SELF-ASSESSMENT — NOT C3PAO CERTIFIED

This documentation represents an internal self-assessment prepared with AI assistance. It has not been reviewed or validated by a Certified Third-Party Assessment Organization (C3PAO), external MSSP, or any external auditor. CMMC Level 2 certification requires a formal C3PAO assessment. Control statuses reflect honest current implementation state — not aspirational targets.

CMMC Level 2 — Self-Assessment

Security Protocol Dashboard

Internal cybersecurity compliance documentation for OUTSOURCE Consulting Services, Inc. — structured against NIST SP 800-171 Rev 2 and the CMMC 2.0 Level 2 framework. This is a gap analysis and roadmap, not a certification claim.

Organization: OUTSOURCE Consulting Services, Inc. Framework: NIST SP 800-171 Rev 2 / CMMC 2.0 Level 2 Last Updated: April 3, 2026 Prepared By: OCSI Internal (AI-Assisted) Assessment Type: Self-Assessment — C3PAO Review Pending
16
Implemented (Verified)
14
Partially Implemented
80
Not Implemented / No Evidence
13
Open POA&M Items
NIST Cybersecurity Framework Lifecycle

OCSI's security protocols are structured around the NIST Cybersecurity Framework 5-phase lifecycle. Phases 3-5 require external partnership (e.g., external MSSP or similar MSSP) — not yet engaged.

1. Assessment Gap Analysis & Vulnerability ID
2. Remediation Risk Mitigation & Controls
3. Testing Penetration & Control Testing
4. Monitoring Log Review & Alerting (No SIEM)
5. Incident Response Triage, Contain, Recover
Master Documents
NIST SP 800-171 — 14 Control Families
Supporting Documents

Current Compliance Posture — Gap Analysis

OUTSOURCE Consulting Services, Inc. (OCSI) has begun implementing cybersecurity controls structured against NIST SP 800-171 Rev 2 to work toward CMMC 2.0 Level 2 readiness. This is an internal gap analysis, not a compliance certification. Of 110 required controls: 16 are technically verified in code, 14 are partially implemented, and 80 require further implementation or organizational evidence. A formal C3PAO assessment has not been conducted. Key gaps include: no MFA, client-side-only authentication, no SIEM, no encryption at rest, and shared hosting infrastructure.

Target: NIST SP 800-171 Rev 2 Target: CMMC 2.0 Level 2 C3PAO Assessment: Not Scheduled 13 Open POA&M Items