CMMC Compliance for Central Florida Defense Contractors | Lorikeet Security Skip to main content
Back to Blog

CMMC 2.0 Compliance for Central Florida Defense Contractors

Lorikeet Security Team April 12, 2026 10 min read

Central Florida is one of the most concentrated defense industrial bases in the United States. From the simulation and training facilities clustered around Lake Nona to the aerospace primes lining the I-4 corridor through Orlando, Kissimmee, and into the Space Coast, the region generates billions of dollars in Department of Defense contracts annually. That concentration of defense work means one thing for the hundreds of companies in the supply chain: the Cybersecurity Maturity Model Certification program is no longer optional.

CMMC 2.0 has been codified into the Defense Federal Acquisition Regulation Supplement. Contract clauses are appearing in new solicitations, and the DoD has made clear that contractors who handle Controlled Unclassified Information must demonstrate compliance with NIST SP 800-171 and, in many cases, undergo a third-party assessment before award. For the defense industrial base in Central Florida, the question is no longer whether CMMC compliance is required but whether your organization is ready for assessment today.

This guide is written for security practitioners, compliance leads, and executives at defense contractors in the Orlando metro area. It covers what CMMC 2.0 Level 2 actually requires, how CUI handling translates into concrete controls, why penetration testing fits into the compliance framework, and how to build an assessment-ready program.


Why Central Florida Is Ground Zero for CMMC

The I-4 corridor has a defense industrial footprint that rivals any metro in the country outside of the Beltway. Lockheed Martin's Orlando facility is one of the largest producers of guided weapon systems in the world. L3Harris Technologies, headquartered in Melbourne, is a major prime contractor with a significant Orlando presence. Raytheon Technologies and Northrop Grumman both maintain substantial operations in the region. Collins Aerospace, Leidos, SAIC, and dozens of mid-tier defense companies round out the prime contractor landscape.

But the prime contractors are not the ones scrambling for CMMC compliance. They have entire compliance and information security organizations. The companies that face the most acute CMMC pressure are the hundreds of small and mid-sized subcontractors in the supply chain: the engineering firms, software developers, systems integrators, simulation technology companies, and specialized manufacturers that flow down from those primes.

Florida's Modeling, Simulation, and Training industry is particularly relevant. The Orlando region has the largest concentration of MS&T companies in the country, largely because of the proximity to military training ranges and the legacy of STRICOM (now Program Executive Office for Simulation, Training, and Instrumentation, or PEO STRI) at the University of Central Florida Research Park. Companies in this sector routinely handle CUI related to training scenarios, weapons system specifications, and adversary modeling. CMMC Level 2 is the baseline for nearly all of them.

If your company holds or touches DoD contracts in Central Florida, and those contracts involve any technical data, engineering drawings, software, research, or systems specifications related to a defense program, you almost certainly handle Controlled Unclassified Information. That makes CMMC Level 2 your compliance floor.


CMMC 2.0: The Three-Level Framework

The original CMMC 1.0 model had five maturity levels. CMMC 2.0, finalized through rulemaking, collapsed those to three levels and aligned them more directly with existing NIST standards. Understanding which level applies to your contracts is the first analytical step.

Level Requirements Assessment Type Who It Applies To
Level 1 (Foundational) 17 practices from FAR 52.204-21 Annual self-assessment Contractors handling Federal Contract Information (FCI) only
Level 2 (Advanced) 110 practices from NIST SP 800-171 Triennial C3PAO assessment (for critical programs) or self-assessment with senior official affirmation Contractors handling CUI on DoD programs
Level 3 (Expert) 110 NIST 800-171 practices plus a subset of NIST 800-172 Government-led assessment by DCSA Contractors on the highest-priority programs, typically those involving advanced persistent threat risk

For the overwhelming majority of Central Florida defense subcontractors, Level 2 is the target. Level 1 applies to companies that handle only general federal contract information with no CUI designation. Level 3 applies to a much smaller set of companies working on specifically designated programs, assessed directly by the Defense Counterintelligence and Security Agency.

The most significant operational change in CMMC 2.0 for Level 2 contractors is the bifurcation between self-assessment and third-party assessment. Whether a given program requires a C3PAO (CMMC Third-Party Assessment Organization) assessment is determined by the contracting officer and specified in the solicitation. Companies should not assume self-assessment suffices for all programs. If the contract solicitation includes DFARS clause 252.204-7021 and specifies Level 2 with a C3PAO assessment, you need a certified third-party assessment before award.


NIST SP 800-171: The Technical Foundation

CMMC Level 2 is a direct mapping to the 110 security requirements in NIST Special Publication 800-171 Revision 2, organized across 14 control families. Understanding the structure of 800-171 is essential to building a compliant program rather than chasing individual controls in isolation.

The 14 Control Families

NIST 800-171 organizes its 110 requirements into the following families:

  1. Access Control (AC) — 22 requirements: Who can access what, and under what conditions. Covers user account management, least privilege, remote access controls, and wireless access.
  2. Awareness and Training (AT) — 3 requirements: Security awareness training for all personnel and role-based training for those with security responsibilities.
  3. Audit and Accountability (AU) — 9 requirements: Logging, log protection, review, and retention. A frequent gap for small contractors who have not deployed a centralized logging solution.
  4. Configuration Management (CM) — 9 requirements: Baseline configurations, change control, least functionality, and software restrictions. Running unnecessary services on systems that touch CUI is a common finding.
  5. Identification and Authentication (IA) — 11 requirements: Multi-factor authentication for CUI systems is required. This is one of the most frequently failed controls in self-assessments.
  6. Incident Response (IR) — 3 requirements: An incident response capability must exist, be tested, and incidents must be reported to appropriate authorities.
  7. Maintenance (MA) — 6 requirements: Controlled maintenance, sanitization of media removed from CUI systems, and supervision of maintenance personnel without full access.
  8. Media Protection (MP) — 9 requirements: Marking, storage, transport, and sanitization of media containing CUI.
  9. Personnel Security (PS) — 2 requirements: Screening of individuals in roles that handle CUI and termination/transfer procedures.
  10. Physical Protection (PE) — 6 requirements: Physical access controls to systems that store or process CUI. Relevant for offices, server rooms, and manufacturing floors.
  11. Risk Assessment (RA) — 3 requirements: Regular risk assessments, vulnerability scanning, and remediation of identified risks.
  12. Security Assessment (CA) — 4 requirements: Periodic assessment of security controls, a system security plan, and a plan of action and milestones (POA&M) for deficiencies.
  13. System and Communications Protection (SC) — 16 requirements: Network segmentation, boundary protection, encryption of CUI in transit and at rest, and separation of user functionality from system management.
  14. System and Information Integrity (SI) — 7 requirements: Malware protection, security alerts, software and firmware patching, and monitoring of information systems.

A CMMC Level 2 assessment evaluates all 110 requirements. Each requirement is either met, not met, or met with a plan of action. Under CMMC 2.0 rules, a company can receive a conditional certification with an active and credible POA&M for certain deficiencies, but the DoD has published specific limits on which requirements can be in a POA&M and for how long. High-priority requirements like multi-factor authentication cannot be deficient at the time of assessment.

Common High-Risk Control Gaps in the Central Florida Market

Based on working with defense subcontractors in the Orlando region, several control families consistently surface as problem areas:


Controlled Unclassified Information: What It Is and Why It Matters

The entire CMMC Level 2 framework exists to protect Controlled Unclassified Information. But CUI is a category that is widely misunderstood, and that misunderstanding is one of the root causes of compliance gaps.

CUI is not classified information. It is not information that requires a security clearance to access. CUI is a government-designated category of sensitive information that requires safeguarding and dissemination controls pursuant to law, regulation, or government-wide policy. The National Archives administers the CUI Registry, which catalogs the specific categories and subcategories.

For defense contractors in Central Florida, relevant CUI categories typically include:

The CUI identification problem: Many contractors in the supply chain receive CUI without knowing it has been formally designated. A prime contractor sends technical specifications via email, and the subcontractor stores them in an uncontrolled shared drive. The information is CUI regardless of whether it is labeled. Under CMMC, your obligation to protect CUI begins the moment you receive it, not when someone puts a banner on it. If you work with any technical data related to a defense program, assume it is CUI until you have confirmed otherwise.

CUI System Boundary: Defining the Assessment Scope

One of the most critical decisions in a CMMC compliance program is defining the CUI enclave, the boundary of systems, networks, and devices that store, process, or transmit CUI. The scope of a CMMC Level 2 assessment is determined by the CUI enclave. Every system inside the boundary must satisfy all 110 NIST 800-171 requirements. Systems outside the boundary are out of scope.

Scoping the CUI enclave is both a technical and a business decision. A broader enclave simplifies data management (all CUI is in one place) but increases the compliance burden. A narrow enclave reduces the number of systems in scope but requires strict technical controls to ensure CUI cannot flow out of the enclave into out-of-scope systems.

Common enclave architectures for Central Florida defense contractors include:


The System Security Plan: Your Compliance Foundation

NIST 800-171 requires (in CA.2.157) that organizations "periodically assess the security controls in organizational systems to determine if the controls are effective in their application." But the foundational document for a CMMC assessment is the System Security Plan.

The SSP is not optional. It is not a formality. It is the primary artifact that a C3PAO assessor or government assessor reviews to understand your environment, how your controls are implemented, and where gaps exist. A weak or incomplete SSP will fail an assessment before any technical testing begins.

A compliant SSP for CMMC Level 2 must document:

The SSP is a living document. It must be updated when the system changes, when controls are added or modified, and prior to each assessment cycle. Assessors will look for date stamps and revision histories to verify that the SSP reflects the current state of the environment, not the state it was in when a consultant wrote it two years ago.


Where Penetration Testing Fits in the CMMC Framework

Penetration testing is not a separate compliance exercise bolted onto CMMC. It is directly referenced in the NIST 800-171 control framework and has specific implications for assessment readiness.

The RA Family: Risk Assessment Requirements

NIST 800-171 Requirement RA.2.141 states: "Periodically scan for vulnerabilities in organizational systems and applications; scan when new vulnerabilities potentially affecting those systems and applications are identified; and remediate vulnerabilities in accordance with organizational assessments of risk."

This requirement establishes the baseline: vulnerability scanning is mandatory. But vulnerability scanning and penetration testing serve different functions. Automated vulnerability scanning identifies known vulnerabilities based on signatures and CVE databases. Penetration testing involves a human attacker using the same techniques as adversaries targeting the defense industrial base to identify exploitable attack paths that scanning cannot detect.

For a CMMC Level 2 assessment, satisfying RA.2.141 requires documented evidence of vulnerability scanning with a defined cadence and a remediation process tied to risk. A best-practice program includes penetration testing to validate the effectiveness of the controls that the 110 requirements mandate, not merely confirm that known CVEs are patched.

The CA Family: Security Assessment Requirements

Requirements CA.2.157 and CA.2.158 require periodic assessment of security controls and the development of action plans for deficiencies. A penetration test is a highly effective mechanism for satisfying the assessment requirement: it provides independent, evidence-based validation of whether the controls you have documented in the SSP are actually working as intended.

A common failure pattern in CMMC assessments is the gap between documented controls and actual implementation. The SSP states that MFA is enforced on all CUI systems. The penetration test discovers that a legacy application bypasses the MFA enforcement because it uses a service account with a static password. This is exactly the kind of finding that a C3PAO assessor will look for, and exactly the kind of finding that a pre-assessment penetration test will surface before it becomes an assessment failure.

Penetration Testing as Pre-Assessment Validation

For Central Florida defense contractors preparing for a C3PAO assessment, a pre-assessment penetration test serves three functions:

  1. Control validation: Confirms that the technical controls you have implemented actually prevent the attack scenarios they are intended to prevent. Boundary protection, network segmentation, access controls, and logging can all be independently validated through testing.
  2. Gap identification: Surfaces vulnerabilities and control weaknesses before the assessor sees them, giving you the opportunity to remediate before the formal assessment.
  3. POA&M scoping: If the penetration test identifies gaps that cannot be remediated before the assessment, it provides precise documentation of what the gap is, what the risk is, and what remediation looks like, which is exactly what a POA&M entry requires.

A note on scope: A CMMC-focused penetration test should be scoped to the CUI enclave. Testing systems outside the enclave is useful for general security posture but does not directly support CMMC assessment readiness. The test should target the systems, network segments, and applications that are in scope for the CMMC assessment, because those are the systems the assessor will be examining.

What a CMMC-Focused Penetration Test Should Cover

A penetration test structured to support CMMC Level 2 assessment readiness should include the following activities:

We provide CMMC-focused penetration testing structured specifically around NIST 800-171 control validation, including deliverables mapped to specific CMMC requirements to support assessment documentation. Our team is based in Orlando and serves defense contractors throughout the I-4 corridor and Space Coast.


Practical Steps to Prepare for a CMMC Level 2 Assessment

CMMC assessment readiness is a program, not a project. The following roadmap reflects the approach we use with Central Florida defense contractors working toward Level 2 compliance.

Phase 1: Scoping and Gap Analysis (Weeks 1 to 6)

Before any technical work begins, you need to understand what you are protecting and where the gaps are. This phase involves:

Phase 2: Remediation (Months 2 to 9, depending on gap depth)

The gap analysis will produce a prioritized list of control deficiencies. Remediation typically falls into three categories:

Phase 3: Validation and Pre-Assessment Testing (Months 8 to 10)

Before engaging a C3PAO, validate that the controls you have implemented are working as intended. This phase includes:

Phase 4: C3PAO Assessment

The formal CMMC Level 2 assessment is conducted by a C3PAO listed on the Cyber AB Marketplace. The assessment involves a combination of document review, interviews with personnel, and technical testing. Assessors are not looking to fail contractors; they are verifying that the controls you claim to have implemented are actually in place.

Findings from the assessment are categorized and, if the organization passes (or passes conditionally with a POA&M), the assessment results are submitted to the CMMC Accreditation Body, which issues the certification. Certifications are valid for three years, after which a new assessment is required.

Timing matters: CMMC certifications must be in place before contract award for programs that require them. "We are working toward CMMC compliance" is not an acceptable answer in a solicitation response that requires Level 2 certification. Start the process early enough that the C3PAO assessment can be completed before the contracts you are pursuing are awarded. Given current assessor demand and the time required for a typical remediation program, twelve to eighteen months of lead time is a reasonable planning horizon for organizations starting from a low baseline.


CMMC and the Florida Defense Contractor Supply Chain

One dimension of CMMC that is frequently underestimated by Central Florida defense contractors is the supply chain dimension. If you are a prime contractor, you are responsible for flowing down CMMC requirements to your subcontractors. If you are a subcontractor, you need to understand what your prime is requiring of you, because primes are increasingly including CMMC compliance language in their teaming agreements and subcontracts.

The practical implication is that CMMC compliance is not just your problem. If you share CUI with a subcontractor, that subcontractor must also be CMMC compliant to the appropriate level. A gap in a subcontractor's CMMC posture creates risk for the prime and, ultimately, for the program. We are already seeing Central Florida primes conduct cybersecurity assessments of their supplier base as part of contract onboarding, well before the formal CMMC requirement flows down through a contract clause.

For companies in the supply chain that want to remain competitive for defense work over the next several years, CMMC compliance is a business development imperative as much as a compliance requirement. Primes will increasingly prefer subcontractors who can demonstrate CMMC Level 2 compliance, because working with a non-compliant subcontractor creates supply chain risk that the prime ultimately bears.


How Lorikeet Supports CMMC Compliance in Central Florida

Lorikeet Security is based in Orlando and works extensively with defense contractors throughout Central Florida, including the I-4 corridor, the UCF Research Park area, and the Space Coast. Our security services are structured to support CMMC Level 2 readiness and assessment.

For defense contractors at the beginning of their CMMC journey, we provide gap assessments against all 110 NIST 800-171 requirements with a prioritized remediation roadmap. For contractors who have completed remediation and are preparing for a C3PAO assessment, we provide pre-assessment penetration testing of the CUI enclave with deliverables that map directly to CMMC control requirements.

You can also read our detailed guide on penetration testing for Orlando defense contractors for additional context on how technical security testing supports CMMC compliance specifically in the Central Florida market.

If you are a defense contractor in Central Florida working toward CMMC Level 2 compliance and want to understand your current posture, start with our platform or contact us to discuss a structured readiness engagement.

CMMC Compliance Support for Central Florida Defense Contractors

From gap assessments and System Security Plan development to pre-assessment penetration testing of your CUI enclave, we work with defense contractors across the I-4 corridor to build assessment-ready CMMC programs.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!