Data Migration

Turn-key email, data, and workflow migration to cloud-based and hybrid solutions.

Configuration Services

M365, GCC and GCCH configuration services

Managed IT Services

Manage your IT infrastructure and ensure optimal performance

IT Consulting

Optimize your infrastructure to align IT strategies with business objectives

VIEW ALL SERVICES

CMMC Compliance Services

Powered by Microsoft 365 GCC High and Azure Government, supporting CMMC Level 1 and Level 2 compliance preparation

Level 1 – Handling Federal Contract Information (FCI) in M365

CMMC 2.0 Level 1 applies to contractors in the aerospace, defense, and related sectors who work with the Department of Defense and manage or process Federal Contract Information (FCI).

Key requirements for Level 1 include:

N

Implementation of 17 basic cybersecurity practices aligned with FAR 52.204-21 - Basic Safeguarding of Covered Contractor Information Systems

N

Completion of an annual self-assessment to verify compliance

N

Ensuring the protection of Federal Contract Information (FCI) from unauthorized access and disclosure

We assist government contractors in achieving compliance with DFARS 7012, NIST SP 800-171, and CMMC Level 1 and Level 2 requirements.

Level 2 – Protecting Controlled Unclassified Information (CUI) 

CMMC 2.0 Level 2 applies to organizations partnering with the Department of Defense that handle, process, or store sensitive information critical to national security. This level is designed for contractors and subcontractors whose work involves safeguarding data beyond basic Federal Contract Information (FCI).

Examples of the types of sensitive data covered include:

N

Controlled Unclassified Information (CUI) / Covered Defense Information (CDI)

N

Controlled Technical Information (CTI)

N

Information governed by International Traffic in Arms Regulations (ITAR)

Most organizations within the Defense Industrial Base (DIB), along with many higher education institutions involved in defense-related research, will need to achieve CMMC Level 2 to meet contract requirements.

Safeguarding our nation’s most critical data

Level 1 Services

This project includes, but is not limited to:

N

Protecting sensitive data across your workstations, laptops, and mobile devices

N

Aligning Microsoft 365 E3 license configurations with the 12 technical security requirements of CMMC Level 1

N

Implementing data backup and retention strategies to support contract-specific compliance needs (optional)

N

Conducting a baseline review of your existing Microsoft 365 Commercial environment to identify compliance gaps (optional)

Level 2 Services

The implementation of your CMMC Level 2 solution may include these and other critical components:

N

Establishing a security baseline for your Microsoft 365 GCC or GCC High environment

N

Protecting corporate devices through Microsoft Intune endpoint security

N

Configuring Microsoft security tools to align with NIST SP 800-171 requirements

N

Setting up identity management and enforcing multi-factor authentication (MFA) with Azure Active Directory

N

Deploying Microsoft Purview Information Protection to safeguard sensitive data

N

Leveraging Microsoft Defender solutions for enhanced data security and threat protection

Streamlined Policy and Procedure Documentation

Struggling to develop the right cybersecurity documentation for CMMC Level 2?
Looking for customizable templates that align with CMMC 2.0 Level 2 requirements without draining your internal resources?

Our team leverages deep CMMC and NIST expertise to help you tailor ready-to-use templates and build out the essential policies, procedures, and plans needed to achieve CMMC Level 2 compliance.

Make CMMC Level 2 compliance achievable with:

N

Policies and procedures covering all NIST SP 800-171 security families

N

Data classification and handling policies to protect CUI

N

Risk management plans aligned with DoD expectations

N

Configuration management plans for secure system baselines

N

Incident response and vulnerability management plans

N

Employee handbooks with cybersecurity roles and responsibilities

N

Asset inventories to support scoping and control mapping

N

CMMC scoping documentation to define the boundary of your CUI environment

N

A cybersecurity program plan tailored to your organization

N

A system security plan (SSP) that reflects your actual environment

Share your contact details to find out how we can support your CMMC Level 2 documentation needs

3 + 15 =