Live Threats
[CVE-2026-1234]Windows CLFS Driver zero-day — privilege escalation to SYSTEM, CISA KEV confirmed, patch immediately|
[CVE-2026-0891]Fortinet FortiOS authentication bypass — unauthenticated admin access, active exploitation in the wild|
[CVE-2026-2201]Palo Alto PAN-OS command injection — remote code execution on firewall management plane, CISA KEV listed|
[PATCH]Microsoft April 2026 Patch Tuesday — 147 CVEs addressed including 3 zero-days, deploy immediately|
[BREACH]Healthcare sector breach — 2.3M patient records exposed, PHI including SSNs and medical histories compromised|
[CVE-2026-1887]Chrome V8 type confusion RCE — remote code execution via malicious web page, update Chrome immediately|
[COMPLIANCE]PCI DSS 4.0.1 MFA deadline — mandatory multi-factor authentication enforcement now in effect for all merchants|
[CVE-2026-3310]Cisco IOS XE privilege escalation — authenticated users gain root on affected switches and routers, patch now|
[RANSOMWARE]LockBit 4.0 SMB campaign — RDP brute-force targeting small businesses, double-extortion, 72-hour ransom window|
[ADVISORY]Adobe Acrobat PDF phishing wave — malicious PDFs bypassing email filters, credential harvesting at scale|
[CVE-2026-1234]Windows CLFS Driver zero-day — privilege escalation to SYSTEM, CISA KEV confirmed, patch immediately|
[CVE-2026-0891]Fortinet FortiOS authentication bypass — unauthenticated admin access, active exploitation in the wild|
[CVE-2026-2201]Palo Alto PAN-OS command injection — remote code execution on firewall management plane, CISA KEV listed|
[PATCH]Microsoft April 2026 Patch Tuesday — 147 CVEs addressed including 3 zero-days, deploy immediately|
[BREACH]Healthcare sector breach — 2.3M patient records exposed, PHI including SSNs and medical histories compromised|
[CVE-2026-1887]Chrome V8 type confusion RCE — remote code execution via malicious web page, update Chrome immediately|
[COMPLIANCE]PCI DSS 4.0.1 MFA deadline — mandatory multi-factor authentication enforcement now in effect for all merchants|
[CVE-2026-3310]Cisco IOS XE privilege escalation — authenticated users gain root on affected switches and routers, patch now|
[RANSOMWARE]LockBit 4.0 SMB campaign — RDP brute-force targeting small businesses, double-extortion, 72-hour ransom window|
[ADVISORY]Adobe Acrobat PDF phishing wave — malicious PDFs bypassing email filters, credential harvesting at scale|
View All
CMMC Level 1
Small Business <100 Users

CMMC Level 1
Foundational Guide

A practical, stage-by-stage roadmap for small businesses under 100 users to achieve CMMC Level 1 (Foundational) compliance — from initial GAP assessment through SPRS self-attestation.

10–12 weekstypical timeline
17 practicesto implement

Compliance Timeline

01
GAP Assessment1–2 weeks
Weeks 1–2
02
System Security Plan (SSP)2–3 weeks
Weeks 2–4
03
POA&M / Corrective Action1–2 weeks (to create)
Weeks 3–5
04
Remediation4–8 weeks
Weeks 4–10
05
Evidence Gathering1–2 weeks
Weeks 9–11
06
Evidence Review & Self-Attestation1 week
Weeks 11–12
Total timeline10–12 weeks
Annual re-attestationRequired
The Standard Explained

What Is CMMC Level 1 (Foundational)?

CMMC Level 1 — officially called Foundational — is the entry-level tier of the Cybersecurity Maturity Model Certification framework. It applies to any DoD contractor or subcontractor that handles Federal Contract Information (FCI).

Level 1 covers 17 security practices across 6 domains — Access Control, Identification & Authentication, Media Protection, Physical Protection, System & Communications Protection, and System & Information Integrity. These are the basic cyber hygiene practices every organization should already have in place.

Unlike Level 2, Level 1 does not require a third-party assessment. You self-assess annually and submit your score to the DoD's Supplier Performance Risk System (SPRS). But the self-assessment must be accurate — false attestation carries serious legal risk.

17
Security Practices
Across 6 domains
FCI
Data Type Covered
Federal Contract Information
Self
Assessment Type
Annual self-attestation
Annual
Re-attestation
SPRS submission required
10–12
Weeks to Comply
For &lt;100 user businesses
Custom
Engagement Pricing
Based on GAP assessment
Stage-by-Stage Roadmap

The 6-Stage Compliance Journey

Every CMMC Level 1 engagement follows these six stages. Click each stage to see exactly what happens, what it costs, and how much of your team's time it requires.

The GAP assessment is your starting point. A qualified assessor evaluates your current security posture against all 17 CMMC Level 1 practices and produces a scored baseline showing exactly where you stand.

What Happens in This Stage

  • Kick-off meeting with key stakeholders (IT, HR, facilities)
  • Inventory of all systems that touch Federal Contract Information (FCI)
  • Review of existing policies, procedures, and technical controls
  • Interviews with IT staff and system administrators
  • Walkthrough of physical facilities where FCI is accessed
  • Scoring of each of the 17 practices (Met / Partially Met / Not Met)
  • Delivery of written GAP report with prioritized findings

Stage Outputs

  • GAP Assessment Report
  • Practice-by-practice scoring
  • Prioritized remediation list

Small Business Reality

For a business under 100 users, this stage typically takes 1–2 weeks. Most of the time is scheduling interviews and reviewing existing documentation — not technical work. Expect 4–8 hours of your team's time.

What We Find Most Often

Most Common Level 1 Gaps

These are the gaps Segler.Net finds most frequently when assessing small businesses for CMMC Level 1. If any of these sound familiar, you likely have work to do.

High

No Multi-Factor Authentication

The single most common gap. Many small businesses still rely on passwords alone. MFA is required for all FCI system access.

IA.1.077
High

Outdated or Missing Antivirus

Endpoint protection that isn't current, isn't deployed on all devices, or isn't actively monitored fails this practice.

SI.1.211
High

No Formal Patch Management

Ad-hoc patching doesn't satisfy this requirement. You need a documented process with defined timelines and tracking.

SI.1.210
Medium

Excessive User Permissions

Users with admin rights they don't need, shared accounts, or no formal access review process are common findings.

AC.1.001
Medium

No Media Sanitization Process

Old laptops, drives, and USB devices disposed of without formal sanitization or destruction documentation.

MP.1.118
Medium

Weak Physical Access Controls

Server rooms without locks, no visitor log, or no formal process for revoking physical access when employees leave.

PE.1.131
High

FCI on Public-Facing Systems

FCI inadvertently accessible on websites, shared drives, or cloud storage without proper access restrictions.

AC.1.004
Medium

Flat Network Architecture

No network segmentation between FCI systems and general business systems or guest networks.

SC.1.176
The Full Requirement Set

All 17 Level 1 Practices

Every practice your business must satisfy for CMMC Level 1 self-attestation. Filter by domain to focus on specific areas.

AC.1.001AC

Limit system access to authorized users

Ensure only authorized individuals, processes, and devices can access your systems and data.

AC.1.002AC

Limit system access to authorized transactions

Control the types of transactions and functions authorized users are permitted to execute.

AC.1.003AC

Verify and control external system connections

Establish rules governing connections to external systems and verify those connections are authorized.

AC.1.004AC

Control public access to information

Control information posted or processed on publicly accessible systems to prevent unauthorized disclosure of FCI.

IA.1.076IA

Identify information system users

Identify all users, processes acting on behalf of users, and devices accessing your systems.

IA.1.077IA

Authenticate users, processes, and devices

Authenticate the identities of users, processes, and devices before allowing access to systems.

MP.1.118MP

Sanitize or destroy media before disposal

Sanitize or destroy information system media containing FCI before disposal or reuse.

PE.1.131PE

Limit physical access to authorized individuals

Limit physical access to organizational systems to authorized individuals.

PE.1.132PE

Escort visitors and monitor visitor activity

Escort visitors and monitor visitor activity in areas containing FCI.

PE.1.133PE

Maintain audit logs of physical access

Maintain audit logs of physical access to facilities where FCI is processed or stored.

PE.1.134PE

Control and manage physical access devices

Control and manage physical access devices such as keys, combinations, and access cards.

SC.1.175SC

Monitor, control, and protect communications

Monitor, control, and protect organizational communications at external boundaries and key internal boundaries.

SC.1.176SC

Implement subnetworks for publicly accessible systems

Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.

SI.1.210SI

Identify, report, and correct information system flaws

Identify, report, and correct information and information system flaws in a timely manner.

SI.1.211SI

Provide protection from malicious code

Provide protection from malicious code at appropriate locations within organizational information systems.

SI.1.212SI

Update malicious code protection mechanisms

Update malicious code protection mechanisms when new releases are available.

SI.1.213SI

Perform periodic scans and real-time scans

Perform periodic scans of the information system and real-time scans of files from external sources.

What Comes Next

Ready to Move to CMMC Level 2?

If your DoD contracts involve Controlled Unclassified Information (CUI), you'll need CMMC Level 2 — which covers all 110 NIST SP 800-171 requirements and requires a third-party C3PAO assessment. Level 1 compliance is the foundation that makes Level 2 achievable.

Level 1 — Foundational17 practices

FCI protection · Annual self-attestation · You are here

You are here
Level 2 — Advanced110 practices

CUI protection · Triennial C3PAO assessment · NIST 800-171

Level 3 — Expert110+ practices

High-value CUI · Government-led assessment · NIST 800-172

Start Your CMMC Level 1 Journey

Get a free GAP assessment. We'll score your current posture against all 17 practices and give you a clear, stage-by-stage remediation plan.

Talk with Us