⚙ Admin Control Panel — Summit Research Institute

Add Community Board Message

Manage Findings Visibility

Toggle individual findings on/off for presentation mode.

    Update Compliance Score

    Current Score Display: 38%

    Add Grant

      Page Tools ✎ Editing

      + Add New Item

      DoD Research
      Summit Research Institute
      Pennsylvania State University • CMMC Level 2 Compliance Case Study • State College, PA
      ACTIVE COMPLIANCE ALERT: Inaccurate SPRS score (submitted: 110 | actual: −47) — potential False Claims Act exposure. Foreign national access suspension pending deemed export review. Immediate legal counsel engagement recommended.
      🔒 SRI EST. 1987 SUMMIT RESEARCH INSTITUTE Pennsylvania State University • State College, PA CMMC LEVEL 2 COMPLIANCE ASSESSMENT High-Entropy Alloy Lattice AUTONOMOUS SYSTEMS ADVANCED MATERIALS
      CMMC Level 2 Compliance Assessment

      Summit Research Institute
      DoD Research Security & Compliance

      University-affiliated laboratory conducting DARPA and ONR-funded research on autonomous systems and advanced materials. Handling CUI and export-controlled technical data — 8 active compliance findings requiring immediate remediation.

      8
      CMMC Findings
      $8.2M
      Annual Funding
      38%
      Current Compliance
      3
      Active Grants
      45+
      Researchers

      🏛 Organization Profile

      Institution Type

      University-Affiliated DoD Lab
      Affiliated with Penn State University

      Location

      State College, PA
      Centre County, Pennsylvania

      Annual Funding

      ~$8.2 Million
      DARPA + ONR contract awards

      Research Personnel

      45 Researchers + Graduate Students
      Including post-docs, PhD, and MS candidates

      Active Grants

      3 Active Awards
      2 DARPA • 1 ONR

      DoD Oversight

      DARPA / ONR
      Defense Sciences Office, Information Innovation Office, Materials Science Div.

      Research Focus

      Autonomous Systems & Advanced Materials
      Navigation, HMT, High-Entropy Alloys

      Regulatory Exposure

      DFARS / CMMC / ITAR / EAR
      CUI + Export-controlled technical data

      Why This Case Matters

      Summit Research Institute occupies a high-risk compliance intersection: it performs cutting-edge defense research attracting some of the nation's most talented scientists — including foreign nationals — while operating under the legal and cultural norms of a university that prizes openness and collaboration. DFARS 252.204-7012, CMMC 2.0 Level 2, and ITAR/EAR create a strict access-controlled environment that is structurally at odds with academic culture. Eight compliance findings expose the institute — and its parent university — to contract termination, False Claims Act liability, and federal export control enforcement.

      Key Compliance Flags

      Student CUI Access Foreign National Gap BYOD on CUI Network No Formal SSP ITAR / EAR Gaps No Incident Response Plan Audit Log Deficiencies No Security Awareness Training

      CUI Categories Present

      CUI//CTI CUI//EXPT CUI//SP-PRVCY CUI//NAVSEA CUI//MFC

      📄 Active Research Grants

      Three active DoD-sponsored grants totaling $8.2M/year in direct funding. All three involve CUI-designated technical data and are subject to DFARS 252.204-7012. Export-controlled technical data is present under all three awards.

      DARPA • DSO

      Resilient Autonomous Navigation Under Adversarial Electromagnetic Conditions

      DARPA-HR0011-24-C-0142
      $3,400,000
      Period: Sep 2023 – Aug 2026
      PI: Dr. M. Hollis

      Machine learning algorithms for GPS-denied autonomous navigation; adversarial robustness testing; terrain-relative navigation using computer vision and inertial navigation fusion.

      CUI//CTI CUI//EXPT (ECCN 7E994) DFARS 252.204-7012 No FN Access w/o PM Approval
      ONR • Materials Science

      Multiscale Characterization of High-Entropy Alloy Fatigue Resistance for Naval Structural Applications

      N00014-24-1-2847
      $2,100,000
      Period: Jan 2024 – Jan 2027
      PI: Prof. K. Asante

      Fatigue crack initiation and propagation mechanisms in novel high-entropy alloys for shipboard structural components; synchrotron X-ray diffraction; multi-physics simulation.

      CUI//CTI CUI//NAVSEA CUI//EXPT (ECCN 1E001) No Commercial Cloud
      DARPA • I2O

      Cognitive Load Optimization in Human-Autonomous System Teams for Dynamic Mission Environments

      DARPA-HR0011-23-C-0089
      $2,700,000
      Period: Apr 2023 – Mar 2026
      PI: Dr. M. Hollis / Prof. K. Asante (Co-I)

      Adaptive AI systems monitoring human operator cognitive load in real time; dynamic autonomy adjustment in human-machine teams; physiological sensing and unmanned system simulations.

      CUI//CTI CUI//SP-PRVCY CUI//EXPT (ECCN 4E001) CUI//MFC Annual ITAR/EAR Training Req.

      🔎 CMMC Gap Findings (8 Total)

      Assessment conducted by CMMC Registered Practitioner Organization (RPO). All findings mapped to NIST SP 800-171 Rev. 2 and CMMC 2.0 Level 2 practices. Three findings classified as Critical.

      Filter by Severity:
      F-001 Critical Unsecured Graduate Student Access to Controlled Unclassified Information AC.1.001 / AC.2.006
      Domain

      Access Control (AC)

      NIST 800-171

      3.1.1 / 3.1.2

      Effort

      120–160 hours

      Est. Cost

      $12,000–$18,000

      Timeline

      30–45 days

      Description

      Graduate students rotating through the autonomous systems lab are granted broad access to shared network drives containing CUI technical data as a matter of operational convenience. No formal need-to-know determination is documented before access is provisioned. Access accounts frequently persist beyond a student's involvement on a specific project. A single shared credential exists for the CUI file share among several graduate students — eliminating all audit trail capability.

      ⚠ Risk

      Unauthorized disclosure of DARPA-funded CUI could trigger DFARS 252.204-7012 breach notification. Shared credentials prevent forensic attribution. CUI spillage to a student's thesis repository (e.g., university GitLab) constitutes a reportable unauthorized disclosure to the DoD CIO.

      ✓ Remediation

      Implement role-based access control (RBAC). Require formal need-to-know determination signed by PI before any graduate student account is provisioned. Enforce individual (non-shared) accounts. Deploy automated account deprovisioning tied to project end dates in the Sponsored Research Office system. Integrate with university identity management for automatic revocation within 24 hours of student separation.

      F-002 Critical Foreign National Access to Export-Controlled Data Without TAA or Deemed Export Determination AC.1.001 / PS.2.127
      Domain

      Access Control / Personnel Security

      NIST 800-171

      3.1.1 / 3.9.1

      Effort

      200–300 hours

      Est. Cost

      $35,000–$75,000

      Timeline

      60–90 days (+ ongoing)

      Description

      Three foreign national researchers (two visiting scholars from a non-Five Eyes country; one PhD candidate who is a citizen of an EAR Country Group D:5 nation) are actively conducting research under the DARPA grant involving controlled autonomous systems algorithms. No Technology Control Plan (TCP) is in place. No "deemed export" analysis was conducted. One researcher has direct access to CUI-flagged simulation code for autonomous vehicle navigation.

      ⚠ Risk

      Releasing export-controlled technology to a foreign national in the U.S. is deemed an export to their country of nationality under EAR (15 CFR 734.13) and ITAR. ITAR violations: civil penalties up to $1.3M per violation; criminal up to $1M and 20 years per violation. Three simultaneous exposure events identified. Voluntary disclosure may be required.

      ✓ Remediation

      Immediately suspend foreign national access to export-controlled data pending deemed export review. Develop Technology Control Plans for each active grant. Engage university legal counsel for potential voluntary self-disclosure to BIS/DDTC. For future hires, mandate Export Control Officer clearance before any foreign national is added to a restricted project.

      F-003 High Unmanaged Personal Devices (BYOD) Accessing CUI Network Without Endpoint Controls CM.2.061 / SC.3.177
      Domain

      Configuration Mgmt / Sys. & Comm. Protection

      NIST 800-171

      3.4.1 / 3.13.1 / 3.13.8

      Effort

      180–240 hours

      Est. Cost

      $28,000–$45,000

      Timeline

      60–90 days

      Description

      Researchers and graduate students connect personal laptops, tablets, and phones to the institute's internal "SRI-Research" Wi-Fi network, which also accesses CUI data stores and the DARPA simulation cluster. No NAC solution enforces endpoint compliance. Personal devices have no guaranteed patch level, no required disk encryption, no EDR agent, and are not enrolled in MDM. The "SRI-Research" SSID is not segregated from the CUI processing environment by VLAN or firewall policy.

      ⚠ Risk

      A single compromised personal device could pivot into the CUI network segment. Stolen or lost personal laptops containing cached CUI require DFARS breach notification within 72 hours. Absence of MDM means the institute cannot remotely wipe CUI from a lost device — an immediate C3PAO assessment failure.

      ✓ Remediation

      Create separate CUI enclave VLAN with firewall enforcement. Deploy NAC solution (e.g., Cisco ISE or Aruba ClearPass) enforcing endpoint compliance posture. Require full-disk encryption on all managed endpoints. Prohibit BYOD access to CUI segments via policy and technical enforcement. Provide loaner managed devices for researchers. Create a guest VLAN for personal devices with zero CUI access.

      F-004 High Inadequate Export Control Compliance Program — No TCP, Incomplete ITAR/EAR Reviews RA.2.141 / RA.3.144
      Domain

      Risk Assessment (RA)

      NIST 800-171

      3.11.1 / 3.11.2

      Effort

      250–400 hours

      Est. Cost

      $40,000–$80,000

      Timeline

      90–180 days

      Description

      Summit Research Institute lacks a comprehensive export control compliance program. No item-level ITAR/EAR jurisdiction reviews have been conducted for research outputs across the three active grants. No Technology Control Plans exist. The Export Control Officer allocates approximately 0.1 FTE to SRI. No export control training has been conducted in 24+ months. Personal cloud storage platforms (Dropbox, Google Drive) have not been assessed for EAR/ITAR cloud compliance and are actively in use for research data.

      ⚠ Risk

      Unreviewed technical data shared at an international conference, uploaded to a non-compliant cloud, or emailed to a foreign collaborator could constitute multiple simultaneous export violations. BIS/DDTC enforcement actions against universities have resulted in multi-million dollar penalties. Personal cloud usage may constitute ongoing undetected violations.

      ✓ Remediation

      Conduct immediate export control audit of all three grants. Develop Technology Control Plans. Increase Export Control Officer dedicated time to 0.5 FTE minimum. Deliver mandatory annual export control training. Implement pre-publication review process. Restrict use of non-compliant cloud storage. Subscribe to export control compliance management platform.

      F-005 Critical No Documented System Security Plan (SSP) — Inaccurate SPRS Score Filed NIST 800-171 3.12.4
      Domain

      Risk Assessment / Configuration Mgmt

      NIST 800-171

      3.12.4 (derived)

      Effort

      300–500 hours

      Est. Cost

      $55,000–$120,000

      Timeline

      60–90 days (SSP) / 12 months (C3PAO)

      Description

      Summit Research Institute has no System Security Plan (SSP) documenting the CUI environment. There is no defined system boundary, no documentation of which controls are implemented vs. planned, no Plan of Action & Milestones (POA&M), and no basis for the SPRS self-assessment score. The institute submitted an SPRS score of 110 (maximum) at contract award without a supporting assessment — actual assessed score is −47.

      ⚠ Risk

      An inaccurate SPRS score constitutes a potential False Claims Act violation with treble damages exposure. DFARS 252.204-7012(d)(2) requires SSP availability within 30 days of request. Without an SSP, CMMC Level 2 certification is impossible — jeopardizing all contract renewals beginning in the 2025–2027 DoD CMMC phased rollout.

      ✓ Remediation

      Retain CMMC RPO immediately for SSP development. Define and document authorization boundary. Assess all 110 NIST SP 800-171 controls. Develop POA&M. Correct SPRS self-assessment score. Engage university legal counsel regarding FCA exposure. Plan for C3PAO third-party assessment before next contract renewal.

      F-006 High Inadequate Audit Log Collection, Retention, and Review for CUI Systems AU.2.041 / AU.2.042
      Domain

      Audit and Accountability (AU)

      NIST 800-171

      3.3.1 / 3.3.2

      Effort

      160–220 hours

      Est. Cost

      $22,000–$40,000

      Timeline

      60–90 days

      Description

      CUI-scoped file servers, research workstations, and VPN gateway are not forwarding logs to a centralized SIEM. Local logs overwrite after 30 days. File access events on CUI shared drives are only logged at the folder level. VPN concentrator logs are reviewed only when a specific incident prompts manual inspection. No log review schedule, no anomaly alerts, and no designated individual responsible for log review.

      ⚠ Risk

      Without centralized audit logs, the institute cannot detect insider threats, exfiltration, or unauthorized access. DFARS 252.204-7012 requires ability to conduct and report cyber incidents — inability to produce audit logs during a DoD-requested investigation is a serious compliance failure and could be viewed as obstruction.

      ✓ Remediation

      Deploy centralized SIEM (e.g., Microsoft Sentinel, Splunk, or MSSP-provided). Configure all CUI-scoped systems with 90-day online / 1-year archive retention. Enable file-level audit logging on CUI repositories. Implement alert rules for high-risk events (bulk download, after-hours access, privilege escalation). Assign ISSO as log review owner with documented schedule.

      F-007 Medium No Formal Cyber Incident Response Plan Meeting DFARS 252.204-7012 Reporting Requirements IR.2.092 / IR.2.093
      Domain

      Incident Response (IR)

      NIST 800-171

      3.6.1 / 3.6.2

      Effort

      80–120 hours

      Est. Cost

      $12,000–$22,000

      Timeline

      45–60 days

      Description

      Summit Research Institute has no written Incident Response Plan for CUI cyber incidents. The university's general IT procedure does not address the 72-hour DFARS reporting requirement to DIBNet, does not identify DARPA and ONR contracting officers as notification parties, and has never been exercised for CUI-specific scenarios. A 2023 phishing compromise of a researcher's email was handled entirely through the university helpdesk with no DFARS reporting consideration — and may require retroactive review for reportability.

      ⚠ Risk

      DFARS 252.204-7012(c) requires cyber incident reporting within 72 hours via dibnet.dod.mil. Failure to report a qualifying incident constitutes breach of contract and can trigger FCA scrutiny. The 2023 phishing incident may require retroactive disclosure to DoD.

      ✓ Remediation

      Develop standalone CUI Cyber Incident Response Plan aligned to DFARS 252.204-7012 and NIST SP 800-61. Register SRI on DIBNet portal. Define ISSO, RSO, ECO, PI, and legal counsel roles. Conduct annual tabletop exercise. Retroactively assess 2023 phishing incident for DFARS reporting obligations.

      F-008 Medium No CUI-Specific Security Awareness and Training Program for Laboratory Personnel AT.2.056 / AT.2.057
      Domain

      Awareness and Training (AT)

      NIST 800-171

      3.2.1 / 3.2.2

      Effort

      80–120 hours

      Est. Cost

      $8,000–$18,000

      Timeline

      45–60 days

      Description

      Research staff, graduate students, and laboratory administrators receive only the university's standard 30-minute annual IT security awareness training covering phishing, passwords, and FERPA. No CUI handling, DFARS, ITAR/EAR, or DoD contractor obligation training exists. Graduate students are onboarded without information security elements. Users can access CUI systems without completing any relevant training. PIs have not received training on their responsibilities as CUI custodians.

      ⚠ Risk

      Most CUI breaches in university research originate from unintentional insider actions — emailing CUI to personal accounts, posting controlled code to public GitHub, sharing controlled drafts via Google Docs with international collaborators. Without role-specific training, personnel cannot recognize controlled information or know when to escalate.

      ✓ Remediation

      Develop tiered training curriculum: (1) General CUI awareness for all personnel; (2) ITAR/EAR responsibilities for researchers on restricted grants; (3) Role-specific training for ISSO, RSO, ECO; (4) PI-specific briefing on CUI custodian responsibilities. Require training completion before CUI access provisioning. Deploy on LMS with completion tracking. Use CDSE (Center for Development of Security Excellence) free resources as foundation.

      📈 Compliance Score & Domain Coverage

      NIST SP 800-171 self-assessment. 110 practices across 14 domains. SPRS submitted score: 110 (INACCURATE) — Actual assessed score: −47.

      38% NIST 800-171 COMPLIANCE 0% 50% 100% NON-COMPLIANT PARTIAL COMPLIANT SPRS Filed: 110 (Inaccurate) Actual Score: −47 | FCA Exposure

      Practice Coverage by Domain

      Access Control (AC)36%
      Awareness & Training (AT)17%
      Audit & Accountability (AU)33%
      Config. Management (CM)44%
      Ident. & Auth. (IA)64%
      Incident Response (IR)17%
      Maintenance (MA)58%
      Media Protection (MP)44%
      Personnel Security (PS)50%
      Physical Protection (PE)75%
      Risk Assessment (RA)17%
      Security Assessment (CA)13%
      Sys. & Comm. Prot. (SC)53%
      Sys. & Info. Integrity (SI)71%
      −47
      Actual SPRS Score
      38%
      Practices Implemented
      110
      SPRS Filed (Inaccurate)

      🏛 Organizational Security Framework

      Governance structure showing regulatory environment, university administrative layer, SRI laboratory layer, and the CUI enclave — with policy flow and incident reporting pathways.

      REGULATORY ENVIRONMENT DFARS 252.204-7012 NIST SP 800-171 CMMC 2.0 Level 2 ITAR 22 CFR 120-130 EAR 15 CFR 730-774 UNIVERSITY ADMINISTRATIVE LAYER — Penn State University VP for Research Ultimate institutional research authority NSPM-33 compliance Contractor of record Sponsored Research Office (SRO) Award administration DFARS flow-down SPRS submission Export Control Office (ECO) ITAR / EAR compliance Deemed export analysis TCP development University CISO / IT Security Cybersecurity policy CUI incident response CMMC readiness Office of General Counsel FCA risk assessment Voluntary disclosures Contract compliance SRI LABORATORY LAYER — Summit Research Institute Lab Director Dr. M. Hollis, Ph.D. Scientific leadership DoD PM interface CUI custodian (2 grants) SPRS disclosure Principal Investigators 4 active PIs CUI custodian per grant Access authorization Research reporting ISSO James Okafor, M.S. Security controls SSP / POA&M owner Log review / SIEM DIBNet reporting Export Control / Research Security Dr. L. Szymanski, J.D. TCP development Voluntary disclosure FN risk assessment Research Personnel 45 researchers 22 graduate students CUI handlers Training required - - - CMMC ASSESSMENT BOUNDARY - - - CUI ENCLAVE CUI File Servers (3) Windows Server / FIPS HPC Cluster Linux / DARPA Research Workstations (6) Windows / macOS managed VPN Gateway Cisco / FIPS 140-2 SIEM Platform TO BE DEPLOYED 🔒 🔒 🔒 🔒 DARPA Program Manager DSO / I2O ONR Technical Representative Materials Science DIBNet Portal 72-hr Incident Reporting (DFARS) Policy / Control Flow Incident Reporting Grant Data Flow CMMC Assessment Boundary

      🗺 Remediation Roadmap

      Three-phase remediation plan from immediate risk reduction through full CMMC Level 2 certification. Total estimated investment: $285,000–$470,000 over 12 months.

      Phase 1 • Days 0–90

      Immediate Risk Reduction & Foundation

      Objective: Stop immediate legal exposure, establish foundational compliance infrastructure.
      • Day 1: Suspend foreign national access to export-controlled data
      • Days 1–5: Engage legal counsel for FCA/SPRS exposure
      • Days 1–14: Revoke shared CUI credentials; issue individual accounts
      • Days 1–21: Engage CMMC RPO for SSP development
      • Days 14–21: Register on DIBNet portal
      • Days 21–30: Deliver emergency CUI awareness briefing
      • Days 21–60: Export control audit of all three grants
      • Days 30–75: Complete SSP draft and corrected SPRS score
      • Days 45–90: Deploy minimum viable SIEM configuration
      • Days 45–90: Publish CUI Incident Response Plan v1.0
      $85K–$140K
      Estimated Phase 1 Cost
      Phase 2 • Days 91–180

      Core Compliance Implementation

      Objective: Implement technical controls, complete export control program, achieve defensible posture.
      • Days 91–120: CUI network segmentation; deploy NAC solution
      • Days 91–150: Procure and deploy managed endpoint devices; retire BYOD
      • Days 91–150: Complete deemed export analyses for all foreign nationals
      • Days 91–120: Deliver tiered security awareness training (100% completion)
      • Days 91–120: Implement RBAC; complete quarterly access review
      • Days 91–120: Finalize Technology Control Plans for all three grants
      • Days 91–120: Complete SIEM tuning; implement alert rules
      • Days 120–150: Conduct first CUI incident response tabletop exercise
      • Days 91–150: CMMC gap assessment (all 110 practices) with RPO
      • Days 120–180: Finalize POA&M for all CMMC gaps
      $120K–$200K
      Estimated Phase 2 Cost
      Phase 3 • Days 181–365

      Full CMMC Level 2 Certification

      Objective: Close all POA&M items, complete C3PAO pre-assessment, achieve CMMC Level 2 certification.
      • Days 181–300: Address all open POA&M items from Phase 2
      • Days 181–270: Implement remaining technical controls (IA hardening, MP, PE)
      • Days 270–300: Conduct internal pre-assessment (mock C3PAO audit) with RPO
      • Days 300–330: Remediate pre-assessment findings
      • Days 270–330: Engage and schedule C3PAO for official assessment
      • Day 330–365: C3PAO third-party assessment
      • Days 300–365: Establish ongoing compliance program
      • Days 330–365: Develop multi-year CMMC maintenance budget
      • Day 365: Brief VPR and SRO leadership on compliance posture
      $80K–$130K
      Estimated Phase 3 Cost
      $285K–$470K
      Total Remediation Investment
      12 months
      Full Certification Timeline
      $65K–$95K/yr
      Ongoing Annual Compliance Cost
      $15.5M–$35.9M
      Maximum Risk Exposure (Non-Compliance)

      👥 Key Personnel & Stakeholders

      Four key stakeholders driving the compliance remediation effort across technical, legal, administrative, and research dimensions.

      🔬
      Dr. Margaret Hollis, Ph.D.
      Laboratory Director & Principal Investigator — Autonomous Systems
      Dr. Hollis has led Summit Research Institute for eleven years, building its reputation as a leading university-affiliated laboratory for autonomous navigation and adaptive control. She holds a Ph.D. in Electrical Engineering from Carnegie Mellon University, has served as PI on nine consecutive DoD grants totaling over $22M, and serves on the DARPA ISAT study group. The recent CMMC assessment has shifted her perspective on compliance requirements from administrative burden to institutional imperative.
      💻
      James Okafor, M.S.
      Information System Security Officer (ISSO) & Research IT Manager
      James manages all laboratory IT infrastructure as a sole practitioner — network administration, endpoint management, research computing, and DFARS information security compliance. He completed CDSE training, holds CompTIA Security+, and is pursuing CISSP. James identified the inaccurate SPRS score and escalated it to Dr. Hollis and university counsel, effectively initiating the current remediation effort.
      Dr. Linda Szymanski, J.D., M.S.
      Export Control Officer (Shared Appointment) & Research Security Coordinator
      Dr. Szymanski came to Penn State after a career in international trade law specializing in ITAR and EAR compliance for defense contractors. Her portfolio covers 800+ active sponsored research projects university-wide, with SRI's three DoD grants among the highest risk profiles. She is leading Technology Control Plan development for all three active grants and coordinating a potential ITAR voluntary self-disclosure under evaluation by university counsel.
      🔬
      Prof. Kwame Asante, Ph.D.
      Principal Investigator — Advanced Materials Program & Associate Professor of Materials Science
      Professor Asante joined Penn State following postdoctoral work at Lawrence Berkeley National Laboratory, developing expertise in synchrotron X-ray diffraction for characterizing metallic alloy microstructure. He is PI for the ONR high-entropy alloy program and co-investigator on the DARPA human-machine teaming grant. He advises five PhD students — three of whom are foreign nationals central to the ongoing export control review — and is cooperating fully with compliance efforts.

      ⚖ Regulatory Framework

      Five overlapping regulatory regimes govern Summit Research Institute's DoD-sponsored research. Understanding the interaction between these frameworks — particularly where they conflict with academic culture and the Fundamental Research Exclusion — is central to any compliance strategy.

      📄
      DFARS 252.204-7012

      Safeguarding Covered Defense Information

      Primary DoD cybersecurity clause. Requires NIST SP 800-171 implementation, 72-hour cyber incident reporting to DIBNet, malicious software submission to DC3, media preservation, subcontractor flow-down, FedRAMP-compliant cloud services, and current SPRS score submission. Non-compliance: contract termination for default, debarment, False Claims Act exposure.

      🔐
      CMMC 2.0 Level 2

      110 Practices — NIST SP 800-171

      CMMC 2.0 (32 CFR Part 170, finalized Dec. 2024) maps directly to NIST SP 800-171 Rev. 2. Level 2 = 110 security practices across 14 domains. Third-party C3PAO certification required for prioritized DoD acquisitions involving CUI. SRI's DARPA and ONR grants are prioritized — third-party certification will be required at next renewal cycle (est. 2025–2027).

      🌐
      ITAR 22 CFR 120–130

      International Traffic in Arms Regulations

      DDTC-administered. Controls export of defense articles, services, and technical data on the U.S. Munitions List (USML). Relevant USML categories: VIII (Aircraft/UAV), XI (Military Electronics), XII (Fire Control/Guidance), XV (Spacecraft). Deemed export applies to foreign nationals. No FRE if publication restrictions or access controls exist. Civil: up to $1.3M/violation. Criminal: up to $1M and 20 years/violation.

      📈
      EAR 15 CFR 730–774

      Export Administration Regulations

      BIS-administered. Controls dual-use items on the Commerce Control List (CCL). Relevant ECCNs: 7E994 (Autonomous navigation technology), 3E001 (Advanced materials technology), 4E001 (AI/computer technology). Military end-use rule (15 CFR 744.21) may apply even to EAR99 items in SRI's research context. FRE available but invalidated by DFARS access controls present in all SRI grants.

      🏫
      Fundamental Research Exclusion

      FRE — ITAR 22 CFR 120.11 / EAR 15 CFR 734.8

      Frequently misapplied at SRI. FRE exempts university basic/applied research intended for open publication — but only if NO publication restrictions, NO access controls, and NO proprietary constraints exist. Any grant including DFARS 252.204-7012 cannot simultaneously claim FRE, because DFARS itself imposes access controls. All three SRI grants include DFARS → FRE does not apply to any SRI grant.

      🔒
      NSPM-33 / Research Security

      National Security Presidential Memorandum 33

      Post-NSPM-33 and CHIPS Act requirements mandate university research security programs including: Foreign talent risk assessment, conflict of interest/commitment disclosure, cybersecurity programs for CUI, export control integration, research security training, and incident reporting procedures. DoD ONRI and NSF require research security programs for institutions receiving $50M+ in federal research funding — Penn State exceeds this threshold.

      NIST SP 800-171 Domain Coverage — Full Summary

      Domain Abbr. Practices Implemented Partial Not Implemented Coverage %
      Access ControlAC22561136%
      Awareness & TrainingAT301217%
      Audit & AccountabilityAU922533%
      Configuration ManagementCM932444%
      Identification & AuthenticationIA1153364%
      Incident ResponseIR301217%
      MaintenanceMA631258%
      Media ProtectionMP932444%
      Personnel SecurityPS210150%
      Physical ProtectionPE641175%
      Risk AssessmentRA301217%
      Security AssessmentCA401313%
      System & Comm. ProtectionSC1672753%
      System & Info. IntegritySI741271%
      TOTAL 110 37 24 49 38%

      💬 Research Security Community Board

      A discussion forum for ISSO officers, export control professionals, research security officers, and DoD-affiliated laboratory staff. Share insights, ask questions, and collaborate on compliance challenges.

      Post a Message

      Recent Discussions

      Dr. Sarah Kim — ISSO, Applied Physics Laboratory, Johns Hopkins March 28, 2026

      We just completed our CMMC Level 2 C3PAO assessment — happy to share lessons learned. The biggest surprise was how much the assessors focused on SSP boundary definition accuracy. If your boundary is vague, every system becomes "in scope" and you spend half the assessment defending scope instead of demonstrating controls. Define your CUI enclave boundary precisely before you engage a C3PAO.

      Prof. Marcus Webb — Research Security Director, Georgia Tech Research Institute March 24, 2026

      Looking for advice on how other DoD-affiliated university labs are handling the CMMC / academic culture tension. Faculty governance is pushing back hard on the RBAC requirement for CUI systems — PIs want to be able to add students themselves without an access review process. Has anyone found a workflow that balances PI autonomy with the formal need-to-know requirement?

      Lt. Col. (Ret.) Amanda Torres — Research Security Consultant March 20, 2026

      Reminder that NSPM-33 research security program requirements now include an annual disclosure certification for all personnel on DoD-sponsored grants. DOE and NSF are enforcement leaders on this — DoD is following. If your institution doesn't have a formal COI/COC disclosure process tied to your grant onboarding workflow, you need one before your next DoD audit.

      James Okafor, M.S. — ISSO, Summit Research Institute April 2, 2026

      Quick update on our remediation progress: individual CUI accounts are now provisioned for all lab personnel (Day 14 milestone hit). We're working through the foreign national deemed export analysis — three situations under legal review. Most important lesson so far: get your SPRS score corrected BEFORE your next contract renewal conversation. Finding out during a proposal cycle is much worse.

      📚 Resources & References

      Key compliance resources for DoD-affiliated university research laboratories pursuing CMMC Level 2 certification and export control compliance.

      📄

      DFARS 252.204-7012

      Full text of the DoD cybersecurity safeguarding clause with CUI and incident reporting requirements

      View Clause
      🔐

      CMMC 2.0 Program

      Official DoD CMMC program documentation, rulemaking, and assessment resources

      CMMC Portal
      📖

      NIST SP 800-171 Rev. 2

      Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

      Download SP
      🌐

      DDTC ITAR Resources

      State Department Directorate of Defense Trade Controls — ITAR compliance, USML, licenses

      DDTC Portal
      📈

      BIS / EAR Resources

      Bureau of Industry and Security — Commerce Control List, license exceptions, deemed export

      BIS Portal
      🏫

      CDSE Training

      Center for Development of Security Excellence — free DoD-approved security awareness training

      CDSE Portal
      📋

      DoD CUI Registry

      Official CUI categories, subcategories, markings, and handling requirements

      CUI Registry
      🔎

      DIBNet Portal

      DoD Defense Industrial Base Network — cyber incident reporting, SPRS, contractor portal

      DIBNet
      📁

      NSPM-33 Guidance

      OSTP guidance on research security program requirements for federally funded institutions

      NSPM-33

      Additional Case Study Resources

      CMMC Resources: https://sands-mvcc.github.io/CMMC/

      Related Case Study: AI in Action: NSF ATE Grant Case Study

      📞 Contact & Engagement

      Summit Research Institute

      University-Affiliated DoD Research Laboratory

      110 Technology Center
      University Park, PA 16802
      State College, Pennsylvania

      Affiliation: Pennsylvania State University
      Oversight: DARPA / ONR

      CMMC Assessment Contact

      ISSO: James Okafor, M.S.
      Research IT Manager & ISSO

      Export Control: Dr. Linda Szymanski, J.D., M.S.
      Export Control Officer / Research Security Coordinator
      Penn State Office of Research

      For CMMC RPO engagement or research security collaboration inquiries.

      Compliance Status (Live)

      SPRS Score (Actual): −47

      SPRS Score (Filed): 110 ⚠

      Active Findings: 8 (3 Critical, 3 High, 2 Medium)

      Remediation Phase: Phase 1 (Active)

      Next Milestone: SSP v1.0 Complete — Day 75

      C3PAO Target: Q1 2027