Compliance & Regulations

What Is CMMC Level 2?

CMMC Level 2 (Advanced) is the intermediate and most commonly required certification level in the DoD Cybersecurity Maturity Model Certification 2.0 program. It mandates implementation of all 110 security practices from NIST SP 800-171 Rev.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

CMMC Level 2 (Advanced) is the intermediate and most commonly required certification level in the DoD Cybersecurity Maturity Model Certification 2.0 program. It mandates implementation of all 110 security practices from NIST SP 800-171 Rev. 2, organized into 14 control domains and 320 specific security objectives, verified through third-party assessment by Certified CMMC Professional Assessment Organizations (C3PAOs). Level 2 applies to organizations handling Controlled Unclassified Information (CUI) and represents the baseline requirement for defense contractors across the Defense Industrial Base (DIB).

How Does CMMC Level 2 Work?

CMMC Level 2 operates through a structured control framework with mandatory third-party assessment and ongoing compliance verification.

Control Structure and Requirements

The 110 security practices in CMMC Level 2 are organized into 14 security domains according to DoD CIO CMMC Model Overview from 2021. These domains include Access Control with 13 practices, Awareness and Training with 3 practices, Audit and Accountability with 7 practices, Configuration Management with 10 practices, Identification and Authentication with 6 practices, Incident Response with 8 practices, Maintenance with 4 practices, and Media Protection with 4 practices.

Additional domains cover Personnel Security with 3 practices, Physical and Environmental Protection with 4 practices, Risk Assessment with 3 practices, Security Assessment and Authorization with 8 practices, System and Communications Protection with 19 practices, and System and Information Integrity with 7 practices.

Each practice includes detailed implementation requirements addressing both capability-building and operational processes. All 110 practices are mandatory with no distinction between "addressable" and "required" specifications according to DoD CIO documentation from 2024.

Assessment Process and Timeline

The assessment covers all systems and processes within the defined Authorized Accounting and Disclosure or Authoritative Source scope. This includes the contractor's systems handling CUI and supporting infrastructure, and may extend to subcontractor systems if they handle CUI.

The assessment occurs in four phases. The Planning Phase spanning 4 to 8 weeks pre-assessment involves coordination between the C3PAO and contractor on scope definition. The contractor completes self-assessment based on NIST SP 800-171A, documents compliance evidence, and identifies readiness gaps according to Strike Graph guidance from 2024.

The Assessment Phase lasting 2 to 4 weeks on-site includes C3PAO interviews with contractors, evaluation of documented policies and procedures, and verification of control implementation through document review, system configuration verification, personnel interviews, log and audit trail examination, and vulnerability scanning or testing.

The Reporting Phase consuming 2 to 4 weeks post-assessment produces a detailed C3PAO report identifying findings and remediation requirements. The assessor issues a score on a 0 to 100 scale, with a minimum compliance score of 88 representing 80 percent compliance according to DoD CIO CMMC Assessment Guide Level 2 from 2024.

Post-Assessment Compliance is ongoing, requiring the contractor to conduct annual affirmation of continued compliance, submit evidence to maintain certification, and remediate any identified deficiencies. Certification remains valid for three years from the assessment date, with annual compliance affirmation required to maintain status and reassessment required after three years.

Key Control Implementation Areas

Identity and Access Management requirements include multi-factor authentication for all user access to systems, role-based access control, least privilege principle enforcement, and account monitoring and deactivation procedures.

Data Protection mandates encryption of CUI at rest and in transit, data loss prevention tools, secure disposal of media containing CUI, and backup and recovery procedures.

Configuration Management requires configuration baselines for all systems, change management procedures, inventory of authorized software and hardware, and vulnerability scanning and patch management according to PreVeil analysis from 2024.

Incident Response necessitates a formal incident response plan and procedures, detection and response procedures, incident documentation and reporting, and recovery and continuity procedures.

Security Assessment demands annual risk assessments, security control assessment procedures, penetration testing and vulnerability scanning, and control effectiveness evaluation.

How Does CMMC Level 2 Differ from Other Certification Levels?

CMMC Level 2 represents a middle ground between basic cyber hygiene and advanced security requirements, as shown in the following comparison:

Aspect

Level 1

Level 2

Level 3

Applicable Data

FCI only

CUI

High-value CUI

Control Count

17 practices

110 practices

134 practices (110 + 24)

Assessment Type

Self or government

C3PAO required

C3PAO required

Implementation Cost

$50,000-$200,000

$200,000-$1,000,000+

$500,000-$2,000,000+

Timeline to Compliance

6-12 months

12-24 months

18-36 months

Contractor Applicability

Basic contractors

Primary contractors

Specialized/advanced DIB

NIST Foundation

N/A

NIST 800-171 Rev. 2

NIST 800-171 + 800-172

Source: Summit 7, CMMC Level Comparison, 2024; ISI Defense, CMMC Level 2 Expert Guide, 2024

Level 1 addresses basic cyber hygiene for organizations handling only Federal Contract Information, requiring just 17 foundational practices with self-assessment options. Level 2 serves as the primary requirement for contractors handling Controlled Unclassified Information, implementing all 110 NIST 800-171 controls through mandatory third-party assessment. Level 3 extends to high-value CUI with 134 total practices including additional NIST 800-172 requirements.

Why Does CMMC Level 2 Matter?

CMMC Level 2 has become the defining security requirement for the Defense Industrial Base as DoD implements mandatory certification across the defense supply chain.

Primary Requirement for Defense Contractors

Level 2 represents the most common CMMC level mandated for DIB contractors. An estimated 200,000 or more contractors require Level 2 certification, making it the baseline security standard for organizations handling defense-related information according to Summit 7 CMMC market analysis from 2024.

Average C3PAO assessment costs range from $20,000 to $50,000 depending on scope, with typical implementation costs ranging from $200,000 to $1,000,000 or more depending on organization size and current security posture. Implementation timeline typically spans 12 to 24 months for medium-sized organizations.

Phased Rollout Status

Phase 1 rollout began November 10, 2025 with new contracts including Level 2 requirements. All new and existing contracts must achieve full compliance by 2027 according to Federal Register CMMC final rule from 2024.

C3PAO availability is limited initially, with capacity building underway and training programs expanding. Market trends show 2025 through 2026 focused on self-assessments and remediation, with 2026 through 2027 experiencing accelerated C3PAO assessments.

Consequences of Non-Compliance

Non-compliance risks include contract termination, suspension from federal contracting, or debarment from the defense supply chain. These consequences create existential risk for organizations dependent on defense contracts, making Level 2 certification a business-critical requirement.

What Are the Limitations of CMMC Level 2?

CMMC Level 2 faces several implementation challenges that affect contractors across the defense supply chain.

NIST 800-171 Version Management Complexity

While NIST 800-171 Revision 3 was released in May 2024, DoD Class Deviation requires use of Revision 2 until further notice. This creates version management complexity as organizations must track which revision applies and when transition to Revision 3 will be required according to Crowell & Moring analysis from 2024.

Overlapping Standards Burden

Organizations may need to simultaneously comply with multiple frameworks including NIST Cybersecurity Framework 2.0 and ISO 27001 using different control taxonomies. This creates mapping challenges and duplicative documentation requirements across frameworks that address similar security objectives with different terminology and structure.

Multi-Factor Authentication Complexity

The requirement for MFA on all access creates challenges for legacy systems and organizations with large distributed workforces. Some operational technology systems, manufacturing equipment, and specialized defense applications do not support modern MFA implementations, requiring workarounds or system replacements according to ISI Defense guidance from 2024.

Legacy System Incompatibility

Older infrastructure may not support modern control implementation including encryption, centralized logging, and configuration management. Organizations face choices between costly system replacements and complex compensating controls that may not fully satisfy assessment requirements.

Cost and Resource Constraints

Small and mid-sized contractors struggle with implementation costs ranging from $200,000 to $1,000,000 or more, compounded by skilled personnel shortages. These organizations often lack dedicated security staff and must rely on consultants or managed service providers, adding to compliance costs.

Subcontractor Cascade Effects

All subcontractors handling CUI must also achieve Level 2 certification, creating supply chain complexity and cost propagation throughout multiple tiers of the defense supply chain. Prime contractors bear responsibility for verifying subcontractor compliance, creating oversight burden and potential liability.

Assessment Bottlenecks

Limited numbers of trained C3PAOs early in implementation create assessment backlogs expected during 2026 through 2027. Organizations must schedule assessments well in advance and may face delays that impact contract award timelines.

Continuous Compliance Burden

The annual affirmation requirement and three-year reassessment cycle create ongoing compliance overhead. Organizations must maintain continuous monitoring and documentation systems to support affirmation submissions and prepare for reassessment according to DoD CIO scoping guide from 2024.

How Does CMMC Level 2 Relate to Regulatory Requirements?

CMMC Level 2 operates within a comprehensive regulatory framework established by the Department of Defense and implemented through federal acquisition regulations.

Regulatory Framework

The U.S. Department of Defense, Office of the Chief Information Security Officer provides authority for CMMC Level 2. Implementation occurs through the Defense Federal Acquisition Regulation Supplement (DFARS), with the primary clause being DFARS 252.204-7021 addressing CMMC requirements for Phase 1 contractors.

The current baseline under DFARS 252.204-7012 addresses NIST SP 800-171 compliance and is being phased out. Assessment standards derive from NIST SP 800-171A Rev. 2 providing assessment procedures and methods, while control standards come from NIST SP 800-171 Rev. 2 specifying the 110 required practices according to DoD CIO documentation from 2024.

Phased Implementation Schedule

Phase 1 spanning November 10, 2025 through mid-2026 incorporates Level 1 or Level 2 requirements into new solicitations with DFARS 252.204-7021 incorporated into contracts. Contractors may self-assess or undergo C3PAO assessment with no contract blocking for lack of certification.

Phase 2 from mid-2026 through mid-2027 expands applicability with C3PAO assessments increasing while self-assessments remain allowed for some categories. Phases 3 through 4 from late 2026 through 2027 initiate full enforcement where contracts may be blocked if Level 2 certification is not achieved and all subcontractors must be certified according to Federal Register CMMC Defense Federal Acquisition Regulation Supplement from September 2025.

CMMC Scorecard and Compliance Requirements

Scoring uses a 0 to 100 point scale with a minimum compliance threshold of 88 points representing 80 percent achievement. The score represents the percentage of required practices with sufficient implementation evidence.

Continuous compliance documentation requires annual affirmation of compliance submitted electronically, updates to policies and procedures as systems and processes change, and documentation of remediation of any identified gaps.

Enforcement and Consequences

Non-compliance results in contract suspension or termination, removal from active contracting opportunities, federal contractor debarment, and loss of ability to handle CUI or FCI. These enforcement mechanisms give DoD significant leverage to ensure contractor compliance with Level 2 requirements.

FAQs

What is the minimum score needed to pass CMMC Level 2 assessment?

A minimum score of 88 out of 100 is required for compliance, representing 80 percent achievement of required practices. This is the passing threshold C3PAOs use when evaluating whether an organization has sufficiently implemented the required controls. Organizations scoring below 88 must remediate identified deficiencies and undergo reassessment.

Do all my company's systems need to be included in CMMC Level 2 scope?

Only systems that handle, store, process, or transmit Controlled Unclassified Information or support such systems need to be in scope. Non-CUI systems may be excluded if they are properly segregated and do not support CUI systems. Effective scoping can significantly reduce assessment complexity and implementation costs by limiting the boundary to CUI-relevant infrastructure.

How often does CMMC Level 2 certification need to be renewed?

Initial certification is valid for three years from the assessment date. After three years, reassessment by a C3PAO is required. Annual affirmation of continued compliance is required to maintain status between reassessments. Organizations must submit evidence demonstrating ongoing compliance and document any changes to their security posture.

What is the typical cost and timeline for CMMC Level 2 compliance?

Typical implementation costs range from $200,000 to $1,000,000 or more depending on organization size and current security posture. Timeline is typically 12 to 24 months from planning through certification. Organizations with mature security programs may achieve compliance more quickly, while those starting from minimal security posture may require extended timelines and higher investment.

Can we stay at NIST 800-171 compliance without CMMC Level 2 certification?

As of November 10, 2025, new DoD contracts require CMMC Level 2 certification, not just NIST 800-171 self-assessed compliance. Existing contracts still under NIST 800-171 requirements via DFARS 252.204-7012 will transition to CMMC requirements during Phases 2 through 4 of the rollout. Organizations should plan for mandatory third-party assessment rather than relying on self-assessment.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

Leave Training & Simulated Phishing to us.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.