CMMC Assessment Visualization
Assessment-Ready Controls

CMMC Level 2 &
DFARS Physical Security

Visitor management workflows designed for CMMC 2.0 Level 2 and DFARS 252.204-7012. Immutable audit logging, identity verification, and assessment-ready evidence packs.

Direct Control Alignment

Our platform is architected to satisfy the specific Physical Protection (PE) requirements of NIST SP 800-171.

PE.L2-3.10.1

Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.

SecurePoint USA enforces ID-verified check-ins and nationality-based access rules to ensure only authorized individuals enter controlled spaces.

PE.L2-3.10.3

Escort visitors and monitor visitor activity.

Automated host notifications and digital visitor badges clearly state escort requirements and restricted zones based on screening results.

PE.L2-3.10.4

Maintain audit logs of physical access.

Every visitor check-in, host approval, and FSO decision is captured in an immutable, append-only vault with 7-year retention.

PE.L2-3.10.5

Control and manage physical access devices.

Track visitor badge issuance and return with precise timestamps, ensuring all physical access tokens are accounted for in the audit trail.

Assessment-Grade
Evidence Packs

Satisfy assessors with cryptographically signed audit summaries. One-click exports for every visitor access event during your assessment window.

Immutable Logs

Append-only records with SHA-256 verification ensure data integrity.

C3PAO Ready

Designed to survive rigorous joint surveillance assessments.

Evidence Summary

ID: EVIDENCE-2024-Q2

Verified
Control PE.3.10.1
Enforced
Control PE.3.10.3
Escorted
Control PE.3.10.4
Logged

FedRAMP Ready

Infrastructure built on FedRAMP Moderate/High environments for maximum protection of your visitor metadata.

FIPS 140-2

Data at rest and in transit protected by FIPS-validated cryptographic modules for NIST compliance.

Audit Trail Integrity

Digital signatures prevent any manipulation of access records, providing the "defensibility" auditors require.

Automate Your Assessment Prep

1

Phase 1: Control Alignment

Map your specific site policies to PE requirements in our rules engine.

2

Phase 2: Data Orchestration

Unified screening and ID verification automatically creates the evidence trail.

3

Phase 3: Immutable Archive

Logs are vaulted with cryptographic hashes for external audit validation.

The Standard for
Audit Readiness

Stop manually collecting paper logs. Join the facilities using SecurePoint USA to automate the physical security of their CUI.