CMMC 101: The Complete Guide to CMMC Compliance for Defense Contractors

CMMC

If you work with the Department of Defense (redesignated the Department of War by executive order, September 2025) and someone handed you a solicitation with "CMMC Level 2" written in the requirements, this guide is for you.

CMMC stands for Cybersecurity Maturity Model Certification. As of November 10, 2025, it is a legal requirement under DFARS 252.204-7021. If your contract involves sensitive government data and you do not meet the applicable CMMC level, you cannot perform on that contract. That is the stakes.

This guide covers everything you need to understand the program: what it is, which level applies to your organization, how the timeline works, what an assessment looks like, how to prepare, and what it costs. Every section links to a deeper companion article for readers who want to go further on a specific topic.

Table of Contents

  1. What Is CMMC?
  2. The Three CMMC Levels
  3. Who Needs CMMC: FCI, CUI, Primes, and Subs
  4. The CMMC Timeline and Enforcement Phases
  5. NIST 800-171 and Its Relationship to CMMC
  6. Self-Assessment and SPRS: How Scoring Works
  7. What a C3PAO Assessment Looks Like
  8. How to Prepare for CMMC Certification
  9. The Cost of CMMC Compliance 10.Common Mistakes That Derail CMMC Programs
  10. Work With NR Labs

What Is CMMC?

CMMC stands for Cybersecurity Maturity Model Certification. It is the Department of Defense's program for verifying that defense contractors have implemented the cybersecurity controls required to protect sensitive government information.

The key word is "verifying." Before CMMC, contractors were required to implement security controls under DFARS 252.204-7012, but verification was largely self-reported. A contractor signed a contract clause, submitted a score into a government database, and the government mostly had to take their word for it. CMMC changes that model. For contracts involving the most sensitive data, contractors must now be assessed by an independent third party, not just self-certify.

Why the DoD Built CMMC

The defense supply chain includes over 300,000 companies. These range from the large prime contractors to small machine shops, software developers, IT service providers, MSSPs, and specialty manufacturers that make up the broader Defense Industrial Base (DIB).

Many of these companies were handling sensitive government data on systems with minimal security controls. Nation-state adversaries, particularly China and Russia, identified the defense supply chain as a softer target than the DoD's own classified networks. By penetrating small and mid-sized contractors, they could gain access to technical designs, acquisition data, and operational information without ever touching a classified system.

The F-35 program is the canonical example. Intelligence reporting indicated that adversaries obtained technical data about the aircraft through defense contractor networks. The DoD needed a way to verify that contractors were actually protecting this data, not just checking a box. CMMC is that verification mechanism.

The Data CMMC Is Designed to Protect

CMMC is all about protecting data. CMMC is built around two categories of sensitive government data:

  • Federal Contract Information (FCI) is information provided by or generated for the government under a contract to develop or deliver a product or service. The definition comes from FAR Clause 52.204-21. If you receive technical specifications, statement of work details, or government-generated deliverable data under a contract, that is likely FCI.
  • Controlled Unclassified Information (CUI) is a broader category established by Executive Order 13556. It covers information that requires safeguarding under law, regulation, or government-wide policy but does not rise to the level of classified information. DoD examples include export-controlled technical data, acquisition-sensitive information, personally identifiable information, and critical program information.

The type of data you handle determines which CMMC level applies to your organization. For a deeper analysis of the distinction and how to identify your data types, read FCI vs CUI: How to Know Which Type of Data You Handle.

CMMC Is Now Law

The CMMC program was established through a process that started with the National Defense Authorization Act (NDAA) for Fiscal Year 2020. After years of development and revision (CMMC 1.0 in 2020, CMMC 2.0 announced in 2021), the final rule was published in 32 CFR Part 170 and DFARS 252.204-7021 took effect on November 10, 2025.

From that date forward, CMMC requirements can appear in DoD solicitations and contracts. If your contract includes DFARS 252.204-7021, you are in scope for CMMC. For the full explanation of what CMMC is and why it exists, read What Is CMMC? A Plain-English Guide for Defense Contractors.

The Three CMMC Levels

CMMC 2.0 organizes requirements into three levels:

Level 1: Foundational

Level 1 applies to organizations that handle FCI but not CUI. It requires 15 security practices derived directly from FAR Clause 52.204-21, distributed across six security domains: Access Control (4 practices), Identification and Authentication (2), Media Protection (1), Physical Protection (2), System and Communications Protection (2), and System and Information Integrity (4).

Compliance is verified through an annual self-assessment. Your organization scores itself against each of the 15 practices, submits the score to SPRS, and a senior official affirms the accuracy of the submission. There is no third-party assessment requirement for Level 1.

For a detailed breakdown of all 15 practices with implementation guidance, read The 15 CMMC Level 1 Practices: What They Are and How to Implement Them.

Level 2: Advanced

Level 2 applies to organizations that handle CUI. It requires full implementation of NIST Special Publication 800-171 Revision 2, which contains 110 security requirements across 14 security families. This is a substantially more demanding standard than Level 1, covering comprehensive audit logging, configuration management, incident response, multi-factor authentication, FIPS-validated encryption, and more.

Level 2 verification depends on contract sensitivity. Some contracts allow self-assessment; others require an independent third-party assessment by a Certified Third-Party Assessment Organization (C3PAO). C3PAO certifications are valid for three years, with the result being either Final (all requirements Met) or Conditional (open POA&M items, 180 days to close).

The weighted scoring system assigns 5, 3, or 1 points per requirement, with a maximum of 110. Organizations need a minimum of 88 points (80%) for Conditional certification.

Level 3: Expert

Level 3 applies to the most sensitive DoD programs. It requires all 110 Level 2 requirements plus 24 additional requirements from NIST SP 800-172, for a total of 134. The additional requirements address Advanced Persistent Threat (APT) defenses including enhanced access control, penetration testing, threat hunting, and supply chain risk management.

Level 3 assessments are conducted exclusively by DIBCAC, the DoD's own assessment team. Before pursuing Level 3, an organization must have a current, valid Level 2 C3PAO certification. Level 3 certifications are valid for three years.

How to Determine Your Level

The determination is contract-driven:

  • Review your contract clauses. FAR 52.204-21 without DFARS 252.204-7012 means FCI only (Level 1). DFARS 252.204-7012 or 252.204-7021 means CUI (Level 2 minimum). Level 3 is specified explicitly by the contracting officer.
  • Trace the data. Identify what government information your organization actually receives, processes, stores, or transmits.
  • When in doubt, default to Level 2. The cost of under-preparing is far higher than over-preparing.

For the complete breakdown of all three levels, read CMMC Level 1 vs Level 2 vs Level 3: Which One Do You Need?.

Who Needs CMMC: FCI, CUI, Primes, and Subs

CMMC applies to both prime contractors and subcontractors throughout the defense supply chain. If you hold a DoD contract that includes DFARS 252.204-7012, you are already subject to CMMC requirements or will be shortly.

Prime Contractor Obligations

Prime contractors are responsible for flowing CMMC requirements down to subcontractors. If you are a prime handling CUI and you pass that CUI to a subcontractor, that subcontractor needs at minimum Level 2 certification. Before sharing CUI with any subcontractor, you are required to verify their SPRS submission. For the full picture of flow-down requirements, read CMMC Flow-Down Requirements: What Primes Must Require from Subs.

Subcontractor Impact

CMMC applies to all companies performing under applicable DoD contracts regardless of tier. Company size is not an exemption factor. A five-person machine shop that receives CUI from a prime contractor has the same Level 2 requirements as the prime itself. The requirement attaches to the data, not the organization's size or revenue.

For small defense subcontractors, the practical challenge is that CMMC compliance costs are proportionally larger relative to revenue. However, the requirement is non-negotiable if CUI flows to your systems. Read What CMMC Means for Small Defense Subcontractors for strategies specific to smaller organizations.

Who CMMC Does Not Apply To

CMMC does not apply to contracts outside the DoD, classified systems (which have their own requirements), or contracts where the only government data involved is hardcopy CUI that is never placed on an IT system. However, the moment hardcopy CUI is scanned, photographed, emailed, or otherwise digitized, all systems that could touch it come into scope.

The CMMC Timeline and Enforcement Phases

The CMMC program rolls out in four phases from November 2025 through November 2028.

Phase 1: November 2025 Through November 2026

Phase 1 is the self-assessment phase. Contracting officers include CMMC requirements in new solicitations, with self-assessment as the primary compliance verification mode for Level 2. Organizations can demonstrate compliance by conducting their own assessment, calculating a weighted score, submitting to SPRS, and having a senior official legally affirm accuracy.

C3PAO third-party assessments during Phase 1 are at the contracting officer's discretion, but in most cases Phase 1 means self-assessments.

Phase 1 is not a grace period. Organizations without an active, accurate SPRS submission can be excluded from contract awards today.

Phase 2: November 2026 Through November 2027

Phase 2 is when mandatory C3PAO third-party assessments begin appearing in new solicitations. This is the inflection point where self-assessment is no longer sufficient for many Level 2 contracts. Level 3 requirements also begin to appear. Organizations pursuing Level 3 must first achieve a full Level 2 C3PAO certification.

If you start your readiness program in October 2026 because a Phase 2 solicitation landed on your desk, you will almost certainly miss the award. C3PAO assessments require scheduling, preparation, and completion time.

Phase 3: November 2027 Through November 2028

C3PAO requirements extend more broadly across the DoD contract base. Certification becomes standard rather than exceptional for Level 2 CUI contracts. The C3PAO capacity constraint becomes more acute as demand surges.

Phase 4: November 2028 and Beyond

Full CMMC implementation. All applicable contracts have full enforcement in place.

The Renewal Cycle

CMMC certifications are not permanent. Level 1 requires annual self-assessment and affirmation. Level 2 and Level 3 certifications are valid for three years, with annual affirmations required throughout. Three events can trigger early reassessment: a major technology change, cyber intelligence reporting, or a merger/acquisition that materially changes the environment.

For the complete phase-by-phase breakdown with action items, read The CMMC Timeline: What's Happening and When (2025-2028). For the assessor capacity challenge, read The CMMC Assessor Shortage: What It Means for Your Timeline.

NIST 800-171 and Its Relationship to CMMC

NIST SP 800-171 is the security requirements catalog. CMMC Level 2 is the verification and certification program built on top of it. If you implement all 110 NIST SP 800-171 Revision 2 requirements and can demonstrate that implementation to a C3PAO assessor, you will pass a CMMC Level 2 assessment.

What CMMC Adds Beyond the Requirements

CMMC Level 2 uses the same 110 technical requirements as NIST 800-171 Rev 2, but adds several elements:

  • Formal assessment and certification mechanism: C3PAO third-party assessments, DIBCAC government assessments, formal certification status with defined validity periods, and eMASS as the official recording platform
  • Weighted scoring methodology: 5/3/1 point values per requirement, producing a numerical score out of 110 that is tracked in SPRS
  • POA&M rules and Conditional status: Six prohibited controls that cannot be on a POA&M, the 180-day Conditional window, and the one-shot closeout rule
  • Senior official affirmation: A legal attestation creating personal False Claims Act liability
  • Flow-down and subcontractor requirements: Specific obligations codified at 32 CFR section 170.23
Rev 2 vs Rev 3

NIST published Revision 3 of SP 800-171 in May 2024, significantly restructuring the publication. However, a DoD class deviation keeps CMMC assessments locked to Revision 2 until new rulemaking formally incorporates Rev 3. If you are preparing for a C3PAO assessment, implement Rev 2 fully. Building your program around Rev 3 creates risk of gaps relative to the current assessment standard.

For the complete analysis of the NIST/CMMC relationship, read CMMC and NIST 800-171: What's the Same, What's Different.

Self-Assessment and SPRS: How Scoring Works

Every organization subject to CMMC must have an active, accurate score in the Supplier Performance Risk System (SPRS) before a contracting officer can award an applicable DoD contract. That requirement has been in effect since November 2020 under DFARS 252.204-7012, and it remains true under CMMC.

What SPRS Is

SPRS is a DoD web application that stores contractor performance data, including CMMC self-assessment scores and affirmations. Contracting officers query SPRS to verify compliance status before awarding contracts. Prime contractors can review SPRS submissions from potential subcontractors before sharing CUI or awarding subcontracts.

The Scoring Framework

Level 1 scoring is binary. Each of the 15 practices is either Met (1 point) or Not Met (0 points). Maximum score: 15.

Level 2 scoring is weighted. Each of the 110 requirements carries one of three point values:

  • 5-point requirements (high impact): Critical security controls including multi-factor authentication, malicious code protection, FIPS-validated cryptography, access control policy, and security awareness training
  • 3-point requirements (medium impact): Significant controls with moderate penalty for gaps
  • 1-point requirements (standard): Standard controls with minimal individual impact

Maximum possible score is 110 points. Organizations need a minimum of 88 points (80%) to qualify for Conditional certification. A score below 88, or any of six prohibited controls on the POA&M, results in "No Status."

The SSP Hard Gate

Before any Level 2 SPRS submission, CA.L2-3.12.4 (the System Security Plan requirement) must be Met. If the SSP is Not Met, SPRS returns "No Score." No assessment can be completed without a current SSP.

The Affirmation

After entering the score, a senior official must affirm its accuracy. This is a legal attestation under the False Claims Act. The affirmation must be renewed annually for Level 1, and annually plus at each assessment event for Level 2.

For the complete SPRS submission process, read SPRS 101: How to Submit Your CMMC Self-Assessment Score. For the affirmation implications, read CMMC Affirmation: What It Means to Sign on the Dotted Line.

What a C3PAO Assessment Looks Like

For Level 2 contracts requiring third-party assessment, a Cyber AB-accredited C3PAO conducts an independent evaluation of your environment against all 110 NIST SP 800-171 Rev 2 requirements.

Before the Assessment

The C3PAO reviews your SSP, POA&M, and supporting documentation before arriving on site. Pre-assessment activities include verifying the CMMC Assessment Boundary, reviewing evidence packages, and confirming personnel availability for interviews.

During the Assessment

C3PAO assessors evaluate each requirement using three methods:

  • Examine: Review of documentation, policies, procedures, system configurations, and artifacts
  • Interview: Conversations with system administrators, security staff, HR, end users, and management
  • Test: Technical verification that controls are working as described, including running queries, reviewing logs, testing authentication, and verifying configurations

A requirement is only Met when all used methods are consistent. If the documentation says MFA is enforced but a test shows an account can authenticate with just a password, the requirement is Not Met regardless of what the policy says.

Assessment Outcomes
  • Final Level 2 Certification: All 110 requirements Met. Valid for three years.
  • Conditional Level 2 Certification: Score at or above 88, with open POA&M items (excluding the six prohibited controls). The organization has 180 days to close all POA&M items. The closeout can only be finalized once in eMASS. If any item is still Not Met at closeout, Conditional status terminates and a new full assessment is required.
  • No Status: Score below 88, or any prohibited control on the POA&M.

For the detailed assessment process, read What a CMMC Gap Assessment Actually Looks Like (Step by Step). For evidence expectations, read CMMC Evidence Collection: What Assessors Actually Want to See and What DIBCAC Assessors Actually Want to See: Evidence by Domain.

How to Prepare for CMMC Certification

Preparation for CMMC certification is a structured program, not a one-time project. The organizations that pass C3PAO assessments are the ones that built their programs methodically.

Step 1: Determine Your Level and Scope
  • Identify which CMMC level applies based on your contract clauses and data types. Then define your CMMC Assessment Boundary: every system that processes, stores, or transmits CUI (or FCI), plus every system that provides security protection for those assets.
  • Scoping is the most consequential decision in your program. A well-designed CUI enclave can dramatically reduce assessment scope and cost. Read How to Scope Your CMMC Boundary: Systems, Data, and People for the full scoping methodology.
Step 2: Conduct a Gap Assessment

A professional gap assessment evaluates your current security posture against all applicable requirements. The output is a scored picture of your current state, a projected SPRS score, and a prioritized remediation roadmap.

A thorough gap assessment includes document review, technical testing, and personnel interviews. Gap assessments that skip technical testing will miss implementation gaps that a C3PAO will find.

Step 3: Build Your System Security Plan

The SSP is the CMMC hard gate. It must describe your information system, define the assessment boundary, and document how each requirement is implemented. Implementation descriptions must be specific: name the technology, reference the configuration, describe the enforcement mechanism.

Build the SSP to reflect your current, actual security posture. Aspirational language ("the organization will implement") signals to assessors that the control is Planned, not Implemented. Read Building Your System Security Plan (SSP) for CMMC for the complete SSP development guide.

Step 4: Remediate Gaps

Work through your remediation roadmap in priority order:

  • First priority: Any prohibited controls that are Not Met, the SSP if incomplete, and 5-point requirements pushing the score below 88
  • Second priority: 3-point requirements Not Met, documentation gaps (policies, procedures)
  • Third priority: 1-point requirements Not Met, process improvements
Step 5: Collect Evidence

Evidence must be specific, dated, and traceable to your actual environment. Organize evidence by domain and requirement, following the DIBCAC Objective Evidence Lists as the authoritative reference. All eMASS artifacts require SHA-256 hashing.

Step 6: Submit to SPRS and Affirm

Calculate your accurate score, submit to SPRS, and have your senior official execute the affirmation. If pursuing Conditional certification, ensure your POA&M is realistic and excludes prohibited controls.

Step 7: Engage a C3PAO

Schedule your assessment with adequate lead time. Most organizations need 30 to 90 days of intensive preparation between completing remediation and beginning the assessment. Solicit quotes from multiple C3PAOs via the Cyber AB marketplace at cyberab.org/marketplace.

For choosing a readiness partner, read How to Choose a CMMC RPO: 7 Questions to Ask. For automation opportunities, read CMMC Compliance Automation: What You Can Automate (and What You Cannot).

The Cost of CMMC Compliance

CMMC costs vary significantly based on organization size, existing security posture, IT complexity, and scope. But there are structural facts every contractor should know.

The Four Major Cost Categories
  • Gap assessment and readiness services: A gap assessment that costs less but misses critical technical gaps is not a bargain.
  • Remediation (technology and labor): The largest and most variable component. Technology costs include cloud migration to FedRAMP Moderate (GCC High licensing adds $15-30/user/month), identity and access management upgrades, EDR ($3-15/endpoint/month), SIEM ($1,000-5,000+/month), and MFA hardware ($15-50/token).
  • C3PAO assessment fees: Depends on organization size, scope, and C3PAO. The Cyber AB does not set prices; C3PAOs price competitively.
  • Ongoing compliance: Covering annual training, affirmations, patch management, monitoring, SSP maintenance, and the three-year re-assessment cycle.
CMMC Costs Are Allowable

CMMC compliance costs are allowable costs under DoD contracts. Remediation costs can be included in overhead rates, assessment fees can be proposed as direct costs, and ongoing compliance costs can be built into bid pricing. The full cost does not come out of margin.

Cost Reduction Strategies
  • Scope reduction through enclave design is the highest-leverage cost strategy
  • Leverage existing investments in M365, Azure AD, and EDR licensing
  • Phased remediation using the POA&M to achieve defensible SPRS status incrementally
  • Right-size the RPO engagement to advisory support rather than full program management if your team is capable

For the complete cost analysis, read The Cost of CMMC Compliance: What to Budget and Where to Save. For government assistance programs, read How the DoD Is Helping Small DIB Companies Afford CMMC.

Common Mistakes That Derail CMMC Programs

The Aerojet Rocketdyne settlement was $9 million. A former employee filed a qui tam lawsuit alleging the company misrepresented its cybersecurity compliance on DoD and NASA contracts. That case established that cybersecurity compliance is a material contract requirement under the False Claims Act.

Most CMMC failures are not intentional fraud. They are predictable, preventable mistakes:

  • Waiting for the contract requirement. C3PAO certification has a lead time of 12 to 24 months. Starting when a Phase 2 solicitation arrives means missing the award. Start now.
  • Inflating the SPRS score. An overstated score creates False Claims Act liability when the senior official affirms accuracy. Score accurately, build a credible POA&M, and remediate systematically.
  • Treating the SSP as a checkbox. The aspirational SSP (describing what you intend to implement) and the missing SSP (never built one) are the two most common assessment failures. Build it to reflect current reality, not plans.
  • Mishandling the POA&M. Putting prohibited controls on the POA&M terminates the assessment. The 180-day Conditional closeout is one shot: if any item remains Not Met, Conditional status terminates and a full reassessment is required.

Choosing the wrong partner. An RPO that produces a gap assessment without technical testing leaves you unprepared for a C3PAO that will conduct technical testing. Vet your RPO on credentials, methodology, and references from similar organizations.

For the full analysis, read The 5 CMMC Mistakes That Cost Contractors Millions. For False Claims Act exposure, read The False Claims Act and CMMC: What Defense Contractors Need to Know and The Aerojet Rocketdyne Case: What Every Defense Contractor Should Learn.

Work With NR Labs

NR Labs provides CMMC readiness and ongoing advisory services with certified professionals who have direct experience moving defense contractors from gap assessment through C3PAO certification.

What we provide:

  • CMMC Gap Assessments: Professional assessments using the same evidence standards that DIBCAC and C3PAOs apply, including document review, technical testing, and interviews. You get a real SPRS score projection, not an optimistic one.
  • SSP Development: System Security Plans built to DIBCAC standards with specific, assessor-ready implementation descriptions. No generic templates.
  • Remediation Program Management: Prioritized roadmaps with hands-on support for closing gaps, from enclave design and cloud migration to policy development and evidence collection.
  • SPRS Submission Support: Guided scoring, POA&M development, and senior official affirmation preparation.
  • C3PAO Readiness: Pre-assessment evidence review, interview preparation, and final readiness validation before your C3PAO engagement.
  • Ongoing Compliance: Annual affirmation support, SSP maintenance, and continuous compliance monitoring to maintain certification between assessment cycles.

We work with defense contractors at every level of the supply chain, from small subcontractors pursuing Level 1 to the largest primes preparing for or maintaining their Level 2 C3PAO certification.

Ready to understand where your organization stands? Contact us to schedule a CMMC readiness conversation.