Skip to main content
CMMC Compliance

CMMC Compliance: Protect CUI and Win Defense Contracts

CMMC (Cybersecurity Maturity Model Certification) compliance services prepare defense contractors and their subcontractors to meet Department of Defense cybersecurity requirements for handling Controlled Unclassified Information (CUI). Vigil Cyber implements the 110 controls required for CMMC Level 2 certification based on NIST SP 800-171.

CMMC Is Not Optional — It Is a Contract Requirement

Starting with contracts awarded under DFARS clause 252.204-7021, DoD contractors must demonstrate CMMC compliance at the level required by the contract. Self-attestation was eliminated for Level 2 requirements — organizations handling CUI above a basic threshold must be assessed and certified by a C3PAO (Certified Third-Party Assessor Organization). A company without the required CMMC level is ineligible for award, regardless of price or technical merit. The window to prepare is now — not when the next solicitation lands.

CMMC 2.0 Framework

Three Levels, One Mandatory Requirement

CMMC 2.0 simplified the original five-level model to three levels aligned with the sensitivity of the information handled. Your contract determines which level applies — and which assessment pathway is required.

1
Level 1

Foundational

Covers 17 basic cybersecurity practices derived from FAR 52.204-21. Protects Federal Contract Information (FCI) — not CUI. Annual self-assessment with senior official affirmation.

Applies to: Contracts with FCI, no CUI

Assessment: Annual self-assessment

Practices: 17 practices

2
Level 2

Advanced

Aligns with all 110 practices in NIST SP 800-171. Required for contracts involving CUI. C3PAO assessment required for critical national security programs; self-assessment permitted for some non-prioritized contracts.

Applies to: Contracts with CUI (most defense work)

Assessment: C3PAO or self-assessment

Practices: 110 practices

3
Level 3

Expert

Builds on Level 2 with practices from NIST SP 800-172. Targets organizations supporting DoD's highest priority programs. Government-led assessment. Required for select critical programs.

Applies to: Highest priority DoD programs

Assessment: DCSA-led government assessment

Practices: 110 + additional practices

NIST SP 800-171

The Technical Foundation: NIST 800-171

CMMC Level 2 maps directly to the 110 security practices in NIST Special Publication 800-171, which defines how contractors must protect CUI in non-federal systems. Level 2 requires all 110 practices to be fully implemented — not partially implemented, not compensating controls. Each practice has a specific assessment objective, and C3PAO assessors verify implementation through interviews, document review, and technical testing.

The SPRS (Supplier Performance Risk System) score is the numerical expression of your NIST 800-171 implementation status. A perfect score is 110. Missing or partially implemented practices reduce the score. DoD uses SPRS scores in source selection — a low score is visible to contracting officers and program managers before contract award. Improving your SPRS score is not just about compliance: it is a competitive differentiator.

For organizations in manufacturing and industrial sectors, see how CMMC integrates with broader IT/OT security requirements .

NIST 800-171 Practice Families

Access Control (AC)

22 practices

User permissions, remote access, least privilege, system use notifications.

Audit & Accountability (AU)

9 practices

System audit logs, review and reporting, protection of audit information.

Configuration Management (CM)

9 practices

Baseline configurations, change control, security configuration settings.

Identification & Authentication (IA)

11 practices

User identity verification, multi-factor authentication, authenticator management.

Incident Response (IR)

3 practices

Incident handling capability, tracking, reporting, and testing.

Maintenance (MA)

6 practices

Controlled maintenance, media sanitization, remote maintenance controls.

Media Protection (MP)

9 practices

Media access, marking, storage, transport, and sanitization.

Personnel Security (PS)

2 practices

Screening, termination and transfer, third-party personnel.

Risk Assessment (RA)

3 practices

Risk assessments, vulnerability scanning, remediation.

Security Assessment (CA)

4 practices

System assessment, plan of action development, monitoring.

System & Communications (SC)

16 practices

Network boundary protection, cryptographic protections, architecture.

System & Information Integrity (SI)

7 practices

Malware protection, security alerts, patching, data integrity.

CMMC Services

From Gap Analysis to C3PAO Assessment-Ready

CMMC compliance requires closing every gap before assessment — not after. Vigil Cyber systematically implements the 110 NIST 800-171 practices, manages your POA&M, and prepares your team for the C3PAO assessment process.

CMMC Readiness Assessment

Current State Analysis

Your SPRS score, gap list, and remediation roadmap — before the C3PAO sees your environment.

We conduct a structured assessment against all 110 NIST 800-171 practices using the CMMC assessment methodology. Each practice is scored Met, Not Met, or Partially Met. The output includes your current SPRS score, a prioritized remediation list, and a realistic timeline for assessment readiness.

CUI Identification & Scoping

CUI Environment Definition

Know exactly where CUI lives, flows, and leaves your environment — and scope your assessment boundary.

Before you can protect CUI, you must identify it. We conduct CUI discovery across your systems, map data flows, identify where CUI enters and exits, and define the assessment boundary. Proper scoping can significantly reduce assessment complexity and cost by isolating CUI handling to a defined enclave.

NIST 800-171 Control Implementation

Technical Remediation

Close gaps across all 14 practice families with documented implementation evidence.

We implement the technical controls across access control, identification and authentication, audit and accountability, configuration management, system integrity, and communications protection that the 110 NIST 800-171 practices require. Each implementation is documented in the format C3PAO assessors use for evidence review.

System Security Plan (SSP) Development

Required Documentation

C3PAO-ready SSP that describes your system boundary, CUI flows, and control implementation.

The System Security Plan is the primary artifact C3PAO assessors review. It must describe your system boundary, the CUI processed and stored, the controls implemented, how each practice is satisfied, and responsible parties. We develop and maintain your SSP as a living document that reflects your actual environment.

POA&M Management

Plan of Action & Milestones

Document residual gaps with remediation plans that satisfy assessment requirements.

A Plan of Action and Milestones (POA&M) documents practices that are not yet fully implemented, with scheduled milestones for remediation. For Level 2 assessments, a POA&M can be accepted for certain deficiencies — but practices in the highest-impact families typically cannot be deferred. We manage your POA&M and track remediation progress against milestones.

Enclave Strategy & Architecture

Scope Reduction

Contain CUI to a defined, isolated environment to reduce assessment scope and cost.

For organizations where CUI touches only part of their environment, an enclave strategy can isolate CUI processing to a defined boundary — reducing the number of systems in scope for the assessment. We design, implement, and document CUI enclaves that satisfy CMMC scoping guidance while enabling the rest of your environment to operate outside the assessment boundary.

Common Questions

Frequently Asked Questions

Defense contractors and DoD supply chain organizations ask us these questions about CMMC 2.0.

Ready to Secure Your Business?

Get a free security assessment and discover how Vigil Cyber can protect your organization for a fraction of the cost of building an internal team.

24/7

SOC Coverage

<1hr

Response Time

99.9%

Uptime SLA