Skip to main content

CMMC Level 2


Cybersecurity Maturity Model Certification (CMMC) Level 2 includes Federal Acquisition Regulation (FAR) practices and NIST SP 800-171 Rev 1 controls.

What Is CMMC Level 2?


CMMC Level 2 is the second certification for defense contractors out of five possible levels. Specifically, these requirements apply to defense contractors who create or access Controlled Unclassified Information (CUI). The levels range from “Basic Cyber Hygiene” to “Advanced/Progressive.” Level 2 is known as “Good Cyber Hygiene.” It includes requirements focused on planning, sourcing and reviewing your security policies and procedures.

While CMMC level 2 indicates good cyber hygiene overall, it is still limited compared to higher levels. An organization that is CMMC level 2 certified may still struggle to effectively defend against advanced persistent threats (APTs).

How Does Level 2 Compare With Level 1?


The most significant differences between CMMC level 1 and level 2 come from the process maturity of both levels. This can also be referred to as ongoing security management. Level 1 requires defense contractors to establish policies, practices and a plan to implement the required security elements.

Level 2 takes that significant step further by also requiring a detailed review of those policies and practices, along with dedicated resources to meet the plan and activities as stated. These extra measures help to ensure that security solutions are implemented correctly and able to be fully effective. Achieving level 2 certification means your organizations has implemented the appropriate solutions and is actively monitoring them.

What Are The Audit Requirements Of Level 2?


CMMC level 2 certification requires significantly more controls than level 1. There are 110 required processes in all for level 2. These controls are grouped into 17 domains. Let’s take a brief look at what each of these domains covers:

  • Domain AC: Access Control is focused on identifying and limiting the people and other entities allowed to access your systems. It also involves limiting the types of functions and transactions that authorized users can perform.
  • Domain AM: Asset Management includes requirements for managing services and devices that store or interact with your data, whether they are on your network or hosted in the cloud.
  • Domain AT: Awareness and Training controls require defense contractors to maintain a training program for their staff, contractors and vendors so that they are equipped to overcome cybersecurity threats they may encounter.
  • Domain AU: Audit and Accountability controls specify how to create and maintain audit trails that let you track individual users’ activity and system activity.
    • Domain CA: Security Assessment covers the need for assessing and testing periodically to make sure your system security plans are working.
    • Domain CM: Configuration Management lists the requirements for creating baseline configurations and inventories and making changes to those systems. It also requires that your organization monitors for any unapproved changes.
    • Domain IA: Identification and Authentication is similar to Domain AC in that it is focused on user access. However, the emphasis in this case is on ensuring the person using an account is indeed the correct user.
    • Domain IR: Incident Response controls cover the need to make a plan that anticipates security incidents and specifies what your response will be if they occur.
    • Domain MA: Maintenance is based on the premise that all computer systems are vulnerable to failure at some point. That means defense contractors must protect critical services and data against vulnerabilities in the instance of a system failure.
    • Domain MP: Media Protection covers the use of removable media to store data, including both electronic storage devices and paper. Storing information on removable media can be dangerous, so it must be carefully controlled.
    • Domain PE: Physical Protection outlines the need to protect your physical facility and equipment from unauthorized access since such access could expose your data to security threats.
    • Domain PS: Personnel Security requires your organization to screen people before allowing them to gain access to systems containing controlled unclassified information (CUI). When a person is transferred or terminated and is no longer authorized to access data, you must take steps to protect that data.
    • Domain RE: Recovery has to do with data backups. Regularly backing up your data is critical for preventing data losses.
    • Domain RM: Risk Management focuses on the need to regularly conduct risk assessments of your data and systems so that you can keep them protected.
    • Domain SA: Situational Awareness requires an organization to take intelligence regarding cyber threats from external sources seriously and respond to them appropriately.
    • Domain SC: Systems and Communications Protection includes an extensive list of controls focused on securing the transmission of information that takes place within a system. It also prohibits the sharing of CUI on public forums.
    • Domain SI: System and Information Integrity requires defense contractors to monitor for issues and promptly apply security patches as needed. You should also take advantage of updates to your security capabilities.

How Do I Pass Level 2?


Security should be a top concern for your organization. Making security a priority, at all levels of the company, helps an organization achieve a sound security posture. By implementing CMMC level 2 requirements, defense contractors will position themselves properly in the ongoing process of protecting their networks and data.

So what’s next? How can an organization supporting the DoD through their products or services also maintain good cybersecurity hygiene, even when they often have limited resources and/or staff to do so? Most organizations won’t know the extensive list of controls required for level 2, nor will they understand how to implement them. Many organizations have turned to working with a managed security service provider who not only specializes in delivering compliant CMMC security solutions but also takes on the compliance burden to make sure you meet your desired CMMC certification level.

Prepare For Your Upcoming CMMC Level 2 Audit


That’s where we can help with our comprehensive CMMC compliance solution for government contractors. We’ll take on the responsibility of successfully achieving CMMC certification on your behalf. Contact us today to schedule your complimentary consultation with our security experts.