Skip to main content
Compliance

NIST 800-171 and CMMC 2.0 for small AI firms

110 controls, SPRS scoring math, self-assessment versus C3PAO, and the DFARS 252.204-7012 flow-down small AI firms keep missing. A grounded read for teams with CUI in their pipeline.

The three artifacts, in order

If you handle Controlled Unclassified Information for DoD or DoD-subject contracts, three federal requirements stack: DFARS 252.204-7012 (the contract clause), NIST SP 800-171 Rev 3 (the 110-control technical baseline), and CMMC 2.0 (the certification program that verifies 800-171 implementation). You do not pick one. DFARS tells you which you need; 800-171 tells you what to implement; CMMC tells you how it gets verified.

171 CONTROLS IS THE CMMC FLOOR

NIST 800-171 has 110 requirements across 14 domains. CMMC Level 2 certification requires third-party assessment against all 110. AI firms handling CUI in defense contracts need CMMC L2 by 2026 — the assessment process should be underway now.

NIST 800-171 is the work. CMMC 2.0 is the verification. Small firms that conflate the two overspend on certification theater and underspend on actual control implementation.

The 110 controls, grouped

FamilyControlsWhat it means
Access Control (AC)22Who can access what, session management, privileged-account control, separation of duties.
Awareness and Training (AT)3User training on CUI handling and insider threat.
Audit and Accountability (AU)9Logging, review, retention, tamper-evidence.
Configuration Management (CM)9Baseline configs, change control, least functionality, allowed software.
Identification and Authentication (IA)11MFA, password complexity, cryptographic authentication, replay resistance.
Incident Response (IR)3Incident handling, DFARS 72-hour reporting, IR testing.
Maintenance (MA)6Maintenance authorization, tool approval, non-local maintenance MFA.
Media Protection (MP)9Physical media handling, sanitization, encrypted transport.
Personnel Security (PS)2Screening, termination procedures.
Physical Protection (PE)6Physical access controls, visitor logs.
Risk Assessment (RA)3Periodic risk assessment, vulnerability scanning.
Security Assessment (CA)4Self-assessment, POA&M, continuous monitoring.
System and Communications Protection (SC)16Boundary protection, FIPS 140-validated crypto, key management.
System and Information Integrity (SI)7Flaw remediation, malicious code protection, monitoring.

For a small AI firm, IA (MFA everywhere, FIPS 140-3 validated crypto for privileged access), SC (boundary protection, FIPS-validated crypto modules across the stack), and AU (centralized log aggregation with retention and tamper-evidence) are the expensive families.

CMMC 2.0 levels, practically

LevelScopeAssessment
Level 117 controls (FAR 52.204-21). Federal Contract Information (FCI), not CUI.Annual self-assessment.
Level 2All 110 NIST 800-171 controls. CUI handling.Triennial C3PAO assessment for most contracts; self-assessment for a narrow subset.
Level 3110 plus enhanced 800-172 subset. High-value CUI, APT-relevant.Triennial DIBCAC government assessment.

Most small AI firms touching DoD CUI operate at Level 2. Level 3 is for a narrow slice of high-sensitivity programs.

SPRS scoring, the math

CMMC Level implementation burden at a glance
Level 1 controls
17
17
Level 2 controls
110
110
Level 3 controls
110+
110+
Typical SPRS scores by maturity
Mature firm
90–110
90+
Growing firm
70–89
~80
Flagged / review
Below 80
<80
Red flag
0
Neg.

The Supplier Performance Risk System is the DoD database where you record your 800-171 self-assessment score. Scoring starts at 110 and subtracts weighted penalties for each control not fully implemented. Weights range 1-5 based on risk impact. The possible range is +110 to -203.

  • Full implementation = 0 penalty.
  • Partial = half penalty, only if listed in a POA&M with a remediation date.
  • Not implemented = full penalty.

110 is perfect. Scores in the 90s are common for mature firms. Below 80 gets attention. Negative is a red flag. Your SPRS score is visible to contracting officers and increasingly referenced as a pre-award gate.

DFARS 252.204-7012 in the middle

  • Provide adequate security — implement NIST 800-171.
  • Report cyber incidents to DoD within 72 hours via DIBNet.
  • Preserve affected media and damage-assessment data.
  • Flow the same requirements down to subcontractors.

The 72-hour reporting obligation trips small firms. You need a medium-assurance DoD-approved PKI certificate for DIBNet, an IR runbook that references DIBNet, and staff who understand the reporting threshold (any cyber incident affecting CUI or CUI-enabling systems, not only confirmed breaches).

What small AI firms keep missing

1. Treating developer laptops as out of scope

If a dev clones a repo containing CUI training data, that laptop is in scope. The boundary travels with the data. Teams that scope assessment around "only prod" fail C3PAO assessments.

2. Using commercial LLM APIs with CUI

Sending CUI to commercial OpenAI, Anthropic, or Gemini is a flow of CUI outside your boundary to a service not built for 800-171. That is a reportable incident. Use FedRAMP-authorized LLM endpoints.

3. Incomplete asset inventory

Assessment starts with "show me every system in the CUI boundary." A stale Google Doc produces findings across CM, CA, and RA. A live CMDB is not optional.

4. No separation between CUI and non-CUI environments

A dedicated CUI enclave — segregated network, separate identity plane, separate logging — is the single most effective scope-reduction move.

The goal is not compliance across your whole business. The goal is a tight CUI enclave where compliance is affordable and the rest of the company moves at commercial speed.

A realistic small-firm build

  • CUI enclave in AWS GovCloud or Azure Government (FedRAMP-inherited baseline).
  • Azure AD or AWS IAM Identity Center with hardware-key MFA (PIV-I or FIDO2).
  • Centralized log aggregation (Splunk, Sentinel) — FIPS-validated transport, tamper-evident, one-year online retention.
  • EDR on all in-scope endpoints (CrowdStrike, Defender, S1).
  • FedRAMP-authorized LLM endpoint only (Azure OpenAI Government, Bedrock GovCloud, Vertex Assured Workloads).
  • Documented IR runbook with DIBNet reporting and 72-hour timer.
  • Quarterly vuln scans, monthly patch cadence, annual pen test.
  • Written policies for AC, AU, CM, IA, IR, SC, SI — referenced in the SSP.

C3PAO assessment cost

$80K-$200K typical for a small-firm Level 2 C3PAO, depending on scope. Triennial, so $25K-$70K per year amortized. Plan it as G&A. Pre-assessment readiness work usually adds 3-6 months of internal engineering.

Bottom line

NIST 800-171 is 110 controls. CMMC 2.0 Level 2 certifies them. DFARS 7012 is the contract clause that triggers both and adds the 72-hour incident-report obligation. Small AI firms handle this well when they build a tight CUI enclave with FedRAMP-authorized dependencies and document relentlessly. They handle it badly when they treat it as paperwork. Build the enclave first; the paperwork follows.

Frequently asked questions

How many controls are in NIST 800-171?

110 controls across 14 families. Rev 3 is the current baseline. CMMC 2.0 Level 2 requires all 110 implemented.

What is CMMC Level 2?

The certification level for contractors handling CUI. Requires implementation of all 110 NIST 800-171 controls and, for most contracts, triennial C3PAO assessment.

What is a SPRS score?

Your self-reported NIST 800-171 implementation score in DoD's Supplier Performance Risk System. Starts at 110, subtracts weighted penalties for missing controls. Visible to contracting officers.

Can I still self-attest under CMMC 2.0?

Level 1 is self-assessment. A narrow subset of Level 2 allows self-assessment. Most Level 2 contracts require C3PAO assessment. Level 3 requires DIBCAC government assessment.

What does DFARS 252.204-7012 require?

800-171 implementation, 72-hour cyber incident reporting to DIBNet, media preservation, and flow-down to subcontractors handling CUI.

Can I use commercial OpenAI or Anthropic APIs with CUI?

No. Commercial endpoints are not 800-171 compliant for federal CUI. Use Azure OpenAI Government, Bedrock GovCloud, Vertex Assured Workloads.

1 business day response

Standing up CMMC Level 2?

If you are building a CUI enclave or preparing for a C3PAO assessment, we can help you scope it tightly and avoid common small-firm mistakes.

Talk to usRead more insights →
UEI Y2JVCZXT9HP5CAGE 1AYQ0NAICS 541512SAM.GOV ACTIVE