Product
Everything you need to secure code, cloud, and runtime– in one central system
Code
Dependencies
Prevent open-source risks (SCA)
Secrets
Catch exposed secrets
SAST
Secure code as its written
Container Images
Secure images easily
Malware
Prevent supply chain attacks
Infrastructure as Code
Scan IaC for misconfigurations
License Risk & SBOMs
Avoid risk, be compliant
Outdated Software
Know your EOL runtimes
Cloud
Cloud / CSPM
Cloud misconfigurations
DAST
Black-box security testing
API Scanning
Test your API’s for vulns
Virtual Machines
No agents, no overhead
Kubernetes Runtime
soon
Secure your container workloads
Cloud Search
Cloud sprawl, solved
Defend
Runtime Protection
In-app Firewall / WAF
Features
AI AutoFix
1-click fixes with Aikido AI
CI/CD Security
Scan before merge and deployment
IDE Integrations
Get instant feedback while coding
On-Prem Scanner
Compliance-first local scanning
Solutions
Use Cases
Compliance
Automate SOC 2, ISO & more
Vulnerability Management
All-in-1 vuln management
Secure Your Code
Advanced code security
Generate SBOMs
1 click SCA reports
ASPM
End-to-end AppSec
CSPM
End-to-end cloud security
AI at Aikido
Let Aikido AI do the work
Block 0-Days
Block threats before impact
Industries
FinTech
HealthTech
HRTech
Legal Tech
Group Companies
Agencies
Startups
Enterprise
Mobile apps
Manufacturing
Pricing
Resources
Developer
Docs
How to use Aikido
Public API docs
Aikido developer hub
Changelog
See what shipped
Security
In-house research
Malware & CVE intelligence
Learn
Software Security Academy
Trust Center
Safe, private, compliant
Blog
The latest posts
Open Source
Aikido Intel
Malware & OSS threat feed
Zen
In-app firewall protection
OpenGrep
Code analysis engine
Integrations
IDEs
CI/CD Systems
Clouds
Git Systems
Compliance
Messengers
Task Managers
More integrations
About
About
About
Meet the team
Careers
We’re hiring
Press Kit
Download brand assets
Calendar
See you around?
Open Source
Our OSS projects
Customer Stories
Trusted by the best teams
Partner Program
Partner with us
Contact
Login
Start for Free
No CC required
Aikido
Menu
Aikido
EN
EN
FR
JP
DE
PT
Login
Start for Free
No CC required
Learn
/
Compliance Frameworks Hub
/
Chapter 1Chapter 2Chapter 3

CMMC

4minutes read140

Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter

TL;DR

If you handle DoD contracts and touch Federal info (FCI or CUI), CMMC (Cybersecurity Maturity Model Certification) is mandatory.

Three levels:

  • Level 1: Basic cyber hygiene (self-assessed).
  • Level 2: NIST 800-171 (third-party assessed).
  • Level 3: Advanced security (gov-led audits).

No CMMC = no contract. Get certified, stay eligible.

CMMC Scorecard Summary:

  • Developer Effort: Moderate to High (Depending on level; requires implementing controls related to access control, configuration management, system integrity, vulnerability management, secure coding practices relevant to protecting CUI).
  • Tooling Cost: Moderate to High (Requires tools for access control, MFA, endpoint security, vulnerability scanning, logging/SIEM, configuration management, potentially DLP, aligned with NIST 800-171 controls).
  • Market Impact: Critical (Mandatory for participation in DoD contracts involving FCI/CUI; becoming a fundamental requirement for the entire DIB).
  • Flexibility: Low to Moderate (Based on specific NIST controls; Level 2 allows limited Plans of Action & Milestones (POA&Ms) at assessment time, but full compliance is the goal).
  • Audit Intensity: High (Level 1 is self-assessment, but Level 2 requires formal third-party assessment by a C3PAO, and Level 3 requires government assessment).

What is CMMC?

The Cybersecurity Maturity Model Certification (CMMC) program is a U.S. Department of Defense (DoD) initiative designed to enforce cybersecurity standards across the Defense Industrial Base (DIB). Its primary goal is to protect sensitive unclassified information that resides on contractor networks, specifically:

  • Federal Contract Information (FCI): Information not intended for public release, provided by or generated for the Government under a contract.
  • Controlled Unclassified Information (CUI): Information requiring safeguarding or dissemination controls pursuant to law, regulation, or government-wide policy.

CMMC 2.0, the current iteration, simplifies the original model into three maturity levels:

  • Level 1 (Foundational): Focuses on basic safeguarding of FCI. Aligns with the 15 basic requirements specified in FAR 52.204-21. Requires annual self-assessment.
  • Level 2 (Advanced): Focuses on protecting CUI. Aligns completely with the 110 security requirements outlined in NIST SP 800-171 Rev 2. Requires triennial third-party assessments conducted by an accredited CMMC Third Party Assessment Organization (C3PAO) for most contracts involving CUI. A subset of Level 2 programs may allow self-assessment.
  • Level 3 (Expert): Focuses on protecting CUI from Advanced Persistent Threats (APTs). Includes all 110 controls from NIST SP 800-171 plus a subset of controls from NIST SP 800-172 (Enhanced Security Requirements). Requires triennial government-led assessments.

Unlike previous self-attestation approaches to NIST 800-171, CMMC introduces mandatory assessments (self, third-party, or government depending on the level) to verify implementation of the required cybersecurity practices. The required CMMC level will be specified in DoD solicitations and contracts.

Why is it Important?

CMMC is a game-changer for the Defense Industrial Base (DIB):

  • Mandatory for DoD Contracts: Eventually, achieving and maintaining the required CMMC level will be a prerequisite for companies to be awarded or even participate in DoD contracts that involve FCI or CUI. Non-compliance means losing eligibility for DoD work.
  • Protects Sensitive Information: Aims to significantly reduce the theft of sensitive defense information (FCI/CUI) from the DIB supply chain, which is a major national security concern.
  • Standardizes Cybersecurity: Creates a unified cybersecurity standard across the DIB, moving away from inconsistent self-attestation towards verified compliance.
  • Enhances Supply Chain Security: Requirements flow down to subcontractors handling FCI/CUI, aiming to secure the entire supply chain.
  • Increases Accountability: Shifts from self-attestation to verified assessments, increasing accountability for implementing required security controls.
  • Builds Trust: CMMC certification provides assurance to the DoD (and prime contractors) that subcontractors have appropriate cybersecurity measures in place.

For any company currently doing business with the DoD or planning to, understanding and achieving CMMC compliance is becoming essential for survival and growth in the defense marketplace.

What and How to Implement (Technical & Policy)

Implementing CMMC involves adopting the cybersecurity practices associated with the target level, which are largely drawn from FAR 52.204-21 and NIST SP 800-171 / 800-172:

  1. Determine Required Level: Identify the CMMC level required based on the type of information handled (FCI only for Level 1; CUI for Level 2/3) and specific contract requirements.
  2. Define Scope: Clearly identify the systems, assets, locations, and personnel that handle FCI/CUI. This "CUI boundary" is critical for assessment. Document data flows.
  3. Gap Analysis: Assess current security posture against the requirements for the target CMMC level (15 controls for L1; 110 NIST 800-171 controls for L2; L2 + NIST 800-172 subset for L3). Identify gaps.
  4. Remediation & Implementation: Address identified gaps by implementing the required controls. This spans 14 domains derived from NIST 800-171:
    • Access Control (AC): Implement least privilege, manage accounts, control remote access, use MFA (required for CUI).
    • Awareness & Training (AT): Conduct security awareness training.
    • Audit & Accountability (AU): Generate and retain system logs, ensure actions can be traced to users.
    • Configuration Management (CM): Establish configuration baselines, manage changes, restrict software installation.
    • Identification & Authentication (IA): Uniquely identify and authenticate users (including MFA for CUI access).
    • Incident Response (IR): Develop and test an incident response plan.
    • Maintenance (MA): Perform system maintenance securely.
    • Media Protection (MP): Sanitize or destroy media containing CUI.
    • Personnel Security (PS): Screen individuals before granting access.
    • Physical Protection (PE): Limit physical access, escort visitors.
    • Risk Assessment (RA): Periodically assess risks, scan for vulnerabilities.
    • Security Assessment (CA): Develop System Security Plan (SSP), monitor controls, manage POA&Ms.
    • System & Communications Protection (SC): Monitor/control communications boundaries (firewalls), implement cryptographic protections (e.g., FIPS 140 validated encryption for CUI at rest/in transit), deny network traffic by default.
    • System & Information Integrity (SI): Identify/manage flaws, protect against malware, monitor for unauthorized changes.
  5. Documentation: Develop key documentation:
    • System Security Plan (SSP): Describes how each required control is met.
    • Policies & Procedures: Formal documentation supporting control implementation.
    • Plan of Action & Milestones (POA&M): If gaps remain (allowable only temporarily for CMMC Level 2 under specific conditions), document the plan to fix them.
  6. Self-Assessment (All Levels): Conduct an internal assessment against the requirements and calculate a NIST SP 800-171 assessment score if applicable (required for SPRS submission).
  7. Prepare for Assessment: Gather evidence, prepare personnel for interviews, ensure documentation is complete.
  8. Undergo Assessment:
    • Level 1: Annual self-assessment.
    • Level 2: Triennial third-party assessment by C3PAO (for most) or self-assessment (for some).
    • Level 3: Triennial government-led assessment.

Implementation relies heavily on aligning practices with NIST SP 800-171 and demonstrating maturity and effectiveness through documentation and assessment.

Common Mistakes to Avoid

Achieving CMMC certification requires careful planning. Avoid these mistakes:

  1. Underestimating Scope/Complexity: Failing to accurately identify all systems/locations where FCI/CUI is stored, processed, or transmitted, leading to an incomplete assessment.
  2. Lack of Executive Buy-In: Treating CMMC as purely an IT problem without leadership support for necessary resources, policy changes, and cultural shifts.
  3. Insufficient Resources: Underfunding the effort or lacking personnel with the expertise to implement and document NIST 800-171 controls correctly.
  4. Poor Documentation: Having weak or non-existent SSPs, policies, procedures, or failing to collect adequate evidence to demonstrate control implementation during the assessment.
  5. Ignoring NIST SP 800-171: Assuming existing security practices are sufficient without performing a detailed gap analysis against the 110 controls required for Level 2.
  6. Neglecting Supply Chain: Failing to flow down CMMC requirements to subcontractors who handle FCI/CUI, or not managing risks from External Service Providers (ESPs) like cloud platforms.
  7. Procrastination: Waiting until CMMC requirements appear in contracts, underestimating the 9-18+ months often needed for preparation and remediation.
  8. Treating it as a "Check-the-Box" Exercise: Implementing controls superficially without ensuring they are actually effective and integrated into operations.

What Auditors/Assessors Will Ask (Developer Focus)

While CMMC assessments cover broad IT and security practices, developers handling CUI or working on systems within the CMMC scope might be involved in demonstrating compliance with controls like:

  • (CM Controls) "How are changes to software configuration managed and tracked?"
  • (SI Controls) "What measures are in place to detect and prevent malicious code during development?"
  • (SA Controls - related to 800-171) "Describe your secure software development practices." (While not explicitly detailed in 800-171 itself to the extent of SSDF, secure development is an implicit expectation for protecting CUI).
  • (AC Controls) "How is access to development environments and source code containing CUI controlled?"
  • (AU Controls) "Are developer actions logged, particularly when accessing systems with CUI?"
  • (RA Controls) "How are vulnerabilities identified and remediated in custom-developed software handling CUI?" (e.g., SAST/DAST usage)
  • (SC Controls) "How is CUI protected during transmission (e.g., encryption used in APIs)?"

Assessors will look for implemented technical controls, documented procedures followed by developers, and evidence (logs, scan results, access reviews) confirming compliance.

Quick Wins for Development Teams

Development teams can contribute to CMMC readiness, particularly for Level 2 (NIST 800-171 alignment):

  1. Identify CUI in Dev: Understand if/where CUI might exist in code, test data, documentation, or development tools. Implement handling procedures if necessary.
  2. Secure Dev Environments: Apply access controls (least privilege, MFA) to development servers, code repositories, and CI/CD pipelines, especially if handling CUI.
  3. Integrate SAST/SCA: Use automated tools to find vulnerabilities in code and dependencies early. (Supports RA.L2-3.11.2, SI.L2-3.14.1)
  4. Secrets Management: Ensure no secrets/credentials (especially those providing access to CUI) are hardcoded. (Supports AC.L1-3.1.1, AC.L1-3.1.2)
  5. Formalize Change Management: Use Gitflow/PRs, require approvals, link changes to issues. (Supports CM.L2-3.4.1, CM.L2-3.4.2)
  6. Developer Security Training: Basic security awareness and secure coding training. (Supports AT.L2-3.2.1)

Ignore This And... (Consequences of Non-Compliance)

For organizations in the Defense Industrial Base, CMMC non-compliance will have direct and severe consequences as the framework is rolled out:

  • Ineligibility for DoD Contracts: The primary consequence. Failure to achieve the required CMMC level will disqualify organizations from being awarded new DoD contracts or potentially continuing work on existing ones that involve FCI/CUI.
  • Loss of Revenue: Being locked out of DoD contracts can mean significant loss of current and future revenue for defense contractors.
  • Supply Chain Exclusion: Prime contractors will require their subcontractors to meet CMMC requirements, meaning non-compliant subcontractors will be excluded from DoD supply chains.
  • Competitive Disadvantage: Companies that achieve CMMC certification will have a significant advantage over competitors who do not.
  • Potential Contractual Penalties: Existing contracts might be impacted if CMMC requirements are flowed down and not met, potentially leading to breach of contract issues (though specifics are still evolving).

Essentially, CMMC compliance is becoming a cost of doing business for the DIB.

FAQ

Who needs CMMC certification?

All organizations within the Defense Industrial Base (DIB) supply chain that handle Federal Contract Information (FCI) or Controlled Unclassified Information (CUI) will eventually need to achieve a specific CMMC level as required by their DoD contracts.

What is the difference between CMMC 1.0 and CMMC 2.0?

CMMC 2.0 streamlined the original 5 levels down to 3. It removed CMMC-unique practices and processes, aligning Level 2 directly with NIST SP 800-171 and Level 3 with NIST SP 800-171 + a subset of NIST SP 800-172. It also allows for self-assessments at Level 1 (and a subset of Level 2) and permits the limited use of Plans of Action & Milestones (POA&Ms) at the time of Level 2 assessment under specific conditions.

What is the difference between FCI and CUI?

FCI (Federal Contract Information) is information not intended for public release, provided by/for the government under contract. CUI (Controlled Unclassified Information) is a broader category requiring safeguarding controls, defined by laws, regulations, or government policies (e.g., export-controlled data, certain technical data). Handling CUI triggers the need for CMMC Level 2 or 3.

When will CMMC be required in contracts?

The DoD is implementing CMMC through a phased rollout starting potentially in mid-to-late 2025, based on the finalization of the CMMC program rule (currently under review). It's expected to appear increasingly in contracts over the following years, becoming a requirement for nearly all DoD contracts handling FCI/CUI by approximately late 2027/early 2028.

What is NIST SP 800-171 and how does it relate to CMMC?

NIST SP 800-171 outlines requirements for protecting CUI in non-federal systems. CMMC Level 2 is directly aligned with the 110 security requirements specified in NIST SP 800-171 Rev 2. Compliance with NIST 800-171 is the foundation for achieving CMMC Level 2.

What is a C3PAO?

A CMMC Third Party Assessment Organization (C3PAO) is an organization accredited by the CMMC Accreditation Body (The Cyber AB) authorized to conduct CMMC Level 2 certification assessments.

Can we use cloud services (like AWS, Azure, Google Cloud) for CMMC?

Yes, but the Cloud Service Provider (CSP) environment must meet specific requirements. For contracts requiring CMMC Level 2, contractors can use CSP offerings that are FedRAMP Moderate (or High) authorized or equivalent. Responsibilities for controls are shared between the contractor and the CSP, requiring careful documentation (e.g., Shared Responsibility Matrix).

Jump to:
Text Link

Security done right.
Trusted by 25k+ orgs.

Start for Free
No CC required
Book a demo
Share:

www.aikido.dev/learn/software-security-tools/cmmc

Table of contents

Chapter 1: Understanding Compliance Frameworks

What Are Compliance Frameworks and Why Do They Matter?
How Compliance Frameworks Affect DevSecOps Workflows
Common Elements Across Frameworks

Chapter 2: Major Compliance Frameworks Explained

SOC 2 Compliance
ISO 27001
ISO 27017 / 27018
NIST SP 800-53
NIST SSDF (SP 800-218)
OWASP ASVS
GDPR
NIS2 Directive
DORA
EU Cyber Resilience Act (CRA)
CMMC
PCI DSS
FedRAMP
HIPAA / HITECH
Essential Eight
Singapore CCoP (for CII)
Japan Cybersecurity Act & Related (APPI)

Chapter 3: Implementing Compliance in Development

Choosing the Right Frameworks for Your Organization
Building Compliant DevSecOps Pipelines
Training Development Teams for Compliance
Audit Preparation for Developers
Maintaining Compliance Long-Term
The End

Related blog posts

See all
See all
June 4, 2024
•
Compliance

SOC 2 certification: 5 things we learned

What we learned about SOC 2 during our audit. ISO 27001 vs. SOC 2, why Type 2 makes sense, and how SOC 2 certification is essential for US customers.

January 16, 2024
•
Compliance

NIS2: Who is affected?

Who does NIS2 apply to? Who does it affect? What are essential and important sectors and company size thresholds? Aikido's app has a NIS2 report feature.

December 5, 2023
•
Compliance

ISO 27001 certification: 8 things we learned

What we wished we'd known before starting the ISO 27001:2022 compliance process. Here are our tips for any SaaS company going for ISO 27001 certification.

Company
ProductPricingAboutCareersContactPartner with us
Resources
DocsPublic API DocsVulnerability DatabaseBlogIntegrationsGlossaryPress KitCustomer Reviews
Security
Trust CenterSecurity OverviewChange Cookie Preferences
Legal
Privacy PolicyCookie PolicyTerms of UseMaster Subscription AgreementData Processing Agreement
Use Cases
ComplianceSAST & DASTASPMVulnerability ManagementGenerate SBOMsWordPress SecuritySecure Your CodeAikido for MicrosoftAikido for AWS
Industries
For HealthTechFor MedTechFor FinTechFor SecurityTechFor LegalTechFor HRTechFor AgenciesFor EnterpriseFor PE & Group Companies
Compare
vs All Vendorsvs Snykvs Wizvs Mendvs Orca Securityvs Veracodevs GitHub Advanced Securityvs GitLab Ultimatevs Checkmarxvs Semgrepvs SonarQube
Connect
hello@aikido.dev
LinkedInX
Subscribe
Stay up to date with all updates
Not quite there yet.
👋🏻 Thank you! You’ve been subscribed.
Team Aikido
Not quite there yet.
© 2025 Aikido Security BV | BE0792914919
🇪🇺 Registered address: Coupure Rechts 88, 9000, Ghent, Belgium
🇪🇺 Office address: Gebroeders van Eyckstraat 2, 9000, Ghent, Belgium
🇺🇸 Office address: 95 Third St, 2nd Fl, San Francisco, CA 94103, US
SOC 2
Compliant
ISO 27001
Compliant