What Everyone Gets Wrong About CMMC: 6 Key Takeaways from the Final Rule
What Everyone Gets Wrong About CMMC: 6 Key Takeaways from the Final Rule
The Cybersecurity Maturity Model Certification (CMMC) final rule is here, and it challenges everything the Defense Industrial Base (DIB) thought it knew about compliance, cost, and contract eligibility.

Unlocking clarity in the complex world of CMMC compliance.
The CMMC Final Rule: What You Thought You Knew Just Changed
For government contractors, the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) program has been a source of complexity, cost, and considerable anxiety. Since its inception, the regulation has evolved, leaving many in the Defense Industrial Base (DIB) struggling to keep up with its requirements and implications. The goal is clear: to secure the DIB against evolving cybersecurity threats and protect sensitive government information.
Beneath the dense regulatory language of the final rule, however, are several surprising, counter-intuitive, and impactful realities that every business in the DIB needs to understand. These aren't minor details; they are fundamental aspects of the program that challenge common assumptions and have significant strategic implications for contract bidding, IT investment, and risk management.
This article distills the official CMMC rule documents into a clear, scannable list of the most critical takeaways. It cuts through the noise to reveal what the Pentagon’s new cybersecurity rules really say and what they mean for your business. Our goal is to give you clarity and confidence to make quick, informed decisions.
Takeaway 1: "Self-Attestation" Isn't Dead—It Just Evolved
A core motivation behind the original CMMC program was to move the DIB away from the "self-attestation" model of security that the DoD had previously relied on for NIST SP 800-171 compliance. The perception was that self-reporting wasn't effective enough, necessitating a shift toward third-party verification.
The surprising twist is that the revised CMMC Program (often called CMMC 2.0) streamlined the model and reintroduced self-assessments as a valid compliance pathway. The final rule confirms that companies at Level 1 and a subset of companies at Level 2 are allowed to demonstrate compliance through annual self-assessments rather than a mandatory third-party audit.
This is a significant and pragmatic change that alleviates the immediate, immense cost and logistical burden a universal audit requirement would have placed on the DIB, especially on small businesses. This evolution represents a calculated, risk-based decision by the DoD, which has determined that for contracts involving less sensitive information, the risk of unverified compliance is acceptable when weighed against the practical realities and costs imposed on the defense industrial marketplace.
Takeaway 2: Perfection Isn't Required to Win a Contract
A common misconception about CMMC is that a contractor must have a perfect cybersecurity assessment score to be eligible for a contract award. This assumption has been a major source of stress for companies working toward compliance, as achieving 100% implementation of all security controls is a formidable task.
The final rule clarifies that this is not the case. An organization can be awarded a contract by achieving a "Conditional Level 2" or "Conditional Level 3" CMMC status. To qualify, a company must achieve a minimum score equal to 80% of the maximum score on a CMMC Level 2 or Level 3 assessment. All unmet requirements must be documented in a Plan of Action and Milestones (POA&M).
Critically, the organization has a 180-day deadline from the date of the conditional assessment to close out the POA&M and meet all remaining requirements. This is a significant and practical concession from the DoD, allowing companies to win business while still finalizing their compliance efforts.
Takeaway 3: The Government Won't Tell You Exactly What to Protect
One of the most persistent areas of confusion for contractors is determining what information, exactly, constitutes Controlled Unclassified Information (CUI). Many have asked the government for clearer definitions, guidance, and contract-specific lists to help define the scope of their CMMC efforts.
The counter-intuitive reality is that the DoD has officially stated this is outside the scope of the CMMC rule, placing the primary responsibility for identifying CUI squarely on the contractor. The rule's commentary includes a direct and unambiguous response to industry requests for guidance:
The CMMC Program will not provide CUI guidance materials to industry as it is outside the scope of this CMMC rule.
The document further clarifies that official DoD policy states, "The authorized holder of a document or material is responsible for determining, at the time of creation, whether information in a document or material falls into a CUI category." This places a significant burden on contractors, who must become experts in data classification to accurately define the scope of their own CMMC assessments.
Takeaway 4: The Biggest Costs of CMMC Aren't Considered "CMMC Costs"
The high cost of CMMC compliance is a major concern across the DIB. However, the DoD's official position on what constitutes a "CMMC cost" may come as a surprise. The costs to implement the required security controls for Level 1 (from FAR 52.204-21) and Level 2 (from NIST SP 800-171) are not considered costs attributable to the CMMC rule.
The government's rationale is that these implementation requirements were mandated years earlier, with a deadline to implement the NIST SP 800-171 controls set back in December 2017. Therefore, from the DoD's perspective, companies should have already incurred these implementation costs. The only new costs officially attributed to CMMC Levels 1 and 2 are for the assessment and affirmation activities required to verify that those pre-existing requirements have been met. The DoD reinforces its perspective on the necessity of these costs with a powerful statement:
The cost of lost technological advantage over potential adversaries is greater than the costs of such enforcement.
Takeaway 5: Your Cloud Provider Is Part of Your Audit
A company’s CMMC compliance boundary does not end with its own on-premises servers and workstations. If an organization uses an external Cloud Service Provider (CSP) to process, store, or transmit CUI, that CSP is unequivocally part of the CMMC assessment scope.
The final rule specifies a clear and impactful requirement for these providers: the CSP must meet the FedRAMP Moderate baseline or an equivalent standard. The rule documents are explicit on this point, stating the following:
...the DoD is not willing to assume all the risk of non-FedRAMP Moderate Equivalent CSOs when the CSO is used to process, store, or transmit CUI.
This effectively makes vendor selection a compliance decision, not just an IT one. The contractor is ultimately responsible for ensuring its entire CUI data chain—including services provided by third parties—meets DoD's stringent security standards.
Takeaway 6: The "COTS Exception" Is Narrower Than You Think
The CMMC rule provides a well-known exemption for contracts that are solely for the acquisition of Commercially Available Off-the-Shelf (COTS) items. This has led some to believe that if they sell COTS products, they are exempt from CMMC entirely.
However, there is a critical and surprising nuance in this rule. The source text clarifies: "The exemption does not apply to a contractor's use of COTS products within its information systems that process, store, or transmit CUI."
A simple example illustrates this crucial distinction:
A company whose contract is solely to sell COTS laptops directly to the DoD might be exempt from CMMC for that specific contract.
However, if that same company uses those same COTS laptops in its own corporate network to perform work on a different DoD contract that involves CUI, then its network is subject to CMMC requirements.
The exemption applies to what is being sold, not to what is being used to perform contract work involving sensitive data. This is a crucial detail that could easily lead to a failed assessment if misinterpreted.
Conclusion: A New Era of Accountability and Pragmatism
The Cybersecurity Maturity Model Certification program represents a fundamental shift in the DoD's approach to securing its supply chain. It moves the DIB from a model based on trust and self-attestation to one centered on verification and accountability. Yet, as these takeaways reveal, the final rule is not a rigid, one-size-fits-all mandate. It includes pragmatic allowances—such as self-assessments and conditional certifications—that acknowledge the business realities faced by the thousands of companies that support the U.S. warfighter.
The rules are now set, and the phased implementation is underway. With this new era of accountability beginning, the true test now begins: will this landmark regulation successfully raise the DIB's security baseline to protect against advanced threats, or will it create unforeseen obstacles for the very innovators the DoD relies on? The path forward requires clarity, and recognizing these six realities is the first step toward confident compliance.

