CMMC Compliance for the Assets You Cannot Replace.
You signed the Affirming Official statement. Your assessor flagged the shop floor. The PLCs cannot run an agent, the HMIs are on Windows XP, and GCC High is not an option. Access Gate proxies every CUI-touching asset on-premise, enforces MFA at the network boundary, and generates the AC, AU, IA, and SC evidence your C3PAO will ask for.
The Enduring Exception tells your assessor the PLC cannot do MFA. It does not tell them you have done anything about it. That is the gap Access Gate closes.
The Real Compliance Gap.
Most defense suppliers fail their pre-assessment in four specific places. Here is what each requires and how Access Gate addresses it.
AC: Access Control (22 controls)
Identity-based access to every CUI-touching asset. AC.L2-3.1.1 through 3.1.22. Access Gate enforces RBAC and MFA at a per-asset, per-protocol, per-session granularity. Vendor sessions are scoped, time-bound, and revocable.
AU: Audit and Accountability (9 controls)
Tamper-evident audit logs that survive a C3PAO review. AU.L2-3.3.1 through 3.3.9. Access Gate captures every session at the proxy with user, timestamp, asset, protocol, and full session replay. Hash-chained, FIPS-signed, 90-day retention default.
IA: Identification and Authentication (11 controls)
MFA enforced for every CUI-bearing system, including legacy assets that cannot run a client. IA.L2-3.5.3 specifically. Access Gate enforces MFA at the network boundary so the asset itself never needs to support it.
SC: System and Communications Protection (16 controls)
FIPS-validated TLS for every CUI flow. SC.L2-3.13.8 and SC.L2-3.13.11. Access Gate proxies every connection through FIPS 140-3 cipher suites without modifying production equipment.
Open-CMMC — On-Prem CUI Storage, Open-Sourced.
A hardened fork of filebrowser for on-premise CUI storage at CMMC Level 2 / NIST SP 800-171 Rev 2. FIPS-mode Go binary, OIDC + MFA, envelope encryption, tamper-evident audit. 72 of 110 controls covered directly.

CUI Enclaves On-Site
Isolated, encrypted zones around CUI servers and workstations. Segmented, access-controlled, fully logged. All on-premise.
Protect CUI Interactions On-Site
Control how CNC, PLC, and HMI access CUI. Network-level policies, no agents to install.
87 of 110 Controls Enforced
87 NIST 800-171 controls enforced at the network layer. Full Shared Responsibility Matrix available for your C3PAO.
From Flat Network To CUI Enclave.
One Appliance. Full CUI Protection.
CUI enclaves deployed in hours, not months. See how Elna Magnetics secured 100% of on-site CUI flows — no disruption, no GCC High, no agents.
Request a DemoOne Appliance. All On-Premise CUI Protected.
Connects to existing firewall or main network bus. Enforces NIST 800-171 across every CUI flow — file servers, workstations, and production equipment.
CUI Enclave Isolation
Enclaves around CUI servers, databases, and workstations. No Cloud Migration needed.
Zero-Trust Access to CUI
MFA-enforced access to every CUI resource. Users see only what they need — everything else is cloaked.
Covers IT & OT
Enforce policies across IT systems and production machine, legacy and new. No agents to install.
Continuous Control Evidence
87 of 110 NIST 800-171 controls enforced from the network layer. Assessment-ready evidence for your C3PAO, with a full Shared Responsibility Matrix for the remaining 23.
Full CUI Flow Visibility
See every device that touches CUI. Know who accessed what, when, from where.
Keep CUI Data on-site
On-premise CUI protection. No cloud migration. All data stays on-site, under your control.
How Elna Magnetics secured 100% of on-site CUI flows.
of on-site CUI flows secured and documented for CMMC Level 2. Deployed without downtime.
“CUI was flowing everywhere — engineering, shop floor, file servers — with no access control and no audit trail. The Access Gate gave us enclave isolation and full logging.”
Accelerate your CMMC journey
See how the Access Gate maps to NIST 800-171 controls and secures CUI on your floor.
Download the DoD Zero-Trust OT Alignment.
How the Trout Access Gate maps to the seven pillars of the DoD Zero Trust Reference Architecture for operational technology environments.
What's Inside
DTM 25-003 alignment, seven Zero Trust pillars mapped to Access Gate capabilities, OT-specific deployment guidance, and compliance evidence generation.
See It in Action
Request a live demo to see how the Access Gate deploys on your network without rewiring or downtime.
Common Questions About CMMC Compliance.
87 of 110 NIST 800-171 controls enforced at the network layer. The remaining 23 (physical security, personnel, endpoint DLP, vulnerability scanning) require customer-owned process controls. Full Shared Responsibility Matrix available.
For on-site CUI flows, the Access Gate covers the controls on-premise — no cloud migration needed. Whether GCC High is also required depends on your contract.
Network-level policies segment and control CUI access from CNC, PLC, and HMI — no agents on OT. Every access is logged.
An isolated network segment containing all CUI systems — file servers, databases, workstations, printers. Created via overlay networking with Zero Trust at every boundary.
Hours. Inline on your existing network — no re-cabling, no IP changes. Elna Magnetics went from unboxing to CMMC-ready in one afternoon.
TAG provides technical enforcement evidence for 87 of the 110 NIST 800-171 controls, with strongest coverage in AC (Access Control), AU (Audit), CM (Configuration Management), IA (Identification and Authentication), and SC (System and Communications Protection). For the 23 controls outside TAG's scope (physical security PE, personnel screening PS, endpoint/DLP MP, vulnerability scanning RA), TAG provides supporting documentation context but not technical enforcement. The full Shared Responsibility Matrix is downloadable and shows exactly which controls TAG enforces, which it supports, and which are customer-owned. Assessors can review access logs, policy configurations, segmentation baselines, and session recordings on demand.
Yes. Built-in bastion host with MFA, scoped to specific CUI resources, time-limited, fully recorded. No VPN tunnels.


Respect Your Elders.
Your legacy machines don't need replacing. Get free stickers for your shop floor and learn how Trout protects specialized assets for CMMC.
Go Deeper on CMMC.
Practical guides, control mappings, and audit-readiness playbooks for defense contractors and manufacturers preparing for C3PAO assessment.

