CMMC CONNECT
A monthly CMMC Q&A with a leading C3PAO team of assessors that have done over 100 assessments.
If you’re looking for practical questions to help manage CMMC, this page brings together real-world guidance on readiness, assessments, and ongoing compliance.
Next Live Session: April 30th
Day(s)
:
Hour(s)
:
Minute(s)
:
Second(s)
Questions to Help Manage CMMC
CMMC isn’t theoretical. It’s here right now. 1000+ DoD Contractors are now Level 2 certified across the Defense Industrial Base.
This hub brings together the real questions these contractors are asking as they prepare for assessments, manage compliance, and navigate both implementation and assessment expectations.
Join live sessions or explore answers on-demand, all grounded in what assessors are actually seeing in the field.
Do you have a CMMC question?
CMMC FAQs
What triggers a re-assessment?
At a minimum, every 3 years for Level 2, but sooner if there’s a significant change to your environment. Per the CMMC Level 2 Scoping Guide (Page 11, under “Separation Techniques”), that means changes to your architecture or assessment boundary, like:
- Mergers or acquisitions
- Changes to CUI scope or boundaries
- Shifts in how or where CUI is stored, processed, or transmitted
If the change materially impacts your assessed environment, a new assessment is required. Bottom line: your Affirming Official is responsible for determining if a change is “significant,” and that decision carries real weight (including False Claims Act implications). Always document changes and check with your C3PAO if you’re unsure. They can give a professional opinion, but not advisory direction.
Once you pass an assessment, how do you upkeep an SSP?
Treat your SSP like a living document, not a trophy.
Review it at least during your annual risk assessment, and update it whenever meaningful changes happen to your environment, tooling, policies, boundary, assets, or service providers. If the environment changed, the SSP should catch up reasonably soon, especially for anything security-impacting.
What makes a good artifact?
A good artifact is easy to map, easy to trust, and easy to verify.
It should be clearly labeled, tied to the control, current, and consistent with your policy, SSP, and actual system behavior.
The reason that matters is that assessors validate controls through examine, interview, and test, so the best artifacts support the story across all three, not just as a random screenshot dump.
How do printers come into play with CMMC assessments, and what are best practices for on-site printing?
If you allow printing of CUI, you pull the physical domain into the assessment, which usually means an onsite visit during an assessment.
Best practice is to keep printing limited, controlled, and intentional: restrict who can print, place printers where output is not exposed to unauthorized people, secure printed CUI like any other media, and have a process to ensure nothing is left sitting in trays.
CMMC and FedRamp???
FedRAMP is about the cloud service. CMMC is about your implementation.
A FedRAMP-authorized provider can help satisfy part of the requirement, but it does not make the contractor automatically compliant.
If a CSP processes CUI, it must meet the applicable FedRAMP requirement, and the OSC still has to document the relationship, define responsibilities in a CRM/shared responsibility model, and secure everything that remains the contractor’s job.
How do companies distribute costs incurred across federal government contracts?
Cybersecurity costs should be built into your bid rates, that was always the intent. When DFARS 7012 came out, the DoD made it clear they expected rates to increase to account for these new requirements. The reality is many companies didn’t raise rates to stay competitive and are now feeling that gap.
- If you have multiple contracts, the most practical approach is to spread costs across contracts and CAGE codes over the 3-year certification period.
- If you only have one contract, those costs will hit much more directly.
Bottom line: your proposal and contracts team needs to track and allocate these costs properly so you’re not absorbing them out of pocket.
Would using Azure OpenAI with CUI data in an Azure Gov environment go against CMMC compliance?
Not automatically, but it’s not automatically okay either.
Microsoft shows Azure OpenAI in scope for FedRAMP High and DoD IL4/IL5 in Azure Government. But here’s the catch: Azure Gov being FedRAMP High does NOT mean everything running in it is CMMC-safe.
CMMC cares about your actual implementation, including:
- Whether the service is within your authorized boundary
- How CUI is handled and flows
- Your shared responsibility model
- Whether you can defend the use in your SSP and assessment evidence
Bottom line: authorized service ≠ approved use case.
Play it safe. Don’t put CUI into OpenAI, even in Azure Gov, unless you’ve fully validated the service, boundary, data flow, and contract/customer expectations.

Common CMMC Gaps That Make Managing Compliance Harder
AT 3.2.1-3
Role-Based Risk Awareness, Role-Based Training, & Insider Threat AwarenessOrganizations often provide annual training, but miss the role-based elements.
IA 3.5.3
Multifactor AuthenticationOne of the most consistent misses. MFA may be enabled somewhere, but not everywhere it needs to be
AC 3.1.22
Control Public InformationFrequently missed in cloud environments. It’s more than “public website content”—you must prevent unauthorized sharing or exposure of CUI-related info across collaboration and shared systems.
MP 3.8.1
Media ProtectionPortable media, removable drives, and even virtual media are often not controlled, logged, or encrypted. This includes screenshots, exports, meeting recordings, USBs, and cloud file shares.
CM 3.4.7
Nonessential FunctionalityOrganizations often don’t have clear documentation or technical enforcement showing that unused services, ports, protocols, & functions are disabled, especially in cloud environments.
SI 3.14.1
Flaw RemediationScanning happens — but remediation doesn’t. No documented process, no tracking of closure, or patch timelines that don’t match policy. Assessors need to see the full lifecycle.
SC 3.13.11
CUI EncryptionEncryption is usually enabled, but not with FIPS-validated modules.
CM.3.4.1
System BaseliningMany organizations have configurations, but not formal baselines. Assessors expect defined, approved, and version-controlled baselines for system builds, not just “we build them the same way.”
Join us live
Every last Thursday, from 1:00–2:00 (ET)
The best questions, answers, and insights happen in real time and in the chat.
One registration = all 2026 sessions (quarterly calendar invites sent automatically)
Session Replays
Upcoming Sessions
Every Last Thursday from 1:00 – 2:00 ET
CMMC Connect is a live, interactive forum where DoD contractors get together to ask questions, share challenges, and learn directly from assessors in real time.
April 30
Recap of the March and April Cyber AB Town Hall and general CMMC updates, with a focus on CAGE codes and cross-department collaboration.
May 28, June, 25
We’ll break down the latest Cyber AB Town Hall updates and major CMMC developments, and answer your questions live (submit one here). Check back closer to each session for a more detailed agenda.
July 30, Aug 27, Sep 24
We’ll break down the latest Cyber AB Town Hall updates and major CMMC developments—and answer your questions live (submit one here). Check back closer to each session for a more detailed agenda.
Oct 29, Nov 19, Dec 17
We’ll break down the latest Cyber AB Town Hall updates and major CMMC developments—and answer your questions live (submit one here). Check back closer to each session for a more detailed agenda.
Ask a Question
Have a CMMC question of your own? Submit it using the form on the right, and we will make sure it’s in the queue for our next live session!