Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeCybersecurity GuidesCMMC Compliance Guide
CMMC Controls

CMMC Controls Explained: Full List and Breakdown by Domain

Published:
February 17, 2026


Key takeaways

  • CMMC 2.0 organizes 110 Level 2 controls into 14 domains, with the most assessment-critical domains governing identity, access, monitoring, incident response, and system boundaries.

  • Access control, identification and authentication, audit and accountability, incident response, and system and communications protection account for the highest assessment risk, because they are heavily enforced, evidence-driven, and directly tied to real-world breach paths.

  • Successful CMMC compliance depends on demonstrable technical controls and documentation, making continuous monitoring and domain-aligned evidence essential for passing assessments and maintaining eligibility for DoD contracts.

The rollout of Cybersecurity Maturity Model Certification (CMMC) requirements for DoD contractors has begun, with full enforcement slated for 2028. Becoming compliance-ready from an immature state can take 12–18 months, making an immediate start a must for DIB organizations. 

Although the 110 Level 2 CMMC controls have existed as NIST SP 800-171 self-reporting requirements since 2017, data shows that many businesses still struggle to understand and implement them. Failing to satisfy requirements fully can lead to costly delays and remediation or missed contract opportunities, while early certification may offer a competitive advantage. 

In this guide, we break down the CMMC 2.0 controls list by domains that cover how systems are accessed, monitored, and protected. We also explain how each is assessed so you can start toward compliance today.


Try Huntress for Free
Get a Free Demo
Topics
CMMC Controls Explained: Full List and Breakdown by Domain
Down arrow
Topics
  1. What is the Cybersecurity Maturity Model Certification (CMMC)?
  2. Understanding POA&Ms and How They Fit into CMMC Compliance
  3. Developing Your System Security Plan for CMMC Compliance
  4. FCI vs. CUI Data in CMMC: What's the Difference?
  5. CMMC vs. NIST 800-171 Compliance: What’s the Difference?
  6. CMMC 2.0 Compliance Levels Explained (Level 1, 2, 3)
  7. CMMC Controls Explained: Full List and Breakdown by Domain
    • CMMC 2.0 controls
    • Key domains
    • How controls are validated
    • Why domain grouping helps
    • Implement CMMC controls with Huntress
  8. CMMC 2.0 Certification Explained: Key Changes & Deadlines
  9. CMMC vs. FedRAMP Compliance: What’s the Difference and Which Applies to Your Organization?
  10. Who Needs CMMC Certification and When Is It Required?
  11. How to Determine the Right CMMC Certification Level for Your Organization?
  12. CMMC Readiness Assessment Guide: How to Conduct a Gap Analysis and Readiness Assessment for CMMC Compliance
Share
Facebook iconTwitter X iconLinkedin iconDownload icon

CMMC Controls Explained: Full List and Breakdown by Domain

Published:
February 17, 2026


Key takeaways

  • CMMC 2.0 organizes 110 Level 2 controls into 14 domains, with the most assessment-critical domains governing identity, access, monitoring, incident response, and system boundaries.

  • Access control, identification and authentication, audit and accountability, incident response, and system and communications protection account for the highest assessment risk, because they are heavily enforced, evidence-driven, and directly tied to real-world breach paths.

  • Successful CMMC compliance depends on demonstrable technical controls and documentation, making continuous monitoring and domain-aligned evidence essential for passing assessments and maintaining eligibility for DoD contracts.

The rollout of Cybersecurity Maturity Model Certification (CMMC) requirements for DoD contractors has begun, with full enforcement slated for 2028. Becoming compliance-ready from an immature state can take 12–18 months, making an immediate start a must for DIB organizations. 

Although the 110 Level 2 CMMC controls have existed as NIST SP 800-171 self-reporting requirements since 2017, data shows that many businesses still struggle to understand and implement them. Failing to satisfy requirements fully can lead to costly delays and remediation or missed contract opportunities, while early certification may offer a competitive advantage. 

In this guide, we break down the CMMC 2.0 controls list by domains that cover how systems are accessed, monitored, and protected. We also explain how each is assessed so you can start toward compliance today.


Try Huntress for Free
Get a Free Demo

CMMC 2.0 controls


The full CMMC controls list can be found on the DoD website, but they’re best understood by grouping them into 14 domains:

  • Access control (AC)

  • Identification and authentication (IA)

  • Media protection (MP)

  • Physical protection (PE)

  • System and communications protection (SC)

  • System and information integrity (SI)

  • Audit and accountability (AU)

  • Incident response (IR)

  • Configuration management (CM)

  • Risk assessment (RA)

  • Security assessment (CA)

  • Personnel security (PS)

  • Situational awareness (SA)

  • Recovery (RE)

CMMC Level 1 controls consist of 17 practices derived from FAR 52.204-21 (foundational safeguards for FCI). CMMC Level 2 controls align with the 110 safeguards outlined in NIST SP 800-171 Rev. 2 and are organized into the 14 domains above. CMMC Level 3 controls build on Level 2 with a DoD‑defined subset of enhanced requirements derived from NIST SP 800-172, assessed by the government, and used within the same 14‑domain structure.

Since the great majority of DIB contracts carry Level 2 requirements for handling CUI, we’ll focus on those controls. For a deeper dive into compliance levels, check out CMMC 2.0 Compliance Levels Explained.





Key domains

For this guide, we’ll focus on the five highest-priority domains your organization must master for CMMC compliance. These domains tend to receive greater scrutiny during assessments because they carry the highest risk, covering how attackers get in, what they do, and how quickly you notice. For that reason, they are also the areas most responsible for failed assessments.

Access control

Access control (AC) limits who or what can enter the system and what they can do within it. In practice, it operates on the principle of least privilege (PoLP), meaning every user and device gets only the access it needs. Specific controls include unique user accounts, session timeouts, and multi-factor authentication (MFA). Stolen credentials are the top initial attack vector, accounting for 22% of breaches. AC guards against credential abuse and insider threats and limits lateral movement in the event of an intrusion.



Incident response

Incident response (IR) covers how an organization prepares for and reacts to security events. Required controls include an IR plan, defined responsibilities, and procedures for detection, containment, eradication, and recovery. For CMMC compliance, it’s not enough to just have an IR plan; organizations have to regularly test and document these procedures. 

Assessors will look for evidence such as incident logs, dated IR plans, and training records showing staff rehearsed their roles. During a breach, a quick, organized response is critical. Breaches that are contained within 200 days cost an average of $1.14 million less than those with a longer dwell time.


Audit and accountability

Audit and accountability (AU) controls include enabling detailed logging of user actions, system events, and security events, and then regularly reviewing those logs. A SIEM (security information and event management) system often centralizes logs for analysis.  Effective logging is essential for quickly assessing the scope of a breach, identifying who did what and when. CMMC requires specifying what events to log (logins, privileged actions, file accesses, etc.), how long to keep logs, and how often to review them. For assessors, logs are evidence that controls are in place and functioning.


Identification and authentication

Identification and authentication (IA) operate hand in hand with access control. While AC focuses on what a user or device is allowed to do, IA first verifies that you are who you claim to be. IA requires each user and device to have a unique identity and a method to verify it (passwords, tokens, biometrics). Controls include enforcing password complexity, rotating credentials, and implementing MFA. This domain ensures only known identities are granted system access. According to Microsoft, MFA can block 99.9% of account compromise. 

CMMC requires documented procedures for issuing and revoking IDs and periodically reviewing accounts. For example, if an employee leaves, their accounts must be disabled immediately. Auditors will check user account lists and MFA logs to confirm policies are enforced.


System and communications protection

System and communications protection (SC) safeguards data and networks at the system boundary so that even if attackers gain a foothold, their ability to exfiltrate data or hop laterally is limited.

Controls include encryption, firewalls, network segmentation, secure protocols (e.g., TLS for email), and anti-malware. For example, CMMC may require encrypting all stored CUI (at rest) and configuring routers to drop unauthorized traffic. Proving these controls would include system configuration files showing enabled encryption (e.g., BitLocker status) and network diagrams with security zones.




How controls are validated

CMMC assessments require proof of technical implementation and documented procedures. Every implemented control should be documented. This includes system security plans (showing how each control is met), IR plans, and audit logs. Assessors will interview staff, review policies and training, and inspect system settings and logs to confirm that policies match real-world controls. 



Why domain grouping helps

With 110 controls to implement and document, domain grouping simplifies compliance. Organizing, reporting, and evidence by domain align with how CMMC assessors structure reports, making it easier to notice if any documentation or controls are missing. If gaps are found, teams can prioritize remediation based on domain risk, for instance, strengthening IA to guard against breaches before other lower-risk controls. In many companies, roles naturally align with domains (e.g., the network team handles SC, security ops owns AU/IR, HR oversees personnel security). These clearly defined responsibilities simplify project management.



Implement CMMC controls with Huntress

Huntress supports multiple CMMC domains, including access control, audit & accountability, incident response, and identification & authentication through integrated endpoint, log, and identity monitoring. Explore how Huntress can operationalize CMMC controls and help demonstrate compliance with assessor-ready documentation.



Continue Reading

CMMC 2.0 Certification Explained: Key Changes & Deadlines

Right arrow

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy