CMMC Control Families: Your Guide to Cybersecurity Compliance

Understanding CMMC Control Families: The Foundation of Defense Cybersecurity

The CMMC control families are the 14 organized categories of cybersecurity practices that form the backbone of the Cybersecurity Maturity Model Certification (CMMC) framework required for Department of Defense contractors. If you’re looking for a quick overview of these control families, here they are:

CMMC Control Family Abbreviation Focus Area
Access Control AC Limiting system access to authorized users and devices
Audit and Accountability AU Tracking system activity and ensuring users are accountable
Awareness and Training AT Educating users about security risks and requirements
Configuration Management CM Maintaining secure system configurations
Identification and Authentication IA Verifying user identities before granting access
Incident Response IR Planning for and responding to security incidents
Maintenance MA Securely maintaining systems and components
Media Protection MP Protecting system media containing sensitive information
Personnel Security PS Managing security risks related to employees
Physical Protection PE Securing physical access to systems and facilities
Risk Assessment RA Identifying and addressing security risks
Security Assessment CA Evaluating security controls for effectiveness
System and Communications Protection SC Protecting data communications and systems
System and Information Integrity SI Maintaining accurate and reliable system operations

The CMMC framework was developed by the Department of Defense to protect sensitive information across the defense industrial base. With cybercrime costing the U.S. economy over $150 billion annually as of 2025, these control families provide a structured approach to securing both Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).

Each control family contains specific practices that organizations must implement based on their required CMMC level (1, 2, or 3). These levels are cumulative, meaning higher levels include all requirements from lower levels plus additional controls.

As the DoD continues to enforce CMMC requirements in 2025, organizations across the defense industrial base are working diligently to achieve and maintain compliance with these essential security standards.

For non-profits and small organizations working with the DoD, understanding these control families is the first step toward achieving compliance and securing future contracts.

CMMC control families organized in a hierarchical structure showing the 14 families across 3 certification levels with specific security practices for each level - cmmc control families infographic

Terms related to cmmc control families:

Introduction to CMMC and Its Importance

In today’s digital battlefield, the stakes couldn’t be higher. When intellectual property and sensitive information get stolen from our Defense Industrial Base (DIB), it’s not just a business problem—it’s a national security threat. With cybercrime costing the global economy a staggering $10.5 trillion annually by 2025 according to Cybersecurity Ventures, protecting our defense information isn’t optional—it’s essential.

Department of Defense cybersecurity requirements for contractors - cmmc control families

What is the Cybersecurity Maturity Model Certification (CMMC)?

Think of the CMMC control families as the security playbook for America’s defense network. The Cybersecurity Maturity Model Certification brings together best practices from various cybersecurity standards to create a unified approach for the entire Defense Industrial Base—a massive ecosystem of over 300,000 companies working together to support our national defense.

At its heart, CMMC is a framework designed to safeguard sensitive unclassified information that flows between the Department of Defense and its many contractors. Rather than a one-size-fits-all approach, CMMC offers a tiered certification system:

CMMC Level 1 (Foundational) establishes basic cyber hygiene practices with 17 security controls focused on protecting Federal Contract Information (FCI). Think of this as the essential security practices every organization should have in place.

CMMC Level 2 (Advanced) raises the bar significantly, incorporating all 110 security requirements from NIST SP 800-171 Rev 2. This level is designed for contractors handling Controlled Unclassified Information (CUI).

CMMC Level 3 (Expert) builds on Level 2 and adds selected controls from NIST SP 800-172, creating a robust security posture for organizations handling the most sensitive unclassified information.

What makes CMMC different from previous approaches is its verification requirement. No more honor system—organizations must now prove their compliance through assessments by certified third-party assessment organizations (C3PAOs). This verification process ensures that security isn’t just promised but actually implemented.

Why CMMC Compliance Matters for DoD Contractors

For organizations working with the Department of Defense, CMMC compliance isn’t just another box to check—it’s becoming the price of admission. As the DoD itself states, security is foundational to all purchase decisions and shouldn’t be compromised for cost, schedule, or performance.

When we work with small businesses and non-profits at ETTE, we emphasize that CMMC compliance delivers multiple benefits beyond just regulatory requirements. Contract eligibility is the most immediate concern—without the appropriate certification level, you simply won’t be able to bid on DoD contracts, full stop.

But the importance goes deeper. By implementing these security controls, you’re helping protect national security by hardening potential entry points that nation-state actors might target. You’re also safeguarding valuable intellectual property that fuels American innovation and economic strength.

CMMC also strengthens our entire defense supply chain. Just like a chain is only as strong as its weakest link, our defense industrial base is only as secure as its most vulnerable contractor. Every organization that achieves compliance helps build a more resilient defense ecosystem.

There’s also a significant competitive advantage for early adopters. Organizations that achieve certification sooner rather than later position themselves ahead of competitors who delay implementation, potentially winning contracts while others are still working toward compliance.

At ETTE, we’ve witnessed how proper cybersecurity implementation not only prevents devastating breaches but opens doors to valuable opportunities. Our experience with NIST requirements for government contractors has taught us that early preparation makes all the difference in successful compliance.

For small businesses and non-profits supporting America’s defense mission, CMMC compliance represents both a responsibility and an opportunity—a chance to demonstrate your commitment to security while positioning your organization for success in the defense marketplace.

Understanding the 14 CMMC Control Families

Think of the CMMC control families as the 14 pillars that hold up your cybersecurity house. These organized domains align perfectly with NIST SP 800-171 standards and create a comprehensive framework to protect your sensitive information. Each family tackles a specific aspect of security, with requirements that get more rigorous as you move up the CMMC certification levels.

When implemented together, these control families create a robust shield that protects both Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Let’s walk through each family to understand what they require and why they matter to your organization.

Access Control (AC)

Access Control is the security guard at the entrance of your digital environment. This family focuses on making sure only the right people can access the right information at the right time.

At its core, Access Control requires you to limit system access to authorized users and processes. Think about it like assigning different keys to different doors in your building – not everyone needs access to everything. You’ll need to enforce approved authorizations for information flow, separate duties among team members to reduce risk, and employ the principle of least privilege.

For example, if you’re implementing AC.L1-3.1.1, you’ll create systems that uniquely identify each user and enforce role-based access. In our work helping clients with DFARS and NIST 800-171 compliance, we’ve noticed that many organizations struggle with least privilege principles. It’s not just about setting restrictions once – you need to regularly review and adjust permissions as roles change.

Audit and Accountability (AU)

If Access Control is your security guard, then Audit and Accountability is your security camera system. This family ensures you can track, record, and investigate everything that happens within your systems.

Creating and retaining system audit logs is fundamental here. These logs should be detailed enough that you can trace actions back to specific users. Regularly reviewing these logs helps you spot suspicious activity before it becomes a major problem.

Think of your audit system like a black box on an airplane – when something goes wrong, you need reliable records to figure out what happened. For CMMC Level 2, you’ll need to implement practices like AU.L2-3.3.1, establishing secure audit processes with clear policies and procedures for generating reports that your security team can actually use.

Awareness and Training (AT)

Your technology is only as secure as the people using it. The Awareness and Training family makes sure everyone in your organization understands security risks and knows how to protect sensitive information.

This includes providing basic security awareness training to all system users, as well as specialized training for personnel with specific security responsibilities. At ETTE, we’ve seen that security awareness training delivers incredible value for its cost. Your team members can either be your greatest vulnerability or your strongest defense – proper training makes all the difference.

For CMMC Level 2, you’ll implement AT.L2-3.2.1, which focuses on recognizing and reporting potential insider threats. This is especially crucial for defense contractors, as insider threats remain a significant concern across the defense industrial base.

Configuration Management (CM)

Configuration Management is about keeping your systems in a known, secure state. This family focuses on establishing baseline configurations and maintaining them throughout your systems’ lifecycle.

Configuration Management involves establishing baseline configurations and inventories, employing the principle of least functionality, controlling user-installed software, and enforcing security configuration settings. Misconfigured systems are like open uped doors – they give attackers easy entry points. In fact, many breaches occur not through sophisticated attacks but through simple configuration errors.

For example, CM.L2-3.4.1 requires you to document your current system configurations as a reference point. This documentation becomes invaluable when you need to detect unauthorized changes or restore systems after an incident. It’s like having a detailed map of your security landscape – you can’t protect what you don’t understand.

Understanding these four control families gives you a solid foundation, but all 14 families work together to create a comprehensive security posture. At ETTE, we help small businesses and non-profits steer these requirements with practical, custom solutions that match your specific needs and resources.

Key CMMC Control Families for Data Protection

When it comes to safeguarding sensitive information like Controlled Unclassified Information (CUI) and Federal Contract Information (FCI), not all security measures are created equal. While the entire framework of CMMC control families works together to create a robust security posture, four families stand out as particularly vital for data protection. Let’s explore these critical components that form the backbone of your defense strategy.

Identification and Authentication (IA)

Think of identification and authentication as the security guards at your building’s entrance—they determine who gets in and who doesn’t. This control family ensures that only verified users, processes, or devices can access your systems.

In today’s threat landscape, passwords alone have become woefully inadequate. That’s why practices like IA.L2-3.5.3 require multifactor authentication for network access to privileged accounts at CMMC Level 2. This means combining something you know (password), something you have (token or smartphone), and sometimes even something you are (biometrics).

We’ve seen at ETTE how proper implementation of these controls can dramatically reduce unauthorized access attempts. One of our non-profit clients reduced their security incidents by 70% after implementing our recommended multifactor authentication solution. The key is finding the sweet spot between security and usability—too cumbersome, and users find workarounds; too simple, and protection is compromised.

Other critical requirements include preventing identifier reuse, disabling inactive accounts, and managing credentials securely. Each of these practices adds another layer of protection against unauthorized access to your sensitive defense information.

Media Protection (MP)

Media protection often flies under the radar in cybersecurity discussions, but it deserves your full attention. This family focuses on protecting both physical and digital media containing sensitive information—from hard drives and USB sticks to printed documents.

Consider this real-world scenario we encountered: A small defense contractor disposed of old computers without properly sanitizing the hard drives. If we hadn’t caught this during a pre-certification assessment, sensitive design specifications could have ended up in unauthorized hands. This illustrates why practices like proper media sanitization before disposal are mandatory for CMMC compliance.

For organizations handling CUI at CMMC Level 2, practice MP.L2-3.8.9 requires protecting the confidentiality of backup information. This might involve encrypting backup media, securing physical storage locations, and limiting access to authorized personnel only. A backup containing sensitive data needs the same level of protection as the original.

CMMC control families like Media Protection require both technical and procedural controls—it’s not just about encryption, but also about how people handle and store media physically.

System and Communications Protection (SC)

In our interconnected world, data rarely stays in one place. The System and Communications Protection family ensures that your sensitive information remains secure while in transit across networks.

Without proper protections, CUI could be intercepted, modified, or redirected during transmission. Think of this family as providing armored cars for your data as it travels from one location to another.

At CMMC Level 2, practice SC.L2-3.13.8 requires implementing cryptographic mechanisms to prevent unauthorized disclosure during transmission. In practical terms, this means using secure protocols like TLS for web traffic and IPsec for VPN connections. We’ve helped many organizations implement these controls while ensuring their systems remain performant and user-friendly.

Boundary protection is another critical aspect of this family. By monitoring and controlling communications at key network boundaries, you create checkpoints where suspicious traffic can be identified and blocked before it reaches sensitive systems.

System and Information Integrity (SI)

The System and Information Integrity family is your ongoing defense against evolving threats. While other families might set up protective barriers, this family ensures those barriers remain effective over time through monitoring, updates, and timely responses to new vulnerabilities.

For CMMC Level 2, practice SI.L2-3.14.1 requires identifying, reporting, and correcting system flaws promptly. This isn’t a one-time effort but a continuous process that includes:

  • Subscribing to security advisory services to stay informed about new vulnerabilities
  • Implementing regular vulnerability scanning to identify weaknesses
  • Establishing efficient patch management processes to address those weaknesses
  • Monitoring systems for suspicious activities that might indicate a compromise

We’ve seen organizations transform their security posture by implementing robust system and information integrity practices. One small government contractor we work with reduced their vulnerability remediation time from weeks to days by adopting our recommended automated patch management solution.

The protection of sensitive defense information isn’t a destination but a journey. These four CMMC control families provide the foundation for that journey, ensuring that your data remains secure whether it’s being accessed, stored, transmitted, or maintained. At ETTE, we specialize in helping organizations implement these controls in ways that improve security without disrupting operations—because we understand that security should enable your mission, not hinder it.

Implementing CMMC Control Families in Your Organization

Bringing the CMMC control families into your organization isn’t just about checking boxes—it’s about creating a security culture that protects your valuable information and keeps you eligible for DoD contracts. Think of it as renovating a house: you need a good plan, the right tools, and a clear understanding of what you’re trying to achieve.

Organization implementing CMMC control families - cmmc control families

At ETTE, we’ve walked alongside many organizations on this journey, holding their hands through what can sometimes feel like a maze of requirements. We’ve found that taking things step by step makes the whole process much more manageable—and even a little less scary.

Determining Your Required CMMC Level

First things first: you need to know which CMMC level applies to your organization. This isn’t something you get to choose—it depends on what kind of information you handle in your DoD work.

If you’re only handling Federal Contract Information (FCI)—basic contract details and related data—you’ll likely need Level 1 (Foundational) certification. This covers 17 basic cybersecurity practices that most organizations should already have in place.

Handling Controlled Unclassified Information (CUI)? That bumps you up to Level 2 (Advanced), which includes all 110 practices from NIST SP 800-171. This is where most defense contractors land, especially if you’re working with technical information or sensitive contract documents.

For organizations protecting CUI in critical programs or high-value assets, Level 3 (Expert) adds even more security controls based on NIST SP 800-172.

As the Department of Defense puts it:

“Security is a foundational aspect of all purchase decisions and should not be sacrificed for cost, schedule, or performance.”

In plain English: if you want to work with the DoD, security isn’t optional—it’s essential.

To figure out your level, ask yourself these simple questions:

  1. Do you provide products or services to the DoD?
  2. Do you handle FCI or CUI in your work?
  3. What specific requirements appear in your contracts?

Most small businesses and non-profits working with technical information or sensitive contract data will need Level 2 certification. When in doubt, check your contract requirements or ask your contracting officer.

Best Practices for CMMC Implementation

After helping dozens of organizations with NIST 800 Compliance, we’ve learned what works and what doesn’t. Here’s our real-world advice for making CMMC implementation smoother:

Start with a gap assessment. Before rushing to implement new controls, take stock of what you already have in place. Many organizations are surprised to find they’re already doing many things right. A good gap assessment highlights what’s missing so you can focus your efforts where they’re needed most.

Focus on your crown jewels first. Not all data needs the same level of protection. Identify your most sensitive information and the systems that store or process it. These deserve your immediate attention. We often tell clients, “If you can only secure five things right now, make sure they’re the five most important things.”

Document as you go. The CMMC assessors will want evidence that you’ve implemented the required controls. Create a simple, consistent system for documenting your security measures from day one. Trust us—trying to recreate documentation after the fact is much harder than keeping records as you go.

Build a comprehensive System Security Plan. Your SSP is like the blueprint of your security program. It should clearly define your system boundaries, security requirements, and implemented controls. Think of it as telling the story of your security program to someone who knows nothing about your organization.

Make security an everyday habit. Security isn’t a one-and-done project—it’s an ongoing commitment. Establish processes for regular monitoring, testing, and improvement. As one of our clients put it, “It’s like brushing your teeth—you don’t do it once and consider yourself done for life.”

Invest in your people. The most sophisticated security controls in the world won’t help if your staff doesn’t understand them. Ensure everyone knows their security responsibilities through regular training and awareness programs. Your people can be either your greatest vulnerability or your strongest defense.

Do a practice run. Before your official CMMC assessment, conduct internal assessments to identify and fix any issues. It’s much better to find and address problems yourself than to have an assessor find them.

In our work with small businesses and non-profits, we’ve seen some common challenges crop up time and again. Here’s what we typically encounter and how we address them:

When resources are tight, we recommend prioritizing controls based on risk and implementing in phases. You don’t have to do everything at once.

For organizations struggling with outdated legacy systems, we help implement compensating controls while planning for gradual system upgrades that fit within budget constraints.

Many smaller organizations simply don’t have cybersecurity expertise on staff. That’s where partners like ETTE come in—we can fill knowledge gaps or help train your team.

Resistance to change is natural in any organization. We focus on getting leadership buy-in and helping communicate the importance (and benefits) of security to all staff members.

The documentation requirements can feel overwhelming. We help clients implement simple tools and templates to streamline this process and make it more manageable.

For non-profit organizations facing these challenges, we offer specialized Compliance Services for Nonprofits that address their unique circumstances and constraints.

The journey to CMMC compliance might seem daunting at first glance, but with the right approach and support, it’s absolutely achievable—even for smaller organizations with limited resources. The key is taking that first step and building momentum from there.

Conclusion: Achieving CMMC Compliance with Expert Support

The journey through the CMMC control families might feel like navigating a complex maze, especially if you’re a small business or non-profit with limited resources. But here’s the good news: compliance isn’t just a box-checking exercise for winning DoD contracts—it’s an investment in your organization’s security foundation.

Think of these 14 control families as the pillars that hold up your cybersecurity house. From determining who can access your systems to ensuring those systems remain trustworthy in the face of evolving threats, each family plays a vital role in protecting what matters most—your sensitive information and your reputation.

CMMC compliance isn’t a one-and-done achievement. Cybersecurity is more like tending a garden than building a wall—it requires ongoing attention, care, and adaptation. As threats evolve (and they always do), your security practices need to grow alongside them. Continuous monitoring, regular assessments, and ongoing improvements become your best friends on this journey.

At ETTE, we’ve walked alongside many Washington DC-based non-profits and small businesses as they steer these waters. We’ve seen the furrowed brows in those first meetings when the scope of CMMC seems overwhelming. And we’ve also seen the relief and confidence that comes when organizations realize they don’t have to figure it all out alone.

Our team brings real-world experience with NIST 800-171, DFARS, and CMMC compliance to the table. We speak both “government requirement” and “small business reality” fluently, helping you bridge the gap between compliance demands and practical implementation. We believe in solutions that work for your specific situation—not one-size-fits-all approaches that break your budget or overwhelm your team.

Whether you’re just starting to explore what CMMC means for your organization or you’re looking to strengthen your existing security practices, we’re here as partners, not just consultants. Our approach centers on understanding your unique challenges and building sensible, cost-effective solutions that address your specific risks.

The stakes are high—cybersecurity threats targeting the defense industrial base continue to grow in sophistication and frequency. By thoughtfully implementing the 14 CMMC control families, you’re taking meaningful steps to protect not just your organization and clients, but contributing to our collective national security.

When you’re ready to move forward with confidence on your CMMC compliance journey, ETTE is here to help you steer the complexities while keeping your mission and operations front and center. After all, good security should enable your work, not hinder it.

Ready to take that next step? Our team at ETTE is just a conversation away from helping you transform CMMC from a compliance challenge into a competitive advantage.

Need Reliable IT Services & Support?

Stop worrying about technology problems. Focus on your business. Let us provide the Managed IT Services you require.