Your DoD Contracts Require CMMC Compliance.
We Make That Happen.
Southern California's defense industrial base — from the Boeing supply chain in Anaheim to Northrop Grumman in Redondo Beach — depends on airtight IT compliance. IT Center delivers CMMC 2.0, ITAR, and DFARS-ready managed IT so you can protect CUI, pass third-party assessments, and keep winning DoD contracts. Protecting defense contractors since 2012.
Compliance Frameworks Managed
CMMC 2.0 · ITAR · DFARS — The Stakes Are High
Defense contracts are won or lost on compliance posture. One failed assessment or ITAR violation can end your ability to compete for government work entirely.
Foundational — 17 Practices
Required for contractors handling only Federal Contract Information (FCI). Annual self-assessment with senior official affirmation submitted to SPRS.
- Limit information system access to authorized users and processes
- Limit physical access to organizational systems and CUI
- Perform maintenance on organizational systems
- Provide security awareness training to personnel
- Identify, report, and correct information security flaws
Advanced — 110 Practices
Required for contractors handling Controlled Unclassified Information (CUI). Tri-annual third-party assessment by a C3PAO organization is mandatory for critical programs.
- Full alignment with all 110 NIST SP 800-171 controls
- 14 control families including Access Control, Incident Response, Risk Assessment
- System Security Plan (SSP) and Plan of Action & Milestones (POA&M)
- Multi-factor authentication on all privileged accounts
- Encrypted data at rest and in transit using FIPS 140-2 validated modules
Expert — 110+ Practices
Required for programs involving highly sensitive CUI associated with critical DoD programs. Government-led assessments are conducted by DCSA.
- All 110 NIST 800-171 controls plus NIST 800-172 enhanced requirements
- Advanced persistent threat (APT) defensive posture
- Proactive threat hunting and continuous monitoring
- Zero-trust architecture across all connected environments
- Government-led triennial assessment by DoD assessors
Safeguarding Covered Defense Information
Mandatory contractual clause requiring implementation of NIST 800-171 and rapid reporting of cyber incidents to the DoD within 72 hours of discovery.
- Implement NIST SP 800-171 across all systems processing CUI
- Report cyber incidents to DoD within 72 hours via dibnet.dod.mil
- Preserve and protect images of compromised systems
- Submit SPRS score before contract award
- Cloud service providers must meet FedRAMP Moderate equivalency
International Traffic in Arms Regulations
22 CFR Parts 120–130 govern export of defense articles and services. IT systems storing or transmitting ITAR-controlled technical data require strict access controls.
- Restrict access to ITAR-controlled data to U.S. persons only (citizenship verification)
- Encrypt all ITAR data in transit and at rest
- Control physical and logical access to engineering CAD/CAM systems
- Maintain audit logs of all access to controlled technical data
- Prohibited from storing ITAR data on foreign-hosted cloud services
Controlled Unclassified Information
CUI is any information the Government creates or possesses that requires safeguarding per law, regulation, or Government-wide policy. Common aerospace categories include:
- Export Controlled — Technical data subject to EAR or ITAR
- DoD Critical Infrastructure Security Information
- Naval Nuclear Propulsion Information (NNPI)
- Controlled Technical Information (CTI) — specifications and drawings
- Privacy Act Information relating to DoD personnel
Consequences of Non-Compliance
Managed IT Services for Aerospace & Defense
Every service we deliver is designed around the unique compliance, security, and operational demands of the defense industrial base. No generic IT — purpose-built for contractors.
Network Segmentation for CUI Environments
Design and enforce network boundaries that physically and logically isolate systems processing Controlled Unclassified Information from general corporate traffic. Firewall policy enforcement, VLAN segmentation, and micro-segmentation aligned to the CMMC scoping guide to minimize your compliance boundary and reduce assessment scope.
CMMC Gap Assessment & Remediation
Complete gap analysis against all 110 NIST SP 800-171 controls. We identify deficiencies, assign risk scores, build your Plan of Action & Milestones (POA&M), and execute remediation to bring you to a passing SPRS score — before the C3PAO auditors arrive.
ITAR-Controlled IT Asset Management
Maintain a complete inventory of all endpoints, servers, and removable media that touch ITAR-controlled technical data. Enforce U.S.-person-only access controls, disable unauthorized ports and peripherals, and maintain audit trails satisfying DDTC requirements for all USML-related systems.
Encrypted Communications (FIPS 140-2)
Deploy and manage FIPS 140-2 validated encryption across all communications channels — email, VoIP, file transfer, and remote access VPN. Ensure that CUI in transit is protected by cryptographic modules approved by NIST's Cryptographic Module Validation Program (CMVP).
System Security Plan (SSP) Documentation
Author, maintain, and version-control your SSP — the foundational document that describes how your organization implements each of the 110 NIST 800-171 controls. Kept current as your environment changes, with full audit history for C3PAO assessors and contracting officers.
Continuous Monitoring & Vulnerability Scanning
24/7 AI-powered SIEM monitoring with automated alerting and response. Regular authenticated vulnerability scans of all in-scope assets. NIST 800-171 control 3.11.2 satisfied through documented, scheduled scanning and remediation tracking integrated with your POA&M workflow.
GFE Policy Management
Establish and enforce Government Furnished Equipment (GFE) policies covering acceptable use, prohibited activities, configuration baselines, and media sanitization procedures. Ensure GFE is never commingled with contractor-owned systems, and baseline configurations are documented and enforced via MDM solutions.
Multi-Factor Authentication (DoD IA Controls)
Deploy phishing-resistant MFA across all remote access, privileged accounts, and systems touching CUI. Implement PIV/CAC-compatible authentication for environments requiring hardware-based credentials. Aligned to DoD Identity and Access Management policies and NIST 800-63B AAL2/AAL3 requirements.
NIST SP 800-171 — 110 Controls Across 14 Families
CMMC Level 2 is built entirely on NIST SP 800-171. Every control must be implemented and assessable. IT Center manages all 14 families end-to-end.
The 14 NIST SP 800-171 control families cover every aspect of your information environment — from who can log in to how you respond when something goes wrong. IT Center maintains active implementation and evidence documentation for all 14.
-
1
CUI Environment Scoping
Identify every asset — endpoints, servers, cloud services, and network components — that processes, stores, or transmits CUI. Define your assessment boundary to limit scope and reduce compliance cost.
-
2
Gap Assessment vs. 110 Controls
Evaluate current state against every NIST 800-171 requirement. Document implementation status as Met, Not Met, or Partially Met. Assign point values per DoD's scoring methodology to calculate your initial SPRS score.
-
3
System Security Plan (SSP) Authorship
Write or refine your SSP describing the system boundary, operating environment, and how each control is satisfied. The SSP is the primary artifact reviewed by C3PAO assessors and DoD contracting officers at award.
-
4
POA&M Execution & Remediation
Build a prioritized Plan of Action & Milestones for every deficient control. Execute technical and administrative remediation with documented milestones, assigned resources, and completion dates tracked to closure.
-
5
SPRS Score Submission
Calculate your final NIST 800-171 score using DoD's 110-point methodology and submit to the Supplier Performance Risk System (SPRS) via the DoD PIEE portal. Maintain a current score with each remediation milestone completed.
About the SPRS Score
Your SPRS (Supplier Performance Risk System) score ranges from −203 to +110. Every unmet NIST 800-171 control carries a point deduction. A score below 110 requires a POA&M. The score is visible to prime contractors and DoD contracting officers — it directly impacts your ability to win contracts. IT Center actively manages your score and keeps it updated as your environment evolves and remediations are completed.
We Serve the Prime Contractors' Supply Chain
Southern California hosts the densest concentration of aerospace and defense prime contractors in the United States. If you supply to any of these organizations, you need CMMC compliance. We know this ecosystem — and we know the IT requirements these primes demand of their Tier 2 and Tier 3 suppliers.
Tier 2 & Tier 3 Supply Chain Compliance
CMMC compliance flows down the supply chain. When a prime contractor like Northrop Grumman or Boeing wins a DoD contract requiring CMMC Level 2, that requirement cascades to every subcontractor who handles CUI — including your company. There are no size exemptions. IT Center specializes in bringing Tier 2 and Tier 3 suppliers into full compliance before contract award deadlines. Our flat-rate $300/computer user/month model means you know exactly what compliance-ready IT costs — no surprise invoices as your assessment date approaches.
actively managed
readiness — typical timeline
of your CUI environment
audit cycle with our SSP
Frequently Asked Questions
Everything you need to know about CMMC, ITAR, and compliance-ready IT for aerospace and defense contractors in Southern California.
Start Your CMMC Assessment Today — Before Your Next Contract Requires It
IT Center has guided aerospace and defense contractors through CMMC, ITAR, and DFARS compliance since 2012. Our flat-rate $300/computer user/month model means compliance-ready IT with no surprise invoices and no per-ticket billing. Let’s find out where your SPRS score stands today.
Request Your Free CMMC Gap Assessment