The Cybersecurity Maturity Model Certification (CMMC) framework has undergone several reforms over the years, culminating in the publication of the CMMC 2.0 final rule in the federal register on October 15, 2024.
One of the striking differences between CMMC 2.0 and its previous iterations is the emphasis on mandatory compliance for all defense contractors that handle Controlled Unclassified Information (CUI). That includes prime contractors who engage directly with the Department of Defense (DoD), as well as subcontractors and even external service providers (ESPs).
Another significant reform is the introduction of mandatory independent audits for CMMC Levels 2 and 3.
To obtain Level 2 certification, a defense contractor must undertake triennial cybersecurity assessments spearheaded by CMMC third-party assessor organizations (C3PAOs). Here are the six critical things that C3PAOs look for during routine CMMC audits.
Photo Credit: Pixabay.com
- Access Control Protocols
Access control is a basic requirement for all Defense Industrial Base (DIB) companies that process controlled unclassified information. It entails procedures that ensure only authorized personnel can interact with the CUI in your system.
When you enlist a C3PAO, the organization will carefully scope your information assets to determine if you’ve implemented robust access control mechanisms. Their focus areas include the use of strong passwords and multi-factor authentication (MFA).
To create the right impression, you’ll need to go beyond surface-level access control practices.
Consider embracing more advanced techniques, such as enforcing the principle of least privilege (PoLP) and utilizing encryption software like virtual private networks (VPNs).
- Data Flow Diagrams
How does information flow into and out of your organization? This is the next critical aspect that a C3PAO will examine during CMMC Level 2 assessments.
Note that CUI typically comes with defense contracts. But once the information is in your possession, you must implement the right procedures for secure storage, handling, and dissemination.
C3PAOs will review each step extensively to ensure you’ve deployed proper safeguards against unauthorized access to your organization’s CUI assets.
To minimize the security weaknesses uncovered during the audit processes, remember to apply proper data encryption ahead of the assessments. That applies to both data-in-transit and data-at-rest.

Photo Credit: Pixabay.com
- Incident Response Protocols
When implementing cybersecurity practices, the overarching goal is to avert threats proactively. But since hackers are continually refining their craftiness, even the strongest bulwark may be breached occasionally.
Implementing advanced incident response protocols is the most effective way to deal with cyber-attacks after the fact.
Ensure your organization has a structured methodology for handling cyber incidents. The plan should be broad-spectrum, encompassing techniques for threat detection and response, as well as risk mitigation. More importantly, your incident response protocols must align with the CMMC standards for Level 2 businesses.
Once you have a plan in place, assess their efficacy by simulating cyber-threats. Model with the worst-case scenarios if possible.
This validates your organization’s readiness to the most aggressive threats commonly aimed at the defense supply chain.
- Personnel Training Records
One rookie mistake when preparing for C3PAO assessments is skimping on employee training. To demonstrate your CMMC Level 2 readiness, adopt programs that impart your IT team with CMMC knowledge.
Although your immediate interest is Level 2, it’s best to bring them up to speed on Levels 1 and 3 as well.
Document employee training records, highlighting the covered topics, key beneficiaries, and the frequency of the training programs.
You may curate the programs to focus on equipping your in-house cybersecurity team with CMMC’s Level 2 requirements. However, every other employee must be regularly impressed on the significance of adhering to your organization’s cybersecurity policies.
It’s even better if your company also conducts extensive pre-employee screening. This ensures you’re hiring individuals with clean records, rather than those previously implicated in serious offenses like espionage.

Photo Credit: Pixabay.com
- System Security Plan
A system security plan (SSP) is a formal document that details your organization’s cybersecurity preparedness. It describes the security protocols you have put in place or plan to enforce to safeguard the information in your systems.
Since CMMC Level 2 deals primarily with CUI, your system security plan should spell out how your company handles CUI.
A C3PAO will carefully review the document to establish your system’s cybersecurity posture and how it aligns with CMMC’s standards for Level 2 DIBs.
A good practice is to undertake multiple self-audits between the mandated triennial C3PAO assessments, updating your SSPs after each evaluation.
- POA&Ms
Plans of Action and Milestones (POA&Ms) are commonly used alongside system security plans.
But unlike SSPs that detail the security policies and procedures for safeguarding the CUI in your systems, POA&Ms helps you track the remediation of specific security weaknesses identified during previous audits. POA&Ms detail when and how to fulfill the unmet controls.
CMMC Level 2 allows for limited usage of POA&Ms.
If invoked, aspiring defense suppliers have up to 180 days to resolve the cybersecurity deficiencies before pursuing Level 2 certification further. Similarly, existing contractors must address the security vulnerabilities within the stipulated window or lose their contracts.

Photo Credit: Pixabay.com
Summary
When it comes to CMMC Level 2 compliance, in-depth preparation is key. A critical part of the planning entails scouring the Cyber AB marketplace for an accredited third-party assessment organization.
But even before you go shopping for an authorized C3PAO, it’s prudent to identify the key aspects that the auditors typically look for during their routine cybersecurity assessments.
Understanding the focus areas is a significant step towards shortening the CMMC Level 2 assessment and certification process. Besides, it enables you to anticipate and respond decisively to emerging cyber threats.
