Free Consultation
#cmmc
#data security

CMMC Level 2 Certification Checklist

October 8, 2024

CMMC Level 2 Certification Checklist

CMMC Level 2 certification requires contractors to implement 110 NIST SP 800-171 requirements and complete a third-party conformity assessment  

The Cybersecurity Maturity Model Certification (CMMC) is an important milestone for defense contractors to address, measuring cybersecurity maturity at three levels - Foundational (Level 1), Advanced (Level 2), and Expert (Level 3).  

There is no overlap between CMMC Level 1 and Level 2. CMMC Level 1 is exclusively focused on protecting Federal Contract Information (FCI) and involves 15 FAR 52.204-21 requirements. CMMC Level 2 shifts its focus to protecting Controlled Unclassified Information (CUI) and requires organizations to implement 110 security controls from NIST SP 800-171. As a result, CMMC Level 2 expands on the basic security practices established in Level 1 and is more complex, requiring more time and resources to achieve.  

Delve deeper into the CMMC Level 2 compliance requirements with our CMMC Level 2 checklist:

What is CMMC Level 2?

CMMC Level 2 is an advanced level of CMMC certification. It applies to current and bidding DoD contractors that have the DFARS 252.204-7012 requirements in their contracts that handle CUI, CTI, and ECI:

Read more about CUI protection requirements for Dod Contractors

CMMC Level 2 requirements consist of 110 security controls listed in NIST SP 800-171 distributed across 17 control families.  

Read how to determine your CMMC level.

What is the Difference Between CMMC Level 2 and NIST 800-171?

The main difference between NIST 800 171 and CMMC Level 2 is that the former is set by the National Institute of Standards and Technology (NIST) as a security standard for CUI protection. At the same time, CMMC is a certification that is based on meeting the NIST 800-171 requirements.  

CMMC Level 2 closely maps to the 110 controls of NIST SP 800-171, with some additional practices. It requires documentation of security practices and policies to be in place and includes maturity elements that assess how well an organization has institutionalized its cybersecurity practices. CMMC Level 2 requires a third-party assessment from an accredited CMMC Third-Party Assessor Organization (C3PAO).  

NIST SP 800-171 focuses purely on implementing the 110 technical and operational security controls. It does not include a certification or third-party audit component.

CMMC 2.0. Level 2 Control Requirements

CMMC Level 2 requirements include 110 controls grouped under 17 domains:  

Access Control

Access control is the most extensive category within the NIST 800-171 control families. It mandates organizations to oversee all access activities within their IT environment and restrict access to systems and information. Key requirements include:

Awareness and Training

Provide security literacy training to managers, system administrators, and other users as part of initial training, when required by system changes, or onexperiencing insider threat, social engineering, and social mining. Provide role-based security training to organizational personnel and regularly update security literacy training content

Audit and Accountability

Audit and Accountability controls require evolve around retaining audit logs and records and keeping users accountable for their actions. Organizations must have audit logs to detect any unauthorized activity by:

Configuration Management

Configuration management requires businesses have to establish and maintain baseline configurations. These include monitoring user-installed software identifying deviations from established configuration settings, and any trackling any changes in organization’s systems. The compliance requirements include:

Identification and Authentication

The identification and authentication control family requires users to verify the identity of users, devices, or systems before granting access to resources within an organization’s IT environment. It ensures that only authorized individuals/entities can access sensitive systems, data, or applications. Some of the best practices under this control family include:  

Incident Response

This control family obligates organizations to have an updated incident response strategy that ensures the incidents are detected, responsed, communicated and addressed timely and effectively. In particulair, orgnizations must:

Maintenance

Organizations must implement effective system maintenance practices to safeguard CUI and other sensitive information from potential threats or compromise. Among the activities that organizations must perform as part of systems maintenance are:

Media Protection

Under the media protection control, orgasnizations must ensure the security of system media containing CUI. Some of the specific activities include, but are not limited to:

Personnel Security

This is a small family of controls that requires businesses to properly manage personnel changes such as hiring, transfers, and offboarding. This includes ensuring necessary agreements, identity verifications, background checks, and other personnel controls.  

Physical Protection

Physical Protection involves safeguarding hardware, software, networks, and data from damage or loss caused by physical events. This domain requires organizations to take various actions to reduce the risk of physical harm, such as:

Risk Assessment

There are two major requirements that cover the performance of regular risk assessments:

Organizations are required to do both to meet this control.  

Security Assessment

Organizations must monitor and assess thei security controls to determine if they are effective enough to help keep data secure. Under this control family, organizations are required to:

System and Communications Protection

This is a broad set of requirements consisting of 16 controls aimed at monitoring, controlling, and securing information transmitted or received by IT systems. Key activities include:

System and Information Integrity

This set of controls requires organizations to swiftly detect and fix system vulnerabilities while protecting critical assets from malicious code. Key tasks include:

Planning

This control family addresses policies and procedures for the protection of CUI and includes the requirements to:

System and Service Acquisition

Organizations should apply systems security engineering principles to system modifications and development and ensure

Supply Chain Risk Management

This control family requires organizations to develop a plan for managing supply chain risks associated with the research and development, design, manufacturing, acquisition, delivery, integration, operations, maintenance, and disposal of the system, system components, or system services. Besides this, organizations must :

CMMC Level 2 Assessment and Certification

CMMC Level 2 Self-Affirmation Requirements

Every organization with DFARS Clause 252.204-7021 requirements in their contracts is obligated to:

NOTE: If the organization's FCI and CUI boundaries overlap, the CMMC Level 2 annual assessment and self-affirmation letter will be sufficient to meet the Level 1 requirements.  Unlike Level 1, CMMC Level 2 allows conditional certification per the Plans of Actions & Milestones (POA&M).  

CMMC Level 2 Third-Party Certification Requirements

CMMC Level 2 requires organizations to undergo a third-party CMMC Conformity Assessment once every three years. Only accredited 3rd Party Assessment Organizations (C3PAO) are authorized to conduct the assessments. To fully meet all CMMC Level 2 security requirements, organizations must be either conditionally certified per the POA&M threshold or fully meet all Security Requirements ( §170.17).

CMMC Level 2 Plans of Action & Milestones (POA&M)

POA&M is a formal document used by organizations to identify and manage gaps in their cybersecurity practices. The POA&M outlines specific actions the organization needs to take in order to address and remediate deficiencies or weaknesses discovered during a security assessment, such as non-compliance with CMMC requirements. CMMC POA&Ms is governed by the paragraph §170,21(a)(2).  

All organizations are expected to have had and maintain a POA&M for all actions needed to get them into compliance. During a Conformity Assessment, your organization should be able to provide a POA&M completed remediations to address deficiencies.  

POA&M guidance is about eligibility for certification and, if so, what kind it is. In short, under CMMC Level 2, the three certification states are:

CMMC Level 2 Compliance Checklist

Summing up, here's a concise checklist to help you achieve CMMC Level 2 compliance:  

Scope your environment. Determine the types of information your organization handles (e.g., FCI, CUI). Establish which systems, networks, and processes will be included in the assessment. Evaluate any third-party vendors or partners that may impact your compliance.  

Understand your requirements. Familiarize yourself with CMMC Level 2 requirements, focusing on the NIST SP 800-171 controls (110 total).  

Conduct a gap analysis. Assess your current cybersecurity practices against the NIST SP 800-171 controls to identify gaps where your organization is not meeting the requirements.  

Develop a Plan of Action & Milestones (POA&M). Create a document outlining how to address gaps including timelines and responsible personnel for remediation.  

Perform annual self-assessments. Conduct annual self-assessments to evaluate compliance with NIST SP 800-171 controls. Document findings and continuously improve practices.  

Prepare for external assessments. Prepare for third-party assessments by choosing a C3PAO that is fully authorized by the Cyber AB (CMMC Accreditation body). Gather all documentation, policies, and evidence of compliance for the assessor.  

Conduct a third-party conformity assessment and provide a POA&M completed remediations to address deficiencies and become conditionally or fully CMMC certified.

Planet 9 services for CMMC Level 2 Compliance

To reduce your organization’s burden with CMMC 2.0. compliance efforts, engage third-party security and compliance services, such as Planet 9. For CMMC Level 2, Planet 9 can support your organization with the following services:

Book a free consultation to learn more or contact the Planet 9 team for help with your security and compliance challenges. We’ll be happy to assist!  

Book a Free Consultation

Schedule a free consultation today to explore how Planet 9 can help you achieve your security and compliance goals.
Book Free Consultation

FAQs

How does a PTCISO service differ from hiring a full-time CISO?
A part-time CISO offers the same strategic oversight and expertise as a full-time CISO but on a flexible, cost-effective basis. It’s ideal for small to mid-sized businesses that need executive-level guidance without the overhead.
Is a virtual CISO service suitable for regulated industries like healthcare or finance?
Yes, virtual CISOs (or fractional CISOs) are especially valuable for industries with strict compliance requirements such as HIPAA, PCI DSS, or GLBA. They help ensure your organization meets regulatory standards and is prepared for audits.
What can I expect during a vCISO engagement?
Our vCISO service typically includes cybersecurity assessments, program development, compliance planning, incident response strategy, vendor risk management, and ongoing executive reporting tailored to your business.
How do I know if my business needs a CISO-as-a-Service?
If you lack in-house security leadership, struggle with compliance, or face growing cyber risks, a vCISO can fill that gap, providing strategic direction, improving resilience, and helping you make smarter security investments.

Related blog posts