No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

US Finalizes CMMC Rule: Cybersecurity Verification Now Determines Contract Eligibility for Defense Contractors

New requirements expected to affect more than 300,000 defense contractors by the time they are fully phased in

by Richard W. Arnholt and Todd R. Overman
December 12, 2025
in Cybersecurity
us pentagon building

With the CMMC rule finalized, cybersecurity in defense contracts has become more than just a technical concern; it is now a key compliance and legal requirement. Although implementation will be phased, contractors who adapt and prepare early better position themselves to compete and comply, say Richard W. Arnholt and Todd R. Overman of law firm Bass, Berry & Sims.

The final rule implementing the cybersecurity maturity model certification (CMMC) program into the Defense Federal Acquisition Regulation Supplement (DFARS) took effect just over one month ago, on Nov. 10. The new rule requires contractors and subcontractors to undergo cybersecurity self-assessments or third-party certifications, post results in the Supplier Performance Risk System (SPRS) and provide annual affirmations of continuous compliance. 

The final rule is the most significant restructuring of cybersecurity obligations in the defense industrial base to date. Since the rule took effect, CMMC is now a binding contract requirement for virtually all companies that create, receive, process or store federal contract information (FCI) or controlled unclassified information (CUI). The new requirements do not, however, apply to awards that do not involve the handling or transmission of FCI or CUI.

Although it will be phased in over a three-year period, CMMC certification is now a prerequisite for contract eligibility. Contractors will need to meet these four obligations, including demonstrating compliance before award, maintaining it throughout performance and certifying its accuracy annually, among others.

  • Reporting: Contractors must enter their current status for each CMMC unique identifier (UID) into the SPRS, unless that system has already been assessed by a CMMC third-party assessment organization (C3PAO) or defense industrial base cybersecurity assessment center (DIBCAC) at the required or higher level. This requirement applies to all systems used to process, store, or transmit FCI or CUI.
  • Continuous compliance: Contractors must maintain the required CMMC level for the entire life of the contract. 
  • Identification: Contractors must provide the contracting officer with the CMMC UID for each covered information system and update this information when changes occur.
  • Affirmation: Contractors must maintain a current affirmation of continuous compliance for each CMMC UID.

The Department of War (DoW), until recently known as the Department of Defense, has repeatedly stated that the ability of contractors to protect sensitive unclassified information is critical to national security. As a result, cybersecurity is now directly tied to contracting rights, award eligibility and potential exposure under the False Claims Act. Cybersecurity assurance is no longer a best practice but a legal condition of participating in the defense marketplace.

The final rule

CMMC was originally developed to address challenges in how the DoW evaluated contractor cybersecurity. Under DFARS 252.204-7012 and National Institute of Standards and Technology (NIST) SP 800-171, contractors were responsible for implementing security controls and attesting to compliance. The CMMC program, codified in 2024 at 32 C.F.R. Part 170, was designed to create a uniform, enforceable framework for cybersecurity assessments across the defense industry.

The final DFARS rule operationalizes this framework by making CMMC a binding contractual requirement. The contracting officer will specify the required CMMC level in the solicitation.

Depending on the sensitivity of the information an offeror’s systems will handle, contractors must complete a CMMC Level 1 or Level 2 self-assessment or undergo a third-party assessment for certain acquisitions at Level 2 or DoW assessment for Level 3, with the technical requirements flowing from the underlying NIST frameworks:

  • CMMC Level 1: Contractors must implement 15 cybersecurity practices derived from FAR 52.204-21, which are basic safeguarding requirements. Level 1 requires annual self-assessment with results entered into SPRS.
  • CMMC Level 2: Incorporates the full set of 110 NIST SP 800-171 controls, which address issues like physical protection, access control and system integrity. Level 2 requires C3PAO assessment every three years to be entered into CMMC Enterprise Mission Assurance Support Service (eMASS) or self-assessment every three years for select programs to be entered into SPRS.
  • CMMC Level 3: Applies to a smaller segment of contractors handling the most sensitive CUI, requiring implementation of 134 controls derived from both NIST SP 800-171 and NIST SP 800-172. Level 3 requires DIBCAC certification assessment every three years with results to be entered into CMMC eMASS.

Contractors must also upload assessment results into SPRS, maintain the required level throughout the life of the contract and submit annual affirmations of continuous compliance. An offeror will be ineligible for award — whether a contract, task order or delivery order — if it does not have a current CMMC status entered in SPRS at the required level and a current affirmation of continuous compliance in SPRS. Both requirements must be met for every contractor information system that will process, store or transmit FCI or CUI in performing the award.

A central feature of the rule is that CMMC compliance becomes a condition of contract eligibility. Contractors cannot receive new awards or continue performance on covered contracts unless their assessment results or certifications are current and properly posted in SPRS. This requirement extends to both prime contractors and subcontractors, and primes are responsible for ensuring subcontractor compliance at the appropriate level. Notably, subcontractors that do not process, store or transmit FCI or CUI on their own information systems during performance are not required to undergo a CMMC assessment.

The rule further requires an “affirming official” to submit an annual affirmation certifying continued compliance with the cybersecurity standards. This affirmation must be updated if the compliance status of any system changes. This requirement is particularly significant from a legal standpoint as it creates a formal, annual representation to the government that can trigger FCA liability if inaccurate.

Three-year phased rollout

The US government anticipates a three-year phased rollout during which CMMC requirements will appear in an increasing number of solicitations. During the first year, only a small number of procurements selected by the CMMC program office will include the requirement. DoW estimates about 1,100 small businesses will be affected in Year One. In the second and third years, agencies will expand CMMC coverage across more contracts, increasing the number of affected small businesses to over 18,000 by Year Three.

By Year Four, CMMC will reach full implementation. Every new solicitation involving FCI or CUI will require at a minimum a Level 1 self-assessment. Contracts involving CUI will require Level 2, and those involving the most sensitive CUI will require Level 3 certification.

Ultimately, the rule will apply to an estimated 338,000 contractors, nearly 230,000 of which are small businesses. Although the rule exempts procurements involving only commercially available off-the-shelf (COTS) items, most contractors will be subject to new annual reporting obligations.

dod pentagon
Cybersecurity

CMMC 2.0 Creates New Compliance Calculus for Defense Contractors

by Shrav Mehta
July 3, 2025

Simplified framework still poses significant challenges for smaller defense industrial base participants

Read moreDetails

Legal & compliance risks

A significant legal risk created by the final rule arises under the FCA. Because contractors must post assessment results in SPRS, maintain certification throughout performance and submit annual affirmations, they will be making frequent and explicit representations to the government about their cybersecurity policies. If these representations are false, incomplete or misleading, they may be actionable under the FCA, particularly under the DOJ’s Civil Cyber-Fraud Initiative, which has already targeted contractors that misrepresented compliance.

Several aspects of the rule heighten FCA exposure. First, SPRS postings are affirmative claims, not passive compliance activities. Submitting inaccurate documentation may constitute a false statement. Second, annual affirmations by an affirming official creates an easy connection for the DOJ to argue that a false certification was made knowingly or with reckless disregard.

To mitigate these risks, contractors should maintain detailed documentation, subcontractor oversight measures and internal monitoring procedures.

Contractors should not wait for the phased rollout to accelerate before acting. Preparation should begin now by determining the appropriate CMMC level for the information their systems handle, particularly where that information qualifies as CUI. Contractors expecting to handle CUI should consider early engagement with a C3PAO, as demand for third-party assessors may rise in later phases of the rollout. Contractors should map systems accurately and document how information flows through their organization and to subcontractors.

Contractors should also develop a documentation system to house policies. Internal audits should be built around annual affirmations. For primes that rely heavily on subcontractors, internal procedures should include verification of subcontractor CMMC status and ongoing monitoring throughout performance.

Contractors will only be able to access their own CMMC certificate or CMMC self-assessment information. DoW does not have a tool that would allow sharing of subcontractor information with prime contractors electronically. Prime contractors are expected to work with their suppliers to conduct verifications as they would for any other clause requirement that flows down to subcontractors. The rule states that prior to awarding a subcontract or other contractual instrument, the prime contractor should ensure that the subcontractor has a current CMMC status at the CMMC level that is appropriate for the information to be flowed down. SPRS will allow subcontractors to print or take a screen shot of their own CMMC status and affirmation information in SPRS, which they can share as they determine appropriate.

Finally, contractors should educate their affirming officials about their new responsibilities. Affirming officials will need clear visibility into how the organization maintains continuous compliance, how incidents are handled and how systems evolve.

Looking ahead

The final CMMC rule represents a decisive shift in how the DoW manages cybersecurity risk across the defense industrial base. By making cybersecurity verification a condition of award eligibility and requiring annual affirmations, the department has transformed cybersecurity from a technical concern to a core compliance and legal obligation. While the phased rollout offers contractors time to prepare, the scope of these requirements demands early attention. Contractors that begin assessing their systems now, document their controls carefully and integrate CMMC into their governance will be better positioned to compete and to avoid the liability risks the rule introduces.

Further CMMC program resources are available on DoW’s chief information officer website.


Tags: Contract ManagementThird Party Risk Management
Previous Post

Banks Shouldn’t View the Treasury Clearing Rule Simply as a Compliance Exercise

Richard W. Arnholt and Todd R. Overman

Richard W. Arnholt and Todd R. Overman

Richard W. Arnholt is a member of Bass, Berry & Sims in Washington, D.C. For over 20 years, he has represented government contract clients in a wide range of matters, including litigation, investigations, counseling and transactions. In particular, he has extensive experience counseling clients on the complex ethics and compliance obligations required of government contractors and grant recipients; assisting companies and individuals faced with suspension or debarment by a number of government agencies; filing and defending against bid protests at the Government Accountability Office (GAO), Court of Federal Claims and the Federal Circuit; and government contracts-related litigation such as prime/sub disputes and defending against False Claims Act (FCA) allegations.
Todd R. Overman is managing partner of Bass, Berry & Sims’ Washington, D.C., office and chairs government contracts practice group. He has nearly two decades of experience advising companies in meeting the demanding and ever-changing regulatory environment of contracting with the federal government and over the past decade has advised on more than 50 transactions involving the purchase or sale of a government contractor.

Related Posts

usaid building

The USAID Funding Crisis as Governance Stress Test

by Oksana Zolotova
December 8, 2025

How compliance and contracts leaders can strengthen resilience after one of the most disruptive funding crises in recent government contracting...

expiration date on product

Why Your Third-Party Risk Assessment Has an Expiration Date

by Mandy Cooper
September 22, 2025

Financial institutions have learned expensive lessons about the cost of treating vendor oversight as a one-time exercise

fbi cyber security incident

Cyber Risk Mitigation, Courtesy the FBI

by Staff and Wire Reports
September 16, 2025

Early engagement with federal investigators creates strategic advantages that extend far beyond incident response

5 wooden steps on a wall

5 Essential Steps to Build & Scale a Third-Party Risk Management Program

by Antonia Donaldson
August 25, 2025

Programs must be comprehensive, documented & defensible

reminder to speak up
No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights