April 2026

What Evidence Is Required for a CMMC Assessment?

What Evidence Is Required for CMMC?

A CMMC assessment requires organizations to provide objective, verifiable evidence that security controls are implemented, enforced, and functioning as intended across their environment.

This evidence must demonstrate not only that policies exist, but that systems, configurations, and operational processes align with those policies in practice.

In CMMC, stated intent is not sufficient—evidence must be observable, testable, and defensible.


Why Evidence Matters in CMMC

The Cybersecurity Maturity Model Certification (CMMC) is explicitly designed as an evidence-based framework. According to the Department of Defense’s CMMC Model 2.0, assessments are focused on validating that practices are implemented—not just documented.

Rather than evaluating whether an organization has purchased tools or written policies, assessors evaluate whether:

  • Controls are implemented correctly
  • Configurations support those controls
  • Systems produce evidence that controls are functioning

This aligns directly with the NIST SP 800-171A assessment methodology, which defines how security requirements are evaluated through examination, testing, and interviews.

Source:
https://dodcio.defense.gov/CMMC/
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171A.pdf


The Types of Evidence Required for CMMC

CMMC assessments rely on multiple categories of evidence. These are grounded in NIST SP 800-171A, which defines “assessment objects” such as specifications, mechanisms, and activities.


1. Policy and Procedural Evidence

This includes documented materials that define how your organization intends to meet security requirements.

Examples:

  • Security policies
  • Standard operating procedures (SOPs)
  • Access control policies
  • Incident response plans

These documents establish intent, but do not prove implementation.


2. Technical and Configuration Evidence

This is the most critical category for validation.

It demonstrates how systems are actually configured and whether controls are implemented at the technical level.

Examples:

  • Identity and access configurations (e.g., MFA enforcement)
  • Conditional access policies
  • Endpoint security settings
  • System configuration baselines
  • Encryption configurations
  • Network segmentation

NIST SP 800-171A specifically requires assessors to evaluate mechanisms, meaning the technical implementations that enforce controls.

Source:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171A.pdf


3. Operational and Logging Evidence

This evidence demonstrates that controls are functioning over time.

Examples:

  • Audit logs
  • Security event logs
  • Monitoring outputs
  • Alerting and response records
  • Log retention configurations

These artifacts support validation that controls are not only configured, but actively operating.


The Difference Between Documentation and Evidence

A common point of confusion is the difference between documentation and evidence.

Documentation:

  • Describes what should happen
  • Exists in policies and procedures

Evidence:

  • Shows what is actually happening
  • Exists in configurations, logs, and system outputs

For example:

  • A policy may require multi-factor authentication (MFA)
  • Evidence must show MFA is enabled, enforced, and consistently applied across users

This distinction is reinforced in NIST guidance, which separates specifications (policies) from mechanisms (systems) and activities (operations).


How Assessors Evaluate Evidence

During a CMMC assessment, evidence is evaluated using standardized methods defined in NIST SP 800-171A:

Examine

Reviewing documents, configurations, and artifacts

Interview

Speaking with personnel to confirm implementation

Test

Validating that controls function as expected

Assessors are looking for:

  • Completeness — Coverage across systems
  • Accuracy — Reflects current environment
  • Consistency — Controls applied uniformly
  • Traceability — Mapped to specific CMMC practices

Source:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171A.pdf


Why Security Tools Alone Do Not Satisfy Evidence Requirements

Security tools such as XDR platforms and vulnerability scanners provide important data, but they do not independently fulfill CMMC evidence requirements.

For example:

  • XDR provides detection and response data
  • Vulnerability scans identify known exposures

However, they do not:

  • Validate configuration alignment with CMMC controls
  • Confirm consistent enforcement of policies
  • Produce structured evidence mapped to compliance requirements

NIST SP 800-171 requires controls to be implemented and enforced, not simply supported by tools.

Source:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf


What a Complete Evidence-Based Assessment Looks Like

A comprehensive approach to CMMC evidence includes:

  • A snapshot of system configurations
  • Validation of identity and access controls
  • Verification of logging and monitoring coverage
  • Correlation of tool outputs with control requirements
  • Structured documentation aligned to CMMC practices

This transforms raw technical data into audit-ready, defensible evidence.


How ARCH by Rolle IT Supports Evidence Validation

ARCH is designed to help organizations generate and validate the types of evidence required for CMMC assessments.

It combines:

  • XDR data
  • Vulnerability scan results
  • Security telemetry
  • System configuration state

Into a unified assessment model.

ARCH enables organizations to:

  • Capture a point-in-time snapshot of their environment
  • Validate configurations against compliance expectations
  • Identify gaps between policy and implementation
  • Correlate data across systems
  • Produce structured, actionable reporting

This supports the creation of verifiable, audit-aligned evidence consistent with CMMC and NIST requirements.


From Documentation to Demonstration

CMMC assessments require organizations to move beyond describing their security posture.

They must demonstrate it through:

  • Configuration validation
  • Control enforcement
  • Evidence generation

This is the shift from policy-driven compliance to evidence-based compliance.


Final Thought

Understanding what evidence is required for CMMC is essential for any organization preparing for assessment.

Security tools provide important inputs, but compliance depends on:

  • How systems are configured
  • How controls are enforced
  • How evidence is produced and validated

An evidence-based assessment approach ensures your organization is not relying on assumptions, but on verifiable data aligned with federal standards.


Sources and Framework Alignment

This approach aligns with:


Next Step

If your organization is preparing for CMMC or needs to validate its current posture:

Learn how ARCH by Rolle IT can help you generate and validate compliance evidence across your environment.

👉Contact [email protected] to request an ARCH assessment

What Evidence Is Required for a CMMC Assessment? Read More »

What Is a Compliance Assessment (and Why XDR and Vulnerability Scans Aren’t Enough)?

What Is a Compliance Assessment?

A compliance assessment is a structured evaluation of whether your systems, configurations, and security controls meet defined regulatory or framework requirements such as CMMC or NIST.

Unlike traditional security tools, it does not just identify risks—it verifies whether controls are correctly implemented and functioning as intended.

A compliance assessment validates whether controls are correctly implemented—not just whether tools are present.


Why This Matters More Than Ever

Many organizations believe they are compliant because they have invested in modern security tools like XDR and vulnerability scanners.

But compliance is not about tool deployment.
It is about control effectiveness, configuration accuracy, and documented evidence.

This is where the gap exists—and where most audit failures occur.


What XDR Does (and Doesn’t Do)

Extended Detection and Response (XDR) platforms are critical for modern security operations.

What XDR Does Well:

  • Detects suspicious activity and threats
  • Provides endpoint and identity visibility
  • Enables rapid response to incidents

What XDR Does NOT Do:

  • Validate system configurations against compliance frameworks
  • Confirm that required controls are implemented correctly
  • Provide structured, audit-ready compliance evidence

XDR is designed for detection and response, not compliance validation.


What Vulnerability Scanning Does (and Doesn’t Do)

Vulnerability scanning tools identify known weaknesses across systems and applications.

What Vulnerability Scans Do Well:

  • Identify missing patches and known CVEs
  • Highlight exposed services and outdated software
  • Provide risk-based prioritization of vulnerabilities

What Vulnerability Scans Do NOT Do:

  • Assess whether security policies are correctly configured
  • Validate control implementation across environments
  • Correlate findings with real-world compliance requirements

Vulnerability scans measure exposure, not compliance readiness.


Compliance Assessment vs. Security Tools

CapabilityXDRVulnerability ScanCompliance Assessment
Detect threatsYesNoPartial
Identify vulnerabilitiesNoYesYes
Validate configurationsNoNoYes
Confirm compliance alignmentNoNoYes
Provide audit-ready documentationNoNoYes

This distinction is critical.

Security tools generate signals.
Compliance assessments validate the environment behind those signals.


What a True Compliance Assessment Includes

A real compliance assessment goes beyond scanning and detection. It provides a comprehensive, evidence-based view of your environment.

Key Components:

1. Configuration Validation
Evaluates system settings, policies, and configurations against compliance requirements.

2. Control Implementation Review
Confirms whether required controls are properly deployed and enforced.

3. Cross-System Correlation
Analyzes data from multiple sources—XDR, vulnerability scans, telemetry—to identify gaps.

4. Evidence and Documentation
Produces structured output that supports audits and internal reporting.

5. Actionable Remediation Guidance
Identifies not just what is wrong, but what to fix and how to prioritize it.


Where Organizations Typically Fail

Even well-resourced IT teams encounter the same challenges:

  • Over-reliance on tools instead of validation
  • Misconfigured policies and security settings
  • Configuration drift across environments
  • Lack of centralized visibility across systems
  • Insufficient documentation for audits

The result is a false sense of security—and increased risk of compliance failure.


Introducing ARCH by Rolle IT

ARCH is Rolle IT’s AI-supported compliance assessment platform designed to close the gap between security tools and compliance validation.

It combines:

  • XDR data
  • Vulnerability scan results
  • Security telemetry
  • System and environment configurations

Into a single, real-time assessment model.

What ARCH Delivers:

  • A snapshot of your current environment
  • Identification of hidden gaps and misconfigurations
  • Validation of control implementation
  • Detailed, audit-ready reporting
  • Actionable insights for remediation

ARCH is purpose-built for organizations operating in Microsoft GCC High environments and those pursuing CMMC compliance.


From Assumption to Evidence

If your organization relies solely on XDR and vulnerability scanning, you are only seeing part of the picture.

A compliance assessment provides the missing layer:
validation, alignment, and proof.

ARCH gives you the ability to move from:

  • Tool deployment → Control validation
  • Security signals → Compliance evidence
  • Assumptions → Confidence

Take the Next Step

Before your next audit—or before risk becomes reality—understand where you truly stand.

Learn how ARCH can help your organization validate compliance, identify gaps, and build a defensible security posture.

Contact [email protected] for more information

What Is a Compliance Assessment (and Why XDR and Vulnerability Scans Aren’t Enough)? Read More »

The Misunderstanding Around GCC High

Many organizations assume:

“If we are in GCC High, we are closer to compliance.”

While partially true, this assumption is dangerous.

GCC High provides:

  • A compliant infrastructure baseline

But it does not guarantee:

  • Proper configuration
  • Control implementation
  • Policy enforcement

Compliance still depends on how your environment is configured and managed.


Key Challenges in GCC High Compliance Validation

1. Identity and Access Complexity

Identity is central to CMMC and security frameworks.

In GCC High environments, organizations often struggle with:

  • Conditional access misconfigurations
  • Over-permissioned accounts
  • Inconsistent MFA enforcement
  • Role-based access issues

These gaps are difficult to detect without detailed configuration analysis.


2. Policy and Configuration Misalignment

Security policies must be:

  • Defined
  • Applied
  • Verified

Common issues include:

  • Policies created but not enforced
  • Conflicting configurations across systems
  • Incomplete deployment of required settings

Without validation, these issues remain hidden.


3. Logging and Telemetry Gaps

CMMC requires:

  • Logging
  • Monitoring
  • Traceability

In GCC High, organizations often encounter:

  • Incomplete log coverage
  • Misconfigured retention policies
  • Gaps between systems generating logs and systems storing them

This creates risk in both security operations and compliance validation.


4. Configuration Drift in Cloud Environments

Cloud environments are dynamic by nature.

Over time:

  • Settings change
  • Permissions evolve
  • Policies are modified

This leads to configuration drift, where the environment no longer matches its intended compliant state.

Without regular validation, drift introduces silent compliance gaps.


5. Lack of Unified Visibility

GCC High environments span multiple layers:

  • Microsoft 365 services
  • Identity systems
  • Endpoint configurations
  • Security tools

Most organizations lack a unified way to see:

  • How these systems interact
  • Whether controls are consistently implemented
  • Where gaps exist across the environment

This fragmentation makes validation difficult.


The Core Challenge: Seeing the Whole Environment

Compliance in GCC High is not about individual tools or settings.

It is about:

  • How systems are configured
  • How controls are enforced
  • How data flows across the environment

Without a unified, correlated view, organizations are left with:

  • Partial insights
  • Incomplete validation
  • Increased audit risk

What Effective GCC High Validation Requires

To confidently validate compliance in GCC High, organizations need:

Configuration-Level Visibility

Understanding how systems are actually configured—not just how they should be configured.

Cross-System Correlation

Connecting identity, endpoint, telemetry, and policy data into a cohesive assessment.

Control Mapping

Aligning configurations and findings to frameworks like CMMC.

Evidence Generation

Producing documentation that supports audit requirements.


How Rolle IT ARCH Tool Solves GCC High Validation Challenges

ARCH by Rolle IT was built with GCC High environments in mind.

It provides a structured, real-time assessment that combines:

  • XDR insights
  • Vulnerability data
  • Telemetry
  • System configurations

ARCH Enables Organizations To:

  • Capture a true snapshot of their environment
  • Identify misconfigurations across systems
  • Validate control implementation against compliance standards
  • Detect gaps caused by drift or misalignment
  • Generate actionable, audit-ready reports

ARCH delivers the visibility that GCC High environments require—but most organizations lack.


From Complexity to Clarity

GCC High environments are powerful, but they are not self-validating.

Compliance requires:

  • Insight
  • Validation
  • Documentation

Without these, complexity becomes risk.


Operating in GCC High does not guarantee compliance.

It raises the standard for how compliance must be validated.

If your organization needs a clearer, more defensible view of its environment:

ARCH provides the assessment capability to get there.

Connect with us at [email protected]

The Misunderstanding Around GCC High Read More »