Hero Background

Here Comes the CMMC Train – All Aboard!

Kevin Hancock

Think of CMMC as a train that’s on schedule. The best move is to be ready to get on board. For organizations in the Defense Industrial Base (DIB), the choice is simple: climb on board or risk being left holding the bag at the station. 

Why now? On July 22, the Department of Defense (DoD) sent its proposed final language for Title 48 of the Code of Federal Regulations (CFR 48) to the Office of Management and Budget’s (OMB) Office of Information and Regulatory Affairs (OIRA) for review. And that means only a couple of stops remain before the train reaches its final destination and the Cybersecurity Maturity Model Certification (CMMC) becomes official and can start appearing in DoD contract solicitations. 

From DFARS 7012 to CMMC 2.0: How We Got Here 

A bit of historical context helps put the current status into perspective. For nearly a decade, DIB companies that send, receive, store, process, or otherwise handle controlled unclassified information (CUI) have been required to meet the 110 security controls defined in National Institute of Standards and Technology Special Publication 800-171 (NIST SP 800-171). Defense Federal Acquisition Regulation Supplement (DFARS) clause 252.204-7012 (DFARS 7012) codifies that mandate. 

DFARS 7012 allows organizations to self-assess and self-report their compliance with NIST SP 800-171. However, many businesses fell short by: 

  • Not attesting their compliance in the DoD’s Supplier Performance Risk System (SPRS) 
  • Misjudging or incorrectly calculating their compliance score 
  • Failing to complete their Plans of Action and Milestones (POA&Ms) to close security gaps 

These shortcomings created risk for the DIB, triggering huge financial losses1 and elevating threats to national security to unacceptable levels. 

The self-assessment and self-attestation defined in DFARS 7012 did not work as envisioned. In 2019, the DoD changed course and initiated CMMC to better protect CUI and federal contract information (FCI). CMMC brings a critical change: most DIB firms will no longer be able to self-assess and self-report their compliance with NIST SP 800-171. Instead, they will only receive CMMC accreditation after passing an audit conducted by an approved CMMC 3rd Party Assessment Organization (C3PAO). 

In December 2024, the DoD completed the process of formally defining CMMC with the publication of Title 32 of the CFR in the Federal Register. CMMC 2.0 comprises three maturity levels, with nearly all the DIB falling within Level 1 and Level 2.  

  1. CMMC Level 1 encompasses 17 controls from NIST SP 800-171 to protect FCI and allows companies to self-assess and self-attest compliance.
  2. CMMC Level 2 encompasses all 110 controls from NIST SP 800-171 Revision 2 to protect FCI and CUI and requires (with a small percentage of exceptions) organizations to pass a C3PAO audit to become accredited. 
  3. CMMC Level 3 encompasses 110 controls from NIST SP 800-171 plus an additional 24 controls from NIST SP 800-172 to account for advanced persistent threats. The Defense Contract Management Agency’s (DCMA) Defense Industrial Base Cybersecurity Assessment Center (DIBCAC) conducts the assessment for accreditation.

Today, only one significant hurdle remains before CMMC becomes reality: the activation of the DFARS 7021 clause that allows the DoD to include the CMMC mandate in contract solicitations. And that’s precisely what CFR 48 will do. 

CMMC Acronyms You Need to Know and Why They Matter 

 

Acronym Definition Why It’s Important
CMMC Cybersecurity Maturity Model Certification  DoD’s framework to ensure contractors protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) through verified cybersecurity practices. Required for winning future DoD contracts. 
CUI Controlled Unclassified Information  Sensitive government data that is not classified but requires safeguarding. Loss of CUI can lead to financial harm and national security risks. 
FCI Federal Contract Information  Information provided by or generated for the government under a contract, not intended for public release. Protecting FCI is the foundation of CMMC Level 1 compliance. 
DFARS Defense Federal Acquisition Regulation Supplement  DoD-specific acquisition rules. Clauses like 7012 and 7021 define cybersecurity requirements and enforcement mechanisms for defense contractors. 
DFARS 7012 DFARS Clause 252.204-7012  Requires contractors to implement NIST SP 800-171 and report cyber incidents, historically allowing self-assessment. The starting point for today’s CMMC requirements. 
DFARS 7021 DFARS Clause 252.204-7021  Activates CMMC requirements in DoD contracts, making third-party certification mandatory for certain levels. 
NIST SP 800-171  National Institute of Standards and Technology Special Publication 800-171  Defines 110 security controls for protecting CUI in nonfederal systems, the backbone of CMMC Level 2 compliance. 
POA&M Plan of Action and Milestones  A documented plan for addressing cybersecurity gaps. In CMMC, incomplete POA&Ms can delay certification. 
SSP System Security Plan  Detailed documentation describing how an organization implements NIST SP 800-171 controls. A key requirement for passing a C3PAO audit. 
SPRS Supplier Performance Risk System  DoD’s platform for submitting and storing cybersecurity self-assessment scores. Critical for demonstrating compliance readiness under DFARS 7012. 
C3PAO CMMC Third-Party Assessment Organization  Authorized entities that conduct CMMC Level 2 and above audits. Limited availability means scheduling early is essential. 
OIRA Office of Information and Regulatory Affairs  Federal office that reviews and approves new rules like CFR 48 before they are published and enforced. 
CFR Code of Federal Regulations  The codified rules and regulations of federal agencies. Title 32 and Title 48 define and implement CMMC requirements. 

 

What Happens Next? The Final Steps Before CMMC 2.0 Arrives 

With CFR 48 now in the hands of OMB’s OIRA, the timeline for what happens next becomes much clearer. OIRA has up to 90 days to review and approve CFR 48, with the option to request a 30-day extension. Upon OIRA approval, the DoD has 15 days to post CFR 48 to the Federal Register. Publication on the Federal Register triggers a 60-day period for Congress or the President to raise any objections, after which DFARS 7021 becomes active and the CMMC 2.0 rollout begins. 

What does this mean realistically in terms of timing? The CMMC train will likely arrive at its final destination sometime in the fourth quarter of this year, especially in light of Defense Secretary Hegseth’s recent memo explicitly identifying the importance of CMMC to protect DoD assets from foreign access. 

For context, OIRA took close to the full 90 days to review and approve CFR 32, a far more complex rule than CFR 48. If they follow the same track, the DoD uses its full 15 days to post the rule, and Congress and the President remain silent for all 60 days, DFARS 7021 goes live near the end of Q4. If OIRA and the DoD move more quickly and Congress and the President forfeit their rights to object prior to the close of their 60-day window (a distinct possibility given that CFR 48 has been deemed economically insignificant), DFARS 7021 takes effect near the beginning of Q4. 

OIRA, DFARS and DoD process

Why Get CMMC Ready Now? The Numbers Tell the Story 

With CFR 48 now just a few steps from completion, even the strongest skeptics must admit that CMMC compliance requirements will almost certainly start appearing in DoD contract solicitations in the next six months. 

The projected three-year full rollout of CMMC 2.0 for all DoD contract solicitations and renewals might tempt you to wait a little longer to start preparing. 

How Long Will CMMC Prep Really Take? 

Even organizations with strong security processes, procedures, and personnel will need up to six months to assess themselves accurately versus NIST SP 800-171’s 110 controls, address shortcomings, and gather and produce required documentation, including System Security Plans (SSPs). Others may require 12 or perhaps as many as 18 months to do so, depending on the size and scope of their enterprise and their current degree of security maturity.  

Getting ready takes longer than you think, especially when you will be assessed by a C3PAO and want to pass and gain accreditation on the first try (failing adds significant time and cost to an already expensive and lengthy process). 

Don’t underestimate the time to schedule a C3PAO audit. Demand for CMMC Level 2 Certification will be high, with around 70,000 DIB organizations seeking accreditation and fewer than 80 C3PAOs authorized to perform the audits. While that number is steadily growing, scheduling will take time. The good news is that organizations that start early and get on a C3PAO’s calendar now will avoid long waits down the road. By planning ahead, you’ll keep your certification process on track and position your business to compete for contracts as soon as requirements appear. 

  • 6 months – Time even mature organizations need to prepare for an audit 
  • 12–18 months – Prep time for less mature organizations 
  • ~70,000 DIBs vs <80 auditors – Organizations competing for limited C3PAO availability 
  • Failing the first audit adds cost, delays, and could mean lost contracts 

In the meantime, the DoD will start issuing contract solicitations that require CMMC soon. If you don’t have the accreditation, you won’t win or be on the winning team. Period. Can your business risk the potential loss of revenue? 

Accelerate Your CMMC Compliance Journey with Exostar’s CMMC Ready Suite 

CMMC crunch time has arrived. Exostar offers cost-effective resources to help prepare for CMMC accreditation, so you maintain the competitive advantage that keeps DoD revenue opportunities in play. Exostar’s CMMC Ready Suite includes: 

  • Exostar’s Managed Microsoft 365 – A fully-managed enclave for secure and compliant external and internal management and sharing of FCI, CUI, and other sensitive information and intellectual property that meets 85 of the 110 NIST SP 800-171 controls out of the box. 
  • Certification Assistant – A product that helps you understand the NIST SP 800-171 controls, guides and tracks your self-assessment progress, archives important information for C3PAO assessment, creates the SSP and POA&Ms, and accurately computes your assessment score for upload to SPRS. 
  • Exostar PolicyPro – A product that leverages artificial intelligence to create policies defined in NIST SP 800-171 compliantly from scratch or from existing policies by identifying and remediating shortcomings. 

Don’t be distracted by the bright light of the CMMC train. With the transition of CFR 48 from the DoD to OMB’s OIRA, it’s only a matter of time before DFARS 7021 is activated and CMMC 2.0 becomes a contract requirement. The train is approaching its final stop. The question is: will your business be ready to board when it arrives?  

 

1 “Raytheon Companies and Nightwing Group to Pay $8.4M to Resolve False Claims Act Allegations Relating to Non-Compliance with Cybersecurity Requirements in Federal Contracts,” Office of Public Affairs, U.S. Department of Justice.

 

These solutions are available in the CMMC Ready Suite.

One suite for your CMMC compliance.