Definitive Guide

The Definitive Guide to CMMC 2.0 Compliance

Everything government contractors and defense suppliers need to know about CMMC 2.0 — levels, requirements, assessment process, timelines, and how to prepare for certification.

FK

Farhad Mirza Khawar

Founder of HIPAA Agent and Cyber Defense Agent. Compliance infrastructure for SMBs. Sacramento, CA.

2026-05-01

What is CMMC 2.0?

The Cybersecurity Maturity Model Certification (CMMC) 2.0 is the Department of Defense's framework for ensuring that defense contractors and their supply chains adequately protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI). CMMC 2.0 replaced the original CMMC 1.0 model in November 2021, simplifying the framework from five maturity levels to three and aligning more closely with existing NIST standards. CMMC 2.0 is not optional for DoD contractors. Beginning with phased implementation in 2025 and full enforcement expected by 2026, CMMC certification will be required in DoD contracts as a condition of award. Contractors that cannot demonstrate the required level of cybersecurity maturity will be ineligible to bid on or continue performing DoD contracts. The fundamental purpose of CMMC is to address the persistent problem of contractors self-attesting compliance with NIST SP 800-171 without actually implementing the required controls. CMMC introduces third-party assessments (at Level 2) and government-led assessments (at Level 3) to verify that contractors have actually implemented the cybersecurity practices they claim. This represents a sea change from the honor system that previously governed contractor cybersecurity.

CMMC 2.0 levels explained

CMMC 2.0 defines three certification levels, each building on the previous: Level 1 — Foundational: Level 1 applies to contractors that handle Federal Contract Information (FCI) but not Controlled Unclassified Information (CUI). It requires 17 basic cyber hygiene practices drawn from FAR 52.204-21. Level 1 allows annual self-assessment — no third-party assessment is required. These are fundamental practices like using antivirus software, limiting physical access, and authenticating users. Most small contractors handling only FCI will need Level 1. Level 2 — Advanced: Level 2 applies to contractors that handle CUI and is the level most defense contractors will need. It requires implementation of all 110 security requirements from NIST SP 800-171 Rev 2, organized across 14 control families. Level 2 introduces third-party assessment by a CMMC Third-Party Assessment Organization (C3PAO) for contractors handling critical CUI. Some Level 2 contractors handling non-critical CUI may be permitted to self-assess annually, but the default is third-party assessment every three years. Level 3 — Expert: Level 3 applies to contractors handling the most sensitive CUI and targets advanced persistent threats (APTs). It requires compliance with a subset of NIST SP 800-172 controls in addition to all NIST SP 800-171 requirements. Level 3 assessments are conducted by the government (DIBCAC — the Defense Industrial Base Cybersecurity Assessment Center). Very few contractors will require Level 3, and those that do are typically large defense primes or subcontractors working on classified-adjacent programs.

CMMC 2.0 timeline and implementation

The CMMC 2.0 implementation timeline has evolved since the program was announced, but the current trajectory is clear: CMMC Rule finalization — The CMMC final rule (32 CFR Part 170) was published in October 2024, establishing the program structure, assessment requirements, and certification procedures. The corresponding DFARS rule (48 CFR) that integrates CMMC into contract language is being finalized. Phased rollout — CMMC requirements are being phased into DoD contracts starting in 2025. Phase 1 requires CMMC Level 1 or Level 2 self-assessment. Phase 2 adds third-party assessment requirements for Level 2. Phase 3 extends to Level 3 assessments. Phase 4 completes full implementation across all applicable contracts. Plan of Action and Milestones (POA&M) — CMMC 2.0 allows limited use of Plans of Action and Milestones for contractors that meet most but not all requirements at the time of assessment. However, certain critical controls cannot be on a POA&M — they must be fully implemented. POA&M items must be closed within 180 days of assessment. Contractors should not wait for CMMC to appear in their specific contracts. The time to prepare is now. Assessment backlogs are expected as demand exceeds C3PAO capacity, and contractors that start early will have a significant competitive advantage. Cyber Defense Agent's external scanning provides immediate visibility into your public-facing security posture, which directly impacts multiple CMMC control families including Access Control, System and Communications Protection, and Risk Assessment.

The 14 NIST SP 800-171 control families

CMMC Level 2 is built on the 110 security requirements from NIST SP 800-171, organized into 14 control families. Understanding these families is essential for scoping your compliance effort: Access Control (AC) — 22 requirements governing who can access CUI, how access is authorized, and how it is enforced. Includes remote access controls, wireless access, mobile devices, and session management. Awareness and Training (AT) — 3 requirements for security awareness training for all users and specialized training for personnel with security roles. Audit and Accountability (AU) — 9 requirements for creating, protecting, and retaining audit records sufficient to enable monitoring, analysis, investigation, and reporting. Configuration Management (CM) — 9 requirements for establishing and enforcing security configuration settings, change control, and system inventories. Identification and Authentication (IA) — 11 requirements for identifying and authenticating users, devices, and processes. Includes multi-factor authentication requirements. Incident Response (IR) — 3 requirements for incident response capabilities including preparation, detection, analysis, containment, recovery, and user reporting. Maintenance (MA) — 6 requirements for performing timely maintenance, controlling maintenance tools, and managing remote maintenance. Media Protection (MP) — 9 requirements for protecting, sanitizing, and disposing of media containing CUI. Personnel Security (PS) — 2 requirements for screening personnel and protecting CUI during personnel actions like termination. Physical Protection (PE) — 6 requirements for physical access controls, monitoring, and protection of equipment. Risk Assessment (RA) — 3 requirements for conducting and acting on risk assessments, including vulnerability scanning. Security Assessment (CA) — 4 requirements for assessing, monitoring, and correcting deficiencies in security controls. System and Communications Protection (SC) — 16 requirements for monitoring and protecting communications, including encryption, boundary protection, and network segmentation. System and Information Integrity (SI) — 7 requirements for identifying, reporting, and correcting flaws, including malicious code protection and security alert monitoring.

How Cyber Defense Agent maps to CMMC requirements

While CMMC encompasses both internal and external security controls, Cyber Defense Agent directly addresses the externally verifiable elements of multiple control families: Access Control (AC) — Our scan identifies exposed remote access services, open management ports, and unauthorized network services that violate access control requirements. Risk Assessment (RA) — Continuous external vulnerability scanning feeds directly into RA.L2-3.11.2 (vulnerability scanning) and RA.L2-3.11.3 (remediation of vulnerabilities). System and Communications Protection (SC) — We verify TLS/SSL configuration, encryption standards, DNSSEC implementation, and boundary protection controls that map to SC requirements. System and Information Integrity (SI) — Our monitoring for known vulnerabilities, missing patches (via service version detection), and security misconfigurations addresses SI control requirements. Security Assessment (CA) — Regular Cyber Defense Agent scans satisfy elements of CA.L2-3.12.1 (periodic assessment of security controls) and provide the evidence needed for continuous monitoring. Cyber Defense Score — Your score provides a quantifiable metric that tracks your external security posture over time, supporting both self-assessment and preparation for third-party assessment. Important: Cyber Defense Agent covers the external attack surface. Full CMMC compliance requires internal controls, policies, training, and physical security that are beyond the scope of any external scanning tool. Use CDA as one critical component of your comprehensive CMMC compliance program.

Key Takeaways

TL;DR

CMMC 2.0 has three levels: Level 1 (self-assessment, 17 practices), Level 2 (third-party assessment, 110 NIST SP 800-171 requirements), and Level 3 (government assessment, NIST SP 800-172).

CMMC certification is being phased into DoD contracts starting in 2025, with full enforcement expected by 2026.

Level 2 — required for contractors handling CUI — demands implementation of all 110 NIST SP 800-171 security requirements across 14 control families.

Cyber Defense Agent addresses externally verifiable controls across multiple CMMC control families including Access Control, Risk Assessment, and System and Communications Protection.

Start preparing now — C3PAO assessment capacity is limited and contractors that begin early will have a competitive advantage.

FAQ

Frequently asked questions

Do I need CMMC if I am a subcontractor?

Yes. CMMC requirements flow down to subcontractors at all tiers if they handle FCI or CUI. Prime contractors are required to ensure their subcontractors meet the appropriate CMMC level. The specific level depends on the type of information (FCI vs CUI) the subcontractor handles, not its position in the supply chain.

How much does CMMC Level 2 assessment cost?

C3PAO assessment costs vary based on the size and complexity of your organization. For small to mid-size contractors, expect assessment costs ranging from $30,000 to $100,000 for a Level 2 certification. This does not include the cost of implementing controls and remediating gaps, which can range from $50,000 to $500,000+ depending on your current maturity. Many contractors find that the cost of non-compliance — losing eligibility for DoD contracts — far exceeds the investment in certification.

Can I use a Plan of Action and Milestones (POA&M) to pass my assessment?

CMMC 2.0 allows limited POA&Ms for some requirements that are not fully implemented at the time of assessment. However, certain critical controls (including encryption, MFA, and malicious code protection) cannot be on a POA&M — they must be fully implemented. POA&M items must be closed within 180 days of assessment, and your certification is conditional until they are resolved.

How long does it take to prepare for CMMC Level 2?

For most small to mid-size contractors starting from a limited cybersecurity baseline, expect 12-18 months of preparation. This includes conducting a gap assessment, implementing controls, developing policies and procedures, training personnel, and collecting evidence. Starting with a Cyber Defense Agent scan gives you immediate visibility into your external security gaps.

What happens if I fail my CMMC assessment?

If you fail a C3PAO assessment, you will not receive certification and will be ineligible for DoD contracts requiring that CMMC level. You can remediate the identified gaps and schedule a reassessment, but this takes time and costs additional assessment fees. The best approach is thorough preparation before engaging a C3PAO, including a pre-assessment readiness review.

Get your Cyber Defense Score™ in 60 seconds.

100 tools. No installation. No credit card. Real evidence.