Blog

Where Can You Store CUI and FCI?

Proper storage of Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) is at the core of a healthy and satisfactory compliance program. The issue? There seems to be ample confusion on what CUI and FCI are, the difference between the two, and where they officially can be stored.   Improper storage of both CUI […]

Blog

ISC2 2025: Our Top 8 CMMC Observations 

We recently attended one of the most anticipated cybersecurity conferences of the year—ISC2 Security Congress 2025. Held at the Gaylord Opryland Nashville, thousands gathered to learn the latest in cybersecurity. While it wasn’t a Defense Industrial Base-focused show, the overlap between cybersecurity and compliance was clear.  Our exhibitor booth welcomed several compliance professionals, all of […]

Blog

Timeline of CMMC Phases and Contractor Requirements: A Quick Guide

It’s official, 48CFR has been published and the CMMC Phase 1 rollout is just 60 days away. Defense Industrial Base (DIB) contractors are understandably beginning to search for information regarding the recently finalized DFARS rule (Case 2019-D041), formally integrating the Cybersecurity Maturity Model Certification (CMMC) requirements into the DoD acquisition process.   This is a big deal—especially […]

Blog

Whitepaper: Continuous Controls Monitoring in CMMC Level 2 Compliance: An In-Depth Exploration of Control 3.12.3 

In CMMC, continuous monitoring stands as a pivotal component in safeguarding sensitive information. For organizations aiming to achieve Cybersecurity Maturity Model Certification (CMMC) Level 2 compliance, a thorough understanding and implementation of ‘continuous monitoring’ and its role in Risk Management is essential.  It is easy to conflate three closely related topics, Continuous Controls Monitoring (CCM), […]

Blog

CMMC Data Flow Diagrams Done Right: A CCA’s Perspective 

Creating a Data Flow Diagram (DFD) is a foundational step in achieving Cybersecurity Maturity Model Certification (CMMC) compliance. DFDs offer a visual representation of how Controlled Unclassified Information (CUI) traverses through an organization’s systems.  The process of identifying how FCI and CUI traverse an organization also highlights the people, processes, and technology that come in […]

Blog

9 C3PAO Red Flags to Look Out For

Getting assessed by a Certified Third-Party Assessment organization (C3PAO) is required for CMMC compliance — but not all C3PAOs are made equal.  With dozens of C3PAOs to choose from, it’s important to partner with one that can efficiently and accurately guide you through the assessment process. Here are nine critical red flags to watch out for […]

Blog

CMMC Level 2 Scoping for Operational Technology Environments 

As defense contractors and manufacturers progress toward CMMC Level 2 compliance, a critical area of ambiguity lies in how Operational Technology (OT) is treated within the current Level 2 Scoping Guide. Specifically, the treatment of OT within the category of “specialized assets” leaves significant room for interpretation — and potential misalignment with the practical realities […]