CMMC Compliance Deadlines in 2026
In 2026, the Cybersecurity Maturity Model Certification (CMMC) will become mandatory for all organizations seeking to establish contracts with the Department of Defense (DoD). Unlike in previous years, when CMMC compliance was not broadly enforced, it will become a required condition for many contracts beginning in fall 2026.
These new adjustments now mean your organization’s security posture directly impacts your ability to bid on and close new revenue opportunities. The guide below outlines the critical 2026 milestones and the steps you need to take to remain competitive in the defense sector.
Key 2026 Compliance Dates
Phase 1 (Active through November 9, 2026)
During this phase, contractors working with the U.S. Department of Defense may be required to submit self-assessments for either Level 1 or Level 2 of the Cybersecurity Maturity Model Certification into the Supplier Performance Risk System when specified in a solicitation or contract. These assessments must be formally affirmed by a senior company official, confirming that the organization has fully implemented the applicable security controls.
This represents an important shift from prior practices. In earlier years, contractors operating under NIST SP 800-171 could report imperfect scores so long as the results were submitted. Under the current framework, self-assessments are expected to reflect full implementation of the required controls when reported for contract eligibility.
Phase Expansion (Beginning November 10, 2026)
Beginning November 10, 2026, contracting officers may begin inserting CMMC requirements, including third-party Level 2 certification performed by a Certified Third-Party Assessor Organization (C3PAO), into new solicitations and contracts where Controlled Unclassified Information (CUI) is involved. These phase milestones authorize the inclusion of CMMC clauses; they do not automatically require all contractors to be certified by that date.
The specific timing of when certification must be in place is determined at the contract level. Contracting officers may require certification at the time of award or allow it to be completed by a defined post-award milestone, such as before the exercise of an option year. Because these clauses will increasingly appear in solicitations after the November milestones, contractors seeking to remain eligible for awards should plan readiness activities and certification timelines accordingly.
Requirements for CMMC Level 1 and Level 2
Level 1 (Foundational)
If your organization plans on collecting or using data classified as Federal Contract Information (FCI), you’ll need to meet 15 basic security controls. These are found in FAR 52.204-21 and focus on standard cybersecurity hygiene tasks, such as basic access control and protecting your physical workspace.
To meet compliance with this level, you’ll need to perform an annual self-assessment and upload those results to the SPRS database.
Level 2 (Advanced)
CMMC Level 2 compliance is the standard requirement for most government contractors handling Controlled Unclassified Information (CUI). In this tier, requirements jump to 110 specific security points outlined in NIST SP 800-171.
While Phase 1 allowed for self-assessments at this level, Phase 2 requires an audit every three years by an accredited C3PAO. You can achieve a “Conditional” status with a score of 88 (80%), provided you meet all high-priority controls, such as encryption and multi-factor authentication.
However, it’s important to keep in mind that you only have a 180-day window to fix any remaining items on your POA&M. If you miss that deadline, your status expires, and you lose your eligibility for new awards.
Primes and Subcontractors
In 2026, the relationship you have with prime contractors will likely be defined by your readiness for the different audit stages of CMMC 2.0. Here are some things you’ll want to keep in consideration:
Market Pressure
Even in cases where a specific contract has not yet reached a formal CMMC enforcement deadline, market pressure is already accelerating across the defense supply chain. Many large prime contractors are proactively evaluating the cybersecurity maturity of their subcontractors in anticipation of upcoming requirements.
As a result, organizations within the supply chain are increasingly being asked to demonstrate evidence of CMMC Level 2 readiness before they are allowed to participate in bidding opportunities. In some cases, companies may be required to provide documentation of their security posture before they can even review or respond to a request for proposal (RFP).
For prime contractors, partnering with non-compliant subcontractors creates potential risk to their own contract eligibility and bid competitiveness. To reduce that risk, many primes are prioritizing vendors and partners who can clearly demonstrate CMMC readiness and the ability to safeguard controlled information. As enforcement timelines approach, this dynamic is expected to further reinforce the preference for working with organizations that have already taken measurable steps toward compliance.
How CMMC Requirements Flow Down
Under DFARS 252.204-702, CMMC requirements now flow through the entire supply chain. This means that if a prime contract requires Level 2 certification, you’ll also need to meet that standard if your business handles the same CUI.
Primes are now legally responsible for checking your status in the SPRS system before they make a final award to you. This makes your compliance status a matter of public record for your partners.
The Competitive Advantage of CMMC Compliance
Having a high SPRS score is a really effective way to stand out from competitors. While a score of 88 might make you compliant, a perfect +110 shows that your security posture is mature and stable.
Subcontractors with lower scores may face more scrutiny than higher-scoring businesses or be excluded from high-value awards where cybersecurity is a weighted factor in the decision.
Identifying CMMC in Your Contracts
To find out exactly where your business’s compliance requirements are, look for the DFARS 252.204-7021 clause in your government agreements. If you see it, compliance is a mandatory condition for both winning the award and performing the necessary work.
You should also reference Sections L and M of your Request for Proposal (RFP) to understand the timing for compliance verification. If it says “Required for Eligibility,” you’ll need to provide a valid SPRS score when you submit your proposal. If it says “Required at Award,” you must have your status updated before you sign the contract.
CMMC Readiness Do’s and Don’ts
- Do prioritize your System Security Plan (SSP): our SSP serves as a foundational roadmap for your assessment. It should clearly define your system boundaries and document how each required security control is implemented within your environment. Because assessors rely heavily on this document during evaluations, ensuring that your SSP is accurate, complete, and regularly maintained is essential to a smooth assessment process.
- Do build an evidence library: Auditors will need to see proof, such as system logs, training records, and signed policies. Collecting these resources early makes it easier to prove that your security practices have been consistent over time.
- Don’t rely on old self-attestations: A C3PAO audit is much more rigorous than previous self-assessments. Keep in mind that you’ll need to show that these security practices are fully integrated into how you do business every day.
- Don’t wait to book your auditor: As the November deadline gets closer, C3PAO backlogs are expected to grow. Securing your spot on their calendar early prevents a gap in your certification that could impede your bids.
In Summary
The transition to CMMC in 2026 changes how the DoD now chooses its partners. By understanding how these changes affect your business and incorporating new requirements into your operations, you’ll avoid gaps in your eligibility and ensure ongoing compliance, with support from CMMC consulting services if needed.



