CMMC Self-Assessment Guide for Small Businesses: Start Here
You've heard about CMMC. You know it's coming (or already here). You're a small defense contractor — maybe 15, 50, or 100 employees — and you need to figure out where you stand. But hiring a consultant for $30K just to tell you how bad things are doesn't make sense when you don't even know if your contracts require Level 1 or Level 2.
This guide walks you through a complete CMMC self-assessment from scratch. No prior compliance experience needed. By the end, you'll have your SPRS score, a clear picture of your gaps, and a prioritized plan to close them.
Before You Start: Do You Actually Need CMMC?
Not every DoD contractor needs CMMC. Let's figure out your situation:
Check your contracts for these clauses:
- DFARS 252.204-7012 (Safeguarding Covered Defense Information) — If this is in your contract, you handle CUI and need CMMC Level 2.
- DFARS 252.204-7021 (CMMC Requirements) — This clause explicitly states your required CMMC level.
- FAR 52.204-21 (Basic Safeguarding of Covered Contractor Information Systems) — This is the baseline. If this is your only security clause, CMMC Level 1 (17 practices) may be sufficient.
If you're a subcontractor: Ask your prime contractor. CUI flows down — if they pass CUI to you, you need the same level of protection they do, and CMMC Level 2 likely applies.
Still not sure? Check the contract's DD Form 254 (if applicable) for CUI markings, or contact your Contracting Officer for clarification. When in doubt, prepare for Level 2 — it's a superset of Level 1, so you're covered either way.
Step 1: Define Your CUI Boundary
This is the most important step — and the one most small businesses skip. Your CUI boundary defines which systems, people, networks, and physical locations are in scope for your assessment.
What Goes Inside the Boundary
- Every computer, server, and mobile device that stores, processes, or transmits CUI
- Every person who accesses CUI
- Every network segment that carries CUI traffic
- Every physical location where CUI is accessed (including home offices)
- Every cloud service that stores or processes CUI
- Every tool, application, or system that touches CUI data
What Stays Outside
- Systems that have no contact with CUI
- Personal devices (unless they access CUI — which you should avoid)
- Guest WiFi networks
- Non-CUI business systems (HR, accounting, marketing)
How to Shrink Your Boundary
Smaller boundary = fewer systems to assess = lower cost = faster compliance. Strategies:
- Create a CUI enclave: Dedicate specific workstations and a network segment to CUI work. Only people who need CUI access use these systems.
- Use virtual desktops: A cloud-based virtual desktop (Azure Virtual Desktop on GCC High, for example) can be your entire CUI boundary — employees connect to it when working with CUI, then disconnect.
- Minimize CUI recipients: Do you really need 30 people accessing CUI, or can 8 people handle it with better workflows?
Document it. Create a network diagram showing your CUI boundary, data flows (where CUI enters, moves within, and exits your environment), and a list of all systems and people in scope. This becomes part of your System Security Plan (SSP).
Step 2: Assess Yourself Against All 110 Practices
Now comes the actual assessment. You need to evaluate your implementation of each NIST 800-171 practice and score it.
The Three-Status Framework
For each practice, assign one of three statuses:
- MET: You fully implement this practice. You have evidence to prove it (configuration screenshots, policy documents, logs, etc.).
- NOT MET: You do not implement this practice, or your implementation is incomplete.
- NOT APPLICABLE (N/A): This practice doesn't apply to your environment. (Use sparingly — assessors scrutinize N/A designations. A practice is rarely truly N/A.)
How to Evaluate Each Practice
For every single practice, ask yourself three questions:
- Is there a documented policy or procedure? (Many practices require written policy even if the technical control exists.)
- Is the technical control actually implemented? (Not "we plan to" — is it deployed and working today?)
- Can I prove it? (Screenshots, configuration exports, log samples, training records, signed policies)
If you can't answer "yes" to all three, the practice is NOT MET.
Working Through the Domains
Go domain by domain. Here's a condensed checklist for the highest-impact areas:
Access Control (22 practices): - [ ] User accounts are individually assigned (no shared accounts) - [ ] Role-based access control is implemented - [ ] Remote access requires MFA - [ ] CUI access is limited to authorized users only - [ ] Session timeouts are configured - [ ] Mobile device access to CUI is controlled and encrypted
Audit & Accountability (9 practices): - [ ] Audit logs are enabled on all CUI systems - [ ] Logs capture who did what, when - [ ] Logs are protected from tampering - [ ] Logs are reviewed regularly (automated alerts preferred) - [ ] Audit logs are retained for at least 90 days
Configuration Management (9 practices): - [ ] Hardware/software inventory exists and is current - [ ] Security baselines are documented and applied - [ ] Change management process exists - [ ] Unnecessary services are disabled - [ ] Software installation is restricted
Identification & Authentication (11 practices): - [ ] MFA is enabled for all accounts accessing CUI - [ ] Password policies meet complexity requirements - [ ] Passwords are stored encrypted - [ ] Default passwords are changed on all devices
Incident Response (3 practices): - [ ] Written Incident Response Plan exists - [ ] IR plan has been tested (tabletop exercise) - [ ] Incident reporting procedures are documented (including 72-hour DoD reporting)
System & Communications Protection (16 practices): - [ ] Network boundary protections (firewall) are in place - [ ] CUI network is segmented from general traffic - [ ] CUI is encrypted in transit (TLS 1.2+, VPN) - [ ] CUI is encrypted at rest (BitLocker, etc.) - [ ] FIPS-validated cryptography is used - [ ] DNS filtering or web proxy is configured
Step 3: Calculate Your SPRS Score
The Supplier Performance Risk System (SPRS) score is a number between -203 and 110 that reflects your current compliance level. Every DoD contractor handling CUI is required to submit an SPRS score.
How SPRS Scoring Works
You start at 110 (perfect compliance). For every practice that is NOT MET, you subtract its weighted value. The weights are defined in the DoD Assessment Methodology and range from 1 to 5 points per practice.
The weighting reflects risk impact:
- 5-point practices (critical): These are the practices that, if missing, create the most risk. Missing several of these will tank your score. Examples:
- AC.L2-3.1.1 (Limit system access) — 5 points
- IA.L2-3.5.3 (Use MFA) — 5 points
- SC.L2-3.13.11 (FIPS-validated cryptography) — 5 points
-
AU.L2-3.3.1 (Create audit logs) — 5 points
-
3-point practices (important): Significant controls that matter but carry less weight.
-
1-point practices (foundational): Still required, but lower individual impact on your score.
Calculation Example
Let's say you assess yourself and find: - 75 practices are MET - 35 practices are NOT MET
If those 35 unmet practices have a total weighted value of 95 points: Your SPRS score = 110 - 95 = 15
A score of 15 means you have significant work to do, but you're not starting from zero. For reference: - 110: Full compliance (rare for first-time assessments) - 70-109: Strong posture, focused remediation needed - 30-69: Moderate gaps, structured remediation program needed - Below 30: Significant gaps, expect 6-12 months of work - Negative scores: Major security deficiencies, fundamental controls missing
Where to Submit Your SPRS Score
Submit your score at https://www.sprs.csd.disa.mil/. You'll need: - A CAGE code for your company - An ECA certificate (External Certification Authority) for the person submitting - Your assessment results and date - The name and title of the senior official affirming the results
Important: Your SPRS submission is a legal affirmation. Inflating your score can trigger False Claims Act liability. Be honest.
Step 4: Conduct a Gap Analysis
You've assessed yourself and calculated your score. Now turn your NOT MET list into an actionable plan.
Categorize Every Gap
For each unmet practice, document:
- Current state: What do you have today? (Even partial implementations count)
- Required state: What does full compliance look like?
- Gap: What's the delta between current and required?
- Remediation action: What specific steps close this gap?
- Resources needed: Technology, people, budget, time
- Estimated effort: Hours or days to implement
- Dependencies: Does this require another gap to be closed first?
Map Gaps to Projects
Group related gaps into remediation projects. Common clusters:
- MFA Rollout — covers IA.L2-3.5.3 and related authentication practices
- Log Management — covers AU practices (3.3.1 through 3.3.9)
- Network Segmentation — covers SC practices (3.13.1, 3.13.2, 3.13.5)
- Policy Development — covers practices across multiple domains that require documented policies
- Endpoint Hardening — covers CM and SI practices related to configuration and malware protection
- Training Program — covers AT practices (3.2.1 through 3.2.3)
Step 5: Prioritize Remediation
You can't fix everything at once. Prioritize based on three factors:
The Prioritization Matrix
Priority 1 — Quick Wins (Low effort, high impact) These are the practices you can close in days with minimal cost: - Enable MFA on existing accounts (IA.L2-3.5.3) — many platforms support this natively - Enable audit logging (AU.L2-3.3.1) — often just a configuration change - Update password policies (IA.L2-3.5.7) — Active Directory or cloud identity settings - Enable disk encryption (SC.L2-3.13.16) — BitLocker is built into Windows Pro - Configure session timeouts (AC.L2-3.1.10-3.1.11) — GPO or cloud policy settings
Priority 2 — High-Value Controls (Moderate effort, high impact) These take more effort but address critical risks and high-weight SPRS items: - Deploy endpoint protection/EDR (SI.L2-3.14.2, 3.14.6) - Implement network segmentation (SC.L2-3.13.1, 3.13.5) - Set up centralized log management (AU.L2-3.3.5) - Deploy vulnerability scanning (RA.L2-3.11.2) - Write and test Incident Response Plan (IR.L2-3.6.1-3.6.3)
Priority 3 — Policy and Documentation (Moderate effort, required) These don't improve your technical security directly but are required for assessment: - System Security Plan development (CA.L2-3.12.4) - Security policies and procedures (multiple domains) - Configuration baselines documentation (CM.L2-3.4.1) - Training program documentation (AT.L2-3.2.1-3.2.3)
Priority 4 — Complex Projects (High effort, required) These require planning, procurement, and implementation cycles: - Cloud migration to GCC High (if needed) - FIPS-validated cryptography implementation (SC.L2-3.13.11) - Application whitelisting (CM.L2-3.4.8) - Full media protection program (MP domain)
The 80/20 Rule for CMMC
In practice, 80% of your SPRS score improvement comes from addressing about 20% of your gaps — specifically the 5-point practices. Focus there first.
If you can only do five things this month: 1. Enable MFA everywhere 2. Turn on audit logging 3. Enable disk encryption 4. Install endpoint protection 5. Start your System Security Plan
These five actions can improve your SPRS score by 25-40 points and establish a real security foundation.
Step 6: Build Your Plan of Action & Milestones (POA&M)
Your POA&M is a formal document that tracks every unmet practice, your plan to fix it, and your timeline. Under CMMC 2.0, you can have open POA&M items at the time of assessment — but with strict conditions:
- POA&M items must be closed within 180 days of assessment
- Not all practices are eligible for POA&M (some must be met at assessment time)
- Your POA&M must include specific milestones, responsible parties, and resources
POA&M Template
For each item, document:
| Field | Description |
|---|---|
| Practice ID | e.g., AC.L2-3.1.5 |
| Practice Description | Employ least privilege |
| Current Status | Partial — admin accounts not restricted |
| Planned Actions | 1. Audit admin accounts 2. Create standard user accounts 3. Implement PAM solution |
| Milestone 1 | Audit complete — April 15 |
| Milestone 2 | Standard accounts created — May 1 |
| Milestone 3 | PAM deployed — June 15 |
| Responsible Party | IT Manager (name) |
| Resources Required | PAM tool license ($2,400/yr), 40 hours labor |
| Risk if Delayed | Excessive admin access increases breach risk |
| Completion Date | June 15, 2026 |
Step 7: Prepare Your Documentation Package
When it's time for assessment (self or C3PAO), you'll need these documents ready:
Required Documents
-
System Security Plan (SSP) — Your most important document. Describes your CUI boundary, system architecture, data flows, and how you implement each of the 110 practices. This is what assessors read first.
-
Plan of Action & Milestones (POA&M) — Tracks unmet practices and remediation plans.
-
Network Diagram — Shows your CUI boundary, network segments, data flows, and connections to external systems.
-
Hardware/Software Inventory — Every device and application in your CUI boundary.
-
Security Policies — Written policies covering each domain (Access Control Policy, Incident Response Policy, etc.).
-
Evidence Artifacts — Screenshots, configuration exports, log samples, training records, and other evidence proving implementation. Organize these by practice ID.
Documentation Tips
- Use practice IDs consistently. Reference AC.L2-3.1.1 in your SSP, your evidence folder, and your POA&M. Assessors need to trace from SSP to evidence seamlessly.
- Be specific, not aspirational. Write what you DO, not what you plan to do. If a practice isn't met, it goes in the POA&M — not the SSP.
- Date everything. Policies need review dates. Evidence needs capture dates. SSPs need version dates.
- Keep evidence fresh. A screenshot from 2024 doesn't prove compliance in 2026. Refresh evidence quarterly.
Common Self-Assessment Mistakes
Mistake 1: Scoring yourself too generously. If a practice is partially implemented, it's NOT MET. Partial credit doesn't exist in CMMC. Being honest now saves you from failing a C3PAO assessment later (or worse, False Claims Act issues).
Mistake 2: Ignoring inherited controls. If you use M365 GCC High, Microsoft handles many controls — but you need to document this. Your SSP should clearly state which controls are inherited from your cloud provider and which you're responsible for.
Mistake 3: Forgetting about people and process. CMMC isn't just technical controls. Practices about training (AT), personnel screening (PS), and incident response (IR) are about people and processes. A locked-down network with untrained staff is still non-compliant.
Mistake 4: Not involving leadership. A senior official must affirm your SPRS score. They need to understand what they're signing. Involve leadership early — they're accountable.
Mistake 5: Doing it alone. Self-assessment doesn't mean isolation. Use frameworks, templates, platforms, and peer communities. The CMMC-AB marketplace lists Registered Practitioner Organizations that can help without conducting your full assessment.
Your 30-Day Quick-Start Plan
Week 1: Foundations - Identify your CMMC level requirement (check contracts) - Define your preliminary CUI boundary - Gather your team (IT, leadership, contract managers)
Week 2: Assessment - Walk through all 110 practices - Rate each as MET or NOT MET - Calculate your preliminary SPRS score
Week 3: Analysis - Categorize gaps by priority (quick wins first) - Estimate remediation costs and timelines - Draft your POA&M
Week 4: Action - Implement Priority 1 quick wins (MFA, encryption, logging) - Begin System Security Plan draft - Present findings and plan to leadership
Take the Next Step
A self-assessment is your starting point, not your finish line. But it's the most important step — because you can't get where you're going if you don't know where you are.
📋 Take our free CMMC Self-Assessment Quiz — get your estimated SPRS score in 10 minutes, with a gap summary and recommended next steps.
📖 Download the free CMMC Survival Guide
🛡️ Get the CMMC Starter Kit ($129) — SSP template, POA&M tracker, gap assessment, and all 110 controls mapped to plain-English actions.
— includes assessment worksheets, SPRS scoring templates, and a domain-by-domain checklist.🚀 Get the CMMC Starter Kit ($129) — SSP templates, POA&M tracker, policy templates, gap analysis worksheets, and evidence collection guides. Everything you need to go from self-assessment to assessment-ready.
Attestio helps small defense contractors achieve CMMC compliance without the six-figure consulting bills. Built for companies with fewer than 200 employees. Learn more at attestio.ai.