CMMC 2.0 Requirements Explained

The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense’s framework for ensuring that contractors and subcontractors protect sensitive information. CMMC 2.0 is the streamlined version of this framework, reducing the original five maturity levels to three and aligning more closely with existing NIST standards.

CMMC Levels

CMMC is structured into three levels, but most organizations fall into one:

  • Level 1: Basic safeguards (17 controls)
  • Level 2: Full NIST 800-171 alignment (110 controls)
  • Level 3: Advanced protection for high-risk programs


Level 2 Is a Requirement For Most Contractors


This means implementing
110 security controls across your entire environment, including:

– Access control and user permissions

– Authentication and identity management

– Logging, monitoring, and audit trails

– System security and threat protection

These controls must be applied across your users, devices, and systems.

What’s Required

Level 1

Foundational

Do you handle Federal Contract Information (FCI)?

Information not intended for public release, provided by or generated for the Government under a contract.

17 Practices Annual Self-Assessment
MOST COMMON
Level 2

Advanced

Do you handle Controlled Unclassified Information (CUI)?

Information that requires safeguarding or dissemination controls pursuant to and consistent with laws, regulations, and policies.

110 Practices (NIST 800-171) Triennial C3PAO Assessment
Level 3

Expert

Are you targeted by Advanced Persistent Threats (APTs)?

For the most critical defense programs involving highly sensitive CUI.

110+ Practices Government-Led Assessment

What You Have to Implement

CMMC Level 2 demands 110 strict controls spread across 14 domains.
Access Control (AC)

Limit system access to authorized users and devices.

Audit & Accountability (AU)

Create and retain system audit logs to trace actions.

Incident Response (IR)

Establish operational prep to detect and respond to threats.

Identification & Auth (IA)

Verify identities before granting system access (MFA).

Configuration Mgmt (CM)

Establish and maintain baseline system configurations.

System Integrity (SI)

Monitor systems, patch flaws, and protect against malware.

+ 8 Additional Support Domains across people, processes, and physical security.

This is not a simple checklist, it’s full security architecture.

Leading the Way in Cybersecurity

Recognized for excellence with numerous industry awards, reflecting our commitment to delivering top-tier IT solutions. Our accolades showcase our dedication to innovation, quality service, and client satisfaction.

Book a Demo

CMMC Success Comes Down to Execution

Understanding the requirements is step one.

– Configure systems to meet those controls
– Enforce policies through technology
– Build the evidence assessors expect

Implementing them correctly is what determines whether you pass.

Step 1: Gap Analysis

Identify exactly what’s missing

Step 2: Implementation

Deploy and configure required controls

Step 3: Pre-Assessment Preparation

Validate everything before the auditor arrives

From Controls to Real Implementation

We translate dense compliance requirements into working IT systems.

Access Control

RBAC, Least Privilege, Secure Access

Authentication

Enterprise MFA Deployment

Audit Logging

Centralized Logs + SIEM Alerts

System Integrity

EDR + Vulnerability Scanning

Incident Response

Tabletop Exercises + Tested Plans

We don’t just document compliance, we actively build it.

5,700+ companies trust IT GOAT for their compliance needs

What Compliance Means

This is where many organizations get tripped up. CMMC compliance is not a documentation exercise. It’s not about having the right policies on a shelf. Compliance means your controls are implemented, enforced, and monitored in practice.

Implemented

The control must be technically deployed and functioning in your environment. A policy saying “we use MFA” doesn’t count if MFA isn’t actually configured and required for all users.

Enforced

The control must be consistently applied. If your access control policy requires least privilege but half your users have admin rights, the control isn’t enforced.

Monitored

You must have ongoing visibility into whether controls remain effective. This means logging, alerting, periodic reviews, and the ability to detect and respond to control failures.

Zero Breaches

Protect your business with 24/7 advanced threat detection, proactive defense, and endpoint security to keep your systems secure.

Never Lose Data

Save your critical business data with automated backups and fast disaster recovery to minimize downtime during emergencies.

Always Audit Ready

Meet regulatory requirements like HIPAA, PCI, and GDPR with data encryption, automated compliance checks, and detailed reporting.