Most businesses choose an IT provider based on price alone — and pay for it later. Get matched based on actual fit. →

Compliance Guide · CMMC · 2026

CMMC Compliance Guide for Defense Contractors:
Level 2 IT Requirements and Assessment Prep

CMMC Level 2 requires 110 NIST 800-171 controls, a System Security Plan, and a third-party C3PAO assessment. Most contractors don't know where to start. This guide tells you exactly what needs to be in place — technically and documentarily — before an assessor arrives.

Updated May 2026 28 min read For IT Directors, Contracts Managers & CEOs of Defense Contractors

CMMC Framework Overview: What You Need to Know First

The Cybersecurity Maturity Model Certification (CMMC) is the DoD's framework for verifying that defense contractors and subcontractors have implemented adequate cybersecurity practices to protect sensitive defense information. It was finalized as a rule in December 2024 and is being phased into contracts.

LevelPracticesInformation TypeAssessment TypeWho Needs It
Level 117 practicesFederal Contract Information (FCI)Annual self-attestationContractors with FCI but no CUI
Level 2110 practices (NIST 800-171)Controlled Unclassified Information (CUI)Third-party C3PAO (most); self-attestation for someMost DoD contractors handling CUI
Level 3110+ practices (NIST 800-172)CUI in critical programsDCSA government-ledHighest-priority defense programs

Most defense contractors and subcontractors fall under Level 2. If your contract includes DFARS clause 252.204-7012, you are required to implement NIST SP 800-171 and are on the path to CMMC Level 2 certification.

The 14 Domains of NIST SP 800-171

CMMC Level 2 maps to all 110 controls across NIST 800-171's 14 domains. The domains most commonly associated with significant IT implementation work:

DomainKey IT ControlsCommonly Failed
Access Control (3.1)Least privilege, unique accounts, remote access controls, privileged account managementYes — shared accounts, excessive access
Audit and Accountability (3.3)Event logging, log review, log protection, audit failure alertingYes — logging enabled but not reviewed
Configuration Management (3.4)Baseline configurations, change control, least functionality principleSometimes
Identification and Authentication (3.5)Unique identification, MFA (required for privileged access and remote access)Yes — MFA gaps
Incident Response (3.6)Incident response capability, incident reporting to DoDYes — untested procedures
Maintenance (3.7)Controlled maintenance, sanitization of media used in maintenanceSometimes
Media Protection (3.8)Media access, media transport protection, media sanitizationSometimes
Personnel Security (3.9)Screening of individuals with CUI access, personnel actionsRarely (HR domain)
Physical Protection (3.10)Physical access authorization, visitor control, physical monitoringSometimes
Risk Assessment (3.11)Periodic risk assessments, vulnerability scanningYes — missing documentation
Security Assessment (3.12)Periodic security assessments, POA&M maintenanceYes — SSP not current
System and Communications Protection (3.13)Network segmentation, boundary protection, encryption in transit, key managementYes — segmentation gaps
System and Information Integrity (3.14)Malware protection (EDR), security alerts, patching, spam protectionSometimes — patch management gaps

The System Security Plan (SSP): Your Most Important Document

The SSP is the document that describes how your organization implements each of the 110 NIST 800-171 controls. It is what C3PAO assessors review. A compliant SSP includes:

What assessors actually check

A DCSA assessor told one contractor that their documentation was better than 80% of companies reviewed. That's because their IT provider had done 30+ CMMC assessments and knew exactly what assessors want to see: not just that a control exists, but evidence it's operating. For audit logging: not just "logging is enabled" but a screenshot of the log configuration, a sample log export, and documentation of who reviews logs and how often.

Plan of Action and Milestones (POA&M)

No contractor achieves 100% of the 110 controls before their first assessment. The POA&M is the document where you document the gaps — controls not yet fully implemented — along with your plan and timeline to close them.

Key requirements for a defensible POA&M:

CUI Scoping: The Most Misunderstood Part of CMMC

The single most important decision in CMMC preparation is defining your CUI boundary. The CUI boundary determines which systems, users, and data are in scope for the 110 controls. A smaller, well-defined boundary is significantly easier to certify than a broad, poorly-defined one.

Approaches to CUI boundary definition:

CMMC Assessment Preparation: 90-Day Readiness Checklist

SPRS Score: Where You Stand Before the Assessment

The Supplier Performance Risk System (SPRS) is where contractors self-report their NIST 800-171 implementation score. The scoring methodology assigns a maximum of 110 points and deducts points for unimplemented controls — with higher deductions for higher-risk controls. A perfect score is 110. Many contractors self-report without understanding the methodology and submit inaccurately high scores.

Your SPRS score is visible to DoD contracting officers and can affect contract award decisions. More importantly, submitting an inaccurate (inflated) SPRS score can expose you to False Claims Act liability — intentional misrepresentation of your cybersecurity posture to obtain government contracts has resulted in DOJ investigations and settlements.

Frequently Asked Questions

What is the difference between CMMC Level 1, Level 2, and Level 3?
Level 1 covers 17 basic practices protecting FCI — annual self-attestation. Level 2 covers 110 NIST 800-171 practices protecting CUI — typically requires C3PAO third-party assessment. Level 3 covers additional NIST 800-172 practices for the most critical programs — requires government-led DCSA assessment.
When does CMMC become a contract requirement?
CMMC requirements are being phased into DoD contracts following the December 2024 final rule. Contractors should not wait for a contract to demand certification — the assessment process takes 6–18 months, and waiting until required leaves no time to achieve it.
What is a System Security Plan (SSP) and why does it matter for CMMC?
The SSP is the master document describing how your organization implements each of the 110 NIST 800-171 controls. C3PAO assessors review the SSP to verify your claims. An SSP that doesn't accurately reflect your actual environment — or was written as a template — will fail the assessment.
Free Tool
Does your current IT provider actually support your compliance obligations?
Grade your MSP in 15 questions. Get a letter grade + actionable breakdown.
Take the MSP Scorecard →

Need an MSP That Has Done CMMC Before?

Get matched with IT providers who have taken defense contractors through CMMC Level 2 assessment — not ones who'll learn it on your contract.

Find the Right IT Provider →