Insights · For CEOs

You just heard about CMMC. The conversation before the certification.

A plain-English primer for the CEO who has just been told their business needs to do something about CMMC. What it is, why it's happening, the real penalties for getting it wrong — and the decision you have to make before the certification decision.

220,000Companies in the US Defense Industrial Base affected by CMMC. ~76,000 of these need Level 2 third-party certification specifically.
1%Contractors who feel fully prepared for CMMC assessments, per the 2025 State of the DIB report — down from 8% in 2023.
33,000–44,000Forecast DIB exits by 2027 (15–20% of the 220,000 total) as compliance costs exceed the value of defense work for some contractors.
By Deepak Pal Singh
·
May 13, 2026
·
24 min read
·
Sources 23 cited

Jump to a section

Five takeaways before you read
  1. **CMMC isn't new rules.** The 110 controls behind it (NIST SP 800-171) have been a contractual requirement since 2017 via DFARS 252.204-7012. CMMC is the verification of rules you were already supposed to be following.
  2. **Three penalty layers, in order of immediacy:** contracts (no certification, no new DoD work), legal (False Claims Act exposure with treble damages), personal (the CEO or CFO who signs the annual affirmation has personal criminal exposure under 18 USC § 1001).
  3. **The enforcement is real and recent.** The MORSE Corp $4.6M settlement (March 2025) and the Danielle Hillmer criminal indictment (December 2025) are not the ceiling. They're the floor. The DoJ recovered $52M+ across nine cybersecurity FCA cases in FY2025 alone.
  4. **The stay-or-go decision is the real first decision** — and it's the conversation nobody else will have with you. It depends on six factors, and the maths is different for every business. Some contractors should certify. Some shouldn't.
  5. **Honest paths through this exist.** The article ends with the first three decisions that matter and free resources you can use this week — no email required.

If you’re reading this, someone has probably just told you that your business needs to do something about CMMC. Maybe a prime contractor asked about your status. Maybe a bid came back marked non-responsive. Maybe your IT manager or MSP has been raising it with a slightly panicked tone. Maybe you read a headline about a defense contractor settling False Claims Act cases for millions and thought: could that be us?

What you’re hearing is real, and it matters. The single most important date on your calendar is 10 November 2026. That’s when Phase 2 of the CMMC program begins, and the eight-year honour system that governed defense cybersecurity ends. From that day forward, contracting officers will require independently-verified Level 2 certification by default for any new DoD contract involving Controlled Unclassified Information. Self-attestation will no longer be enough. The DoD estimates more than 76,000 contractors need Level 2 certification. As of February 2026, fewer than 1,100 had completed it.19

That’s roughly seven months from now. A typical readiness journey takes 12 to 14 months from gap analysis to C3PAO certification. C3PAO scheduling lead times are already 6 months and growing, with some hubs already booking into 2027. The arithmetic, if you do it in your head, is uncomfortable. It’s meant to be.

But Phase 2 isn’t the end of the world for any individual contractor — not yet. The phased rollout means existing contracts don’t get canceled overnight; the squeeze comes through option exercises, recompetes, and new awards. The decisions you make in the next 30 days — not the next seven months — are what determine where your business sits when the squeeze starts.

What you’re being told about CMMC is often confused, vendor-tinted, or selling something. This article exists for one reason: to give you a calm, well-sourced, plain-English picture of where CMMC sits, why it exists, what happens if you don’t comply, and the most important question nobody else will ask with you — whether it makes sense to stay in the defense supply chain at all.

We’ve walked this conversation with CEOs and CFOs at companies ranging from 20-person engineering shops to 300-person systems integrators. The pattern is the same. The first 30 minutes are confusion. The next 30 minutes are quiet alarm. Then come the questions that should have been asked first — the ones this article tries to answer.

What CMMC actually is, in plain English.

CMMC is the US Department of Defense’s cybersecurity certification program for any contractor that handles defense information. Three levels, mapped to the sensitivity of the data:

LevelWho it applies toWhat’s requiredWho assesses
Level 1 — FoundationalContractors handling Federal Contract Information (FCI) only — basic contract paperwork, low-sensitivity work product15–17 basic cyber hygiene practices from FAR 52.204-21You. Annual self-assessment in SPRS1
Level 2 — AdvancedContractors handling Controlled Unclassified Information (CUI) — technical drawings, specs, anything sensitive. ~98% of CMMC certifications happen at this level.2110 controls from NIST SP 800-171, scored out of a possible 110 in SPRSA C3PAO — an independent CMMC Third-Party Assessor Organization. Re-assessed every three years.
Level 3 — ExpertContractors on the highest-risk DoD programs — advanced persistent threat targets110 NIST 800-171 controls + 24 enhanced controls from NIST 800-172 (134 total)The DoD itself, via DIBCAC (the Defense Industrial Base Cybersecurity Assessment Center)

The most important thing to take from this section:

CMMC is not a new set of rules. The 110 controls it verifies (NIST SP 800-171) have been a contractual requirement on DoD work since 2017 via DFARS 252.204-7012. CMMC is the verification of rules you were already supposed to be following.

That reframing matters. The defense industry has been operating on an honour system for eight years. Contractors self-attested that they were implementing NIST 800-171. When the DoD eventually started auditing those claims through its assessment arm (DIBCAC), the picture wasn’t pretty — many contractors couldn’t demonstrate the compliance they had claimed.3 CMMC formalises a verification regime that the original DFARS clause assumed would happen voluntarily and didn’t.

Want to look at the actual controls?

We’ve published a free, plain-English reference for all 110 NIST SP 800-171 controls at learn.ancitus.com. Each control includes the assessor question, the evidence required, common implementation patterns, and how the C3PAO will verify it. No login. No email. We built it because the NIST PDF is impenetrable for non-IT readers, and the assessors’ guidance (NIST 800-171A) is even worse.

FCI vs CUI — the only acronyms you need today

You’ll hear these two terms constantly. Here’s what they actually mean:

FCI (Federal Contract Information) is information not for public release, provided by or generated for the government under a contract. Basic contract paperwork, low-sensitivity stuff. If you do any DoD work at all, you almost certainly handle FCI — it’s the broader category. FCI gets Level 1.

CUI (Controlled Unclassified Information) is the narrower, more sensitive category. Engineering drawings, technical specifications, military test data, export-controlled component designs, source selection information. If your contracts include the clause DFARS 252.204-7012, you almost certainly handle CUI. CUI gets Level 2.

All CUI is FCI. Not all FCI is CUI. The vast majority of small and mid-sized defense contractors fall into Level 2.

The quick test

Open any active DoD contract or solicitation. Search for the text 252.204-7012. If you find it, you handle (or are expected to handle) CUI, and you need to plan for CMMC Level 2.

If you only find FAR 52.204-21 and no 7012 reference, you’re likely a Level 1 contractor.

If you genuinely can’t find either, you may be on a contract that doesn’t carry cybersecurity obligations — or you may be looking at the wrong document. Ask your contracts officer.

Want the longer answer? Identifying CUI is harder than it looks — the marking system is unreliable, and most contractors get scope wrong on the first pass. We’ve written a full piece on the four-step CUI discovery process and the five categories that cover ~95% of what defense contractors handle: How to identify CUI: a practical guide for defense contractors.

Three quick checks before you assume you’re out of scope

Three patterns we see repeatedly. If any of them describes your situation, you’re in scope — even if you assumed you weren’t.

1. You’re a subcontractor. The prime is certified. Are you covered? No. CMMC requirements flow down independently. If your prime passes CUI to your business, you must meet the same level the prime’s contract required — you can’t inherit the certification. This is the most common compliance gap we see. Primes are now actively auditing their sub-tiers and dropping subs who can’t show readiness.20

2. You think CMMC is “just an IT problem.” Is it really? Probably not. Any system that processes, stores, or transmits CUI is in scope. That includes your CRM if it ingests email from government contacts. Any AI tool you use to write proposals, if CUI ends up in the prompt. Your file-sharing platform. Every laptop a CUI-handling employee uses. Most CEOs assume “scope” means “our IT infrastructure” — in reality, scope is wherever the data goes. Decisions you make here will drive your costs for the next 12 months.21

3. You sell commercial off-the-shelf products. Does that exempt you? Mostly no. Contracts exclusively for COTS items are exempt, and contracts below the micro-purchase threshold are exempt. But there’s no general exemption for FAR Part 12 commercial product or service contracts. If your commercial-item contract involves FCI or CUI, CMMC still applies.22

Why the government is doing this now.

If a regulation feels arbitrary, the rest of the conversation gets harder. So it’s worth a paragraph on the why, because it’s not actually arbitrary.

Three things drove this:

First, the honour system didn’t work. Between 2017 and 2020, contractors self-attested NIST 800-171 compliance. When DIBCAC started auditing, they found scores being reported at +100 with actual scores in the negative.3 The DoD’s own Inspector General confirmed in DODIG-2023-078 that compliance verification was systematically absent.4

Second, the cyber attacks on the supply chain are real and constant. The largest US defense systems have been routinely targeted by nation-state actors — principally Chinese state-affiliated groups — through the smallest, least-secure links in their supply chains. The 2020 SolarWinds breach, the breaches of multiple US Navy submarine contractors, the 2024 incidents involving cleared contractors and stolen weapons systems data — each was made possible by the security posture of the contractor, not the prime.

Third, the Department of Justice operationalised enforcement. In October 2021, then-Deputy Attorney General Lisa Monaco launched the Civil Cyber-Fraud Initiative, explicitly tying the False Claims Act — a 1863 Civil War statute — to cybersecurity misrepresentations.5 If you certify compliance to win a contract and the certification is materially false, that’s a false claim. Treble damages, per-claim penalties, individual liability.

By FY2025, the Initiative had matured. The DoJ recovered over $52 million across nine cybersecurity False Claims Act settlements in that fiscal year, more than triple the prior year.6 The cases section below walks through five of the most consequential.

What happens if you don’t comply.

This is the section where most CEOs sit up. We’ll handle it in three layers, in order of how immediately you’ll feel each one.

Layer 1 — The contract layer (immediate)

This is the simplest layer to understand. If you don’t have the right CMMC level, you cannot bid on DoD contracts that require it. Existing contracts at recompete or option exercise are out too. There’s no grace period after the relevant phase boundary.

Phase 1 began on 10 November 2025. Self-assessments at Levels 1 and 2 are now appearing in solicitations.7 Phase 2 begins on 10 November 2026, when most Level 2 contracts will require C3PAO certification, not self-attestation. By Phase 4 (10 November 2028), CMMC requirements will be in every applicable DoD contract.

The primes aren’t waiting for the phase boundaries. Lockheed Martin, Boeing, Raytheon, and Northrop Grumman are already auditing their sub-tiers and asking for documented SPRS scores. Some are color-coding suppliers green, amber, red. Some are restricting CUI flow-down to non-certified subs. The contract pressure is here, not coming.

The question every CEO asks: "Will my existing contract be canceled?"

Generally, no. Phase 2 is not retroactive to contracts already awarded. Your existing contract continues. What changes are option exercises, recompetes, task orders under existing IDCs, and any new contracts after 10 November 2026 — those will require the appropriate CMMC certification status. The practical effect is that your business pipeline starts shutting off, not that an existing contract is yanked.

For most contractors, the option exercise is the squeeze point. A three-year contract awarded in 2024 with annual option years comes up for option exercise in 2027 and 2028 — both inside the Phase 2 and Phase 3 windows. If you’re not certified by then, the option isn’t exercised, and the contract effectively ends.

And the assessor capacity isn’t there. There are around 100 fully-authorised C3PAOs serving an estimated 76,000+ Level 2 contractors, with roughly 750 certified CMMC assessors across the whole ecosystem.19 Even if every authorised assessor worked nonstop, the pipeline cannot absorb the demand about to hit it. Aerospace and defense hubs — Maryland, Northern Virginia, Southern California, Massachusetts — are already booking into late 2026 and 2027. If you wait until your contract forces you to certify, the certification capacity will not be there.

This is the layer most CEOs hadn’t considered before. The False Claims Act is the federal government’s primary anti-fraud statute. Under 31 USC § 3729, knowingly making a false claim — or being recklessly indifferent to whether a claim is true — carries:

  • Civil penalties of $14,308–$28,619 per false claim (figures as adjusted for inflation by the DoJ in July 2025)8
  • Treble damages — three times the actual damages to the government
  • Plus the relator’s (whistleblower’s) attorney fees and costs

The mechanism: every invoice you submit on a contract that requires CMMC compliance is — legally — a “claim.” If the underlying compliance is false, every one of those invoices is potentially a false claim.

And the whistleblower mechanic matters. The False Claims Act’s qui tam provisions allow private individuals to file suits on the government’s behalf and receive 15–30% of the recovery. In the MORSE Corp case below, the whistleblower received $851,000.9 Most of the cybersecurity cases the DoJ has settled started with a former employee.

Here are the five enforcement cases that most define the current landscape:

March
2025
$4.6 million
MORSE Corp — the precedent case for SPRS fraud

A Cambridge, Massachusetts defense contractor settled with the DoJ over False Claims Act allegations spanning January 2018 to February 2023. MORSE submitted a SPRS score of 104 out of 110 in January 2021 — near-perfect compliance. In July 2022, a third-party gap analysis revealed the actual score was negative 142. MORSE did not correct the score until June 2023, three months after the DoJ served a subpoena. The case was brought by a qui tam relator (MORSE's own head of security) who received $851,000 of the settlement.9

The pattern: the case turned on the gap between what was claimed and what was real. Not on a breach. There was no allegation that any CUI was stolen.

SPRS misrepresentation
February
2025
$11.25 million
Health Net Federal Services — falsely certified compliance for TRICARE

A managed care provider administering health benefits for military servicemembers settled with the DoJ over alleged false cybersecurity compliance certifications on a TRICARE contract from 2015–2018. The allegations centred on certifications made to obtain and maintain the contract, not on a specific breach.10

Health Net
August
2024
$875,000
Georgia Institute of Technology — false SPRS, missing antimalware

A major university research institution settled to resolve allegations that it submitted a false SPRS score and failed to install anti-malware tools on systems handling CUI in a research lab. The case is notable because it shows the FCA reaching research institutions that don't think of themselves as defense contractors.11

University research
July
2022
$9 million
Aerojet Rocketdyne — the foundational FCA cyber settlement

The first major FCA settlement under the Civil Cyber-Fraud Initiative. Aerojet settled allegations that it misrepresented its compliance with cybersecurity requirements in DoD and NASA contracts. The case established the legal theory that cybersecurity certifications are material to government payment decisions.12

Aerojet
Q4
2025
40% revenue lost
Maryland subcontractor — the more common reality

A defense subcontractor with $5 million in annual DoD revenue delayed CMMC compliance, believing the deadline was further away than it was. When the prime contractor flowed down CMMC Level 2 requirements in Q4 2025 with 90 days' notice to comply or be removed from the contract, the subcontractor couldn't get there in time. They lost the contract. That contract represented 40% of the company's revenue.23

Why this matters more than FCA cases: the FCA settlements are dramatic, but contract loss is what will hit most contractors first. The primes don't wait for Phase 2. They're already dropping non-compliant subs. This subcontractor never got investigated, never got sued, never got indicted. They just lost the work.

Contract loss
December
2025
Criminal indictment
United States v. Danielle Hillmer — the first individual indictment

A federal grand jury in DC indicted Hillmer, 53, a former senior manager at Accenture Federal Services13, on two counts of wire fraud, one count of major government fraud, and two counts of obstructing federal audits. The indictment alleges Hillmer misrepresented FedRAMP High and DoD Impact Level 4/5 compliance on a cloud platform used by the US Army, Department of State, Department of Veterans Affairs, and at least three other agencies between March 2020 and November 2021. Contracts involved were valued at more than $250 million. The indictment quotes a July 2021 internal chat: an employee writes "we've dodged the [multi-factor authentication] implementation bullet for now, but it could come up again… We aren't out of the woods yet", and Hillmer responds with a fingers-crossed emoji.14

Maximum penalties if convicted: 20 years for each wire fraud count, 10 years for major government fraud, 5 years for each obstruction count.

Why this case matters: the conduct described is exactly the kind of "we'll fix it later" decision a manager under pressure to win contracts might make. The DoJ chose to prosecute her personally, not just the company.

Worth noting: Hillmer is technically a FedRAMP case, not a CMMC case. But the legal theory is identical — misrepresenting cybersecurity compliance to win federal contracts — and the same DoJ Civil Cyber-Fraud Initiative pursues both. If you sign a CMMC affirmation knowing your controls aren't where you've claimed, you're sitting in exactly the same statute the DoJ used against Hillmer.

Personal liability

Layer 3 — The personal layer (the Affirming Official)

Under 32 CFR § 170.22, an “Affirming Official” must submit an annual affirmation in SPRS that the organization has implemented and continues to maintain all applicable CMMC security requirements. At small and mid-sized contractors, that’s almost always the CEO or CFO.15

If that affirmation turns out to be wrong, exposure isn’t limited to the company. Under 18 USC § 1001, materially false statements to the federal government carry up to five years in prison for the individual making them. Under 31 USC § 3729, the company faces the FCA exposure. The two run in parallel.

The Hillmer indictment is the first time the DoJ has used these statutes against an individual on cybersecurity compliance grounds. It will not be the last. Industry analysts now expect personal indictments to become routine through 2026.16

Worth knowing about D&O insurance

Within 60 days of the first major False Claims Act indictment against an officer, D&O insurers began excluding CMMC affirmation liability from standard policies and adding new endorsements that require evidence of an actual C3PAO assessment before an officer signs an affirmation.16 If you’re relying on D&O cover, talk to your broker.

The decision before the decision.

Here’s where most articles in this space lose their nerve. They tell you what CMMC is, list the penalties, and move straight to here’s how to comply. That’s a vendor pitch. The actual first decision is whether your business should stay in the defense supply chain at all.

For some contractors, the answer is unambiguously yes. For others, it isn’t. The maths is genuinely different depending on six factors:

  1. What percentage of your revenue is DoD work?
  2. What’s the margin on that work, and how much room does it have to absorb compliance overhead?
  3. How quickly can your civilian / non-defense market grow if you redirect?
  4. Where is your current cybersecurity posture relative to NIST 800-171? Closer to the standard = cheaper journey. The Readiness Assessor gives you a rough first read in five minutes; a proper Gap Assessment gives you a defensible number scored against all 110 controls.
  5. What’s your time horizon as the owner? Looking to exit in 24 months changes the calculus.
  6. What capability do you offer that the DoD specifically needs? A niche capability is harder for the DoD to lose; you have more leverage.
Before you write off the maths

The cost picture isn’t as binary as it looks. FAR Part 31 allowable cost recovery, state grants (Connecticut CAP, Maryland, Michigan, Texas), and MEP/PTAC subsidised advisory all do real work for contractors who find them. For the full economic picture — the math by tier, what’s recoverable, where grants help — see Who actually pays for CMMC? The math by tier.

Tool

Take the 5-minute CMMC Readiness Assessor.

Six questions about your current contracts, cybersecurity posture, and DoD revenue share. Output: which tier you’re closest to, plus the three first decisions that matter. No email required. Genuinely free.

Take the assessment →

We’ve grouped the contractors we’ve spoken with into three positions. Yours probably resembles one of them.

Tier 1 Stay and certify early

"Defense is the core of our business and we have time to do this right."

You have 40%+ DoD revenue, healthy margins, owner time-horizon of 5+ years, and a meaningful capability in defense work. The maths overwhelmingly favours certifying and certifying early — ideally during 2026 while assessor capacity exists.

  • DoD revenue40%+
  • Time horizon5+ years
  • Compliance / 12mo profit< 1.5x
  • DecisionCertify Phase 1 / early Phase 2
Tier 2 Compress the decision

"We need to look at this carefully. The maths is uncomfortable."

You have 15–40% DoD revenue, thinner margins, and your civilian markets are growing. Compliance cost will likely exceed 12–18 months of DoD profit. Some Tier 2 contractors should certify. Others should plan a managed wind-down of DoD work. The decision is binary and time-sensitive.

  • DoD revenue15–40%
  • Time horizon2–5 years
  • Compliance / 12mo profit1.5–3x
  • DecisionHonest financial modeling needed
Tier 3 Exit may be rational

"This will cost more than the work is worth."

You have under 15% DoD revenue, thin or no margin on it, owner is exit-planning or retirement-adjacent, and your civilian markets are healthy. The honest answer is often that the cost of compliance ($75K–$300K plus 12–18 months of attention) exceeds the lifetime value of remaining DoD work. Stopping DoD work is a legitimate strategy.

  • DoD revenue< 15%
  • Time horizon< 2 years
  • Compliance / 12mo profit> 3x
  • DecisionPlan a wind-down or pivot

The strategic insight worth holding onto: the contractors who exit can’t easily come back. Once you’ve let your DoD relationships go and stopped bidding, re-entry in 2028 will be effectively impossible — certification still required, but now competing against fully-certified incumbents who’ve had two years of less competition.

And on the other side: the 15–20% of the DIB that does exit is concentrated in Tiers 2 and 3. The contractors who stay will be bidding against a smaller pool. That’s not a marketing claim — it’s the direct consequence of the StrikeGraph attrition forecast and PreVeil’s $116K median first-year cost figure colliding with thin-margin sub-tier business.17

What’s actually in it for you.

If you decide to stay and certify, the upside is more than just “you keep your DoD revenue.” Four things worth knowing:

A competitive moat. If 33,000–44,000 contractors exit the DIB through 2027 (roughly 15–20% of the 220,000 total), certified firms will be bidding against a meaningfully smaller pool. Early certifiers win disproportionately in 2026–2027 because the supply of qualified bidders is shrinking faster than the demand. That moat narrows again by Phase 4 (late 2028) as more contractors complete certification, so the window matters.

An acquisition premium. Investment banks and private equity buyers active in the DIB now treat CMMC certification as table stakes for acquisition targets. Acquirers don’t want to inherit compliance debt or FCA exposure. Certified contractors trade at meaningfully higher multiples than non-certified peers, and the premium should widen through 2027.

Commercial cross-over. CMMC Level 2 implementation gets you roughly 80% of the way to ISO 27001 or SOC 2 Type II — the credentials that unlock larger enterprise commercial customers (Fortune 500 buyers, regulated industries, financial services).18 If you’re trying to diversify away from defense dependency, the controls you build for CMMC pay for themselves a second time on the commercial side.

Genuine security. The 110 controls aren’t bureaucratic theatre. They’re the practical floor on what protects a small business from ransomware, business email compromise, IP theft, and the kind of nation-state-led attacks that targeted the DIB in the first place. Most of our clients tell us, after the fact, that the controls would have been worth implementing even without the DoD context.

Where you are vs where you need to be.

The CMMC program has a phased rollout. Knowing exactly where the calendar is today helps frame how much time you actually have.

CMMC implementation phases
10 November 2025

Phase 1 began — self-assessments now in solicitations

Contracting officers began including Level 1 and Level 2 self-assessment requirements in new DoD solicitations. SPRS scores are being checked at bid evaluation. Some contracts are already requiring C3PAO Level 2 at award where the DoD designates it.

May 2026 — today

Inside Phase 1 you are here

~80,000 contractors need Level 2 certification. Fewer than 1,100 have completed it.19 C3PAO assessment lead times are now 6+ months and growing. The bottleneck is real.

10 November 2026

Phase 2 begins — the honour system ends

Mandatory C3PAO certification for most Level 2 contracts. Self-attestation no longer sufficient. A typical readiness journey is 12–14 months — meaning a contractor starting in May 2026 with no current posture is realistically looking at certification in mid-to-late 2027.

10 November 2027

Phase 3 begins — Level 3 requirements added

DIBCAC-assessed Level 3 introduced for the highest-risk programs. Level 2 C3PAO certification now extended to option exercises on existing contracts — meaning contract renewals start to require it too.

10 November 2028

Phase 4 — full enforcement

CMMC requirements appear in all applicable DoD contracts and option periods. No grandfathering. Every contractor in scope must be certified at the appropriate level or be excluded from awards.

The maths most CEOs need to do is simple. Count backwards from when your next major DoD contract goes to bid, or your next option exercise comes due. Subtract 12–14 months of preparation. Subtract another 6 to 12 months for C3PAO assessment lead time. That gives you the latest possible date to start. For most contractors looking at 2027 bids, that date was last year.

If you’re staring at the calendar thinking we can’t possibly hit this, you’re not wrong. 1% of contractors feel fully prepared.19 You’re in the 99%. The first job is to know honestly where you stand, then work backwards from a realistic target date.

The first three decisions that matter.

If you do nothing else this week, do these three things in order. Each takes a few hours. Together they get you from “we just heard about CMMC” to “we have a defensible plan.”

This week

Three decisions, in order.

If you'd rather have all three handled structured and on a deadline, our 4–6 week fixed-fee Gap Assessment covers the full set. Or use the free tool linked in each step below to do it yourself.

  1. Identify which CMMC level you actually need. Pull every active DoD contract and active solicitation you're bidding on. Search each one for the text DFARS 252.204-7012 or 252.204-7021 or the term "Controlled Unclassified Information". The contracts that contain those determine your level. Don't take an MSP's word for it. The contract is the authoritative document. If you find 7012 anywhere, you handle (or are expected to handle) CUI — plan for Level 2. Free tool How to identify CUI — our four-step practical guide to finding CUI in your business, plus the five categories that cover ~95% of what defense contractors handle.
  2. Get an honest gap assessment — not a self-quiz. Self-assessments are systematically optimistic. The MORSE Corp case turned on a self-reported score of 104 with an actual score of -142. A real gap assessment gives you a defensible starting score plus a remediation roadmap. The firm that does your gap assessment cannot also assess you for certification — that's a Cyber AB ethics rule, and it protects you. Your gap assessor will give you honest answers. Free tool learn.ancitus.com — plain-English reference for all 110 NIST 800-171 controls, with assessor questions and evidence checklists. Free, no login. Takes weeks of focused effort but you can self-assess against the same questions a C3PAO will ask.
  3. Do not sign anything you don't understand. If a prime sends you a flow-down agreement requiring CMMC compliance, do not sign without understanding what you're committing to. If an MSP offers "instant compliance" or "we handle 200 controls for you", be sceptical — particularly if the contract doesn't include a written Customer Responsibility Matrix (the document that says exactly which controls they own and which you own). The wrong vendor commitment, signed early, costs more than the right one signed three months later. The Affirming Official signature is the one to watch most carefully. You sign that, not your IT manager and not your MSP. Free tool Shared Responsibility Matrix — print this before every vendor conversation. It maps which of the 110 controls are owned by you, your cloud provider (AWS GovCloud / Azure Gov / GCC High), and your MSP. The MSP can't claim coverage of controls they don't actually handle if you have this in front of you.
If you want help with all three

A structured Gap Assessment covers all of this.

Four to six weeks. Fixed fee. Contract review and level determination, full CUI scoping, an honest SPRS score against all 110 controls, and a prioritized remediation roadmap. Independent of any implementation work — so the findings stay honest.

Book a Gap Assessment →

If you’ve done these three things, you’re already ahead of the median DIB contractor. From here, the path forward depends on which tier you’re in — and that’s the conversation we’re built to have.

Free resources to start with.

You don’t need to pay anyone to get started. The resources below are ungated — no email required — and combined, they give you about a working day’s worth of useful self-education before you bring in anyone external.

Use these this week

Resources, ungated and free.

A mix of official DoD sources, Cyber AB references, and free tools we've built for the DIB. None of these require email or payment.

Official DoD

DoD Mandatory CUI Training (IF141)

Free 60-minute self-paced course from the Center for Development of Security Excellence. The single best layperson primer on CUI. Take it before you do anything else.

cdse.edu
Official source

The National CUI Registry

National Archives maintains the authoritative list of every CUI category and the laws behind them. If someone tells you data is CUI, this is where you verify.

archives.gov/cui
Cyber AB

CMMC Marketplace

Searchable directory of authorised RPOs (advisory), C3PAOs (assessment), RPs, CCPs, CCAs. If someone claims a CMMC credential, verify it here.

cyberab.org/Marketplace
NIST

NIST SP 800-171 (the 110 controls)

The actual standard CMMC Level 2 verifies. PDF is free. Chapter 3 is the 110 controls themselves, written in plain bureaucratic English.

csrc.nist.gov
Ancitus

5-minute Readiness Assessor

Six questions. Output: your tier, current realistic timeline, and the three first decisions specific to your situation. No email required.

ancitus.com/readiness-assessor
Ancitus

Shared Responsibility Matrix tool

Free tool mapping which of the 110 controls are owned by you, your cloud provider (AWS GovCloud / Azure Gov / GCC High), and your MSP. Print and use in vendor conversations.

ancitus.com/shared-responsibility

What we’d do if we were you.

If you’ve read this far, you’re in the first 5% of CEOs who actually engage with this material. Most stop at the first jargon-heavy article they encounter and put the question off. Don’t be that CEO — not because we want your business, but because the people who let this drift are the ones who run out of runway in 2027 and discover their options have narrowed considerably.

Here’s the six-step path we’d walk if we were sitting across the table from you. Each step has a clear next action, and each maps to a specific stage of the implementation journey we’ll cover in the rest of this series.

Step 1 — Take 5 minutes today to know where you stand.

The Readiness Assessor asks six questions about your contracts, your current cybersecurity posture, and your DoD revenue share. You get back which tier you’re closest to and an honest first read on your timeline. Free, no email required. Do this before reading anything else.

Step 2 — Have the stay-or-go conversation with your CFO this week.

Work through the six factors in the stay-or-go section above. Model the maths properly. If you can’t do that in one afternoon, bring in someone who can — a fractional CFO who knows government contracting, or a CMMC-aware advisor who can run a costed scenario analysis. Don’t skip this step. The contractors who run out of runway in 2027 are the ones who never had this conversation. For the funding side of the maths, see our piece on who actually pays for CMMC.

Step 3 — If you’re staying, commission a proper gap assessment.

Self-quizzes are systematically optimistic. A real gap assessment by an independent RPO gives you a defensible starting SPRS score, a remediation roadmap with realistic timelines, and the leverage you need in vendor conversations. Without one, you’re shopping blind. Our Gap Assessment runs 4–6 weeks, fixed fee, and is independent of any implementation work — so the findings stay honest.

Step 4 — Make the partner decision before you commit to implementation.

The MSP question is the single most expensive decision after stay-or-go. Three viable models exist, and the one that fits depends on whether your current MSP has the credentials and the experience — or doesn’t. Don’t sign a long-term MSP CMMC contract before reading our next article in this series, “The 8 stages of CMMC compliance — and the MSP decision that will cost you the most if you get it wrong” (publishing in two weeks). When you’ve decided on the model, our CMMC Implementation service is principal-led, fixed-fee, and works inside your tenant alongside your existing MSP — or replaces them, if that’s the right call.

Step 5 — Plan for continuous compliance from day one.

CMMC Level 2 isn’t “certify once every three years.” It’s a triennial assessment with an annual affirmation, 180-day POA&M closeout windows, and continuous evidence collection in between. Every degraded control between assessments becomes potential FCA exposure for the next annual signature. The contractors who treat this as a one-time project regret it at re-assessment. Our Continuous Compliance service handles the annual affirmation prep, evidence collection, POA&M maintenance, and triennial re-assessment as an ongoing program rather than a fire drill.

Step 6 — Use the resources above before you talk to anyone selling you anything.

The free resources section above gives you about a working day of useful self-education. Take the DoD CUI training. Look up your CUI categories on the National Registry. Verify any vendor’s credentials on the Cyber AB Marketplace. The contractors who do this homework have better conversations with vendors and pay less for better work. The ones who skip it end up paying more for worse work, and finding out at the C3PAO assessment.

So which path is right for you? You're probably in one of three positions. Pick the one that fits and act this week.

Path 1

Do it yourself.

"We have the time and bandwidth to handle this in-house."

Best fit if you have an experienced IT lead, 12–18 months of runway, and DoD work that justifies the internal effort. Your path:

Start with the Readiness Assessor
Path 2

Get a Gap Assessment.

"We need a defensible starting score before we commit to vendors."

Best fit if you're certain you're Level 2, you don't want to shop blind for an MSP, and you want a structured remediation roadmap. Our Gap Assessment delivers:

  • 4–6 weeks, fixed fee
  • Full CUI scoping & SSP draft
  • Honest SPRS score against all 110 controls
  • Prioritized remediation roadmap
Book a Gap Assessment
Path 3

Talk to us first.

"We're not sure which path is right. Or whether we should be doing this at all."

A 30-minute call. No pitch. We'll look at your contracts, talk through your tier, and tell you honestly whether we think we're the right firm for you. Sometimes the answer is no — either way you walk away with a clearer head than you walked in with.

  • Principal-led (no junior handover)
  • Senior-only delivery
  • Cyber AB Registered Practitioner · RPA in progress
Book a 30-min call

This is article 1 of a planned series for CEOs and non-IT leaders in the defense supply chain. The next pieces cover the 8 stages of compliance (and the MSP trap), how to scope your environment and decide between an enclave vs whole-company architecture, and what continuous compliance actually looks like in year two and beyond. See all our insights →

Next step

If you're staring at CMMC and not sure where to start.

Thirty minutes. No pitch. We'll look at your contracts, talk through your tier, and tell you honestly whether we think we're the right firm for you. Sometimes the answer is no — either way you walk away with a clearer head than you walked in with.

Book a 30-min call → Replies within one business day · Direct to Deepak
Sources

Citations and references.

  1. 32 CFR Part 170 — the CMMC Program Rule, codifying Levels 1–3 and the affirmation regime. ecfr.gov. Effective date 16 December 2024; phased implementation through DFARS 252.204-7021.
  2. IBSS Corp, CMMC Certification Cost in 2026: "Level 2 certification accounts for approximately 98% of defense contractor certifications in 2026." ibsscorp.com.
  3. DIBCAC findings reported across multiple industry sources, most clearly synthesised in StrikeGraph, 5 Reasons Not to Wait to Get Compliant with CMMC, citing DoD audit findings that approximately 70% of contractors claiming compliance failed when actually assessed. strikegraph.com.
  4. DoD Office of Inspector General, Audit of the DoD Implementation of Controlled Unclassified Information, Report No. DODIG-2023-078, June 2023. The IG documented systematic gaps in CUI marking, contractor self-assessment, and DoD oversight. A subsequent January 2026 management advisory reconfirmed the issue.
  5. DoJ press release, Deputy Attorney General Lisa O. Monaco Announces New Civil Cyber-Fraud Initiative, 6 October 2021. justice.gov.
  6. DoJ, Fact Sheet: False Claims Act Settlements and Judgments FY2025, 12 January 2026, page 5. $52M+ recovered across nine cybersecurity FCA settlements. Synthesised in O'Melveny analysis, February 2026. omm.com.
  7. DFARS 252.204-7021, Contractor Compliance with the Cybersecurity Maturity Model Certification Level Requirement, effective 10 November 2025. Codified at 48 CFR Subpart 204.73 (and reorganised to 48 CFR Part 240 by the February 2026 class deviation).
  8. HMTG Qui Tam Law, What is the False Claims Act? 2026 Guide: "Civil penalties of $14,308 to $28,619 per false claim (as of 3 July 2025, adjusted annually for inflation)." fcalawfirm.com.
  9. Skadden, Arps, Slate, Meagher & Flom LLP, Government Contractor Settles FCA Case Over Cybersecurity Maturity Model Certification Violations, April 2025. skadden.com. Original DoJ press release and GSA OIG announcement at gsaig.gov. Whistleblower share: Alston & Bird, alstonprivacy.com.
  10. Holland & Knight, CMMC Affirmation Trap: FCA Exposure for Defense Contractors and Acquirers, 23 January 2026. hklaw.com. The TRICARE settlement involved an $11.25 million payment.
  11. DoJ settlement, Georgia Institute of Technology, September 2025. Synthesised in Holland & Knight analysis cited at footnote 10.
  12. United States ex rel. Markus v. Aerojet Rocketdyne Holdings Inc., DoJ settlement July 2022. Foundational case under the Civil Cyber-Fraud Initiative.
  13. FedScoop, DOJ says government contractor misled agencies about platform's FedRAMP compliance, 10 December 2025: "Hillmer's LinkedIn shows that during the time in question, she worked for Accenture Federal Services." fedscoop.com. Foley & Lardner confirms employer at foley.com.
  14. DoJ Office of Public Affairs press release, 10 December 2025: Senior Manager for Government Contractor Charged in Cybersecurity Fraud Scheme. justice.gov. Federal News Network, FedRAMP at the center of DoJ's latest cyber fraud allegations, 12 December 2025, for contract value figure (>$250 million across six agencies) and the fingers-crossed emoji detail. federalnewsnetwork.com.
  15. 32 CFR § 170.22 (Affirmation requirements). The affirmation must be made by a "senior official" of the organization, defined as someone with the authority to commit the organization to the affirmation. At small and mid-sized contractors this is the CEO or CFO; at larger contractors it may be the CISO or designated Affirming Official.
  16. StrikeGraph, Five Predictions on CMMC's Impact to the Defense Industrial Base in 2026, December 2025: discussion of D&O insurance exclusions following first major FCA indictment. strikegraph.com.
  17. CyberSheath / Merrill Research, State of the Defense Industrial Base on CMMC Compliance 2025, October 2025, plus StrikeGraph attrition forecast cited above, plus PreVeil 2,000+ contractor survey on cost. cybersheath.com; preveil.com.
  18. Accorian, CMMC in 2026 How Small and Mid-Sized Defense Contractors Are Being Reshaped, 15 January 2026: "Many firms find that CMMC compliance places them 80% of the way toward ISO 27001 or SOC 2, unlocking commercial and international opportunities." accorian.com.
  19. Greypike, CMMC Phase 2 Requirements 2026, April 2026: "The DoD estimates more than 76,000 organizations need Level 2 C3PAO certification. As of February 2026, fewer than 1,100 had completed it." Combined with CyberSheath / Merrill Research 1% preparedness finding. greypike.com. Elevate Consult, CMMC 2.0 Certification: DoD Contractor Guide for 2026, March 2026, for the 600-assessors / 350,000+-contractors visual: elevateconsult.com.
  20. CyberSheath analysis (Feb 2026) and Accorian (Jan 2026): the most common compliance gap is subcontractors assuming the prime's certification covers them. It doesn't. CMMC flow-down is independent. HD Tech, What Is CMMC Compliance? Defense Contractor Guide 2026: "If a prime contractor passes CUI to a subcontractor, that subcontractor must meet the same CMMC level required by the prime's contract. This is one of the most common compliance gaps." hdtech.com.
  21. Cabrillo Club, CMMC 2.0 Guide: Requirements, Cost & 90-Day Timeline (2026): "Your CRM and AI tools are probably in scope. Any system that stores, processes, or transmits CUI falls inside your assessment boundary. That includes your CRM if it ingests emails from government contacts, and any cloud AI tool you use for proposal writing." cabrilloclub.com.
  22. Coalition for Government Procurement, What Federal Contractors Need to Know About CMMC: "CMMC requirements will be incorporated into DoD contracts above the micro-purchase threshold (MPT) where the contractor provides information systems that 'process, store, or transmit' FCI or CUI. Contracts exclusively for commercially available off-the-shelf (COTS) items are exempt from CMMC requirements. There is no exception for FAR Part 12 commercial product or commercial service contracts." thecgp.org.
  23. CISPOINT, CMMC 2.0 Complete Guide for Defense Contractors 2026, January 2026: "A Maryland-based defense subcontractor with $5M in annual DoD revenue delayed CMMC compliance, believing they had more time. When their prime contractor flowed down CMMC Level 2 requirements in Q4 2025, they had only 90 days to comply or lose the contract. Unable to achieve compliance in time, they lost the contract, which represented 40% of their revenue." cispoint.com.
Continue reading

Related articles.

April 15, 2026·14 min readEnclaves

How CMMC enclaves cut your assessment scope by 60–70% — and where they fail.

Most defense contractors making this decision get it wrong, and pay $150,000 to $300,000 for it. Here's how enclaves actually work, where they fail at first con…

Read the article →
March 18, 2026·14 min readScoring

What your SPRS score actually means in 2026.

Last year's enforcement record changed the cost of being wrong: $52 million across nine False Claims Act settlements, five of them filed by whistleblowers. The…

Read the article →
February 11, 2026·15 min readCost

Who actually pays for CMMC? The math by tier.

The most contested question in defense contracting isn't whether CMMC is fair. It's whether you can recover the cost. DoD, consultants, contractors — three voic…

Read the article →