CMMC 2.0 Requirements: What's Changed and What's Next

Hey there, defense contractor folks. Today I'm going to walk you through the significant changes in CMMC 2.0 and what you need to prepare for as implementation approaches.

April 18, 2025

If you're in the Defense Industrial Base (DIB), these changes will directly impact your business operations and ability to bid on DoD contracts.

Understanding CMMC 2.0 is no longer optional—it's essential for your company's future with the Department of Defense.

In this article, you'll learn:

  • The key differences between CMMC 1.0 and 2.0
  • The new streamlined level structure
  • How POA&Ms are now being handled
  • What the implementation timeline looks like
  • Practical next steps for your organization

The Simplified Level Structure

CMMC 1.0 introduced a complex 5-level model that many contractors found confusing.

CMMC 2.0 has streamlined this into a more straightforward 3-tier approach.

Gone are the transitional levels 2 and 4.

The new levels have been renamed to Foundational (Level 1), Advanced (Level 2), and Expert (Level 3).

This simplification makes it much clearer which level your organization needs to target based on the data you handle.

For most DIB organizations, the requirements break down like this:

  • Level 1: For contractors that handle Federal Contract Information (FCI) only
  • Level 2: For contractors that handle Controlled Unclassified Information (CUI)
  • Level 3: For contractors handling CUI on high-value programs or facing Advanced Persistent Threats (APTs)

Removal of "Delta" Requirements

One of the most significant changes in CMMC 2.0 is the elimination of all "delta" requirements.

These were additional security practices and maturity processes that CMMC 1.0 added beyond the baseline DFARS requirements.

CMMC 2.0 has returned to requiring the 110 NIST SP 800-171 security requirements at Level 2 and additional NIST SP 800-172 requirements at Level 3.

This alignment with established NIST standards makes compliance more straightforward for organizations already working toward NIST SP 800-171 implementation.

Introduction of POA&Ms

CMMC 1.0 required 100% implementation of all security requirements.

No exceptions.

CMMC 2.0 introduces a more practical approach by allowing Plans of Action and Milestones (POA&Ms).

This means organizations can achieve certification even with some gaps, provided they have a clear plan to address them.

However, there are important restrictions:

  • For Level 2, 80% of the 110 requirements (88 controls) must be implemented
  • POA&Ms must be closed within 180 days
  • Certain critical security requirements cannot be included in POA&Ms

This flexibility acknowledges the real-world challenges of implementing comprehensive cybersecurity measures while still maintaining high standards.

Self-Assessment Options

Another major change is the introduction of self-assessment options.

Under CMMC 1.0, all assessments required third-party certification.

CMMC 2.0 allows:

  • All Level 1 assessments to be performed as self-assessments
  • Some Level 2 assessments to be self-assessed (for select programs)
  • Most Level 2 assessments to require C3PAO certification (every three years)
  • Level 3 to require government-led assessment

This tiered approach reduces costs for smaller contractors while maintaining appropriate scrutiny for organizations handling more sensitive information.

Implementation Timeline

The DoD has published the final rule for the CMMC Program on October 15, 2024.

The program will roll out in four phases over three years:

Phase 1: Expected to begin in early to mid-2025, requiring Level 1 (Self) and Level 2 (Self) assessments for applicable contracts.

Phase 2: Begins six months after Phase 1, continuing the requirements from Phase 1.

Phase 3: Begins one year after Phase 2, adding Level 2 (C3PAO) assessment requirements and possibly Level 3 (DIBCAC) assessments for high-value contracts.

Phase 4 (Full Implementation): Begins three years after the effective date of Phase 1, with CMMC requirements included in all applicable DoD solicitations and contracts.

This phased approach gives organizations time to prepare, but the clock is ticking.

Wrapping Up

CMMC 2.0 represents a more pragmatic approach to securing the defense supply chain.

The streamlined level structure, alignment with NIST standards, and introduction of POA&Ms all reflect feedback from the defense industrial base.

But don't mistake these changes for a relaxation of security requirements.

The core mission remains the same: protecting controlled unclassified information throughout the defense supply chain.

What you've learned today should help you navigate the evolving CMMC landscape and prepare your organization for what's coming next.

The time to start preparing is now, as the first phase of implementation is expected to begin in early to mid-2025.