Live Threats
[CVE-2026-1234]Windows CLFS Driver zero-day — privilege escalation to SYSTEM, CISA KEV confirmed, patch immediately|
[CVE-2026-0891]Fortinet FortiOS authentication bypass — unauthenticated admin access, active exploitation in the wild|
[CVE-2026-2201]Palo Alto PAN-OS command injection — remote code execution on firewall management plane, CISA KEV listed|
[PATCH]Microsoft April 2026 Patch Tuesday — 147 CVEs addressed including 3 zero-days, deploy immediately|
[BREACH]Healthcare sector breach — 2.3M patient records exposed, PHI including SSNs and medical histories compromised|
[CVE-2026-1887]Chrome V8 type confusion RCE — remote code execution via malicious web page, update Chrome immediately|
[COMPLIANCE]PCI DSS 4.0.1 MFA deadline — mandatory multi-factor authentication enforcement now in effect for all merchants|
[CVE-2026-3310]Cisco IOS XE privilege escalation — authenticated users gain root on affected switches and routers, patch now|
[RANSOMWARE]LockBit 4.0 SMB campaign — RDP brute-force targeting small businesses, double-extortion, 72-hour ransom window|
[ADVISORY]Adobe Acrobat PDF phishing wave — malicious PDFs bypassing email filters, credential harvesting at scale|
[CVE-2026-1234]Windows CLFS Driver zero-day — privilege escalation to SYSTEM, CISA KEV confirmed, patch immediately|
[CVE-2026-0891]Fortinet FortiOS authentication bypass — unauthenticated admin access, active exploitation in the wild|
[CVE-2026-2201]Palo Alto PAN-OS command injection — remote code execution on firewall management plane, CISA KEV listed|
[PATCH]Microsoft April 2026 Patch Tuesday — 147 CVEs addressed including 3 zero-days, deploy immediately|
[BREACH]Healthcare sector breach — 2.3M patient records exposed, PHI including SSNs and medical histories compromised|
[CVE-2026-1887]Chrome V8 type confusion RCE — remote code execution via malicious web page, update Chrome immediately|
[COMPLIANCE]PCI DSS 4.0.1 MFA deadline — mandatory multi-factor authentication enforcement now in effect for all merchants|
[CVE-2026-3310]Cisco IOS XE privilege escalation — authenticated users gain root on affected switches and routers, patch now|
[RANSOMWARE]LockBit 4.0 SMB campaign — RDP brute-force targeting small businesses, double-extortion, 72-hour ransom window|
[ADVISORY]Adobe Acrobat PDF phishing wave — malicious PDFs bypassing email filters, credential harvesting at scale|
View All
DoD Compliance

CMMC
Compliance Services

Achieve Cybersecurity Maturity Model Certification and protect your DoD contracts. Expert CMMC gap assessments, SSP development, and C3PAO assessment readiness for Texas defense contractors.

3
Certification Levels
110
Level 2 Practices
DoD
Contract Requirement
C3PAO
Assessment Ready
The Standard Explained

What Is CMMC?

The Cybersecurity Maturity Model Certification (CMMC) is a Department of Defense framework that verifies cybersecurity practices across the entire Defense Industrial Base (DIB). Unlike previous self-attestation models, CMMC requires independent third-party verification for most contractors.

CMMC is being phased into all DoD contracts through 2025 and beyond. If your business handles Federal Contract Information (FCI) or Controlled Unclassified Information (CUI), you must achieve the appropriate CMMC level to bid on or retain DoD contracts.

CMMC Level 2 — the most common requirement — maps directly to all 110 NIST SP 800-171 requirements, making NIST 800-171 compliance the essential foundation for CMMC certification.

System Security Plan (SSP)

Required documentation describing how each CMMC practice is implemented across your environment and CUI boundary.

Plan of Action & Milestones (POA&M)

Documented roadmap for any practices not yet fully implemented, with realistic timelines and milestones.

C3PAO Assessment Readiness

All documentation, evidence packages, and technical controls prepared to satisfy a Certified Third-Party Assessment Organization.

Continuous Compliance Monitoring

Ongoing monitoring, annual reviews, and SSP maintenance to sustain CMMC compliance between assessments.

Certification Tiers

Three CMMC Levels

Your required CMMC level depends on the type of information your DoD contracts involve.

Level 117 practices

Foundational

Covers: Federal Contract Information (FCI)

Assessment: Annual self-assessment

  • Access control basics
  • Identification & authentication
  • Incident response fundamentals
  • Media protection
  • Physical protection
  • System & communications protection
  • System & information integrity
Level 2110 practices

Advanced

Covers: Controlled Unclassified Information (CUI)

Assessment: Triennial C3PAO assessment

  • All 110 NIST SP 800-171 requirements
  • Access control (22 practices)
  • Audit & accountability (9 practices)
  • Configuration management (9 practices)
  • Identification & authentication (11 practices)
  • Incident response (3 practices)
  • Risk assessment (3 practices)
  • System & communications protection (16 practices)

Most common DoD contract requirement

Full Level 2 Compliance Guide
Level 3134 practices

Expert

Covers: High-value CUI / Advanced Persistent Threats

Assessment: Government-led assessment

  • All NIST SP 800-171 requirements
  • NIST SP 800-172 additions
  • Advanced persistent threat protections
  • Enhanced incident response
  • Supply chain risk management
  • Government-led triennial assessment
The Framework

14 CMMC Practice Domains

CMMC Level 2 covers all 110 NIST SP 800-171 practices organized across these 14 domains. Segler.Net assesses and implements all of them.

22 req.

Access Control

Limit system access to authorized users, processes, and devices acting on behalf of users.

3 req.

Awareness & Training

Ensure personnel are aware of security risks and trained to carry out security responsibilities.

9 req.

Audit & Accountability

Create and retain system audit logs to enable monitoring, analysis, and investigation.

9 req.

Configuration Management

Establish and maintain baseline configurations and inventories of organizational systems.

11 req.

Identification & Authentication

Identify system users and authenticate identities before allowing access to systems.

3 req.

Incident Response

Establish an operational incident-handling capability including preparation and recovery.

6 req.

Maintenance

Perform maintenance on organizational systems and control maintenance tools and personnel.

9 req.

Media Protection

Protect system media containing CUI, both paper and digital, and limit access.

2 req.

Personnel Security

Screen individuals prior to authorizing access and protect CUI during personnel actions.

6 req.

Physical Protection

Limit physical access to organizational systems to authorized individuals.

3 req.

Risk Assessment

Periodically assess risk to operations, assets, and individuals from system operation.

4 req.

Security Assessment

Periodically assess security controls and develop plans of action for identified gaps.

16 req.

System & Communications

Monitor, control, and protect communications at external and key internal boundaries.

7 req.

System & Info Integrity

Identify and correct system flaws, protect from malicious code, and monitor alerts.

How We Work

Our CMMC Compliance Process

A proven, systematic approach to achieving CMMC certification for Texas defense contractors.

01

Gap Assessment

Evaluate all CMMC practices against your current environment and score your baseline posture.

02

SSP Development

Build your System Security Plan documenting CUI boundaries, system components, and control implementations.

03

POA&M Creation

Document all gaps with realistic remediation timelines and prioritized action items.

04

Remediation

Implement technical controls, policies, and procedures to close identified gaps systematically.

05

Assessment Prep

Prepare evidence packages, conduct pre-assessment reviews, and coordinate with your C3PAO.

Foundation Standard

CMMC Level 2 Is Built on NIST SP 800-171

Every one of the 110 CMMC Level 2 practices maps directly to a NIST SP 800-171 requirement. Achieving NIST 800-171 compliance is the essential first step — and the bulk of the work — toward CMMC Level 2 certification.

Segler.Net structures all CMMC engagements with NIST 800-171 as the foundation, ensuring your SSP, POA&M, and evidence packages satisfy both the NIST standard and C3PAO assessment requirements from day one.

Learn About NIST 800-171

110 Shared Requirements

All 110 NIST SP 800-171 requirements are directly incorporated into CMMC Level 2 — no duplication of effort.

Shared Documentation

Your SSP and POA&M serve both NIST 800-171 self-attestation and CMMC C3PAO assessment requirements.

Efficient Path to Certification

Achieving NIST 800-171 compliance first means you're already most of the way to CMMC Level 2 certification.

Beyond Level 2

CMMC Level 3 adds NIST SP 800-172 requirements — Segler.Net can guide you through all three levels.

Common Questions

CMMC FAQ

Straight answers to what Texas defense contractors ask most about CMMC compliance and certification.

Have a CMMC question specific to your DoD contract?

Our San Antonio compliance experts work with Texas defense contractors daily — no obligation to ask.

Ask an Expert

Ready to Achieve CMMC Certification?

Start with a free gap assessment. We'll evaluate your current posture against all CMMC requirements and give you a clear path to certification.

Talk with Us