Article

Breaking Down the DoD’s Latest CMMC Guidance: What Defense Contractors Need to Know

February 26, 2025

The Department of Defense (DoD)’s new guidance outlining Cybersecurity Maturity Model Certification (CMMC) program requirements is now in full effect under CFR 32, and the guidance for contracting is in its final stages. If you do business with the DoD, this directly impacts your ability to win and keep contracts.

New administrations often bring shifts in priorities, but those waiting to see if CMMC will be cut need to reconsider. CMMC was introduced under the first Trump administration, and its lead architect at the time, Katie Arrington, was just named DoD Chief Information Security Officer (CISO), signaling a renewed commitment to protecting sensitive government data.

Additionally, enforcement actions against DoD contractors failing to meet cybersecurity requirements continue. In February 2025, Health Net Federal Services was hit with an $11 million False Claims Act judgment for non-compliance. This reinforces that cybersecurity matters—compliance is no longer optional, and breaches and fines cost far more than meeting requirements.

CMMC is not an optional program, and failing to prepare means you could lose eligibility for future government contracts, even if you’re currently compliant with DFARS 252.204-7012 or NIST SP 800-171. The phased rollout will soon make CMMC a hard requirement, meaning contractors and subcontractors must prove they meet security standards through self-assessments, third-party certifications, or government-led reviews.

If your company handles Federal Contract Information (FCI) or Controlled Unclassified Information (CUI), here’s what this means for you—and why you need to act now.

Why This Matters: The Risks of Inaction

If you don’t prepare for CMMC now, you face:

  • Lost Business Opportunities – If your company fails to meet the required CMMC level, you won’t be eligible to bid on DoD contracts, no matter how well you perform in other areas.
  • Supply Chain Disruptions – If your subcontractors aren’t compliant, they could be removed from contracts, leaving you scrambling to find new, certified partners. Prime contractors are mentioned 116 times in CFR 32, emphasizing the importance of monitoring supplier compliance.
  • Increased Scrutiny & Cybersecurity Requirements – The DoD is cracking down on cybersecurity compliance, and non-compliance could result in audits, contract loss, fines, and legal liability.

What This Means for Your Organization

1. Your CMMC Level Determines Your Next Steps

Not all companies will need a third-party assessment, but you must determine your required level now:

Level 2 (Third-Party Certification, with some self-attestation exceptions)

  • Who Needs It? - Companies handling CUI (e.g., Controlled Technical Information, Critical Infrastructure)
  • Assessment Type - Third-Party Assessment (C3PAO)
  • Key Requirement - Pass a formal CMMC certification assessment

Level 3 (Government Assessment)

  • Who Needs It? - Companies facing advanced persistent threats due to innovative technologies, designs, or high aggregation of CUI
  • Assessment Type - Government Assessment (DIBCAC)
  • Key Requirement - Implement NIST SP 800-172 enhanced protections

Key takeaway: If you handle CUI, you will likely need a third-party assessment and may also require a government assessment.

2. Deadlines Are Coming—Don’t Wait to Get Ready

The DoD is phasing in CMMC requirements, meaning they will be enforced on strict timelines:

· Phase 1:  Begins at Effective date. Where applicable, solicitations include Levels 1 and 2 self-assessment and some solicitations may require Level 2 certification.

· Phase 2: Begins 6 months later. Where applicable, solicitations include Level 2 certification. Some solicitations may require Level 3. Solicitations may specify the certification due at award or at option period.

· Phase 3: Begins 12 months later (18 months after effective date). Where applicable, solicitations include Level 1, 2 or 3 requirements. For Level 3 only, solicitation may specify due at option period (all others due at award).

· Phase 4: 12 months later (30 months after Effective Date), DoD intends all solicitations will include the applicable CMMC level requirements.

Key takeaway: These deadlines mean you must start preparing now, not when the rule goes into effect.

3. Your Subcontractors Must Also Be Compliant

Even if your company is ready, your subcontractors must also meet CMMC requirements. If a subcontractor fails compliance, prime contractors could lose eligibility to bid on contracts or be forced to replace key suppliers—potentially causing delays, cost overruns, or compliance failures.

Actionable Steps:

  • Review who in your supply chain will be impacted by CMMC.
  • Require subcontractors to start their CMMC readiness assessments now.
  • Consider working only with vendors already meeting NIST SP 800-171.

Key takeaway: Your compliance is only as strong as your weakest subcontractor—plan ahead.

4. Waivers Are Limited—Don’t Count on an Exception

In very limited circumstances, and in accordance with all applicable policies, procedures, and requirements, a Service Acquisition Executive (SAE) or Component Acquisition Executive (CAE) may elect to waive the inclusion of CMMC Program requirements in a solicitation or contract.

However, contractors and subcontractors will still be required to comply with all applicable cybersecurity and information security requirements.

How to Prepare Now

Step 1: Identify Your CMMC Level

  • Review contracts to determine if clauses require compliance at CMMC Level 1, 2, or 3.
  • Use CFR 32 to determine the specific compliance steps required for your contract level.

Step 2: Conduct a Cybersecurity Review

  • Compare your security controls to CFR 32 and NIST SP 800-171 or 800-172, depending on your level.
  • Assess your CUI boundary and create a complete inventory of assets categorized according to CMMC requirements.
  • Identify gaps and develop a Plan of Action and Milestones (POA&M) with timelines for completion to ensure you’re ready for your assessment.
  • Address vulnerabilities before scheduling your CMMC assessment.

Step 3: Get Your Subcontractors on Board

  • Ensure subcontractors understand their CMMC requirements.
  • Establish flow-down requirements in contracts to enforce compliance.
  • Consider vetting new subcontractors that already meet CMMC standards.

Step 4: Monitor Rulemaking and Plan Your Assessment Timelines

  • Track updates to CMMC rulemaking efforts.
  • Prepare for your assessment—if you require a third-party assessment, begin remediation efforts now to avoid surprises.

Final Thoughts: The Time to Act Is Now

CMMC compliance isn’t just another checkbox—it’s a requirement that directly impacts your ability to work with the DoD. The guidance makes it clear:

  • You will need a self-assessment, third-party assessment by a C3PAO, or possibly also a DIBCAC assessment against Level 3, depending on your contract’s clauses.
  • Waivers will be rare and should not be counted on as a long-term solution.
  • Your supply chain must also comply—your subcontractors’ non-compliance can disqualify your bids.
  • Waiting to start will put you behind, potentially costing you future contracts.

Bottom line: Contractors who prepare now will have a competitive advantage over those who wait. If your organization relies on DoD contracts, ensure your cybersecurity practices are compliant before it’s too late.

Start preparing today—CMMC is coming, whether you’re ready or not. Learn more about how Coalfire Federal guide you to compliance effectively and efficiently.

Amy Williams

Vice President of CMMC

Amy Williams began her career in Accounting Information Systems, a precursor to cybersecurity that imbued her with the talents and knowledge that she uses today. A member of multiple fields of study, Dr. Williams has ample experience understanding fraud, system errors in internal systems, and internet security protection. She has been on the forefront of developing cyber strategies for supply chains since the world wide web made the internet popular for sharing data in business. With both a Master’s Degree and PhD from Virginia Tech, Amy Williams has held prestigious positions with the NY Citizens Crime Commission where she built an alliance with the FBI, and she led the development of BlueVoyant's CMMC and CIS Advisory Practices prior to joining Coalfire Federal.

View Full Bio