{"id":26,"date":"2026-01-21T20:05:27","date_gmt":"2026-01-21T20:05:27","guid":{"rendered":"https:\/\/encapcybercstg.wpenginepowered.com\/?page_id=26"},"modified":"2026-02-18T20:40:23","modified_gmt":"2026-02-18T20:40:23","slug":"about-us","status":"publish","type":"page","link":"https:\/\/encapcyber.com\/?page_id=26","title":{"rendered":"CMMC"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"26\" class=\"elementor elementor-26\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4cdcc2 e-flex e-con-boxed e-con e-parent\" data-id=\"c4cdcc2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/encapcyber.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Video-2.mp4&quot;,&quot;background_play_on_mobile&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container\">\n\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t<\/div>\t\t<div class=\"elementor-element elementor-element-4c3b28e elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4c3b28e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Maturity Model  Certification (CMMC)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6b7d4a elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"d6b7d4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">We make CMMC compliance clear, achievable, and defensible.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2796b18 e-flex e-con-boxed e-con e-parent\" data-id=\"2796b18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-59fab6f e-con-full e-flex e-con e-child\" data-id=\"59fab6f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-185b938 elementor-widget__width-auto elementor-invisible elementor-widget elementor-widget-image\" data-id=\"185b938\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"960\" height=\"960\" src=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/RP-Registered-1024x1024.png\" class=\"attachment-large size-large wp-image-130\" alt=\"\" srcset=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/RP-Registered-1024x1024.png 1024w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/RP-Registered-300x300.png 300w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/RP-Registered-150x150.png 150w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/RP-Registered-768x768.png 768w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/RP-Registered-600x600.png 600w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/RP-Registered.png 1379w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9116156 e-con-full e-flex e-con e-child\" data-id=\"9116156\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8f5921 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"e8f5921\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Maturity Model Certification (CMMC)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-805b419 elementor-widget elementor-widget-text-editor\" data-id=\"805b419\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Our certified team provides comprehensive evaluation of your cybersecurity maturity against the Department of Defense (DoD) CMMC 2.0 framework, ranging from Level 1 (Foundational &#8211; 15 controls) to Level 2 (Advanced \u2013 110 controls) to Level 3 (Expert \u2013 24 controls) to meet contractual eligibility for bidding and maintaining DoW contracts, significantly reduce risks and safeguard sensitive national security information .\u00a0 Key activities include guiding your organization through the rigorous process of documenting the System Security Plan, Ports, Protocols and Services, Hardware and Software list and verifying the implementation of required security practices to ensure your systems are fully prepared for official certification or self-attestation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-203e9ed e-flex e-con-boxed e-con e-parent\" data-id=\"203e9ed\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b01d10a elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b01d10a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our CMMC Services<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f05a84 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"6f05a84\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ff29c18 elementor-widget elementor-widget-icon-box\" data-id=\"ff29c18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCMMC Readiness Assessments\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2aa4c73 elementor-widget elementor-widget-text-editor\" data-id=\"2aa4c73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Identify gaps in your current security posture<\/li><li>Review policies, processes, and technical controls<\/li><li>Provide a roadmap to CMMC compliance<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-da0795c e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"da0795c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c9acd12 elementor-widget elementor-widget-icon-box\" data-id=\"c9acd12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCMMC Consulting &amp; Advisory\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce04e14 elementor-widget elementor-widget-text-editor\" data-id=\"ce04e14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Customized compliance strategies for your organization<\/li><li>Policy and documentation support to include vCISO services<\/li><li>Risk management and security architecture guidance<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b569e0d e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"b569e0d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1df52de elementor-widget elementor-widget-icon-box\" data-id=\"1df52de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCMMC Assessments (C3PAO Services)\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53dca99 elementor-widget elementor-widget-text-editor\" data-id=\"53dca99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Pre-assessment checklists to confirm your readiness<\/li><li>Official CMMC Level 1 &amp; 2 Assessments<\/li><li>Certified CMMC Assessment team with extensive DoD cybersecurity expertise<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-699d2c3 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"699d2c3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-659005c elementor-widget elementor-widget-icon-box\" data-id=\"659005c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCMMC Continuous Monitoring &amp; Compliance Maintenance\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfd6708 elementor-widget elementor-widget-text-editor\" data-id=\"bfd6708\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Ensure ongoing compliance with changing requirements<\/li><li>Proactive security improvements and vulnerability management<\/li><li>Support for self-assessments and SPRS submissions<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be8597b e-flex e-con-boxed e-con e-parent\" data-id=\"be8597b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6340b51 e-con-full e-flex e-con e-child\" data-id=\"6340b51\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d16fe7 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6d16fe7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Business Value of CMMC Compliance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cdc672 elementor-position-left elementor-vertical-align-top elementor-position-left elementor-vertical-align-top elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"1cdc672\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:200,&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"901\" height=\"901\" src=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-15.png\" class=\"attachment-full size-full wp-image-76\" alt=\"\" srcset=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-15.png 901w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-15-300x300.png 300w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-15-150x150.png 150w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-15-768x768.png 768w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-15-600x600.png 600w\" sizes=\"(max-width: 901px) 100vw, 901px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Contractual Eligibility &amp; Competitive Edge<\/h3><p class=\"elementor-image-box-description\">Achieving the required CMMC level is a mandatory prerequisite for bidding on and maintaining lucrative DoD contracts, ensuring your business remains a viable and preferred partner within the Defense Industrial Base (DIB).<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49d22f3 elementor-position-left elementor-vertical-align-top elementor-position-left elementor-vertical-align-top elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"49d22f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:400,&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"901\" height=\"901\" src=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-16.png\" class=\"attachment-full size-full wp-image-77\" alt=\"\" srcset=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-16.png 901w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-16-300x300.png 300w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-16-150x150.png 150w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-16-768x768.png 768w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-16-600x600.png 600w\" sizes=\"(max-width: 901px) 100vw, 901px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Strengthened Security &amp; Risk Management<\/h3><p class=\"elementor-image-box-description\">CMMC assessments evaluate the implementation and effectiveness of required security practices, helping organizations identify gaps, validate data protection controls, and improve their ability to safeguard Controlled Unclassified Information (CUI) and other sensitive national security data.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b892491 elementor-position-left elementor-vertical-align-top elementor-position-left elementor-vertical-align-top elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"b892491\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:200,&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"901\" height=\"901\" src=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-17.png\" class=\"attachment-full size-full wp-image-78\" alt=\"\" srcset=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-17.png 901w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-17-300x300.png 300w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-17-150x150.png 150w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-17-768x768.png 768w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-17-600x600.png 600w\" sizes=\"(max-width: 901px) 100vw, 901px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Enhanced Partnership Status<\/h3><p class=\"elementor-image-box-description\">In the modern defense landscape, Prime contractors are increasingly selective about their subcontractors. By achieving CMMC compliance, your company doesn't just \"check a box\" for the DoW, they become\u00a0low-risk, high-trust partners\u00a0for major defense leads. This status streamlines the \"flow-down\" process, making it significantly easier to be integrated into large-scale, multi-year projects where security is a non-negotiable prerequisite.\u00a0\u00a0<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c666ef2 elementor-position-left elementor-vertical-align-top elementor-position-left elementor-vertical-align-top elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"c666ef2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:400,&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"901\" height=\"901\" src=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-18.png\" class=\"attachment-full size-full wp-image-79\" alt=\"\" srcset=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-18.png 901w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-18-300x300.png 300w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-18-150x150.png 150w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-18-768x768.png 768w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/EncapCyber-Icons-18-600x600.png 600w\" sizes=\"(max-width: 901px) 100vw, 901px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Reduced Legal and Financial Risk<\/h3><p class=\"elementor-image-box-description\">By adhering to CMMC standards, your company significantly reduces their exposure to \"False Claims Act\" litigation.\u00a0 CMMC requires verified evidence of security practices, it provides a robust legal defense and ensures that a company\u2019s self-attestations are accurate, protecting them from the massive fines and contract debarment associated with compliance failures.\u00a0\u00a0<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e88a8e0 e-flex e-con-boxed e-con e-parent\" data-id=\"e88a8e0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3086038 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3086038\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CMMC Readiness<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06c2158 elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"06c2158\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e2b74e elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"8e2b74e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tOfficial Assessments\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t\u2022 CMMC Level 2 Certification<br>\n\u2022 Joint Surveillance Vulnerability Assessment (JSVA)<br>\n\u2022 Delta Assessments<br>\n\u2022 POA&amp;M Close-Out\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2c5402 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"a2c5402\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tReadiness Assessment\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t\u2022 NIST SP 800-171 Gap Analysis<br>\n\u2022 CMMC Assessment Process Readiness Review<br>\n\u2022 Score Validation<br>\n\u2022 Remediation Road-Mapping\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aeacb0e elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"aeacb0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tScoping Strategy\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t\u2022 CUI Boundary Definition<br>\n\u2022 Enclave Design Advisory<br>\n\u2022 Asset Categorization<br>\n\u2022 External Provider Review\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43d996b elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"43d996b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tMock Assessments\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t\u2022 \u201cExamine, Interview, Test\u201d Dry Runs<br>\n\u2022 SME Interview Coaching<br>\n\u2022 Evidence Locker Audit<br>\n\u2022 Executive Tabletops\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1890398 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"1890398\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDocumentation Support\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t\u2022 SSP Development<br>\n\u2022 Policy &amp; Procedure Authoring<br>\n\u2022 Customer Responsibility Matrices (CRM)<br>\n\u2022 POA&amp;M Management\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a3099d elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"5a3099d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSustainment\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t\u2022 Annual Affirmation Support<br>\n\u2022 Continuous Monitoring Oversight<br>\n\u2022 Re-certification Planning<br>\n\u2022 Supply Chain Audits\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-acbb7a4 e-flex e-con-boxed e-con e-parent\" data-id=\"acbb7a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ccd7cf2 e-con-full e-flex e-con e-child\" data-id=\"ccd7cf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a5b290 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"9a5b290\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Deliverables<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5cf443 elementor-position-left elementor-vertical-align-top elementor-position-left elementor-vertical-align-top elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"b5cf443\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:200,&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"901\" height=\"901\" src=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-20.png\" class=\"attachment-full size-full wp-image-160\" alt=\"\" srcset=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-20.png 901w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-20-300x300.png 300w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-20-150x150.png 150w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-20-768x768.png 768w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-20-600x600.png 600w\" sizes=\"(max-width: 901px) 100vw, 901px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Foundational Governance<\/h3><p class=\"elementor-image-box-description\">\u2022 System Security Plan (SSP)<br>\n\u2022 14 Domain Policy Suite<br>\n\u2022 Policy-to-Practice Crosswalk<br>\n\u2022 Shared Responsibility Matrix (SRM\/CRM)<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6888e26 elementor-position-left elementor-vertical-align-top elementor-position-left elementor-vertical-align-top elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"6888e26\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:400,&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"901\" height=\"901\" src=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-21.png\" class=\"attachment-full size-full wp-image-161\" alt=\"\" srcset=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-21.png 901w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-21-300x300.png 300w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-21-150x150.png 150w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-21-768x768.png 768w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-21-600x600.png 600w\" sizes=\"(max-width: 901px) 100vw, 901px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Technical &amp; Discovery<\/h3><p class=\"elementor-image-box-description\">\u2022 CUI Flow Diagrams<br>\n\u2022 Boundary Definition &amp; Justification<br>\n\u2022 Asset Inventory (Hardware\/Software)<br>\n\u2022 Network Architecture Diagrams\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bba9ee0 elementor-position-left elementor-vertical-align-top elementor-position-left elementor-vertical-align-top elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"bba9ee0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:200,&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"901\" height=\"901\" src=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-22.png\" class=\"attachment-full size-full wp-image-162\" alt=\"\" srcset=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-22.png 901w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-22-300x300.png 300w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-22-150x150.png 150w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-22-768x768.png 768w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-22-600x600.png 600w\" sizes=\"(max-width: 901px) 100vw, 901px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Actionable Strategy<\/h3><p class=\"elementor-image-box-description\">\u2022 Gap Analysis Report<br>\n\u2022 Plan of Action &amp; Milestones (POAM)<br>\n\u2022 SPRS Score Calculation &amp; Submission<br>\n\u2022 SPRS Submission Support\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-170fad7 elementor-position-left elementor-vertical-align-top elementor-position-left elementor-vertical-align-top elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-image-box\" data-id=\"170fad7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:400,&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"901\" height=\"901\" src=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-23.png\" class=\"attachment-full size-full wp-image-163\" alt=\"\" srcset=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-23.png 901w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-23-300x300.png 300w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-23-150x150.png 150w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-23-768x768.png 768w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/EncapCyber-Icons-23-600x600.png 600w\" sizes=\"(max-width: 901px) 100vw, 901px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Audit Readiness<\/h3><p class=\"elementor-image-box-description\">\u2022 FIPS 140-2\/3<br>\n\u2022 Vulnerability Scan Reports<br>\n\u2022 Evidence Information Package<br>\n\u2022 Mock Interviews Briefings\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Maturity Model Certification (CMMC) We make CMMC compliance clear, achievable, and defensible. Cybersecurity Maturity Model Certification (CMMC) Our certified team provides comprehensive evaluation of your cybersecurity maturity against the Department of Defense (DoD) CMMC 2.0 framework, ranging from Level 1 (Foundational &#8211; 15 controls) to Level 2 (Advanced \u2013 110 controls) to Level 3 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-26","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CMMC - EncapCyber<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/encapcyber.com\/?page_id=26\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CMMC - EncapCyber\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity Maturity Model Certification (CMMC) We make CMMC compliance clear, achievable, and defensible. Cybersecurity Maturity Model Certification (CMMC) Our certified team provides comprehensive evaluation of your cybersecurity maturity against the Department of Defense (DoD) CMMC 2.0 framework, ranging from Level 1 (Foundational &#8211; 15 controls) to Level 2 (Advanced \u2013 110 controls) to Level 3 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/encapcyber.com\/?page_id=26\" \/>\n<meta property=\"og:site_name\" content=\"EncapCyber\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-18T20:40:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/RP-Registered.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1379\" \/>\n\t<meta property=\"og:image:height\" content=\"1379\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=26\",\"url\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=26\",\"name\":\"CMMC - EncapCyber\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/encapcyber.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=26#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=26#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/encapcyber.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/RP-Registered-1024x1024.png\",\"datePublished\":\"2026-01-21T20:05:27+00:00\",\"dateModified\":\"2026-02-18T20:40:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=26#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/encapcyber.com\\\/?page_id=26\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=26#primaryimage\",\"url\":\"https:\\\/\\\/encapcyber.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/RP-Registered.png\",\"contentUrl\":\"https:\\\/\\\/encapcyber.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/RP-Registered.png\",\"width\":1379,\"height\":1379},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=26#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/encapcyber.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CMMC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/encapcyber.com\\\/#website\",\"url\":\"https:\\\/\\\/encapcyber.com\\\/\",\"name\":\"EncapCyber\",\"description\":\"AI-Powered Protection for Modern Threats\",\"publisher\":{\"@id\":\"https:\\\/\\\/encapcyber.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/encapcyber.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/encapcyber.com\\\/#organization\",\"name\":\"EncapCyber\",\"url\":\"https:\\\/\\\/encapcyber.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/encapcyber.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/encapcyber.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/encapcyber_logo-scaled.png\",\"contentUrl\":\"https:\\\/\\\/encapcyber.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/encapcyber_logo-scaled.png\",\"width\":1765,\"height\":2560,\"caption\":\"EncapCyber\"},\"image\":{\"@id\":\"https:\\\/\\\/encapcyber.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CMMC - EncapCyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/encapcyber.com\/?page_id=26","og_locale":"en_US","og_type":"article","og_title":"CMMC - EncapCyber","og_description":"Cybersecurity Maturity Model Certification (CMMC) We make CMMC compliance clear, achievable, and defensible. Cybersecurity Maturity Model Certification (CMMC) Our certified team provides comprehensive evaluation of your cybersecurity maturity against the Department of Defense (DoD) CMMC 2.0 framework, ranging from Level 1 (Foundational &#8211; 15 controls) to Level 2 (Advanced \u2013 110 controls) to Level 3 [&hellip;]","og_url":"https:\/\/encapcyber.com\/?page_id=26","og_site_name":"EncapCyber","article_modified_time":"2026-02-18T20:40:23+00:00","og_image":[{"width":1379,"height":1379,"url":"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/RP-Registered.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/encapcyber.com\/?page_id=26","url":"https:\/\/encapcyber.com\/?page_id=26","name":"CMMC - EncapCyber","isPartOf":{"@id":"https:\/\/encapcyber.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/encapcyber.com\/?page_id=26#primaryimage"},"image":{"@id":"https:\/\/encapcyber.com\/?page_id=26#primaryimage"},"thumbnailUrl":"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/RP-Registered-1024x1024.png","datePublished":"2026-01-21T20:05:27+00:00","dateModified":"2026-02-18T20:40:23+00:00","breadcrumb":{"@id":"https:\/\/encapcyber.com\/?page_id=26#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/encapcyber.com\/?page_id=26"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/encapcyber.com\/?page_id=26#primaryimage","url":"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/RP-Registered.png","contentUrl":"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/RP-Registered.png","width":1379,"height":1379},{"@type":"BreadcrumbList","@id":"https:\/\/encapcyber.com\/?page_id=26#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/encapcyber.com\/"},{"@type":"ListItem","position":2,"name":"CMMC"}]},{"@type":"WebSite","@id":"https:\/\/encapcyber.com\/#website","url":"https:\/\/encapcyber.com\/","name":"EncapCyber","description":"AI-Powered Protection for Modern Threats","publisher":{"@id":"https:\/\/encapcyber.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/encapcyber.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/encapcyber.com\/#organization","name":"EncapCyber","url":"https:\/\/encapcyber.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/encapcyber.com\/#\/schema\/logo\/image\/","url":"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/encapcyber_logo-scaled.png","contentUrl":"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/encapcyber_logo-scaled.png","width":1765,"height":2560,"caption":"EncapCyber"},"image":{"@id":"https:\/\/encapcyber.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/encapcyber.com\/index.php?rest_route=\/wp\/v2\/pages\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/encapcyber.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/encapcyber.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/encapcyber.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/encapcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=26"}],"version-history":[{"count":0,"href":"https:\/\/encapcyber.com\/index.php?rest_route=\/wp\/v2\/pages\/26\/revisions"}],"wp:attachment":[{"href":"https:\/\/encapcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}