The Clock is Ticking for Defense Contractors
With CMMC (Cybersecurity Maturity Model Certification) requirements rolling out in contracts, defense contractors (OSC – Organization Seeking Certification) face a critical deadline. Level 2 certification, required for handling CUI (Controlled Unclassified Information), is not a simple checklist; it’s a comprehensive transformation of your security posture.
Based on our experience guiding contractors through this process, a 12-month timeline is aggressive but achievable if well-managed.
Phase 1: Months 1-3 – Scoping and Gap Analysis
Goal: Understand exactly where you stand against NIST 800-171/CMMC Level 2 practices.
- Define the CUI Boundary: You cannot protect what you haven’t identified. Map the flow of CUI through your systems. Reduce scope where possible to save costs.
- Conduct a Gap Assessment: Honest assessment against all 110 controls. This is not the time for optimism; if a control isn’t fully implemented and documented, it’s a gap.
- Develop the SPRS Score: Calculate your current Supplier Performance Risk System score.
Phase 2: Months 4-7 – Remediation and Documentation
Goal: Close technical gaps and formalize policies.
- Technical Remediation: Implement MFA, FIPS-validated encryption, log management, and other technical controls.
- Policy and Procedure Writing: CMMC requires that you not only do the security practice but also have a policy saying you will do it and a procedure showing how you do it.
- System Security Plan (SSP): Draft your SSP. This is your “living document” describing how every requirement is met.
Phase 3: Months 8-10 – Operational Maturity and POA&Ms
Goal: Demonstrate that controls are working over time.
- Evidence Collection: Auditors need to see that controls have been in place for a period of time. Collect logs, tickets, and meeting minutes.
- Plan of Action and Milestones (POA&M): For any non-critical gaps remaining, create a strict POA&M.
Critical POA&M Limitations:
- All 5-point weighted controls must be 100% implemented (no POA&M)
- Examples: MFA (3.5.3), FIPS-validated cryptography (3.13.11), access control (3.1.1)
- All POA&M items must be remediated within 180 days of assessment
- Training: Ensure all staff are trained on the new policies and procedures.
Phase 4: Months 11-12 – Pre-Assessment and the C3PAO Audit
Goal: Verify readiness and cross the finish line.
- Mock Assessment: Have a third party (not your implementer) conduct a mock audit to catch last-minute issues.
- Select a C3PAO: Engage a Certified Third-Party Assessor Organization early. Their schedules fill up fast.
- The Assessment: Be prepared for a rigorous examination. Have your SSP and evidence ready and organized.
The Reality Check
Twelve months assumes you have dedicated resources and budget. Many organizations take 18-24 months. The key is to start now.
Need help navigating the CMMC maze? Contact our CMMC Registered Practitioners for a gap analysis.




