Company Profile
Organization Summary
Name: Stratum Defense Systems Inc.
Industry: Defense Industrial Base (DIB) Manufacturer
Headquarters: San Diego, CA
Primary Data Center: Phoenix, AZ
Total Employees: 54 FTE
Operational Focus: Precision manufacturing for aerospace and defense contracts. The organization manages Controlled Unclassified Information (CUI) requiring NIST 800-171 / CMMC compliance.
Site Locations & Connectivity
- Phoenix, AZ: Main Data Center & Manufacturing. Hub for VPNs.
- San Diego, CA: Corporate HQ. Connected via Site-to-Site VPN.
- Seattle, WA: Engineering & Mfg. Connected via Site-to-Site VPN.
- Norfolk, VA: Engineering & Mfg. Connected via Site-to-Site VPN.
- AWS (us-west-2): Cloud extension connected via VPN to Phoenix.
Network Architecture
Hub & Spoke Topology Visualization
San Diego HQ
AT&T Fiber (500/500)
IPsec VPN
Phoenix (DC)
Cox Business (1G/1G)
HUB
AWS Cloud
us-west-2
VPN (No DX)
Seattle
Lumen Fiber (500/500)
IPsec VPN
Norfolk
Verizon Fios (300/300)
IPsec VPN
All Site-to-Site tunnels use AES-256 encryption, IKEv2.
VLAN Segmentation
Phoenix Data Center (10.50.x.x)
| ID | Name | Subnet |
|---|---|---|
| 10 | Server Infra | 10.50.10.0/24 |
| 20 | Engineering | 10.50.20.0/23 |
| 30 | Admin/Office | 10.50.30.0/23 |
| 40 | Mfg/Shop | 10.50.40.0/24 |
| 50 | Guest | 10.50.50.0/24 |
| 60 | IT Mgmt | 10.50.60.0/24 |
| 99 | Net Mgmt | 10.50.99.0/28 |
Branch Offices
| Site | VLAN Function | Subnet Range |
|---|---|---|
| San Diego | Server (110) | 10.51.10.0/26 |
| San Diego | Guest (150) | 10.51.50.0/25 |
| Seattle | Engineering (220) | 10.52.20.0/25 |
| Seattle | Mfg/Shop (240) | 10.52.40.0/24 |
| Norfolk | Engineering (320) | 10.53.20.0/25 |
| Norfolk | Mfg/Shop (340) | 10.53.40.0/24 |
Infrastructure & Cloud
Phoenix Physical Hardware
Rack Configuration (Key Assets)
| Device | Role | Specs/Notes |
|---|---|---|
| Fortinet FortiGate 600E | Firewall | HA Pair planned (Currently Single?) |
| Cisco Catalyst 9300 | Core Switches | Redundant pair |
| Dell PowerEdge R750 (x6) | ESXi Hosts | Running VMware vSphere |
| Dell EMC Unity 480 | SAN Storage | Primary Storage Array |
AWS Cloud Environment
Configuration Note
VPC ID: vpc-0a1b2c3d4e5f6g7h8 | CIDR: 10.100.0.0/16 | Region: us-west-2
EC2 Instances
- Web Tier (Public): EC2-WEB01, EC2-WEB02 (AL2, t3.large)
- App Tier (Private): EC2-APP01 thru 04 (Win2019, m5.xlarge)
- Database (Private): RDS-PROD01 (PostgreSQL 14.7, Multi-AZ)
- Mgmt: EC2-BASTION01 (10.100.99.10)
S3 Storage Buckets
| Bucket Name | Encryption | Logging |
|---|---|---|
| stratum-cui-documents | SSE-S3 | Disabled |
| stratum-engineering-archives | SSE-S3 | Enabled |
| stratum-backups | SSE-S3 | Enabled |
| stratum-application-logs | SSE-S3 | Disabled |
Security Controls
Firewall Logic (FortiGate 600E)
Inbound Rules
- Allow VPN (UDP 500, 4500)
- Allow HTTPS (443) to DMZ Web (10.50.10.50)
*Issue: Server decommissioned, rule remains. - Implicit Deny All other traffic.
*No explicit deny logged for RDP.
Outbound Rules
- Allow Server/Admin VLAN -> Internet (HTTPS)
- Allow Engineering -> Internet (HTTP, HTTPS, FTP)
- Allow Guest -> Internet Only
- Deny Guest -> Internal VLANs
Wireless & Remote Access
Wireless Networks
| SSID | Auth | Risk |
|---|---|---|
| Stratum-Corporate | 802.1X (RADIUS) | Low |
| Stratum-Manufacturing | WPA2-PSK | Medium (PSK) |
| Stratum-Guest | WPA2-PSK | Medium (Shared PWD) |
VPN (Fortinet SSL)
- Capacity: 100 Users (Avg 45-60 active)
- Auth: AD + Duo MFA (63% Adoption)
- Configuration: Split Tunnel Enabled
- Critical 17% of users lack MFA (Legacy exemptions)
- Critical Split tunnel allows local LAN access on remote clients
Controlled Unclassified Information (CUI)
Data Flow Analysis
The following flows describe how CUI moves through the environment. Students should map these to CMMC controls.
1. Engineering CUI Flow
CAD Workstation (V20)
➔
PLM01 Server
➔
SQL01 DB
➔
AWS S3 (Cloud)
Also flows from File Share (FILE01) ➔ Veeam Backup ➔ Tape Library (On-site).
2. Contract CUI Flow
Admin PC (V30)
➔
SharePoint (FILE02)
➔
SharePoint Online (M365)
Risk: CUI transmitted to SharePoint Online without encryption verification.
Identified Protection Gaps
- ❌ No DLP solution to prevent exfiltration.
- ❌ USB ports are open on workstations with CUI access.
- ❌ Email attachment scanning does not look for CUI markers.
- ❌ Local storage of CUI on workstation drives found (Policy Violation).
Manufacturing Operations
Legacy Equipment Warning
Shop floor contains isolated but vulnerable equipment.
Equipment Inventory (Phoenix)
- CNC-HAAS (12 units): 10.50.40.101-112
- CNC-MAZAK (8 units): 10.50.40.121-128
- CMM-HEXAGON (3 units): 10.50.40.141-143
- Industrial Printers (9 units): 10.50.40.151-159
Operational Risks
- OS EOL CNC machines running Windows 7.
- Remote Access Vendors use TeamViewer (Always-on).
- Auth Default passwords on machine controllers.
- AV No antivirus on manufacturing equipment.
- Segregation No segmentation between individual machines.
Employee Directory
Staff List (54 FTE)
| Name | Title | Department | Location |
|---|---|---|---|
| Robert Sterling | Chief Executive Officer (CEO) | Executive | San Diego |
| Marcus Thorne | Chief Operating Officer (COO) | Executive | San Diego |
| Sarah Jenkins | Chief Financial Officer (CFO) | Executive | San Diego |
| David Chen | Chief Info Security Officer (CISO) | Executive | Phoenix |
| James Wilson | IT Manager | IT & Security | Phoenix |
| Emily Rodriguez | Network Engineer | IT & Security | Phoenix |
| Michael Chang | Systems Administrator | IT & Security | Phoenix |
| Lisa Kumar | Systems Administrator | IT & Security | San Diego |
| Alex Foster | Security Analyst | IT & Security | Phoenix |
| Dr. Alan Grant | Chief Engineer | Engineering | Norfolk |
| Rebecca Moore | Sr. Mechanical Engineer | Engineering | Seattle |
| Kevin O'Connor | Mechanical Engineer | Engineering | Seattle |
| Diana Prince | Mechanical Engineer | Engineering | Norfolk |
| Bruce Miller | Mechanical Engineer | Engineering | Phoenix |
| Gregory Hines | Mechanical Engineer | Engineering | Seattle |
| Brian Hughes | Electrical Engineer | Engineering | Norfolk |
| Jessica Wu | Electrical Engineer | Engineering | Phoenix |
| Samuel Jackson | CAD Designer | Engineering | Seattle |
| Patricia Lewis | CAD Designer | Engineering | Norfolk |
| Amanda Wallace | QA Manager | Quality Assurance | Phoenix |
| Jennifer Walters | Compliance Officer | Quality Assurance | San Diego |
| Peter Parks | Quality Inspector | Quality Assurance | Phoenix |
| Steven Rogers | Quality Inspector | Quality Assurance | Seattle |
| Natalie Roman | Quality Inspector | Quality Assurance | Norfolk |
| Clinton Barnes | Quality Inspector | Quality Assurance | Phoenix |
| Mary Watson | HR Director | Human Resources | San Diego |
| Piper Potts | HR Generalist | Human Resources | Phoenix |
| Harold Hogan | Office Manager | Administration | San Diego |
| Edward Leeds | Accountant | Finance | San Diego |
| Frank Castiglione | Plant Manager | Operations | Phoenix |
| Logan Hewitt | Shop Foreman | Operations | Phoenix |
| John Smith | CNC Machinist III | Operations | Phoenix |
| Robert Johnson | CNC Machinist III | Operations | Phoenix |
| Michael Williams | CNC Machinist II | Operations | Phoenix |
| David Brown | CNC Machinist II | Operations | Phoenix |
| James Jones | CNC Machinist I | Operations | Phoenix |
| Arthur Curry | Shop Foreman | Operations | Seattle |
| Thomas Miller | CNC Machinist II | Operations | Seattle |
| Richard Davis | CNC Machinist I | Operations | Seattle |
| Charles Garcia | CNC Machinist I | Operations | Seattle |
| Joseph Rodriguez | Assembly Tech | Operations | Seattle |
| Christopher Wilson | Assembly Tech | Operations | Seattle |
| Barry Allen | Shop Foreman | Operations | Norfolk |
| Daniel Martinez | CNC Machinist II | Operations | Norfolk |
| Paul Anderson | CNC Machinist I | Operations | Norfolk |
| Mark Taylor | CNC Machinist I | Operations | Norfolk |
| Donald Thomas | Assembly Tech | Operations | Norfolk |
| George Hernandez | Assembly Tech | Operations | Norfolk |
| Kenneth White | Maintenance Tech | Facilities | Phoenix |
| Steven Lopez | Maintenance Tech | Facilities | Seattle |
| Edward Scott | Logistics Coordinator | Logistics | Phoenix |
| Brian Green | Shipping/Receiving | Logistics | Phoenix |
| Ronald Adams | Shipping/Receiving | Logistics | Seattle |
| Anthony Baker | Shipping/Receiving | Logistics | Norfolk |
Policies & Governance
Auditor Instructions
Review the official corporate policies below. Compare these requirements against the configurations found in the Infrastructure, Security, and Manufacturing tabs to identify compliance gaps.
Access Control Policy (AC-1)
3.1 Purpose: To establish requirements for granting, monitoring, and revoking access to Stratum Defense Systems information assets.
3.4.2 Multi-Factor Authentication (MFA)
MFA is mandatory for all network access originating from outside the corporate physical network. This applies to all employees, contractors, and third-party vendors without exception. No legacy exemptions are permitted after Dec 31, 2023.
3.4.5 Remote Access Logic
Split tunneling is strictly prohibited on all corporate VPN connections. All traffic from remote assets must tunnel through the corporate security stack for inspection.
System & Communications Protection (SC-1)
5.1.2 Unsupported Software
The use of unsupported or End-of-Life (EOL) operating systems (e.g., Windows 7, Server 2008) is prohibited on any network segment connected to the corporate WAN. Isolated "air-gapped" systems are the only exception and require written CISO approval.
5.2.1 Data Loss Prevention (DLP)
All egress points, including email, web gateways, and USB interfaces, must have active DLP monitoring configured to detect and block the unauthorized transmission of CUI.
Audit & Accountability Policy (AU-1)
4.1.3 Cloud Storage Logging
Access logging must be enabled for all cloud storage containers (e.g., AWS S3, Azure Blob) that house CUI or system backups. Logs must be retained for a minimum of 365 days.
4.2.1 Third-Party Access
All vendor remote access sessions must be attended (supervised) by internal IT staff. "Always-on" or unattended vendor access is strictly forbidden.