Published OnFebruary 28, 2025
CMMC - Systems Communication Protections
The IT Company's CMMC General Education JourneyThe IT Company's CMMC General Education Journey

CMMC - Systems Communication Protections

This episode demystifies how organizations can meet CMMC Level 2 compliance through secure communication practices such as encryption with TLS, VPN, and IPsec. Discover the importance of FIPS certification, audit-ready documentation, and tools from NIST 800-171 to strengthen cybersecurity. Relatable examples and actionable tips help businesses—from SMBs to larger enterprises—navigate compliance with practical and scalable strategies.

Chapter 1

Introduction

Eric Marquette

We're diving right into a vital piece of the CMMC Level 2 puzzle—Systems Communication Protections. This topic is incredibly important for any Managed Service Provider, or MSP, striving to stay compliant and protect their clients.

Lila Trevors

Right, because, I mean, what's more critical than keeping communications secure? It’s like the backbone of everything. Without it, your other security measures just crumble.

Eric Marquette

Exactly. Systems Communication Protections is one of the key domains in CMMC Level 2. It addresses how organizations ensure their communications—both internal and external—are protected against unauthorized access and tampering.

Lila Trevors

Think about all the data flying around: emails, file transfers, even those boring company conference calls. If it's not properly protected, you're exposing Controlled Unclassified Information—or CUI as we call it—to threats.

Eric Marquette

Couldn't have said it better. And this "CUI" isn't just any data; it's sensitive information that companies are required to safeguard as part of their contracts with federal agencies. Failure to secure it doesn’t just mean trouble; it could cost contracts and credibility.

Lila Trevors

Which is why encryption becomes your best friend, right? Like... you’ve got your TLS, VPNs, uh, IPsec. Those are the go-to tools to protect data in transit.

Eric Marquette

Yes, and while those acronyms might sound intimidating, they’re really just different ways to ensure data is encrypted while it’s being transmitted across networks.

Lila Trevors

Oh, totally. I remember when I first heard about encryption algorithms. I was like, “Wait, what? Are we learning a new language here?” It felt like every term—AES, RSA, FIPS—was just alphabet soup to me.

Eric Marquette

I think we’ve all been there, Lila. But once you get the hang of it, you realize those standards, like FIPS—Federal Information Processing Standards—essentially act as guidelines. They verify that a product or service meets certain security criteria. For organizations working toward CMMC compliance, FIPS certificates go a long way in demonstrating adherence to these protocols.

Lila Trevors

Exactly. And it’s not just about using tools labeled "FIPS certified." You’ve gotta configure them correctly to make sure they’re actually operating securely. That’s a step people often skip.

Eric Marquette

Right. So, for MSPs, proper setup, documentation, and ongoing checks are crucial aspects of securing communications. They need to ensure systems are not only compliant but genuinely secure. It’s non-negotiable in today’s threat landscape.

Lila Trevors

And with that, anyone can see that Systems Communication Protections is, like, a non-glamorous but absolutely vital piece of the cybersecurity puzzle.

Eric Marquette

Absolutely. Let’s expand on one of the most foundational tools—TLS, or Transport Layer Security—in the next section.

Chapter 2

Examples of Secure Communication in Practice

Eric Marquette

As we mentioned earlier, Transport Layer Security—or TLS—is one of the most foundational tools for Systems Communication Protections. It's a protocol that encrypts data in transit, ensuring that whatever information you're sending—whether it’s emails, customer data, or transaction details—stays confidential and tamper-proof.

Lila Trevors

Oh, and don’t forget, TLS also ensures the data is authentic, right? Like, uh, it guarantees the data’s coming from the source you expect. I always think of how TLS works on websites. You see that little padlock in your browser, and boom—you know it's secure.

Eric Marquette

Exactly. Without TLS, the risks of data interception skyrocket. In one case study I came across, a midsize company nearly lost a major client when a phishing attack exploited their unsecured communications. Once they implemented TLS properly on their servers, the phishing problem dropped dramatically—and the client stuck around.

Lila Trevors

Whoa, just like that?

Eric Marquette

Well, it took a bit of tweaking. They had to make sure their configuration was spot on, but yeah, TLS gave their clients confidence in their communications security.

Lila Trevors

That’s why real-world experience matters, right? Anyone on an MSP team who's had to deploy TLS will probably tell you there's always a “gotcha moment”—like figuring out the right certificates or dealing with compatibility issues between systems.

Eric Marquette

Absolutely. And that's where documentation and thorough testing come into play—as we touched on earlier. Now, moving on, let’s discuss VPNs and another protocol often paired with it, IPsec. Both are crucial for secure remote access.

Lila Trevors

Ah, good ol' VPNs. Connecting remote teams securely... it’s like the poster child of quarantine work-life essentials. But! People forget there’s more to it than downloading an app. It's the configuration, right? Like, if you're just using a basic VPN without solid encryption protocols like IPsec, you’re, uh, wasting your time.

Eric Marquette

Right. IPsec strengthens your VPN by encrypting everything before it even hits the Internet, ensuring genuinely secure connections. That’s particularly useful for inter-office communications, where sensitive data often flows.

Lila Trevors

Speaking of flow, let’s talk about SFTP. It’s one of my favorites 'cause it solves such a basic problem—making sure file transfers are secure, without exposing sensitive data during upload or download.

Eric Marquette

Yes, SFTP—or Secure File Transfer Protocol—encrypts the file transfer channel itself, unlike basic FTP. It’s often used when transferring critical files like contracts, client data, or even large system updates.

Lila Trevors

And don’t forget FTPS! It’s like SFTP’s cousin, also encrypting file transfers but works a bit differently with TLS. Both are solid options depending on your infrastructure.

Eric Marquette

Exactly. At the end of the day, understanding these tools—TLS, VPN, IPsec, SFTP, FTPS—is essential. And don't worry about the acronyms; think of them as your personal toolbox to keep communications safe.

Lila Trevors

I mean, acronyms aside, the important thing is that these tools help combat risks we see every day, especially since remote work made secure communication more critical than ever.

Chapter 3

Roles and Responsibility in Organizational Compliance

Eric Marquette

Now that we’ve gone over how tools like TLS, VPNs, and SFTP play a role in securing communications, let’s zoom out a bit and talk about what ties all of this together—compliance. At the end of the day, compliance isn’t just about tools or protocols; it’s about people taking collective responsibility.

Lila Trevors

Oh, totally. Like, it doesn’t matter how fancy your encryption or VPN is if your team isn’t using it properly. It’s kinda like building a fortress but leaving the gate open because no one bothered to lock it.

Eric Marquette

Exactly. For technical employees, the role is pretty clear. They’re the ones implementing encryption protocols like TLS and IPsec, configuring VPNs, and making sure those systems are running as designed. But it doesn’t stop there—they've also gotta monitor those systems to catch any irregularities.

Lila Trevors

Yup, and troubleshooting when things get messy. I've heard plenty of horror stories about, like, misconfigured VPNs or certificates breaking everything. It's... messy, but super important.

Eric Marquette

It really is. And on the flip side, there’s a huge role for non-technical employees, too. While they might not be configuring systems, they’re the ones using those tools. That means using secure platforms like SFTP for file transfers or reporting any suspicious activity they notice—those small actions add up.

Lila Trevors

I mean, even just recognizing phishing attempts and not clicking random links in emails. That stuff matters. It's like, if you don’t know why something’s secure, ask. That way, you’re not accidentally putting all the work your IT team’s doing at risk.

Eric Marquette

Exactly, and awareness is key. Knowing why you’re using those tools and following protocols helps keep the organization secure. Remember, audits and assessments don’t just look at the tools; they look at how well teams implement and follow policies.

Lila Trevors

So true. And, honestly, compliance isn’t a one-and-done thing, right? It’s about monitoring, improving, and always adapting to new challenges. Kinda makes it exciting in a way.

Eric Marquette

Absolutely. And for everyone listening, it really boils down to staying curious and vigilant. Secure communications and compliance require tools, sure, but more importantly, they require teamwork.

Lila Trevors

Teamwork makes the dream work, or in this case, keeps the data safe. Just remember, every single one of you contributes—whether you're locking down systems, using those systems securely, or even just reporting something that doesn’t look right.

Eric Marquette

And with that, we’re wrapping up this episode! It’s been a pleasure diving into these topics with you. Stay curious, stay secure, and we’ll see you next time.

Lila Trevors

Yeah, thanks for sticking with us! Stay safe out there, everyone, and until next time—keep rocking those secure comms!

About the podcast

Join The IT Company on our CMMC General Education Journey, where we break down the Cybersecurity Maturity Model Certification (CMMC) in a way that’s accessible, practical, and relevant for businesses and IT professionals. Whether you're just starting to understand CMMC compliance or looking for strategies to level up your security posture, this podcast provides insights from industry experts, MSPs, and cybersecurity professionals navigating the same challenges

This podcast is brought to you by Jellypod, Inc.

© 2025 All rights reserved.