What Is CMMC? A Plain-English Guide for Defense Contractors

CMMC

If you work with the Department of Defense (redesignated the Department of War by executive order, September 2025) and someone just dropped "CMMC" into a conversation or contract requirement and you are not sure what it means, this is the article for you.

CMMC is not optional for defense contractors handling sensitive government data. As of November 2025, it is a legal requirement. What follows is a plain-English explanation of what it is, why it exists, and what it means for your organization.

CMMC Stands for Cybersecurity Maturity Model Certification

CMMC is the Department of Defense's program for verifying that defense contractors have implemented the cybersecurity controls required to protect sensitive government information.

The key word in that sentence is "verifying." Before CMMC, contractors were required to implement security controls, but verification was largely self-reported. A contractor signed a contract clause saying they would protect sensitive data, submitted a score into a government database, and the government mostly had to take their word for it.

CMMC changes that model. For contracts involving the most sensitive data, contractors must now be assessed by an independent third party, not just self-certify.

Why the DoD Built CMMC

The defense supply chain is massive. Over 300,000 companies hold DoD contracts. These range from the large prime contractors you see in the news to small machine shops, software developers, IT service providers, and specialty manufacturers that make up the broader Defense Industrial Base (DIB).

Many of these companies were handling sensitive government data on systems with minimal security controls. Nation-state adversaries, particularly China and Russia, identified the defense supply chain as a softer target than the DoD's own classified networks. By penetrating small and mid-sized contractors, they could gain access to technical designs, acquisition data, and operational information without ever touching a classified system.

The F-35 program is the canonical example. Intelligence reporting indicated that adversaries obtained technical data about the aircraft through defense contractor networks. The data that moves through the supply chain is sensitive enough to cause real damage if compromised, even if it is not classified.

The DoD needed a way to verify that contractors were actually protecting this data, not just checking a box. CMMC is that verification mechanism.

The Data CMMC Is Designed to Protect

CMMC is built around two categories of sensitive government data.

  • Federal Contract Information (FCI) is information provided by or generated for the government under a contract to develop or deliver a product or service. If you receive technical specifications, statement of work details, or government-generated deliverable data under a contract, that is likely FCI. The definition comes from FAR Clause 52.204-21.
  • Controlled Unclassified Information (CUI) is a broader category established by Executive Order 13556. It covers information that requires safeguarding under law, regulation, or government-wide policy but does not rise to the level of classified information. DoD examples of CUI include export-controlled technical data, acquisition-sensitive information, personally identifiable information, and critical program information.

The type of data you handle determines which CMMC level applies to your organization.

CMMC Has Three Levels

CMMC 2.0 organizes requirements into three levels:

  • Level 1 applies to organizations that handle FCI but not CUI. It requires 15 security practices derived directly from FAR Clause 52.204-21. Compliance is verified through an annual self-assessment. This is the entry-level tier covering basic cyber hygiene.
  • Level 2 applies to organizations that handle CUI. It requires full implementation of NIST Special Publication 800-171 Revision 2, which contains 110 security requirements. Depending on the sensitivity of the contract, Level 2 compliance is verified through either a self-assessment or an independent third-party assessment by a Certified Third-Party Assessment Organization (C3PAO).
  • Level 3 applies to the most sensitive contracts. It requires everything in Level 2 plus 24 additional requirements from NIST SP 800-172, for a total of 134. Level 3 assessments are conducted by DIBCAC, the DoD's own assessment team.

CMMC Is Now Law

The CMMC program was established through a process that started with the National Defense Authorization Act (NDAA) for Fiscal Year 2020. After years of development and revision (CMMC 1.0 in 2020, CMMC 2.0 announced in 2021), the final rule was published in 32 CFR Part 170 and DFARS 252.204-7021 took effect on November 10, 2025.

From that date forward, CMMC requirements can appear in DoD solicitations and contracts. The program rolls out in four phases through November 2028, with Phase 1 (November 2025 through November 2026) focused primarily on self-assessments, and later phases phasing in mandatory C3PAO third-party assessments.

If your contract includes DFARS 252.204-7021, you are in scope for CMMC.

What "Certification" Actually Means

CMMC certification is an official determination that your organization meets the requirements for a specific CMMC level. Here is what that looks like in practice:

  • For Level 1: You conduct an annual self-assessment of your organization against the 15 required practices, calculate a score, submit it to the Supplier Performance Risk System (SPRS), and have a senior official affirm its accuracy.
  • For Level 2 (C3PAO): A Cyber AB-accredited C3PAO conducts an on-site assessment of your environment. Their assessment goes into the DoD's eMASS system. You receive either a Final certification (all requirements met) or a Conditional certification (open items on a Plan of Action and Milestones with 180 days to close them out). C3PAO certifications are valid for three years.
  • For Level 3: After achieving Level 2 C3PAO certification, DIBCAC conducts an additional assessment against the 24 additional requirements. Level 3 certifications are also valid for three years.

Who Has to Comply

If you hold a DoD contract that includes DFARS 252.204-7012 (the clause requiring NIST 800-171 compliance for CUI), you are already subject to CMMC requirements or will be shortly. CMMC applies to both prime contractors and subcontractors throughout the defense supply chain.

Prime contractors are responsible for flowing CMMC requirements down to subcontractors. If you are a prime handling CUI and you pass that CUI to a subcontractor, that subcontractor needs at minimum Level 2 certification. Before sharing CUI with any subcontractor, you are required to verify their SPRS submission.

CMMC applies to all companies performing under applicable DoD contracts, both domestic and international. Company size is not an exemption factor.

CMMC does not apply to contracts outside the DoD, classified systems, or contracts where the only government data involved is hardcopy CUI that is never placed on an IT system.

The False Claims Act Exposure

CMMC has legal teeth beyond the risk of losing a contract. Under the False Claims Act (31 U.S.C. § 3729), any contractor who misrepresents their CMMC compliance status can face treble damages and civil penalties. The Act allows private individuals (often former employees) to file qui tam lawsuits on behalf of the government.

The Aerojet Rocketdyne case settled for $9 million after an employee alleged the company misrepresented its cybersecurity posture on DoD and NASA contracts. That settlement established that cybersecurity compliance is a material contract requirement, meaning misrepresentation creates actionable False Claims Act liability.

Every senior official who affirms a CMMC self-assessment is personally attesting to its accuracy. The affirmation is not a formality.

What to Do If You Are Just Starting

If you just learned about CMMC and you are not sure where your organization stands, start with three things:

  1. Check your contract clauses. If DFARS 252.204-7012 or 252.204-7021 is in your contract, you are in scope. Identify what data you handle under the contract (FCI, CUI, or both) and what level applies.
  2. Check your SPRS score. Log into sprs.army.mil and verify whether your organization has an active self-assessment submission. If you have never submitted, you are not compliant with existing requirements, regardless of CMMC phase.
  3. Get a gap assessment. A professional CMMC gap assessment evaluates your current security posture against the applicable requirements, produces a scored SPRS estimate, and gives you a prioritized roadmap to close the gaps. The typical timeline from a gap assessment to C3PAO readiness is 12 to 24 months.

Starting now, before a C3PAO requirement appears in your solicitations, is the only way to avoid being squeezed out of contract awards during the Phase 2 and Phase 3 rollout.

Key Takeaways

  • CMMC is the DoD's program for verifying that defense contractors protect sensitive government data
  • Three levels: Level 1 (15 practices, FCI), Level 2 (110 requirements, CUI), Level 3 (134 requirements, highest sensitivity)
  • Legally effective November 10, 2025 under DFARS 252.204-7021
  • Rolling four-phase implementation through November 2028
  • Annual self-assessment required at Level 1; C3PAO third-party assessment required for most Level 2 CUI contracts
  • False Claims Act liability attaches to misrepresentation of compliance status

Learn More

This article is part of the NR Labs CMMC 101 content series. For a complete, end-to-end resource on the CMMC program, read our CMMC 101: The Complete Guide to CMMC Compliance for Defense Contractors.

Related articles in this series:

  • CMMC Level 1 vs Level 2 vs Level 3: Which One Do You Need?
  • The CMMC Timeline: What's Happening and When (2025-2028)
  • FCI vs CUI: How to Know Which Type of Data You Handle

Ready to understand where your organization stands? NR Labs provides CMMC gap assessments, SSP development, and SPRS submission support for defense contractors at every level of the supply chain. Contact us to schedule a readiness conversation.