CMMC Registered Provider Organization · Cyber-AB Accredited

CMMC Level 2 in 6 Months.
Not 18.

Petronella Technology Group is a CMMC Registered Practitioner Organization (RPO) with the Cyber AB providing end-to-end CMMC 2.0 compliance services for defense contractors. PTG has 80% of required CMMC documentation pre-written, enabling most organizations to achieve compliance readiness in 3-6 months versus the 12-18 month industry average.

Craig Petronella is a CMMC Registered Practitioner. His team has extensive experience guiding organizations through compliance assessments. The CMMC final rule is active as of December 16, 2024 — your contracts depend on acting now.

BBB Accredited Business ★★★★★ 4.7/5 on Google | BBB Accredited Since 2003 | 2,500+ Businesses Served

DFARS 7021 is now enforceable • Non-compliance = lost contracts • Free 30-minute call

6 Mo
Average Time to CMMC Level 2 Certification
22+
Years of Compliance Experience
Proven
Compliance Methodology
The Standard

What Is CMMC 2.0?

The Cybersecurity Maturity Model Certification is the Department of Defense's unified standard for implementing cybersecurity across the Defense Industrial Base (DIB). It simplifies the original five-tier model into three streamlined levels aligned with NIST SP 800-171 and SP 800-172.

CMMC 2.0 is not a checkbox exercise — it is a framework designed to protect national security by safeguarding Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) on contractor systems. The final rule (32 CFR Part 170) went into effect December 16, 2024, making DFARS 252.204-7021 active and enforceable.

If your organization contracts with the U.S. Department of Defense or hopes to, you must meet specific cybersecurity standards to secure those contracts. CMMC certification is now woven into the DFARS fabric as a condition of doing business with the DoD.

Three Maturity Levels

Understanding the CMMC 2.0 Framework

Each level builds on the one before. The DoD specifies the required level in your contract based on the sensitivity of information you handle.

Level 1

Foundational

17 Practices
Based on FAR 52.204-21

Applies to organizations handling Federal Contract Information (FCI). Focuses on basic safeguarding practices: antivirus software, limiting system access to authorized users, and protecting media.

Assessment: Annual self-assessment with senior official affirmation. Results uploaded to SPRS. No third-party audit required, but false attestation triggers False Claims Act liability.

Level 2

Advanced

110 Practices
Aligned with NIST SP 800-171 Rev. 2

Applies to contractors handling Controlled Unclassified Information (CUI). Requires full implementation of 110 security requirements across 14 control families: access control, incident response, encryption, MFA, and more.

Assessment: Third-party assessment by a C3PAO (Certified Third-Party Assessment Organization) every three years. Some lower-risk programs may allow self-assessment. Limited POA&Ms permitted for non-critical controls.

Level 3

Expert

130+ Practices
NIST SP 800-171 + 24 controls from NIST SP 800-172

Reserved for critical national security work facing Advanced Persistent Threats (APTs). Adds enhanced requirements: deception technologies, penetration testing, hunt operations, and rigorous risk management.

Assessment: Government-led audit by DIBCAC. Requires existing Level 2 certification first. Reviewed every three years with annual affirmations. POA&Ms must close within 180 days.

Side-by-Side Comparison

Compare CMMC Levels at a Glance

Toggle between views to understand requirements, assessment types, timelines, and costs for each certification level.

Requirement Level 1 Level 2 Level 3
Number of practices 17 110 130+
Framework basis FAR 52.204-21 NIST SP 800-171 r2 NIST 800-171 + 800-172
Data type protected FCI only CUI Critical CUI / APT
Access control (AC)
Multi-factor authentication
FIPS-validated encryption
Incident response plan
Penetration testing
Threat hunting operations
Assessment Detail Level 1 Level 2 Level 3
Assessment type Self-assessment C3PAO third-party Government (DIBCAC)
Frequency Annual Every 3 years Every 3 years
Annual affirmation
POA&Ms allowed No Limited (non-critical) Limited (180-day close)
SPRS score required
Prerequisite level None None Level 2 required first
False Claims Act risk
Factor Level 1 Level 2 Level 3
Typical timeline 1-3 months 6-12 months 12-18 months
With PTG (accelerated) 2-4 weeks ~6 months ~12 months
Estimated cost range $5K - $15K $20K - $100K+ $100K - $500K+
C3PAO assessment fee N/A (self-assess) $20K - $50K N/A (Gov't audit)
Ongoing annual cost $2K - $5K $10K - $30K $50K+
Staff training needed Basic awareness Role-based + annual Advanced + specialized
Documentation volume Minimal SSP + 14 policy families SSP + enhanced controls
End-to-End Services

Everything You Need to Get Certified

From initial assessment to audit day, we handle the heavy lifting so you can focus on winning contracts.

Gap Assessment

Comprehensive evaluation of your current cybersecurity posture against all CMMC controls. We identify every gap, calculate your SPRS score, and deliver a prioritized remediation plan with timelines and cost estimates.

System Security Plan (SSP)

Detailed documentation mapping how your organization implements each of the 110 NIST SP 800-171 requirements. Our SSP framework comes 80% pre-written — we customize it to your exact environment and architecture.

POA&M Management

For each unmet control, we create a formal Plan of Action & Milestones with responsible parties, target dates, and resource commitments. We prioritize critical controls that cannot be deferred and must be met before assessment day.

CUI Enclave Setup

We design and deploy a secure enclave for your Controlled Unclassified Information using FedRAMP-approved cloud solutions like Microsoft GCC High. Segment CUI from general IT to reduce audit scope and cost. Operational in as little as 30 days.

Policies & Procedures

Complete policy library covering all 14 NIST 800-171 control families: access control, incident response, configuration management, media protection, and more. Includes security awareness training programs, phishing simulations, and role-based training.

CMMC Assessment Prep

Mock audits, pre-assessment checklists, evidence reviews, and staff interview rehearsals. We simulate the C3PAO experience so there are zero surprises on audit day. We coordinate with accredited C3PAOs and provide on-site support during your formal assessment.

Regulatory Framework

DFARS Clauses You Must Know

These Defense Federal Acquisition Regulation clauses are the legal teeth behind CMMC. Click each clause to explore plain-English explanations, deadlines, and penalties.

What it requires: If your systems process, store, or transmit Covered Defense Information (CDI) or CUI, you must implement all 110 security requirements from NIST SP 800-171. You must also report cyber incidents to the DoD within 72 hours via the DIBNet portal and preserve forensic evidence for at least 90 days.

Flow-down requirement: This clause must be included in all subcontracts where CDI/CUI is involved. This means your subcontractors must also meet 800-171 requirements — and you are responsible for ensuring they do.

Penalties for non-compliance: Breach of contract, loss of future awards, potential False Claims Act liability if you claim compliance without actual implementation. In severe cases, suspension or debarment from government contracting.

Effective
Since 2017
Incident Reporting
72 Hours
Evidence Retention
90 Days

What it requires: Before being awarded a DoD contract, you must complete a Basic Assessment of your NIST 800-171 implementation and submit the resulting score to the Supplier Performance Risk System (SPRS). Your score ranges from -203 (no controls met) to 110 (all controls fully implemented).

How scoring works: Each of the 110 controls has a weighted value (1, 3, or 5 points). Start at 110 and subtract points for every unmet control. A score below 110 means you have gaps. You must also document unmet controls in a Plan of Action with target completion dates.

Penalties for non-compliance: No SPRS score = no new contract awards. Contracting officers check SPRS as a mandatory gate. Submitting an inflated or false score triggers DOJ Civil Cyber-Fraud Initiative investigations under the False Claims Act.

Score Range
-203 to 110
Submission
SPRS Portal
Consequence
No Score = No Award

What it requires: This clause authorizes the DoD — specifically DIBCAC (Defense Industrial Base Cybersecurity Assessment Center) — to conduct Medium or High assessments of your 800-171 implementation. They will verify that your self-reported SPRS score is accurate.

Assessment levels: Basic = self-assessment (you do it). Medium = DIBCAC reviews your SSP, policies, and POA&Ms remotely. High = DIBCAC conducts an on-site examination of your technical configurations, interviews staff, and validates every claimed control.

Penalties for non-compliance: If your actual implementation does not match your SPRS score, DIBCAC can flag your assessment as failed. This can trigger contract termination, ineligibility for future awards, and referral to DOJ for false claims investigation.

Assessor
DIBCAC
Assessment Types
Basic / Medium / High
Verification
SSP + On-Site

What it requires: As of December 16, 2024, this clause is active and enforceable. It mandates that contractors hold a current CMMC certification at the level specified in the solicitation as a condition of contract award. Your certificate must be no older than 3 years.

Implementation timeline: CMMC requirements will phase in over 4 years. Phase 1 (2025): Level 1 self-assessments and some Level 2 self-assessments appear in contracts. Phase 2 (2026): Level 2 C3PAO assessments required for CUI contracts. Phase 3 (2027): Level 3 assessments added. Phase 4 (2028): Full implementation across all applicable contracts.

Penalties for non-compliance: No valid CMMC certificate = ineligible for contract award. Existing contracts may not be renewed. The clause applies to both prime contractors and subcontractors at every tier where FCI/CUI is involved. Waivers exist but are extremely rare and granted only at the highest DoD authority levels.

Effective Date
Dec 16, 2024
Cert Validity
3 Years
Full Rollout
By 2028

SPRS Submission Portal: https://www.sprs.csd.disa.mil/

Your Roadmap

10 Steps to CMMC Certification

A proven methodology refined over 22+ years of compliance work. We guide you through every step.

1

Determine Your Required CMMC Level

Identify whether you handle FCI only (Level 1) or CUI (Level 2+). Review contracts and consult your DoD customer to confirm data classification.

2

Scope Your Environment

Map which networks, servers, endpoints, and cloud services process or store FCI/CUI. Segment CUI into a dedicated enclave to reduce audit scope and cost.

3

Perform a Gap Assessment

Measure current controls against all 110 NIST 800-171 requirements. Mark each as MET or NOT MET. Calculate your SPRS score. Identify all documentation gaps.

4

Develop POA&M and Budget

Create a formal remediation plan for every gap. Assign responsible parties, target dates, and budget. Prioritize critical controls that cannot be deferred under CMMC rules.

5

Implement Security Controls

Deploy technical controls (firewalls, MFA, encryption, EDR, SIEM), write policies and procedures, create your System Security Plan, and conduct security awareness training for all staff.

6

Set Up Secure CUI Hosting

Ensure your CUI environment meets FedRAMP Moderate or equivalent requirements. Deploy GCC High or a private enclave with proper access controls, monitoring, and encryption.

7

Conduct Internal Pre-Assessment

Run a mock audit against the official CMMC Assessment Guide. Verify evidence for each control. Test staff knowledge through interview rehearsals. Fix any remaining gaps.

8

Submit SPRS Score

Update your SPRS score to reflect current implementation status. Ensure your score aligns with documented controls. Note any active POA&M items for remaining gaps.

9

Undergo the CMMC Assessment

For Level 2, engage a C3PAO through the Cyber-AB Marketplace. Provide documentation, demonstrate controls, and participate in staff interviews. We provide on-site support throughout.

10

Maintain and Monitor

Certification is valid for 3 years with annual affirmations. Integrate CMMC practices into daily operations: continuous monitoring, regular training, patch management, and SSP updates for any system changes.

Estimate Your Timeline

Certification Timeline Calculator

Answer three questions to get an estimated timeline and cost range for your CMMC certification journey.

Estimated Time to Certification
6-9 months
Based on typical Level 2 engagements
Estimated Cost Range
$40K - $80K
Includes remediation, documentation, and C3PAO fees
Recommended Starting Point
Gap Assessment + SPRS Score

Our recommendation: Start with a free 30-minute assessment call. We will evaluate your current posture and give you a precise roadmap tailored to your environment.

Get Your Free Assessment →
Obstacles We Solve

Common CMMC Challenges

Every defense contractor hits these hurdles. Here is how Petronella removes them.

Identifying All CUI

CUI hides in email threads, shared drives, and backups. We conduct thorough data mapping, deploy DLP tools to catch CUI spillage, and train employees to recognize markings and handle CUI properly.

Budget and Resource Constraints

Instead of building costly infrastructure in-house, leverage cloud services already compliant (Microsoft GCC High, secure enclaves). Our Done-With-You packages get clients to ~80% compliance in weeks at a fraction of DIY cost.

Legacy Systems and Technical Complexity

Older systems cannot support modern encryption or authentication protocols. We modernize and segment: isolate legacy systems from CUI, migrate to compliant platforms, and deploy compensating controls where upgrades are not feasible.

Documentation Overload

CMMC requires formal policies, procedures, and system security plans across all 14 control families. Our policy templates are aligned to each CMMC family — 80% pre-written, customized to your environment, and audit-ready.

Employee Culture Change

New password policies, MFA steps, and data handling rules meet resistance. We deliver interactive security awareness training, phishing simulations, and role-based programs that get genuine buy-in — not just checkboxes.

Evolving Requirements

NIST 800-171 Rev. 3 is on the horizon. Threats constantly change. Our managed services include continuous monitoring, quarterly compliance check-ins, and documentation updates so recertification is seamless.

The Urgency

Your Contracts Depend on It

Hackers actively target the defense supply chain. The DoD expects contractors to be proactive, not reactive.

Non-compliance results in loss of contract eligibility. Solicitations involving CUI now require a CMMC certification that contractors must meet to be eligible for award.

False SPRS claims trigger False Claims Act investigations and civil penalties. The DOJ Civil Cyber-Fraud Initiative is actively pursuing contractors who misrepresent compliance.

Prime contractors demand proof of flow-down compliance from subcontractors. Annual affirmations and continuous monitoring are the new norm.

Competitive advantage: Getting certified ahead of competitors means you can bid on contracts they cannot. CMMC certification unlocks higher-value defense opportunities.

Self-Assessment

CMMC Level 2 Readiness Checklist

Evaluate your organization against key CMMC Level 2 practices. Select Yes, Partial, or No for each item to get your readiness score.

0 of 20 answered Score: --

Access Control (AC)

0/4
System access limited to authorized users and transactions
Multi-factor authentication (MFA) enabled for all remote and privileged access
CUI access restricted on a need-to-know basis with role-based permissions
Remote access sessions encrypted and monitored
All users uniquely identified and authenticated before system access
Password complexity and expiration policies enforced
FIPS-validated cryptography used for authentication
CUI encrypted at rest and in transit using FIPS 140-2 validated encryption
Network boundary protections (firewalls, DMZ) implemented and monitored
CUI segregated in a dedicated enclave or boundary
Documented incident response plan with defined roles and escalation procedures
Incident response plan tested at least annually
Capability to report incidents to DoD within 72 hours via DIBNet
System audit logs capture login, access, and change events
Audit logs protected from unauthorized access and tampering
Audit logs regularly reviewed and anomalies investigated
SIEM or centralized log management deployed
Physical access to CUI systems restricted and monitored
Security awareness training conducted for all employees at least annually
Formal System Security Plan (SSP) documented and maintained
0% Readiness

Your CMMC Readiness

Complete all items above to see your readiness assessment and personalized recommendation.

AI-Powered Compliance

Meet ComplyBot

Get instant answers to CMMC, HIPAA, and SOC 2 questions — trained on the actual frameworks, not blog posts. ComplyBot understands the 110 NIST SP 800-171 controls, DFARS clause requirements, and the CMMC assessment process.

Try ComplyBot at petronella.ai

Instant framework answers — Ask about any NIST 800-171 control and get the requirement, evidence needed, and common implementation approaches.

DFARS clause guidance — Understand which clauses apply to your situation and what evidence satisfies each requirement.

Assessment preparation — Learn what C3PAO assessors look for, common interview questions, and documentation best practices.

Industry Relevance

Who Needs CMMC Certification?

Defense Contractors

Prime contractors handling CUI need Level 2 certification to win and maintain DoD contracts.

DoD Subcontractors

Primes demand flow-down compliance. Subcontractors need certification or risk losing their place in the supply chain.

DIB Supply Chain

Manufacturers, tech firms, and service providers in the Defense Industrial Base who handle any FCI or CUI.

Free Resource

Download Our Free CMMC 2.0 Guide

Our step-by-step playbook covers how to secure your government contracts, align with NIST 800-171, prepare for CMMC assessments, and avoid the most common compliance pitfalls.

Download the Free CMMC Guide (PDF)
FAQ

Frequently Asked Questions

What is CMMC 2.0 and when did it take effect?
CMMC 2.0 (Cybersecurity Maturity Model Certification) is the Department of Defense's framework requiring defense contractors to demonstrate cybersecurity maturity through formal assessments. The final rule (32 CFR Part 170) went into effect on December 16, 2024, making DFARS 252.204-7021 active and enforceable. It simplifies the original five-level model into three streamlined levels aligned with NIST SP 800-171 and SP 800-172.
Who needs CMMC certification?
Any organization in the Defense Industrial Base (DIB) that handles Federal Contract Information (FCI) or Controlled Unclassified Information (CUI) needs CMMC certification to bid on or maintain DoD contracts. This includes prime contractors, subcontractors, and any company in the DoD supply chain that receives or generates non-public federal data.
What are the three CMMC 2.0 levels?
Level 1 (Foundational) requires 17 basic safeguarding practices from FAR 52.204-21 for organizations handling FCI. Level 2 (Advanced) requires all 110 security requirements from NIST SP 800-171 for organizations handling CUI. Level 3 (Expert) adds 24 enhanced controls from NIST SP 800-172 for critical national security programs and is assessed by DIBCAC.
How long does it take to achieve CMMC compliance?
Timeline depends on your current cybersecurity maturity, organization size, and target level. Organizations starting from scratch typically need 6 to 12 months for Level 2. With Petronella's accelerated methodology and pre-built documentation, many clients achieve Level 2 certification in as little as 6 months. Our Done-With-You packages can get you to approximately 80% compliance within weeks.
What is the difference between CMMC and NIST 800-171?
NIST SP 800-171 defines the 110 security requirements for protecting CUI in non-federal systems. CMMC is the DoD's certification framework that verifies contractors have actually implemented those requirements through formal assessments. CMMC Level 2 maps directly to the 110 NIST 800-171 controls. In short: NIST 800-171 is the "what," and CMMC is the "prove it."
What are POA&Ms and are they allowed under CMMC 2.0?
Plans of Action and Milestones (POA&Ms) allow you to address remaining control gaps on a defined timeline. Under CMMC 2.0, limited POA&M use is permitted at Levels 2 and 3 for non-critical controls, granting a "conditional" certification with 180 days to remediate. However, critical controls (such as MFA, antivirus, and incident response) cannot be on a POA&M and must be fully implemented at the time of audit. Level 1 does not allow POA&Ms at all.
How much does CMMC compliance cost?
Costs vary widely based on organization size, current maturity, and target level. Small businesses can expect to invest between $20,000 and $100,000 or more for Level 2 compliance, including remediation, documentation, infrastructure, and C3PAO assessment fees. Petronella's approach reduces costs by providing pre-built documentation (80% done), using compliant cloud infrastructure, and scoping the CUI environment to minimize the boundary of what needs Level 2 controls.
What is an SPRS score and why does it matter?
The Supplier Performance Risk System (SPRS) score reflects your NIST 800-171 self-assessment results, ranging from -203 (no controls implemented) to 110 (all controls fully in place). Under DFARS 7019, contractors must submit their SPRS score to be considered for new DoD awards. Contracting officers check SPRS as a gate — proposals without a current score may be rejected. SPRS is effectively Phase 1 of CMMC implementation.
Is Petronella a certified CMMC provider?
Yes. Petronella Technology Group is a CMMC Registered Provider Organization (RPO) accredited by the Cyber-AB. Our team includes Registered Practitioners (RPs) trained in the CMMC model and NIST standards. Craig Petronella is a CMMC Registered Practitioner. We provide end-to-end services including gap assessments, SSP development, POA&M management, secure CUI hosting, policy creation, and C3PAO assessment preparation. We do not conduct the certification audit ourselves to avoid conflicts of interest.
What happens if I am not CMMC compliant?
Without the required CMMC certification, you will not be awarded DoD contracts that specify a CMMC requirement. You risk losing current contracts, being disqualified from future bids, and facing False Claims Act liability if you misrepresent your cybersecurity posture. The DOJ's Civil Cyber-Fraud Initiative actively pursues contractors who falsely claim compliance. Waivers are extremely rare, granted only at the highest DoD levels, and should never be relied upon as a strategy.

The Clock Is Running.
Your Free Assessment Takes 30 Minutes.

Let our certified CMMC practitioners evaluate your SPRS score, identify readiness gaps, and give you a clear roadmap to pass your assessment the first time. No obligation. No pressure. Just clarity.

Certified RPO • 22+ years of compliance experience • Proven methodology • Serving the DIB since 2002