How can we help?
Speak with one of our CMMC registered practitioners to get started on your path to compliance.
CONTACT USWith a lead CCA on staff and several CCPs and CMMC-RPs, our CMMC consultants understand your scope, assess your compliance gaps, and drive accountability for checking off security effort milestones.
Ultimately, this will make the security work you’re doing both accurate and defensible—and help you keep your Defense contracts
Speak with one of our CMMC registered practitioners to get started on your path to compliance.
CONTACT USUnderstand how data enters the environment, how it moves within it, and where it goes.
Identify controls that require additional artifacts in order to achieve certification.
Based on the gaps to compliance identified, assign tasks and deadlines to key team members.
Policies, artifact templates, and a milestone calendar to keep records and ensure progress.
Set milestones for each control family, assign due dates and internal stakeholders, and track your progress over time.
Determine and administer training requirements for numerous security categories based on role, and track completion dates.
Track assets such as hardware, software, devices, and people by predetermined asset categories.
Apply reference documentation like policies and procedures to each of the assessment objectives.
Create and log a cadence for the completion of important tasks within the assessment objectives.
Implement our incident response plan. Categorize potential risks and categorize how they'd be treated in accordance to the plan.
The Cyber-AB. They are a non-profit organization separate from the DOW.
Contractors that do business either as a prime contractor or as a subcontractor at some level under a prime that have DFARS 252.204-7021, DFARS 252.204-7025 clause requirements in their contracts.
Historically, those clauses were DFARS 252.204-7012, which included a self-assessment requirement.
If you see these clauses in your contracts, your subcontractors should also receive them in their flow-down contracts if they receive or create CUI as part of their execution of the contract.
Currently, under CMMC, we are in the first year, so it applies to everyone with contractual requirements and a minimum self-assessment requirement. Starting in November of 2026, CMMC requirements will require a third-party (C3PAO) assessment.
Officially, CUI is defined by the National Archives.
Specifically, the DOW has 5 categories that are listed here, but the vast majority that we see “feet on the street” is controlled technical information (CTI).
Hopefully, the upstream contractor or DOW will define is CUI by utilizing a contract data requirements list (CDRL).
If you create CUI, a security classification guide (SCG) would define what the CUI is. The DOW is not consistent with labeling so by receiving documentation that seems to be consistent with CTI, refer to your contracting officer for clarification.
Scoping is the right place to start. A functional understanding of how data comes into the environment, how it moves within the environment, and where it goes is critical.
Additionally, understanding your assets in the environment provides more clarity to the flow. Assets include data, technology, people, and facilities.
Once the data flow is understood, we will conduct a gap assessment (unless it makes more sense to proceed directly to consulting based on an agreed-upon milestone calendar).
An assessment date is set fairly early so that C3PAO availability does not affect the desired timeline.
This is the toughest question to answer because there are many variables—customer capacity to work on remediation, budgets, architecture model (full enclave, hybrid enclave, or full enterprise), and security program existing maturity.
4-6 months is possible if you’re small and utilizing a full enclave. If an enterprise approach is pursued, it can take 18-24 months, as it can require significant changes to core software packages.
FRSecure has been in business for over 10 years, and our team has more than 300 years of combined experience working in information security and boasts 30 different kinds of certifications. When it comes to growing a security program that complies with CMMC, you have the benefit of experience in your corner.
Our mission at FRSecure is to fix the broken information security industry. Not only do we help comply with the CMMC, but we also solve as many weaknesses as we can in your security environment. We are dedicated to making real, lasting, impactful changes to your security program.
Our style isn’t “cookie cutter.” We recognize that each organization is different, and every security program is at a different stage of maturity. We get to know your security program intimately, use an information security risk assessment to determine what your strengths and weaknesses are, and then apply industry best practices to provide the next steps that’ll help you comply with CMMC.
Information security is all we do. We don’t do IT, sell hardware, or provide telco services. We only do security. Because of this, our team can provide unbiased recommendations that will actually make a dramatic impact to the way you do security. We work hard to be a partner—collaborating with and educating your team every step of the way.