Ultimate guide to CMMC 2.0 compliance requirements
CMMC 2.0 now applies to all DoD contracts. Are you ready?
The Department of Defense (DoD) developed the Cybersecurity Maturity Model Certification (CMMC) framework to protect the Defense Industrial Base (DIB) from adversarial intelligence collection efforts and corporate proprietary data theft that could compromise U.S. national security. The framework is designed to ensure that defense contractors can meet the cybersecurity requirements built on the National Institute of Standards and Technology (NIST) 800-171 standards.
The DoD issued a final rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to mandate compliance with CMMC 2.0. Since November 10, 2025, CMMC are included as award criteria in new contracts as well as when exercising option years for existing contracts.
Use the following guide to understand the key components of CMMC 2.0 and get answers to frequently asked questions about the CMMC 2.0 compliance requirements.
What is CMMC 2.0?
The CMMC framework was created to protect the availability, confidentiality, and integrity of Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) throughout the DoD’s extensive contractor supply chain. CMMC 2.0 – an advancement of CMMC 1.0 based on input from stakeholders – was released in October 2024. The revised framework streamlines and simplifies the original one with the goal of increasing the accountability and uniformity of cybersecurity procedures for contractors operating within the DIB.
With the introduction of CMMC 2.0, the DoD is pursuing three objectives:
- Guaranteeing that suitable cybersecurity controls and procedures are in place
- Streamlining certification
- Lowering compliance obstacles and costs for smaller organizations
Effective since December 2024 (32 CFR Final Rule), the revised CMMC Program is characterized by a tiered model and its assessment requirements aligned to NIST SP 800-171, a set of cybersecurity requirements published by the National Institute of Standards and Technology, and a phased rollout.
The 4 pillars of the revised CMMC 2.0 framework
Tiered model
Businesses entrusted with FCI and CUI are required to implement the progressive cybersecurity standards mandated by CMMC 2.0. The program also explains the process for mandating information that is flowed down to subcontractors to be protected.
- The new model has been simplified to three maturity levels instead of the previous five.
Assessment requirement
The DoD can confirm the use of precise cybersecurity standards through CMMC evaluations.
- Self-evaluation is sufficient for Level 1, but third-party assessment is required for Level 2, and the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC) assessment is required for Level 3.
Phased implementation
Certain DoD contractors handling FCI and CUI will need to reach a specific CMMC level as a requirement of contract award once CMMC regulations go into effect.
- CMMC 2.0 has a well-defined implementation schedule; the new requirements will be put into effect over a three-year period, utilizing a four-phase implementation plan.
Standard alignment
Unlike the earlier program, CMMC 2.0 fully aligns with the controls set out in NIST SP 800-171 Revision 2.
Loading component...
Loading component...
Loading component...
Loading component...
Time and cost of CMMC 2.0 compliance
Achieving certification should typically take 6 to 18 months. However, costs to achieve this vary depending on scope – i.e., volume of CUI and assets that store CUI, the CMMC Level aimed for, and an organization’s cybersecurity maturity at the start of the process. To enhance readiness and prepare your organization for certification, you can work with a CMMC Registered Provider Organization (RPO), authorized by the Cyber AB, or a C3PAO (which, in this case, cannot also be your certifying entity).
Learn how Infor supports your compliance requirements in a CMMC 2.0-ready environment.