- CMMC compliance is the DoD’s way of checking that contractors protect sensitive federal data, not just promise they do.
- It matters because CMMC can be a condition of award, meaning you may not be eligible to win if you can’t meet the required level.
- CMMC has three levels, and the level you need depends on whether you handle FCI (Federal Contract Information) or CUI (Controlled Unclassified Information).
- The rollout is phased from Nov 2025 through Nov 2028, and Phase 1 began Nov 10, 2025, so it’s already affecting solicitations and teaming.
If you’re a small defense contractor or subcontractor, CMMC can feel like a locked door that only opens after you show the right paperwork and the right controls. I see this most often with SMBs that have solid delivery teams but a messy IT baseline, a rushed cloud setup, or unclear data boundaries.
In this post, I’m sharing practical guidance from a technology operations point of view, not legal advice. I’ll focus on what changes in bids, teaming, and post-award execution as CMMC rolls out from Nov 2025 to Nov 2028, and how to get ready without turning your business into a compliance factory.
CMMC 2.0 basics that decide if I can bid (Levels 1, 2, 3 and FCI vs CUI)
CMMC 2.0 boils down to one question: what data touches my environment?
- FCI is contract-related info that isn’t meant for public release, but also isn’t classified or CUI.
- CUI is more sensitive. It can include technical data, test results, controlled drawings, or certain program communications that the government marks and expects you to protect.
Here’s the plain-English mapping:
- Level 1: FCI, based on FAR 52.204-21 “basic safeguards.”
- Level 2: CUI, aligned to NIST SP 800-171 requirements.
- Level 3: highest priority programs and advanced threat protection, assessed by the government.
My quick decision rule for most SMBs is simple: if I store, process, or transmit CUI, I plan for Level 2. That includes CUI sitting in email, Teams, SharePoint, file shares, ticket attachments, backups, or in a supplier portal export that someone saves “temporarily.”
Level 2 is where most real-world bids get won or lost because CUI shows up in more places than people expect, especially after an Office 365 Migration or a “quick” SharePoint rollout.
Level 1 for FCI (FAR 52.204-21), what “basic safeguards” look like
Level 1 fits companies that handle FCI only, often as a supplier providing parts, packaging, basic services, or non-CUI administrative support. FCI examples might include purchase orders, delivery schedules, or non-public contract requirements.
Those “15 safeguards” sound abstract until you translate them into day-to-day Small Business IT:
- Access control: unique user accounts, least privilege, no shared admin logins.
- Device Hardening: secure configs on laptops and servers, remove local admin where possible.
- Endpoint Security: antivirus or EDR, patching discipline, and blocked risky macros.
- Basic incident response: who to call, how to isolate a device, how to preserve logs.
For many firms, Level 1 is achievable without buying a mountain of tools, but it does require consistency. A few unmanaged laptops can ruin your story fast.
Level 2 for CUI (NIST SP 800-171), the level that makes or breaks most bids
Level 2 aligns to 110 requirements in NIST SP 800-171. If you want to see what you’re being measured against, I point teams straight to the source: NIST SP 800-171 Rev. 3 (PDF).
In Phase 1 of the rollout, many Level 2 situations start with self-assessment and reporting, but some programs will require third-party certification by a C3PAO earlier than others. Either way, the operational reality is the same: you need a Secure Cloud Architecture, clear boundaries, and evidence that controls actually run.
This is where Cloud Infrastructure and Cloud Management choices matter. If CUI lives in Microsoft 365, I treat Office 365 Migration as a security project, not just a mailbox move. Common make-or-break items include MFA, conditional access, centralized logging, retention, device compliance, and strict data handling rules for downloads, sharing, and guest access. If you also run hybrid workloads with Data Center Technology (on-prem file servers, ERP, lab systems), scoping and logging get harder, and costs usually rise.
Where CMMC shows up in real DoD contracts (and how primes use it to screen teams)
CMMC is no longer a future problem. The DoD’s official CMMC resources are clear that the program is active and expanding, and I keep clients pointed at the living source documents on the DoD CIO CMMC Resources & Documentation page.
The phased implementation matters for bid strategy:
- Phase 1 started Nov 10, 2025, and runs through Nov 9, 2026.
- Phases continue through Nov 2028, when CMMC requirements are broadly expected across applicable contracts.
That means CMMC shows up in solicitations as an eligibility gate, and primes treat it like supplier insurance. If you can’t meet the required level (or can’t prove it), the prime often won’t risk adding you to the team, even if your technical capability is strong.
When I review an RFP or a prime’s onboarding packet, I look for:
- The required CMMC level for award
- Whether CUI is in scope, and where it will live (email, portals, shared repos)
- Assessment expectations (self-assessment vs third-party)
- Reporting requirements and timelines
- Subcontractor flow-down language and data-sharing rules
The contract language to watch: DFARS 252.204-7012, 7019, 7020, and the CMMC clause 7021
These clauses are the “teeth” behind CMMC:
- 7012: protect CUI and report cyber incidents (including the 72-hour reporting expectation).
- 7019: requires an NIST SP 800-171 assessment score posted in SPRS before award.
- 7020: allows the DoD to verify your security claims.
- 7021: the clause that ties the required CMMC level to the contract.
For the most current program framing and official references, I use the DoD CIO “About CMMC” page plus the rulemaking notice trail in the Federal Register CMMC Program entry. For teams that want a fast, plain-language overview to share internally, I often send the CMMC 101 program overview (PDF).
Practically, missing SPRS entries or having the wrong CMMC level can block award, delay onboarding, or trigger a painful “prove it now” scramble.
SPRS scores, annual affirmations, and “flow-down” to subcontractors
SPRS is the government system used to track supplier risk and assessment status. Even when you’re not the prime, primes care because your gap becomes their problem.
In real teaming, flow-down happens fast. If you touch FCI or CUI, the prime will often ask for proof such as an SPRS score screenshot, your CMMC status, an SSP summary, and a short evidence pack (MFA enforcement, logging examples, endpoint posture, incident response contact process).
This is also where leadership attestation risk becomes real. If an officer signs off that controls exist, and they don’t, it can create serious contractual exposure. I keep this squarely in “talk to counsel” territory, but I also don’t let teams treat affirmations like routine paperwork.
How CMMC compliance changes win rate, delivery risk, and post-award performance
CMMC changes three parts of the business at once: eligibility, schedule, and trust.
As a Business Technology Partner, I frame it this way: compliance is part of Infrastructure Optimization and Business Continuity & Security, not a bolt-on.
Bid or no-bid: eligibility gates, schedule risk, and why “we’ll fix it after award” fails
During the rollout, CMMC can still be a condition of award. Waiting until after award fails because you may never get the award.
Red flags that push me toward no-bid or re-scope:
- Required level can’t be met by the proposal due date
- SPRS status is missing or outdated
- CUI boundary is unclear (or keeps changing weekly)
- Evidence is thin (policies exist, but logs and enforcement don’t)
Prime contractor vetting: what primes ask me for before they add me to a team
Primes usually ask where CUI lives, how it flows, what Endpoint Security is deployed, how MFA is enforced, what logging exists, and how incident reporting works. They also ask how subcontract language handles flow-down.
A simple scenario I see often: a subcontractor needs Level 2 access to CUI in a shared collaboration space. Their Microsoft tenant was set up for general business use, so external sharing is wide open, logging is limited, and devices aren’t compliant. The prime chooses another partner because the risk is immediate and visible.
Post-award reality: evidence, audits, incident reporting, and keeping operations running
Compliance is not a one-time project. You’ll maintain the SSP, track POA&M items where allowed, collect evidence over time, and stay ready for verification or assessment. Done well, it supports delivery, reduces outages, and helps your IT Strategy for SMBs stay aligned with contract reality, even during Digital Transformation work that would otherwise increase risk.
A practical CMMC readiness plan (timeline, cost drivers, pitfalls, and next steps)
Most SMBs I work with need 3 to 9 months to get ready, depending on scope, current maturity, and whether they’re hybrid (cloud plus Data Center Technology).
Implementation timeline and cost drivers I see most often
Cost and time usually come from: scoping and boundaries, asset inventory, identity and access, logging and monitoring, secure configuration, backups, encryption, policies and training, vendor tools, and assessment prep. Hybrid environments add complexity because you’re proving controls across more systems, not just one cloud tenant.
This is where Innovative IT Solutions and Tailored Technology Services pay off, because the goal is fewer surprises, not more tools.
Common pitfalls that delay certification (scope, asset inventory, boundaries, SSP/POA&M, evidence)
- Wrong CUI scope: teams assume “we don’t have CUI,” then find it in email and file shares.
- Incomplete asset inventory: unknown devices can’t be protected or logged.
- Unclear enclave boundary: auditors can’t tell what’s in or out of scope.
- Weak SSP: vague descriptions that don’t match reality.
- POA&M misuse: treating major gaps like minor paperwork items.
- Missing evidence: controls exist, but there’s no proof.
- Tool-only fixes: buying products without process and accountability.
- Ignoring subcontractor flow-down: a weak link breaks the chain.
Managed IT for Small Business and well-scoped Cybersecurity Services can reduce these delays when accountability is clear and documented.
CMMC readiness checklist and recommended next steps
- Identify FCI vs CUI
- Map systems and data flows
- Confirm your target level
- Run a gap assessment against FAR 52.204-21 or NIST SP 800-171
- Set an SPRS process and leadership affirmation cadence
- Build an SSP and evidence library
- Fix high-risk gaps (Endpoint Security, Device Hardening, MFA, logging)
- Tighten cloud configuration (Secure Cloud Architecture)
- Plan for assessment scheduling if a third-party review is needed
- Update subcontract flow-down language
- Set a maintenance cadence tied to operations
If you want help, I approach this as Technology Consulting plus operational support, from Cloud Infrastructure and Cloud Management to endpoint controls. That same discipline also shows up in my non-DoD work, like Restaurant POS Support and Kitchen Technology Solutions, because uptime, access control, and incident response still matter when revenue is on the line.
Conclusion
CMMC compliance now affects whether I can bid, win, and keep DoD work, and it changes how primes choose teammates. With the phased rollout running from Nov 2025 through Nov 2028 (and Phase 1 already active), waiting usually raises cost and shrinks options.
My advice is to start with scoping, data flow mapping, and a realistic gap plan, then build evidence as you improve controls. This is general information, not legal advice.
If you want a readiness review, I can help you scope CUI, choose the right Secure Cloud Architecture, and build a practical plan across cloud, Office 365 Migration, data center, and Endpoint Security so compliance supports delivery, not the other way around.
Discover more from Guide to Technology
Subscribe to get the latest posts sent to your email.
