CMMC 2.0 for Defense Subcontractors: 2026 Compliance Roadmap
CMMC has stopped being a future concern and started being a right-now contract requirement. If you're a defense subcontractor and you've been hoping to wait this out, that strategy has expired. The Department of Defense is putting CMMC language in active contracts. Primes are flowing those requirements down to their subcontractors. The organizations I've worked with recently aren't debating whether to pursue CMMC, they're scrambling to hit compressed prime-imposed deadlines. This is the working explanation of what's required, what it actually costs, and how I'd approach CMMC readiness if I were starting today with a tight timeline. The authoritative sources are the DoD CIO's CMMC program page and the underlying NIST SP 800-171 and NIST SP 800-172 control catalogs.
The Three CMMC 2.0 Levels
CMMC 2.0 has three levels, and the differences matter for what you actually need to do. Level 1 is foundational, 17 basic cyber hygiene practices, annual self-attestation, applies to anyone handling Federal Contract Information. In practice, that means any DoD contractor. Level 2 is advanced, 110 practices aligned to NIST SP 800-171, three-year assessment by a Certified Third Party Assessment Organization, applies to anyone handling Controlled Unclassified Information. Level 3 is expert, adds 24 more practices from NIST SP 800-172, government-led assessment by DCMA's DIBCAC, applies to the most critical DoD programs. Most subcontractors are in Level 2 territory. Most conversations start there.
Flow-Down From Primes
The flow-down mechanics catch people off guard. Primes get CMMC requirements from their DoD contracts and are obligated to flow those requirements down to subcontractors handling CUI. Machine shops, engineering consultancies, IT providers, small specialty manufacturers, all of them are now in scope if they touch CUI from a defense prime. I've had clients tell me their prime customer gave them 90 days to get CMMC Level 2 ready or lose the contract. That's not unusual in 2026. It's the new baseline.
What is CUI, practically? CUI is unclassified information that requires safeguarding or dissemination controls under law, regulation, or government policy. In defense contexts, it typically means technical drawings, specifications, manuals, performance data, and project plans. If your prime shares information marked 'CUI' or the legacy equivalents (NOFORN, SBU, FOUO), you're handling CUI and Level 2 applies. If you aren't sure, ask the prime. They're required to mark CUI explicitly. Don't guess. Getting the CUI scope wrong at the start creates expensive rework later.
Scoping: Enterprise vs Enclave
Scoping CMMC Level 2 is the first critical decision and the one that most determines cost. You have two scoping approaches. Enterprise-wide means the entire company is in scope, which is the simplest to explain but the most expensive and operationally painful. Enclave scoping means a dedicated environment for CUI only: isolated network segment, dedicated endpoints, restricted user access. Enclave is dramatically cheaper and faster to achieve, which is why most mid-market subcontractors build a CUI enclave. If you can reasonably isolate your CUI handling, do it. The scope reduction is typically 60-80%, and the cost reduction scales similarly.
The 110 Level 2 practices come from NIST SP 800-171 and span 14 control families: access control, awareness and training, audit and accountability, configuration management, identification and authentication, incident response, maintenance, media protection, personnel security, physical protection, risk assessment, security assessment, system and communications protection, and system and information integrity. Each practice needs an implementation that can be demonstrated to an assessor with evidence. This isn't a checkbox exercise. Assessors test both design and operation.
The technical controls that matter most for Level 2 are the ones everyone forgets to fully implement. MFA for all CUI access and all privileged access. Encryption at rest and in transit for CUI. Network segmentation isolating CUI from non-CUI environments, and that segmentation has to be real, not aspirational. Endpoint protection with centralized logging. SIEM or log management with 90+ day retention, enforced. Vulnerability scanning and patch management with defined cadence, also enforced. Incident response capability with a documented runbook and tabletop exercise evidence. I've seen organizations fail assessments because one of these was in place on paper but not in practice.
The process controls are just as important as the technical ones, and they're where organizations often lose points during assessment. A documented System Security Plan and Plan of Action and Milestones. Security awareness training for all personnel with CUI access, tracked and refreshed annually. Media sanitization procedures that meet the actual standards, not just 'delete the files'. Physical access controls to CUI areas, meaning if you have CUI handling in a specific room, you need documented access control to that room. Personnel screening before CUI access. Vendor risk management for subcontractors handling your CUI. Continuous monitoring with defined metrics and review cadence.
Cost Reality
Cost reality is the part people really want to know. A clean Level 2 assessment from a C3PAO runs $40K-$120K depending on scope and complexity. That's the assessment alone. Before assessment, reaching Level 2 readiness for most subcontractors means $50K-$200K in remediation work: technical controls deployment, documentation, training, tabletop exercises. Ongoing operation of Level 2 controls costs $80K-$250K per year once you're there. A first-time Level 2 journey typically totals $200K-$500K all-in. That number shocks people who haven't budgeted for it, which is most of them when the prime's deadline lands.
Compressed Timelines
Timelines are compressing dramatically. Historically, organizations took 12-18 months to reach Level 2 readiness. In 2026, primes are demanding readiness within 90-180 days to avoid contract disruption. Tight timelines require parallel workstreams: gap assessment, remediation, documentation, and evidence collection happening simultaneously rather than sequentially. Organizations without mature IT or security capabilities usually can't hit these timelines without a managed services partner who has done this work before. Trying to build the capability internally during a 90-day window is how organizations miss their prime's deadline.
Level 3 is a separate conversation for a different audience. Fewer than 500 organizations will likely ever achieve Level 3. It applies to programs where CUI loss would have severe impact on national security: advanced weapons systems, intelligence community supplier contracts, nuclear command and control. Assessment is conducted by DCMA's DIBCAC, not a commercial C3PAO, and is materially more rigorous. If you're unsure whether you'll need Level 3, you almost certainly don't. DoD contracts explicitly state the required CMMC level.
Common C3PAO Failure Patterns
The failure patterns at C3PAO assessment are consistent, and all of them are pre-emptable. SSP documents CUI boundaries that don't match the actual technical controls, which means scope was claimed on paper but not enforced in network configuration. Log retention falls short of the 90-day operational requirement during the observation period. The POA&M tracks gaps but closure evidence isn't documented. Subcontractor flow-down requirements aren't enforced, which means subcontractors handling your CUI don't have their own CMMC evidence. Tabletop exercises weren't conducted, or were conducted but documentation is thin. Five patterns. If you can rule out all five, you're in good shape.
The assessment process itself takes longer than people expect. After C3PAO engagement, expect 4-8 weeks of pre-assessment preparation (artifact collection, interviews, clarifications), 1-2 weeks of on-site or virtual fieldwork, and 4-8 weeks for report finalization. During fieldwork, assessors sample controls and test both the design and operation. Failed practices result in a deficiency that must be remediated within 180 days. Failure to remediate results in CMMC Level 2 certification denial. First-time organizations typically surface 5-15 deficiencies at initial assessment. Build that remediation time into your plan. Expecting zero deficiencies at your first assessment is unrealistic.
Recertification is every three years, but continuous operation is ongoing. You have to demonstrate that Level 2 controls operated continuously between assessments, not just that you hit the bar on assessment day. Slipping during the three-year gap and scrambling for recertification is how organizations lose their CMMC status. The pragmatic answer: operate Level 2 controls continuously with a managed security partner who maintains the evidence pipeline. That's how recertification stops being a crisis and becomes a routine check-in.
POA&M specifics matter more than most guides explain. The POA&M documents control gaps, remediation plans, target dates, and responsible parties. For CMMC Level 2, a POA&M is permitted for a limited subset of practices, primarily lower-weighted ones, and only for a maximum of 180 days post-assessment. High-weight controls (MFA for CUI access, encryption of CUI, incident response capability) can't be POA&M'd. They have to be fully operational at assessment. The POA&M template from the CMMC Accreditation Body has specific required fields: practice identifier, finding description, risk rating, remediation action, target completion date, responsible person, verification evidence. Keep the POA&M honest. Understating gaps to pass assessment creates bigger problems in the 180-day remediation window.
Subcontractor flow-down compliance is enforced through your contracts, not through hope. DFARS 7012 and the CMMC final rule require that CMMC obligations flow down to subcontractors handling CUI. In practice this means your subcontract agreements must include CMMC clauses identifying the required level. You must collect and review subcontractor CMMC assessment reports or self-attestations. You must track subcontractor CMMC status and flag expirations. If a subcontractor loses CMMC status, you must remediate before resuming CUI sharing. I've seen primes get caught off-guard by DCMA audits that specifically sample subcontractor flow-down compliance. Build a vendor management program that treats CMMC compliance as a contract-renewal gate, not an occasional check.
Overlap With ISO 27001 and SOC 2
The CMMC, ISO 27001, and SOC 2 overlap is worth understanding because it can save you substantial work. These frameworks share significant technical requirements but have real differences. ISO 27001 and SOC 2 are commercial frameworks focused on general information security. CMMC is DoD-specific and focused on CUI protection. A mature ISO 27001 program typically covers 60-75% of CMMC Level 2 technical requirements. A SOC 2 Type II program covers 50-65%. The gap is in CMMC-specific requirements: CUI marking and handling, specific incident reporting to DoD, personnel screening for CUI access, and media sanitization procedures meeting NSA standards. Organizations holding ISO 27001 or SOC 2 Type II have a significant head start on CMMC Level 2. The roadmap is closing the gap, not starting from scratch.
Level 2 to Level 3 progression is rare but worth understanding if you might face it. Level 3 adds 24 practices from NIST SP 800-172 focused on Advanced Persistent Threat protection: threat hunting capability, supply chain risk analysis, advanced authentication, and protection of sensitive information in applications. Assessment is by DCMA's DIBCAC and is considerably more rigorous. Organizations pursuing Level 3 need dedicated threat hunting personnel or retained MDR with threat hunting, software composition analysis and supply chain security tooling, privileged access with session recording, and advanced cryptographic controls. Level 3 is required only for the most sensitive DoD programs. If your contracts don't explicitly require Level 3, you probably don't need it.
The long-term economics of CMMC operation are what you should actually plan for, because the recurring cost is permanent. Year one readiness plus assessment is $200K-$500K all-in for most subcontractors. Year two continuous operation is $80K-$250K annually depending on operational model. Year three preparation for recertification adds another $15K-$40K for readiness review. The recurring cost is unavoidable because CUI-handling systems require continuous monitoring, documented evidence, and periodic exercise. The right economic model is treating CMMC as a cost of doing business with DoD customers, factored into contract bids rather than absorbed as overhead. Primes are increasingly accepting CMMC compliance costs as allowable indirect costs in government contracts, so discuss this with your contracting officer.
When organizations already have mature security programs, integrating CMMC has three paths. The carve-out approach creates a dedicated CUI enclave with its own controls, monitoring, and evidence pipeline, separate from general enterprise operations. Minimizes CMMC scope but creates operational duplication. The lift-everything approach extends CMMC-level controls across the entire enterprise. Simplifies operations but expands assessment scope and cost dramatically. The hybrid approach implements CMMC controls enterprise-wide for the baseline (MFA, logging, patching) but maintains a CUI enclave for CUI-specific requirements (media marking, personnel screening, DoD incident reporting). Most subcontractors with 500+ employees adopt the hybrid as the most economical balance.
Training and personnel requirements are where I see organizations surprised at assessment. CMMC Level 2 requires documented security awareness training for all personnel handling CUI, covering CUI identification, proper handling, incident reporting, and penalties for mishandling. Training must be delivered before CUI access is granted and refreshed annually. Role-based training for CUI custodians and privileged users requires additional depth on technical controls, incident response procedures, and system-specific usage. Assessors sample training completion records during fieldwork, and missing or outdated records are a common deficiency. Training content can come from DoD-provided materials, commercial providers like KnowBe4, SANS, or Infosec Institute, or custom content. What matters is documented delivery, completion, and content relevance.
Organizational readiness matters beyond the technical controls, and this is the part that's hardest to fake. CMMC assessment evaluates not just whether controls exist but whether they operate as documented. In practice, your leadership, IT team, and CUI custodians need to understand the controls well enough to describe them to assessors without reading from documentation. Preparation should include leadership interviews with the vCISO or compliance lead to rehearse assessor questions, walkthrough exercises where team members demonstrate controls in their daily systems, documentation of day-in-the-life scenarios showing how CUI moves through your environment, and pre-assessment Q&A sessions to catch knowledge gaps before fieldwork. Organizations that skip rehearsal often have technically correct controls but stumble on operational narratives. Assessors interpret that as immature operation even when the underlying technology is sound.
One last observation from running CMMC readiness with defense subcontractors. The clients who handle CMMC best aren't the ones with the biggest security budgets. They're the ones whose leadership took CMMC seriously from day one rather than treating it as a compliance checkbox. When leadership engages directly (CEO in the tabletop exercise, CFO signing off on the POA&M, COO asking hard questions about operational control), the program operates better because nobody below them can treat CMMC as someone else's problem. When leadership delegates CMMC to IT and disengages, the controls operate poorly because they're not seen as organizational priorities. The cultural signal matters as much as the technical implementation.
EFROS delivers CMMC Level 2 readiness and continuous control operation as a fixed-scope engagement. We hold ISO 27001 and SOC 2 Type II ourselves, operate NIST 800-171 controls across many client environments, and have delivered C3PAO-ready engagements for defense subcontractors in precision manufacturing, aerospace, and defense IT. Our recent case study documents a 90-day journey from zero CMMC readiness to Level 2 certified, without losing a single production hour on the shop floor. For subcontractors facing prime-customer deadlines, compressed-timeline readiness is our core competency, and the timeline is typically the hardest constraint to work against.
Frequently Asked Questions
Do I need CMMC if I only handle FCI, not CUI?
Yes — CMMC Level 1 (self-attestation, 17 practices) applies to any DoD contractor handling Federal Contract Information. FCI includes basic contract information, delivery schedules, invoices, and similar. Level 1 requirements are aligned with basic cyber hygiene (MFA, patching, backup, access control) and are achievable for most organizations without specialized investment.
Can we self-attest Level 2 instead of using a C3PAO?
No. Level 2 requires third-party assessment by a C3PAO for contracts involving CUI. A narrow exception exists for some non-critical CUI contracts where self-assessment is permitted, but most defense contracts require third-party Level 2 certification.
How long does CMMC Level 2 readiness take?
With mature starting capabilities: 90-180 days. From a near-zero baseline: 6-12 months. Compressed timelines (under 90 days) are only feasible with dedicated resources, a managed security partner operating controls, and enclave-based scoping rather than enterprise-wide.
What happens if we fail a C3PAO assessment?
The assessor documents deficiencies in a POA&M. You have 180 days to remediate. Once remediation is evidenced and re-tested, certification is issued. Failure to remediate within 180 days results in denial and requires restart of the assessment process. Most organizations achieve certification within 180 days of initial assessment if gap remediation is prioritized.
About the author

Stefan Efros
CEO & Founder, EFROS
Stefan founded EFROS in 2009 after 15+ years in enterprise IT and cybersecurity. He sees how the pieces connect before others see the pieces themselves. Focus: security-first architecture, operational rigor, and SLA accountability.
Related articles
More from the EFROS blog on compliance and adjacent topics.
SOC 2 Type II Readiness: A 12-Week Checklist
The 12-week path to a SOC 2 Type II audit-ready state: gap assessment, control design, evidence pipeline, pre-audit dry run. What actually matters, what's optional.
Virtual CISO: When, Why, and How to Choose One in 2026
A vCISO delivers executive security leadership at 0.25-0.5 FTE cost. When to hire one, what to expect, how to evaluate providers, and what a fair engagement looks like.
PCI-DSS 4.0 Scope Reduction: Tokenization, P2PE, and Segmentation
Reducing PCI scope cuts audit effort, breach risk, and compliance cost. The three techniques that work, the pitfalls, and a practical scope-reduction roadmap.