Search

A Brief History of CMMC—And a Look at Where It’s Going Next  

Over the past decade, cybersecurity has become a major concern for organizations that support the federal government. As malicious cyber activities targeting government systems and defense contractors have grown more advanced, federal agencies have had to rethink how sensitive information is protected across the defense supply chain.  

At the center of this challenge is the Defense Industrial Base (DIB), a large network of companies that delivers and supports technologies used by the U.S. Department of Defense (DoD). This ecosystem includes everything from large prime contractors to small, specialized software vendors, manufacturers, and service providers, including MSPs that help operate and secure critical IT environments.   

The Security Challenge  

While DIB enables the defense industry to innovate and scale quickly, it also poses a difficult challenge: ensuring sensitive information is consistently protected across organizations with very different cybersecurity capabilities.  

In the early 2010s, the DoD tried to address this challenge by requiring contractors to comply with NIST SP 800-171, which was published in June 2015, with mandatory compliance following via DFARS in 2016. This was a standard designed to protect Controlled Unclassified Information (CUI).   

The framework outlined a set of security requirements organizations were expected to implement when handling sensitive government data. However, compliance relied on self-attestation, allowing contractors to report that they met the requirements without independent verification. While aligned with federal policy, the lack of a reliable way to verify implementation meant security practices across the defense supply chain varied widely, and companies often reported compliance even though security gaps still existed.  

Over time, the DoD noticed a concerning pattern: sensitive defense information was moving through a large network of contractors and service providers without a reliable way to verify that appropriate cybersecurity protections were in place. This growing concern triggered a major shift in how cybersecurity would be managed across the Defense Industrial Base.  

The Birth of CMMC  

To address these challenges, the DoD began developing a more structured approach to cybersecurity across the supply chain, moving toward a verifiable framework that could confirm whether organizations were implementing the security practices required to protect CUI.  

This effort led to the creation of the Cybersecurity Maturity Model Certification (CMMC). Introduced in 2019, CMMC built on the same requirements as NIST SP 800-171, but added an important new element: independent third-party assessments. Instead of just claiming compliance, organizations would need to demonstrate that their security practices were implemented and operating effectively.  

The framework also introduced maturity levels, designed to measure how effectively organizations integrated security practices into their ongoing operations. Instead of focusing only on documented controls, the model focused on those practices that needed to be implemented, and consistently followed, across the organizations. The overall goal was simple—enhance cybersecurity across the DIB and ensure sensitive data was protected in practice, not just in theory.  

Many organizations were skeptical of CMMC’s potential impact during its early rollout. Across the defense contractor community, particularly among small and mid-sized companies, there were concerns about the cost and complexity of obtaining certification. Some also feared that the new requirements could create barriers for smaller vendors and reduce competition within the defense supply chain.  

These concerns led to refinements of the framework over time, eventually resulting in CMMC 2.0; this simplified the model and clarified how certification requirements would be applied to contractors.  

Why CMMC Matters for MSPs  

While CMMC was primarily created to ensure that defense contractors protect CUI within the Department of Defense supply chain, it is equally important for MSPs, as many federal contractors rely on service providers to manage their infrastructure, security tools, and cloud environments. The model is designed to ensure these providers maintain the same level of protection for sensitive data and systems.  

If an MSP manages systems that handle CUI, its security practices may fall within the scope of a contractor’s CMMC assessment. In practical terms, the MSP’s security posture can directly affect whether a contractor is able to achieve certification. As a result, cybersecurity practices such as identity and access management, logging and monitoring, configuration management, and incident response are no longer just internal operational decisions—they are increasingly tied to regulatory expectations within the defense supply chain. For MSPs, this shift creates both responsibility and opportunity.   

Many contractors lack the internal expertise to implement security controls aligned with the required frameworks. MSPs that understand the requirements and integrate strong security practices into their operations can become trusted partners, helping clients improve their cybersecurity posture on the path toward CMMC certification.  

Common CMMC Misunderstandings  

1. CMMC only applies to large defense contractors.  

CMMC applies across the entire defense industrial base. Organizations of all sizes, including small subcontractors, may be required to meet CMMC requirements if they handle Federal Contract Information (FCI) or CUI.  

2. There’s no CUI, so CMMC doesn’t affect us.  

Even companies that only process or transmit information related to DoD contracts may still be in scope for CMMC. Contracts involving FCI typically require at least Level 1 security practices.  

3. You must use a FedRAMP Moderate authorized cloud.  

A common misunderstanding is that cloud environments storing CUI must be in a FedRAMP Moderate authorized environment. In practice, the cloud provider must either meet FedRAMP Moderate security requirements or demonstrate equivalent protections with documented equivalency.  

4. Our MSP handles security, so we’re covered.  

MSPs may manage the contractor’s environment, but the contractor remains accountable for protecting sensitive information and ensuring that providers meet the required security controls.  

5. CMMC is a one-time certification project.  

CMMC is designed to ensure that the best cybersecurity practices are sustained over time. Organizations must maintain their security posture continuously, not just before the assessment period.  

CMMC 2.0: The Future is Now  

In late 2025, the United States Department of Defense reached an important milestone in this effort. The final rule, formally implementing CMMC 2.0, was published in the Federal Register and incorporated into the Defense Federal Acquisition Regulation Supplement (DFARS). On November 10, 2025, contracting officers gained the ability to include CMMC requirements directly in Department of Defense solicitations and contracts, marking the transition of CMMC from a developing policy initiative to an enforceable, contractual requirement.  

The rollout of CMMC 2.0 is expected to occur gradually over several years, with certification requirements appearing in contracts based on the type of information involved. Early phases emphasize self-assessments for lower-risk environments, while systems that process CUI will require third-party certification through accredited assessment organizations. The highest level, CMMC Level 3, will involve government-led assessments for the most sensitive defense programs.  

Another interesting development worth watching is the release of NIST SP 800-171 Revision 3, published by the National Institute of Standards and Technology in 2024. While the current CMMC 2.0 framework remains aligned with Revision 2, the newer revision introduces structural changes and updated security expectations that may influence future updates to the program.  

For now, organizations preparing for CMMC assessments will continue to be evaluated against the Revision 2 control baseline. However, as cybersecurity expectations continue to evolve across the defense supply chain, organizations that begin strengthening their security posture now will be far better positioned as CMMC requirements expand and mature in the years ahead.  

For more on the CMMC final rule, check out how it changed the game, and why the customer responsibility matrix is critical to get right.

Share:

Author:

Vlad Polusmak

Vlad Polusmak is a cybersecurity and regulatory compliance leader with a background in security architecture and cloud platform design. After beginning his career in technical and architectural roles, he transitioned into security program and compliance leadership, enabling him to bridge system design with high-assurance regulatory requirements. He has worked in environments aligned with NIST 800-53/FedRAMP, FIPS 140-3, CMMC, SOC 2, and ISO/IEC 9001 & 27001. Vlad holds the CISSP and CISA certifications and maintains a strong professional interest in data privacy and critical infrastructure security. He is currently senior director of product and strategy/compliance and audit at Kaseya.

RELATED ARTICLES

Get The #1 Media Source For MSPs!
Thousands Of MSPs Trust
MSP Success
For The Best Industry News, Trends And Business Growth Strategies. Subscribe now!
 

Upcoming Events

Stay Up To Date

Thousands Of MSPs Trust
MSP Success
For The Best Industry News, Trends and Business Growth Strategies

Never Miss An Update