Follow Us:

Frequently Asked Questions.

Clear answers to common CMMC, FedRAMP, and cloud compliance questions—without the marketing noise.

These terms describe very different roles under CMMC, and confusing them often leads to unnecessary scope and compliance cost.
  • ESP (External Service Provider): Any third party that provides services affecting the security of CUI. This is a CMMC concept, not a business model.
    Examples: Managed IT providers, SOC operators, identity providers, backup services.
  • CSP (Cloud Service Provider): A provider offering cloud services as defined in NIST SP 800-145 (on-demand, scalable, multi-tenant, etc.).
    Examples: AWS, Azure, Google Cloud, SaaS application vendors.
  • MSP (Managed Service Provider): A company providing people-driven IT services such as help desk, system administration, or endpoint management.
    Examples: Outsourced IT support, patching services, Intune administrators.
  • MSSP (Managed Security Service Provider): A specialized MSP focused on security operations.
    Examples: SIEM monitoring, SOC-as-a-Service, vulnerability scanning teams.
An MSP or MSSP may also be an ESP. A CSP may or may not be an ESP. These labels are not interchangeable.

Sovereign clouds such as GCC-High are not required by default for CMMC or FedRAMP. They are required when data is subject to:
  • ITAR – Export-controlled defense articles and technical data
  • EAR – Certain controlled dual-use technologies
  • NOFORN – Information restricted to U.S. persons only
These requirements come from law, regulation, or explicit contract language—not from CMMC itself. If your contract or data markings do not impose these restrictions, sovereign cloud usage is optional, not mandatory.

A product is considered cloud only if it meets the characteristics defined in NIST SP 800-145. Cloud services include:
  • On-demand self-service
  • Broad network access
  • Resource pooling (multi-tenancy)
  • Rapid elasticity
  • Measured service
Examples of cloud: SaaS platforms, PaaS offerings, IaaS environments. Not cloud: Dedicated hosted servers, managed appliances, staff-run enterprise systems. If your product primarily relies on people and dedicated equipment rather than customer-controlled scalable infrastructure, it is likely not cloud.

FedRAMP applies only to cloud service providers as defined by NIST SP 800-145. If your product is a managed or enterprise service—where your staff operate systems, access customer data, or provide bespoke infrastructure—it may not be cloud at all. FedRAMP equivalency is not a universal requirement. It becomes relevant only when:
  • Customer data is stored or processed in a scalable, multi-tenant cloud service
  • The service is offered broadly, not as a bespoke managed environment
Many organizations are incorrectly told to pursue FedRAMP when their product does not meet the cloud definition.

No. End-to-end encryption products are not required by CMMC. CMMC does not require data loss prevention (DLP) or zero-knowledge encryption. However, products like PreVeil allow organizations to create a very small, tightly controlled boundary with virtually no risk of data spillage. These products are optional architectural choices, not compliance requirements.

Yes. FedRAMP is not required for services that do not store or process CUI, such as:
  • Telemetry and performance monitoring
  • Anonymous diagnostics
  • Public threat intelligence feeds
However, audit logs, security event data, and vulnerability scan results are considered Federal data and must be handled accordingly.

No. CMMC does not impose a blanket U.S.-citizen-only requirement. Citizenship restrictions apply only when driven by:
  • ITAR, EAR, or NOFORN markings
  • Explicit contractual language
In the absence of those requirements, CMMC does not mandate U.S.-only access.

No—unless ITAR, EAR, or NOFORN apply. A product can meet CMMC or FedRAMP requirements without being a “gov” version, as long as security controls are satisfied. However, agencies and systems handling higher-sensitivity data may be prohibited from using non-sovereign versions, even if they are compliant.

No. A DoD memorandum issued in January 2025 clarified that only certain defense contractor groupings are required to undergo independent Level 2 assessments. Others remain eligible for self-assessment, depending on contract scope and data sensitivity.

The determination is driven by:
  • Contract language
  • DoD program designation
  • Whether the contractor handles prioritized acquisition programs or critical CUI
If the contract requires certification by a C3PAO, an independent assessment is required. Otherwise, a self-assessment may be permitted.