CMMC Compliance Checklist 2026: Complete Requirements Guide
Posted: March 6, 2026 to Compliance.
CMMC Compliance Checklist 2026: What Every Defense Contractor Must Know
The Cybersecurity Maturity Model Certification (CMMC) 2.0 framework is now fully enforceable, and defense contractors who fail to meet its requirements risk losing their Department of Defense contracts entirely. After spending more than two decades helping organizations navigate federal cybersecurity mandates, I can tell you that CMMC compliance is not something you can improvise. It requires methodical preparation, documented evidence, and a clear understanding of every control domain.
This checklist covers everything you need to prepare for CMMC Level 1 and Level 2 certification in 2026. Whether you are a small machine shop with a single DoD contract or a mid-size defense subcontractor handling Controlled Unclassified Information (CUI), this guide will walk you through the requirements step by step.
Understanding CMMC 2.0 Levels
CMMC 2.0 simplified the original five-level model into three tiers. Each level builds on the one below it, and the certification level you need depends on the type of information you handle.
Level 1: Foundational
Level 1 applies to contractors who handle Federal Contract Information (FCI) but not CUI. It requires compliance with 17 practices drawn from FAR 52.204-21. Self-assessment is permitted at this level, and results must be submitted to the Supplier Performance Risk System (SPRS).
Level 2: Advanced
Level 2 applies to contractors who handle CUI. It requires full implementation of all 110 security controls from NIST SP 800-171 Revision 2. Most Level 2 contractors will require a third-party assessment by a CMMC Third-Party Assessment Organization (C3PAO). A subset of Level 2 contractors may qualify for self-assessment depending on the sensitivity of the CUI involved.
Level 3: Expert
Level 3 is reserved for contractors working on the most sensitive DoD programs. It incorporates a subset of controls from NIST SP 800-172 and requires a government-led assessment by the Defense Contract Management Agency (DCMA).
Pre-Assessment Preparation Checklist
Before you begin implementing controls, you need to establish the foundational elements that every CMMC assessment will examine.
Define Your CUI Boundary
Identify exactly where CUI enters, resides, and exits your environment. This includes workstations, servers, file shares, email systems, cloud services, mobile devices, and any removable media. Document your CUI data flow with diagrams that show how information moves between systems, users, and external parties.
Complete Your System Security Plan (SSP)
Your SSP is the single most important document in your CMMC compliance program. It must describe your information system boundary, the security controls you have implemented, how those controls operate, and who is responsible for maintaining them. A weak or incomplete SSP is the number one reason organizations fail assessments.
At Petronella Technology Group, we use our proprietary ComplianceArmor platform to generate comprehensive SSPs that map every NIST 800-171 control to your specific environment. This eliminates the guesswork and ensures nothing falls through the cracks.
Conduct a Gap Assessment
Compare your current security posture against every applicable CMMC control. For Level 2, that means all 110 controls in NIST 800-171. Document each control as fully implemented, partially implemented, or not implemented. For any control that is not fully met, create a Plan of Action and Milestones (POA&M) with specific remediation steps, responsible parties, and target completion dates.
Calculate Your SPRS Score
Your SPRS score reflects your current compliance with NIST 800-171. A perfect score is 110. Each unmet control reduces your score by 1, 3, or 5 points depending on its weight. You must submit your current SPRS score to the DoD, and this score will be verified during your assessment. Organizations with scores below 110 must have documented POA&Ms for every gap.
CMMC Level 1 Checklist: 17 Practices
Level 1 covers four domains with 17 practices. Here is what you must demonstrate.
Access Control (AC)
- AC.L1-3.1.1: Limit system access to authorized users, processes acting on behalf of authorized users, and devices including other systems
- AC.L1-3.1.2: Limit system access to the types of transactions and functions that authorized users are permitted to execute
- AC.L1-3.1.20: Verify and control connections to and use of external information systems
- AC.L1-3.1.22: Control information posted or processed on publicly accessible information systems
Identification and Authentication (IA)
- IA.L1-3.5.1: Identify information system users, processes acting on behalf of users, or devices
- IA.L1-3.5.2: Authenticate or verify the identities of those users, processes, or devices as a prerequisite to allowing access
Media Protection (MP)
- MP.L1-3.8.3: Sanitize or destroy information system media containing FCI before disposal or release for reuse
Physical Protection (PE)
- PE.L1-3.10.1: Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals
- PE.L1-3.10.3: Escort visitors and monitor visitor activity
- PE.L1-3.10.4: Maintain audit logs of physical access
- PE.L1-3.10.5: Control and manage physical access devices
System and Communications Protection (SC)
- SC.L1-3.13.1: Monitor, control, and protect organizational communications at the external boundaries and key internal boundaries
- SC.L1-3.13.5: Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks
System and Information Integrity (SI)
- SI.L1-3.14.1: Identify, report, and correct information and information system flaws in a timely manner
- SI.L1-3.14.2: Provide protection from malicious code at appropriate locations within organizational information systems
- SI.L1-3.14.4: Update malicious code protection mechanisms when new releases are available
- SI.L1-3.14.5: Perform periodic scans of the information system and real-time scans of files from external sources
CMMC Level 2 Checklist: 110 Controls by Domain
Level 2 requires full implementation of NIST SP 800-171 Rev 2. Here is a domain-by-domain checklist of the most critical controls and common failure points.
Access Control (AC) - 22 Controls
Access control is the largest domain and the one where most organizations have gaps. Key requirements include implementing least privilege (3.1.5), limiting unsuccessful login attempts (3.1.8), providing session lock after inactivity (3.1.10), and controlling remote access through managed access control points (3.1.12). You must also encrypt CUI on mobile devices (3.1.19) and restrict the use of portable storage devices (3.1.21).
Awareness and Training (AT) - 3 Controls
All users must receive security awareness training. Managers and system administrators need role-based training specific to their responsibilities. You must document and maintain training records as evidence. Generic annual security training videos alone are typically insufficient for Level 2 compliance.
Audit and Accountability (AU) - 9 Controls
You must create, protect, and retain system audit logs. Logs must capture who did what, when, and where for all CUI-relevant systems. You need to review and correlate audit records regularly, alert on audit process failures, and protect audit information from unauthorized access and modification. Most organizations need a SIEM solution to meet these requirements effectively.
Configuration Management (CM) - 9 Controls
Establish and enforce security configuration baselines. Track, review, and approve all changes to your information systems. Restrict the use of nonessential programs, and apply the principle of least functionality. Document your baseline configurations and any approved deviations.
Incident Response (IR) - 3 Controls
Establish an incident response capability that includes preparation, detection, analysis, containment, recovery, and user response activities. Test your incident response plan regularly and report incidents to appropriate authorities. Your incident response plan must be documented, tested, and updated annually.
Maintenance (MA) - 6 Controls
Perform maintenance on organizational systems in a timely manner. Ensure maintenance tools are sanitized before use. Require multifactor authentication for remote maintenance sessions. Supervise maintenance activities of personnel without required access authorization.
Personnel Security (PS) - 2 Controls
Screen individuals before authorizing access to CUI systems. Ensure that CUI and systems containing CUI are protected during and after personnel actions such as terminations and transfers.
Risk Assessment (RA) - 3 Controls
Conduct periodic risk assessments. Scan for vulnerabilities in organizational systems and applications on a regular basis. Remediate vulnerabilities according to risk-based prioritization. We recommend quarterly vulnerability scans as a minimum.
Security Assessment (CA) - 4 Controls
Periodically assess your security controls to determine whether they are effective. Develop and implement plans of action to correct deficiencies. Monitor security controls on an ongoing basis. System interconnections must be authorized and documented.
Recovery (RE) - 2 Controls
Regularly perform and test data backups. Establish alternate processing sites if needed. Your backup strategy must ensure that CUI can be recovered following a disruption. Backups must be encrypted and tested regularly.
Common CMMC Assessment Failures
After guiding dozens of organizations through CMMC preparation, these are the most frequent reasons assessments fail.
Incomplete Documentation
Having the technology in place is only half the battle. Assessors need to see written policies, procedures, and evidence of implementation. If you cannot produce a document that proves a control is in place, the assessor will mark it as not met. This is where ComplianceArmor delivers enormous value. It generates the complete documentation package that assessors expect, including your SSP, POA&Ms, policies, and procedures, all mapped to specific NIST 800-171 controls.
Insufficient Multi-Factor Authentication
NIST 800-171 control 3.5.3 requires MFA for local and network access to privileged accounts and for network access to non-privileged accounts. Many organizations implement MFA for remote access but forget about local console access or service accounts. Every access path to CUI must be covered.
Weak Audit Logging
Turning on basic Windows event logging is not enough. You need centralized log collection, correlation, regular review, alerting on suspicious activity, and protection of log integrity. If your audit logs can be modified or deleted by an administrator, you fail the audit protection controls.
Missing Encryption
CUI must be encrypted both in transit and at rest. FIPS 140-2 validated cryptographic modules are required. Self-signed certificates, expired certificates, and non-FIPS encryption implementations are all common findings.
Your CMMC Compliance Timeline
For organizations starting their CMMC journey now, here is a realistic timeline.
Months 1-2: Assessment and Planning
Complete your gap assessment, calculate your SPRS score, and develop your remediation roadmap. Engage a qualified CMMC consultant to identify blind spots. Learn more about our CMMC compliance services.
Months 3-6: Remediation
Implement technical controls, deploy security tools, and develop required documentation. This phase typically requires the most investment in both technology and staff time.
Months 7-8: Pre-Assessment
Conduct an internal assessment or engage a consultant for a mock assessment. Identify and remediate any remaining gaps. Finalize all documentation.
Months 9-10: Formal Assessment
Engage a C3PAO and schedule your assessment. Be prepared for assessor interviews, evidence review, and technical testing. Respond promptly to any Requests for Information from the assessment team.
Next Steps
CMMC compliance is a significant undertaking, but it does not have to be overwhelming. The key is to start early, document everything, and work with experienced professionals who understand both the technical and administrative requirements.
Petronella Technology Group has been helping defense contractors achieve and maintain compliance with NIST 800-171 and CMMC since the framework was introduced. Our ComplianceArmor platform automates the documentation process, and our team of certified professionals guides you through every step from gap assessment to successful certification.
Schedule a free CMMC readiness assessment to find out where you stand and what it will take to get certified.