🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.3: Step-by-Step Guide to Separate User Functionality from System Management Functionality

Step-by-step practical guidance to separate user functionality from system management functionality to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requirements for small businesses.

•
April 02, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

SC.L2-3.13.3 requires that you separate user functionality from system management functionality so that routine user activity cannot access, bypass, or accidentally modify administrative controls — a practical control that reduces risk and supports NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 compliance for small and mid-size organizations.

Why separation matters (risk and objectives)

When administrative interfaces (management consoles, privileged APIs, SSH/telnet, SNMP write, local admin accounts) are reachable or used by normal users or user-facing systems, the attack surface increases dramatically. An exposed or shared admin path enables privilege escalation, unauthorized configuration changes, lateral movement, and easier malware persistence. For Compliance Framework objectives, this control reduces the likelihood that user-facing systems can interfere with confidentiality, integrity, or availability of Controlled Unclassified Information (CUI) and helps produce clear audit trails for management activities.

Step-by-step implementation approach

1) Inventory and classify management interfaces

Start by inventorying all devices and services that expose management functionality: network devices (switches, routers, firewalls), servers (SSH, RDP, IPMI/BMC), virtual infrastructure (vSphere, Hyper-V), cloud consoles/APIs, applications with admin dashboards, and SNMP write or NetConf endpoints. Record how each is accessed (protocol, port, IP range), who has accounts, and whether the interface is in-band (same network as users) or out-of-band (dedicated management network).

2) Design a separation architecture

For small business networks, the usual, low-cost designs are: a) a dedicated management VLAN/subnet logically separated by ACLs from user subnets, b) an out-of-band (OOB) management network for infrastructure devices, or c) cloud-provider controls that restrict management APIs to jump hosts or specific IP ranges. Example: create a management VLAN 10.10.10.0/24 accessible only from a hardened jump host at 10.10.10.5, and block user VLANs (192.168.1.0/24) from reaching 10.10.10.0/24 except where explicitly allowed for monitoring.

3) Implement least-privilege access and RBAC

Ensure admin tasks require separate privileged accounts — do not use the same credentials or sessions that users use for email or browsing. Implement role-based access control (RBAC) or privileged access management (PAM) solutions so administrative privileges are granted only when needed. Small businesses can start with Azure AD roles, AWS IAM roles, or local Active Directory groups for segregation, and consider free/open-source PAM (e.g., Vault with the SSH secret backend) or Microsoft LAPS for local admin password rotation.

4) Harden and secure management access

Harden management interfaces: disable unused protocols (telnet, SNMP v1/2 write), enforce SSH key-based authentication and strong cipher suites, enable MFA for consoles and VPNs, and restrict source IPs with firewall rules. Example firewall rule (conceptual): allow tcp/22 to management devices only from the jump host IP, deny from user VLANs. For cloud: restrict console/API access by policy to a bastion host and enforce MFA via conditional access policies.

5) Use jump hosts, bastions, or out-of-band management

Require administrators to access a hardened jump host (bastion) that is itself tightly controlled, monitored, and multi-factor authenticated. The jump host should have no internet browsing, minimal software, and comprehensive logging shipped to your central SIEM or log collector. For network gear, use out-of-band serial or OOB management networks when possible to physically or logically separate management plane traffic from user traffic.

6) Logging, monitoring, and auditing

Log all management activity (who, when, command/executed API calls), and retain logs per your retention policy. Use central log collection (syslog, Windows Event Forwarding, cloud audit logs) and set alerts for anomalous management access (outside business hours, unknown source IPs, failed MFA). Regularly review privileged sessions and use session recording where possible (PAM solutions, Azure AD Privileged Identity Management, AWS CloudTrail for management API calls).

Real-world examples and small-business scenarios

Example A — Small office with ISP router, a managed switch, a firewall, and Windows domain: Put switch and firewall management on a "Mgmt" VLAN addressed 10.10.10.0/24; configure the switch to accept management only on that VLAN and set the management IP on loopback. Create a Windows server jump host joined to the domain that administrators RDP into after authenticating with strong MFA; disable local admin usage on workstations and use LAPS to rotate local admin passwords. Use the firewall to block traffic from user VLANs to 10.10.10.0/24 except for designated monitoring ports from your NMS server.

Example B — Cloud-first small consultancy: Restrict AWS console/API administration to a bastion EC2 instance using IAM policies that require assume-role, enable MFA, and limit assume-role by source IP. Use separate IAM roles for administrative tasks and non-admin day-to-day tasks. Tag and audit administrative resources, enable CloudTrail and guardrails via AWS Organizations to prevent users from creating high-risk management endpoints in other accounts.

Compliance tips and best practices

Document the separation design in your System Security Plan (SSP) and link it to the control SC.L2-3.13.3. Add procedures that require administrators to request and justify privileged access (ticketing) and capture approval evidence. Periodically test separation controls: attempt controlled access from a user account to ensure ACLs/VLANs block management interfaces, and perform privileged account reviews quarterly. Use automation (Ansible, Terraform) to enforce immutable configuration of network and management hosts so misconfigurations are easier to detect and remediate.

Risks of non-implementation

Failing to separate user and management functionality can lead to compromised admin credentials through phishing or malware on a user machine, unauthorized configuration changes that disrupt availability, and regulatory noncompliance that could result in lost contracts or penalties. For organizations handling CUI, such failures may directly violate contract terms under DFARS and risk exclusion from defense contracting.

In summary, meeting SC.L2-3.13.3 is a practical mix of network segmentation, access control, hardened management hosts, audit logging, and documented procedures — all achievable for small businesses with a phased approach: inventory, design, implement separation (VLANs/OOB/jump hosts), lock down authentication and protocols, monitor, and maintain documentation and audits. These steps not only satisfy Compliance Framework expectations but significantly reduce operational risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes