{"id":14981,"date":"2023-07-10T11:03:31","date_gmt":"2023-07-10T15:03:31","guid":{"rendered":"https:\/\/tsisupport.com\/tsistaging\/?p=14981"},"modified":"2023-07-12T08:57:27","modified_gmt":"2023-07-12T12:57:27","slug":"enclaves-for-nist-800-171-compliance-cmmc-not-so-fast-5-things-to-be-aware-of-when-considering-an-enclave-solution","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=14981","title":{"rendered":"Enclaves for NIST 800-171 Compliance &#038; CMMC? Not So Fast: 5 Things To be Aware of When Considering an Enclave Solution"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In your quest as a Defense Industrial Base (DIB) contractor to tackle the intricate aspects of NIST 800-171 and CMMC compliance, you&#8217;ve likely been bombarded with a plethora of marketing claims promising swift, \u2018silver bullet\u2019 compliance solutions alleviating your woes. This is understandably enticing for small to medium-sized DIBs grappling between successfully addressing the complex layers of these extensive compliance prerequisites and the cost of implementing them. However, many DIBS ultimately find themselves caught in the web of misleading, irresponsible marketing tactics that overstate the capabilities of their solutions and sell the dream of a foolproof, plug and play solution, that in reality, paves the road to non-compliance with NIST 800-171 and CMMC, which can be a massive risk for DIB contractors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our mission today is not only to expose these challenges but also to arm you with the right questions that will assist you in navigating this labyrinth. Probing your enclave solution provider with these queries will help you ascertain whether you&#8217;re on the right path and will also aid in mitigating the risk of misrepresenting your compliance status. In particular, we will be exploring what are often called \u201cEnclave Solutions\u201d, also known as isolated enclaves or secure enclaves.\u00a0<\/span><\/p>\n<h2><b>What is an Enclave Solution &amp; How Does It Fit into the CMMC Landscape?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">An enclave, in information security, is a fortified section of a network. It serves as a tightly controlled space for handling sensitive data, effectively granting access to authorized users while barring the unapproved. When compared with traditional compliance strategies, enclave solutions shine for their focused, cost-effective approach. They are especially valuable for SMBs whose operations in defense-related domains or systems containing Controlled Unclassified Information (CUI) are limited.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In essence, enclave solutions can serve as an effective mechanism addressing many CMMC controls, by providing a \u201cnetwork within a network\u201d for handling sensitive data. However, to make a well-informed decision, it&#8217;s vital to delve into a series of key considerations that could make or break your compliance strategy.<\/span><\/p>\n<h2><b>Key Questions to Ask Yourself and Your Teams:<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">As you consider the potential implementation of an enclave solution to address your NIST 800-171 and CMMC compliance requirements, it&#8217;s crucial to take a step back and ask yourself a series of reflective questions, that will provide vital insights into whether an enclave strategy aligns with your current and future needs:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Where Does My Information Reside: Individual Computers or the Cloud?<\/span><\/i><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Reflect on the nature of your work. Is your team handling sensitive information on their individual devices, or is access predominantly via the cloud? The answer to this question can shed light on the importance of endpoint security within your organization, and if your team frequently uses individual devices to handle sensitive information, a robust endpoint security solution will be paramount to maintaining compliance and protecting your network. Remember that in the vast majority of cases, endpoints that access CUI are in scope, even when accessing data hosted externally.\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">Where Do I Stand: Sharing Risk or Owning It?<\/span><\/i><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Next, consider your stance on risk ownership. Implementing an enclave solution means placing a portion of your organization&#8217;s security in the hands of your provider which introduces the element of shared risk. Are you comfortable with this, or would you prefer to maintain full control over your risk management? Remember, a detailed Responsibility Matrix can aid in understanding the division of risk and responsibilities between you and your provider.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><span style=\"font-weight: 400;\">What is My Current Data Handling and Storage Strategy, and What Do I Want for the Future?<\/span><\/i><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Take stock of how you&#8217;re currently handling and storing sensitive data. Are you satisfied with the security measures in place? How do you envision this process in the future? If your current measures lack robust security or you aspire to a more secure data handling strategy, an enclave solution might provide the secure space for handling sensitive data that you&#8217;re seeking.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The answers to these three questions should provide you with valuable information that can help inform your decisions going forward. It\u2019s important to understand your unique needs, so that you don\u2019t spend critical time and effort implementing a solution that ends up not being a good fit.\u00a0<\/span><\/p>\n<h2><b>The 5 Questions to Use When Evaluating An Enclave Solution\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">So, you have found a few providers that look like they could be a fit. This is where things can get muddy quickly, and where you will start to see claims that promise a whole lot, for little cost or effort. Unfortunately claims like, \u201csolves for 85% of NIST 800-171 controls\u201d and \u201cbecome ITAR compliant in less than a week\u201d, are often misleading and don\u2019t tell the whole story. TSI has invested countless hours reviewing dozens of products aimed at DIB contractors, and to date, we have seen many claims and have yet to find a single, silver-bullet solution that \u201csolves\u201d CMMC. The fact is, that no such solutions exist, and that to truly achieve the CMMC standards, it will require developing a mature cybersecurity program that accurately keeps in consideration and complements the organization\u2019s unique operational model, compliance obligations and tolerance to risk.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All is not lost though\u2026 the fact is that enclave solutions can be a great fit for many organizations. With features like end-to-end encryption, compliant and secure cloud hosting, and well thought out architecture, many enclave solutions can be a key support element for building the robust cybersecurity program that CMMC requires. Armed with that knowledge, here are five critical questions to ask your prospective enclave solution providers to clarify whether their solution is the right fit for your needs and will meet your expectations:\u00a0<\/span><\/p>\n<ol>\n<li><b><i>What Does &#8220;Address&#8221; vs &#8220;Fulfill&#8221; vs &#8220;Satisfy&#8221; vs &#8220;Complete&#8221; Mean in the Context of Your Solution?<\/i><\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">In the world of CMMC, claims of solutions &#8220;addressing,&#8221; &#8220;fulfilling,&#8221; &#8220;satisfying,&#8221; or &#8220;completing&#8221; the majority of NIST 800-171\/CMMC controls are commonplace. However, these terms can often be ambiguous or misleading. Again, we have not found a single solution to date that singlehandedly &#8220;fulfills&#8221; a control, as the vast majority of solutions rather &#8220;support&#8221; the fulfillment of a control. This places the onus on you, the customer, to ensure the solution is implemented correctly, and that it fulfills the control requirements which will also be needed when you\u2019re developing CMMC-ready policies or documentation and end-user training program. When these claims appear, seek clarification to fully understand the meaning of each term, particularly if they purport to fulfill, satisfy, address, or complete a substantial number of the 100+ NIST 800-171\/CMMC requirements.<\/span><\/p>\n<p><b><i>2.Where Is Your Enclave Hosted?<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400;\">If your organization has certain CUI specified handling requirements or ITAR export controls, knowing the location of your enclave&#8217;s hosting is critical. Ignoring this key consideration can lead to non-compliance, particularly if your data could be accessible to non-US persons, including provider support personnel. Be certain that your provider offers a clear and satisfactory response that includes a description of data residency and controls for data privacy and access.<\/span><\/p>\n<p><b><i>\u00a03. Do You Offer a Detailed CMMC\/NIST Control Responsibility Matrix?<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Ask your prospective provider to differentiate between the controls their solution fully addresses (fulfills\/satisfies) and those it only partially covers (support) by requesting a detailed Control Responsibility Matrix. This document should explicitly indicate which controls their solution fully satisfies and which are only supported. For example, does the solution provide for or require endpoint security configuration to be compliant? If you work with a Registered Provider Organization (RPO), ask them to help clarify any semantics that might inadvertently impact your compliance strategy.<\/span><\/p>\n<p><b><i>4. What Endpoints or Systems Are Considered in Scope for CMMC in Your Solution?<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Understanding the scope of systems covered by a provider&#8217;s solution is crucial, as all devices connecting to your network fall under CMMC controls in one way or another. This includes everything from personal laptops, servers and mobile devices. A comprehensive enclave solution should offer solid guidance for endpoint security, accounting for all potential devices. They should also provide a data-flow diagram (or similar) that clearly defines where data is stored at any given time, and what devices can access it.\u00a0<\/span><\/p>\n<p><b><i>5. Is Your Hosted Enclave Solution FedRAMP Moderate Compliant?<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Compliance with FedRAMP Moderate standards is a significant indicator of a provider&#8217;s commitment to security, but it is also required when using a cloud service provider (CSP) when storing or transmitting CUI. The FedRAMP Moderate designation shows that a CSP successfully implemented a substantial number of security controls, which are crucial for handling sensitive government data and that they\u2019ve been assessed by a 3<\/span><span style=\"font-weight: 400;\">rd<\/span><span style=\"font-weight: 400;\"> party for control validation. Furthermore, to comply with ITAR&#8217;s stringent standards, providers must also demonstrate additional control requirements when dealing with ITAR-regulated data to claim they support ITAR compliance. Ensuring your provider&#8217;s compliance with these standards is critical to ensuring your cloud solutions aren\u2019t causing a gap in your compliance posture.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Equipped with these five pivotal questions, you are now ready to effectively appraise prospective enclave solution providers but remember that the objective is not to find a &#8220;magic bullet&#8221; solution (because none exists!), but to identify a provider that truly understands your needs and can offer a strategy tailored to your unique compliance journey.<\/span><\/p>\n<p><b>How can TSI assist with evaluating a prospective enclave solution?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">As a CMMC RPO, TSI is continuously evaluating the landscape of security solution providers, especially those specifically oriented to DIB organizations. If you have found a solution provider you think may fit for your organization, there is a very good chance we have already evaluated their suitability and functionality, so before signing a contract or purchasing a solution, we highly recommend you hold off so you can verify their suitability. We would love to provide you with the knowledge we have already acquired to save you time and hopefully keep you from spending money on a solution that either won\u2019t meet your needs or would not fully support your unique compliance requirements. We understand that this process can be complex, and you are likely feeling the pressure to move forward with a solution, but please keep in mind we\u2019re here to help and have the experience and expertise to help you.\u00a0<\/span><\/p>\n<p><b>About TSI<\/b><\/p>\n<p><span style=\"font-weight: 400;\">TSI is 34-year old cybersecurity (MSSP) and IT support (MSP) company specializing in helping DIB organizations address their NIST 800-171 and CMMC compliance obligations. As a CMMC-AB Registered Provider Organization (RPO), TSI offers complete NIST 800-171 and CMMC support services to ensure their clients&#8217; sustainable adherence to these expansive compliance requirements. Our team has decades of experience navigating the pitfalls of NIST compliance and would love to help you on your journey. For more information about TSI, please visit our site here: <\/span><a href=\"https:\/\/tsisupport.com\/\"><span style=\"font-weight: 400;\">https:\/\/tsisupport.com\/<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<div class=\"fl-builder-content fl-builder-content-13159 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"13159\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-edl64zj9t1xi fl-row-default-height fl-row-align-center fl-row-bg-overlay sec-pad cta\" data-node=\"edl64zj9t1xi\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-2ztdnuy0woc3\" data-node=\"2ztdnuy0woc3\">\n\t\t\t<div class=\"fl-col fl-node-i57nfg3xtqv1 fl-col-bg-color\" data-node=\"i57nfg3xtqv1\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-myo7cqvetu5h sec-title-big\" data-node=\"myo7cqvetu5h\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h3 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Get in Touch with TSI<\/span>\n\t<\/h3>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-iv9btc1n6lzh\" data-node=\"iv9btc1n6lzh\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>For more information on how TSI can help your organization stay compliant with minimal disruption or if there\u2019s anything we can help address, please give us a call at <a href=\"tel:508-543-6979\">508-543-6979<\/a>\u00a0or send us a message here to get started.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-swgltradoeki fl-animation fl-fade-down primary-btn red-btn\" data-node=\"swgltradoeki\" data-animation-delay=\"0\" data-animation-duration=\"1\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-center\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">get in touch<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<style>.fl-node-swgltradoeki.fl-animation:not(.fl-animated){opacity:0}<\/style><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In your quest as a Defense Industrial Base (DIB) contractor to tackle the intricate aspects of NIST 800-171 and CMMC compliance, you&#8217;ve likely been bombarded with a plethora of marketing claims promising swift, \u2018silver bullet\u2019 compliance solutions alleviating your woes. This is understandably enticing for small to medium-sized DIBs grappling between successfully addressing the complex&hellip;<\/p>\n","protected":false},"author":40,"featured_media":14989,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7,369],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enclaves for NIST 800-171 Compliance &amp; CMMC? Not So Fast: 5 Things To be Aware of When Considering an Enclave Solution - TSI Support<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enclaves for NIST 800-171 Compliance &amp; CMMC? Not So Fast: 5 Things To be Aware of When Considering an Enclave Solution - TSI Support\" \/>\n<meta property=\"og:description\" content=\"In your quest as a Defense Industrial Base (DIB) contractor to tackle the intricate aspects of NIST 800-171 and CMMC compliance, you&#8217;ve likely been bombarded with a plethora of marketing claims promising swift, \u2018silver bullet\u2019 compliance solutions alleviating your woes. This is understandably enticing for small to medium-sized DIBs grappling between successfully addressing the complex&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=14981\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-10T15:03:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-12T12:57:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/07\/cmmc.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chris Riani, CISSP &amp; CMMC Registered Practitioner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chris Riani, CISSP &amp; CMMC Registered Practitioner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=14981\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=14981\",\"name\":\"Enclaves for NIST 800-171 Compliance & CMMC? Not So Fast: 5 Things To be Aware of When Considering an Enclave Solution - TSI Support\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=14981#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=14981#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/07\/cmmc.png\",\"datePublished\":\"2023-07-10T15:03:31+00:00\",\"dateModified\":\"2023-07-12T12:57:27+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/2ab31f44f09e232e313a6068278c98f8\"},\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=14981#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=14981\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=14981#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/07\/cmmc.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/07\/cmmc.png\",\"width\":1920,\"height\":960,\"caption\":\"cmmc\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=14981#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enclaves for NIST 800-171 Compliance &#038; CMMC? Not So Fast: 5 Things To be Aware of When Considering an Enclave Solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/2ab31f44f09e232e313a6068278c98f8\",\"name\":\"Chris Riani, CISSP &amp; CMMC Registered Practitioner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6135092c12abc44dfda7e5a9dcad816a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6135092c12abc44dfda7e5a9dcad816a?s=96&d=mm&r=g\",\"caption\":\"Chris Riani, CISSP &amp; CMMC Registered Practitioner\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=40\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enclaves for NIST 800-171 Compliance & CMMC? Not So Fast: 5 Things To be Aware of When Considering an Enclave Solution - TSI Support","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Enclaves for NIST 800-171 Compliance & CMMC? Not So Fast: 5 Things To be Aware of When Considering an Enclave Solution - TSI Support","og_description":"In your quest as a Defense Industrial Base (DIB) contractor to tackle the intricate aspects of NIST 800-171 and CMMC compliance, you&#8217;ve likely been bombarded with a plethora of marketing claims promising swift, \u2018silver bullet\u2019 compliance solutions alleviating your woes. This is understandably enticing for small to medium-sized DIBs grappling between successfully addressing the complex&hellip;","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=14981","og_site_name":"TSI Support","article_published_time":"2023-07-10T15:03:31+00:00","article_modified_time":"2023-07-12T12:57:27+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/07\/cmmc.png","type":"image\/png"}],"author":"Chris Riani, CISSP &amp; CMMC Registered Practitioner","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Chris Riani, CISSP &amp; CMMC Registered Practitioner","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=14981","url":"https:\/\/tsisupport.com\/tsistaging\/?p=14981","name":"Enclaves for NIST 800-171 Compliance & CMMC? Not So Fast: 5 Things To be Aware of When Considering an Enclave Solution - TSI Support","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=14981#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=14981#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/07\/cmmc.png","datePublished":"2023-07-10T15:03:31+00:00","dateModified":"2023-07-12T12:57:27+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/2ab31f44f09e232e313a6068278c98f8"},"breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=14981#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=14981"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=14981#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/07\/cmmc.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/07\/cmmc.png","width":1920,"height":960,"caption":"cmmc"},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=14981#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Enclaves for NIST 800-171 Compliance &#038; CMMC? Not So Fast: 5 Things To be Aware of When Considering an Enclave Solution"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/2ab31f44f09e232e313a6068278c98f8","name":"Chris Riani, CISSP &amp; CMMC Registered Practitioner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6135092c12abc44dfda7e5a9dcad816a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6135092c12abc44dfda7e5a9dcad816a?s=96&d=mm&r=g","caption":"Chris Riani, CISSP &amp; CMMC Registered Practitioner"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=40"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/14981"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14981"}],"version-history":[{"count":3,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/14981\/revisions"}],"predecessor-version":[{"id":14986,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/14981\/revisions\/14986"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/14989"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}