- **CMMC isn't new rules.** The 110 controls behind it (NIST SP 800-171) have been a contractual requirement since 2017 via DFARS 252.204-7012. CMMC is the verification of rules you were already supposed to be following.
- **Three penalty layers, in order of immediacy:** contracts (no certification, no new DoD work), legal (False Claims Act exposure with treble damages), personal (the CEO or CFO who signs the annual affirmation has personal criminal exposure under 18 USC § 1001).
- **The enforcement is real and recent.** The MORSE Corp $4.6M settlement (March 2025) and the Danielle Hillmer criminal indictment (December 2025) are not the ceiling. They're the floor. The DoJ recovered $52M+ across nine cybersecurity FCA cases in FY2025 alone.
- **The stay-or-go decision is the real first decision** — and it's the conversation nobody else will have with you. It depends on six factors, and the maths is different for every business. Some contractors should certify. Some shouldn't.
- **Honest paths through this exist.** The article ends with the first three decisions that matter and free resources you can use this week — no email required.
If you’re reading this, someone has probably just told you that your business needs to do something about CMMC. Maybe a prime contractor asked about your status. Maybe a bid came back marked non-responsive. Maybe your IT manager or MSP has been raising it with a slightly panicked tone. Maybe you read a headline about a defense contractor settling False Claims Act cases for millions and thought: could that be us?
What you’re hearing is real, and it matters. The single most important date on your calendar is 10 November 2026. That’s when Phase 2 of the CMMC program begins, and the eight-year honour system that governed defense cybersecurity ends. From that day forward, contracting officers will require independently-verified Level 2 certification by default for any new DoD contract involving Controlled Unclassified Information. Self-attestation will no longer be enough. The DoD estimates more than 76,000 contractors need Level 2 certification. As of February 2026, fewer than 1,100 had completed it.19
That’s roughly seven months from now. A typical readiness journey takes 12 to 14 months from gap analysis to C3PAO certification. C3PAO scheduling lead times are already 6 months and growing, with some hubs already booking into 2027. The arithmetic, if you do it in your head, is uncomfortable. It’s meant to be.
But Phase 2 isn’t the end of the world for any individual contractor — not yet. The phased rollout means existing contracts don’t get canceled overnight; the squeeze comes through option exercises, recompetes, and new awards. The decisions you make in the next 30 days — not the next seven months — are what determine where your business sits when the squeeze starts.
What you’re being told about CMMC is often confused, vendor-tinted, or selling something. This article exists for one reason: to give you a calm, well-sourced, plain-English picture of where CMMC sits, why it exists, what happens if you don’t comply, and the most important question nobody else will ask with you — whether it makes sense to stay in the defense supply chain at all.
We’ve walked this conversation with CEOs and CFOs at companies ranging from 20-person engineering shops to 300-person systems integrators. The pattern is the same. The first 30 minutes are confusion. The next 30 minutes are quiet alarm. Then come the questions that should have been asked first — the ones this article tries to answer.
What CMMC actually is, in plain English.
CMMC is the US Department of Defense’s cybersecurity certification program for any contractor that handles defense information. Three levels, mapped to the sensitivity of the data:
| Level | Who it applies to | What’s required | Who assesses |
|---|---|---|---|
| Level 1 — Foundational | Contractors handling Federal Contract Information (FCI) only — basic contract paperwork, low-sensitivity work product | 15–17 basic cyber hygiene practices from FAR 52.204-21 | You. Annual self-assessment in SPRS1 |
| Level 2 — Advanced | Contractors handling Controlled Unclassified Information (CUI) — technical drawings, specs, anything sensitive. ~98% of CMMC certifications happen at this level.2 | 110 controls from NIST SP 800-171, scored out of a possible 110 in SPRS | A C3PAO — an independent CMMC Third-Party Assessor Organization. Re-assessed every three years. |
| Level 3 — Expert | Contractors on the highest-risk DoD programs — advanced persistent threat targets | 110 NIST 800-171 controls + 24 enhanced controls from NIST 800-172 (134 total) | The DoD itself, via DIBCAC (the Defense Industrial Base Cybersecurity Assessment Center) |
The most important thing to take from this section:
CMMC is not a new set of rules. The 110 controls it verifies (NIST SP 800-171) have been a contractual requirement on DoD work since 2017 via DFARS 252.204-7012. CMMC is the verification of rules you were already supposed to be following.
That reframing matters. The defense industry has been operating on an honour system for eight years. Contractors self-attested that they were implementing NIST 800-171. When the DoD eventually started auditing those claims through its assessment arm (DIBCAC), the picture wasn’t pretty — many contractors couldn’t demonstrate the compliance they had claimed.3 CMMC formalises a verification regime that the original DFARS clause assumed would happen voluntarily and didn’t.
We’ve published a free, plain-English reference for all 110 NIST SP 800-171 controls at learn.ancitus.com. Each control includes the assessor question, the evidence required, common implementation patterns, and how the C3PAO will verify it. No login. No email. We built it because the NIST PDF is impenetrable for non-IT readers, and the assessors’ guidance (NIST 800-171A) is even worse.
FCI vs CUI — the only acronyms you need today
You’ll hear these two terms constantly. Here’s what they actually mean:
FCI (Federal Contract Information) is information not for public release, provided by or generated for the government under a contract. Basic contract paperwork, low-sensitivity stuff. If you do any DoD work at all, you almost certainly handle FCI — it’s the broader category. FCI gets Level 1.
CUI (Controlled Unclassified Information) is the narrower, more sensitive category. Engineering drawings, technical specifications, military test data, export-controlled component designs, source selection information. If your contracts include the clause DFARS 252.204-7012, you almost certainly handle CUI. CUI gets Level 2.
All CUI is FCI. Not all FCI is CUI. The vast majority of small and mid-sized defense contractors fall into Level 2.
Open any active DoD contract or solicitation. Search for the text 252.204-7012. If you find it, you handle (or are expected to handle) CUI, and you need to plan for CMMC Level 2.
If you only find FAR 52.204-21 and no 7012 reference, you’re likely a Level 1 contractor.
If you genuinely can’t find either, you may be on a contract that doesn’t carry cybersecurity obligations — or you may be looking at the wrong document. Ask your contracts officer.
Want the longer answer? Identifying CUI is harder than it looks — the marking system is unreliable, and most contractors get scope wrong on the first pass. We’ve written a full piece on the four-step CUI discovery process and the five categories that cover ~95% of what defense contractors handle: How to identify CUI: a practical guide for defense contractors.
Three quick checks before you assume you’re out of scope
Three patterns we see repeatedly. If any of them describes your situation, you’re in scope — even if you assumed you weren’t.
1. You’re a subcontractor. The prime is certified. Are you covered? No. CMMC requirements flow down independently. If your prime passes CUI to your business, you must meet the same level the prime’s contract required — you can’t inherit the certification. This is the most common compliance gap we see. Primes are now actively auditing their sub-tiers and dropping subs who can’t show readiness.20
2. You think CMMC is “just an IT problem.” Is it really? Probably not. Any system that processes, stores, or transmits CUI is in scope. That includes your CRM if it ingests email from government contacts. Any AI tool you use to write proposals, if CUI ends up in the prompt. Your file-sharing platform. Every laptop a CUI-handling employee uses. Most CEOs assume “scope” means “our IT infrastructure” — in reality, scope is wherever the data goes. Decisions you make here will drive your costs for the next 12 months.21
3. You sell commercial off-the-shelf products. Does that exempt you? Mostly no. Contracts exclusively for COTS items are exempt, and contracts below the micro-purchase threshold are exempt. But there’s no general exemption for FAR Part 12 commercial product or service contracts. If your commercial-item contract involves FCI or CUI, CMMC still applies.22
Why the government is doing this now.
If a regulation feels arbitrary, the rest of the conversation gets harder. So it’s worth a paragraph on the why, because it’s not actually arbitrary.
Three things drove this:
First, the honour system didn’t work. Between 2017 and 2020, contractors self-attested NIST 800-171 compliance. When DIBCAC started auditing, they found scores being reported at +100 with actual scores in the negative.3 The DoD’s own Inspector General confirmed in DODIG-2023-078 that compliance verification was systematically absent.4
Second, the cyber attacks on the supply chain are real and constant. The largest US defense systems have been routinely targeted by nation-state actors — principally Chinese state-affiliated groups — through the smallest, least-secure links in their supply chains. The 2020 SolarWinds breach, the breaches of multiple US Navy submarine contractors, the 2024 incidents involving cleared contractors and stolen weapons systems data — each was made possible by the security posture of the contractor, not the prime.
Third, the Department of Justice operationalised enforcement. In October 2021, then-Deputy Attorney General Lisa Monaco launched the Civil Cyber-Fraud Initiative, explicitly tying the False Claims Act — a 1863 Civil War statute — to cybersecurity misrepresentations.5 If you certify compliance to win a contract and the certification is materially false, that’s a false claim. Treble damages, per-claim penalties, individual liability.
By FY2025, the Initiative had matured. The DoJ recovered over $52 million across nine cybersecurity False Claims Act settlements in that fiscal year, more than triple the prior year.6 The cases section below walks through five of the most consequential.
What happens if you don’t comply.
This is the section where most CEOs sit up. We’ll handle it in three layers, in order of how immediately you’ll feel each one.
Layer 1 — The contract layer (immediate)
This is the simplest layer to understand. If you don’t have the right CMMC level, you cannot bid on DoD contracts that require it. Existing contracts at recompete or option exercise are out too. There’s no grace period after the relevant phase boundary.
Phase 1 began on 10 November 2025. Self-assessments at Levels 1 and 2 are now appearing in solicitations.7 Phase 2 begins on 10 November 2026, when most Level 2 contracts will require C3PAO certification, not self-attestation. By Phase 4 (10 November 2028), CMMC requirements will be in every applicable DoD contract.
The primes aren’t waiting for the phase boundaries. Lockheed Martin, Boeing, Raytheon, and Northrop Grumman are already auditing their sub-tiers and asking for documented SPRS scores. Some are color-coding suppliers green, amber, red. Some are restricting CUI flow-down to non-certified subs. The contract pressure is here, not coming.
Generally, no. Phase 2 is not retroactive to contracts already awarded. Your existing contract continues. What changes are option exercises, recompetes, task orders under existing IDCs, and any new contracts after 10 November 2026 — those will require the appropriate CMMC certification status. The practical effect is that your business pipeline starts shutting off, not that an existing contract is yanked.
For most contractors, the option exercise is the squeeze point. A three-year contract awarded in 2024 with annual option years comes up for option exercise in 2027 and 2028 — both inside the Phase 2 and Phase 3 windows. If you’re not certified by then, the option isn’t exercised, and the contract effectively ends.
And the assessor capacity isn’t there. There are around 100 fully-authorised C3PAOs serving an estimated 76,000+ Level 2 contractors, with roughly 750 certified CMMC assessors across the whole ecosystem.19 Even if every authorised assessor worked nonstop, the pipeline cannot absorb the demand about to hit it. Aerospace and defense hubs — Maryland, Northern Virginia, Southern California, Massachusetts — are already booking into late 2026 and 2027. If you wait until your contract forces you to certify, the certification capacity will not be there.
Layer 2 — The legal layer (the wake-up)
This is the layer most CEOs hadn’t considered before. The False Claims Act is the federal government’s primary anti-fraud statute. Under 31 USC § 3729, knowingly making a false claim — or being recklessly indifferent to whether a claim is true — carries:
- Civil penalties of $14,308–$28,619 per false claim (figures as adjusted for inflation by the DoJ in July 2025)8
- Treble damages — three times the actual damages to the government
- Plus the relator’s (whistleblower’s) attorney fees and costs
The mechanism: every invoice you submit on a contract that requires CMMC compliance is — legally — a “claim.” If the underlying compliance is false, every one of those invoices is potentially a false claim.
And the whistleblower mechanic matters. The False Claims Act’s qui tam provisions allow private individuals to file suits on the government’s behalf and receive 15–30% of the recovery. In the MORSE Corp case below, the whistleblower received $851,000.9 Most of the cybersecurity cases the DoJ has settled started with a former employee.
Here are the five enforcement cases that most define the current landscape:
2025
A Cambridge, Massachusetts defense contractor settled with the DoJ over False Claims Act allegations spanning January 2018 to February 2023. MORSE submitted a SPRS score of 104 out of 110 in January 2021 — near-perfect compliance. In July 2022, a third-party gap analysis revealed the actual score was negative 142. MORSE did not correct the score until June 2023, three months after the DoJ served a subpoena. The case was brought by a qui tam relator (MORSE's own head of security) who received $851,000 of the settlement.9
The pattern: the case turned on the gap between what was claimed and what was real. Not on a breach. There was no allegation that any CUI was stolen.
2025
A managed care provider administering health benefits for military servicemembers settled with the DoJ over alleged false cybersecurity compliance certifications on a TRICARE contract from 2015–2018. The allegations centred on certifications made to obtain and maintain the contract, not on a specific breach.10
Health Net2024
A major university research institution settled to resolve allegations that it submitted a false SPRS score and failed to install anti-malware tools on systems handling CUI in a research lab. The case is notable because it shows the FCA reaching research institutions that don't think of themselves as defense contractors.11
University research2022
The first major FCA settlement under the Civil Cyber-Fraud Initiative. Aerojet settled allegations that it misrepresented its compliance with cybersecurity requirements in DoD and NASA contracts. The case established the legal theory that cybersecurity certifications are material to government payment decisions.12
Aerojet2025
A defense subcontractor with $5 million in annual DoD revenue delayed CMMC compliance, believing the deadline was further away than it was. When the prime contractor flowed down CMMC Level 2 requirements in Q4 2025 with 90 days' notice to comply or be removed from the contract, the subcontractor couldn't get there in time. They lost the contract. That contract represented 40% of the company's revenue.23
Why this matters more than FCA cases: the FCA settlements are dramatic, but contract loss is what will hit most contractors first. The primes don't wait for Phase 2. They're already dropping non-compliant subs. This subcontractor never got investigated, never got sued, never got indicted. They just lost the work.
2025
A federal grand jury in DC indicted Hillmer, 53, a former senior manager at Accenture Federal Services13, on two counts of wire fraud, one count of major government fraud, and two counts of obstructing federal audits. The indictment alleges Hillmer misrepresented FedRAMP High and DoD Impact Level 4/5 compliance on a cloud platform used by the US Army, Department of State, Department of Veterans Affairs, and at least three other agencies between March 2020 and November 2021. Contracts involved were valued at more than $250 million. The indictment quotes a July 2021 internal chat: an employee writes "we've dodged the [multi-factor authentication] implementation bullet for now, but it could come up again… We aren't out of the woods yet", and Hillmer responds with a fingers-crossed emoji.14
Maximum penalties if convicted: 20 years for each wire fraud count, 10 years for major government fraud, 5 years for each obstruction count.
Why this case matters: the conduct described is exactly the kind of "we'll fix it later" decision a manager under pressure to win contracts might make. The DoJ chose to prosecute her personally, not just the company.
Worth noting: Hillmer is technically a FedRAMP case, not a CMMC case. But the legal theory is identical — misrepresenting cybersecurity compliance to win federal contracts — and the same DoJ Civil Cyber-Fraud Initiative pursues both. If you sign a CMMC affirmation knowing your controls aren't where you've claimed, you're sitting in exactly the same statute the DoJ used against Hillmer.
Layer 3 — The personal layer (the Affirming Official)
Under 32 CFR § 170.22, an “Affirming Official” must submit an annual affirmation in SPRS that the organization has implemented and continues to maintain all applicable CMMC security requirements. At small and mid-sized contractors, that’s almost always the CEO or CFO.15
If that affirmation turns out to be wrong, exposure isn’t limited to the company. Under 18 USC § 1001, materially false statements to the federal government carry up to five years in prison for the individual making them. Under 31 USC § 3729, the company faces the FCA exposure. The two run in parallel.
The Hillmer indictment is the first time the DoJ has used these statutes against an individual on cybersecurity compliance grounds. It will not be the last. Industry analysts now expect personal indictments to become routine through 2026.16
Within 60 days of the first major False Claims Act indictment against an officer, D&O insurers began excluding CMMC affirmation liability from standard policies and adding new endorsements that require evidence of an actual C3PAO assessment before an officer signs an affirmation.16 If you’re relying on D&O cover, talk to your broker.
The decision before the decision.
Here’s where most articles in this space lose their nerve. They tell you what CMMC is, list the penalties, and move straight to here’s how to comply. That’s a vendor pitch. The actual first decision is whether your business should stay in the defense supply chain at all.
For some contractors, the answer is unambiguously yes. For others, it isn’t. The maths is genuinely different depending on six factors:
- What percentage of your revenue is DoD work?
- What’s the margin on that work, and how much room does it have to absorb compliance overhead?
- How quickly can your civilian / non-defense market grow if you redirect?
- Where is your current cybersecurity posture relative to NIST 800-171? Closer to the standard = cheaper journey. The Readiness Assessor gives you a rough first read in five minutes; a proper Gap Assessment gives you a defensible number scored against all 110 controls.
- What’s your time horizon as the owner? Looking to exit in 24 months changes the calculus.
- What capability do you offer that the DoD specifically needs? A niche capability is harder for the DoD to lose; you have more leverage.
The cost picture isn’t as binary as it looks. FAR Part 31 allowable cost recovery, state grants (Connecticut CAP, Maryland, Michigan, Texas), and MEP/PTAC subsidised advisory all do real work for contractors who find them. For the full economic picture — the math by tier, what’s recoverable, where grants help — see Who actually pays for CMMC? The math by tier.
Take the 5-minute CMMC Readiness Assessor.
Six questions about your current contracts, cybersecurity posture, and DoD revenue share. Output: which tier you’re closest to, plus the three first decisions that matter. No email required. Genuinely free.
We’ve grouped the contractors we’ve spoken with into three positions. Yours probably resembles one of them.
"Defense is the core of our business and we have time to do this right."
You have 40%+ DoD revenue, healthy margins, owner time-horizon of 5+ years, and a meaningful capability in defense work. The maths overwhelmingly favours certifying and certifying early — ideally during 2026 while assessor capacity exists.
- DoD revenue40%+
- Time horizon5+ years
- Compliance / 12mo profit< 1.5x
- DecisionCertify Phase 1 / early Phase 2
"We need to look at this carefully. The maths is uncomfortable."
You have 15–40% DoD revenue, thinner margins, and your civilian markets are growing. Compliance cost will likely exceed 12–18 months of DoD profit. Some Tier 2 contractors should certify. Others should plan a managed wind-down of DoD work. The decision is binary and time-sensitive.
- DoD revenue15–40%
- Time horizon2–5 years
- Compliance / 12mo profit1.5–3x
- DecisionHonest financial modeling needed
"This will cost more than the work is worth."
You have under 15% DoD revenue, thin or no margin on it, owner is exit-planning or retirement-adjacent, and your civilian markets are healthy. The honest answer is often that the cost of compliance ($75K–$300K plus 12–18 months of attention) exceeds the lifetime value of remaining DoD work. Stopping DoD work is a legitimate strategy.
- DoD revenue< 15%
- Time horizon< 2 years
- Compliance / 12mo profit> 3x
- DecisionPlan a wind-down or pivot
The strategic insight worth holding onto: the contractors who exit can’t easily come back. Once you’ve let your DoD relationships go and stopped bidding, re-entry in 2028 will be effectively impossible — certification still required, but now competing against fully-certified incumbents who’ve had two years of less competition.
And on the other side: the 15–20% of the DIB that does exit is concentrated in Tiers 2 and 3. The contractors who stay will be bidding against a smaller pool. That’s not a marketing claim — it’s the direct consequence of the StrikeGraph attrition forecast and PreVeil’s $116K median first-year cost figure colliding with thin-margin sub-tier business.17
What’s actually in it for you.
If you decide to stay and certify, the upside is more than just “you keep your DoD revenue.” Four things worth knowing:
A competitive moat. If 33,000–44,000 contractors exit the DIB through 2027 (roughly 15–20% of the 220,000 total), certified firms will be bidding against a meaningfully smaller pool. Early certifiers win disproportionately in 2026–2027 because the supply of qualified bidders is shrinking faster than the demand. That moat narrows again by Phase 4 (late 2028) as more contractors complete certification, so the window matters.
An acquisition premium. Investment banks and private equity buyers active in the DIB now treat CMMC certification as table stakes for acquisition targets. Acquirers don’t want to inherit compliance debt or FCA exposure. Certified contractors trade at meaningfully higher multiples than non-certified peers, and the premium should widen through 2027.
Commercial cross-over. CMMC Level 2 implementation gets you roughly 80% of the way to ISO 27001 or SOC 2 Type II — the credentials that unlock larger enterprise commercial customers (Fortune 500 buyers, regulated industries, financial services).18 If you’re trying to diversify away from defense dependency, the controls you build for CMMC pay for themselves a second time on the commercial side.
Genuine security. The 110 controls aren’t bureaucratic theatre. They’re the practical floor on what protects a small business from ransomware, business email compromise, IP theft, and the kind of nation-state-led attacks that targeted the DIB in the first place. Most of our clients tell us, after the fact, that the controls would have been worth implementing even without the DoD context.
Where you are vs where you need to be.
The CMMC program has a phased rollout. Knowing exactly where the calendar is today helps frame how much time you actually have.
Phase 1 began — self-assessments now in solicitations
Contracting officers began including Level 1 and Level 2 self-assessment requirements in new DoD solicitations. SPRS scores are being checked at bid evaluation. Some contracts are already requiring C3PAO Level 2 at award where the DoD designates it.
Inside Phase 1 you are here
~80,000 contractors need Level 2 certification. Fewer than 1,100 have completed it.19 C3PAO assessment lead times are now 6+ months and growing. The bottleneck is real.
Phase 2 begins — the honour system ends
Mandatory C3PAO certification for most Level 2 contracts. Self-attestation no longer sufficient. A typical readiness journey is 12–14 months — meaning a contractor starting in May 2026 with no current posture is realistically looking at certification in mid-to-late 2027.
Phase 3 begins — Level 3 requirements added
DIBCAC-assessed Level 3 introduced for the highest-risk programs. Level 2 C3PAO certification now extended to option exercises on existing contracts — meaning contract renewals start to require it too.
Phase 4 — full enforcement
CMMC requirements appear in all applicable DoD contracts and option periods. No grandfathering. Every contractor in scope must be certified at the appropriate level or be excluded from awards.
The maths most CEOs need to do is simple. Count backwards from when your next major DoD contract goes to bid, or your next option exercise comes due. Subtract 12–14 months of preparation. Subtract another 6 to 12 months for C3PAO assessment lead time. That gives you the latest possible date to start. For most contractors looking at 2027 bids, that date was last year.
If you’re staring at the calendar thinking we can’t possibly hit this, you’re not wrong. 1% of contractors feel fully prepared.19 You’re in the 99%. The first job is to know honestly where you stand, then work backwards from a realistic target date.
The first three decisions that matter.
If you do nothing else this week, do these three things in order. Each takes a few hours. Together they get you from “we just heard about CMMC” to “we have a defensible plan.”
Three decisions, in order.
If you'd rather have all three handled structured and on a deadline, our 4–6 week fixed-fee Gap Assessment covers the full set. Or use the free tool linked in each step below to do it yourself.
- Identify which CMMC level you actually need. Pull every active DoD contract and active solicitation you're bidding on. Search each one for the text
DFARS 252.204-7012or252.204-7021or the term "Controlled Unclassified Information". The contracts that contain those determine your level. Don't take an MSP's word for it. The contract is the authoritative document. If you find 7012 anywhere, you handle (or are expected to handle) CUI — plan for Level 2. Free tool How to identify CUI — our four-step practical guide to finding CUI in your business, plus the five categories that cover ~95% of what defense contractors handle. - Get an honest gap assessment — not a self-quiz. Self-assessments are systematically optimistic. The MORSE Corp case turned on a self-reported score of 104 with an actual score of -142. A real gap assessment gives you a defensible starting score plus a remediation roadmap. The firm that does your gap assessment cannot also assess you for certification — that's a Cyber AB ethics rule, and it protects you. Your gap assessor will give you honest answers. Free tool learn.ancitus.com — plain-English reference for all 110 NIST 800-171 controls, with assessor questions and evidence checklists. Free, no login. Takes weeks of focused effort but you can self-assess against the same questions a C3PAO will ask.
- Do not sign anything you don't understand. If a prime sends you a flow-down agreement requiring CMMC compliance, do not sign without understanding what you're committing to. If an MSP offers "instant compliance" or "we handle 200 controls for you", be sceptical — particularly if the contract doesn't include a written Customer Responsibility Matrix (the document that says exactly which controls they own and which you own). The wrong vendor commitment, signed early, costs more than the right one signed three months later. The Affirming Official signature is the one to watch most carefully. You sign that, not your IT manager and not your MSP. Free tool Shared Responsibility Matrix — print this before every vendor conversation. It maps which of the 110 controls are owned by you, your cloud provider (AWS GovCloud / Azure Gov / GCC High), and your MSP. The MSP can't claim coverage of controls they don't actually handle if you have this in front of you.
A structured Gap Assessment covers all of this.
Four to six weeks. Fixed fee. Contract review and level determination, full CUI scoping, an honest SPRS score against all 110 controls, and a prioritized remediation roadmap. Independent of any implementation work — so the findings stay honest.
If you’ve done these three things, you’re already ahead of the median DIB contractor. From here, the path forward depends on which tier you’re in — and that’s the conversation we’re built to have.
Free resources to start with.
You don’t need to pay anyone to get started. The resources below are ungated — no email required — and combined, they give you about a working day’s worth of useful self-education before you bring in anyone external.
Resources, ungated and free.
A mix of official DoD sources, Cyber AB references, and free tools we've built for the DIB. None of these require email or payment.
DoD Mandatory CUI Training (IF141)
Free 60-minute self-paced course from the Center for Development of Security Excellence. The single best layperson primer on CUI. Take it before you do anything else.
cdse.edu Official sourceThe National CUI Registry
National Archives maintains the authoritative list of every CUI category and the laws behind them. If someone tells you data is CUI, this is where you verify.
archives.gov/cui Cyber ABCMMC Marketplace
Searchable directory of authorised RPOs (advisory), C3PAOs (assessment), RPs, CCPs, CCAs. If someone claims a CMMC credential, verify it here.
cyberab.org/Marketplace NISTNIST SP 800-171 (the 110 controls)
The actual standard CMMC Level 2 verifies. PDF is free. Chapter 3 is the 110 controls themselves, written in plain bureaucratic English.
csrc.nist.gov Ancitus5-minute Readiness Assessor
Six questions. Output: your tier, current realistic timeline, and the three first decisions specific to your situation. No email required.
ancitus.com/readiness-assessor AncitusShared Responsibility Matrix tool
Free tool mapping which of the 110 controls are owned by you, your cloud provider (AWS GovCloud / Azure Gov / GCC High), and your MSP. Print and use in vendor conversations.
ancitus.com/shared-responsibilityWhat we’d do if we were you.
If you’ve read this far, you’re in the first 5% of CEOs who actually engage with this material. Most stop at the first jargon-heavy article they encounter and put the question off. Don’t be that CEO — not because we want your business, but because the people who let this drift are the ones who run out of runway in 2027 and discover their options have narrowed considerably.
Here’s the six-step path we’d walk if we were sitting across the table from you. Each step has a clear next action, and each maps to a specific stage of the implementation journey we’ll cover in the rest of this series.
Step 1 — Take 5 minutes today to know where you stand.
The Readiness Assessor asks six questions about your contracts, your current cybersecurity posture, and your DoD revenue share. You get back which tier you’re closest to and an honest first read on your timeline. Free, no email required. Do this before reading anything else.
Step 2 — Have the stay-or-go conversation with your CFO this week.
Work through the six factors in the stay-or-go section above. Model the maths properly. If you can’t do that in one afternoon, bring in someone who can — a fractional CFO who knows government contracting, or a CMMC-aware advisor who can run a costed scenario analysis. Don’t skip this step. The contractors who run out of runway in 2027 are the ones who never had this conversation. For the funding side of the maths, see our piece on who actually pays for CMMC.
Step 3 — If you’re staying, commission a proper gap assessment.
Self-quizzes are systematically optimistic. A real gap assessment by an independent RPO gives you a defensible starting SPRS score, a remediation roadmap with realistic timelines, and the leverage you need in vendor conversations. Without one, you’re shopping blind. Our Gap Assessment runs 4–6 weeks, fixed fee, and is independent of any implementation work — so the findings stay honest.
Step 4 — Make the partner decision before you commit to implementation.
The MSP question is the single most expensive decision after stay-or-go. Three viable models exist, and the one that fits depends on whether your current MSP has the credentials and the experience — or doesn’t. Don’t sign a long-term MSP CMMC contract before reading our next article in this series, “The 8 stages of CMMC compliance — and the MSP decision that will cost you the most if you get it wrong” (publishing in two weeks). When you’ve decided on the model, our CMMC Implementation service is principal-led, fixed-fee, and works inside your tenant alongside your existing MSP — or replaces them, if that’s the right call.
Step 5 — Plan for continuous compliance from day one.
CMMC Level 2 isn’t “certify once every three years.” It’s a triennial assessment with an annual affirmation, 180-day POA&M closeout windows, and continuous evidence collection in between. Every degraded control between assessments becomes potential FCA exposure for the next annual signature. The contractors who treat this as a one-time project regret it at re-assessment. Our Continuous Compliance service handles the annual affirmation prep, evidence collection, POA&M maintenance, and triennial re-assessment as an ongoing program rather than a fire drill.
Step 6 — Use the resources above before you talk to anyone selling you anything.
The free resources section above gives you about a working day of useful self-education. Take the DoD CUI training. Look up your CUI categories on the National Registry. Verify any vendor’s credentials on the Cyber AB Marketplace. The contractors who do this homework have better conversations with vendors and pay less for better work. The ones who skip it end up paying more for worse work, and finding out at the C3PAO assessment.
So which path is right for you? You're probably in one of three positions. Pick the one that fits and act this week.
Do it yourself.
"We have the time and bandwidth to handle this in-house."
Best fit if you have an experienced IT lead, 12–18 months of runway, and DoD work that justifies the internal effort. Your path:
- Take the Readiness Assessor today
- Study the 110 controls at learn.ancitus.com
- Use the free resources in section 8
- Self-assess against NIST 800-171 over Q3/Q4
Get a Gap Assessment.
"We need a defensible starting score before we commit to vendors."
Best fit if you're certain you're Level 2, you don't want to shop blind for an MSP, and you want a structured remediation roadmap. Our Gap Assessment delivers:
- 4–6 weeks, fixed fee
- Full CUI scoping & SSP draft
- Honest SPRS score against all 110 controls
- Prioritized remediation roadmap
Talk to us first.
"We're not sure which path is right. Or whether we should be doing this at all."
A 30-minute call. No pitch. We'll look at your contracts, talk through your tier, and tell you honestly whether we think we're the right firm for you. Sometimes the answer is no — either way you walk away with a clearer head than you walked in with.
- Principal-led (no junior handover)
- Senior-only delivery
- Cyber AB Registered Practitioner · RPA in progress
This is article 1 of a planned series for CEOs and non-IT leaders in the defense supply chain. The next pieces cover the 8 stages of compliance (and the MSP trap), how to scope your environment and decide between an enclave vs whole-company architecture, and what continuous compliance actually looks like in year two and beyond. See all our insights →