This website uses cookies to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
READ MORE
OKAY, I AGREE
BACK TO BLOG

Author:

Patrick Ibrahim

Share article:

In this article:

TALK TO AN EXPERT

CMMC 1.0 vs 2.0: What Changed and How It Affects You

CMMC

/

March 27, 2026

Author:

Patrick Ibrahim

Share article:

CMMC 2.0 simplified the original model by reducing five levels to three, removing maturity scoring, aligning Level 2 directly to NIST SP 800-171, and adjusting assessment types. The key differences between CMMC 1.0 vs 2.0 include streamlined requirements, clearer Level 1 vs Level 2 separation, and updated CMMC timeline changes from version 1.0 to 2.0 that affect contract rollout and assessment pathways.

Introduction

The Cybersecurity Maturity Model Certification (CMMC) framework guides defense contractors toward the consistent, measured protection of government data. This page explains CMMC 1.0 vs 2.0 in clear terms, turning the regulatory shift into practical steps. It clarifies level names, assessment types, scoring, and the specific changes to daily work. You will find control expectations mapped to real documents and tasks, helping your team move from theory to action. CyberCrest supports planning, gap closure, and audit preparation for teams across the Defense Industrial Base.

Read this guide to understand the difference between CMMC 1.0 and CMMC 2.0, exactly what contracts expect, and how to pace your compliance effort. Every section blends definitions with actions, owners, and proof. Use it to brief leaders, align suppliers, and plan your next review. The goal is a fast path to a durable program that meets customer needs and protects mission data. Teams often ask, how does CMMC 2.0 differ from CMMC 1.0? This page gives a direct, practical answer.

What Changed at a Glance

CMMC 2.0 trims the model from five levels to three, aligns language with NIST SP 800-171, removes the process and maturity scoring used in 1.0, and introduces flexible assessment pathways [2]. Level 1 covers Federal Contract Information with basic cyber hygiene. Level 2 aligns with 110 controls for Controlled Unclassified Information. Level 3 targets the most sensitive programs and adds heightened safeguards. The result is a simpler framework that links work to well-known security standards and clearer contract language.

The Model Shift, Plain and Simple

The initial CMMC approach referenced in DoD’s 2020 interim rule used a five-level model and included process maturity requirements and additional practices beyond the NIST SP 800-171 Rev. 2 baseline. The revised program uses three levels and removes the process maturity scoring. It focuses on practices that reduce risk and evidence that proves operation. The change reduces noise and puts attention on controls that protect sensitive information.

Alignment to NIST and What That Means

The core of Level 2 maps to NIST SP 800-171, the baseline for safeguarding CUI in nonfederal systems [2]. Teams build a system security plan, run a risk assessment, and keep evidence that controls run. This anchors the CMMC framework in a mature standard from the National Institute and supports reuse across programs that cite NIST SP. It also tightens language around assessment objectives, which clarifies tests a reviewer will use.

Data Types and Scope

Know your data. Federal Contract Information calls for basic safeguards and steady routines. Controlled Unclassified Information (CUI) needs the full NIST SP 800-171 control set and stronger proof. Contracts describe data types and expected levels. Map data flows, name owners, and note where suppliers handle data to support supply chain security and due care.

Assessment Types in Practice

CMMC 2.0 offers three assessment pathways: [1] annual Level 1 self-assessment and senior official affirmation, [2] Level 2 third-party C3PAO certification assessment or authorized self-assessment, and [3] Level 3 government-led assessment for select efforts [1].

  • Annual self-assessment with senior company official affirmation for Level 1.
  • Third-party assessment by a C3PAO for Level 2 in higher risk programs.
  • Government-led assessment for Level 3 on select efforts.

Read also: CMMC Audit Guide: Compliance Roadmap 

Some Level 2 awards use self-assessments where risk is lower. Contracts specify which path applies and how to verify compliance.

Scope, Inheritance, and Supplier Oversight

Set scope around systems that handle CUI or FCI. Use segmentation, managed services, and shared responsibility to reduce footprint. Document what you inherit from cloud or platform providers and what you still own. Track supplier controls, keep evidence current, and plan reviews. Supply chain risk management sits at the center of the program.

Controls and Domains that Matter Day to Day

Work centers on access control, configuration management, media protection, incident response, personnel security, communications protection, and related security domains. Teams design security measures, test outcomes, and store proof. This builds a clean trail during any security assessment and shows a strong cybersecurity posture to buyers.

Evidence and Attestations

Evidence comes from tickets, logs, scans, and approvals. Keep a current system security plan and a living plan of action with a remediation plan for open items.

An affirming official (a senior-level representative) submits the required affirmation of continuing compliance in SPRS, the DoD’s Supplier Performance Risk System, at the completion of the assessment and annually thereafter for the current CMMC status [1].

DoD’s CMMC 2.0 program guidance states that companies must self-assess and submit scores in SPRS during the Phase 1 rollout [4]. Clear records and owners speed reviews and reduce compliance burden across years.

CMMC Level 1 In Detail

Level 1 targets protection of Federal Contract Information. It sets basic cybersecurity practices that small teams can meet with steady routines. Level 1 requires implementing the safeguarding requirements applicable to Federal Contract Information (FCI), defined as information provided by or generated for the government under a contract that is not intended for public release (commonly aligned to FAR 52.204-21). Supporting routines include, but are not limited to, asset tracking, flaw remediation (patching), backups, and access review. Train staff, keep simple procedures, and fix issues fast. Keep a dated record of checks and a short package that proves activity. This is the entry point for federal contractors who need to protect Federal Contract Information and meet contract terms.

CMMC Level 2 In Detail

Level 2 protects Controlled Unclassified Information. It mirrors the 110 requirements in NIST SP 800-171 with practical tests. Evidence must show design and operation across the year. Some awards require a third-party assessment, while others allow a Level 2 self-assessment where permitted by the solicitation/contract; Level 2 self-assessments are performed every three years with annual affirmations. Work here includes tighter logging, stronger identity rules, and deeper supplier checks. Teams document results in the system security plan and prove outcomes with records. This is the path that dominates current awards for DoD contractors handling CUI.

Also read: Understanding CMMC 2.0 Levels: A Guide for Defense Contractors

CMMC Level 3 In Brief

Level 3 applies to a smaller set of programs that face advanced persistent threats. Reviews are government-led, and safeguards extend beyond Level 2. This adds depth in detection, response, and resilience. Few suppliers need this tier, yet awareness helps plan long-term investments and talent.

Phrase-By-Phrase: CMMC level 1 vs level 2

Level 1 protects FCI with a short set of practices and annual self-assessment. Level 2 protects Controlled Unclassified Information (CUI) by requiring implementation of the full NIST SP 800-171 requirement set and, depending on the award, either a third-party certification assessment or an annual self-assessment. Proof depth, logging, and supplier oversight increase at Level 2. The workload also expands for incident response, training, and change control.

Where CMMC 2.0 Eases Work

The removal of process maturity scoring simplifies evidence. Clear mapping to NIST SP 800-171 reduces debates on intent. Self-assessments reduce cost where allowed. Plan of Action and Milestones may support time-bound closure of select gaps, with limits defined in program guidance. These features cut friction while keeping strong outcomes for sensitive data.

Where Rigor Increased

Affirmations by a senior leader raise accountability. Contract language adds clarity on assessment types and renewal cycles. Level 2 programs that handle CUI at higher risk expect third-party assessments with detailed sampling. Government-led testing at Level 3 adds depth. These changes strengthen trust across the supply chain.

Your Working Package: What To Build

  • Current system security plan with clear scope.
  • Risk assessment with owners and dates.
  • Configuration management standards and records.
  • Access control rules, reviews, and ticket trails.
  • Media protection steps and disposal logs.
  • Communications protection settings and tests.
  • Incident response procedures, drills, and lessons.
  • Personnel security checks and training logs.
  • Vendor oversight records and service descriptions.
  • A register of actions with due dates and status.

A Practical Path To “CMMC 2.0 vs 1.0” Readiness

  1. Run a gap analysis by level and domain.
  2. Map contracts to the required level.
  3. Build a short plan with owners and milestones.
  4. Close high-risk gaps tied to access control, logging, and identity.
  5. Prepare the evidence pack and a briefing for leadership.

This sequence turns policy into actions that achieve compliance with less churn.

Contracts, Flowdowns, and Shared Risk

CMMC requirements appear in prime awards and flow down to subs. Confirm language with partners and record who holds which controls. Share expectations early with suppliers. Ask for independent evidence where needed and track fixes to closure. This discipline raises supply chain security and reduces surprises during reviews.

People, Process, and Tooling

People: train teams on duties and reporting paths. 

Process: write short procedures that match how work gets done.

Tooling: use endpoint management, identity, logging, and backup platforms that produce clear reports. Tie these parts together with tight ownership and monthly status checks. The result is a program that can verify compliance on demand.

The Role of Risk

Risk drives decisions on priorities, spending, and exceptions. Use a method that rates impact and likelihood, lists threats, and ties actions to owners. Keep the register current and link tasks to tickets. This supports CMMC assessments and builds trust with customers who want a clear view of current cybersecurity posture.

POA&M and Remediation

When gaps appear, write a clear remediation plan with target dates and proof needs. Limit open items and close them on schedule. Keep leaders informed and record approvals for any deferrals tied to mission needs. This approach balances delivery, risk, and compliance requirements.

Building Repeatable Reviews

Plan internal reviews each quarter. Test samples for identity, change, backups, and incident response. Record results, assign fixes, and retest. Invite a Certified Information Systems Auditor for a simple outside check when the team is small. This cadence keeps the program sharp between formal reviews and supports achieving compliance with confidence.

Where Evidence Lives

Keep records where auditors can find them. Store tickets, reports, and screenshots in a shared location with dates and names. Save exports that show settings, access, and events. This file hygiene speeds third-party assessment work and reduces disruption to delivery teams.

Training, Culture, and Accountability

Deliver role-based training. Make duties clear for admins, developers, and managers. Record attendance and keep content short and current. Enforce policy with clear steps for exceptions and reviews. This culture reduces errors and helps teams protect sensitive data across the life of each contract.

Program Metrics

Track cycle time to close actions, patch age for high findings, backup test results, and access review status. Use small dashboards with trend lines. Share status with leaders and program managers tied to DoD contracts. Metrics steer effort and prove progress to buyers.

The Big Picture

CMMC is about national security and mission success. The CMMC program verifies protection of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) across the defense industrial supply chain. Clear standards, steady routines, and good records keep teams ready and reduce risk from cyber threats across organizations operating in the Defense Industrial Base.

Side-By-Side Breakdown: What Stayed, What Changed

Use CMMC 2.0 vs 1.0 comparisons to guide plans and messages across teams:

  • Levels: Five levels in CMMC 1.0; three levels in 2.0 with clearer mapping to data types.
  • Control Source: Mixed practices in 1.0; direct alignment with NIST SP 800-171 for Level 2 in 2.0.
  • Maturity Processes: Formal process maturity in 1.0; removed in 2.0 to focus on practices and outcomes.
  • Assessments: Broad third-party use in 1.0; targeted third-party assessment for higher risk Level 2 programs in 2.0, with government-led assessment at Level 3.
  • Attestations: New senior leader affirmation in 2.0, tied to records and posture.
  • POA&M: Clearer rules in 2.0 for limited, time-bound gap closure.
  • Scope And Inheritance: Tighter guidance in 2.0 on shared services and inherited safeguards.
  • Supplier Oversight: Stronger emphasis across both versions; 2.0 clarifies expectations on evidence and ownership.

Deep Dive on Level 2 Controls

Teams map the 110 NIST SP 800-171 requirements to current systems and workflows. Focus early on identity, logging, endpoint hardening, secure configurations, and change records. Build repeatable checks for backups, restore tests, and alert triage. Tighten vendor reviews for any service that touches CUI. Capture decisions in the system security plan and maintain a register of actions with status, owners, and dates.

Readiness Tasks for Contract Teams

  • Tag each active and pending award with the expected CMMC level.
  • Confirm whether the contract language calls for third-party assessments or self-attestation.
  • Align the evidence pack to assessment objectives used by reviewers.
  • Keep a briefing for program managers that explains scope, recent fixes, and remaining risk.
  • Track entries in the Supplier Performance Risk System and refresh them on schedule.
  • Share expectations with subs and record who owns which controls.

Timeline Planning and Internal Milestones

Teams want clarity on CMMC timeline changes from 1.0 to 2.0 and CMMC timeline changes from version 1.0 to 2.0. Plan internal milestones that fit any external dates. Build a 12-month loop with quarterly checks, a mid-year dry run, and a pre-award package review. Record annual affirmations by the affirming official (as required) and retain supporting evidence for the applicable CMMC status. The DFARS acquisition rule integrating CMMC 2.0 into defense contracts is effective November 10, 2025 and initiates a three-year phased rollout of CMMC requirements in solicitations and contracts [3]. Expect CMMC 2.0 timeline changes from 1.0 to roll out through contract clauses and program notices. A steady internal calendar protects delivery across shifts in guidance.

Read also: What Is CMMC Compliance? Requirements, & Certification Process Guide

Governance and Roles

Name one owner for each domain and each high-risk control area. Meet monthly to review status and issues. Publish a short memo to leadership that lists wins, open items, and asks. Keep a simple RACI for primes and subs. Clarity on duties shortens reviews and reduces follow-up from third-party assessments.

Evidence Quality and File Hygiene

Review samples before any formal visit. Screenshots need dates. Exports need scope notes. Tickets need approvals and completion dates. Use consistent names and folders for fast retrieval. Match each item to a clause, control, or assessment objective. Clear, dated files cut interview time and limit disruption to delivery work.

From Gap To “Done”

Run a tight loop: identify the gap, write the fix, assign the owner, set a date, and store proof. Close items in order of risk and contract impact. Keep the register short and current. This pattern supports CMMC assessments and helps teams achieve CMMC compliance with less churn.

Conclusion

CMMC 2.0 centers on three levels, NIST-aligned controls, and clear assessment paths. It trims complexity from the first release and keeps strong safeguards where risk is high. With a simple plan, scheduled reviews, and clean records, teams meet contract terms and protect mission data. CyberCrest builds the plan, mentors owners, and assembles evidence that reviewers accept. Use this guide to brief leaders, set scope, and move forward with confidence across the full CMMC certification process. A steady cadence of checks, fixes, and proofs turns compliance into routine work, reduces rework, and keeps awards moving.

Advance Your CMMC Program with CyberCrest

Book a short planning call. We will map awards to levels, run a focused gap analysis, and set a paced timeline. Your team gets owners, dates, and the documents reviewers expect. We prepare evidence, coach interviews, and support third-party assessments or self-attestations by contract. Turn questions into a clear plan that reduces risk and supports delivery. Start now with a concise checklist and leave with a calendar, templates, and a path your team can execute with confidence across the next award cycle.

{{cta}}

References

  1. 32 CFR Part 170: Cybersecurity Maturity Model Certification (CMMC) Program (eCFR, current text)
    https://www.ecfr.gov/current/title-32/subtitle-A/chapter-I/subchapter-G/part-170
  2. Cybersecurity Maturity Model Certification (CMMC) Program, Final Rule (Federal Register, October 15, 2024)
    https://www.federalregister.gov/documents/2024/10/15/2024-22905/cybersecurity-maturity-model-certification-cmmc-program
  3. DFARS: Assessing Contractor Implementation of Cybersecurity Requirements (DFARS Case 2019-D041), Final Rule (Federal Register, September 10, 2025)
    https://www.federalregister.gov/documents/2025/09/10/2025-17359/defense-federal-acquisition-regulation-supplement-assessing-contractor-implementation-of
  4. CMMC 2.0 Details and Links to Key Resources (DoD, business.defense.gov)https://business.defense.gov/Programs/Cyber-Security-Resources/CMMC-20/

Get expert compliance support

Achieve compliance with confidence. Get expert advice on how to get started from the CyberCrest team.

TALK TO AN EXPERT

FAQ

What does Level 1 require in practice?

Basic cyber hygiene focused on protecting Federal Contract Information (FCI). Organizations must maintain steady, repeatable routines such as keeping an asset inventory, applying patches, performing backups, and regularly reviewing user access. Security checks should be documented, and issues should be identified and remediated promptly.

What changes at Level 2?

Level 2 expands protections to Controlled Unclassified Information (CUI) by requiring implementation of the full NIST SP 800-171 control set. Depending on contract requirements, organizations must either undergo a third-party assessment or complete an annual self-assessment to demonstrate compliance.

Do we need a formal plan and system description?

Yes. Keep a system security plan, a current register of actions, and dated evidence. This package anchors any review.

How do we prepare for an assessment?

Run a gap analysis, build a short plan, and collect proof while work continues. Hold a dry run with owners and rehearse walkthroughs.

How do primes and subs share work?

Prime contractors flow down security requirements to subcontractors. Teams should document who owns each control, what evidence exists, and which services or safeguards are shared.

Where do scores live?

Many programs post scores and dates in the Supplier Performance Risk System. Keep entries current and match records to what you report.

About the author

Patrick Ibrahim

Senior Director, Compliance Services

With over a decade of experience in information security, working with hundreds of companies including fortune 50 organizations and startups alike, Patrick excels at all things compliance.

Patrick’s expertise spans ISO, PCI, HITRUST as well as CMMC in the Federal space,  with hands-on experience conducting combined audits (PCI DSS, SOC 2, HITRUST). With a proven track record in BCPDR planning and realistic tabletop testing, Patrick is passionate about delivering actionable strategies that not only secure data but also ensure business continuity during disruptions.