Cybersecurity Maturity Model Certification: Compliance Risks

Wiz Experts Team
9 minute read
CMMC main takeaways:
  • CMMC ensures that DIB contractors meet basic cybersecurity requirements when handling CUI.

  • The DoD has mandated that every defense contractor achieve CMMC certification by 2026, with three maturity levels (Level 1: Foundational, Level 2: Advanced, and Level 3: Expert), based on data sensitivity.

  • Contractors must comply with specific CMMC levels, depending on their contract: Level 1 for federal contract information, Level 2 for controlled unclassified information, and Level 3 for highly sensitive data.

  • Non-compliance with the FCA carries serious consequences, including treble damages and civil penalties ranging from $13,508 to $27,018 per false claim. Fines aren’t necessarily based on the number of unmet controls.

  • CMMC framework focuses on safeguarding sensitive defense-related information, establishing mandatory cybersecurity standards for defense contractors, and holding them accountable for securing government data as part of DoD contracts.

What is a maturity model in cybersecurity?

Cybersecurity Maturity Model Certification (CMMC) is a specific cybersecurity maturity model from the United States Department of Defense (DoD), ensures that defense industrial base (DIB) contractors meet mandatory cybersecurity requirements when handling controlled unclassified information (CUI).

Although the DoD has long provided cybersecurity guidelines to contractors, it only established the CMMC in 2020. Now, every contractor must earn this certification to be eligible to develop and supply products and services to the DoD. The CMMC requires all DoD contractors to undergo a third-party cybersecurity assessment.

The CMMC Assessors and Instructors Certification Organization and Certified Third-Party Assessor Organizations (C3PAOs)—firms that the CMMC Accreditation Body has trained and certified—assess every contractor.

The need for CMMC in the defense supply chain 

Traditionally, defense contractors relied on self-attestation to meet NIST SP 800-171 standards. However, this approach revealed significant gaps in compliance, which prompted the DoD to introduce CMMC as a more rigorous and accountable framework.

CMMC—which helps teams better assess, monitor, and secure the defense supply chain—covers roughly 350,000 firms in the DIB. Initially, the CMMC program offered five certification levels, which the DoD condensed into three levels under CMMC 2.0 (when it renewed the CMMC program, it eliminated Levels 2 and 4 to streamline compliance). Despite this, CMMC has not lost its rigorous standards.

In CMMC 2.0, a contract’s level of data sensitivity determines the required certification level. This differs from general frameworks like NIST CSF, which use tiers to assess an organization’s overall risk management practices.

CMMC’s different maturity levels

Below are CMMC 2.0’s current maturity levels and their requirements:

CMMC 2.0 Levels 1–3 vs. CMMC 1.0 Levels 1–5 (Source: CMMC)

Level 1: Foundational

The most basic maturity level requires you to practice minimum cybersecurity measures, such as patch updates and password management. It covers 17 controls from 48 CFR 52.204-21 standards. 

Level 1 certification aims to reduce risk for companies that manage data. Organizations don’t need documentation to implement these foundational security requirements. Instead, they can self-assess their readiness for Level 1 compliance. DIB contractors who handle federal contract information (FCI), which isn’t critical, must attain Level 1 certification.

Level 2: Advanced

CMMC 2.0 Level 2 certification is necessary for companies that handle CUI. Level 2 focuses on implementing intermediate cyber hygiene practices by adhering to the 14 domains and 110 security controls in NIST SP 800-171. 

While these controls aim to protect sensitive unclassified information from unauthorized access, their primary purpose is to ensure compliance with NIST SP 800-171 requirements rather than directly addressing national security concerns.

In addition to the outlined practices in Level 1, Level 2 stipulates that organizations must document their security processes and guidelines. As a result, contractors must undergo an assessment process by C3PAOs every three years. Since they manage information critical for national security, these organizations must also conduct annual self-assessments.

Level 3: Expert

As the highest level of CMMC, Level 3 involves stringent security policies based on NIST SP 800-171 and a subset of 24 additional controls from NIST SP 800-172. This level requires implementing all 110 NIST SP 800-171 controls alongside enhanced security measures to address sophisticated threats, including advanced persistent threats (APTs).

At this maturity level, organizations focus on proactive cybersecurity measures like advanced monitoring, testing, automation, and threat hunting to detect and neutralize APTs. These measures also ensure continuous improvement and robust defense against evolving cyber threats.

Core aspects of CMMC compliance

The DoD introduced CMMC to cover three key objectives:

  • Safeguarding sensitive information that could challenge national security

  • Setting a cybersecurity standard for companies that secure defense contracts

  • Holding defense contractors accountable for securing government data 

The CMMC framework comprises three key aspects to achieve these objectives: domains, practices, and capabilities. Let’s briefly discuss each:

  • Domains: The DoD groups CMMC’s 14 cyber domains, or sets of security practices, by their attributes. Below are the types of domains under CMMC 2.0:

NumberCyber domain
1Access Control
2Asset Management
3Audit and Accountability
4Awareness and Training
5Configuration Management
6Identification and Authentication
7Incident Response
8Maintenance
9Media Protection
10Personnel Security
11Physical Protection
12Recovery
13Risk Management
14Security Assessment
15Situational Awareness
16System and Communications Protection
17System and Information Integrity
  • Practices: Contractors must implement 110 practices across 14 security domains to safeguard information.

  • Capabilities: Organizations must employ these best practices, processes, and tactics for robust security. (The DoD removed some capabilities from CMMC 2.0 that CMMC 1.0 explicitly mentioned.)

Who needs to comply with CMMC?

The DoD has mandated that every defense contractor must achieve CMMC certification by 2026. While commercial-off-the-shelf vendors are generally exempt from certification requirements, exceptions may apply if their products involve handling CUI or are subject to specific contract requirements. Other organizations must secure the appropriate maturity level, according to their contracts, to remain eligible for DoD work.

The three different types of contractors who need to comply with CMMC are as follows:

  • Organizations working only with FCI and that have a FAR 52.204-21 clause in their contract will need CMMC Level 1. These must self-certify their security practices rather than undergo third-party assessment. Contractors must also share the details of their FCI management plan, including information about people, processes, technologies, facilities, and other external providers.

  • Defense contractors with a DFARS 7021 clause in their contract will need Level 2 certification. Per the mandate, they must undergo a third-party assessment through an accredited C3PAO every three years and complete a self-assessment annually.

  • Organizations that handle highly sensitive data and have DFARS 7021 clauses in their contract will need the highest level of maturity. To achieve Level 3 certification, they must comply with essential security practices in NIST SP 800-171 and some of 800-172. These organizations must undergo an audit by a Defense Industrial Base Cybersecurity Assessment Center.

CMMC cloud compliance best practices

Below are seven best practices you can implement to achieve CMMC:

1. Understand what level of CMMC certification you need

Review your defense contract carefully to determine the maturity level you need. You can determine your level based on your organization’s expectations, such as how and whether you handle FCI or CUI.

Remember: Level 1 certification is a minimum requirement for securing a defense contract from the DoD. If your organization deals with CUI, you must instead earn Level 2 compliance. Level 3 certification is currently the highest level of attainment.

2. Establish a core team to take care of CMMC compliance

Delegating compliance responsibility to a core team will streamline your security practices. IT teams usually take up this role—but regardless of who’s in charge, someone who can involve all the organization’s stakeholders and keep the project on track at every step must manage CMMC compliance.

You can build your team by incorporating the following roles for compliance: 

  • Executive leadership: Identify a qualified team member to lead compliance initiatives and standards throughout different governing bodies and evolving standards, such as allocating budget, resources, and objectives.

  • Compliance manager: Choose a leader who can execute and monitor CMMC compliance. This person must communicate with all relevant departments, stakeholders, and their teams to assess and document compliance standards.

  • Security team members: Train and establish security professionals for CMMC best practices. These security engineers and system architects can place security controls on NIST security practices and monitor logs and actions through consistent security processes. 

  • Training coordinators: Continuously educate your team to improve current compliance standards and position them for future changes and threats. You can implement a DevSecOps approach to ensure that everyone, at every level, understands core compliance expectations.

  • Auditors: Leverage key team members and solutions like Wiz to find gaps and provide assessments through internal audits. This will allow you to track and remediate potential issues. 

3. Determine your CMMC readiness

Implement a self-assessment procedure to determine the state of your cybersecurity and readiness for CMMC compliance. This typically involves evaluating your policies, procedures, and access controls in the following ways:

  • Add technical controls like multi-factor authentication for cloud applications and endpoint protection.

  • Establish administrative processes like patch management policies and incident response plans.

  • Build physical safeguards like server room access logs and physical security measures.

You can better assess your readiness through auditing, analyzing, and reviewing your reporting and communication.  For each CMMC practice, you should:

  • Create documentation: Develop system security plans, procedures, and policies that support requirements.

  • Conduct interviews: Confirm staff knowledge of security protocols and the documentation process.

  • Test controls: Create real-world scenarios, like phishing attacks or disaster recovery, to verify technical controls and training.

Remember: self-assessments are only applicable for Level 1 compliance under CMMC 2.0, which focuses on foundational cyber best practices. Levels 2 and 3 require third-party assessments by C3PAOs or government entities to ensure adherence to more advanced cybersecurity requirements.

Thankfully, you don’t have to perform all these steps manually as you prepare and implement CMMC. With solutions like Wiz, for example, you can automate compliance against your current infrastructure and use benchmarks to reach your goals. 

4. Limit access to CUI for easy security management

Giving a large group access to CUI will make it difficult to monitor who is accessing the information. For greater control over CUI access, you can restrict access to select personnel and ensure that they receive training on CUI management practices. These steps involve:

  • Finding systems and data stores that have CUI

  • Changing your protocols to include role-based access control (and confirming that only the right people and systems can access CUI)

  • Consistently reviewing access logs for accuracy

  • Encrypting and securing storage with encrypted drives or cloud environments with strict access logs to safeguard CUI at rest and in transit

  • Enforcing policy with a CSPM tool like Wiz by automating compliance with frameworks like NIST 800-171 or CMMC to meet federal contractor requirements

5. Build an SSP for CMMC compliance

Creating a system security plan (SSP) will make it easy for you to achieve certification. Your SSP document should include all aspects of your IT ecosystem that host CUI. It should also mention how that information flows through your organization’s authorization and authentication steps. 

In essence, an SSP gives you a security profile by defining system boundaries (like AWS environments that handle CUI), listing implemented controls (like AES-256 encryption or SIEM monitoring), and documenting interconnections (like APIs to third-party vendors).

You can implement your plan by following these steps:

  • Conduct an inventory for your systems that host CUI

  • Develop an information flow diagram that shows your current authorizations and authentication process 

  • Establish descriptions of your security controls and how to implement them

  • Create a process for updates based on system changes and CMMC standards

6. Create a POA&M for compliance

A plan of action and milestones (POA&M) is a prioritized roadmap for resolving compliance gaps and aligning security investments with business risk. It translates technical vulnerabilities into actionable items with clear ownership, timelines, and resource requirements.

Be sure to include the following considerations in your plan:

  • Track your metrics in real time through continuous monitoring.

  • Adopt automation tools for compliance checks and remediation.

  • Prioritize action items based on risk and your security picture.

7. Adopt a holistic solution for compliance and security

Clear steps, action plans, and team members are all part of achieving and maintaining CMMC. But you also need something that puts all of these things together to organize your compliance initiatives, improve cloud security through essential tools, and streamline your security posture.

Cloud-native application management platforms like Wiz provide the compliance frameworks and checks you need for automated, efficient data security management. Not only can you implement compliance, but you can also protect your entire cloud infrastructure by:

  • Gaining complete visibility across your cloud assets

  • Identifying and mitigating risks through prioritized alerts and action steps

  • Implementing continuous, agentless scanning to assess your entire cloud infrastructure

Penalties for non-compliance

Any organization that wants to secure a defense contract must comply with CMMC. Preserving the defense supply chain is essential to safeguarding confidential data, which makes CMMC certification non-negotiable. 

Additionally, non-compliance with the program could result in serious issues for contractors working with the DoD. Failing to secure certification could leave organizations liable for charges under the False Claims Act (FCA).

Non-compliance with the FCA carries serious consequences, including treble damages and civil penalties that range from $13,508 to $27,018 per false claim. While the DoD doesn’t calculate fines based on the number of unmet controls, organizations that fail to implement Level 2’s 110 requirements risk significant financial liability due to misrepresentation or failure to comply.

Other examples of cybersecurity maturity models

Cybersecurity models provide organizations with frameworks to improve their security. CMMC focuses on the US Defense Industrial base, but many other models exist for specific sectors and purposes. 

Here’s a comparison of four specific models:

Maturity modelFocusKey characteristicsGoverning body
CMMCDefense supply chain security for defense industrial base contractors
  • Requirement for DoD contractors
  • Third-party assessments for higher levels
  • Special focus on protection for CUI
US DoD
NIST CSFFoundational cybersecurity framework for all organizations. Alternatives include ISO 27001 and CIS Controls
  • Based on core functions: identify, protect, detect, respond, govern, and recover
  • Adopted across industries
NIST
C2M2Energy sector security for organizations operating within it
  • Based on 10 areas that cover critical infrastructure
  • Includes sector-specific controls and requirements
  • Focuses on operational security
Department of Energy
HITRUST CSFHealthcare security for organizations that operate within the industry
  • Widely adopted globally
  • Focuses on risk management and a process approach
  • Includes HIPAA
HITRUST Alliance

Besides CMMC’s focus on defense contractor security, some key differences between it and other models are that compliance is a mandatory expectation with CMMC, while many frameworks like NIST CSF offer voluntary adherence. CMMC also requires third-party assessment for high levels, where C2M2 asks for self-assessments. 

Achieving cloud compliance with Wiz

Wiz’s heat map for compliance

As we’ve seen, CMMC mandates ways to safeguard the defense supply chain and protect sensitive government data. Meeting compliance directives doesn’t have to be difficult—you just need the right tools. 

That’s where Wiz comes in—it leads solutions that help you ensure that your cloud environment complies with multiple industry regulations, including NIST compliance (800-171 and SP 800-53) and FedRAMP. Wiz’s platform also continuously monitors your systems and generates interactive heatmaps to assess your security and compliance posture comprehensively. 

Learn more about data governance today with Wiz’s free Guide to Data Governance and Compliance in the Cloud.

100+ Built-In Compliance Frameworks

See how Wiz eliminates the manual effort and complexity of achieving compliance in dynamic and multi-cloud environments.

Get a demo 
    OSZAR »