Certification workflow
With 110 controls to implement, it’s first essential to define the boundaries of compliance requirements. This prevents unnecessary costs from over-scoping, while guarding against audit failure and security risks from under-scoping.
Identify all assets that process, store, or transmit CUI by analyzing data flows, and categorize in‑scope assets per DoD guidance (e.g., CUI assets, Security Protection Assets, Contractor Risk‑Managed Assets).
Once the scope is defined, implement NIST SP 800-171 Rev. 2 controls, closing any technical and administrative gaps identified during a CMMC pre-assessment. Developing a System Security Plan (SSP) is an essential part of this phase. The SSP tells the story of compliance, describing who is responsible for each control, what tools are used, and how the control is maintained. Organizations using managed service providers (MSPs) or cloud service providers (CSPs) should also document shared responsibilities (often via an SRM).
Conduct a final readiness review to confirm that your organization is ready for formal assessment.