Jackie Ramsey February 3, 2026 0

If you’re a small DoD contractor or a subcontractor under a prime, 2026 is not the year to “wait and see.” CMMC is now mandatory (effective Nov 10, 2025), and it’s rolling out in phases, which means the work shows up in contracts before many teams feel “ready.”

I talk to 10 to 200-person shops every week that run on Microsoft 365, a small IT staff, and a lot of hustle. They’re not trying to be careless. They’re trying to ship work, keep margins, and still win bids. That’s exactly why certain CMMC compliance mistakes keep repeating.

In this post, I’ll keep it practical: what breaks, why it breaks in small firms, what it costs you, and the quickest real-world fixes that stand up in an assessment.

Quick CMMC refresher for 2026 (Levels 1 and 2, what’s required, and why it matters)

CMMC is tied to the type of data you handle.

FCI (Federal Contract Information) is basic contract data you need to do the job (think purchase orders, schedules, or shipping details). If you only touch FCI, you’re typically looking at CMMC Level 1, which is an annual self-assessment based on 17 basic practices (aligned to FAR 52.204-21).

CUI (Controlled Unclassified Information) is more sensitive government data that still isn’t classified (think engineering drawings marked CUI, test results, or technical specs). If you handle CUI, you’re typically in CMMC Level 2, mapped to NIST SP 800-171’s 110 requirements.

For Level 2, the assessment type depends on the contract. Some work allows self-assessment, and other work requires a third-party assessment by a C3PAO. The DoD’s official detail is in the CMMC Level 2 Assessment Guide.

Two business realities catch small subs off guard:

  • SPRS reporting: when the clause applies, you post your score and an affirmation in SPRS, and it has to stay current.
  • Primes check subs: even if you’re “just a sub,” primes often validate your SPRS posture before they keep you on a team.

The rollout runs 2025 to 2028 (Phase 1 through Phase 4). Phase 1 is already here (self-assessments). Nov 2026 is a big tipping point because Phase 2 expands where Level 2 third-party assessments start showing up in awards.

Minimalist editorial line art illustration depicting a mid-40s small business owner in casual attire, stressed at a desk with CMMC-stamped papers, laptop error alerts, coffee mug, and subtle CUI folders and 2026 calendar on a clean white background with blue accents.
An AI-created illustration of the pressure many small contractors feel when compliance deadlines collide with day-to-day work.

The top CMMC compliance mistakes small contractors make (grouped by theme)

Scoping and CUI handling mistakes: guessing what’s in scope, and letting CUI sprawl

Why it happens: small teams move fast, and CUI arrives through normal channels (email, Teams, SharePoint) before anyone decides where it “should” live.

Simple example: CUI hits a shared mailbox, gets forwarded to a personal email “just to print,” then ends up in a home laptop cache.

Business impact: you either fail scoping in an assessment, or you scope in far more systems than you can afford to secure. Both can kill a bid.

Fix it with a few concrete moves:

  • Data map first: where CUI enters, where it’s stored, who touches it.
  • Define a boundary: pick an enclave or clearly documented scope boundary you can defend.
  • Limit sharing: lock down external sharing, especially anonymous links and personal email forwarding.
  • Document the scope decision so your SSP and evidence match reality.

Governance and documentation mistakes: weak SSPs, copy-paste policies, and POA&M surprises

Why it happens: people treat the SSP like a template exercise and policies like a binder on a shelf.

Simple example: the policy says “MFA everywhere,” but the legacy VPN still runs on passwords only.

Business impact: assessors don’t grade your intent, they grade what’s implemented. Gaps become expensive rework, and POA&M items can turn into deadline pain.

Here’s what I do instead:

  • Write the SSP from your real tools and network, not from a generic sample (this is where many SSPs fall apart, and this breakdown is described well in common SSP failure patterns).
  • Assign a control owner per control family (even if one person wears three hats).
  • Keep a simple policy and evidence folder with approval dates and training proof.
  • Understand the POA&M clock: many gaps have a 180-day window to close. Miss it, and you can lose eligibility on work that requires full compliance at award.

Technical control mistakes: thinking tools equal compliance

Why it happens: buying a security tool feels like progress, but CMMC cares about configuration, enforcement, and proof.

Simple example: endpoint protection is installed, but half the laptops haven’t checked in for 60 days because they’re unmanaged.

Business impact: failed assessments, higher cyber insurance pain, and frantic “all hands” fixes right when you should be bidding.

Core fixes I prioritize for small shops:

  • Enforce MFA for all users, including admins and remote access.
  • Remove local admin sprawl and use least privilege.
  • Build a real asset inventory (if you don’t know it exists, you can’t secure it).
  • Set a patch cadence with clear timelines.
  • Turn on central logging for key systems.
  • Test backups with an actual restore, not just “backup succeeded.”

If you’re a Microsoft 365 shop, it helps to compare your tenant controls to practical guidance like NIST and CMMC in Microsoft 365, then verify your final approach against your contract scope.

Evidence and audit readiness mistakes: you did the work, but can’t prove it

Why it happens: small teams fix problems in real time, then move on. Nobody snapshots settings, exports logs, or saves tickets.

Simple example: “We do access reviews,” but there’s no dated report, no sign-off, and no record of removals.

Business impact: you burn days recreating evidence, and you risk failing requirements you actually meet.

What works:

  • Build an evidence map that ties each requirement to artifacts.
  • Collect recurring artifacts monthly or quarterly (logs, access lists, training).
  • Save change tickets and approvals, even if it’s lightweight.
  • Run a mock interview so staff can explain “how we do it here” without guessing.

Vendor and cloud mistakes: trusting providers, not managing shared responsibility

Why it happens: MSPs, SaaS tools, and subcontractors blur accountability. Small firms assume the vendor “covers compliance.”

Simple example: a vendor has global admin access, no MFA requirement in writing, and no exit plan when the contract ends.

Business impact: you inherit risk you can’t explain to an assessor, or worse, you inherit a breach.

Fix steps that don’t require a big bureaucracy:

  • Maintain a vendor list (who touches in-scope systems).
  • Run admin access reviews and remove standing access.
  • Add basic contract clauses (MFA, incident notice, data handling, offboarding).
  • Use least-privileged roles and a documented offboarding checklist.

One more cloud note: Microsoft 365 choices like GCC or GCC High can affect where data lives and what controls are available. I don’t treat any tenant as “auto-compliant.” I confirm needs with the prime, the contract, and the assessor, then document the boundary.

Fix-it action plan: a practical 30-60-90 day timeline to get ready for Level 1 now and Level 2 next

30 days: lock scope, stop CUI spread, and stand up your evidence folder

  • Identify contracts and data types (FCI vs CUI).
  • Choose in-scope systems and users, then freeze the boundary.
  • Disable risky sharing and block personal email forwarding where CUI exists.
  • Enforce MFA and start a basic asset list.
  • Draft your SSP outline aligned to NIST SP 800-171 (Level 2) or Level 1 practices.
  • Create an evidence tracker (control, artifact, owner, due date).
  • Complete SPRS steps where required (score plus affirmation), don’t wait for “perfect.”

60-90 days: close gaps, test controls, and run a mock assessment

  • Finalize the SSP and approve core policies.
  • Run access reviews and save the dated output.
  • Validate backups with a restore test and document results.
  • Prove patching with reports, not promises.
  • Centralize logs for key systems and keep samples.
  • Finish training and keep rosters.
  • Build a POA&M for remaining gaps with owners and dates.
  • Budget time for a C3PAO, and don’t wait until the last quarter of 2026.

FAQs small contractors ask before a CMMC assessment

What’s the difference between CUI and FCI, and why does it change my CMMC level?

FCI is contract info needed to do work, like an order, schedule, or invoice detail. CUI is controlled government info, like a CUI-marked drawing or technical data package. Handling CUI usually drives Level 2 obligations because you’re expected to meet NIST SP 800-171.

What evidence do assessors want to see for Level 2?

They usually want: approved policies, screenshots or exported settings, logs, training records, tickets and change records, access lists and reviews, backup restore results, incident records, and vendor agreements.

If I use Microsoft 365, do I need GCC or GCC High for CMMC?

It depends on contract terms, the type of CUI, and how you set your scope boundary and controls. I start by documenting tenant settings, restricting sharing, enforcing MFA and conditional access, setting retention, and confirming where CUI is stored. A checklist like this CMMC compliance checklist guide can help you organize the work, but your assessor and contract needs decide the final path.

Conclusion

Most CMMC failures I see aren’t because a team skipped buying a tool. They happen because scope, proof, and repeatable process weren’t nailed down early. If you do one thing this week, do a scope decision and an evidence map, then protect that boundary like it’s your bid pipeline.

If you want help getting ready without drowning in paperwork, I work with small teams to tighten CMMC scope, harden Office 365, and improve cloud security in a way that holds up when the assessor starts asking for receipts.


Discover more from Guide to Technology

Subscribe to get the latest posts sent to your email.

Category: 

Leave a Reply