No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

CMMC Phase One Reality Check: Documentation Alone Won’t Pass Muster

With Phase Two enforcement approaching in November 2026, early preparation matters in a market where assessment capacity has become limited

by Marci Womack
January 29, 2026
in Cybersecurity
pentagon aerial view

As CMMC Phase One enforcement begins and independent validation replaces self-attestation for defense contractors handling federal contract information and controlled unclassified information, the compliance model has shifted from documentation to demonstrable security practices. Marci Womack, managing director in Schellman’s CMMC practice, examines why assessors focus on objective evidence of actual control operation, how limited assessment capacity creates timing risks for contract eligibility and what sustainable program management requires as Phase Two approaches in November 2026. 

Phase one of CMMC 2.0 is officially underway as of November 2025. Changes are coming, but what will be their exact impact? This phase will bring new cybersecurity expectations to the entire defense industrial base, and these expectations are shifting from aspirational to enforceable. What was once largely a matter of contract language and contractor self-attestation is evolving into a more structured model that emphasizes demonstrable security practices, independent validation and long-term program maturity.

For contractors that handle federal contract information (FCI) or controlled unclassified information (CUI), this transition signals a clear message: Preparation can no longer be deferred. While timelines may vary by contract, the underlying expectations of CMMC are already influencing how organizations are evaluated for future work.

Navigating this transition demands an intentional approach to embed readiness and operationalize security across every part of an organization. The keys to this approach for contractors include understanding the FCI/CUI they handle (what and where), honestly evaluating and improving their true security posture for the protection of the identified FCI/CUI, preparing for independent assessments and planning around limited assessment capacity.

From self-attestation to security reality

One of the most significant shifts under CMMC is the growing emphasis on accuracy and accountability in self-assessments. For many contractors, previous approaches focused heavily on written policies or point-in-time compliance checks. Under the updated model, that approach is no longer sufficient.

Effective preparation begins with a realistic understanding of how security controls function in practice. That means identifying where FCI or CUI exists within the organization, the lifecycle of the FCI/CUI and which systems fall within scope because they store, process or transmit FCI/CUI. Without clear scoping, organizations risk misjudging both their compliance status and the effort required to improve it.

Once scope is defined, controls aligned to NIST SP 800-171 should be evaluated through the lens of execution, not intention. Assessments that focus solely on whether a policy exists often overlook whether controls are consistently implemented, monitored and maintained. The gap between documentation and reality is where many contractors encounter challenges later in the process.

Addressing those gaps requires prioritization. Rather than attempt to resolve every deficiency at once, organizations are better served by focusing on foundational areas like identity and access management, audit logging, authentication mechanisms and incident response. Incremental improvement, guided by a structured remediation plan, is more sustainable and more defensible during future reviews.

us pentagon building
Cybersecurity

US Finalizes CMMC Rule: Cybersecurity Verification Now Determines Contract Eligibility for Defense Contractors

by Richard W. Arnholt and Todd R. Overman
December 12, 2025

New requirements expected to affect more than 300,000 defense contractors by the time they are fully phased in

Read moreDetails

Preparing for independent assessment expectations

As focus shifts to third-party validation, contractors must adjust their mindset around what it means to be ready. Independent assessments are designed to verify that controls are operating as intended, not just that they are described accurately.

Assessors rely on objective evidence — organizational parameters clearly defined in a system security plan (SSP), configuration settings, documented access reviews, audit logs, system inventories and incident response records all play a role in demonstrating compliance. Organizations that struggle during assessments often do so not because controls are absent, but because evidence is incomplete, difficult to retrieve or inconsistent with policy or expected implementation.

Preparation for third-party validation benefits from structure. Centralizing evidence, assigning ownership to specific control areas and conducting internal walkthroughs and practice demonstrations before an assessment can significantly reduce friction and unexpected surprises. These activities also help internal teams become more comfortable articulating how controls work in practice.

Many organizations also find value in conducting readiness reviews ahead of formal assessments. These reviews provide an opportunity to test assumptions, validate interpretations of requirements and identify weaknesses that may not be obvious from internal reviews alone. The result is a more predictable assessment experience and fewer last-minute surprises.

Assessment demand has made planning crucial

Beyond technical readiness, contractors must also contend with practical constraints. For most contractors handling CUI subject to CMMC Level 2, third-party assessments will be required on a three-year cycle, making long-term scheduling and planning essential rather than optional. Notably, demand for CMMC assessments is increasing, and assessor availability has become much more limited.

This reality introduces a new risk: timing. Contractors that delay preparation until requirements appear in active solicitations may find themselves competing for limited assessment capacity. Scheduling delays can have downstream impacts on contract eligibility.

Organizations that prepare early are better positioned to manage this risk. Thorough self-assessments, organized assessment evidence and documentation and clearly defined system boundaries allow assessments to proceed more efficiently. When assessors can move quickly through evidence and validation, timelines become more predictable.

Strong internal ownership also plays a critical role. Teams that understand their controls and can respond quickly to assessor questions reduce the likelihood of delays. In a constrained assessment market, that level of preparedness can make the difference between meeting a deadline and missing an opportunity.

Building a program that lasts beyond certification

CMMC is far more than just checking a box on some to-do list. It’s an ongoing process with complex layers and interdependencies, and it carries real-world consequences for those that fall behind. Phase One stretches through to November of this year, when Phase Two begins with even more stringent CMMC enforcement, and organizations need to make sure they’re ready for what comes next.

As requirements continue to mature and enforcement expands, contractors will need to maintain their security posture over time. Treating compliance as an ongoing program rather than a discrete project is key to long-term success.

Organizations that invest in repeatable processes, continuous monitoring and regular reassessment are better equipped to adapt as expectations evolve. These efforts not only support compliance but also strengthen overall cybersecurity resilience.

The transition to CMMC represents a meaningful change for the defense industrial base and our national security by emphasizing the protection of sensitive information that has too-frequently fallen into the hands of adversaries. Contractors that act early, plan strategically and focus on sustainable security practices will be best positioned to navigate future phases and remain competitive in a changing landscape.


Tags: Data Governance
Previous Post

Admissions, Visas & More: Higher Ed’s 2026 Regulatory Preview

Next Post

ACH Network Overhaul: What March and June 2026 Deadlines Mean for Financial Institutions

Marci Womack

Marci Womack

Marci Womack is a managing director in Schellman's federal practice overseeing the emerging CMMC assessment program, the established FedRAMP assessment program and related areas like StateRAMP, FISMA and other NIST 800-53 derivatives. She also serves as the 3PAO (third party assessment organization) representative on the Federal Secure Cloud Advisory Committee (FSCAC). Prior to joining Schellman as a senior associate, Marci worked as a federal contractor implementing and assessing federal cybersecurity programs, as well as an FFIEC/GLBA security controls assessor and consultant. Marci has over 10 years of information security experience across various industries and holds key certifications, including CISSP, CISA, CEH and (CMMC) CCA.

Related Posts

news roundup bundled papers

Almost 40% of US Workers Have Witnessed Harassment in the Past 5 Years

by Staff and Wire Reports
February 5, 2026

Board-GC communication frequency doesn’t match organizational objectives

tiktok on phone screen

What Oracle’s TikTok Dance Can Teach Everyone About Good Data Governance

by Rita W. Garry
February 4, 2026

Many US companies still resist recognizing data governance and structured management as a value center, but the regulatory and technological...

small child using smartphone

The US Is Not Alone in Regulating Children’s Data Privacy. Here’s a Primer on the Global State of Play.

by Ceren Canal Aruoba
February 2, 2026

Emerging policies extend beyond data privacy into product governance and algorithmic accountability

federal trade commission building sign

What Recent FTC Enforcement Actions Reveal About COPPA Risks

by Stacey Brandenburg and Yiannis Vandris
February 2, 2026

Companies need to evaluate whether they have actual knowledge of users younger than 13

Next Post
person online shopping with credit card

ACH Network Overhaul: What March and June 2026 Deadlines Mean for Financial Institutions

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2026 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2026 Corporate Compliance Insights