Before reviewing security controls, it is necessary to establish a clear understanding of the OSC's environment, business operations, and current compliance posture.
Phase 1: Scope Definition & Context Gathering
1
Identify OSC Details & Regulatory Requirements
Legal Name, Address, and POC Information (IT Director, Compliance Lead, CISO)
2
DIB Status
Is the OSC a DoD contractor? Do they handle Controlled Unclassified Information (CUI)?
3
Active DoD Contracts & Requirements
Does the contract require CMMC Level 2 or adherence to DFARS 252.204-7012? Are flow-down requirements applicable to subcontractors?
4
CAGE Code / UEI
5
Current Compliance Posture
Have they attempted self-assessments (e.g., SPRS score)? Have they completed any previous compliance work (e.g., NIST 800-171 SSP, POAM, or third-party audits)?
Phase 2: System Boundaries & Architecture Review
To analyze compliance, it is important to determine where CUI exists and how it is managed within the organization's systems.
1
Identify CUI Scope & System Boundaries
What systems, networks, and users handle CUI?
2
Data Flow Mapping
Where is CUI stored, processed, or transmitted? Are cloud services used (e.g., GCC High, AWS GovCloud)? Are external IT providers or Managed Service Providers (MSPs) involved?
3
System Inventory
List all devices handling CUI (workstations, servers, mobile devices). Identify FedRAMP-authorized services, local infrastructure, and hybrid environments.
4
Remote Access & External Connections
How is remote work handled? Are VPNs, VDI, or other security measures in place?