Article summary:
A CMMC gap analysis identifies missing controls, evidence, and readiness gaps for CMMC Levels 1, 2, and 3 before self-assessment, C3PAO certification, or government review. The process follows three phases: scoping, assessment, and reporting. Scoping defines system boundaries and the required CMMC level. Assessment evaluates required practices and maps them to verifiable evidence. Reporting documents gaps, updates the System Security Plan in Levels 2 and 3, and builds a remediation roadmap through permitted POA&Ms. This approach helps defense contractors prepare efficiently and reduce certification risk.
A CMMC gap analysis shows you what’s missing in your data security before a formal assessment. It focuses your time and effort by showing which controls are in place, which are not, and what needs to happen next to meet DoD contract requirements.
A CMMC gap analysis runs in three phases, including scoping, assessment, and reporting. Your workflow stays the same across levels. Level 1 is lighter and easier to document. Level 2 adds many more controls, evidence, and formal records. Level 3 is rare and builds on Level 2 with DoD-selected enhanced requirements from NIST SP 800-172.
The format is the same whether you’re doing a self-assessment or working with Certified Third-party Assessment Organizations (C3PAOs). You define what’s in scope, rehearse each required control, collect evidence, and detail what’s missing. CMMC Level 1 includes 15 safeguarding requirements from FAR 52.204-21, which are assessed using 17 assessment objectives in the Level 1 self-assessment and SPRS. For CMMC Level 2 compliance, you review 110 NIST SP 800-171 Rev. 2 requirements and map them to real evidence.
The process prepares you to produce key compliance documents, including the System Security Plan (SSP) and the Plan of Action and Milestones (POA&M), and to post assessment results/status in the Supplier Performance Risk System (SPRS). It’s the pre-game warmup to show you're ready to handle controlled data in the arena under Defense Federal Acquisition Regulation Supplement (DFARS) contracts.
CMMC aligns defense suppliers with DoD expectations for protecting data across the Defense Industrial Base (DIB). Two types of data drive scope in the CMMC (Cybersecurity Maturity Model Certification) program: Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).
FCI aligns with Level 1 self-assessment safeguards. CUI drives Level 2 requirements. According to the CMMC Assessment Guide (v2.13, September 2024), the Level 2 certification assessment gives the DoD confidence that you protect CUI at the required risk level, including safeguarding data flows with subcontractors across a multi-tier supply chain.
The following phases provide step-by-step directions for each phase of CMMC gap analysis. Use these phased steps to scope systems, test practices, collect proof, and rank gaps by risk.
Scoping defines what’s in and out for your assessment. The Level 1 scope is usually narrow and simpler to track. For Level 2, you track how your CUI flows through systems and people.
“Start by identifying your CUI system boundaries to help scope the situation and make you more successful in completing any gap assessment or putting controls in place,” says Micah Spieler, Chief Product Officer at Strike Graph. “Data flows across systems fluidly now. Don’t create a blind spot that surfaces during a CMMC audit, or worse, exposes a vulnerability, by assuming data is siloed adequately.”
Spieler notes that seeing how all systems process, store, or transmit CUI takes a bit of data forensics. Most organizations understandably lack the needed level of documentation to account for how all data flows in their systems. He recommends keeping an open mind and following the thread as you outline the full data flow. Watch out for shadow systems — the set-it-and-forget-it systems with information access, or the contractor with access to infrastructure.
You don’t need to lock in every detail on day one, but you do need to agree on what’s in and out of scope and who decides.
Here are the phase one CMMC gap analysis scoping and prep steps:
Phase 2 turns scoping into action. You check required practices, collect proof, and record where things fall short. Level 1 needs basic evidence. Level 2 expects mapped, dated artifacts across users and systems.
Expect to finish this phase with a list of your CMMC gaps and the work needed to resolve them all.
Follow these phase two CMMC Gap Analysis assessment and analysis steps:
Spieler notes that choosing which issues to tackle first is a choice each business makes based on its needs and capabilities. But whichever approach you take, you want to sequence dependencies and pay close attention to how issues stack. Pay attention to dependencies on NIST SP 800-53 control families already in place.
“All of your CMMC action items need to be resolved within a defined timeline. It’s about what resources you have available and how aggressively you can work to resolve the weakness,” he says. “Some weaknesses may be interconnected, so take note if you can tackle multiple issues with one action.”
The final phase turns your findings into actions. Summarize the status of your gap analysis. What’s missing, who owns the fix, and when it gets done. Update your core documents and schedule the work.
For Level 2, you must include a formal remediation plan, an SSP, and documented progress toward full CMMC compliance.
Follow these phase 3 CMMC Gap Analysis reporting and planning steps:
The difference between minimal documentation and evidence that truly satisfies a CMMC assessment is verifiable, repeatable proof mapped to the practice, with timestamps, system context, and an owner.
“Leaders should see a path they can fund, with owners and dates they can hold accountable,” says Spieler. “Your documentation and evidence should be as thorough as possible to prove that a control is operational and in place. It’s better to over-demonstrate control operation than it is to understate it.”
Don’t forget to document along the way. Spieler points out that this is a great habit to ensure you’re ready for future growth as your systems evolve and mature with the CMMC program. “Useful reports are prioritized, specific and actionable, and map to evidence requirements so that it’s easy to get started,” says Spieler. It also helps with future audits, maintaining continuous compliance, and developing a culture of compliance within your teams.
As you move to higher CMMC levels, the number of security requirements grows, and your evidence standards are more substantial. The requirements scale with sensitivity and risk. The framework remains consistent, but the depth of proof, the scope of review, and documentation requirements increase with each certification level.
No matter the complexity, the CMMC framework anchors your approach. Whether you’re a smaller subcontractor or a large prime handling CUI, the right gap analysis depends on knowing what each level demands:
|
Aspect |
CMMC Level 1 |
CMMC Level 2 |
CMMC Level 3 |
|
Scope |
FCI |
CUI |
Select CUI with advanced safeguards |
|
Control requirements |
15 requirements from FAR 52.204-21 |
110 requirements from NIST SP 800-171 |
Selected enhanced requirements from NIST SP 800-172 plus Level 2 |
|
Priorities |
Access control, configs, malware protection, patching |
Identity, logging, incident response, vendor oversight, policy maturity |
Segmentation, threat detection, response, continuous validation |
|
POA&M |
Not permitted |
Allowed with limits: 180-day closeout to move from Conditional to Final |
Allowed with limits: 180-day closeout to move from Conditional to Final |
|
Required documents |
Record self-assessment and affirmation |
SSP and POA&M to manage and close gaps |
SSP and POA&M covering enhanced safeguards |
|
Who assesses |
Annual self-assessment with affirmation |
Triennial self-assessment or C3PAO certification per contract, with annual affirmation |
Government-led (DIBCAC) after Final Level 2 |
Download our CMMC Gap Analysis Templates for all three levels
Use these CMMC gap analysis templates to turn notes into assessment-ready evidence. You get Level 1, Level 2, and Level 3 workbooks, plus examples for each.
Download this CMMC Level 1 gap template with all 15 requirements. You enter the status, evidence, assessment method, and your follow-up notes. Use it to keep scope tight, document simple controls, and produce a clean summary for leadership.
This example, which appears as a tab within the CMMC Level 1 gap analysis template above, is for a small subcontractor we’re calling Summit Precision Fabrication. You can see how each practice is scored, what proof was collected, and how the findings roll into your action plan.
Download the CMMC Level 2 gap template to map 110 requirements to the required evidence. It includes the CMMC and NIST reference numbers, domains, and control requirements, with entries for status, evidence, assessment method and notes.
The two examples, which appear as tabs in the CMMC Level 2 gap analysis template above, show how fictional companies might complete it. Summit Precision Fabrication is the same subcontractor in the Level 1 example, but this time it’s handling CUI and needs Level 2. The second example is Orion Manufacturing, a fictional mid-sized aerospace manufacturer.
Download the CMMC Level 3 gap analysis template to map the additional requirements from NIST SP 800-172 to your evidence. Only a handful of the largest companies need Level 3, but we’re showing it for instructional purposes.
Only a few top companies will need CMMC Level 3 certification. However, we are still showing this example of a CMMC Level 3 gap analysis to explain the types of issues in this level. This example shows a fictional Tier-1 prime contractor supporting a high-value DoD program.
A strong gap analysis is predictable and defensible. You arrange a scope, test against the right standard, collect proof the same way every time, and interpret what you find to fund the work. The key components of CMMC gap analysis keep your teams in sync and your evidence consistent.
Treat the gap analysis as plan building, not paperwork. It shows what works, what is missing, and how much effort is needed to fund the work. It turns requirements into work and frees you to progress with clarity. Here’s a component snapshot:
Spieler points out that you’re probably already implementing many CMMC-aligned practices. Still, some of those protections may need to be formalized into policies or monitoring programs.
“Doing a gap analysis, for any framework, is a perfect place to start your implementation process,” says Spieler. “If you’re coming to InfoSec compliance without much experience, the CMMC requirements can be confusing, and jumping straight in can be overwhelming. Doing a gap analysis can help right-size your investment toward building the right compliance program.”
Typical timelines deviate by level, flow complexity, and whether you run the work internally or with outside help. A disciplined approach will keep the work moving.
Here’s what you can expect based on our experience with planning ranges, along with what to be aware of that can change your timelines:
Internal teams may move faster at the start because they know the systems and the right people. Your timelines slip when you start juggling operations, the evidence sits in someone's inbox, or decisions wait too long for approval. You can expect added coordination time with subcontractors.
“Unless you’re touching CUI, most organizations should start with Level 1. Jumping into Level 2 could require more time and effort than you’re prepared to invest,” says Spieler. “If you over-scope from the beginning, the project is more likely to stall, resulting in wasted investment.”
He emphasizes that this point is especially important to consider when contracting with a C3PAO for a Level 2 assessment. “This is sometimes a good thing to do earlier in the process, so you can align with the auditor on the system boundaries that they plan to certify,” he says. “Partnering with a C3PAO for the CMMC Level 2 certification process too early can be an expensive endeavor and definitely something to avoid.”
The cost of a CMMC gap analysis depends on the level, scope, and who’s doing the work. Your costs can rise when evidence is scattered across owners and systems, when boundaries are unclear, or when third parties are in scope.
The DoD publishes CMMC 2.0 compliance cost estimates derived from averages of assessment and affirmation activities for each assessment phase. Use CMMC program cost estimates to help you set expectations for each level. Then you can estimate your budget for gap analysis and remediation costs for your level:
Spieler says that automation and machine learning can mitigate the cost of your CMMC gap analysis. Strike Graph’s Verify AI is a powerful tool that helps you monitor your evidence collection, so you can feel more confident that you’ve integrated with the right systems or provided the right evidence. It validates hundreds of artifacts in minutes, saving hundreds of hours of validation effort.
“We provide a to-do list for you,” says Spieler. “The pre-mapped controls and evidence requirements are already laid out for Strike Graph customers, making implementing a CMMC program straightforward. Our integrations and automated evidence collection make it easier to get the right data from the right systems and save time on future evidence collection for continuous monitoring.”
Strike Graph’s CMMC customers report up to 42 percent less prep time and 40 percent shorter assessments by embracing automated evidence collection, resulting in more than $8,000 in first-year savings and $26,000 in year two.
If you handle FCI or CUI for a DoD contract, you need a CMMC gap analysis. And that applies to prime contractors and subcontractors that touch the data at any point in the supply chain. The requirements flow to every entity in your delivery chain.
You initiate a gap analysis when you bid, renew, change scope, or introduce new systems or third parties that affect where FCI or CUI lives. Doing so reduces your CMMC assessment risk and aligns spending to evidence you can produce on request.
Most CMMC gap analysis challenges come from scope confusion, scattered evidence, unclear ownership, vendor blind spots, and poor time estimates. Identify common obstacles early so your analysis moves faster, and your gap fixes align with budgets and contract timelines.
When you begin your CMMC gap analysis, it’s vital to turn findings into evidence — and Strike Graph’s compliance automation platform makes that easier. The platform combines a guided self-assessment, AI-driven validation, and automatic reporting so you can move quickly from identifying gaps to demonstrating compliance.
You start with Strike Graph’s interactive CMMC self-assessment, aligned with NIST SP 800-171 and CMMC 2.0. In minutes, you’ll see where you stand and can generate a System Security Plan (SSP), a Plan of Action and Milestones (POA&M), and an SPRS-ready package.
As you close gaps, Verify AI automatically validates evidence, confirming your controls are well-documented and operating as intended. The result is continuous readiness — lower manual effort, fewer surprises at assessment time, and a well-defined path from your initial gap analysis to sustained CMMC compliance.
Is a CMMC gap analysis different from other gap analyses?
A CMMC gap analysis maps your environment to DoD-specific requirements tied to FCI and CUI. It focuses on level selection, system boundaries, evidence depth, and flow-down to subcontractors and service providers. Other frameworks use different control sets and evidence rules.
Is a CMMC gap analysis the same as a CMMC gap assessment?
You’ll see the terms used interchangeably, though there is a practical line. The CMMC gap analysis is the diagnostic. You map controls, check evidence, and list gaps. The gap assessment is a structured test. You sample records, verify execution, and confirm effectiveness over time.
Is a CMMC gap analysis the same as a CMMC readiness assessment?
No. A readiness assessment is a dress rehearsal for the review. It resembles the reviewer’s approach with interviews, evidence sampling, and issue logging. A gap analysis builds the inventory of gaps and high-value fixes that the readiness assessment will later test.
How is a CMMC gap analysis different from a Plan of Action and Milestones (POA&M)?
A CMMC gap analysis identifies where controls and evidence fall short. A POA&M manages the fixes. It lists each gap with tasks, owners, resources, and due dates, then tracks status to closure. One finds the work, and the other runs it. You use the POA&M to budget, sequence quick wins, and stage longer changes such as segmentation and logging coverage.