundaries” — with concrete steps, technical configuration notes, small-business scenarios, and compliance evidence tips.

Key objectives and scope for Compliance Framework implementers

The primary objectives for this Control are to ensure communications that can carry Controlled Unclassified Information (CUI) are: (1) protected in transit, (2) monitored for misuse or exfiltration, (3) controlled at network and application boundaries, and (4) auditable with retained logs and documented procedures. Scope your checklist to include external boundaries (internet gateways, cloud egress, email relays) and key internal boundaries (VLANs, segmentation between business and engineering systems, enclave boundaries where CUI is processed).

Practical implementation checklist — step-by-step

Use this checklist as the backbone of your implementation plan; mark each item with a status, owner, date, and evidence location: 1) Inventory communication channels (email domains, SIP/VoIP systems, chat apps, third-party APIs) and classify which channels may carry CUI; 2) Document external and internal boundaries (firewalls, cloud VPCs, VLAN IDs, subnets) and draw a simple network boundary diagram; 3) Apply encryption-in-transit minimums (TLS 1.2+, cipher suites documented) and enforce MTA TLS for email and SRTP/TLS for voice where applicable; 4) Deploy boundary controls — perimeter firewall rules, secure web gateway/CASB for SaaS, email filtering/DLP, and egress filtering for cloud workloads; 5) Implement logging and forwarding of network, email, and application logs to a central SIEM (syslog/TLS or native cloud ingest) with retention policy and access controls; 6) Configure detection rules and alerts for data exfiltration patterns, anomalous outbound connections, and large attachments to external addresses; 7) Maintain playbooks for alert triage, evidence preservation, and incident escalation defined to CMMC/NIST roles; 8) Produce artifacts for evidence: diagrams, rule/configuration exports, DLP policy screenshots, log retention settings, and incident playbooks.

Technical control details and configuration tips

Be specific when you implement: enforce TLS 1.2+ on MTAs and disable weak ciphers (e.g., avoid RC4, 3DES); publish and validate SPF, DKIM, and DMARC records for your domains and enforce quarantine/reject at DMARC for high risk; enable opportunistic TLS is not enough — require TLS with strict validation for partner endpoints when exchanging CUI. For logging, forward firewall and proxy logs to a SIEM using TLS-encrypted syslog (RFC 5425) or native cloud ingestion (CloudWatch Logs, Azure Monitor) and normalize events to a common schema (CEF/LEEF). Configure retention aligned to your contract/audit requirements — a pragmatic baseline is 1 year for network/transport logs and 90 days for verbose application debug logs unless contract specifies otherwise. For internal segmentation, implement VLANs + ACLs at switch/firewall plus host-based firewall rules and consider a host-based agent (Wazuh/OSSEC) for lateral movement detection; document ACL rule justification and a change control record for each rule.

Small-business scenarios and real-world examples

Example A — 20-person small defense subcontractor using Microsoft 365: enable Defender for Office 365, create DLP policies that fingerprint CUI (keywords, patterns), enforce TLS for outbound mail, enable mailbox auditing, forward Office 365 audit logs to a central SIEM (use Azure Sentinel or a managed SIEM), and apply conditional access policies to require MFA for external access. Evidence: export DLP policy configuration, audit log ingestion confirmation, and conditional access policy screenshots. Example B — 10-person manufacturer using a VPS-hosted app and cloud email: use a managed firewall/VPC security group with explicit egress deny-all except allowed ports, deploy a cloud-native WAF, use a CASB for SaaS visibility, and subscribe to a Managed Detection & Response (MDR) provider for 24/7 monitoring if staff are limited; evidence: provider SLA, MDR rule set, and network diagrams showing enforced egress rules.

Compliance tips and best practices

Prioritize controls that provide the most risk reduction per effort: email DLP + SPF/DKIM/DMARC and central log aggregation are high-value. Maintain a living boundary diagram and change control log; auditors will look for "who changed what and why" for firewall rules and DLP exceptions. Create templates for evidence collection — e.g., a checklist row showing a screenshot of a firewall policy with timestamp, export of matching SIEM events for a test alert, and the corresponding runbook. Automate tests: schedule daily/weekly checks for TLS validation, DMARC reports parsing, and simulated data exfiltration tests (non-production data) to validate DLP rules. If resource-constrained, adopt managed services for SIEM, email protection, and CASB but ensure you retain contractual rights to logs and a documented onboarding/offboarding process with those vendors.

Risks of not implementing SC.L2-3.13.1

Failing to monitor and control communications exposes CUI to accidental or malicious exfiltration, increases susceptibility to phishing and business email compromise, and can lead to contract penalties, lost contracts, and reputational damage. On the technical side, lack of boundary monitoring means lateral movement and data exfiltration can go undetected for long periods; missing logs or short retention destroys your ability to perform forensic analysis and demonstrate compliance during a CMMC assessment or a DFARS audit.

Summary

Converting SC.L2-3.13.1 into a practical checklist means scoping communications and boundaries, applying encryption and boundary controls, centralizing and retaining logs, implementing detection and incident runbooks, and producing auditable artifacts — all documented with owners and evidence. For small businesses, focus on high-impact, low-effort controls (email protections, DLP, SIEM/log forwarding) and use managed services where necessary, but keep ownership of evidence and playbooks. Use the checklist above as a living document: run periodic tests, capture screenshots/exports for evidence, and update controls as your environment or contracts change to maintain continuous compliance with the Compliance Framework.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes