NIST 800-53 REV 5 • PLANNING
PL-2(2) — Functional Architecture
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
A functional architecture describes how the security and privacy functions are distributed across your system's components. It shows how different parts of the system work together to provide security.
Example 1: Create a functional architecture diagram that shows where key security controls are implemented: firewall at the perimeter, IDS on the internal network, MFA at the authentication layer, encryption at the storage layer. Include this diagram in your SSP.
Example 2: Map your security functions to specific technologies and products: authentication (Azure AD with MFA), access control (NTFS permissions + Conditional Access), auditing (Microsoft Sentinel), endpoint protection (Defender for Endpoint). Present this as a table or layered diagram in your security architecture documentation.