Previous All Posts Next

CMMC Compliance Checklist: Complete 110-Control Guide for 2026

Posted: March 31, 2026 to Blog.

CMMC Compliance Checklist: Complete 110-Control Guide for 2026

This checklist covers every CMMC requirement across all three certification levels. Use it to assess your organization's readiness, identify gaps, and prepare for your C3PAO assessment. Every practice listed here maps directly to the requirements in 32 CFR Part 170 and NIST SP 800-171 Revision 2. Updated for the 2026 enforcement timeline.

The Cybersecurity Maturity Model Certification (CMMC) is no longer a future concern. The Department of Defense is actively including CMMC clauses in new solicitations, and contractors that cannot demonstrate compliance are being excluded from contract awards. Whether you are a prime contractor or a subcontractor anywhere in the defense supply chain, this checklist gives you a concrete, actionable framework for achieving and maintaining certification.

This guide is organized by CMMC level and then by control family, making it usable both as a gap assessment tool and as ongoing evidence tracking for your CMMC compliance program.

What Is CMMC: A Quick Definition

The Cybersecurity Maturity Model Certification (CMMC) is a DoD cybersecurity framework codified in 32 CFR Part 170 that requires defense contractors to verify their implementation of cybersecurity controls before they can receive contract awards involving Federal Contract Information (FCI) or Controlled Unclassified Information (CUI). CMMC replaced the previous self-attestation model under DFARS 252.204-7012 with a structured, three-level certification system that includes both self-assessments and third-party audits.

CMMC has three levels:

  • Level 1 (Foundational): 17 practices from FAR 52.204-21. Self-assessment. Required for contractors handling FCI only.
  • Level 2 (Advanced): 110 practices from NIST SP 800-171 Rev 2. Third-party assessment by a C3PAO. Required for contractors handling CUI.
  • Level 3 (Expert): 110 NIST 800-171 practices plus 24 additional requirements from NIST SP 800-172. Government-led assessment by DIBCAC. Required for the highest-priority programs.

The phased rollout began in 2025 and will cover all applicable contracts by 2028. The CMMC compliance guide provides additional background on the framework's history and structure.

CMMC Level 1 Checklist: 17 Foundational Practices

Level 1 applies to contractors that handle Federal Contract Information (FCI) but not CUI. It requires implementation of 17 basic cybersecurity practices derived from FAR 52.204-21. Level 1 is assessed through annual self-assessment with results submitted to SPRS (Supplier Performance Risk System).

These 17 practices represent the minimum cybersecurity hygiene every federal contractor must meet. Below is the complete list organized by control domain, with plain-language explanations and verification guidance.

Access Control (AC): 4 Practices

  • AC.L1-3.1.1 - Limit system access to authorized users. Only people with a legitimate business need should have access to your information systems. Verify by reviewing your user account list and confirming every account belongs to a current employee, contractor, or authorized service account. Disable or remove accounts for anyone who has left the organization.
  • AC.L1-3.1.2 - Limit system access to authorized transactions and functions. Users should only be able to perform the actions their job requires. Verify by checking that role-based permissions are configured and that no user has administrator access unless specifically required. Common gap: giving everyone local admin rights on their workstation.
  • AC.L1-3.1.20 - Verify and control connections to external systems. Any connections between your network and external systems (cloud services, vendor VPNs, partner networks) must be identified, authorized, and monitored. Verify by maintaining a list of all external connections and reviewing firewall rules.
  • AC.L1-3.1.22 - Control information posted on publicly accessible systems. Ensure that FCI and sensitive information is not posted on public websites, file shares, or other publicly accessible locations. Verify by auditing your public-facing web content and cloud storage permissions.

Identification and Authentication (IA): 2 Practices

  • IA.L1-3.5.1 - Identify system users, processes, and devices. Every user, process, and device accessing your systems must have a unique identifier. No shared accounts. Verify by auditing Active Directory or your identity provider for shared or generic accounts like "frontdesk" or "lab1."
  • IA.L1-3.5.2 - Authenticate users, processes, and devices. Require authentication (passwords, MFA, certificates) before granting access. Verify that no systems allow anonymous access and that password policies meet minimum complexity requirements.

Media Protection (MP): 1 Practice

  • MP.L1-3.8.3 - Sanitize or destroy media before disposal or reuse. Hard drives, USB drives, and any media that contained FCI must be wiped or physically destroyed before disposal. Verify by documenting your media sanitization process and keeping destruction logs.

Physical Protection (PE): 4 Practices

  • PE.L1-3.10.1 - Limit physical access to authorized individuals. Only authorized personnel should be able to physically access your servers, network equipment, and workstations. Verify by checking badge access logs, door locks, and visitor sign-in procedures.
  • PE.L1-3.10.3 - Escort visitors and monitor visitor activity. Visitors must be escorted in areas where FCI is accessible. Verify by reviewing your visitor management process and ensuring sign-in logs are maintained.
  • PE.L1-3.10.4 - Maintain audit logs of physical access. Keep records of who accesses secure areas and when. Verify by reviewing badge system logs or manual sign-in sheets and confirming they are retained for at least 12 months.
  • PE.L1-3.10.5 - Control and manage physical access devices. Keys, badges, and access cards must be tracked and managed. Verify by maintaining an inventory of issued access devices and promptly deactivating devices when employees leave.

System and Communications Protection (SC): 2 Practices

  • SC.L1-3.13.1 - Monitor, control, and protect communications at system boundaries. Firewalls and boundary protection devices must be in place between your network and external networks. Verify by reviewing firewall configurations and confirming that inbound and outbound traffic is filtered.
  • SC.L1-3.13.5 - Implement subnetworks for publicly accessible system components. Public-facing systems (web servers, email gateways) must be separated from your internal network using DMZs or network segmentation. Verify by reviewing your network architecture diagram.

System and Information Integrity (SI): 4 Practices

  • SI.L1-3.14.1 - Identify, report, and correct system flaws in a timely manner. Patch management is required. Apply security patches within a defined timeline (30 days for critical, 90 days for others is common). Verify by running vulnerability scans and reviewing patch compliance reports.
  • SI.L1-3.14.2 - Provide protection from malicious code. Antivirus and anti-malware must be installed on all endpoints and servers. Verify by confirming that signatures are updated regularly and real-time scanning is enabled.
  • SI.L1-3.14.4 - Update malicious code protection mechanisms. Antivirus definitions and engines must be kept current. Verify by checking the last update timestamp on all endpoints and confirming automatic updates are configured.
  • SI.L1-3.14.5 - Perform periodic system and file scans. Regular full-system scans must run in addition to real-time protection. Verify by reviewing scan schedules and confirming weekly or daily scans are configured.
Need Help Tracking Your CMMC Controls?

ComplianceArmor's CMMC module maps every control to your policies, evidence, and POA&M items automatically. Explore the CMMC software or call 919-348-4912.

CMMC Level 2 Checklist: All 110 Requirements by Control Family

Level 2 is where the majority of defense contractors will certify. It maps directly to the 110 security requirements in NIST SP 800-171 Revision 2, organized across 14 control families. A C3PAO (CMMC Third-Party Assessment Organization) must conduct the assessment, which evaluates both technical implementation and documentation including your System Security Plan (SSP) and Plan of Action and Milestones (POA&M).

Below is every control family with its requirement count and key practices. Use this as your working checklist for gap analysis and assessment preparation.

1. Access Control (AC): 22 Requirements

Access Control is the largest control family and the one where assessors find the most gaps. These 22 requirements govern who can access your systems, what they can do, how remote access works, and how you control information flow.

Key requirements include:

  • AC.L2-3.1.3 - Control CUI flow. You must control the flow of CUI in accordance with approved authorizations. This means implementing data loss prevention (DLP) tools, email filtering, and network segmentation to prevent CUI from moving to unauthorized systems or users. Assessors will look for documented data flow diagrams showing where CUI enters, is processed, stored, and exits your environment.
  • AC.L2-3.1.5 - Employ least privilege. Beyond basic role-based access, this requires that users receive only the minimum access necessary for their job function. Verify by reviewing privilege escalation procedures and confirming that privileged accounts are separate from regular user accounts.
  • AC.L2-3.1.12 - Monitor and control remote access. All remote access sessions must be monitored, encrypted, and controlled. VPN connections must terminate at authorized endpoints. Verify by reviewing VPN logs and confirming that split tunneling is disabled or controlled for CUI systems.

Other AC requirements cover session lock timeouts (AC.L2-3.1.10), wireless access restrictions (AC.L2-3.1.16), mobile device connections (AC.L2-3.1.18), and encryption of CUI on mobile devices (AC.L2-3.1.19). Every remote access mechanism in your environment must be documented and secured.

2. Awareness and Training (AT): 3 Requirements

Training requirements are straightforward but frequently handled poorly. These three controls require that all users understand their security responsibilities and that managers and system administrators receive role-specific training.

Key requirements include:

  • AT.L2-3.2.1 - Security awareness for all users. Every person who accesses your systems must complete security awareness training that covers current threats, phishing, social engineering, and CUI handling procedures. Training must be documented and refreshed regularly, typically annually.
  • AT.L2-3.2.2 - Role-based training. System administrators, developers, and managers need additional training specific to their security responsibilities. A generic awareness course alone does not satisfy this requirement.
  • AT.L2-3.2.3 - Insider threat awareness. Users must be trained to recognize and report potential insider threats. This includes understanding indicators of insider threat behavior and knowing the reporting channels.

Petronella Technology Group offers security awareness training programs that cover all three AT requirements and include phishing simulation testing.

3. Audit and Accountability (AU): 9 Requirements

Audit requirements ensure that you are logging security-relevant events, protecting those logs from tampering, and reviewing them regularly. Without proper audit trails, you cannot detect or investigate security incidents.

Key requirements include:

  • AU.L2-3.3.1 - Create and retain audit records. Log successful and failed login attempts, privilege escalation, file access to CUI, configuration changes, and other security-relevant events. Retain logs for a period consistent with your records retention policy (typically 1 to 3 years for CMMC).
  • AU.L2-3.3.2 - Ensure actions can be traced to individual users. Every action in your audit log must be attributable to a specific user. This is why shared accounts are prohibited and why service accounts must be individually tracked.
  • AU.L2-3.3.5 - Correlate audit review, analysis, and reporting. You need a centralized log management or SIEM solution that correlates events across multiple systems. Manual log review of individual servers does not meet this requirement at scale.

Additional AU controls cover alert generation for audit failures (AU.L2-3.3.4), audit log protection (AU.L2-3.3.8), and audit reduction and report generation (AU.L2-3.3.6).

4. Configuration Management (CM): 9 Requirements

Configuration Management controls how your systems are built, documented, and maintained. Poorly configured systems are the most common attack vector in the defense industrial base.

Key requirements include:

  • CM.L2-3.4.1 - Establish and maintain baseline configurations. Every system in your CUI environment must have a documented baseline configuration that includes operating system settings, installed software, patch levels, and security configurations. Gold images and configuration management tools (Group Policy, Intune, Ansible) are the standard approach.
  • CM.L2-3.4.2 - Establish and enforce security configuration settings. Apply security benchmarks such as CIS Benchmarks or DISA STIGs to all systems. Verify compliance with automated scanning tools.
  • CM.L2-3.4.6 - Employ least functionality. Disable unnecessary services, ports, protocols, and software on all systems. A web server should not have database software installed unless required. Common gap: leaving default services running on Windows servers.

Other CM requirements address change management (CM.L2-3.4.3), software usage restrictions (CM.L2-3.4.9), and user-installed software policies (CM.L2-3.4.9).

5. Identification and Authentication (IA): 11 Requirements

IA requirements extend Level 1's basic authentication into multifactor authentication (MFA), password management, and cryptographic authentication mechanisms.

Key requirements include:

  • IA.L2-3.5.3 - Use multifactor authentication. MFA is required for all network access to privileged accounts and for all remote network access. This is one of the most frequently cited gaps. Hardware tokens, authenticator apps, or FIDO2 keys all qualify. SMS-based MFA is allowed but not recommended.
  • IA.L2-3.5.7 - Enforce minimum password complexity. Passwords must meet defined complexity requirements. NIST 800-63B recommends minimum 8 characters with no mandatory complexity rules, but many assessors still expect mixed character types. Document your policy and be consistent.
  • IA.L2-3.5.8 - Prohibit password reuse for a defined number of generations. Users must not be able to reuse previous passwords. Typically enforce a history of at least 12 to 24 passwords.

Additional IA controls cover authenticator management (IA.L2-3.5.4), replay-resistant authentication (IA.L2-3.5.9), and identifier management procedures (IA.L2-3.5.5, IA.L2-3.5.6).

6. Incident Response (IR): 3 Requirements

Three requirements may seem minimal, but each one demands significant documentation and capability. You need a tested incident response plan, the ability to detect and report incidents, and a defined process for tracking and documenting them.

Key requirements include:

  • IR.L2-3.6.1 - Establish incident handling capability. Document an incident response plan that covers preparation, detection, analysis, containment, eradication, and recovery. The plan must identify roles, responsibilities, and escalation procedures. It must be tested (tabletop exercises count) and updated at least annually.
  • IR.L2-3.6.2 - Track, document, and report incidents. Every security incident must be documented from detection through resolution. For CMMC, you must also report cyber incidents involving CUI to the DoD within 72 hours per DFARS 252.204-7012.
  • IR.L2-3.6.3 - Test incident response capability. Conduct tabletop exercises or simulations at least annually. Document the results and any lessons learned. Assessors will ask to see evidence of your most recent test.

7. Maintenance (MA): 6 Requirements

Maintenance controls govern how system maintenance is performed, who performs it, and how maintenance tools and remote maintenance sessions are managed.

Key requirements include:

  • MA.L2-3.7.1 - Perform maintenance on organizational systems. Establish maintenance schedules and document all maintenance activities. This includes both routine patches and hardware repairs.
  • MA.L2-3.7.5 - Require MFA for remote maintenance sessions. Any remote maintenance session must use multifactor authentication and be fully logged. Terminate the session and change credentials when maintenance is complete.
  • MA.L2-3.7.2 - Provide controls on maintenance tools. Tools used for maintenance (diagnostic software, portable drives, remote access tools) must be inspected and approved before use on CUI systems.

8. Media Protection (MP): 9 Requirements

Media protection goes well beyond Level 1's sanitization requirement. Level 2 requires marking, transport protection, storage control, and access restrictions for all media containing CUI.

Key requirements include:

  • MP.L2-3.8.1 - Protect system media containing CUI. Both paper and digital media containing CUI must be physically protected. Locked storage for removable media, restricted access to file servers, and controlled print areas all apply.
  • MP.L2-3.8.2 - Limit access to CUI on system media. Only authorized users should be able to access media containing CUI. Implement access controls on network shares, removable media, and backup tapes.
  • MP.L2-3.8.6 - Implement cryptographic mechanisms for CUI on portable media. USB drives, laptops, and any portable storage containing CUI must use FIPS 140-2 validated encryption. BitLocker with TPM, self-encrypting drives, and encrypted USB devices all qualify.

Additional MP controls cover CUI marking on media (MP.L2-3.8.4), transport protection (MP.L2-3.8.5), and media use restrictions (MP.L2-3.8.7).

Identify Your Compliance Gaps Before Your Assessor Does

ComplianceArmor's gap analysis module benchmarks your current posture against all 110 NIST 800-171 controls and generates a prioritized remediation plan. Start your gap analysis or call 919-348-4912.

9. Personnel Security (PS): 2 Requirements

Personnel Security is the smallest control family but critical. It ensures that people are screened before being given access to CUI and that access is revoked when they leave.

  • PS.L2-3.9.1 - Screen individuals before authorizing access. Background checks must be completed before granting access to systems containing CUI. Define what constitutes an acceptable background check and document the process.
  • PS.L2-3.9.2 - Protect CUI during personnel actions. When employees are terminated or transferred, immediately revoke system access, retrieve badges and devices, and ensure CUI is not removed from the organization. Document offboarding procedures and verify they are followed consistently.

10. Physical Protection (PE): 6 Requirements

Level 2 builds on Level 1's physical protection with additional controls for alternate work sites, equipment protection, and environmental hazards.

Key requirements include:

  • PE.L2-3.10.2 - Protect and monitor physical facility. Implement surveillance cameras, alarm systems, and intrusion detection at facilities where CUI is processed or stored. Monitor these systems continuously or on a defined schedule.
  • PE.L2-3.10.6 - Enforce safeguards for CUI at alternate work sites. Remote workers and teleworkers who access CUI from home offices or other locations must follow defined physical security measures. This includes locked offices, privacy screens, and secure Wi-Fi. Document your telework policy and the security requirements for alternate sites.

11. Risk Assessment (RA): 3 Requirements

Risk assessment is a foundational activity that informs all other security decisions. These three controls require periodic risk assessments, vulnerability scanning, and remediation of discovered vulnerabilities.

  • RA.L2-3.11.1 - Periodically assess risk. Conduct formal risk assessments at least annually, and whenever significant changes occur in your environment. Document the methodology, findings, and risk response decisions. Your risk assessment should cover all 14 control families.
  • RA.L2-3.11.2 - Scan for vulnerabilities periodically and when new vulnerabilities are identified. Run authenticated vulnerability scans at least monthly. Address critical and high vulnerabilities within 30 days. Document scan results and remediation actions.
  • RA.L2-3.11.3 - Remediate vulnerabilities in accordance with assessments of risk. Prioritize vulnerability remediation based on risk. Not every vulnerability needs immediate attention, but your risk-based prioritization must be documented and defensible.

A comprehensive cybersecurity risk assessment should be the starting point for any CMMC compliance program.

12. Security Assessment (CA): 4 Requirements

Security Assessment controls require you to periodically evaluate whether your security controls are working as intended and to develop plans for addressing deficiencies.

  • CA.L2-3.12.1 - Periodically assess security controls. Conduct internal assessments of your security controls at least annually. This is separate from your C3PAO assessment and serves as ongoing due diligence.
  • CA.L2-3.12.2 - Develop and implement plans of action to correct deficiencies. Your POA&M must document every identified deficiency, assign responsibility, set milestones, and track remediation progress. Assessors review your POA&M to understand what gaps exist and whether you have a credible plan to close them.
  • CA.L2-3.12.3 - Monitor security controls on an ongoing basis. Implement continuous monitoring through automated tools (SIEM, vulnerability scanners, configuration compliance tools) to verify that controls remain effective between assessments.
  • CA.L2-3.12.4 - Develop, document, and periodically update system security plans. Your SSP is the central document for your CMMC assessment. It must describe your system boundaries, how each of the 110 controls is implemented, and the security architecture of your CUI environment. Keep it current.

13. System and Communications Protection (SC): 16 Requirements

SC is the second-largest control family and covers encryption, network architecture, and data protection in transit and at rest. These 16 requirements are technically demanding and often require infrastructure changes.

Key requirements include:

  • SC.L2-3.13.8 - Implement cryptographic mechanisms to prevent unauthorized disclosure during transmission. All CUI transmitted across networks must be encrypted using FIPS 140-2 validated cryptography. This applies to email, file transfers, VPN connections, and API communications. TLS 1.2 or higher is the minimum standard.
  • SC.L2-3.13.11 - Employ FIPS-validated cryptography. Cryptographic modules used for CUI protection must be FIPS 140-2 validated. This means using compliant implementations of AES, SHA, and RSA, not just any encryption library. Verify by checking the NIST Cryptographic Module Validation Program (CMVP) list.
  • SC.L2-3.13.16 - Protect confidentiality of CUI at rest. CUI stored on any system must be encrypted at rest. Full disk encryption (BitLocker, FileVault with FIPS mode) and database encryption both qualify, provided the cryptographic module is FIPS 140-2 validated.

Other SC requirements address session authenticity (SC.L2-3.13.9), DNS filtering (SC.L2-3.13.6), collaborative computing devices (SC.L2-3.13.12), and mobile code restrictions (SC.L2-3.13.13).

14. System and Information Integrity (SI): 7 Requirements

SI requirements ensure that your systems are monitored for security issues, that you receive and act on security alerts, and that your systems are protected from malicious code.

Key requirements include:

  • SI.L2-3.14.3 - Monitor security alerts and advisories. Subscribe to vendor security advisories, CISA alerts, and threat intelligence feeds relevant to your technology stack. Act on these alerts within your defined vulnerability management timeline.
  • SI.L2-3.14.6 - Monitor systems to detect attacks and indicators of potential attacks. Deploy intrusion detection and prevention systems (IDS/IPS), endpoint detection and response (EDR), or a managed XDR solution. Passive monitoring alone is insufficient; you need active detection capabilities. Our managed XDR suite provides this capability for organizations that lack in-house SOC resources.
  • SI.L2-3.14.7 - Identify unauthorized use of organizational systems. Implement monitoring to detect unauthorized access patterns, unusual login times, impossible travel scenarios, and unauthorized software installation. Correlate these with your audit logs for investigation.

CMMC Level 3 Additional Requirements

Level 3 applies to the most sensitive DoD programs and adds 24 requirements from NIST SP 800-172 on top of the 110 Level 2 controls. Level 3 assessments are conducted by the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC), a government organization, not a private C3PAO.

The additional Level 3 requirements focus on advanced threat protection:

  • Enhanced threat detection: Implement behavioral analytics, advanced threat hunting, and anomaly detection beyond standard SIEM capabilities.
  • Dual authorization for critical operations: Require two-person authorization for highly sensitive administrative actions such as changing encryption keys or modifying security configurations on CUI systems.
  • Penetration testing: Conduct regular adversary-driven penetration testing that simulates advanced persistent threats (APTs) using current TTPs from the MITRE ATT&CK framework.
  • System resiliency: Design systems to continue operating in a degraded state during cyberattacks and to rapidly recover from incidents.
  • Isolation and segmentation: Implement micro-segmentation and zero trust architecture principles to contain lateral movement from compromised systems.
  • Enhanced incident response: Maintain specialized incident response capabilities including forensic analysis, malware reverse engineering, and threat intelligence integration.

Most defense contractors in the supply chain will not need Level 3. It is reserved for programs where advanced persistent threats from nation-state adversaries are a primary concern. If your contract requires Level 3, you should expect significantly higher costs and a 12 to 24 month implementation timeline.

SPRS Score and Self-Assessment

Every defense contractor handling CUI must calculate and report their SPRS (Supplier Performance Risk System) score. This score quantifies your compliance posture on a scale from -203 to +110, where 110 represents full implementation of all NIST 800-171 controls and -203 represents no implementation at all.

How to Calculate Your SPRS Score

The scoring methodology works as follows:

  • Start with a score of 110 (perfect compliance).
  • For each NIST 800-171 control that is not implemented, subtract the weighted value assigned to that control.
  • Control weights range from 1 to 5 points, based on the security impact of the control.
  • If a control is partially implemented or planned in your POA&M, you still subtract the full weight until it is completely implemented.

Critical controls carry the highest weights. For example, multifactor authentication (IA.L2-3.5.3) carries a weight of 5, meaning its absence drops your score by 5 points. Some access control and encryption requirements also carry 5-point weights.

Reporting Requirements

Under DFARS 252.204-7019, contractors must:

  • Conduct a self-assessment using the DoD Assessment Methodology.
  • Submit the score to SPRS along with the date of the assessment, the scope of the assessment, and the system security plan.
  • Update the score whenever your compliance posture changes materially.
  • Maintain the assessment for review by the contracting officer upon request.

Use our SPRS calculator to estimate your current score and identify the highest-impact controls to implement first.

Assessment Types by CMMC Level

The type of assessment required depends on your certification level. Understanding these differences helps you plan your budget, timeline, and evidence preparation accordingly.

Criteria Level 1 Level 2 Level 3
Assessment type Self-assessment C3PAO (third-party) DIBCAC (government)
Controls assessed 17 (FAR 52.204-21) 110 (NIST 800-171) 110 + 24 (NIST 800-172)
Certification period Annual self-attestation 3 years with annual affirmation 3 years with annual affirmation
Estimated cost $5,000 to $15,000 $50,000 to $200,000 $200,000+
Applies to FCI only CUI Critical CUI programs
POA&M allowed No Yes (limited, 180 days) Yes (limited, 180 days)
SPRS submission Required Required Required
Learn more CMMC overview C3PAO assessment guide NIST compliance

Common Compliance Gaps: Top 10 Most-Failed Controls

Based on assessment data from C3PAOs and our own gap analysis engagements with defense contractors, these are the controls that organizations fail most frequently. Addressing these first will have the greatest impact on your SPRS score and assessment readiness.

1. Multifactor Authentication (IA.L2-3.5.3)

Failure rate: Very high. Many organizations have MFA on email but not on VPN, admin accounts, or cloud services. CMMC requires MFA for all privileged access and all remote access, without exception.

Remediation: Deploy MFA across all remote access entry points and privileged accounts. Use hardware tokens or authenticator apps. Enforce MFA through conditional access policies in Azure AD or your identity provider.

2. FIPS 140-2 Validated Encryption (SC.L2-3.13.11)

Failure rate: Very high. Organizations use encryption but cannot verify that their implementation is FIPS 140-2 validated. Standard BitLocker without FIPS mode enabled does not qualify. Most commercial VPN and email encryption tools are not FIPS-validated by default.

Remediation: Enable FIPS mode in Windows (Group Policy), verify VPN concentrators use FIPS-validated firmware, and confirm TLS implementations use FIPS-compliant cipher suites.

3. System Security Plan (CA.L2-3.12.4)

Failure rate: High. Many contractors either have no SSP, have an outdated SSP, or have an SSP that does not accurately describe their CUI environment. The SSP is the first document assessors request and the foundation of your entire assessment.

Remediation: Create or update your SSP to accurately document your CUI boundary, system architecture, data flows, and how each of the 110 controls is implemented. Review and update it quarterly.

4. Audit Log Review (AU.L2-3.3.1, AU.L2-3.3.5)

Failure rate: High. Organizations collect logs but do not review them. CMMC requires active log review and correlation, not just storage. Without SIEM or centralized logging, this requirement is nearly impossible to meet at scale.

Remediation: Deploy a SIEM solution, define alert rules for security events, and assign responsibility for daily or weekly log review. Document your review process and retain evidence of reviews performed.

5. CUI Data Flow Documentation (AC.L2-3.1.3)

Failure rate: High. Most organizations cannot clearly articulate where CUI enters their environment, how it moves through their systems, where it is stored, and how it exits. Without documented data flows, you cannot define your CUI boundary or demonstrate that you are protecting CUI consistently.

Remediation: Create data flow diagrams that show CUI ingress, processing, storage, and egress points. Map these to your network architecture and identify all systems within your CUI boundary.

6. Vulnerability Scanning and Remediation (RA.L2-3.11.2, RA.L2-3.11.3)

Failure rate: Moderate to high. Some organizations scan monthly but do not remediate findings within their defined timelines. Others scan only quarterly, which is insufficient.

Remediation: Implement authenticated vulnerability scanning on a monthly schedule. Define SLA timelines (30 days for critical, 60 for high, 90 for medium) and track remediation in your POA&M.

7. Incident Response Testing (IR.L2-3.6.3)

Failure rate: Moderate to high. Organizations have incident response plans but never test them. An untested plan gives false confidence and often fails during actual incidents.

Remediation: Conduct at least one tabletop exercise annually using a realistic CUI breach scenario. Document the exercise, participants, findings, and improvements made to the plan.

8. Configuration Baselines (CM.L2-3.4.1)

Failure rate: Moderate. Organizations deploy systems without documented baseline configurations, making it impossible to verify that security settings are consistent and compliant.

Remediation: Create gold images for each system role (workstation, server, domain controller) with CIS Benchmarks or DISA STIGs applied. Enforce configurations through Group Policy, Intune, or configuration management tools.

9. Media Protection and Encryption of Portable Devices (MP.L2-3.8.6)

Failure rate: Moderate. USB drives without encryption, laptops without full-disk encryption, and uncontrolled use of personal devices are common findings.

Remediation: Enforce BitLocker with FIPS mode on all laptops, block unauthorized USB devices through endpoint management policies, and implement encrypted USB drive solutions for any required portable media.

10. Least Privilege and Account Management (AC.L2-3.1.5, AC.L2-3.1.7)

Failure rate: Moderate. Users with excessive privileges, shared administrator accounts, and dormant accounts that were never deactivated are common findings across organizations of all sizes.

Remediation: Conduct quarterly access reviews. Ensure privileged accounts are separate from daily-use accounts. Implement just-in-time privileged access where possible. Disable accounts within 24 hours of personnel departure.

Close Every Gap with ComplianceArmor

ComplianceArmor generates your SSP, POA&M, policies, and procedures for all 14 control families. Automated evidence mapping across all 110 controls. Learn about ComplianceArmor or schedule a free consultation.

CMMC Rollout Timeline and Deadlines

Understanding the phased rollout schedule is critical for planning your compliance timeline. The DoD published the final CMMC rule (32 CFR Part 170) in late 2024, with enforcement beginning in 2025.

Phase 1 (2025)

CMMC Level 1 self-assessments and Level 2 self-assessments begin appearing in new solicitations. Contractors must have a current SPRS score submitted. The DoD can include CMMC requirements in any new contract or contract renewal at its discretion.

Phase 2 (2026)

Level 2 C3PAO assessments become required for contracts involving CUI where the DoD determines third-party assessment is necessary. This is the phase most contractors are preparing for now. The demand for C3PAO assessments is expected to far exceed supply, creating scheduling bottlenecks. Contractors who wait until a solicitation requires certification before starting their compliance program will likely miss bid deadlines.

Phase 3 (2027)

Level 2 C3PAO assessments are required for all contracts involving CUI. Level 3 DIBCAC assessments begin for the most sensitive programs. CMMC requirements are included in option exercises and contract modifications, not just new awards.

Phase 4 (2028)

Full enforcement. CMMC certification is required for all applicable DoD contracts. The contract clause DFARS 252.204-7021 is included in all solicitations and contracts involving FCI or CUI. No exceptions, no extensions.

Key Contract Clause: DFARS 252.204-7021

This is the contract clause that makes CMMC a binding requirement. When this clause appears in a solicitation or contract, the contractor must:

  • Have a current CMMC certification at the level specified in the contract.
  • Maintain certification throughout the period of performance.
  • Flow down the requirement to subcontractors that will process, store, or transmit FCI or CUI.
  • Provide certification status to the contracting officer upon request.

Organizations that have not begun their compliance journey should start immediately. A realistic timeline from initial gap assessment to certification-ready status is 6 to 18 months, and C3PAO scheduling delays can add another 3 to 6 months.

How ComplianceArmor Automates This Checklist

Manually tracking 110 controls, writing policies for 14 control families, maintaining your SSP, managing your POA&M, and preparing assessment evidence is a massive administrative burden. This is exactly the problem ComplianceArmor was built to solve.

ComplianceArmor automates the most time-consuming parts of CMMC compliance:

  • Policy and procedure generation: Generates CMMC-aligned policies and procedures for all 14 control families. Each document maps directly to the specific NIST 800-171 requirements it satisfies, so assessors can trace every control to its supporting documentation.
  • System Security Plan (SSP): Produces a complete SSP template populated with your organization's information, system boundaries, and control implementation descriptions. Updated automatically as your environment changes.
  • POA&M management: Tracks every open deficiency with responsible parties, milestones, estimated completion dates, and risk ratings. Generates the POA&M in the format assessors expect.
  • SPRS score calculation: Calculates your current SPRS score based on your control implementation status and updates it in real time as you close gaps.
  • Evidence mapping: Maps your technical evidence (screenshots, configurations, scan results) to the specific controls they support. When your assessor asks to see evidence for AC.L2-3.1.3, you can produce it in seconds rather than searching through folders.
  • Gap analysis: Compares your current posture against all 110 requirements and generates a prioritized remediation roadmap based on SPRS scoring weights and implementation difficulty.

Organizations using ComplianceArmor typically reduce their documentation preparation time by 60 to 80 percent and enter their C3PAO assessment with higher confidence because every control is mapped, documented, and evidenced before the assessor arrives.

Next Steps: From Checklist to Certification

This checklist gives you visibility into every requirement across CMMC Levels 1, 2, and 3. The path from checklist to certification follows a consistent sequence:

  1. Scope your CUI environment. Define exactly where CUI enters, is processed, stored, and exits your organization. Reducing your CUI boundary reduces the number of systems that must comply.
  2. Conduct a gap assessment. Evaluate your current posture against all applicable controls. Use the ComplianceArmor gap analysis or engage a qualified assessor.
  3. Calculate your SPRS score. Know where you stand today. Use the SPRS calculator to identify the highest-impact controls to implement first.
  4. Build your remediation plan. Prioritize controls by SPRS weight, implementation difficulty, and dependencies. Focus on the top 10 most-failed controls listed above.
  5. Implement controls and document everything. Every control needs both technical implementation and supporting documentation. Your SSP, policies, procedures, and evidence must be complete.
  6. Conduct an internal assessment. Before scheduling your C3PAO, do a full dry run. Fix everything the internal assessment finds.
  7. Schedule and complete your C3PAO assessment. Understand the C3PAO assessment process before your assessor arrives.

If you need help at any stage of this process, Petronella Technology Group has guided hundreds of defense contractors through CMMC compliance from initial assessment to certification. Our team holds CMMC Registered Practitioner credentials and has direct experience with C3PAO assessment preparation.

Ready to Start Your CMMC Journey?

From gap assessment to certification, we handle the heavy lifting. Schedule a free consultation or call 919-348-4912.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Need Cybersecurity or Compliance Help?

Schedule a free consultation with our cybersecurity experts to discuss your security needs.

Schedule Free Consultation
Previous All Posts Next
Free cybersecurity consultation available Schedule Now