⚠ This case study is entirely fictitious and created for educational purposes only. Any resemblance to real organizations, contracts, or individuals is coincidental.
🏢 Meridian Precision Defense Systems
Meridian Precision Defense Systems
🌐 MPDS Network Diagram
MPDS Network Diagram
Edit Mode Active — click any text to modify it
DoD Subcontractor · Audit Training Scenario

Meridian Precision Defense Systems

A complete, self-contained CMMC Level 2 audit training scenario supporting nine student document groups. Explore organizational data, find the gaps, and build your findings.

147
Employees
3
Active Contracts
8
Seeded Gaps
9
Audit Documents
$17.9M
Contract Value
🏢

Company Profile

Legal Name

Meridian Precision Defense Systems, Inc. (MPDS)

CAGE Code

7RK42

UEI Number

MPDS2024UEI881

Year Founded

1998

Ownership

Privately held — ESOP (~72% employee-owned, 28% founding family)

Primary NAICS

332995 — Other Ordnance and Accessories Manufacturing

Secondary NAICS

541330 — Engineering Services

Revenue Range

$28M–$34M annually (FY2024 estimate)

Employees

147 total — 112 Dayton OH · 35 Huntsville AL

FOCI Status

No known foreign ownership, control, or influence. Annual review completed March 2025.

Mission: "To deliver precision-engineered defense components and systems integration services that meet the exacting standards of the U.S. warfighter — on time, on spec, and fully compliant."
📍

Locations

Headquarters — Primary Site

1440 Industrial Parkway
Dayton, OH 45401
112 employees · All servers on-prem here · Primary CUI processing

Secondary Site

820 Technology Drive
Huntsville, AL 35806
35 employees · Systems Integration Team · Connected via IPsec VPN to Dayton

Commercial office lease — MPDS does not control building access system

Core Competencies

  • Precision machining and fabrication of guidance system housings and actuator assemblies
  • Systems integration support for unmanned aerial vehicle (UAV) subsystems
  • Technical data package (TDP) development and configuration documentation
  • Defense acquisition lifecycle support — engineering change proposals, failure analysis
📋
MPDS holds three active DoD contracts — one prime, one subcontract, one SBIR Phase II. All include DFARS 252.204-7012. The prime contract also includes 7019, 7020, and 7021.

Contract 1 — Army Prime Contract (W58RGZ-23-C-0174)

Contract NumberW58RGZ-23-C-0174
AgencyU.S. Army Aviation and Missile Command (AMCOM), Redstone Arsenal, AL
TypeFirm Fixed Price (FFP)
Value$11.4M
Period of Performance01 Oct 2023 – 30 Sep 2026
DeliverablesActuator housing assemblies (NSN 1270-01-594-3311); associated TDPs; qualification test reports
CUI Categories CUI//CTI EAR99 Baseline ITAR-Controlled Drawings
DFARS Clauses 252.204-7012 252.204-7019 252.204-7020 252.204-7021
Classified?No — all CUI, no classified information

Contract 2 — Raytheon Subcontract (RTX-SUB-2024-4489)

Subcontract NumberRTX-SUB-2024-4489 / Prime: FA8650-24-C-0033
Agency (via Prime)AFLCMC, Wright-Patterson AFB, OH (Raytheon Technologies prime)
TypeCost Plus Fixed Fee (CPFF) subcontract
Value$4.7M
Period of Performance15 Mar 2024 – 14 Mar 2027
DeliverablesUAV airframe bracket design support; FEA reports; engineering drawings per MIL-DTL-31000C
CUI Categories CUI//CTI CUI//PRVCY (limited) ITAR — 22 CFR Part 121
DFARS Clauses 252.204-7012 252.225-7048 Flow-down from Raytheon prime

Contract 3 — NAVAIR SBIR Phase II (N68335-22-C-0552)

Contract NumberN68335-22-C-0552
AgencyNaval Air Systems Command (NAVAIR), Patuxent River, MD
Value$1.85M
Period of Performance01 Jun 2022 – 31 May 2025 (final reports phase)
DeliverablesR&D prototype — lightweight composite actuator; final technical report
CUI Categories CUI//CTI CUI//SP-EXPT
DFARS Clauses252.204-7012
👥

Key Personnel — Cybersecurity Responsibilities

NameTitleCybersecurity Role
Marcus T. EllisonPresident / CEOAuthorizing Official (AO) — signs risk acceptance; CMMC compliance sponsor
Diana L. KowalczykCISO / IT Security ManagerSSP owner; policy oversight; IR coordination; CMMC assessment lead; POA&M management
Trevor J. NakamuraIT Administrator / Sys AdminDay-to-day sysadmin; patch mgmt; account provisioning; backup mgmt; log collection
Priya S. MehtaContract ManagerDFARS clause tracking; CUI flow-down requirements; supplier agreements
Renata M. BauerHR DirectorPersonnel security; background checks; onboarding/offboarding; SAT enrollment
Gregory A. FarrisFSO / Physical Security MgrPhysical access control; visitor management; media destruction; DISS records
🤝

Third-Party Relationships

PartyRoleCUI Access?Notes / Gaps
ClearPath IT Solutions Managed Service Provider (MSP) YES Remote admin via VPN · Month-to-month · No DFARS flow-down · No CMMC requirement in contract
Microsoft (M365 GCC High) Cloud productivity suite YES FedRAMP High authorized · Meets ITAR/CUI for GCC High · Partially configured (see §IT)
AWS GovCloud (US-West) Cloud compute — SBIR analysis YES FedRAMP High authorized · MPDS manages IAM directly · Root account MFA enabled
Whitmore & Associates LLC External accounting (CPA) NO Read-only QuickBooks; not in SSP scope
🚨
Critical Gap: ClearPath MSP holds standing domain admin rights with NO MFA, NO background check verification, NO contractual cybersecurity requirements, and NO right-to-audit provision. This is a supply chain risk and access control finding (GAP-02, GAP-06).
🖥

In-Scope Systems

System IDNameTypePlatformLocationCUI?
SYS-001MPDS-CORP-DC01AD Domain ControllerWindows Server 2019DaytonYes
SYS-002MPDS-CORP-DC02AD Secondary DC / DNSWindows Server 2019DaytonYes
SYS-003MPDS-FILE-SRV01Windows File ServerWindows Server 2022DaytonPRIMARY
SYS-004MPDS-APP-LNX01Linux App Server — PLMUbuntu 22.04 LTSDaytonYes
SYS-005MPDS-ENG-WS (×14)Engineering Workstations CAD/CAMWindows 10 Enterprise 22H2DaytonYes
SYS-006MPDS-HVL-WS (×6)Engineering WorkstationsWindows 11 EnterpriseHuntsvilleYes
SYS-007M365-GCC-HIGHM365 GCC High TenantCloud — MicrosoftCloudYes
SYS-008AWS-GOVCLOUD-ENVAWS GovCloud Compute/S3Cloud — AWSCloudYes
SYS-009MPDS-FW-01Perimeter FirewallFortinet FortiGate 200FDaytonNo
SYS-010MPDS-VPN-GWVPN GatewayFortiGate 200F (module)DaytonNo
SYS-011MPDS-IDS-01IDS/IPS SensorSnort 3.x on Ubuntu 20.04DaytonNo
SYS-012MPDS-PRNT-01MFP Printer/ScannerXerox AltaLink C8045DaytonYes
🌐

Network Architecture — Dayton HQ

🚨
GAP-08: All three subnets route freely through the core Cisco Catalyst 2960-X switch. There is NO VLAN-enforced microsegmentation between CORP-LAN and ENG-LAN. A compromise on CORP-LAN has direct SMB/NFS access to CUI file stores.
CORP-LAN · 10.10.1.0/24
MPDS-CORP-DC01SYS-001
MPDS-CORP-DC02SYS-002
MPDS-FILE-SRV01SYS-003
Admin WorkstationsGeneral Users
UNRESTRICTED ROUTING (GAP-08)
ENG-LAN · 10.10.2.0/24
MPDS-APP-LNX01SYS-004 · PLM
MPDS-ENG-WS ×14SYS-005 · CAD/CAM
MPDS-PRNT-01SYS-012 · Xerox MFP
MGMT-LAN · 10.10.3.0/24
IT Admin SystemsNakamura
MPDS-IDS-01SYS-011
FW Mgmt InterfaceSYS-009
Mgmt-LAN access not enforced at switch level — policy-only segregation, not technical
🔥 FortiGate 200F — SYS-009
Single ISP · 1Gbps · No DMZ · IPsec VPN on SYS-010
Huntsville Secondary Site (192.168.5.0/24)
MPDS-HVL-WS ×6SYS-006
Cisco RV345Perimeter Router
Always-On IPsec Tunnel→ Dayton DCs
🚨
Network equipment in unlocked utility closet accessible to building maintenance. MPDS does not control building access system.
🔄

CUI Data Flow

Contracting Agency / Prime
SFTP / Encrypted Email
M365 GCC High
SYS-007 · Email receipt
File Server
SYS-003 · Primary CUI store
PLM (Arena)
SYS-004 · Drawings, BOMs
ENG Workstations
SYS-005/006 · CAD/CAM
PRNT-01 (SYS-012)
Hard-copy CUI output
SYS-003 (on-prem)
Manual Upload
⚠ No automated control
AWS GovCloud
SYS-008 · FEA data
Remote Access Gap (GAP-01): VPN authentication uses AD username/password only. MFA is enforced only at the M365 layer — not at the network access layer. ~22 VPN users, 6 accounts belong to former employees (GAP-02).
📄

Existing Policies & Documents

IDDocument TitleVersionLast ReviewedStatus
POL-001Access Control Policy1.2Jan 2024Current
POL-002Incident Response Plan1.0Mar 2022Stale — 3+ yrs
POL-003Configuration Management Plan1.1Sep 2023Aging
POL-004Media Protection Policy1.0Nov 2021Stale — 4+ yrs
POL-005Security Awareness Training Program2.0Feb 2024Current
POL-006Risk Assessment ReportJun 2023 (19+ mo ago)Overdue
POL-007System & Communications Protection Policy1.0Aug 2022Stale — 3+ yrs
POL-008System Security Plan (SSP)2.1Oct 2023Needs update
POL-009Physical Security Plan1.3Jan 2024Current
POL-010Contingency / Business Continuity Plan0.9 DRAFTNever finalizedDraft — not approved
🚨

Identified Security Gaps (8 Seeded Findings)

CRITICAL

GAP-01 — MFA Not Enforced on SSL VPN

IA
Domain
IA — Identification & Authentication
Practice
3.5.3 — Use multifactor authentication for local and network access
Finding
Remote access to all in-scope systems is accessible with username/password only. MFA is enforced only at the M365 layer, not at the network access (VPN) layer.
Evidence Needed
VPN configuration screenshots; authentication logs; MFA policy documentation
CRITICAL

GAP-02 — Six Stale VPN Accounts for Separated Employees

AC
Domain
AC — Access Control
Practices
3.1.1 — Limit system access to authorized users; 3.1.2 — Limit system access to transactions and functions users are authorized to execute
Finding
Six VPN accounts for separated employees remain active. No automated deprovisioning tie-in between Convergent HR and AD/VPN gateway.
Root Cause
Offboarding email notification process — VPN deprovisioning not included in offboarding checklist
HIGH

GAP-03 — Audit Logs Not Regularly Reviewed; 30-Day Retention

AU
Domain
AU — Audit & Accountability
Practices
3.3.1 — Create and retain system audit logs; 3.3.2 — Ensure actions of individual users can be traced
Finding
SYS-003 and SYS-004 generate logs but no formal review process exists. Retention is 30 days (below 90-day minimum). No SIEM deployed.
Evidence Needed
Log retention configuration; review schedule / ticketing records; SIEM or equivalent documentation
HIGH

GAP-04 — No Asset Inventory; Unpatched Engineering Workstations

CM
Domain
CM — Configuration Management
Practices
3.4.1 — Establish and maintain baseline configurations; 3.4.2 — Establish and maintain a component inventory
Finding
Engineering workstations (SYS-005 ×14) not enrolled in any configuration management tool. ~4 workstations are 90+ days behind on critical Windows Updates. No formal asset inventory exists.
Evidence Needed
Patch management reports; WSUS/SCCM enrollment; configuration baseline documentation
HIGH

GAP-05 — No Formal POA&M; Informal Spreadsheet Not AO-Approved

CA
Domain
CA — Security Assessment
Practice
3.12.4 — Develop, document, and periodically update system security plans
Finding
Kowalczyk maintains an informal spreadsheet (stored in personal OneDrive — NOT GCC High). It has no version control, no remediation owners, no target dates, no resource estimates, and has not been reviewed by the AO in 18+ months.
Additional Gap
POA&M stored outside the authorized CUI boundary (personal OneDrive vs. GCC High tenant)
CRITICAL

GAP-06 — No Supply Chain Risk Management Program

SR
Domain
SR — Supply Chain Risk Management
Practices
3.17.1 — Assess cybersecurity risks associated with suppliers; 3.17.2 — Use SCRM plans to reduce risk
Finding
MPDS has not assessed the cybersecurity posture of ClearPath MSP or any hardware/material suppliers. MSP contract contains no DFARS flow-down, no right-to-audit, and no cybersecurity requirements.
Scope
Affects ClearPath MSP, Acuitas Machining (receives CUI drawings), Secure Shred AL (handles CUI paper, no NDA)
HIGH

GAP-07 — IRP Not Tested Since 2022; Missing DIBCAC Reporting Language

IR
Domain
IR — Incident Response
Practices
3.6.1 — Establish an IR capability; 3.6.2 — Track, document, and report incidents; 3.6.3 — Test the IR capability
Finding
No tabletop exercise since IRP creation (2022). IRP lacks DFARS 72-hour reporting requirement language. Contact list includes former employee (Chen, PM — departed early 2024).
CRITICAL

GAP-08 — No Network Segmentation Between CORP-LAN and ENG-LAN

SC
Domain
SC — System & Communications Protection
Practice
3.13.3 — Separate user functionality from system management functionality
Finding
CUI on ENG-LAN (SYS-003, SYS-004, SYS-005) is reachable from CORP-LAN without restriction. A workstation compromise on CORP-LAN provides direct SMB/NFS access to all CUI file stores.
🔑

Onboarding & Offboarding

Onboarding

  • Background check via HireRight prior to Day 1 (criminal, employment, education)
  • CUI Handling Agreement (Form HR-07) signed before AD account provisioned
  • IT provisioning via manual ticket from HR — avg. lag 1–2 business days

Offboarding — GAPS

  • HR notifies IT via email only — no formal workflow or checklist
  • Average AD account disable lag: 3–7 business days after separation
  • VPN deprovisioning NOT part of standard offboarding (source of GAP-02)
  • Physical badge deactivation done by FSO Farris — generally same day
📚

Security Awareness Training

Platform

KnowBe4 (annual subscription)

Frequency

Annual required training; quarterly phishing simulations

Records Storage

KnowBe4 platform; exported quarterly to M365 GCC High SharePoint

FY2024 Completion Rates

Overall 89%
Dayton 94%
Huntsville 71% Below target
Gap: No separate privileged-user training track. Nakamura and ClearPath MSP technicians receive the same standard annual training as all employees. NIST 800-171 practice 3.2.2 requires role-based training.
🏛

Dayton HQ — Physical Controls

AreaAccess ControlNotes
Main EntranceHID card readerVisitor check-in — paper log + photo ID
Rear Manufacturing EntranceHID card readerManufacturing staff badge zone
Server Room (Room 104)HID card + PIN keypadAccessible to Nakamura, Kowalczyk, Ellison. MSP escorted — escort policy informal (not documented)
Engineering AreaCorporate badge onlyNo separate access control — all CORP badge holders can reach ENG workstations
Manufacturing FloorSeparate badge zoneRequired for floor personnel and visitors
Server room has APC UPS (2 kVA), wall HVAC, smoke detector. No water/humidity sensor. No formal environmental monitoring log.
🔴

Huntsville — Physical Security Gaps

🚨
Commercial office lease. MPDS does not control the building access control system. Network switch and UPS are in an unlocked utility closet accessible to building maintenance. No local IT staff present.
🗑

Media Handling & Destruction

Media TypeLocationMethodStatus
Hard-copy CUIDaytonCross-cut shredder (DIN 66399 P-4)Compliant
Hard-copy CUIHuntsvilleSecure Shred AL (offsite vendor)NO NDA — No CUI handling agreement
Digital media (HDD/USB)DaytonDegauss + physical destruction, Assured Destruction Services — certs retainedCompliant
Decommissioned HDDs ×3 (2022)Dayton server roomAwaiting disposal in cardboard boxUntracked — No timeline
🚨

Incident History

📌
Incident 1 — Phishing / Malware Attempt (Oct 2023)
PM Kowalski received a spearphishing email impersonating the Army contracting officer. Kowalski clicked the link; CrowdStrike Falcon (Dayton only) blocked the payload. Informally reported to Nakamura via chat. No formal IR report filed. Kowalczyk learned of it two weeks later in casual conversation. No DIBCAC notification made.
📌
Incident 2 — Lost USB Drive (Feb 2024)
Engineering technician reported losing a USB drive that "may have had some drawing files on it." Drive was unencrypted. No formal investigation. No determination made of whether CUI was on the drive. No DoD notification made. Media Protection Policy prohibits unencrypted removable media — enforcement is policy-only, no technical control.
MPDS has submitted zero reports to the DoD CIO cyber incident reporting portal (dibnet.dod.mil) in the past 24 months. The non-reporting decision for both incidents was made informally without documented analysis against DFARS 252.204-7012(c) thresholds.
📊

Open Risk Register

Risk IDDescriptionLikelihoodImpactLevelRemediationOwner
RISK-01 Unpatched ENG workstations exploited via network HighHigh Critical Planned — no target date Nakamura
RISK-02 MSP privileged access abused or compromised (no MFA, no SCRM) MediumHigh High No remediation initiated Kowalczyk
RISK-03 Stale VPN accounts used by former employee or attacker MediumHigh High Partial — HR notified; IT review pending Nakamura
RISK-04 CUI exfiltrated via unencrypted removable media MediumMedium Medium Policy exists; no technical enforcement Kowalczyk / Nakamura
RISK-05 Fire/flood in Dayton server room — no offsite backup for SYS-003 LowHigh Medium Backups to local NAS only — no offsite Nakamura
RISK-06 Huntsville utility closet equipment physically accessed/tampered LowMedium Low-Med Not addressed Farris
🚨
POA&M Status (GAP-05): Informal spreadsheet only. Maintained by Kowalczyk in personal OneDrive (outside GCC High CUI boundary). Not AO-approved. Not version-controlled. Oct 2023 and Feb 2024 incidents not captured. No completion history for any closed items.
🔗

Critical Suppliers

SupplierRoleCUI Access?DFARS Flow-Down?Assessment?
ClearPath IT Solutions MSP — remote admin, helpdesk YES — domain admin NO NO
FastenerTech Supply Precision hardware components No N/A N/A
AeroComp Composites LLC Composite structural parts for UAV brackets 2D drawings via encrypted email Partial — ref. in PO, not verified NO
Acuitas Machining Inc. Sub-tier machining overflow YES — SharePoint link (GCC High) NO formal agreement NO
Secure Shred AL Offsite paper shredding (Huntsville) Physical CUI paper NO NDA — no CUI handling agreement NO

Cloud Service Providers

ProviderServiceFedRAMPCUI Compliant?IAM Owner
Microsoft M365 GCC High Email, Teams, SharePoint, OneDrive High — Authorized Platform: Yes; Config: Partial Nakamura (Global Admin)
AWS GovCloud (US-West) Compute, S3 — SBIR analysis High — Authorized Yes Nakamura (root acct, MFA enabled)
M365 Configuration Gaps: (a) Conditional Access policies partially configured — guest access to SharePoint not fully restricted. (b) Shared service account mpds-admin@meridianpds.onmicrosoft.com holds Global Admin rights with no individual owner assigned.
📂
Nine student groups — each assigned one audit document. All groups receive the full case study. Expand each document below to see scope, key sections, CMMC domains, and the primary finding to identify.
🎓

Logistics & Delivery Options

Group Size

3–5 students per document group (9 groups total; 27–45 students)

Distribution

Full case study to all groups — real auditors review full organizational context

Duration

Recommended 2–3 hours in-class plus 30–60 min prep reading

Deliverable Options

📝
Option A — Foundational
Written findings memo (1–2 pp): list findings, cite NIST 800-171 practice IDs, assign severity, recommend remediation.
📋
Option B — Intermediate
Formal audit workpaper in C3PAO style — finding narrative, evidence required, practice met/not met determination.
🎤
Option C — Advanced
Mock debrief oral presentation (10 min) to "MPDS executive team" — deliver findings and respond to pushback.