CMMC Level 1 vs Level 2 vs Level 3: Which One Do You Need?

CMMC

The first question every defense contractor asks about CMMC is: which level applies to me?

The answer is not based on your company size, your revenue, or how long you have been in the defense industry. It comes down to one thing: the type of data in your Department of Defense (redesignated the Department of War by executive order, September 2025) (DoD) contracts. Get this determination right and you know exactly what you are building toward. Get it wrong and you either waste money over-engineering for requirements you do not have, or you underprepare and fail an assessment.

This article breaks down all three CMMC levels, what each one requires, how compliance is verified, and how to determine which applies to your organization.

CMMC Level 1: Foundational

Who It Applies To

Level 1 applies to organizations that handle Federal Contract Information (FCI) but do not handle Controlled Unclassified Information (CUI).

FCI is information provided by or generated for the government under a contract to develop or deliver a product or service. If your company manufactures a component under a DoD contract, provides administrative support services, or delivers professional services where you receive contract-specific government-generated data that has not been approved for public release, that is FCI.

If your work involves only FCI and no CUI, Level 1 is your target.

What It Requires

Level 1 has 15 security practices, all drawn directly from FAR Clause 52.204-21. These practices are distributed across six security domains:

Access Control (4 practices)

  • Limit system access to authorized users
  • Limit access to permitted transactions and functions
  • Verify and control connections to external systems
  • Control information posted on publicly accessible systems

Identification and Authentication (2 practices)

  • Identify system users, processes, and devices
  • Authenticate the identities of users, processes, and devices

Media Protection (1 practice)

  • Sanitize or destroy media containing FCI before disposal or reuse

Physical Protection (2 practices)

  • Limit physical access to systems and facilities to authorized individuals
  • Escort visitors and maintain physical access logs

System and Communications Protection (2 practices)

  • Monitor, control, and protect organizational communications at external boundaries
  • Implement subnetworks for publicly accessible system components

System and Information Integrity (4 practices)

  • Identify and remediate system flaws in a timely manner
  • Provide protection from malicious code
  • Update malicious code protection mechanisms
  • Perform periodic and real-time scans for malicious code

How Compliance Is Verified

Level 1 compliance is verified through an annual self-assessment. Your organization scores itself against each of the 15 practices (Met = 1 point, Not Met = 0 points), submits the score to SPRS, and a senior official affirms the accuracy of the submission. This affirmation must be renewed annually.

There is no third-party assessment requirement for Level 1. The organization conducts its own assessment, but the senior official affirmation creates False Claims Act liability for misrepresentation. This is why organizations hire third parties like NR Labs to help with Level 1 prep and submission, the penalties are costly at Level 1 as well.

What Level 1 Looks Like in Practice

For most organizations, Level 1 represents a baseline of operational IT hygiene. If you have active directory with managed user accounts, antivirus software, a firewall, and documented procedures for removing access when employees leave, you are likely close to Level 1 compliance. The gaps are frequently in documentation, media disposal procedures, and formal visitor logging rather than major technical deficiencies.

CMMC Level 2: Advanced

Who It Applies To

Level 2 applies to organizations that handle Controlled Unclassified Information (CUI). CUI is a broad category established by Executive Order 13556 covering government-created or possessed information that requires safeguarding under law, regulation, or government-wide policy but does not rise to the level of classified information.

If your contract contains DFARS 252.204-7012, your work involves CUI. Common examples include technical specifications for defense systems, export-controlled data (ITAR/EAR), acquisition-sensitive information, proprietary drawings or designs provided by the government, and certain personnel information.

Level 2 is the level that applies to the majority of defense contractors currently subject to DFARS 252.204-7012, which is most of the defense industrial base.

What It Requires

Level 2 requires full implementation of NIST SP 800-171 Revision 2, which contains 110 security requirements across 14 security families. This is a substantially more demanding standard than Level 1.

Where Level 1 covers basic access control and hygiene, Level 2 adds requirements for:

  • Comprehensive audit logging and review
  • Configuration management baselines and change control
  • Incident response planning and execution
  • System maintenance controls and remote maintenance restrictions
  • Detailed risk assessment processes
  • Security assessment and continuous monitoring
  • Multi-factor authentication
  • FIPS-validated encryption for CUI at rest and in transit
  • Media protection including CUI marking and handling
  • Personnel security screening and termination procedures

The full scope of NIST 800-171 Rev 2 represents a professional-grade enterprise security program, not just IT hygiene.

How Compliance Is Verified

Level 2 verification depends on the sensitivity of the specific program:

Self-assessment: Some Level 2 contracts allow the organization to self-assess against all 110 requirements, calculate a weighted score out of 110 points, submit to SPRS, and have a senior official affirm. During Phase 1 of CMMC implementation (November 2025 through November 2026), self-assessment is the primary mode for most Level 2 contracts.

C3PAO third-party assessment: For contracts where the contracting officer requires third-party assessment, a Cyber AB-accredited C3PAO conducts an independent assessment. The C3PAO documents findings in eMASS, and the result is either a Final Level 2 certification (all requirements Met) or a Conditional Level 2 certification (some items open on a POA&M, with 180 days to close). C3PAO certifications are valid for three years.

The weighted scoring system for Level 2 is defined in 32 CFR § 170.24:

  • 5-point requirements: High-impact controls (multi-factor authentication, malicious code protection, FIPS encryption, and others). There are no partial points for these.
  • 3-point requirements: Medium-impact controls.
  • 1-point requirements: Standard controls.

Maximum possible score is 110 points. Organizations need a minimum score of 88 points (80%) to be eligible for Conditional certification. A score below 88, or any of the six prohibited controls on the POA&M, results in "No Status" and prevents certification.

What Level 2 Looks Like in Practice

Level 2 is a multi-year program for most organizations. A company with a mature IT environment and an existing NIST 800-171 implementation might need 12 months to achieve C3PAO readiness. A company starting from scratch typically needs 18 to 24 months.

The most common gaps found in Level 2 gap assessments are: incomplete or absent System Security Plan (SSP), missing audit logging with review procedures, lack of FIPS-validated encryption, absent or informal incident response procedures, and inadequate configuration management baselines.

CMMC Level 3: Expert

Who It Applies To

Level 3 applies to organizations working on the most sensitive DoD programs, where CUI has been specifically designated as high-value target data requiring the highest level of protection. These programs are typically identified at the program office level. The contracting officer and program manager will specify Level 3 if it applies.

If you are not certain whether Level 3 applies to your contract, it almost certainly does not. Level 3 is a relatively small portion of the total contract base.

What It Requires

Level 3 requires all 110 Level 2 requirements plus 24 additional requirements selected from NIST SP 800-172, for a total of 134. The additional requirements represent enhanced protections specifically designed to defend against Advanced Persistent Threat (APT) actors.

The 24 additional requirements span areas including enhanced access control (such as just-in-time privileged access), advanced configuration management, penetration testing, threat hunting, supply chain risk management for security-critical components, and enhanced audit analysis capabilities.

How Compliance Is Verified

Level 3 assessments are conducted exclusively by DIBCAC, the Defense Industrial Base Cybersecurity Assessment Center, a government assessment team. No C3PAO can conduct a Level 3 assessment.

Before pursuing Level 3, an organization must have a current, valid Level 2 C3PAO certification on file. DIBCAC conducts its own assessment of the 24 additional Level 3 requirements. Level 3 certifications are valid for three years.

How to Determine Your Level

The determination is contract-driven. Follow this logic:

Step 1: Review your contract clauses.

  • If you see FAR 52.204-21 and no DFARS 252.204-7012: You likely handle FCI only. Level 1.
  • If you see DFARS 252.204-7012 or DFARS 252.204-7021: You handle CUI. Level 2 at minimum.
  • If the contracting officer specifies Level 3 in the CMMC requirements: Level 3.

Step 2: Trace the data. Look at what government information your organization actually receives, processes, stores, or transmits. Talk to your program managers and contracts team. If CUI flows to your systems, Level 2 applies regardless of whether the contract clause is present.

Step 3: When in doubt, default to Level 2. If you are genuinely uncertain whether your data is FCI or CUI, operate as if it is CUI. The cost of under-preparing for Level 2 is far higher than the cost of over-preparing.

One Level Does Not Cover Your Entire Organization

A company can have contracts at multiple levels simultaneously. A prime contractor might hold one contract requiring Level 1 (FCI, no CUI) and another requiring Level 2 (CUI involved). In that case, the organization needs Level 2 certification, which also satisfies Level 1. Level 2 is a superset of Level 1.

The CMMC Assessment Boundary for each contract is defined separately. Ideally, your entire IT environment is brought to Level 2 rather than trying to create separate environments for Level 1 and Level 2 contracts. Maintaining a segmented environment to reduce assessment scope can be cost-effective for large organizations, but for small and mid-sized contractors, a single Level 2-compliant environment is simpler to manage.

Key Takeaways

  • Level 1 = FCI data, 15 practices, annual self-assessment
  • Level 2 = CUI data, 110 requirements, self-assessment or C3PAO, 3-year cycle
  • Level 3 = highest-sensitivity CUI, 134 requirements, government-conducted DIBCAC assessment
  • The determining factor is the type of data in your contract, not company size
  • Level 2 is a superset of Level 1; having Level 2 certification satisfies Level 1 requirements

Learn More

For a complete overview of the CMMC program, see the CMMC 101: The Complete Guide to CMMC Compliance for Defense Contractors.

Related articles in this series:

Not sure which level applies to your contracts? NR Labs can review your contract clauses, trace your data flows, and give you a definitive answer along with a gap assessment scoped to your actual requirements. Contact us to get started.