Is Your Company Ready for CMMC Level 2?

5 minutes. 14 questions. Get your personalized readiness score, gap analysis, and recommended next steps.

Phase 2 enforcement begins November 2026
14 Questions
5 min To Complete
Free No Obligation
110 Controls Mapped
Question 1 of 14
1. Does your company work with sensitive (but not classified) government data?
This is called CUI — things like technical drawings, test data, or contract specs marked 'Controlled.' Learn more about CUI in our FAQ.
2. Do you have a written plan for how your company protects sensitive data?
In CMMC language, this is called a System Security Plan (SSP). Learn more in our FAQ.
3. Is multi-factor authentication (MFA) implemented for all users accessing company systems with sensitive data?
MFA requires a second form of verification (like a phone app or text code) beyond just a password.
4. Do you have a plan for what to do if you get hacked or have a data breach?
CMMC requires a documented incident response plan that covers sensitive data breaches.
5. Is your sensitive data encrypted (scrambled so hackers can't read it) both when stored and when sent?
CMMC requires FIPS 140-2 validated encryption for data at rest and in transit.
6. Do you regularly scan your systems for security weaknesses and fix them?
This is called vulnerability management — finding and patching security holes before hackers exploit them.
7. How many people at your company can access sensitive government data?
Fewer people with access means a smaller scope to secure — and a simpler path to certification.
8. Do you have dedicated cybersecurity personnel or a Chief Information Security Officer (CISO)?
9. Have you done an official security self-assessment and reported your score to the DoD?
This is the SPRS score based on NIST 800-171 — it's required for all DoD contractors.
10. When do you need to achieve CMMC Level 2 certification?
11. Do you have written rules about who can see sensitive government data — and do you enforce them?
These are called access control policies — documenting who gets access to what data and how you verify they should have it.
12. Do you provide cybersecurity awareness training for personnel with CUI access?
13. Do you keep records of who accessed what on your systems, and does someone review them?
These are called audit logs — digital footprints that track user activity for security monitoring.
14. Do you have a standard, secure setup for your computers and servers — and a process to keep them that way?
This is configuration management — ensuring all systems follow secure baseline settings and stay configured properly over time.
0
YOUR CMMC READINESS SCORE

Priority Recommendations

    Ready to Close Your Compliance Gaps?

    Schedule a free discovery call to discuss your specific situation and next steps.

    Book a Free Discovery Call

    Most contractors are assessment-ready within 90–120 days.

    Ready to Get Compliant?

    Principal-led CMMC preparation. One consultant, start to finish. Assessment-ready documentation — faster than you think.