Author name: Rolle IT Cybersecurity

Why Law Enforcement Agencies Should Use Microsoft GCC (Not Commercial) — and How to Transition Successfully

Introduction

Law enforcement agencies face unique cybersecurity, compliance, and data protection requirements that standard commercial cloud environments are not designed to meet.

From CJIS compliance to safeguarding Criminal Justice Information (CJI), agencies must ensure that their IT environments meet strict standards for access control, data residency, personnel screening, and auditing.

Microsoft’s Government Community Cloud (GCC) provides a purpose-built environment designed to meet these needs. In contrast, commercial Microsoft 365 environments often fall short in key areas required for public safety and law enforcement operations.

This article outlines why law enforcement agencies should strongly consider GCC over commercial environments—and how to approach the transition effectively.


The Problem with Commercial Cloud for Law Enforcement

Commercial Microsoft 365 environments are designed for general business use—not regulated government workloads.

Key Limitations:

  • No CJIS alignment by default
  • Broader administrative access models (including non-U.S. personnel in some cases)
  • Limited support for law enforcement-specific compliance requirements
  • Less control over data handling expectations tied to public sector policies

While commercial environments can be secured, they typically require significant customization—and still may not meet all CJIS or state-level requirements.


What is Microsoft GCC?

Microsoft GCC is a cloud environment designed specifically for U.S. government entities and their partners.

Key characteristics include:

  • Data residency within the United States
  • Access restricted to screened U.S. persons
  • Alignment with federal and state compliance requirements
  • Separation from commercial cloud infrastructure

For law enforcement agencies, GCC provides a baseline that is much closer to CJIS expectations than commercial offerings.


Why GCC is Better for Law Enforcement

1. CJIS Alignment

CJIS requires strict controls over:

  • Who can access systems
  • Where data is stored
  • How data is transmitted

GCC environments are architected with these requirements in mind, making it easier to:

  • Enforce access restrictions
  • Maintain compliance documentation
  • Pass CJIS audits

2. U.S. Person Access Requirements

CJIS and many state policies require that individuals with access to systems handling CJI meet specific background screening requirements.

GCC environments are designed to support these restrictions, while commercial environments may not provide the same level of assurance.


3. Improved Control and Governance

GCC allows agencies to implement:

  • Strong identity and access controls (MFA, Conditional Access)
  • Centralized logging and monitoring
  • Secure data handling policies

These capabilities align directly with CJIS audit expectations.


4. Reduced Compliance Risk

Starting from a government-aligned environment reduces the risk of:

  • Misconfiguration
  • Policy gaps
  • Audit findings

This is especially important for agencies with limited internal IT resources.


Common Misconceptions

“We can just secure commercial Microsoft 365.”

While technically possible, this often results in:

  • Increased complexity
  • Higher operational burden
  • Greater risk of missing CJIS-specific requirements

“GCC is only for federal agencies.”

GCC is designed for:

  • State and local governments
  • Law enforcement agencies
  • Public sector organizations

Key Considerations Before Transitioning to GCC

Moving to GCC is not a simple license change—it is a structured migration.

Agencies must plan for:

  • Data migration (Exchange, SharePoint, Teams)
  • Identity and access restructuring
  • Device and endpoint configuration
  • Policy and compliance alignment

Without proper planning, migrations can lead to disruption or misconfigurations.


How to Transition to GCC Successfully

A successful transition typically includes:

1. Assessment and Planning

  • Evaluate current environment
  • Identify CJIS gaps
  • Define scope and requirements

2. Environment Design

  • Configure identity and access controls
  • Design secure architecture
  • Align policies with CJIS requirements

3. Migration Execution

  • Migrate email, files, and collaboration tools
  • Validate configurations
  • Minimize downtime and user disruption

4. Post-Migration Hardening

  • Implement security controls
  • Enable logging and monitoring
  • Validate compliance posture

5. Ongoing Compliance Management

  • Continuous monitoring
  • Policy updates
  • Audit preparation

The Role of Leadership in the Transition

Transitioning to GCC is not just an IT initiative.

Agency leadership must:

  • Approve security policies
  • Allocate budget and resources
  • Support enforcement of compliance controls
  • Understand operational impacts

Successful transitions require coordination across IT, administration, and command staff.


How Rolle IT Supports Law Enforcement Agencies

Rolle IT Cybersecurity specializes in supporting public sector and law enforcement organizations.

We provide:

  • GCC readiness assessments n- CJIS-aligned architecture design
  • Secure migration planning and execution
  • Policy and documentation development
  • Ongoing monitoring and compliance support

Our approach ensures that agencies are not only migrated—but also configured correctly and prepared for CJIS audits.


About Rolle IT Cybersecurity

For law enforcement agencies, choosing the right cloud environment is a critical decision that impacts security, compliance, and operational effectiveness.

Microsoft GCC provides a foundation that aligns with CJIS requirements and reduces compliance risk compared to commercial environments.

With the right strategy and support, agencies can transition successfully and build a secure, compliant, and future-ready IT environment.

Rolle IT Cybersecurity helps law enforcement agencies and public sector organizations design, implement, and manage secure GCC environments aligned with CJIS and other regulatory requirements.

If your agency is evaluating GCC or planning a transition, Rolle IT can provide expert guidance to ensure a successful outcome. [email protected]

Why Law Enforcement Agencies Should Use Microsoft GCC (Not Commercial) — and How to Transition Successfully Read More »

CJIS Compliance Explained: What IT Leaders Need to Know to Protect Criminal Justice Information

Introduction

For organizations supporting law enforcement, public safety, and government operations, CJIS compliance is a critical requirement.

The Criminal Justice Information Services (CJIS) Security Policy governs how Criminal Justice Information (CJI) is accessed, transmitted, and protected. Whether you are a police department, municipality, MSP, or technology vendor, failure to comply can result in loss of access, contract risk, and significant operational disruption.

This article provides a clear, expert-level overview of CJIS compliance, what it requires, and how organizations can build an environment that meets both technical and audit expectations.


What is CJIS Compliance?

CJIS compliance refers to adherence to the FBI CJIS Security Policy, a set of requirements designed to ensure the confidentiality, integrity, and availability of criminal justice data.

It applies to:

  • Law enforcement agencies
  • State and local government entities
  • Courts and public safety organizations
  • Vendors and contractors with access to CJI

If your organization touches CJI in any form, you are expected to comply with CJIS requirements.


What is Criminal Justice Information (CJI)?

CJI includes sensitive data such as:

  • Criminal history records
  • Biometric data (fingerprints, facial recognition)
  • Personally identifiable information tied to investigations
  • Law enforcement operational data

Because of its sensitivity, CJIS requires strict controls over how this data is handled across systems, users, and networks.


Core CJIS Security Requirements

While the CJIS Security Policy is extensive, key control areas include:

1. Access Control

  • Unique user identification
  • Multi-factor authentication (MFA)
  • Least privilege access
  • Session timeouts and lockouts

2. Encryption

  • Encryption of data in transit
  • Secure remote access (VPN or equivalent)
  • Protection of data across public networks

3. Auditing and Accountability

  • Logging of user activity
  • Monitoring access to CJI
  • Retention of audit logs

4. Personnel Security

  • Background checks for individuals accessing CJI
  • Security awareness training
  • Role-based access approval

5. Incident Response

  • Defined procedures for handling security incidents
  • Reporting requirements
  • Documentation of response actions

6. Device and Endpoint Security

  • Secure configuration of systems
  • Patch management
  • Endpoint protection

CJIS Compliance Is More Than Technology

One of the most common misconceptions is that CJIS compliance is purely a technical implementation.

In reality, it requires:

  • Documented policies and procedures
  • Ongoing training and awareness
  • Leadership oversight and accountability
  • Coordination between IT, HR, and management

CJIS is a program, not just a set of tools.


CJIS Audits and Oversight

CJIS compliance is enforced through state CJIS Systems Agencies (CSA), which conduct audits and reviews.

Organizations should expect:

  • Periodic compliance audits
  • Documentation reviews
  • Validation of technical controls
  • Interviews with personnel

Failure to demonstrate compliance can result in:

  • Loss of system access
  • Contract termination
  • Reputational damage

Common Challenges Organizations Face

  • Interpreting CJIS requirements correctly
  • Managing documentation and policy requirements
  • Aligning technical controls with policy statements
  • Supporting remote access securely
  • Maintaining compliance over time

Many organizations underestimate the operational effort required to remain compliant.


CJIS and Other Frameworks (NIST, CIS)

CJIS shares similarities with other frameworks such as NIST and CIS Controls.

Common overlaps include:

  • Access control
  • Logging and monitoring
  • Incident response
  • Configuration management

This means organizations can often:

  • Leverage existing security investments
  • Align CJIS with broader compliance programs
  • Reduce duplication of effort

However, CJIS includes specific legal and operational requirements that must be addressed independently.


Building a CJIS-Compliant Environment

A practical approach includes:

  1. Defining where CJI exists (scope)
  2. Implementing required technical controls
  3. Developing policies and procedures
  4. Training personnel
  5. Establishing monitoring and auditing

Platforms like Microsoft 365 (including identity, endpoint, and logging tools) can support many CJIS requirements when properly configured.


The Role of Leadership in CJIS Compliance

CJIS compliance requires involvement beyond IT.

Leadership must:

  • Approve policies and procedures
  • Support enforcement of security controls
  • Allocate resources for compliance
  • Accept and manage risk

Organizations that treat CJIS as “just IT” often fail during audits due to governance gaps.


When to Seek Expert Support

Organizations often require assistance when:

  • Preparing for CJIS audits
  • Interpreting policy requirements
  • Implementing secure environments
  • Managing ongoing compliance

Expert support helps ensure that controls are not only implemented—but also documented and defensible.


About Rolle IT Cybersecurity

CJIS compliance is essential for any organization handling criminal justice information. It requires a combination of technical controls, policy enforcement, and organizational accountability.

By taking a structured approach and aligning CJIS with broader cybersecurity practices, organizations can build a secure, compliant, and audit-ready environment.


Rolle IT Cybersecurity helps law enforcement agencies, municipalities, and vendors achieve and maintain CJIS compliance.

We support organizations with:

  • CJIS readiness assessments
  • Secure environment design and implementation
  • Policy and documentation development
  • Ongoing monitoring and compliance support

If your organization needs guidance navigating CJIS requirements, Rolle IT provides expert support tailored to your environment. [email protected]

CJIS Compliance Explained: What IT Leaders Need to Know to Protect Criminal Justice Information Read More »

How to Complete Cybersecurity Questionnaires: A Practical Outline for IT and Security Teams

Introduction

IT security questionnaire help, CMMC questionnaire answers, NIST 800-171 questionnaire support, federal contractor compliance questionnaire, DFARS compliance questionnaire, cybersecurity questionnaire assistance, CUI compliance questions, how to answer security questionnaires, CMMC readiness questionnaire, IT compliance documentation support

These questionnaires—issued by customers, insurers, partners, auditors, or regulatory bodies—are not simple checklists. They are designed to validate whether your organization can effectively manage cybersecurity risk and protect sensitive data.

Depending on the context, they may align to frameworks such as:

  • NIST SP 800-171
  • NIST Cybersecurity Framework (CSF)
  • CIS Critical Security Controls
  • ISO 27001
  • CMMC (for DoD-related work)
  • Custom requirements

This article outlines how to approach these questionnaires effectively, avoid common pitfalls, and position your organization as audit-ready.


Why IT Security Questionnaires Matter

IT security questionnaires are not limited to DoD or CMMC-driven contracts. Organizations encounter them across multiple contexts, including:

  • Cybersecurity insurance applications and renewals
  • State, Local, and Education (SLED) contracts
  • Vendor risk assessments from partners and primes
  • General third-party risk management programs

Each of these questionnaires may vary in complexity, but they all serve a similar purpose: evaluating your organization’s ability to manage cybersecurity risk and protect sensitive data.

Security maturity expectations are increasing across all sectors—not just federal contracting. As a result, even “simpler” questionnaires often include controls aligned to frameworks like NIST 800-171, NIST CSF, or CIS Controls.

Security questionnaires are often the first gate to winning or maintaining contracts.

They are used to:

  • Validate your cybersecurity posture before award
  • Assess risk in the supply chain
  • Determine eligibility for handling CUI
  • Pre-screen organizations for CMMC readiness

Poor or inconsistent responses can:

  • Delay contract awards
  • Trigger additional scrutiny
  • Disqualify your organization

What These Questionnaires Are Really Testing

Most questionnaires map directly to NIST SP 800-171 control families.

They are not just asking what tools you use—they are evaluating whether you can:

  • Demonstrate control implementation
  • Provide supporting evidence
  • Align technical controls with documented policies
  • Show repeatable, enforceable processes

In other words, they are testing program maturity, not just technology.


Common Challenges IT Teams Face

1. Interpreting the Questions Correctly

Many questions are written in compliance language, not operational language. For example:

“Does your organization enforce least privilege across all systems?”

This requires both:

  • Technical enforcement (RBAC, PIM, etc.)
  • Documented policy and governance

2. Inconsistent or Unsupported Answers

A common issue is answering “Yes” without:

  • Documented procedures
  • Configurations to support the claim
  • Evidence (logs, screenshots, reports)

This creates risk during audits or follow-up reviews.


3. Lack of Alignment Between IT and Leadership

Security questionnaires often require input beyond IT:

  • Legal (contracts, data handling)
  • HR (personnel security)
  • Executive leadership (risk acceptance)

Without coordination, responses can be incomplete or contradictory.


4. Time Constraints and Resource Limitations

Completing questionnaires thoroughly can take:

  • Dozens of hours
  • Cross-functional coordination
  • Technical validation and documentation

For lean IT teams, this becomes a major operational burden.


A Structured Approach to Completing Questionnaires

1. Map Questions to NIST 800-171 Controls

Instead of answering each question independently, map them to:

  • Control families (AC, AU, IA, SI, etc.)
  • Specific control IDs (e.g., AC.2.001)

This ensures consistency across responses.


2. Build a Centralized Evidence Repository

Maintain documentation such as:

  • System Security Plan (SSP)
  • Policies and procedures
  • Configuration baselines
  • Audit logs and reports

This allows you to reuse validated responses.


3. Standardize Response Language

Develop pre-approved response statements for common controls.

Example structure:

  • Control intent
  • How it is implemented
  • Tools used
  • Reference to policy/evidence

This improves accuracy and reduces rework.


4. Involve the Attesting Official and Leadership

Security questionnaires often imply attestation of compliance.

This means:

  • Responses should reflect organizational risk decisions
  • Leadership must understand what is being claimed
  • The Attesting Official may ultimately be accountable

Cybersecurity is not just an IT responsibility. It is a company-wide program.


5. Validate Before Submission

Before submitting:

  • Review for consistency across answers
  • Ensure claims match actual configurations
  • Confirm documentation exists for each “Yes”

Treat the questionnaire like a pre-audit.


How Microsoft Environments Can Support Responses

Organizations using Microsoft 365 (GCC or GCC High) can leverage native tools to support questionnaire responses:

  • Entra ID → Access control, MFA, identity governance
  • Defender Suite → Endpoint, identity, and email protection
  • Purview → Data classification, DLP, compliance controls
  • Microsoft Sentinel → Logging, monitoring, SIEM

When properly configured, these tools provide both:

  • Control implementation
  • Evidence for validation

Common Mistakes That Lead to Failed Reviews

  • Treating questionnaires as administrative tasks
  • Overstating capabilities (“Yes” without evidence)
  • Ignoring documentation requirements
  • Lack of executive awareness or approval

When to Bring in Expert Support

Organizations often seek assistance when:

  • Questionnaires become more technical or detailed
  • Contracts require higher levels of assurance
  • Internal teams lack compliance experience
  • There is concern about audit readiness

Expert support can help:

  • Translate compliance requirements into accurate responses
  • Validate technical controls
  • Ensure alignment with CMMC expectations

Conclusion

IT security questionnaires are not just paperwork, they are a critical component of demonstrating compliance and securing federal contracts.

A structured, evidence-based approach, combined with leadership involvement, ensures your responses accurately reflect your organization’s capabilities and readiness.

Organizations that treat questionnaires as part of a broader compliance program are far more likely to succeed in compliance needs.


About Rolle IT Cybersecurity

Rolle IT Cybersecurity is a Managed Security Service Provider (MSSP) specializing in supporting the Defense Industrial Base and federal contractors.

We help organizations:

  • Complete complex IT security questionnaires
  • Align responses with NIST 800-53 NIST 800-171, CMMC and other targeted frameworks
  • Validate technical controls and documentation
  • Prepare for audits and contract requirements

If your team is struggling with compliance questionnaires or needs validation before submission, Rolle IT can provide expert support. [email protected]

How to Complete Cybersecurity Questionnaires: A Practical Outline for IT and Security Teams Read More »

How IT Directors Can Implement CMMC Level 2 In-House: A Practical Outline for IT Directors

Introduction

As CMMC requirements become mandatory across Department of Defense (DoD) contracts, many IT Directors and security leaders are asking a critical question:

Can we implement CMMC Level 2 ourselves without hiring a full external consulting firm?

The answer is yes: with the right strategy, tooling, and understanding of NIST SP 800-171. However, it is important to set expectations clearly.

This is not a step-by-step implementation guide. Instead, this article is an expert-informed outline of the critical considerations, decision points, and functional areas organizations must address when pursuing CMMC Level 2 in-house.

CMMC implementation varies significantly based on your environment, contracts, and risk tolerance. This overview is designed to help IT Directors and Stakeholders understand the scope and complexity of the effort so they can plan appropriately, ask the right questions, and avoid common pitfalls.


This article provides a structured outline for thinking about CMMC Level 2 implementation internally, using proven practices and Microsoft-native tools where applicable.


Understanding What “CMMC Level 2” Really Requires

CMMC Level 2 aligns directly with NIST SP 800-171 Rev. 2, which includes 110 security controls across 14 control families.

Key areas include:

  • Access Control (AC)
  • Audit & Accountability (AU)
  • Configuration Management (CM)
  • Identification & Authentication (IA)
  • Incident Response (IR)
  • System & Communications Protection (SC)

For IT Directors, this means your responsibility is not just technical deployment—but also documentation, policy enforcement, and continuous monitoring.


Step 1: Establish Executive Ownership and Accountability

Before any technical work begins, it is critical to understand that CMMC is not an IT project—it is an organization-wide compliance program.

A successful implementation requires active involvement from:

  • Executive leadership (CEO, COO, or equivalent)
  • The designated CMMC Attesting Official
  • Legal and compliance stakeholders
  • IT and security leadership
  • Users

Why Leadership Involvement Matters

Under CMMC, the Attesting Official is legally responsible for affirming that the organization meets required controls. This means:

  • Decisions about risk acceptance cannot be made solely by IT
  • Budget, staffing, and operational impacts must be approved at the executive level
  • Policies must be enforced across the entire organization—not just technical systems

Key Responsibilities of Leadership

  • Approving the System Security Plan (SSP)
  • Reviewing and accepting risk documented in the POA&M
  • Ensuring resources are allocated for compliance
  • Driving a culture of security and accountability

Organizations that treat CMMC as “just IT” often fail audits due to gaps in governance, policy enforcement, and documentation.


Step 2: Define Your CUI Boundary

Before implementing any controls, you must clearly define:

  • Where Controlled Unclassified Information (CUI) is stored
  • Where it is processed
  • Who has access to it

This is known as your CMMC scope or boundary.

Best practices:

  • Segment CUI systems from corporate IT
  • Limit access to only required personnel
  • Document all systems within scope

Failing to properly scope your environment is one of the most common causes of audit failure.


Step 3: Perform a NIST 800-171 Gap Assessment

A gap assessment identifies where your current environment does not meet required controls.

Approach:

  • Review all 110 controls in NIST 800-171
  • Score each as: Implemented, Partially Implemented, or Not Implemented
  • Document evidence for each control

Tools you can use:

  • Microsoft Compliance Manager
  • NIST 800-171 assessment templates
  • SSP/POA&M tracking spreadsheets

The output should include a Plan of Action and Milestones (POA&M).


Step 4: Build Your System Security Plan (SSP)

Your System Security Plan (SSP) is the central document auditors will review.

It must define:

  • System architecture
  • Control implementations
  • Roles and responsibilities
  • Policies and procedures

Key tip: Write your SSP as you implement controls—not after.


Step 5: Implement Core Technical Controls

For most organizations, Microsoft 365 (especially GCC or GCC High) provides a strong foundation.

Identity & Access Control

  • Enforce MFA for all users
  • Implement Conditional Access policies
  • Use least privilege principles

Endpoint Security

  • Deploy endpoint detection and response (EDR)
  • Enforce device compliance policies
  • Maintain patch management

Data Protection

  • Implement Data Loss Prevention (DLP)
  • Encrypt data at rest and in transit
  • Use sensitivity labels for CUI

Logging & Monitoring

  • Enable audit logging
  • Centralize logs (SIEM)
  • Monitor for anomalies

Step 6: Develop Required Policies and Procedures

CMMC is not just technical—it is heavily policy-driven.

You must create and maintain policies for:

  • Access control n- Incident response
  • Configuration management
  • Media protection
  • Personnel security

Policies must be:

  • Documented
  • Approved by leadership
  • Enforced and reviewed regularly

Step 7: Establish Incident Response Capabilities

You must be able to:

  • Detect security incidents
  • Respond quickly
  • Document actions taken
  • Report incidents when required (DFARS 7012)

This includes creating:

  • Incident response plan
  • Playbooks
  • Communication procedures

Step 8: Continuous Monitoring and Maintenance

CMMC compliance is not a one-time project.

You must continuously:

  • Monitor security events
  • Review logs
  • Update systems
  • Reassess controls

Automation tools (like Microsoft Defender and Sentinel) significantly reduce workload.


Common Challenges for DIY CMMC Implementation

While self-implementation is possible, IT Directors should be aware of common obstacles:

  • Underestimating documentation requirements
  • Misinterpreting control requirements
  • Misconfiguring technical controls
  • Lack of internal compliance expertise
  • Time constraints on IT teams
  • Difficulty preparing for third-party audits

Many organizations start internally but eventually require expert validation.


When to Consider External Support

Even if you implement most controls internally, external expertise can help with:

  • Gap validation before audit
  • SSP and documentation review
  • Technical Controls Consulting
  • Remediation & Implementation
  • CMMC readiness assessments
  • Ongoing monitoring (SOC services)

This hybrid approach balances cost with assurance.


Conclusion

Implementing CMMC Level 2 in-house is achievable for organizations with strong IT leadership and disciplined processes. The key is to approach it as a structured program—not just a technical deployment.

By focusing on scope, controls, documentation, and continuous monitoring, IT Directors can build a compliant environment that supports both regulatory requirements and long-term security maturity.


About Rolle IT Cybersecurity

Rolle IT Cybersecurity helps DoD contractors navigate CMMC implementation—whether you need full-service support or expert validation of your in-house efforts.

If you are working toward CMMC compliance, Rolle IT can help ensure your environment is audit-ready. [email protected]


How IT Directors Can Implement CMMC Level 2 In-House: A Practical Outline for IT Directors Read More »

Implementing Microsoft GCC High Environments for CMMC Compliance: A Practical Guide for DoD Contractors

Introduction

For organizations operating within the Defense Industrial Base (DIB), achieving and maintaining Cybersecurity Maturity Model Certification (CMMC) compliance is no longer optional. One of the most critical decisions in this journey is selecting and properly implementing a secure cloud environment that meets federal data handling requirements.

Microsoft Government Community Cloud High (GCC High) has emerged as the de facto standard for contractors handling Controlled Unclassified Information (CUI) and export-controlled data such as ITAR. However, simply migrating to GCC High does not guarantee compliance. Proper implementation, configuration, and ongoing management using Microsoft-native security tools are essential.

This guide provides a subject-matter-expert (SME) level overview of how to implement a GCC High environment and operationalize it using Microsoft’s native security stack to support CMMC, NIST SP 800-171, and DFARS requirements.


What is Microsoft GCC High?

Microsoft GCC High is a sovereign cloud environment designed specifically for U.S. government agencies and contractors. It provides:

  • U.S.-based data residency
  • Access restricted to screened U.S. persons
  • Compliance with DFARS 7012, ITAR, and FedRAMP High
  • Separation from commercial Microsoft 365 tenants

For DoD contractors handling CUI, GCC High is often required to meet compliance expectations under DFARS 252.204-7012 and CMMC Level 2 and Level 3 requirements.


Why GCC High is Critical for CMMC Compliance

CMMC Level 2 is aligned with NIST SP 800-171, which mandates strict controls around:

  • Access control (AC)
  • Audit and accountability (AU)
  • Identification and authentication (IA)
  • System and communications protection (SC)

A properly configured GCC High tenant enables organizations to implement these controls using built-in Microsoft technologies rather than relying heavily on third-party tools.


Core Components of a GCC High Implementation

1. Identity & Access Management (Microsoft Entra ID)

Identity is the foundation of CMMC compliance.

Key configurations include:

  • Enforcing Multi-Factor Authentication (MFA) for all users
  • Conditional Access policies for risk-based access control
  • Privileged Identity Management (PIM) for just-in-time admin access
  • Disabling legacy authentication protocols

These controls directly map to NIST 800-171 IA and AC families.


2. Endpoint Security (Microsoft Intune + Defender for Endpoint)

Endpoints are a primary attack vector and a major focus of CMMC audits.

Best practices:

  • Enroll all devices in Intune for centralized management
  • Enforce device compliance policies
  • Deploy Microsoft Defender for Endpoint (MDE) in GCC High
  • Enable EDR and automated investigation and response

This supports CMF controls for configuration management (CM) and system integrity (SI).


3. Data Protection (Microsoft Purview)

Protecting CUI is the core objective of CMMC.

Key capabilities:

  • Data Loss Prevention (DLP) policies for CUI
  • Sensitivity labels and encryption
  • Insider risk management
  • Audit logging and eDiscovery

Proper classification and labeling ensure that CUI is controlled across SharePoint, Teams, and Exchange.


4. Threat Detection & Response (Microsoft Defender XDR)

A modern Security Operations Center (SOC) strategy relies on visibility and response capabilities.

Microsoft-native approach:

  • Microsoft Defender for Endpoint
  • Defender for Office 365
  • Defender for Identity
  • Centralized correlation via Microsoft XDR

This provides:

  • Real-time threat detection
  • Incident correlation
  • Automated remediation workflows

5. Logging, Monitoring, and SIEM (Microsoft Sentinel)

CMMC requires robust logging and continuous monitoring.

Implementation steps:

  • Enable unified audit logging
  • Ingest logs into Microsoft Sentinel (GCC High supported)
  • Configure analytic rules and alerting
  • Implement playbooks for automated response

This directly supports AU (Audit and Accountability) requirements.


Common Pitfalls in GCC High Deployments

Many organizations assume that migrating to GCC High equals compliance. This is incorrect.

Frequent issues include:

  • Misconfigured Conditional Access policies
  • Lack of endpoint enrollment
  • Incomplete logging and monitoring
  • No formal incident response process
  • Failure to map controls to NIST 800-171 requirements

Without proper configuration and governance, organizations remain non-compliant despite being in the correct cloud environment.


Mapping Microsoft Native Tools to CMMC Controls

One of the advantages of GCC High is the ability to map Microsoft tools directly to compliance controls:

CMMC / NIST ControlMicrosoft Tool
Access Control (AC)Entra ID, Conditional Access
Audit (AU)Microsoft Sentinel, Audit Logs
Identification (IA)MFA, PIM
System Integrity (SI)Defender for Endpoint
Data Protection (MP/SC)Purview, DLP

This reduces complexity and simplifies audit readiness.


Building an Audit-Ready GCC High Environment

To achieve audit readiness, organizations should:

  1. Develop a System Security Plan (SSP)
  2. Implement policies aligned with NIST SP 800-171
  3. Continuously monitor security posture
  4. Conduct regular gap assessments
  5. Document all configurations and controls

Automation using Microsoft tools significantly reduces manual overhead and improves consistency.


The Role of a Managed Security Service Provider (MSSP)

Implementing and maintaining a GCC High environment requires deep expertise in:

  • Microsoft security architecture
  • CMMC and NIST frameworks
  • Continuous monitoring and incident response

A specialized MSSP can:

  • Accelerate deployment
  • Ensure correct configuration
  • Provide 24/7 SOC services
  • Maintain compliance over time
  • Provide a customized Shared Responsibilities Matrix to meet the needs of your organization

GCC High is not just a hosting environment

It is a compliance foundation for DoD contractors handling CUI. However, compliance is achieved through proper implementation and operationalization of Microsoft-native security tools.

Organizations that take a structured, control-driven approach—leveraging Entra ID, Defender, Purview, and Sentinel—are best positioned to achieve and maintain CMMC compliance.


About Rolle IT Cybersecurity

Rolle IT Cybersecurity is a leading Managed Security Service Provider (MSSP) specializing in supporting the Defense Industrial Base. We help federal contractors design, implement, and operate GCC High environments aligned with CMMC and NIST SP 800-171.

If your organization is preparing for CMMC or needs to migrate to GCC High, contact Rolle IT to develop a compliant, audit-ready security architecture. Schedule your free consultation at [email protected]

Implementing Microsoft GCC High Environments for CMMC Compliance: A Practical Guide for DoD Contractors Read More »

What Evidence Is Required for a CMMC Assessment?

What Evidence Is Required for CMMC?

A CMMC assessment requires organizations to provide objective, verifiable evidence that security controls are implemented, enforced, and functioning as intended across their environment.

This evidence must demonstrate not only that policies exist, but that systems, configurations, and operational processes align with those policies in practice.

In CMMC, stated intent is not sufficient—evidence must be observable, testable, and defensible.


Why Evidence Matters in CMMC

The Cybersecurity Maturity Model Certification (CMMC) is explicitly designed as an evidence-based framework. According to the Department of Defense’s CMMC Model 2.0, assessments are focused on validating that practices are implemented—not just documented.

Rather than evaluating whether an organization has purchased tools or written policies, assessors evaluate whether:

  • Controls are implemented correctly
  • Configurations support those controls
  • Systems produce evidence that controls are functioning

This aligns directly with the NIST SP 800-171A assessment methodology, which defines how security requirements are evaluated through examination, testing, and interviews.

Source:
https://dodcio.defense.gov/CMMC/
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171A.pdf


The Types of Evidence Required for CMMC

CMMC assessments rely on multiple categories of evidence. These are grounded in NIST SP 800-171A, which defines “assessment objects” such as specifications, mechanisms, and activities.


1. Policy and Procedural Evidence

This includes documented materials that define how your organization intends to meet security requirements.

Examples:

  • Security policies
  • Standard operating procedures (SOPs)
  • Access control policies
  • Incident response plans

These documents establish intent, but do not prove implementation.


2. Technical and Configuration Evidence

This is the most critical category for validation.

It demonstrates how systems are actually configured and whether controls are implemented at the technical level.

Examples:

  • Identity and access configurations (e.g., MFA enforcement)
  • Conditional access policies
  • Endpoint security settings
  • System configuration baselines
  • Encryption configurations
  • Network segmentation

NIST SP 800-171A specifically requires assessors to evaluate mechanisms, meaning the technical implementations that enforce controls.

Source:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171A.pdf


3. Operational and Logging Evidence

This evidence demonstrates that controls are functioning over time.

Examples:

  • Audit logs
  • Security event logs
  • Monitoring outputs
  • Alerting and response records
  • Log retention configurations

These artifacts support validation that controls are not only configured, but actively operating.


The Difference Between Documentation and Evidence

A common point of confusion is the difference between documentation and evidence.

Documentation:

  • Describes what should happen
  • Exists in policies and procedures

Evidence:

  • Shows what is actually happening
  • Exists in configurations, logs, and system outputs

For example:

  • A policy may require multi-factor authentication (MFA)
  • Evidence must show MFA is enabled, enforced, and consistently applied across users

This distinction is reinforced in NIST guidance, which separates specifications (policies) from mechanisms (systems) and activities (operations).


How Assessors Evaluate Evidence

During a CMMC assessment, evidence is evaluated using standardized methods defined in NIST SP 800-171A:

Examine

Reviewing documents, configurations, and artifacts

Interview

Speaking with personnel to confirm implementation

Test

Validating that controls function as expected

Assessors are looking for:

  • Completeness — Coverage across systems
  • Accuracy — Reflects current environment
  • Consistency — Controls applied uniformly
  • Traceability — Mapped to specific CMMC practices

Source:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171A.pdf


Why Security Tools Alone Do Not Satisfy Evidence Requirements

Security tools such as XDR platforms and vulnerability scanners provide important data, but they do not independently fulfill CMMC evidence requirements.

For example:

  • XDR provides detection and response data
  • Vulnerability scans identify known exposures

However, they do not:

  • Validate configuration alignment with CMMC controls
  • Confirm consistent enforcement of policies
  • Produce structured evidence mapped to compliance requirements

NIST SP 800-171 requires controls to be implemented and enforced, not simply supported by tools.

Source:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf


What a Complete Evidence-Based Assessment Looks Like

A comprehensive approach to CMMC evidence includes:

  • A snapshot of system configurations
  • Validation of identity and access controls
  • Verification of logging and monitoring coverage
  • Correlation of tool outputs with control requirements
  • Structured documentation aligned to CMMC practices

This transforms raw technical data into audit-ready, defensible evidence.


How ARCH by Rolle IT Supports Evidence Validation

ARCH is designed to help organizations generate and validate the types of evidence required for CMMC assessments.

It combines:

  • XDR data
  • Vulnerability scan results
  • Security telemetry
  • System configuration state

Into a unified assessment model.

ARCH enables organizations to:

  • Capture a point-in-time snapshot of their environment
  • Validate configurations against compliance expectations
  • Identify gaps between policy and implementation
  • Correlate data across systems
  • Produce structured, actionable reporting

This supports the creation of verifiable, audit-aligned evidence consistent with CMMC and NIST requirements.


From Documentation to Demonstration

CMMC assessments require organizations to move beyond describing their security posture.

They must demonstrate it through:

  • Configuration validation
  • Control enforcement
  • Evidence generation

This is the shift from policy-driven compliance to evidence-based compliance.


Final Thought

Understanding what evidence is required for CMMC is essential for any organization preparing for assessment.

Security tools provide important inputs, but compliance depends on:

  • How systems are configured
  • How controls are enforced
  • How evidence is produced and validated

An evidence-based assessment approach ensures your organization is not relying on assumptions, but on verifiable data aligned with federal standards.


Sources and Framework Alignment

This approach aligns with:


Next Step

If your organization is preparing for CMMC or needs to validate its current posture:

Learn how ARCH by Rolle IT can help you generate and validate compliance evidence across your environment.

👉Contact [email protected] to request an ARCH assessment

What Evidence Is Required for a CMMC Assessment? Read More »

What Is a Compliance Assessment (and Why XDR and Vulnerability Scans Aren’t Enough)?

What Is a Compliance Assessment?

A compliance assessment is a structured evaluation of whether your systems, configurations, and security controls meet defined regulatory or framework requirements such as CMMC or NIST.

Unlike traditional security tools, it does not just identify risks—it verifies whether controls are correctly implemented and functioning as intended.

A compliance assessment validates whether controls are correctly implemented—not just whether tools are present.


Why This Matters More Than Ever

Many organizations believe they are compliant because they have invested in modern security tools like XDR and vulnerability scanners.

But compliance is not about tool deployment.
It is about control effectiveness, configuration accuracy, and documented evidence.

This is where the gap exists—and where most audit failures occur.


What XDR Does (and Doesn’t Do)

Extended Detection and Response (XDR) platforms are critical for modern security operations.

What XDR Does Well:

  • Detects suspicious activity and threats
  • Provides endpoint and identity visibility
  • Enables rapid response to incidents

What XDR Does NOT Do:

  • Validate system configurations against compliance frameworks
  • Confirm that required controls are implemented correctly
  • Provide structured, audit-ready compliance evidence

XDR is designed for detection and response, not compliance validation.


What Vulnerability Scanning Does (and Doesn’t Do)

Vulnerability scanning tools identify known weaknesses across systems and applications.

What Vulnerability Scans Do Well:

  • Identify missing patches and known CVEs
  • Highlight exposed services and outdated software
  • Provide risk-based prioritization of vulnerabilities

What Vulnerability Scans Do NOT Do:

  • Assess whether security policies are correctly configured
  • Validate control implementation across environments
  • Correlate findings with real-world compliance requirements

Vulnerability scans measure exposure, not compliance readiness.


Compliance Assessment vs. Security Tools

CapabilityXDRVulnerability ScanCompliance Assessment
Detect threatsYesNoPartial
Identify vulnerabilitiesNoYesYes
Validate configurationsNoNoYes
Confirm compliance alignmentNoNoYes
Provide audit-ready documentationNoNoYes

This distinction is critical.

Security tools generate signals.
Compliance assessments validate the environment behind those signals.


What a True Compliance Assessment Includes

A real compliance assessment goes beyond scanning and detection. It provides a comprehensive, evidence-based view of your environment.

Key Components:

1. Configuration Validation
Evaluates system settings, policies, and configurations against compliance requirements.

2. Control Implementation Review
Confirms whether required controls are properly deployed and enforced.

3. Cross-System Correlation
Analyzes data from multiple sources—XDR, vulnerability scans, telemetry—to identify gaps.

4. Evidence and Documentation
Produces structured output that supports audits and internal reporting.

5. Actionable Remediation Guidance
Identifies not just what is wrong, but what to fix and how to prioritize it.


Where Organizations Typically Fail

Even well-resourced IT teams encounter the same challenges:

  • Over-reliance on tools instead of validation
  • Misconfigured policies and security settings
  • Configuration drift across environments
  • Lack of centralized visibility across systems
  • Insufficient documentation for audits

The result is a false sense of security—and increased risk of compliance failure.


Introducing ARCH by Rolle IT

ARCH is Rolle IT’s AI-supported compliance assessment platform designed to close the gap between security tools and compliance validation.

It combines:

  • XDR data
  • Vulnerability scan results
  • Security telemetry
  • System and environment configurations

Into a single, real-time assessment model.

What ARCH Delivers:

  • A snapshot of your current environment
  • Identification of hidden gaps and misconfigurations
  • Validation of control implementation
  • Detailed, audit-ready reporting
  • Actionable insights for remediation

ARCH is purpose-built for organizations operating in Microsoft GCC High environments and those pursuing CMMC compliance.


From Assumption to Evidence

If your organization relies solely on XDR and vulnerability scanning, you are only seeing part of the picture.

A compliance assessment provides the missing layer:
validation, alignment, and proof.

ARCH gives you the ability to move from:

  • Tool deployment → Control validation
  • Security signals → Compliance evidence
  • Assumptions → Confidence

Take the Next Step

Before your next audit—or before risk becomes reality—understand where you truly stand.

Learn how ARCH can help your organization validate compliance, identify gaps, and build a defensible security posture.

Contact [email protected] for more information

What Is a Compliance Assessment (and Why XDR and Vulnerability Scans Aren’t Enough)? Read More »

The Misunderstanding Around GCC High

Many organizations assume:

“If we are in GCC High, we are closer to compliance.”

While partially true, this assumption is dangerous.

GCC High provides:

  • A compliant infrastructure baseline

But it does not guarantee:

  • Proper configuration
  • Control implementation
  • Policy enforcement

Compliance still depends on how your environment is configured and managed.


Key Challenges in GCC High Compliance Validation

1. Identity and Access Complexity

Identity is central to CMMC and security frameworks.

In GCC High environments, organizations often struggle with:

  • Conditional access misconfigurations
  • Over-permissioned accounts
  • Inconsistent MFA enforcement
  • Role-based access issues

These gaps are difficult to detect without detailed configuration analysis.


2. Policy and Configuration Misalignment

Security policies must be:

  • Defined
  • Applied
  • Verified

Common issues include:

  • Policies created but not enforced
  • Conflicting configurations across systems
  • Incomplete deployment of required settings

Without validation, these issues remain hidden.


3. Logging and Telemetry Gaps

CMMC requires:

  • Logging
  • Monitoring
  • Traceability

In GCC High, organizations often encounter:

  • Incomplete log coverage
  • Misconfigured retention policies
  • Gaps between systems generating logs and systems storing them

This creates risk in both security operations and compliance validation.


4. Configuration Drift in Cloud Environments

Cloud environments are dynamic by nature.

Over time:

  • Settings change
  • Permissions evolve
  • Policies are modified

This leads to configuration drift, where the environment no longer matches its intended compliant state.

Without regular validation, drift introduces silent compliance gaps.


5. Lack of Unified Visibility

GCC High environments span multiple layers:

  • Microsoft 365 services
  • Identity systems
  • Endpoint configurations
  • Security tools

Most organizations lack a unified way to see:

  • How these systems interact
  • Whether controls are consistently implemented
  • Where gaps exist across the environment

This fragmentation makes validation difficult.


The Core Challenge: Seeing the Whole Environment

Compliance in GCC High is not about individual tools or settings.

It is about:

  • How systems are configured
  • How controls are enforced
  • How data flows across the environment

Without a unified, correlated view, organizations are left with:

  • Partial insights
  • Incomplete validation
  • Increased audit risk

What Effective GCC High Validation Requires

To confidently validate compliance in GCC High, organizations need:

Configuration-Level Visibility

Understanding how systems are actually configured—not just how they should be configured.

Cross-System Correlation

Connecting identity, endpoint, telemetry, and policy data into a cohesive assessment.

Control Mapping

Aligning configurations and findings to frameworks like CMMC.

Evidence Generation

Producing documentation that supports audit requirements.


How Rolle IT ARCH Tool Solves GCC High Validation Challenges

ARCH by Rolle IT was built with GCC High environments in mind.

It provides a structured, real-time assessment that combines:

  • XDR insights
  • Vulnerability data
  • Telemetry
  • System configurations

ARCH Enables Organizations To:

  • Capture a true snapshot of their environment
  • Identify misconfigurations across systems
  • Validate control implementation against compliance standards
  • Detect gaps caused by drift or misalignment
  • Generate actionable, audit-ready reports

ARCH delivers the visibility that GCC High environments require—but most organizations lack.


From Complexity to Clarity

GCC High environments are powerful, but they are not self-validating.

Compliance requires:

  • Insight
  • Validation
  • Documentation

Without these, complexity becomes risk.


Operating in GCC High does not guarantee compliance.

It raises the standard for how compliance must be validated.

If your organization needs a clearer, more defensible view of its environment:

ARCH provides the assessment capability to get there.

Connect with us at [email protected]

The Misunderstanding Around GCC High Read More »

Top 10 Failed CMMC Controls, #10 System Baselining

CMMC Journey Guides

#10- CM.L2-3.4.1: System Baselining

When working with individual controls, we know that they have to be dissected from an objective level. For this specific control out of the 110 controls, 320 objectives in CMMC, I have chosen to split it up with objectives a/b/c and d/e/f. Two parts, mainly covering “baseline configurations” and “system inventory”. If you work with CUI, you don’t get to “wing it” on configurations or inventory. CM.L2-3.4.1 asks you to do two big things across the system life cycle:
(1) build and maintain secure, documented baselines for each system and
(2) keep a trustworthy inventory that actually reflects reality in production.

The CMMC Level 2 Assessment Guide spells this out clearly, including exactly what assessors will “Examine/Interview/Test” to verify it’s in place. In this article we will get granular with 1) Dissecting the Control, 2) What full implementation looks like, 3) Why this Control Fails, 4) A Quick Checklist.

1) Dissecting The Control in Two Logical Halves

Objectives A/B/C: Baseline Configurations

  • [a] Establish a baseline configuration for each system component type. For every deployed machine type, you define the approved build: OS version, required apps, hardened settings, network placement, and anything else that affects security and function.
  • [b] Include the full buildout for each system. Baselines must cover hardware, software, firmware, and documentation—not just a golden image. Think platform model/BIOS, OS and app versions/patch status, and the config parameters that lock it down.
  • [c] Maintain it consistently moving forward. As your environment changes, review and update baselines so they always reflect the live system and enterprise architecture (create new baselines when things change materially).

What lives in a solid baseline:

  • Laptops/Desktops/Servers
  • Enclaves (e.g., entire VDI and each component), laptops/workstations, servers
  • ALL Applications per asset group
  • Versions & patch levels for OS/apps/firmware
  • Networking elements: routers, switches, firewalls, WAPs, etc.

Objectives D/E/F: System Inventory

  • [d] Establish a system inventory. A real one… no, seriously. This is ideally software via Asset Management agent(s) that automate most of this process. BUT that is not required, just advice. Any devices classified as any of the CMMC asset types will be in-scope and should be in the system inventory.
  • [e] Include the full buildout for each system in the inventory. (again: hardware, software, firmware, and documentation).
  • [f] Maintain it. Review and update it as systems evolve so it stays accurate to production reality in a reasonable and timely manner.

What lives in a solid inventory:

  • Manufacturer, device type, model, serial number, physical location, owners/main users
  • Hardware specs & parameters
  • Software inventory with version control and potentially licensing information
  • Network info (machine names, IPs)

Assessor angle (what they look at): Policies, procedures, SSP, Configuration Management plan, inventory records and update logs, config docs, change/install/remove records; plus, interviews with the people who build and maintain these things; plus, tests of the actual processes and mechanisms you use to manage baselines and the inventory.

2) What Full Implementation Looks Like

A simple, effective pattern from the Assessment Guide:

  1. Design a secure workstation baseline. Research the hardened settings that deliver the least functionality needed to do the job, then test that baseline on a pilot machine.
  2. Document it (build sheet, settings, required software, version list, how it’s joined to the network) and roll it out to the rest of that asset class from the documented baseline.
  3. Update the master inventory manually, or make sure an appropriate agent is live to reflect the software changes and the devices now at the new baseline.
  4. Schedule a regular review interval to re-validate versions, patches, and settings; or make review a normal part of your SOP that is updated on a regular basis.

Scale that approach across all deployed machine types:

  • Enclaves & Virtual Desktop Infrastructure: baseline the image and each supporting component (connection brokers, secure gateways, user-profile layers, and file-system layers).
  • Laptops & Workstations: document hardware models and BIOS/UEFI versions, OS build, required apps, GPOs/MDM profiles.
  • Servers: OS baselines per role (AD/DNS, file, app, DB), service hardening, approved modules/agents.
  • Networking: switch/router/Firewall/WAP firmware baselines, approved feature sets and templates.
  • Applications Inventory: version standards, required configs, and how they’re deployed/updated.
  • Docs: build guides, change records.

And yes, tie everything to change management controls, because the second you patch, you either (1) update the baseline or (2) record an approved deviation and a plan to reconcile. The guide’s “Potential Assessment Considerations” call out version/patch levels, configuration parameters, network info, and communications with connected systems (proof for [a]/[b]), and timely baseline updates ([c]).

How computers are actually baselined, end-to-end:

  1. Procurement & intake: approve models; capture serials/asset tags at receipt; record ownership/location.
  2. Imaging: apply the gold image (or Autopilot/MDT/SCCM/Intune flow); inject drivers; enforce policies (GPO/MDM).
  3. Hardening: apply CIS/NIST-inspired settings that match your baseline; lock services/ports/protocols; set logging.
  4. Application set: install required software; check licensing; verify versions.
  5. Join & place: join to domain/MDM; put it in the right OU/MDM group/VLAN/segmented subnet.
  6. Recordkeeping: update the inventory with HW/SW/firmware/docs and network details; save the build sheet and sign-off.
  7. Review cadence: calendar-based (e.g., quarterly) and/or event-based (whenever a major patch lands) to keep baseline and inventory current ([c], [f]).

3) Why This Control Fails (Top-10, sitting at #10)

Short answer: it’s a lot of work. and it’s the kind that doesn’t scream until something goes terribly wrong…

  • Documentation feels heavy. A real baseline covers hardware, software, firmware, and documentation and needs regular updates. That is inherently more than “we have an image.” It is buildout documentation, version matrices, network placement, and the approval trail that shows the baseline evolved with your environment.
  • Inventory discipline gets neglected. Many shops run with a “good enough” list. CMMC expects manufacturer, model, serial, location, owner, license/version data, and network identifiers; and expects you to keep it aligned to reality. If the list doesn’t match what’s plugged in, you’ll feel it during interviews and evidence review… and potentially a failed assessment.
  • Change is constant. Patches, feature updates, firmware drops, and hardware refreshes mean your baseline and inventory are living artifacts. If you don’t have a trigger to update both when changes roll out, drift creeps in, and you’ll miss [c]/[f] maintenance requirements.
  • Historical culture. Plenty of orgs “got by” without rigorous Change Management and Asset Inventory. CMMC is forcing the shift from tribal knowledge to documented, reviewable practice. Assessors will Examine/Interview/Test to verify it’s not just policy on paper.
  • Tool sprawl and ownership ambiguity. If imaging is owned by one team, firmware by another, and inventory by a third, gaps appear. You need clear roles and a single source of truth that each team updates as part of their workflow (again, the guide’s methods target exactly these mechanisms).

4) A Quick checklist you can actually use:

  • A baseline configuration exists for each asset class (VDI, laptop/WS, server roles, network devices, key apps) with:
    • Versions/patch levels, hardened settings, required software, network placement, and rationale (A/B).
    • An update log proving periodic and event-driven reviews (C).
  • A system (asset) inventory exists and matches production, with HW/SW/firmware/docs and the who/where/how (D/E).
  • A cadence (calendar + change triggers) keeps both baseline and inventory in sync with reality (F).
  • Evidence on hand for assessors: policies, CM plan/SSP, build sheets, images/scripts, install/removal/change records, inventory review logs, asset inventory dashboards, and interviews with the people who actually do the work (the assessment guide lists these explicitly).


Sources:

  • CMMC Assessment Guide – Level 2, CM.L2-3.4.1 (practice statement, objectives a–f, methods, discussion, example).
  • NIST SP 800-171A, 3.4.1 (assessment objectives and methods).
  • NIST SP 800-171r2, 3.4.1 discussion (what belongs in baselines and inventories).

Top 10 Failed CMMC Controls, #10 System Baselining Read More »