Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeCybersecurity GuidesCMMC Compliance Guide
What is CMMC

What is the Cybersecurity Maturity Model Certification (CMMC)?

Published:
February 17, 2026

Key Takeaways:

  • CMMC (Cybersecurity Maturity Model Certification) is the Department of Defense (DoD) framework for protecting federal contract information (FCI) and controlled unclassified information (CUI), using a three-level maturity model based on NIST 800-171.

  • Achieving compliance requires documented, implemented, and continuously maintained security controls that match your contract requirements.

  • Huntress helps defense contractors meet CMMC technical controls and evidence requirements with Managed Endpoint Detection and Response (EDR), Managed Security Information and Event Management (SIEM), Managed Identity Threat Detection and Response (ITDR), 24/7 continuous monitoring, and Managed Security Awareness Training (SAT), and all at an affordable price point that doesn’t require a full in-house security team.


CMMC stands for Cybersecurity Maturity Model Certification, and it's the Department of Defense (DoD) framework for measuring, assessing, and certifying an organization's ability to safeguard federal contract information (FCI) and controlled unclassified information (CUI). 

CMMC uses three maturity levels to make sure companies handling sensitive data implement security controls that match the data’s risk. The more sensitive the data you work with, the greater the required security hygiene.


Try Huntress for Free
Get a Free Demo
Topics
What is the Cybersecurity Maturity Model Certification (CMMC)?
Down arrow
Topics
  1. What is the Cybersecurity Maturity Model Certification (CMMC)?
    • Why CMMC exists
    • What CMMC covers
    • How the CMMC levels work
    • Getting started with CMMC compliance
    • The difference between NIST and CMMC
    • Is CMMC certification mandatory?
    • Huntress can help you achieve CMMC compliance
  2. Understanding POA&Ms and How They Fit into CMMC Compliance
  3. Developing Your System Security Plan for CMMC Compliance
  4. FCI vs. CUI Data in CMMC: What's the Difference?
  5. CMMC vs. NIST 800-171 Compliance: What’s the Difference?
  6. CMMC 2.0 Compliance Levels Explained (Level 1, 2, 3)
  7. CMMC Controls Explained: Full List and Breakdown by Domain
  8. CMMC 2.0 Certification Explained: Key Changes & Deadlines
  9. CMMC vs. FedRAMP Compliance: What’s the Difference and Which Applies to Your Organization?
  10. Who Needs CMMC Certification and When Is It Required?
  11. How to Determine the Right CMMC Certification Level for Your Organization?
  12. CMMC Readiness Assessment Guide: How to Conduct a Gap Analysis and Readiness Assessment for CMMC Compliance
Share
Facebook iconTwitter X iconLinkedin iconDownload icon

What is the Cybersecurity Maturity Model Certification (CMMC)?

Published:
February 17, 2026

Key Takeaways:

  • CMMC (Cybersecurity Maturity Model Certification) is the Department of Defense (DoD) framework for protecting federal contract information (FCI) and controlled unclassified information (CUI), using a three-level maturity model based on NIST 800-171.

  • Achieving compliance requires documented, implemented, and continuously maintained security controls that match your contract requirements.

  • Huntress helps defense contractors meet CMMC technical controls and evidence requirements with Managed Endpoint Detection and Response (EDR), Managed Security Information and Event Management (SIEM), Managed Identity Threat Detection and Response (ITDR), 24/7 continuous monitoring, and Managed Security Awareness Training (SAT), and all at an affordable price point that doesn’t require a full in-house security team.


CMMC stands for Cybersecurity Maturity Model Certification, and it's the Department of Defense (DoD) framework for measuring, assessing, and certifying an organization's ability to safeguard federal contract information (FCI) and controlled unclassified information (CUI). 

CMMC uses three maturity levels to make sure companies handling sensitive data implement security controls that match the data’s risk. The more sensitive the data you work with, the greater the required security hygiene.


Try Huntress for Free
Get a Free Demo

Why CMMC exists

For years, DoD officials had been raising alarms about data breaches of defense contractors. Their complaints largely fell on deaf ears—implementation of security measures was spotty, documentation was often poor or non-existent, and workarounds for cybersecurity challenges were common.

Enter CMMC. First rolled out in 2020, the initial version of the program faced major challenges. The framework was ambiguous, the requirements weren’t clear, and self-assessment was the primary compliance method. This essentially meant contractors were grading their own work with little oversight. 

CMMC 2.0, finalized in 2024, and being phased into contracts through 2026, changes that approach completely. The certification program essentially states: "You want to do business with us? Cool. Now show us you're serious about security, and there are some specific ways we expect you to do that." This includes documented, implemented, third-party verified processes and security controls specific to each level of the CMMC model. No more pinky promises allowed.

CMMC applies to any company in the Defense Industrial Base (DIB) that processes FCI or CUI. This can include prime contractors, all tiers of subcontractors, and service providers that offer their services to DIB contractors. In other words, if your business relies on revenue from DIB contracts, you need to either get compliant or get out of the DIB.



What CMMC covers

At its core, the framework is meant to safeguard two types of data:

Federal contract information (FCI)

FCI is information that the government provides or generates under a contract action, but is not intended for public release. Examples include bid proposals, contract terms and conditions, and the like. All the categories of government data you wouldn’t post on LinkedIn.


Controlled Unclassified Information (CUI)

CUI is where things get a bit more serious. CUI includes technical data and other information that needs safeguarding or dissemination controls, or follows other restrictions on access or use. Examples include export-controlled information and sensitive-but-unclassified data that could cause serious damage to national security if made public.

CMMC maps its security controls to three maturity levels that align with the National Institute of Standards and Technology Special Publication 800-171, or NIST 800-171, the federal standard for protecting CUI. The CMMC program takes those 110 NIST 800-171 controls and structures them into tiers.




How the CMMC levels work

CMMC maturity involves three tiers. Each one adds a greater number of controls and increased rigor to align with the sensitivity of the information.


CMMC level 1: Foundational

Level 1 represents the foundational cyber hygiene practices that you should already be following if you're working with DoD contractors, even if you're not actively working on a defense contract. This includes:

  • Passwords and access controls

  • Multi-factor authentication (MFA)

  • Basic data access restrictions

The 17 practices in Level 1 are all about safeguarding FCI. The good news is that at this level, you can self-attest compliance annually. The bar is low here, but it’s still a bar.


CMMC level 2: Advanced

Level 2 is where most defense contractors will land. It’s Level 1 plus 93 more boxes to check from NIST 800-171. These controls are all about securing CUI and include:

  • Enhanced access controls and identity management

  • Security monitoring and incident response

  • Improved physical security

  • Documented security plans and processes

At Level 2, a third party will actually check your homework, assessing you every three years through a CMMC Third-Party Assessor Organization, or C3PAO. This assessment is a deep dive to confirm that a contractor effectively implements and documents all 110 security controls derived from NIST SP 800-171. These controls are mandatory for protecting CUI. 

The C3PAO’s role is to verify your policies, procedures, and technical evidence, making sure your organization has achieved the required maturity level and that CUI is secured against unauthorized access or loss. This often means using cloud solutions equivalent to FedRAMP Moderate and mandates FIPS 140-2 validated encryption for CUI at rest and in transit. 


CMMC level 3: Expert

Level 3 is the top tier of CMMC and is intended for contractors that work with the most sensitive and highest impact CUI. In addition to all of the Level 2 practices, Level 3 includes additional enhanced practices (110+ total practices) that require "expert implementation." This includes:

  • Advanced threat detection and response, including proactive threat hunting

  • Defense against Advanced Persistent Threats (APTs): adversaries with sophisticated cyber expertise

  • Standardized processes and capabilities like monitoring, scanning, and data forensics



Getting started with CMMC compliance

To get CMMC certified, organizations have to commit to processes that demonstrate security documentation, actual implementation, and proof that they're doing what they say they're doing. 


Conduct a gap analysis

A gap analysis shows you where your company stands in relation to the required CMMC controls. This review compares your current processes, controls, and documentation to requirements, determining where you fall short.


Implement required security controls

After the gap analysis, it's time to roll up your sleeves and do some work to address the problem areas. This means writing policy, implementing, and documenting technical controls, administrative procedures, and physical security measures. Depending on where you start, this may include:

  • Security tools that are either FEDRAMP or that can prove their out of scope for gathering CUI: 

  • See Huntress Sensitive Data Mode that applies to the entire Huntress Platform 

  • Network segmentation to isolate sensitive data

  • Formal incident response plans


Maintain continuous evidence

CMMC doesn't stop after the assessment. You need ongoing evidence that security controls remain effective through log reviews, security monitoring, vulnerability scanning, policy reviews, and training records.



The difference between NIST and CMMC

The NIST 800-171 standard is a set of security controls, requirements, and procedures you need to follow to protect CUI. CMMC is a certification program that assesses the maturity of your organization's cybersecurity practices based on the type of work you do with the DoD. It uses the security controls in NIST 800-171 at Level 2 and incorporates a formal assessment to verify that you're following the standards.

Or put another way: NIST defines the rules. CMMC makes sure you're actually following them and gives you a grade on your efforts.



Is CMMC certification mandatory?

Sort of, though in government speak, that basically means ignore it at your peril. The DoD will phase CMMC into contracts by 2026. Once that happens, contractors will need to achieve the appropriate CMMC level for each contract. In other words, no certification, no contract. No contract, no defense work. No defense work, well… you know where this is going. 



Huntress can help you achieve CMMC compliance

CMMC compliance can be a confusing and time-intensive process for all involved. The Huntress platform is a combination of tools and 24/7 monitoring. Unlike MDRs or third-party SaaS companies, Huntress owns its own tech stack, which allowed them to create Sensitive Data Mode. When enabled, no Huntress SOC analyst can pull or view any file that potentially contains FCI or CUI. Using the Huntress platform helps you achieve 37/110 controls out of the box, including security expert management. And unlike many other security tools, there’s no upcharge for Sensitive Data Mode and no FEDRAMP environment necessary, allowing you to meet many CMMC requirements without hiring a full cybersecurity team or paying exorbitant costs of third-party MDR on top of a FedRAMP EDR, ITDR, or SIEM instance. For more guidance, see our CMMC Compliance page.

From Managed Endpoint Detection and Response (EDR) to identity threat detection, Security Information and Event Monitoring (SIEM), Security Awareness Training (SAT), and 24/7 SOC monitoring, the Huntress platform gets you further, faster, and more affordably. Our solutions build the evidence trail and maintain the ongoing monitoring needed to make the assessment process seamless and less stressful.

Get a demo to see how Huntress can help you achieve and maintain CMMC compliance.



Continue Reading

Understanding POA&Ms and How They Fit into CMMC Compliance

Right arrow

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy