Skip to content

The Compliance Gap No One Talks About: Employees Who Can’t Explain Their Own Security Roles

Travis Sands
Travis Sands

You've invested in a top-tier sovereign cloud enclave. You've carefully mapped all 110 controls from NIST SP 800-171. Your System Security Plan (SSP) spans 200 pages of technical excellence, featuring network diagrams that would bring joy to any engineer's heart.

You're fully prepared for your CMMC assessment, right?

Not necessarily. A critical, often-overlooked gap exists in most compliance programs—one that has little to do with firewalls and everything to do with the people sitting at desks around you.

The gap: Your employees cannot clearly explain their security roles and responsibilities.

In the Defense Industrial Base (DIB), we pour so much energy into the "cyber" aspect that we sometimes neglect the "maturity" part. Maturity isn't a software toggle—it's a human characteristic.

The "Black Box" Delusion

Too many organizations treat security as a mysterious "black box" handled solely by an overworked IT team. The rest of the staff hears the usual instructions: "Use this tool, enable MFA, and avoid phishing links." But CMMC isn't purely a technical audit—it's a process audit. Assessors don't just inspect your screens; they interview your people. This is where the "documentation bottleneck" becomes a far more dangerous "human bottleneck."

Imagine an assessor asking your HR manager: "How do you handle offboarding a privileged user?" If the response is, "I'm not sure—I think IT takes care of it," you've hit a serious issue. Even if IT executes the process flawlessly, the lack of awareness and coordination from HR demonstrates that the process isn't truly institutionalized. To an assessor, if the person who initiates the action (HR) doesn't understand the full workflow, the control effectively doesn't exist in practice.

The Interview: The Often-Underestimated Pillar

CMMC assessments rely on three primary evidence-gathering methods, as defined in NIST SP 800-171A and adopted by the DoD: Examine (reviewing documentation), Test (verifying technical configurations), and Interview (discussing processes with personnel).

Most companies prepare rigorously for Examine ("Here's our policy!") and Test ("Check our settings!"), but they frequently neglect Interview.

Assessors seek more than a simple yes/no. They're evaluating what we call the PEA Answer Model:

  • P – Policy: Can the employee reference the governing rule, policy, or document?
  • E – Evidence: Can they produce the artifact (log entry, form, ticket) proving the action was performed recently?
  • A – Action: Can they walk through the actual, step-by-step workflow they follow in their daily work?

If your team falters on the "Action" component, the assessor cannot confirm consistent implementation. In their view, "I think we do that" equates to "We don't do that."

The Three Most Common—and Dangerous—Interview Gaps

From helping numerous small-to-mid-sized contractors, we've seen these recurring pitfalls:

  1. Configuration Management (CM) An assessor asks a developer: "Who authorizes changes to this system, and how do you confirm approval before deployment?" A shrug and "We discuss it in the morning stand-up" spells failure. The developer must reference the Configuration Control Board (CCB) process and produce the specific ticket or approval record.
  2. Media Protection (MP) An office manager is queried: "What's the exact process for sanitizing or destroying a thumb drive that stored CUI?" Responses like "We toss them in a drawer" or "Throw them away" are non-starters. They need to know the location of the approved "burn bag," degausser, or certified shredding service that meets NIST standards.
  3. Incident Response (IR) An administrative assistant is asked: "What counts as a security incident, and who's your first point of contact?" "IT" is a start, but insufficient. Can they distinguish a routine tech issue (e.g., broken mouse) from a genuine incident (e.g., suspicious file or unauthorized access)? Do they know the escalation path if IT is unreachable?

Bridging the Gap: From Tools to Talk

To close these gaps before the assessor arrives, adopt a governance-first mindset paired with rigorous evidence discipline.

  • Move beyond annual training — Slide decks once a year don't build muscle memory. Instead, conduct monthly "Flash Interviews": Randomly select a staff member and ask one security-related question tied to their role. If they struggle, turn it into immediate coaching.
  • Explicitly document ownership in the SSP — Don't just describe what happens; clearly assign the responsible role (and name the individual where appropriate). Ensure that person recognizes themselves as the owner of the associated evidence.
  • Empower with technology, but anchor in process — Encrypted enclaves and secure tools are essential, but they're only effective when wrapped in well-understood human workflows.

The Bottom Line

Software can encrypt your data, but it can't speak for you in an interview. Your employees form the front line—not only against cyber threats, but also in proving compliance to an assessor.

A flawless technical stack won't compensate if your team can't articulate their part in the mission. True success is forged in the months of consistent practice before the auditor steps through the door.

Is your team truly ready for the assessor interview?

If the "human bottleneck" sounds familiar, don't wait for the audit notification. Start bridging the divide between your technical controls and everyday workflows today.

Our CMMC Evidence Starter Kit provides targeted interview prep models, role-specific question banks, and 12-point checklists to align your people, processes, and evidence—ensuring your compliance stands up under scrutiny.

 👉 Download the Evidence Starter Kit by clicking the image below and Start Your Readiness Check Today

Untitled design (4)

 

Share this post