The Complete CMMC Compliance Guide
Everything defense contractors need to know about CMMC 2.0 certification in 2026. Covers requirements, costs, step-by-step certification process, CRM compliance, and how to reduce your assessment boundary.
Cabrillo Club
Editorial Team · January 1, 2025 · Updated Feb 25, 2026 · 29 min read

Key Takeaways
- CMMC 2.0 is now in effect. The final rule took effect on December 16, 2024, and Phase 1 self-assessments began appearing in contracts in early 2025. C3PAO-led assessments for Level 2 start rolling into solicitations in late 2026.
- There are three levels, not five. CMMC 2.0 simplified the original five-level model into three tiers: Level 1 (17 practices, self-assessment), Level 2 (110 controls aligned to NIST SP 800-171, third-party assessment), and Level 3 (NIST SP 800-172, government-led assessment).
- Your CRM and AI tools are probably in scope. Any system that stores, processes, or transmits CUI falls inside your assessment boundary. That includes your CRM if it ingests emails from government contacts, and any cloud AI tool you use for proposal writing. See our CUI-safe CRM guide for architecture guidance.
- Costs range from $5,000 to $500,000+ depending on your level, current maturity, and the size of your CUI boundary. The single most effective cost-reduction strategy is shrinking that boundary.
- Small businesses are not exempt. Roughly 73% of the Defense Industrial Base (DIB) consists of small businesses, and the DoD has explicitly stated that CMMC applies across the entire supply chain, including subcontractors.
- Preparation takes 12 to 18 months for most organizations. If you have not started your gap assessment, the time to act is now. Waiting until a solicitation requires certification will be too late.
The Complete CMMC Compliance Guide
If you do business with the Department of Defense, CMMC compliance is no longer optional. The Cybersecurity Maturity Model Certification (CMMC) 2.0 framework is now the gating requirement for every contract that involves Federal Contract Information (FCI) or Controlled Unclassified Information (CUI). Whether you are a prime contractor managing billion-dollar programs or a 15-person machine shop supplying precision parts, your ability to win and retain DoD work depends on meeting these standards.
This guide walks you through everything you need to know: the three CMMC levels, the certification timeline, realistic cost estimates, a step-by-step path to certification, and the often-overlooked compliance gaps hiding in your CRM, AI tools, and business systems. We have written it for GovCon operations leaders and small business CEOs who need clarity, not jargon.
---
---
What Is CMMC 2.0?
The Cybersecurity Maturity Model Certification (CMMC) is a DoD-mandated framework that verifies defense contractors have adequate cybersecurity controls in place before they can be awarded contracts involving sensitive information. Think of it as a cybersecurity fitness test: you must pass before you are allowed on the field.
The Problem CMMC Solves
For years, defense contractors self-attested to their cybersecurity posture under DFARS 252.204-7012. The results were alarming. A 2019 DoD Inspector General report found that contractors routinely failed to implement even basic controls. Self-attestation without verification created a system built on trust, and that trust was misplaced. Nation-state adversaries exploited these gaps to steal weapons system designs, personnel records, and classified program data from contractor networks.
CMMC replaces self-attestation with verified compliance. For contracts involving critical CUI, an independent third-party assessor must confirm your controls are actually implemented and effective, not just documented in a System Security Plan gathering dust on a shelf.
From CMMC 1.0 to 2.0
The original CMMC 1.0 model, released in January 2020, defined five maturity levels with 171 practices and a mandatory third-party assessment at every level. Industry feedback was swift and pointed: the model was too complex, too expensive, and too burdensome for small businesses.
CMMC 2.0, finalized in the Federal Register on October 15, 2024, addressed these concerns with three key changes:
- Simplified from five levels to three. Levels 2 and 4 from the original model were eliminated, creating a cleaner Foundational / Advanced / Expert structure.
- Aligned directly to existing NIST standards. Level 2 maps one-to-one to NIST SP 800-171 Rev 2 (110 controls), and Level 3 adds controls from NIST SP 800-172. No more CMMC-unique practices.
- Introduced self-assessment for lower-risk contracts. Level 1 is entirely self-assessed, and some Level 2 contracts allow self-assessment rather than third-party evaluation.
The Regulatory Foundation
CMMC does not exist in isolation. It sits atop a regulatory stack that includes:
- DFARS 252.204-7012 (Safeguarding Covered Defense Information): The existing clause that requires contractors handling CUI to implement NIST SP 800-171 and report cyber incidents within 72 hours.
- NIST SP 800-171 (Protecting CUI in Nonfederal Systems): The 110-control framework that defines how CUI must be protected. This is the technical backbone of CMMC Level 2.
- NIST SP 800-172 (Enhanced Security Requirements): Additional controls for Level 3, targeting advanced persistent threats.
- 32 CFR Part 170: The CMMC program rule that codifies the certification process, assessor requirements, and enforcement mechanisms.
- 48 CFR (DFARS): The acquisition rule that enables contracting officers to include CMMC requirements in solicitations.
Who Enforces CMMC?
Three entities play key roles:
- The Department of Defense sets policy and determines which contracts require CMMC (and at what level).
- The Cyber Accreditation Body (CyberAB) accredits the third-party assessment organizations and individual assessors who conduct evaluations.
- CMMC Third-Party Assessment Organizations (C3PAOs) perform the actual assessments for Level 2 certification. They are private companies authorized by CyberAB.
For a practical roadmap of how these entities interact with your compliance timeline, see our CMMC 2.0 roadmap for GovCon.
---
CMMC 2.0 Levels Explained
CMMC 2.0 defines three levels of cybersecurity maturity. Each level builds on the one below it, and the level you need is determined by the type of information you handle, not by company size or revenue.
Level 1: Foundational
Level 1 applies to contractors who handle Federal Contract Information (FCI) but not CUI. FCI is information generated or provided under a government contract that is not intended for public release, but it is not classified or controlled at the CUI level.
- Controls: 17 practices drawn from FAR 52.204-21 (Basic Safeguarding of Covered Contractor Information Systems)
- Assessment: Annual self-assessment with results entered into the Supplier Performance Risk System (SPRS)
- Affirmation: A senior company official must affirm compliance annually
- Examples of controls: Use of antivirus software, limiting physical access to systems, authenticating users before granting access
Level 1 is intentionally lightweight. Most organizations that have basic IT hygiene practices already meet the majority of these requirements.
Level 2: Advanced
Level 2 is the level that most defense contractors handling CUI will need. It maps directly to the 110 security controls in NIST SP 800-171 Rev 2, organized across 14 control families.
- Controls: 110 practices from NIST SP 800-171
- Assessment: Third-party assessment by a C3PAO for contracts involving critical national security information; self-assessment allowed for select non-critical CUI contracts
- Affirmation: Senior official affirmation required
- Reassessment: Every three years
The 14 control families include Access Control, Awareness and Training, Audit and Accountability, Configuration Management, Identification and Authentication, Incident Response, Maintenance, Media Protection, Personnel Security, Physical Protection, Risk Assessment, Security Assessment, System and Communications Protection, and System and Information Integrity.
Level 3: Expert
Level 3 is reserved for contractors supporting the DoD's highest-priority programs, where the threat model includes advanced persistent threats (APTs) from nation-state actors.
- Controls: 110 controls from NIST SP 800-171 plus a subset of enhanced controls from NIST SP 800-172
- Assessment: Government-led assessment conducted by the Defense Contract Management Agency (DCMA) Defense Industrial Base Cybersecurity Assessment Center (DIBCAC)
- Prerequisite: Must hold a current Level 2 certification
- Scope: Programs involving intelligence, space systems, nuclear systems, and other critical capabilities
Comparison Table: CMMC Levels at a Glance
| Attribute | Level 1: Foundational | Level 2: Advanced | Level 3: Expert | |---|---|---|---| | Number of Practices | 17 | 110 | 110+ (NIST 800-172 subset) | | Framework | FAR 52.204-21 | NIST SP 800-171 Rev 2 | NIST SP 800-171 + 800-172 | | Assessment Type | Self-assessment | C3PAO or self-assessment | Government-led (DIBCAC) | | Information Type | FCI only | CUI | CUI on critical programs | | Assessment Frequency | Annual | Every 3 years | Every 3 years | | Estimated Cost | $5,000 - $30,000 | $50,000 - $200,000+ | $200,000+ | | Who Typically Needs It | All DoD contractors | Contractors handling CUI | Top-tier prime contractors | | POA&Ms Allowed | No | Limited (180-day closeout) | Limited | | SPRS Score Required | N/A | Yes (110 max) | Yes |
---
Who Needs CMMC Certification?
The short answer: every company in the defense supply chain. The longer answer requires understanding what information you handle and where you sit in the contracting hierarchy.
Prime Contractors
If you hold a prime contract with the DoD and that contract involves CUI, you will need at minimum Level 2 certification. Many primes supporting critical programs will need Level 3. Primes also bear responsibility for flowing CMMC requirements down to their subcontractors.
Subcontractors
CMMC requirements flow down through the supply chain. If a prime contractor shares CUI with you as part of their contract performance, you need CMMC certification at the level specified in your subcontract. This is not theoretical: primes are already adding CMMC clauses to subcontract agreements.
A common misconception is that small subcontractors can avoid CMMC because they only handle a tiny slice of program data. The framework does not have a size exemption. If CUI touches your systems, you are in scope.
The FCI vs. CUI Distinction
Understanding whether you handle FCI, CUI, or both determines your required level:
- FCI (Federal Contract Information): Information not intended for public release that is generated or provided under a government contract. Examples include contract terms, pricing submitted in proposals, and internal communications about contract deliverables. FCI requires Level 1 only.
- CUI (Controlled Unclassified Information): A broader category defined by the CUI Registry (32 CFR Part 2002) that includes technical data, export-controlled information, personally identifiable information from government systems, critical infrastructure data, and more. CUI requires Level 2 or Level 3.
Many contractors underestimate their CUI exposure. Technical drawings, engineering specifications, test results, logistics data, and even certain financial information related to contract performance can qualify as CUI. If you are unsure, the CUI marking guide and your contracting officer are your best resources.
Small Business Considerations
Roughly 73% of the Defense Industrial Base consists of small businesses, and the DoD has acknowledged the disproportionate burden CMMC places on these organizations. Several mechanisms exist to help:
- Phased rollout: CMMC will not appear in all contracts simultaneously, giving smaller companies time to prepare
- Self-assessment option: Level 2 self-assessment is available for some contracts, reducing the cost of third-party evaluations
- PTAC (Procurement Technical Assistance Centers): Free or low-cost consulting available through the DoD PTAC network
- Mentor-Protege programs: Large primes can sponsor small businesses and provide cybersecurity resources
Despite these accommodations, the reality is stark: if you cannot achieve CMMC certification, you cannot compete for DoD contracts that require it. For strategies tailored to smaller organizations, see our section on CMMC for small defense contractors below.
---
The CMMC Certification Timeline in 2026
The CMMC 2.0 final rule took effect on December 16, 2024, but the DoD is implementing it in phases to avoid shocking the defense industrial base.
Phase 1: Self-Assessments (Started Late 2025)
Since late 2025, contracting officers have been including CMMC Level 1 self-assessment and Level 2 self-assessment requirements in new solicitations and contract awards. This means:
- You may already be seeing CMMC self-assessment clauses in RFPs
- You need a current SPRS score based on a self-assessment of your NIST 800-171 implementation
- A senior company official must sign an affirmation in SPRS
Phase 2: C3PAO Assessments (Late 2026)
Starting approximately one year after Phase 1, contracting officers can require Level 2 C3PAO certification in solicitations. This is the phase that changes the game: you will need an independent third-party assessment before you can win certain contracts.
The practical implications:
- C3PAO assessments take weeks to months to schedule, and demand will spike as Phase 2 approaches
- You should be engaging with a C3PAO 6 to 9 months before you expect to need certification
- The assessment itself typically takes 3 to 5 days on-site, but preparation is the real time investment
Phase 3: Full Level 2 Enforcement (2027)
All DoD contracts involving CUI will require demonstrated CMMC Level 2 compliance, either through self-assessment or C3PAO certification as specified in the solicitation.
Phase 4: Level 3 Enforcement (2028)
Level 3 requirements, including government-led DIBCAC assessments, will be included in contracts supporting the most sensitive programs.
What "Phased Rollout" Means Practically
Phased rollout does not mean you can wait. Here is why:
- Contracting officers have discretion. Even in Phase 1, some contracting officers are including CMMC requirements. You cannot predict which RFPs will require it.
- Preparation takes 12 to 18 months. If you need Level 2 and have not started, you are already behind the curve for Phase 2 deadlines.
- C3PAO capacity is limited. There are a finite number of accredited assessors. As Phase 2 approaches, scheduling will become a bottleneck.
- Primes are not waiting. Many prime contractors are already requiring CMMC-equivalent cybersecurity from their subcontractors, regardless of the federal timeline.
The organizations that treat CMMC as an urgent operational priority today will have a competitive advantage over those who wait until it becomes a contractual emergency.
---
How Much Does CMMC Certification Cost?
Cost is the question every GovCon executive asks first. The honest answer is that it depends on your starting point, your CUI boundary size, and your target level. Here are realistic ranges based on industry data and assessor feedback.
Level 1 Costs: $5,000 to $30,000
Level 1 is a self-assessment against 17 basic practices. For a company with reasonable IT hygiene:
- Gap assessment and documentation: $3,000 - $10,000
- Remediation (if needed): $2,000 - $15,000
- SPRS submission and affirmation: Minimal cost (internal labor)
- Ongoing annual self-assessment: $2,000 - $5,000 per year
Level 2 Costs: $100,000 to $500,000+
Level 2 is where costs escalate significantly, especially for organizations starting from a low maturity level:
- Gap assessment: $15,000 - $50,000 (engaging a consultant to evaluate your current state against all 110 NIST 800-171 controls)
- Remediation: $50,000 - $300,000+ (implementing technical controls, upgrading infrastructure, deploying new tools)
- C3PAO assessment fee: $50,000 - $200,000 (varies by organization size and complexity)
- Documentation (SSP, POA&M, policies): $20,000 - $50,000
- Training and awareness programs: $5,000 - $15,000
Level 3 Costs: $200,000+
Level 3 costs are difficult to estimate because the enhanced NIST 800-172 controls require sophisticated capabilities like threat hunting, advanced encryption, and segmented architectures. Budget a minimum of $200,000 beyond your Level 2 investment, and potentially much more for large organizations.
Hidden Costs Most Contractors Miss
The assessment fee is just the tip of the iceberg. These ongoing costs catch many organizations off guard:
- Managed Security Service Provider (MSSP): $3,000 - $15,000/month for 24/7 monitoring, SIEM management, and incident response capabilities required by several NIST 800-171 controls
- GCC High migration: $10 - $35 per user/month premium over standard Microsoft 365 licensing for a FedRAMP High environment
- Annual penetration testing: $15,000 - $50,000
- Employee security awareness training: $2,000 - $10,000 annually
- Ongoing documentation maintenance: SSPs, POA&Ms, and policies must be kept current
- Triennial reassessment: The C3PAO assessment fee recurs every three years
- Opportunity cost: IT and security staff will spend significant time on compliance activities instead of other projects
How to Reduce Costs
The most effective cost-reduction strategy is reducing your CUI boundary. Every system, network segment, and application that handles CUI must meet all 110 controls. Fewer systems in scope means fewer controls to implement and document.
Practical approaches include:
- Segment your network. Isolate CUI-handling systems from general business systems. A well-architected enclave dramatically reduces scope.
- Use compliant-by-design tools. Instead of trying to make general-purpose cloud tools compliant, adopt platforms built for CUI environments. This is particularly relevant for CRM systems and collaboration tools.
- Leverage FedRAMP-authorized cloud services. Using a FedRAMP Moderate or High cloud provider means you inherit their physical, infrastructure, and some logical controls.
- Centralize CUI processing. The more you can consolidate CUI into fewer systems, the smaller your boundary and the lower your compliance cost.
- Automate compliance monitoring. Tools that continuously validate control implementation reduce the manual effort of maintaining compliance between assessments.
---
Step-by-Step: How to Get CMMC Certified
Certification is not an event; it is a journey. Here is the structured path that leads to a successful assessment.
Step 1: Determine Your Required Level
Start by reviewing your current and target contracts. Look for:
- DFARS 252.204-7012 clauses (indicates CUI handling)
- DFARS 252.204-7021 clauses (CMMC requirement)
- CUI marking on information received from the government or primes
- Contract Data Requirements Lists (CDRLs) that reference controlled technical information
If you only handle FCI, Level 1 is sufficient. If any CUI touches your systems, Level 2 is your baseline. Your contracting officer can clarify the required level for specific contracts.
Step 2: Conduct a Gap Assessment Against NIST 800-171
Before you can fix gaps, you need to find them. A thorough gap assessment evaluates your current security posture against each of the 110 NIST SP 800-171 controls and produces:
- A current SPRS score (calculated by subtracting points for unmet controls from 110)
- A prioritized list of gaps with risk ratings
- An estimated remediation timeline and budget
Many organizations hire a Registered Practitioner Organization (RPO) or cybersecurity consultant for this step. You can also use the DoD's free NIST 800-171 self-assessment guide, but professional guidance significantly improves accuracy.
Step 3: Create a System Security Plan (SSP)
Your SSP is the master document that describes your information system, its boundaries, and how you implement each of the 110 controls. Assessors will use this as their roadmap during the evaluation.
A strong SSP includes:
- System boundary description (what is in scope and what is not)
- Network architecture diagrams
- Data flow diagrams showing how CUI enters, moves through, and exits your environment
- Control-by-control implementation descriptions
- Roles and responsibilities for security functions
The SSP is a living document. It must be updated whenever your environment changes.
Step 4: Build and Execute a Plan of Action and Milestones (POA&M)
Your POA&M documents the gaps identified in Step 2 and your plan to close them. Under CMMC 2.0, limited POA&Ms are allowed at the time of assessment, but they come with strict rules:
- POA&M items must be closed within 180 days of certification
- Certain critical controls cannot be on a POA&M (they must be fully implemented before assessment)
- Each POA&M entry must include a responsible party, milestone dates, and required resources
A realistic, well-managed POA&M demonstrates maturity to assessors. An overstuffed POA&M signals that you are not ready.
Step 5: Implement Technical Controls
This is typically the most time-consuming and expensive step. Common technical implementations include:
- Multi-factor authentication (MFA) for all users accessing CUI systems
- Encryption of CUI at rest and in transit (FIPS 140-2 validated modules)
- Audit logging with centralized collection and 90-day retention
- Endpoint detection and response (EDR) on all endpoints in the CUI boundary
- Network segmentation to isolate CUI systems from general business networks
- Vulnerability scanning on a regular cadence with documented remediation
- Configuration management baselines for all system components
Step 6: Conduct Internal Readiness Assessment
Before engaging a C3PAO, conduct a mock assessment. This can be done internally or with the help of an RPO. The goal is to:
- Verify all controls are implemented and operating effectively
- Test your evidence collection process (assessors will ask for proof)
- Identify any remaining gaps that need remediation
- Confirm your SSP accurately reflects your current environment
- Train staff on assessment interview procedures
Step 7: Select and Engage a C3PAO
Find accredited C3PAOs through the CyberAB Marketplace. When evaluating C3PAOs, consider:
- Their experience with organizations of your size and industry
- Availability and scheduling (book early, as demand increases)
- Their communication style and willingness to explain the process
- References from other defense contractors
Engage your C3PAO at least 6 months before you need certification. They will conduct a pre-assessment review to help you understand what to expect.
Step 8: Complete the Formal Assessment
The C3PAO assessment typically involves:
- Document review: SSP, POA&M, policies, procedures, and prior assessment results
- Technical testing: Verifying that controls are technically implemented (not just documented)
- Personnel interviews: Assessors will interview IT staff, system administrators, and end users to verify that controls are understood and practiced
- Physical inspection: Verifying physical security controls at facilities that house CUI systems
After the assessment, the C3PAO submits results to the CMMC eMASS (Enterprise Mission Assurance Support Service) system. If you pass, your certification is valid for three years.
Step 9: Maintain Continuous Compliance
Certification is not a one-time achievement. Between assessments, you must:
- Conduct annual self-assessments and update your SPRS score
- Maintain and update your SSP as your environment changes
- Close any POA&M items within the 180-day window
- Continue security awareness training
- Monitor for and respond to security incidents per your incident response plan
- Prepare for triennial reassessment
---
CMMC for CRM and Business Systems
This is the compliance gap that almost no one is talking about, and it may be the most dangerous one in your environment.
Why Your CRM Is Probably in Your CMMC Assessment Boundary
Here is the question most contractors have never considered: does your CRM system store, process, or transmit CUI?
If your business development team receives emails from government program managers, and those emails contain technical requirements, contract specifications, or other controlled information, and those emails sync into your CRM, then your CRM is processing CUI. It is now inside your CMMC assessment boundary, and every one of the applicable NIST 800-171 controls must be implemented on that system.
The most common CUI ingress vector is email. Government contacts send program data, technical specifications, and contract details via email. Your CRM ingests those emails and attaches them to contact records, opportunity records, or account records. Suddenly, your entire CRM database is potentially contaminated with CUI.
For a deeper analysis of this risk, read our guide on email ingestion as a CUI compliance blind spot.
The CRM Compliance Problem
Most commercial CRM platforms, including Salesforce, HubSpot, and Microsoft Dynamics 365 (standard), were not designed to handle CUI. They typically fail CMMC requirements in several areas:
- Access Control (AC): Lacking per-record CUI classification and role-based access granular enough to restrict CUI to authorized users only
- Audit and Accountability (AU): Insufficient audit logging of who accessed which CUI records and when
- System and Communications Protection (SC): Data may be processed in environments that are not FedRAMP authorized at the appropriate level
- Media Protection (MP): CUI in CRM reports and exports may not be properly marked or controlled
See our CMMC compliant CRM checklist for a detailed control-by-control evaluation framework.
AI Features in CRMs Creating Compliance Gaps
The problem is getting worse, not better. CRM vendors are racing to embed AI features: Salesforce Einstein, HubSpot AI, Microsoft Copilot for Dynamics. These features send your CRM data to cloud AI models for analysis, summarization, and recommendations.
If your CRM contains CUI, these AI features are transmitting CUI to cloud infrastructure that is almost certainly not authorized to process it. This is a CMMC violation waiting to be discovered during an assessment.
How to Handle CRM Compliance
You have two strategic options:
- Scope your CRM out of the CUI boundary. Implement strict policies and technical controls to prevent CUI from entering your CRM. This means disabling email sync for government contacts, training staff never to paste CUI into CRM fields, and implementing DLP (Data Loss Prevention) rules. This approach is fragile because it depends on human behavior.
- Use a CUI-safe CRM architecture. Deploy a CRM system designed from the ground up to handle CUI with proper access controls, audit logging, encryption, and data classification at the record level. This is the more robust approach.
Our CUI-safe CRM guide provides detailed architecture guidance, including CUI data flow diagrams and DFARS 7012 CRM requirements that map CRM functions to specific NIST 800-171 controls.
---
CMMC and AI: Keeping Proposal Data Compliant
Artificial intelligence is transforming how defense contractors write proposals, analyze RFPs, and develop pricing strategies. But most AI tools are a CMMC compliance disaster.
The Cloud AI Problem
Tools like ChatGPT, Google Gemini, Microsoft Copilot, and similar cloud-based AI services process your data on shared infrastructure operated by the AI vendor. When you paste proposal content, pricing data, or technical approaches into these tools, that data leaves your environment and enters theirs.
If any of that data qualifies as CUI, or even if it includes proprietary competitive information like win themes and pricing strategies, you have just transmitted it outside your controlled boundary. Under NIST 800-171 control families for System and Communications Protection and Media Protection, this is a violation.
Even if the data is not CUI, consider the competitive risk: your proposal pricing, technical differentiators, and teaming strategies are now sitting on someone else's servers.
Private LLMs: The Only Compliant AI Architecture for CUI
The only way to use AI for CUI-related work and remain CMMC compliant is to run the AI model locally within your CUI boundary. This means:
- The model runs on infrastructure you control (on-premises or in your FedRAMP-authorized cloud enclave)
- No data is transmitted to external AI services
- All processing, training, and inference happens within your security boundary
- Audit logging captures all AI interactions for accountability
This approach is called a private LLM or sovereign AI architecture. It provides the productivity benefits of AI without the compliance risk of cloud-based tools.
For defense contractors using AI for proposal automation, the architecture must ensure that RAG (Retrieval-Augmented Generation) systems maintain isolation between programs, preventing cross-contamination of CUI between different contracts.
Proposal Automation Must Keep Data Local
Proposal pricing, financial projections, win themes, past performance narratives, and technical approaches are the crown jewels of a defense contractor. Even if they are not formally CUI, they represent existential competitive risk if exposed.
A compliant proposal automation system must:
- Run LLMs locally, not in the cloud
- Isolate data between programs and contracts
- Maintain audit trails of all AI-generated content
- Enforce access controls on proposal workspaces
- Keep financial data (pricing, rates, projections) within your controlled environment
For a comprehensive treatment of this topic, see our compliant AI proposal guide. Cabrillo's Proposal OS is built on this architecture: private LLMs that keep all proprietary data local, with RAG isolation between programs and full audit logging for CMMC compliance.
---
CMMC for Small Defense Contractors
Small businesses form the backbone of the Defense Industrial Base. The DoD knows this, and CMMC 2.0 includes accommodations for smaller organizations. But the compliance burden is still significant, and small businesses must approach it strategically.
Unique Challenges for Small Businesses
- Budget constraints: A $150,000 compliance investment hits a $5M company very differently than a $500M company
- IT staffing: Many small contractors have one IT person (or none), while CMMC requires dedicated security functions like incident response, audit log review, and vulnerability management
- Scope complexity: Small companies often use the same systems for everything, making it harder to isolate a CUI boundary
- Knowledge gaps: Understanding 110 technical controls and how to implement them requires specialized cybersecurity expertise
Strategies to Minimize Scope and Cost
Reduce your CUI boundary aggressively. The single most impactful strategy for small businesses is minimizing the number of systems that handle CUI. Consider:
- Dedicating a small number of hardened workstations for CUI work, completely separate from general business systems
- Using a separate network segment (physical or virtual) for CUI processing
- Implementing a "clean desk" policy where CUI is only accessed in controlled environments
- Using compliant cloud enclaves (GCC High, AWS GovCloud) rather than trying to make general-purpose infrastructure compliant
Leverage managed services. Instead of building security capabilities in-house, use managed security service providers (MSSPs) who specialize in CMMC compliance. They can provide:
- 24/7 security monitoring (required by several controls)
- Vulnerability scanning and management
- Incident response capabilities
- Log management and analysis
Use compliant-by-design platforms. Choosing tools that are already built for CUI environments saves enormous time and money compared to trying to retrofit general-purpose tools. This applies to collaboration platforms, CRM systems, file storage, and AI tools.
Available Support Resources
- Procurement Technical Assistance Centers (PTACs): Free or low-cost counseling available nationwide to help small businesses navigate federal contracting, including CMMC readiness
- SBA resources: The Small Business Administration offers cybersecurity training and connects businesses with SCORE mentors who have defense contracting experience
- Mentor-Protege programs: Under DoD's Mentor-Protege Program, large primes can provide financial assistance, technical support, and cybersecurity resources to small business proteges
- DoD CIO resources: The DoD Chief Information Officer's website provides free self-assessment tools and guidance documents
- Project Spectrum: A free resource from the DoD for small businesses to assess and improve their cybersecurity posture
For broader guidance on competing effectively as a small defense contractor, see our winning federal contracts guide.
---
Understanding C3PAOs and the Assessment Process
If you need Level 2 certification with a third-party assessment, understanding the C3PAO process is essential for a smooth experience.
What Is a C3PAO?
A CMMC Third-Party Assessment Organization (C3PAO) is an independent company authorized by the Cyber Accreditation Body (CyberAB) to conduct CMMC assessments. C3PAOs employ certified CMMC assessors who evaluate your organization's cybersecurity controls against the CMMC requirements.
Think of a C3PAO as the audit firm and the assessors as the auditors. They are independent third parties, separate from the DoD, whose job is to objectively evaluate whether your controls meet the standard.
How to Find a C3PAO
The official source for finding accredited C3PAOs is the CyberAB Marketplace at cyberab.org. You can search by:
- Geographic location
- Industry specialization
- Assessment level (Level 2 or Level 3)
- Availability
When selecting a C3PAO, consider:
- Experience with your industry segment (IT services vs. manufacturing vs. engineering have different control environments)
- Team size and availability (larger C3PAOs may have shorter wait times)
- Communication approach (some C3PAOs offer pre-assessment consulting; others maintain strict independence)
- Cost (assessment fees vary significantly between C3PAOs)
What to Expect During an Assessment
A typical Level 2 C3PAO assessment follows this sequence:
- Pre-assessment planning (2-4 weeks before): The C3PAO reviews your SSP, network diagrams, and other documentation. They identify areas of focus and schedule interviews.
- On-site assessment (3-5 days): Assessors conduct interviews with key personnel (IT, security, management, end users), observe processes in action, inspect physical security, and technically verify controls through configuration reviews and testing.
- Evidence collection: You will need to provide evidence for each control. This includes configuration screenshots, policy documents, training records, audit logs, vulnerability scan results, and incident response records.
- Preliminary findings: At the end of the on-site assessment, the lead assessor typically provides preliminary findings, including any identified deficiencies.
- Final report and submission: The C3PAO compiles results and submits them to the CMMC eMASS system. If you meet all requirements (with allowable POA&Ms), you receive certification.
Common Findings and How to Address Them
Based on early CMMC assessments and the extensive NIST 800-171 assessment experience that preceded them, the most common deficiencies include:
- Incomplete audit logging: Organizations often log authentication events but miss file access, privilege changes, and failed access attempts
- Weak access control: Excessive administrative privileges, shared accounts, and lack of least-privilege enforcement
- Missing or outdated documentation: SSPs that do not reflect the current environment, policies that exist on paper but are not practiced
- Insufficient incident response testing: Having an incident response plan is not enough; you must test it through tabletop exercises or simulations
- Configuration management gaps: Systems not hardened to a baseline, missing patch management procedures, or undocumented changes
POA&M Management Post-Assessment
If your assessment results include POA&M items, you have 180 days to close them. During this period:
- Work is tracked in your POA&M with clear milestones and responsible parties
- The C3PAO or a designated assessor will verify closure of POA&M items
- Failure to close POA&Ms within 180 days can result in revocation of your conditional certification
- Critical controls cannot be placed on POA&M; they must be fully implemented before assessment
---
Building Your Secure Operations Stack for CMMC
Your technology choices directly impact your CMMC boundary size, compliance cost, and operational efficiency. Building a secure operations stack is not just about checking boxes; it is about choosing tools that make compliance a natural byproduct of how you work.
How ready are you for CMMC?
Take our free readiness assessment. 10 questions, instant results, no email required until you want your report.
Check Your CMMC Readinessor try our free CMMC Cost Estimator →
The Technology Decisions That Impact Your Boundary
Every application that touches CUI expands your assessment boundary. This means your choice of email platform, collaboration tools, CRM system, file storage, proposal management software, and even your AI tools all have CMMC implications.
The goal is to select platforms that are either:
- Already authorized to process CUI (FedRAMP Moderate/High, DoD IL4/IL5), or
- Architecturally isolated so they never touch CUI and remain outside your boundary
Collaboration Tools
Your collaboration platform is where your team discusses contracts, shares documents, and coordinates work. If those discussions involve CUI, the platform must be compliant.
Your options include:
- Microsoft Teams GCC High: FedRAMP High authorized, designed for CUI. Higher licensing cost but inherits Microsoft's compliance controls.
- Mattermost: Self-hosted, open-source option that keeps all data on your infrastructure. Full control but requires you to manage the platform.
- Slack: The standard version is not authorized for CUI. Slack GovSlack exists but has limited adoption in the DIB.
For a detailed comparison, read our Mattermost vs Teams vs Slack CUI comparison.
CRM Systems
As discussed earlier, your CRM is likely in your CMMC boundary whether you realize it or not. The architecture you choose matters enormously:
- Salesforce Government Cloud Plus: FedRAMP High authorized, but expensive and may require significant customization for CUI record-level controls
- Microsoft Dynamics 365 GCC High: Integrated with the Microsoft GCC High ecosystem, but licensing costs are substantial
- CUI-safe CRM architecture: Purpose-built systems designed for per-record CUI classification, email boundary enforcement, and local data processing
Our CUI-safe CRM guide details the architectural requirements for a CRM that supports CMMC compliance without expanding your boundary unnecessarily.
AI and Automation Tools
This is the frontier where most contractors are getting it wrong. Cloud-based AI tools are not compliant for CUI work. The compliant approach is:
- Private/sovereign LLMs running within your security boundary
- RAG systems with program isolation to prevent cross-contamination
- Local processing of all proposal content, pricing, and competitive intelligence
See our compliant AI proposal guide for detailed architecture guidance.
Data Sovereignty as a Design Principle
The thread connecting all of these technology decisions is data sovereignty: maintaining control over where your data is processed, stored, and transmitted. For CMMC compliance, data sovereignty means:
- CUI never leaves your controlled environment without authorization
- AI processing happens locally, not in vendor clouds
- CRM data stays within your boundary, not scattered across SaaS platforms
- Financial projections, pricing models, and competitive intelligence remain under your control
Cabrillo is built on this principle. Our platform keeps CRM data, proposal content, and financial projections local, processing everything within your infrastructure rather than sending it to the cloud. This approach does not just satisfy CMMC; it protects your competitive advantage.
For a comprehensive view of the operational technology stack, see our secure operations guide.
---
How Cabrillo Helps with CMMC Compliance
Cabrillo was designed from day one for defense contractors who need to move fast without breaking compliance. Here is how the platform maps to your CMMC requirements.
Compliance Command Center
Cabrillo's Compliance Command Center provides a single dashboard that maps your readiness across all 14 NIST 800-171 control families. Instead of managing compliance in spreadsheets, you get:
- Real-time visibility into control implementation status
- Automated evidence collection for common controls
- Gap identification with prioritized remediation guidance
- POA&M tracking with milestone management
- Assessment preparation checklists tailored to your environment
Private LLMs
Every AI capability in Cabrillo runs on private LLMs deployed within your infrastructure. CUI never leaves your boundary for AI processing. This includes:
- Proposal content generation and refinement
- RFP analysis and compliance matrix creation
- Past performance narrative drafting
- Competitive intelligence analysis
- Financial projection modeling
CUI-Safe CRM
Cabrillo's CRM is built with CUI handling as a core requirement, not an afterthought:
- Per-record CUI classification: Every record can be tagged with its CUI category and handling requirements
- Email boundary enforcement: Automated controls prevent CUI from being ingested from unauthorized sources or transmitted to unauthorized recipients
- Role-based access control: Granular permissions ensure only authorized personnel access CUI records
- Complete audit logging: Every access, modification, and export of CUI records is logged for assessment evidence
ERP Integration
Cabrillo connects with your existing ERP systems (Costpoint, Unanet, and others) to bring real financial data into your business development process. Revenue forecasting uses actual contract financials, not spreadsheet estimates, while keeping all financial data within your controlled environment.
Data Sovereignty by Design
Everything in Cabrillo processes locally. Your CRM data, proposal content, financial projections, pipeline analytics, and AI outputs all stay within your infrastructure. This is not a feature we added for compliance; it is the architectural foundation the platform is built on.
Ready to see how Cabrillo maps to your specific CMMC requirements? Schedule a CMMC assessment to get a personalized readiness evaluation.
---
Frequently Asked Questions
What is CMMC 2.0 and when does it take effect?
CMMC 2.0 (Cybersecurity Maturity Model Certification) is the DoD's framework for verifying that defense contractors have implemented adequate cybersecurity controls to protect sensitive information. The final rule took effect on December 16, 2024, with a phased rollout: self-assessment requirements began appearing in contracts in late 2025, and C3PAO-led third-party assessments will be required in solicitations starting in late 2026. For a detailed timeline, see our CMMC 2.0 roadmap.
What is the difference between CMMC Level 1 and Level 2?
Level 1 requires 17 basic cybersecurity practices drawn from FAR 52.204-21 and applies to contractors handling only Federal Contract Information (FCI). It is self-assessed annually. Level 2 requires 110 controls from NIST SP 800-171 and applies to contractors handling Controlled Unclassified Information (CUI). Level 2 typically requires a third-party assessment by a C3PAO every three years, though some non-critical CUI contracts may allow self-assessment. The jump from Level 1 to Level 2 is significant in both complexity and cost.
How much does CMMC certification cost?
Costs vary widely based on your starting maturity level and organization size. Level 1 self-assessment typically costs $5,000 to $30,000. Level 2 total costs, including gap assessment, remediation, and C3PAO assessment, typically range from $100,000 to $500,000+. The largest variable is remediation: organizations that already have strong cybersecurity foundations spend less than those starting from scratch. Reducing your CUI boundary is the most effective way to control costs.
Who needs CMMC certification?
Every company that does business with the Department of Defense, either as a prime contractor or subcontractor, will need some level of CMMC certification. If you handle only FCI, Level 1 is sufficient. If you handle CUI, which includes technical data, engineering specifications, and controlled technical information, you need Level 2 or higher. Approximately 73% of the Defense Industrial Base consists of small businesses, and none are exempt from CMMC requirements.
Does CMMC apply to subcontractors?
Yes. CMMC requirements flow down through the entire supply chain. If a prime contractor shares CUI with you as part of contract performance, you must achieve the CMMC level specified in your subcontract agreement. Many prime contractors are already adding CMMC requirements to subcontract terms, even before the DoD mandates it in their prime contracts. This is a critical consideration for small businesses in the defense supply chain.
What happens if I fail a CMMC assessment?
If your C3PAO assessment identifies deficiencies, the outcome depends on their severity. For limited deficiencies, you may receive a conditional certification with a POA&M that must be closed within 180 days. For significant deficiencies, you will not receive certification and must remediate before reassessment. Failing an assessment does not result in penalties per se, but you will be unable to win contracts that require the certification level you failed to achieve. You can engage a C3PAO for reassessment once you have addressed the findings.
Can I self-assess for CMMC Level 2?
In certain cases, yes. CMMC 2.0 allows self-assessment for Level 2 on contracts involving CUI that the DoD determines is not critical to national security. However, the contracting officer makes this determination, and many contracts involving CUI will require a C3PAO third-party assessment. Self-assessed Level 2 still requires full implementation of all 110 NIST 800-171 controls, a completed SSP, an SPRS score submission, and senior official affirmation. It is the same standard, just a different verification method.
What is a C3PAO?
A C3PAO (CMMC Third-Party Assessment Organization) is an independent company authorized by the Cyber Accreditation Body (CyberAB) to conduct CMMC assessments. C3PAOs employ certified CMMC assessors who evaluate your organization's cybersecurity controls against the Level 2 or Level 3 requirements. You can find accredited C3PAOs through the CyberAB Marketplace at cyberab.org. It is recommended to engage a C3PAO at least 6 months before you need certification, as scheduling demand is expected to increase significantly as Phase 2 enforcement approaches.
How long does CMMC certification take?
The timeline depends on your starting point. For an organization with a mature cybersecurity program that already meets most NIST 800-171 controls, the process from gap assessment to certification can take 6 to 9 months. For organizations starting with significant gaps, expect 12 to 18 months or more. The longest phase is typically remediation, which involves implementing technical controls, deploying new tools, writing documentation, and training staff. The C3PAO assessment itself takes 3 to 5 days on-site, but scheduling may add weeks or months of lead time.
What is the difference between CMMC and NIST 800-171?
NIST SP 800-171 is a set of 110 security controls that defines how CUI should be protected in nonfederal systems. CMMC is a certification framework that verifies whether those controls (and others) are actually implemented. Think of NIST 800-171 as the textbook and CMMC as the exam. Before CMMC, contractors self-attested to NIST 800-171 compliance under DFARS 252.204-7012. CMMC adds independent third-party verification to ensure contractors are not just claiming compliance but actually achieving it. CMMC Level 2 maps directly to NIST 800-171 Rev 2.
What are CMMC POA&Ms?
A Plan of Action and Milestones (POA&M) is a document that identifies cybersecurity deficiencies and outlines a plan to remediate them. Under CMMC 2.0, limited POA&Ms are allowed at the time of a Level 2 assessment, meaning you can receive conditional certification even if a small number of non-critical controls are not yet fully implemented. However, all POA&M items must be closed within 180 days, and certain critical controls cannot be placed on a POA&M. If you fail to close POA&M items within the deadline, your conditional certification may be revoked.
Is CMMC mandatory in 2026?
CMMC is mandatory for any DoD contract that includes a CMMC requirement clause, and the DoD has been phasing these clauses into solicitations since late 2025, continuing through 2026. In late 2025 and early 2026, self-assessment requirements (Level 1 and Level 2 self-assessment) are being included in contracts. By late 2026, C3PAO-led Level 2 assessments will begin appearing in solicitations. While not every contract will require CMMC immediately, the direction is clear: CMMC will become a standard requirement across DoD contracting. Waiting is a competitive risk.
How do I find a C3PAO?
The official directory of accredited C3PAOs is the CyberAB Marketplace at cyberab.org/marketplace. You can filter by location, capability level, and availability. When evaluating C3PAOs, request references from organizations similar to yours in size and industry. Ask about their assessment methodology, team experience, and timeline. Pricing varies significantly, so obtain quotes from multiple C3PAOs. Also consider engaging a Registered Practitioner Organization (RPO) for pre-assessment preparation, but note that your RPO cannot also serve as your C3PAO due to conflict-of-interest rules.
What is CUI and how does it relate to CMMC?
Controlled Unclassified Information (CUI) is information that the government creates or possesses, or that a contractor creates or possesses on behalf of the government, that requires safeguarding or dissemination controls. CUI categories are defined in the CUI Registry (32 CFR Part 2002) and include technical data, export-controlled information, critical infrastructure data, and certain financial and legal information. CMMC Level 2 and Level 3 exist specifically to protect CUI. If your organization handles CUI in any form, you need at minimum CMMC Level 2 certification. Understanding what data in your environment qualifies as CUI is the essential first step in scoping your compliance effort.
Does my CRM need to be CMMC compliant?
If your CRM stores, processes, or transmits CUI, then yes, it must meet all applicable NIST 800-171 controls and falls within your CMMC assessment boundary. The most common way CUI enters a CRM is through email ingestion: government contacts send emails containing technical requirements or contract details, and your CRM automatically attaches those emails to contact or opportunity records. Most commercial CRMs (Salesforce, HubSpot, Dynamics 365 standard) are not designed for CUI handling. You must either scope your CRM out of the CUI boundary by preventing CUI ingestion, or use a CUI-safe CRM architecture designed for controlled information. This is one of the most overlooked compliance gaps in the Defense Industrial Base.
Official Resources
Related Guides
Dive deeper into specific topics covered in this guide:
CMMC Readiness Checklist
110-control checklist mapped to NIST 800-171. Track your compliance status across all 14 security families.
No spam. Unsubscribe anytime. Privacy Policy
How ready are you for CMMC?
Take our free readiness assessment. 10 questions, instant results, no email required until you want your report.
Check Your CMMC Readinessor try our free CMMC Cost Estimator →

Cabrillo Club
Editorial Team
Cabrillo Club is a defense technology company building AI-powered tools for government contractors. Our editorial team combines deep expertise in CMMC compliance, federal acquisition, and secure AI infrastructure to produce actionable guidance for the defense industrial base.
Related Articles

CRM Compliance Checklist for Defense Contractors: Is Yours CMMC Ready?
A practical, technical checklist to assess whether your CRM can support CMMC-aligned controls for handling CUI. Learn architecture, configs, and evidence to collect.

CMMC Flowdown Requirements and Your CRM: What Primes Owe Subcontractors (and Vice Versa)
When primes share CUI with subcontractors via CRM, the sub's CRM must also meet CMMC requirements. This guide covers 32 CFR 170.23 flowdown rules, how CUI flows through CRM in prime-sub relationships, verification obligations, common failures, and why purpose-built CRM solves the 300,000-company supply chain compliance problem.

CRM Migration to CMMC Compliance: The Defense Contractor's Roadmap
The defense contractor's roadmap for migrating CRM to CMMC compliance before Phase 2 enforcement. Covers three migration paths (gov cloud upgrade, purpose-built CRM, dual environment), 8-phase timeline, CUI data cleansing, integration challenges, and realistic cost analysis ($50K-$200K).