Jackie Ramsey January 28, 2026 0

If you’re chasing DoD work in 2026, you’ve probably heard some version of this: “Just move to Microsoft 365 and you’ll be CMMC compliant.” I wish it worked that way. Microsoft 365 CMMC alignment can absolutely cover a lot of ground, but it’s not a magic button.

What matters is three decisions I make up front: what data I handle (FCI vs CUI), how I scope my assessed enclave (the “bubble” that touches CUI), and which Microsoft 365 cloud I choose (Commercial, GCC, or GCC High). Those choices drive cost, effort, and audit stress.

CMMC 2.0’s rollout began on Nov 10, 2025, and it’s already influencing awards and renewals. If I wait until an RFP forces the issue, I’m late. Planning now gives me time to set the tenant up right, build evidence, and avoid a rushed migration.

Start with CMMC 2.0 basics, scope, and the CUI enclave

Descriptive alt text
An AI-created illustration of an “enclave bubble” protecting FCI and CUI inside Microsoft 365-style workflows.

CMMC 2.0 is simpler than the older model, but it still trips teams up because the hardest part is not tech. It’s scope.

Level 1 is for FCI (Federal Contract Information). Think of everyday contract data that is not meant for the public, like a purchase order, delivery schedule, or contract line items. Level 1 aligns to the basic safeguards in FAR 52.204-21, and it’s typically an annual self-assessment reported in SPRS (the DoD even provides a CMMC Level 1 self-assessment guide that helps you understand the intent).

Level 2 is for CUI (Controlled Unclassified Information). This is where most small defense contractors get surprised. CUI can show up as a drawing with controlled markings, a test report, engineering specs, security requirements, or technical data sent by a prime. Level 2 aligns to all 110 requirements in NIST SP 800-171, and assessments are typically every three years by a C3PAO (with limited cases allowing self-assessment, depending on the contract and risk).

Here’s the part I treat as non-negotiable: if I touch any CUI, I scope that environment to Level 2. “We only have a little CUI” is like saying, “We only have a little gasoline near the pilot light.”

Scoping is simple in theory: if a system processes, stores, or transmits FCI or CUI, it’s in scope. In real life, email forwarding, Teams chats, OneDrive sync, and unmanaged laptops quietly expand the boundary.

That’s why I like the assessed enclave approach. I build a defined “bubble” of people, devices, identities, and systems that handle CUI, then I keep the rest of the business out of that bubble. Done correctly, a smaller enclave cuts licensing, reduces audit evidence, and limits daily friction. If you want a good plain-language explanation of the concept, this overview of what a CUI enclave is is worth a few minutes.

A quick way I decide if I am Level 1 or Level 2

  • FCI only, no controlled markings, no technical data: I plan for Level 1.
  • Any CUI from a prime or the DoD: I treat it as Level 2 scope.
  • Specs, drawings, test data, or controlled work instructions: I assume CUI until proven otherwise.
  • My team uses personal email/text for work: scope is already expanding.
  • CUI lives in “normal” SharePoint/OneDrive: I’m likely scoping the whole tenant, and that gets expensive fast.

What “in scope” really means for Microsoft 365, endpoints, and vendors

If I store or send FCI or CUI in Exchange, SharePoint, OneDrive, or Teams, those services are in scope. So are the identities (Microsoft Entra ID accounts), the devices that access the data, and the security logs that prove controls are working.

Vendors matter too. If an MSP, helpdesk tool, backup provider, or third-party app can access CUI, that relationship can pull more systems into scope. I document access, lock down permissions, and keep a clean record of who can touch what.

Choosing the right Microsoft 365 cloud for DoD work, Commercial vs GCC vs GCC High

Descriptive alt text
An AI-created illustration showing Commercial, GCC, and GCC High as separate cloud tiers with stronger controls higher up.

Tenant choice is not a “later” decision. It shapes your controls, your evidence, and whether your prime will accept your environment for CUI.

Here’s the practical view I use:

  • Commercial can often work for Level 1 FCI if it’s configured well (strong identity controls, device controls, and logging).
  • GCC is a government-focused environment, but it’s not always the best landing spot for true DoD CUI unless the contract and prime explicitly accept it.
  • GCC High is the safer default when I handle real CUI and need to line up with the expectations that often come with DFARS-style flowdowns and stricter government cloud requirements.

This is also where FedRAMP expectations show up in plain terms. When CUI is involved, I want the cloud environment, support model, and compliance posture to match the risk. I can’t “settings my way out” of being in the wrong cloud. If you want Microsoft’s positioning on this, their Microsoft Cloud for CMMC page gives a helpful high-level overview.

My rule of thumb for picking Commercial, GCC, or GCC High

  • FCI-only (Level 1): Commercial is usually fine when locked down.
  • CUI (Level 2): GCC High is usually my default choice.
  • ITAR or export-controlled work: I plan for GCC High unless legal and contract language says otherwise.

One more practical option: I can keep my main business in Commercial and put only CUI users in GCC High, as long as my workflows keep data from crossing the line.

Microsoft 365 CMMC alignment, what it covers, what I must configure, and what it cannot replace

Descriptive alt text
An AI-created illustration of a control-mapping concept between CMMC families and Microsoft security tools.

When people ask me if Microsoft 365 can “do CMMC,” I answer like this: Microsoft 365 gives me strong building blocks, but CMMC is proved with configuration, evidence, and repeatable process.

For cloud selection differences and why many DoD contractors choose GCC High for CUI, this comparison of GCC High vs GCC for protecting CUI with CMMC is a solid reference.

Table, CMMC and NIST 800-171 families mapped to Microsoft 365 features

FamilyWhat auditors look for (plain words)Microsoft 365 tools that helpWhat is still on me
ACOnly approved users get accessEntra ID, Conditional Access, IntuneAccess rules, reviews, proof
AULogs exist and can be reviewedPurview Audit, Defender, Sentinel (optional)Retention, daily/weekly review
IAStrong sign-in controlsMFA, Conditional Access, Entra IDAccount process, break-glass plan
SCData protected in transit/restM365 encryption, TLS, PurviewApproved methods, configs documented
SIMalware protection and patchingDefender for Endpoint, IntunePatch cadence, exception handling
IRRespond to incidents consistentlyDefender alerts, Sentinel (optional)IR plan, roles, exercises
CMSecure settings stay secureIntune policies, baselinesChange control, approvals, evidence
MPMedia and data handling rulesPurview labels/DLPHandling policy, user training
PEPhysical access controlled(Limited in M365)Doors, badges, visitor logs
ATUsers trained on rulesTraining platform, phishing sims (if used)Training records, enforcement
RARisks identified and trackedDefender posture signalsRisk register, remediation plan
CAAssessments and plans existCompliance Manager (if used)SSP, POA&M, internal reviews

My must-do Microsoft 365 configurations for CMMC Level 1 and Level 2

  • Enforce MFA for all users with Conditional Access.
  • Create break-glass accounts, protect them, test them.
  • Block legacy authentication across the tenant.
  • Use least privilege admin roles, no daily global admins.
  • Require Intune enrollment and compliant devices for access.
  • Turn on disk encryption (BitLocker) and escrow recovery keys.
  • Roll out Defender for Endpoint and verify onboarding reports.
  • Configure Defender for Office 365 (Safe Links, Safe Attachments).
  • Use Purview sensitivity labels for CUI, add DLP for email and files.
  • Restrict external sharing in SharePoint, OneDrive, and Teams.
  • Enable unified audit logging, set clear retention targets.
  • Set alerting ownership, define triage steps and time goals.
  • Run an incident response tabletop and keep notes and action items.
  • Build an evidence plan (screenshots, exports, tickets) per control.

What Microsoft 365 can’t replace is the “paper and people” part: your SSP, your policies, vendor management, backup strategy, vulnerability management, and proof that you actually do the work each month. Licensing also matters. Features vary by tenant type and plan level, so I confirm what’s included before I design the control set.

Conclusion

Microsoft 365 can help me meet many CMMC requirements, but only when I treat it like a system, not a subscription. The honest path is clear: I identify whether I handle FCI or CUI, I scope a tight enclave, I pick the right cloud (Commercial, GCC, or GCC High), and I configure security features with real evidence behind them. That’s what makes Microsoft 365 CMMC alignment believable to a prime and defensible to an assessor.

If you want help, I can map your FCI/CUI scope, recommend a tenant strategy, and turn your current setup into an assessment-ready plan (SSP, evidence list, and a prioritized checklist). No promises of “guaranteed certification,” just a clear plan you can execute and defend.


Discover more from Guide to Technology

Subscribe to get the latest posts sent to your email.

Category: 

Leave a Reply