Understanding the CMMC Assessment Process (CAP): An OSC's Guide
- Jeffrey Crump

- Jul 21
- 7 min read
The Cyber AB has released version 2.0 of the Cybersecurity Maturity Model Certification (CMMC) Assessment Process, and it's a game-changer for defense contractors. This comprehensive guide outlines exactly how organizations will be evaluated for their cybersecurity maturity—and what it means for your Defense Industrial Base (DIB) business.

What is CMMC Assessment Process and Why Should You Care?
The CMMC program is the DoD's systematic approach to ensuring that companies handling sensitive government information have robust cybersecurity protections in place. Specifically, it's designed to safeguard Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) that flows through defense contracts.
It's important to understand that CMMC isn't a single document—it's an ecosystem of interconnected requirements and guidance. The official doctrine comes from multiple authoritative sources: the Code of Federal Regulations (CFR), DoD publications, and NIST standards within the Department of Commerce. The actual CMMC Level 2 security requirements are codified in NIST Special Publication 800-171, Revision 2 (NIST SP 800-171 R2), "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations."
The CMMC Assessment Process (CAP) document we're discussing here is specifically the procedural guide for Third-Party Assessment Organizations (C3PAOs) conducting assessments. Published and maintained by The Cyber AB (and approved by the CMMC Program Management Office), the CAP ensures consistency and integrity across all CMMC Level 2 certification assessments. This isn't just guidance—adherence to the CAP is mandatory for C3PAOs and their certified assessors.
Think of it as a cybersecurity report card that determines whether your organization can continue doing business with the Department of Defense. No passing grade? No contracts.
The Assessment Journey: Preliminary Proceedings Plus Four Phases
Before the formal assessment even begins, there are critical preliminary proceedings that set the foundation for everything that follows. Then comes the four-phase assessment process itself.
Preliminary Proceedings: Setting the Stage
Before any formal assessment activities begin, several crucial administrative and contractual steps must be completed:
Entity Confirmation: The C3PAO must confirm exactly which legal entity is being assessed and obtain your CAGE code(s). This might seem basic, but it's essential—no CAGE code means no assessment can proceed.
Assessment Framing: You'll work with the C3PAO to determine the scope, schedule, logistics, and personnel requirements. This includes identifying whether certain security requirements can be assessed virtually or require on-site visits (18 specific requirements typically need in-person assessment).
Conflict of Interest Management: The C3PAO must identify and manage any conflicts of interest, including proposing specific assessors and getting your approval. This ensures impartiality throughout the process.
Contractual Agreement: A formal contract must be executed, including non-disclosure agreements. Importantly, C3PAOs are prohibited from guaranteeing assessment outcomes or offering bonuses tied to certification success.
These preliminary steps are where many organizations stumble—rushing through them can derail the entire assessment process.
The Four Core Assessment Phases
After the preliminary proceedings are complete, the formal assessment process begins with four distinct phases:
Phase 1: Conduct the Pre-Assessment
This phase is all about readiness, and it's more comprehensive than many organizations realize. The Lead CCA will supervise all Phase 1 activities, starting with a thorough review of your System Security Plan (SSP) for completeness, accuracy, and consistency. They're not evaluating implementation adequacy yet—just ensuring you've properly addressed all NIST SP 800-171 R2 security requirements on paper.
The assessment scope validation is critical here. Any disagreements about what's in or out of scope must be resolved before moving to Phase 2. If you have External Service Providers (ESPs) in scope, the assessment team will confirm that Customer Responsibility Matrices are available and that ESP personnel will participate in the assessment. For ESPs handling CUI, you'll need to provide evidence of their FedRAMP Moderate Authorization, equivalency, or their own CMMC Level 2 certificate.
Dig Deeper: Federal Risk and Authorization Management Program Moderate Equivalency for Cloud Service Provider's Cloud Service Offerings: FedRAMP Moderate Equivalency explained by DoD via memorandum dated December 21, 2023 and cleared for release on January 2, 2024. This memo applies to DoD contractors who use such CSOs to store, process, or transmit covered defense information. The memo is not intended to confer Moderate Authorization to CSOs nor does it apply to CSOs that have FedRAMP Moderate Authorization under the existing process.
The Lead CCA makes the final determination on assessment readiness based on evidence availability, personnel accessibility, and overall preparation confidence. If you're not ready, the assessment stops here—and importantly, the C3PAO cannot provide remedial advice on how to improve without creating a conflict of interest that would prevent them from resuming your assessment later.
Phase 1 concludes when the Pre-Assessment Form is successfully uploaded to CMMC eMASS, which includes your CAGE codes, SSP details, assessment team information, and the readiness determination.
Phase 2: Assess Conformity to Security Requirements
Here's where the rubber meets the road, and it's far more rigorous than a typical compliance audit. The process begins with an In-Brief Meeting where the Lead CCA establishes common understanding of objectives, procedures, roles, and schedules. Detailed minutes must be documented and retained.
Assessment teams will evaluate your implementation using the three prescribed NIST methods: examine (reviewing documentation and configurations), interview (questioning personnel), and test (validating functionality). They'll apply "focused" sampling values for both depth and coverage—meaning they dig deep into representative samples rather than superficially checking everything.
The assessment can be conducted virtually, in-person, or hybrid, but 18 specific security requirements typically require on-site evaluation (including physical access controls, media storage, visitor escorts, and collaborative computing device indicators). When questionable evidence is encountered, sampling increases to get a clearer picture.
For organizations with multiple CAGE codes or physical locations, the assessment team ensures all entities and sites are properly represented in their sampling approach. External Service Providers must demonstrate credible "ownership" of their assigned security requirements through interviews, and their Customer Responsibility Matrix claims are tested through examine and test methods.
Cloud Service Provider evaluations involve verifying FedRAMP Moderate authorization through the official FedRAMP Marketplace, or for non-FedRAMP CSPs, reviewing equivalency documentation for completeness, integrity, and currency—though not evaluating the technical adequacy of the evidence itself.
Throughout Phase 2, quality assurance individuals (who aren't part of the assessment team) conduct ongoing reviews, and daily checkpoint meetings summarize progress and coordinate next steps.
Phase 3: Complete and Report Assessment Results
After all evaluative activities conclude, the compilation phase begins. Assessment teams have up to ten business days after the active assessment period to re-evaluate any "NOT MET" security requirements, giving organizations a brief window to address immediate issues.
The Lead CCA determines the overall outcome: if all requirements are MET, they recommend a Final Certificate. If requirements are MET except for those documented in a valid Plan of Action & Milestones (POA&M) per 32 CFR §170.21, they recommend a Conditional Certificate. If requirements remain NOT MET without valid POA&M coverage, no certificate is recommended.
Before sharing results with the organization, a formal quality assurance review is conducted by a CCA who wasn't part of the assessment team and had no interaction with the team during the assessment process.
The Out-Brief Meeting presents results through a standardized Assessment Results Briefing that includes assessment dates, entity information, final determinations for each security requirement, POA&M status, and certificate determination. Critically, this briefing cannot contain any remedial advice or suggestions—that would violate the assessment organization's impartiality requirements.
Organizations must hash all assessment artifacts using NIST-approved algorithms and retain them for six years from the CMMC Status Date. The hash values and algorithm information are uploaded to CMMC eMASS along with the assessment results.
If organizations disagree with findings, there's a formal appeals process—first with the C3PAO, then potentially with The Cyber AB. All appeals must be managed by quality assurance individuals who weren't involved in the original assessment.
Phase 4: Issue Certificate and Close Out POA&M
Certificate generation uses standardized templates provided by The Cyber AB and must include specific required information: OSC legal name, all associated CAGE codes, system description, unique identifier from CMMC eMASS, assessment dates, CMMC Status Date, conformity statement, and proper logos and authorization badges.
Only an Authorized Certifying Official registered with The Cyber AB can sign certificates. The signed certificate is delivered to the Affirming Official and OSC Point of Contact, uploaded to CMMC eMASS, and a copy sent to The Cyber AB.
For organizations receiving Conditional Certificates, POA&M closeout can be handled by the same C3PAO or a different one. The POA&M closeout C3PAO assumes responsibility for the final status determination and, if successful, issues the Final Certificate.
POA&M closeout includes its own conflict of interest review, quality assurance processes, and potential appeals procedures. Organizations can request an Out-Brief Meeting for POA&M results, though it's not required—but written communication of results and next steps is mandatory.
The entire assessment process formally concludes when the Final Certificate is issued and uploaded to CMMC eMASS, completing the organization's journey from assessment request to certified status.
Key Changes and Important Details
Strict Evidence Requirements: Organizations must now hash and retain assessment artifacts for six years using NIST-approved algorithms. This ensures the integrity of evidence used during your assessment.
Enhanced Quality Assurance: Every phase includes mandatory quality assurance reviews conducted by certified assessors who weren't part of your assessment team. This adds an extra layer of verification to the process.
Appeals Process: Don't agree with your assessment results? There's now a formal appeals process, first with your C3PAO and then with The Cyber AB if needed.
External Service Provider Focus: The process includes detailed procedures for assessing External Service Providers (ESPs) and Cloud Service Providers (CSPs), recognizing that modern IT environments often rely on third-party services.
What This Means for Your Organization
Don't Underestimate the Preliminary Phase: Many organizations focus solely on technical compliance but stumble during preliminary proceedings. Make sure you have clear entity identification, understand your CAGE codes, and can articulate your assessment scope clearly.
Contract Negotiations Matter: The preliminary proceedings include contract execution. Don't rush this—ensure you understand the terms, timeline, and what's expected from both parties.
Scope Definition is Critical: The preliminary proceedings establish your CMMC Assessment Scope. Getting this wrong early can derail everything that follows. Work closely with your C3PAO to ensure proper scoping per 32 CFR §170.19(c).
Start Early: The assessment process is thorough and detailed, beginning well before the formal evaluation phases. Organizations should begin preparing for preliminary proceedings months in advance of their target assessment date.
Documentation is Critical: Your System Security Plan needs to be complete, accurate, and consistent. Assessors will scrutinize it carefully in Phase 1.
No Shortcuts: The "focused" sampling approach means assessors will dig deep into your implementations. Surface-level compliance won't cut it.
Third-Party Relationships Matter: If you use external service providers or cloud services, make sure you understand their security posture and have proper documentation of shared responsibilities.
Looking Forward
The CMMC Assessment Process v2.0 represents a maturation of the program, with clearer procedures and more rigorous oversight. While this might seem daunting, it also provides predictability—organizations now know exactly what to expect during their assessment.
The key to success lies in treating CMMC not as a compliance checkbox, but as a comprehensive cybersecurity improvement initiative. Organizations that invest in genuine security improvements, rather than just meeting minimum requirements, will find themselves better positioned not only for CMMC success but for overall cyber resilience.
As the defense industrial base continues to face evolving cyber threats, CMMC serves as both a shield and a standard—protecting sensitive information while raising the security bar for all participants in the defense ecosystem.

