CMMC Readiness Tool

CMMC Readiness Assessment

Select a certification level to begin
Domain 1 of 140%

This tool evaluates your organisation's cybersecurity readiness against the Cybersecurity Maturity Model Certification (CMMC 2.0) framework. Select a certification level below to scope the assessment to the appropriate control families and practices.

Each question presents four implementation levels. Select the response that most accurately describes your current state — not your target.

Select CMMC Certification Level
Family 3.1 — 22 Requirements

Access Control

NIST SP 800-171 Rev 2 §3.1.1–3.1.22
System access limitations, information flow control, least privilege, separation of duties, session management, and remote access controls.
Q 1.0 — Basic FCI access controls
How does your organisation limit information system access to authorised users, processes acting on behalf of authorised users, and devices (including other systems), and limit the types of transactions and functions that authorised users are permitted to execute?
Q 1.1 — System access & least privilege
How does your organisation limit system access to authorised users and enforce least-privilege principles across CUI systems?
Q 1.2 — Remote access & session management
How are remote access sessions controlled, monitored, and encrypted for CUI systems?
Q 1.3 — Enhanced access controls (SP 800-172)
How does your organisation implement enhanced access controls — including dual authorisation for critical operations, automated policy enforcement, and network-based access restrictions — to protect CUI against Advanced Persistent Threats?
Domain 1 of 14
Family 3.2 — 3 Requirements

Awareness & Training

NIST SP 800-171 Rev 2 §3.2.1–3.2.3
Security awareness for all users, role-based training for privileged personnel, and insider threat awareness programmes.
Q 2.1 — Security awareness & role-based training
How does your organisation ensure all CUI system users receive security awareness training and role-specific cybersecurity training?
Q 2.2 — Insider threat awareness
How effectively does your organisation train personnel to recognise and report potential indicators of insider threats?
Q 2.3 — APT-focused awareness training (SP 800-172)
How does your organisation provide enhanced, practical awareness training that covers APT tactics, techniques, and procedures (TTPs) and includes realistic exercises simulating advanced threat scenarios?
Domain 2 of 14
Family 3.3 — 9 Requirements

Audit & Accountability

NIST SP 800-171 Rev 2 §3.3.1–3.3.9
Audit log creation, retention, correlation, protection, and individual user accountability for all CUI system activity.
Q 3.1 — Audit logging & retention
How comprehensively does your organisation create, retain, and protect audit logs for CUI system activity?
Q 3.2 — Audit review & correlation
How does your organisation review, analyse, and correlate audit records for investigation and incident detection?
Q 3.3 — Advanced audit analytics (SP 800-172)
How does your organisation implement advanced audit capabilities — including automated analysis, cross-system correlation, and threat-informed audit strategies — to detect sophisticated adversary activities?
Domain 3 of 14
Family 3.4 — 9 Requirements

Configuration Management

NIST SP 800-171 Rev 2 §3.4.1–3.4.9
Baseline configurations, change control, least functionality, and restriction of unauthorised software on CUI systems.
Q 4.1 — Baseline configurations & change control
How does your organisation establish, maintain, and enforce baseline configurations and change control for CUI systems?
Q 4.2 — Least functionality & software restrictions
How does your organisation enforce least functionality and restrict unauthorised software on CUI systems?
Q 4.3 — Automated configuration monitoring (SP 800-172)
How does your organisation implement automated configuration management and continuous monitoring to detect unauthorised changes and ensure system integrity against sophisticated adversaries?
Domain 4 of 14
Family 3.5 — 11 Requirements

Identification & Authentication

NIST SP 800-171 Rev 2 §3.5.1–3.5.11
User and device identification, multi-factor authentication, authenticator management, and replay-resistant mechanisms.
Q 5.0 — Basic identification & authentication
How does your organisation identify and authenticate users, processes, and devices before granting access to FCI systems?
Q 5.1 — Identity management & MFA
How does your organisation identify system users and enforce multi-factor authentication for CUI system access?
Q 5.2 — Authenticator management
How are authenticators (passwords, tokens, certificates) managed, protected, and enforced across the enterprise?
Q 5.3 — Enhanced authentication mechanisms (SP 800-172)
How does your organisation implement enhanced authentication — including hardware-bound credentials, network-authenticated access, and adaptive authentication — to resist credential theft and replay attacks by APTs?
Domain 5 of 14
Family 3.6 — 3 Requirements

Incident Response

NIST SP 800-171 Rev 2 §3.6.1–3.6.3 · DFARS 252.204-7012 (72-hr reporting)
Incident handling capability, tracking and reporting (including DFARS 72-hour DC3 reporting), and testing of IR procedures.
Q 6.1 — Incident handling capability
Does your organisation have an operational incident-handling capability covering preparation, detection, analysis, containment, recovery, and user response?
Q 6.2 — IR testing & lessons learned
How regularly does your organisation test its incident response capability and incorporate lessons learned?
Q 6.3 — Proactive threat hunting & advanced IR (SP 800-172)
How does your organisation implement proactive threat hunting, advanced incident response capabilities, and coordination with external threat intelligence sources to address APT-level threats?
Domain 6 of 14
Family 3.7 — 6 Requirements

Maintenance

NIST SP 800-171 Rev 2 §3.7.1–3.7.6
Controlled system maintenance, approved maintenance tools, remote maintenance oversight, and equipment sanitisation.
Q 7.1 — Maintenance controls & tools
How does your organisation control maintenance activities and approve maintenance tools for CUI systems?
Q 7.2 — Remote maintenance
How is remote maintenance of CUI systems supervised, controlled, and documented?
Q 7.3 — Supply chain–aware maintenance (SP 800-172)
How does your organisation protect maintenance activities from supply chain threats and ensure maintenance tools, firmware, and updates are verified for integrity before deployment?
Domain 7 of 14
Family 3.8 — 9 Requirements

Media Protection

NIST SP 800-171 Rev 2 §3.8.1–3.8.9
Protection, access control, sanitisation, marking, and transport of media containing CUI.
Q 8.0 — Basic FCI media sanitisation
How does your organisation sanitise or destroy information system media containing Federal Contract Information before disposal or release for reuse?
Q 8.1 — Media protection & access control
How does your organisation protect and control access to media (digital and physical) containing CUI?
Q 8.2 — Media sanitisation & transport
How does your organisation sanitise media before disposal/reuse and protect CUI during transport?
Q 8.3 — Enhanced media protection (SP 800-172)
How does your organisation implement enhanced media protection — including cryptographic protections, advanced access controls, and automated tracking — for media containing highly sensitive CUI?
Domain 8 of 14
Family 3.9 — 2 Requirements

Personnel Security

NIST SP 800-171 Rev 2 §3.9.1–3.9.2
Personnel screening prior to CUI access and CUI protection during personnel actions (termination, transfer).
Q 9.1 — Personnel screening
How does your organisation screen individuals prior to authorising access to CUI systems?
Q 9.2 — Personnel actions (termination/transfer)
How does your organisation protect CUI during and after personnel actions such as terminations and transfers?
Q 9.3 — Enhanced personnel security (SP 800-172)
How does your organisation implement enhanced personnel security measures — including continuous evaluation, advanced insider threat detection, and supply chain personnel vetting — for individuals with access to highly sensitive CUI?
Domain 9 of 14
Family 3.10 — 6 Requirements

Physical Protection

NIST SP 800-171 Rev 2 §3.10.1–3.10.6
Physical access authorisation, monitoring, visitor control, audit logs, and protection of CUI at alternate work sites.
Q 10.0 — Basic physical access controls
How does your organisation limit physical access to FCI systems, equipment, and operating environments to authorised individuals, and how are visitors managed and physical access activity monitored?
Q 10.1 — Physical access controls
How does your organisation control and monitor physical access to CUI systems and the facilities housing them?
Q 10.2 — Visitor management & facility monitoring
How does your organisation manage visitors and monitor physical access to facilities containing CUI?
Q 10.3 — Enhanced physical security (SP 800-172)
How does your organisation implement enhanced physical security — including multi-factor physical access, advanced surveillance, and penetration testing of physical controls — for facilities housing highly sensitive CUI?
Domain 10 of 14
Family 3.11 — 3 Requirements

Risk Assessment

NIST SP 800-171 Rev 2 §3.11.1–3.11.3
Periodic risk assessments, vulnerability scanning, and remediation of vulnerabilities in CUI systems.
Q 11.1 — Risk assessments
How does your organisation conduct and maintain risk assessments for CUI systems?
Q 11.2 — Vulnerability scanning & remediation
How does your organisation scan for vulnerabilities and remediate findings on CUI systems?
Q 11.3 — Threat intelligence–driven risk (SP 800-172)
How does your organisation integrate threat intelligence into risk assessments and maintain a comprehensive, continuously updated threat-informed risk posture?
Domain 11 of 14
Family 3.12 — 4 Requirements

Security Assessment

NIST SP 800-171 Rev 2 §3.12.1–3.12.4
Periodic security control assessments, SSP development and maintenance, POA&M management, and continuous monitoring.
Q 12.1 — Security control assessments
How does your organisation assess the effectiveness of its security controls for CUI systems?
Q 12.2 — SSP & POA&M management
How mature are your System Security Plan (SSP) and Plan of Action & Milestones (POA&M)?
Q 12.3 — Advanced assessments & red teaming (SP 800-172)
How does your organisation conduct advanced security assessments — including red team exercises, penetration testing modelled on APT TTPs, and independent evaluation of security architecture?
Domain 12 of 14
Family 3.13 — 16 Requirements

System & Communications Protection

NIST SP 800-171 Rev 2 §3.13.1–3.13.16
Boundary protection, architectural design, CUI flow enforcement, cryptographic protections, session authenticity, and DNS/DNSSEC.
Q 13.0 — Basic boundary protection & subnetworks
How does your organisation monitor, control, and protect communications at the external boundaries and key internal boundaries of information systems, and implement architectural designs with subnetworks for publicly accessible components?
Q 13.1 — Boundary protection & segmentation
How does your organisation protect system boundaries and segment CUI environments from general-purpose networks?
Q 13.2 — Cryptographic protections
How does your organisation implement cryptographic mechanisms to protect CUI confidentiality in transit and at rest?
Q 13.3 — Enhanced boundary & crypto protections (SP 800-172)
How does your organisation implement enhanced boundary protections — including microsegmentation, encrypted information flow control, and advanced network monitoring — to defend CUI systems against APT lateral movement?
Domain 13 of 14
Family 3.14 — 7 Requirements

System & Information Integrity

NIST SP 800-171 Rev 2 §3.14.1–3.14.7
Flaw remediation, malicious code protection, security alerting, system monitoring, and inbound/outbound communications analysis.
Q 14.0 — Basic flaw remediation & malware protection
How does your organisation identify, report, and correct information system flaws in a timely manner, and provide protection from malicious code at appropriate locations?
Q 14.1 — Flaw remediation & malicious code protection
How does your organisation identify, report, and correct system flaws and protect against malicious code?
Q 14.2 — System monitoring & alerting
How does your organisation monitor CUI systems for security-relevant events and generate alerts for anomalies?
Q 14.3 — Advanced integrity & threat detection (SP 800-172)
How does your organisation implement advanced integrity verification, continuous monitoring, and automated threat detection to counter sophisticated adversaries targeting CUI systems?
Domain 14 of 14

CMMC Readiness

Readiness score
0.0
/ 4.0

Control Family Readiness Radar

Plan of Action & Milestones (POA&M)