Design a security program that builds trust, scales with your business, mitigates risk, and empowers your team to work efficiently.
Cybersecurity is evolving — Strike Graph is leading the way.
Check out our newest resources.
Find answers to all your questions about security, compliance, and certification.
Find out why Strike Graph is the right choice for your organization. What can you expect?
Find out why Strike Graph is the right choice for your organization. What can you expect?
Explore CMMC 2.0 Level 3 essentials. Learn whether it applies to your organization and how it differs from Level 2. Dive into new security requirements, find tips to streamline the process, and download a free Level 3 control spreadsheet and task checklist.
Key Takeaways:
CMMC Level 3 is the highest standard in the new CMMC 2.0 framework. Level 3 mandates 134 security controls to protect Controlled Unclassified Information (CUI) from advanced cyber threats. The Department of Defense requires contractors to comply with Level 3 to be eligible for some critical defense contracts.
The Cybersecurity Maturity Model Certification (CMMC) is a framework created by the Department of Defense (DoD) to enforce cybersecurity standards across its defense industrial base. In 2024, the DoD updated CMMC 1.0 to CMMC 2.0, simplifying compliance requirements while maintaining strict security standards. A key change in the updated framework reduced the original five compliance levels to three.
The DoD requires Level 3 compliance for contracts involving sensitive data at risk of advanced threats. Only contractors who achieve Level 3 compliance can bid on these contracts. This level demonstrates that contractors have the necessary infrastructure to protect critical information effectively.
The CMMC framework draws most of its requirements from the National Institute of Standards and Technology (NIST), a federal agency that develops and promotes standards for technology and cybersecurity. CMMC and NIST are closely connected: NIST provides the detailed security guidelines, while CMMC serves as the enforcement framework.
To achieve Level 3 compliance, contractors must implement 24 security controls outlined in the NIST SP 800-172 standard, along with meeting Level 2 compliance standards and the 110 security controls in NIST 800-11. This includes advanced techniques related to network configuration, access control, continuous monitoring, and incident response planning. Level 3 compliance also requires a triennial assessment from a government agency.
Achieving CMMC 2.0 Level 3 compliance is a significant milestone for defense contractors. It is critical for any defense organization that wants to bid on high-stakes government contracts.
The DoD introduced a phased three-year rollout for CMMC 2.0 compliance. Level 3 contractors must achieve Level 2 compliance by December 2026 and meet Level 3 requirements by December 2027. This timeline allows contractors to adapt while prioritizing Level 2 compliance first.
To meet Level 3 compliance, organizations must first fully comply with Level 2. The DoD will begin to enforce Level 2 requirements first and add Level 3 requirements later. This phased approach gives contractors time to put Level 3 security measures in place, achieve Level 2 compliance as a prerequisite, and prepare for CMMC audits.
CMMC Level 3 ensures that defense contractors protect Controlled Unclassified Information (CUI) from Advanced Persistent Threats (APTs). This helps prevent data breaches. Level 3 is the highest.
The DoD built CMMC Level 3 requirements based on the NIST 800-172 standard. Directly in the standard, the authors, primarily experts from NIST (National Institute of Standards and Technology), highlight why these additional CMMC Level 3 security measures are important: “The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the Federal Government to successfully conduct its essential missions and functions.”
The main benefit of CMMC Level 3 certification is simple. When defense contractors earn it, they become eligible for valuable, long-term federal contracts that require it.
"Earning CMMC Level 3 isn’t about gaining a competitive advantage,” Harnagel explains. "The main benefit is becoming eligible for Level 3 contracts, which include many of the most lucrative and long-lasting projects. If you perform well, you position yourself for even more of these opportunities."
CMMC Level 2 includes 110 security controls that protect Controlled Unclassified Information (CUI). Level 3 adds 24 more controls that target Advanced Persistent Threats (APTs). Level 3 also requires an assessment from a government agency.
CMMC 2.0 includes three compliance levels. CMMC 2.0 Level 1 applies to contracts involving Federal Contract Information (FCI), which is less sensitive than CUI and only needs basic cyber hygiene practices. CMMC 2.0 Level 2 and Level 3 address contracts with CUI, with Level 3 typically involving more sensitive data or critical projects.
CMMC Level 3 builds on NIST SP 800-171 by adding 24 advanced requirements from NIST SP 800-172. These requirements add controls that specifically address Advanced Persistent Threats (APTs). “The difference between Level 2 and Level 3 cybersecurity requirements comes down to the scope and strength of the controls,” says Steven Bjarnason, a cybersecurity leader with over 30 years of experience and CISSP, Technical Services Manager at 360 Advanced. “Level 3 adds more advanced measures from NIST SP 800-172. These enhancements are designed for highly sensitive situations across various security domains.”
Bjarnason provides an example: “In the 'access control' domain, Level 2 includes basic measures like complex passwords, multifactor authentication (MFA), or physical tokens. Level 3 takes it further with dual authorization, where two people must be present to access the system.”
As Bjarnason explains, Level 3 controls represent a significant step up from Level 2. NIST designed these controls to better protect data from APTs and improve incident response in the event of a data breach.
The DoD will determine which contracts require Level 3 compliance on a case-by-case basis. These contracts involve critical data needing extra protection from Advanced Persistent Threats (APTs). Level 3 will apply to only a very small number of contracts.
CMMC compliance is tied to the security needs of a particular project, not the organization or individual handling the work. While larger organizations may be more likely to handle Level 3 projects due to their resources, they are not automatically subject to Level 3 requirements. However, it’s still unclear which criteria the DoD will use to determine if a contract requires Level 3.
According to Bjarnason, CMMC Level 3 compliance will apply to a small number of contracts that support critical DoD missions.
“These contracts will support missions like weapons development, intelligence, or secure communications,” he explains. “They might include sensitive information like technical drawings, operational plans, maintenance manuals, or research and development data. Larger companies like Boeing, Raytheon, and Lockheed Martin often handle these contracts, but smaller contractors can also be affected. In general, Level 3 contractors will make up the smallest portion of the Defense Industrial Base (DIB)."
Bjarnason also notes that the DoD has yet to clearly define what qualifies as a "critical" mission. “The DoD determines compliance obligations on a contract-by-contract basis, usually depending on how a contractor handles CUI as well as other mission needs and risks,” he explains.
During the initial proposal phase of CMMC 2.0, many stakeholders, including defense contractors, expressed concerns about these potentially vague Level 3 criteria. In the 32 CFR CMMC Final Rule, the DoD addresses these concerns and the related worry that Level 3 compliance might apply to too many contracts.
Despite suggestions to revise the criteria, the DoD opted to maintain its approach. It clarified that Level 3 requirements would depend on the sensitivity and importance of the information in the contract, not factors like the number of contracts an organization holds, the contract’s value, or its acquisition program category.
The DoD plans to assign CMMC Level 3 to a small number of contracts for critical projects that need strong security against Advanced Persistent Threats (APTs). They base Level 3 decisions on the project, not the organization. By mid-2025, DoD contracts will include specific CMMC requirements.
The DoD assigns the appropriate CMMC level to each contract based on the type and sensitivity of the information it involves. In the CMMC 2.0 final rule, the DoD emphasized that Level 3 compliance provides “confidence in a contractor’s ability to safeguard certain CUI against Advanced Persistent Threats.”
According to Elliott Harnagel, Product and Compliance Strategist at Strike Graph, the specifics of Level 3 compliance are somewhat unclear because decisions are made on a case-by-case basis by the "Requiring Activity." This entity within the DoD is responsible for identifying the requirements of a contract, assessing the nature of its information, and determining whether it warrants advanced security measures like Level 3 compliance.
“In October, the DoD published Rule 32, which outlines technical requirements for CMMC, including security controls and assessment schedules,” Harnagel explains. “However, they provided little guidance on what qualifies as ‘critical’ projects or assets that would require Level 3 compliance.”
Harnagel adds that by mid-2025, the DoD will formally integrate CMMC 2.0 requirements into contracts through updates to Title 48 of the Code of Federal Regulations (CFR).
“This update is critical,” he says, “because it will define how CMMC 2.0 fits into contracts. Once finalized, the DoD will require CMMC compliance as a condition for contract. That information will be in the contract’s Defense Federal Acquisition Regulation Supplement (DFARS) 7012 clause. At that point, contractors will face clear and enforceable requirements, eliminating any ambiguity about whether a contract needs CMMC compliance or which level applies.”
Throughout the CMMC final rule and other related resources, the DoD has reiterated its expectation that “Level 3 will affect a very small portion of the DIB,” underscoring its focus on contracts with the most critical security needs. However, it has not provided a specific estimate of what percentage of DIB contracts will need Level 3 compliance.
CMMC 2.0 Level 3 builds on Level 2 by adding 24 more cybersecurity measures from the NIST SP 800-172 guidelines. These measures target Advanced Persistent Threats (APTs) and improve data confidentiality, integrity, and access controls.
CMMC 2.0 Level 3 adds 24 more cybersecurity measures from the NIST SP 800-172, “Enhanced Security Requirements for Protecting Controlled Unclassified Information,” to the Level 2 requirements. To get Level 3 compliance, organizations must meet all Level 2 requirements and the extra 24 controls for Level 3.
The NIST developed enhanced requirements to specifically address Advanced Persistent Threats (APTs). These requirements will help organizations protect their data from APTs and respond quickly in the case of a breach. According to the NIST, the requirements focus on three key components:
Here’s a summary of the 24 enhanced security requirements, organized by the 14 security families established in NIST SP 800-171 for Level 2 compliance.
Download this spreadsheet of the 24 additional controls for CMMC 2.0 Level 3. These controls show what you need to implement above and beyond the CMMC Level 2 controls.
Download the CMMC 2.0 Level 3 Controls Spreadsheet
To achieve Level 3 compliance, first complete Level 2 certification. Conduct an internal assessment to identify gaps, implement the necessary controls, and perform a self-audit. Finally, schedule a DIBCAC assessment to finalize Level 3 certification.
Here's a summary of the basic steps to get CMMC Level 3 compliance:
Level 3 certification remains valid for three years, but organizations must submit annual affirmations confirming ongoing compliance with Level 3 requirements. After the three-year period, organizations must undergo another formal DIBCAC assessment to renew their certification.
The CMMC Level 3.0 checklist below helps you stay on track as you work toward eventual CMMC Level 3 compliance. It outlines the most important tasks. You can also download this more detailed CMMC Level 3 checklist.
Step |
Description |
Key Details |
1. Complete Level 2 certification |
Implement the Level 2 security controls and receive a formal assessment from a Certified Third-Party Assessor Organization (C3PAO) |
Generate an SPRS (Supplier Performance Risk System) score. An organization must fully comply with the 110 controls and receive a perfect SPRS score (110) |
2. Conduct a gap analysis |
Identify which Level 3 security controls you are not currently implementing |
Develop a System Security Plan (SSP) |
3. Implement the required controls |
Create a plan for managing required controls. |
Use SSP templates to document CMMC requirements and how you plan to meet them. |
4. Self-audit and remediate |
Evaluate your current compliance status. |
Create a Plan of Action and Milestones (POA&M) |
5. Receive an assessment from DIBCAC |
Undergo a formal Defense Industrial Base Cybersecurity Center (DIBCAC) assessment to finalize Level 3 compliance |
Contact DIBCAC early in case of long lead times |
Download the CMMC 2.0 Level 3 compliance task checklist
CMMC Level 3 compliance is the hardest CMMC 2.0 compliance level. It requires a significant investment of time, money, and other resources. Organizations that already follow NIST SP 800-172 practices may find it easier to comply.
Here's an overview of the specific challenges that affect the difficulty of CMMC Level 3.0:
However, other requirements, such as dual authorization, continuous monitoring, cryptographic protections, and cyber resiliency planning, are far more complex.
"Most of the most challenging controls are in the Configuration Management (CM) domain and the Identification and Authentication (IA) domain," explains Harnagel. "These will require companies to purchase additional tools or dedicate significant man-hours to implementation.”
Here are the specific controls Harnagel highlights as potentially time-intensive:
Control ID |
Description |
CM.L3-3.4.1e |
Establish and maintain an authoritative source and repository to provide a trusted source and accountability for approved and implemented system components. |
CM.L3-3.4.2e |
Employ automated mechanisms to detect misconfigured or unauthorized system components; after detection, remove the components or place the components in a quarantine or remediation network to facilitate patching, re-configuration, or other mitigations. |
CM.L3-3.4.3e |
Employ automated discovery and management tools to maintain an up-to-date, complete, accurate, and readily available inventory of system components. |
IA.L3-3.5.1e |
Identify and authenticate systems and system components, where possible, before establishing a network connection using bidirectional authentication that is cryptographically based and replay resistant. |
IA.L3-3.5.3e |
Employ automated or manual/procedural mechanisms to prohibit system components from connecting to organizational systems unless the components are known, authenticated, in a properly configured state, or in a trust profile. |
The time it takes to get CMMC Level 3 compliance depends on an organization’s size, scope, and current security posture. Organizations with advanced cybersecurity measures in place may finish in a year, while others may need up to two years.
Achieving CMMC compliance at Level 3 will be a challenging and time-intensive process. However, some organizations will need to invest less time and money than others.
Here are a few factors that affect the time it takes to get CMMC 3 compliance:
The DoD estimates CMMC 2.0 Level 3 compliance will cost $500,000 to $21 million over three years, depending on size, scope, and current security. Costs include Level 2 and 3 assessments, with most expenses tied to implementing Level 3 security measures.
In the CMMC 2.0 final rule, the DoD offers a detailed estimate of CMMC Level 3 certification, assessment, and affirmation costs. These estimates include engineering costs to implement the additional 24 security measures from NIST SP 800-172. These estimates account for the time the organization needs to implement the security and prepare for, support, and participate in a Level 2 and Level 3 certification assessment from a DIBCAC.
The DoD’s cost estimate for Level 3 is so high because contractors were never required to implement any controls from NIST SP 800-172. As a result, the estimate includes the cost of implementing these controls, which ranges from $400,000 for small entities to tens of millions for large ones. In contrast, contractors were already expected to follow Level 2 protocols (NIST SP 800-171) before CMMC existed, so the DoD excluded implementation costs for Level 2. Bjarnason suggests Level 3 contractors renegotiate contracts to help manage the financial burden of these new requirements.
“If you have an existing contract, you’ll likely need to renegotiate it,” Bjarnason says. “Contractors won’t be expected to cover all compliance costs. These costs will be factored into the contract to ensure fairness. The Department of Defense (DoD) is also hiring staff to support compliance efforts, with many associated costs likely charged back to the government.”
“One way to reduce costs is by partnering with the right external or managed service provider (MSP),” Harnagel explains. “Many MSPs already have CMMC ecosystems in place, which can save you money, especially in man-hours. If you’re trying to figure this out on your own, it can be frustrating. An experienced MSP with out-of-the-box solutions for CMMC compliance will make the process much easier.”
CCMC Level 2 is a prerequisite for Level 3, so first focus on fully meeting Level 2 requirements. Use the grace period between the DoD’s contract announcement and Level 3 enforcement to ensure a smooth transition to Level 3 compliance.
"Start with Level 2 compliance," says Harnagel. "Right now, focusing on Level 2 makes the most sense because the actual contract requirements won’t take effect for another six months, until the DoD finalizes the enforcement mechanism that will require them to include CMMC requirements in each contract. After that, there’s a grace period, giving you additional time to address Level 3 compliance.”
He adds: “Trying to go above and beyond now, when it’s not yet required, could be premature — especially since so few companies will need to meet those higher requirements immediately. It’s more practical to tackle Level 2 first, as it’s already challenging enough. Then wait for 48 CFR to be finalized and specific contractual language to emerge."
To secure a DoD contract, CMMC compliance is crucial. Strike Graph’s customizable platform organizes key controls, lets you add your own, and streamlines documentation. Our experts know CMMC inside and out, so you can focus on landing the contract while we handle compliance.
CMMC 2.0 demands significant effort from your team — but Strike Graph can lighten the load. Our NIST-based framework aligns with CMMC standards to make compliance straightforward. Select common controls or customize your own, and let our VerifyAI tool flag evidence issues before they reach an assessor. The enterprise content management feature simplifies compliance further by distributing controls across divisions, eliminating redundant work.
Our experts monitor evolving compliance frameworks, keeping you informed about regulatory changes. With expert guidance and a cutting-edge platform, Strike Graph helps you reduce errors, meet CMMC standards, and secure government contracts with ease.
Find answers to common questions about CMMC 3.0 Level 3 compliance. Learn about key topics like security requirements and assessments. Fill in gaps in your understanding to determine if you need to meet CMMC 2.0 requirements to comply with Department of Defense (DoD) standards for protecting CUI.
CMMC 2.0 Level 3 compliance will be mandatory for contracts designated by the DoD as requiring Level 3 security standards. Only contractors who meet these standards will be eligible to bid on these contracts.
Yes, CMMC 2.0 Level 3 requirements follow the federal standard NIST SP 800-172. Also, contractors pursuing Level 3 compliance must first fully comply with Level 2, which follows NIST SP 800-171.
CMMC Level 3 applies to subcontractors if they handle Controlled Unclassified Information (CUI) that needs Level 3 security. Whether this applies depends on if Level 3 data flows from the prime contractor to the subcontractor. Subcontractors should check their contracts and talk to the prime contractor to confirm compliance.
The DoD will begin specifying Level 3 requirements in contracts in mid-2025 and gradually enforce them over three years. Contractors must comply with Level 3 for new contracts by late 2026, with full compliance required for all contracts by late 2027.
The 32 CFR codifies CMMC in the Code of Federal Regulations. It outlines mandatory security levels and requirements. It also specifies timelines to meet CMMC standards effectively.
The Cyber AB plays an indirect role in CMMC Level 3 compliance. It approves the Certified Third-Party Assessor Organizations that run Level 2 assessments. Level 2 is required before Level 3 assessments, which the D0D runs.
Yes, contractors must get CMMC Level 2 certification before qualifying for Level 3. They need to meet all 110 Level 2 security controls and pass an assessment by a Certified Third-Party Assessor Organization (C3PAO). Once certified, they can move on to Level 3.
The Defense Industrial Base Cybersecurity Assessment Center (DIBCAC) conducts CMMC Level 3 audits. It’s part of the DoD. A DIBCAC assessor reviews an organization's cybersecurity to ensure it meets all Level 3 requirements.
The security landscape is ever changing. Sign up for our newsletter to make sure you stay abreast of the latest regulations and requirements.
Strike Graph offers an easy, flexible security compliance solution that scales efficiently with your business needs — from SOC 2 to ISO 27001 to GDPR and beyond.
© 2025 Strike Graph, Inc. All Rights Reserved • Privacy Policy • Terms of Service • EU AI Act
Fill out a simple form and our team will be in touch.
Experience a live customized demo, get answers to your specific questions , and find out why Strike Graph is the right choice for your organization.
What to expect:
We look forward to helping you with your compliance needs!
Fill out a simple form and our team will be in touch.
Experience a live customized demo, get answers to your specific questions , and find out why Strike Graph is the right choice for your organization.
What to expect:
We look forward to helping you with your compliance needs!