The Cybersecurity Maturity Model Certification (CMMC) is a unified security framework designed by the U.S. Department of Defense to protect the Defense Industrial Base (DIB) from increasingly sophisticated cyber threats. The program transitions the defense supply chain from a "self-attestation" model to a mandatory "certification" model.

Under CMMC 2.0, any contractor or subcontractor handling Federal Contract Information (FCI) or Controlled Unclassified Information (CUI) must achieve a specific certification level as a condition of contract award.

The Difference Between CMMC and CMMC 2.0

In November 2021, CMMC 2.0 was introduced to simplify compliance while maintaining strict security controls. Here’s what changed:

  • Fewer Maturity Levels – The original five-level model was reduced to three levels:
    • Level 1 (Foundational) – Requires basic cybersecurity measures to protect FCI.
    • Level 2 (Advanced) – Aligns with NIST SP 800-171 and focuses on protecting CUI with 110 security controls.
    • Level 3 (Expert) – Adds enhanced security measures for organizations handling high-risk information.
  • Flexible Assessment Requirements – Instead of mandatory third-party audits at all levels, CMMC 2.0 allows:
    • Self-assessments for Level 1 and some Level 2 contracts.
    • Third-party assessments for critical Level 2 contracts.
    • Government-led assessments for Level 3 contracts.
  • Use of Plan of Action & Milestones (POA&M) – Companies can now temporarily achieve certification while working to address certain compliance gaps, as long as they meet minimum security thresholds.

The Three Levels of CMMC 2.0

The CMMC framework is divided into three tiers, each building upon the previous one. Your required level is determined by the sensitivity of the data you handle.

Level 1: Foundational (FCI)

  • Focus: Basic cyber hygiene.
  • Requirement: 15 security practices (mapped to FAR 52.204-21).
  • Assessment: Annual self-assessment and executive affirmation.
  • Target: Contractors who handle only Federal Contract Information (FCI).

Level 2: Advanced (CUI)

  • Focus: Protection of Controlled Unclassified Information (CUI).
  • Requirement: 110 practices (aligned 100% with NIST SP 800-171).
  • Assessment: Triennial third-party assessment (C3PAO) for prioritized programs; self-assessment for non-prioritized.
  • Target: The majority of defense subcontractors handling technical data, blueprints, or ITAR-controlled info.

Level 3: Expert (High-Value CUI)

  • Focus: Reducing risk from Advanced Persistent Threats (APTs).
  • Requirement: 110+ practices (based on NIST SP 800-172).
  • Assessment: Government-led assessment (DIBCAC) every three years.
  • Target: Prime contractors working on the most sensitive national security programs.

CMMC Compliance Checklist for 2026

To prepare for a CMMC audit, organizations should follow this high-level roadmap:

  1. Identify Data Flow: Map exactly where CUI and FCI enter, reside, and leave your network.
  2. Conduct Gap Analysis: Evaluate your current environment against the 110 NIST 800-171 controls.
  3. Develop an SSP: Create a System Security Plan (SSP) that describes how you meet every requirement.
  4. Manage POA&Ms: Create a Plan of Action and Milestones (POA&M) for any failed controls (Note: CMMC 2.0 allows only limited 180-day POA&Ms).
  5. Gather Evidence: Collect "artifacts"— audit logs, screenshots, and policies—that prove the controls are active.

Why CMMC Compliance is Important

CMMC compliance is essential for organizations aiming to do business with the DoD. Without certification, companies cannot win or maintain DoD contracts, which can lead to significant financial losses. Beyond eligibility, CMMC also enhances cyber resilience, helping businesses defend against cyber threats like data breaches, espionage, and ransomware attacks.

Why CMMC is Critical for the Defense Sector

The defense industry deals with highly sensitive information, including classified research, military logistics, and advanced technologies. A cybersecurity breach could have severe national security implications, exposing critical data to foreign adversaries or cybercriminals. CMMC ensures that every contractor, whether from large defense firms or small suppliers, implements security practices that prevent unauthorized access to CUI and FCI.

Industries That Require CMMC Compliance

While CMMC is primarily focused on defense contractors, its impact extends to multiple industries that work with the DoD:

  • Manufacturing – Companies producing military equipment, weapons, and defense-related technology.
  • Information Technology (IT) – Providers of software, cybersecurity, and cloud services for government contracts.
  • Aerospace & Engineering – Contractors developing aviation, space, and defense infrastructure.
  • Logistics & Supply Chain – Businesses managing transportation, storage, and distribution of defense materials.
  • Research & Development (R&D) – Institutions carrying out defense-related research, including universities and private labs.

FAQs: Cybersecurity Maturity Model Certification (CMMC)

What is CUI in the context of CMMC?

Controlled Unclassified Information (CUI) is government-created or owned information that requires safeguarding or dissemination controls. Examples include engineering drawings, specs, and export-controlled data (ITAR).

Who are C3PAOs?

A C3PAO (Certified Third-Party Assessment Organization) is an entity authorized by the Cyber AB to conduct CMMC Level 2 assessments. You must hire one of these firms to receive your official certification.

Does CMMC apply to cloud service providers (CSPs)?

CSPs themselves are usually governed by FedRAMP. However, if a contractor uses a cloud tool to store CUI, that tool must meet "FedRAMP Moderate" equivalency for the contractor to pass their CMMC audit.

How does Theodosiana accelerate CMMC certification?

Theodosian’s File-Centric Security (FCS) platform is purpose-built for the 14 domains of CMMC:

  • Access Control (AC): We automate least privilege so only authorized users can decrypt CUI.
  • Audit and Accountability (AU): Every action taken on a CUI file is cryptographically logged, creating "audit-ready" evidence for your C3PAO.
  • Media Protection (MP): Our per-file encryption ensures CUI remains protected even if it’s moved to a USB drive or a personal device.
  • System and Communications Protection (SC): We provide the FIPS-validated encryption required for all "data at-rest" and "data in-transit."