On October 16, 2024, the first of two critical CMMC rules was published in the Federal Register, formally establishing the Cybersecurity Maturity Model Certification (CMMC) program under Title 32 of the Code of Federal Regulations. This was followed by the final acquisition rule amending the Defense Federal Acquisition Regulation Supplement (DFARS), which was published on September 10, 2025, and becomes effective on November 10, 2025. 1 With this final step, CMMC is no longer a future plan but a binding, contractual requirement for Department of Defense (DoD) contractors.
The program's original architect, Ms. Katie Arrington, is now Performing the Duties of the Department of Defense Chief Information Officer, signaling the DoD's unwavering commitment to the program. Her leadership suggests that CMMC requirements will be vigorously enforced on upcoming contracts to secure the Defense Industrial Base (DIB) from persistent cyber threats.
For many contractors, this transition can feel overwhelming. As a CMMC RPO, we’ve broken down the latest developments, key milestones, and what you should be doing right now to avoid disruptions. Below is an overview of the latest updates in CMMC:
With the Department of Defense (DoD) intensifying its focus on safeguarding sensitive information through the implementation of Cybersecurity Maturity Model Certification (CMMC) 2.0, contractors must meet these codified regulatory demands. Non-compliance can compromise sensitive government data and result in severe legal and financial repercussions. Recent enforcement actions, like the lawsuits involving Georgia Tech and Penn State University, highlight the serious consequences of failing to meet federal cybersecurity requirements.
Recent legal action taken by the U.S. Department of Justice against Georgia Tech underscores the high stakes universities face when conducting DoD-regulated research without adequate cybersecurity measures. Government oversight of academic institutions is mounting rapidly, particularly as the Cybersecurity Maturity Model Certification (CMMC) moves closer to full implementation in federal contracts.
“Government contractors that fail to fully implement required cybersecurity controls jeopardize the confidentiality of sensitive government information,” stated Principal Deputy Assistant Attorney General Brian M. Boynton, head of the Justice Department’s Civil Division. “The department’s Civil Cyber-Fraud Initiative was designed to identify such contractors and to hold them accountable.”
After multiple iterations, the CMMC framework has been formally established through two distinct final rules, creating a complete legal and contractual foundation.
First, the CMMC Program Rule (Title 32 CFR Part 170), published in October 2024, officially established the CMMC program's structure, assessment procedures, and accreditation bodies. This rule became effective on December 16, 2024.
Second, and most critically for contractors, the CMMC Acquisition Rule (Title 48 CFR, DFARS) was published as a final rule on September 10, 2025. This rule amends the DFARS to officially integrate CMMC into the procurement process, making it a mandatory requirement for contract eligibility.
The final DFARS rule becomes effective on November 10, 2025. Starting on this date, the DoD will begin its phased rollout, and contractors will see the new DFARS clause 252.204-7021 in solicitations.
This clause mandates that contractors handling Federal Contract Information (FCI) or Controlled Unclassified Information (CUI) must have the required CMMC certification. This status must be accurately posted in the Supplier Performance Risk System (SPRS) at the time of contract award. The window for preparation is closing, and compliance is now a prerequisite for winning new business.
The Georgia Tech case is part of a broader federal effort to enforce cybersecurity standards. A similar lawsuit involving Penn State University demonstrates this trend, where the institution was accused of failing to meet requirements under DFARS 252.204-7012, which mandates adherence to the 110 controls outlined in NIST SP 800-171. These cases are a clear indicator that the DoD is increasingly holding contractors accountable for cybersecurity lapses, especially when it involves Covered Defense Information (CDI) and CUI. This heightened scrutiny underscores the need for contractors to align with these standards to retain their DoD contract eligibility.
Beyond regulatory enforcement, CMMC certification is becoming a key differentiator in the defense market. Prime contractors are now prioritizing subcontractors that have already achieved certification, favoring vendors that:
As market conditions shift toward stricter cybersecurity enforcement, subcontractors that fail to meet CMMC requirements risk being excluded from major defense contracts.
The DoD has intensified compliance enforcement, ensuring that contractors who fail to meet cybersecurity requirements face severe consequences. Under the False Claims Act, organizations that falsely claim CMMC compliance may be subject to:
While compliance is legally required, CMMC also enhances an organization's overall cybersecurity posture and strengthens its competitiveness. Organizations that achieve early certification benefit from:
The DoD has made it clear that cybersecurity failures in the defense supply chain will not be tolerated. CMMC is now a contractually binding requirement, making non-compliance both a security vulnerability and a legal liability. By prioritizing CMMC compliance, organizations position themselves as trusted partners in national security efforts, securing both regulatory approval and market leadership.
Join our free email series for tips and resources to achieve compliance.
CMMC 2.0, officially established through final rules in 2024 and 2025, introduces a standardized approach to securing Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) within the Defense Industrial Base (DIB).
Governed by 32 CFR Part 170 and enforced through the final DFARS rule in Title 48 CFR, this framework compels defense contractors to adopt robust cybersecurity practices before receiving or renewing DoD contracts. To streamline compliance, CMMC 2.0 aligns with widely recognized standards like NIST SP 800-171 and NIST SP 800-172. Key DFARS clauses embedding these requirements include:
Rather than enforcing a one-size-fits-all security standard, CMMC 2.0 defines three levels of maturity based on the sensitivity of data handled and the degree of risk.
Aimed at contractors handling only FCI, Level 1 focuses on 15 essential cybersecurity practices from FAR 52.204-21.
Designed for contractors handling CUI, Level 2 aligns with the 110 security controls in NIST SP 800-171 Rev 2.
The highest tier applies to contractors with highly sensitive CUI, requiring defenses against Advanced Persistent Threats (APTs). It includes all 110 controls from Level 2, plus a subset of advanced controls from NIST SP 800-172.
The DoD is implementing CMMC requirements in contracts using a deliberate, three-phased approach that begins on November 10, 2025. This ensures the defense industrial base has time to prepare and the CMMC ecosystem can scale to meet demand.
The CMMC final rules establish several critical compliance requirements that contractors must understand to remain eligible for DoD contracts.
Phase | Timeframe | Focus |
---|---|---|
1 | Nov 10, 2025 – Sep 30, 2027 | Initial Rollout & Self-Assessments: CMMC requirements will begin appearing in contracts. Level 1 and most Level 2 compliance can be met with a Self-Assessment. A C3PAO-led assessment will only be required for a small subset of critical programs. |
2 | Oct 1, 2027 – Sep 30, 2028 | Ramp-Up to Third-Party Assessments: A C3PAO-led Level 2 Certification Assessment will become the requirement for most new contracts involving CUI. Government-led Level 3 assessments will also begin. |
3 | Beginning Oct 1, 2028 | Full Implementation: CMMC requirements will be included in all applicable DoD solicitations and contracts. Compliance will be a mandatory prerequisite for all contractors handling FCI or CUI. |
Schedule a free consultation to get personalized advice tailored to your needs.
Achieving CMMC certification is a multi-step process that requires a structured approach to ensure compliance with DoD cybersecurity requirements. A structured approach to CMMC certification reduces compliance risks, ensures readiness for DoD contracts, and protects your business from potential financial penalties due to cybersecurity non-compliance.
Under the CMMC Final Rule (32 CFR Part 170), any defense contractor or subcontractor handling Federal Contract Information (FCI) or Controlled Unclassified Information (CUI) must meet designated CMMC Levels 1, 2, or 3 before contract award. DFARS 252.204-7021 enforces this mandate, eliminating self-attestation for most contractors managing CUI. They must now undergo assessments by Certified Third-Party Assessment Organizations (C3PAOs) or DoD-led evaluations (DIBCAC) or face potential contract disqualification, revenue loss, and legal exposure.
Organizations that fail to meet their required CMMC certification level are barred from bidding on, renewing, or extending DoD contracts, underscoring cybersecurity’s critical role in procurement. To remain eligible, contractors must:
With full implementation by 2028, delaying certification risks losing competitiveness in DoD markets.
Prime contractors must secure their own certification and ensure subcontractor compliance with the appropriate CMMC levels. Under DFARS 252.204-7012, they must vet subcontractors for valid CMMC credentials, flow down mandatory clauses, and document security measures in SPRS. Neglecting these responsibilities can compromise a prime’s own certification status, leading to lost contracts or legal consequences. Primes also need to monitor their supply chain, including Cloud Service Providers and External Service Providers, to confirm FedRAMP Moderate Baseline standards are met.
Subcontractors can no longer opt out of CMMC obligations if they wish to remain in the DoD supply chain. Although primes oversee compliance, each subcontractor must achieve and maintain its certification independently. Because the certification process can take several months—up to two years—early preparation is essential. Key steps include:
By staying ahead of CMMC requirements, subcontractors bolster their position in DoD contracting and protect vital business opportunities as 2028 approaches.
Defense contractors and subcontractors must take proactive steps to prepare for certification, mitigate risks, and maintain contract eligibility. Here are broad steps contractors should take to become CMMC Compliant:
For small and mid-sized defense contractors, achieving CMMC compliance presents significant hurdles. Addressing these challenges early ensures a smoother transition and positions your business for continued DoD contract eligibility.
Addressing these challenges early ensures a smoother transition to CMMC compliance, positioning your business for continued DoD contract eligibility.
To reduce costs and streamline compliance, small businesses should focus on targeted, foundational strategies that minimize operational disruptions while ensuring adherence to CMMC requirements.
Before implementing controls, you must understand what CUI you have and where it resides.
The CMMC security requirements only apply to the components of your systems that process, store, or transmit CUI. Appropriately scoping your environment is a critical strategy for managing costs and effort.
Documentation is not optional; it is a core component of compliance. Federal agencies use these documents as inputs for risk-based decisions about your systems.
An important point for managing costs is that many requirements in SP 800-171 can be achieved through the creation of processes and procedures, without needing large investments in new technology.
Follow the Cyber AB, DoD, and industry organizations for the latest official updates. Participate in cybersecurity forums and DoD contractor networks to stay informed and separate current requirements from outdated guidance.
By adopting a strategic approach, small businesses can achieve CMMC compliance efficiently, ensuring long-term contract eligibility while keeping costs manageable.
The cost of CMMC certification varies significantly based on your business's size, the required compliance level, the complexity of your IT infrastructure, and your current cybersecurity posture. Budgeting for CMMC involves more than just the final assessment fee; it includes preparation, remediation, and ongoing maintenance.
CMMC Level | Assessment Type | Estimated Total Cost (Implementation & Assessment) |
---|---|---|
Level 1 | Self-Assessment | $5,000 – $15,000 Covers gap analysis, basic remediation, documentation, and internal labor. |
Level 2 (Non-Prioritized) |
Self-Assessment | $15,000 – $40,000 Higher cost due to more complex controls and documentation (SSP). |
Level 2 (Prioritized) |
C3PAO Third-Party Assessment | $50,000 – $150,000+ Includes extensive remediation, tools, consulting, and the final audit fee. |
Level 3 | DIBCAC Assessment | $150,000 - $300,000+ Due to stringent NIST SP 800-172 requirements and intensive government audit. |
Note: Costs are estimates for the entire compliance journey and vary widely based on an organization's size, complexity, and starting cybersecurity maturity. |
Businesses should budget for three main categories of expenses:
While CMMC requires investment, strategic planning can help manage the financial impact:
Budgeting early for these various costs reduces financial strain and helps avoid last-minute expenses as certification deadlines approach.
The current CMMC 2.0 final rule is based on NIST SP 800-171 Revision 2. You must comply with Revision 2 for your certification. However, it is widely expected that the DoD will update CMMC to align with Revision 3 in the future. The best practice is to meet Revision 2 requirements now while reviewing Revision 3 to inform your long-term security strategy and make future transitions easier.
No. There is no such thing as a "CMMC-certified" tool. CMMC certifies your organization's entire cybersecurity program—your policies, procedures, and how your people use technology to protect CUI. While specific tools are essential for meeting the requirements, they are only one part of the overall compliance puzzle.
An enclave is a strategy where you isolate all systems that handle CUI into a secure, segmented portion of your network (e.g., a secure cloud environment like Microsoft 365 GCC High). This drastically reduces the scope of a CMMC assessment, as only the systems within the enclave must meet the stringent security controls. This is a highly effective method for reducing cost and complexity.
SPRS is the DoD's authoritative database for tracking supplier security compliance. Under the new rule, your official CMMC certification status (or annual self-assessment affirmation) must be posted and current in SPRS. An outdated or missing entry in SPRS will make you ineligible for contract awards.
The 32 CFR Part 170 rule establishes the CMMC program itself—its structure, levels, and the rules for assessment organizations. The 48 CFR (DFARS) rule is the acquisition regulation that gives the DoD the legal authority to require CMMC certification in contracts, making it a mandatory prerequisite for contract award
The DoD may grant a temporary, limited waiver under very specific, mission-critical circumstances. However, these are expected to be extremely rare and are not a viable compliance strategy for the vast majority of contractors.
Partially. For a CMMC Level 2 or 3 assessment, you can have a POA&M for some lower-weighted security controls at the time of the audit. However, all deficiencies on the POA&M must be fully remediated within 180 days of the assessment for the final certification to be awarded. A POA&M cannot be used for the most critical security controls.
Not necessarily. The required CMMC level is determined by the type of information a contractor handles. If you are a prime contractor at Level 2 but only flow down FCI to a subcontractor, that subcontractor would only need to meet Level 1. The requirement always follows the data.
Subcontractors must meet the CMMC level based on the sensitivity of the data they handle. Prime contractors must verify this compliance before awarding subcontracts. If a subcontractor only handles FCI, Level 1 may suffice; CUI requires Level 2 or Level 3.
A NIST SP 800-171 assessment results in a self-reported numerical score (up to 110). A CMMC Level 2 Certification Assessment is a formal, pass/fail audit conducted by a Certified Third-Party Assessment Organization (C3PAO) that verifies you have met all 110 controls. The CMMC certification is a much higher bar that replaces the self-attested score for contract eligibility.
If your organization handles neither FCI nor CUI, then CMMC requirements do not apply.
With CMMC enforcement rolling out in phases, defense contractors and subcontractors must act early to prevent delays and ensure compliance before certification becomes mandatory. Waiting until the final enforcement deadline increases the risk of contract ineligibility, rushed remediation costs, and assessment backlogs due to the high demand for certified assessors.
Starting early offers several advantages:
Since CMMC Level 2 aligns directly with NIST SP 800-171, organizations should immediately begin implementing the required 110 security controls. Establishing compliance now ensures a smoother certification process, reduced financial risk, and long-term eligibility for DoD contracts.
CMMC 2.0 compliance can be both complex and resource-intensive, particularly for small to mid-sized defense contractors. Registered Provider Organizations (RPOs) offer specialized guidance, bridging technical gaps, streamlining certification efforts, and reducing operational costs.
By collaborating with an RPO, defense contractors lay a strong cybersecurity foundation, maintain DoD contract eligibility, and position themselves for future opportunities.
CMMC has transformed cybersecurity from a compliance formality into a decisive factor for winning and retaining DoD contracts. By defining clear maturity levels and rigorous assessments, the Department of Defense is raising the bar on how contractors handle Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).
This shift not only safeguards critical data but also serves as a business differentiator—companies that meet CMMC requirements early will stand out as trusted partners.
For prime contractors, the responsibilities extend beyond their own security posture to ensuring subcontractors also align with the required CMMC level.
Subcontractors, in turn, must proactively meet their obligations or risk exclusion from the defense supply chain. Preparing now—via strategic planning, gap analyses, and incremental remediation—can prevent costly last-minute scrambling and help avoid disqualification from lucrative contracts.
Ultimately, CMMC compliance is more than a DoD mandate; it is an opportunity to strengthen overall cybersecurity resilience and customer trust.
By embracing a well-structured approach and seeking specialized support (e.g., through RPOs or managed service providers), defense contractors can navigate evolving regulations confidently, maintain a competitive edge, and uphold national security objectives in the process.
Need guidance on your CMMC compliance journey? Fill a short form and our experts would reach out to you.
Enter your details below and we will send an email with a download link.
Enter your details below and we will send an email with a download link.
Enter your details below and you'll receive insights, updated, and news related to Cybersecurity. No SPAM!