Who this article is for
If you’re a CEO, CTO, CISO, or IT/security lead at a DoD contractor handling Controlled Unclassified Information (CUI), you’ve likely seen three acronyms everywhere: DFARS 252.204-7012, CMMC Level 2, and NIST SP 800-171. This guide shows how they fit together—and exactly what evidence you need to be audit-ready and contract-eligible.
The 30‑Second CMMC Level 2 Requirements Picture
- DFARS 252.204-7012: A contract clause mandating NIST 800‑171, 72‑hour cyber incident reporting, malware submission, and subcontractor flow‑down.
- NIST SP 800‑171: The 110 security requirements across 14 families to protect CUI in nonfederal systems.
- CMMC Level 2: A verification program (often via a C3PAO) that you actually implement and maintain those 110 controls, with evidence.
Bottom line: Pass CMMC Level 2 and you’ll have the evidence that meets DFARS safeguarding expectations—then add DFARS‑specific overlays (72‑hour reporting, cloud, FIPS, flow‑down).
Quick map: CMMC L2 ↔ NIST 800‑171 ↔ DFARS 252.204‑7012
| Area | CMMC Level 2 | NIST 800‑171 | DFARS 252.204‑7012 Focus |
|---|---|---|---|
| Safeguarding CUI | Certification that 110 controls are implemented & maintained | 110 requirements / 14 families | Contractual requirement to implement 800‑171 for CUI |
| Assessment | Third‑party (C3PAO) for prioritized; some self‑assessment | Implementation statements + objective evidence | DoD may review score (SPRS); CO reliance |
| Reporting | Evidence of IR capability, plans, and logs | IR controls (IR‑L2) | 72‑hour DoD incident reporting; malware submission |
| Cloud | Vendor due diligence, agreements, logs | Controls still apply to SaaS/IaaS/PaaS | FedRAMP‑equivalent or DoD‑approved if storing CUI |
| Encryption | Keys, algorithms, key management evidence | SC controls require protection | FIPS‑validated crypto for CUI at rest/in transit |
| Flow‑down | Subcontractor oversight & attestation | Applies to environments touching CUI | Prime must flow down safeguarding & reporting |
| Documentation | SSP, POA&M, policies, procedures, diagrams | Describe how controls are met | Accurate descriptions for oversight & accountability |
NIST 800‑171 Evidence: What Auditors Expect (Audit‑Ready)
Core documentation
- System Security Plan (SSP) — Current, detailed narrative of each 800‑171 control; include data‑flow diagrams.
- Plan of Actions & Milestones (POA&M) — Gaps with owners, budgets, priority, and due dates.
- Policies & Procedures — Access control, asset, change, IR, vuln, configuration, media, risk, vendor/flow‑down.
- Control Artifacts — Configs, screenshots, tickets, logs, contracts, training, scans, pen‑test findings.
- Risk Register & Training Records — Awareness, role‑based, IR tabletop exercises.
Operational evidence
- MFA enforcement (IdP, VPN, privileged access) and least‑privilege role maps.
- Asset inventory (hardware, software, SaaS) and CUI data inventory mapped to vendors.
- Secure configurations, patch cadence, vulnerability management tickets.
- Logging & monitoring: SIEM/EDR, retention, alert triage evidence.
- Backup/restore tests, encryption configs, key management procedures.
- Change management tickets and approvals.
- Third‑party management: DFARS flow‑down, FedRAMP evidence, breach‑notification terms.
DFARS‑specific overlays
- 72‑hour incident reporting plan — notification tree, indicator capture, malware submission.
- FIPS‑validated crypto inventory — modules, versions; replace “FIPS‑like” with validated.
- Cloud due‑diligence file — FedRAMP authorization/equivalency, CUI boundary, log access.
- Subcontractor compliance file — CUI subs list, executed clauses, assessment/attestations, oversight cadence.
C3PAO Assessment Readiness & SPRS Score: Your 90‑Day Action Plan
Days 0–15: Establish scope & gap picture
- Confirm CUI scope and boundaries; document data flows and vendors.
- Pull your SPRS score; run/refresh a NIST 800‑171 gap assessment.
- Stand up an executive‑visible POA&M with budgets and deadlines.
Days 16–45: Close critical gaps
- Enforce MFA everywhere, harden admin paths, remove standing privilege.
- Stand up centralized logging (SIEM/EDR), set retention, tune alerts.
- Remediate high‑risk vulnerabilities, encrypt CUI with FIPS‑validated modules, segment networks.
Days 46–75: Prove it works
- Run IR tabletops and backup/restore tests; save outputs.
- Update vendor contracts for DFARS flow‑down and cloud/FedRAMP terms.
- Finalize SSP updates and attach real artifacts.
Days 76–90: Pre‑assessment & scheduling
- Conduct a CMMC Level 2 pre‑assessment; score internally.
- Fix residual findings; lock the SSP/POA&M.
- If required, schedule your C3PAO assessment; if self‑attesting, capture objective evidence.
DFARS 252.204‑7012 Compliance Overlays & Where Companies Lose Points
- Weak or outdated SSP/POA&M → Treat as living docs; update after changes/incidents.
- MFA exceptions → Remove; place legacy apps behind secure gateways.
- Shadow IT & SaaS sprawl → Maintain a SaaS registry; restrict CUI to approved systems.
- No proof of monitoring → Keep evidence of alert triage and incident closeout.
- Cloud misunderstandings → Collect FedRAMP letters and logging terms; map shared responsibility.
- Subcontractor blind spots → Flow‑down clauses, subcontractor assessments, periodic checks.
CMMC Level 2 Evidence Checklist (Copy/Paste)
FAQ
Is CMMC Level 2 the same as NIST 800‑171?
No. 800‑171 is the what (requirements). CMMC Level 2 is the proof that you consistently do the what.
Do we still need to comply with DFARS 252.204‑7012 if we pass CMMC Level 2?
Yes. CMMC proves 800‑171 implementation; DFARS also requires 72‑hour reporting, FIPS crypto, cloud obligations, and subcontractor flow‑down.
What if we only handle FCI (not CUI)?
You may be in CMMC Level 1 scope. Start with our 5‑minute Level 1 Readiness Quiz—you’ll receive an emailed POA&M to plan Level 2.
How long does Level 2 take?
Most SMBs reach audit‑ready in 90–180 days with focused effort and executive sponsorship.