Design a security program that builds trust, scales with your business, mitigates risk, and empowers your team to work efficiently.
Cybersecurity is evolving — Strike Graph is leading the way.
Check out our newest resources.
Find answers to all your questions about security, compliance, and certification.
Find out why Strike Graph is the right choice for your organization. What can you expect?
Find out why Strike Graph is the right choice for your organization. What can you expect?
.png)
A CMMC Plan of Action and Milestones (POA&M) is a document that shows which non-critical CMMC requirements an organization has not yet met. It lists security gaps, outlines steps to resolve them, and monitors progress until the company closes all items and reaches full compliance.
POA&Ms are common throughout compliance frameworks, whether it’s SOC 2, ISO 27001, or CMMC. For CMMC, the POA&M plays a specific role: it lets contractors receive “Conditional CMMC Status” so they can continue bidding on DoD contracts while addressing non-critical gaps identified in a formal assessment.
Instead of completing a full, resource-intensive reassessment immediately, an organization can document the gaps, outline corrective actions, perform interim risk mitigation, and move toward “Final CMMC Status” within an approved timeframe. The process helps the DoD keep more contractors eligible while ensuring organizations actively close deficiencies.
Alongside a System Security Plan (SSP), a POA&M is a key document that helps organizations not only track compliance but also drive continuous improvement in their cybersecurity program.
For Scott Lumpkin, Director at Quantum AI Security, a POA&M is “more than a compliance artifact, it is a structured risk management instrument. Within the context of CMMC Level 2 and NIST SP 800-171, it provides traceability between known deficiencies, planned remediations, and accountable ownership.”
Lumpkin adds: “There are very strong reasons to maintain a POA&M even when it’s not required for compliance. Any organization aligning with NIST SP 800-53, ISO 27001, or the NIST Risk Management Framework can use a POA&M to track weaknesses methodically. It establishes accountability and preserves institutional knowledge, which is something that tickets or spreadsheets cannot maintain over time.”
Article Summary:
A CMMC Plan of Action and Milestones (POA&M) helps defense contractors document, prioritize, and remediate cybersecurity gaps identified in an assessment. This guide explains how POA&Ms enable conditional CMMC status under CMMC 2.0, outlines required elements, and shares expert practices for tracking remediation effectively. It includes a free POA&M template and starter kit to streamline compliance.
Under CMMC 2.0, companies that meet at least 80% of requirements can use a POA&M to earn Conditional CMMC Status and gain Final CMMC Status by fixing issues within 180 days. CMMC 1.0 required 100% compliance immediately and did not allow POA&Ms.
The DoD developed the CMMC framework to enforce cybersecurity standards originally established under FISMA, the Federal Information Security Management Act. In the first iteration of CMMC, companies had to meet every security control to earn certification, no matter their compliance level.
In 2024, the DoD first published the final rule for CMMC 2.0, introducing several updates to the CMMC framework. Among the changes, the DoD introduced POA&Ms and the Conditional CMMC Status option. To qualify for conditional status using a POA&M, an organization must score at least 80% on a CMMC assessment, meet all “critical controls,” and outline the way they will resolve their remaining issues with a POA&M. This option is available only for organizations seeking CMMC Level 2 or CMMC Level 3 certification.
Here are more details about how POA&Ms and conditional status work in CMMC 2.0:
“Some NIST controls are too critical to include in a POA&M, and the DoD requires that you meet these controls at the time of the assessment,” says Elliott Harnagel, Product and Compliance Strategist at Strike Graph. “The one-point controls are usually minor and exactly the kind of small, fixable issues the POA&M process is meant to cover.”Each CMMC POA&M should list the specific control, describe the issue, and explain how to fix it. It must also include the priority level, timeline, budget, and the person or team responsible for completing the corrective action.
Here's a summary of the key elements of a CMMC POA&M, straight from the National Institute of Standards and Technology (NIST), which defines the security requirements for CMMC:
Beyond these essential data fields, Lumpkin recommends that organizations add the following data to make it fully functional for CMMC management:
How to create a CMMC POA&M
Follow key steps to create an effective CMMC POA&M. Identify and categorize each issue, assign responsibility, estimate resources, and set milestones. Track progress regularly, update statuses as you go, and close items only after they’re fully fixed. Document each critical step in your POA&M template.
Here’s a breakdown of the key steps Lumpkin and Harnagel recommend for creating an effective POA&M. Each step corresponds to a column in the POA&M template to help you plan, assign, and verify remediation activities in order.
Download our free CMMC POA&M template to organize and track your remediation work. It includes every NIST-required field, along with expert-recommended details to make your POA&M more effective and audit-ready.
Our expert-vetted POA&M template includes a dedicated row for each security control under remediation, with key fields for budget, milestones, current status, and more. Field descriptions help teams document consistently and meet NIST reporting expectations.

Download your free POA&M template now to streamline your process, meet CMMC documentation requirements, and track your cybersecurity remediation over time.
A complete CMMC POA&M lists each NIST security gap that needs remediation, along with details on budget, timeline, and responsible personnel. Each row corresponds to a security control under remediation. Our template includes filled-out examples to show how a finished POA&M should look.
Download our free POA&M template to see complete examples for various NIST security controls, including technical, administrative, and operational controls.
Our free CMMC POA&M Starter Kit has all the resources you need in a single place. It includes a fillable POA&M template, a cheat sheet, and a best-practice guide. It gives you everything you need to create an effective plan of action, meet compliance requirements, and support continuous monitoring and compliance..png?width=697&height=374&name=Starter%20Kit%20for%20CMMC%20Plan%20of%20Action%20%26%20Milestones%20(2).png)
Download your free CMMC POA&M Starter Kit to put expert guidance and proven tools into action for your next remediation plan.
Keep your POA&M in a secure location, record every update, and use consistent evidence to demonstrate progress and fixes. Keep your notes clear and concise, and review the document often. These habits help keep your POA&M audit-ready and support strong cybersecurity across your organization.
Here's a list of best practices from cybersecurity experts Lumpkin and Harnagel that will help you get the most out of your POA&M and prepare for a CMMC audit:
Strike Graph’s all-in-one compliance platform helps you manage every part of CMMC in one place. You can outline controls, collect evidence, and track POA&Ms and remediation work seamlessly. Its AI-powered tools connect controls, evidence, and tasks to reduce manual effort, speed up compliance, and strengthen cybersecurity.
Sign up for your free 60-day access to Strike Graph and start your CMMC POA&M journey today.
Strike Graph’s compliance software helps you manage every aspect of your CMMC process in a single, integrated dashboard. You can outline controls, collect evidence, and track POA&Ms through built-in workflows that make compliance faster, clearer, and easier to maintain. Its AI-powered tools automatically connect controls, evidence, and remediation tasks, reducing manual work and helping your team stay audit-ready. Every item links directly to the relevant NIST requirement, giving you a complete view of what is compliant, what needs work, and who is responsible.
Because every compliance program is unique, Strike Graph lets you customize your environment and reuse evidence across controls or frameworks, so your documentation process stays efficient and consistent.
Schedule a demo today to see how Strike Graph can help you move through CMMC compliance with clarity and confidence.
When are POA&Ms allowed in CMMC?
Organizations seeking CMMC Level 2 or CMMC Level 3 compliance can use a POA&M to receive conditional status for 180 days. To qualify, they must score at least 80% on the assessment and meet all critical controls that the DoD requires.
Which CMMC controls cannot be put in a POA&M?
At Level 2, organizations cannot include controls worth more than one point, or any requirement tied to protecting Controlled Unclassified Information (CUI), in a POA&M. At Level 3, the DoD specifies seven controls that must be met at assessment.
Here's more about the CMMC controls that the DoD does not allow in a POA&M:
Level 2 :
AC.L2-3.1.20 External Connections (CUI Data).
AC.L2-3.1.22 Control Public Information (CUI Data).
CA.L2-3.12.4 System Security Plan.
PE.L2-3.10.3 Escort Visitors (CUI Data).
PE.L2-3.10.4 Physical Access Logs (CUI Data).
PE.L2-3.10.5 Manage Physical Access (CUI Data).
Level 3:
Under the final rule (32 CFR Part 170), Level 3 includes 24 selected NIST SP 800-172 requirements and seven that cannot be placed on a POA&M:
IR.L3-3.6.1e Security Operations Center.
IR.L3-3.6.2e Cyber Incident Response Team.
RA.L3-3.11.1e Threat-Informed Risk Assessment.
RA.L3-3.11.6e Supply Chain Risk Response.
RA.L3-3.11.7e Supply Chain Risk Plan.
RA.L3-3.11.4e Security Solution Rationale.
SI.L3-3.14.3e Specialized Asset Security.
How does a POA&M relate to a System Security Plan (SSP) for CMMC compliance?
The System Security Plan (SSP) explains how a company implements required security controls and is assessed and required at Level 2. For Level 1, there are no explicit documentation requirements for the self-assessment. A POA&M complements the SSP by detailing how the company will remediate security gaps and achieve Final CMMC Status.
Who is responsible for the CMMC POA&M?
The organization seeking CMMC compliance is usually responsible for drafting and maintaining the POA&M. Usually, the internal security staff drafts the POA&M, and external leaders approve. For Level 2 (Self), no C3PAO approval step applies; for Level 2 (C3PAO) and Level 3, assessors review POA&M items as part of the assessment process.
How are POA&Ms closed out?
A company closes out a POA&M after it remediates all issues and an assessor verifies the POA&M in a closeout certification assessment. The DoD then grants full CMMC certification. Organizations have 180 days from the date of conditional status to close out the POA&M.
What are the consequences of failing to close out a POA&M on time?
If a company fails to close out a POA&M within 180 days, the DoD expires the organization’s conditional status. It must restart the process and undergo a full assessment to regain status.
How often should a POA&M be updated?
A company should update its POA&M whenever it identifies new security gaps or changes its remediation plan. Regularly updating your POA&M demonstrates your company's commitment to continuous monitoring.
How do we ensure our POA&M is effective?
Make your POA&M effective by following key best practices. Prioritize important issues, set realistic budgets, and gain leadership support. Treat the POA&M as a key cybersecurity document, not just a checklist for compliance.
Why are CMMC POA&Ms important for DoD contractors?
CMMC POA&Ms allow contractors to bid on DoD contracts while they fix security gaps. Without POA&Ms, contractors must meet every requirement immediately or restart the process. POA&Ms also help contractors track issues and stay committed to long-term compliance.
How does CISA relate to CMMC POA&Ms?
CISA is a federal agency that helps public and private groups prevent and respond to cyberattacks. CISA isn’t directly related to CMMC, but both use POA&Ms to track and improve cybersecurity.
How do SOC 2 and SSAE-16/SSAE-18 relate to POA&Ms?
SSAE-16 (superseded by SSAE-18) is the auditing standard behind SOC 1 and SOC 2 reports. While those frameworks don’t require a formal POA&M, many organizations use a similar plan-of-action format to track remediation of control deficiencies discovered during SOC readiness or audit reviews.
What’s next for CMMC—and how will POA&Ms factor into future updates?
POA&Ms are now a permanent part of CMMC 2.0, giving contractors limited time to close out cybersecurity gaps after an assessment. As the Department of Defense refines the framework, contractors can expect POA&Ms to remain central to demonstrating ongoing risk management and continuous improvement.
To understand how these changes fit into the broader federal security landscape, listen to former National Risk Management Center Director Bob Kolasky on Strike Graph’s Secure Talk podcast: The Future of CMMC: Surviving the New Federal Security Landscape.
Kolasky discusses how CMMC 2.0 aligns with government-wide cybersecurity initiatives, why POA&Ms are a practical bridge between compliance and risk management, and what defense contractors can do now to prepare for evolving requirements.
The security landscape is ever changing. Sign up for our newsletter to make sure you stay abreast of the latest regulations and requirements.
Strike Graph offers an easy, flexible security compliance solution that scales efficiently with your business needs — from SOC 2 to ISO 27001 to GDPR and beyond.
© 2026 Strike Graph, Inc. All Rights Reserved • Privacy Policy • Terms of Service • EU AI Act
Fill out a simple form and our team will be in touch.
Experience a live customized demo, get answers to your specific questions , and find out why Strike Graph is the right choice for your organization.
What to expect:
We look forward to helping you with your compliance needs!
Fill out a simple form and our team will be in touch.
Experience a live customized demo, get answers to your specific questions , and find out why Strike Graph is the right choice for your organization.
What to expect:
We look forward to helping you with your compliance needs!