Skip to content

CMMC Level 2 Checklist

CMMC Level 2 Checklist

Complete Compliance Guide for Businesses

If your business handles Controlled Unclassified Information (CUI) for the Department of Defense, CMMC Level 2 compliance is no longer optional (in 2026); it’s required to win and retain contracts. Yet most companies don’t fail because they ignore CMMC. They fail because they misunderstand what “compliant” actually means. This guide breaks down the complete CMMC Level 2 checklist, explains what auditors actually look for, and shows how your business can move from uncertainty to audit-ready.

What Is CMMC Level 2 Compliance?

CMMC Level 2 aligns directly with NIST SP 800-171 and includes 110 security controls designed to protect CUI across your environment.

Unlike earlier versions of the framework, Level 2 now requires:

  • Third-party certification (C3PAO assessment) for most contractors
  • Documented, repeatable processes
  • Evidence (not assumptions) of control implementation

If your business cannot prove controls are implemented and operating effectively, you are not compliant, regardless of what tools you have in place, the size of your company, or the number of computers in your IT environment.

CMMC Level 2 Checklist: The 14 Control Families

CMMC Level 2 is structured around 14 control families. Below is a CMMC checklist of what your company must implement and demonstrate to pass an audit and become CMMC level 2 certified. When we perform CMMC gap assessments, we normally spend a lot of time (over half the hours) working with the client on the scope of the CUI environment. Once the scope can be clearly defined and minimized, the company can then build controls around the specific environment.

Your business must strictly control who can access systems containing CUI. This includes limiting access by job role, enforcing least privilege, and preventing unauthorized users from accessing sensitive systems. Remote access must be secured, monitored, and restricted. Shared accounts should be eliminated wherever possible, and session controls must be enforced to prevent unauthorized persistence.

Employees are one of the most common attack vectors. Your firm must implement a formal security awareness program that educates users on phishing, social engineering, and proper data handling. Training must be ongoing and well documented, not a one-time exercise. You must also demonstrate that employees understand their responsibilities when handling CUI.

You must be able to track, monitor, and investigate activity across your systems. This includes generating audit logs for user actions, system changes, and security events. Logs must be protected from tampering, retained appropriately, and reviewed regularly. If an incident occurs, your company must be able to reconstruct what happened.

Uncontrolled systems are one of the fastest ways to fail a CMMC audit. Your business must establish secure baseline configurations for all systems and enforce change control procedures. Unauthorized software must be restricted, and all system changes must be documented, approved, and tracked.

Every user and system must be uniquely identifiable. Your environment must enforce strong authentication mechanisms, including multi-factor authentication (MFA) for privileged and remote access. Default credentials must be eliminated by the IT team, and password policies must meet strict security standards.

CMMC requires more than reacting to incidents; it requires preparedness. Your firm must have a documented incident response plan that outlines detection, reporting, containment, and recovery procedures. Teams must be trained on their roles, and the plan must be tested periodically.

System maintenance activities must be controlled and secure. This includes managing tools used for maintenance, restricting who can perform maintenance, and ensuring remote maintenance sessions are monitored and authorized.

CUI must be protected wherever it exists, including physical media. Your business must control access to media, securely store it, and properly sanitize or destroy it when no longer needed. This process applies to hard drives, USB devices, backups, and printed materials.

Security starts before access is granted. You must screen employees appropriately and ensure that access to CUI is removed immediately when personnel leave or change roles. Insider threats are a major focus of CMMC assessments.

Physical access equals system access. Physical facilities that contain systems with CUI must be secured through access controls, monitoring, and visitor management. Your company must demonstrate that only authorized individuals can physically access sensitive systems.

You cannot protect what you don’t understand. Your firm must conduct regular risk assessments to identify vulnerabilities and threats to CUI. These assessments must drive remediation efforts and be updated as your environment changes.

Controls must be tested, not merely assumed to be effective. Your business must perform internal assessments to validate that controls are implemented correctly and operating effectively. This includes maintaining a System Security Plan (SSP) and Plan of Action & Milestones (POA&M).

Your network must be segmented and secured. This includes controlling data flow, encrypting CUI in transit, and implementing boundary protections such as firewalls and secure architectures. Improper network segmentation is one of the most common audit failures.

You must detect and fix vulnerabilities quickly. Your firm must implement vulnerability management, malware protection, and system monitoring. Patching must be timely, and you must demonstrate the ability to detect and respond to emerging threats.

CMMC Level 2 Checklist

What Auditors Actually Look For

Many companies believe they are compliant because they have security tools in place. That is not enough.

CMMC Level 2 assessments focus on evidence, including:

  • Documented policies and procedures
  • Proof of control implementation
  • Logs and system-generated evidence
  • Employee training records
  • Risk assessments and remediation tracking

If you cannot prove a control is working, it will be marked as a failure.

Common Reasons Companies Fail CMMC Level 2

Most businesses don’t fail because they ignore requirements; they fail because of execution gaps.

The most common issues include a lack of a System Security Plan, missing or outdated risk assessments, incomplete MFA implementation, poor log monitoring, weak access controls, and failure to properly define the CUI boundary.

Another major issue is overestimating compliance. Many firms assume that having tools like firewalls or antivirus automatically satisfies requirements. In reality, CMMC requires process maturity, documentation, and validation.

It is my pleasure to highly recommend Tanner Security Consultants.  As a company dealing with large-scale construction projects, ensuring the safety and integrity of our digital infrastructure is crucial to our operations. Tanner Security Consultants not only met but exceeded all of our expectations.

Jeff M – Chief Information Officer

How Long Does CMMC Level 2 Take?

For most businesses, achieving CMMC Level 2 compliance takes 3 to 9 months, depending on:

  • Current security maturity
  • Size and complexity of the environment
  • Scope of CUI handling
  • Internal resources available

Firms starting without a structured security program should expect closer to the longer end of that range.

How Tanner Security Helps You Achieve CMMC Level 2

At Tanner Security, we help businesses move from uncertainty to audit-ready with a clear, structured approach.

We begin with a comprehensive gap assessment against all 110 controls. From there, we build a prioritized remediation roadmap aligned to your business operations and contract requirements. Our team works alongside your internal stakeholders to review controls, develop documentation, and prepare for assessment.

We don’t just help you “check the box.” We help you build a defensible, audit-ready security program that withstands real-world scrutiny.

Start Your CMMC Level 2 Assessment

If your business is pursuing DoD contracts, waiting is the fastest way to lose opportunities. The sooner you understand your gaps, the faster you can close them and move toward certification with confidence.

Schedule a CMMC Level 2 readiness assessment with Tanner Security today and get a clear, actionable path to compliance.