Cyber, infrastructure, and compliance — built for mission-critical programs

MacTech Solutions helps federal programs and defense contractors achieve authorization, audit readiness, and operational confidence through integrated technical and risk-aware delivery.

SDVOSB
Service-Disabled Veteran-Owned
CMMC 2.0 L2
Self-Attested
NAICS
541512 · 541519 · 541511
PSC
D310 · D307 · D399
GSA HACS
Eligible

Compliance Frameworks & Alignments

Flagship

CUI Enclave & Trust Codex

One boundary. One evidence story. One handoff to the C3PAO. The CUI Vault Enclave creates a defensible CMMC 2.0 Level 2 boundary; the Trust Codex maps every NIST SP 800-171 requirement to exactly where the evidence lives.

  • FIPS-validated CUI vault, deployed in production

    Hardened Windows enclave on Microsoft Entra ID with VPN-then-RDP access, USB and clipboard redirection disabled, and idempotent PowerShell hardening that re-runs without drift.

  • 110 of 110 NIST SP 800-171 controls mapped to evidence

    Each control points to the artifact, the script that generates it, and the location it lands in on disk — so an assessor can verify every claim end-to-end.

  • Stand up a defensible CUI boundary in under one week

    Ship the enclave, populate the Trust Codex, and walk into your C3PAO conversation with a single, reviewable evidence story.

Trust Codex800-171 r2
3.1.1Access Control
Entra ID Conditional Access policies/evidence/access/
3.4.2Configuration Management
Invoke-CuiHardening.ps1 baseline/evidence/config/
3.13.11System & Comm Protection
FIPS 140-3 validated cryptography/evidence/crypto/
+ 107 additional controls mapped end-to-end
110/110
Controls mapped
FIPS 140-3
Validated crypto
< 1 week
To defensible boundary

Featured Offerings

Productized capabilities, ready to deploy

New Release

IR Tabletop & AAR Evidence Kit

A productized incident response tabletop and After-Action Review for CMMC 2.0 Level 2. AI-drafted custom scenarios, MITRE ATT&CK overlay, and an immutable evidence bundle the C3PAO can verify in minutes — delivered on the same MacTech Training platform that already covers your CMMC Awareness & Training program.

  • AI scenario generator

    Describe an incident in plain English. Get a control-mapped tabletop with injects, TTPs, and objective pass criteria.

  • AI-assisted After-Action Review

    Sub-second drafts for executive summary, timeline, strengths, gaps, and evidence — built from real inject responses.

  • Immutable evidence bundle

    SHA-256 manifest, optional RFC 3161 timestamp, drafter ≠ approver enforced, 6-year retention with legal-hold.

Scenario Composer · IR.L2-3.6.x
Prompt:
“Vendor MSP RMM tool compromised — pushes malicious update to our Windows hosts. Detect, contain, brief contracting officer.”
→ Drafting…
7 injects · T+0 → T+90
4 MITRE TTPs mapped
9 NIST controls validated
Review · Refine · Save to library
3.6.1
IR Capability
3.6.2
Track + Report
3.6.3
Test the Plan
Tools

Automated STIG Compliance

Our Hardening and Validation Suite transforms DISA Security Technical Implementation Guides into production-ready automation artifacts — reducing manual effort and accelerating compliance.

  • Ansible Hardening Playbooks

    Automatically generate idempotent playbooks that apply STIG controls programmatically.

  • Compliance Checker Playbooks

    Validate STIG compliance with automated checker playbooks for continuous monitoring.

  • CTP Documentation

    Generate Certification Test Procedure documents in standardized formats for manual controls.

Hardening and Validation Suite
$python -m app.main --stig-file RHEL_9_STIG.xml
→ Generating artifacts...
stig_rhel9_hardening.yml
stig_rhel9_checker.yml
stig_rhel9_ctp.csv
Production-ready automation artifacts
RHEL 8/9
Linux STIGs
Windows
Windows STIGs
Cisco
Network STIGs

Ready to achieve authorization and audit readiness?

Start with our readiness assessment to understand where you stand.