The Problem:
Regulatory Convergence Without Architectural Alignment CNC-based shops serving commercial nuclear and government defense sectors encounter converging regulations when naval nuclear propulsion is involved. Contracts often warn that part failure could cause catastrophic nuclear events, yet most insurance policies include a “Nuclear Exclusion Clause” that excludes the coverage in the event the failure in performance results in a nuclear incident. And yet, as much as Quality Assurance and Control are uncompromisable, the Government also makes cybersecurity compliance pillar non-negotiable (CMMC AB).
CMMC Level 2 mandates the 97 security requirements in NIST SP 800-171 Revision 3 (May 2024), or the prior Revision 2’s 110 controls. The 97 security requirements, down from the prior revision’s 110, are more detailed, and even though they are fewer in number, the compliance burden is not lighter by any assessment. These are enforced by DFARS 252.204-7012, requiring CUI safeguarding, 72-hour cyber incident reporting, and damage assessment support.
Shops supporting naval nuclear programs must protect NNPI, with stringent controls. While most NNPI is classified under NISPOM requiring clearance, Unclassified NNPI (U-NNPI) is handled as CUI with NOFORN marking and access limited to authorized U.S. citizens. Defense articles involve ITAR-controlled technical data under 22 CFR Parts 120–130, restricting foreign-person access and digital transmission.
Audits reveal procedural overlaps, but the core issue is architectural misalignment: shops are optimized for precision and traceability, not cyber threat containment or unclassified data control.
These firms also operate under ASME NQA-1, 10 CFR 50 Appendix B, and client specifications like General Dynamics-Electric Boat Spec 2678. NQA-1 and Appendix B require rigorous documentation, procurement, and corrective actions but do not mandate network segmentation, MFA, encryption, or monitoring. Audits reveal procedural overlaps, but the core issue is architectural misalignment: shops are optimized for precision and traceability, not cyber threat containment or unclassified data control.
Root Causes:
Structural Friction in CNC Environments Architectural Legacy Most small shops use flat networks linking CAD/CAM, ERP, accounting, shop-floor terminals, vendors, and portals. CUI, U-NNPI, and ITAR data coexist without segmentation, preventing NIST SP 800-171 boundary protection. Legacy paper documentation required by contracts for years also falls under CMMC controls if it contains CUI, U-NNPI, NOFORN, or LEVEL 1 data. Physical document archiving, storage, protection, and control are prescribed in both NQA-1 and CMMC, presenting ownership, access, logging, and other challenges. SCQIM offers partial perspective on convergence issues. CNC machines run outdated, unsupported operating systems. They cannot encrypt or decrypt data, support MFA, connect to networks without latency issues, or run endpoint detection agents. OSHA safety rules require open floor positioning for plain view, conflicting with need-to-know access.
A viable solution could be a replacement of the legacy equipment with new, more advanced machines capable of accommodating at least some of the CMMC controls. And yet, replacement solely to meet the compliance requirements is practically never economically possible. Companies have spent years acquiring and managing the cost of tooling arsenal that is practically always useless outside of the specific machine’s ecosystem. Replacing equipment is also connected with construction costs to prepare the foundation. Connecting utilities and meeting local fire, electric, and other requirements add cost and could also take substantial time. It was also reported by CNC operators that adopting new equipment presents a learning curve and critically increases the possibility of making an error. So, replacement may not only be commercially impracticable, but it can also affect the very rationale of meeting the critical quality objectives.
Removable Media Practices USB transfer of G-code remains common. When derived from ITAR or DFARS/NIST-protected technical data, G-code is CUI. Controlling USB transfers challenges compliance: NIST 800-171 restricts uncontrolled removable media, NNPI demands dissemination controls, and ITAR prohibits unauthorized export. An unlogged USB transfer risks exposure across all domains.
Governance Fragmentation Quality and cybersecurity functions operate independently. IT is outsourced to external providers. Small shops cannot justify a full-time compliance IT specialist, nor easily fill part-time. Nuclear compliance maturity alone does not necessarily, if at all, translate into cybersecurity maturity. Despite a healthy overlap in function, quality management is less receptive to adopting the cybersecurity compliance model. It requires accepting ownership of a program that, in most instances, carries liability outside the primary area of QA/QC personnel’s subject-matter expertise.
Rather than treating cybersecurity as a parallel compliance system, SCQIM aligns architectural segmentation with quality assurance discipline.
Following the Segmented Cyber-Quality Integration Model (SCQIM) SCQIM merges QA methodologies with cybersecurity best practices, drawing on Lean Six Sigma for process segmentation, continuous improvement, and waste reduction. It incorporates NIST SP 800-171 and ISO/IEC 27001. The model segments systems into manageable units meeting both quality and cybersecurity standards. Rather than treating cybersecurity as a parallel compliance system, SCQIM aligns architectural segmentation with quality assurance discipline. It leverages the overlaps in compliance and evidence gathering. Both compliance environments require technical, operational, and managerial engagement in implementation and maintenance so while different in application they are very similar in implementation and auditing process.
SCQIM delivers structured, measurable, auditable compliance through three pillars: controlled information enclave architecture; governance integration within NQA-1 controls, policies, and procedures; and phased technical and procedural implementation.
Controlled Information Enclave Architecture Enclaves are segmented environments isolating and protecting controlled data for CUI, NNPI, or ITAR, with access control, encryption, and NIST 800-171 alignment. Components include isolation, network segmentation, Zero Trust, and FEDRAMP-moderate (or higher) readiness. Benefits: reduced scope, enhanced security, lower cost, and pre-configured solutions.
Defining the Controlled Information Boundary Scoping maps CUI, U-NNPI, or ITAR data flows. NIST SP 800-171 limits scope to handling systems, containing them in the enclave. This avoids over-scoping, maintains production efficiency, and controls compliance costs.
Network Segmentation Implement via dedicated VLAN, firewall rules, restricted ingress/egress, and VPN with FEDRAMP MFA. This meets NIST boundary protection, blocks unauthorized ITAR access, and limits NNPI dissemination.
Identity, Role, and Citizenship Environment Require individual accounts, enforce MFA, restrict foreign-person access for ITAR, and retain/review logs. This addresses NIST Access Control, ITAR restrictions, and NAVSEA U-NNPI expectations. AC family aligns most readily.
Controlled Media Gateway A hardened workstation encrypts removable media, scans for malware, logs transfers, and grants role-based access. This balances operational needs with compliance, supporting NQA-1 and CMMC flexibility.
Governance Integration Within NQA-1 Systems Corrective Action Alignment Use NQA-1 corrective action programs for CMMC noncompliance, cyber incidents, POA&M items, and deviations. This leverages double-checking culture, simplifies tracking, and boosts accountability via external audits.
Internal Audit Expansion Expand NQA-1 audits by certified lead auditors to cover CMMC evidence: access testing, logs, incident response, training, and tabletop exercises. Integrate into quality cycles.
Document Control Integration Place System Security Plans, ITAR technology control plans, and NNPI procedures under NQA-1/Appendix B document control. Existing personnel handle evidence gathering.
Training and LMS Utilization Incorporate cybersecurity into NQA-1 annual curriculum using micro-training via Learning Management Systems for short, agile sessions adapting to threats.
Incremental Implementation Within SCQIM
Phase 1 Governance Consolidation: Assign compliance lead; map-controlled data flows; identify foreign-person risks.
Phase 2 Enclave Deployment: Implement segmentation; deploy MFA; configure logging.
Phase 3 Media and Export Safeguards: Establish transfer controls; update ITAR documentation; formalize NNPI procedures.
Phase 4 Documentation and Evidence: Develop System Security Plan and SOPs; align POA&M and incident response with corrective actions; maintain configuration baselines.
Phase 5 Internal Validation: Conduct mock CMMC assessment; perform export control review; audit NNPI access logs.
Technical Suitability in CNC-Based Operations SCQIM avoids CNC replacement, full cloud migration, or enterprise overhauls. It isolates risk via segmentation while preserving production continuity. Costs use targeted upgrades, managed services, and integrated governance.
Integration Across Defense and Nuclear Supply Chains SCQIM applies to naval propulsion suppliers, aerospace machining, export-controlled fabrication, and nuclear-grade manufacturers. It harmonizes cybersecurity, export control, and nuclear quality without duplicate systems.
Measured Compliance Maturity Effective adherence shows in:
- Defined enclave;
- Enforced MFA;
- No shared accounts;
- Logged/encrypted media transfers;
- Integrated audits;
- Documented ITAR/NNPI controls.
Manufacturers should assess architecture against enclave principles and integrate controls into NQA-1 systems. This reduces exposure and bolsters supply chain participation.
Conclusion:
Structured Adherence Enables Sustainable Compliance Small CNC DIB shops intersect CMMC, U-NNPI, ITAR, and nuclear mandates. Documentation alone is insufficient; SCQIM links segmentation to quality governance for sustainable compliance without production disruption. Controlled data supports defense and nuclear safety. Protection demands structured segmentation, governance, staged implementation, and documentation across technical, operational, and managerial domains. Manufacturers should assess architecture against enclave principles and integrate controls into NQA-1 systems. This reduces exposure and bolsters supply chain participation.
Acknowledgements:
Acknowledgments The author acknowledges the assistance of Grok AI (developed by xAI) in editing the original manuscript to reduce the word count from approximately 2,620 to the target of 1,600 words and to improve clarity and readability. All technical details, regulatory citations, SCQIM methodology, arguments, and conclusions have been fully preserved. The author has reviewed and approved every change and takes complete responsibility for the final content. ![]()
Greg Isaak Voykhanksy, J.D., Ph.D.
References
Defense Federal Acquisition Regulation Supplement. (2019). DFARS 252.204-7012: Safeguarding covered defense information and cyber incident reporting.
General Dynamics, Electric Boat. (2024), Quality Control Requirements for Procured Material, EB Specification 2678, Revision Q. April 29, 2024.
National Institute of Standards and Technology. (2020). NIST Special Publication 800-171 Rev. 2.
U.S. Nuclear Regulatory Commission. (2022). 10 CFR 50 Appendix B.
American Society of Mechanical Engineers. (2019). ASME NQA-1.
U.S. Department of State. (2023). International Traffic in Arms Regulations (22 CFR Parts 120–130).
Department of Defense. (2020). Cybersecurity Maturity Model Certification model overview.
Leave a Comment