Phase 1: Scoping
Goal
Before configuration, you must understand where your Controlled Unclassified Information (CUI) lives, who interacts with it, and which third parties are responsible for its protection.
Chapter 1: CUI Data Flows & Business Applications
- Mapping how CUI enters, moves through, and exits your business applications (Email, ERP, SAFE exchange).
Chapter 2: People, Technology, and Processes
- Identifying CUI Assets, Security Protection Assets (SPA), and CRMA to define what the auditor will actually look at.
Chapter 3: External Service Provider (ESP) Management
- Inventorying third parties (MSPs, SaaS tools) and validating FedRAMP Moderate Equivalency.
Chapter 4: Contractual Ingestion & LOB Strategy
- Analyzing DoD contract flow-downs (DFARS 7012) and how lines of business identify CUI at the start of an award.
Phase 2: Identity
Goal
Secure the "Who" (Identity) before building the "What" (Infrastructure).
Chapter 5: Sovereign Cloud Considerations
- Commercial vs. GCC High: The decision matrix (when to stay vs. when to migrate). GCC High as a de facto standard.
- Constraints and Gotchas: AOS-G purchasing (why you can't use a credit card), feature parity, and timeline expectations.
Chapter 6: Identity Foundation
- Cloud Strategy: Cloud-Only vs. Hybrid (less AD FS complexity ==> more security).
- Access Governance: Privileged Identity Management and Entitlement Management for US-Person-only approval workflows.
- Cross-Tenant Collaboration: Cross-tenant access notes and gotchas (e.g. cross-cloud B2B OFF by default, DNS records).
Chapter 7: Conditional Access
- The "CMMC Baseline": Geo-blocking, MFA enforcement, and "Require Compliant Device."
- Auditor’s View: Documenting "break-glass" accounts for the assessor.
Phase 3: Devices
Goal
Define "Where" CUI lives to minimize the audit scope.
Chapter 8: The Virtual Desktop Strategy (AVD)
- Strategic Pivot: Using Azure Virtual Desktop to avoid managing physical endpoints.
- Technical Deep Dive: "Screen Capture Protection" and Watermarking on Session Hosts.
- GCC High Gap: Managing RDP Shortpath and multimedia redirection in Azure Gov regions.
Chapter 9: Endpoint Architecture & Onboarding
- The "Build" Phase: Designing the boundary, identity trust, and enrolling devices.
- Product Focus: Config Profiles for BitLocker (FIPS mode), Firewall, and EDR onboarding.
Chapter 10: Endpoint Operations & Compliance
- The "Run" Phase: Patching, threat defense, and audit evidence.
- GCC High Gap: Mobile Application Management (MAM) requires the specific "Government" variants of apps (e.g., Outlook for Government) to function correctly.
Phase 4: Data
Goal
Encrypt and tag CUI wherever it travels.
Chapter 11: Data Architecture
- Taxonomy Design: Public vs. Internal vs. CUI-Basic vs. CUI-Specified.
- GCC High Gap: The "Unified Labeling Client" is deprecated; you must use the built-in Office labeling client, which has different feature parity in Gov Cloud.
Chapter 12: Data Enforcement & Monitoring
- Taxonomy Design: Public vs. Internal vs. CUI-Basic vs. CUI-Specified.
- GCC High Gap: The "Unified Labeling Client" is deprecated; you must use the built-in Office labeling client, which has different feature parity in Gov Cloud.
Chapter 13: Threat Defense (Defender XDR)
- Gap Filled: Defender for Cloud Apps (MDCA). Detecting "Shadow IT" (CUI -> Gmail).
- Constraint: MDCA in GCC High has fewer 3rd-party API connectors than Commercial.
Chapter 14: Secure Collaboration (Teams & Exchange)
- Architecture: Private Channels vs. Shared Channels for CUI segmentation.
- Critical Constraint: Teams Voice. Microsoft Calling Plans are unavailable in GCC High.
- You must implement "Direct Routing" or "Operator Connect for Gov" to get a dial tone.
Phase 5: Monitoring
Goal
Prove to auditors that you are watching.
Chapter 15: SIEM (Microsoft Sentinel)
- Why: M365 logs are not enough for "Automated Analysis" (AU.L2-3.3.1).
- GCC High Gap: Missing Data Connectors. How to route alerts when a native connector (like MDCA) is missing in Gov Cloud.
Chapter 16: Purview Audit and Data Lifecycle Management
- Technical Deep Dive: "Audit (Premium)" to capture MailItemsAccessed (forensics).
- Critical Gap: Default log retention is too short. Configuring Diagnostic Settings to stream logs to Azure Storage for the required 1-year retention.
Appendices
Goal
Mappings and worksheets to help you pass your CMMC audit.
Appendix A: CMMC Level 2 Technical Controls
- Why: Maps CMMC technical controls to Microsoft tech and chapters in this book.
- GCC High Gap: Purview provides a list, this book provides a roadmap.