Q&A: CMMC Domain Architecture — Mapping AI Agents to All 14 Practice Domains #93
Unanswered
AGI-Corporation
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Overview
This Q&A maps the CMMC 2.0 framework's 14 practice domains to our AI agent architecture, clarifying how each compliance area is automated, monitored, and reported using the AGI-Corporation/CMMC agent stack.
Q1: How are the 14 CMMC domains organized across agent responsibilities?
A1: Each CMMC domain is handled by a specialized sub-agent that owns validation, evidence collection, and gap reporting for that domain:
AccessControlAgent— enforces least-privilege, monitors user/device authTrainingAgent— tracks completion, flags overdue certificationsAuditAgent— streams logs to tamper-evident store, generates reportsAssessmentAgent— runs periodic scoring against NIST SP 800-171ConfigAgent— diffs baseline configs, flags unauthorized changesIdentityAgent— validates MFA, PKI, and credential hygieneIRAgent— triggers playbooks on threat detectionMaintenanceAgent— schedules and audits system maintenance windowsMediaAgent— tracks removable media, enforces encryption policiesPhysicalAgent— interfaces with badge/sensor APIs (stub for on-prem)PersonnelAgent— monitors onboarding/offboarding, access revocationRiskAgent— runs continuous threat modeling, scores residual riskNetworkAgent— monitors traffic, enforces segmentation rulesIntegrityAgent— runs hash checks, AV sweeps, patch status monitoringQ2: How does the orchestrator coordinate all 14 domain agents in a single assessment run?
A2: The
CMMCOrchestratormaintains a shared state graph (similar to Route.X's dynamic world-state). On assessment trigger:compliance_state.jsonAssessmentAgentaggregates scores into a single SPRS (Supplier Performance Risk Score)AuditAgentseals the run into an immutable evidence packageQ3: What does the MCP integration look like for CMMC evidence collection?
A3: Each domain agent exposes its capabilities as an MCP tool via Route.X. This means:
Q4: How do we handle the gap between Level 1 (17 practices) and Level 2 (110 practices)?
A4: The framework uses a tiered activation model:
CMMC_LEVEL=1activates only the 17 foundational practices across AC, IA, MP, PE, SICMMC_LEVEL=2activates all 110 practices across all 14 domainsQ5: How does the CMMC stack integrate with the guardrails- framework?
A5: The
guardrails-repo provides a safety wrapper layer deployed as a sidecar to all CMMC agents. Any LLM-generated compliance recommendation passes through the guardrail engine before being written tocompliance_state.json. This prevents:See:
AGI-Corporation/guardrails-→ Governance and Threat Model wiki page for the full policy YAML definitions.Beta Was this translation helpful? Give feedback.
All reactions