CMMC Level 2 Certified.
Secure. Mission-Ready.

In today’s defense supply chain, cybersecurity is not optional — it is operational readiness. Great Lakes Industrial is certified under the Cybersecurity Maturity Model Certification (CMMC) Level 2 framework, validating our ability to protect Controlled Unclassified Information (CUI) across Department of Defense programs.

What Our CMMC Level 2 Certification Means for You

CMMC Level 2 aligns with the requirements of NIST SP 800-171 and requires implementation of 110 security controls across 14 cybersecurity domains. Our certification demonstrates that our systems, processes, and personnel meet federal requirements for safeguarding Controlled Unclassified Information.

Secure Handling of CUI

• Controlled access to sensitive program information
• Encryption of CUI in transit and at rest
• Multi-factor authentication across critical systems

Reduced Supply Chain Risk

• Independently validated cybersecurity controls
• Continuous monitoring and audit logging
• Formal incident response procedures

Program Eligibility Protection

• Compliance with DoD flow-down requirements
• Support for prime contractor cybersecurity obligations
• Documentation aligned with federal standards

Why It Matters to Prime Contractors

Prime contractors are accountable for the cybersecurity posture of their supply chain. Partnering with a CMMC Level 2 certified supplier reduces compliance risk, strengthens audit readiness, and helps protect eligibility for Department of Defense contracts.

Helps ensure continued eligibility for DoD programs requiring CMMC Level 2 certification.

Mitigates subcontractor cybersecurity risk within your extended supply chain.

Safeguards sensitive technical drawings, models, and program documentation.

Provides documented controls and independently assessed cybersecurity processes.

Maintain Contract Eligibility

Reduce Compliance Risk

Protect Technical Data

Strengthen Audit Readiness

Our Secure Operating Environment

Strict role-based access ensures that only authorized personnel can access sensitive program data and systems.

Controlled Unclassified Information (CUI) is protected using industry-approved encryption standards both in transit and at rest.

System logging, auditing, and monitoring are implemented to detect, document, and respond to potential security events.

Access Control

Data Protection

Continuous Monitoring

Documented incident response procedures align with federal reporting requirements and ensure rapid mitigation if required.

Formal system configuration management ensures traceability, integrity, and controlled system updates.

Secure file transfer protocols and restricted-access systems protect shared technical documentation.

Incident Response

Configuration & Change Management

Controlled Collaboration

Beyond Compliance: A Security-First Culture

Certification is not a checkbox for Great Lakes Industrial. It reflects our long-term commitment to protecting our customers, their programs, and the warfighter. Cybersecurity is embedded into our leadership oversight, operational systems, and day-to-day decision making.

• Executive-level cybersecurity oversight
• Ongoing employee cybersecurity training
• Documented System Security Plan (SSP)
• Continuous internal risk assessments
• Formal policy and procedure controls
• Continuous improvement of security controls

Secure Collaboration

We support secure collaboration with customers and understand the sensitivity of defense program data. When technical information must be exchanged, we use controlled processes designed to protect CUI.

  • Secure exchange of technical drawings and models
  • Controlled access portals (when required)
  • Secure email and encrypted file transfer
  • NDA-backed technical discussions

Compliance Summary

  • CMMC Level 2 Certified
  • NIST SP 800-171 Implemented
  • Secure CUI Environment
  • Formal Incident Response Plan
  • Multi-Factor Authentication Enforced
  • Encryption of CUI at Rest and in Transit
  • Documented Access Control Policies

***Additional documentation available upon requestunder NDA.

Contact our team to request additional compliance documentation under NDA.

Contact Us