• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Screen Connect
Support
Customer Portal
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Avalara
        • AvidXchange
        • BILL
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • DocLink
        • Fortis
        • FreightPOP
        • Lumber
        • Microsoft 365
        • Netstock
        • Quadient
        • Sage Fixed Assets
        • Sage HCM
        • Sage Intacct Payroll powered by ADP
        • Sage Supply Chain Intelligence
        • Savant WMS
        • Endpoint Automation Solutions
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nuvei
        • Nectari
        • Ottimate
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage HRMS
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed IT Services
        • Managed Cloud Services
        • Network Assurance Core
        • Email Hosting
        • IT Support
        • Microsoft 365 Services
        • Server Monitoring
        • Virtualization
      • Cybersecurity
          • CyberAssurance CORE™
          • Cybersecurity Solutions
          • Backup & Continuity
          • Compliance
          • Dark Web Monitoring
          • EDR
          • Encryption
          • MDR
          • MFA
          • Penetration Testing
          • Security Training
          • SOC
          • Spam & Virus Filtering
          • vCIO
          • Vulnerability Assessment
      • Cloud Services
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Acumatica IaaS
      • Industries
        • Financial Services
        • Healthcare
        • Construction
      • Locations
          • Nationwide
          • Austin
          • California
          • Chicago
          • Minneapolis
          • New Jersey
          • New York
          • North Carolina
          • Philadelphia
          • Phoenix
          • San Diego
          • Seattle
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

What CMMC 2.0 Changes for Your Cybersecurity Compliance

May 12, 2026 by Hector Bonilla

Home » Regulation Compliance » What CMMC 2.0 Changes for Your Cybersecurity Compliance

Write Alt Text for this image.

1:50 PM
Claude responded: Close-up of a dark green vintage typewriter with a sheet of white paper loaded into the carriage, printed with the words "NATIONAL SECURITY" in bold uppercase …
Close-up of a dark green vintage typewriter with a sheet of white paper loaded into the carriage, printed with the words "NATIONAL SECURITY" in bold uppercase black letters, set against a dark wood surface.

The Cybersecurity Maturity Model Certification (CMMC) program began a new program in November 2025 that will shift the burden of attestation and place stricter requirements on government contractors and subcontractors. The existing framework establishes a uniform cybersecurity standard for businesses that handle Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) under contracts with the Department of War (DoW), the agency formerly known as the Department of Defense (DoD). CMMC 2.0 replaces the previous self-attestation model with verified assessments and may affect businesses across the federal supply chain, including subcontractors several tiers removed from a prime contractor.

This article covers what the new rules will actually require, the three certification levels, the phased rollout timeline through 2028 and the broader implications for businesses affected:

What CMMC 2.0 is and What Changed in November 2025

CMMC 2.0 is the formal framework the DoW uses to assess and verify the cybersecurity practices of businesses in the Defense Industrial Base. The program organizes existing federal cybersecurity standards into three levels of certification that are each aligned with widely accepted guidance from the National Institute of Standards and Technology (NIST). Two regulatory milestones gave the program its current legal weight: the 32 Code of Federal Regulations Part 170 final rule, which took effect December 16, 2024 and the 48 CFR rule published in the Federal Register on September 10, 2025, which took effect on November 10, 2025.

The 48 CFR rule amended the Defense Federal Acquisition Regulation Supplement (DFARS) to allow contracting officers to include CMMC requirements in solicitations and contracts through DFARS clause 252.204-7025, with contract eligibility now tied to a business’s CMMC status under DFARS clause 252.204-7021,. CMMC obligations no longer appear only in policy documents but do in the contract itself, with status confirmed through the Supplier Performance Risk System (SPRS) before an award can be made.

The Three CMMC Levels

CMMC 2.0 streamlined the original five-tier model into three certification levels. The level required for a given contract depends on the type of information involved and a single business may need to demonstrate different levels for different contracts in its portfolio:

Level 1 (Foundational)

Level 1 applies to businesses that handle FCI but not CUI. It requires implementation of the 15 basic safeguarding practices set out in FAR 52.204-21, covering fundamental controls such as access management, password protection and basic incident reporting. Verification is handled through an annual self-assessment, the results of which must be entered into SPRS along with an affirmation from a senior executive.

Level 2 (Advanced)

Level 2 applies to businesses that handle CUI and is the level most defense suppliers will need to reach. It requires implementation of the 110 security controls in NIST SP 800-171 Revision 2, covering areas such as access control, audit and accountability, configuration management, incident response, media protection, system integrity and more. Some Level 2 contracts permit self-assessment, while others require a third-party assessment conducted by a CMMC Third-Party Assessor Organization (C3PAO) accredited by the Cyber Accreditation Body.

Level 3 (Expert)

Level 3 applies to a narrow set of businesses supporting the most sensitive DoW programs. It builds on the 110 controls of Level 2 by adding 24 enhanced controls drawn from NIST SP 800-172, designed to address advanced persistent threats. Verification is handled through a government-led assessment rather than a third-party assessor.

The Phased CMMC Rollout Timeline Through November 2028

The DoW is implementing CMMC 2.0 through a four-phase rollout that began on November 10, 2025 and will run through November 10, 2028. The phased structure determines when CMMC clauses appear in DoW solicitations and which level of verification those clauses require.

  • Phase 1 runs from November 10, 2025, through November 9, 2026 and triggers Level 1 and Level 2 self-assessment requirements in applicable solicitations, with contracting officers retaining discretion to require third-party Level 2 assessments for select high-priority contracts
  • Phase 2 begins November 10, 2026, and introduces mandatory C3PAO Level 2 certification for applicable contracts involving CUI
  • Phase 3 begins November 10, 2027, and introduces Level 3 certification requirements where applicable
  • Phase 4, scheduled to begin November 10, 2028, marks full implementation, at which point CMMC level requirements will appear as a condition of award across all applicable DoW solicitations and contracts

What CMMC 2.0 Readiness Looks Like in Practice

Readiness under CMMC 2.0 has four practical dimensions:

  1. Scope – A business must identify which of its systems, applications, users and data flows actually touch FCI or CUI, because the scope of the assessment is bound by where that information lives. Many businesses may discover during scoping that the relevant data passes through more hands than expected, including external people, technology and facilities, and can end up stored in systems outside of your immediate control or visibility.
  2. Documentation – CMMC assessments evaluate a System Security Plan that describes how each applicable control is implemented, supported by evidence demonstrating how each control is implemented. Businesses that fall short of the full control set may submit a Plan of Action and Milestones (POA&M) to document remediation work, but for Level 2 the rule sets a strict 180-day window to close the open items before a conditional status expires. Independent assessments by a third-party auditor can help businesses identify and document unmet requirements before a formal CMMC assessment.
  3. Controls – The 15 practices at Level 1 and the 110 controls at Level 2 cover areas such as multi-factor authentication (MFA) for accounts accessing FCI or CUI, centralized logging with active monitoring, consistent patch management and least-privilege access enforcement. A vulnerability assessment is required by NIST to help identify gaps across these areas through automated scanning and analysis; though not required, penetration testing also validates whether these controls function under the kind of pressure an attacker would apply.
  4. Sustainment – CMMC validation requires consistent compliance management year-over-year. Level 1 requires annual self-assessment and affirmation in SPRS. Level 2 certifications carry a three-year validity period but require annual affirmation in years two and three. Changes to the business, including acquisitions, divestitures, technology migrations and new data flows, can shift the compliance posture and the scope of the next assessment.

Prepare for CMMC 2.0 with SWK Technologies

CMMC 2.0 has reshaped how cybersecurity compliance is verified for businesses across the federal supply chain and the practical work of preparing for an assessment can take months depending on the current state of your security program. SWK Technologies will help you evaluate your cybersecurity posture against the controls that CMMC and similar frameworks rely on, identify gaps through structured assessments and document the evidence needed to demonstrate compliance.

Sign up here for an independent assessment by SWK and let us help you validate if your security controls meet NIST guidelines to ensure compliance with the latest cybersecurity regulations.

Contact SWK Here

Category: Regulation Compliance, Blog, Cybersecurity

Sidebar

Recent Posts

  • What CMMC 2.0 Changes for Your Cybersecurity Compliance
  • Sage Intacct vs. Microsoft Dynamics GP
  • Which Microsoft Copilot Plan is Right for You?
  • Sage Intacct vs Sage 50 – Top 13 Differences
  • AI in ERP: Cutting Down on Manual Accounting Tasks
  • How Pre-Contract Procurement in Construction Creates Financial Blind Spots
  • Sage 100 2026.0 Release Feature Guide

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Write Alt Text for this image. 1:50 PM Claude responded: Close-up of a dark green vintage typewriter with a sheet of white paper loaded into the carriage, printed with the words "NATIONAL SECURITY" in bold uppercase … Close-up of a dark green vintage typewriter with a sheet of white paper loaded into the carriage, printed with the words "NATIONAL SECURITY" in bold uppercase black letters, set against a dark wood surface.

What CMMC 2.0 Changes for Your Cybersecurity Compliance

Read moreWhat CMMC 2.0 Changes for Your Cybersecurity Compliance
Sage Intacct vs. Microsoft Dynamics GP cloud ERP comparison

Sage Intacct vs. Microsoft Dynamics GP

Read moreSage Intacct vs. Microsoft Dynamics GP
A 3D rendering of the Microsoft 365 Copilot app icon, shown as a white rounded square tilted at an angle with the multicolored Copilot logo on its face, casting a shadow on a red-to-blue gradient background.

Which Microsoft Copilot Plan is Right for You?

Read moreWhich Microsoft Copilot Plan is Right for You?

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2026 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.