Loading component...

Ultimate guide to CMMC 2.0 compliance requirements

CMMC 2.0 now applies to all DoD contracts. Are you ready? 

Infor_3D Platform Image_Library_Dark_06.jpg

The Department of Defense (DoD) developed the Cybersecurity Maturity Model Certification (CMMC) framework to protect the Defense Industrial Base (DIB) from adversarial intelligence collection efforts and corporate proprietary data theft that could compromise U.S. national security. The framework is designed to ensure that defense contractors can meet the cybersecurity requirements built on the National Institute of Standards and Technology (NIST) 800-171 standards.

The DoD issued a final rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to mandate compliance with CMMC 2.0. Since November 10, 2025, CMMC are included as award criteria in new contracts as well as when exercising option years for existing contracts.

Use the following guide to understand the key components of CMMC 2.0 and get answers to frequently asked questions about the CMMC 2.0 compliance requirements.

What is CMMC 2.0? 

The CMMC framework was created to protect the availability, confidentiality, and integrity of Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) throughout the DoD’s extensive contractor supply chain. CMMC 2.0 – an advancement of CMMC 1.0 based on input from stakeholders – was released in October 2024. The revised framework streamlines and simplifies the original one with the goal of increasing the accountability and uniformity of cybersecurity procedures for contractors operating within the DIB.

With the introduction of CMMC 2.0, the DoD is pursuing three objectives:

  1. Guaranteeing that suitable cybersecurity controls and procedures are in place
  2. Streamlining certification
  3. Lowering compliance obstacles and costs for smaller organizations

Effective since December 2024 (32 CFR Final Rule), the revised CMMC Program is characterized by a tiered model and its assessment requirements aligned to NIST SP 800-171, a set of cybersecurity requirements published by the National Institute of Standards and Technology, and a phased rollout.

The 4 pillars of the revised CMMC 2.0 framework

Bar, graph, line, analytics, data, Birst, reporting, tracking, chart

Tiered model

Businesses entrusted with FCI and CUI are required to implement the progressive cybersecurity standards mandated by CMMC 2.0. The program also explains the process for mandating information that is flowed down to subcontractors to be protected.

  • The new model has been simplified to three maturity levels instead of the previous five.
Patient, checklist, HCL, check, mark, tick, approve, medical, form, list, testing, qa, report, task list, to do list, checking

Assessment requirement

The DoD can confirm the use of precise cybersecurity standards through CMMC evaluations.

  • Self-evaluation is sufficient for Level 1, but third-party assessment is required for Level 2, and the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC) assessment is required for Level 3.
calendar, time, date, planning, schedule,

Phased implementation

Certain DoD contractors handling FCI and CUI will need to reach a specific CMMC level as a requirement of contract award once CMMC regulations go into effect.

  • CMMC 2.0 has a well-defined implementation schedule; the new requirements will be put into effect over a three-year period, utilizing a four-phase implementation plan.
Checkmark, tick, approve, authorize, yes, complete, finished, select, done, verify

Standard alignment

Unlike the earlier program, CMMC 2.0 fully aligns with the controls set out in NIST SP 800-171 Revision 2.

Loading component...

Loading component...

Loading component...

Loading component...

Time and cost of CMMC 2.0 compliance

Achieving certification should typically take 6 to 18 months. However, costs to achieve this vary depending on scope – i.e., volume of CUI and assets that store CUI, the CMMC Level aimed for, and an organization’s cybersecurity maturity at the start of the process. To enhance readiness and prepare your organization for certification, you can work with a CMMC Registered Provider Organization (RPO), authorized by the Cyber AB, or a C3PAO (which, in this case, cannot also be your certifying entity).

Learn how Infor supports your compliance requirements in a CMMC 2.0-ready environment.

Explore Infor A&D software

Loading component...

Loading component...