CMMC 2.0 Level 2 – Plain-English Explainer
This page breaks down the main CMMC Level 2 domains in non-legal, beginner-friendly language. It is meant to be read by business owners, managers, and technical staff who need to understand what the requirements actually mean in day-to-day operations.
For each domain, you will see:
- A simple description of what the domain is about.
- Key practices and how they show up in real environments.
- Concrete examples of evidence you can gather for an assessment.
Plain-English overview
CMMC Level 2 expects you to deliberately limit access to systems and data that handle Controlled Unclassified Information (CUI). That means:
- You know which roles need access to CUI and which do not.
- You grant access based on job duties, not convenience.
- You use technical controls (permissions, groups, VPNs, firewalls) to enforce those decisions.
- You regularly review access to make sure it still makes sense.
Key practices in this domain
- Define CUI access roles and permissions: Make a simple matrix that lists job roles (e.g., Contracts Manager, System Admin, Help Desk) and the CUI systems or data they can access, with a short business reason.
- Enforce least privilege: Users should only see the systems and data required to do their work. For example, a help desk technician might be able to reset passwords but not open contract files with CUI.
- Control remote access: Remote access into the environment that handles CUI should be limited, monitored, and protected with VPN + MFA.
- Control shared and admin access: Limit how many people can use administrator accounts or shared accounts, and record who uses them and when.
What this looks like in real life
- Active Directory groups for “CUI-Readers”, “CUI-Editors”, “CUI-Admins” rather than everyone using generic groups.
- File shares where only specific project teams can see CUI folders, not “Everyone”.
- VPN configured so only approved staff can connect, and only from approved devices.
- Help desk staff following a written procedure before granting new access (ticket, manager approval, etc.).
- Documented access control policy and role-to-system matrix.
- Screenshots of AD groups, file permissions, or role-based access in key apps.
- VPN/MFA configuration screenshots and a list of users allowed remote access.
- Access review records (for example, quarterly review of who can access CUI repositories).
Plain-English overview
For CMMC, asset management focuses on identifying the systems, applications, and locations that store, process, or transmit CUI. Once those are defined, they become in scope for your security controls, patching, and monitoring.
Key practices in this domain
- Inventory in-scope systems: Keep a list of servers, workstations, network gear, cloud services, and SaaS apps that are part of your CUI environment.
- Identify CUI data locations: Document where CUI actually exists: specific folders, databases, apps, and shared mailboxes.
- Track ownership: Assign an “owner” for each critical asset. This person is responsible for security decisions and approvals related to that system.
What this looks like in real life
- A spreadsheet or asset management system listing all CUI-relevant assets with fields like: hostname, IP, role, location, OS, owner, in-scope (yes/no).
- A simple network diagram showing CUI servers, users, VPN, and internet connections.
- Clear identification of which cloud services hold CUI (for example, specific SharePoint sites or Teams channels).
- Asset inventory export with a filter flag for “CUI in-scope”.
- Diagrams or documentation describing where CUI is stored and processed.
- System ownership list showing who is responsible for each CUI system.
Plain-English overview
This domain requires that you turn on logging, store logs safely, and actually review them. The goal is to detect suspicious behavior, support investigations, and prove that your controls are working.
Key practices
- Enable logging on in-scope systems: Servers, endpoints, firewalls, and key apps should log security-relevant events.
- Centralize and protect logs: Forward logs to a central system (SIEM, log collector) and restrict who can modify or delete them.
- Define what to log: Decide which events matter: logons, failed logons, admin actions, permission changes, security alerts, etc.
- Review and respond: Have someone look at alerts or summaries on a routine schedule, and know how to respond when something looks wrong.
What this looks like day-to-day
- Windows and Linux event logs configured to capture logon failures and admin actions.
- Firewall logs sent to a centralized logging or SIEM platform.
- A weekly or daily routine where IT/Security staff review dashboards or email summaries.
- Screenshots of logging configuration on servers, endpoints, and firewalls.
- Sample SIEM dashboards or log search results.
- Documented SOPs for log review and incident triage.
- Tickets or records showing how past alerts were investigated.
Plain-English overview
In practice, this means hardening systems, documenting standard builds, and controlling configuration changes so nothing drifts into an insecure state that could put CUI at risk.
Key practices
- Baseline secure configurations: Decide on a “gold image” or baseline config for servers, workstations, and network devices that handle CUI.
- Change management: Require review/approval for meaningful changes (new software, new firewall rules, major upgrades).
- Track changes: Keep records of what changed, when, why, and who approved it.
Real-world examples
- A standard build document for Windows servers used for CUI applications.
- Change tickets in a helpdesk or ITSM system for firewall modifications.
- Group Policy Objects (GPOs) enforcing hardening settings on domain-joined machines.
- Configuration baseline documents or exported GPO reports.
- Change control tickets or spreadsheets listing recent changes to CUI systems.
- System configuration management tool screenshots (e.g., Intune, RMM, Ansible, etc.).
Plain-English overview
CMMC Level 2 expects strong, well-managed identities for people, services, and (in some cases) devices. You must know who is logging in, and use more than just a password for sensitive access.
Key practices
- Unique user IDs: No shared “generic” accounts for normal user work. Each person has their own login.
- Multi-factor authentication (MFA): Required for remote access, admin accounts, and other high-risk access paths.
- Strong passwords and lockout: Length, complexity, lockout after repeated failures, and password reuse limits.
- Service and device identities: Carefully managed service accounts and device credentials, with restricted use.
Real-world examples
- Azure AD / Entra ID configured to enforce MFA for admins and remote users.
- Password policies set via GPO and enforced in cloud directory.
- Service accounts stored in a password vault with limited admin access.
- Screenshots of MFA enforcement policies.
- Password policy configuration (GPO, MDM, or cloud directory settings).
- List of service accounts with descriptions and owners.
Plain-English overview
CMMC wants you to have a plan, train people on it, test it occasionally, and keep records when incidents actually occur. The focus is on incidents that affect CUI or systems that process CUI.
Key practices
- Written incident response plan: A document explaining roles, contact info, communication plans, and step-by-step activities.
- Clear reporting path: Staff know how to report suspicious events and whom to call after hours.
- Exercises: Tabletop or technical exercises using realistic scenarios (e.g., ransomware in a CUI file share).
- Incident records: Document what happened, when you discovered it, how you responded, and lessons learned.
- Incident response plan document with version history.
- Training or awareness records showing staff were briefed on reporting incidents.
- Tabletop exercise agendas, notes, and action items.
- Incident tickets or reports from actual past incidents.
Plain-English overview
For CUI systems, you should plan maintenance windows, control remote tools used for support, and record what work was done. This prevents “stealth” changes and helps with troubleshooting later.
Key practices
- Scheduled maintenance windows: Regular, predictable times for system updates and upgrades.
- Controlled remote maintenance: Limit who can use remote tools (RDP, remote support tools) and how.
- Maintenance logs: Capture who performed maintenance, what they changed, and whether it was successful.
- Maintenance policy or SOPs.
- Tickets documenting maintenance activities and approvals.
- Configuration of remote support tools showing restricted access.
Plain-English overview
You need rules and controls for how CUI is saved, transported, and destroyed. Without them, a lost laptop or USB drive can become a reportable incident.
Key practices
- Control removable media: Decide when USB drives are allowed, how they are scanned, and how to prevent uncontrolled copying of CUI.
- Protect media with CUI: Encrypt laptops, mobile devices, and external drives that store CUI. Lock them up when not in use.
- Sanitize or destroy media: Use approved wiping or destruction methods (shredding, degaussing, physical destruction) for media that held CUI.
- Written media protection policy.
- Disk encryption configuration screenshots (e.g., BitLocker, FileVault).
- Records of media disposal or certificates from shredding vendors.
Plain-English overview
You must control who can physically reach systems that handle CUI. This includes office doors, server rooms, wiring closets, and workstations that routinely access CUI.
Key practices
- Control facility access: Locks, badge systems, keys, and visitor check-in procedures.
- Escort and log visitors: Keep a visitor log and ensure guests are escorted in sensitive areas.
- Secure workstations and ports: Position screens away from public view, use privacy screens where needed, and secure network ports in public areas.
- Photos or diagrams of physical security controls (locked doors, badge readers).
- Visitor log templates or electronic visitor records.
- Policies or signage about visitor escort and restricted areas.
Plain-English overview
This domain is about screening people who will access CUI, making sure they understand their responsibilities, and quickly removing access when they leave or change roles.
Key practices
- Screen personnel: Use background checks or similar methods allowed by law and contract.
- Manage onboarding and offboarding: New hires get the right access; departing staff have access removed on or before their last day.
- Define responsibilities: Job descriptions include any CUI-handling expectations.
- HR procedures for background checks and onboarding/offboarding checklists.
- Records showing timely account disablement for terminated employees.
- Job descriptions that mention cybersecurity and CUI responsibilities.
Plain-English overview
CMMC expects you to periodically step back and ask: “What could go wrong with our CUI, how bad would it be, and how likely is it?” Then you decide which risks to address and how.
Key practices
- Perform risk assessments: At least annually, list threats, vulnerabilities, and impacts related to CUI systems.
- Consider changes: When you add new systems, move to the cloud, or change processes, revisit your risk picture.
- Track risk treatment actions: Document which risks you are mitigating and how, along with timelines and owners.
- Risk assessment reports or spreadsheets.
- Meeting notes where risk decisions were made.
- A risk register that tracks open risks and mitigation plans.
Plain-English overview
This domain covers internal and external assessments, handling findings, and keeping a Plan of Action and Milestones (POA&M) for gaps that are not yet fully closed.
Key practices
- Assess controls: Perform self-assessments, gap analyses, or third-party reviews to see how you match up to CMMC requirements.
- Remediate findings: Track issues found and make sure someone is responsible for fixing them.
- Maintain a POA&M: Keep a living document listing gaps, planned fixes, owners, and dates.
- Internal CMMC self-assessment results.
- Penetration test or vulnerability assessment reports and remediation tickets.
- Your POA&M document or tracking tool export.
Plain-English overview
Think of SC as network hygiene: segmentation, encryption in transit, secure gateways, and controlled use of remote management protocols.
Key practices
- Segment CUI systems: Place them on dedicated VLANs or network segments so they are not directly exposed to the whole corporate network.
- Encrypt CUI in transit: Use TLS and VPNs to protect CUI whenever it crosses networks, including internal Wi-Fi.
- Protect external connections: Use firewalls, web application security, and secure proxies for internet-facing services.
- Control remote management protocols: Restrict RDP, SSH, and other protocols to trusted admins and secure jump hosts.
- Network diagrams showing segmented CUI networks.
- Firewall rule documentation and screenshots.
- Configuration screenshots for VPN and TLS settings.
Plain-English overview
CMMC expects you to deploy security tools, keep them updated, apply patches, and monitor for unusual or malicious activity that could affect CUI.
Key practices
- Endpoint protection: Use anti-malware or endpoint detection and response (EDR) on CUI systems.
- Patch management: Track and apply OS, application, and firmware patches on a defined schedule.
- Alert monitoring: Configure tools to alert on suspicious events and make sure someone is responsible for reviewing them.
- Integrity monitoring: Detect unauthorized changes to critical files, configurations, or applications.
- Endpoint protection console screenshots and deployment reports.
- Patch management reports showing compliance status for CUI systems.
- Alert notification examples and related incident tickets.