CMMC 2.0: What Manufacturers Need to Know
Learn what manufacturers need to know about CMMC 2.0, its core levels, compliance strategies, and how to secure defense contracts in this comprehensive guide.
📖 Estimated Reading Time: 3 minutes
Article
CMMC 2.0: What Manufacturers Need to Know
Introduction
The Cybersecurity Maturity Model Certification (CMMC) 2.0 represents a pivotal shift in the cybersecurity landscape for defense contractors and, by extension, a substantial portion of the U.S. manufacturing base. With its historical origins embedded in persistent weaknesses observed across the Defense Industrial Base (DIB), CMMC’s latest iteration is designed to foster a culture of cybersecurity maturity and accountability. For CISOs, IT Directors, Network Engineers, and Operations teams working in complex manufacturing and industrial environments, understanding these changes is not optional—it is required for maintaining and winning DoD contracts.
Historical Backdrop: From DFARS to CMMC 2.0
To appreciate the rigor of CMMC 2.0, it helps to understand its evolution:
DFARS 252.204-7012: The original regulatory instrument required contractors to self-attest to the implementation of NIST SP 800-171 cybersecurity controls.
Persistent Gaps: Widespread non-compliance, weak self-assessments, and steady breaches (e.g., the 2018 Chinese exfiltration of sensitive Navy ship data) exposed flaws in the honor-system approach.
CMMC 1.0 (2020): Introduced a five-level certification regime, initially requiring third-party audits for all but the lowest tier—a significant leap in oversight but criticized for complexity and increased cost.
CMMC 2.0 (2021 - Present): Announced in response to industry feedback, this framework streamlines requirements, reducing to three tiers and aligning closer with NIST SP 800-171, while targeting accountability via both self-attestation and third-party certification where most critical.
Core Elements of CMMC 2.0
Streamlined Model
CMMC 2.0 refines the model to three levels:
Level 1 – Foundational: Basic safeguarding of Federal Contract Information (FCI). Self-assessment only; based on 17 controls in NIST SP 800-171.
Level 2 – Advanced: Focused on Controlled Unclassified Information (CUI). Requires 110 NIST SP 800-171 controls. Some contracts allow self-assessment; others (involving prioritized CUI) require third-party assessment.
Level 3 – Expert: Tailored for organizations managing the most sensitive CUI. Mandates even more rigorous controls (aligned with selected NIST SP 800-172 controls), with government-led assessments.
NIST Alignment
CMMC 2.0 is tightly mapped to NIST SP 800-171 (and in the future, select requirements from 800-172 for Level 3). This standardization reduces ambiguity for manufacturers with mature cybersecurity programs and offers clearer guidance for those needing to build robust policies and procedures.
Key Technical Concepts for Manufacturers
Scoping: What Systems Matter?
Scoping under CMMC means not just “who owns the network” but which assets are exposed to FCI or CUI. For industrial operations, this particularly affects:
Networks and segment zones where IT meets OT—for example, any industrial control system (ICS) gateways exchanging maintenance logs or operational data with contractor IT systems.
Cloud-hosted software (e.g., MES, SCADA historians, ERP integrations) where workflows involve defense data, including where third-party SaaS providers may introduce additional risk vectors.
Portable media and removable storage used on production networks, possibly bridging air-gapped or segmented domains.
A granular, risk-based scoping exercise is critical to avoid both under- and over-engineering compliance strategies—a nontrivial challenge where legacy OT equipment is still prevalent and air gaps are disappearing.
Configuration Management and Hardening
Industrial and manufacturing networks often aggregate decades’ worth of disparate devices. Many programmable logic controllers (PLCs), human-machine interfaces (HMIs), and manufacturing execution systems (MES) were never designed with native authentication, encryption, or event logging.
Under CMMC 2.0, organizations should:
Develop a configuration baseline for both IT and OT equipment, with documentation on hardening practices that align as closely as possible with NIST 800-53 and 800-171 mappings.
Implement network segmentation, limiting the exposure of sensitive data where legacy systems can’t be updated to hardened states.
Document all “compensating controls,” especially for devices that are functionally unable to support modern authentication or encryption.
Secure Connectivity and Monitoring
Gone are the days when operational networks rested behind a single firewall and called it secure. Modern manufacturing architectures require:
Zero Trust Networks (ZTN), enforcing least-privilege access for users, applications, and devices at every layer.
Continuous Monitoring: With third-party audit tools increasingly being adopted alongside traditional SIEM, organizations must prove that monitoring is not a one-time exercise but an ongoing, auditable activity.
Threat Intelligence Integration: Particularly vital for manufacturers under the CMMC umbrella, given the ongoing supply chain and industrial espionage threats prevalent in DIB.
IT/OT Collaboration: Organizational and Technical Barriers
The traditional gulf between IT (information technology) and OT (operational technology) teams is a major risk. In CMMC contexts, this gap can have direct compliance consequences:
OT networks often lack mature vulnerability management, leaving unknowns in compliance documentation.
Most CMMC-aligned frameworks expect unified incident response programs, including playbooks and tabletop exercises that encompass both IT and OT assets.
Asset inventory, patch management, and identity/access controls all require tight information sharing—impractical absent cross-functional governance.
Establishing joint IT/OT security councils, as well as shared metrics and objectives, is critical for demonstrating due diligence to auditors and regulators.
Pitfalls and Implementation Challenges
Legacy Devices and Technical Debt
Most factories and industrial networks run on legacy protocols (MODBUS, DNP3, OPC-DA, etc.) lacking basic security affordances. Full replacement is rarely feasible. Instead:
Use network enclaves and application-layer filtering to shield insecure protocols.
Incorporate out-of-band monitoring and anomaly detection to identify unauthorized access attempts or policy violations.
Leverage compensating processes and document “exceptions” with risk acceptance, showing the intent to progress toward full compliance where possible.
Supply Chain and Third-Party Risk Management
CMMC requires oversight not just of your own network but that of your suppliers and key service providers. Organizations should:
Develop and enforce cybersecurity clauses in supplier contracts, including requirements for their own CMMC compliance tracking.
Perform periodic risk assessments and request self-assessments (and, where possible, third-party certifications) downstream in your supply chain.
Next Steps: Action Items for Manufacturing CISOs and Network Leaders
Understand CUI/FCI flows: Map how sensitive data moves through your business and which systems touch it, including transitory access.
Perform gap analysis: Audit current controls against NIST SP 800-171 and identify shortfalls. Get realistic about legacy OT limitations.
Develop a remediation plan: Prioritize compensating controls or network isolation where full remediation is currently infeasible.
Establish cross-functional teams: Break down IT and OT silos, implement shared incident response, and define common goals around CMMC compliance.
Monitor regulatory updates: The CMMC program rulemaking process is ongoing; federal guidance may change as it enters the Defense Federal Acquisition Regulation Supplement (DFARS) and is enforced contractually.
Conclusion
CMMC 2.0 is more than a compliance checkbox—it is an operational reality for manufacturers looking to participate in the defense supply chain. While the model is more focused and better aligned with existing standards than its predecessor, it still poses substantial technical and organizational challenges, particularly in environments where IT and OT convergence is accelerating.
The true differentiator will be a proactive, technically-informed approach to scoping, architectural design, and collaborative security—supported by leadership and rigorously documented at every stage. Manufacturers who view CMMC 2.0 as an opportunity to mature rather than a burden will be best positioned for long-term resilience and competitiveness.
Other blog posts from Trout