A practical guide to understanding CMMC compliance and building a System Security Plan with limited IT staff and budget.


Why CMMC Matters for Small Business#

What is CMMC?#

Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense’s way of verifying that contractors protecting sensitive defense information have their security house in order. It’s not optional if you work with the DoD—it’s a requirement.

If your small business:

  • Sells to the Department of Defense
  • Works as a subcontractor on DoD projects
  • Handles Controlled Unclassified Information (CUI)
  • Competes for federal contracts over $150,000

…you need CMMC compliance.

What Does Compliance Actually Look Like?#

Compliance isn’t a magic certification that happens overnight. It’s:

  1. Policies — Written rules for how your company handles security (access, passwords, incident response, etc.)
  2. Tools — Software and systems that enforce those rules (firewalls, backups, antivirus, etc.)
  3. Evidence — Documentation proving you actually follow those policies and tools work as intended

For a small business with 5-50 people, compliance means 3-6 months of focused work and $5,000-$50,000 in tools and consulting—depending on your starting point and which level you need.

Who Actually Needs to Comply?#

  • Prime contractors (direct DoD contracts) — Always
  • Subcontractors handling CUI — Yes, required by prime
  • Subcontractors NOT handling CUI — No, but check your contracts
  • Small businesses under $150K contracts — Check the contract; some still require it

First step: Read your current DoD contract. Look for “CMMC” or “DFARS Clause 252.204-7012.” That tells you which level.


CMMC Essentials for Small Business#

The Three Levels, Plain English#

CMMC has three levels, each requiring more practices (security controls) and effort:

LevelPractices RequiredWhat It MeansWho Needs ItRough Cost
Level 117 basic practicesFoundational security: passwords, backups, antivirus, basic access controlSubcontractors handling unclassified CUI$5-15K
Level 2110 intermediate practicesAdvanced security: multi-factor auth, encryption, incident response, auditingMost prime contractors and larger subs$15-50K
Level 3171 advanced practicesAdvanced + continuous monitoring, threat detection, advanced incident responseHigh-value contractors, sensitive work$50K-$200K+

Reality check: Most small businesses start with Level 1 because that’s what their contracts require. Level 2 is where it gets real; Level 3 is enterprise-grade.

What “Compliant” Actually Means#

It’s NOT:

  • A one-time checklist you complete and forget
  • A document you buy from a consultant and file away
  • Something your IT person can do in a weekend

It IS:

  • A system of policies, tools, and ongoing practices
  • An annual assessment by a certified auditor
  • Maintenance of your controls year-round
  • Evidence that you actually follow your policies

Which Level Do You Need? (Quick Flowchart)#

Do you have a DoD contract or contract clause mentioning CMMC?
├─ NO → You don't need CMMC (yet)
└─ YES →
   Does the clause mention a specific level?
   ├─ YES → That's your level. Go there.
   └─ NO or unclear →
      Do you handle Controlled Unclassified Information (CUI)?
      ├─ NO → Likely Level 1
      └─ YES →
         Is this a prime contract over $500M/year?
         ├─ YES → Likely Level 2 or 3
         └─ NO → Likely Level 1 or 2 (check your prime's requirements)

Key Acronyms Demystified#

  • CUI — Controlled Unclassified Information (unclassified but sensitive to the DoD)
  • SSP — System Security Plan (the document proving you’re compliant)
  • C3PAO — Certified CMMC Professional Assessor Organization (the auditors)
  • DFARS — Defense Federal Acquisition Regulation Supplement (where the requirement lives)
  • DoD — Department of Defense

Assess & Plan in 5 Steps#

Step 1: Inventory What You Have#

Before you can be compliant, you need to know what you’re protecting. Spend an hour answering these questions:

Systems & Data:

  • What business systems do you use? (email, accounting software, file servers, CRM, etc.)
  • Which systems touch CUI or sensitive DoD data?
  • Where does sensitive data live? (servers, cloud, desktops, backups?)
  • How often do you back up critical data?

People & Access:

  • How many employees/contractors have access to sensitive data?
  • Who can access servers, file shares, or cloud systems?
  • Do you have a way to remove access when someone leaves?
  • Do people use shared passwords?

Current Security:

  • Do you have antivirus on all machines?
  • Do you have a firewall?
  • Are any systems encrypted?
  • Do you monitor login attempts or unusual activity?
  • Do you have a backup system?

Quick checklist:

  • List all systems that handle sensitive data
  • Map who has access to each system
  • Document current security tools (antivirus, firewall, backups, etc.)
  • Note any recent security incidents or close calls

Output: A one-page “Current State” document listing what you have.

Step 2: Identify Gaps#

Compare what you have to what your target level requires. You don’t need perfection—you need to know where the biggest gaps are.

For Level 1, you need:

  • Multi-user systems with access control (not just shared admin accounts)
  • Antivirus and malware protection on all endpoints
  • Regular backups with documented restoration tests
  • Basic password policies (minimum length, change regularly)
  • A written incident response plan
  • A way to audit who accessed what and when
  • Security awareness training for staff

For Level 2, add:

  • Multi-factor authentication (MFA) for remote access and privileged accounts
  • Encryption of sensitive data in transit and at rest
  • Network segmentation (separate networks for sensitive vs. non-sensitive)
  • Continuous monitoring and log collection
  • Documented change management process
  • Risk assessment and threat analysis

Quick gap analysis:

  • Which Level 1 practices do you already have? (mark ✓)
  • Which are you completely missing? (mark ✗)
  • Which need work but partially exist? (mark ⚠)

Output: A list of controls ranked by “missing” vs. “partial” vs. “done.”

Step 3: Select Controls Strategically#

Not every control is equally hard or expensive. Prioritize by:

  1. Impact on compliance — Controls required by your target level
  2. Implementation effort — Quick wins vs. major projects
  3. Cost — Free/low-cost vs. expensive tools
  4. Team capacity — What can your people actually do?

Priority framework:

Phase 1 (Month 1-2) — Quick Wins & Foundation:

  • Implement a written Access Control Policy
  • Set up MFA for admin/remote accounts (free tools: Authy, Microsoft Authenticator)
  • Enable antivirus on all machines (built-in Windows Defender works for Level 1)
  • Document and test your backup process
  • Create an Incident Response Plan (template exists, customize for your org)

Phase 2 (Month 3-4) — Core Controls:

  • Implement network segmentation (separate VLAN for sensitive data)
  • Set up centralized logging (free option: open-source ELK stack; paid: Splunk, LogicMonitor)
  • Encrypt sensitive data at rest (file-level encryption, database encryption)
  • Formalize change management process
  • Security awareness training for all staff

Phase 3 (Month 5-6+) — Hardening:

  • Implement endpoint detection and response (EDR)
  • Advanced network monitoring
  • Vulnerability scanning and remediation
  • Continuous compliance monitoring

Key insight: You don’t implement everything at once. Start with what makes you compliant, then harden over time.

Step 4: Reality-Check Your Budget#

Be honest about what you can afford and what you’ll do in-house vs. outsource.

Rough cost breakdown for Level 1 (small org, 10-50 people):

CategoryCost RangeOptions
Tools (annual)$2,000-$10,000Firewalls, backups, antivirus, MFA
Consulting (optional)$5,000-$25,000SSP writing, policy development, assessment prep
Assessor (one-time)$5,000-$15,000C3PAO for formal assessment
Staff time (equivalent)3-6 months part-timeYour people doing implementation + documentation
Total$7,000-$50,000+Varies wildly based on starting point

Budget wisely:

  • Spend money on tools if you lack multi-user system infrastructure (network, servers, backups).
  • Spend money on consulting if you’re writing an SSP from scratch and your team has no security experience.
  • Spend money on the assessor only when you’re actually ready (don’t assess early—it costs the same).
  • DIY policy writing, documentation, and evidence gathering if you have 1-2 people who can dedicate time.

Lean approach:

  • Use free/open-source tools where possible (Linux firewalls, Nextcloud for file sharing, OpenVPN for VPN)
  • Partner with an MSP (Managed Service Provider) for ongoing security ($500-$2,000/month)
  • Hire a consultant for 40-80 hours to help structure your SSP, then execute in-house

Step 5: Build a Phased Roadmap#

Don’t try to be fully compliant in 30 days. Instead, commit to a realistic timeline:

Month 1:

  • Assessment complete (what you have, what you lack)
  • SSP started (system description, preliminary control list)
  • Quick wins deployed (MFA, basic antivirus, documented backup process)

Months 2-3:

  • Core controls implemented (access control, logging, basic encryption)
  • Policies written and staff trained
  • SSP updated with control implementations

Months 4-6:

  • Advanced controls deployed (network segmentation, EDR, vulnerability scanning)
  • Evidence gathering and documentation complete
  • Internal audit/review of compliance posture

Month 6+:

  • Formal assessment scheduled with C3PAO
  • Last-minute gap remediation
  • Assessment conducted and certification issued

Key principle: Compliance is a journey, not a sprint. A realistic 6-month timeline beats a rushed 6-week timeline that falls apart.


Building Your SSP Without a Consultant#

What an SSP Is (and Isn’t)#

An SSP is just documented proof that you’re compliant. It’s not:

  • A 500-page defense brief
  • A work of literature requiring perfect prose
  • Something locked in a vault and never updated

It IS:

  • A clear description of your systems and security controls
  • Evidence that you thought about risks and addressed them
  • A living document you update as your systems change
  • What an auditor reads to verify you’re compliant

Your SSP Should Have These Sections#

System Description (1-2 pages) Describe what you’re protecting in plain English:

  • “We have 25 employees. Our main system is a Windows-based file server storing customer data and design files. We use Office 365 for email and Microsoft Teams for communication. We also have a web-facing application running on AWS that customers use to order our products. All systems handle unclassified but sensitive company data.”

Keep it straightforward. An auditor just wants to know what systems exist, not a technical specification.

System Scope & Boundaries (1 page) Define what’s IN and OUT of compliance scope:

  • “IN scope: All employee desktops, the file server, Office 365, and the web app. OUT of scope: Personal devices (we don’t manage them), third-party vendor systems (they’re responsible for their own security).”

This prevents scope creep and makes clear what you’re responsible for.

Organizational Security Policies (3-5 pages or link to policies) Summarize (don’t copy-paste entire policies, but list and briefly describe):

  • Access Control Policy (who can access what)
  • Incident Response Plan (what to do if breached)
  • Change Management Policy (how you update systems safely)
  • Backup and Recovery Policy (how often, where, tested)
  • Security Awareness Training Plan (what staff learn, how often)

Example snippet:

  • “We maintain an Access Control Policy requiring unique user accounts, password complexity (12+ characters, mixed case/numbers/symbols), and MFA for all administrative access and remote connections. Access is reviewed quarterly and removed within 1 day of termination.”

Control Implementation (largest section) For each control required by your level, document:

  • Control ID & Name — e.g., “AC-1: Access Control Policy”
  • Implementation — How you do it (e.g., “We use Windows Active Directory with group policies enforcing password complexity. MFA is enforced via Azure MFA for remote access.”)
  • Evidence — What proof exists (screenshots of settings, audit logs, training records, etc.)

Example for one control:

AC-2: User Access Reviews
Implementation: We review all user accounts and access rights quarterly.
The IT manager exports the user list from Active Directory, sends it to
department heads for verification, documents approvals, and removes
any accounts flagged as invalid.

Evidence:
- Access Review Schedule (documented quarterly review dates)
- Most Recent Access Review (spreadsheet, signed by IT and manager)
- Screenshots of active user accounts
- User termination checklist (shows how we remove access)

Risk Assessment (1-2 pages) Don’t overthink this. Just document that you thought about risks:

AssetThreatImpactLikelihoodMitigation
Customer Data on File ServerRansomwareData loss, business disruptionMediumDaily backups tested weekly; antivirus on all endpoints
Web ApplicationSQL Injection AttackData breach, downtimeMediumInput validation in code; WAF rules; penetration testing annually
Employee CredentialsPhishing emailsUnauthorized accessHighMFA on sensitive systems; security awareness training quarterly

This shows you’ve thought about what could go wrong and how you’re protecting against it.

Evidence & Documentation Plan (1 page) Commit to keeping evidence organized:

  • “We maintain a shared drive with: policies (updated annually), training records (with sign-off sheets), MFA enrollment screenshots, backup test logs (monthly), access review documentation (quarterly), and incident logs (any security events, including near-misses).”

Real Example: SSP for a Fictional Small Business#

TechCorp Consulting, 12 employees, handles grant data for a federal agency.

System Description: “TechCorp has 12 employees. Our main IT assets are: 12 Windows 10 desktops, 1 network file server, 1 printer, Office 365 for email/Teams, and a single cloud-based project management tool. We handle unclassified but sensitive grant data from our client, stored on our file server and in encrypted shared folders. We do NOT have a public-facing web application. All staff have company-issued laptops; we don’t allow personal devices to access company systems.”

Key Policies (summarized):

  • Access Control: IT admin manages user accounts; new hires get standard setup; departed staff are removed within same day. MFA required for anyone accessing grant data remotely.
  • Backups: File server backed up daily, tested monthly with restore.
  • Incident Response: Staff report suspicious activity to IT manager; IT documents and escalates to the client if needed.
  • Security Training: All staff complete annual training; new hires trained in first week.

Sample Control Implementation:

  • SI-2: Flaw Remediation — “We enable Windows Update on all desktops set to auto-update monthly. IT manager reviews security bulletin emails and manually patches critical updates immediately. Patch status is verified monthly.”
  • SC-7: Boundary Protection — “Our network has a basic firewall (Ubiquiti EdgeRouter) blocking inbound traffic to the file server except from our office IP range and one approved VPN connection. Outbound traffic is restricted by category (no P2P, no torrenting).”

See? Simple, clear, honest. An auditor can read this and verify it’s real.


Make It Work With Limited Staff#

Cost-Effective Tools & Strategies#

You probably can’t afford enterprise tools. Here’s what actually works for small orgs:

Control NeedFree/Cheap OptionMid-RangeEnterprise
AntivirusWindows Defender (built-in)Malwarebytes ($40/yr)Crowdstrike ($2,000+/yr)
BackupsWindows File History + external driveBackblaze ($100/yr) or VeeamBackup appliance ($20K+)
FirewallspfSense (free, self-hosted)Ubiquiti EdgeSecure ($500)Fortinet, Palo Alto ($5K+)
VPNOpenVPN (free)Wireguard (free, modern)Enterprise VPN ($3K+)
MFAAuthy, Microsoft Authenticator (free)Duo Security ($3/user/mo)Enterprise MDM ($50K+)
LoggingWindows Event Viewer (free)Splunk Free Tier (500 MB/day)Splunk Enterprise ($5K+/yr)
EncryptionVeraCrypt (free)BitLocker (built-in Win Pro/Enterprise)Full-disk enterprise solutions
Vulnerability ScanningNessus Essentials (free, 16 IPs max)Qualys VMDR ($500+/yr)Full SIEM + SOAR

Recommendation: Start with free/built-in tools. Upgrade to paid only when free options don’t meet compliance needs.

Role-Sharing Patterns for Small Teams#

With 1-2 IT people, you can’t specialize. Here’s a realistic division:

If you have 1 IT person:

  • Security Officer role (30% time) — Policies, compliance, risk assessment
  • Network/Systems role (50% time) — Infrastructure, backups, access control
  • Support role (20% time) — Help desk, user resets, basic troubleshooting

If you have 2 IT people:

  • Person A: Compliance lead (policies, SSP, evidence) + access control
  • Person B: Infrastructure & support (network, backups, MFA setup, user management)
  • Both: Security awareness training, incident response (when needed)

If you have an MSP (outsourced provider):

  • Let them handle infrastructure (monitoring, patching, backups)
  • Keep compliance in-house (you write policy, they implement it)
  • Share incident response responsibilities

Maintenance Basics#

Compliance doesn’t end at certification. Here’s the minimal ongoing work:

Monthly:

  • Review backup logs; test restore from backup once monthly
  • Scan for failed logins or unusual access patterns
  • Patch critical security updates

Quarterly:

  • Access review (are all user accounts still needed?)
  • Policy review (any changes needed?)
  • Security awareness training refresher

Annually:

  • Full risk assessment update
  • SSP review and update (new systems, new threats, policy changes)
  • Formal assessment (every 3 years for Level 1; more frequently for Level 2+)
  • Staff security training (even if they passed last year)

When to Get Outside Help#

Hire a consultant for:

  • Writing your initial SSP (40-80 hours, $100-$200/hour = $4-16K)
  • Policy templates (customize them, don’t start from scratch)
  • First risk assessment
  • Preparing for formal assessment

Don’t hire for:

  • Ongoing policy maintenance (you can do this)
  • Evidence collection (keep a folder, update as you go)
  • Basic tool implementation (YouTube exists)
  • Annual compliance reviews (you’ll learn this year one)

Partner with an MSP for:

  • Patch management and OS updates
  • Backup monitoring and testing
  • Network monitoring and logging
  • Incident response on-call support
  • Vulnerability scanning

Cost: $500-$2,000/month depending on org size and services. Often cheaper than hiring an internal person.


Getting Started This Week#

Three Immediate Actions#

By Wednesday:

  1. Read your DoD contract and identify the CMMC level requirement.
  2. Make a list of all systems that handle sensitive data (systems, backup location, who has access).
  3. Identify 1-2 staff who will own compliance (even if part-time).

By Friday:

  1. Enable MFA on administrator accounts using a free tool (Authy, Microsoft Authenticator).
  2. Document your current backup process (how often, where, tested recently?).
  3. Create a shared folder where you’ll collect evidence (policies, training records, logs, etc.).

By Next Week:

  1. Schedule a 2-hour meeting to walk through the “Assessment” section above and inventory your current state.
  2. Look up 2-3 consultants or MSPs and request quotes for SSP support.
  3. Download a compliance checklist for your target level (search “CMMC Level 1 practices” or “CMMC Level 2 practices”).

Key Takeaways#

  • CMMC is mandatory for DoD work. Read your contract to know which level.
  • Compliance = Policies + Tools + Evidence. You need all three.
  • Start small. Quick wins in month 1, core controls in months 2-4, hardening in months 5+.
  • Use free/cheap tools. Enterprise software is nice but not required for Level 1.
  • Document as you go. Keep a folder of evidence so assessment prep isn’t a nightmare.
  • Maintain it. Compliance is ongoing, not a one-time project.

Glossary of Key Terms#

Assessor / C3PAO — A certified professional who audits your compliance. Required for formal CMMC certification.

CUI (Controlled Unclassified Information) — Unclassified but sensitive information (e.g., grant data, contract details, technical specs) that the DoD protects.

DFARS — The regulation that requires CMMC. Found in your contract if you’re in scope.

Evidence — Proof that you implement a control (screenshots, logs, training records, policies, etc.).

Level 1/2/3 — The three CMMC maturity levels, each requiring more controls and security sophistication.

SSP (System Security Plan) — The document you produce proving you’re compliant. It describes your systems, policies, and how you meet each control.

Control — A security practice or tool required by CMMC (e.g., “use multi-factor authentication,” “encrypt data at rest”).


Resources & Further Help#

Government Sources:

Practical Tools:

Consulting & Assessors:

  • Search “CMMC C3PAO” for certified assessors in your region
  • Look for local consultants specializing in small business compliance
  • Ask your prime contractor for recommended assessors

Training:


Last updated: March 30, 2026