MULTI.FRAMEWORK.COMPLIANCE

One Compliance Partner Across Every Framework You Have To Pass

CMMC L1 / L2 / L3 / HIPAA / NIST 800-53 / 800-171 / PCI-DSS / SOC 2 Type II

Petronella Technology Group maps your controls across CMMC, HIPAA, NIST, PCI-DSS, SOC 2, and HITRUST once - then reuses the evidence so you stop paying for the same proof three times. Defense contractors hit CMMC and ITAR. Healthcare hits HIPAA and HITRUST. Fintech lives under SOC 2 and GLBA. California exposure pulls everyone into CCPA. We run one engagement across all of it, with a written gap report, a System Security Plan, a POAM, and an evidence library you can hand to any assessor.

CyberAB Registry #1449 CMMC Registered Provider Org verify
NC State License #604180 Digital Forensics Examiner (Craig Petronella)
Founded 2002 23+ years building regulated IT, security, compliance
BBB Accreditation A+ Continuously accredited since 2003
02 / Pick Your Framework Lane

Find Your Compliance Entry Point

Eight regulatory frameworks cover ninety percent of the engagements that walk through our door. Match the row on the left to your situation, then click into the deliverable on the right. If your scope spans more than one row, the discovery call is exactly the conversation to have - we engineer the cross-framework evidence library that lets one assessment campaign satisfy two or three regimes.

Framework
Who needs it
Engagement length
Petronella deliverable
CMMC Level 117 controls / FCI scope
DoD subcontractors handling Federal Contract Information but no CUI. Annual self-attestation required.
30 - 60 days from kickoff to filed self-assessment
CMMC L1 self-assessment workbook
CMMC Level 2110 controls / CUI scope
DoD primes and subcontractors handling Controlled Unclassified Information. Triennial C3PAO assessment required.
60 - 270 days depending on starting posture
CMMC L2 readiness program
CMMC Level 3110 + 24 enhanced
Critical-program contractors handling CUI under APT threat. DIBCAC-led assessment, the highest CMMC tier.
9 - 18 months remediation + boundary engineering
CMMC L3 enhanced security program
HIPAAPrivacy / Security / Breach
Covered entities and business associates handling Protected Health Information. Annual review expected, breach notification on incident.
90 - 120 days from kickoff to attestation-ready
HIPAA compliance program
NIST 800-53Federal info systems
Federal agencies, federal contractors, and any organization aligning to the FISMA baseline. Foundation for FedRAMP and StateRAMP.
120 - 240 days for low / moderate / high baseline
NIST 800-53 controls implementation
NIST 800-171Non-federal CUI handlers
Non-federal organizations processing or storing CUI on behalf of the federal government. The technical backbone of CMMC Level 2.
60 - 180 days depending on environment complexity
NIST 800-171 control mapping
PCI-DSSv4.0.1 / card data
Merchants, service providers, and any organization storing, processing, or transmitting cardholder data. Annual self-assessment or QSA audit by level.
90 - 150 days from SAQ scoping to attestation
PCI-DSS consulting engagement
SOC 2 Type IITrust Services Criteria
SaaS, fintech, healthtech, and hosted-service vendors proving operational controls to enterprise buyers. Audit window 6 - 12 months.
180 - 365 days readiness + observation window
SOC 2 Type II readiness

In Short - What This Page Covers

  • Petronella Technology Group is a CMMC-AB Registered Provider Organization, RPO #1449, verified at cyberab.org. Founder Craig Petronella holds CMMC-RP, CCNA, CWNE, and Digital Forensics Examiner #604180. The entire technical team is CMMC-RP certified. Regulated-vertical IT, security, and compliance work since 2002. BBB A+ continuously accredited since 2003.
  • This hub covers eight regulatory frameworks under one engagement: CMMC Level 1 / 2 / 3, HIPAA, NIST 800-53, NIST 800-171, PCI-DSS v4.0.1, and SOC 2 Type II. HITRUST, FedRAMP, FISMA, CCPA, CJIS, GLBA, FERPA, ITAR, IRS-1075, StateRAMP, and the SEC cybersecurity disclosure rules also fall inside our scope. The deeper deliverable pages live one click below.
  • Cross-framework evidence reuse is the differentiator. Most compliance shops run each framework as a separate project. We map the controls once, build one evidence library, and let one campaign satisfy two or three regimes. CMMC and ITAR together. HIPAA and HITRUST together. SOC 2 and PCI together. The unit economics get materially better at the two-framework mark.
  • We are an RPO, not an assessor. C3PAOs certify CMMC. Independent CPA firms attest SOC 2. HITRUST-authorized external assessors handle HITRUST. We do everything up to the assessor: gap analysis, System Security Plan and POAM authoring, technical remediation, evidence collection, mock assessment, assessor handoff. Independence is the law in most of these regimes - the assessment firm cannot also have built the program.
  • How this pillar differs from /cmmc-compliance/ and /compliance/cmmc/. The CMMC pillar is the CMMC-only deep dive. The CMMC technical hub is the control-by-control reference. This page is the multi-framework overview for buyers whose scope crosses regulatory lines and who need one team to run the whole campaign.
  • Engagements price after a discovery call. Cost depends on framework count, scope, current posture, integration complexity, and how much technical remediation the environment needs. Custom-quote model. Book a compliance discovery call or call (919) 348-4912 to scope.
03 / Why Petronella

Four Things That Make This Different

Most multi-framework compliance work fails in the seams between consultants. Petronella Technology Group runs strategy, gap analysis, technical remediation, evidence collection, and assessor handoff under one engagement letter because the audit-trail integrity depends on continuity.

01
Registered Provider Organization, not a generic consultant
Petronella Technology Group is CMMC-AB Registered Provider Organization #1449, verified in the official CyberAB registry. The full technical team holds CMMC-RP. That credential signals trained, vetted compliance practitioners under DoD-recognized oversight - the same framework that governs the C3PAOs assessing your final readiness. Most "compliance consultants" do not carry it.
02
Cross-framework evidence library, one campaign
Forty percent of a typical compliance program is evidence collection. We build one evidence library, mapped to multiple frameworks, refreshed continuously through our ComplianceArmor platform. A single MFA log, EDR coverage report, or patch-status snapshot can satisfy CMMC AC.L2-3.5.3, HIPAA 164.312(a), NIST 800-53 IA-2, PCI-DSS 8.4, and SOC 2 CC6.1 simultaneously. Buyers who run two or more frameworks save 30 to 50 percent versus parallel project budgets.
03
Real engineering depth behind the paperwork
Petronella is an MSP and security shop first, a compliance consultancy second. The team that writes your System Security Plan is the same team that hardens your Microsoft 365 tenant, deploys the EDR, segments the CUI enclave, builds the audit log pipeline, and runs the change-control board. Paperwork-only firms write SSPs that fail field testing. We close the gap between policy and posture before the assessor walks in.
04
Local accountability, since 2002
Headquartered at 5540 Centerview Dr., Suite 200, Raleigh, NC 27606. Real address, real team, real track record. Twenty-three-plus years of regulated-vertical IT in healthcare, defense supply chain, finance, legal, and now AI. BBB A+ continuously accredited since 2003. Reach the same engineer on call who built your Active Directory baseline last year - not a different name on every project.
04 / How Engagements Run

The 3-Stage Methodology

Every framework engagement, regardless of which regulatory regime you enter through, runs the same three stages. Each stage produces a written deliverable and a written go or no-go that the buyer signs off before the next stage funds. No surprise scope creep. No mystery line items. The framework changes; the methodology does not.

Stage 01 / Assess

Map the scope and the gap

Two to six weeks. We classify the data, map the boundary, inventory the systems, interview the workflow owners, and compare current posture to every applicable control. The output is a written gap report against each framework, scored, ranked by risk, and tied to specific remediation tasks.

  • Data classification (CUI, ePHI, cardholder data, restricted)
  • Boundary diagram and system inventory
  • Control-by-control gap analysis
  • System Security Plan draft
  • POAM with remediation owners and dates
  • Written go or no-go to Stage 02
Stage 02 / Remediate

Close the gaps, build the evidence

Sixty to two hundred and seventy days. Technical remediation across identity, endpoint, network, logging, backup, and access. Policy authoring where policies are missing. Evidence collection automated through ComplianceArmor so the audit pipeline runs continuously, not as a six-week pre-assessment scramble. Third-party penetration testing is scheduled in this stage so the report is current when the assessor walks in.

  • Microsoft 365 / Entra ID hardening
  • EDR / XDR deployment and tuning
  • Network segmentation and boundary enforcement
  • Centralized logging with retention to control mandate
  • Policy authoring and rollout
  • Continuous evidence collection
  • Mock assessment and tabletop exercises
Stage 03 / Maintain

Sustain posture, prepare for re-audit

Ongoing. Most frameworks require annual reaffirmation or triennial reassessment. We operate the controls, refresh the evidence, update the SSP when the environment shifts, and walk you through the assessor engagement when it comes. The evidence library you built in Stage 02 becomes the artifact that survives staff turnover and vendor changes.

  • Quarterly control review
  • Annual SSP and POAM refresh
  • Continuous evidence collection
  • Vulnerability scanning and remediation
  • Incident response readiness
  • Assessor liaison at re-audit window

Cross-framework evidence reuse: the math that matters

Multi-framework buyers come to Petronella for a single reason: the unit economics fall apart when each regulatory regime is treated as a separate project. A typical mid-market firm with sixty-five employees, a hybrid on-prem and Microsoft 365 environment, and exposure under both CMMC Level 2 and HIPAA will gather between four hundred and six hundred discrete evidence artifacts to satisfy both regimes. About sixty-five percent of those artifacts answer to the same underlying technical control - multi-factor authentication enforcement, endpoint protection coverage, network segmentation, audit logging retention, backup integrity testing. Run the engagements in parallel with two separate consultancies and you collect the same evidence twice, with two sets of reviewers, two sets of meetings, two sets of interview cycles for the same workflow owners. Run them through one cross-framework engagement and the evidence collects once.

The framework that pays the most attention to this overlap is the National Institute of Standards and Technology Special Publication 800-171, which underpins CMMC Level 2 and maps cleanly to HIPAA Security Rule Subpart C, the Trust Services Criteria for SOC 2, the Payment Card Industry Data Security Standard control families, and the federal NIST 800-53 baseline. A control like NIST 800-171 3.5.3 - "use multifactor authentication for local and network access to privileged accounts" - is the same technical posture as HIPAA 164.312(d), PCI-DSS Requirement 8.4, SOC 2 CC6.1, and NIST 800-53 IA-2(1). One MFA enforcement screenshot, properly captured and tagged, satisfies all five.

ComplianceArmor, Petronella's evidence-collection platform, is built around this reuse pattern. It pulls live telemetry from your Microsoft 365 tenant, your EDR console, your patch-management system, your backup verification, and your identity provider, then maps each artifact to every framework control it satisfies. When the assessor asks for evidence of access reviews under CMMC AC.L2-3.1.1, the same artifact is already tagged for HIPAA 164.308(a)(4), SOC 2 CC6.3, and PCI-DSS Requirement 7.2.4. The evidence library does not get rebuilt from scratch every year - it gets refreshed continuously.

This is the part of the engagement most "compliance consultants" cannot run. They write the gap report, hand you a sixty-page SSP, and disappear before the technical remediation starts. Petronella Technology Group, as an MSP and cybersecurity shop first, runs the evidence layer as a managed service. The same engineer who configured your conditional access policies is the one who captures the screenshot and tags it to four frameworks.

What "multi-framework" actually means in practice

The most common multi-framework engagements we run come from three buyer profiles. Defense contractors with international customers carry CMMC and ITAR simultaneously, with the ITAR boundary enforced through technical controls that also satisfy CUI handling. Healthcare technology vendors selling into hospital systems carry HIPAA for the data handling obligations and SOC 2 Type II for the procurement criteria the hospital's vendor risk team requires. Financial services firms with California customers and federal contracts carry GLBA, SOC 2, CCPA, and increasingly the SEC cybersecurity disclosure rules together.

Two-framework programs typically run 30 to 50 percent cheaper than two parallel single-framework programs. Three-framework programs are where the math gets genuinely lopsided - we have seen savings approach 60 percent compared to engaging three different consultancies, primarily because the SSP, the boundary diagram, the asset inventory, the policy library, and the evidence pipeline all consolidate. The cost driver in compliance is not the framework count. It is the artifact count and the meeting count. Both compress sharply under a single engagement.

The independence rule, and why we do not assess

One question almost every prospective client asks early: can Petronella also certify the work after the remediation finishes? The answer is no, and the answer is no for a structural reason every regulator agrees on. The C3PAO program under CMMC, the AICPA rules under SOC 2, the HITRUST authorized external assessor program, and the QSA framework under PCI-DSS all require independence between the firm that built the program and the firm that attests to it. Buyers benefit from the rule - it prevents conflicts of interest and protects the integrity of the audit chain. Petronella runs the program. An independent C3PAO, CPA firm, HITRUST AEA, or QSA runs the assessment. We handle the assessor handoff, attend the kickoff and exit meetings, respond to evidence requests, and stand behind the artifacts we produced. We do not sign the attestation.

How this hub differs from /cmmc-compliance/ and /compliance/cmmc/

This page is a multi-framework overview. Three sibling pillars cover deeper territory:

  • /cmmc-compliance/ is the CMMC-only pillar. If your scope is purely DoD supply chain and Controlled Unclassified Information, that page is the deeper read. It covers the C3PAO landscape, Phase 2 readiness, CMMC Level 2 timing, and the cost breakdown specific to CMMC.
  • /compliance/cmmc/ is the CMMC technical hub. It maps the 110 NIST 800-171 controls to deliverable pages, hosts the control-by-control reference index, and serves as the audit-trail backbone for an active CMMC engagement.
  • /hipaa-compliance/ is the HIPAA-only pillar. Covered entities and business associates with single-framework scope live there.
  • This hub is for buyers whose scope crosses regulatory lines - CMMC plus ITAR, HIPAA plus SOC 2, PCI plus NIST 800-53 - and who need one engagement letter, one project team, and one evidence library across all of it.
05 / Framework Deep Dives

Spoke Pages by Framework

Each framework below has its own deliverable hub with controls, deliverables, pricing model, and case-study language. Open the one closest to your situation. If your scope spans two or more, the discovery call is the right next step.

DoD Supply Chain

CMMC Compliance Pillar

All three CMMC levels: L1 self-attestation for FCI handlers, L2 C3PAO readiness for the 110 NIST 800-171 controls, L3 enhanced security for critical-program contractors. Includes SSP authoring, POAM remediation, mock C3PAO, and ComplianceArmor evidence collection.

Read the CMMC pillar →
Healthcare / PHI

HIPAA Compliance Pillar

Privacy, Security, and Breach rules for covered entities and business associates. Risk analysis, Security Rule attestation, Business Associate Agreement review, breach notification readiness, workforce training, and annual reaffirmation.

Read the HIPAA pillar →
Federal Baseline

NIST 800-53 Implementation

Federal information system controls for FISMA-aligned organizations. Low, moderate, and high baselines. Foundation for FedRAMP and StateRAMP authorization. Covers all 20 control families across access control, identification, audit, configuration, contingency planning, and incident response.

Read the NIST 800-53 page →
Non-Federal CUI

NIST 800-171 Controls

The 110 controls that govern non-federal handlers of Controlled Unclassified Information. Technical backbone of CMMC Level 2 and the contractual baseline of DFARS clause 252.204-7012. Includes the 14 control family mapping and the 320-control assessment objectives.

Read the NIST 800-171 page →
Cardholder Data

PCI-DSS Consulting

PCI-DSS v4.0.1 readiness for merchants and service providers. SAQ scoping, network segmentation for cardholder data environments, vulnerability scanning, penetration testing coordination, and assessor handoff to your QSA. See the PCI DSS overview for the full control map and the merchant-level breakdown.

Read the PCI consulting page → SaaS / Service Org

SOC 2 Type II Readiness

Trust Services Criteria readiness for SaaS, fintech, healthtech, and hosted-service vendors. Covers Security, Availability, Confidentiality, Processing Integrity, and Privacy. Includes policy authoring, control implementation, continuous monitoring, and CPA firm handoff.

Read the SOC 2 page →
Healthcare / Common Security

HITRUST Common Security Framework

HITRUST CSF readiness for organizations that need a unified control framework across HIPAA, NIST 800-53, ISO 27001, and PCI-DSS. Most often required by hospital procurement teams and healthcare technology buyers.

Read the HITRUST page →
International ISMS

ISO/IEC 27001 Certification Consulting

ISO/IEC 27001:2022 Information Security Management System readiness for export-driven, multi-national, and enterprise-procurement organizations. Includes Statement of Applicability, risk treatment plan, Annex A control mapping, internal audit, and certification body handoff. Crosswalks to SOC 2, HIPAA, NIST 800-53, and CMMC so a single ISMS satisfies multiple regimes.

Read the ISO 27001 page →
Cloud / Federal

FedRAMP Authorization

Federal Risk and Authorization Management Program readiness for cloud service providers selling to federal agencies. Low, moderate, and high baselines built on NIST 800-53. Includes Joint Authorization Board and Agency Authorization paths.

Read the FedRAMP page →
06 / Verticals We Serve

Compliance By Industry

Frameworks rarely come alone. Each vertical we work in pairs two or more regulatory regimes by default. The vertical pages below describe the realistic combination buyers in that industry face and the deliverable Petronella ships.

Defense supply chain

CMMC Level 2 plus ITAR plus DFARS 252.204-7012 are the typical stack. Primes and subs carry CUI and frequently export-controlled technical data. Boundary engineering matters more than paperwork; the C3PAO will walk the data flow before reading the SSP.

Healthcare and life sciences

HIPAA is the floor. HITRUST is the procurement requirement from large hospital systems. SOC 2 Type II is now standard for healthcare technology vendors. Clinical trial and research workflows add NIH and IRB layers on top.

Financial services and fintech

GLBA Safeguards Rule, SOC 2 Type II, PCI-DSS for card handling, the SEC cybersecurity disclosure rules for public-company exposure, and increasingly state-level privacy regimes. The pace of regulatory change is the highest of any vertical we serve.

SaaS and hosted-service vendors

SOC 2 Type II is the procurement-blocking control for enterprise buyers. HIPAA arises whenever the customer is a covered entity. PCI-DSS matters if any tier of the product touches cardholder data. Cross-framework evidence reuse is highest leverage here.

Legal and law firms

State bar ethics rules around client confidentiality, ABA Formal Opinion 477R on encryption, court-side cybersecurity standards, and increasing client-driven SOC 2 requirements from corporate counsel teams. Engagement scope often expands into incident response readiness and forensics.

IT services and federal contractors

MSPs serving federal customers carry their own CMMC obligation as a service provider, often at CMMC Level 2 or higher. The chain-of-trust impact on every client they serve is the multiplier the DoD wrote the framework around.

07 / Cross-Framework Mapping

One Control, Five Frameworks

A sample of how a single technical control answers multiple regulatory regimes simultaneously. The full mapping covers more than three hundred control intersections across the eight frameworks above and lives in ComplianceArmor as your evidence library scaffolding.

Technical control CMMC L2 HIPAA NIST 800-53 PCI-DSS v4 SOC 2 TSC
Multi-factor authentication for privileged access IA.L2-3.5.3 164.312(d) IA-2(1) / (2) 8.4 / 8.5 CC6.1
Centralized audit logging with retention AU.L2-3.3.1 164.312(b) AU-2 / AU-3 / AU-11 10.2 / 10.5 CC7.2
Endpoint protection on workstations and servers SI.L2-3.14.2 164.308(a)(5)(ii)(B) SI-3 5.2 / 5.3 CC6.8
Network segmentation for sensitive data SC.L2-3.13.1 164.312(e)(1) SC-7 1.2 / 1.3 CC6.6
Quarterly vulnerability scanning RA.L2-3.11.2 164.308(a)(1)(ii)(A) RA-5 11.3 CC7.1
Encrypted backup with integrity testing MP.L2-3.8.9 164.308(a)(7)(ii)(A) CP-9 / CP-10 9.4 A1.2
Periodic access review and recertification AC.L2-3.1.1 164.308(a)(4) AC-2(j) 7.2.4 CC6.3
Incident response plan with annual tabletop IR.L2-3.6.1 164.308(a)(6) IR-1 / IR-3 12.10 CC7.3
08 / Frequently Asked

Common Questions, Direct Answers

Which compliance frameworks does Petronella handle directly?

CMMC 2.0 at Levels 1, 2, and 3. HIPAA Privacy, Security, and Breach Notification Rules. NIST SP 800-171 and 800-171A. NIST SP 800-172 enhanced security. NIST SP 800-53 at low, moderate, and high baselines. NIST Cybersecurity Framework 2.0. PCI-DSS v4.0.1. SOC 2 Type I and Type II readiness. HITRUST CSF. FedRAMP and StateRAMP. FISMA. FERPA. GLBA. CCPA. CJIS Security Policy. ITAR. IRS-1075. The SEC cybersecurity disclosure rules.

We are a CMMC-AB Registered Provider Organization, RPO #1449, verified at cyberab.org. The technical team holds CMMC-RP across the board. Craig Petronella additionally carries CCNA, CWNE, and Digital Forensics Examiner #604180.

Can one engagement cover multiple frameworks at once?

Yes, and most of our engagements do exactly this. Defense contractors with international customers carry CMMC and ITAR together. Healthcare technology vendors carry HIPAA and SOC 2 Type II together. Financial services firms carry GLBA, SOC 2, and increasingly PCI-DSS together. Public-company customers add the SEC cybersecurity disclosure rules.

We map the controls once across all applicable frameworks, build one evidence library through ComplianceArmor, and run one campaign that satisfies every regime. Buyers who run two frameworks typically save 30 to 50 percent versus engaging two consultancies in parallel. Three-framework programs save closer to 60 percent.

Do you certify or assess?

No. C3PAOs certify CMMC. Independent CPA firms attest SOC 2. HITRUST-authorized external assessors handle HITRUST. Qualified Security Assessors handle PCI-DSS. Petronella does everything up to the assessor: gap analysis, System Security Plan and POAM authoring, technical remediation, evidence collection, mock assessment, and assessor handoff. Independence between the firm that builds the program and the firm that attests to it is required under every regime we work in - and we agree with the rule.

How long does a typical compliance engagement take?

Gap assessments run 2 to 6 weeks across most frameworks. Remediation depends heavily on starting posture. A clean Microsoft 365 tenant with conditional access and EDR already deployed might reach CMMC Level 2 readiness in 60 to 90 days. A hybrid environment with legacy on-premises systems, no centralized logging, and inconsistent endpoint coverage can run 6 to 9 months. HIPAA and CCPA programs typically run 90 to 120 days from kickoff to attestation-ready. SOC 2 Type II includes a 6 to 12 month observation window after readiness, which is not negotiable - the framework requires the controls to operate for that long before the auditor can attest.

How is ComplianceArmor different from a generic GRC tool?

ComplianceArmor is Petronella's evidence-collection platform built around the frameworks our clients actually live in. It pulls continuous telemetry from Microsoft 365, Entra ID, your EDR, your patch-management system, your backup verification, and your identity provider, then maps each artifact to every framework control it satisfies. Generic GRC tools optimize for the questionnaire response cycle. ComplianceArmor optimizes for the evidence cycle - the part of compliance work that actually proves the control operates.

When the assessor walks in, the evidence library is already populated, dated, tagged to multiple frameworks, and ready to download. Audit prep becomes a review meeting, not a six-week scramble.

What does a compliance engagement cost?

Pricing is engagement-specific and depends on framework count, scope size, current posture, environment complexity, and how much technical remediation the work requires. Gap assessment, SSP and POAM authoring, technical remediation, evidence library buildout, and mock assessment are scoped per environment. We do not publish fixed prices because the same framework can vary by an order of magnitude depending on starting point - a clean Microsoft 365 tenant is a different project than a multi-site hybrid environment with legacy systems.

Book a discovery call or call (919) 348-4912. The discovery is free and produces a written scope and quote within five business days.

What is the relationship between CMMC and NIST 800-171?

NIST SP 800-171 is the technical control catalogue. CMMC Level 2 is the assessment framework that confirms a contractor has implemented those 110 controls. Both terms describe the same set of security requirements - NIST 800-171 is the regulation; CMMC is the audit mechanism the Department of Defense uses to verify compliance. DFARS clause 252.204-7012 is the contractual hook that brings both into a defense contract.

CMMC Level 1 covers a narrower seventeen-control set focused on Federal Contract Information, not CUI. CMMC Level 3 adds twenty-four enhanced security requirements from NIST 800-172 on top of the 110 base controls.

Can we use the same Microsoft 365 tenant for CMMC and commercial workloads?

It depends on the data class. For most CMMC Level 2 environments, GCC High is the path that resolves the data-residency and FedRAMP-equivalence concerns - the commercial Microsoft 365 tenant does not meet the FedRAMP Moderate baseline that NIST 800-171 effectively requires for CUI processing. For CMMC Level 1 and FCI-only environments, the commercial tenant can be in scope with the right configuration. The decision affects everything downstream - licensing, identity architecture, third-party integrations, and the boundary diagram. We make the recommendation during Stage 01 gap analysis after looking at the actual data flow.

Are you a Raleigh-only firm, or do you serve clients outside North Carolina?

Petronella Technology Group is headquartered in Raleigh, NC, at 5540 Centerview Dr., Suite 200, but our compliance engagements run nationally. Most of the work is done remotely - SSP authoring, gap analysis, evidence collection through ComplianceArmor, policy review, and mock assessment are all delivered over secure collaboration channels. We send engineers on-site for assessor visits, tabletop exercises, and the initial boundary walk when the engagement warrants. Most clients see us in person two to six times across a six-month engagement.

What happens after the assessment passes?

The work shifts from build to sustain. Stage 03 of our methodology - Maintain - covers quarterly control review, continuous evidence collection, annual SSP and POAM refresh, vulnerability scanning, incident response readiness, and assessor liaison at the reassessment window. CMMC reassesses on a three-year cycle. SOC 2 Type II reassesses annually. HIPAA expects continuous reaffirmation through annual risk analysis. The evidence library you built in Stage 02 is the artifact that survives staff turnover, vendor changes, and platform migrations. Skipping the maintenance phase is how programs decay between audits.

09 / Service Areas

Compliance Services Across North Carolina

Petronella Technology Group is headquartered in Raleigh and serves regulated firms across the Research Triangle, the Triad, and the Charlotte metro. Compliance work runs nationally; on-site engineers ship from Raleigh.

Ready to scope your compliance program?

Pick the discovery path that fits. The compliance call covers framework scoping, current posture, timeline, and the engagement letter. Free, fifteen minutes, no hard sell.