Free Consultation
#cmmc
#compliance

CMMC Level 1 Checklist

September 24, 2024

CMMC Level 1 Checklist

On September 10, 2025, the Department of Defense (DoD) published its final Cybersecurity Maturity Model Certification (CMMC 2.0.). The  framework measures cybersecurity maturity at three levels - Foundational (Level 1), Advanced (Level 2), and Expert (Level 3). Each CMMC level is based on various considerations, including regulations, implementation complexity, the type and sensitivity of the information, threats, and costs. 

CMMC Level 1 organizations should already have established internal practices to ensure sensitive data is accessed only by authorized users and protected from basic security risks. CMMC Level 1 may seem simple at first glance. Yet, it quickly becomes more complex once contract terms, self-assessments, and reporting obligations come into play. What looks like “basic cybersecurity” often leaves people unsure about which data security measures to apply, how to demonstrate compliance, and whether internal practices are sufficient. 

This CMMC Level 1 Checklist breaks the requirements down into clear, practical steps, helping organizations understand what to focus on, where common gaps appear, and how to approach CMMC Level 1 compliance with confidence. 

What is CMMC Level 1?

Read how to determine your CMMC Level

CMMC Maturity Level 1, also called Foundational, is the entry-level tier of the CMMC framework. Unlike CMMC Level 2, it applies to organizations that handle Federal Contract Information (FCI) but do not store, process, or transmit Controlled Unclassified Information (CUI). FCI refers to non-public information related to a U.S. government contract that is provided by or generated for the government during contract performance and is not intended for public release.

In practical terms, FCI represents routine government contract information that must be safeguarded using fundamental cybersecurity practices. From a business perspective, FCI typically includes everyday contractual data such as:

While this information is not considered highly sensitive, it still requires basic protection to prevent unauthorized access or disclosure.

CMMC Level 1 focuses on basic cybersecurity hygiene. Organizations must implement 15 fundamental security practices designed to protect FCI from unauthorized access or disclosure. 

CMMC 2.0. Level 1 control requirements

CMMC Level 1 requirements are based on a set of foundational cybersecurity practices that cover 15 FAR security controls across six core security families: Access control, Identification and authentication, Media protection, Physical protection, Systems and communication, protection, System and information integrity.

Access controls

To successfully meet this requirement, all the users’ accounts must be protected with a username, a strong password, and MFA. Organizations must also implement role-based access controls (RBAC) for all systems that handle FCI. Additionally, they must maintain an active log of all assets (people, processes, and technologies) authorized to access organizational resources. 

It's important to keep track of who is allowed to post or manage information on public systems and platforms. There should be clear guidelines to prevent FCI from being shared on these platforms and a review process before any content is made public. Regularly check all public content to make sure no FCI is shared, and have a quick way to remove any incorrect or unauthorized FCI if needed.

Identification and authorization

To meet these requirements, one should clearly know who and what can access their systems. This starts with assigning unique identities to users and devices, so every login and action can be traced back to an individual. Clear identification reduces confusion, supports accountability, and makes it easier to investigate issues if something goes wrong.

In practice, when setting up accounts in platforms like Azure or Google Workspace, companies should follow defined naming and access standards rather than creating accounts randomly. This ensures that access remains controlled, while reducing the risk of unauthorized or unmanaged access to critical systems.

Media protection

The information systems media include mobile devices, portable storage devices, and digital storage components found in devices. Proper media protection practices would prevent the retrieval or reconstruction of sensitive information from the device.

NIST SP 800-88 provides guidance on best practices for media sanitation.

To ensure this control, the organization should establish a media sanitization procedure requiring all system media to be cleared, purged, or destroyed before reuse or disposal. Before reusing any device, all data should be fully wiped to prevent recovery. This applies to laptops, desktops, mobile devices, and removable media. Devices intended for disposal should be restored to factory settings, wiped clean of all previously stored data, and properly destroyed prior to disposal.

Physical access

To implement physical access control requirements, one should create a list identifying all individuals permitted to access organizational spaces, including detailed information about areas with enhanced access restrictions. Additionally, it is necessary to implement physical barriers, such as fences, secure doors, and windows, to prevent unauthorized access to its devices and facilities.

System and communications protection

In practice , organizations must develop documentation that outlines the data flows across the network, highlighting both external and critical internal access boundaries (e.g., cloud applications, endpoints, etc.)

It is also necessary to protect against dangerous web domains and applications, including those hosting phishing scams, exploits, and other malicious content. Utilize technologies such as web filtering to block web traffic to low-reputation sources.

System and Information Integrity

Organizations need to develop policies and procedures to check vendor resources for available patches. It is also required to create processes to evaluate update severity and determine remediation deadlines for flaws. Consider using automated solutions and anti-malware products to accurately identify threats. 

It's important to create and keep an up-to-date inventory of all assets that can access the organization’s resources. This helps identify potential entry points into the information system that could be used to introduce malicious code. Protection measures should cover servers, workstations, mobile devices, and network appliances, such as firewalls and switches.

It is also necessary to determine the frequency at which its environment should be scanned for malicious code (computer viruses, worms, Trojan horses, logic bombs, spyware) and define that frequency in its documented policies and procedures. Best practice is to have the antivirus solution run a full system scan at least once daily. Additionally, the antivirus solution should conduct real-time scans on all emails, files, attachments, and downloads.

CMMC Level 1 self-assessment

Compliance at Level 1 is demonstrated through an annual self-assessment, rather than a third-party audit. Although it is the entry-level requirement, Level 1 is mandatory for applicable DoD contracts, and noncompliance may exclude an organization from contract eligibility. From a business standpoint, CMMC Level 1 sets a minimum, defensible security baseline and often acts as a foundation for scaling to higher CMMC levels as organizations take on work involving more sensitive DoD information.

For CMMC Level 1, organizations must complete a self-assessment to confirm compliance with basic cybersecurity safeguards. In practice, this includes: 

Please note that there are two NOs in the CMMC Level 1 Self Assessment:

1. NO POA&Ms are permitted for CMMC Level 1.

2. NO 3rd-party conformity assessment and certification is necessary for Level 1. 

If an organization fails to meet CMMC Level 1 compliance, standard contractual penalties will apply. Additionally, the organization will not be eligible for new contracts requiring CMMC Level 1 or higher until they successfully complete a valid self-assessment for Level 1, as stated in §170.15(a)(1)(ii).

Boost your CMMC Level 1 compliance with Planet 9

With the broad scope of practice controls under CMMC 2.0, DoD contractors and subcontractors may seek guidance and oversight from CMMC specialists. Planet 9 can support your CMMC Level 1 compliance efforts with the following CMMC certification readiness services:

Book a free consultation to learn more, or contact the Planet 9 team for help with your security and compliance challenges. We’ll be happy to assist!

Website: https://planet9security.com

Email:  info@planet9security.com

Phone:  888-437-3646

Book a Free Consultation

Schedule a free consultation today to explore how Planet 9 can help you achieve your security and compliance goals.
Book Free Consultation

FAQs

How does a vCISO service differ from hiring a full-time CISO?
A part-time CISO offers the same strategic oversight and expertise as a full-time CISO but on a flexible, cost-effective basis. It’s ideal for small to mid-sized businesses that need executive-level guidance without the overhead.
Is a virtual CISO service suitable for regulated industries like healthcare or finance?
Yes, virtual CISOs (or fractional CISOs) are especially valuable for industries with strict compliance requirements such as HIPAA, PCI DSS, or GLBA. They help ensure your organization meets regulatory standards and is prepared for audits.
What can I expect during a vCISO engagement?
Our vCISO service typically includes cybersecurity assessments, program development, compliance planning, incident response strategy, vendor risk management, and ongoing executive reporting tailored to your business.
How do I know if my business needs a CISO-as-a-Service?
If you lack in-house security leadership, struggle with compliance, or face growing cyber risks, a vCISO can fill that gap, providing strategic direction, improving resilience, and helping you make smarter security investments.

FAQs

What is CMMC Level 1 compliance?
CMMC Level 1 represents the Foundational level of the Cybersecurity Maturity Model Certification (CMMC). It focuses on protecting Federal Contract Information (FCI) through 17 basic cybersecurity practices derived from NIST SP 800-171. These include access control, identification and authentication, system monitoring, and other controls that form the first step toward full CMMC maturity.
Who needs to comply with CMMC Level 1?
Any contractor or subcontractor that works with the U.S. Department of Defense and handles FCI must meet Level 1 CMMC requirements. This includes businesses providing products or services to prime contractors, even if they don’t process Controlled Unclassified Information (CUI).
How can I prepare for a CMMC Level 1 assessment?
Start by conducting a self-assessment using a reliable CMMC Level 1 checklist. Review each control, document supporting evidence, and remediate any gaps through security policy updates, employee training, and improved access controls before submitting your self-attestation to the DoD Supplier Performance Risk System (SPRS).
What are the common challenges with CMMC Level 1 compliance?
Businesses often struggle with documenting security controls, maintaining consistent access management, and ensuring employee awareness. Working with a qualified cybersecurity consultant helps interpret DoD requirements and establish repeatable processes.

Related blog posts