FIPS 140-3 · CMMC Level 2 · C3PAO-ready evidence

CMMC & CUI Compliance — built for mission-critical programs

MacTech Solutions helps federal programs and defense contractors achieve CMMC readiness, C3PAO confidence, and a defensible CUI boundary through integrated platform, vault, or compliance-package delivery.

Why a clear CUI boundary matters

  • Pass C3PAO assessments with a defined, defensible boundary that reduces scope and audit risk.
  • Reduce cost and complexity by isolating CUI in a FIPS-controlled enclave — not sprawl across your enterprise.
  • Meet DFARS 252.204-7012 and flow-downs with audit-ready evidence and operational confidence.

Three paths to CMMC compliance and CUI protection

Federal Capture Platform

Capture, CUI boundary, and compliance in one integrated place—achieving authorization readiness and operational confidence without silos or handoffs.

Understand Your Readiness

What's included

  • Capture pipeline for opportunities and contracts—accelerate bid and proposal workflows.
  • CUI vault integration with a FIPS-controlled boundary; no CUI outside the enclave.
  • Readiness evidence and compliance dashboards for C3PAO and internal audits.

Deployable CUI Vault

A FIPS 140-3–controlled boundary and API-first vault you deploy into any app or enclave—reducing scope and cost while meeting DFARS and flow-downs.

What's in the box

  • FIPS-controlled boundary with REST API for upload, list, and delete—no CUI leaves the enclave.
  • Policy bundle and C3PAO-ready evidence package for your boundary documentation.

New Offering

Full CMMC Documentation Template

Everything your team needs to stand up CMMC documentation quickly: complete NIST SP 800-171 policy content, contractor-specific language, and implementation-ready structure your team can tailor and deploy immediately.

Start the Conversation

14

Control Families

110

Controls

320

Objectives

What's inside

  • -Policy documents written from the ground up for all control families, controls, and objectives.
  • -Designed specifically for DoD contractors and federal contractors.
  • -High-level process and standards with practical implementation language.
  • -Best practices aligned to DoD, government, and industry expectations.
  • -Policy statements mapped to individual controls, plus supplemental documentation.

Optional add-on services

SPRS score improvement, CMMC gap assessment, readiness planning, and cybersecurity/compliance consulting.

Compliant IT solutions and security architecture design.

Compliant cloud migration for Microsoft GCC, GCC High, Office 365, and AWS GovCloud.

Compliant managed services (MSP/MSSP) and IT support.

Compliant SIEM and continuous security monitoring.

Building DoD and federal policy documentation from scratch is expensive, slow, and easy to misalign. This package gives your team a fast, credible starting point that cuts time-to-readiness and reduces rework ahead of assessment.

Inside the Evidence Engine

TrainOS — training & evidence modules a C3PAO can read directly

39 / 46

Statements satisfied directly through training

13

CMMC L2 controls in scope

3 of 4

Families fully covered by training (AT · IR · CA)

v2.13

CMMC L2 Assessment Guide aligned (Sept 2024)

Awareness & Role-Based Training

AT-001 · AT-002

Two CMMC L2 awareness courses—CUI/insider-threat and role-based—delivering 30 modules, 50 quiz items, and 17 verbatim attestations across ~21,500 words of teaching prose.

  • 9 of 9 AT-family determination statements (AT.L2-3.2.1/2/3 — 100%).
  • Deterministic certificate + byte-stable PDF, hash-anchored to the ledger on pass.
  • Step-up reverification on course-version approval and certificate revocation.

Incident Response Tabletop

IR.L2-3.6.1/2/3

Facilitated tabletop exercises with an 11-file deterministic evidence bundle—plan, facilitator guide, injects, attestation, AAR, CARs, control-mapping matrix, technical evidence, notification log, and canonical snapshot.

  • 14 of 14 IR-family determination statements (100%).
  • DOCX + XLSX + PDF + JSON in a frozen ZIP—same input, byte-identical bundle hash.
  • AAR signing and bundle export both step-up reauth gated.

Annual Risk Assessment

RA.L2-3.11.1

Seven-phase wizard producing an 11-file vault zip: scoping, scenarios, NIST SP 800-30 R1 scoring, treatments (Mitigate/Accept/Transfer/Avoid), approvals chain, and live objective evaluator.

  • 100% of in-scope control (RA.L2-3.11.1 [a]+[b]) with live MET/NOT MET evaluation per objective.
  • HIGH/CRITICAL acceptance, executive approval, and finalize all step-up reauth gated.
  • Hard separation of duties enforced at the state machine—approver ≠ assessor.

Continuous Control Assessment

CA.L2-3.12.1/2/3/4

Per-objective evidence intake, per-packet adjudication, continuous-monitoring event capture, and a 12-file finalize bundle that drives the next SSP regenerate plus drift-detect.

  • 14 of 14 CA-family determination statements (100%, the entire CA family).
  • Operational POA&M nomenclature aligned to v2.13 page 204 (no 180-day cap conflation).
  • SCTM packet finalize, cycle finalize, and hash-manifest seal all step-up reauth gated.
Extended by MacTech toolkit

Vulnerability scan + remediation — RA.L2-3.11.2 + RA.L2-3.11.3 (7 statements)

The remaining 7 statements sit outside the training surface by design—they're continuous machine activity, not human program activity. MacTech covers them through EnclaveWatch + Microsoft Defender: Microsoft Defender Vulnerability Management and Defender for Cloud scanning, config-drift detection, and the vuln_remediation register feeding the same ledger-anchored audit chain that backs the training bundles.

The integrity primitives behind every artifact

Append-only ledger, gap-free

SHA-256 chained EvidenceRecord + LedgerEntry per tenant, peppered with a three-secret bind. Verifiable externally with no app dependency.

Byte-stable bundles

RFC 8785-aligned canonical JSON, frozen-date ZIP, pinned PDF trailers, deterministic DOCX packing—same input, same bytes, same hash.

CUI in Azure Government only

FIPS-aligned .usgovcloudapi.net by default, public access blocked at the storage account, 7-year retention pinned per blob.

ESP designation embedded

Every bundle carries the 32 CFR § 170.4 ESP designation—the OSA names MacTech in the SSP and the C3PAO recognizes the ESP scoring path on v2.13 page 11.

Step-up reauth on every gate

11 reverification gates across the four modules—AAR signing, course approval, cert revocation, RA acceptance, RA approval, finalize, SCTM packet, cycle finalize, hash-manifest seal, and more.

Assessment-objective granularity

Per-objective evidence with the verbatim NIST 800-171A statement, MET-path provenance, and assessment method (examine/interview/test) tagged inline. No aggregation, no false-pass risk.

Coverage and statement counts verified against the CMMC L2 Assessment Guide v2.13 (Sept 2024, DoD-CIO-00003).

Compliance frameworks & alignments

CMMC 2.0 Level 2
FedRAMP Moderate
NIST RMF
SOC 2 Type I

How we align with these frameworks

  • CMMC 2.0 Level 2: Independently certified implementation of NIST SP 800-171 controls for protecting CUI — C3PAO-ready evidence and defensible boundary.
  • FedRAMP Moderate: Security architecture and control design aligned with the FedRAMP Moderate baseline.
  • NIST RMF: Risk governance structured around NIST Risk Management Framework principles.
  • SOC 2 Type I: Internal SOC 2 Type I readiness for security control design.

Ready to achieve CMMC readiness and a defensible CUI boundary?

Contact a director to scope your program.

What happens when you reach out

  1. Discovery call to understand your program, scope, and timeline.
  2. Scope and fit: we recommend platform, vault, or package — tailored to your needs.
  3. Proposal and timeline with clear deliverables and C3PAO-ready evidence.
  4. Onboarding and delivery with operational confidence — no surprises at audit.