
Citadel Cloud Management
CMMC Level 2 Compliance Blueprint
Cybersecurity FrameworksCreated by Kenny Ogunlowo
Product Description
CMMC Compliance Framework — Defense Industrial Base Certification Toolkit
Having supported CMMC Level 2 assessment preparation for defense contractors handling CUI, I built this framework because the gap between reading NIST SP 800-171 Rev 2's 110 controls and actually passing a C3PAO assessment is where most small-to-mid DIB companies fail — and losing certification means losing contracts.
The specific threat: defense industrial base organizations handling Controlled Unclassified Information (CUI) under DFARS 252.204-7012 must demonstrate implementation of all 110 NIST SP 800-171 practices. CMMC 2.0 Level 2 requires third-party assessment by a C3PAO, and the assessment methodology (based on NIST SP 800-171A) examines implementation, documentation, and operational evidence for every practice.
What You Get
- 110 Practice Implementation Guides — For each NIST SP 800-171 practice: technical implementation steps for Microsoft 365 GCC High, Azure Government, and AWS GovCloud. Includes specific Group Policy settings, Conditional Access configurations, and network architecture patterns.
- System Security Plan (SSP) — CMMC-compliant SSP template with pre-filled control descriptions for common cloud architectures. Covers CUI scope definition, system boundary documentation, and data flow diagrams that C3PAOs need.
- Plan of Action & Milestones (POA&M) — Structured remediation tracking with risk scoring, milestone deadlines, and resource allocation. Includes the specific POA&M formatting that CMMC assessors accept.
- Evidence Collection Matrix — Maps each of the 320 NIST SP 800-171A assessment objectives to specific evidence artifacts: screenshots, configuration exports, policy documents, and log samples. Pre-organized in the folder structure C3PAOs expect.
- CUI Scoping Guide — Methodology for identifying CUI boundary, marking requirements per DoDI 5200.48, and minimizing assessment scope through legitimate architectural segmentation.
Brownfield Implementation
Phase 1 (Weeks 1-3): CUI scoping and system boundary definition — this determines your assessment scope and cost. Phase 2 (Weeks 4-10): Implement Access Control (AC) and Identification/Authentication (IA) families first — they're prerequisites and account for 30% of practices. Phase 3 (Weeks 11-18): Deploy remaining control families with evidence collection automation. Phase 4 (Weeks 19-22): Self-assessment using NIST SP 800-171A methodology, gap remediation, and C3PAO readiness review.
Scope Limitations
Covers CMMC Level 2 (110 practices). Does not cover Level 3 (NIST SP 800-172 enhanced requirements), ITAR compliance, classified system requirements (NIST SP 800-53 High baseline), or physical security controls beyond documentation templates. Assumes Microsoft or AWS GovCloud infrastructure.
Audit Evidence
Generates the complete evidence package C3PAOs request: SSP with accurate control descriptions, POA&M with status tracking, CUI asset inventory, network diagrams with CUI boundary markings, access control lists, audit log configurations, MFA enforcement records, encryption validation, vulnerability scan results, and incident response plan documentation aligned to DFARS 252.204-7012 72-hour reporting requirements.
Written by Kenny Ogunlowo — Detection Engineer, U.S. Secret Clearance holder. Prepared CMMC assessment evidence packages for defense contractors at Lockheed Martin.