Previous All Posts Next

What Is CMMC: Complete Guide for Defense Contractors 2026

Posted: March 27, 2026 to Compliance.

What Is CMMC and Why It Matters in 2026

The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense's program to verify that defense contractors protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) in their systems and networks. After years of development and revision, CMMC 2.0 is now being enforced through new contract requirements appearing in the Defense Federal Acquisition Regulation Supplement (DFARS).

CMMC replaces the self-attestation model under DFARS 252.204-7012, which allowed contractors to self-report their NIST 800-171 compliance. The fundamental problem with self-attestation was that many contractors claimed compliance they did not actually have. CMMC addresses this by requiring third-party assessments for contractors handling CUI at Level 2 and above.

For defense contractors in 2026, CMMC is not a future consideration. It is a current business requirement that affects your ability to bid on and win DoD contracts. The CMMC compliance guide provides the framework, and this article breaks down everything contractors need to know.

CMMC 2.0 Levels Explained

Level 1: Foundational

Level 1 applies to contractors that handle Federal Contract Information (FCI) but not CUI. It includes 15 basic safeguarding practices derived from FAR 52.204-21. These are fundamental security hygiene items that every organization should already implement.

Level 1 practices include:

  • Limit information system access to authorized users
  • Limit information system access to the types of transactions and functions authorized users are permitted to execute
  • Verify and control/limit connections to external information systems
  • Control information posted or processed on publicly accessible information systems
  • Identify information system users, processes acting on behalf of users, or devices
  • Authenticate users, processes, or devices as a prerequisite to allowing access
  • Sanitize or destroy information system media containing FCI before disposal or reuse
  • Limit physical access to organizational information systems, equipment, and operating environments
  • Escort visitors and monitor visitor activity
  • Maintain audit logs of physical access
  • Control and manage physical access devices
  • Monitor, control, and protect organizational communications at external and key internal boundaries
  • Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks
  • Identify, report, and correct information and system flaws in a timely manner
  • Provide protection from malicious code at appropriate locations

Level 1 assessment is self-assessment only, submitted annually to the Supplier Performance Risk System (SPRS).

Level 2: Advanced

Level 2 applies to contractors that handle CUI. It encompasses all 110 security requirements from NIST SP 800-171 Rev. 2 (transitioning to Rev. 3). This is the level that most defense contractors working on DoD programs must achieve.

Level 2 has two assessment paths:

  • Self-assessment: For contracts involving less sensitive CUI, contractors conduct their own assessment and submit results to SPRS. This path will apply to a subset of contracts as determined by the DoD.
  • Third-party assessment (C3PAO): For contracts involving more sensitive CUI, a CMMC Third-Party Assessment Organization (C3PAO) conducts the assessment. The C3PAO verifies that all 110 requirements are implemented and operating effectively.

Level 3: Expert

Level 3 applies to the highest-value programs involving the most sensitive CUI. It adds requirements beyond NIST 800-171 from NIST SP 800-172. Level 3 assessments are conducted by the Defense Contract Management Agency (DCMA). Few contractors will require Level 3 initially, but it will apply to programs with advanced persistent threat (APT) risk profiles.

The CMMC Assessment Process

Preparation Phase

Before scheduling an assessment, complete these preparation steps:

  1. Define your CUI scope: Identify exactly which systems, networks, and personnel handle CUI. Narrowing scope reduces compliance effort and cost.
  2. Implement all NIST 800-171 requirements: Every requirement must be fully implemented with supporting evidence.
  3. Document your SSP: The System Security Plan is the primary assessment artifact. It describes how every requirement is satisfied.
  4. Close POA&M items: While limited POA&Ms may be acceptable, assessors expect substantive progress. Critical requirements cannot have open POA&Ms.
  5. Conduct a readiness assessment: Have an independent party (RPO or consultant) evaluate your readiness before the C3PAO assessment.
  6. Gather evidence: Screenshots, configuration exports, policy documents, training records, audit logs, and other evidence supporting each requirement.

Assessment Phase

The C3PAO assessment typically takes 3 to 5 days on-site for a Level 2 assessment. Assessors will:

  • Review your SSP and supporting documentation
  • Interview key personnel (IT staff, security officer, management)
  • Inspect systems and configurations
  • Test security controls through observation and verification
  • Document findings for each of the 110 requirements as MET, NOT MET, or NOT APPLICABLE

Post-Assessment

If all requirements are MET, you receive CMMC certification valid for 3 years, with annual affirmation required. If requirements are NOT MET, you receive a report detailing deficiencies. You can remediate and request re-assessment. There is no partial certification; you either meet the level requirements or you do not.

Need Help with CMMC Compliance?

Petronella Technology Group is a registered CMMC provider helping defense contractors achieve and maintain certification. Schedule a free consultation or call 919-348-4912.

Common CMMC Compliance Challenges

Scope Creep

The most expensive mistake is allowing CUI to flow throughout your entire network. If CUI touches every system, every system must be in scope for CMMC. Implement CUI enclaves: dedicated, segmented network environments specifically for handling CUI. Keep CUI out of general business systems.

Cloud Service Selection

Cloud services used to process, store, or transmit CUI must meet FedRAMP Moderate baseline (or equivalent). Standard commercial cloud services do not qualify. Microsoft GCC High ($35/user/month), AWS GovCloud, and Google Workspace with Assured Controls are the primary options. Budget for the premium pricing of government cloud services.

MFA Implementation

Multi-factor authentication must be enforced on all accounts accessing CUI, not just admin accounts. This includes VPN access, email, cloud services, and any system in the CUI boundary. MFA must use FIPS-validated cryptographic modules, which eliminates some consumer MFA solutions.

Supply Chain Flow-Down

If your subcontractors handle CUI, they must also achieve CMMC certification. Managing subcontractor compliance adds complexity and timeline risk. Start communicating CMMC requirements to subcontractors immediately.

CMMC Timeline and Enforcement

CMMC requirements are appearing in contracts through a phased rollout:

  • 2025: CMMC requirements begin appearing in select new contracts and renewals
  • 2026: Broader inclusion across DoD contract types
  • 2027-2028: Full enforcement across all applicable DoD contracts

Contractors who wait until CMMC appears in their specific contracts will likely face a bottleneck. C3PAO assessment capacity is limited, and demand is growing. Starting now provides time to remediate gaps, schedule assessments, and achieve certification before it becomes a contract prerequisite.

Frequently Asked Questions

How much does CMMC certification cost?+
Implementation costs range from $30,000 to $500,000+ depending on your current security posture, scope, and environment size. The C3PAO assessment itself typically costs $30,000 to $100,000 for Level 2. Total cost for a small contractor (25 to 50 employees) starting from a basic security posture is typically $50,000 to $150,000.
How long does it take to achieve CMMC Level 2?+
From initial assessment to certification, plan for 6 to 18 months. Organizations with existing NIST 800-171 implementations may achieve certification in 6 to 9 months. Organizations starting from scratch should plan for 12 to 18 months.
Do all defense contractors need CMMC?+
All contractors handling FCI need at minimum Level 1. Contractors handling CUI need Level 2. The specific CMMC level required will be stated in contract solicitations. If you currently have DFARS 252.204-7012 in your contracts, plan for Level 2.
What is the difference between CMMC and NIST 800-171?+
NIST 800-171 defines the security requirements. CMMC is the verification mechanism. CMMC Level 2 maps directly to NIST 800-171 requirements but adds third-party assessment and certification. Under the previous self-attestation model, contractors assessed themselves. Under CMMC, a C3PAO verifies compliance.
Can we use a virtual environment to reduce CMMC scope?+
Yes. Virtual desktop infrastructure (VDI) or cloud-based virtual desktops in a FedRAMP-authorized environment can narrow your CUI boundary. Users access CUI through virtual desktops that are in scope, while their physical workstations may remain out of scope if properly configured.
What happens if we fail the CMMC assessment?+
You receive a report detailing which requirements were not met. You can remediate the deficiencies and schedule a re-assessment. There is no penalty for failing, but you cannot bid on contracts requiring CMMC certification until you pass. Re-assessment fees apply.
Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Achieve Compliance with Expert Guidance

CMMC, HIPAA, NIST, PCI-DSS — we have 80% of documentation pre-written to accelerate your timeline.

Learn About Compliance Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now