Resiliency

 

    • Applies to all contractors supporting the Defense Industrial Base (DIB)
    • Learn how Site2 can assist with with the process controls and practices
    • Comply before your audit

CMMC Compliance

The Defense Federal Acquisition Regulation Supplement (DFARS) 252.204.7012 established the National Institute of Standards and Technology’s Special Publication 800-171 Rev.2 (NIST 800-171) as the principle security standards for protecting both Controlled Unclassified Information (CUI) and Covered Defense Information (CDI) associated with Department of Defense (DoD) related contracts. 

The Cybersecurity Maturity Model Certification (CMMC) builds upon the existing DFARS 252.204-7012 regulation.  CMMC adds a verification component.  The goal is for CMMC to be cost-effective and affordable for small businesses to implement at the lower CMMC levels.  Site2 helps make that a reality. 

 

Site2 has CMMC Registered Practitioners to guide you through the implementation process.   

 

  • Gap Analysis & Basic Self-Assessments
  • Plan of Actions and Milestones (POAM)
  • System Security Plan (SSP)
  • Policies and Processes

Cyberconverged Storage — meets 19 of the 110 NIST 800-171 controls

  • Unstructured files are x% of all data in a company 
  • Audit trails 
  • Access Control 
  • SIEM integration 

Schedule a call with our experts.

Clarks Summit Office

200 Abington Executive Park
Suite 207
Clarks Summit, PA 18411
570-558-5660

3 + 5 =

Latest Updates

Site2 Sponsors and Exhibits at MFG Day 2023

The Northeast PA Industrial Resource Center (NEPIRC) held their annual Manufacturer's Day on Friday, October 13, 2023 at the Mohegan Sun Hotel and Convention Center in Wilkes Barre, PA. Site2 was once again a proud sponsor and exhibitor. This was NEPIRC's most well...

read more

Cybersecurity Webinar 102

This is the second installment of our two part Cybersecurity webinar series in partnership with NEPIRC. We take a deeper dive into the nuances of the NIST 800-171 r2 and CMMC 2.0 requirements. This cybersecurity framework and regulation respectively have manufacturers...

read more