Chapter 7 of 14
Module 7: Level 1 and Level 2 Self-Assessments and Scoring
Explore how to conduct CMMC self-assessments, calculate scores aligned with NIST 800-171, and report results as required under DFARS and CMMC rules.
Step 1 – Where Self-Assessments Fit in Today’s CMMC/DFARS Landscape
Before you can score anything, you need to know which rules apply right now and how they interact.
1.1 Regulatory anchors (as of December 2025)
- DFARS 252.204-7012 (Safeguarding Covered Defense Information)
- Requires implementation of NIST SP 800-171 for systems handling CUI.
- Still in force; applies to most CUI-handling DoD contractors.
- DFARS 252.204-7019 (Notice of NIST SP 800-171 DoD Assessment Requirements)
- Requires contractors to have a NIST SP 800-171 Assessment (Basic/Medium/High) and to post the score in SPRS.
- The Basic assessment is effectively a self-assessment.
- DFARS 252.204-7020 (NIST SP 800-171 DoD Assessment Requirements)
- Governs how DoD conducts Medium and High assessments and how results are shared.
- DFARS 252.204-7021 (CMMC Requirements)
- Establishes CMMC as a condition of contract award.
- DoD has been phasing in CMMC (Phase 1, etc.). In the early deployment, Level 1 and some Level 2 are self-assessments with annual affirmation.
> Key idea: For Level 1, you are essentially doing a CMMC self-assessment of basic cyber hygiene. For Level 2, you are doing a NIST SP 800-171–aligned self-assessment (Basic Assessment methodology) that feeds into SPRS scoring and CMMC expectations.
1.2 What this module focuses on
- CMMC Level 1 self-assessment (protecting FCI)
- CMMC Level 2 self-assessment mapped to NIST SP 800-171 and the DoD Assessment Methodology
- How to:
- Plan and scope the self-assessment (building on Modules 5 and 6)
- Collect evidence for each practice/requirement
- Calculate and interpret scores (esp. NIST 800-171 scoring for Level 2)
- Report scores in SPRS and maintain documentation
- Understand annual affirmation and executive accountability
Keep in mind: CMMC = maturity model + assurance mechanism, but its technical core for Level 2 is NIST SP 800-171 Rev. 2. Your self-assessment must be defensible under both CMMC and DFARS.
Step 2 – Clarifying Level 1 vs. Level 2 Self-Assessments
2.1 CMMC Level 1 – Focus on FCI
- Scope: Systems handling Federal Contract Information (FCI) but not CUI.
- Practices: 17 basic cyber hygiene practices (largely from FAR 52.204-21).
- Assessment type in early CMMC rollout: Annual self-assessment + annual affirmation by senior official.
- No NIST 800-171 scoring; instead, you check implementation of each practice.
2.2 CMMC Level 2 – Focus on CUI (NIST SP 800-171)
- Scope: Systems handling Controlled Unclassified Information (CUI).
- Practices: 110 security requirements from NIST SP 800-171 Rev. 2.
- Early-phase CMMC:
- Some contracts: self-assessment (especially for less critical CUI programs).
- Other contracts: require third-party certification (C3PAO) or government-led assessment.
- Scoring: Uses the NIST SP 800-171 DoD Assessment Methodology (maximum score 110).
- DFARS 252.204-7019 links this score to SPRS.
2.3 Conceptual differences
| Aspect | Level 1 | Level 2 |
|---------------------------|------------------------------------|---------------------------------------------|
| Data type | FCI only | CUI (and often FCI too) |
| Framework | 17 practices (FAR-based) | NIST SP 800-171 (110 requirements) |
| Scoring model | Pass/Fail per practice | Weighted scoring (0 to 110, often negative) |
| Reporting destination | Contract file / internal records | SPRS (via DFARS 7019) |
| Assessment complexity | Low | High (technical & documentation-heavy) |
> Critical insight: Level 2 self-assessments are not just checklists; they are risk-informed, evidence-backed evaluations that must stand up to Medium/High DoD assessments later.
Step 3 – Planning and Scoping Your Self-Assessment
This step connects Module 6 (Scoping and Boundaries) to concrete self-assessment tasks.
3.1 Confirm your assessment boundary
From Module 6, you should already have:
- A documented CMMC assessment boundary (systems, networks, locations).
- An asset inventory categorized as:
- CUI assets (for Level 2)
- Security protection assets (e.g., firewalls, SIEM, identity providers)
- Specialized assets (OT, IoT, test equipment) and how they’re handled
- Out-of-scope assets and justification
For Level 1, your boundary is where FCI is stored, processed, or transmitted.
3.2 Build an assessment plan
At minimum, your plan should specify:
- Objectives
- Level 1: Demonstrate full implementation of 17 practices.
- Level 2: Produce a defensible NIST 800-171 score and POA&M.
- Team and roles
- Technical leads (sysadmins, network engineers)
- Compliance lead (e.g., security manager, ISSO)
- Business owner / program manager
- Legal/Contracts (for DFARS, SPRS submission)
- Schedule
- Time-box each domain (e.g., Access Control, Incident Response).
- Reserve time for evidence collection and internal challenge/peer review.
- Methodology
- Use the CMMC Assessment Guides (Level 1 & Level 2) + NIST 800-171A.
- Decide on tools: GRC platform, spreadsheets, ticketing system for POA&Ms.
3.3 Evidence strategy (high-level)
For each practice/requirement, pre-plan:
- Policy evidence (e.g., written access control policy)
- Process evidence (e.g., onboarding checklist, incident playbooks)
- Technical evidence (e.g., screenshots, config exports, logs)
- Records evidence (e.g., training logs, audit logs, change tickets)
> Edge case: Cloud environments (e.g., Microsoft 365 GCC High, AWS GovCloud) require mapping shared responsibility: what controls the cloud provider implements vs. what you must demonstrate (e.g., identity management, configuration baselines).
Step 4 – Worked Example: Level 1 Self-Assessment for a Small Contractor
Consider a small engineering firm with ~40 employees doing unclassified design work for DoD, handling only FCI (no CUI).
4.1 Identify applicable practices (Level 1)
Level 1 includes 17 practices across domains such as:
- Access Control (AC) – limit information access to authorized users.
- Identification and Authentication (IA) – require unique user IDs.
- Media Protection (MP) – control physical access to systems.
- System and Information Integrity (SI) – update antivirus, patch systems.
4.2 Assess one practice end-to-end
Take the practice analogous to FAR 52.204-21(b)(1) – limit information system access to authorized users.
- Define the practice in your own words:
- Only authorized employees should be able to access systems holding FCI.
- Gather evidence:
- Policy: Written access control policy specifying account approval and revocation.
- Process: HR onboarding/offboarding checklist with IT steps.
- Technical: Screenshot of Active Directory OU structure, sample user access review report.
- Evaluate implementation:
- Are there any shared accounts? If yes, practice is not fully met.
- Are terminated employees promptly disabled? Check last 3 terminations.
- Record result:
- Status: MET / NOT MET.
- Rationale: Short narrative (2–4 sentences) referencing evidence.
- Reviewer: Name, date.
4.3 Edge case: Partial implementation
Suppose all corporate laptops are well-controlled, but an older file server with FCI is accessible via a generic local account used by a small team.
- Under CMMC guidance, partial implementation is treated as NOT MET.
- You must:
- Mark practice as NOT MET.
- Create a remediation task (e.g., eliminate shared account, migrate data).
- Document target date and responsible owner.
> Takeaway: Even for Level 1, the self-assessment must be evidence-based and binary per practice. There is no scoring weight; a single critical NOT MET can be a contract risk if it contradicts your annual affirmation.
Step 5 – NIST SP 800-171 Scoring for Level 2: Mechanics and Nuances
For Level 2, you must understand the NIST SP 800-171 DoD Assessment Methodology, which converts your implementation status into a numeric score.
5.1 Scoring overview
- Maximum score: 110 (all 110 requirements fully implemented).
- Each requirement has a point value (typically 1, 3, or 5 points).
- You start at 110, then subtract points for each requirement that is not fully implemented.
- Some high-value requirements (e.g., multi-factor authentication, incident response) subtract more points.
- The score can be negative (down to –203 in the original methodology, depending on weighting).
5.2 Implementation status categories
For each NIST 800-171 requirement (e.g., 3.1.1, 3.1.2, …):
- Implemented: No points subtracted.
- Not Implemented: Full point value subtracted.
- Alternative but equivalent implementation: Allowed if it meets the security objective; should be documented and justified.
- Planned (POA&M): Still treated as Not Implemented for scoring until complete.
There is no partial credit in the official DoD scoring methodology.
5.3 Example: MFA requirement (IA domain)
Suppose requirement 3.5.3 (implement multi-factor authentication) is worth 5 points.
- If MFA is enforced for all remote and privileged access to CUI systems → no subtraction.
- If MFA is only enforced for VPN but not for cloud email containing CUI → requirement is Not Implemented; subtract 5 points.
5.4 Scoring vs. CMMC expectations
- CMMC Level 2 expects substantive alignment with all 110 requirements.
- In early Phase 1 rollout, DoD may allow POA&Ms for a limited number of requirements, with constraints (e.g., you must meet all high-weight controls, and all POA&Ms must be closed within a defined period).
- Your NIST 800-171 score in SPRS must match your documented reality; overstatement is a False Claims Act risk.
> Key nuance: The score is not a maturity rating; it is a snapshot of implementation gaps. A score of 88 can be acceptable if gaps are well-documented and actively remediated, but lying about a 110 is far worse than honestly reporting 88.
Step 6 – Thought Exercise: Calculating a Mini NIST 800-171 Score
Imagine your organization is assessing only 5 NIST 800-171 requirements (for simplicity). Their point values and implementation status are:
| Requirement | Description (simplified) | Points | Status |
|------------|--------------------------------------------------|--------|------------------|
| 3.1.1 | Limit system access to authorized users | 5 | Implemented |
| 3.1.12 | Monitor and control remote access sessions | 3 | Not Implemented |
| 3.3.1 | Create and retain system audit logs | 5 | Implemented |
| 3.5.3 | Multi-factor authentication | 5 | Partially done |
| 3.13.8 | Implement boundary protection (firewalls, etc.) | 3 | Implemented |
Assume partial implementation = Not Implemented for scoring purposes.
Your task
- Start from 21 points (sum of all points: 5 + 3 + 5 + 5 + 3).
- For each Not Implemented requirement, subtract its full point value.
Questions (answer mentally or in notes):
- What is your final score?
- Which two requirements caused point deductions?
- If you remediate only one of the two gaps, what would the new score be?
---
Check your reasoning
- Missing 3.1.12 (3 points) and 3.5.3 (5 points) → total subtraction = 8 points.
- Final score = 21 – 8 = 13.
- If you remediate MFA (3.5.3) but still lack remote session control (3.1.12):
- New score = 21 – 3 = 18.
> Reflection: Which gap is more critical for your environment? The scoring model is weighted, but your risk analysis should also consider threat landscape, not just points.
Step 7 – Quiz: Mapping NIST 800-171 Scoring to CMMC Expectations
Test your understanding of how NIST SP 800-171 scoring aligns with CMMC Level 2.
Which statement best describes the relationship between NIST SP 800-171 scoring and CMMC Level 2 expectations?
- A high NIST 800-171 score automatically guarantees a CMMC Level 2 certification.
- NIST 800-171 scoring provides a weighted view of implementation gaps, which CMMC Level 2 uses as part of evaluating whether all required practices are effectively implemented.
- CMMC Level 2 ignores NIST 800-171 scores and relies only on qualitative interviews with staff.
Show Answer
Answer: B) NIST 800-171 scoring provides a weighted view of implementation gaps, which CMMC Level 2 uses as part of evaluating whether all required practices are effectively implemented.
Option 2 is correct. CMMC Level 2 is built on NIST SP 800-171 requirements. The DoD Assessment Methodology score reflects how many of those requirements are fully implemented and where gaps remain. A high score supports a positive CMMC outcome but does not automatically guarantee certification; assessors still check evidence, effectiveness, and any POA&Ms. Option 1 is too strong, and option 3 is incorrect because NIST 800-171 scoring is central to Level 2.
Step 8 – Documenting Results: SPRS, POA&Ms, and Evidence Packages
8.1 SPRS reporting (DFARS 252.204-7019)
For Level 2 self-assessments, you must submit your NIST SP 800-171 Assessment score to the Supplier Performance Risk System (SPRS).
Typical data elements include:
- Assessment score (e.g., 88)
- Assessment type (Basic for self-assessment)
- Date of assessment
- CAGE code and system identifier
- Expected date to achieve full implementation (if not at 110)
> Important: The score you submit must be traceable to your internal assessment records and evidence.
8.2 POA&Ms (Plans of Action and Milestones)
For each Not Implemented requirement:
- Define the gap (what is missing and in which systems).
- Specify the corrective action (technical, process, or policy change).
- Assign a responsible owner and target completion date.
- Track status (open, in progress, closed).
CMMC allows limited use of POA&Ms under specific conditions; high-priority controls often cannot be left on POA&M at the time of certification.
8.3 Evidence packages
Create a structured evidence package so that if DoD or a C3PAO conducts a Medium/High or certification assessment later, you can demonstrate consistency:
- Assessment report summarizing methodology, scope, and overall findings.
- Control-by-control workbook (or GRC export) with:
- Status (Implemented / Not Implemented)
- Evidence references (file paths, ticket IDs, URLs)
- Notes on alternative implementations or risk-based decisions.
- Supporting artifacts:
- Policies, procedures, training records
- System diagrams, network topology
- Configuration baselines, screenshots, log excerpts
> Edge case: If you rely on a managed security service provider (MSSP) or cloud provider for some controls, ensure contracts and SLAs are part of your evidence package to show those controls are actually in force.
Step 9 – Annual Affirmation and Senior Leadership Accountability
CMMC’s early-phase rules emphasize annual affirmation by a senior official—this is not a rubber stamp.
9.1 What is annual affirmation?
- A formal statement, typically submitted electronically to DoD, where a senior company official (e.g., CEO, COO, CIO, CISO) attests that:
- The organization has conducted the required self-assessment (Level 1 and/or Level 2 Basic).
- The SPRS score (for Level 2) is accurate and current.
- Any POA&Ms are legitimate, actively managed, and within allowed parameters.
9.2 Legal and ethical implications
- The affirmation is a representation to the U.S. government.
- If it is knowingly false or recklessly indifferent to the truth, it can trigger:
- False Claims Act liability (treble damages, penalties).
- Suspension or debarment from federal contracting.
- Personal liability for executives in extreme cases.
9.3 Best practices for executives before signing
Senior leadership should demand at least:
- Executive-level summary of the self-assessment, including:
- Current NIST 800-171 score (if applicable)
- Major residual risks and open POA&Ms
- Any known non-compliance with DFARS 7012, 7019, 7020, 7021.
- Evidence sampling:
- Ask to see evidence for a few high-impact controls (e.g., MFA, incident response, backups).
- Independent challenge:
- Encourage internal audit, security committees, or external advisors to critically review the self-assessment before affirmation.
> Key insight: The annual affirmation turns your technical assessment into a governance and accountability artifact; it forces alignment between security reality and what leadership tells DoD.
Step 10 – Flashcard Review: Core Terms and Concepts
Use these flashcards to reinforce key terminology related to CMMC self-assessments and scoring.
- CMMC Level 1 Self-Assessment
- An annual, evidence-based review of the 17 basic cyber hygiene practices applicable to systems handling Federal Contract Information (FCI), typically performed internally and affirmed by a senior official.
- CMMC Level 2 Self-Assessment
- A NIST SP 800-171–aligned Basic Assessment covering 110 security requirements for systems handling CUI, resulting in a scored outcome that must be reported to SPRS under DFARS 252.204-7019.
- NIST SP 800-171 DoD Assessment Methodology
- The scoring approach used by DoD to evaluate implementation of NIST SP 800-171 requirements, starting at 110 points and subtracting weighted values for each requirement not fully implemented.
- SPRS (Supplier Performance Risk System)
- The DoD system of record where contractors must submit their NIST SP 800-171 assessment scores and related data, used by acquisition officials to evaluate cyber risk.
- POA&M (Plan of Action and Milestones)
- A documented plan describing how an organization will remediate a specific security gap, including required tasks, responsible parties, and target completion dates.
- Annual Affirmation
- A yearly attestation by a senior company official that required CMMC/DFARS self-assessments have been completed and that reported scores and implementation statuses are accurate.
- Basic / Medium / High Assessment (DFARS 7019/7020)
- Tiers of NIST SP 800-171 assessments: Basic is contractor self-assessment; Medium and High are conducted by the government with increasing rigor and evidence review.
- Assessment Boundary
- The defined set of systems, networks, locations, and assets within which FCI or CUI is processed, stored, or transmitted, and to which CMMC/NIST 800-171 requirements apply.
Step 11 – Capstone Exercise: Designing Your Own Self-Assessment Checklist
Apply what you’ve learned by sketching a mini self-assessment plan.
Your task (do this in writing or a notes app)
- Choose a level:
- If your hypothetical organization handles only FCI, choose Level 1.
- If it handles CUI, choose Level 2.
- Define your scope in 3–5 bullet points:
- Which systems are in scope?
- Which users/roles are in scope?
- Any cloud services or MSSPs involved?
- List 5 practices/requirements you will assess first (e.g., MFA, logging, access control, backups, incident response).
- For each of the 5, answer:
- Evidence: What concrete artifacts will you collect?
- Status scale: How will you label them (e.g., Implemented / Not Implemented)?
- Scoring: If Level 2, what is the point value and how will it affect your score?
- Executive briefing: Write two sentences you would say to your CEO summarizing:
- Your current implementation status (qualitative).
- Why their annual affirmation must align with your findings.
---
If you can complete this exercise with realistic, defensible answers, you are ready to participate in (or lead) a real-world CMMC self-assessment conversation.
Key Terms
- CUI
- Controlled Unclassified Information; unclassified information that requires safeguarding or dissemination controls under law, regulation, or government-wide policy.
- FCI
- Federal Contract Information; information provided by or generated for the government under a contract not intended for public release.
- CMMC
- Cybersecurity Maturity Model Certification, the DoD program that defines cybersecurity requirements and assurance mechanisms for defense contractors.
- SPRS
- Supplier Performance Risk System, the DoD database where contractors submit NIST SP 800-171 assessment scores and related information.
- POA&M
- Plan of Action and Milestones, a formal document that identifies security weaknesses and describes planned remediation steps, responsible parties, and completion dates.
- NIST SP 800-171
- National Institute of Standards and Technology Special Publication 800-171, which defines security requirements for protecting CUI in nonfederal systems and organizations.
- NIST SP 800-171A
- Companion publication to NIST SP 800-171 that provides assessment procedures for evaluating the effectiveness of implemented security requirements.
- Annual Affirmation
- Yearly attestation by a senior company official that required CMMC/DFARS self-assessments have been completed and that reported scores and statuses are accurate.
- DFARS 252.204-7012
- Defense Federal Acquisition Regulation Supplement clause requiring contractors to safeguard covered defense information and report cyber incidents, including implementation of NIST SP 800-171.
- DFARS 252.204-7019
- DFARS clause that requires contractors to have a current NIST SP 800-171 assessment and to report their score to the Supplier Performance Risk System (SPRS).
- DFARS 252.204-7020
- DFARS clause outlining how DoD conducts and uses Medium and High NIST SP 800-171 assessments and how results are shared with contractors.
- DFARS 252.204-7021
- DFARS clause establishing CMMC requirements as a condition for contract award, including the required CMMC level and assessment type.
- Assessment Boundary
- The defined set of systems, networks, locations, and assets within which FCI or CUI is processed, stored, or transmitted, and that are subject to CMMC/NIST 800-171 controls.