Skip to main content
DoD Contractors

Supply Chain Cybersecurity for DoD Contractors: CMMC and NIST 800-171 Requirements

Ken Satkunam, CISM
Ken Satkunam, CISM

March 19, 2026 · 8 min read

Supply Chain Cybersecurity for DoD Contractors: CMMC and NIST 800-171 Requirements

The defense supply chain is only as secure as its weakest link—and adversaries know it. The U.S. Defense Industrial Base (DIB) is a network of over 300,000 contractors and subcontractors, many of them small and mid-sized businesses that handle sensitive technical data, engineering specifications, and export-controlled information every day. When CMMC 2.0's final rule took effect on November 10, 2025, it formalized something prime contractors had already been demanding for years: verified cybersecurity compliance, flowing down through every tier of the supply chain. If your company handles Controlled Unclassified Information (CUI) or Federal Contract Information (FCI) for a DoD prime, your security posture is now a contract requirement—not just a best practice.

What Is CMMC 2.0 and Who Does It Apply To?

The Cybersecurity Maturity Model Certification (CMMC) 2.0 is the DoD's framework for ensuring that defense contractors protect sensitive information on their systems. The DoD estimates that CMMC requirements will ultimately affect approximately 337,968 contractors and subcontractors across the program's four-year rollout. The framework operates at three levels:

  • Level 1 (Foundational): Applies to contractors handling Federal Contract Information (FCI). Requires implementing 15 basic safeguarding practices from FAR clause 52.204-21, with annual self-assessments entered into the Supplier Performance Risk System (SPRS).
  • Level 2 (Advanced): Applies to most contractors handling Controlled Unclassified Information (CUI). Requires full implementation of all 110 security controls from NIST SP 800-171 Rev. 2. Level 2 assessments may be self-assessments or third-party C3PAO assessments, depending on the program's sensitivity.
  • Level 3 (Expert): Reserved for the most critical CUI programs, requiring an additional 24 controls from NIST SP 800-172 and triennial assessments by DCMA's Defense Industrial Base Cybersecurity Assessment Center (DIBCAC).

Phase 1 of the rollout began November 10, 2025. Contracting officers are now including CMMC Level 1 and Level 2 requirements in new solicitations, and companies must complete their assessments before contract award. By Phase 4 (November 2028 and beyond), compliance will be mandatory across all applicable DoD contracts with no exceptions.

What Are FCI and CUI, and Why Does the Distinction Matter in Your Supply Chain?

Understanding what information you're handling—and what your subcontractors are handling—determines your compliance obligations and theirs.

  • Federal Contract Information (FCI) is information provided by or generated for the government under a contract to develop or deliver a product or service. Contractors handling only FCI need Level 1 compliance.
  • Controlled Unclassified Information (CUI) is sensitive data that doesn't meet the threshold for classified status but still requires protection under law or policy. Examples include technical drawings, test data, export-controlled specifications (ITAR/EAR), software code, and personnel information related to DoD programs. Contractors handling CUI need Level 2 (or Level 3 for high-priority programs).

The critical supply chain implication: if you share CUI with a subcontractor—meaning they receive, process, store, or generate deliverables that contain CUI—that subcontractor is in scope for the same NIST SP 800-171 requirements you are. As a prime, you are responsible for defining those data flows in your System Security Plan (SSP) and ensuring your subcontractors comply. Failing to control CUI flow-down isn't just a compliance gap; it's a direct breach of contract under DFARS clause 252.204-7021.

How Do DFARS Flow-Down Clauses Work in Practice?

DFARS clause 252.204-7012 (Safeguarding Covered Defense Information and Cyber Incident Reporting) is the foundational clause—and it is explicitly a flow-down requirement. Under DFARS 252.204-7012, prime contractors must include the clause in all subcontracts where performance involves CUI. This means:

  • Subcontractors must implement NIST SP 800-171: Any subcontractor handling CUI must fully implement all 110 security controls—or document a Plan of Action and Milestones (POA&M) for any gaps.
  • Subcontractors must report cyber incidents within 72 hours: When a subcontractor discovers a cyber incident affecting a covered contractor information system or CUI residing on it, they must report to the DoD via DIBNet within 72 hours of discovery. They must also notify the prime contractor as soon as practicable and provide the incident report number.
  • Forensic evidence must be preserved for 90 days: Upon discovering a cyber incident, both primes and subcontractors must preserve images of all affected systems and relevant monitoring or packet capture data for at least 90 days to allow DoD to request evidence.
  • DFARS 252.204-7021 (CMMC) is also a flow-down clause: Under the final rule, primes must ensure subcontractors handling CUI hold the appropriate CMMC certification level. As enforcement matures, primes will be required to only select team members who hold the appropriate certification, potentially excluding unqualified subcontractors from CUI-related work.

DFARS 252.204-7019 requires contractors to submit a current SPRS score before contract award, while DFARS 252.204-7020 requires subcontractors to also report their scores—making supply chain cybersecurity posture visible to contracting officers at every tier.

What Does NIST SP 800-161 Add to Supply Chain Risk Management?

While NIST SP 800-171 governs how you protect CUI on your own systems, NIST SP 800-161 (Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations) addresses how you manage risk from the suppliers, vendors, and service providers in your own supply chain. The CMMC framework incorporates a Supply Chain Risk Management (SCRM) control family under NIST SP 800-171 that references 800-161 as guidance.

For DoD contractors, a credible C-SCRM strategy means:

  • Maintaining a supplier inventory: Document every vendor, subcontractor, and service provider with access to your systems or CUI, including IT managed service providers, cloud vendors, and software developers.
  • Conducting due diligence assessments: Evaluate the cybersecurity posture of suppliers before onboarding and periodically thereafter—using questionnaires, SOC 2 reports, or contractual flow-down audits.
  • Establishing contractual protections: All supplier contracts should include appropriate data handling, security, and breach notification requirements. CUI must not flow to vendors who haven't agreed to protect it.
  • Building resilience: Identify single points of failure in your supply chain—software components, hardware sources, sole-source vendors—and document contingency plans if a supplier is compromised or disrupted.

The DIB supply chain is made up of approximately 12,000 subcontractors, many of them small businesses with limited cybersecurity resources. Nation-state adversaries have learned to exploit this reality, using supply chain entry points to gain persistent access to prime contractor networks and DoD programs.

What Are the Most Common Supply Chain Cybersecurity Failures in DoD Contracts?

Based on DIBCAC assessments and industry experience, the most common deficiencies that create supply chain risk include:

  • Undocumented CUI data flows: Many contractors don't know exactly where CUI lives—which systems touch it, which subcontractors receive it, or whether it traverses commercial cloud services that lack FedRAMP authorization. Without a documented data flow, you can't control what you can't see.
  • Missing or inadequate SSPs: The System Security Plan (SSP) is the foundational document for CMMC compliance. Under control CA.L2-3.12.4, an assessment cannot even proceed without an adequately documented SSP. Many contractors either lack an SSP entirely or have one that doesn't reflect their actual environment.
  • Weak subcontractor vetting: Prime contractors sometimes rely on self-attestations from subcontractors without verifying SPRS scores or reviewing evidence of control implementation. When a subcontractor is breached, the prime carries significant legal and reputational exposure.
  • Commercial cloud usage for CUI: Using commercial Microsoft 365, Google Workspace, or similar tools to store or transmit CUI without verifying FedRAMP authorization violates DFARS 252.204-7012. For most contractors handling CUI, Microsoft 365 GCC High is the appropriate environment—it meets FedRAMP High authorization and satisfies DFARS 7012 paragraphs (c) through (g).
  • Lack of multi-factor authentication (MFA): MFA for all users accessing systems that store CUI is a non-negotiable NIST SP 800-171 requirement (control 3.5.3). Missing MFA is also one of the controls that cannot be placed on a POA&M—it will result in a failed CMMC assessment outright.

How Do You Build a Defensible Supply Chain Security Program?

For small and mid-size defense contractors, a practical supply chain security program starts with scope and documentation, then moves to technical controls:

  • Define your CUI boundary: Identify every system, device, application, and network segment that processes, stores, or transmits CUI. This is your CMMC assessment scope—keep it as narrow as defensible while accurately reflecting your operations.
  • Document your subcontractor data flows: Map which subcontractors receive CUI and under what contract authority. Verify their SPRS scores and confirm they have flow-down clauses in their agreements with you.
  • Implement a supplier risk scoring process: Rate each supplier by the sensitivity of data they access and their demonstrated security posture. Require annual reconfirmations from subcontractors handling CUI.
  • Use compliant cloud infrastructure: Migrate CUI-handling workflows to government-cloud environments like Microsoft 365 GCC High or other FedRAMP-authorized platforms. Commercial cloud environments, even with strong security configurations, may not satisfy DFARS 7012 requirements.
  • Conduct regular supplier security reviews: Don't wait for a breach to discover a subcontractor's gaps. Annual questionnaires, audit rights, and SOC 2 report reviews are practical tools for maintaining visibility.

See also our article on Risk Assessments for CMMC Compliance for guidance on how to structure your internal assessment process before a third-party C3PAO review.

What Should Defense Contractors Do Next?

Supply chain cybersecurity is no longer an abstract compliance discussion—it's a procurement reality. With CMMC Phase 1 active as of November 2025 and enforcement intensifying through 2028, prime contractors that fail to manage subcontractor compliance will face contract eligibility risks, and subcontractors that fall short will lose work to competitors who've done the preparation.

At NorthStar Technology Group, we work directly with defense contractors and their subcontractors to scope CUI environments, document System Security Plans, assess compliance against all 110 NIST SP 800-171 controls, and build the technical infrastructure needed for CMMC certification. If your organization is navigating supply chain obligations—whether as a prime managing subcontractor risk or as a sub preparing for a C3PAO assessment—we can help you build a defensible program. Learn more at northstartechnologygroup.com/services/dod-cmmc.

CybersecurityCMMCNIST 800-171Supply Chain SecurityDFARSCUIDefense Contractors
Share this article

About the author

Ken Satkunam, CISM

Ken Satkunam, CISM

President & Founder, NorthStar Technology Group

Ken has spent over 25 years in IT leadership, serving in roles from technical support to CIO for organizations as large as 23,000 employees. He founded NorthStar Technology Group in 2000 to help regulated organizations build secure, compliant, and operationally resilient technology environments. Ken holds the Certified Information Security Manager (CISM) credential from ISACA and is the co-author of the Amazon best-seller "Cyber Attack Prevention." He has been quoted in industry publications including eWeek and DM News, and NorthStar has been recognized on the Inc. 5000 list in both 2024 and 2025.

CISMInc. 5000MSP 500Published Author25+ Years

Need Help With Your Technology Strategy?

Our experts can help you assess your current posture and build a roadmap for success.