720-891-1663
Need to get CMMC compliant fast?
Check out our Turnkey CMMC Program for Small Contractors — affordable, fast-track, and tailored to your size.

NIST SP 800-171, CMMC 1.0 and CMMC 2.0
-- A History of DoD Efforts to Protect the DIB

The DoD has been working to improve cybersecurity over the last several years as news of nation-state sponsored theft of defense secrets makes the news on a regular basis. The biggest source of leaks of sensitive intellectual property is the hundreds of thousands of contractors that have access to sensitive but unclassified information called CONTROLLED UNCLASSIFIED INFORMATION or CUI.

In 2013 the DoD created a security requirement in the Defense Federal Acquisition Regulations called DFARS 252.204-7012 and then a few years later, NIST released a security requirement named SP 800-171. While both of these were a start to improving security for the defense industrial base, they didn't solve the problem.

What is CUI?

Controlled Unclassified Information or CUI was created after 9/11 via a presidential memorandum signed by President Bush. It was updated in 2011 by President Obama under Executive Order 13556. The Pentagon and other parts of the government are still working on implementing this 20 years later.

CUI is government created or owned information that requires safeguarding or dissemination controls consistent with applicable laws, regulations and government wide policies.

CUI is not classified information. It is not corporate intellectual property unless created for or included in requirements related to a government contract. It is information that we do not want to fall into our adversary’s hands. An example of this is the design of the F-35 fighter, which China stole and then built their own.

Why is CUI Important and What is the CMMC?

Because there are fewer controls over CUI as compared to classified information, CUI is the path of least resistance for adversaries. Loss of aggregated CUI is the one of the most significant risks to national security, directly affecting lethality of our warfighters.

The problem was that people were claiming that they were compliant with these regulations but they were not compliant and no one was checking to verify it.

In early 2019 DoD upped the ante by releasing the Cybersecurity Maturity Model Certification (CMMC). This was the first time DoD required contractors, sub-contractors and suppliers to be CERTIFIED to participate in the DoD supply chain.

US Army Cyber Operations Center - Fort Gordon, Georgia

CMMC 1.0 vs. CMMC 2.0

The DoD released version 1 of CMMC as an emergency requirement. While it allowed rapid deployment, it was costly and difficult for small businesses. After a mandated review, the DoD released CMMC 2.0 in November 2021. The final rule was published on December 26, 2024, and is now in effect.

Here are the confirmed key elements of CMMC 2.0:

1. The five levels of CMMC are now three.

2. Contractors that only need Level 1 may self-certify annually.

3. Level 2 is based entirely on NIST SP 800-171 and split into self-assessed and certified tiers. About 85–90% will need third-party assessments by a C3PAO.

4. Level 3 will require a DoD-led assessment in addition to Level 2 certification.

5. The 20 extra CMMC 1.0 controls are gone for now, but may return via a future update to NIST SP 800-171 (Rev. 3 is in draft).

6. Process maturity is no longer scored.

7. The DoJ is actively pursuing contractors for false claims related to 800-171 compliance.

8. The CMMC-AB is now the Cyber AB and third-party certifications are live in 2025.

9. Incentives for early certification are still under discussion.

10. Self-certifications must be signed by a company executive and are subject to annual renewal.

At higher levels, certifications are valid for three years.

NOTE: This web page is updated as more information is released by the Department of Defense.

For more info, see our FAQ page HERE.

The CMMC Model

The CMMC will encompass three maturity levels that range from "Foundational" to "Expert". The intent is to identify the required CMMC level in RFP sections L and M and use it as a "go / no go decision."

In its final form, the CMMC intended to combine various cybersecurity control standards such as NIST SP 800-171 (Rev 1 and Rev 2) (Rev. 1 & Rev. 2), NIST SP 800-53, and AIA NAS9933s into one unified standard for cybersecurity. After a lot of pushback from the contractor community, they limited CMMC to just controls in 800-171.

They say they plan to enhance NIST SP 800-171 to bring back some of the controls that were in CMMC 1.0 and are not currently in CMMC 2.0. They are doing this by creating a version 3 of 800-171, which will likely be released in 2023.

The Difference between NIST SP 800-171 and CMMC

To be clear, the DoD does not control what is in 800-171. That is the responsibility of the Department of Commerce. If you don’t like what is in 800-171, talk to Commerce; DoD can’t change it.

CMMC is a program to make sure that contractors who say they are complying with 800-171 really are complying. That is ALL CMMC is. CMMC does not have any of its own requirements any longer.

What the CMMC Means for DoD Contractors

The DoD has built upon existing DFARS 252.204-7012 regulation and developed the CMMC as a "verification component" with respect to cybersecurity requirements. The DoD has entrusted DoD contractors to achieve compliance and (with continued pressure) to ensure 100% adoption of cybersecurity controls--as the DoD is updating its policies. This is a "trust but verify" process.

The DoD is putting a lot of pressure on the big primes to get their subs in line. Of course, the primes don’t have their own houses in order yet. The prime contractors are required to flow down the appropriate CMMC requirement to sub-contractors and the subs must flow down these requirements to their subs.

Don’t Forget About Your Sub-Contractors and Vendors

If you have a vendor that has access to your systems such as an IT services provider or you have a vendor that you give either system access or data, any of those third parties may need to be certified at the same level as you are or above. The current DFARS -7012 and -7019 are MANDATORY flow down clauses with no changes other than you can insert your company’s name. Since almost all companies use vendors or service providers, this is going to be a big one. When CMMC is fully rolled out, any subs or vendors used on the contract will need to be certified at the appropriate level before the contract can be awarded.

Current CMMC Certification Status

The DoD still plans on maintaining a database that contracting officers will review prior to awarding contracts. What this looks like is still undefined. It will probably look something like SPRS plus other systems.

Important Dates and Milestones for ALL DoD Contractors, Subcontractors and Suppliers

  1. Now: Evaluate your current NIST SP 800-171 compliance status and begin remediation of any gaps through a documented plan of action (POA&M).
  2. January 2020 – DoD released the original CMMC 1.0 standard.
  3. March 2020 – A follow-up update to CMMC 1.0 was released.
  4. November 2021 – CMMC 2.0 concepts were announced to streamline the model.
  5. December 26, 2024 – The CMMC 2.0 final rule was officially published in the Federal Register.
  6. January 2025 – Voluntary CMMC Level 2 third-party assessments began under the formal rule.
  7. Spring/Summer 2025 – CMMC requirements begin appearing in new DoD solicitations under 48 CFR clauses.
  8. October 2026 – All covered contractors are expected to meet the required CMMC level prior to award.

DoD contractors will no longer be allowed to bid on contracts that include CMMC clauses unless they are certified (or self-attested for Level 1 or limited Level 2). This is a major change from past policy, where compliance was expected after award. Now, certification or attestation must happen in advance.

No More Guesses – The Timeline Is Now Official

The final rule is in effect. As of mid-2025, the DoD is gradually inserting CMMC requirements into contracts. The rollout is staged, but real — and contractors must demonstrate their CMMC posture prior to award through SPRS scoring or C3PAO certification, depending on level.

The DoD has acknowledged the challenges in rollout speed, especially for small businesses, and is balancing enforcement with flexibility. But the clock is ticking. If your company handles CUI, a full CMMC Level 2 certification will eventually be required.

Becoming Certified

As of 2025, DoD contractors must either submit an annual self-attestation (for CMMC Level 1 or limited Level 2) or coordinate with a CMMC Third-Party Assessment Organization (C3PAO) to undergo a formal assessment. For companies required to meet Level 3, additional review by the Department of Defense will follow after successful Level 2 certification.

How to Prepare for a CMMC Audit

Option 1: Do it Yourself and Meet Requirements In-House

Contractors with a skilled internal IT/security team can implement CMMC requirements internally. The Self-Assessment Handbook - NIST Handbook 162 remains a useful guide for NIST SP 800-171 Rev. 1. However, as of now, there is no handbook for Rev. 2 or 3 (draft), which makes full DIY preparation more difficult.

While internal preparation can support self-attestation, a third-party certification still requires coordination with a certified C3PAO — and all documentation (SSP, POA&M, policy set) must be complete and accurate.

Option 2: Work with a CMMC Consultant

For many small and mid-sized contractors, the fastest and most cost-effective path to compliance is working with an experienced CMMC consultant. Consultants like CyberCecurity, LLC and Turnkey Cybersecurity and Privacy Solutions, LLC offer hands-on assistance with system preparation, documentation, and readiness assessments.

Keep in mind: even if a consultant prepares you, you are still responsible for your organization’s compliance. For Level 2 certification, a C3PAO must independently verify your readiness through a full audit.

The Risk Assessment or Gap Analysis

The first step toward compliance is to assess your environment: identify what CUI you handle, where it resides, and who can access it. Then conduct a gap analysis to determine how far you are from meeting NIST SP 800-171 controls and CMMC expectations.

This process reveals risks such as:

  • Unvetted vendors or IT providers with access to sensitive data
  • Weak or missing access controls
  • Lack of documented security policies
  • Untrained system administrators or end users
  • Missing or outdated backups, logs, or incident response plans

The result of a good gap assessment is a prioritized POA&M — your roadmap to full compliance.

Ongoing Cybersecurity Monitoring and Reporting

Compliance isn’t a one-time event. DFARS and CMMC require ongoing vigilance, including near-immediate breach reporting (within 72 hours) to DoD or your prime. To remain compliant, contractors must continuously monitor, maintain logs, update configurations, and document incidents.

The Importance of Passing the First CMMC Audit

DoD contracts are increasingly gated by CMMC requirements. Failure to pass a Level 2 assessment — or falsely attesting to 800-171 compliance — can lead to loss of award eligibility, false claims liability, and even debarment.

CMMC Audit Preparation & Assessment Services

Turnkey Cybersecurity and CyberCecurity provide tailored services to help you prepare for CMMC audits and ongoing DFARS/NIST obligations.

Our offerings include:

  • Pre-assessments and gap analysis
  • System Security Plan (SSP) and POA&M creation
  • Full implementation support for NIST SP 800-171 controls
  • Assistance with SPRS scoring and readiness for C3PAO certification

We focus on smaller DoD contractors — helping them reach compliance quickly, without building a massive IT program from scratch.

Have more questions?

Please call me for more information:
Mitch Tanenbaum, CISO, CyberCecurity, LLC
[email protected]
720-891-1663