🧭 Section 19: CUI/FCI Data Flow & Trust Boundary Mapping¶
🎯 Objective¶
This section defines how Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) traverse the OpenCMMC Stack, and how trust boundaries are enforced to protect sensitive data in transit, at rest, and in use. This supports scoping and documentation for CMMC Level 2 assessment readiness.
🧊 Trust Zones Overview¶
Zone | Description | Examples |
---|---|---|
Trusted User Devices | Authenticated devices with endpoint controls | Company laptops, mobile devices |
Trusted Infrastructure | Hardened, monitored servers with audit and backup | Ubuntu LTS, Podman-hosted services |
DMZ/Public Access | Services exposed via reverse proxy with access control | NGINX Proxy Manager |
Identity & Access Control | SSO, MFA, and user provisioning services | Keycloak, Tailscale |
Monitoring & Forensics | Central log and response tools | Wazuh, Auditd, Restic |
🔁 Data Flow Examples¶
CUI File Upload via Nextcloud¶
- Authenticated user connects via Tailscale
- Keycloak enforces MFA and SAML SSO
- User uploads CUI file into Nextcloud AIO
- File is stored encrypted-at-rest on host volume
- Access is controlled via group-based permissions
- Audit events logged to Wazuh
Secure Email Transmission (Mailcow)¶
- Authenticated user logs into Mailcow webmail or IMAP
- Outbound message is TLS-encrypted and DKIM-signed
- Headers identify sender, recipient, and sensitivity
- Delivery logs and access logs stored centrally
🧱 Boundary Controls¶
Control Type | Enforcement Mechanism |
---|---|
Network Trust | Tailscale identity-based tunnels |
Identity Assurance | Keycloak + MFA |
Access Policy | RBAC via Keycloak + App config |
Audit Logging | Auditd, Wazuh, Journalctl |
Configuration Drift | Ansible enforcement and scans |
🖼️ Architecture Diagram¶
This diagram visualizes how Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) flow securely through trust zones in the OpenCMMC Stack. Each containerized service is scoped, monitored, and hardened to enforce CMMC Level 2 compliance.
📜 CMMC Practices Addressed¶
Practice | Description |
---|---|
CA.2.157 | Define and enforce system boundaries |
SC.1.175 | Protect CUI in transit |
SC.2.178 | Limit information flow |
AC.2.006 | Control system access to CUI |
AU.2.042 | Record and review user actions |
✅ Next Step¶
With trust boundaries defined, Section 20 will summarize performance, scaling, and cost estimation for different org sizes.