Skip to main content
Skip to main content
Defense / Manufacturing ConsultingCybersecurity16 weeks

CMMC Level 2 Certification Program for Cornerstone Consulting Organization

Enabling a Veteran-Owned Defense Industrial Base Consulting Firm to Protect CUI and Secure DoD Contract Eligibility Through Full CMMC 2.0 Compliance

CMMC Practices Implemented

0%

NIST Controls Satisfied

0

POA&M Items at Assessment

0

CUI Data Flows Protected

0%

Cornerstone Consulting Organization (CCO)

The Client

Cornerstone Consulting Organization (CCO)

ccoconsulting.com

Cornerstone Consulting Organization (CCO) is a Toledo, Ohio-based consulting firm that has built a reputation for hands-on operational excellence in manufacturing environments. Founded in 2015, CCO deploys experienced consultants directly into client operations, helping manufacturers increase throughput, reduce waste, compress cycle times, and improve profitability. Through their affiliate companies, Premier Staffing Solution (PSS) and Just-In-Time Staffing (JITS), CCO also provides skilled trades professionals, engineers, and production operators to manufacturing facilities nationwide.

CCO is a certified Service-Disabled Veteran-Owned Small Business (SDVOSB), and its leadership team brings decades of experience from Fortune 500 manufacturing operations. The company's 'anti-consultant' philosophy — embedded execution rather than detached recommendations — has delivered billions in documented savings for their clients.

As CCO expanded its work with defense manufacturers and prime contractors supporting Department of Defense (DoD) programs, a new requirement emerged. Defense industrial base (DIB) clients increasingly required their consulting partners to demonstrate CMMC compliance. Without certification, CCO risked losing access to its fastest-growing market segment.

The Challenge

The Problem

CMMC 2.0 Level 2 requires implementation of all 110 security practices defined in NIST SP 800-171 Revision 2. For a consulting firm like CCO, this presented a challenge distinct from a typical manufacturer's CMMC journey.

CCO's consultants do not work in a single facility. They deploy to client sites across the country, often for months at a time. They access client systems, use client-issued devices in some engagements and CCO-issued devices in others, and handle CUI that belongs to the client but transits through CCO's communication and collaboration tools. The 'system boundary' for CUI handling was not a single office network in Toledo — it was a distributed environment spanning CCO's headquarters, remote consultant locations, client facilities, and the cloud services connecting them all.

The initial gap assessment revealed significant work ahead. CCO had standard business cybersecurity controls, but these fell far short of NIST SP 800-171 requirements. The assessment identified gaps in 73 of the 110 required practices. Key areas of non-compliance included access control, audit and accountability, identification and authentication, incident response, media protection, and system and communications protection.

The timeline pressure was real. CCO had received a letter from a major prime contractor stating that consulting partners handling CUI would need to demonstrate CMMC Level 2 readiness within six months. Failure to comply would result in exclusion from future task orders.

Our Approach

4 Phases. 16 weeks.

Flynaut's OneProtect team scoped CUI data flows across CCO's distributed consulting model, implemented all 110 NIST SP 800-171 practices using a Microsoft 365-centric architecture, built comprehensive policy documentation, and guided CCO through assessment preparation with zero POA&M items.

01

CUI Scoping & System Boundary Definition

3 weeks

Traced every CUI data flow across CCO's distributed consulting model — from CUI received from clients, created by consultants during engagements, stored in CCO systems, transmitted between parties, and destroyed at engagement completion. Defined the CUI boundary: Microsoft 365 tenant, CCO-issued devices, VPN infrastructure, and specific cloud applications.

Most small organizations get CMMC wrong by scoping too broadly or too narrowly. We reduced CCO's compliance footprint by documenting out-of-scope systems (marketing site, staffing platform, accounting) without creating gaps.

02

Technical Controls Implementation

6 weeks

Implemented all 110 NIST SP 800-171 practices across 14 control families. Deployed Microsoft Entra ID with conditional access and MFA, Microsoft Sentinel as centralized SIEM, Intune for device management with BitLocker/FileVault encryption, Purview for sensitivity labels and DLP, and always-on VPN for remote consultants.

All 14 shared/generic accounts were eliminated. USB storage blocked by policy. Email containing CUI is automatically protected through sensitivity labels that enforce encryption and prevent forwarding.

03

Policy, Documentation & Training

4 weeks

Developed the System Security Plan (SSP) documenting every practice, CUI handling procedures for field consultants, and role-specific security awareness training. Conducted two tabletop exercises: compromised consultant laptop and phishing attack targeting engagement managers. Quarterly phishing simulations established.

Goal was zero POA&M items at assessment time — achieved. Initial phishing simulation click rate: 6.1%, trending down with quarterly reinforcement.

04

Assessment Readiness & Validation

3 weeks

Conducted comprehensive pre-assessment simulating C3PAO methodology. Reviewed every control implementation, tested every technical safeguard, examined every policy document, and interviewed staff to verify practices were understood and followed. Pre-assessment found 4 minor documentation clarifications and 2 technical adjustments — all resolved within one week.

CCO achieved full compliance with all 110 NIST SP 800-171 practices with zero POA&M items at actual assessment.

The Results

Performance That Speaks

Metric

Before

After

Change

NIST SP 800-171 Practices Met

37 of 110

110 of 110

+197%

POA&M Items

N/A

Zero

Zero

MFA Coverage

0%

100%

+100%

CUI Data Flows Mapped

None documented

100% mapped & protected

New

Shared/Generic Accounts

14

Zero

-100%

Encrypted Devices

62%

100%

+61%

SIEM/Log Monitoring

None

24/7 (Sentinel + OneProtect)

New

Incident Response Plan

None

Documented & tested (2 exercises)

New

Phishing Simulation Click Rate

Not measured

6.1% (trending down)

New

Time to Certification Readiness

N/A

16 weeks

New

Within 60 days of achieving CMMC readiness, CCO secured three new defense manufacturing consulting engagements contingent on compliance. Combined contract value: $4.2 million over 18 months. The prime contractor who issued the compliance ultimatum expanded CCO's scope of work, citing their security posture as a differentiator.

Technology

The Stack

Identity & AccessMicrosoft Entra ID + Conditional Access + MFA
Device ManagementMicrosoft Intune (compliance policies, encryption)
Data ProtectionMicrosoft Purview (sensitivity labels, DLP)
Email SecurityMicrosoft Defender for Office 365 + DMARC
SIEMMicrosoft Sentinel
Endpoint ProtectionMicrosoft Defender for Endpoint
VPNAlways-on VPN (managed through Intune)
CollaborationMicrosoft Teams + SharePoint (CUI-approved tenant)
Managed SecurityFlynaut OneProtect (24/7 monitoring)
Compliance DocsCustom SSP, POA&M, CUI handling procedures

Reflections

What This Project Taught Us

CMMC for consulting and staffing firms presents a unique scoping challenge that most CMMC guidance — written for manufacturers with fixed facilities — does not adequately address. CCO's consultants are nomadic by design. Defining the CUI boundary for this operating model required creative thinking and close collaboration with CCO's engagement management team.

The Microsoft 365 ecosystem (Entra ID, Intune, Purview, Defender, Sentinel) proved to be a remarkably effective CMMC compliance platform for small and mid-size organizations. The integrated nature of the Microsoft stack delivered full NIST SP 800-171 coverage at a cost point that was sustainable for a company of CCO's size.

CCO's leadership framed the CMMC investment not as a compliance burden but as an extension of their service to the defense industrial base. As a veteran-owned company whose consultants work daily to strengthen America's manufacturing capacity, protecting the CUI they handle is a continuation of the service ethic that defines their culture. That framing transformed what could have been an adversarial compliance project into an organizational commitment.

Ready?

Ready to transform your digital experience?

Flynaut builds enterprise-grade digital experiences for brands that refuse to compromise.