Cybersecurity Maturity Model Certification 2.0
Crosswalk to NIST CSF 2.0 · 155 controls · Updated April 2026.
CMMC 2.0 is the U.S. Department of Defense cybersecurity certification framework for contractors handling CUI or FCI. It incorporates NIST SP 800-171 (110 controls) at Level 2 and adds selected NIST SP 800-172 controls at Level 3. Assessment rigor increases at each level — self-attestation for Level 1, third-party for Level 2, government-led for Level 3.
About CMMC 2.0
CMMC 2.0 is the streamlined successor to CMMC 1.0, eliminating unique CMMC-only practices in favor of NIST SP 800-171 and 800-172 alignment. The effective date is December 16, 2024, with DoD contracts incorporating CMMC requirements on a rolling basis starting in fiscal 2025.
Contractors handling CUI are required to meet Level 2 (110 controls). The assessment pathway varies by contract criticality — some allow annual self-assessment, most require triennial third-party certification. Level 3 adds roughly 35 controls from NIST SP 800-172 and requires a government-led assessment.
SecurityStack crosswalks CMMC practices to NIST CSF 2.0 categories. The crosswalk density is highest in PROTECT (access control, media protection, configuration management) and IDENTIFY (risk assessment, security assessment).
Primary audience: Defense Industrial Base (DIB) contractors handling Controlled Unclassified Information (CUI) or Federal Contract Information (FCI). Effective date Dec 16, 2024.
Controls by domain
155 controls across 26 groups. Mapping strengths to NIST CSF 2.0 categories are summarized below.
AC 7 controls
| Control ID | Name | IG |
|---|---|---|
| CMMC-AC.1.001 | Authorized access control policies | L1-L3 |
| CMMC-AC.1.002 | Limit transactions/functions | L1-L3 |
| CMMC-AC.2.005 | Provide privacy/security notices | L1-L3 |
| CMMC-AC.2.006 | Limit use of portable storage | L1-L3 |
| CMMC-AC.3.017 | Separate duties of individuals | L1-L3 |
| CMMC-AC.3.018 | Prevent non-privileged users from executing privileged functions | L1-L3 |
| CMMC-AC.3.020 | Control connection of mobile devices | L1-L3 |
Access Control (AC) 22 controls
| Control ID | Name |
|---|---|
| CMMC-AC.L1-3.1.1 | AC.L1-3.1.1 [L1] Limit system access to authorized users, processes, devices |
| CMMC-AC.L1-3.1.2 | AC.L1-3.1.2 [L1] Limit access to authorized transaction types and functions |
| CMMC-AC.L1-3.1.20 | AC.L1-3.1.20 [L1] Verify and control/limit connections to external systems |
| CMMC-AC.L1-3.1.22 | AC.L1-3.1.22 [L1] Control information posted on publicly accessible systems |
| CMMC-AC.L2-3.1.10 | AC.L2-3.1.10 [L2] Use session lock with pattern-hiding displays |
| CMMC-AC.L2-3.1.11 | AC.L2-3.1.11 [L2] Terminate user session after defined condition |
| CMMC-AC.L2-3.1.12 | AC.L2-3.1.12 [L2] Monitor and control remote access sessions |
| CMMC-AC.L2-3.1.13 | AC.L2-3.1.13 [L2] Employ cryptographic mechanisms for remote access |
| CMMC-AC.L2-3.1.14 | AC.L2-3.1.14 [L2] Route remote access via managed access control points |
| CMMC-AC.L2-3.1.15 | AC.L2-3.1.15 [L2] Authorize remote execution of privileged commands |
| CMMC-AC.L2-3.1.16 | AC.L2-3.1.16 [L2] Authorize wireless access prior to connections |
| CMMC-AC.L2-3.1.17 | AC.L2-3.1.17 [L2] Protect wireless access using auth and encryption |
| CMMC-AC.L2-3.1.18 | AC.L2-3.1.18 [L2] Control connection of mobile devices |
| CMMC-AC.L2-3.1.19 | AC.L2-3.1.19 [L2] Encrypt CUI on mobile devices and platforms |
| CMMC-AC.L2-3.1.21 | AC.L2-3.1.21 [L2] Limit use of portable storage on external systems |
| CMMC-AC.L2-3.1.3 | AC.L2-3.1.3 [L2] Control CUI flow per approved authorizations |
| CMMC-AC.L2-3.1.4 | AC.L2-3.1.4 [L2] Separate duties to reduce malevolent activity risk |
| CMMC-AC.L2-3.1.5 | AC.L2-3.1.5 [L2] Employ least privilege, including for privileged accounts |
| CMMC-AC.L2-3.1.6 | AC.L2-3.1.6 [L2] Use non-privileged accounts for nonsecurity functions |
| CMMC-AC.L2-3.1.7 | AC.L2-3.1.7 [L2] Prevent non-privileged users from executing privileged functions |
| CMMC-AC.L2-3.1.8 | AC.L2-3.1.8 [L2] Limit unsuccessful logon attempts |
| CMMC-AC.L2-3.1.9 | AC.L2-3.1.9 [L2] Provide privacy/security notices consistent with CUI rules |
AT 4 controls
| Control ID | Name | IG |
|---|---|---|
| CMMC-AT.1.056 | Conduct security awareness activities | L1-L3 |
| CMMC-AT.1.057 | Ensure personnel are trained | L1-L3 |
| CMMC-AT.2.056 | Role-based cybersecurity training | L1-L3 |
| CMMC-AT.3.058 | Provide security training for new threats | L1-L3 |
AU 3 controls
| Control ID | Name | IG |
|---|---|---|
| CMMC-AU.2.041 | Audit events that indicate violations | L2-L3 |
| CMMC-AU.2.042 | Ensure audit log review | L2-L3 |
| CMMC-AU.3.045 | Review/analyze/report audit logs | L2-L3 |
Audit & Accountability (AU) 9 controls
| Control ID | Name |
|---|---|
| CMMC-AU.L2-3.3.1 | AU.L2-3.3.1 [L2] Create and retain system audit logs |
| CMMC-AU.L2-3.3.2 | AU.L2-3.3.2 [L2] Ensure actions traceable to individual users |
| CMMC-AU.L2-3.3.3 | AU.L2-3.3.3 [L2] Review and update logged events |
| CMMC-AU.L2-3.3.4 | AU.L2-3.3.4 [L2] Alert on audit logging process failure |
| CMMC-AU.L2-3.3.5 | AU.L2-3.3.5 [L2] Correlate audit review, analysis, and reporting |
| CMMC-AU.L2-3.3.6 | AU.L2-3.3.6 [L2] Provide audit record reduction and report generation |
| CMMC-AU.L2-3.3.7 | AU.L2-3.3.7 [L2] Synchronize clocks with authoritative time source |
| CMMC-AU.L2-3.3.8 | AU.L2-3.3.8 [L2] Protect audit info and tools from unauthorized access |
| CMMC-AU.L2-3.3.9 | AU.L2-3.3.9 [L2] Limit audit logging management to privileged users |
Awareness & Training (AT) 3 controls
| Control ID | Name |
|---|---|
| CMMC-AT.L2-3.2.1 | AT.L2-3.2.1 [L2] Ensure awareness of security risks and applicable policies |
| CMMC-AT.L2-3.2.2 | AT.L2-3.2.2 [L2] Train in assigned security duties and responsibilities |
| CMMC-AT.L2-3.2.3 | AT.L2-3.2.3 [L2] Provide insider threat awareness training |
CA 3 controls
| Control ID | Name | IG |
|---|---|---|
| CMMC-CA.2.157 | Security assessments roles | L1-L3 |
| CMMC-CA.2.158 | Plan of action and milestones | L2-L3 |
| CMMC-CA.3.161 | Monitor security controls on ongoing basis | L2-L3 |
CM 5 controls
| Control ID | Name | IG |
|---|---|---|
| CMMC-CM.1.069 | Establish/maintain baseline configurations | L1-L3 |
| CMMC-CM.2.061 | Establish/maintain asset baseline | L2-L3 |
| CMMC-CM.2.062 | Control and monitor user-installed software | L1-L3 |
| CMMC-CM.2.064 | Establish/maintain security configuration | L1-L3 |
| CMMC-CM.3.068 | Employ deny-by-exception policy | L1-L3 |
Configuration Mgmt (CM) 9 controls
| Control ID | Name |
|---|---|
| CMMC-CM.L2-3.4.1 | CM.L2-3.4.1 [L2] Establish/maintain baseline configs and inventories |
| CMMC-CM.L2-3.4.2 | CM.L2-3.4.2 [L2] Establish/enforce security configuration settings |
| CMMC-CM.L2-3.4.3 | CM.L2-3.4.3 [L2] Track, review, approve/disapprove, log changes |
| CMMC-CM.L2-3.4.4 | CM.L2-3.4.4 [L2] Analyze security impact of changes prior to implementation |
| CMMC-CM.L2-3.4.5 | CM.L2-3.4.5 [L2] Define/enforce physical and logical access restrictions for changes |
| CMMC-CM.L2-3.4.6 | CM.L2-3.4.6 [L2] Employ least functionality — only essential capabilities |
| CMMC-CM.L2-3.4.7 | CM.L2-3.4.7 [L2] Restrict/disable nonessential programs, ports, protocols |
| CMMC-CM.L2-3.4.8 | CM.L2-3.4.8 [L2] Apply deny-by-exception software policy |
| CMMC-CM.L2-3.4.9 | CM.L2-3.4.9 [L2] Control and monitor user-installed software |
IA 3 controls
| Control ID | Name | IG |
|---|---|---|
| CMMC-IA.1.076 | Identify users, processes, devices | L1-L3 |
| CMMC-IA.1.077 | Authenticate users, processes, devices | L1-L3 |
| CMMC-IA.3.083 | Use multifactor authentication | L1-L3 |
Identification & Auth (IA) 11 controls
| Control ID | Name |
|---|---|
| CMMC-IA.L1-3.5.1 | IA.L1-3.5.1 [L1] Identify system users, processes, and devices |
| CMMC-IA.L1-3.5.2 | IA.L1-3.5.2 [L1] Authenticate identities as prerequisite to access |
| CMMC-IA.L2-3.5.10 | IA.L2-3.5.10 [L2] Store/transmit only cryptographically-protected passwords |
| CMMC-IA.L2-3.5.11 | IA.L2-3.5.11 [L2] Obscure feedback of authentication information |
| CMMC-IA.L2-3.5.3 | IA.L2-3.5.3 [L2] Use MFA for local/network access |
| CMMC-IA.L2-3.5.4 | IA.L2-3.5.4 [L2] Employ replay-resistant authentication |
| CMMC-IA.L2-3.5.5 | IA.L2-3.5.5 [L2] Prevent reuse of identifiers for defined period |
| CMMC-IA.L2-3.5.6 | IA.L2-3.5.6 [L2] Disable identifiers after defined inactivity period |
| CMMC-IA.L2-3.5.7 | IA.L2-3.5.7 [L2] Enforce minimum password complexity |
| CMMC-IA.L2-3.5.8 | IA.L2-3.5.8 [L2] Prohibit password reuse for specified generations |
| CMMC-IA.L2-3.5.9 | IA.L2-3.5.9 [L2] Allow temporary password with immediate change required |
Incident Response (IR) 3 controls
| Control ID | Name |
|---|---|
| CMMC-IR.L2-3.6.1 | IR.L2-3.6.1 [L2] Establish incident-handling capability |
| CMMC-IR.L2-3.6.2 | IR.L2-3.6.2 [L2] Track, document, report incidents to officials |
| CMMC-IR.L2-3.6.3 | IR.L2-3.6.3 [L2] Test organizational incident response capability |
IR 4 controls
| Control ID | Name | IG |
|---|---|---|
| CMMC-IR.1.010 | Establish operational incident handling capability | L1-L3 |
| CMMC-IR.2.092 | Establish operational incident handling | L2-L3 |
| CMMC-IR.2.093 | Track/document/control incidents | L2-L3 |
| CMMC-IR.3.098 | Track/document/control incidents | L2-L3 |
Maintenance (MA) 6 controls
| Control ID | Name |
|---|---|
| CMMC-MA.L2-3.7.1 | MA.L2-3.7.1 [L2] Perform maintenance on organizational systems |
| CMMC-MA.L2-3.7.2 | MA.L2-3.7.2 [L2] Controls on maintenance tools, techniques, personnel |
| CMMC-MA.L2-3.7.3 | MA.L2-3.7.3 [L2] Ensure off-site maintenance equipment sanitized of CUI |
| CMMC-MA.L2-3.7.4 | MA.L2-3.7.4 [L2] Check diagnostic/test media for malicious code |
| CMMC-MA.L2-3.7.5 | MA.L2-3.7.5 [L2] Require MFA for nonlocal maintenance; terminate when complete |
| CMMC-MA.L2-3.7.6 | MA.L2-3.7.6 [L2] Supervise maintenance personnel without required access |
Media Protection (MP) 9 controls
| Control ID | Name |
|---|---|
| CMMC-MP.L1-3.8.3 | MP.L1-3.8.3 [L1] Sanitize/destroy media before disposal/reuse |
| CMMC-MP.L2-3.8.1 | MP.L2-3.8.1 [L2] Physically control and securely store media with CUI |
| CMMC-MP.L2-3.8.2 | MP.L2-3.8.2 [L2] Limit access to CUI on system media |
| CMMC-MP.L2-3.8.4 | MP.L2-3.8.4 [L2] Mark media with CUI markings and distribution limitations |
| CMMC-MP.L2-3.8.5 | MP.L2-3.8.5 [L2] Control media access; maintain accountability during transport |
| CMMC-MP.L2-3.8.6 | MP.L2-3.8.6 [L2] Encrypt CUI on digital media during transport |
| CMMC-MP.L2-3.8.7 | MP.L2-3.8.7 [L2] Control use of removable media on system components |
| CMMC-MP.L2-3.8.8 | MP.L2-3.8.8 [L2] Prohibit portable storage with no identifiable owner |
| CMMC-MP.L2-3.8.9 | MP.L2-3.8.9 [L2] Protect confidentiality of backup CUI at storage locations |
MP 3 controls
| Control ID | Name | IG |
|---|---|---|
| CMMC-MP.1.118 | Protect system media containing CUI | L1-L3 |
| CMMC-MP.2.119 | Limit access to CUI on media | L1-L3 |
| CMMC-MP.3.122 | Mark media with CUI designations | L1-L3 |
Personnel Security (PS) 2 controls
| Control ID | Name |
|---|---|
| CMMC-PS.L2-3.9.1 | PS.L2-3.9.1 [L2] Screen individuals prior to authorizing access to CUI |
| CMMC-PS.L2-3.9.2 | PS.L2-3.9.2 [L2] Protect CUI during/after personnel actions |
Physical Protection (PE) 6 controls
| Control ID | Name |
|---|---|
| CMMC-PE.L1-3.10.1 | PE.L1-3.10.1 [L1] Limit physical access to systems, equipment, environments |
| CMMC-PE.L1-3.10.3 | PE.L1-3.10.3 [L1] Escort visitors and monitor visitor activity |
| CMMC-PE.L1-3.10.4 | PE.L1-3.10.4 [L1] Maintain audit logs of physical access |
| CMMC-PE.L1-3.10.5 | PE.L1-3.10.5 [L1] Control and manage physical access devices |
| CMMC-PE.L2-3.10.2 | PE.L2-3.10.2 [L2] Protect and monitor physical facility/support infrastructure |
| CMMC-PE.L2-3.10.6 | PE.L2-3.10.6 [L2] Enforce CUI safeguarding at alternate work sites |
Risk Assessment (RA) 3 controls
| Control ID | Name |
|---|---|
| CMMC-RA.L2-3.11.1 | RA.L2-3.11.1 [L2] Periodically assess risk to operations, assets, individuals |
| CMMC-RA.L2-3.11.2 | RA.L2-3.11.2 [L2] Scan for vulnerabilities periodically and when new ones identified |
| CMMC-RA.L2-3.11.3 | RA.L2-3.11.3 [L2] Remediate vulnerabilities per risk assessments |
RM 3 controls
| Control ID | Name | IG |
|---|---|---|
| CMMC-RM.2.141 | Establish risk management strategy | L2-L3 |
| CMMC-RM.2.142 | Risk tolerance documentation | L2-L3 |
| CMMC-RM.3.144 | Periodically assess risk to operations | L2-L3 |
SC 4 controls
| Control ID | Name | IG |
|---|---|---|
| CMMC-SC.1.175 | Monitor/control communications | L1-L3 |
| CMMC-SC.3.177 | Employ FIPS-validated cryptography | L1-L3 |
| CMMC-SC.3.185 | Implement subnetworks for publicly accessible components | L2-L3 |
| CMMC-SC.3.187 | Establish/manage cryptographic keys | L1-L3 |
Security Assessment (CA) 4 controls
| Control ID | Name |
|---|---|
| CMMC-CA.L2-3.12.1 | CA.L2-3.12.1 [L2] Periodically assess security controls for effectiveness |
| CMMC-CA.L2-3.12.2 | CA.L2-3.12.2 [L2] Develop/implement plans of action for deficiencies |
| CMMC-CA.L2-3.12.3 | CA.L2-3.12.3 [L2] Monitor security controls on an ongoing basis |
| CMMC-CA.L2-3.12.4 | CA.L2-3.12.4 [L2] Develop, document, periodically update system security plans |
SI 3 controls
| Control ID | Name | IG |
|---|---|---|
| CMMC-SI.1.210 | Policy for flaw remediation | L1-L2 |
| CMMC-SI.2.214 | Scan for vulnerabilities | L1-L3 |
| CMMC-SI.2.216 | Monitor organizational systems for attacks | L2-L3 |
SR 3 controls
| Control ID | Name | IG |
|---|---|---|
| CMMC-SR.1.161 | Develop supply chain risk management plan | L2-L3 |
| CMMC-SR.2.169 | Assess supply chain risk | L2-L3 |
| CMMC-SR.3.177 | Employ SBOM | L2-L3 |
Sys & Comms Protection (SC) 16 controls
| Control ID | Name |
|---|---|
| CMMC-SC.L1-3.13.1 | SC.L1-3.13.1 [L1] Monitor/control/protect communications at boundaries |
| CMMC-SC.L1-3.13.5 | SC.L1-3.13.5 [L1] Implement subnetworks for publicly accessible components |
| CMMC-SC.L2-3.13.10 | SC.L2-3.13.10 [L2] Establish and manage cryptographic keys |
| CMMC-SC.L2-3.13.11 | SC.L2-3.13.11 [L2] Employ FIPS-validated cryptography for CUI |
| CMMC-SC.L2-3.13.12 | SC.L2-3.13.12 [L2] Prohibit remote activation of collaborative devices |
| CMMC-SC.L2-3.13.13 | SC.L2-3.13.13 [L2] Control and monitor use of mobile code |
| CMMC-SC.L2-3.13.14 | SC.L2-3.13.14 [L2] Control and monitor use of VoIP technologies |
| CMMC-SC.L2-3.13.15 | SC.L2-3.13.15 [L2] Protect authenticity of communications sessions |
| CMMC-SC.L2-3.13.16 | SC.L2-3.13.16 [L2] Protect confidentiality of CUI at rest |
| CMMC-SC.L2-3.13.2 | SC.L2-3.13.2 [L2] Employ architectural designs for security |
| CMMC-SC.L2-3.13.3 | SC.L2-3.13.3 [L2] Separate user functionality from system management |
| CMMC-SC.L2-3.13.4 | SC.L2-3.13.4 [L2] Prevent unauthorized info transfer via shared resources |
| CMMC-SC.L2-3.13.6 | SC.L2-3.13.6 [L2] Deny network traffic by default; allow by exception |
| CMMC-SC.L2-3.13.7 | SC.L2-3.13.7 [L2] Prevent split tunneling on remote devices |
| CMMC-SC.L2-3.13.8 | SC.L2-3.13.8 [L2] Encrypt CUI during transmission |
| CMMC-SC.L2-3.13.9 | SC.L2-3.13.9 [L2] Terminate connections at end of sessions/after inactivity |
Sys & Info Integrity (SI) 7 controls
| Control ID | Name |
|---|---|
| CMMC-SI.L1-3.14.1 | SI.L1-3.14.1 [L1] Identify, report, correct system flaws in timely manner |
| CMMC-SI.L1-3.14.2 | SI.L1-3.14.2 [L1] Provide malicious code protection at appropriate locations |
| CMMC-SI.L1-3.14.4 | SI.L1-3.14.4 [L1] Update malicious code protection when new releases available |
| CMMC-SI.L1-3.14.5 | SI.L1-3.14.5 [L1] Perform periodic scans and real-time scans from external sources |
| CMMC-SI.L2-3.14.3 | SI.L2-3.14.3 [L2] Monitor security alerts/advisories and take action |
| CMMC-SI.L2-3.14.6 | SI.L2-3.14.6 [L2] Monitor systems for attack indicators (inbound/outbound) |
| CMMC-SI.L2-3.14.7 | SI.L2-3.14.7 [L2] Identify unauthorized use of organizational systems |
Crosswalk density to NIST CSF 2.0
Top 12 NIST CSF categories by number of CMMC 2.0 controls mapped. The distribution tells you where the framework's emphasis sits against NIST's six functions.
| NIST category | Controls mapped |
|---|---|
| PR.AA | 27 |
| PR.DS | 17 |
| PR.PS | 17 |
| DE.CM | 16 |
| PR.IR | 10 |
| DE.AE | 8 |
| PR.AT | 7 |
| ID.RA | 6 |
| RS.AN | 6 |
| GV.RM | 5 |
| GV.RR | 5 |
| AN.TI | 5 |
Frequently asked questions
Do I need CMMC certification if I don't handle CUI?
If you handle Federal Contract Information (FCI) but not CUI, you are subject to Level 1 — which covers 17 practices and allows annual self-attestation. If you handle CUI, Level 2 is required. If you're not a DoD contractor at all, CMMC does not apply.
When does CMMC take effect for my contracts?
The rollout is phased. DoD contracts began including CMMC requirements on December 16, 2024, but full enforcement across the DIB is expected over three years. Check specific contract clauses (DFARS 252.204-7021) or ask your contracting officer.
Can I self-assess at Level 2?
Only for a narrow subset of contracts deemed lower-criticality. Most Level 2 contracts require a C3PAO (CMMC Third-Party Assessor Organization) assessment every three years. Self-assessment is allowed for Level 1 and for certain Level 2 scopes — the contract tells you which applies.
Next
See your stack against CMMC 2.0
Start a free assessment, select CMMC 2.0 as a required framework, and see which controls your current tools already cover — and which gaps need new investment.