CMMC Practice SC.5.198

Configure monitoring systems to record packets passing through the organization's Internet network boundaries and other organizational-defined boundaries.

Source

CMMC Version 1.02, pg. 273

Bold Coast Security Guidance

Though there are simple ways to capture packets of data over a period of time, this practice specifically addresses and very high-level of maturity in the science of data management. For Level 5 compliance there must be a specialized function with a high-degree of automation in place, and a risk to the organization that would require storing months of packet-level information coming into and going out of an organization's network boundaries. Depending on the size of the organization, this particular level of control would require dedicated personnel or a very close third-party managed services provider relationship.

Discussion From Source

CIS CONTROLS V7.1 Configure monitoring systems to record network packets passing through the boundary at each of the organization’s network boundaries.

References