Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
Background image for CMMC Checklist: Audit Prep Guide for DoD Contractors
Cybersecurity 101/Cybersecurity/CMMC Checklist

CMMC Checklist: Audit Prep Guide for DoD Contractors

CMMC 2.0 requires independent verification of DoD contractor cybersecurity controls. Use this CMMC checklist to prepare for audit from scoping to certification.

CS-101_Cybersecurity.svg
Table of Contents
What Is CMMC (Cybersecurity Maturity Model Certification)?
Who Needs a CMMC Checklist?
How to Determine Your Required CMMC Level
Matching data type to certification level
Understanding CMMC Levels Before Using a Checklist
Pre-Assessment Readiness Checklist
CMMC Level 1 Checklist (Foundational Controls)
CMMC Level 2 Checklist (Advanced Controls)
CMMC Level 3 Checklist (Expert-Level Controls)
Documentation and Evidence Checklist
Common Mistakes in CMMC Checklist Implementation
Scoping Errors that Derail Assessments
Documentation that Describes Intent, not Reality
POA&M Mismanagement
CMMC Assessment Costs and Timeline Expectations
Typical Timeline Ranges
Cost Considerations
Best Practices for Using a CMMC Checklist
Start with CUI Discovery, not Control Implementation
Segment your Network Before Assessment
Build Evidence over Months, not Days
Prepare your People for Interviews
Enforce Subcontractor Flow-Down Requirements
Key Takeaways

Related Articles

  • What Is the DORA Regulation? EU Digital Resilience Framework
  • Ethical Hacker: Methods, Tools & Career Path Guide
  • What Is Session Fixation? How Attackers Hijack User Sessions
  • What Is Insecure Direct Object Reference (IDOR)?
Author: SentinelOne | Reviewer: Arijeet Ghatak
Updated: April 30, 2026

What Is CMMC (Cybersecurity Maturity Model Certification)?

A DoD contractor loses a major defense contract because they assumed self-attestation to NIST SP 800-171 was enough. As of November 10, 2025, it isn't. The Cybersecurity Maturity Model Certification (CMMC) 2.0 is a DoD cybersecurity certification framework that verifies defense contractor implementation of existing federal security requirements through independent assessment. It does not create new security requirements. It adds independent verification to controls already mandated under DFARS 7012 since 2017.

The program is codified in 32 CFR 170 (CMMC Program Rule) and enforced through 48 CFR 204 (DFARS Acquisition Rule). The Cyber AB serves as the accreditation body for the CMMC ecosystem. If you handle Federal Contract Information (FCI) or Controlled Unclassified Information (CUI) for the Department of Defense, CMMC applies to you.

Per 48 CFR 204.7502, contracting officers shall not award contracts to offerors without current CMMC status at the required level. Your CMMC checklist preparation starts now, not when a solicitation lands on your desk.

Before CMMC, contractors self-scored their NIST SP 800-171 implementation and submitted results to the Supplier Performance Risk System (SPRS). Self-attestation created a trust gap across the defense industrial base (DIB), allowing contractors to claim compliance without independent validation.

CMMC closes this gap by requiring third-party or government assessments depending on the sensitivity of data you handle. Every control you claim in your System Security Plan (SSP) must survive examination, interview, and hands-on technical testing by trained assessors. Your security operations tools, audit logging, access controls, and incident response procedures all fall within CMMC's assessment scope. The framework organizes these requirements into three certification levels, each with its own assessment process.

Who Needs a CMMC Checklist?

Not every organization interacting with the DoD faces identical CMMC requirements, but the scope is broader than many contractors expect. Any company that stores, processes, or transmits FCI or CUI as part of a DoD contract must achieve the appropriate CMMC certification level before contract award.

Prime contractors holding DoD contracts that include the DFARS 252.204-7021 clause must demonstrate current CMMC status at the level specified in the solicitation. This requirement flows down through the supply chain: subcontractors that handle CUI in support of contract performance must independently meet the required CMMC level, not simply rely on the prime contractor's certification. Per an NDIA supply chain analysis, DFARS flow-down requirements apply without regard to supply chain tier position.

Organizations that should maintain a CMMC checklist include defense manufacturers and suppliers handling CUI, IT service providers and managed service providers with access to CUI environments, research institutions under DoD-funded contracts, and staffing or professional services firms whose employees access CUI systems. Small businesses are not exempt. If your contract involves CUI, CMMC Level 2 requirements apply regardless of company size or revenue.

The threshold is straightforward: if your contract currently includes or will include DFARS 252.204-7021, you need a structured compliance process. A CMMC checklist lets you track control implementation, document evidence collection, and identify gaps before a C3PAO or DIBCAC assessor does.

How to Determine Your Required CMMC Level

Your required CMMC level depends on the type of information you handle under a DoD contract. The determination starts with one question: does your contract involve CUI?

Matching data type to certification level

  • FCI only (Level 1): Your contract involves basic Federal Contract Information but no CUI markings. You implement 17 practices from FAR 52.204-21 and self-assess annually.
  • CUI (Level 2): Your contract includes data marked as Controlled Unclassified Information under the CUI Registry. You implement all 110 NIST SP 800-171 practices and undergo a C3PAO assessment or self-assessment depending on the contract.
  • High-value CUI (Level 3): Your contract involves CUI on critical programs identified by the DoD. You implement 134 practices (110 from NIST SP 800-171 plus 24 from NIST SP 800-172) and undergo a government-led DIBCAC assessment. Level 3 requires current Level 2 status as a prerequisite.

If your contract does not specify a CMMC level, review the DFARS clauses in your solicitation. Per 32 CFR 170, the contracting officer determines the required level based on the sensitivity of information involved. When in doubt, contact your contracting officer directly. Getting the level wrong means preparing for the wrong assessment, which wastes time and budget. Once you know your level, the table below shows exactly what that level requires.

Understanding CMMC Levels Before Using a Checklist

Before working through any CMMC checklist, you need a clear picture of what each certification level requires. The three levels differ significantly in practice count, assessment type, and the category of information they protect.

FeatureLevel 1: FoundationalLevel 2: AdvancedLevel 3: Expert
ProtectsFederal Contract Information (FCI)Controlled Unclassified Information (CUI)High-Value CUI
Practice Count17 basic safeguarding practices110 practices134 practices
Assessment TypeAnnual self-assessmentTriennial C3PAO or self-assessmentTriennial DIBCAC government assessment
POA&Ms Permitted?NoYes, close-out requiredYes, close-out required, critical requirements excluded
Results Entered InSPRSSPRSCMMC eMASS
PrerequisiteNoneNoneCurrent Level 2 status

Phase 1 implementation began November 10, 2025, focusing primarily on Level 1 and Level 2 requirements. Phase 2 starts November 10, 2026, expanding mandatory CMMC Third Party Assessment Organization (C3PAO) Level 2 assessments. Full implementation across all applicable contracts begins after November 9, 2028.

All Level 2 C3PAO assessments follow a mandatory four-phase structure per the CMMC process:

  1. Plan and Prepare Pre-Assessment: Define scope, provide SSP and network diagrams, and agree on assessment timeline.
  2. Assess Conformity to Security Requirements: Assessors examine documentation, interview personnel, and test controls directly.
  3. Complete and Report Assessment Results: C3PAO uploads results to the required reporting system.
  4. Issue Certificate and Close Out POA&M: Remediate open items within the allowed period or lose your Conditional CMMC Status.

Assessors use three mandatory methods drawn from NIST 171A: examine (review documentation, configurations, logs), interview (structured discussions with personnel), and test (hands-on technical validation). You cannot pass on paper alone.

CMMC currently uses NIST SP 800-171 Revision 2. Per DoD CIO FAQs, DoD has issued a class deviation to DFARS clause 252.204-7012 to maintain Rev 2 as the assessment standard until Rev 3 is incorporated through future rulemaking. With this context established, the following checklists give you a structured path through preparation.

Pre-Assessment Readiness Checklist

Pre-assessment readiness covers the foundational work that must be complete before you can accurately scope, document, or engage a C3PAO. Gaps identified here affect every item on your CMMC checklist.

Asset scoping:

  • Complete hardware and software asset inventory across all five CMMC asset categories (CUI Assets, Security Protection Assets, CRMA, Specialized Assets, Out-of-Scope)
  • Map all data flows showing where CUI enters, moves through, and exits your environment
  • Document all cloud service provider connections and whether they process CUI or FCI
  • Identify all external connections, remote workers, and vendor access points
  • Verify technical and physical separation for out-of-scope assets
  • Document CRMA risk management justification in SSP for each CRMA designation
  • Identify all Security Protection Assets and their security functions

Assessment readiness:

  • Gap analysis complete against all Level 2 practices using the DoD assessment guide
  • Internal mock assessment or Registered Practitioner Organization (RPO) readiness review conducted
  • Personnel prepared for assessor interviews (can articulate their security responsibilities)
  • Self-assessment score submitted to SPRS
  • C3PAO selected from Cyber AB marketplace and engagement agreement executed

Completing asset scoping before engaging a C3PAO is not optional. Assessors who discover undisclosed CUI assets during the assessment can expand scope, extend timelines, and convert passing controls into findings. Getting this right early has more impact on assessment outcomes than any other single step in CMMC preparation.

CMMC Level 1 Checklist (Foundational Controls)

Level 1 requires 17 practices drawn from FAR 52.204-21, organized across six security domains. These are basic safeguarding requirements for systems that handle FCI. No POA&Ms are permitted at Level 1: all 17 practices must be fully implemented before self-assessment.

Access control:

  • Limit system access to authorized users, processes, and devices
  • Restrict access to the types of transactions and functions authorized users may execute
  • Verify and control connections to external information systems
  • Control information posted or processed on publicly accessible systems

Identification and authentication:

  • Identify all users, processes acting on behalf of users, and devices
  • Authenticate the identities of users, processes, and devices before allowing system access

Media protection:

  • Sanitize or destroy information system media before disposal or reuse

Physical protection:

  • Limit physical access to systems to authorized individuals
  • Escort visitors, monitor visitor activity, and maintain physical access logs
  • Protect and monitor physical facilities and supporting infrastructure

System and communications protection:

  • Monitor, control, and protect communications at external and key internal boundaries
  • Implement subnetworks for publicly accessible components that are separated from internal networks

System and information integrity:

  • Identify and correct information system flaws in a timely manner
  • Provide protection from malicious code at appropriate system locations
  • Update malicious code protection mechanisms when new releases are available
  • Perform periodic system scans and real-time scans of files from external sources

Level 1 compliance is achievable for most small contractors with basic IT hygiene in place. If all 17 practices are implemented, your CMMC checklist at this level is straightforward to document and self-attest. The more significant preparation burden begins at Level 2, where 110 practices must be assessed against documented, operational evidence.

CMMC Level 2 Checklist (Advanced Controls)

Level 2 maps to all 110 practices in NIST SP 800-171 Revision 2 across 14 security domains. This CMMC checklist is organized by domain family. Not all 110 individual practice line items are listed here; use the DoD assessment guide for the complete practice list and assessment objectives.

  • Access control (AC): Implement least-privilege access, manage privileged accounts, enforce session lock after inactivity, control remote access and use of external systems, and prohibit use of portable storage without identifiable owner.
  • Audit and accountability (AU): Create and protect system audit logs, review and analyze logs for unauthorized activity, retain audit records to support after-the-fact investigation, and provide system capability to audit events defined in the SSP.
  • Configuration management (CM): Establish and maintain baseline configurations, enforce security configuration settings, track and control changes to systems, analyze security impact of changes prior to implementation.
  • Identification and authentication (IA): Enforce multi-factor authentication for all network access and privileged accounts, manage authenticator strength and lifecycle, and employ replay-resistant authentication.
  • Incident response (IR): Establish an operational incident-handling capability including preparation, detection, containment, recovery, and user reporting. Test incident response capability and track incidents.
  • Maintenance (MA): Perform maintenance on systems, control maintenance tools, sanitize equipment removed for off-site maintenance, and require MFA for remote maintenance sessions.
  • Media protection (MP): Protect system media containing CUI, limit access to CUI on media to authorized users, sanitize media prior to disposal or reuse, and control access to media containing CUI during transport.
  • Personnel security (PS): Screen individuals prior to authorizing access to systems containing CUI, and ensure CUI is protected during and after personnel actions such as terminations and transfers.
  • Risk assessment (RA): Periodically assess risk to operations and assets, scan for vulnerabilities in systems and applications, and remediate vulnerabilities in accordance with risk assessments.
  • Security assessment (SA): Periodically assess security controls, develop and implement plans of action, monitor system security controls on an ongoing basis, and produce a current SSP that reflects the operating environment.
  • System and communications protection (SC): Monitor, control, and protect communications at boundaries, implement architectural designs and software development techniques promoting security, and encrypt CUI in transit and at rest.
  • System and information integrity (SI): Identify and address flaws, provide malicious code protection, monitor systems for security alerts, and update malicious code protections when new releases are available.

Working through the CMMC Level 2 checklist requires sustained effort over months, not weeks. Organizations that have not previously implemented NIST SP 800-171 should begin gap remediation well before C3PAO engagement.

CMMC Level 3 Checklist (Expert-Level Controls)

Level 3 adds 24 practices from NIST SP 800-172 on top of the full Level 2 practice set, for a total of 134 practices. These enhanced requirements target organizations protecting high-value CUI on critical DoD programs. Assessments are conducted by the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC), not a C3PAO, and current Level 2 status is a prerequisite.

The 24 additional practices focus on five enhanced control areas:

  • Enhanced access control: Employ dynamic access control approaches that coordinate with organizational risk strategy and support real-time access decisions
  • Advanced configuration management: Establish and maintain a configuration management system capable of tracking changes with integrity verification
  • Strengthened incident response: Establish a security operations center (SOC) capability and employ automated mechanisms to support incident handling
  • Supply chain risk management: Assess the risk associated with suppliers, developers, and external providers and address the risk through contractual requirements
  • Advanced system and communications protection: Employ architectural capabilities and system configurations that leverage managed interfaces and employ boundary protection devices and mechanisms

Level 3 organizations must also demonstrate persistent monitoring, threat-hunting capability, and coordination with federal cybersecurity agencies. Because DIBCAC conducts government-led assessments, scheduling lead times are significant and early coordination with DoD program offices is essential before beginning Level 3 CMMC checklist preparation.

Documentation and Evidence Checklist

Documentation and evidence gaps are the most common reason CMMC assessments stall or fail. Your SSP is the central artifact in any CMMC checklist, but assessors require a complete evidence package spanning every domain in scope.

SSP and documentation:

  • Complete descriptions of all in-scope assets across all five categories
  • Current network diagrams showing CUI data flows and system boundaries
  • Documentation of all security controls and their implementation status
  • Roles and responsibilities for security control implementation
  • Incident response procedures and contacts
  • All listed non-POA&M practices fully implemented (AC.L2-3.1.20, AC.L2-3.1.22, CA.L2-3.12.4, PE.L2-3.10.3, PE.L2-3.10.4, PE.L2-3.10.5)

Evidence collection:

  • System logs demonstrating continuous monitoring (AU domain)
  • Access control configurations and current authorized user lists
  • Multi-factor authentication records across all in-scope systems
  • Security awareness training completion records with dates and content
  • Incident response plan with documented exercise records
  • Configuration baselines and change management records
  • Vulnerability assessment results and remediation tracking
  • Cryptography documentation and certificates
  • Physical access logs for CUI areas
  • Media sanitization records
  • Third-party and cloud service provider CUI handling documentation

Post-certification maintenance:

  • Annual self-assessment with senior executive attestation
  • Annual affirmation submitted to SPRS
  • Continuous monitoring and audit logging maintained
  • SSP updated when environment changes
  • Recertification planning initiated before expiration

Per the Cyber AB CAP, without an adequately documented SSP, an assessment cannot proceed and results in a failed assessment by default. Build your CMMC checklist evidence repository continuously throughout preparation, not in the weeks before your assessment date.

Common Mistakes in CMMC Checklist Implementation

Many contractors approach CMMC with confidence in their existing security programs, only to stall during assessment preparation. These are the most frequent failure points and how to avoid them.

Scoping Errors that Derail Assessments

Over-scoping your CUI environment inflates cost and complexity without improving security. If a system never processes, stores, or transmits CUI, proper Contractor Risk Managed Asset (CRMA) designation and technical segregation can legitimately reduce your assessment footprint. However, per the CMMC process, CRMA designations are "subject to the assessor's discretion." Every CRMA must be backed by documented justification in your SSP.

Equally dangerous: under-scoping by excluding backup systems containing CUI, cloud services processing CUI, or remote worker endpoints. If CUI can traverse a system, that system is in scope regardless of informal declarations.

Documentation that Describes Intent, not Reality

Per the Cyber AB CAP, without an adequately documented System Security Plan, an assessment cannot proceed and results in a failed assessment by default. Your SSP is the single most critical document in CMMC, and it must reflect actual operational state, not aspirational posture.

Common evidence gaps include access control lists missing recently added personnel, policies lacking senior management endorsement, and attestations signed by employees who are not the proper owner, operator, or supervisor.

POA&M Mismanagement

Some practices cannot be placed on a Plan of Action and Milestones (POA&M), including CA.L2-3.12.4 (System Security Plan), several physical protection practices, and specific access control practices. If you enter a C3PAO assessment with gaps in these controls, you can face a completely new assessment.

If you receive a Conditional CMMC Status with open POA&M items, the close-out clock is absolute. Per DoD CMMC guidance, failure to close POA&Ms within the documented period means your status expires with no documented extension option.

Across all of these failure points, the common thread is timing. Gap-to-CMMC certification timelines can be substantial, and the costs associated with missed deadlines or repeated assessments are significant. Understanding the realistic budget and timeline picture is the next step.

CMMC Assessment Costs and Timeline Expectations

Budget and timeline are two of the most common concerns for contractors beginning CMMC preparation. Both vary significantly based on your organization's size, existing security maturity, and the certification level you need.

Typical Timeline Ranges

Per DoD CIO guidance, there is no fixed preparation period, but industry experience provides useful benchmarks:

  • Level 1 self-assessment: 1-3 months for organizations with basic controls already in place.
  • Level 2 with existing NIST SP 800-171 program: 6-12 months covering gap remediation, evidence collection, and C3PAO scheduling.
  • Level 2 starting from scratch: 12-18 months or longer, accounting for control implementation, documentation, evidence maturation, and assessor availability.
  • Level 3 government assessment: Timeline depends on DIBCAC scheduling and requires current Level 2 status first.

C3PAO availability adds to these timelines. Per GAO-26-107955, assessor capacity is limited, so early engagement is important.

Cost Considerations

Assessment costs depend on your environment size and scope complexity. Key cost categories include consultant and RPO fees for gap analysis and remediation support, C3PAO assessment fees (which vary by organization size and scope), technology investments for controls you have not yet implemented, and internal staff time for documentation and evidence preparation. 

Smaller subcontractors with a narrow CUI scope will spend less than large primes managing complex, multi-site environments. Factor these costs into your program planning early to avoid surprises during solicitation response. With budget and timeline accounted for, the following operational practices help you make the most of both.

Best Practices for Using a CMMC Checklist

Passing a CMMC assessment takes more than checking boxes on a CMMC checklist. These practices help contractors build the sustained CMMC compliance posture that assessors expect.

Start with CUI Discovery, not Control Implementation

Before deploying a single security control, identify every location where CUI exists. Common locations include:

  • Email archives and collaboration platforms
  • HR files and project documentation
  • Supplier documents and meeting notes
  • Shared drives and cloud storage

Map exactly how CUI enters your environment, where it travels, where it is stored, and where it exits. This CUI map drives your SSP and directly determines your assessment scope. If external cloud service providers process CUI, they must meet DFARS 252.204-7012(b)(2)(ii)(D) requirements.

Segment your Network Before Assessment

Proper segmentation is the primary mechanism for reducing your assessment scope. Deploy firewalls between internal networks and the internet. Use routing switches to create zones separating CUI environments from general business networks, and encrypt all CUI flowing across the internet. The Singularity Platform's policy enforcement and device control capabilities can support this segmentation by controlling peripheral device access to CUI-handling systems.

Build Evidence over Months, not Days

Establish a structured evidence repository aligned to the CMMC control families. Populate it continuously, not reactively. The Level 2 assessment guide requires evidence demonstrating controls operate consistently over time, so training records, audit log samples, vulnerability scan results, and incident response exercise documentation must show sustained operation. Assessors evaluate operational maturity, not just technical presence.

Prepare your People for Interviews

Personnel who cannot explain their security responsibilities to assessors are a frequently underestimated failure point. Conduct internal interview rehearsals. Ensure every person in scope can explain what they do, why they do it, and where it is documented.

Assessors will interview personnel in several key roles:

  • Security awareness training recipients
  • Information security training administrators
  • Incident response team members
  • Audit monitoring and log review staff

Preparation across these groups builds confidence and reduces surprises during the assessment.

Enforce Subcontractor Flow-Down Requirements

Per an NDIA supply chain analysis, DFARS 252.204-7012 flow-down requirements apply "without regard to their supply chain tier position level" for any subcontractor that stores, processes, or generates CUI as part of contract performance. Identify all subcontractors who will handle CUI and include CMMC clause flow-down in subcontract agreements. Verify that each subcontractor has appropriate CMMC status at the required level. Do not flow down CMMC requirements to subcontractors who will not handle CUI.

Applying these practices consistently builds the operational maturity assessors look for. The right security tooling can further reduce the manual effort involved in maintaining that posture.

Unleash AI-Powered Cybersecurity

Elevate your security posture with real-time detection, machine-speed response, and total visibility of your entire digital environment.

Get a Demo

Key Takeaways

CMMC 2.0 is enforceable now, with Phase 1 active since November 10, 2025. Your CMMC checklist must cover asset scoping, SSP documentation, evidence collection, and ongoing maintenance across Level 2 practices. The most common failures are documentation that describes intent rather than operational reality, incomplete CUI discovery, and reactive evidence gathering. 

Start CMMC compliance preparation well before you need certification, account for limited C3PAO capacity, and build monitoring infrastructure that generates CMMC certification evidence by design.

FAQs

A CMMC checklist is a structured tool that helps DoD contractors track implementation and evidence collection for each required cybersecurity practice under the Cybersecurity Maturity Model Certification framework. It organizes the 17, 110, or 134 practices required at each CMMC level into actionable items, covering asset scoping, documentation, control implementation, and assessment readiness. 

Using a CMMC checklist reduces the risk of missing critical controls or arriving at a C3PAO assessment without sufficient evidence.

A complete CMMC checklist covers asset inventory and CUI scoping, System Security Plan (SSP) documentation requirements, control implementation status across all applicable NIST SP 800-171 practice families, evidence collection requirements by domain (access control, audit logs, incident response, configuration management, and others), POA&M tracking for any open items, and personnel readiness for assessor interviews. 

At Level 2, the checklist maps to 110 practices across 14 security domains. At Level 3, it expands to 134 practices incorporating NIST SP 800-172 requirements.

No regulation requires contractors to use a specific checklist format. However, the DoD assessment process requires that every in-scope practice be examined, tested, or observed by assessors. Without a systematic tracking approach, contractors routinely miss evidence gaps or underdocument control implementations. 

Per the Cyber AB CAP, an assessment cannot proceed without an adequately documented SSP, making structured preparation effectively mandatory even if the checklist format itself is not prescribed.

The core documentation package for a CMMC Level 2 assessment includes: a System Security Plan covering all in-scope assets, network diagrams showing CUI data flows and system boundaries, access control lists and authorization records, security awareness training records with completion dates, incident response plan and exercise documentation, configuration baselines and change management records, vulnerability scan results and remediation tracking, and any open POA&M items with milestone dates. 

Assessors will also conduct structured personnel interviews and perform hands-on technical testing, so documentation must reflect operational reality, not intended state.

Preparation timelines vary based on your existing controls, documentation maturity, and how much historical evidence you can already produce. Organizations with mature security programs and established SSPs typically move faster, while those building from scratch should expect a longer runway. 

All organizations should account for evidence collection periods, internal readiness reviews, and C3PAO scheduling lead times, which can add months to the overall timeline.

Your Conditional CMMC Status can expire, and you may need to undergo a completely new assessment rather than simply resuming where you left off. This resets your timeline and increases costs. 

It can also disqualify you from active contract opportunities that require current CMMC status. Plan remediation efforts carefully and allocate resources to close POA&M items well before the deadline approaches.

If a cloud service provider processes, stores, or transmits CUI on your behalf, it must meet the security requirements outlined in DFARS 252.204-7012(b)(2)(ii)(D). This typically means FedRAMP Moderate or equivalent authorization. 

Failure to document and validate your cloud provider's compliance status creates scoping problems during assessment and can result in findings against your organization, not just the provider.

DFARS 252.204-7012 establishes the underlying cybersecurity requirements that defense contractors must implement, primarily based on NIST SP 800-171. CMMC adds a verification layer by requiring independent assessment of those implementations. 

The two work together: DFARS defines what you must do, and CMMC confirms you actually did it. Before CMMC, contractors self-reported compliance without independent validation.

Subcontractors that store, process, or generate CUI as part of contract performance need the appropriate CMMC status at the level specified in the contract flow-down. 

Prime contractors are responsible for including CMMC clauses in subcontract agreements and verifying subcontractor status. Subcontractors that handle only FCI or do not interact with CUI should not receive unnecessary CMMC flow-down requirements beyond what the contract requires.

Discover More About Cybersecurity

IT vs. OT Security: Key Differences & Best PracticesCybersecurity

IT vs. OT Security: Key Differences & Best Practices

IT vs. OT security covers two domains with distinct risk profiles, compliance mandates, and operating priorities. Learn key differences and best practices.

Read More
What Are Air Gapped Backups? Examples & Best PracticesCybersecurity

What Are Air Gapped Backups? Examples & Best Practices

Air Gapped Backups keep at least one recovery copy beyond attackers' reach. Learn how they work, types, examples, and best practices for ransomware recovery.

Read More
What Is OT Security? Definition, Challenges & Best PracticesCybersecurity

What Is OT Security? Definition, Challenges & Best Practices

OT Security protects industrial systems that run physical processes in critical infrastructure. Covers Purdue Model segmentation, IT/OT convergence, and NIST guidance.

Read More
Cyber Security in Government Sector: Risks, Best Practices & FrameworksCybersecurity

Cyber Security in Government Sector: Risks, Best Practices & Frameworks

Check out what risks and threats government agencies and bodies are facing in the world of cybersecurity. We also cover the best practices for securing government systems. Read on to learn more.

Read More
CS- 101 Cybersecurity - Prefooter | Experience the Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Get a Demo
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English