🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.6

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.6

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.6 – Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).

Understanding the Requirement

This control requires that your network be configured to block all inbound and outbound traffic by default, and only permit specific traffic that is explicitly authorized. The goal is to implement a whitelist approach so that only the communications needed to support business functions are allowed, reducing accidental or malicious connections. For organizations following NIST SP 800-171 REV.2 / CMMC 2.0 Level 2, this means documenting which flows are allowed and enforcing those decisions with technical controls and an exception process.

Technical Implementation

  • Inventory and categorize traffic. Start with a short discovery period (7–14 days) using firewall logs, flow records (NetFlow/sFlow), and endpoint data to identify normal business traffic: source/destination IPs, ports, protocols, and services. Label flows by business purpose (e.g., payroll, SaaS app, vendor backup).
  • Create a documented allowlist policy. Translate the inventory into a written policy that lists allowed flows, who approved them, and why they're necessary. Include a regular review cadence (quarterly or after major changes) and an exception approval workflow.
  • Implement deny-by-default firewall rules. On perimeter and internal firewalls, apply a default deny (implicit or explicit) for both inbound and outbound rulesets. Only create rules that match entries in the allowlist. Use least-privilege ports/protocols and restrict by IP or subnet where possible.
  • Segment the network and apply micro-perimeters. Use VLANs, internal firewalls, or host-based firewalls to separate critical systems (e.g., servers with controlled unclassified information) from general user networks. Limit east-west traffic so a compromise in one segment cannot freely access others.
  • Control remote access and third-party connections. Require authenticated, encrypted VPNs or zero-trust access tools. Allow vendor or cloud vendor traffic only from known addresses and enforce strict rules that permit only the required management ports and protocols.
  • Monitor, log, and validate rules. Enable logging for allowed and denied traffic, retain logs for incident response, and review exceptions and denied attempts regularly. Use periodic testing (scheduled scans and simulated traffic) and change control to ensure rules remain accurate and do not drift over time.

Example in a Small or Medium Business

Acme Manufacturing (70 employees) needs to protect design files and supplier data while keeping cloud services and remote users functional. The IT lead runs a two-week capture of firewall and proxy logs and identifies the minimal set of services required: Office365, the ERP vendor IP ranges on specific ports, a cloud backup service, and approved remote support tools. They document these flows in an allowlist, including business justification and the approving manager, then create firewall rules that deny all other outbound and inbound traffic. Internally, Acme segments engineering workstations from the guest Wi‑Fi and from the administrative network so designers cannot reach payroll systems. For remote access, they replace broad VPN access with a zero-trust gateway that permits only the specific applications each user needs. They implement a simple exception ticket process for temporary allowances (with automatic expiration), and they schedule monthly reviews of logs and firewall rules. Over the next quarter Acme blocks several unexpected outbound connections from an infected workstation, verifies the cause, and tightens host-based firewall rules—demonstrating the deny-by-default posture reduced their exposure.

Summary

Adopting a deny-all, permit-by-exception approach requires both clear policy and precise technical enforcement: inventory your traffic, document an allowlist with approvals, implement deny-by-default firewall and segmentation controls, and maintain monitoring and change control. For SMBs this combination limits unnecessary connections, reduces the attack surface, and ensures that only vetted, business-critical communications are permitted—meeting the control's intent while keeping operations functional through documented exceptions and regular review.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes