Here’s everything you need to know about CMMC Level 1 continuous monitoring.

This blog discusses strategies for monitoring the effectiveness of security requirements. Control assessments are infrequent, often occurring only once per year. Continuous monitoring activities can provide better awareness of threats, vulnerabilities, and control effectiveness.
NIST SP 800-137 defines the information security continuous monitoring (ISCM) process:

The purpose of this post is to define an ISCM for CMMC Level 1 security requirements.
There are four types of records to update or review within a system maintenance log on a weekly basis. This includes:
This guidance originates from NIST SP 800-88. Organizations should track media sanitization efforts. Maintain records when introducing, moving, or sanitizing media. Record keeping helps track sanitization for all media introduced into the operating environment. Update maintenance records when the media reaches the sanitization destination. Documentation details may depend on the confidentiality level of the media. When required, complete a certificate of media disposition for sanitized electronic media. This may include either an electronic or paper record of the action taken. For convenience, a Fillable Certificate of Sanitization template is available courtesy of PeakInfoSec.
Updating media records evidence for the following CMMC Level 1 objectives:
Evidence:
Policy Statement:
Media Protection
This guidance originates from NIST SP 800-61. Organizations should establish procedures to ensure adequate collection and review of log information. This may be tedious if filtering is not used to condense the logs to a reasonable size. Handlers should focus on unexplained entries, which are usually more important to investigate. Conducting frequent log reviews enables identification of trends and changes over time. The reviews also reveal the reliability of each source.
Reviewing audit records establishes evidence for the following CMMC Level 1 objectives:
Evidence:
Policy Statements:
System and Information Integrity
This guidance originates from NIST SP 800-40. Organizations should track all exceptions to maintenance plans. Define maintenance groups to reduce assets considered “exceptions.” Having some exceptions is inevitable. Review all exceptions and determine whether you can use the maintenance plan now. Move assets with similar long-term exceptions to a separate maintenance group.
Reviewing maintenance plan exceptions establishes evidence for the following CMMC Level 1 objectives:
Evidence:
Policy Statements:
Maintenance
System and Information Integrity
This guidance originates from NIST SP 800-83. Organizations should centralize management of antivirus software. Assign responsibilities for acquiring, testing, approving, and delivering antivirus signatures and updates. Prevent users from disabling or deleting antivirus software or altering critical settings. Administrators should confirm that hosts are using current antivirus software with correct configurations . Implementing these recommendations supports a strong and consistent antivirus deployment across the organization.
Updating antivirus establishes evidence for the following CMMC Level 1 objectives:
Evidence:
Policy Statements:
System and Information Integrity
This guidance originates from AC-2 within NIST SP 800-53. Identification of authorized users and privileges reflect the requirements in other controls. Users requiring administrative privileges on system accounts should receive extra scrutiny. Control AC-2 has a FedRAMP Moderate assigned parameter that states:
quarterly for privileged access, and once a year for non-privileged access.
This guidance originates from NIST SP 800-12. From time to time, it is necessary to review user account management on a system. Within the area of user access, reviews may examine:
Organizations may conduct these reviews on applications or system-wide. Organizations may use in-house systems personnel, internal audit staff, or external auditors. It is a good practice for application managers to review user access levels every month. Signing an access approval list provides a written record of the approvals. Conducting reviews by systems personnel is usually less effective. System personnel can verify that users only have accesses specified by their managers. Since access requirements may change, it is important to involve the application manager. They often best understand current access requirements.
Documenting reviews establishes evidence for the following CMMC Level 1 objectives:
Evidence:
Policy Statement:
Account Management
This guidance originates fromNIST SP 800-137. Accurate system component inventories improve the effectiveness of patch management and vulnerability management. Control CM-8 from NIST SP 800-53 has a FedRAMP Moderate assigned parameter that states:
This guidance originates from NIST SP 800-128. ThA process of discovery populates the component inventory. Discovery is the process of obtaining system component information that composes the systems. Discovery processes may be manual or automated. The organization determines the types and granularity of the components in the inventory. Automated tools are generally a more effective means of maintaining component inventories. Even with automated tools, it may be necessary to enter some component inventory data. Examples include unique identifiers, system associations, owner, administrator, user, or type of component. Inventory management tools are usually database-driven applications that track and manage system components. Automated tools may detect the removal or addition of components. Some tools allow for expanded monitoring of components. With this functionality, organizations can track changes in the component’s configuration.
Component inventories can help track approved configuration baselines, configuration changes, and security impacts. Some data elements stored for each component in the system inventory include:
Other data elements may include:
Documenting reviews establishes evidence for the following CMMC Level 1 objectives:
Evidence:
Policy Statement:
Configuration Management
This guidance originates from NIST SP 800-53. Reviewing physical access logs helps identify suspicious activity, anomalous events, or potential threats. Automated system access logs can support the reviews.
Control PE-6 from NIST SP 800-53 has a FedRAMP Moderate assigned parameter that states:
Control PE-8 from NIST SP 800-53 has two FedRAMP Moderate assigned parameters:
Access record reviews determine if authorizations are current and support business functions. Access records are not required for areas accessible to the public. Visitor access records should include the following details:
Reviewing physical access logs establish evidence for the following CMMC Level 1 objectives:
Evidence:
Policy Statement:
Physical and Environmental Protection
This tasks consists of two related activities:
Identifying system flaws
NIST SP 800-160 defines a flaw as an imperfection or defect.
This guidance originates from the discussion of SI-2 within NIST SP 800-53. The need to remediate system flaws applies to all types of software and firmware. Organizations identify systems affected by flaws and report this information to designated personnel. Flaw discovery comes from assessments, continuous monitoring, incident response activities, and error handling.
This guidance originates from NIST SP 800-40. Know when new software vulnerabilities affect applications, operating systems, and firmware. This involves knowing assets in use and which software those assets run. Subscribe to vendor vulnerability feeds, security researchers, and the National Vulnerability Database (NVD).
NIST SP 800-160 defines a vulnerability as an exploitable weakness.
Vulnerability monitoring and scanning (RA-5) is a related control to SI-2. Control RA-5 from NIST SP 800-53 has a FedRAMP Moderate assigned parameter that states:
Reporting system flaws
This guidance originates from NIST SP 800-40. Plan the risk response. This involves assessing the risk the vulnerability poses to your organization. Choose which form(s) of risk response to use, and decide how to put the risk response in place. Elevated risks may include vulnerabilities exploited in the wild and present in assets. You may choose to mitigate the risk by upgrading software or altering its settings.
Examples of common steps for preparing to deploy a patch include the following:
Take advantage of low-level metrics already collected when developing enterprise-level performance metrics. There is often information already available from software and asset inventories. This may include assets’ technical and mission/business characteristics. Organizations often have detailed information about the vulnerabilities. This includes CVSS scores, threat intelligence, and metrics provided by vulnerability management tools. This information helps identify the importance of each mitigated vulnerability.
Develop enterprise-level metrics that reflect the relative importance of each vulnerability and patch. Simplistic metrics, such as quantity and patch percentages, are not actionable. Reporting that 10 % of your assets were not patched does that measure risk. What is the relative importance of each of those assets? If they are the most important assets, then not patching them might be a major problem. If they are less important, not patching them indicates prioritization of resources. Report at assets based on the relative severity of the vulnerabilities.
Simple metrics are not actionable because they do not provide enough information. They do not offer the insights into the performance of vulnerability management. They do not identify improvements that could improve vulnerability management performance. Table 1 shows a notional example of actionable performance metrics. Each cell provides metrics based on asset importance and vulnerability severity. The metrics identify the percentage of assets patched based on the maintenance plan. It also reports the average and median time for patching.

You can also analyze mitigation data by platform, business unit, or other characteristics. This may help identify deficiencies or set targets for improving performance. It can also provide relevant metrics to executives, operations staff, and compliance professionals.
Set a schedule to update low-level metrics and strive for them to be as accurate as possible. Incorrect low-level metrics will impact the enterprise-level metrics calculated from them. Scanning for vulnerabilities monthly might make the number of vulnerabilities identified seem small. This would provide a misleading picture of the organization’s vulnerability management program. Only running unauthenticated vulnerability scans will also under-report vulnerabilities and skew the metrics.
Checking for new vulnerabilities establishes evidence for the following CMMC Level 1 objectives:
Evidence:
Policy Statement:
System and Information Integrity
This guidance originates from the discussion of SI-2 within NIST SP 800-53. Time periods for updating security-relevant software and firmware vary based on risk factors. Factors include the system's security category, vulnerability severity, risk tolerance, and threat environment. Some types of flaw remediation may need more testing than other types. Determine the type of testing needed and the changes that are configuration-managed. You may determine testing updates is not necessary or practical. For example, when implementing simple malicious code signature updates. Consider whether you are obtaining updates from authorized sources with appropriate digital signatures.
Control SI-2 from NIST SP 800-53 has a FedRAMP Moderate assigned parameter that states:
This guidance originates from NIST SP 800-40. At a high level, examples of common steps for deploying a patch include the following:
Verifying a patch’s deployment can ensure successful installation. The robustness of verification is dependent on an organization’s needs. Automated means are generally needed to achieve verification at scale.
Monitoring the patch’s deployment using automation confirms that it is still installed. Monitoring identifies if a user or an attacker uninstalls the patch. It also identifies software restored to an unpatched version or factory-default state. Monitoring deployed patches also helps identify if behavior changes after patching. This may detect situations where the installed patch was itself compromised.
Patching vulnerabilities establishes evidence for the following CMMC Level 1 objectives:
Evidence:
Policy Statement:
Vulnerability scanning
This guidance originates from NIST SP 800-41. Manage changes to firewall policies as part of a formal configuration management process. Many firewall interfaces audit changes but this does not always track policy changes. You should keep a log of all policy changes associated with the firewall. Consider attaching the log to the device or keeping it in the same part of the inventory system as the firewall. Some firewalls permit maintaining comments for each rule. When workable, document rulesets with comments on each rule. Most firewalls allow restrictions on who can make changes to the ruleset. Some allow restrictions on the addresses from which administrators can make such changes. Use such restrictions when possible.
This guidance originates from the discussion of CM-3 within NIST SP 800-53. Change control involves the proposal, justification, implementation, testing, review, and disposition of changes. This includes system upgrades, modifications, and vulnerability remediations. Change control covers changes to baselines as well as operational procedures. Configuration Control Boards or Change Advisory Boards review and approve proposed changes. For new systems or major upgrades, include development team representatives on the Board. Audit activities before, after, and associated with implementing system or component changes.
This guidance originates from NIST SP 800-128. A well-defined change control process is fundamental to any security-focused configuration management program. Change control ensures an evaluation process is in place for requested configuration changes. You should assess the security impact and test the effectiveness before authorizing changes. The process may have different levels of rigor depending on risk tolerance. Configuration change control generally consists of the following steps:
Documenting configuration changes helps establish evidence for the following CMMC Level 1 practices:
Evidence:
Policy Statement:
Configuration Management
This guidance originates from DCSA CUI FAQ. Federal Contract Information (FCI) is information not intended for public release. Contractors may receive FCI from the Federal Government under a contract. Contractors may also generate FCI as part of their participation in government contracts. Controlled unclassified information (CUI) and FCI share similarities and a particularly important distinction. Both CUI and FCI include information created or collected by or for the Government. Both also include as well as information received from the Government. CUI requires safeguarding and may be subject to dissemination controls. In short, all CUI in possession of a Government contractor is FCI, but not all FCI is CUI.
This guidance originates from control AC-22 within NIST SP 800-53. The public is not authorized to have access to nonpublic information. This includes information protected under the PRIVACT and proprietary information. This addresses systems controlled by the organization and accessible without identification or authentication. You should cover posting information on non-organizational systems by organizational policy. This control addresses the management of the individuals who make information accessible. Control AC-22 from has a FedRAMP Moderate assigned parameter that states:
Reviewing systems accessible to the public establishes evidence for the following objectives:
Evidence:
Policy Statement:
Access Control
This guidance originates from NIST SP 800-41. Be aware that firewall rulesets can become complicated with age. A new firewall rule might address outbound user traffic and inbound email traffic. It will likely contain more rules by the time the firewall system reaches the end of its first year. It is important to review the firewall policy often. Such a review can uncover rules no longer needed. Reviews can also identify the need for new policy requirements.
It is best to review the firewall policy at regular intervals. You should not wait to do reviews during audits or emergencies. Reviews should include an examination of all changes since the last regular review. You should review who made the changes and under what circumstances. It is also useful to have people not part of the policy review team perform ruleset audits. This provides an outside view of how the policy matches the organization’s goals. Some firewalls have tools that can do automated reviews of policies. These tools help find redundant rules or missing recommended rules. Use such tools at regular intervals as part of the regular policy review.
Reviewing firewall policies creates evidence for the following CMMC Level 1 objectives:
Evidence:
Policy Statements:
System and Communication Protection
While AC-2 focuses on system access, PE-2 focuses on facility access. Control PE-2 has a FedRAMP Moderate assigned parameter that states:
Maintaining an authorized account list helps meet the following CMMC Level 1 objectives:
Evidence:
Policy Statement:
Access Control
This guidance originates from control AC-2 within NIST SP 800-53. System account types may include individual, system, developer, and service. Users with administrative privileges should receive more scrutiny for approval. Organizations may prohibit shared, group, emergency, anonymous, temporary, and guest accounts.
You may define access privileges by account, type of account, or a combination of the two. Other attributes required may include restrictions on time, day, and point of origin. Consider related business requirements when defining other access privilege attributes. Failure to consider these factors could affect system availability.
Restrict temporary and emergency accounts for short-term use. You may establish temporary accounts without the need for immediate account activation. You may establish emergency accounts out of the need for rapid account activation. Emergency account activation may bypass normal account authorization processes. Do not confuse emergency and temporary accounts with accounts used less often. This includes local logon accounts used for special tasks. Keep such accounts available and do not subject them to automatic disabling. Conditions for disabling or deactivating accounts include when they are no longer required. Conditions for disabling also include transferred or terminated individuals. Change shared/group authenticators when members leave the group. This ensures that former group members do not keep access to the shared or group account. Some types of system accounts may need specialized training.
Documenting this review establishes evidence for the following CMMC Level 1 objectives:
Evidence:
Policy Statement:
Access Control
A network diagram shows a perspective of the network, not the whole network. Network diagrams may show connections, layers of access, network routing, or data flow. Network diagrams should address and depict components reflected in the authorization boundary, and:
Organizations should update the network diagram at least once per year. Adding or removing system components should prompt more frequent updates.
Updating the network diagram establishes evidence for the following CMMC Level 1 objectives:
Evidence:
Policy Statement:
System and Communication Protection
This guidance originates from NIST SP 800-47. An interconnection is a direct connection between two or more systems. These systems operate in different authorization boundaries. Interconnections may exchange information and/or allow access to information, services, and resources. Base the decision to allow interconnections on an assessment of associated risks.
This guidance originates from NIST SP 800-41. Perform a risk analysis before creating a firewall policy. Develop a list of the types of traffic needed by the organization and categorize how to secure them. Identify the types of traffic that can traverse a firewall under what circumstances. Base the risk analysis on threats; vulnerabilities; countermeasures; and compromise impact.
This guidance originates from NIST SP 800-30. Conducting risk assessments includes the following specific tasks:
Conducting a risk assessment on interconnections to establishes evidence for the following objectives:
Evidence:
Policy Statement:
Risk Assessment
This guidance originates from control AC-20 within NIST SP 800-53. Authorized individuals include anyone with authorized access to organizational systems. Organizations are able to impose specific rules of behavior related to system access. Restrictions that organizations impose on authorized individuals need not be uniform. The restrictions may vary depending on trust relationships between organizations.
This guidance originates from NIST SP 800-83. Implementing awareness programs can provide guidance to users on malware incident prevention. You should make all users aware of the ways that malware enters and infects hosts. Discuss the risks of malware and the importance of users in preventing incidents. Emphasize best practices to avoid social engineering attacks. Make users aware of policies and procedures that apply to malware incident handling. Identify how to report a suspected incident and what users might need to do. Malware awareness programs reduce incidents that occur through human error.
Providing malware awareness and external system usage training establishes evidence for:
Evidence:
Policy Statement:
Awareness and Training
There are three roles with specific CMMC Level 1 training requirements:
Training individuals authorized to post content on systems accessible to the public
NIST made this training explicit within SP 800-171 Rev 3. Train individuals posting content on systems accessible to the public. This training should cover how to identify nonpublic information. Extend this training to include Controlled Unclassified Information when seeking CMMC Level 2.
The US Government does not provide training related to Federal Contract Information (FCI). We created one and posted it for anyone to use on YouTube.
We cover the definition of FCI and the requirements around controlling public information. The training provides several examples to train staff on identifying FCI. The Department of Defense publishes training on Controlled Unclassified Information. Consider using this free training for individuals posting content on your website. a
Providing training on identifying nonpublic information establishes evidence for the following objectives:
Evidence:
Policy Statement:
Awareness and Training
Training individuals with assigned sanitization responsibilities
This guidance originates from NIST SP 800-88. A key element of verifying sanitization is the training and expertise of personnel. Organizations should ensure that equipment operators are competent to perform sanitization functions. We created a training video that reviews processes derived from NIST SP 800-88:
Providing training to staff assigned media sanitization responsibilities establishes evidence for the following:
Evidence:
Policy Statement:
Awareness and Training
Training members of the IT team that handle malware incidents
This guidance originates from NIST SP 800-83. The initial phase of malware incident response involves performing preparatory activities. This includes developing malware incident handling procedures and training for incident response teams. Identify staff who might need to assist during malware incidents in advance. Provide staff with documentation and periodic training on their possible duties. Conduct awareness activities for staff involved and provide training on specific tasks.
Training staff with malware incident response responsibilities establishes evidence for the following:
Evidence:
Policy Statement:
Awareness and Training
This guidance originates from NIST SP 800-61 Rev 2. An event is an observable occurrence in a system or network. Hosts should have auditing enabled and should log significant security-related events.
This guidance originates from NIST SP 800-92. Logs created within an organization could have some relevance to computer security. For example, logs from network devices might record data that could be of use. These logs are generally used as supplementary sources for computer security. Consider the value of log data sources when implementing log management.
Security Software
Most organizations use several types of software to detect malicious activity. Security software is a major source of computer security log data. Common types of network-based and host-based security software include the following:
Operating Systems
Operating systems for servers, workstations, and networking devices record security-related information. The most common types of security-related OS data are as follows:
Applications
Some applications generate their own log files. Other applications use the logging capabilities of the OS. Applications vary in the types of information that they log. The following lists some common logged types of information and their benefits:
This guidance originates from AU-2 within NIST SP 800-53. The types of events to log are those events that are significant and relevant to system security. Event logging also supports specific monitoring and auditing needs. Event types include password changes and failed logons or failed accesses. Other event types include security attribute changes and administrative privilege usage. Data action changes, query parameters, or external credential usage are also important events. Consider the monitoring and auditing requirements when determining the event types to log. Event logging should include all protocols that are operational and supported.
Control AU-2 has a FedRAMP Moderate assigned parameter that states:
Identify a subset of event types to log. This will help balance monitoring and auditing requirements with other system needs. For example, you may want to log every file access that is successful and unsuccessful. You may select to log events occurring under specific circumstances. Reducing the quantity of logged events reduces the burden on system performance. The types of logged events may change. Reviewing and updating the types of events logged ensures the events remain relevant. Consider how the types of logging events can reveal information about individuals. Consider the privacy risk and identify how best to mitigate such risks.
You can generate audit records at various levels. For example, logging information at the packet level as information traverses the network. Recording the appropriate level of events can identify the root causes of problems. When defining event types, consider the logging necessary to cover related event types. This may include the process steps and actions that occur in service-oriented architectures.
Other requirements may identify the need to log specific event types . These events include:
AC-2(4) - Account creation, modification, enabling, disabling, and removal actions.
AC-3(10) - Overrides of automated access control mechanisms under defined conditions.
AC-6(9)- The execution of privileged functions in audit logs.
AC-17(1)- Connection activities of remote users on a variety of system components. This includes servers, notebook computers, workstations, smart phones, and tablets.
CM-3f - Activities associated with configuration-controlled changes to the system.
CM-5(1)- System accesses associated with applying configuration changes.
IA-3(3.b) - Lease information related to dynamic address allocation for devices.
MA-4(1) - Defined events for nonlocal maintenance and diagnostic sessions
MP-4(2) - Access attempts and granted access to media storage areas
PE-3 - Physical access audit logs for defined entry or exit points
PM-21 -Disclosures of personal information. This includes the date, nature, and purpose of each disclosure; and name and address.
PT-7 - Application of defined processing conditions or protections for personal information.
SC-7(9) - The identity of internal users associated with denied communications
SC-7(15) - Networked, privileged accesses
SI-3(8) - Unauthorized operating system commands for kernel functions that are suspicious.
SI-4(22) - Unauthorized or unapproved network services
SI-7(8) - Software, firmware, and information integrity violations
SI-10(1) - Manual overrides for input validation
Reviewing logged event types establishes evidence for the following CMMC Level 1 objectives:
PE.L1-b.1.ix (c) maintain audit logs of physical access;
SC.L1-b.1.x (g) protect communications at the external system boundary; and
SC.L1-b.1.x (h) protect communications at key internal boundaries.
SI.L1-b.1.xiii (b) provide protection from malicious code at designated locations
Evidence:
Policy Statement:
Audit and Accountability
This guidance originates from NIST SP 800-41 Rev 1. Consider conducting penetration testing to assess the security of your network environment. Testing can verify firewall performance by comparing network traffic with its expected response. Consider employing penetration testing as a complement to a conventional audit program.
Testing boundary protection devices establishes evidence for the following CMMC Level 1 objectives:
SC.L1-b.1.x (e) control communications at the external system boundary; and
SC.L1-b.1.x (f) control communications at key internal boundaries.
SC.L1-b.1.xi (b) separate system components accessible to the public from internal networks
Evidence:
Policy Statements:
System and Communications Protection
As set forth in 32 CFR § 170.24, documents need to be in their final forms. Drafts of policies or documentation are not eligible because they are not official.
Policies
This guidance originates from the CMMC Level 1 Assessment Guide for AC.L1-B.1.III. Establish terms for the use of external systems using policies and procedures. This guidance originates from SI.L1-B.1.XII. Software vendors release patches, service packs, and hot fixes. Make sure your software that processes FCI is up to date. Develop a policy that requires checking vendor websites for flaw notifications every week. The policy states you patch computers weekly, and servers monthly.
This guidance originates from NIST SP 800-83 Rev1. Policy statements are the basis for malware prevention efforts. This includes user and staff awareness, vulnerability mitigation, threat mitigation, and defensive architecture. Malware prevention–related policy should be as general as possible. This provides flexibility in implementation and reduces the need for frequent policy updates. It should also be specific enough to make the intent and scope of the policy clear. Malware prevention–related policy should include provisions related to remote workers. Policies should address using hosts within and outside organizational control. Organizations should have policies and procedures to mitigate vulnerabilities that malware might exploit.
Updating policies establishes evidence for the following CMMC Level 1 objectives:
AC.L1-b.1.iii (f) control/limit the use of external systems
SI.L1-b.1.xii (a) specify the time within which to identify system flaws
SI.L1-b.1.xii (c) specify the time within which to report system flaws
SI.L1-b.1.xii (e) specify the time within which to correct system flaws
SI.L1-b.1.xiii (b) provide protection from malicious code at designated locations
Evidence:
Policy Statements:
Security Assessment
Plans
This guidance originates from NIST SP 800-40 Rev 4. Define a maintenance plan for each maintenance group and applicable risk response scenario. A maintenance plan defines actions taken when a scenario occurs. This includes the timeframes for beginning and ending each action.
This guidance originates from NIST SP 800-61 Rev2. Have a formal incident response plan for implementing the incident response capability. The plan should lay out the necessary resources and management support. The incident response plan should include the following elements:
Discuss the incident response program structure within the plan. Develop a plan and gain management approval. Review it at least once a year. This will help ensure the organization is maturing the capability.
Updating plans establishes evidence for the following CMMC Level 1 objectives:
SI.L1-B.1XII(d) report system flaws within the specified time frame
SI.L1-B.1.XIII(b) provide protection from malicious code at designated locations
Evidence:
Policy Statements:
Maintenance
Incident Response
We defined these tasks to gauge the efficacy of basic security requirements. These 18 tasks only satisfy 8 of the 56 CMMC Level 1 requirements. This plan aligns continuous monitoring activities for another 29 objectives. This plan should complement hardware and software configurations, policies and procedures. By implementing an ISCM program, you establish a stronger foundation for CMMC Level 2.
In nec dictum adipiscing pharetra enim etiam scelerisque dolor purus ipsum egestas cursus vulputate arcu egestas ut eu sed mollis consectetur mattis pharetra curabitur et maecenas in mattis fames consectetur ipsum quis risus mauris aliquam ornare nisl purus at ipsum nulla accumsan consectetur vestibulum suspendisse aliquam condimentum scelerisque lacinia pellentesque vestibulum condimentum turpis ligula pharetra dictum sapien facilisis sapien at sagittis et cursus congue.
Convallis pellentesque ullamcorper sapien sed tristique fermentum proin amet quam tincidunt feugiat vitae neque quisque odio ut pellentesque ac mauris eget lectus. Pretium arcu turpis lacus sapien sit at eu sapien duis magna nunc nibh nam non ut nibh ultrices ultrices elementum egestas enim nisl sed cursus pellentesque sit dignissim enim euismod sit et convallis sed pelis viverra quam at nisl sit pharetra enim nisl nec vestibulum posuere in volutpat sed blandit neque risus.

Feugiat vitae neque quisque odio ut pellentesque ac mauris eget lectus. Pretium arcu turpis lacus sapien sit at eu sapien duis magna nunc nibh nam non ut nibh ultrices ultrices elementum egestas enim nisl sed cursus pellentesque sit dignissim enim euismod sit et convallis sed pelis viverra quam at nisl sit pharetra enim nisl nec vestibulum posuere in volutpat sed blandit neque risus.
Feugiat vitae neque quisque odio ut pellentesque ac mauris eget lectus. Pretium arcu turpis lacus sapien sit at eu sapien duis magna nunc nibh nam non ut nibh ultrices ultrices elementum egestas enim nisl sed cursus pellentesque sit dignissim enim euismod sit et convallis sed pelis viverra quam at nisl sit pharetra enim nisl nec vestibulum posuere in volutpat sed blandit neque risus.
Vel etiam vel amet aenean eget in habitasse nunc duis tellus sem turpis risus aliquam ac volutpat tellus eu faucibus ullamcorper.
Sed pretium id nibh id sit felis vitae volutpat volutpat adipiscing at sodales neque lectus mi phasellus commodo at elit suspendisse ornare faucibus lectus purus viverra in nec aliquet commodo et sed sed nisi tempor mi pellentesque arcu viverra pretium duis enim vulputate dignissim etiam ultrices vitae neque urna proin nibh diam turpis augue lacus.