CMMC Level 2 Readiness for Small Manufacturers
- Sadrack Fleurimond
- Dec 9, 2025
- 3 min read

CMMC Level 2 Readiness for Small Manufacturers
If you’re a small or mid-size manufacturer working with the DoD, you’ve probably heard:
“No CMMC, no contract.”
CMMC 2.0 is the U.S. Department of Defense’s framework to make sure contractors protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) at a level that matches modern threats.
Level 2 is the line in the sand for many small manufacturers. It maps to the 110 controls in NIST 800-171 and is required for contracts where you touch CUI.
The good news: it’s achievable.The bad news: winging it will absolutely wreck your bid pipeline.
This guide is your plain-language path to CMMC Level 2 readiness.
1. What CMMC 2.0 Level 2 actually means (in human terms)
At Level 2, DoD wants to see that you:
Know where CUI lives in your environment
Protect it with technical controls (MFA, logging, access control, etc.)
Have documented policies and procedures, not tribal knowledge
Can prove you’re doing what you say (evidence)
It’s not just a paperwork exercise. Assessors will look at:
Your System Security Plan (SSP)
Your Policies & Procedures mapped to controls
Your Plan of Actions & Milestones (POA&M)
Evidence like logs, screenshots, configs, tickets, and training records
2. The 5 most common gaps for small manufacturers
No clear CUI scope
No one can answer: “Which systems actually process or store CUI?”
Result: overscoping (too expensive) or underscoping (failed audit).
Weak or inconsistent access control
Shared logins on shop floor PCs
No MFA on remote access, email, or line-of-business apps
Logging & monitoring missing
No centralized logs
No one watching for suspicious activity
Informal or missing policies
People “know what to do” but nothing’s written.
That doesn’t fly at Level 2.
No formal vulnerability and patch management
Patching is “when we have time” or “when something breaks.”
Old OSes and firmware create easy entry points.
3. Your CMMC Level 2 readiness roadmap
Think in phases, not chaos.
Phase 1 – Get your bearings
Identify your CUI and FCI flows
Where do you:
Receive CUI (email, portals, SFTP)?
Store it (file shares, ERP, PLM, MES)?
Process it (engineer workstations, CNC programming PCs)?
Draw the high-level diagram
Show networks, key systems, cloud services, and trust boundaries.
Baseline gap assessment
Compare your current practices to NIST 800-171 / CMMC Level 2.
Score each requirement: Met, Partially Met, Not Met.
You don’t need perfection here; you need visibility.
Phase 2 – Fix high-impact technical gaps
Prioritize controls that dramatically cut risk and are visible to assessors:
Identity & Access
MFA on:
VPN / remote access
Email
Any portal handling CUI
Unique accounts only; no shared logins for CUI systems.
Role-based access — least privilege.
Endpoint & network protection
Modern AV/EDR on servers and workstations.
Firewall rules that restrict access to CUI systems.
Separate guest / corporate / OT networks where possible.
Backups & recovery
Regular, tested backups for CUI systems.
At least one immutable or offline backup.
Logging & monitoring
Centralized log collection for:
Domain controllers / identity providers
Key servers and security devices
Alerts for failed logins, admin changes, and unusual activity.
Phase 3 – Put structure around it
This is where many shops stall. You’ll stand out if you nail:
System Security Plan (SSP)
Describe:
Your environment
CUI scope
How each requirement is met
This is the master narrative of your security program.
Policies & proceduresAt minimum, have written, approved documents for:
Access Control
Identification & Authentication
Incident Response
Configuration Management
Backup & Recovery
Acceptable Use
Physical Security
Vendor / Supply Chain Management
POA&M (Plan of Actions & Milestones)
Any requirement not fully met goes here:
What’s missing
Who owns it
Target completion date
Assessors care less about perfection and more about honesty + progress.
4. Should you go it alone or bring in help?
You can DIY CMMC Level 2, but most small manufacturers benefit from a hybrid:
Internal team
Knows the processes, machines, and constraints.
Owns daily operations and discipline.
External CMMC-savvy MSP/consultant
Designs secure network & identity architecture.
Implements and monitors controls (MFA, logging, EDR, etc.).
Helps write the SSP, policies, and POA&M.
Preps you for assessment with mock interviews and evidence checks.
Look for partners who:
Can speak both cyber and manufacturing (OT, shop floor realities).
Understand DFARS, NIST 800-171, and CMMC — not just generic IT.
5. A practical next step for manufacturers
Position this as your offer:
Free CMMC Level 2 Readiness Snapshot (Manufacturers Only) 30–45 minute call to map your CUI scope Quick scoring of your identity, access, backups, and logging A simple 1–2 page summary: Where you are now Top 5 gaps Recommended 90-day plan




Comments