• Requirement

    Establish connections to the system on demand and terminate connections after [Selection: completion of a request; a period of non-use].

  • Discussion

    Persistent connections to systems can provide advanced adversaries with paths to move laterally through systems and potentially position themselves closer to high value assets. Limiting the availability of such connections impedes the adversary’s ability to move freely through organizational systems.

More Info

  • Title

    Non-persistence | Non-persistent Connectivity
  • Family

    System and Information Integrity
  • Related NIST 800-53 ID


CMMC Training

Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!