CMMC COMPLIANCE CHECKLIST
CMMC Level 2 requires your organization to implement all 110 security controls from NIST SP 800-171 before a C3PAO assessment. This checklist maps every control family, explains what assessors look for, and gives you a concrete path from gap assessment to certification. Use it to audit your current posture, prioritize remediation, and track progress toward compliance.
What Is CMMC and Who Needs It?
The Cybersecurity Maturity Model Certification is the Department of Defense's mandatory cybersecurity framework for defense contractors handling Controlled Unclassified Information.
CMMC 2.0 replaced the original five-tier model with three streamlined levels. Level 1 covers 15 basic safeguarding practices for Federal Contract Information (FCI) and allows annual self-assessment. Level 2 maps directly to the 110 security requirements in NIST SP 800-171 Rev 2 and requires a third-party assessment by a CMMC Third-Party Assessment Organization (C3PAO) for contracts involving CUI. Level 3 adds requirements from NIST SP 800-172 for the most sensitive DoD programs and requires government-led assessments.
Every company in the Defense Industrial Base (DIB) that handles CUI must achieve at least CMMC Level 2 certification before being awarded new DoD contracts. Prime contractors, subcontractors, and suppliers throughout the supply chain are all subject to CMMC requirements. The DoD began including CMMC clauses in contracts starting in 2025, with full rollout across all applicable solicitations by 2028.
The consequences of non-compliance are severe: loss of existing DoD contracts, ineligibility for new awards, and potential False Claims Act liability if you misrepresent your compliance status. The average SPRS score across the DIB is currently negative, meaning most contractors have significant gaps to close before they can pass a C3PAO assessment.
Preparing for Your CMMC Assessment
Watch our overview of the CMMC assessment process, what C3PAOs evaluate, and how to prepare your organization for a successful certification.
CMMC Level 1 Checklist: 17 FAR 52.204-21 Practices
Level 1 covers Federal Contract Information (FCI) protection through 17 basic safeguarding practices derived from FAR 52.204-21. These are the minimum cybersecurity requirements for any company doing business with the DoD. Level 1 allows annual self-assessment without a C3PAO.
Every organization in the defense supply chain must meet Level 1 at minimum. These 17 practices represent fundamental cyber hygiene that most businesses should already have in place. If your contracts only involve FCI (not CUI), Level 1 self-assessment may be sufficient. However, if you handle any Controlled Unclassified Information, you must achieve Level 2 certification through a C3PAO assessment.
Not Sure Which CMMC Level You Need?
Our CMMC-RP certified team will review your contracts and determine the exact level and scope required for your organization.
CMMC Level 2 Compliance Checklist: All 14 Control Families
This checklist covers every NIST 800-171 control family required for CMMC Level 2. Use it to identify gaps, assign remediation owners, and track progress toward your C3PAO assessment.
1. Access Control (AC) — 22 Requirements
The largest control family and the one where most contractors fail. Access control governs who can reach CUI, how they authenticate, and what they can do once inside your systems.
2. Awareness and Training (AT) — 3 Requirements
Every person who touches CUI must understand the threats and their responsibilities. Assessors look for documented training programs with attendance records.
3. Audit and Accountability (AU) — 9 Requirements
Logging is the foundation of accountability. C3PAO assessors will verify that you capture, protect, and regularly review audit records across all CUI-touching systems.
4. Configuration Management (CM) — 9 Requirements
Baseline configurations and change control prevent unauthorized modifications that could expose CUI. Assessors check for documented baselines and active enforcement.
5. Identification and Authentication (IA) — 11 Requirements
Multi-factor authentication is mandatory for all remote access and privileged accounts. Weak authentication is one of the top reasons contractors fail their assessment.
6. Incident Response (IR) — 3 Requirements
You need a documented and tested incident response plan specifically covering CUI-related incidents. Assessors will ask for evidence of tabletop exercises.
7. Maintenance (MA) — 6 Requirements
System maintenance must be controlled, documented, and supervised when performed by external parties. Remote maintenance sessions require additional safeguards.
8. Media Protection (MP) — 9 Requirements
Any media that stores CUI must be protected throughout its lifecycle: storage, transport, sanitization, and disposal. This includes USBs, backup tapes, and cloud storage.
9. Personnel Security (PS) — 2 Requirements
Personnel security focuses on screening individuals before granting access to CUI and taking prompt action when employees leave or change roles.
10. Physical Protection (PE) — 6 Requirements
Physical access to facilities and systems that process CUI must be restricted, monitored, and logged. Visitor management is a common gap.
11. Risk Assessment (RA) — 3 Requirements
Risk assessments are the foundation of your entire security program. Assessors expect current, documented risk assessments with prioritized findings and active remediation.
12. Security Assessment (CA) — 4 Requirements
Internal assessments and continuous monitoring ensure your controls remain effective between C3PAO assessments. This is where your System Security Plan lives.
13. System and Communications Protection (SC) — 16 Requirements
The second-largest control family covers network boundary protection, CUI encryption, session management, and cryptographic key management. This is where CUI enclaves are defined.
14. System and Information Integrity (SI) — 7 Requirements
The final family covers flaw remediation, malware protection, security monitoring, and ensuring the integrity of your CUI processing systems.
CMMC Level 3: NIST 800-172 Enhanced Requirements
Level 3 adds 24 enhanced security requirements from NIST SP 800-172 for organizations handling the most sensitive CUI in critical DoD programs. Level 3 requires a government-led assessment by the Defense Contract Management Agency (DCMA).
CMMC Level 3 is reserved for contractors working on the most sensitive defense programs where CUI compromise would pose a significant national security risk. To pursue Level 3, your organization must first achieve and maintain Level 2 certification. The additional 24 requirements from NIST SP 800-172 focus on defending against Advanced Persistent Threats (APTs) and nation-state actors. These controls go beyond standard cybersecurity hygiene into active threat hunting, penetration-resistant architecture, and automated incident response.
Unlike Level 2 where a C3PAO conducts the assessment, Level 3 assessments are led by the government (DCMA DIBCAC). The assessment is more rigorous, evaluating not just policy documentation but demonstrating that controls can withstand sophisticated attack scenarios. Most defense contractors do not need Level 3; it applies primarily to programs involving intelligence, weapons systems, and classified-adjacent information.
Penetration-Resistant Architecture
Design systems to limit damage from APT intrusions using micro-segmentation, zero-trust architecture, and diversity in system components to prevent single-exploit lateral movement.
Threat Hunting Operations
Conduct proactive threat hunting activities across organizational systems. Employ threat intelligence, behavioral analytics, and anomaly detection to identify adversaries already inside the network.
Automated Incident Response
Implement automated mechanisms to support incident analysis, containment, and recovery. SOAR platforms and automated playbooks are expected for rapid response to detected threats.
Supply Chain Risk Management
Assess supply chain risks and implement controls to reduce exposure from compromised vendors, software dependencies, and hardware components in CUI processing environments.
Dual Authorization
Implement dual authorization for critical or sensitive operations. No single individual should be able to execute high-impact actions on CUI systems without approval from a second authorized person.
Enhanced Monitoring
Deploy enhanced monitoring capabilities including network traffic analysis, user behavior analytics, and real-time correlation of security events across all CUI system boundaries.
Level 3 cost and timeline: Organizations pursuing Level 3 should expect total investment of $500,000 to $2 million or more, depending on existing security maturity and system complexity. Timeline ranges from 18 to 36 months. Because DCMA DIBCAC conducts the assessment rather than a commercial C3PAO, scheduling depends on government availability and program priority. Organizations considering Level 3 should engage with their contracting officer and a qualified consultant early. Petronella Technology Group's CMMC consulting team can evaluate whether Level 3 applies to your contracts and develop a phased roadmap.
CMMC Certification Timeline
Most defense contractors need 6 to 18 months to go from initial gap assessment to passing their C3PAO assessment. Here is the typical path.
Gap Assessment
Month 1-2. Evaluate your current posture against all 110 controls. Calculate your SPRS score. Identify every gap and prioritize remediation.
SSP and POA&M
Month 2-4. Develop your System Security Plan documenting how each control is implemented. Create Plans of Action and Milestones for open items.
Remediation
Month 3-12. Close gaps identified in your assessment. Deploy technical controls, update policies, train personnel, and implement monitoring systems.
C3PAO Assessment
Month 9-18. Engage a C3PAO for your formal assessment. Provide evidence, support interviews, and demonstrate control implementation across all 14 families.
Organizations with mature security programs and existing compliance documentation (ISO 27001, SOC 2, FedRAMP) can often complete the process in 6 to 9 months. Those starting from scratch with minimal security infrastructure should plan for 12 to 18 months. The single biggest factor affecting timeline is the size and complexity of your CUI boundary. A CMMC gap assessment provides a realistic timeline estimate based on your specific environment.
What Happens If You Fail CMMC?
The consequences of CMMC non-compliance extend far beyond a failed assessment. Defense contractors that cannot demonstrate compliance face a cascade of business impacts that threaten their viability as government contractors.
Loss of DoD contracts: Without CMMC certification at the required level, your organization cannot bid on or be awarded contracts that require CUI handling. For many defense contractors, DoD work represents 50-80% of their revenue. Losing eligibility means losing the core of your business.
Supply chain exclusion: Prime contractors are increasingly requiring CMMC compliance from their subcontractors before the DoD mandate takes full effect. Even if your specific contract does not yet require CMMC, your prime may drop you in favor of a certified competitor.
False Claims Act exposure: If you self-attested compliance on SPRS and later fail your C3PAO assessment, you could face False Claims Act liability. Recent DOJ settlements in cybersecurity fraud cases have reached tens of millions of dollars. The DOJ's Civil Cyber-Fraud Initiative specifically targets contractors who misrepresent their cybersecurity posture.
Competitive disadvantage: Contractors that achieve CMMC certification early gain a significant competitive advantage. They can bid on contracts that non-certified competitors cannot, and they demonstrate to primes that they take CUI protection seriously.
Incident liability: A data breach involving CUI when your organization is not compliant dramatically increases your legal exposure. Without documented controls and incident response procedures, the financial and reputational damage from a breach is amplified.
CMMC Certification Cost Breakdown
Understanding the full cost of CMMC certification helps you budget accurately and avoid surprises. Costs vary significantly based on your current security posture, organization size, and the scope of your CUI boundary.
| Cost Category | Level 1 (Self-Assessment) | Level 2 (C3PAO) | Level 3 (Government-Led) |
|---|---|---|---|
| Gap Assessment | $5,000 - $15,000 | $15,000 - $50,000 | $50,000 - $100,000 |
| SSP and POA&M Development | $2,000 - $8,000 | $10,000 - $40,000 | $25,000 - $75,000 |
| Technical Remediation | $5,000 - $25,000 | $50,000 - $300,000+ | $200,000 - $1,000,000+ |
| Policy and Procedure Development | $3,000 - $10,000 | $15,000 - $50,000 | $30,000 - $80,000 |
| Security Awareness Training | $1,000 - $5,000 | $5,000 - $20,000 | $10,000 - $30,000 |
| Formal Assessment Fee | $0 (self-assessment) | $50,000 - $150,000 | Government-scheduled |
| Ongoing Annual Compliance | $5,000 - $15,000/yr | $30,000 - $100,000/yr | $75,000 - $250,000/yr |
| Total Estimated Range | $20,000 - $75,000 | $100,000 - $500,000+ | $500,000 - $2,000,000+ |
How to reduce costs: The single most effective cost reduction strategy is minimizing your CUI boundary through a dedicated CUI enclave. By isolating CUI processing into a segmented environment, you reduce the number of systems, users, and controls subject to assessment. Organizations that implement CUI enclaves typically reduce total remediation costs by 40-60%. Petronella deploys proven enclave architectures that have successfully passed C3PAO assessments. Contact us for a cybersecurity assessment to determine the optimal boundary for your organization.
Hidden costs to plan for: Budget for SIEM/log management solutions ($12,000-$60,000/year), endpoint detection and response tools ($5-$15 per endpoint/month), vulnerability scanning licenses, MFA tokens or licenses, encrypted backup solutions, and the internal staff time required for documentation and evidence gathering. Many contractors underestimate the ongoing monitoring and maintenance costs that continue after initial certification.
How to Calculate Your SPRS Score
The Supplier Performance Risk System (SPRS) score quantifies your compliance with NIST SP 800-171. Every defense contractor must submit their score to the DoD before bidding on contracts. Understanding your score is the first step toward CMMC readiness.
Your SPRS score starts at 110 (full compliance with all 110 NIST 800-171 requirements) and is reduced by the weighted value of each unmet requirement. Each of the 110 security requirements has a point value of 1, 3, or 5 based on its security impact. A perfect score is 110. The minimum acceptable score for contract award is -203, which represents having zero controls implemented. The DoD uses your SPRS score to evaluate supply chain risk, and contracting officers can see your score when evaluating bids.
How scoring works: Requirements weighted at 5 points are the most critical (examples: MFA implementation, access control enforcement, encryption of CUI). Requirements weighted at 3 points are significant but less impactful. Requirements weighted at 1 point address supporting controls. If a requirement is NOT MET and has no POA&M, you lose the full point value. If a requirement is NOT MET but has a valid POA&M, the point deduction still applies to your current score but demonstrates a path to compliance.
| SPRS Score Range | What It Means | Action Required |
|---|---|---|
| 110 | Full compliance with all NIST 800-171 controls | Ready for C3PAO assessment. Maintain and monitor. |
| 90 to 109 | Minor gaps, mostly low-weight controls missing | Close remaining gaps. 2-4 months to assessment readiness. |
| 70 to 89 | Moderate gaps, some critical controls missing | Focused remediation on 5-point controls first. 4-8 months. |
| 30 to 69 | Significant gaps across multiple control families | Comprehensive remediation program needed. 8-14 months. |
| Below 30 | Major deficiencies, most controls not implemented | Full security program build-out required. 12-18 months. |
| Negative score | Critical controls missing, high supply chain risk | Immediate action required. Consider CUI enclave to reduce scope. |
Where to submit your score: SPRS scores are submitted through the SPRS application at sprs.csd.disa.mil. You must have a valid CAGE code, a DUNS/UEI number, and an active SAM.gov registration. The score must be updated whenever your security posture changes materially, and at minimum every three years for Level 1 self-assessments or when the assessment is triennial.
Common SPRS mistakes: The most frequent error is overscoring: claiming controls as implemented when the evidence would not satisfy a C3PAO assessor. A policy document alone does not mean the control is implemented. You need evidence of consistent execution, such as access review logs, training records, vulnerability scan reports, and incident response test results. Petronella's CMMC gap assessment provides an independently validated SPRS score you can submit with confidence.
Plan of Action and Milestones (POA&M) for CMMC
A POA&M documents how your organization plans to remediate security gaps. Under CMMC 2.0, POA&Ms have specific rules about what gaps are acceptable and the timeline for closure.
Under CMMC 2.0, a limited number of security requirements can remain open with an active POA&M at the time of your C3PAO assessment. However, there are important restrictions. Not all 110 controls are eligible for POA&M treatment. Controls deemed critical by the DoD must be fully implemented before the assessment. Your C3PAO will evaluate whether open POA&M items represent a reasonable remediation path or a fundamental security gap.
POA&M requirements under CMMC 2.0:
180-Day Closure Requirement
All POA&M items must be closed within 180 days of your conditional certification. If you fail to close them within this window, your certification is revoked. This means your remediation plan must be realistic and adequately resourced before you engage the C3PAO.
Prohibited POA&M Items
Certain high-weight security requirements cannot be placed on a POA&M. These include controls related to multi-factor authentication (3.5.3), FIPS-validated encryption (3.13.11), and other requirements the DoD considers essential to CUI protection. If these are not implemented, you will not receive even a conditional certification.
What a Good POA&M Contains
Each POA&M entry must include: the specific NIST 800-171 requirement number, a description of the weakness, the planned corrective action, required resources (budget and personnel), a responsible individual, milestones with specific dates, the estimated completion date, and the current status. Vague POA&Ms are a red flag for assessors.
POA&M Scoring Impact
Controls on a POA&M still count as "NOT MET" in your SPRS score calculation. Your score reflects your current implementation status, not your planned status. This means your SPRS score may be lower than expected until all POA&M items are fully closed and verified.
Petronella recommends closing as many gaps as possible before engaging a C3PAO. While POA&Ms provide flexibility, relying on them increases risk. If your 180-day remediation timeline slips, you lose your conditional certification and must start the assessment process over. Our CMMC remediation services help contractors close gaps efficiently using proven playbooks and automated compliance monitoring. For more on building effective security training programs, see our NIST 800-50 training blueprint.
Self-Assessment vs. C3PAO Assessment: Which Do You Need?
CMMC 2.0 offers two assessment paths depending on your required level and the sensitivity of the CUI you handle. Understanding which path applies to your contracts determines your cost, timeline, and preparation requirements.
Self-Assessment (Level 1)
- Applies to Level 1 (FCI only, 17 practices)
- Annual self-assessment by your organization
- No third-party assessment required
- Affirmed by senior company official
- Results submitted to SPRS
- Lower cost: $20,000 - $75,000 total
- Faster timeline: 2-6 months typical
C3PAO Assessment (Level 2)
- Required for Level 2 (CUI, 110 controls)
- Certified C3PAO conducts on-site assessment
- Assessors interview staff and review evidence
- 3-year certification validity
- Annual affirmation required between assessments
- Higher cost: $100,000 - $500,000+ total
- Longer timeline: 6-18 months typical
How to determine your required level: Review your active and target contracts for DFARS clause 252.204-7021 (CMMC requirement). The contract will specify the required CMMC level. If your contracts reference DFARS 252.204-7012 (Safeguarding Covered Defense Information), you are handling CUI and will need Level 2. If you only have FAR 52.204-21 requirements, Level 1 self-assessment is sufficient. When in doubt, ask your contracting officer or prime contractor for clarification.
A note on Level 2 self-assessment: A limited number of Level 2 contracts will allow self-assessment rather than C3PAO assessment, but only for programs that do not involve critical national security information. The DoD will specify in the contract solicitation whether a self-assessment or C3PAO assessment is required. Petronella recommends preparing for C3PAO assessment regardless, as it demonstrates stronger commitment to security and positions you for contracts that require it. Defense contractors in Raleigh and Durham can schedule an in-person consultation with our team.
How Petronella Helps You Get Certified
Petronella Technology Group is a CMMC Registered Provider Organization (RPO) with an entire team of CMMC-RP certified practitioners. We guide defense contractors from initial assessment through successful C3PAO certification.
CMMC Gap Assessment
CMMC Remediation
NIST 800-171 Assessment
Penetration Testing
CMMC Compliance Guide
Virtual CISO Consulting
Cybersecurity Assessment ($2,497)
Managed Detection & Response
Our CMMC engagement follows a proven process: comprehensive gap assessment with validated SPRS scoring, SSP and POA&M development, hands-on remediation support, mock assessments that mirror the C3PAO methodology, and ongoing compliance monitoring using AI-powered automation. We have served clients since 2002, and our team includes Craig Petronella (CMMC-RP, CCNA, CWNE, DFE #604180) along with Blake Rea, Justin Summers, and Jonathan Wood, all CMMC-RP certified.
CMMC Compliance Checklist FAQ
What is the difference between CMMC Level 1 and Level 2?
CMMC Level 1 covers 15 basic safeguarding practices from FAR 52.204-21 and applies to organizations handling only Federal Contract Information (FCI). It allows annual self-assessment. Level 2 maps to all 110 NIST SP 800-171 security requirements and applies to organizations handling Controlled Unclassified Information (CUI). Level 2 requires a third-party assessment by a certified C3PAO. The jump from Level 1 to Level 2 is substantial, requiring significantly more documentation, technical controls, and organizational processes. Learn more in our CMMC levels explained guide.
How much does CMMC Level 2 certification cost?
Total cost ranges from $100,000 to $500,000+ depending on organizational size, current security posture, and scope of CUI processing. A gap assessment typically costs $15,000 to $50,000. Remediation is the largest variable, ranging from $50,000 for organizations with mature security to $300,000+ for those starting from scratch. The C3PAO assessment itself costs $50,000 to $150,000. CUI enclave solutions can significantly reduce total cost by minimizing the assessment boundary. Petronella's gap assessment provides a detailed cost estimate specific to your environment.
How long does it take to achieve CMMC Level 2 certification?
Most organizations need 6 to 18 months from initial gap assessment to passing the C3PAO assessment. Organizations with existing compliance programs (ISO 27001, SOC 2, or FedRAMP) and documented security policies can often complete in 6 to 9 months. Those building security programs from the ground up should plan for 12 to 18 months. The biggest factors affecting timeline are the size of your CUI boundary, current SPRS score, and available internal resources.
What is a System Security Plan (SSP) and do I need one?
A System Security Plan is the foundational document for your CMMC assessment. It describes your information system boundary, the operating environment, how you implement each of the 110 NIST 800-171 controls, and the connections to other systems. Every organization pursuing CMMC Level 2 must have a complete, current SSP. It is literally the first document your C3PAO will request. Petronella develops SSPs using the DoD-recommended format and populates each control with specific evidence of your implementation.
Can I use a CUI enclave to reduce my CMMC scope?
Yes. A CUI enclave is a segmented network environment specifically designed for processing, storing, and transmitting CUI. By isolating CUI in a dedicated enclave, you reduce the number of systems that fall within your CMMC assessment boundary. This can dramatically reduce both the cost and timeline for certification. The enclave must be properly segmented with documented data flows, and users who access the enclave must still meet all 110 requirements within that boundary. Petronella deploys CUI enclaves using proven architectures that have successfully passed C3PAO assessments.
What happens if my organization fails the C3PAO assessment?
If you do not pass, you receive a report detailing the specific controls that were not met. You can remediate the findings and request a reassessment, but you will need to pay for the reassessment. During the gap period, you cannot be awarded new contracts requiring CMMC at that level. This is why Petronella recommends conducting a thorough gap assessment and mock assessment before engaging a C3PAO, so you identify and close all gaps before the formal assessment begins.
What is an SPRS score and how do I calculate mine?
The Supplier Performance Risk System (SPRS) score measures your compliance with NIST SP 800-171. It starts at 110 (perfect compliance) and is reduced by the weighted value (1, 3, or 5 points) of each unmet security requirement. The minimum possible score is -203. You must submit your current score to SPRS at sprs.csd.disa.mil before bidding on DoD contracts. Petronella provides independently validated SPRS scoring as part of our gap assessment so you submit an accurate score that reflects reality.
What is a POA&M and how many open items can I have?
A Plan of Action and Milestones (POA&M) documents specific security gaps and your plan to remediate them. Under CMMC 2.0, you can receive a conditional certification with some open POA&M items, but all items must be closed within 180 days. Certain critical controls (such as multi-factor authentication and FIPS encryption) cannot be placed on a POA&M and must be fully implemented before assessment. Each POA&M entry must include the specific requirement, corrective action, responsible party, milestones, and estimated completion date. Our remediation team helps contractors close POA&M items efficiently.
When do CMMC requirements take effect for DoD contracts?
The DoD began including CMMC clauses in select contracts in 2025 through a phased rollout. By 2028, all applicable DoD solicitations and contracts involving CUI will require CMMC certification at the appropriate level. However, many prime contractors are already requiring CMMC compliance from subcontractors ahead of the official mandate. Organizations that start the certification process now will be positioned to bid on contracts as requirements expand across the defense industrial base. Download our 2026 compliance guide for the latest enforcement timeline.
Start Your CMMC Compliance Journey
Our CMMC-RP certified team has helped defense contractors across North Carolina prepare for and pass their C3PAO assessments. Get a gap assessment and know exactly where you stand.