CMMC 2.0 Phase 2: What San Diego Defense Contractors Must Do Before the Deadline
The Department of Defense's Cybersecurity Maturity Model Certification program is no longer optional guidance — it is now a hard contract requirement. Phase 2 enforcement means that any company bidding on DOD contracts that involve Controlled Unclassified Information (CUI) must demonstrate certified compliance at Level 2 or risk losing contract eligibility entirely. If you are a San Diego-area defense contractor and you are not already in an active CMMC preparation program, the window to act is closing fast.
What CMMC Level 2 Actually Requires
Level 2 aligns to NIST SP 800-171 Rev 2 — 110 security practices across 14 domains. The areas where most San Diego defense contractors fall short:
- Access Control (AC): Multi-factor authentication on all systems that touch CUI, role-based access enforcement, and privileged account controls.
- Audit & Accountability (AU): Logging must be comprehensive, tamper-resistant, and retained for at least 3 years. Most SMBs have no centralized logging at all.
- Configuration Management (CM): Baseline configurations documented and enforced. Unauthorized software blocked. Most organizations have no formal baseline.
- Incident Response (IR): A written, tested IR plan. DCSA notification within 72 hours of a confirmed incident involving CUI.
- System & Communications Protection (SC): Encryption in transit and at rest for all CUI. FIPS 140-2 validated encryption is required.
The SPRS Score Trap
Many contractors have self-assessed and submitted a score to the Supplier Performance Risk System. If that score is inflated or unsupported by documentation, you are now exposed to False Claims Act liability — not just contract loss. The DOJ has actively pursued FCA cases against contractors with inaccurate SPRS scores. A score submitted in good faith with proper documentation and a Plan of Action & Milestones (POA&M) is defensible. A score that does not reflect reality is not.
What to Do Right Now
- Identify which of your contracts involve CUI — check DD-254 forms and contract language for CUI markings and DFARS 252.204-7012.
- Conduct a formal NIST 800-171 gap assessment against your current environment. Not a checklist — a documented, evidence-based assessment.
- Build or update your System Security Plan (SSP). This is the foundational document C3PAO assessors will examine.
- Remediate highest-gap areas first: MFA, logging, encryption, and access control tend to score worst and require the most lead time.
- Select a C3PAO early — their calendars are filling up as Phase 2 enforcement accelerates.
DoD Cyber Consulting specializes in CMMC readiness for San Diego and Southern California defense contractors. We conduct gap assessments, build SSPs, and guide clients through the full remediation-to-certification process.