The Blade Validate is an automated CMMC Level I and II assessment readiness application that creates a digital twin of company infrastructure to streamline the CMMC compliance process. Powered by KDM Analytics, Blade Validate interprets a wide variety of document and file types to auto generate comprehensive system diagrams, maps out data flows for Controlled Unclassified Information (FCI), and creates cybersecurity reports; providing the user with key insight into their CMMC assessment readiness, and the steps required to ensure compliance. As the first and only automated solution for CMMC assessment readiness, Blade Validate represents a cost-effective, repeatable, and power cyber solution that Department of Defense (DoD) contractors of all sizes can leverage to ensure that they pass their CMMC assessment the first time.

Who Can We Help

Current and future DoD contractors.

Organizations working with Controlled Unclassified Information (CUI).

Organizations working with Federal Contract Information (FCI).

A New Era In CMMC Assessments

The DoD has mandated that all defense contractors must be CMMC Certified Level I or II, depending on the nature of the work. Organizations who have undergone their CMMC assessment know firsthand the difficulty of the preparation process. It typically requires hiring an expensive consultant or assigning a team of cybersecurity experts to manually map out and evaluate the company architecture. Using Blade Validate, a single operator can condense the output into 2 hours, freeing up resources & allowing the user to focus on their core products & services.

Benefits

  • Cost Effective: Generates documentation at 2% the cost of a consultant, or 7% the cost of internal development.
  • Repeatable: Re-evaluate your architecture as modifications are made, ensuring constant compliance.
  • Efficient: Performs tasks that require a team of cybersecurity professionals to complete manually, freeing up resources.
  • Comprehensive: Provides a single platform that aligns with a variety of frameworks based on NIST Special Pubs and ISO Standards.

How it Works

Data Entry

Import existing Architecture Analysis Report (AAR) documents, or create a system model from scratch with Blade Validate’s streamlined table forms. (Blade Validate automatically enforces general guidelines & policies that apply to all tables including name conventions, headers & syntax, as well as specific table rules and interdependencies).

System Description

Once the user has reviewed and submitted the data, Blade Validate will auto generate a System Description table identifying all the internal nodes inside the boundary, as well as an external system description, which identifies all external nodes located outside the boundary.

The user can then specify what information types pertain to each node, and Blade Validate will generate a system diagram with a visual representation of the system’s operational model. The user can review and edit nodes and information types in the system diagram. 

AAR & POA&M Generation

Blade Validate will generate an Architecture Analysis Report (AAR) using the latest template, and an excel spreadsheet containing the 110 CMMC Level II controls (including the 17 Level I controls), which specifies the compliance status for each control and include a justification.

Blade Validate will then generate a Plan of Action & Milestones (POA&M) report which contains all non-compliant controls, a justification, and the necessary actions to ensure compliance.

Partner with Acquired Data Solutions