Previous All Posts Next

CMMC Final Rule Implementation: The Complete Timeline, Requirements, and Preparation Guide for Defense Contractors

Posted: March 6, 2026 to Compliance.

CMMC Final Rule Implementation: The Complete Timeline, Requirements, and Preparation Guide for Defense Contractors

The CMMC final rule is now in effect, and defense contractors who have been waiting to begin their compliance journey are running out of time. The Department of Defense is actively incorporating CMMC requirements into contracts, and organizations without certification or a credible path to certification are being excluded from competitive bidding. The era of self-attestation without verification is ending.

This guide provides a comprehensive overview of the CMMC final rule as implemented in 2026, including the certification levels, assessment requirements, timeline milestones, and the specific steps defense contractors must take to achieve and maintain compliance.

CMMC 2.0 Final Rule: What Changed

Simplified to Three Levels

The CMMC 2.0 final rule streamlined the original five-level model to three levels:

Level 1 (Foundational): 15 practices based on FAR 52.204-21. Self-assessment with annual affirmation. Required for contracts involving Federal Contract Information (FCI) only.

Level 2 (Advanced): 110 practices aligned with NIST SP 800-171 Rev 2. Third-party assessment by a C3PAO (Certified Third-Party Assessment Organization) for most contracts. Self-assessment permitted for select non-critical contracts. Required for contracts involving Controlled Unclassified Information (CUI).

Level 3 (Expert): 110+ practices with additional requirements from NIST SP 800-172. Government-led assessment by DIBCAC. Required for contracts involving the most sensitive CUI and critical programs.

Plans of Action and Milestones (POA&Ms)

The final rule allows limited use of POA&Ms for Level 2 assessments. Organizations can achieve conditional certification with a POA&M for certain practices, provided they close the gaps within 180 days. However, not all practices are eligible for POA&M treatment. Critical security controls must be fully implemented at the time of assessment.

SPRS Score Requirements

Defense contractors must submit their Supplier Performance Risk System (SPRS score) based on their NIST 800-171 self-assessment. The SPRS score ranges from -203 to 110, with 110 representing full implementation of all 110 practices. A score below 110 indicates gaps that must be addressed. The SPRS score serves as a pre-assessment indicator but does not replace formal CMMC certification.

Implementation Timeline

Phase 1 (Active Now)

CMMC Level 1 self-assessments and Level 2 self-assessments for applicable contracts are required now. Contracting officers are including CMMC requirements in new solicitations. Organizations must have current SPRS scores posted to demonstrate compliance progress.

Phase 2 (Rolling Out)

Level 2 third-party assessments by C3PAOs are being required for contracts involving CUI. The C3PAO ecosystem is expanding but assessment capacity remains constrained. Early scheduling of assessments is critical as demand exceeds supply.

Phase 3 (Coming)

Level 3 government assessments will be required for the most sensitive programs. DIBCAC assessment scheduling has extended lead times. Organizations anticipating Level 3 requirements should begin preparation immediately.

Phase 4 (Full Enforcement)

Full CMMC implementation across all applicable DoD contracts. Organizations without appropriate certification will be ineligible to compete for or receive contract awards.

The Path to CMMC Certification

Step 1: Determine Your Required Level

Review your current and anticipated contracts to determine whether you handle FCI only (Level 1), CUI (Level 2), or critical CUI (Level 3). If you are unsure what information your contracts involve, consult with your contracting officer. Many organizations discover they handle CUI that they did not previously identify.

Step 2: Conduct a Gap Assessment

Evaluate your current security posture against the applicable CMMC requirements. For Level 2, this means a thorough assessment against all 110 NIST 800-171 practices. Document your current implementation status for each practice, identify gaps, and estimate the effort required to close them. Professional gap assessments provide the most accurate picture.

Step 3: Develop a Remediation Plan

Prioritize gaps based on the risk they represent and the effort required to close them. Some practices require technology implementation while others require policy development, training, or process changes. Many organizations find that the most challenging practices involve access control, audit and accountability, and system and communications protection.

Step 4: Implement Controls

Execute your remediation plan, implementing the technical, administrative, and physical controls required for your target CMMC level. This is typically the longest phase, taking six to eighteen months depending on the size of your gaps and the complexity of your environment. Do not underestimate the effort required for documentation, policy development, and employee training.

Step 5: Prepare for Assessment

Before scheduling your formal assessment, conduct an internal readiness review or engage a consultant for a pre-assessment. This identifies any remaining gaps and gives your team practice in demonstrating compliance to assessors. Prepare your System Security Plan, POA&M documentation, network diagrams, and evidence of practice implementation.

Step 6: Schedule and Complete Assessment

For Level 2, engage a C3PAO for your formal assessment. C3PAO availability varies by region and demand. Schedule your assessment three to six months in advance to secure your preferred timeline. The assessment itself typically takes three to five days on-site depending on the size and complexity of your environment.

Common CMMC Compliance Challenges

Scoping the CUI Environment

Defining the boundary of your CUI environment is one of the most critical and frequently mishandled steps. An environment that is too broadly scoped means more systems, users, and controls to manage. An environment that is too narrowly scoped risks leaving CUI unprotected. Proper scoping requires understanding data flows, identifying all systems that process, store, or transmit CUI, and implementing boundary protections.

Multi-Factor Authentication

MFA implementation across all applicable systems is a common gap. CMMC requires MFA for remote access and for privileged accounts at a minimum. Many organizations struggle with MFA implementation for legacy systems, industrial control systems, and applications that do not natively support modern authentication protocols.

Audit Log Management

CMMC requires comprehensive audit logging including user activity, system events, and security-relevant actions. Organizations must protect audit logs from unauthorized access and modification, retain them for specified periods, and review them regularly. Many businesses lack centralized log management and the SIEM capabilities needed to meet these requirements.

Encryption Requirements

CUI must be encrypted at rest and in transit using FIPS 140-2 validated cryptographic modules. This requirement affects data storage, email communications, file transfers, backup systems, and mobile devices. Implementing FIPS-validated encryption across all CUI touchpoints is a significant technical undertaking.

How Petronella Technology Group Supports CMMC Compliance

Our CMMC compliance services cover the full journey from initial gap assessment through certification and ongoing maintenance. We help defense contractors scope their CUI environments, implement the 110 NIST 800-171 practices, prepare documentation for assessors, and maintain compliance between assessments. Our team includes professionals with direct experience in DoD cybersecurity requirements and CMMC assessment preparation.

Frequently Asked Questions

How much does CMMC certification cost?

Total costs depend on your current security posture and target level. Gap assessment and remediation for Level 2 typically costs $50,000 to $250,000 for a small to mid-size contractor. The C3PAO assessment itself costs $20,000 to $80,000. Ongoing compliance maintenance adds $2,000 to $10,000 monthly. These costs must be factored into your contract pricing.

How long does it take to get CMMC certified?

From starting your compliance journey to achieving certification, most organizations need 12 to 24 months. Organizations with mature IT environments and existing NIST 800-171 implementation may achieve certification faster. Organizations starting from scratch typically need 18 to 24 months for Level 2.

Can we use a managed service provider for CMMC compliance?

Yes. Many defense contractors, especially small businesses, use managed service providers to implement and maintain the technical controls required for CMMC. The MSP must meet CMMC requirements themselves and operate as part of your documented CUI boundary. Contact us to discuss how our managed services support CMMC compliance.

What happens if we fail the CMMC assessment?

If you do not achieve your target CMMC level, you receive a report identifying the gaps. You can remediate the gaps and schedule a reassessment. However, you cannot receive contract awards requiring that CMMC level until you achieve certification. Failed assessments also consume time and assessment fees, so thorough preparation is essential.

Do subcontractors need CMMC certification?

Yes. CMMC requirements flow down to subcontractors who handle FCI or CUI. Prime contractors are responsible for ensuring their subcontractors meet applicable CMMC levels. Subcontractor compliance verification is increasingly a condition of teaming agreements and subcontract awards.

Need help preparing for your CMMC assessment? Contact Petronella Technology Group for a gap assessment and remediation plan. Our Training Academy offers CMMC awareness and preparation courses for defense contractor personnel.


Related Resources

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment
Craig Petronella
Craig Petronella
CEO & Founder, Petronella Technology Group | CMMC Registered Practitioner

Craig Petronella is a cybersecurity expert with over 24 years of experience protecting businesses from cyber threats. As founder of Petronella Technology Group, he has helped over 2,500 organizations strengthen their security posture, achieve compliance, and respond to incidents.

Related Service
Achieve Compliance with Expert Guidance

CMMC, HIPAA, NIST, PCI-DSS — we have 80% of documentation pre-written to accelerate your timeline.

Learn About Compliance Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now