Skip to content

Aulendur Labs

Personnel Security Policy

Document ID: AUL-POL-08 Version: 1.0 Classification: Internal Owner: Chief Technology Officer / ISSM Effective: TBD-YYYY-MM-DD Next Review: TBD-YYYY-MM-DD


1. Purpose

This policy establishes personnel security requirements for Aulendur Labs, Inc. to verify that individuals with access to information systems and CUI are trustworthy and meet security requirements before, during, and after their association with the organization. This policy implements NIST SP 800-171 Rev. 3 controls 03.09.01 (Personnel Screening) and 03.07.05 (Maintenance Personnel).

2. Scope

This policy applies to:

  • Personnel: All employees, contractors, interns, advisors, and any individual who will be granted access to Aulendur information systems or data.
  • Data: All classification levels, with enhanced screening for access to Confidential, CUI, and ITAR-controlled data.
  • Third parties: Maintenance personnel, auditors, and service providers who require access to Aulendur facilities or systems.

3. Roles & Responsibilities

Role Responsibility
Chief Executive Officer (CEO) Approves this policy; authorizes hiring decisions; signs offer letters.
Chief Technology Officer (CTO) / ISSM Owns this policy; determines screening levels based on access requirements; reviews screening results; approves access grants.
Hiring Manager Initiates screening requests for new hires and contractors; verifies screening completion before granting system access.
All Personnel Cooperate with screening processes; report changes in personal circumstances that could affect eligibility.
Gusto (HR platform) Facilitates background check initiation and record retention.

4. Policy Statements

4.1 Pre-Employment Screening

4.1.1 All individuals shall undergo personnel screening before being granted access to Aulendur information systems. The screening level shall be commensurate with the sensitivity of the data and systems to be accessed (NIST SP 800-171 R3 03.09.01).

4.1.2 Aulendur Labs shall conduct the following minimum screening for all personnel:

Screening Element Internal/Confidential Access CUI/ITAR Access
Identity verification (government-issued ID) Required Required
Criminal background check (7-year, all jurisdictions) Required Required
Employment history verification (5 years) Required Required
Education verification (highest degree claimed) Required Required
Reference check (2 professional references) Required Required
US person status verification Not required Required (for ITAR access per 22 CFR 120.16)
Credit check Not required Recommended
Active security clearance verification Not required If clearance required by contract

4.1.3 Background checks shall be initiated through Gusto or an approved third-party screening provider. Results shall be reviewed by the CTO/ISSM before system access is granted.

4.1.4 Adverse findings in a background check shall be reviewed by the CEO and CTO/ISSM jointly. Access shall not be granted until both concur that the individual is suitable. The basis for the suitability determination shall be documented.

4.2 Access Agreements

4.2.1 Before receiving access to Aulendur systems, all personnel shall sign the following agreements:

  • (a) Non-Disclosure Agreement (NDA) covering Confidential and proprietary information.
  • (b) Acceptable Use Policy acknowledgment (AUL-POL-05).
  • (c) Code of Conduct & Ethics acknowledgment (AUL-POL-06).
  • (d) CUI Non-Disclosure Agreement — required for personnel with CUI access, acknowledging safeguarding obligations under DFARS 252.204-7012.
  • (e) ITAR/EAR awareness acknowledgment — required for personnel with access to export-controlled data.

4.2.2 Signed agreements shall be retained in the individual's personnel file (Gusto or secure Google Drive folder) for the duration of the relationship plus 3 years.

4.3 Ongoing Personnel Security

4.3.1 Personnel shall report to the CTO/ISSM within 5 business days any change in personal circumstances that could affect their security suitability, including: (a) arrest or criminal charges, (b) foreign travel to high-risk countries, (c) contact by foreign intelligence services, (d) significant financial distress (bankruptcy, garnishment), or (e) changes in citizenship or immigration status.

4.3.2 The CTO/ISSM shall conduct periodic re-screening of personnel with CUI or ITAR access at least every 5 years, or more frequently if required by contract.

4.3.3 Personnel who fail to cooperate with screening or re-screening shall have their system access suspended until cooperation is obtained or the matter is resolved by the CEO.

4.4 Contractor and Third-Party Personnel

4.4.1 Contractors and third-party personnel shall meet the same screening requirements as employees for equivalent access levels. Screening may be performed by the contractor's employer, provided the CTO/ISSM receives written attestation of completed screening before access is granted.

4.4.2 Maintenance personnel who require unescorted access to Aulendur systems or facilities shall have completed screening commensurate with the data accessible from those systems (NIST SP 800-171 R3 03.07.05). Maintenance personnel who have not been screened shall be escorted at all times and their activities shall be monitored.

4.4.3 Visitor and maintenance access shall be logged, including name, organization, purpose, arrival/departure times, and escort (if applicable).

4.5 Security Clearance Management

4.5.1 For positions requiring a security clearance (currently limited to TS/SCI-cleared personnel on staff), the CTO/ISSM shall verify clearance status through appropriate government channels before granting access to classified or sensitive programs.

4.5.2 Personnel with active security clearances shall comply with all reporting obligations under SEAD 3 (Reporting Requirements for Personnel with Access to Classified Information) and any applicable Security Executive Agent Directives.

4.5.3 Aulendur Labs does not currently hold a NISPOM facility clearance. Should classified work be pursued, personnel security requirements shall be updated per 32 CFR Part 117.

4.6 Personnel Actions for Cause

4.6.1 If a personnel security concern arises (e.g., adverse background information, insider threat indicator, policy violation), the CTO/ISSM shall: (a) immediately assess whether system access should be suspended, (b) notify the CEO, (c) document the concern, and (d) determine the appropriate course of action (counseling, access restriction, termination referral).

4.6.2 System access shall be suspended within 1 hour of a determination that an individual poses a security risk, pending investigation.

5. Standards & Procedures Referenced

The following companion documents implement this policy:

6. Compliance & Enforcement

Violations of this policy may result in suspension of system access, disciplinary action up to and including termination, and referral to law enforcement where applicable. Granting system access to unscreened personnel constitutes a policy violation. Suspected violations shall be reported to the CTO/ISSM.

7. Exceptions

Exceptions to this policy require written approval per the Policy Exception & Waiver Policy. Exceptions to CUI or ITAR screening requirements additionally require CEO approval. Emergency access grants (e.g., critical system failure requiring immediate vendor support) shall be escorted, logged, and ratified by the CTO/ISSM within 24 hours.

8. Definitions

Term Definition
Personnel Screening The process of verifying an individual's identity, background, and suitability before granting access to information systems or data.
CUI Controlled Unclassified Information, per 32 CFR Part 2002.
ITAR International Traffic in Arms Regulations (22 CFR 120-130).
US Person A US citizen, lawful permanent resident, or protected individual as defined in 8 USC 1324b(a)(3).
SEAD 3 Security Executive Agent Directive 3, establishing reporting requirements for cleared personnel.
Maintenance Personnel Individuals who perform maintenance or repair activities on Aulendur systems, whether on-site or remote.
Escort Continuous accompaniment of an unscreened individual by a screened Aulendur employee while in Aulendur facilities or accessing Aulendur systems.

9. References

  • NIST SP 800-171 Rev. 3, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
  • NIST SP 800-53 Rev. 5, Security and Privacy Controls for Information Systems and Organizations
  • CMMC 2.0 Level 2, Cybersecurity Maturity Model Certification
  • DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting
  • ITAR (22 CFR 120-130), International Traffic in Arms Regulations
  • SEAD 3, Reporting Requirements for Personnel with Access to Classified Information
  • 32 CFR Part 117, National Industrial Security Program Operating Manual (NISPOM)

10. Control Mappings

Framework Control ID Control Title Coverage
NIST SP 800-171 R3 03.09.01 Personnel Screening Full
NIST SP 800-171 R3 03.07.05 Maintenance Personnel Full
CMMC 2.0 L2 PS.L2-3.9.1 Screen Individuals Full
CMMC 2.0 L2 MA.L2-3.7.5 Nonlocal Maintenance Partial — technical controls in AUL-POL-32
NIST SP 800-53 R5 PS-3 Personnel Screening Full
NIST SP 800-53 R5 PS-6 Access Agreements Full
NIST SP 800-53 R5 PS-7 External Personnel Security Full
NIST SP 800-53 R5 MA-5 Maintenance Personnel Full

11. Revision History

Version Date Author Changes
1.0 TBD-YYYY-MM-DD J. Gershenson Initial issue.

© Aulendur Labs, Inc. 2026. Internal use only unless otherwise classified.