Phase 2 of CMMC 2.0 kicks in on November 10, 2026. After that date, every new DoD contract involving Controlled Unclassified Information will require a certified third-party assessment. If you're a small defense contractor without certification, you won't be able to bid.
That's not a scare tactic. It's the timeline the DoD published when Phase 1 went live on November 10, 2025. And the numbers are sobering: out of roughly 80,000 organizations that will eventually need Level 2 certification, fewer than 500 had achieved it as of early 2026. That's under 0.6%.
Small businesses make up 73% of the Defense Industrial Base and hold about 25% of all DoD prime contracts. Most of those companies don't have a dedicated compliance team or a CISO. This checklist breaks down exactly what you need to do, what it costs, and how to prioritize when you're working with limited resources.
Step 1: Figure Out Your CMMC Level
Before you do anything else, you need to know which level applies to you. This depends entirely on the type of data you handle.
Level 1 (Foundational) applies if you only handle Federal Contract Information (FCI) — basically any non-public information the government gives you during contract performance. Think project schedules, internal correspondence, or contract specifications that aren't classified but aren't public either. Level 1 requires 17 security practices and an annual self-assessment. You submit results to the Supplier Performance Risk System (SPRS) and you're done.
Level 2 (Advanced) is where most small contractors land. If you handle Controlled Unclassified Information (CUI) — technical drawings, engineering data, test results, personnel records — you need all 110 security controls from NIST SP 800-171. Starting in Phase 2, that means a third-party assessment by an accredited C3PAO (Certified Third-Party Assessment Organization).
Level 3 (Expert) adds controls from NIST SP 800-172 and requires a government-led assessment. Very few small businesses will need this level. If you're not sure, check your contracts for DFARS clause 252.204-7012. That clause means you're handling CUI and need Level 2 at minimum.
Step 2: Scope Your CUI Environment
The biggest mistake small businesses make is treating their entire network as in-scope for CMMC. That turns a manageable project into a six-figure nightmare.
Your CUI environment includes every system that stores, processes, or transmits CUI — plus any system that provides security protections for those systems. The goal is to make this boundary as small as possible.
Practical steps:
- Identify where CUI actually lives. Map every location: file shares, email servers, cloud storage, laptops, even USB drives. Most companies find CUI scattered across more places than they expected.
- Segment your network. Create a dedicated enclave for CUI processing. This could be a separate VLAN, a dedicated cloud tenant, or even a physically isolated set of workstations. The smaller this enclave, the fewer controls you need to implement across your full infrastructure.
- Document data flows. Trace how CUI enters your environment, where it moves internally, and how it leaves. Include email, file transfers, collaboration tools, and any third-party services that touch the data.
Step 3: Run a Gap Analysis Against NIST 800-171
If you're targeting Level 2 (most of you), your controls map directly to NIST SP 800-171 Rev 2. That's 110 controls across 14 families: Access Control, Audit and Accountability, Awareness and Training, Configuration Management, Identification and Authentication, Incident Response, Maintenance, Media Protection, Personnel Security, Physical Protection, Risk Assessment, Security Assessment, System and Communications Protection, and System and Information Integrity.
For each control, you need to assess whether it's fully implemented, partially implemented, or not implemented at all. Be honest here — inflating your score will backfire during the C3PAO assessment.
Your gap analysis produces two critical outputs:
- Your SPRS score. A perfect score is 110. Each unmet control reduces your score by 1, 3, or 5 points depending on the control's weight. DoD already requires SPRS scores in many contracts, and Phase 1 made this mandatory for self-assessments. If you haven't submitted yours yet, that's job one.
- A prioritized remediation list. Not all gaps are equal. A missing multi-factor authentication implementation is more urgent than an incomplete training program. Prioritize by risk level and by what's easiest to fix — quick wins build momentum and improve your score fast.
If you've already gone through a NIST 800-171 self-assessment, you're ahead of the curve. Your results map directly to CMMC Level 2 requirements.
Step 4: Build Your System Security Plan
A System Security Plan (SSP) isn't optional. It's one of the first documents a C3PAO assessor will ask for, and it needs to be thorough.
Your SSP should document:
- System boundaries and network architecture (include diagrams)
- How each of the 110 controls is implemented in your environment
- Hardware and software inventory for all in-scope systems
- Roles and responsibilities for security functions
- Interconnections with external systems and services
- Data flow diagrams showing how CUI moves through your systems
The SSP is a living document. Every time you change your infrastructure — add a server, switch cloud providers, modify access policies — the SSP needs to reflect that change. Companies that treat it as a one-time exercise end up scrambling before assessments.
Plans of Action and Milestones (POA&M)
You won't fix every gap before your assessment. A POA&M documents the gaps you haven't addressed yet, with specific remediation steps and target completion dates. C3PAOs can issue a "Conditional" status if your POA&M is credible and the remaining gaps aren't showstoppers. You'll then have 180 days to close those gaps.
Don't lean too heavily on this. A POA&M with 40 open items signals that you're not ready. Keep it under 10-15 items, with clear timelines.
Don't know where you stand on CMMC readiness?
CMMC Ready walks you through every control, identifies your gaps, and generates your SSP — built specifically for small defense contractors.
Start your free CMMC readiness assessment →Step 5: Implement Technical Controls
This is where the money and time go. For a small business, here are the controls that typically require the most effort:
Access Control (AC)
Multi-factor authentication for all remote access and privileged accounts is non-negotiable. If you're still using passwords alone for VPN or admin access, that's your first fix. Hardware tokens or authenticator apps both work — just make sure it's enforced, not optional.
Implement least-privilege access across the board. Every user should have access to exactly what they need for their job and nothing more. Audit access permissions quarterly.
Audit and Accountability (AU)
You need logs. Specifically, you need logs of who accessed what CUI, when, and from where. Centralize these logs in a SIEM or log management system. The requirement isn't just to collect logs — you need to review them regularly and retain them for the period specified in your contracts (typically at least 90 days online, one year archived).
Configuration Management (CM)
Maintain baseline configurations for all in-scope systems and track changes. This means documented build standards for servers, workstations, and network devices. No ad-hoc changes — every modification should be approved, documented, and tracked.
System and Communications Protection (SC)
Encrypt CUI in transit and at rest. TLS 1.2 minimum for data in transit (TLS 1.3 preferred). Full-disk encryption on all endpoints that might contain CUI. If you're using a business VPN for remote access, make sure it meets FIPS 140-2 validated encryption requirements.
Step 6: Address the Non-Technical Requirements
Small businesses often nail the technical controls but fumble the administrative ones. Assessors check these just as closely.
Security Awareness Training
Every employee with access to CUI needs annual security awareness training, plus role-specific training for IT staff and administrators. Document the training, keep attendance records, and test comprehension. A one-page sign-off sheet from 2023 won't cut it.
Incident Response
You need a documented incident response plan that your team has actually practiced. Define what constitutes an incident, who gets notified, how you contain it, and how you report it to DoD (72-hour reporting requirement for cyber incidents under DFARS 252.204-7012). Run a tabletop exercise at least annually.
Personnel Security
Screen employees before granting CUI access. This doesn't require government clearances for most Level 2 companies, but you need a documented process: background checks, role-based access decisions, and immediate revocation when someone leaves or changes roles.
Physical Protection
If CUI exists on physical systems, those systems need physical access controls. Locked server rooms, visitor logs, badge access to sensitive areas. If your engineers work from home, your policy needs to address the physical security of their home offices — locked rooms, screen positioning, secure document storage.
Step 7: Prepare for the C3PAO Assessment
Once your controls are implemented and documented, it's time to prepare for the actual assessment. Here's what to expect.
Pre-assessment: The C3PAO will review your SSP, POA&M, and scoping documentation before they arrive. Sloppy documentation means more time (and money) spent during the on-site assessment.
On-site assessment: Assessors will interview staff, review evidence, and test controls. They're not just checking boxes — they want to see that controls are actually functioning, not just documented. If your policy says you review audit logs weekly, they'll ask to see the last four weeks of review records.
Scoring: Each of the 110 objectives gets a MET or NOT MET score. You need all 110 to achieve full certification, though conditional status is possible with a credible POA&M for remaining gaps.
Book your C3PAO early. With 80,000+ organizations needing assessments and a limited number of accredited assessors, wait times are stretching to months. If you want certification by late 2026, you should be booking now.
What This Actually Costs
Honesty time. CMMC compliance isn't cheap for small businesses, but the ranges vary wildly based on your starting point.
- Level 1: If you already have basic security hygiene, you're mainly looking at documentation time and your annual self-assessment. Many small businesses can handle Level 1 with existing IT staff and minimal outside help.
- Level 2 remediation: Most estimates put this between $34,000 and $112,000 for small businesses, depending on how many gaps you're closing. Companies that start with almost nothing in place will land at the higher end. Those with existing security programs might only need targeted fixes.
- C3PAO assessment: Budget $30,000-$60,000 for the assessment itself. Prices vary by assessor, scope complexity, and how many locations you need assessed.
- Ongoing maintenance: Compliance isn't a one-time event. Annual training, continuous monitoring, log reviews, and policy updates add ongoing costs. Many small businesses find that allocating 5-10% of their IT budget to compliance maintenance keeps them assessment-ready.
Compare that to the alternative: losing your DoD contracts entirely. If defense work is a significant part of your revenue, the math is straightforward.
The Small Business CMMC Checklist (Summary)
Here's your action list, compressed:
- Determine your level — check your contracts for DFARS 252.204-7012 and CUI markings
- Scope your CUI boundary — map data flows, segment your network, minimize the assessment surface
- Run a gap analysis — score every NIST 800-171 control honestly, calculate your SPRS score
- Submit your SPRS score — this is already required under Phase 1
- Build your SSP and POA&M — document everything, keep it current
- Remediate gaps — prioritize MFA, encryption, access controls, and logging first
- Implement administrative controls — training, incident response plans, personnel screening
- Book your C3PAO — do this 3-6 months before your target assessment date
- Run a mock assessment — find problems before the assessor does
- Get certified — close any conditional POA&M items within 180 days
For small defense contractors in the Augusta and CSRA area near Fort Eisenhower — the Army's Cyber Center of Excellence — the talent pool and local expertise for CMMC preparation is better than most places in the country. Take advantage of that proximity. Local MSPs and consultants who work with the defense community understand the specific challenges small contractors face.
Eight months isn't a lot of time to go from zero to certified. But it's enough if you start now, scope tightly, and don't try to boil the ocean. Automate what you can, document as you go, and get your C3PAO on the calendar.
CMMC Ready can help you figure out where you stand and what to fix first — especially if you don't have a full-time compliance team to drive the process.
Start your free CMMC readiness assessment
CMMC Ready identifies your gaps, tracks your remediation progress, and generates assessment-ready documentation.
Start your free CMMC readiness assessment →