NIST 800-53 REV 5 • PLANNING

PL-2(2)Functional Architecture

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

A functional architecture describes how the security and privacy functions are distributed across your system's components. It shows how different parts of the system work together to provide security.

Example 1: Create a functional architecture diagram that shows where key security controls are implemented: firewall at the perimeter, IDS on the internal network, MFA at the authentication layer, encryption at the storage layer. Include this diagram in your SSP.

Example 2: Map your security functions to specific technologies and products: authentication (Azure AD with MFA), access control (NTFS permissions + Conditional Access), auditing (Microsoft Sentinel), endpoint protection (Defender for Endpoint). Present this as a table or layered diagram in your security architecture documentation.