Everything you need to know about catching compliance issues in PRs, not production. 20 frameworks. 5,825 controls. SOC 2, HIPAA, PCI-DSS, NIST, CMMC, FedRAMP, and more.
Why catching issues in PRs beats finding them in production
Shift-left compliance means catching compliance issues early in the development lifecycle - at the PR (Pull Request) stage - rather than after code is deployed to production.
Traditional compliance tools (like Drata and Vanta) scan your production environment and find issues after deployment. By then, you've already:
The fundamental difference is when we catch issues:
| Aspect | Infraproof (Shift-Left) | Drata/Vanta (Runtime) |
|---|---|---|
| When issues found | In PR, before merge | After deployment |
| Production exposure | Zero - blocked before deploy | Hours to days of exposure |
| Evidence format | Code (machine-verifiable) | Screenshots, API snapshots |
| Integration point | CI/CD pipeline | Cloud provider APIs |
Use both for defense in depth: Infraproof catches issues before production. Runtime scanners verify current state. Together, they provide complete coverage.
Compliance as Code treats compliance requirements like software - defined in code, version-controlled, and automatically enforced.
Instead of spreadsheets tracking who completed what checkbox, your compliance posture is:
20 compliance frameworks with 5,825 controls
Infraproof supports 20 compliance frameworks with 5,825 total controls:
| Framework | Controls | Use Case |
|---|---|---|
| SOC 2 | 61 | SaaS companies, startups |
| HIPAA | 46 | Healthcare, health tech |
| PCI-DSS 4.0 | 280 | Payment processing, retail |
| NIST 800-53 | 1,007 | Federal systems, FedRAMP |
| NIST 800-171 | 110 | CUI handling, CMMC |
| CMMC 2.0 | 109 | Defense contractors |
| FedRAMP | 421 | Government cloud |
| ISO 27001 | 114 | International, enterprise |
| CIS 8.0 | 153 | Security benchmarks |
| AWS WAF | 334 | AWS best practices |
Yes. Many controls overlap across frameworks. For example, encryption at rest (SC-28 in NIST) maps to similar requirements in SOC 2, HIPAA, and PCI-DSS.
Infraproof identifies these overlaps so a single Terraform configuration can satisfy multiple frameworks simultaneously. This reduces compliance burden while maintaining coverage.
Understanding the Cybersecurity Maturity Model Certification
CMMC (Cybersecurity Maturity Model Certification) is the Department of Defense's cybersecurity compliance framework. It requires defense contractors to prove they meet specific security standards before winning or keeping DoD contracts.
Think of it as a security certification for doing business with the military. Just like you need a driver's license to drive, you need CMMC certification to handle DoD data.
CMMC 2.0 has three levels, each with increasing security requirements:
| Level | Controls | Assessment | Who Needs It |
|---|---|---|---|
| Level 1 | 17 practices | Self-assessment | Contractors handling FCI (Federal Contract Information) only |
| Level 2 | 110 controls (NIST 800-171) | Third-party (C3PAO) | Contractors handling CUI (Controlled Unclassified Information) |
| Level 3 | 110+ controls | Government-led | Critical programs, highest sensitivity data |
Most contractors need Level 2, which requires passing a third-party assessment against all 110 NIST 800-171 controls.
You need CMMC certification if you:
This includes approximately 80,000+ companies ranging from small machine shops to major aerospace manufacturers.
CUI is sensitive information that requires protection but isn't classified. Examples include:
If your DoD contract includes a DFARS 252.204-7012 clause, you're handling CUI and need CMMC Level 2.
CMMC is being phased in from 2025 through 2028:
However, don't wait. Assessment backlogs are already forming, and getting certified takes 6-12 months from start to finish. Companies starting now will have a competitive advantage.
What to expect when getting CMMC certified
C3PAO stands for CMMC Third Party Assessment Organization. These are companies authorized by the Cyber AB (the CMMC accreditation body) to conduct official CMMC assessments.
Think of C3PAOs like certified auditors. You can't self-certify for Level 2; you must hire an authorized C3PAO to assess your security controls and issue your certification.
As of late 2024, there are approximately 50+ authorized C3PAOs, with more being certified.
CMMC Level 2 assessment costs typically range from $30,000 to $100,000+ depending on:
A typical CMMC Level 2 assessment follows this process:
The entire process from scheduling to certification typically takes 2-4 months.
The System Security Plan (SSP) is the master document describing how your organization implements each NIST 800-171 control. It's the primary evidence package assessors review.
A typical SSP includes:
SSPs are typically 100-300+ pages and take months to create properly.
POA&M (Plan of Action and Milestones) documents known security gaps and your plan to fix them.
If you have minor deficiencies during assessment, you may receive a Conditional Certification with a POA&M listing what must be fixed within a specified timeframe (typically 180 days).
However, you cannot POA&M your way to certification. Critical controls must be fully implemented before assessment.
CMMC certification is valid for 3 years.
During this period, you must:
At the end of 3 years, you must undergo a full reassessment to maintain certification.
Understanding the 110 security controls
NIST SP 800-171 is a publication from the National Institute of Standards and Technology that specifies security requirements for protecting CUI in non-federal systems.
CMMC Level 2 is essentially NIST 800-171 with mandatory third-party verification. The 110 controls in CMMC Level 2 come directly from NIST 800-171.
If you've been complying with DFARS 7012 requirements, you've already been working toward NIST 800-171. CMMC just adds the verification requirement.
NIST 800-171 organizes its 110 controls into 14 families:
| Family | ID | Controls | Focus Area |
|---|---|---|---|
| Access Control | AC | 22 | Who can access what |
| Awareness & Training | AT | 3 | Security training |
| Audit & Accountability | AU | 9 | Logging & monitoring |
| Configuration Management | CM | 9 | System hardening |
| Identification & Authentication | IA | 11 | User verification |
| Incident Response | IR | 3 | Breach handling |
| Maintenance | MA | 6 | System upkeep |
| Media Protection | MP | 9 | Data storage |
| Personnel Security | PS | 2 | Employee screening |
| Physical Protection | PE | 6 | Facility security |
| Risk Assessment | RA | 3 | Threat analysis |
| Security Assessment | CA | 4 | Testing controls |
| System & Communications | SC | 16 | Network security |
| System & Information Integrity | SI | 7 | Malware & patching |
Approximately 40-50% of NIST 800-171 controls can be directly evidenced through infrastructure-as-code configurations. Key examples:
The remaining controls require policies, procedures, or manual evidence (training records, physical security, personnel screening).
Common pitfalls and how to avoid them
Based on NIST 800-171 self-assessments (the predecessor to CMMC), only 10-15% of companies that believed they were compliant actually passed rigorous review.
The most common reasons for this gap:
The most common CMMC assessment failures:
If you fail a CMMC assessment:
This is why pre-assessment verification is critical. Finding gaps before the official assessment saves significant time and money.
Why IaC is the strongest form of compliance evidence
Not all evidence is equal. Assessors weight evidence by verifiability:
| Evidence Type | Weight | Why |
|---|---|---|
| IaC Configurations | Highest | Machine-readable, version-controlled, auditable |
| Cloud API State | High | Reflects current reality |
| Automated Test Results | High | Repeatable verification |
| Exported Logs | Medium | Point-in-time, can be selective |
| Screenshots | Low | Easily fabricated, no context |
| Self-Attestation | Lowest | Unverified claim |
IaC configurations are the gold standard because they're machine-verifiable, version-controlled, and represent your actual implementation.
Infraproof parses all major infrastructure-as-code formats:
We extract security-relevant configurations from each resource and map them to specific NIST 800-171 controls.
Here's an example of how Terraform configuration maps to NIST controls:
Your Terraform:
resource "aws_s3_bucket_server_side_encryption_configuration" "example" {
bucket = aws_s3_bucket.example.id
rule {
apply_server_side_encryption_by_default {
sse_algorithm = "aws:kms"
kms_master_key_id = aws_kms_key.example.arn
}
}
}
Mapped to Controls:
The evidence report includes the exact configuration, resource ARN, and encryption algorithm used.
What we do and how it helps you pass
Infraproof is a shift-left compliance platform that catches issues in PRs, not production:
The result: Zero production exposure. Every commit is compliant.
No. Infraproof is a pre-assessment tool, not a certification body.
You still need an authorized C3PAO to conduct your official CMMC assessment and issue certification. Infraproof helps you:
Think of us as your pre-flight checklist before the FAA inspector arrives.
Traditional GRC (Governance, Risk, Compliance) platforms focus on documentation management. They help you organize policies, track tasks, and store evidence.
Infraproof focuses on evidence verification:
| GRC Platforms | Infraproof |
|---|---|
| Store your claims about compliance | Verify your infrastructure actually implements claims |
| Manual evidence upload | Automatic evidence extraction from IaC |
| Trust documentation | Trust code (machine-verifiable) |
| Point-in-time snapshots | Version-controlled, auditable history |
We complement GRC platforms by providing higher-quality evidence that matches your actual infrastructure.
How to begin your CMMC journey with Infraproof
Request a free evidence report to see how it works with your actual infrastructure.
Yes. We handle CUI-adjacent data and take security seriously:
We're also pursuing our own CMMC certification because we believe in eating our own cooking.
Infraproof pricing is designed to be a fraction of assessment costs:
Compare this to $30-100K for an assessment and $60-200K for a failed assessment + remediation + reassessment.
Yes. Request a free evidence report and we'll analyze a sample of your IaC.
You'll see:
No credit card required. No commitment.
Upload a sample Terraform file and get a real evidence report showing which NIST controls you satisfy.
Get Free Evidence Report View Pricing