CMMC Registered Practitioner Organization

CMMC Compliance Consulting Readiness Services in Raleigh, NC

You have a DoD contract that requires CMMC Level 2. You need a consultant who understands all 110 controls, can scope your CUI environment, write the SSP, close the gaps, and get you ready for the C3PAO audit without blowing your budget or your timeline. That is what Petronella Technology Group does. We are a CMMC Registered Practitioner Organization serving defense contractors in North Carolina and across the United States from our Raleigh office at 5540 Centerview Drive.

CMMC Registered Practitioner Org (RPO) | 4 CMMC-RP Certified Engineers | BBB A+ Since 2003 | Founded 2002

We Help DoD Contractors Get to C3PAO-Ready, Start to Finish

Our CMMC clients are defense contractors who have received a solicitation or contract requiring CMMC Level 2 and need a CMMC Registered Practitioner team to get them there. We work with prime contractors and subcontractors across manufacturing, professional services, IT, and engineering disciplines throughout the Raleigh, RTP, and Fort Bragg corridor.

We do not certify you. That is the C3PAO's job, and the separation between consulting and certifying is by design. What we do is close every gap between your current security posture and what the C3PAO assessor will require to issue your certificate. When you walk into that assessment, we want no surprises.

  • 110-control gap assessment against NIST 800-171 with SPRS score calculation
  • SSP authoring specific to your environment, not a generic template
  • Technical remediation for MFA, FIPS encryption, SIEM, and access control
  • Mock C3PAO assessment before the real one to close last-mile gaps
  • C3PAO handoff package with all documentation, evidence, and artifacts organized for assessors

Start with a Gap Assessment

Get a clear picture of your current CMMC posture, your SPRS score, and what remediation will require, before committing to a full engagement.

Schedule a Consultation Call (919) 348-4912
CMMC-RP Certified Team | No Obligation
Service Packages

CMMC Readiness Engagements

We structure engagements to match where you are in the CMMC journey. Most clients start with a gap assessment and expand from there based on what we find.

Phase 1

CMMC Gap Assessment

The right starting point for any contractor who has not done a formal assessment against all 110 NIST 800-171 controls. We evaluate your current implementation, identify every gap, score your SPRS baseline, and give you a prioritized remediation roadmap with effort and cost estimates.

  • All 110 controls evaluated against your actual environment
  • CUI boundary scoping and data flow mapping
  • SPRS score calculation and documentation
  • Prioritized gap remediation roadmap
  • Estimated timeline and budget for full readiness
Phase 2

Remediation Partner

After the gap assessment, we work alongside your team to close the gaps. This is hands-on technical and documentation work: configuring MFA, enabling FIPS encryption, standing up audit logging, hardening endpoints, and writing the policy documentation set required across all 14 NIST domains.

  • Technical control implementation advisory
  • FIPS-compliant encryption configuration
  • MFA deployment for all required access types
  • SIEM and audit log infrastructure setup
  • 14-domain policy documentation set
Phase 3

Full Readiness Program

For contractors who need a single-vendor path from gap assessment through C3PAO-ready. This engagement covers everything: gap assessment, remediation support, SSP authoring, POA&M management, evidence collection, policy writing, and a mock C3PAO assessment before the real one. We deliver the complete artifact package to hand off to your chosen C3PAO.

  • All Gap Assessment deliverables
  • All Remediation Partner deliverables
  • System Security Plan (SSP) authoring
  • POA&M development and milestone tracking
  • Evidence collection and artifact organization
  • Mock C3PAO assessment
  • C3PAO handoff documentation package
  • Named CMMC-RP engineer on SOW deliverables
Ongoing

Compliance Maintenance

After C3PAO certification, CMMC is a three-year cycle with annual affirmations, continuous monitoring, and ongoing vulnerability management. We provide the ongoing security operations needed to maintain your certificate and prepare for the triennial reassessment without rebuilding from scratch.

  • Continuous NIST 800-171 compliance monitoring
  • Annual senior official affirmation support
  • Vulnerability scanning and remediation management
  • Configuration management and change control
  • Incident response retainer with 72-hour reporting compliance
  • Triennial reassessment preparation

Scope and pricing vary by organization size, CUI environment complexity, and starting security posture. Contact us to discuss your specific situation and get an accurate estimate.

Engagement Deliverables

What a Full Readiness Engagement Includes

Here is what the Full Readiness Program delivers. Each deliverable is produced by a named CMMC-RP certified practitioner and reviewed for alignment with the current C3PAO assessment guides (CAPs) before handoff.

110-Control Scoping and Evaluation

Every NIST 800-171 control assessed against your actual systems, not assumed. Documented with assessment notes and evidence references.

System Security Plan (SSP) Authoring

A complete, C3PAO-ready SSP specific to your environment. Documents how each control is implemented, by what system, and by whom.

POA&M Development and Milestone Tracking

A Plan of Action and Milestones that meets DoD requirements, with realistic closure dates and resource assignments tracked throughout the engagement.

Policy Documentation Across 14 Domains

Written policies covering all 14 NIST security domains: access control, awareness and training, audit, configuration management, identification and authentication, incident response, and the remaining eight families.

Technical Remediation Advisory

Hands-on guidance for configuring FIPS-validated encryption, deploying MFA across all required access paths, hardening endpoint configurations, and standing up audit logging infrastructure.

Evidence Collection and Artifact Organization

All supporting evidence organized by control and ready for assessor review: configuration screenshots, log samples, training records, access control lists, network diagrams, and policy acknowledgment records.

Mock C3PAO Assessment

A full pre-assessment conducted by our team using the same C3PAO assessment guides that assessors use. We identify any remaining deficiencies before your official assessment date and give you time to close them.

C3PAO Handoff Package

A structured documentation package organized for the C3PAO, covering all required artifacts and a clear scope description. Includes guidance on what to expect during the official assessment.

Our CMMC Team

Four CMMC-RP Certified Engineers on Every Engagement

When a defense contractor hires Petronella Technology Group for CMMC readiness, they get a team where every engineer holding a CMMC role is a Registered Practitioner, not a general IT consultant picking up a new credential. Our principal, Craig Petronella, has been working on CMMC and its predecessor DFARS 252.204-7012 since before the program had its current name. Craig is also a Digital Forensic Examiner (DFE #604180), CCNA, and CWNE, with a background that spans both the technical implementation work and the forensic investigations that happen when controls fail.

Our team holds no C3PAO authorization, which means we are not constrained by the assessor independence rules that prevent C3PAOs from also providing consulting. We can do the deep advisory and remediation work that gets you across the finish line.

Craig Petronella
CMMC-RP | CCNA | CWNE | DFE #604180
Blake Rea
CMMC-RP Certified
Justin Summers
CMMC-RP Certified
Jonathan Wood
CMMC-RP Certified

Petronella Technology Group is listed as a Registered Practitioner Organization (RPO) on the Cyber AB Marketplace. BBB A+ accredited since 2003. In business since 2002.

Typical Engagement Timeline

From Kickoff to C3PAO-Ready: 3 to 12 Months

Timeline depends on your starting security posture, the size of your CUI environment, and your internal team's availability to support remediation. Here is what a typical engagement looks like for a 25-150 person defense contractor.

1

Weeks 1-4: Gap Assessment and Scoping

We map your CUI environment, identify every system in scope, and assess all 110 controls against current implementation. You receive your SPRS score baseline, a gap list with severity ratings, a remediation roadmap, and a realistic cost and timeline estimate for achieving full readiness. This phase gives you the information you need to make informed decisions about pace and scope before committing to remediation.

2

Months 1-4: Technical Remediation

Working from the prioritized gap list, we address technical controls in order of assessment weight and implementation risk. Typical priorities in this phase: MFA across all access paths, FIPS-validated encryption for data in transit and at rest, audit logging with tamper protection, endpoint hardening against the configuration management requirements, and access control segmentation for CUI systems. We also scope and implement CUI enclave strategies that can reduce your overall compliance footprint and cost.

3

Months 3-7: Documentation and SSP Build

As remediation progresses, we build the documentation artifacts in parallel. This includes the System Security Plan, all 14-domain policy documents, procedures, role-based training records, and the evidence artifact library. The SSP is written to describe your actual implementation, not to satisfy a template. Assessors frequently find generic SSPs that list control numbers without describing how anything actually works. We write SSPs that would satisfy a detailed examiner.

4

Month 7-9: Mock Assessment and Last-Mile Closure

Before you engage a C3PAO, we conduct a full mock assessment using the same assessment guides C3PAO assessors use. We treat it like the real thing: document review, interviews, and technical examination. Anything we flag gives you targeted remediation items to close before your assessment date. This step consistently surfaces issues that documentation review alone misses, because assessors find gaps between what is written and what is actually running.

5

Month 9-12: C3PAO Assessment and Certification

You engage your chosen C3PAO for the official assessment. We do not have any financial relationship with specific C3PAOs and will give you unbiased guidance on selecting one appropriate for your scope and timeline. We are available to support your team during the assessment for questions about documentation and implementation decisions. After the assessment, if a POA&M is required, we support closure work within the 180-day window.

What We Do Not Do: Formal Level 2 C3PAO Assessment

Petronella Technology Group is a CMMC Registered Practitioner Organization. We are not authorized to conduct the official CMMC Level 2 assessment or issue CMMC certificates. That is the exclusive role of CMMC Third-Party Assessment Organizations (C3PAOs), which operate under a strict separation from consulting organizations. We help you pass the C3PAO assessment. The certificate comes from the C3PAO and is recorded in the DoD's SPRS system. For an explanation of how C3PAOs and RPOs fit together, see our CMMC Compliance Guide.

Tooling and Platforms

Technology We Work With

CMMC compliance requires specific technology choices. We work with a range of GRC platforms, security tools, and infrastructure products and can advise on options that fit your existing environment and budget. We do not mandate specific vendors; we help you evaluate options against your CUI environment and the CMMC requirements, then implement whatever you choose.

GRC Platforms
Apptega, Drata, Vanta, Compliance Accelerator, CyberSaint
MFA Solutions
Duo Security, Microsoft Authenticator, Okta, YubiKey hardware tokens
SIEM and Logging
Microsoft Sentinel, Splunk, LogRhythm, Devo
Endpoint Security
CrowdStrike, Microsoft Defender for Endpoint, SentinelOne
Encryption (FIPS)
BitLocker (FIPS mode), VeraCrypt FIPS, Azure encryption services with FIPS modules
Cloud Environments
Microsoft 365 GCC/GCC High, Azure Government, AWS GovCloud

Tool mentions are for illustration only. Specific recommendations depend on scope and requirements analysis. We do not receive referral fees from these vendors.

Raleigh, NC and the DoD Corridor

On-Site Capability for North Carolina Defense Contractors

Our office at 5540 Centerview Drive, Raleigh, NC positions us to serve defense contractors throughout the Research Triangle Park area, the Fort Liberty (formerly Fort Bragg) corridor, and the broader North Carolina defense industrial base. We can conduct on-site portions of gap assessments, evidence collection interviews, and mock assessments in person for clients within a reasonable drive of the Raleigh metro.

North Carolina is home to a substantial concentration of defense contractors serving programs at Fort Liberty, Camp Lejeune, Marine Corps Air Station Cherry Point, and Seymour Johnson Air Force Base. Many of these contractors are entering CMMC compliance for the first time, having previously operated under DFARS self-attestation alone. We understand the specific challenges of smaller and mid-size defense suppliers who do not have internal security teams and need a consulting partner who can both explain the requirements and do the implementation work.

We also serve clients nationally via remote engagement. The vast majority of gap assessment, SSP authoring, policy writing, and mock assessment work can be conducted remotely without loss of quality.

Common Questions from Buyers

What Defense Contractors Ask Before Engaging Us

How do I know if I need Level 1 or Level 2?

Look at the data you handle. If your DoD contracts involve Controlled Unclassified Information (CUI), you need Level 2. CUI includes categories like export-controlled technical data, proprietary military specifications, contract-sensitive acquisition information, and other categories defined by the National Archives CUI Registry. If you only handle Federal Contract Information (FCI) with no CUI, Level 1 with annual self-assessment may apply. When contracts contain DFARS clause 252.204-7021, read that clause carefully to see which CMMC level is specified. If you are unsure, our first step is always reviewing your actual contract language before making any recommendations.

How long will this take and what will it cost?

Timeline ranges from 3 months (for organizations already substantially implementing NIST 800-171) to 18 months (for organizations starting from near-zero). Most contractors in the 25-150 person range with moderate security maturity are looking at 6-12 months from first assessment to C3PAO-ready. Cost depends on the size and complexity of your CUI environment, the number of gaps to close, and what technology changes are required. We give you a scoped cost estimate after the initial gap assessment, not before. Giving you a number before we understand your environment would be a guess, and we do not do that.

Do you pick the C3PAO for us?

No, and we should not. The C3PAO you choose must be independent from the organization that prepared you, which means we have no role in the formal assessment. We can explain what to look for in a C3PAO (Cyber AB authorization status, experience in your industry segment, assessment availability), and we can help you prepare the right questions to ask them. The list of authorized C3PAOs is publicly available at cyberab.org/marketplace. We do not have financial relationships with C3PAOs and our guidance on them is unbiased.

Can we use our existing IT vendor for CMMC, or do we need a specialist?

General managed service providers can handle day-to-day IT work, but CMMC has specific knowledge requirements around the 110 NIST controls, the assessment methodology C3PAOs use, SSP structure, POA&M rules, and the evidence artifacts assessors look for. If your current IT vendor is also CMMC-RP certified and familiar with the assessment process, they may be able to support parts of the work. If not, having a CMMC practitioner involved at least for the gap assessment and SSP authoring is worth it. Submitting an incomplete SSP or missing evidence going into the C3PAO assessment is far more expensive than doing it right the first time.

What happens if we fail the C3PAO assessment?

If the C3PAO finds deficiencies, you may receive a conditional CMMC certificate (valid for 180 days) for limited non-critical gaps, provided you have an approved POA&M. You then have 180 days to close the POA&M items and request a closeout assessment. If the deficiencies are in practices excluded from POA&M eligibility (such as MFA or FIPS encryption), you cannot receive conditional status and must remediate before any certificate is issued. Our mock assessment before the official C3PAO assessment is specifically designed to prevent surprises. We want to find the problems before the assessor does.

We are a subcontractor. Do we have to get certified too?

Yes, if you handle CUI. Prime contractors are required under DFARS 252.204-7024 to flow down CMMC requirements to subcontractors handling CUI. Your prime should have notified you if you are expected to hold a CMMC certificate. If they have not, and you handle any controlled technical data, design drawings, specifications, or other CUI categories, contact the prime's contracts or security team to clarify your obligations. Starting the process early is critical because the 6-12 month timeline applies to subcontractors as much as primes.

Is CMMC one-and-done after certification?

No. Level 2 certification is valid for three years, with a required annual senior official affirmation to the DoD that your controls remain in place. You must also update your SSP whenever your CUI environment changes materially, report cyber incidents within 72 hours via DIBNet, and maintain continuous compliance across all 110 controls between assessments. If you add systems, migrate to new cloud environments, or onboard new services that touch CUI, those changes can affect your scope and may require a more formal review. Our Compliance Maintenance engagement keeps all of this on track so your triennial reassessment does not require starting over.

What is the AT-3 training requirement and why does it matter?

AT-3 is the role-based security training requirement. It requires training for individuals who have security responsibilities, not just general awareness training for all staff. This means system administrators, network engineers, security personnel, and others with elevated access or security duties need training specific to their roles, documented and distinguishable from the general awareness training required by AT-2. Many contractors fail this control because they believe a general compliance awareness platform satisfies the role-based training requirement. It does not. We include AT-3 training documentation as part of every readiness engagement.

Get Started

Ready for Your CMMC Gap Assessment?

Contact Petronella Technology Group to schedule a scoping call. We will review your contract obligations, walk through your CUI environment, and give you a realistic picture of what getting to C3PAO-ready requires. No obligation, no pressure. Call (919) 348-4912 or contact us online.

Comparing CMMC MSPs?

See our direct comparison: Petronella vs Summit 7 for CMMC Compliance, covering Raleigh-based operations, CMMC-RP team depth, and private AI path. Evaluating AI exposure in your CUI boundary? Our Petronella vs Microsoft Copilot breakdown covers data residency and BAA fit.

Are You an MSP Delivering CMMC to Defense Clients?

Rent Petronella's four CMMC-RP engineer bench for your client engagements through the CMMC for MSP Clients wholesale path. Gap assessments, SSP authoring, assessment readiness, AT-3 custom training, and named RP on SOW deliverables. MSP keeps the client relationship. Self-serve curriculum via Petronella MSP Stack ($1,997/mo).

See the full MSP partner program pricing side-by-side, walk through the MSP partner onboarding process, or layer MSP digital forensics partnership for CUI-incident response.