DoD Compliance

CMMC Level 2 Compliance Services

Achieve and maintain compliance with the Cybersecurity Maturity Model Certification (CMMC) Level 2 requirements. We help defense contractors implement all 110 NIST SP 800-171 security controls to protect Controlled Unclassified Information (CUI).

What is CMMC?

The Cybersecurity Maturity Model Certification (CMMC) is a unified standard developed by the Department of Defense (DoD) for implementing cybersecurity across the defense industrial base (DIB).

CMMC ensures that defense contractors and subcontractors adequately protect sensitive unclassified information, specifically Controlled Unclassified Information (CUI) and Federal Contract Information (FCI).

CMMC Level 2 requires compliance with all 110 security controls from NIST Special Publication 800-171, representing a comprehensive security program for protecting CUI.

Who Needs CMMC?

CMMC applies to all DoD contractors and subcontractors, regardless of size, that handle FCI or CUI:

  • Prime Contractors directly contracted by the DoD
  • Subcontractors working with prime contractors handling DoD data
  • Any organization in the DoD supply chain
  • Companies handling Controlled Technical Information (CTI)
  • Organizations processing ITAR-controlled data
110
Security Controls
14
Control Families
80,000+
DIB Companies Affected
3 Years
Certification Validity

The 14 CMMC Level 2 Control Families

CMMC Level 2 aligns with NIST SP 800-171 and organizes the 110 security controls into 14 families. Here's how Nexum Dynamics helps you achieve compliance in each domain.

AC22 controls

Access Control

Limiting system access to authorized users, processes, and devices, and controlling access to functions and information.

How Nexum Dynamics Helps

  • Role-based access control implementation
  • Privileged access management (PAM) solutions
  • Remote access monitoring and control
  • Session management and timeout policies
  • Wireless access protection
AT3 controls

Awareness and Training

Ensuring personnel are aware of security risks and trained on policies and procedures.

How Nexum Dynamics Helps

  • Security awareness training programs
  • Role-based training development
  • Phishing simulation exercises
  • Training documentation and tracking
  • Ongoing security education
AU9 controls

Audit and Accountability

Creating, protecting, and retaining audit records to enable monitoring, analysis, and reporting.

How Nexum Dynamics Helps

  • SIEM deployment and configuration
  • Centralized log management
  • Audit log review procedures
  • Event correlation and analysis
  • Compliance reporting automation
CM9 controls

Configuration Management

Establishing and maintaining baseline configurations and inventories of systems throughout their lifecycles.

How Nexum Dynamics Helps

  • Baseline configuration development
  • Change management processes
  • Configuration monitoring tools
  • Software inventory management
  • Security configuration guides
IA11 controls

Identification and Authentication

Identifying and authenticating users, processes, and devices before allowing access to systems.

How Nexum Dynamics Helps

  • Multi-factor authentication deployment
  • Identity management solutions
  • Password policy implementation
  • Cryptographic authentication
  • Authenticator management
IR3 controls

Incident Response

Establishing operational incident handling capabilities including preparation, detection, analysis, and recovery.

How Nexum Dynamics Helps

  • Incident response plan development
  • 72-hour DoD breach notification compliance
  • Forensic capability establishment
  • Incident response testing and exercises
  • Post-incident analysis procedures
MA6 controls

Maintenance

Performing timely maintenance on organizational systems and providing controls on maintenance tools and personnel.

How Nexum Dynamics Helps

  • Maintenance scheduling and documentation
  • Remote maintenance security controls
  • Maintenance personnel oversight
  • Tool and media sanitization
  • Maintenance record keeping
MP9 controls

Media Protection

Protecting system media containing CUI, limiting access, and sanitizing or destroying media before disposal.

How Nexum Dynamics Helps

  • Media handling procedures
  • Encryption for portable media
  • Secure media storage solutions
  • Media sanitization and destruction
  • Removable media controls
PE6 controls

Physical Protection

Limiting physical access to systems, equipment, and operating environments to authorized individuals.

How Nexum Dynamics Helps

  • Physical access control systems
  • Visitor management procedures
  • Facility monitoring solutions
  • Environmental controls
  • Physical security assessments
PS2 controls

Personnel Security

Screening individuals prior to access and ensuring CUI protection during personnel actions like terminations.

How Nexum Dynamics Helps

  • Personnel screening processes
  • Access termination procedures
  • HR-IT-Security coordination
  • Personnel transfer protocols
  • Background check integration
RA3 controls

Risk Assessment

Assessing risk to operations, assets, and individuals from system operation and CUI processing.

How Nexum Dynamics Helps

  • Vulnerability scanning programs
  • Risk assessment methodologies
  • Threat identification and analysis
  • Remediation prioritization
  • Continuous risk monitoring
CA4 controls

Security Assessment

Periodically assessing security controls, developing remediation plans, and monitoring security posture.

How Nexum Dynamics Helps

  • System Security Plan (SSP) development
  • Plan of Action & Milestones (POA&M)
  • Control assessment procedures
  • Gap analysis and remediation
  • Continuous monitoring programs
SC16 controls

System and Communications Protection

Monitoring and protecting communications at system boundaries and implementing architectural security designs.

How Nexum Dynamics Helps

  • Network segmentation design
  • FIPS-validated encryption implementation
  • Boundary protection solutions
  • Data-at-rest and in-transit encryption
  • Secure communication protocols
SI7 controls

System and Information Integrity

Identifying, reporting, and correcting system flaws and protecting against malicious code.

How Nexum Dynamics Helps

  • Endpoint detection and response (EDR)
  • Malware protection solutions
  • Patch management programs
  • System flaw remediation
  • Real-time security monitoring

Our Implementation Approach

Achieving CMMC Level 2 compliance requires a strategic, phased approach. Our proven methodology ensures efficient implementation while minimizing disruption to your operations.

Phase 1

Foundation

Months 1-3

  • Identity and authentication infrastructure
  • Basic access control framework
  • Logging infrastructure setup
  • Endpoint protection deployment
Phase 2

Protection

Months 3-6

  • Network segmentation and boundary protection
  • Encryption implementation (at rest and in transit)
  • Configuration management baseline
  • Malware protection enhancement
Phase 3

Detection & Response

Months 6-9

  • SIEM deployment and configuration
  • Log review procedures establishment
  • Vulnerability management program
  • Incident response procedures
Phase 4

Management & Governance

Months 9-12

  • Policy and procedure documentation
  • Training program implementation
  • Risk assessment processes
  • Continuous monitoring setup
Phase 5

Validation

Months 12-15

  • Internal assessment against all controls
  • Evidence collection and organization
  • Gap remediation completion
  • Readiness assessment for C3PAO

CMMC Level 2 Assessment Requirements

Assessment requirements differ based on whether your CUI data is considered critical to national security.

Non-Prioritized Acquisitions

Self-Assessment

For contractors handling CUI that is not critical to national security, an annual self-assessment is required.

  • Annual self-assessment requirement
  • SPRS score submission to DoD
  • Internal documentation and evidence
  • Affirming compliance declaration
Prioritized Acquisitions

Third-Party Assessment (C3PAO)

For contractors with prioritized acquisitions handling data critical to national security, C3PAO certification is required.

  • Assessment by authorized C3PAO
  • Three-year certification validity
  • Comprehensive evidence review
  • On-site assessment procedures

Understanding SPRS Scoring

The Supplier Performance Risk System (SPRS) score reflects your compliance with NIST SP 800-171 controls. A perfect score is 110, with point deductions for unimplemented controls.

Controls are weighted by criticality: 5-point controls address fundamental security capabilities, 3-point controls represent significant functions, and 1-point controls are supporting.

For conditional certification, you need a minimum score of 80 (88 or higher recommended). We help you prioritize remediation based on point values and mission impact.

Critical 5-Point Controls

  • 5ptSI.L2-3.14.2 - Malicious code protection
  • 5ptSI.L2-3.14.1 - System flaw identification
  • 5ptSC.L2-3.13.1 - Boundary communications monitoring
  • 5ptIA.L2-3.5.2 - User/process authentication
  • 5ptIA.L2-3.5.1 - User/process identification
  • 5ptAC.L2-3.1.1 - Authorized user access limits
  • 5ptAC.L2-3.1.2 - Authorized function access limits

Required Documentation

CMMC compliance requires comprehensive documentation. We help you develop and maintain all required artifacts.

System Security Plan (SSP)

Comprehensive document describing your security controls implementation and system boundaries.

Plan of Action & Milestones

POA&M documenting security gaps, remediation plans, and target completion dates.

Policies & Procedures

Documented policies for each control family establishing organizational requirements.

Evidence Repository

Organized collection of screenshots, logs, and records demonstrating control implementation.

Ready to achieve CMMC Level 2 compliance?

Contact us for a gap assessment and customized roadmap to certification.

Schedule Assessment