Research Reference Implementation — This project demonstrates technical control configuration for educational purposes. OpenSCAP scan results do not constitute CMMC certification or operational compliance. See limitations.
Helping Very Small Businesses meet FAR/DFARS cybersecurity requirements using cost-effective open-source tools
Technical configuration documented. Operational compliance requires expertise, policies, and third-party assessment.
The CyberHygiene Project is an academic research initiative exploring whether technical infrastructure for NIST 800-171 compliance can be built affordably using open-source tools. This website documents a reference implementation for educational purposes. It is not a product, service, or turnkey solution. Successful real-world compliance requires cybersecurity expertise, documented policies and procedures, operational security programs, and formal assessment by an authorized C3PAO. The author does not provide cybersecurity consulting services.
Configuration guides, policies, and documentation shared for educational purposes.
Provided "as-is" without warranty. Implementation requires cybersecurity expertise.
Very Small Businesses (VSBs) in the Defense Industrial Base face significant compliance cost barriers that can make government contracting impractical.
This research project explores whether the technical infrastructure for compliance can be built more affordably using open-source tools and commodity hardware.
Important: Demonstrating that technical controls can be configured is different from demonstrating that an organization is compliant. The latter requires operational maturity, documented policies, trained personnel, and third-party validation.
The project explores whether, through collaboration with qualified cybersecurity professionals and strategic partners, reference implementations like this could eventually evolve into more accessible compliance pathways—while maintaining the expertise requirements that genuine security demands.
This architecture demonstrates one approach to building infrastructure for handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Many valid alternative architectures exist.
Installation scripts to replicate this reference build are available on GitHub.
Important Context: The status indicators below reflect technical control configuration as validated by OpenSCAP automated scanning. They do not represent operational maturity, policy implementation, or third-party assessment results. Automated scans are a starting point, not a finish line.
Technical Controls Configured*
*OpenSCAP CUI profile scan passing as of January 2026. Validates technical configuration only.
Technical safeguarding controls configured; incident response procedures documented
Full compliance requires operational implementation and testing.
Technical controls deployed; no C3PAO assessment conducted
CMMC certification requires formal third-party assessment.
Technical configurations have been applied for each control family. Operational effectiveness varies and has not been independently validated.
Maintaining compliance requires continuous effort:
Note: Automated tools generate data. Without human analysis and response, they provide limited security value.
Custom dashboards and tracking systems developed for this reference implementation. These tools support compliance monitoring but do not replace the expertise needed to interpret and act on the information they present.
Centralized Compliance & Performance Monitoring
Requirements Traceability & Evidence Management
Prometheus and Node Exporter deployed across systems with TLS encryption
These dashboards were built to support this research project. They demonstrate that custom compliance tools can be developed without expensive commercial platforms. However:
January 2026: AI infrastructure added using Llama 3.3 70B Instruct on Mac Mini M4 Pro. The SysAdmin Agent Dashboard provides natural language system administration capabilities. Important: AI tools assist but do not replace cybersecurity expertise. See "AI Competency Paradox" in Risks.
SysAdmin Agent Dashboard - AI assistance for system administration tasks
AI tools can accelerate work for those who already understand what they're doing. For those who don't, AI can produce convincing-looking results that contain subtle errors or security gaps. AI assistance does not substitute for foundational cybersecurity knowledge. If you cannot evaluate whether an AI suggestion is correct, you should not implement it.
Running AI locally on the internal network provides:
Trade-offs: Local models may be less capable than cloud APIs; requires hardware investment; model updates require manual intervention.
All software components are enterprise-grade, open-source solutions with zero licensing costs. Automated installation scripts and AI-assisted administration tools are included to reduce implementation complexity, though some additional expertise through a managed service partner may be required for production deployments.
Can leverage existing hardware or inexpensive commercial systems
Enables AI-assisted administration features
Exact hardware and the complete Software Bill of Materials (SBOM) are available in the GitHub repository.
After several months of development (October 2025 - January 2026), we documented the following observations about building this reference implementation:
Note: Development environment with limited exposure. Production environments face different threat profiles.
This was not a quick or simple project.
Labor and expertise costs may exceed hardware savings for many organizations.
Important considerations for anyone exploring similar implementations
Investigating whether deployment complexity can be reduced through automation
Phase II explores whether scripted deployment can reduce the technical barrier while maintaining security.
Policy framework and documentation developed for this reference implementation
Example documentation created for research purposes. Actual compliance requires policies tailored to your organization and actually implemented in practice.
Note: Documentation templates are starting points. Effective policies must reflect your actual operations and be actively followed by personnel.
Questions about the CyberHygiene Project research, the Nexus 2026 presentation, or general inquiries about the approach documented here? Contact us using the form below.
Please note: The author does not provide cybersecurity consulting services. This is an academic research project shared for educational purposes.
The Contract Coach (Donald E. Shannon LLC) is a contract management and project management consulting firm specializing in federal government contracts.
Emerging small businesses seeking to acquire government contracts and develop compliant business systems.
Note: The Contract Coach does not provide cybersecurity consulting services. The CyberHygiene Project is an independent academic research initiative.
2021 NCMA Outstanding Fellow Award
CAGE Code: 5QHR9
DUNS: 832123793
The Contract Coach
Donald E. Shannon LLC
505.259.8485
The CyberHygiene Project has been presented to: