CMMC COMPLIANCE ACCESS CONTROL SYSTEM

Meet CMMC Level III compliance with ease and automation.

CMMC COMPLIANCE

Auto-Lock unattended workstations.

Meet CMMC compliance mandates without using passwords. No more worrying about unlocked workstations. Even with shared accounts, know which user accessed which computer when. Token-based proximity authentication means auto-enforcement of password and access security policies.

CMMC Level III compliance made easy. Ensure only permissible users access information. GateKeeper helps organizations pass CMMC audits effectively through automation.

GateKeeper decreases the potential exposure risks of confidential data

24/7 monitoring and auditing of all login attempts

Auto-prevent unauthorized access to sensitive systems

Enforce minimum password length auto-enforced and typed

Dynamic MFA authentication for user-friendly access

"This is perfect for fulfilling the DoD requirements. This is perfect for fulfilling the DoD CMMC and SPRS requirements for 2FA, audit logs...This product has worked flawlessly since it was installed and fully setup. The GateKeeper team was extremely helpful during the setup process (they will walk you through all of the required steps to get the system operational which helped tremendously)"

Wil Faller
For CMMC and SPRS 2FA requirement 

While conventional two factor
authentication methods could
have cost the company over 240
hours of login time for 14,000
logins in one month, GateKeeper
took only 20 hours of time to
login. GateKeeper made the
computers secure, and cost 90% less in time as compared to any
other authentication method.

Tom Riddle
Major Tool & Machine

For DFARS 252.204-7012 compliance

CMMC Audit solution.

"Untethered Labs’ GateKeeper Enterprise product delivers greater computer security built around the realities of our busy workplaces and workflows by using two-factor authorization and authorized proximity detection to enable access to network applications. Moving away from a user’s workstation shuts down access to prevent unauthorized access. Data breaches make the news, so providing central password control and comprehensive auditing capabilities are essential to protecting your customers, while improving their security footing."

Paul Boucherle
Security Sales & Integration
“The #1 Technology & Business Authority Since 1979”

...an inexpensive and hassle-free way to ensure you can sit down and get to work without delay but securely lock your machine—with no user interaction—whenever you need to step away.

David Cieslak, CPA/CITP
Journal of Accountancy

"We no longer need to remember to lock our workstations nor keep track of complex passwords!

I believe in GateKeeper, and I believe in the Untethered Labs team. They are going places, and I am glad to be on the ride with them!"

Dr. Toyin Opesanmi, M.D., AAHIVS
Gennesaret Medical Center

Insider threat prevention solutions.

GateKeeper Enterprise CMMC Level 3 Compliance Summary

Security mechanism that increases security and decreases complexity of access. CMMC Level 3 requires safeguards against unauthorized users and information breach. Non-compliance by employees pose the greatest security risks. See how GateKeeper helps you adhere to CMMC Level 3 compliance by taking the burden off both users and admins.

Control FamilyControl IDDescriptionCMMC LevelGateKeeper Proximity Enterprise
ACCESS CONTROL (AC)AC.1.001Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
- FAR Clause 52.204-21 b.1.i
- NIST SP 800-171 Rev 1 3.1.1
- CIS Controls v7.1 1.4, 1.6, 5.1, 14.6, 15.10, 16.8, 16.9, 16.11
- NIST CSF v1.1 PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-6, PR.PT-3, PR.PT-4
- CERT RMM v1.2 TM:SG4.SP1
- NIST SP 800-53 Rev 4 AC-2, AC- 3, AC-17
- AU ACSC Essential Eight
1GateKeeper Enterprise provides proximity-based authentication and authorization to workstations. Using GateKeeper Enterprise, organizations can granularly assign access permissions to individuals/groups on a per workstation basis. GateKeeper automatically locks a user's computer when they are no longer in proximity to their workstation, immediately protecting unauthorized users from accessing a system.
ACCESS CONTROL (AC)AC.1.002Limit information system access to the types of transactions and functions that authorized users are permitted to execute.
- FAR Clause 52.204-21 b.1.ii
- NIST SP 800-171 Rev 1 3.1.2
- CIS Controls v7.1 1.4, 1.6, 5.1, 8.5, 14.6, 15.10, 16.8, 16.9, 16.11
- NIST CSF v1.1 PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-6, PR.PT-3, PR.PT-4
- CERT RMM v1.2 TM:SG4.SP1
- NIST SP 800-53 Rev 4 AC-2, AC- 3, AC-17
1GateKeeper Enterprise provides proximity-based authentication and authorization to workstations. Using GateKeeper Enterprise, organizations can granularly assign access permissions to individuals/groups on a per workstation basis. GateKeeper automatically locks a user's computer when they are no longer in proximity to their workstation, immediately protecting unauthorized users from accessing a system.
ACCESS CONTROL (AC)AC.1.003Verify and control/limit connections to and use of external information systems.
- FAR Clause 52.204-21 b.1.iii
- NIST SP 800-171 Rev 1 3.1.20
- CIS Controls v7.1 12.1, 12.4
- NIST CSF v1.1 ID.AM-4, PR.AC-3
- CERT RMM v1.2 EXD:SG3.SP1
- NIST SP 800-53 Rev 4 AC-20, AC- 20(1)
1GateKeeper Enterprise provides proximity-based authentication and authorization to workstations. Using GateKeeper Enterprise, organizations can granularly assign access permissions to individuals/groups on a per workstation basis. GateKeeper automatically locks a user's computer when they are no longer in proximity to their workstation, immediately protecting unauthorized users from accessing a system.
ACCESS CONTROL (AC)AC.2.007Employ the principle of least privilege, including for specific security functions and privileged accounts.
- NIST SP 800-171 Rev 1 3.1.5
- CIS Controls v7.1 14.6
- NIST CSF v1.1 PR.AC-4
- CERT RMM v1.2 KIM:SG4.SP1
- NIST SP 800-53 Rev 4 AC-6, AC- 6(1), AC-6(5)
- UK NCSC Cyber Essentials
2GateKeeper Enterprise provides proximity-based authentication and authorization to workstations. Using GateKeeper, organizations can granularly assign access permissions to individuals/groups on a per workstation basis. This helps enforce the concept of least privilege on a system level.
ACCESS CONTROL (AC)AC.2.009Limit unsuccessful logon attempts.
- NIST SP 800-171 Rev 1 3.1.8
- NIST CSF v1.1 PR.AC-7
- NIST SP 800-53 Rev 4 AC-7
2GateKeeper has the ability to lock a user's account after an administrator-defined number of unsuccessful login attempts.
ACCESS CONTROL (AC)AC.2.010Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
- NIST SP 800-171 Rev 1 3.1.10
- CIS Controls v7.1 16.11
- NIST SP 800-53 Rev 4 AC-11, AC- 11(1)
2GateKeeper automatically locks a user's workstation when they are no longer in proximity to their workstation - preventing access/viewing of data.
ACCESS CONTROL (AC)AC.2.013Monitor and control remote access sessions.
- NIST SP 800-171 Rev 1 3.1.12
- CIS Controls v7.1 12.11, 12.12
- NIST CSF v1.1 PR.AC-3, PR.PT-4
- CERT RMM v1.2 TM:SG2.SP2
- NIST SP 800-53 Rev 4 AC-17(1)
2GateKeeper Enterprise provides proximity-based authentication and authorization to workstations. Using GateKeeper Enterprise, organizations can granularly assign access permissions to individuals/groups on a per workstation basis. GateKeeper automatically locks a user's computer when they are no longer in proximity to their workstation, immediately protecting unauthorized users from accessing a system.
ACCESS CONTROL (AC)AC.3.017Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
- NIST SP 800-171 Rev 1 3.1.4
- NIST CSF v1.1 PR.AC-4
- NIST SP 800-53 Rev 4 AC-5
3GateKeeper Enterprise provides proximity-based authentication and authorization to workstations. Using GateKeeper Enterprise, organizations can granularly assign access permissions to individuals/groups on a per workstation basis. GateKeeper automatically locks a user's computer when they are no longer in proximity to their workstation, immediately protecting unauthorized users from accessing a system.
ACCESS CONTROL (AC)AC.3.018Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
- NIST SP 800-171 Rev 1 3.1.7
- NIST CSF v1.1 PR.AC-4
- CERT RMM v1.2 KIM:SG4.SP1
- NIST SP 800-53 Rev 4 AC-6(9), AC-6(10)
3GateKeeper Enterprise provides proximity-based authentication and authorization to workstations. Using GateKeeper Enterprise, organizations can granularly assign access permissions to individuals/groups on a per workstation basis. This helps enforce the concept of least privilege on a system level.
ACCESS CONTROL (AC)AC.3.019Terminate (automatically) user sessions after a defined condition.
-NIST SP 800-171 Rev 1 3.1.11
- CIS Controls v7.1 16.7, 16.11
- NIST SP 800-53 Rev 4 AC-12
3GateKeeper automatically locks a user's workstation when they are no longer in proximity to their workstation - preventing access/viewing of data.
AUDIT AND ACCOUNTABILITY (AA)AU.2.041Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.
- NIST SP 800-171 Rev 1 3.3.2
- CIS Controls v7.1 16.8, 16.9
- NIST CSF v1.1 DE.CM-1, DE.CM- 3, DE.CM-7
- CERT RMM v1.2 MON:SG1.SP3
- NIST SP 800-53 Rev 4 AU-2, AU- 3, AU-3(1), AU-6, AU-11, AU-12
2GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it, even on shared accounts.
AUDIT AND ACCOUNTABILITY (AA)AU.2.042Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity.
- NIST SP 800-171 Rev 1 3.3.1
- CIS Controls v7.1 6.2
- NIST CSF v1.1. DE.CM-1, DE.CM- 3, DE.CM-7
- CERT RMM v1.2 MON:SG2.SP3
- NIST SP 800-53 Rev 4 AU-2, AU- 3, AU-3(1), AU-6, AU-11, AU-12
2GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it, even on shared accounts. These audit logs are retained indefinitely and can be on on-premise.
AUDIT AND ACCOUNTABILITY (AA)AU.2.044Review audit logs.
- CMMC
- CIS Controls v7.1 6.7
- NIST CSF v1.1 PR.PT-1
- CERT RMM v1.2 COMP:SG3.SP1
- NIST SP 800-53 Rev 4 AU-6
2GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it. These audit logs are retained indefinitely.
AUDIT AND ACCOUNTABILITY (AA)AU.3.045Review and update logged events.
- NIST SP 800-171 Rev 1 3.3.3
- CIS Controls v7.1 6.7
- CERT RMM v1.2 IMC:SG2.SP2
- NIST SP 800-53 Rev 4 AU-2(3)
3GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it. These audit logs are retained indefinitely.
AUDIT AND ACCOUNTABILITY (AA)AU.3.049Protect audit information and audit logging tools from unauthorized access, modification, and deletion.
- NIST SP 800-171 Rev 1 3.3.8
- CERT RMM v1.2 MON:SG2.SP3
- NIST SP 800-53 Rev 4 AU-6(7), AU-9
3GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it. GateKeeper can connect to a syslog server and integrate with an enterprise security architecture. Authorized admins have the ability to export audit logs to further enable audit review, analysis, and reporting processes.
AUDIT AND ACCOUNTABILITY (AA)AU.3.050Limit management of audit logging functionality to a subset of privileged users.
- NIST SP 800-171 Rev 1 3.3.9
- CERT RMM v1.2 MON:SG2.SP2
- NIST SP 800-53 Rev 4 AU-6(7), AU-9(4)
3GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it. GateKeeper can connect to a syslog server and integrate with an enterprise security architecture. Authorized admins have the ability to export audit logs to further enable audit review, analysis, and reporting processes.
AUDIT AND ACCOUNTABILITY (AA)AU.3.051Correlate audit record review, analysis, and reporting processes for investigation and response to indications of unlawful, unauthorized, suspicious, or unusual activity.
- NIST SP 800-171 Rev 1 3.3.5
- CIS Controls v7.1 6.6, 6.7
- NIST CSF v1.1 DE.AE-3
- CERT RMM v1.2 COMP: SG3.SP1
- NIST SP 800-53 Rev 4 AU-6(3)
3GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it. GateKeeper can connect to a syslog server and integrate with an enterprise security architecture. Authorized admins have the ability to export audit logs to further enable audit review, analysis, and reporting processes.
AUDIT AND ACCOUNTABILITY (AA)AU.3.052Provide audit record reduction and report generation to support on-demand analysis and reporting.
- NIST SP 800-171 Rev 1 3.3.6
- NIST CSF v1.1 RS.AN-3
- CERT RMM v1.2 COMP:SG3.SP2
- NIST SP 800-53 Rev 4 AU-7
3GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it. GateKeeper can connect to a syslog server and integrate with an enterprise security architecture. Authorized admins have the ability to export audit logs to further enable audit review, analysis, and reporting processes.
AUDIT AND ACCOUNTABILITY (AA)AU.4.053Automate analysis of audit logs to identify and act on critical indicators (TTPs) and/or organizationally defined suspicious activity.
- CMMC
- CIS Controls v7.1 6.6
- NIST CSF v1.1 DE.AE-3
- NIST SP 800-53 Rev 4 SI-4(2)
4GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it. These audit logs are retained indefinitely and can be sent automatically to administrators.
AUDIT AND ACCOUNTABILITY (AA)AU.4.054Review audit information for broad activity in addition to per-machine activity.
- CMMC
- NIST CSF v1.1 PR.PT-1
- NIST SP 800-53 Rev 4 RA-5(6), RA-5(8), RA-5(10)
4GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it. These audit logs are retained indefinitely and can be sent automatically to administrators.
AUDIT AND ACCOUNTABILITY (AA)AU.5.055Identify assets not reporting audit logs and assure appropriate organizationally defined systems are logging.
- CMMC
- CIS Controls v7.1 6.2
- NIST SP 800-53 Rev 4 AU-12
5GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it. These audit logs are retained indefinitely and can be sent automatically to administrators.
IDENTIFICATION AND AUTHENTICATION (IDA)IA.1.076Identify information system users, processes acting on behalf of users, or devices.
- FAR Clause 52.204-21 b.1.v
- NIST SP 800-171 Rev 1 3.5.1
- CIS Controls v7.1 4.2, 4.3, 16.8, 16.9
- NIST CSF v1.1 PR.AC-1, PR.AC-6, PR.AC-7
- CERT RMM v1.2 ID:SG1.SP1
- NIST SP 800-53 Rev 4 IA-2, IA-3, IA-5
1GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it, even on shared computers. GateKeeper can connect to a syslog server and integrate with an enterprise security architecture. Authorized admins have the ability to export audit logs to further enable audit review, analysis, and reporting processes.
IDENTIFICATION AND AUTHENTICATION (IDA)IA.1.077Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.
- FAR Clause 52.204-21 b.1.vi
- NIST SP 800-171 Rev 1 3.5.2
- CIS Controls v7.1 4.2, 4.3, 16.8, 16.9
- NIST CSF v1.1 PR.AC-1, PR.AC-6, PR.AC-7
- CERT RMM v1.2 TM:SG4.SP1
- NIST SP 800-53 Rev 4 IA-2, IA-3, IA-5
- UK NCSC Cyber Essentials
1GateKeeper Enterprise provides proximity-based identification, authentication, and authorization to workstations. Using GateKeeper Enterprise, an organization can granularly assign access permissions to individuals/groups on a per workstation basis.
IDENTIFICATION AND AUTHENTICATION (IDA)IA.2.078Enforce a minimum password complexity and change of characters when new passwords are created.
- NIST SP 800-171 Rev 1 3.5.7
- CIS Controls v7.1 4.2, 4.4
- NIST CSF v1.1 PR.AC-1, PR.AC-6, PR.AC-7
- NIST SP 800-53 Rev 4 IA-5(1)
- UK NCSC Cyber Essentials
2GateKeeper can integrate with an organization's Active Directory to enforce this control.
IDENTIFICATION AND AUTHENTICATION (IDA)IA.2.079Prohibit password reuse for a specified number of generations.
- NIST SP 800-171 Rev 1 3.5.8
- CIS Controls v7.1 4.2, 4.4
- NIST CSF v1.1 PR.AC-1, PR.AC-6, PR.AC-7
- NIST SP 800-53 Rev 4 IA-5(1)
2GateKeeper can integrate with an organization's Active Directory to enforce this control.
IDENTIFICATION AND AUTHENTICATION (IDA)IA.2.080Allow temporary password use for system logons with an immediate change to a permanent password.
- NIST SP 800-171 Rev 1 3.5.9
- NIST CSF v1.1 PR.AC-1, PR.AC-6, PR.AC-7
- NIST SP 800-53 Rev 4 IA-5(1)
2GateKeeper can integrate with an organization's Active Directory to enforce this control.
IDENTIFICATION AND AUTHENTICATION (IDA)IA.2.081Store and transmit only cryptographically-protected passwords.
- NIST SP 800-171 Rev 1 3.5.10
- CIS Controls v7.1 16.4, 16.5
- NIST CSF v1.1 PR.AC-1, PR.AC-6, PR.AC-7
- CERT RMM v1.2 KIM:SG4.SP1
- NIST SP 800-53 Rev 4 IA-5(1)
2GateKeeper utilizes military-grade AES-256 encryption to securely store and transmit passwords.
IDENTIFICATION AND AUTHENTICATION (IDA)IA.2.082Obscure feedback of authentication information.
- NIST SP 800-171 Rev 1 3.5.11
- NIST CSF v1.1 PR.AC-1
- NIST SP 800-53 Rev 4 IA-6
2GateKeeper PIN login is obscured and all authentication information is obscured.
IDENTIFICATION AND AUTHENTICATION (IDA)IA.3.083Use multifactor authentication for local and network access to privileged accounts and for network access to nonprivileged accounts.
- NIST SP 800-171 Rev 1 3.5.3
- CIS Controls v7.1 4.5, 11.5, 12.11
- NIST CSF v1.1 PR.AC-1, PR.AC-6, PR.AC-7
- CERT RMM v1.2 TM:SG4.SP1
- NIST SP 800-53 Rev 4 IA-2(1), IA- 2(2), IA-2(3)
- AU ACSC Essential Eight
3GateKeeper Enterprise has the capability to enforce multifactor authentication (MFA) for all access to a workstation.
IDENTIFICATION AND AUTHENTICATION (IDA)IA.3.084Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.
- NIST SP 800-171 Rev 1 3.5.4
- NIST CSF v1.1 PR.AC-1, PR.AC-6, PR.AC-7
- NIST SP 800-53 Rev 4 IA-2(8), IA- 2(9)
3GateKeeper is a proximity-based identification and authentication solution. A user must be present with their physical token to unlock their workstation, making it inherently replay-resistant.
IDENTIFICATION AND AUTHENTICATION (IDA)IA.3.085Prevent the reuse of identifiers for a defined period.
- NIST SP 800-171 Rev 1 3.5.5
- CIS Controls v7.1 16.7, 16.10, 16.12
- NIST CSF v1.1 PR.AC-1, PR.AC-6, PR.AC-7
- NIST SP 800-53 Rev 4 IA-4
3GateKeeper can integrate with an organization's Active Directory to enforce this control.
IDENTIFICATION AND AUTHENTICATION (IDA)IA.3.086Disable identifiers after a defined period of inactivity.
- NIST SP 800-171 Rev 1 3.5.6
- CIS Controls v7.1 16.9, 16.10, 16.11
- NIST CSF v1.1 PR.AC-1, PR.AC-6, PR.AC-7
- NIST SP 800-53 Rev 4 IA-4
3GateKeeper Proximity can integrate with an organization's Active Directory to enforce this control.

Automatically know who accessed what PC and when to stay compliant with CMMC effortlessly. Pass CMMC audits with ease.

two factor authentication solution
Capterra Best Value for Authentication Jun-20
Capterra Ease of Use for Authentication Jun-20

See GateKeeper proximity access control in action.

Take a self-guided tour of how your proximity-based access control can work.

Touchless, contactless, passwordless 2FA with continuous authentication. One key for all your passwords. Experience fully automated login and security. Instant 2FA, auto-OTP, password manager and worry-free workflow with proximity-based privileged access management for Windows 10, 8, 7, macOS, desktop applications, and websites.

Download the free Android app.

Proximity-based passwordless 2FA

Active Directory integration with admin console

Automatic lock for all workstations

Continuous authentication password manager

Automatic OTP on websites for 2FA

Wireless login for PC, Mac, web, and software

or call 240-547-5446