🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.2

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.2

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.2 – Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems.

Understanding the Requirement

This control requires an organization to identify and use security-focused architecture choices, secure software development practices, and systems engineering principles so that systems are designed and built with security in mind. In practice (per the NIST SP 800-171 REV.2 / CMMC 2.0 framework), you select a set of security engineering principles—such as least privilege, reduced complexity, secure defaults, defense in depth, accountability/traceability—and document and enforce them across architecture, development, and engineering activities so staff know what to follow and managers can measure compliance.

Technical Implementation

  • Create a concise Security Engineering Policy: select 4–8 principles from NIST SP 800-160 (for example: Reduced Complexity, Least Privilege, Secure Defaults, Defense in Depth, Accountability/Traceability, Secure System Modification). Publish the policy, assign an owner (information security lead), and require sign-off from IT and business system owners. Make the policy the baseline for design, procurement, and development decisions.

  • Build and enforce secure architectural patterns: standardize on a small set of approved patterns for common services (e.g., web app DMZ + app tier + database tier, segmented management network, VPN or Zero Trust access). Implement network segmentation (VLANs, firewalls), use TLS for all transit, and apply trusted communication channels (mTLS or VPN) for admin and inter-service traffic. Document each pattern with diagrams and a short rationale tied to selected principles.

  • Integrate secure software development practices into your SDLC: adopt code reviews, static application security testing (SAST) in the CI pipeline, dependency scanning (SCA), and automated unit/integration tests. Define gating rules (e.g., no merge without a passing SAST scan and one peer review). Train developers on secure coding basics and keep a shortlist of top 10 secure-coding checks that map back to your chosen principles (e.g., input validation for least privilege and reduced attack surface).

  • Establish systems engineering controls for traceability and repeatability: maintain baselined build images and configuration management (infrastructure-as-code or golden images). Use change control (tickets and approvals) and require a documented rollback plan for every production change. Enable logging that ties security-relevant actions to named users (accountability/traceability) and retain logs for a defined period to support investigations.

  • Operationalize secure defaults and least privilege for endpoints and services: create and deploy baseline configurations (hardening guides) for laptops, servers, and cloud instances; enforce with MDM, group policy, or centralized configuration tools (Ansible, Chef). Implement role-based access control and periodic access reviews (quarterly) to remove unnecessary privileges.

  • Measure and iterate: define simple success criteria (documentation exists, baselines applied to X% of assets, code scan coverage, quarterly privilege reviews completed). Assign responsibilities to employees with information security responsibilities and system/network administrators for implementation and evidence collection, and report progress to leadership monthly until mature.

Example in a Small or Medium Business

Acme Engineering (50 employees) adopted a short Security Engineering Policy selecting six principles from NIST SP 800-160: secure defaults, least privilege, reduced complexity, defense in depth, traceability, and repeatable procedures. The CTO and security lead documented three approved architectural patterns for SaaS-hosted apps and for on-prem management systems, including network segmentation and mandatory TLS. The development team added SAST and dependency scanning to their Git-based CI pipeline and required at least one peer review plus a passing scan before merging. IT created golden images for employee laptops with baseline hardening and an MDM policy to enforce antivirus, disk encryption, and automatic patching. All production changes require a ticket, a rollback plan, and a logged approval; audit logs capture who made each change and why. Within three months Acme had baselines applied to 90% of assets, automated scans on every pull request, and a quarterly access review process that removed dormant privileges—reducing the number of high-risk exposures and making security responsibilities visible and auditable.

Summary

Selecting and documenting a small set of security engineering principles, then mapping those principles to architecture patterns, SDLC practices, and systems engineering controls gives SMBs a practical path to satisfy SC.L2-3.13.2. A short policy with assigned owners plus concrete technical measures—baseline images, segmented architectures, CI security gates, change control, and traceable logs—creates repeatable, auditable behavior that embeds security into design and operations rather than relying on ad hoc fixes.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes