CMMC 2.0 • Updated for 2026

CMMC Compliance Guide 2026: Checklist, Levels, Costs & Requirements for DoD Contractors

The Cybersecurity Maturity Model Certification is now a contractual requirement for Department of Defense contractors. This comprehensive guide covers everything defense contractors need to know: CMMC 2.0 levels, the full 110-control compliance checklist, realistic cost estimates, the 2026–2028 rollout timeline, your SPRS score, and a step-by-step roadmap from gap assessment through certification. Written by Petronella Technology Group, Inc., a CMMC Registered Practitioner Organization with 23+ years of cybersecurity compliance experience serving the Defense Industrial Base from Raleigh, NC.

CMMC Registered Practitioner Org • BBB A+ Since 2003 • Founded 2002 • Raleigh, NC

1. What Is CMMC Compliance?

The Cybersecurity Maturity Model Certification (CMMC) is a unified cybersecurity standard created by the Department of Defense to protect sensitive government information throughout the entire defense supply chain. CMMC compliance means your organization has implemented the required cybersecurity controls, documented their operation, and passed an assessment verifying that those controls are functioning as intended.

Unlike previous frameworks that relied on contractor self-attestation, CMMC introduces mandatory third-party assessments for organizations handling Controlled Unclassified Information (CUI). This is a fundamental shift. Before CMMC, the DoD depended on contractors to honestly evaluate and report their own cybersecurity posture through DFARS clause 252.204-7012. Studies found that fewer than 25% of defense contractors were actually meeting NIST 800-171 requirements despite claiming compliance. Adversaries exploited these gaps, exfiltrating terabytes of sensitive data from the Defense Industrial Base.

A Brief History of CMMC

CMMC has evolved significantly since its inception:

  • 2019: The DoD announced the original CMMC framework with five maturity levels and 171 practices, developed by the CMMC Accreditation Body (now the Cyber AB).
  • 2020: CMMC 1.0 was published, but its complexity and cost drew criticism from small businesses in the defense supply chain.
  • 2021: The DoD announced CMMC 2.0, streamlining the model from five levels to three and aligning Level 2 directly with NIST SP 800-171's 110 security requirements.
  • 2024 (October): The final rule for CMMC (32 CFR Part 170) was published, formalizing the program's legal foundation.
  • 2025 (Q1–Q2): CMMC requirements began appearing in select DoD contracts, starting the phased rollout.
  • 2026–2028: Full implementation continues, with CMMC clauses expected in all applicable DoD contracts by the end of the phase-in period.

Why CMMC Compliance Matters

CMMC compliance is not optional for organizations that want to continue doing business with the Department of Defense. It is a go/no-go requirement: without the correct certification level, your company cannot bid on, receive, or maintain DoD contracts. The consequences of non-compliance extend well beyond lost revenue:

  • Contract eligibility: CMMC certification is required as a condition of contract award. No certification means no contract, regardless of your technical qualifications or past performance.
  • False Claims Act liability: Misrepresenting your cybersecurity posture to the federal government can trigger False Claims Act enforcement, with penalties including treble damages and per-claim fines. The Department of Justice has made cybersecurity enforcement a stated priority through its Civil Cyber-Fraud Initiative.
  • Supply chain flow-down: Prime contractors must ensure their subcontractors meet CMMC requirements. Non-compliant subcontractors risk being dropped from supply chains entirely.
  • National security: CUI theft undermines weapons systems, intelligence operations, and America's technological edge. The DoD estimates that adversaries steal over $600 billion in intellectual property annually from the defense supply chain.
  • Competitive advantage: Early certification positions your company ahead of competitors who are delaying, creating a window of opportunity for winning contracts while others are still scrambling to comply.

Key Takeaway: CMMC is not a new set of cybersecurity requirements. It is a verification mechanism that ensures defense contractors actually implement the requirements that have been contractually mandated since 2017 through DFARS 252.204-7012. If your organization has been claiming compliance with NIST 800-171, CMMC is the proof.

2. CMMC 2.0 Levels Explained

CMMC 2.0 organizes cybersecurity requirements into three maturity levels, each corresponding to a progressively higher standard of protection. The level your organization needs depends on the type of information you handle under DoD contracts.

Attribute Level 1: Foundational Level 2: Advanced Level 3: Expert
Information Protected Federal Contract Information (FCI) Controlled Unclassified Information (CUI) CUI + Advanced Persistent Threats (APT)
Number of Controls 17 practices (FAR 52.204-21) 110 requirements (NIST SP 800-171 Rev 2) 110 + additional (NIST SP 800-172)
Assessment Type Annual self-assessment Triennial C3PAO or self-assessment (program-dependent) Triennial government-led (DIBCAC)
Who Needs It All DoD contractors handling FCI Contractors handling CUI Highest-priority DoD programs
Estimated Contractors Affected ~220,000+ ~80,000 ~500–1,000
POA&Ms Allowed No (all 17 must be met) Yes, with conditions (close within 180 days) Limited, with government approval

CMMC Level 1: Foundational

Level 1 applies to organizations that handle Federal Contract Information but do not process, store, or transmit CUI. It requires implementation of 17 basic cybersecurity practices derived from FAR 52.204-21, covering fundamental protections like access control, identification and authentication, media protection, physical protection, system and communications protection, and system and information integrity. Organizations self-assess annually and affirm compliance through a senior official's statement submitted to the Supplier Performance Risk System (SPRS).

CMMC Level 2: Advanced

Level 2 is where the majority of defense contractors will land. It requires implementation of all 110 security requirements from NIST SP 800-171 Revision 2, covering 14 control families. For contracts involving critical national security information, a Certified Third-Party Assessment Organization (C3PAO) must conduct the assessment every three years. Some Level 2 contracts with lower-sensitivity CUI may allow self-assessment. Organizations must submit their assessment results and SPRS scores to the DoD.

CMMC Level 3: Expert

Level 3 is reserved for the most sensitive DoD programs. It builds on Level 2 by adding controls from NIST SP 800-172 designed to protect CUI against advanced persistent threats from nation-state adversaries. Assessment is conducted by the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC), a government entity. The number of organizations requiring Level 3 is relatively small (estimated at 500 to 1,000), but these organizations are critical to national defense.

Not sure which level you need? Review your contract language for references to DFARS 252.204-7012 (CUI), DFARS 252.204-7021 (CMMC), and FAR 52.204-21 (FCI). If your contracts mention CUI, you almost certainly need Level 2. Learn more about CMMC levels or contact us for a free assessment.

3. CMMC Compliance Requirements Checklist

CMMC Level 2 maps directly to the 110 security requirements in NIST SP 800-171 Rev 2, organized across 14 control families. Each control family addresses a specific domain of cybersecurity. Below is the complete checklist with requirement counts and key practices your organization must implement.

AC — Access Control (22) Limit system access, enforce least privilege, control remote access, restrict CUI flow
AT — Awareness & Training (3) Security awareness training, role-based training, insider threat awareness
AU — Audit & Accountability (9) Create/retain audit logs, protect audit information, review/report findings
CM — Configuration Management (9) Baseline configs, change control, least functionality, software restrictions
IA — Identification & Authentication (11) Unique identifiers, MFA, password management, device/session authentication
IR — Incident Response (3) Incident handling capability, tracking/reporting, testing response plans
MA — Maintenance (6) Controlled maintenance, sanitize equipment, authorize remote maintenance
MP — Media Protection (9) Protect/control media, sanitize before disposal, mark CUI media, encrypt portable
PE — Physical Protection (6) Limit physical access, manage visitors, protect power/cabling, control access to equipment
PS — Personnel Security (2) Screen personnel before access, protect systems during personnel actions
RA — Risk Assessment (3) Periodic risk assessments, vulnerability scanning, remediation of vulnerabilities
CA — Security Assessment (4) Assess controls, POA&M development, continuous monitoring, system connections
SC — System & Comms Protection (16) Boundary protection, FIPS encryption, session authenticity, CUI at rest/transit
SI — System & Info Integrity (7) Flaw remediation, malicious code protection, security alerts, system monitoring

Essential Documentation Checklist

Beyond technical controls, CMMC assessors evaluate your documentation. Every requirement must have corresponding written policies, procedures, and evidence. The following documents are mandatory:

  • System Security Plan (SSP): Describes your entire CUI environment, system boundaries, data flows, interconnections, and how each of the 110 requirements is satisfied.
  • Plan of Action & Milestones (POA&M): Documents any unmet requirements with specific remediation steps, responsible parties, and completion dates. POA&Ms must be closed within 180 days of assessment.
  • 14 Control-Family Policies: Written policies covering each control family (Access Control Policy, Incident Response Policy, Configuration Management Policy, etc.).
  • Incident Response Plan: Documented procedures for detecting, reporting, and responding to cybersecurity incidents involving CUI.
  • Configuration Management Plan: Baseline configurations, change management process, and authorization procedures for system modifications.
  • Contingency/Disaster Recovery Plan: Business continuity procedures for CUI systems, including backup verification and recovery testing.
  • Security Awareness Training Records: Documented training program with completion records for all personnel with CUI access.
  • Risk Assessment Report: Most recent organizational risk assessment identifying threats, vulnerabilities, and risk mitigation strategies.
  • Vulnerability Scan Reports: Regular scanning results with evidence of remediation for identified vulnerabilities.
  • Audit Log Review Records: Evidence of regular review and analysis of system audit logs for anomalous activity.
  • Network Diagrams: Current diagrams showing CUI data flows, system boundaries, network segmentation, and external connections.
  • SPRS Score Submission: Documented self-assessment score submitted to the Supplier Performance Risk System.

Warning: Many organizations fail assessments not because they lack security controls, but because they lack documentation proving those controls exist and operate correctly. Assessors follow the mantra "if it isn't documented, it didn't happen." Start building your evidence library now. For more on managing compliance documentation with AI tools, see our guide on automating compliance with AI.

4. CMMC Compliance Timeline & Deadlines

The CMMC rollout follows a phased implementation plan designed to gradually expand requirements across the Defense Industrial Base. Understanding this timeline is critical for planning your compliance journey.

October 2024 — Final Rule Published

32 CFR Part 170 was published, establishing the legal framework for CMMC assessments. The CMMC ecosystem (C3PAOs, assessors, and the Cyber AB) began scaling operations.

Q1 2025 — Phase 1 Begins

The DoD began including CMMC Level 1 self-assessment requirements in select new contracts and solicitations. Contractors handling only FCI needed to demonstrate compliance with the 17 FAR 52.204-21 practices.

2025–2026 — Phase 2: Level 2 Self-Assessments

Level 2 self-assessment requirements begin appearing in contracts. Organizations handling CUI must demonstrate compliance with all 110 NIST 800-171 controls and submit SPRS scores. This phase affects the largest number of contractors.

2026–2027 — Phase 3: Level 2 C3PAO Assessments

Contracts involving critical national security information begin requiring third-party C3PAO assessments for Level 2. This is the most impactful phase for mid-size defense contractors.

2027–2028 — Phase 4: Full Implementation + Level 3

CMMC clauses are expected in all applicable DoD contracts. Level 3 government-led DIBCAC assessments are required for the highest-sensitivity programs. The phase-in is complete.

Do not wait for a contract to require CMMC before starting compliance. Achieving CMMC Level 2 compliance typically takes 6 to 18 months depending on your current security posture. C3PAO assessment scheduling is already constrained due to limited assessor capacity. Organizations that delay will face longer wait times, higher costs, and the risk of losing contracts to certified competitors.

Key Dates to Know

  • SPRS Score Submission: Already required under DFARS 252.204-7020. If you have not submitted a score, you are already non-compliant.
  • POA&M Closure Deadline: Any open POA&Ms from your assessment must be remediated within 180 days. Failure to close POA&Ms results in conditional certification being revoked.
  • Triennial Reassessment: Certification is valid for three years, after which you must undergo a new assessment. Annual affirmation statements are also required between triennial assessments.

5. CMMC Compliance Cost Breakdown

CMMC compliance costs vary significantly based on organization size, current security maturity, CUI scope, and the level of certification required. Below are realistic cost ranges based on our experience working with defense contractors since 2002.

Cost Category Small (1–50 employees) Mid-Size (51–250 employees) Enterprise (250+ employees)
Gap Assessment $10,000 – $25,000 $25,000 – $60,000 $60,000 – $150,000
Remediation & Implementation $30,000 – $100,000 $100,000 – $300,000 $300,000 – $750,000+
Documentation (SSP, Policies) $15,000 – $30,000 $30,000 – $60,000 $60,000 – $120,000
Technology/Tools $12,000 – $36,000/yr $36,000 – $120,000/yr $120,000 – $500,000/yr
C3PAO Assessment $30,000 – $50,000 $50,000 – $100,000 $100,000 – $200,000+
Ongoing Monitoring/Maintenance $24,000 – $60,000/yr $60,000 – $150,000/yr $150,000 – $400,000/yr
Total First-Year Estimate $120,000 – $300,000 $300,000 – $790,000 $790,000 – $2,100,000+

Cost Reduction Strategies

While CMMC compliance is a significant investment, several strategies can reduce costs without compromising your security posture:

  • Scope reduction: Implement a CUI enclave to isolate CUI processing into a defined boundary. Fewer systems in scope means fewer controls to implement, document, and assess.
  • Cloud migration: Moving CUI workloads to FedRAMP-authorized cloud platforms (Microsoft GCC High, AWS GovCloud) inherits many controls from the provider, reducing your implementation burden.
  • AI-powered compliance tools: Automated evidence collection, continuous monitoring, and AI-assisted documentation generation reduce the labor hours required for compliance management.
  • Managed Security Services Provider (MSSP): Outsourcing ongoing monitoring and management to a qualified MSSP like Petronella Technology Group, Inc. spreads costs over time and avoids the expense of building an in-house security operations center.
  • Government resources: The DoD offers Project Spectrum, a free resource for small businesses, and some states offer cybersecurity assistance programs for defense contractors.

Cost perspective: Weigh CMMC compliance costs against the value of your DoD contracts. For a company with $2 million in annual defense revenue, a $200,000 compliance investment represents 10% of that revenue — a cost of doing business that protects your most important revenue stream. The alternative is losing those contracts entirely.

Not Sure Where to Start? Get a Free CMMC Gap Assessment

Petronella Technology Group, Inc. has guided defense contractors through every phase of CMMC compliance since the framework's inception. Our AI-powered assessment identifies your compliance gaps, calculates your SPRS score, and delivers a prioritized remediation roadmap — all within two weeks.

23+ years of cybersecurity expertise • CMMC Registered Practitioner Org • Serving the Triangle & beyond

6. Step-by-Step CMMC Compliance Roadmap

Achieving CMMC certification is a multi-phase effort that requires methodical planning, dedicated resources, and sustained execution. The following roadmap reflects Petronella Technology Group, Inc.'s proven methodology, refined over hundreds of compliance engagements.

1

Define Your Scope

Identify all systems, networks, and personnel that store, process, or transmit CUI. Map data flows to establish your assessment boundary. Minimizing scope through CUI enclaves dramatically reduces cost and complexity. This phase typically takes 2–4 weeks.

2

Conduct a Gap Assessment

Evaluate your current security posture against all 110 NIST SP 800-171 requirements (or 17 for Level 1). Document what you have implemented, what is partially implemented, and what is missing entirely. Calculate your initial SPRS score. This phase takes 3–6 weeks.

3

Develop Your SSP & POA&M

Create the System Security Plan documenting your CUI environment and how each control is satisfied. For any gaps, develop a Plan of Action & Milestones with specific remediation steps and deadlines. These are the two most critical documents for assessment.

4

Implement Technical Controls

Deploy and configure the security technologies needed to close gaps: MFA, FIPS-validated encryption, SIEM/logging, endpoint protection, vulnerability scanning, network segmentation, and access controls. Validate each control against specific requirement language.

5

Build Policies & Procedures

Write organization-specific policies for each control family. Develop standard operating procedures, incident response playbooks, and training materials. Generic templates will not pass assessment — documents must reflect your actual operations.

6

Train Your Workforce

Conduct security awareness training for all personnel and role-based training for IT staff and CUI handlers. Document completion, test retention, and establish a recurring training schedule. Assessors review training records closely.

7

Perform Internal Assessment

Before engaging a C3PAO, conduct a thorough mock assessment using CMMC assessment methodology. Verify every control, review all documentation, test incident response procedures, and address any remaining deficiencies. This is your dress rehearsal.

8

Schedule & Pass C3PAO Assessment

Engage a Certified Third-Party Assessment Organization for your formal assessment. Assessor availability is limited, so schedule early. During the assessment, demonstrate live control operation and provide supporting evidence for all 110 requirements. Close any POA&Ms within 180 days.

Typical timeline: Organizations starting from scratch should plan for 12–18 months to achieve CMMC Level 2 certification. Those with existing NIST 800-171 compliance programs can compress this to 6–9 months. The most common bottleneck is not technology — it is organizational commitment and resource allocation.

7. SPRS Score: What It Is and How to Calculate It

The Supplier Performance Risk System (SPRS) score is a numerical rating that reflects your organization's self-assessed compliance with NIST SP 800-171. Scores range from -203 to 110, where 110 indicates full compliance with all requirements.

How SPRS Scoring Works

The DoD assigns a weighted point value (1, 3, or 5 points) to each of the 110 NIST 800-171 requirements based on its security importance. Your SPRS score starts at 110 and decreases by the weighted value of each requirement you have not fully implemented:

  • 5-point requirements (critical): The highest-impact controls, including multi-factor authentication, encryption of CUI, and audit logging. Missing one 5-point requirement drops your score from 110 to 105.
  • 3-point requirements (important): Significant controls like vulnerability scanning, session termination, and wireless access restrictions.
  • 1-point requirements (supporting): Foundational practices like security awareness training documentation and visitor access procedures.

The total possible deduction across all 110 requirements is 313 points (110 + 203 = 313 total weight). Since you start at 110, the minimum possible score is -203.

SPRS Score Ranges and What They Mean

Score Range Compliance Status Contract Impact
110 Full compliance with all 110 requirements Maximum competitiveness; CMMC-ready
90 – 109 Minor gaps; most controls implemented Generally competitive; targeted remediation needed
50 – 89 Moderate gaps; significant work remaining At risk; may lose bids to higher-scoring competitors
Below 50 Major compliance deficiencies High risk of disqualification; urgent remediation needed
Negative scores Minimal security controls in place Effectively non-compliant; comprehensive program needed

Calculate your SPRS score now: Use our free SPRS Calculator to evaluate your current compliance status against all 110 NIST 800-171 requirements and identify the highest-impact gaps to remediate first.

SPRS Submission Requirements

Under DFARS 252.204-7020, contractors must submit their NIST 800-171 self-assessment results to SPRS. The submission must include your overall score, the date of the assessment, and the scope of the assessment. Contracting officers can access these scores when evaluating bids, making your SPRS score a competitive differentiator. Organizations without a submitted SPRS score are automatically ineligible for contract awards requiring DFARS compliance.

Know Your Score. Fix Your Gaps. Win More Contracts.

Petronella Technology Group, Inc.'s AI-powered gap assessment calculates your exact SPRS score, identifies every non-compliant control, and delivers a cost-prioritized remediation roadmap. Most organizations see 30–50 point score improvements within the first 90 days.

8. CMMC vs. NIST 800-171: Key Differences

Defense contractors frequently confuse CMMC and NIST 800-171, or assume they are interchangeable. While they are closely related, they serve fundamentally different purposes. Understanding the distinction is essential for planning your compliance strategy.

Dimension NIST SP 800-171 CMMC 2.0
What It Is A set of 110 security requirements for protecting CUI A certification framework that verifies implementation of those requirements
Published By National Institute of Standards and Technology (NIST) Department of Defense (DoD)
Assessment Type Self-assessment (self-reported SPRS score) Self-assessment (L1/some L2) or third-party C3PAO assessment (L2/L3)
Enforcement Contractual via DFARS 252.204-7012; relies on contractor honesty Verified by independent assessors; certification required for contract award
Maturity Levels None (single standard) Three levels (L1, L2, L3) based on information sensitivity
Scope Beyond 800-171 110 requirements only L3 adds NIST 800-172 requirements beyond the 110
Recertification Ongoing obligation; no formal recertification cycle Triennial reassessment with annual affirmation
POA&M Treatment Accepted indefinitely with no mandated closure timeline Must be closed within 180 days of assessment

Think of it this way: NIST 800-171 is the exam syllabus, and CMMC is the proctored test. You need to know the material (implement the controls) AND pass the test (undergo independent assessment) to earn your certification. Organizations that have been implementing NIST 800-171 genuinely are well-positioned for CMMC. Organizations that have been submitting inflated SPRS scores face a reckoning.

For a deeper understanding of risk assessment vs. gap analysis in the compliance context, see our guide on security risk assessment vs. gap analysis.

9. Common CMMC Compliance Mistakes to Avoid

After working with hundreds of defense contractors, Petronella Technology Group, Inc. has identified the most frequent pitfalls that delay certification, inflate costs, or lead to assessment failure. Avoid these mistakes to stay on track.

1. Inflating Your SPRS Score

Submitting an inaccurate SPRS score is not just a compliance failure — it is a potential False Claims Act violation. C3PAO assessors will verify every claim. If your self-reported score of 95 turns out to be a -10, you face legal liability, contract termination, and reputational damage.

2. Treating CMMC as an IT-Only Project

CMMC compliance requires organizational commitment from executive leadership, HR, legal, operations, and IT. Physical security, personnel screening, training programs, and policy development are all assessed. Companies that silo CMMC in the IT department fail to address non-technical requirements.

3. Relying on Generic Policy Templates

Assessors can identify template-based documentation immediately. Your policies must reflect your actual organization: naming conventions, specific tools, real procedures, and genuine roles. Generic language like "the organization shall" without specifics is a red flag.

4. Not Defining a CUI Boundary

If you cannot clearly identify where CUI exists in your environment, your entire network is in scope. This dramatically increases cost and complexity. Invest in scoping and boundary definition early — it is the highest-ROI activity in CMMC preparation.

5. Ignoring POA&M Closure Deadlines

CMMC allows conditional certification with open POA&Ms, but you must close them within 180 days. Organizations that treat POA&Ms as permanent waivers lose their certification when deadlines pass without remediation.

6. Waiting Until a Contract Requires It

Compliance takes 6–18 months. C3PAO scheduling is constrained. If you wait until a solicitation requires CMMC, you will not be ready in time and will lose the opportunity to a certified competitor. Start preparing now.

7. Buying Tools Without Configuring Them

Purchasing an endpoint protection platform or SIEM does not mean you are compliant. Assessors evaluate whether tools are configured to meet specific requirement language. A misconfigured security tool provides a false sense of compliance that crumbles under assessment scrutiny.

8. Neglecting Privileged Access Management

Overprivileged accounts are a top audit finding. Assessors verify least privilege, separation of duties, and privileged access controls. Without proper privileged access management, multiple high-value controls fail simultaneously.

10. How PTG Helps: AI-Powered CMMC Compliance Services

Petronella Technology Group, Inc. is a CMMC Registered Practitioner Organization (RPO) headquartered in Raleigh, NC, serving defense contractors across the Research Triangle, North Carolina, and nationwide. Founded in 2002 by Craig Petronella, our team brings 23+ years of cybersecurity compliance expertise to every engagement, combining deep NIST/CMMC knowledge with AI-powered tools that accelerate time-to-compliance and reduce costs.

Our CMMC Service Portfolio

G

CMMC Gap Assessment

Comprehensive evaluation against all 110 controls using our AI-assisted assessment platform. Delivers your exact SPRS score, detailed gap analysis, prioritized remediation roadmap, and executive summary — typically within two weeks. Learn more »

R

Remediation & Implementation

Hands-on engineering to close compliance gaps: technical control deployment, CUI enclave architecture, network segmentation, MFA/encryption implementation, and configuration hardening — all validated against NIST 800-171 requirement language. Learn more »

D

Documentation & SSP Development

AI-accelerated creation of your complete compliance documentation suite: System Security Plan, POA&Ms, 14 control-family policies, incident response plan, configuration management plan, and evidence artifacts. Organization-specific, not template-based.

A

Assessment Preparation

Mock C3PAO assessment using official CMMC assessment methodology, evidence review, interview preparation for key personnel, and final gap closure. We identify any remaining issues before your formal assessment so there are no surprises. Learn more »

M

Managed Compliance & Monitoring

Ongoing managed security services that maintain your certification between triennial assessments. Includes continuous monitoring, quarterly control validation, annual SSP updates, SPRS score maintenance, and incident response support.

P

Penetration Testing

Simulated cyberattacks against your CUI environment to validate control effectiveness. Our penetration testers identify exploitable vulnerabilities that automated scans miss, providing evidence for Risk Assessment (RA) and Security Assessment (CA) controls. Learn more »

The AI Advantage

Petronella Technology Group, Inc. integrates artificial intelligence throughout the compliance lifecycle:

  • Automated evidence collection: AI continuously gathers and organizes compliance evidence from your systems, reducing manual evidence collection from weeks to hours.
  • Intelligent gap analysis: Machine learning models compare your security posture against the 110 requirements, identifying gaps with precision and recommending prioritized remediation based on SPRS score impact.
  • AI-assisted documentation: Our platform accelerates SSP and policy development by analyzing your environment and generating organization-specific documentation drafts that humans refine and validate.
  • Continuous compliance monitoring: AI monitors your environment 24/7 for compliance drift, alerting your team when a control degrades before it becomes an assessment finding.
  • Predictive risk scoring: Algorithms analyze your control maturity and threat landscape to predict assessment outcomes and identify the highest-risk areas before assessors arrive.

For more on how AI transforms compliance workflows, see our article on automating compliance with AI for CMMC and HIPAA.

11. Frequently Asked Questions About CMMC Compliance

What is the CMMC compliance deadline for 2026?

There is no single universal deadline. CMMC is being phased into DoD contracts over a multi-year period from 2025 through 2028. In 2026, Level 2 self-assessment requirements are appearing in an increasing number of contracts, with C3PAO third-party assessment requirements beginning to appear in contracts involving critical national security information. The practical deadline for your organization is whenever a contract you need requires CMMC certification. Since compliance takes 6–18 months to achieve, the time to start is now.

How much does CMMC compliance cost for a small business?

Small defense contractors (1–50 employees) should budget $120,000 to $300,000 for first-year CMMC Level 2 compliance, including gap assessment, remediation, documentation, technology investments, and the C3PAO assessment. Ongoing maintenance runs $24,000 to $60,000 per year. Costs can be reduced significantly through CUI scope reduction (enclave approach), leveraging FedRAMP cloud platforms, and AI-powered compliance tools. CMMC Level 1 costs substantially less, typically $20,000 to $50,000 for small businesses.

What is the difference between CMMC Level 1 and Level 2?

CMMC Level 1 protects Federal Contract Information (FCI) with 17 basic cybersecurity practices and requires only annual self-assessment. Level 2 protects Controlled Unclassified Information (CUI) with all 110 NIST SP 800-171 requirements and may require a triennial third-party assessment by a C3PAO. Level 2 is significantly more comprehensive, covering advanced controls like multi-factor authentication, FIPS-validated encryption, SIEM logging, incident response capabilities, and continuous monitoring. Most contractors handling CUI need Level 2. See our detailed levels guide.

Can I self-assess for CMMC Level 2 or do I need a C3PAO?

It depends on the contract. CMMC 2.0 allows two paths for Level 2: self-assessment for contracts involving less sensitive CUI, and C3PAO third-party assessment for contracts involving critical national security information. The specific contract clause (DFARS 252.204-7021) will specify which assessment type is required. However, the DoD has indicated that the majority of Level 2 contracts will eventually require C3PAO assessment. Even if self-assessment is initially permitted, preparing for C3PAO assessment is the prudent approach.

What happens if my organization fails a CMMC assessment?

If your C3PAO assessment identifies unmet requirements, you may receive a conditional certification with open POA&Ms, which must be remediated within 180 days. If the deficiencies are too severe for conditional status, you do not receive certification and must remediate before scheduling a reassessment. There is no formal "fail" — but lacking certification means you cannot be awarded contracts that require it. The reassessment costs another round of C3PAO fees. This is why thorough preparation and mock assessments are critical investments.

How long does CMMC certification last?

CMMC certification is valid for three years. During that period, your organization must submit an annual affirmation statement confirming that your security practices continue to meet the certified level. If material changes occur (significant system changes, security incidents, or organizational changes), you may need to undergo reassessment before the three-year mark. Maintaining ongoing compliance is not optional between assessments — it is an enforceable requirement.

Do subcontractors also need CMMC certification?

Yes. CMMC requirements flow down through the supply chain. If a prime contractor's contract requires CMMC, they must ensure that any subcontractors who handle FCI or CUI also meet the appropriate CMMC level. This means subcontractors at every tier who touch federal data are subject to the same certification requirements. Prime contractors are increasingly requiring CMMC certification from their subcontractors before awarding subcontracts. If you are a subcontractor in the defense supply chain, CMMC applies to you.

What is the role of the Cyber AB in CMMC?

The Cyber AB (formerly the CMMC Accreditation Body) is the sole organization authorized by the DoD to oversee the CMMC ecosystem. It accredits C3PAOs, certifies individual assessors, trains Registered Practitioners, and manages the CMMC Marketplace where organizations can find authorized service providers. Petronella Technology Group, Inc. is listed on the Cyber AB Marketplace as a Registered Practitioner Organization (RPO), meaning our practitioners have been vetted and authorized to assist organizations with CMMC preparation.

Ready to Achieve CMMC Certification?

Every day without CMMC compliance is a day your organization risks losing DoD contracts to certified competitors. Petronella Technology Group, Inc. has the expertise, AI-powered tools, and 23+ year track record to take you from wherever you are today to successful CMMC certification. Whether you need a gap assessment, remediation engineering, or full managed compliance, we are ready to help.

CMMC Registered Practitioner Org • BBB A+ Since 2003 • Founded 2002 • Raleigh, NC • Craig Petronella, Founder