Your SSP is done. Your policies look clean. Your team feels ready. Then the C3PAO walks in, and within the first hour, you're staring at a NOT MET finding. What happened?
A CMMC Level 2 assessment is a test of operational reality, not documentation quality. C3PAOs (CMMC Third-Party Assessment Organizations) don't grade your writing. They grade whether your security practices are actually running, generating evidence, and covering the right scope. That distinction trips up more contractors than any single technical control.
The gap between a polished SSP and a passing score almost always comes down to three failure points. Evidence that doesn't exist, BYOD policies that quietly blow your scope wide open, and controls that can't be deferred with a Plan of Action and Milestones (POA&M) under 32 CFR 170.21.
Here is what each trap looks like in practice, and what you can do about it before an assessor finds it first.
Your SSP documents the control. Your team follows it. But a C3PAO assessor is not reading your SSP to validate you. They are using it as a starting point for three separate tests: examining your documentation, interviewing your personnel, and testing the live system. All three apply to all 110 practices.
Most teams prepare for one of the three. The documentation is clean. The live system has not been walked through. The personnel have not been briefed on how to answer questions about actual process execution, not policy language.
The gap between what your SSP says and what your team can demonstrate on the day of the assessment is where the majority of NOT MET findings originate. We cover the full mechanics of how assessors apply Examine, Interview, and Test in How CMMC Assessors Test Your People and Live Systems.
The short version: run a dry walk of the Interview method with your team before the assessment. Pick five controls. Ask your IT administrator to walk through the process, not read the policy. The gaps will surface immediately.
But even teams with solid evidence and prepared staff can fail for a completely different reason: scope.
Here is a scenario that plays out more often than most teams realize. Your compliance officer forwards a CUI-bearing attachment to their personal Gmail so they can review it over the weekend. That one action just turned their personal phone into a CUI Asset under 32 CFR 170.19.
Scope under CMMC is defined by where CUI (Controlled Unclassified Information) is processed, stored, or transmitted. The moment CUI touches a personal device, that device falls inside your assessment boundary. And once it's inside, it has to meet every CMMC Level 2 requirement.
Can your compliance officer's personal phone prove FIPS encryption? Does it have audit logging? Configuration management controls? Almost certainly not. That's how a single email forward creates a cascade of NOT MET findings.
[IMAGE: Visual flow chart showing how CUI data flow to a personal device changes its asset category from Out-of-Scope to CUI Asset]
What are your options? You can't ignore these devices. You have to control the flow of CUI. Three defensible approaches:
If you can't prove the device is secured or the data is blocked, the assessor marks the relevant controls as NOT MET. And these failures stack up fast.
Scope problems are fixable if you catch them early. But there's a third category of failure where early detection matters even more, because some controls simply can't be fixed after the fact.
A Plan of Action and Milestones (POA&M) is a mechanism that lets you defer certain failed controls and still receive a Conditional Level 2 certification. Sounds like a safety net, right? It is. But it's a much smaller net than most contractors realize.
To even qualify for Conditional status, you need a score of at least 80% (88 out of 110 points). And per 32 CFR 170.21, two hard constraints limit what you can defer.
Six requirements can never go on a POA&M. Fail any one of these, and Conditional certification is off the table entirely:
Then there's the point-value rule most contractors miss. With one exception, only 1-point requirements can go on a POA&M. That excludes roughly 57 controls. All 5-point requirements and almost all 3-point requirements have to be fully MET at assessment time. The single exception is SC.L2-3.13.11, CUI Encryption.
And encryption scoring has its own twist. If you have no encryption at all, you lose 5 points. That's POA&M-ineligible and blocks certification entirely. But if you have encryption that lacks FIPS validation, you lose only 3 points, and that is eligible for a POA&M.
One detail catches teams here. FIPS compliant is not the same as FIPS validated. Your cryptographic module needs an active certificate on the NIST CMVP list. Revoked certificates are definitive failures. Historical certificates mean the validation expired or the standard was superseded. Assessors treat Historical status with high scrutiny. For new procurements, go with modules that carry Active CMVP status.
[Visual Placeholder: Graphic comparing POA&M eligible vs. ineligible controls based on point value and Table 1 status]
And if you do get Conditional status? The clock starts ticking. Per 32 CFR 170.21(a)(2)(iv), you have exactly 180 days to remediate every open POA&M item. A C3PAO then conducts a closeout assessment to verify the fixes.
If anything remains open after 180 days, the Conditional status lapses. You go back to square one. That means paying for and undergoing a completely new CMMC Level 2 assessment. Finding these blockers before the assessor arrives is significantly cheaper than discovering them during a closeout phase where timelines compress, costs spike, and remediation competes with daily operations.
The difference between passing and failing rarely comes down to your security posture. It comes down to whether you can prove it. You might be secure. But if the evidence isn't there, the scope isn't clean, or you're banking on a POA&M for a control that can't be deferred, the result is the same.
Schedule a Mock Assessment to pressure-test your evidence, scope, and POA&M-ineligible requirements before a C3PAO does. We help you find the gaps that lead to a NOT MET result or an expensive Conditional closeout.
Already have an SSP but not sure it will hold up? Book a Pre-Assessment Gap Analysis. We review your artifacts, logs, diagrams, and boundaries so you walk into the assessment with confidence, not questions.