Skip to content

Pentagon to officially implement CMMC 2.0 requirements in contracts by Nov. 10

September 15, 2025

Last week, the Pentagon published the new rule to the Federal Register titled “Assessing Contractors’ Implementation of Cybersecuity Requirements.” This rule, which amends the Defense Federal Acquisition Regulation Supplement (DFARS), takes effect on Nov. 10 and introduces the Cybersecurity Maturity Model Certification 2.0 framework (CMMC 2.0) as a mandatory requirement for government contractors who deal with Federal Contract Information (FCI) or Controlled Unclassified Information (CUI).

The CMMC has gone through several delays and revisions since it was first introduced in 2019. This framework is an important initiative to strengthen contractors’ cybersecurity safeguards and the protection of information systems in the face of increasingly complex and frequent cybersecurity attacks. Compliance is increasingly important in light of the U.S. government’s lawsuits under the False Claims Act against various contractors for failure to meet cybersecurity requirements in government contracts.

Key takeaways for government contractors

  1. Mandatory compliance with CMMC 2.0: The rule requires contractors to comply with the CMMC 2.0 framework, which includes three levels of certification with variances in requirements dependent on the security levels:
    • Level 1: Self-assessment for contractors handling FCI (less sensitive information)
    • Level 2: Self-assessment or a third-party assessment (C3PAO) for contractors handling CUI (more sensitive information).
    • Level 3: Certification by the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC) for contractors handling a higher level of CUI (the most sensitive information).
  1. Conditional certification with POA&Ms: Contractors at Levels 2 and 3 who do not fully meet the standards may receive a conditional certification for up to 180 days by submitting “Plans of Action & Milestones” (POA&Ms).
  1. SPRS compliance checks: Government contracting officers will utilize the Supplier Performance Risk System (SPRS) to verify a contractor’s CMMC compliance status before awarding contracts, and in some instances before executing contract extensions (options).
  1. 72-hour incident reporting: This new rule maintains the requirement for contractors to report cybersecurity incidents within 72 hours.
  1. Phased implementation: The rule will be phased in over three years for contractors handling FCI or CUI, but contractors will be required to certify their compliance annually.

Notable Policy Changes

  • The introduction of POA&Ms provides flexibility for contractors to address compliance gaps without immediate disqualification.
  • The phased implementation timeline allows contractors to gradually align their practices with CMMC 2.0 requirements.
  • SPRS compliance checks add an additional layer of accountability.

Recommendations for Contractors

  • Access Current Cybersecurity Practices: Contractors must become familiar with this new rule and conduct a thorough review of their systems to determine their current level of compliance with CMMC 2.0 standards.
  • Determine Your CMMC Level: Contractors must identify whether their contracts involve FCI or CUI and the corresponding CMMC level required.
  • Prepare for Certification: Begin preparations for self-assessment, third-party assessment, or DIBCAC certification as applicable.
  • Develop POA&Ms: If gaps exist in a contractor’s compliance, a detailed plan is required.
  • Ensure subcontractor compliance: Prime contractors are responsible for verifying that their subcontractors maintain the same level of compliance for handling the contract’s FCI or CUI.
  • Monitor SPRS compliance: Contractors must regularly and accurately report their compliance status in the Supplier Performance Risk System.

We encourage you to take proactive steps to ensure your company is prepared for these changes. Our team is here to assist you in understanding these developments. Please do not hesitate to reach out to our team if you have any questions or require assistance.

Law clerk Lauren Tessler contributed to this article.

This publication is intended for general informational purposes only and does not constitute legal advice or a solicitation to provide legal services. The information in this publication is not intended to create, and receipt of it does not constitute, a lawyer-client relationship. Readers should not act upon this information without seeking professional legal counsel. The views and opinions expressed herein represent those of the individual author only and are not necessarily the views of Clark Hill PLC. Although we attempt to ensure that postings on our website are complete, accurate, and up to date, we assume no responsibility for their completeness, accuracy, or timeliness.

Subscribe for the latest

Subscribe

Related

Event

Clark Hill's Commercial Real Estate Symposium – Dallas, Texas

Join Clark Hill’s Commercial Real Estate attorneys and industry professionals for a timely and dynamic program in Dallas, focusing on the latest challenges and top trends in the CRE industry.

Explore more
Legal Updates

California Announces Record $12.75 Million CCPA Settlement with GM Over Connected Vehicle Data

On May 8, 2026, California Attorney General Rob Bonta, together with several California district attorneys and the California Privacy Protection Agency, announced a $12.75 million settlement with General Motors and its connected vehicle service OnStar. The settlement resolves allegations that the companies violated the California Consumer Privacy Act (CCPA), the California Unfair Competition Law, and the California False Advertising Law by collecting and selling connected vehicle data without adequate consumer notice or consent.

Explore more
Legal Updates

Using “Schedule A” Litigation to Combat Online Trademark Infringement

In today’s digital world, trademark infringement is a significant concern for businesses aiming to protect their brand identity. Accordingly, it is important for businesses to implement a multifaceted online enforcement strategy to protect their intellectual property rights. Among the various legal avenues available to combat counterfeit goods and unauthorized use of trademarks, “Schedule A” lawsuits, which are most often filed in the U.S. District Court for the Northern District of Illinois, have emerged as a powerful tool. As intellectual property attorneys at Clark Hill, we regularly help businesses secure and enforce their IP rights. Here, we will explore what Schedule A trademark infringement litigation entails, how it works, and why it’s essential for companies to understand this avenue for enforcing their legal rights.

Explore more