VenomousViper Labs
Portfolio Writeups
← Back to Writeups

Executive Summary

This System Operating Policies & Milestones (SOP&M) document is a sanitized case study based on a real engagement preparing a mid-sized defense contractor for CMMC Level 2.

Engagement Context: This initial CMMC Level 2 assessment was delivered solo in 4 days, covering all 14 domains (110 controls) with evidence capture. The deliverables included a 72-page POA&M and a leadership next-steps memo summarizing findings and recommended prioritiesβ€”all completed within the same tight 4-day window.

The original internal document served as both a Plan of Action & Milestones (POA&M) for tracking all remediation work, and a Security Program Implementation Plan feeding into the System Security Plan (SSP).

For this client, I:

About This Portfolio Version:

The complete internal SOP&M/POA&M document spans 72+ pages with detailed control-by-control analysis, gap assessments, remediation plans, and policy deliverables across all 14 CMMC domains.

For portfolio presentation purposes, this page highlights key representative domains to demonstrate the depth, structure, and methodology of the work. Each domain follows the same format: gap identification β†’ remediation actions β†’ policy deliverables.

All client-specific details (company name, domains, IP ranges, locations, ticket IDs, etc.) have been removed or generalized. The structure, analysis, and remediation approach are preserved to demonstrate my work.

Document Metadata

Document Type System Operating Policies & Milestones (SOP&M) / POA&M
Author Jeremy Tarkington (solo assessment and documentation)
Role Systems Engineer III (MSP)
Timeline 4 days (initial assessment, evidence capture, 72-page POA&M, and leadership memo)
Scope 14 CMMC domains, 110 controls (NIST SP 800-171 Rev 2)
Frameworks NIST SP 800-171 Rev 2, CMMC Level 2
Classification Sanitized case study – client identifiers removed

Program Governance and Ownership

To keep CMMC work repeatable and auditable, I defined a simple governance structure:

Roles

Review Cadence

Policy and SOP Index

This engagement required building an entire policy + SOP stack mapped to CMMC domains:

Domain (CMMC) Policy / SOP Examples
3.1 – Access Control AC-01, PA-01, AM-01, RA-01, WA-01, MD-01, MH-01
3.2 – Awareness and Training SA-01, SA-01-SOP, SA-RACI
3.3 – Audit and Accountability AU-01, AU-01-SOP, AU-AUTH, log review templates
3.4 – Configuration Management CM-01, CM-01-SOP, CC-01, SHC-01, AW-01, ES-01
3.5 – Identification & Authentication IA-01, IA-02, IA-MFA-SOP, IA-PASS-SOP, PA-01
3.6 – Incident Response IR-01, IR-01-SOP, IR-REG, IR-TEST-SOP
3.7 – Maintenance MA-01, MA-REMOTE-SOP, MA-SUP-SOP, MA-SAN-SOP
3.8 – Media Protection MP-01, MP-ACCESS-SOP, MP-SAN-SOP, MP-USB-SOP
3.9 – Personnel Security PS-01, PS-VET-SOP, PS-TERM-SOP
3.10 – Physical Protection PE-01, PE-ACCESS-SOP, PE-LOG-SOP, PE-VIS-SOP
3.11 – Risk Assessment RA-01, RA-ASSESS-SOP, RA-RR-01, RA-VM-01
3.12 – Security Assessment CA-01, CA-POAM-SOP, CA-MON-SOP, SSP-01
3.13 – System & Communications Prot. SC-01, SC-FW-POL, SC-SEG-SOP, SC-CRYPTO-POL
3.14 – System & Information Integrity SI-PATCH-POL, SI-MAL-POL, SI-TDR-POL

Domain-by-Domain Analysis

The full document contains detailed analysis for all 14 CMMC domains. Below are representative examples showing the assessment methodology, gap identification, remediation planning, and policy development approach used throughout the engagement.

Each domain analysis includes: (1) Key Gaps Identified, (2) Remediation / Planned Actions, and (3) Policy & Documentation Deliverables.

Domain 3.1 – Access Control
Key Gaps Identified
  • No formal Access Control Policy (AC-01) or privileged access policy.
  • Users widely over-privileged (many in local Administrators groups, shared admin accounts).
  • Encryption and removable media controls inconsistent (BitLocker not enforced).
  • No documented account lockout, session lock, or auto-logoff standards.
  • RDP exposed internally without a clear remote access policy.
  • Wireless and mobile devices unmanaged (no MDM, WPA2-Personal, shared keys).
Remediation Actions
  • Draft and implement AC-01, PA-01, AM-01 policies
  • Remove shared/admin-by-default usage; implement least-privilege roles
  • Enforce access controls via GPOs (session lock ≀15 minutes, login banners, account lockout)
  • Implement BitLocker and removable media controls (BitLocker To Go, GPO-based USB policies)
  • Restrict RDP to internal network only; require VPN for external access
  • Begin rollout of MDM for laptops/phones and move Wi-Fi to WPA2/WPA3-Enterprise with RADIUS
Domain 3.5 – Identification & Authentication
Key Gaps Identified
  • AD user accounts existed, but some shared and service accounts were in use
  • MFA not enforced for either remote access or privileged accounts
  • No documentation of replay-resistant authentication, password complexity, or temporary password handling
  • Inactive accounts remained enabled beyond acceptable timeframes
Remediation Actions
  • Update IA-01 Account Management Policy and create supporting SOPs
  • Enforce MFA for all user logins (especially remote access and admin accounts), VPN and management portals
  • Create dedicated admin accounts separate from user identities
  • Harden password policy (minimum length 12, complexity requirements, history and lockout)
  • Implement automated inactive account disablement and regular account reviews
  • Document cryptographic and Kerberos/NTLM hardening in SOPs
Domain 3.6 – Incident Response
Key Gaps Identified
  • Tools existed (Huntress, Axcient), but no formal Incident Response Plan (IR-01)
  • No incident classification, severity levels, or escalation paths
  • No centralized incident register
  • No tabletop exercises or IR testing evidence
Remediation Actions
  • Build a NIST SP 800-61 aligned Incident Response Program (Preparation, detection, analysis, containment, eradication, recovery)
  • Create IR-01 Incident Response Policy and IR-01-SOP
  • Stand up an Incident Tracking Register (IR-REG) integrated with ticketing
  • Define and document a severity model, SLAs, and communications plan
  • Run at least one tabletop exercise and one simulated incident annually
Domain 3.11 – Risk Assessment
Key Gaps Identified
  • No formal risk assessment process or risk register
  • Vulnerability management was ad-hoc (tool alerts only, no policy or schedule)
  • No remediation tracking or prioritization
Remediation Actions
  • Create RA-01 Risk Management Policy and RA-ASSESS-SOP
  • Stand up a Risk Register (RA-RR-01) with impact/likelihood ratings
  • Build a Vulnerability Management Policy (RA-VM-01) and schedule internal + external scans
  • Implement remediation tracking and validation workflow

Additional Domains Covered

The full SOP&M/POA&M document includes the same level of detailed analysis for the remaining CMMC domains:

Continuous Improvement and Next Steps

For this client, the SOP&M/POA&M became:

Key Next Steps in the Real Engagement

  1. Quarterly POA&M Reviews – Update remediation status; add new findings from scans and assessments
  2. Annual Management Review – Re-validate policies, SSP, and evidence; adjust priorities based on business and threat changes
  3. Evidence Retention & Audit Readiness – Maintain policies, screenshots, exports, and logs; keep a clean mapping from each CMMC practice β†’ policy + technical control + evidence

Document Scope & Portfolio Presentation

Full Document Scope:

This Portfolio Version:

Full documentation available upon request. The complete internal SOP&M/POA&M includes granular control-by-control tables, detailed technical implementation steps, GPO configurations, evidence collection procedures, and live POA&M tracking templates.

Skills Demonstrated