Articles/Author
SS

Sam Sporidis

CMMC Compliance Specialist

Focused on cloud architecture decisions, scope reduction strategies, and security operations alignment for CMMC Level 2 certification programs.

13 articles published

CMMC Physical Security Checklist: Visitor Logs, Escort Rules, and Walkthrough Evidence

Physical security fails more CMMC assessments than contractors expect. Use this checklist for NIST SP 800-171 PE controls,visitor logs, escort procedures, server room access, and the walkthrough evidence your C3PAO assessor will request.

Tolerance6 min read

How C3PAO Assessors Use Examine, Interview, and Test Methods for CMMC

Examine, Interview, and Test: the three methods C3PAO assessors use to verify CMMC compliance under NIST SP 800-171A. Learn how each method works, what evidence to prepare, and how to train your staff for a clean audit.

Tolerance7 min read
CMMC LevelsMar 2025

CMMC Level 1 vs Level 2: Does My Contract Require a Self-Assessment or C3PAO Audit?

Compare CMMC Level 1 vs. Level 2 requirements under 32 CFR Part 170. Understand the difference between FCI and CUI, annual self-assessments vs. triennial C3PAO audits, and which level your DFARS contract triggers.

Tolerance6 min read

FCI vs CUI for CMMC: How to Identify, Mark, and Scope Each Data Type

Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) carry entirely different CMMC compliance obligations. Learn how to identify each, apply correct CUI markings, and determine whether your contract scope is Level 1 or Level 2.

Tolerance6 min read
ScopingMar 2025

What Is a CUI Enclave for CMMC? Scope Reduction Through Logical Isolation

A CUI enclave uses logical isolation and network segmentation to contain Controlled Unclassified Information within a tightly defined CMMC assessment boundary. Learn how to design an enclave that keeps corporate IT out of scope.

Tolerance7 min read

Is My MSP in Scope for CMMC? External Service Provider Rules and Evidence

If your MSP processes, stores, or transmits CUI, they are an External Service Provider (ESP) under CMMC scoping guidance and enter your assessment boundary. Learn the shared responsibility evidence your C3PAO assessor will require.

Tolerance7 min read

What Is Security Protection Data (SPD) in CMMC? Why Logs Expand Your Assessment Scope

Security Protection Data (SPD),SIEM logs, firewall logs, vulnerability scans, and audit records,expands your CMMC Level 2 assessment boundary. Learn how SPD is classified under NIST SP 800-171 and how to scope your monitoring tools.

Tolerance6 min read

Do You Need a SIEM for CMMC Level 2? Audit Log Requirements Explained

NIST SP 800-171 does not name a SIEM,but it requires audit log collection, centralized review, correlation, and alerting. Learn whether your environment needs a SIEM to satisfy CMMC Level 2 controls 3.3.1 through 3.3.9.

Tolerance16 min read

What Audit Logs Does CMMC Require? Collection, Retention, and Review Evidence

CMMC Level 2 requires audit logs from every in-scope system,collected, centralized, retained, reviewed, and producible on demand. Learn what events to log, retention periods under NIST SP 800-171, and how to prove log review to a C3PAO.

Tolerance12 min read

CMMC Vulnerability Scanning Requirements: Authenticated Scans, Exceptions, and Remediation

CMMC Level 2 requires authenticated vulnerability scanning of all in-scope systems under NIST SP 800-171 control 3.11.2. Learn scan frequency requirements, how to document exceptions, patch SLAs, and the remediation evidence assessors evaluate.

Tolerance10 min read

What Does 'Timely' Patch Management Mean for CMMC? SLAs and Evidence Requirements

NIST SP 800-171 requires 'timely' flaw remediation but the timeline is organization-defined. Learn how to set severity-based patch SLAs (critical: 72 hours, high: 7 days), document emergency patching, and produce the evidence your C3PAO expects.

Tolerance10 min read

Which Accounts Need MFA for CMMC? Remote Access, Privileged Accounts, and Common Gaps

NIST SP 800-171 controls 3.5.3 and 3.7.5 require multi-factor authentication for all remote access and all privileged accounts. Learn which logins need MFA, when phishing-resistant factors are required, and the common assessment gaps contractors miss.

Tolerance10 min read

How to Document Shared Responsibility for CMMC: MSP, MSSP, and Internal Team Evidence

When a C3PAO assessor evaluates a CMMC control, they need evidence from whoever implements it,MSP, MSSP, or internal team. Learn how to build a shared responsibility matrix, collect third-party evidence, and avoid the gaps that fail audits.

Tolerance10 min read