CMMC 2.0 Requirements for Defense Contractors
If you're an aerospace or defense contractor, CMMC 2.0 (Cybersecurity Maturity Model Certification) is no longer optional—it's becoming a requirement for doing business with the Department of Defense. Here's what you need to know about the updated framework and how to prepare for certification.
What is CMMC 2.0?
CMMC 2.0 is the Department of Defense's framework for ensuring contractors adequately protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI). The updated version, released in November 2021, streamlines the original five-level model into three levels with clearer requirements.
By 2026, CMMC certification will be required in all DoD contracts. If you manufacture aerospace components, provide defense-related services, or are part of the defense supply chain, you'll need to comply.
The Three CMMC 2.0 Levels
Level 1: Foundational (17 practices)
Who needs it: Contractors handling Federal Contract Information (FCI) only—basic contract info that's not sensitive.
Requirements: Basic cyber hygiene practices derived from FAR 52.204-21
Assessment: Annual self-assessment (no third-party audit required)
Examples: Access controls, media protection, physical security, system monitoring
Level 2: Advanced (110 practices)
Who needs it: Contractors handling Controlled Unclassified Information (CUI)—the majority of defense contractors
Requirements: All 110 practices from NIST SP 800-171
Assessment: Triennial third-party assessment by C3PAO (Certified Third-Party Assessment Organization)
Key additions beyond Level 1: Multi-factor authentication, encryption, incident response, security awareness training, system and information integrity controls
Level 3: Expert (110+ practices)
Who needs it: Contractors supporting high-priority programs with advanced persistent threats (APTs)
Requirements: NIST 800-171 plus additional practices from NIST 800-172
Assessment: Triennial government-led assessment
Focus: Advanced threat detection, threat hunting, enhanced security measures
Most Common Level 2 Requirements
Since most defense contractors will need Level 2, here are the most critical requirements:
Access Control (22 practices)
- Multi-factor authentication for all users
- Least privilege access (users only get access they need)
- Session lock after 15 minutes of inactivity
- Regular review and removal of unnecessary accounts
- Separate admin accounts from regular user accounts
Identification and Authentication (11 practices)
- Unique user identification for all users
- Multi-factor authentication required
- Password complexity requirements
- Prevent password reuse
- Manage authenticators (tokens, certificates, etc.)
Media Protection (9 practices)
- Sanitize or destroy media before disposal
- Control access to CUI on removable media
- Mark media containing CUI
- Encrypt CUI on mobile devices
- Prohibit use of portable storage devices when risks exist
System and Communications Protection (17 practices)
- Monitor and control communications at external boundaries
- Implement network segmentation for CUI
- Encrypt CUI in transit and at rest
- Deny network communications by default (whitelist approach)
- Establish and manage cryptographic keys
Incident Response (8 practices)
- Establish incident handling capability
- Detect, report, and respond to security incidents
- Report incidents to DoD within 72 hours
- Track, document, and report incidents
- Test incident response capability
Documentation Requirements
CMMC 2.0 requires documented evidence of your security practices. You'll need:
- System Security Plan (SSP): Describes how you protect CUI
- Plan of Action and Milestones (POA&M): Documents any gaps and remediation timeline
- Policies and Procedures: Written documentation for each security practice
- Configuration Management: Baseline configurations for systems processing CUI
- Incident Response Plan: Procedures for detecting and responding to incidents
- Training Records: Evidence that users completed security awareness training
- Asset Inventory: Complete list of hardware and software in your environment
Preparation Timeline
Getting ready for CMMC Level 2 typically takes 6-18 months depending on your current state:
Months 1-3: Assessment
- Identify what CUI you handle and where it resides
- Conduct gap analysis against NIST 800-171
- Prioritize remediation efforts
- Develop project plan and budget
Months 4-12: Implementation
- Deploy technical controls (MFA, encryption, logging, etc.)
- Implement network segmentation
- Develop policies and procedures
- Deploy endpoint protection and monitoring
- Configure backup and recovery systems
- Establish incident response capability
Months 13-15: Documentation & Training
- Complete System Security Plan
- Document all policies and procedures
- Conduct security awareness training
- Create evidence packages
- Document POA&M for any remaining gaps
Months 16-18: Assessment Preparation
- Conduct internal assessment
- Address any findings
- Select C3PAO assessor
- Schedule formal assessment
Common Mistakes to Avoid
1. Assuming compliance equals cybersecurity
CMMC
is a minimum baseline. Don't stop at compliance—implement
defense-in-depth.
2. Treating it as an IT-only project
CMMC requires
organization-wide participation. Executive leadership, operations, and
HR all play roles.
3. Poor scoping
Trying to apply all 110 controls
to your entire organization is expensive and complex. Segment your
network and create a defined CUI enclave.
4. Inadequate documentation
"If it's not
documented, it doesn't exist" is the assessor's mantra. Document
everything.
5. Last-minute preparation
Don't wait until you
see CMMC in a contract. Start preparing now—certification will take
time.
6. DIY approach without expertise
While small
contractors can self-implement, most benefit from experienced guidance
to avoid costly mistakes.
Cost Considerations
CMMC Level 2 compliance costs vary widely based on company size and current security posture:
- Small contractors (5-20 employees): $50,000-$150,000
- Medium contractors (20-50 employees): $150,000-$500,000
- Larger contractors (50+ employees): $500,000+
Costs include technology (hardware/software), consulting services, assessment fees, training, and ongoing maintenance. Many contractors find managed IT services more cost-effective than building internal capabilities.
The Bottom Line
CMMC 2.0 is complex, but it's manageable with proper planning and the right partners. The key is starting early—don't wait for it to appear in your contracts. Aerospace and defense contractors who proactively achieve certification will have a competitive advantage in the market.
For California manufacturers working in the aerospace supply chain, CMMC compliance is quickly becoming table stakes for doing business. The investment in cybersecurity not only enables you to bid on DoD contracts but also protects your intellectual property, customer data, and business operations from increasingly sophisticated threats.
Need Help with CMMC Compliance?
We specialize in helping aerospace and defense contractors achieve CMMC Level 2 certification. Schedule a free gap assessment to understand your current state and next steps.
Schedule Gap Assessment