BACK TO BLOGS Back to Press Releases

What is CMMC compliance? Requirements, levels, and preparing for a CMMC audit

Written by:

The U.S. Department of Defense (DoD) is raising the bar for cybersecurity across its supply chain. With the introduction of the Cybersecurity Maturity Model Certification (CMMC) 2.0, organizations that handle sensitive government data must now have demonstrably strong cybersecurity practices.

For contractors and organizations in the Defense Industrial Base (DIB), CMMC compliance is quickly becoming a contractual requirement. Understanding what it is, what it requires, and how to prepare is essential.

What is CMMC compliance?

CMMC compliance refers to meeting the cybersecurity standards established by the DoD to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) across its supply chain.

CMMC 2.0 simplifies the original model into a framework aligned closely with NIST SP 800-171 and focuses on ensuring organizations can both implement and subsequently demonstrate effective security controls.

At its core, CMMC is designed to verify that cybersecurity practices are clearly enforced. It ensures organizations can provide clear evidence during audits while actively reducing risks across the defense supply chain.

Unlike traditional compliance frameworks that rely heavily on self-attestation, CMMC introduces structured assessments, including third-party audits for higher levels. This means organizations must move beyond policy documentation and toward provable, consistent security enforcement.

CMMC compliance requirements

CMMC requirements are primarily derived from NIST SP 800-171 Rev. 2, particularly for organizations handling CUI. These requirements span multiple control families, including Access Control, Identification and Authentication, System and Communications Protection, Configuration Management, Incident Response, Audit and Accountability, and System and Information Integrity.

To achieve compliance, organizations must first implement security controls that align with CMMC practices. These controls need to actively protect systems rather than simply exist as written policies. Beyond implementation, those controls must be enforced consistently across all endpoints, users, and environments to avoid gaps that could introduce risk.

Organizations are also required to maintain audit-ready evidence demonstrating that controls are functioning as intended. This includes maintaining logs, monitoring data, policy configurations, enforcement records, and documentation of incident response activities.

A critical focus area is endpoint security, where most exposure to Controlled Unclassified Information occurs. To address this, organizations must ensure that only authorized applications can run, user privileges are tightly controlled, and any movement of data is restricted and continuously monitored.

CMMC assessments are evidence-driven. Organizations must be able to show that their controls are continuously enforced and measurable in real-world conditions.

CMMC 2.0 levels explained

CMMC 2.0 introduces three streamlined levels, each aligned with the sensitivity of the information being handled.

Level 1: Foundational

Level 1 focuses on the protection of Federal Contract Information (FCI) and requires organizations to implement basic cybersecurity practices. Compliance at this level is verified through an annual self-assessment, with an emphasis on establishing fundamental security hygiene such as access control and basic system protections.

Level 2: Advanced

Level 2 is designed for organizations that handle Controlled Unclassified Information (CUI) and requires alignment with the 110 security controls outlined in NIST SP 800-171. Depending on the type of contract, organizations may be required to undergo a third-party assessment or perform an annual self-assessment.

This level represents the most common target for contractors in the Defense Industrial Base and demands mature, well-documented, and fully enforced security controls.

Level 3: Expert

Level 3 is intended for organizations supporting highly sensitive DoD programs and focuses on protection against advanced persistent threats. Requirements at this level are based on NIST SP 800-172 and are assessed through government-led evaluations.

This level requires a significantly higher degree of cybersecurity maturity and advanced defensive capabilities.

Preparing for a CMMC audit with ThreatLocker

ThreatLocker helps organizations achieve compliance with CMMC 2.0 by delivering a Zero Trust protection platform that enforces security controls at the critical endpoint layer.  

Rather than relying on threat detection alone, ThreatLocker takes an enforcement-first approach. Only approved applications are allowed to run, with further restrictions on how those applications behave to prevent misuse and lateral movement, and least privilege access is enforced across users and systems. It also limits how data can be moved through controls on external storage devices and applies network restrictions through a Zero Trust firewall model.

These capabilities directly align with key CMMC control families such as Access Control, System Protection, and System Integrity.  

One of the biggest challenges in a CMMC audit is producing clear, actionable evidence.  

ThreatLocker simplifies this process by generating detailed logs, policy enforcement records, audit trails, and reporting dashboards. It also provides visibility into incidents and response actions, allowing organizations to demonstrate that their controls are not only in place but actively working.  

During an assessment, this level of visibility and control enables organizations to demonstrate consistent enforcement across all endpoints, validate least privilege policies, and show real-time monitoring and response capabilities. The result is a smoother audit process with stronger confidence from assessors.

Beyond compliance, implementing these controls strengthens overall security posture. Organizations benefit from a reduced attack surface through strict application control, enforced least privilege across systems, faster audit preparation through centralized evidence collection, and simplified security management within a unified platform.

Bottom line

CMMC 2.0 represents a shift from checkbox compliance to enforced cybersecurity. Organizations must prove that their controls are working consistently and continuously.

By implementing a Zero Trust approach at the endpoint, ThreatLocker helps organizations not only prepare for CMMC audits but also build a more resilient and secure environment for the long term.

Whether you’re preparing for an upcoming audit or looking to improve your overall security posture, the ThreatLocker Zero Trust platform can help you move beyond compliance checklists and ensure your controls are actively protecting your environment. Book a demo today.  

No items found.

Start your path to stronger defenses

Start your trial

Try ThreatLocker free for 30 days and experience full Zero Trust protection in your own environment.

Book a demo

Schedule a customized demo and explore how ThreatLocker aligns with your security goals.

Ask an expert

Just starting to explore our platform? Find out what ThreatLocker is, how it works, and how it’s different.