Request a DemoLog In(844) 692-0626
    • Americas
    • América Latina (Español)
    • Canada (English)
    • Canada (Français)
    • United States (English)
Request a DemoLog In
cta-construction-image

Take Your Knowledge to the Next Level

Unlock your career potential with our free educational courses on Health & Safety, Data in Construction, and more.

Learn More

—  15 min read

CMMC: Contractor Data Requirements on DOD Projects

By 
Reviewed by 

Last Updated Dec 30, 2024

By
Reviewed By

Last Updated Dec 30, 2024

Cybersecurity Maturity Model Certification (CMMC) logo over a photo of a construction professional using a laptop.

Construction companies that take on work for the Department of Defense (DOD) and other federal projects often have access to sensitive or controlled information and data. This information isn’t always classified — i.e., potentially damaging to the country’s national security interests — but still requires safeguarding from unauthorized disclosure. 

Cybersecurity Maturity Model Certification (CMMC), spearheaded by the US DOD, is an information security standard that establishes requirements and protocols for the handling and safeguarding of Controlled Unclassified Information, or CUI. Contractors that work on construction projects subject to CMMC must demonstrate their ability to safeguard project information. For example, the drawings, specifications and other contract information for the construction of barracks on a military base would likely be marked as CUI. 

Until recently, the requirements for contractors to protect CUI have been both confusing and difficult to enforce. Contractors could simply self-attest they were taking the necessary measures, leaving sensitive government information vulnerable to exposure. As a result, the Department of Defense (DOD) is launching CMMC 2.0 to establish stricter oversight of controlled information. These requirements will phase in between 2024 and 2028. During this period, contractors on DOD construction projects will need to meet an increasingly high bar for contract compliance. 

Note: This article is purely intended for informational purposes. Nothing in it should be construed as legal advice. For legal guidance pertaining to CMMC compliance, consult with a lawyer. 

Table of contents

CMMC Basics: Types of Controlled Information

Clearly defined rules and protocols for handling classified data have existed in Federal Acquisition Regulation (FAR) since the National Industrial Security Program (NISP) was established in 1993. The rules for management of Controlled Unclassified Information have been less well defined. That’s why the DOD established Cybersecurity Maturity Model Certification in an effort to safeguard CUI and protect it from public disclosure. 

Controlled Unclassified Information is defined as “unclassified information the United States Government creates or possesses that requires safeguarding or dissemination controls limiting its distribution to those with a lawful government purpose.”(Source: DOD) All federal projects have the potential to expose contractors to some categories of CUI, but CMMC compliance is only currently a requirement of the DOD. Other federal agencies set their own standards for data handling and security. 

Contractors on most military construction projects will have access to a subset of CUI known as Federal Contract Information (FCI). This is sensitive “information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government.” FCI doesn’t include simple transactional information (Source: FAR 52.204-21).

To be clear, information is defined by the Code of Federal Regulations (CFR) as “any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual" (Source: 48 CFR 4.1901).

In short, any DOD project contract information that is not publicly available (i.e. published on a government agency website) is considered FCI and subject to CMMC rules.

Examples of FCI in construction include: 

  • Emails and other communication between the DOD and contractors
  • Voicemails, meeting recordings and other audio pertaining to project scope

Further readingCMMC Resources & Documentation: Links to federal legislation, codes and reference documents

Non-federal systems that store, process or transmit FCI that do not also qualify as CUI must follow, at a minimum, the basic safeguarding requirements outlined in FAR clause 52.204-21.

For a full list of key terms and acronyms related to CMMC, see the reference section at the bottom of this page.

CMMC Takeaways for Construction Companies

Construction companies that work on any DOD project that deals with Controlled Unclassified Information must be CMMC compliant to the level required. The solicitation and contract documents will specify when CMMC is required, usually with a specific reference to Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7021. 

The regulations around CMMC also make it clear that any requirements flow down to subcontractors. As a result, general contractors who bid on a DOD project with a CMMC clause need to either self-perform the work or then include that clause in any contract documents with specialty contractors. 

There are three levels of CMMC to which the contractor and any subcontractors might need to comply: 

  • Level 1
  • Level 2
  • Level 3

Because the solicitation will specify which level is required, contractors can determine their ability to bid the project. The vast majority of DOD construction projects will require CMMC Level 2.

Note, though, that CMMC compliance is required as a condition of the contract award, not as a condition to initially submit a bid. As a result, contractors who don’t yet have the required level of compliance could still bid and begin work to secure the required level of CMMC. Since bidding for larger DOD projects typically takes months, the contractor may have sufficient time to implement the required cybersecurity measures and get their certification. 

Ideally, what is and isn’t CUI will be marked. The project administrator from the DOD should be able to provide clarity around what constitutes CUI and is consequently subject to CMMC requirements. That said, this is an area in which many contractors currently report some confusion. 

Further reading: CUI Marking Handbook: A reference guide for understanding how CUI is indicated 

CMMC 2.0 Requirements

CMMC 2.0 sets data security standards for three different levels of compliance. 

CMMC Levels

CMMC LevelApplicable toRequirementsAssessment
Level 1 (Foundational)Contractors who have access to FCI only15 measures as specified in FAR 52.204-21: Basic Safeguarding of Covered Contractor Information SystemsAnnual self-AssessmentAnnual affirmation(More information: Level 1 Assessment Guide)
Level 2 (Expert)Contractors with access to CUI beyond FCI Level 1 requirements AND 110 requirements from NIST SP 800-171: Protecting Controlled Unclassified Information in Nonfederal Systems and OrganizationsTriannual assessment by a Certified Third-Party Assessor Organization (C3PAO) or, for select programs,Triannual self-assessmentAnnual affirmation(More information: Level 2 Assessment Guide)
Level 3 (Advanced)Contractors working on high-value, high-risk DOD where the CUI faces a persistent threatLevel 2 requirements AND24 additional requirements from NIST SP 800-172Triannual assessment by Defense Contract Management Agency (DMCA) Defense Industrial Base Cybersecurity Assessment Center (DIBCAC) Annual affirmation
(More information: Level 3 Assessment Guide)

CMMC 2.0 Timeline

To frame up CMMC 2.0 and what it means for construction professionals, it helps to look back to understand how the DOD and its contractors arrived at this point. 

2001–2024: Controlled Unclassified Information and Early-Stage CMMC

In the wake of 9/11, officials recognized that greater information sharing among government agencies might have prevented the tragedy. As a result, a government-wide initiative was launched with the goal of facilitating information sharing while protecting sensitive details.

From that effort, the term “Controlled Unclassified Information” was born. In 2010, Executive Order 13556 was issued to establish a uniform program for managing CUI. 

Today, a law, regulation, or government-wide policy (LRGWP) is required to categorize information as CUI. The National Archives and Records Administration (NARA) maintains a database of the latest CUI categories as enacted by LRGWP.

The current CUI program leaves government agencies with room to tackle CUI protection in different ways. The DOD has been notable in its proactive approach. 

With the 2017 enactment of Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012, construction contractors working with the DOD needed to comply with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171

This SP was developed by the NARA and the NIST to develop CUI safeguarding standards. NIST SP 800-171 lays the foundation for the DOD’s Cybersecurity Maturity Model Certification

CMMC 2.0

To establish the latest CMMC framework, also called CMMC 2.0, two pieces of legislation are being added to the Code of Federal Regulations (CFR). 

The first is 32 CFR Part 170, which took effect on December 16, 2024, and establishes the new framework and its requirements. However, it won't be implemented until the proposed acquisition rule (48 CFR Part 204 CMMC Acquisitions rule) is finalized, which is expected by mid-2025.

The second component, Defense Federal Acquisition Regulation Supplement (DFARS) 48 CFR, is what enables the DOD to include clauses in contracts requiring CMMC compliance for contractors when handling CUI. 

Note that there’s a third revision of NIST SP 800-171 live. For now, though, CMMC Level 2 hangs on Revision 2, along with a class deviation issued by the DOD.

At the beginning of CMMC 2.0, Level 1 and Level 2 contracts will allow for self-attestation, meaning the contractor can essentially sign something saying that they’re compliant with the 15 or 110 security measures. But as CMMC 2.0 gets phased in, the vast majority of construction contracts will require Level 2 CMMC compliance as confirmed by a Certified Third-Party Assessor Organization (C3PAO). 

To prove Level 3 CMMC compliance, which will only be required of contractors on projects with extremely sensitive security requirements, contractors will need to work with a Defense Industrial Base Cybersecurity Assessment Center (DIBCAC). 

No mandatory CMMC contractual requirements for defense contractors can take effect until the CMMC Title 48 Final Rule is approved and becomes effective. 48 CFR closed its comment period in October 2024 and moved into its finalization process. Approval is expected sometime between Spring and Fall of 2025. Once finalized, the three-year phased roll-out will begin.
 

PhaseEffective DateRequirement Level*Requirement
Phase 12025Level 1 (Self) or Level 2 (Self)In this first phase, new DOD contracts can require either Level 1 or Level 2 CMMC compliance as confirmed by self-attestation from the contractor. 
Phase 22026Level 2 (C3PAO)New DOD contracts can require Level 2 CMMC as confirmed by an audit from a C3PAO. 
Phase 32027Level 2 (C3PAO)Level 3 (DIBCAC)New DOD contracts can require Level 3 CMMC as confirmed by an audit from a DIBCAC.
Phase 42028Full ImplementationSolicitations and contract documents for all DOD projects will include applicable CMMC level requirements.

Becoming CMMC Compliant

CMMC compliance depends on the phase of the 2.0 rollout.

Self-Attestation

This is the current state of affairs and will continue to be so until CMMC 2.0 Phase 2 begins on February 14, 2026. 

Right now, cybersecurity maturity model certification relies on self-attestation. Compliance means meeting the requirements and entering that self-attestation into the DOD’s Supplier Performance Risk System (SPRS).

Self-attestation shouldn’t be taken lightly. By attesting that the company has CMMC compliance to the appropriate level, that contractor is committing to upholding those security measures. 

The government has recourse if the contractor is found to be committing fraud in falsifying a self-attestation. In fact, the False Claims Act was instituted during the Civil War because of defense contractor fraud. Under the Act, fraudulent contractors can be held liable for up to three times the government’s damages plus an additional penalty. Adjusted for inflation, this sits at $13,946 with a maximum of $27,894.

To ensure Level 2 CMMC compliance, contractors should follow specific steps:

  • Identify CUI and document where it lives within the company (e.g., in file folders, specific software solutions).
  • Check compliance for how CUI is protected according to the 110 measures in NIST SP 800-171.
  • Create plans of action and milestones (POAMs) for any areas that aren’t compliant.
  • Look at ways that CUI can flow out of those places into others and set up boundaries to prevent unwanted flow.
  • Name people responsible for monitoring CUI protections and equip them with the necessary tools.
  • Review contracts with other parties (e.g., subcontractors) to ensure CMMC compliance flows down appropriately.
  • Identify service providers and ensure appropriate compliance.

For help understanding what falls under CMMC requirements, construction professionals can turn to the scoping guide from the DOD. Broadly speaking, anything that stores, transmits, or processes CUI needs CMMC compliance. 

To reiterate a key point here, CMMC requirements flow down to subcontractors. Even in the self-attestation phase, all parties involved in the project and interacting with CUI need to be able to prove their CMMC compliance. 

Working With a C3PAO

As CMMC 2.0 Phase 2 rolls out, most contractors working with the DOD will need Level 2 CMMC as validated by a C3PAO. C3PAOs are authorized and accredited by the Cyber AB, the only authorized non-governmental partner of the DOD in implementing and overseeing CMMC. 

While getting an auditor involved might feel like extra work, it can streamline CMMC compliance for the construction company. The auditor determines the scope of the audit, identifying systems and parts of the company’s network that need to be in compliance. The scoping statement the auditor develops shapes the path forward and provides clarity about what the company needs to do to get certified. 

Once the auditor has confirmed CMMC compliance, the information needs to be recorded in both the CMMC Enterprise Mission Assurance Support Service (eMASS) and SPRS. 

To stay continually CMMC-compliant, the contractor needs to attest to compliance annually and have an audit conducted by a C3PAO every three years. 

How FedRAMP Plays Into CMMC Compliance

As part of these cybersecurity measures, any cloud service providers (CSPs) within the boundary that the contractor uses to handle, store, and process CUI must be Federal Risk and Authorization Management Program (FedRAMP) Moderate Baseline equivalent. 

Note, FedRAMP authorization isn’t an additional step the contractor needs to take internally. Instead, they need to choose FedRAMP-authorized CSPs or use CSPs who can prove FedRAMP moderate equivalency. This is explored in more depth in this FedRAMP guide

Looking Ahead With CMMC

As CMMC 2.0 rolls out, contractors should brace for hiccups along the way. The implementation of this cybersecurity standard means a lot of change for a lot of organizations — with surrounding processes layered on top. 

That said, the DOD is a forward-thinking government agency. Other agencies are only in the infancy stages of instituting protections for sensitive data, while the DOD is already in its second wave of implementing a robust plan.

For contractors, the best course of action is to take steps to implement CMMC 2.0 Level 2 compliance. For more information about the cybersecurity maturity model certification and the rollout of CMMC 2.0, construction professionals can refer to the DOD’s CMMC hub page

Reference Section

Key Terms & Acronyms

AcronymMeaningDescription
C3PAOCertified Third-Party Assessor OrganizationA non-governmental organization authorized to conduct assessments on companies seeking CMMC certification.
CFRCode of Federal RegulationsA codification of the general and permanent rules published in the Federal Register by the executive departments and agencies of the federal government.
CMMCCybersecurity Maturity Model CertificationA framework established by the Department of Defense to ensure that contractors implement adequate cybersecurity measures when handling Controlled Unclassified Information.
CUIControlled Unclassified InformationInformation that requires safeguarding or dissemination controls pursuant to and consistent with applicable laws, regulations, and government-wide policies.
DFARSDefense Federal Acquisition Regulation SupplementRegulations that supplement the Federal Acquisition Regulation (FAR) and provide DOD-specific acquisition policies and procedures.
DIBCACDefense Industrial Base Cybersecurity Assessment CenterA DOD unit responsible for evaluating the cybersecurity measures of defense contractors.
DODDepartment of DefenseThe U.S. federal agency responsible for coordinating and supervising all agencies and functions of the government related directly to national security and the military.
FedRAMPFederal Risk and Authorization Management ProgramA government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud services.
NISTNational Institute of Standards and TechnologyA federal agency that develops and promotes measurement standards, including those for cybersecurity.
POAMPlan of Action and MilestonesA document that outlines the steps a contractor needs to take to address any gaps or deficiencies in their cybersecurity practices.
SPSpecial PublicationA series of NIST publications that provide guidelines and standards for various aspects of information technology and cybersecurity.
SPRSSupplier Performance Risk SystemA DOD system where contractors enter self-attestation of their cybersecurity practices as part of the CMMC compliance process.

Source Legislation & Documents

1. FAR 52.204-21 

  • Title: Basic Safeguarding of Covered Contractor Information Systems
  • What it covers: Establishes basic safeguarding requirements and procedures to protect contractor information systems that process, store, or transmit Federal contract information against cybersecurity threats.

2. Executive Order 13556 

3. DFARS 252.204-7012

4. NIST SP 800-171 (Rev 2)

  • Title: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
  • Source: https://csrc.nist.gov/pubs/sp/800/171/r2/upd1/final
  • What it covers: Provides guidelines for protecting Controlled Unclassified Information in non-federal systems and organizations, detailing 110 security requirements to ensure appropriate protections.

5. NIST SP 800-172

  • Title: Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171
  • Source: https://csrc.nist.gov/pubs/sp/800/172/final
  • What it covers: Enhances the security requirements outlined in NIST SP 800-171 by adding additional safeguards for advanced persistent threats, applicable to organizations handling critical programs and high-value assets.

6. CFR 32 Part 170

7. DFARS 48 CFR

  • Title: Federal Acquisition Regulations System
  • What it covers: Enables the Department of Defense to include specific contract clauses requiring CMMC compliance for contractors handling CUI, facilitating the incorporation of cybersecurity requirements into contracts.

8. 31 USC §3729

Was this article helpful?

Thank you for your submission.

0%

0%

You voted that this article was . Was this a mistake? If so, change your vote here.

Scroll less, learn more about construction.

Subscribe to The Blueprint, Procore’s construction newsletter, to get content from industry experts delivered straight to your inbox.

Thank you!

You’re signed up to receive The Blueprint newsletter from Procore. You can unsubscribe at any time.

Categories:

Construction Intelligence

Tags:

Written by

Kacie Goff

39 articles

Kacie Goff is a construction writer who grew up in a construction family — her dad owned a concrete company. Over the last decade, she’s blended that experience with her writing expertise to create content for the Construction Progress Coalition, Newsweek, CNET, and others. She founded and runs her own agency, Jot Content, from her home in Ventura, California.

View profile

Reviewed by

Mandy Pote

Mandy Pote is the Managing Principal at Coalfire, where she leads the Enterprise Risk Analysis team and collaborates with sales to sustain a strong client pipeline. With nearly a decade at Coalfire and past experience at EY, she is skilled in refining assessment methods and developing team training programs. A mentor for Duke's Master's in Cybersecurity program, Mandy is committed to helping students transition smoothly from academia to the professional world. She holds a degree from the Isenberg School of Management, UMass Amherst, and a CISSP certification.

Explore more helpful resources

article-image

The Evolution of Construction Documentation

Every construction project generates an overwhelming amount of information — from daily logs and meeting notes to change orders and safety reports. Managing this data isn’t just about staying organized;...

article-image

What Is Construction Project Loss Insurance?

Construction contractors face potential losses with each project they take on. To mitigate the financial consequences of catastrophic project losses, businesses use construction project loss insurance (PLI). This policy is...

article-image

How Industry Foundation Classes Lay the Foundation for BIM Collaboration

As the world of construction technology grows, the way data gets exchanged between solutions becomes increasingly complex. Particularly for large building information modeling (BIM) files, this can get sticky.  Each...

article-image

7 Types of Insurance Policy Every Subcontractor Needs

Subcontractors who are searching for work need to have the right types of insurance coverage.  Subcontractor insurance protects subcontractors and general contractors (GCs) against potential financial risks and liability issues....

Procore is committed to advancing the construction industry by improving the lives of people working in construction, driving technology innovation, and building a global community of groundbreakers. Our connected global construction platform unites all stakeholders on a project with unlimited access to support and a business model designed for the construction industry.

LinkedIn Icon
LinkedIn
Facebook icon
Facebook
Twitter icon
Twitter
Instagram Icon
Instagram
YouTube icon
YouTube

Call us at (844) 692-0626 to speak with a product expert.

Apple LogoApple App StoreGoogle Play logoGoogle Play

Downloads

Apple LogoApple App StoreGoogle Play logoGoogle Play
  • Privacy Notice
  • Terms of Service
  • Do Not Sell Personal Information

© 2025 Procore Technologies, Inc.