Get assessment-ready for CMMC without rebuilding your security program
What is CMMC?
The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense's verification program for ensuring defense contractors adequately protect sensitive information. Originally announced in 2020, the program was streamlined into CMMC 2.0 with three levels instead of the original five.
The CMMC 2.0 final rule was published in the Federal Register on October 15, 2024, and took effect on December 16, 2024. The companion DFARS rule — which embeds CMMC requirements into actual defense contracts — took effect on November 10, 2025, marking the start of real enforcement.
The three CMMC levels
- Level 1 — Foundational covers basic safeguarding of Federal Contract Information (FCI). It requires 17 practices drawn from FAR 52.204-21 and is verified through annual self-assessment.
- Level 2 — Advanced protects Controlled Unclassified Information (CUI). It requires all 110 security requirements from NIST SP 800-171 Rev 2 and can be verified through self-assessment or third-party C3PAO assessment depending on the contract.
- Level 3 — Expert defends against advanced persistent threats on the most sensitive programs. It adds 24 enhanced requirements from NIST SP 800-172 on top of Level 2 and requires government-led assessment by DIBCAC.
Phased implementation timeline
CMMC enforcement follows a four-phase rollout:
- Phase 1 (November 2025 – November 2026) — Level 1 and Level 2 self-assessments appear as conditions of award in select solicitations. A limited number of contracts may require Level 2 C3PAO assessments.
- Phase 2 (November 2026 – November 2027) — Level 2 C3PAO certification requirements expand to more contracts. Level 3 requirements begin appearing in select solicitations.
- Phase 3 (November 2027 – November 2028) — Level 2 and Level 3 requirements appear broadly across applicable contracts.
- Phase 4 (November 2028 onward) — All DoD contracts requiring FCI or CUI handling must include the appropriate CMMC level as a condition of award.
Who needs CMMC?
Every organization in the defense industrial base that handles FCI or CUI needs a CMMC certification at the level specified in their contract. This includes prime contractors, subcontractors at every tier, and cloud service providers hosting DoD data. Flow-down requirements mean that even small suppliers several tiers removed from the prime may need certification.
Common challenges
- Scoping complexity — determining which systems, people, and processes are in scope for CUI handling is often the hardest first step.
- NIST 800-171 gaps — many contractors self-attested compliance for years but never closed all 110 requirements. CMMC makes third-party verification real.
- POA&M management — Plan of Action and Milestones items must be closed within 180 days of assessment. Tracking remediation across teams is difficult without tooling.
- Subcontractor flow-down — primes must verify that their subcontractors also hold the required CMMC level, adding supply chain management overhead.
A structured approach that maps controls to NIST 800-171, tracks evidence continuously, and monitors POA&M progress removes most of these friction points.
CMMC topics
CMMC outcomes with episki
Why teams choose episki for CMMC
- 14 control families mapped to 110 security requirements
- AI-drafted implementation narratives and testing procedures
- Gap analysis highlights missing controls before your assessment
- POA&M tracking with 180-day close-out reminders
- Scoring methodology aligned to DoD assessment guide
- Assessor portal with scoped read-only access
- Unified control graph eliminates duplicate documentation
- Evidence collected once, reused across every framework
- Framework coverage dashboard shows gaps at a glance
CMMC readiness checklist inside episki
Plug episki into your stack and work directly from this checklist during the free trial.
- ✓ NIST SP 800-171 control library with mapped CMMC practices
- ✓ Level 1, 2, and 3 scoping guidance and practice sets
- ✓ POA&M register with risk-ranked remediation priorities
- ✓ System Security Plan (SSP) template with AI drafting
- ✓ Evidence library organized by control family