What is CMMC? Defense Contractor Guide
Reviewed by the Fully Compliance editorial team
CMMC — the Cybersecurity Maturity Model Certification — is the Department of Defense's mandatory framework requiring defense contractors to implement verified cybersecurity controls before bidding on federal defense contracts. It replaced self-reported NIST compliance with third-party assessment across three maturity levels, and enforcement is active now, not a future threat.
Why the DoD Built CMMC — and Why Self-Attestation Failed
The Department of Defense spent years watching contractors check boxes on security questionnaires while running networks with weak passwords and no monitoring. The problem was structural. NIST 800-171 told contractors what to do, but nobody verified whether they actually did it. A contractor could claim NIST compliance on a form and still be running an environment that would make a penetration tester weep.
The supply chain made the exposure worse. The DoD does business with thousands of prime contractors, each relying on thousands of subcontractors and vendors. According to the Verizon 2023 Data Breach Investigations Report, supply chain attacks accounted for 15% of all breaches, a figure that has only grown since. A single compromised second-tier vendor could expose sensitive information flowing upstream through the entire chain to the DoD itself. The Department needed consistent standards, independent verification, and an enforcement mechanism with actual teeth.
CMMC was that mechanism. It shifted the model from "we claim to follow NIST" to "an independent auditor has certified that we meet CMMC standards." That distinction matters enormously because the DoD can now verify compliance instead of trusting contractor self-reporting. Contractors who cannot produce current certification are being removed from eligible bidder lists — not at some future date, but right now.
The Three Levels and What Each Demands
CMMC uses a scaled framework that matches security requirements to the sensitivity of the work. Imposing advanced threat detection on a five-person machine shop would be unreasonable. Imposing only basic cyber hygiene on a contractor handling sensitive technical data would be negligent. The three levels solve that tension.
Level 1 covers foundational cyber hygiene — firewalls, antivirus, multifactor authentication, basic system hardening. If you have been running a moderately security-conscious operation, you are probably already doing most of this. Assessors at this level verify that controls exist and are configured properly, but they are not deeply testing whether those controls are continuously maintained. For many small subcontractors, Level 1 is sufficient, though it is becoming increasingly rare as a contract requirement.
Level 2 is where most defense contractors operate. It incorporates everything from Level 1 and adds documented security policies, regular security training, incident response planning, encryption of sensitive data both in transit and at rest, and systematic asset management across your environment. At this level, security stops being something the IT department handles alone and becomes an organizational program. You need defined processes, trained personnel, and evidence that those processes are actually functioning. Level 2 maps closely to the 110 controls in NIST 800-171, which is why organizations that have done serious NIST work have a head start — though not as large a head start as many assume.
Level 3 is reserved for organizations handling particularly sensitive information or performing specialized defense work. It requires everything from Levels 1 and 2 plus continuous monitoring and threat detection, a formal risk management program integrated into business processes, regularly tested incident response, penetration testing, and formal supply chain security vetting. Level 3 is expensive to achieve and maintain, requires dedicated security personnel, and is only required for a subset of contractors doing high-sensitivity work.
Your Contract Specifies Your Level — Not Your Preference
Your actual contract language determines which CMMC level you need. Not your guess, not your auditor's recommendation, not what sounds impressive on a proposal. The DoD does not award extra credit for exceeding the required level. Conversely, if your contract requires Level 2 and you only achieve Level 1, you cannot bid on that work. Find the security requirements section of your contract and read what it says about CMMC. If the language is ambiguous, ask your contracting officer directly. Assuming the wrong level wastes money in one direction and blocks revenue in the other.
Third-Party Assessment Is What Makes This Enforceable
The feature that distinguishes CMMC from every previous defense contractor security framework is independent verification. You do not self-certify. You submit to assessment by a Certified Third-Party Assessor Organization (C3PAO) — an auditor trained and authorized by the DoD to conduct CMMC assessments. That auditor examines your controls, your documentation, and your evidence. If you pass, you receive certification. If you do not, you remediate the gaps and resubmit.
The DoD can check with the CMMC Accreditation Body whether your organization holds a current certification. Contractors cannot fake this. They can claim they follow NIST on a questionnaire, but they cannot claim CMMC certification without having actually submitted to assessment. The Department is actively using certification status as a criterion for contract awards and removing uncertified contractors from eligible bidder lists. This enforcement is not theoretical — it is operational.
Supply Chain Cascade — It Does Not Stop With Prime Contractors
If you have a direct contract with the Department of Defense, CMMC almost certainly applies to you. But the requirement cascades. If you are a subcontractor to a prime that needs CMMC, you may inherit the requirement. If you are a vendor providing software, hardware, or services to a defense contractor and your work touches systems or data in scope, you are potentially in scope as well.
Not every subcontractor needs full certification. Some are required to be certified at a specified level. Others must comply with certain CMMC practices without formal certification. The determining factor is always your contract language and the nature of your work. This is why the "who needs CMMC" question is deeply individual — it requires reading your actual contracts, not making assumptions based on industry chatter.
Realistic Costs and Timelines
CMMC is not a paperwork exercise. For a small organization that is mostly compliant already, Level 1 certification typically costs between $10,000 and $20,000 in auditor fees alone. Level 2 runs between $30,000 and $100,000 depending on how much remediation your environment needs, how large your organization is, and how far you are from compliance when you start. Level 3 can exceed $150,000. These figures cover auditor fees, but the real cost picture is larger because most organizations need to fix things — new monitoring tools, additional security staff, consultant engagements for remediation, and significant internal staff time on documentation and evidence gathering.
The timeline is similarly material. Most contractors need 6 to 18 months from the decision to pursue certification to actually holding one. The assessment itself might take a few weeks, but implementing controls, documenting them, and gathering evidence takes real time. If your contract requires certification by a specific date and you are far from compliant, the cost of delay compounds quickly.
How CMMC Relates to NIST 800-171
CMMC and NIST 800-171 are related but not interchangeable. NIST 800-171 describes what you should do to protect Controlled Unclassified Information — implement access control, use encryption, establish incident response. It is guidance. CMMC takes NIST as its foundation, particularly at Level 2 where it essentially incorporates NIST 800-171's 110 controls, but CMMC adds the verification layer. At Level 3, CMMC goes beyond NIST entirely, requiring advanced practices that 800-171 does not address.
An organization can be fully compliant with NIST 800-171 and still fail CMMC certification because it lacks the documentation, policies, and ongoing evidence that CMMC auditors require. Many contractors have learned this the hard way — they assumed their NIST work meant they were ready for CMMC and discovered they had significantly more work ahead. Understanding this relationship prevents wasted effort and audit surprises.
Frequently Asked Questions
Is CMMC certification mandatory for all defense contractors?
CMMC certification is mandatory for contractors whose DoD contracts specify it, which now includes the vast majority of new defense contracts. Some older contract vehicles have not yet been updated, but the direction is toward universal enforcement. If you bid on new DoD work involving Controlled Unclassified Information, certification is required before contract award.
How long does CMMC certification last?
CMMC certification is valid for three years from the date of assessment. After three years, you must undergo reassessment to maintain certification. During the certification period, your organization is expected to maintain all controls — certification does not mean you can let security practices degrade until reassessment.
Can I start with Level 1 and upgrade to Level 2 later?
You can, but your contract dictates what you need now, not what you plan to achieve later. If your contract requires Level 2, achieving Level 1 does not satisfy the requirement. Pursue the level your contract specifies. If you anticipate future contracts requiring a higher level, factor that into your implementation planning.
What happens if I fail the CMMC assessment?
You receive a report documenting the gaps. You remediate those gaps and resubmit for assessment. There is no formal penalty for failing, but you cannot bid on contracts requiring certification until you pass. The practical consequence is lost revenue opportunity during the remediation period.
How does CMMC affect my subcontractors?
If your DoD contract requires CMMC and your subcontractors touch systems or data within scope, they may inherit compliance obligations. Review your subcontracts and flow down the appropriate CMMC requirements. Your compliance depends in part on your supply chain's compliance.
Fully Compliance provides educational content about IT compliance and cybersecurity. This article reflects general information about CMMC as of its publication date. Standards, requirements, and enforcement actions evolve — consult a qualified compliance professional for guidance specific to your organization.