The Compliance Requirement That Cannot Be Ignored
The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense's answer to a critical problem: defense contractors are handling sensitive government data, and most of them cannot prove their cybersecurity measures actually work. CMMC changes the game from self-attestation to verified, third-party-assessed cybersecurity compliance.
If your organization handles Controlled Unclassified Information (CUI) on DoD contracts—or plans to—CMMC certification is not optional. It is a contract requirement. Without it, you do not win contracts. Period.
The Three Certification Levels
CMMC 2.0 streamlined the original five-level model into three tiers, each mapped to a specific set of cybersecurity practices and assessment requirements.
Level 1: Foundational
17 practices from FAR 52.204-21. Basic cyber hygiene for Federal Contract Information (FCI). Annual self-assessment with affirmation by a senior official. No third-party assessment required.
Level 2: Advanced
110 practices from NIST SP 800-171 Rev 2, mapped to 320 assessment objectives. Required for any contract involving CUI. Triennial C3PAO assessment. This is where 90%+ of the defense industrial base falls.
Level 3: Expert
110+ practices from NIST SP 800-172. Government-led assessment by DIBCAC. Reserved for the highest-priority programs with advanced persistent threat (APT) risk. A small subset of contractors.
Why Level 2 Is the Focal Point
For the overwhelming majority of the defense industrial base, CMMC Level 2 is the certification that matters. It maps directly to the 110 security controls in NIST SP 800-171 Revision 2, organized across 14 control families:
- Access Control (AC) — 22 practices
- Awareness and Training (AT) — 3 practices
- Audit and Accountability (AU) — 9 practices
- Configuration Management (CM) — 9 practices
- Identification and Authentication (IA) — 11 practices
- Incident Response (IR) — 3 practices
- Maintenance (MA) — 6 practices
- Media Protection (MP) — 9 practices
- Personnel Security (PS) — 2 practices
- Physical Protection (PE) — 6 practices
- Risk Assessment (RA) — 3 practices
- Security Assessment (CA) — 4 practices
- System and Communications Protection (SC) — 16 practices
- System and Information Integrity (SI) — 7 practices
Each practice expands into multiple assessment objectives—320 in total. An assessor does not just check whether you have a policy; they verify that the policy is implemented, enforced, documented, and effective. This is where most contractors fail.
Who Needs CMMC Certification?
The short answer: any organization in the defense supply chain that handles Controlled Unclassified Information (CUI) or Federal Contract Information (FCI). This includes:
- Prime contractors on DoD contracts
- Subcontractors at any tier who receive or process CUI
- IT service providers and managed security services for defense contractors
- Cloud service providers hosting defense contractor data
- Manufacturing firms producing defense components with controlled technical data
Common misconception: "We're too small to need CMMC." Size does not determine the requirement. If you handle CUI—even a single document—you need Level 2 certification. An 8-person machine shop with CUI-marked drawings has the same obligation as a 500-person prime contractor.
The November 10, 2026 Deadline
CMMC is rolling out in four phases. The critical milestone for most contractors is Phase 2, when third-party C3PAO assessments become required in applicable contracts:
- Phase 1 (December 16, 2024): Self-assessments begin for Level 1 and select Level 2 contracts
- Phase 2 (November 10, 2026): Third-party C3PAO assessments required for Level 2
- Phase 3 (~2027): Level 3 assessments begin (DIBCAC-led)
- Phase 4 (~2028): Full implementation across all applicable contracts
The math is unforgiving. Preparation for a Level 2 assessment typically requires 6–12 months. The assessment itself takes 4–8 weeks. There are approximately 80 authorized C3PAOs serving 16,000+ companies that need certification. If you have not started, you are already behind schedule.
The Assessment Process
A CMMC Level 2 assessment is conducted by a CMMC Third-Party Assessment Organization (C3PAO)—an independent organization authorized by the CyberAB (formerly the CMMC Accreditation Body). The process involves:
- Pre-assessment planning: Defining scope, identifying CUI boundaries, and reviewing the System Security Plan (SSP)
- Evidence collection: Gathering documentation, configurations, logs, policies, and procedures for all 110 practices
- On-site assessment: Assessors interview personnel, inspect systems, and validate implementation of every control
- Findings and determination: Each of the 320 assessment objectives receives a MET or NOT MET determination
- POA&M resolution: Limited Plan of Action & Milestones allowed for non-critical findings (180-day remediation window)
- Certification decision: Final certification valid for three years
The total cost of a formal C3PAO assessment typically ranges from $30,000 to $75,000, depending on organizational complexity. But the cost of the assessment is only part of the equation—most organizations spend $50,000 to $400,000 on the preparation and remediation work required to pass.
Why Only 1% Are Prepared
Our research across the defense industrial base reveals consistent patterns of unpreparedness. The most common failure modes include:
- 100% have documentation gaps — Missing or incomplete SSPs, POA&Ms, and procedural documentation
- 85% lack proper access controls — No multi-factor authentication, excessive user privileges, no access reviews
- 78% have insufficient audit logging — Cannot prove who accessed what, when, and from where
- 70% have no incident response plan — Or have one that has never been tested
- 65% lack configuration management — No baselines, no change control, no system hardening documentation
The gap between "we think we're compliant" and "we can prove we're compliant to an assessor" is enormous. Self-attestation under DFARS 252.204-7012 set a low bar. CMMC raises it to where it should have been all along.
What You Should Do Now
Regardless of where you are in the process, the steps are the same:
- Identify your CUI boundary. Know exactly where CUI lives, flows, and is processed in your environment. This determines your assessment scope.
- Get a gap analysis. An honest evaluation of your current state against all 110 practices. You need to know the size of the problem before you can solve it.
- Build your System Security Plan (SSP). This is the cornerstone document. It describes how every control is implemented in your specific environment.
- Remediate the gaps. Implement technical controls, write policies and procedures, configure systems, train personnel.
- Prepare your evidence. For each of the 320 assessment objectives, you need documented proof that the control is implemented and effective.
- Schedule your C3PAO assessment. Given the bottleneck of ~80 authorized C3PAOs for 16,000+ companies, schedule early.
Start With a Gap Analysis
Our Quick-Start Assessment identifies your readiness gaps against all 110 NIST 800-171 practices, giving you a clear remediation roadmap and timeline.