Published February 24, 2026
CMMC 2.0 (Cybersecurity Maturity Model Certification) is the Department of Defense cybersecurity framework required for contractors who handle Controlled Unclassified Information (CUI). Codified in 32 CFR Part 170 (effective December 2024), it requires most defense industrial base (DIB) contractors to achieve Level 2 certification — 110 security practices from NIST SP 800-171 — before they can bid on or perform DoD contracts containing the DFARS clause 252.204-7021.
Got Questions?
Yes. DFARS clause 252.204-7021 requires prime contractors to flow down CMMC requirements to subcontractors who handle CUI. If you are a tier-2 or tier-3 supplier receiving technical drawings, specifications, or program data from a prime, you likely need to meet Level 2 requirements even if you have no direct DoD contract. Check your subcontract agreements for the presence of DFARS 252.204-7021.
CMMC Level 2 allows self-assessment (with senior official affirmation submitted to SPRS) for programs the DoD has designated as lower criticality. For higher-criticality programs, a third-party assessment by a certified C3PAO (CMMC Third-Party Assessment Organization) is required. Check your specific contract requirements — the solicitation or DFARS clause will specify which assessment type applies. When in doubt, assume C3PAO assessment is required.
The Supplier Performance Risk System (SPRS) is the DoD database where contractors submit their NIST SP 800-171 self-assessment scores. Even before full CMMC certification is required, DoD contracting officers can review SPRS scores as part of source selection. The SPRS score ranges from -203 to 110; the goal is 110 (full compliance). Submitting an inaccurate score constitutes False Claims Act exposure.
Based on DIBCAC assessment data and industry experience, a company starting from a moderate security baseline typically requires 6–18 months to achieve Level 2 compliance through a C3PAO assessment. Companies with significant gaps (low SPRS scores, no vulnerability scanning, no incident response plan) are at the longer end. Beginning the gap assessment immediately is critical — do not wait for a contract award to trigger the process.
If a C3PAO assessment finds deficiencies, the assessor produces a finding report. You can remediate deficiencies and request a follow-up assessment, or submit a Plan of Action & Milestones (POA&M) for temporary conditional authorization on specific items. However, a significant number of non-compliant practices will typically result in failure that must be remediated before certification is granted. Conditional authorization timelines are short — typically 180 days.
The official CMMC program website is cmmc.mil, which publishes the current assessment guides and program documentation. The underlying technical requirements are NIST Special Publication 800-171 (available free at csrc.nist.gov). The legal authority is 32 CFR Part 170 (the final CMMC rule). BRITECITY can provide a <a href="/solutions/cybersecurity">CMMC gap assessment</a> mapped to all 110 practices to show your current compliance position.
Keep Reading
Let's Talk
Get personalized advice based on your specific situation. No pressure, just honest guidance.