Not ready for a Complete Pen Test? How about finding out your Cyber Score in 2 mins? Click here for your Cyber Score
CMMC Level 2 Requirements for Defense Manufacturers: Complete 2026 Guide

CMMC Level 2 Requirements for Defense Manufacturers: Complete 2026 Guide

Published by Capital Cyber | Leesburg, VA | (571) 410 3066

If you are a defense manufacturer and your contracts touch Controlled Unclassified Information (CUI), CMMC Level 2 is the line you have to cross. There is no “Level 1.5.” There is no delay. And as of November 10, 2026, third-party Level 2 certification becomes the default requirement for most contracts involving CUI.

This is the complete 2026 guide to CMMC Level 2 requirements for defense manufacturers — what the 110 controls actually require, how the scoring works, which controls cannot be on a POA&M, and the real timeline to certification for CNC shops, aerospace suppliers, electronics manufacturers, and metal fabricators.

If you run a shop that supplies the DoD, read this carefully. The rules have teeth.


What Is CMMC Level 2?

CMMC Level 2 — the Advanced tier of the Cybersecurity Maturity Model Certification — is built on 110 security requirements from NIST SP 800-171 Rev. 2, organized across 14 control families and measured by 320 distinct assessment objectives.

In plain English: if your manufacturing environment stores, processes, or transmits CUI — engineering drawings, technical data packages, specifications, ITAR-controlled data, or anything a prime contractor flows down under DFARS 252.204-7012 — Level 2 is the baseline that keeps you eligible for DoD contracts.

The DoD estimates roughly 80,000 contractors in the Defense Industrial Base need Level 2 certification. Most defense manufacturers are in that number.


Level 2 Self-Assessment vs. C3PAO Assessment

Level 2 comes in two flavors, and knowing which one applies to you is step one.

Level 2 (Self-Assessment) — allowed for a narrow set of contracts involving CUI that is not critical to national security. You assess your own environment and submit results to the Supplier Performance Risk System (SPRS).

Level 2 (C3PAO Certification) — the default for most CUI contracts. An accredited Certified Third-Party Assessment Organization (C3PAO) conducts an independent audit of your implementation of all 110 controls.

Here is the reality for 2026: assume you need C3PAO certification unless the solicitation specifically says otherwise. The technical requirements are identical either way — only the verification method differs.


The 14 Control Families: What Level 2 Actually Requires

CMMC Level 2 organizes all 110 requirements across 14 NIST 800-171 control families. For defense manufacturers, here is what each one actually means on the shop floor:

1. Access Control (AC) — 22 requirements

The largest family. Covers who can access what. Includes MFA for privileged and non-privileged accounts, least-privilege enforcement, remote access controls, wireless and mobile device restrictions, and control over CUI flow. For manufacturers, this is usually the biggest lift — especially controlling access to CAD files, engineering drives, and CNC programming workstations.

2. Awareness and Training (AT) — 3 requirements

Security awareness training for all users, insider threat awareness, and role-specific training for users with security responsibilities. Generic “phishing video once a year” does not satisfy this.

3. Audit and Accountability (AU) — 9 requirements

Immutable, time-stamped audit logs for everything touching CUI. Log review processes. Protection of audit information from unauthorized modification. This is where most manufacturers have the biggest gap — shop-floor systems often have no central logging at all.

4. Configuration Management (CM) — 9 requirements

Baseline configurations, change control processes, least-functionality hardening, software inventories, and restrictions on user-installed software. Your ERP, CAM system, and quoting tools all need documented baselines.

5. Identification and Authentication (IA) — 11 requirements

User identification, MFA enforcement, password complexity and reuse rules, cryptographic protection of authenticators. MFA is a gate control — not optional, not deferrable.

6. Incident Response (IR) — 3 requirements

Documented incident response plan, user training on reporting, and the ability to track and respond to incidents. You also have to report cyber incidents to DoD within 72 hours under DFARS 252.204-7012.

7. Maintenance (MA) — 6 requirements

Controlled and monitored maintenance activities, sanitization of systems removed for off-site maintenance, supervision of maintenance personnel without clearance. This one catches manufacturers off guard when third-party CNC technicians touch CUI-adjacent systems.

8. Media Protection (MP) — 9 requirements

Protection of media containing CUI, sanitization before disposal or reuse, marking of CUI, limited media transport. USB drives, removable hard drives, and physical prints of drawings all qualify.

9. Personnel Security (PS) — 2 requirements

Screening of individuals with CUI access and ensuring CUI is protected during personnel transfers and terminations.

10. Physical Protection (PE) — 6 requirements

Restricted physical access, visitor control, maintained visitor logs, secure areas for CUI storage, and alternate work site protection. If someone can walk up to an engineering workstation unchallenged, you fail PE.

11. Risk Assessment (RA) — 3 requirements

Periodic risk assessments, vulnerability scanning, and remediation of identified vulnerabilities.

12. Security Assessment (CA) — 4 requirements

Periodic security control assessments, plans of action for deficiencies, monitoring of controls on an ongoing basis, and a documented System Security Plan (SSP).

13. System and Communications Protection (SC) — 16 requirements

Network segmentation, boundary protection, FIPS 140-2 validated cryptography for CUI at rest and in transit, collaboration device restrictions, and VoIP controls. For manufacturers, this is where GCC High, Azure Government, or a proper CUI enclave usually enters the picture.

14. System and Information Integrity (SI) — 7 requirements

Flaw remediation, malicious code protection, system monitoring, and security alert response. Anti-virus alone does not cut it — you need detection and response capability.

Total: 110 requirements, 320 assessment objectives.


The Level 2 Scoring System: 110 Points, 88 to Pass

This is the part most contractors get wrong, and it matters a lot.

CMMC Level 2 is scored on a point-based system starting at 110. Each unmet control deducts points based on its criticality:

  • 5 points — critical controls (e.g., multi-factor authentication, boundary protection)
  • 3 points — important controls (e.g., FIPS-validated encryption)
  • 1 point — baseline controls

To qualify for conditional Level 2 certification, you need a minimum score of 88 out of 110 (80%). Drop below 88 and you fail — full stop.


The 6 Critical Controls That Cannot Be on a POA&M

This is where defense manufacturers get tripped up most often. CMMC 2.0 allows a Plan of Action and Milestones (POA&M) for some non-critical gaps, giving you 180 days to remediate — but six foundational controls must be fully implemented at the time of assessment.

Under 32 CFR § 170.21, the following security requirements cannot be on a POA&M:

  1. AC.L2-3.1.20 — Verify and control connections to external systems
  2. AC.L2-3.1.22 — Control information posted on publicly accessible systems
  3. PE.L2-3.10.3 — Escort visitors and monitor visitor activity
  4. PE.L2-3.10.4 — Maintain audit logs of physical access
  5. PE.L2-3.10.5 — Control and manage physical access devices
  6. CA.L2-3.12.4 — Develop, document, and update the System Security Plan (SSP)

Also barred from POA&M: any control worth 3 or 5 points, with one narrow exception — CUI encryption (SC.L2-3.13.11) can be on a POA&M if encryption is implemented but not yet FIPS-validated.

Bottom line: if MFA isn’t in place, if your SSP is missing, or if visitors can walk into your shop floor unchallenged, you will not receive conditional certification. You will fail the assessment and go back to the end of a 9-to-12-month C3PAO queue.


Conditional vs. Final Level 2 Certification

Two outcomes matter:

Conditional Level 2 (C3PAO) — You scored at least 88 out of 110, and all remaining gaps qualify for POA&M inclusion. You have 180 days from the conditional status date to close every POA&M item and pass a formal closeout assessment.

Final Level 2 (C3PAO) — All 110 controls fully implemented and verified. Valid for 3 years. Annual affirmations required.

Miss the 180-day window? Your conditional status expires. You lose certified status. You start over.


The November 10, 2026 Deadline: Why This Is Urgent for Manufacturers

The CMMC rollout happens in four phases:

  • Phase 1 (Nov 10, 2025): Self-assessments accepted as a condition of award. DoD has discretion to require C3PAO Level 2.
  • Phase 2 (Nov 10, 2026): C3PAO-assessed Level 2 becomes the default for CUI contracts.
  • Phase 3 (Nov 10, 2027): C3PAO Level 2 mandatory across the board, including option exercises on existing contracts.
  • Phase 4 (Nov 10, 2028): Full implementation.

Here is the math defense manufacturers need to run:

  • Gap assessment and remediation: 4 to 8 months
  • SSP and documentation: 2 to 4 months (can run parallel)
  • C3PAO scheduling wait time: 9 to 12 months (and growing)
  • Assessment execution: 2 to 6 weeks
  • Conditional certification POA&M window: up to 180 days

A contractor starting today is realistically looking at certification in mid-to-late 2027 — already past the Phase 2 deadline. If you’re not in motion right now, you will miss at least one contract recompete cycle.


Why Defense Manufacturers Face Unique Level 2 Challenges

Generic CMMC guides treat every environment the same. Real manufacturing shops do not look like law firms or accounting practices. Here is what makes Level 2 harder — and more expensive — for defense manufacturers:

1. Shop-floor OT systems. CNC machines, CMMs, PLC-controlled equipment, and legacy machine controllers often run Windows 7, XP Embedded, or proprietary operating systems that cannot be patched or segmented easily.

2. Engineering file sprawl. Technical drawings and STEP files move between engineering, quoting, CAM programming, inspection, and production. Every stop expands CUI scope.

3. Flat networks. Many machine shops have a single flat LAN where office PCs, CAD workstations, CNC controllers, and quality lab equipment all talk freely. That has to change for CMMC — network segmentation is a major remediation line item.

4. ERP and quoting systems. Epicor, JobBOSS, ProShop, Global Shop, E2, Infor Visual — your ERP almost certainly touches CUI. All of it has to be scoped and documented.

5. Supply chain flow-down. You must flow CMMC requirements to any subcontractor who handles CUI on your behalf. Most shops have no formal mechanism to verify this today.

6. ITAR ≠ CMMC. A common trap. You can be fully ITAR-compliant and still fail CMMC Level 2 because ITAR does not require FIPS-validated encryption, MFA, an SSP, or formal audit logging. CMMC does.


What a Real Level 2 Readiness Path Looks Like

For a typical defense manufacturer, here’s the compressed version of the 12-to-14-month path:

Months 1–2: Scope and Gap

  • Define your CUI boundary
  • Map every system, user, and data flow touching CUI
  • Run a formal gap assessment against NIST 800-171 using 800-171A as the assessment guide
  • Calculate your current SPRS score

Months 3–6: Remediation

  • Deploy GCC High or a CUI enclave where appropriate
  • Implement MFA, FIPS-validated encryption, and network segmentation
  • Harden endpoints, deploy SIEM and logging
  • Close all non-POA&M-eligible controls

Months 4–7: Documentation (parallel with remediation)

  • Build a real System Security Plan tied to your actual environment
  • Write policies and procedures across all 14 families
  • Build your Customer Responsibility Matrix for cloud services
  • Train personnel and document evidence

Months 7–9: Pre-Assessment

  • Mock assessment or readiness review with an RPO
  • Fix any last-mile gaps
  • Ensure all non-POA&M controls are solid

Months 9–12: C3PAO Assessment

  • Formal C3PAO engagement
  • Evidence review, interviews, testing
  • Receive Conditional or Final Level 2 status

Months 12–18 (if needed): Close out POA&M items within the 180-day window.


Common Level 2 Mistakes Defense Manufacturers Make

From what Capital Cyber sees across the manufacturing DIB every week:

  • Confusing readiness with certification. A C3PAO cannot provide both consulting and assessment to the same client. 32 CFR Part 170 requires a firewall.
  • Relying on commercial Microsoft 365 for CUI. Most CUI workloads need GCC High or a dedicated enclave. Commercial M365 rarely satisfies 800-171 on its own.
  • Using a generic downloaded SSP template. Assessors read the SSP against your actual environment. A template with placeholders is an instant red flag.
  • Underestimating subcontractor flow-down. If your subs can’t hold Level 2 and they touch your CUI, you own that risk.
  • Treating an MSP’s “cybersecurity bundle” as compliance. Most generic MSPs have never been through a C3PAO assessment. They don’t know what they don’t know.

The Bottom Line

CMMC Level 2 is not a compliance checkbox — it is an operational discipline built around 110 controls, 320 objectives, and 14 families that reshape how a manufacturing business handles information. Do it right, and you protect every DoD dollar on your books for the next decade. Do it wrong, and you lose contract eligibility on the day your current award recompetes.

Defense manufacturers that start their Level 2 journey now — in the first half of 2026 — still have runway. Manufacturers that wait until Q4 2026 are almost guaranteed to miss the Phase 2 deadline.

Ready to take CMMC Level 2 from confusion to a roadmap?

Capital Cyber works exclusively with defense manufacturers, CNC shops, aerospace suppliers, electronics producers, and DoD subcontractors. We build right-sized Level 2 programs that pass C3PAO assessments — no enterprise bloat, no theoretical frameworks, no guesswork.

Book a free CMMC Level 2 Readiness Call with Capital Cyber →

Practical compliance. Real progress. Your path from gap to certification starts with one honest conversation.

Do not wait until you lose a contract to take action. Call (571) 410 3066 or visit capital-cyber.com for a free CMMC readiness consultation.

Capital Cyber | 1019B Edwards Ferry Rd. #1183, Leesburg, VA 20176

Security Obsessed. Service Driven.

Let Capital Cyber help you with Cybersecurity Services