CMMC compliance checklist: 15 key steps
A practical guide for DoD contractors navigating CMMC 2.0 requirements – what to prepare, what to verify, and how to reduce risk before certification becomes mandatory.
As of November 10th, 2025, the Department of Defense’s (DoD) final CMMC 2.0 rule takes effect, beginning a phased three-year rollout of contractual CMMC compliance requirements. If your organization wishes to compete for new DoD work – or maintain existing contracts – you’ll need to be actively preparing for this shift before it’s too late. This handy 15-step CMMC compliance checklist can help you understand what’s required, prepare effectively, and be sure you’re ready when the time comes.
Who needs CMMC 2.0 certification and what’s at stake?
No matter where you are on the Defense Industrial Base (DIB) – from manufacturing components, providing services, or supporting programs indirectly – CMMC 2.0 applies to you. Prime contractors, subcontractors, vendors, and service providers that handle DoD-related government information must meet these requirements to remain eligible for contracts.
CMMC 2.0 has been streamlined to three levels from the original five introduced in 2020. Here’s a top-level look at the requirements for each level:
- Level 1 (Foundational): The Foundational level of CMMC applies to organizations that only handle FCI. While it requires an annual self-assessment, it’s still a formal compliance obligation.
- Level 2 (Advanced): The Advanced level applies to most prime and subcontractors handling CUI. Organizations must implement all 110 security controls from NIST SP 800-171, and a Certified Third-Party Assessment Organization (C3PAO) is usually required.
- Level 3 (Expert): The Expert level applies to top-tier contractors managing CUI for the DoD’s most sensitive mission-critical programs. It includes all the security controls from Level 2 as well as enhanced controls from NIST SP 800-172, and assessments are DoD-led.
While the model is structured, implementation is never exactly simple — especially for organizations balancing legacy environments, active contracts, and phased rollout timelines.
15-step CMMC compliance checklist: quick reference
This 15-step checklist is a quick reference for how most organizations approach this process as they start reviewing their CMMC compliance. Print it out or bookmark it to refer to as you go through the compliance process. You’ll also find a more in-depth explanation of each step below the checklist.
- Understand the CMMC framework, structure, and required maturity levels
The first step is to start developing a foundational understanding of CMMC 2.0, its objectives, and how each maturity level aligns with DoD contract requirements. - Confirm whether your organization handles FCI, CUI, or both
Determine your compliance obligations by identifying the types of information you create, process, store, or transmit. Understand where FCI and CUI exist and how they move through your organization. - Determine which CMMC maturity level applies to your DoD contracts
Review contract clauses, data handling requirements, and solicitation language to confirm your required CMMC level. Your assigned level drives scope, timelines, cost, and assessment requirements. - Assign a dedicated compliance owner or cross-functional project team
At this stage, teams find it essential to designate clear ownership for planning, coordination, and progress tracking. Defined accountability helps prevent gaps, delays, and duplicated efforts. - Define your CMMC scope and build an inventory of in-scope assets
Document your CMMC boundary by mapping systems, users, devices, applications, data flows, and access points. A clear scope ensures you protect exactly what is required. - Assess gaps against required controls and document them in a POA&M
During this step, evaluate your current practices against applicable CMMC controls and record unmet requirements in a Plan of Action and Milestones (POA&M) to show that you are actively working towards compliance. - Develop or update your System Security Plan (SSP)
Document how each required control is implemented and maintained within your defined boundary. The SSP serves as a core reference for assessors and must remain accurate and up to date. - Implement required policies, procedures, and technical safeguards
At this stage of the process, address identified gaps by deploying or updating administrative, technical, and operational controls. This may involve policy development, configuration changes, or adopting new tools. - Train staff on handling FCI/CUI and reinforce security awareness
As you move through this phase, it’s important to ensure all personnel with access to in-scope systems receive appropriate cybersecurity and data-handling training. Maintain records and plan ongoing training to meet evolving compliance needs. - Establish continuous protection and incident response measures
Apply monitoring, patching, MFA, malware protection, and incident response practices across in-scope systems. These safeguards must operate continuously – not only in preparation for assessments. - Conduct internal audits or self-assessments to validate controls
An important next step is to begin to test control implementation, identify weaknesses, and confirm effectiveness. Regular self-assessments reduce risk and help ensure readiness for formal evaluations. - Collect and maintain documentation and evidence
Maintain logs, records, and supporting documentation that show how controls operate, how issues are tracked, and how security events are managed. Evidence should be current, organized, and reviewable. - Schedule and complete a formal assessment if required
For applicable contracts, you may wish to engage a CMMC Third-Party Assessment Organization (C3PAO) to conduct a Level 2 assessment or prepare for a government-led review where required. - Submit required results and affirmations through SPRS
Enter self-assessment results, required affirmations, and certification status in the Supplier Performance Risk System (SPRS) as required for contract eligibility. - Maintain ongoing compliance through continuous review
Finally, regularly update your SSP, retest controls, retrain staff, and refresh documentation. CMMC 2.0 compliance is an ongoing operational responsibility, not a one-time milestone.