SS
Sam Sporidis
CMMC Compliance Specialist
Focused on cloud architecture decisions, scope reduction strategies, and security operations alignment for CMMC Level 2 certification programs.
13 articles published
Physical SecurityMar 2025
CMMC Physical Security Checklist: Visitor Logs, Escort Rules, and Walkthrough Evidence
Tolerance6 min read
Assessment ProcessMar 2025
How C3PAO Assessors Use Examine, Interview, and Test Methods for CMMC
Tolerance7 min read
CMMC LevelsMar 2025
CMMC Level 1 vs Level 2: Does My Contract Require a Self-Assessment or C3PAO Audit?
Tolerance6 min read
Data ClassificationMar 2025
FCI vs CUI for CMMC: How to Identify, Mark, and Scope Each Data Type
Tolerance6 min read
ScopingMar 2025
What Is a CUI Enclave for CMMC? Scope Reduction Through Logical Isolation
Tolerance7 min read
External ProvidersMar 2025
Is My MSP in Scope for CMMC? External Service Provider Rules and Evidence
Tolerance7 min read
Security DataMar 2025
What Is Security Protection Data (SPD) in CMMC? Why Logs Expand Your Assessment Scope
Tolerance6 min read
Security ToolsMar 2026
Do You Need a SIEM for CMMC Level 2? Audit Log Requirements Explained
Tolerance16 min read
Audit & LoggingMar 2026
What Audit Logs Does CMMC Require? Collection, Retention, and Review Evidence
Tolerance12 min read
Vulnerability ManagementMar 2026
CMMC Vulnerability Scanning Requirements: Authenticated Scans, Exceptions, and Remediation
Tolerance10 min read
Patch ManagementMar 2026
What Does 'Timely' Patch Management Mean for CMMC? SLAs and Evidence Requirements
Tolerance10 min read
Access ControlMar 2026
Which Accounts Need MFA for CMMC? Remote Access, Privileged Accounts, and Common Gaps
Tolerance10 min read
External ProvidersMar 2026
How to Document Shared Responsibility for CMMC: MSP, MSSP, and Internal Team Evidence
Tolerance10 min read