SC-2(2)
-
Requirement
Store state information from applications and software separately.
-
Discussion
If a system is compromised, storing applications and software separately from state information about users’ interactions with an application may better protect individuals’ privacy.
CMMC Training
Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!