The Cybersecurity Maturity Model Certification (CMMC) 2.0 framework is often described as a three-level ladder. That framing misleads more than it clarifies. Level 1 and Level 2 are not two points on the same ladder; they are fundamentally different compliance regimes with different data categories, different controls, different assessment mechanics, and different operational burdens. A contractor who treats Level 2 as "more Level 1" will misallocate budget, miss enclave opportunities, and fail an audit.
This guide is for contracts administrators, facility security officers (FSOs), and CISOs at tier-2 and tier-3 defense industrial base (DIB) suppliers who need to determine which level applies to which contract vehicle, and what "in scope" actually means in practice.
The data determines the level
CMMC level selection follows from the data you process, store, or transmit on behalf of the Department of Defense, not from revenue, headcount, or subjective risk posture. Two data categories matter:
- Federal Contract Information (FCI): information not intended for public release, provided by or generated for the government under a contract to develop or deliver a product or service. FCI triggers Level 1.
- Controlled Unclassified Information (CUI): unclassified information requiring safeguarding or dissemination controls under a law, regulation, or government-wide policy. CUI triggers Level 2 (and in narrow cases, Level 3).
If your contract vehicle transmits even one CUI artifact - a technical drawing, an export-controlled specification, a basic research report - you are in Level 2 territory for the system that handles it. Receiving CUI as an email attachment pulls the mail system into scope unless the traffic is segregated to an enclave.
Level 1: the FCI floor
Level 1 maps to the fifteen basic safeguarding requirements in FAR 52.204-21. These are "basic cyber hygiene" practices: limit system access to authorized users, identify and authenticate users, sanitize or destroy media, escort visitors, monitor physical access, and so on. There are no maturity processes, no documented system security plan (SSP) requirement at the federal acquisition regulation level, and no third-party assessment. Contractors self-attest annually in the Supplier Performance Risk System (SPRS) and enter an affirmation through the eMASS-like CMMC registry.
Level 1 is achievable for most shops with a credible IT stack: endpoint protection, a configured identity provider with MFA, baseline password policy, and a documented media-handling procedure. The failure mode at Level 1 is not technical; it is attestation quality. Self-attestation under the False Claims Act creates personal liability for the senior official who signs, and the DOJ Civil Cyber-Fraud Initiative is actively pursuing cases.
Level 2: the CUI regime
Level 2 aligns to the 110 security requirements in NIST SP 800-171 Revision 2, organized across 14 control families (access control, audit and accountability, configuration management, identification and authentication, incident response, and so on). A subset of contracts requires a C3PAO (Certified Third Party Assessor Organization) assessment every three years; the rest permit self-assessment, but the DoD will announce which contracts require third-party review as program offices designate them.
The operational delta between Level 1 and Level 2 is substantial:
- Documentation: a System Security Plan (SSP) and Plan of Action and Milestones (POA&M) are mandatory and must describe every in-scope asset, every control implementation status, and every remediation commitment.
- Audit trails: the AU family requires immutable audit logs with time synchronization, retention sufficient to support investigations, and protection from unauthorized modification. Most commercial mail and productivity defaults do not satisfy this.
- Configuration baselines: the CM family requires documented baselines for each platform type, change control, and restriction of non-essential programs. Shops running on "user endpoints ship configured by vendor defaults" are non-compliant.
- FIPS-validated cryptography: SC.L2-3.13.11 requires FIPS 140-2/3 validated modules whenever cryptography is used to protect CUI confidentiality. Commercial M365 tenants do not meet this bar without GCC High or explicit module configuration.
Scope is the single highest-leverage decision
The dominant mistake at Level 2 is scoping the entire corporate environment rather than isolating the CUI-handling assets. Under the CMMC Scoping Guide, the assessor evaluates the CUI Asset category (assets that process, store, or transmit CUI) and three adjacent categories:
- Security Protection Assets (SPAs): systems that provide security capabilities to CUI Assets - your SIEM, your EDR management plane, your identity provider - are fully in scope.
- Contractor Risk Managed Assets (CRMAs): assets that can but do not process CUI, constrained by policy. In scope, but with reduced assessment rigor.
- Specialized Assets: government property, IoT, operational technology, test equipment. In the SSP but not individually assessed against 800-171.
A well-scoped enclave - a segmented network, dedicated endpoints, GCC High tenant, dedicated file server, logically isolated MDR tenant - can reduce the assessable surface from the entire enterprise to a dozen or so assets. A poorly scoped environment pulls every endpoint, printer, and SaaS app into the assessment boundary. The cost delta between these two outcomes is typically 3-5x.
Assessment mechanics
Self-assessments at either level require an affirmation from a senior official (typically the CISO, CIO, or COO) in SPRS with the current NIST 800-171 score (for Level 2) and the CMMC status. The score is calculated using the DoD Assessment Methodology: start at 110, deduct the prescribed value for each unimplemented control. Negative scores are permitted and common during initial posture; contracts with DFARS 252.204-7019 require the score to be uploaded before award.
C3PAO assessments follow a standard methodology: document review, interviews, and technical validation. Assessors sample evidence across users, endpoints, and time windows. A single non-compliant finding on a control marked "MET" in the SSP is a fast path to a Not Met verdict. The Cyber AB maintains the roster of authorized C3PAOs - there is no backdoor or private path.
Practical decision tree
Work through these questions in order before committing to a level:
- Does the contract vehicle (or any flow-down from a prime) reference DFARS 252.204-7012, 7019, 7020, or 7021? If yes, you are almost certainly handling CUI and bound for Level 2.
- Does the contract include FAR 52.204-21 only, with no DFARS cyber clauses? Level 1 self-attestation is likely sufficient - but verify with the contracting officer, not your sales team.
- If CUI is involved, can it be segregated to a defined enclave that is logically and physically separated from the rest of the business? If yes, pursue enclave architecture aggressively. If no, begin enterprise-wide remediation planning.
- Does the contract include a CMMC Level 2 (C3PAO) assessment requirement? If yes, budget for the full audit cycle (pre-assessment, readiness, formal assessment, remediation).
What to do next
Most tier-2 contractors underestimate the time required to reach Level 2 by a factor of two. A credible readiness program runs 9-15 months from kickoff to a defensible SSP and evidence library. Starting late is the leading cause of missed award opportunities in the DIB.
Techvera's defense-compliance practice supports contractors from initial CUI scoping through C3PAO-ready remediation. See our government and defense industry page for the full readiness framework, or schedule a consultation to walk through your specific contract vehicles and SPRS posture.
About the Author
Team Techvera
Techvera Team
Articles written collaboratively by the Techvera team, combining expertise across cybersecurity, managed services, and digital transformation.
