Don’t Lose Out on Department of Defense Work
Starting November 10th, the Department of Defense (DoD) has implemented new cybersecurity requirements that directly impact contractors across the Defense Industrial Base (DIB). Known as CMMC Level 1, these rules are now being integrated into DoD contracts, and the message is clear: if your company does not meet Level 1 standards, it will not be eligible to work on contracts that require them.
Who is Affected Now and in the Future?
CMMC Level 1 applies to 60%-70% of all DoD contractors, including prime contractors, subcontractors, and suppliers who handle Federal Contract Information (FCI). While some exemptions exist—such as companies selling Commercial-off-the-shelf (COTS) items without modification or contracts valued under $15,000—the majority of DIB organizations will need to comply. Looking ahead, adherence to these standards is expected to become increasingly critical as the DoD expands cybersecurity requirements across higher levels of CMMC, affecting more contracts and more suppliers.
Advanced CMMC Levels 2 and 3 will be phased in over 2026 and 2027 and require additional safeguards for companies that handle Controlled Unclassified Information (CUI). CUI is sensitive information that the U.S. federal government wants protected but that is not classified as Confidential, Secret, or Top Secret. In other words, it’s important information that could cause problems if it fell into the wrong hands, but it doesn’t rise to the level of classified procurements.
CUI can include a wide variety of data.
Common examples of CUI are: technical information or drawings for defense equipment or systems, contract information that includes sensitive business or pricing data, export-controlled information that has restrictions under ITAR or EAR regulations, critical infrastructure details that could impact operations if disclosed
Understanding CMMC Level 1 Requirements
CMMC Level 1 is designed to ensure basic cyber hygiene for protecting sensitive information. It consists of 17 fundamental security practices, including the use of unique user IDs, strong passwords, limiting system access, maintaining basic device configurations, and ensuring proper media handling. These practices expand into 59 specific controls that a company must address.
Compliance also requires an annual reaffirmation conducted by a senior company official, with results posted in the Supplier Performance Risk System (SPRS) so contracting officers and prime contractors can verify your status.
Steps to Achieve CMMC Level 1 Compliance
The journey to compliance begins with understanding whether your company handles Federal Contract Information (FCI). If it does, the next step is to identify all systems, emails, file shares, and design files that store, process, or transmit this information. Once the scope is established, companies must familiarize themselves with the specific requirements outlined in FAR 52.204-21.
Core domains include access control, identification and authentication, media protection, physical protection, system and communications protection, and system integrity.
Companies must document policies, configurations, access lists, and remediation steps for any gaps they identify. The final step is obtaining a senior official’s affirmation and entering the self-assessment into SPRS, completing the compliance process.
Timeline to Reach Compliance
While Level 1 is the least burdensome CMMC tier, achieving compliance still requires careful planning and documentation. For organizations with existing security measures, the process can take as little as 30 to 90 days. Small to medium-sized firms may require 4 to 8 weeks for assessment and SPRS entry, while companies that need significant new controls or cloud-based solutions should anticipate three to six months—or longer—to fully close gaps and document evidence.
Cohorts, Workshops, and Resources
Support for achieving CMMC Level 1 compliance is becoming widely available. Programs such as Washington APEX Accelerator provide guidance, workshops, and cohort-based learning opportunities to help contractors navigate requirements efficiently. Additional resources include industry guides on CMMC readiness, templates for documentation, and training sessions for affirming officials. These tools can accelerate compliance and reduce the risk of losing out on DoD contracts.
Conclusion
CMMC Level 1 is no longer a future concern—it is here, and the DoD is enforcing it through new contract requirements. Contractors who fail to meet these cybersecurity standards risk losing access to valuable work. By understanding the requirements, documenting processes, and leveraging available resources, businesses can secure compliance and maintain eligibility for contracts within the DIB. Acting now ensures you stay competitive in a landscape where cybersecurity is becoming a baseline expectation rather than an optional practice.
Resources