Search
Close this search box.

The CMMC 2.0 Checklist: Your Company’s Roadmap to Compliance

Digital e-book of CMMC 2.0 checklist

Table of Contents

Download the CMMC 2.0 Checklist

As a defense contractor, achieving and maintaining CMMC compliance is vital for securing contracts with the Department of Defense (DoD). This guide lays out a step-by-step roadmap to help your company navigate the Cybersecurity Maturity Model Certification (CMMC) process. 

What is CMMC?

The Cybersecurity Maturity Model Certification (CMMC) is a cybersecurity program spanning across all defense industrial base (DIB) partners. The U.S. Department of Defense (DoD) mandates CMMC compliance for all its contractors and subcontractors.

The latest CMMC framework (v2.0) establishes three security maturity levels that organizations must adhere to. The DoD uses these levels to determine risk when issuing Requests for Proposals (RFPs) and selecting vendors.

When is CMMC compliance required?

CMMC 2.0 was introduced in November 2021. However, the official program pilot phase and implementation experienced delays, leading to ongoing program changes and requirements. 

The regulatory process to update the DFARS-7012 requirements is also pending, causing further delays in incorporating CMMC requirements into RFPs. 

Despite the setbacks, organizations should be prepared for full CMMC implementation which is expected in 2025. Non-compliant contractors may risk losing access to DoD contracts. 

Who needs to be CMMC certified?

Man inside manufacturing site working with military tank equipment

CMMC applies to all organizations within the defense industrial base (DIB). This includes over 300,000 prime contractors, subcontractors, universities, researchers, engineers, and supply chain staff involved in producing equipment and/or providing services for the U.S. Armed Forces.

To compete for DoD contracts, certification for CMMC compliance is mandatory.

What is needed for CMMC compliance?

DIB manufacturers must ensure that their enterprise network or parts of it handling sensitive information meet certain security standards to comply with the CMMC rules. They should also ensure that all networks that can communicate with each other or be used for stealing data have the same security measures in place.

While some organizations possess the necessary staff, resources, and expertise to meet CMMC requirements internally, many will require external assistance to achieve and maintain compliance. 

What are the CMMC requirements?

Organization’s must implement certain cybersecurity practices stemming from 14 domains. Each CMMC level requires more practices from these domains. 

List of the 14 domains for CMMC 2.0

How does your organization establish system access requirements, control internal system access, control remote system access, and limit data access to authorized users and processes?

Does your organization conduct security awareness activities and training? Are people properly trained and experienced to carry out their roles and duties?

What are your organization’s audit requirements and how does it perform auditing, identify and protect audit information, and/or review and manage audit logs?

What are your organization’s configuration baselines and how is configuration and change management performed?

How does your organization grant access to authenticated entities and ensure that access is limited to those with appropriate need to know/need for privileges?

Does your organization plan incident response, detect and report events, develop and implement a response to a declared incident, perform post incident reviews, test incident response, etc.?

How does your organization manage maintenance of systems and the personnel who perform said maintenance?

Does your organization identify and mark media, protect and control media, sanitize media, protect media during transport?

Does your organization screen personnel and protect CUI during personnel actions?

How does your organization limit physical access to sensitive information and systems?

How does your organization identify and evaluate risk, manage risk, and manage supply chain risk?

Does your organization have a system security plan? Secure baseline configuration? Have a process in place for making system changes? Etc.

What are the system requirements for communications and how do you control them at system boundaries?

Does your organization identify and manage information system flaws, identify malicious content, perform network and system monitoring, and implement advanced email protections, etc.?

What are the levels of CMMC?

Three compliance levels represent varying degrees of cybersecurity maturity that DoD contractors must adhere to, depending on the type of information they handle. The CMMC 2.0 levels are:

Image shows all three levels for CMMC 2.0, including each level's model and assessment type.
Source: About CMMC (defense.gov)

Level 1: Foundational

  • Applicable to contractors who manage Federal Contract Information (FCI), not Controlled Unclassified Information (CUI)
  • Ensures basic cybersecurity practices are in place, protecting FCI from unauthorized access and disclosure.
  • The third-party assessment is generally not required, allowing for annual self-assessments and attestation of compliance.
  • Scoping Guidance – Level 1
  • Self-Assessment Guide – Level 1
Level 1 contains 17 practices stemming from FAR Clause 52.204-21:
ACCESS CONTROL (AC) IDENTIFICATION AND AUTHENTICATION (IA) MEDIA PROTECTION (MP)
  • AC.L1-3.1.1 – Authorized Access Control
  • AC.L1-3.1.2 – Transaction & Function Control
  • AC.L1-3.1.20 – External Connections
  • AC.L1-3.1.22 – Control Public Information
  • IA.L1-3.5.1 – Identification
  • IA.L1-3.5.2 – Authentication
  • MP.L1-3.8.3 – Media Disposal
PHYSICAL PROTECTION (PE) SYSTEM AND COMMUNICATION PROTECTION (SC) SYSTEM AND INFORMATION INTEGRITY (SI)
  • PE.L1-3.10.1 – Limit Physical Access
  • PE.L1-3.10.3 – Escort Visitors
  • PE.L1-3.10.4 – Physical Access Logs
  • PE.L1-3.10.5 – Manage Physical Access
  • SC.L1-3.13.1 – Boundary Protection
  • SC.L1-3.13.5 – Public-Access System Separation
  • SI.L1-3.14.1 – Flaw Remediation
  • SI.L1-3.14.2 – Malicious Code Protection
  • SI.L1-3.14.4 – Update Malicious Code Protection
  • SI.L1-3.14.5 – System & File Scanning

Level 2: Advanced

  • Targeted at contractors who handle CUI, requiring more stringent security measures.
  • Builds upon the foundational practices of Level 1 by implementing additional security controls to safeguard CUI.
  • In most cases, a third-party assessment is required every three years to validate the proper implementation of security practices.
  • Level 2 contains 110 practices aligned with NIST SP 800-171
  • Scoping Guidance – Level 2
  • Self-Assessment Guide – Level 2

Level 3: Expert

  • A specialized cybersecurity maturity level relevant for only a small subset of defense contractors.
  • Demands the highest degree of security measures to protect highly sensitive information and systems.
  • Ensures the contractor can thwart advanced persistent threats (APTs) and maintain robust cybersecurity practices.
  • Requires a government-led assessment every three years.
  • The specific security requirements are still under development by the DoD.
  • However, the DoD has indicated that requirements will be based on the 110 controls under NIST SP 800-171 and a subset of NIST SP 800-172’s 20 controls.

CMMC Compliance Checklist: A Six-Phase Overview

Whether you’re a small business or a large corporation, this checklist provides the information and resources needed to achieve compliance. Follow the steps in order as you navigate the certification process.

Need assistance or have questions? Leave a comment below or reach out to our team of experts by clicking here.

Man holding tablet completing a checklist

Phase 1: Scoping (Getting Started / Requirements Analysis)

In this initial phase, your goal is to determine your CMMC level by identifying Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) in your environment. This is crucial for understanding the specific requirements your organization needs to meet.

Each level requires a specific set of controls, so understanding which level applies to your organization is essential. The CMMC model consists of three maturity levels, with Level 1 being the most basic and Level 3 being the most advanced. Each level builds upon the previous one, adding more security controls and practices as you progress.

This assessment methodology provides a standardized approach to evaluating your organization’s implementation of the security requirements found in NIST SP 800-171. By familiarizing yourself with this methodology, you can better understand the expectations and requirements for achieving CMMC certification.

This individual will be pivotal in guiding your organization towards full compliance. Their key responsibilities include:

  1. Collaborating with various internal stakeholders to secure their engagement and achieve timely outcomes.
  2. Developing necessary policies and acquiring suitable technologies to meet CMMC standards.
  3. Ensuring adherence to established protocols.
  4. Creating a comprehensive timeline for your organization to achieve CMMC readiness.

Once your organization is prepared for the CMMC Assessment, this officer can transition to the role of OSC Assessment Official, serving as the primary contact for the C3PAO during the evaluation process.

Whether you currently have a DoD contract or are bidding on one, you must understand the various components involved. This includes the personnel responsible for handling sensitive information, the processes in place to protect that information, and the technology used to store, process, and transmit data. Check your level’s scoping guidance for more information.

This may involve developing interdepartmental communication channels and coordinating efforts to ensure a unified approach to compliance.

Understand that CMMC requirements extend beyond your organization. If subcontractors and external service providers come into contact with CUI, the same requirements are imposed on them, and they must be compliant at the same level as your organization.

Phase 2: Planning (Scope Assessment Boundary / Data Gathering)

Get your documentation in order during Phase 2. Focus on taking inventory, drafting a SSP, and selecting required security controls based on your CMMC level. If you need help, seek professional guidance from a CMMC Consultant or a Registered Practitioner Organization (RPO). Otherwise, follow these steps:

The cost of achieving compliance largely depends on the size of your organization’s FCI or CUI enclave. Where does CUI enter into and leave your environment? Where is it accessed, processed, or stored? Determine your organization’s CUI footprint or boundary and work towards narrowing it. Reducing your CUI footprint means you’ll have lesser people to train on the CMMC compliance requirements/protocols and fewer endpoints to protect.  This will make it faster, cheaper and easier to achieve CMMC compliance.  

Identify and list all system and data assets that interact with CUI. Your asset inventory should include hardware, software, data storage components, and any cloud-based services your organization uses. By comprehensively understanding your assets, you can better protect your sensitive information and comply with requirements.

The SSP document outlines your organization’s security policies, procedures, and controls. It should describe how your organization meets the requirements and provide a detailed roadmap for maintaining compliance. The SSP should be regularly reviewed and updated as necessary to reflect changes in your organization’s security posture. Download NIST.gov’s SSP Template here. Complete this and print it out for an auditor.

The network diagram should illustrate your organization’s IT infrastructure and show how data flows within and outside your network. By defining the system boundary, you can identify areas where CUI is stored, processed, or transmitted and prioritize the implementation of security controls.

Each CMMC level requires a specific set of security controls and practices. Based on your organization’s CMMC level, identify the controls and practices you need to implement. Find the required practices described for Level 1, Level 2 and Level 3

The POA&M document tracks the progress of your organization’s security improvements. The template should include a list of deficiencies identified during the audit, the corresponding corrective actions, and expected completion dates. The POA&M will be updated as a living document to reflect your organization’s progress toward CMMC compliance. Download NIST.gov’s POA&M template here.

Phase 3: Assessment (Internal/External Assessment)

hand-using-laptop-computer-with-virtual-screen

It’s time to prepare for an assessment. In Phase 3 you will evaluate your organization’s security posture against the CMMC requirements and determine where you stand. 

Evaluate your organization’s implementation of the required security controls and practices. This assessment should be conducted by qualified personnel, either internal staff or external consultants, depending on your organization’s resources and expertise. You can use the DoD’s Self-Assessment Guide for Level 1 and Level 2

The SAR details the findings of your assessment, including any deficiencies identified and recommendations for improvement. Document your assessment results by adding your findings in the SSP document. 

Review the SAR and update the POA&M with any identified deficiencies. This will help your organization track its progress toward compliance and prioritize remediation efforts.

The Defense Federal Acquisition Regulation Supplement (DFARS) outlines specific cybersecurity requirements for contractors working with the DoD. Ensure your organization meets these requirements by completing the DFARS Compliance Checklist.

The SPRS serves as a repository for your organization’s CMMC compliance documentation. You demonstrate your commitment to achieving and maintaining compliance by uploading these artifacts. Access the SPRS here.

Your organization’s self-assessment score reflects its current security posture. Submitting this score to SPRS provides the DoD with valuable information about your organization’s progress toward CMMC compliance.

Phase 4: Remediate Remaining Risks

Take your assessment results and make improvements. Fix (remediate) what’s left, then update your documents for the certification stage in Phase 5. 

Use the POA&M as a guide and implement the remaining CMMC controls/practices. The objective is to achieve a clean POA&M. 

Resubmit updated artifacts into SPRS, generating an updated score.

Phase 5: Certified CMMC Assessment via CMMC C3PAO

Green circular logo representing C3PAO for CMMC-AB

As an Organization Seeking Certification (OSC), in this phase you must engage with a CMMC 3rd Party Assessment Organization (C3PAO) to scope and contract for an independent assessment. Follow these steps:

Engage with the C3PAO to discuss your organization’s readiness for the assessment and establish a mutually agreeable timeline.

The C3PAO’s assessment will validate your organization’s implementation of the required security controls and practices, as well as its overall security posture.

Once the CMMC assessment is complete, the C3PAO will provide your organization with a detailed report outlining its findings. They’ll also submit the findings to a CQAP to verify the assessment documentation. Only after the report is found to be alright will it be uploaded to the CMMC Enterprise Mission Assurance Support Service (EMASS) system, making it accessible to the DoD for review and decision-making.

Volunteering for this assessment demonstrates your commitment to maintaining a high level of cybersecurity. Participating in the Joint Surveillance Assessment showcases your organization’s dedication to continuous improvement and may gain a competitive edge in procurement.

Phase 6: Maintain & Monitor Compliance

Logo for Cybersecurity Maturity Model Certification (CMMC)

Congratulations! You’re now certified for CMMC 2.0. In the final phase, focus on maintaining and monitoring your CMMC compliance by following these last steps:

CMMC compliance requires regular updates to training materials, security processes, and documentation. Establish a schedule for reviewing and updating these items to ensure your organization complies with the evolving cybersecurity landscape.

Regular assessments are critical for maintaining CMMC compliance. Whether conducted internally or through a C3PAO, these assessments help identify areas for improvement and ensure that your organization’s security posture aligns with compliance requirements.

Take Charge of Your CMMC Compliance with TestPros

At TestPros, we specialize in compliance and understand its significance. While we do use automation, we do not solely rely on it. Our unique approach involves thorough manual validation to ensure your company’s compliance. With decades of experience, we have helped countless organizations secure government contracts. 

If you’re seeking professional assistance in achieving CMMC certification, our team of experts is ready to guide you through the entire process, including gap analysis, readiness assessment, remediation, and certification. 

Do not risk your organization’s security and future opportunities. Choose TestPros for a secure future in the defense industry. Contact us today to begin your CMMC certification journey.

View TestPros’ CMMC Compliance Services

Frequently Asked Questions

What does it mean to be CMMC compliant?

Being CMMC compliant means that your organization has successfully implemented the required cybersecurity practices and processes outlined by the Cybersecurity Maturity Model Certification (CMMC) for your designated maturity level. This involves ensuring adequate security measures are in place to protect sensitive information and demonstrating adherence to the CMMC framework during a third-party assessment.

To achieve CMMC certification, your organization needs to follow these steps:

  • Determine the required CMMC level for your organization based on the type of information you handle.
  • Perform a gap analysis and readiness assessment to identify areas needing improvement.
  • Remediate any identified gaps and implement required security practices and processes.
  • Schedule a third-party assessment with a CMMC Third-Party Assessment Organization (C3PAO).
  • Successfully pass the third-party assessment and receive your CMMC certification.

Level 1 organizations who self-certify must do so on an annual basis. Level 2 organizations who work with a C3PAO have their certification valid for three years. After this period, your organization must undergo another third-party assessment to renew your certification and demonstrate continued compliance with the CMMC requirements.

If your organization is not compliant, you risk losing eligibility for new DoD contracts or even having existing contracts terminated. It is essential to work towards achieving and maintaining CMMC compliance to remain competitive in the defense contracting landscape and protect your organization’s sensitive information.

The initial CMMC framework was released in January 2020. A Memorandum of Understanding (MOU) between the DoD and the CMMC Accreditation Body was signed, and certification, licensing, and training requirements for assessors and organizations were put in place.

CMMC 2.0 was introduced in November 2021. Find both versions available on the DoD CMMC website.

Controlling internal system access is critical for CMMC compliance. Here are some ways to achieve this:

  • Implement strong access control policies to limit user access based on their role and need-to-know basis.
  • Establish proper authentication and authorization processes, such as multi-factor authentication and secure password policies.
  • Regularly review and audit user access rights and permissions.
  • Provide cybersecurity training and awareness programs for employees to reinforce the importance of following access control policies.

On average, the CMMC process takes between 3-6 months or more depending on the required level and size of organization.

SHARING IS CARING

Leave a Reply

Related Posts

Skip to content