Drata
Reporting/Documentation

CMMC Certification Explained: Levels, Requirements, & Timelines

Learn what CMMC certification is, its three levels, key requirements, and the timeline for DoD compliance to keep your contracts secure and eligible.

The Department of Defense won't award contracts to organizations that can't prove their cybersecurity meets specific standards. Cybersecurity Maturity Model Certification (CMMC) is the mandatory framework that verifies defense contractors protect Federal Contract Information and Controlled Unclassified Information through independent assessment at three certification levels.

For contractors across the defense industrial base, CMMC certification determines whether you can bid on DoD work. This guide breaks down the three certification levels, explains what each requires, walks through the assessment process, and outlines the timeline for when these requirements take effect.

What Is CMMC Certification?

Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense's mandatory framework for verifying that defense contractors protect sensitive government information. The program establishes three certification levels based on the type of data your organization handles: Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).

Here's the reality: no certification means no contract. Unlike previous approaches where contractors could self-certify their cybersecurity practices, CMMC requires independent verification at certain levels. The DoD won't award contracts to organizations that can't prove they meet the required certification level.

CMMC applies to every organization in the defense supply chain that touches protected information. Whether you're a prime contractor working directly with the DoD or a small subcontractor three tiers down, the same rules apply.

Why Did the DoD Launch the Cybersecurity Maturity Model?

Cyberattacks on defense contractors became a national security problem. Adversaries discovered they could steal weapons designs, operational plans, and classified research by targeting contractors with weak security rather than attacking DoD networks directly.

The old system relied on contractors checking their own homework. Organizations would self-certify compliance with cybersecurity requirements, but many claimed full compliance without actually implementing the controls. The DoD had no way to verify whether contractors were telling the truth about their security posture.

CMMC fixes this by requiring third-party assessments for higher-risk contracts. Independent assessors verify that controls exist and work as intended, creating accountability across the entire defense industrial base.

CMMC 2.0 vs. the Original Model

The current CMMC framework looks different from what the DoD originally proposed in 2020. After industry feedback revealed that the five-level model was too complex, the DoD streamlined the program into three levels while maintaining strong security standards.

The changes make compliance more practical without sacrificing protection for sensitive information:

1. Simplified Three Level Structure

The original five levels created confusion about which level applied to different contract types. CMMC 2.0 uses three clear levels: Foundational protects basic information, Advanced protects sensitive data, and Expert protects the most critical programs.

2. Alignment With NIST SP 800-171

Level 2 now maps directly to National Institute of Standards and Technology (NIST) Special Publication 800-171. If you've already started implementing NIST controls, that work counts toward CMMC certification.

3. Flexible Assessment Pathways

Not every organization faces the same assessment requirements. Level 1 allows annual self-assessment, while Level 2 and Level 3 require third-party assessments by certified CMMC Third-Party Assessment Organizations (C3PAOs) at different frequencies based on contract sensitivity.

CMMC Levels and Maturity Requirements

The three certification levels correspond to the sensitivity of information you handle and the sophistication of threats you face. Each level builds on the previous one.

Level 1 Foundational

Level 1 covers basic cybersecurity practices for Federal Contract Information. FCI includes any information the government provides or you generate under contract that isn't meant for public release—think contract terms, technical specifications, or delivery schedules.

You'll implement 17 fundamental practices like requiring passwords, installing antivirus software, and controlling who can access your systems. Most organizations already do some of this, but CMMC requires documenting and consistently applying every practice.

Level 2 Advanced

Level 2 applies when you handle Controlled Unclassified Information. CUI includes technical data, export-controlled information, and other sensitive government information that adversaries actively target. This level requires all 110 security controls from NIST SP 800-171 across 14 control families.

The jump from Level 1 to Level 2 is significant. You'll need multi-factor authentication, security monitoring systems, incident response procedures, and regular security assessments. Most defense contractors fall into this category.

Level 3 Expert

Level 3 adds enhanced protections for the DoD's highest-priority programs. Beyond the Level 2 controls, you'll implement select practices from NIST SP 800-172 designed to detect and defend against advanced persistent threats.

This level requires capabilities like proactive threat hunting, advanced supply chain risk management, and sophisticated detection systems. Only contractors supporting critical national security programs typically face Level 3 requirements.

Detailed CMMC Compliance Requirements by Level

Let's break down what each level actually requires in practical terms. The requirements range from basic security hygiene to advanced threat detection.

Federal Contract Information Controls

Level 1 focuses on 17 practices across six areas:

  • Access Control: Limit system access to authorized users and devices
  • Physical Protection: Control who enters facilities where FCI lives
  • Media Protection: Sanitize or destroy media containing FCI before disposal

You'll also maintain audit logs showing who accessed what information and when. While straightforward, every practice requires written policies and consistent implementation.

Controlled Unclassified Information Controls

Level 2 implements the complete NIST SP 800-171 framework. This means 110 controls covering access management, security awareness training, audit logging, system configuration standards, incident response plans, and regular security assessments.

The documentation requirements alone can overwhelm organizations new to compliance. Every control needs evidence showing it works as intended, not just that you wrote a policy about it.

Enhanced Security Requirements for Critical Programs

Level 3 adds select NIST SP 800-172 practices focused on advanced threats. You'll conduct proactive threat hunting to find sophisticated attackers already in your environment, implement deception techniques to mislead adversaries, and deploy advanced analytics to spot unusual behavior patterns.

The assumption at this level: well-funded adversaries with advanced capabilities are actively trying to compromise your systems.

Who Needs to Be CMMC Certified?

CMMC requirements flow through the entire defense supply chain based on contract language. Your role determines whether you face certification requirements.

Prime Contractors

Organizations contracting directly with the DoD for work involving FCI or CUI face CMMC requirements. The required level appears in contract solicitations under specific Defense Federal Acquisition Regulation Supplement (DFARS) clauses.

You'll see the requirement during bidding, giving you time to achieve certification before contract award. However, waiting until you see it in a solicitation puts you behind competitors who certified early.

Subcontractors and Suppliers

Any organization that processes, stores, or transmits covered defense information needs certification, even if you don't contract directly with the DoD. Prime contractors flow down CMMC requirements through their subcontracts.

This includes manufacturers building components, software developers creating tools, and consultants providing services for defense-related work. If protected information touches your systems, you face CMMC requirements.

Cloud and SaaS Providers Handling CUI

Technology vendors providing infrastructure or software to defense contractors also face CMMC requirements when their systems handle CUI. Cloud hosting providers, collaboration platforms, and specialized software tools all fall into this category.

Federal Risk and Authorization Management Program (FedRAMP) authorization helps but doesn't replace CMMC. Many cloud providers are pursuing CMMC certification to serve defense customers.

CMMC Certification Process Step by Step

Achieving certification typically takes several months. Here's what the process looks like:

1. Gap Analysis and SPRS Scoring

First, compare your current security posture against CMMC requirements. This gap analysis shows which controls you've implemented and which need work.

For Level 2, you'll also submit scores to the Supplier Performance Risk System (SPRS). This self-assessment reflects your NIST SP 800-171 implementation and becomes part of your contractor performance record.

2. Remediation of Control Gaps

Next comes implementation work. You'll deploy new security tools, update policies, configure systems properly, and train staff on new procedures.

Documentation matters as much as technical implementation. Written policies, procedure guides, configuration standards, and evidence that controls work all come into play during assessment.

3. Assessment by a C3PAO

For levels requiring third-party assessment, a C3PAO evaluates your implementation. Assessors review documentation, interview staff, examine system configurations, and test whether controls work as intended.

Assessments typically take several days depending on your size and complexity. Assessors look for evidence that controls operate consistently, not just that you documented them.

4. DoD Approval and Marketplace Listing

After successful assessment, results go to the DoD for final approval. Once approved, your certification appears in the DoD's CMMC marketplace, making you eligible for contracts requiring your level.

Certifications last three years, though you'll maintain compliance continuously and may face surveillance assessments during that period.

Timeline for CMMC Rule Making and Contract Enforcement

CMMC requirements are rolling out gradually across DoD contracts. Understanding the timeline helps you plan when certification becomes critical.

Interim Rule Publication

The DoD published the CMMC interim rule in late 2024, establishing the legal framework for requiring certification. This rule defines the three levels, assessment requirements, and how CMMC integrates with existing regulations.

While the rule remains interim pending public comment, CMMC requirements already appear in select contracts.

Contract Inclusion Phase In

Requirements are being phased into new contracts and renewals over several years. The DoD prioritizes contracts involving sensitive information and critical programs first, then expands to broader categories.

Each solicitation specifies the required CMMC level. Even if your current contracts don't require certification yet, future renewals or new bids likely will.

Re-certification Cycle

Certifications remain valid for three years from the assessment date. After three years, you'll undergo reassessment to maintain certification and contract eligibility.

Between assessments, you're responsible for maintaining continuous compliance. The DoD may conduct surveillance assessments or request evidence that controls remain effective.

Cost Factors for CMMC Certification

Budgeting for CMMC includes both one-time and ongoing expenses. Total investment varies based on your current security posture, organization size, and target level.

Assessment Fees

C3PAOs charge for assessment services based on scope and complexity. Larger organizations with more systems typically pay more than smaller operations.

The DoD also collects certification fees to support program administration, with reduced rates for small businesses.

Internal Remediation and Tooling

Most organizations invest in new security technologies to meet requirements. Common purchases include multi-factor authentication systems, security monitoring platforms, endpoint protection tools, and encryption solutions.

Staff time for implementation, policy development, and training adds up quickly. Many organizations hire consultants or managed security providers to accelerate the process.

Ongoing Monitoring and Reassessment

Maintaining certification requires continuous compliance monitoring. Budget for ongoing security tool costs, staff time for compliance activities, and reassessment fees every three years.

Organizations treating compliance as continuous rather than point-in-time find reassessments less stressful and more predictable.

How to Maintain Continuous CMMC Compliance

Point-in-time certification is just the start. Maintaining compliance between assessments protects your contract eligibility and reduces reassessment stress.

Continuous Control Monitoring

Real-time visibility into control effectiveness helps you catch issues before they become compliance gaps. Automated monitoring tracks whether controls operate as intended and alerts you to changes affecting compliance.

This shifts compliance from periodic scrambles to steady operations. You'll always know your compliance status rather than discovering problems during assessment prep.

Vendor Risk Management

Your compliance partly depends on vendor and service provider security practices. Regular vendor assessments verify third parties maintain appropriate controls and don't introduce risks.

Document vendor security reviews, track compliance status, and maintain current information about which vendors handle CUI.

Automated Access Reviews

Regular verification that user access aligns with job responsibilities helps maintain access control requirements. Automated reviews flag inappropriate access, orphaned accounts, and excessive permissions.

Manual access reviews quickly become outdated. Automation keeps reviews consistent and creates the documentation assessors expect.

Automating Evidence Collection and Audit Readiness With Drata

Manual compliance tracking creates bottlenecks and increases the risk of missing control failures. Organizations juggling CMMC alongside SOC 2 or ISO 27001 face even greater complexity managing multiple frameworks.

Drata's platform provides continuous monitoring of security controls across your technology environment. The platform automatically collects evidence for CMMC requirements, tracks control effectiveness in real time, and alerts you to potential gaps before they affect certification.

By connecting to your existing security tools and infrastructure, Drata creates a single source of truth for compliance data. This reduces manual effort for assessments and maintains audit readiness continuously.

Ready to streamline your CMMC compliance journey? Book a demo to see how Drata automates evidence collection and maintains continuous audit readiness.


FEBRUARY 13, 2026
CMMC Collection
Navigate CMMC With Confidence
Get a Demo

Navigate CMMC With Confidence

Get a Demo