CMMC Compliance: Protect CUI and Win Defense Contracts
CMMC (Cybersecurity Maturity Model Certification) compliance services prepare defense contractors and their subcontractors to meet Department of Defense cybersecurity requirements for handling Controlled Unclassified Information (CUI). Vigil Cyber implements the 110 controls required for CMMC Level 2 certification based on NIST SP 800-171.
CMMC Is Not Optional — It Is a Contract Requirement
Starting with contracts awarded under DFARS clause 252.204-7021, DoD contractors must demonstrate CMMC compliance at the level required by the contract. Self-attestation was eliminated for Level 2 requirements — organizations handling CUI above a basic threshold must be assessed and certified by a C3PAO (Certified Third-Party Assessor Organization). A company without the required CMMC level is ineligible for award, regardless of price or technical merit. The window to prepare is now — not when the next solicitation lands.
Three Levels, One Mandatory Requirement
CMMC 2.0 simplified the original five-level model to three levels aligned with the sensitivity of the information handled. Your contract determines which level applies — and which assessment pathway is required.
Foundational
Covers 17 basic cybersecurity practices derived from FAR 52.204-21. Protects Federal Contract Information (FCI) — not CUI. Annual self-assessment with senior official affirmation.
Applies to: Contracts with FCI, no CUI
Assessment: Annual self-assessment
Practices: 17 practices
Advanced
Aligns with all 110 practices in NIST SP 800-171. Required for contracts involving CUI. C3PAO assessment required for critical national security programs; self-assessment permitted for some non-prioritized contracts.
Applies to: Contracts with CUI (most defense work)
Assessment: C3PAO or self-assessment
Practices: 110 practices
Expert
Builds on Level 2 with practices from NIST SP 800-172. Targets organizations supporting DoD's highest priority programs. Government-led assessment. Required for select critical programs.
Applies to: Highest priority DoD programs
Assessment: DCSA-led government assessment
Practices: 110 + additional practices
The Technical Foundation: NIST 800-171
CMMC Level 2 maps directly to the 110 security practices in NIST Special Publication 800-171, which defines how contractors must protect CUI in non-federal systems. Level 2 requires all 110 practices to be fully implemented — not partially implemented, not compensating controls. Each practice has a specific assessment objective, and C3PAO assessors verify implementation through interviews, document review, and technical testing.
The SPRS (Supplier Performance Risk System) score is the numerical expression of your NIST 800-171 implementation status. A perfect score is 110. Missing or partially implemented practices reduce the score. DoD uses SPRS scores in source selection — a low score is visible to contracting officers and program managers before contract award. Improving your SPRS score is not just about compliance: it is a competitive differentiator.
For organizations in manufacturing and industrial sectors, see how CMMC integrates with broader IT/OT security requirements .
NIST 800-171 Practice Families
Access Control (AC)
22 practicesUser permissions, remote access, least privilege, system use notifications.
Audit & Accountability (AU)
9 practicesSystem audit logs, review and reporting, protection of audit information.
Configuration Management (CM)
9 practicesBaseline configurations, change control, security configuration settings.
Identification & Authentication (IA)
11 practicesUser identity verification, multi-factor authentication, authenticator management.
Incident Response (IR)
3 practicesIncident handling capability, tracking, reporting, and testing.
Maintenance (MA)
6 practicesControlled maintenance, media sanitization, remote maintenance controls.
Media Protection (MP)
9 practicesMedia access, marking, storage, transport, and sanitization.
Personnel Security (PS)
2 practicesScreening, termination and transfer, third-party personnel.
Risk Assessment (RA)
3 practicesRisk assessments, vulnerability scanning, remediation.
Security Assessment (CA)
4 practicesSystem assessment, plan of action development, monitoring.
System & Communications (SC)
16 practicesNetwork boundary protection, cryptographic protections, architecture.
System & Information Integrity (SI)
7 practicesMalware protection, security alerts, patching, data integrity.
From Gap Analysis to C3PAO Assessment-Ready
CMMC compliance requires closing every gap before assessment — not after. Vigil Cyber systematically implements the 110 NIST 800-171 practices, manages your POA&M, and prepares your team for the C3PAO assessment process.
CMMC Readiness Assessment
Current State Analysis
Your SPRS score, gap list, and remediation roadmap — before the C3PAO sees your environment.
We conduct a structured assessment against all 110 NIST 800-171 practices using the CMMC assessment methodology. Each practice is scored Met, Not Met, or Partially Met. The output includes your current SPRS score, a prioritized remediation list, and a realistic timeline for assessment readiness.
CUI Identification & Scoping
CUI Environment Definition
Know exactly where CUI lives, flows, and leaves your environment — and scope your assessment boundary.
Before you can protect CUI, you must identify it. We conduct CUI discovery across your systems, map data flows, identify where CUI enters and exits, and define the assessment boundary. Proper scoping can significantly reduce assessment complexity and cost by isolating CUI handling to a defined enclave.
NIST 800-171 Control Implementation
Technical Remediation
Close gaps across all 14 practice families with documented implementation evidence.
We implement the technical controls across access control, identification and authentication, audit and accountability, configuration management, system integrity, and communications protection that the 110 NIST 800-171 practices require. Each implementation is documented in the format C3PAO assessors use for evidence review.
System Security Plan (SSP) Development
Required Documentation
C3PAO-ready SSP that describes your system boundary, CUI flows, and control implementation.
The System Security Plan is the primary artifact C3PAO assessors review. It must describe your system boundary, the CUI processed and stored, the controls implemented, how each practice is satisfied, and responsible parties. We develop and maintain your SSP as a living document that reflects your actual environment.
POA&M Management
Plan of Action & Milestones
Document residual gaps with remediation plans that satisfy assessment requirements.
A Plan of Action and Milestones (POA&M) documents practices that are not yet fully implemented, with scheduled milestones for remediation. For Level 2 assessments, a POA&M can be accepted for certain deficiencies — but practices in the highest-impact families typically cannot be deferred. We manage your POA&M and track remediation progress against milestones.
Enclave Strategy & Architecture
Scope Reduction
Contain CUI to a defined, isolated environment to reduce assessment scope and cost.
For organizations where CUI touches only part of their environment, an enclave strategy can isolate CUI processing to a defined boundary — reducing the number of systems in scope for the assessment. We design, implement, and document CUI enclaves that satisfy CMMC scoping guidance while enabling the rest of your environment to operate outside the assessment boundary.
Frequently Asked Questions
Defense contractors and DoD supply chain organizations ask us these questions about CMMC 2.0.
Ready to Secure Your Business?
Get a free security assessment and discover how Vigil Cyber can protect your organization for a fraction of the cost of building an internal team.
24/7
SOC Coverage
<1hr
Response Time
99.9%
Uptime SLA