If you run Small Business IT for a defense contractor, CMMC gaps hit harder than they should. You’re juggling a small staff, a mixed stack (old laptops, new cloud apps, maybe a server closet), and constant change from contracts and primes. CMMC doesn’t care that you’re busy. It cares that controls are real, repeatable, and provable.
I also see confusion around Level 1 versus Level 2. Level 1 is about protecting FCI. Level 2 is about protecting CUI and aligns to NIST SP 800-171. The gap between “we’re careful” and “we can prove it” is where most small teams get burned.
As your Business Technology Partner, I help with Tailored Technology Services across Cloud Infrastructure, Endpoint Security, and Business Continuity & Security. This is not legal advice, confirm requirements in official DoD and NIST sources before you make contract decisions.
Where CMMC stands in 2026 and what “ready” really means for small contractors
As of January 2026, CMMC is no longer a future project. The CMMC program rule is final, and the DFARS acquisition rule is in effect, so DoD can put CMMC requirements directly into solicitations and contracts. DoD is rolling it out in phases from 2025 through 2028.
In Phase 1 (Nov 10, 2025 to Nov 9, 2026), many solicitations focus on Level 1 and Level 2 self-assessments, with scores and affirmations submitted in SPRS. Some Level 2 work can still require a C3PAO assessment in Phase 1, and broader third-party Level 2 requirements start showing up in Phase 2 (beginning Nov 10, 2026).
“Condition of award” is plain-language scary: if the solicitation includes CMMC and your assessment status is missing, expired, or unsupported, you can get rejected before anyone cares how great your proposal is.
For the official baseline, I keep clients anchored to DoD sources like the DoD CMMC 2.0 resource hub and the DoD CIO CMMC resources page. Then we build evidence that matches what we claim in SPRS, before a contract forces a scramble.
Implemented vs documented vs institutionalized, and the evidence assessors want
I think of readiness like a three-legged stool. If one leg is missing, you wobble.
- Implemented means the control is actually working. Examples: MFA is enforced for admins; BitLocker is enabled on laptops; backups run on schedule.
- Documented means you can explain what you do, and why. Examples: an SSP describes your environment; an access control policy states MFA and least privilege; a patch procedure defines timelines.
- Institutionalized means it happens even when someone is on vacation. Examples: monthly access reviews are on a calendar; patching creates tickets; incidents follow a playbook.
Assessments don’t pass on tools alone. They pass on proof. Common evidence I collect: SSP, policies and procedures, screenshots of MFA and device hardening, endpoint baselines, patch tickets, vulnerability scan reports, backup logs, audit logs, training sign-ins, incident tabletop notes, and vendor agreements.
The CMMC gaps I see most in small businesses, and how I fix them fast
These are the CMMC gaps that show up again and again in Technology Consulting engagements, whether the client is doing Office 365 Migration, running light Data Center Technology on-prem, or pushing a bigger Digital Transformation.
Governance and policies: “we do it” is not the same as “we can prove it”
Why it fails: controls aren’t tied to written expectations, owners, or review cycles.
- Quick wins (0 to 30 days): write short policies (access, patching, backups, IR, acceptable use), assign owners, set annual review dates.
- 30 to 90 days: add simple procedures and checklists, track exceptions, align the SSP to your actual settings.
- Typical controls: policy management, ticketing, management sign-off.
- Evidence: approved policy set, revision history, owner list, meeting notes.
Asset, scope, and CUI boundaries: the fastest way to make CMMC too expensive
Why it fails: if you can’t show where CUI lives, everything becomes “in scope,” and costs explode.
- Quick wins: inventory devices and accounts, map data flows, label CUI, restrict where it can live, tighten MSP/admin access.
- 30 to 90 days: build a right-sized CUI enclave (segmented network or separate tenant where needed), standardize baselines, update SSP scope.
- Typical controls: Secure Cloud Architecture, segmentation, Cloud Management guardrails.
- Evidence: asset list, network diagram, data flow map, CUI handling rules, SSP scope statement.
Access control and MFA: weak admin controls, shared accounts, and risky remote access
Why it fails: shared logins and missing MFA break accountability, and over-permissioned access is easy to exploit.
- Quick wins: unique IDs only, disable stale accounts, enforce MFA for admin, remote access, email, and VPN, reduce file share sprawl.
- 30 to 90 days: role-based access, conditional access, a small-business-friendly privileged access approach, scheduled access reviews.
- Typical controls: identity provider, MFA, Device Hardening standards.
- Evidence: IAM/M365 screenshots, access review records, disable tickets, group exports.
Encryption and key management: protected data, but with unclear settings and ownership
Why it fails: “we think it’s encrypted” doesn’t count, and ad-hoc encryption creates gaps.
- Quick wins: enforce full-disk encryption on endpoints, use secure sharing for CUI, control removable media.
- 30 to 90 days: define key ownership and recovery steps, validate cloud storage encryption, document crypto boundaries in the SSP.
- Typical controls: BitLocker/FileVault, DLP or sharing controls.
- Evidence: encryption policy, device encryption reports, cloud settings screenshots, key recovery records.
Logging, monitoring, and incident response: no alerts, no playbook, no proof
Why it fails: if you can’t show logs and response steps, you can’t prove you’d catch or contain an incident.
- Quick wins: turn on cloud audit logging, keep firewall and endpoint logs, set retention, write a basic IR plan with contacts.
- 30 to 90 days: centralize logs (SIEM-lite), define alerts, run a tabletop, build an incident ticket workflow.
- Typical controls: log retention, alerting, time sync.
- Evidence: log samples, retention settings, IR plan, tabletop notes, incident tickets.
Vulnerability, patching, and backups: the basics that fail because nobody tracks them
Why it fails: teams patch “when they can,” backups are untested, and reporting is missing.
- Quick wins: set a patch cadence, remove local admin, confirm backups run, test one restore, document RPO/RTO targets.
- 30 to 90 days: vulnerability scanning, monthly patch reporting, immutable or offline backups, written DR steps for Infrastructure Optimization.
- Typical controls: patch management, backup monitoring, scans.
- Evidence: patch reports, scan outputs, baseline standards, backup logs, restore test results.
For more patterns I see across contractors, I compare notes with industry write-ups like Top 10 CMMC compliance pitfalls and why small contractors fail CMMC, then I translate them into a plan that fits your budget.
Cloud and vendor reality checks: Office 365, MSPs, and supply chain gaps that trigger findings
Cloud services and MSPs don’t make you compliant by default. They can help, but only if you scope and configure them correctly, then save evidence.
In Office 365 Migration projects, I focus on tenant security basics: admin role limits, conditional access, MFA, secure sharing rules, audit logging, and retention. If CUI is involved, tenant separation or a dedicated enclave might be the cleanest path, depending on the contract and data flow.
Vendor access is another common tripwire. I push for written security expectations, flow-down clauses where needed, and least-privilege MSP access. This is the practical side of Managed IT for Small Business: strong controls, tight scope, and evidence you can hand to an assessor without panic.
Third parties and internal users: training, physical security, and documentation hygiene
- Quick wins: run annual training, keep sign-in or completion logs, lock server closets, start a visitor log for areas with in-scope systems, centralize evidence storage.
- 30 to 90 days: add phishing practice, formalize key control, keep the SSP current, track POA&M items where allowed.
- Evidence: training records, visitor logs, photos of physical controls, SSP updates, POA&M status.
My priority order and a short self-checklist for closing CMMC gaps
When time is tight, I prioritize like this: scope first, then identity and MFA, then Endpoint Security and Device Hardening, then logging and incident response, then backups and restore tests, then policies and training reinforcement. That order keeps fixes from ballooning and supports a clean SPRS story.
Here’s a one-afternoon self-check I use for IT Strategy for SMBs planning:
- Confirm whether you handle FCI only, or CUI too.
- List where CUI can and cannot live (email, SharePoint, endpoints).
- Export all admin accounts and verify MFA is enforced.
- Review stale accounts and disable what’s not needed.
- Verify laptop encryption status with a report, not a guess.
- Pull last 30 days of patch compliance and open gaps as tickets.
- Confirm backups ran, then perform one restore test.
- Turn on audit logging and confirm retention settings.
- Locate your SSP and verify it matches reality.
- Centralize evidence for quick retrieval.
If you need a right-sized plan, I provide Cybersecurity Services, Innovative IT Solutions, and practical roadmaps. I also support environments you might not expect to touch compliance, including Restaurant POS Support and Kitchen Technology Solutions, plus on-prem Data Center Technology when you host systems locally.
Conclusion
Most CMMC gaps I see aren’t exotic. They’re scope confusion, weak identity controls, uneven hardening, missing logs, and thin evidence. When I tighten boundaries, enforce MFA and least privilege, standardize configurations, and prove backups and response steps, assessments get much simpler. Keep your proof aligned with what you attest in SPRS, and don’t wait for a solicitation to force your hand. If you want an assessment-ready plan that fits your budget, I can help with Secure Cloud Architecture, Endpoint Security, and Business Continuity & Security. This is not legal advice, confirm requirements in official DoD and NIST sources.
Discover more from Guide to Technology
Subscribe to get the latest posts sent to your email.
