CMMC Level 2 Requirements: All 110 Security Controls Explained
CMMC Level 2 requirements are the compliance standard that most defense contractors must meet to continue handling Controlled Unclassified Information (CUI) on DoD contracts. Level 2 maps directly to all 110 security requirements in NIST SP 800-171 Rev 2, organized across 14 control families — from Access Control to System and Information Integrity.
This guide explains what each domain requires, what assessors actually look for, and how to implement controls efficiently using modern compliance tools.
How CMMC Level 2 Maps to NIST 800-171
CMMC 2.0 Level 2 is a one-to-one mapping to NIST SP 800-171 Rev 2. Every practice in Level 2 corresponds to a specific NIST requirement. The Cyber AB and NIST provide the authoritative control descriptions, but assessors evaluate your implementation — not just your policies.
The 110 requirements are organized into 14 families. Here's every domain, its requirement count, and what you need to know.
Access Control (AC) — 22 Requirements
Access Control is the largest domain and often the most complex to implement. It governs who can access CUI, from where, and under what conditions.
Core requirements include:
- AC.L2-3.1.1: Limit system access to authorized users, processes, and devices
- AC.L2-3.1.2: Limit access to the types of transactions and functions authorized users are permitted to execute
- AC.L2-3.1.3: Control the flow of CUI in accordance with approved authorizations
- AC.L2-3.1.5: Employ the principle of least privilege
- AC.L2-3.1.7: Prevent non-privileged users from executing privileged functions
- AC.L2-3.1.12: Monitor and control remote access sessions
- AC.L2-3.1.14: Route remote access via managed access control points
- AC.L2-3.1.18: Control connection of mobile devices
- AC.L2-3.1.22: Control CUI posted or processed on publicly accessible systems
What assessors look for: Evidence of role-based access control (RBAC) implementation, documented access authorization procedures, session timeout configurations, remote access policies with MFA, and CUI flow diagrams showing how data moves between systems. They'll verify that access reviews happen regularly — not just that a policy exists.
Implementation tip: Define your CUI boundary first. Every system inside the boundary needs full AC controls. Cabrillo Club's CUI-safe CRM enforces role-based access natively, reducing the number of custom AC implementations needed.
Awareness and Training (AT) — 3 Requirements
- AT.L2-3.2.1: Ensure personnel are aware of security risks associated with their activities
- AT.L2-3.2.2: Ensure personnel are trained to carry out their information security responsibilities
- AT.L2-3.2.3: Provide security awareness training on recognizing and reporting potential indicators of insider threat
What assessors look for: Training records with dates, completion tracking, role-specific training for system administrators, and evidence that training covers CUI handling procedures — not just generic cybersecurity awareness.
Audit and Accountability (AU) — 9 Requirements
Audit logging proves compliance and enables incident investigation. This domain requires comprehensive logging, protection of audit data, and regular review.
Core requirements include:
- AU.L2-3.3.1: Create and retain system audit logs and records
- AU.L2-3.3.2: Ensure actions of individual system users can be uniquely traced
- AU.L2-3.3.5: Correlate audit review, analysis, and reporting processes
- AU.L2-3.3.8: Protect audit information and audit logging tools from unauthorized access
- AU.L2-3.3.9: Limit management of audit logging functionality to a subset of privileged users
What assessors look for: Audit log configurations showing WHO did WHAT, WHEN, and WHERE. Logs must be retained for a defined period (typically 1+ year), protected from tampering, and actually reviewed — assessors may ask to see evidence of log review findings.
Common failure point: Many contractors enable logging but never review the logs. Automated SIEM tools address this, but assessors want to see evidence of human review or alert triage, not just tool deployment.
Configuration Management (CM) — 9 Requirements
Configuration management ensures systems are consistently configured and changes are tracked.
- CM.L2-3.4.1: Establish and maintain baseline configurations and inventories
- CM.L2-3.4.2: Establish and enforce security configuration settings
- CM.L2-3.4.5: Define, document, approve, and enforce physical and logical access restrictions associated with changes
- CM.L2-3.4.6: Employ the principle of least functionality (disable unnecessary services)
- CM.L2-3.4.8: Apply deny-by-exception (blacklisting) policy to prevent the use of unauthorized software
What assessors look for: Hardware and software inventories, documented baseline configurations (CIS Benchmarks or DISA STIGs), change management procedures with approval records, and evidence that systems match their documented baselines.
Identification and Authentication (IA) — 11 Requirements
IA controls verify that users and devices are who they claim to be before granting access.
Core requirements include:
- IA.L2-3.5.1: Identify system users, processes, and devices
- IA.L2-3.5.2: Authenticate the identity of users, processes, and devices
- IA.L2-3.5.3: Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts
- IA.L2-3.5.7: Enforce a minimum password complexity
- IA.L2-3.5.10: Store and transmit only cryptographically-protected passwords
What assessors look for: MFA deployed on all accounts with CUI access (not just admins), password policy enforcement in Active Directory or identity provider, unique account identification (no shared accounts), and certificate-based authentication where applicable.
Key requirement: MFA is non-negotiable for Level 2. Every user accessing CUI — whether locally or remotely — must use multifactor authentication. This is one of the most frequently cited deficiencies in NIST 800-171 self-assessments.
Incident Response (IR) — 3 Requirements
- IR.L2-3.6.1: Establish an operational incident-handling capability
- IR.L2-3.6.2: Track, document, and report incidents to designated officials and/or authorities
- IR.L2-3.6.3: Test the organizational incident response capability
What assessors look for: A documented incident response plan (IRP) that specifically addresses CUI incidents, evidence of tabletop exercises or actual incident handling, designated incident response team members, and DFARS 7012 reporting procedures (72-hour notification to DIBNet).
Maintenance (MA) — 6 Requirements
System maintenance controls ensure that maintenance activities don't introduce security risks.
- MA.L2-3.7.1: Perform maintenance on organizational systems
- MA.L2-3.7.2: Provide controls on tools, techniques, and personnel for system maintenance
- MA.L2-3.7.5: Require multifactor authentication to establish nonlocal maintenance sessions and terminate such sessions when complete
- MA.L2-3.7.6: Supervise maintenance activities of personnel without required access authorization
What assessors look for: Maintenance logs, procedures for remote maintenance sessions (with MFA), media sanitization before maintenance equipment leaves the facility, and escorting procedures for third-party maintenance personnel.