CMMC Certification Process: Step-by-Step Guide for MSPs

This blog is created to provide MSPs with a quick step-by-step guide to the full CMMC certification process – from preparing to apply, selecting the right auditor (C3PAO), to timelines and expectations.
Other blogs in this series:
- Who to Hire, Who to Train, and Who to Engage: CMMC Consultant Guide for MSPs
- Do You Need CMMC? A Decision Making Guide for MSPs
Step 1. Determine the Required CMMC Level
- Level 1: If your clients handle only Federal Contract Information (FCI).
- Level 2: If your clients handle Controlled Unclassified Information (CUI).
Tip: If unsure, ask clients to share their DoD contract requirements or refer to the DFARS 252.204-7012 clause.
Step 2. Perform a Readiness Self-Assessment
- Complete a Level 1 or Level 2 readiness checklist.
- Use a Plan of Action & Milestones (POA&M) to identify and track gaps.
Pro Tip: You can’t certify with an active POA&M — unresolved gaps may delay your approval.
CMMC Readiness Self-Assessment for MSPs |
Use this tailored checklist to evaluate your readiness for CMMC Level 1 and Level 2 compliance. Score each item 0 (Not started), 1 (In progress), or 2 (Complete).
Level 1: Foundational Cyber Hygiene☐ Limit access to authorized users and devices. (Score: ___) ☐ Protect against malware and malicious code. (Score: ___) ☐ Update software and apply security patches. (Score: ___) ☐ Perform regular backups and test recovery processes. (Score: ___) ☐ Limit use of removable media (USBs, etc.). (Score: ___) ☐ Monitor physical access to systems. (Score: ___) ☐ Provide basic cybersecurity awareness training. (Score: ___) ☐ Control external system connections (e.g., remote access). (Score: ___) Level 2: Intermediate Cyber Hygiene☐ Maintain documented policies and procedures for all controls. (Score: ___) ☐ Implement access control using least privilege principles. (Score: ___) ☐ Log system events and maintain an audit trail. (Score: ___) ☐ Encrypt CUI at rest and in transit. (Score: ___) ☐ Use multi-factor authentication for all remote access. (Score: ___) ☐ Perform regular vulnerability scans and remediation. (Score: ___) ☐ Conduct security assessments and risk analysis. (Score: ___) ☐ Develop and maintain a System Security Plan (SSP). (Score: ___) ☐ Document a Plan of Action & Milestones (POA&M). (Score: ___) Scoring Guidance• 0–15: Limited Readiness – Consider external consultation or start with foundational education. • 16–25: Partial Readiness – Begin internal gap closure and policy development. • 26+: Strong Readiness – Proceed with planning or engage a C3PAO for pre-assessment. |
Plan of Action & Milestones (POA&M) Starter Template |
||||||||||||
Use this template to document and track remediation activities for CMMC compliance gaps.
|
Step 3. Build Required Documentation
- Create your System Security Plan (SSP).
- Maintain documented policies and procedures for each control.
- Log evidence of control implementation (screen captures, logs, training records, vendor policies).
System Security Plan (SSP) Template for MSPs |
This generic SSP template is designed to help MSPs document how their environment supports CMMC compliance, particularly Level 2 aligned with NIST 800-171. Where applicable, N‑able can input details about its solutions (e.g., N-entral, Cove, EDR).
1. System IdentificationSystem Name: ________________________ 2. System DescriptionDescribe the overall architecture. Include key functions, network diagrams, and the role of the MSP. 3. System Environment and ComponentsList servers, endpoints, backup platforms, and tools in use. 4. CUI HandlingDescribe where Controlled Unclassified Information (CUI) is processed or stored, and how it’s protected. 5. Control Implementation SummaryFor each NIST 800-171 control family, summarize how the MSP addresses it. 6. Points of Contact• CMMC Compliance Officer 7. Review and ApprovalPrepared By: ____________________
|
Step 4. Register with the Cyber AB
- Go to the official Cyber AB site: https://cyberab.org
- Create an account and profile for your organization.
- Indicate your intent to pursue CMMC certification and desired level.
Step 5. Choose a Certified Third-Party Assessor (C3PAO)
- Use the Cyber AB Marketplace to find an authorized Certified Third-Party Assessor Organization.
- Vet based on experience, industry familiarity, and availability.
Step 6. Contract and Schedule Your Assessment
- Finalize the scope of the audit with your C3PAO (e.g., affected systems, enclave strategy).
- Allow 60–90 days minimum lead time.
- Costs vary ($15K–$60K+ depending on scope and level).
Step 7. Undergo the Certification Assessment
- Conducted onsite or remotely over several days.
- Assessor will review:
- Technical controls
- Written policies
- Implementation evidence
- Any nonconformities must be addressed before a certificate is issued.
Step 8. Receive Your Certification Decision
- Certification is valid for 3 years.
- Level 2 certifications are posted on the Cyber AB site.
- C3PAO submits formal report and decision.
Step 9. Maintain Compliance
- Treat certification as a program, not a project.
- Schedule annual internal reviews.
- Update documentation when systems or processes change.
Additional Notes:
- RPOs can assist with pre-assessment and gap closure but cannot certify you.
- MDR, RMM, and backup vendors (like N‑able) should be part of your documentation for technical controls.
Final Thoughts for MSPs Pursuing CMMC
Achieving CMMC certification as an MSP may seem daunting, but with the right preparation, checklists, and templates, you can streamline the process. Start with a readiness self-assessment, document your security practices, and engage a trusted C3PAO to guide your certification journey.
For more on CMMC download our ebook: CMMC: A guide to the What, When, Why, and How?
Looking for more blogs on compliance and regulation, then check out the Compliance section of our blog.
Lewis Pope is the Head Security Nerd at N‑able. You can follow him on Twitter: @cybersec_nerd
LinkedIn: thesecuritypope
Twitch: cybersec_nerd
© N‑able Solutions ULC and N‑able Technologies Ltd. All rights reserved.
This document is provided for informational purposes only and should not be relied upon as legal advice. N‑able makes no warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information contained herein.
The N-ABLE, N-CENTRAL, and other N‑able trademarks and logos are the exclusive property of N‑able Solutions ULC and N‑able Technologies Ltd. and may be common law marks, are registered, or are pending registration with the U.S. Patent and Trademark Office and with other countries. All other trademarks mentioned herein are used for identification purposes only and are trademarks (and may be registered trademarks) of their respective companies.