CMMC & Cybersecurity Intelligence Brief

CMMC & Cybersecurity Intelligence Brief — Week of February 24, 2026

Agility Development Group

CMMC & Cybersecurity Intelligence Brief

Week of February 24, 2026  |  Issue No. 05

Enforcement data confirms a systemic DIB readiness gap as supply chain obligations, a regulatory deadline, and AI-powered threats converge.

Executive Summary

 

The compliance accountability phase of CMMC is sharpening into focus. With Phase 1 enforcement operational since November 2025, real-world data is beginning to expose a troubling readiness gap: the average defense contractor carries an SPRS score of negative 12, and industry estimates suggest only 4% of DIB companies are currently ready for formal certification. Meanwhile, prime contractors face escalating pressure to verify and enforce CMMC compliance down their supply chains before Phase 2 mandatory assessment requirements arrive in November 2026. On the regulatory side, the June 1, 2026 NDAA Section 866 harmonization deadline is approaching — offering potential relief from duplicative cyber requirements, but demanding immediate contractor attention. And for organizations tracking the NIST SP 800-171 Rev 3 horizon, DoD’s publication of Organizationally Defined Parameters signals the future compliance framework is being defined now, even as Rev 2 remains the governing standard. Against this backdrop, the ransomware threat landscape has industrialized through AI-powered Malware-as-a-Service platforms, making sophisticated attacks accessible to a broader range of adversaries — and the DIB is squarely in the crosshairs.

In This Issue

01

SPRS Is Now a Contract Gate: The Average DIB Score Is Negative 12

02

Prime Contractors Now Bear Legal Risk for Every Subcontractor CMMC Gap They Miss

03

June 1 Section 866 Deadline: DoD Must Begin Cutting Duplicative Cyber Requirements

04

NIST Rev 3 Is Not Yet Required — But the Transition Window Is Closing Faster Than You Think

05

AI-Powered Ransomware Has Industrialized the Threat Against the Defense Industrial Base

Top Developments

Development 01  |  Enforcement Trend / Assessment Data

SPRS Score Reality Check — Average Contractor Score Is Negative 12

The Supplier Performance Risk System (SPRS) score is no longer a background compliance metric — it is an active contract gating mechanism. Since CMMC Phase 1 went live November 10, 2025, contracting officers can and do consult SPRS scores when evaluating contractor eligibility. The numbers reveal a stark readiness problem: the average self-reported SPRS score across the defense industrial base is currently negative 12, on a scale of -203 to 110. Only contractors approaching a score of 88 or higher demonstrate the minimum control implementation expected for a successful Level 2 C3PAO assessment.

Industry estimates now suggest that only approximately 4% of defense contractors are fully positioned for CMMC certification — a figure that, when weighed against the 80,000+ small entities anticipated to require Level 2 status, represents a massive systemic readiness gap. SPRS version 4.1.1, released to production in September 2025, has also tightened score validation, meaning self-assessed scores that once passed scrutiny are now subject to closer examination.

For contractors, this creates a dual risk: inaccurate or inflated self-assessments expose them to False Claims Act liability, while genuinely low scores left unaddressed progressively erode competitive positioning as CMMC clauses become more common in solicitations. The business calculus is clear: an SPRS score is no longer a compliance checkbox. It is a market differentiator.

Development 02  |  Policy Movement / Enforcement Trend

Subcontractor Flow-Down Enforcement Tightening — Prime Contractors Bear Direct Liability

As Phase 2 approaches, prime contractors are discovering that CMMC compliance is not solely about their own certification — it is about the entire subcontractor network they manage. DFARS 252.204-7021 places explicit obligations on prime contractors to verify that every subcontractor handling Federal Contract Information (FCI) or Controlled Unclassified Information (CUI) meets the required CMMC level before awarding a subcontract. For subcontractors processing CUI where the prime has a C3PAO-assessed Level 2 status, those subs must hold equivalent certified status.

The enforcement teeth are significant. Prime contractors must now confirm that all applicable subs hold a current CMMC certificate or self-assessment at the required level before subcontract award — and must document annual affirmation of continuous compliance. Failure to properly flow requirements carries consequences including contract termination, withheld payments, and potential suspension and debarment.

The False Claims Act dimension is equally pressing: primes that certify their own CMMC compliance while ignoring subcontractor gaps may face civil liability if those representations are later found to be false. Organizations managing complex supply chains must now treat subcontractor CMMC verification as a procurement requirement, not a post-award courtesy. The question is no longer whether their subs will eventually be compliant — it is whether they can prove it today.

Development 03  |  Regulatory Momentum / Policy Movement

NDAA Section 866 Harmonization — June 1 Countdown Creates Near-Term Regulatory Signal

The June 1, 2026 deadline under NDAA Section 866 is now less than 15 weeks away and represents one of the more significant structural cybersecurity policy shifts in recent memory. Section 866 directs the Secretary of Defense to harmonize cybersecurity requirements across the defense industrial base, reduce bespoke cyber requirements unique to specific contracts, identify and eliminate duplicative obligations, and centralize approval of sub-regulatory cybersecurity requirements — then report to Congress on progress by year-end 2026.

For years, defense contractors have navigated a patchwork of agency-specific, program-specific, and contract-specific cybersecurity addenda layered on top of baseline DFARS and CMMC requirements. Section 866 directs DoD to reduce that burden. Implementation is expected to flow through DFARS revisions beginning in 2026, though the full regulatory update cycle typically extends several months past the statutory deadline.

For contractors, the near-term implication is preparatory: this is not relief that arrives June 1 — it is a mandate for DoD to begin delivering relief. Organizations managing contract portfolios with inconsistent cyber requirements should document those inconsistencies now, as the harmonization process will likely include industry input mechanisms. Those positioned to engage during comment periods will have earlier visibility into which requirements are consolidated, modified, or eliminated.

Development 04  |  Policy Movement / Standards Evolution

NIST SP 800-171 Rev 3 — DoD Publishes ODP Values, But Rev 2 Governs Compliance Through at Least Late 2026

A critical source of confusion in the contractor community centers on NIST SP 800-171 Revision 3, which NIST finalized in May 2024. DoD published official Organizationally Defined Parameters (ODP) guidance in April 2025, establishing default values for the configurable controls introduced in Rev 3 to ensure consistent implementation across the DIB. These ODPs represent DoD’s intent for how contractors should interpret ambiguous or flexible control requirements when Rev 3 eventually governs.

The essential operational point: Rev 3 is not the current compliance standard. CMMC assessments, SPRS scoring, and contract eligibility determinations continue to be based on NIST SP 800-171 Revision 2. DoD has not authorized Rev 3 for compliance purposes. The transition is expected to occur somewhere between the second half of 2026 and early 2027 — a window that is narrowing.

What this creates is a planning horizon, not a compliance emergency. The control count decreased from 110 to 97, though three new control families (Planning, System and Services Acquisition, and Supply Chain Risk Management) were added. Contractors who understand where the ODP values are heading can begin architectural alignment now, avoiding costly remediation when the transition is formally required.

Development 05  |  Threat Intelligence / Emerging Threat

Ransomware Evolves Into Industrialized AI-Powered Campaigns — DIB Is a Strategic Target

The ransomware threat landscape that confronted defense contractors in early 2025 has materially shifted. What began as opportunistic criminal operations leveraging Ransomware-as-a-Service (RaaS) has evolved into industrialized cybercrime powered by Malware-as-a-Service (MaaS) platforms incorporating AI. Cybercriminal syndicates are merging talent, infrastructure, and AI models to create scalable platforms capable of targeting thousands of organizations simultaneously — with automation dramatically lowering the barrier to entry for less sophisticated threat actors.

For the defense industrial base, the threat has both a criminal dimension and a strategic one. Nation-state adversaries — particularly China, Russia, and North Korea — are explicitly targeting the entire defense ecosystem, from large prime contractors down to small niche suppliers. The strategic goal is not merely financial: it is to compromise the industrial base supply chain to degrade a nation’s ability to surge defense production in a wartime scenario. Google Cloud threat intelligence published this week confirms that adversaries are shifting from traditional espionage toward operations designed to disrupt production capacity.

This matters for CMMC compliance in a concrete way: organizations that have deferred technical controls in Access Control (AC), Incident Response (IR), and Media Protection (MP) domains now face adversaries whose capabilities have outpaced that approach. The threat environment is an operational reality shaping the risk calculation behind every CMMC investment decision.

 

Impact Analysis

The five developments this week collectively signal that the CMMC program has entered a new phase: the transition from policy articulation to accountability enforcement. The business impacts are direct and compounding.

Contract Eligibility Risk Is Concentrating. An average SPRS score of -12 means most contractors are operating below the minimum threshold that DoD expects before a C3PAO assessment is even attempted. As CMMC clauses proliferate across solicitations — which DoD data confirms is accelerating — contractors carrying low or unvalidated SPRS scores will find themselves progressively excluded from award decisions, even at the proposal stage. The window to remediate is narrowing as Phase 2 approaches.

Supply Chain Risk Is Becoming a Prime Contractor Problem. The flow-down enforcement trend transfers meaningful compliance risk from subcontractors to their primes. A prime that cannot document its subs’ CMMC status faces both competitive risk (inability to certify supply chain compliance) and legal risk under the False Claims Act. For organizations managing large or complex supply chains, this is a resource and process challenge that cannot be addressed reactively.

Regulatory Consolidation Offers Future Relief, But Demands Present Attention. Section 866 harmonization represents a genuine opportunity to reduce compliance overhead — but the relief arrives through a regulatory process. Contractors who engage actively during DFARS revision will have earlier clarity on which requirements are streamlined; those who wait for final rules will face compressed implementation timelines.

The Rev 3 Transition Window Is Closing. Organizations in multi-year modernization programs should incorporate Rev 3 architectural requirements into current planning cycles. The ODP publication confirms DoD’s intent; the transition timeline confirms the urgency. Organizations that treat Rev 3 as a “2027 problem” risk a compressed and costly remediation when the transition is mandated.

The Threat Environment Justifies the Investment. For contractors questioning whether CMMC investment is proportionate to actual risk, the industrialization of ransomware and the strategic shift in nation-state targeting of the DIB provides a direct answer. The threat environment has accelerated past the compliance framework’s original threat model; the controls are no longer overhead — they are minimum operational security.

 

Recommended Actions

 

ASSESS SPRS ACCURACY BEFORE THE NEXT SOLICITATION CYCLE

Conduct an honest internal assessment of your current NIST SP 800-171 Rev 2 control implementation and reconcile it against your filed SPRS score. Inflated self-assessments carry False Claims Act exposure; deflated scores cost contract opportunities. If the gap is significant, engage a Registered Practitioner Organization (RPO) to validate the assessment methodology and prioritize remediation.

 

MAP AND DOCUMENT YOUR SUPPLY CHAIN CMMC STATUS NOW

Prime contractors should initiate a supply chain audit to identify all subcontractors handling FCI or CUI, determine the applicable CMMC level for each, and verify current certification or self-assessment status. Build the annual affirmation requirement into subcontract templates proactively. This is not a one-time compliance check — it is an ongoing program management responsibility.

 

TRACK THE SECTION 866 RULEMAKING PROCESS

Subscribe to Federal Register alerts for DoD DFARS rulemaking activity, particularly proposed rules affecting cybersecurity clauses. Compile a current inventory of any contract-specific or program-specific cyber requirements layered above DFARS baseline — this documentation will be valuable for comment period engagement and for understanding how your compliance obligations will shift post-harmonization.

 

BEGIN REV 3 GAP ANALYSIS AS AN ARCHITECTURAL EXERCISE

Organizations currently implementing or refreshing their System Security Plans should review the three new Rev 3 control families (Planning, SA, Supply Chain Risk Management) and the ODP default values DoD published in April 2025. This does not change current compliance obligations, but identifies gaps that are more efficiently addressed in current modernization cycles than deferred to a future remediation sprint.

 

HARDEN PRIORITY CONTROL DOMAINS AGAINST THE EVOLVED THREAT

Prioritize Access Control (AC), Incident Response (IR), and Media Protection (MP) domain implementation as operational security posture — not merely assessment preparation. The MaaS threat model targets organizations with gaps in exactly these control areas. Ensure endpoint detection, network segmentation, and IR playbooks are operationally tested, not merely documented.

 

Readiness Tips & Accelerators

SPRS Score Validation

Before filing or updating your SPRS score, run each of the 110 NIST SP 800-171 Rev 2 controls against your implemented security measures and document the evidence. A score without supporting evidence is a liability, not an asset — and SPRS v4.1.1 validation now scrutinizes both the score and the methodology.

Flow-Down Due Diligence Template

Develop a standard subcontractor CMMC verification questionnaire covering: (1) current CMMC level and certificate status, (2) SPRS score and filing date, (3) identity of any C3PAO or RPO engaged, and (4) contact for annual affirmation. This creates a documented and repeatable due diligence process that satisfies the DFARS 252.204-7021 documentation obligation.

Rev 3 Pre-Positioning Checklist

Focus on the three new Rev 3 control families — Planning (PL), System and Services Acquisition (SA), and Supply Chain Risk Management (SR). Assess your current policy and technical coverage in each and flag gaps for incorporation into your next SSP refresh cycle before the transition window closes.

Federal Register DFARS Alert Setup

Configure alerts at federalregister.gov for “DFARS” combined with “cybersecurity” or “252.204” to receive direct notification when Section 866 implementation rulemaking is published for comment. This is a 5-minute setup that puts you ahead of competitors waiting for secondary coverage.

Accelerator Tool — CISA Cybersecurity Performance Goals (CPGs)

CISA’s CPGs provide a prioritized set of cybersecurity practices that directly map to common CMMC control assessment failures. Using CPGs as a remediation sequencing guide allows contractors to address the highest-probability assessment failure points first, reducing time-to-compliance. Available at: cisa.gov/cross-sector-cybersecurity-performance-goals

 
 

Forecast & Emerging Issues

Section 866 Rulemaking Will Move Faster Than Expected. With June 1 less than 15 weeks out and congressional reporting requirements attached, DoD acquisition policy teams are under pressure to show tangible progress. Expect an Advance Notice of Proposed Rulemaking (ANPRM) or proposed rule activity in the Federal Register before May. Contractors who monitor this process can comment and shape which requirements get consolidated.

Phase 2 Readiness Pressure Will Sharpen SPRS Scrutiny. As November 2026 approaches, contracting officers will increasingly use SPRS as a pre-award screening signal — even where CMMC Level 2 certification is not yet formally required. Contractors with scores below 70 should expect heightened scrutiny in competitive procurements.

AI-Powered Threat Escalation Will Drive Incident Reporting Activity. The MaaS industrialization trend means higher-volume, more sophisticated attack patterns against DIB targets. Anticipate an increase in DFARS 252.204-7012 incident reporting activity in Q2-Q3 2026. Organizations without tested IR playbooks and pre-established DC3 reporting workflows face real operational risk when an incident occurs during a high-pressure delivery period.

Rev 3 Transition Timeline May Compress. If DoD accelerates Phase 2 implementation, the 2H 2026 transition target could sharpen sooner than the 2027 outer bound suggests. Organizations that treat “2027” as a firm deadline may face a surprise — early movers have the advantage of avoiding compressed implementation cycles.

False Claims Act Enforcement Is an Emerging Risk Vector. Recent DoJ guidance and at least one filed complaint referencing CMMC-related misrepresentations signals that federal prosecutors are actively interested in cybersecurity certification fraud. The combination of SPRS self-reporting and flow-down certification obligations creates new exposure for contractors who overstate their compliance posture.

 

Tools & Resources

The developments this week draw on authoritative DoD, NIST, and regulatory sources that contractors should have bookmarked and actively monitored. Below are the primary public frameworks and practical tools most directly relevant to SPRS remediation, supply chain compliance, NDAA harmonization, and Rev 3 preparation.

A. Key Public Frameworks and References

NIST SP 800-171 Rev 2 — Current Compliance Standard

The authoritative control set for all current CMMC Level 2 assessments, SPRS scoring, and DFARS 252.204-7021 compliance — this governs until DoD formally transitions to Rev 3.

NIST SP 800-171 Rev 3 — Forthcoming Standard (Planning Reference)

Final version published May 2024. Review alongside DoD ODP guidance for forward-looking gap analysis and architectural planning.

DoD CIO CMMC Program Office

Official source for all CMMC policy, FAQs, assessment guides, and phase implementation documentation.

SPRS Portal

Where SPRS scores are filed and maintained — verify your score is current, accurate, and supported by documented evidence before your next solicitation cycle.

Federal Register — DoD DFARS Rules

Monitor for Section 866 implementation rulemaking and DFARS cybersecurity clause updates. Set up email alerts with keyword “252.204” to catch CMMC-related changes immediately.

CMMC Assessment Guide — Level 2 (v2.13)

DoD’s published assessment methodology guide — use this to understand exactly how assessors evaluate your controls and what evidence they will ask to see.

B. Practical Accelerators and Time-Saving Tools

CISA Cybersecurity Performance Goals (CPGs)

Prioritized cybersecurity practices mapped to common CMMC assessment failure points — use as a remediation sequencing guide to address highest-probability gaps first.

NIST SP 800-171A Rev 3 Assessment Procedures

The companion assessment procedures guide to Rev 3 — reviewing the assessment methods now prepares your evidence strategy and documentation approach for the upcoming transition.

Cyber AB C3PAO Marketplace

Directory of accredited C3PAOs for Level 2 assessments including current scheduling availability — use now for early scheduling before Q3 2026 assessment capacity tightens further.

MITRE ATT&CK for ICS

Maps known adversary TTPs to defense manufacturing and supply chain environments — directly supports IR planning and technical control prioritization against nation-state threat actor profiles targeting the DIB.

 

Additional Recommended Reading

Pentagon Begins Enforcing CMMC Compliance, But Readiness Gaps Remain

DefenseScoop, November 2025 — Real-world enforcement observations from the Phase 1 launch period, including the readiness gap data underlying the -12 average SPRS score finding.

Key Cybersecurity Takeaways from the 2026 NDAA

CSO Online — Comprehensive breakdown of Section 866 harmonization and other contractor-relevant NDAA cybersecurity provisions with implementation timeline analysis.

Threats to the Defense Industrial Base

Google Cloud Threat Intelligence, February 2026 — Current analysis of nation-state and criminal targeting of the DIB, including the operational disruption strategy shift away from traditional espionage.

DoD Finalizes CMMC Rules, Adding Cybersecurity and False Claims Act Compliance Risks

Morgan Lewis, October 2025 — Legal analysis of FCA exposure in CMMC self-certification and supply chain flow-down contexts; essential reading for prime contractor legal and compliance teams.

The Future of CMMC: What to Expect in 2026 and Beyond

IBSS Corp — Forward-looking analysis of CMMC implementation trajectory, Phase 2 timeline implications, and contractor preparation strategies heading into the enforcement ramp.

CMMC & Cybersecurity Intelligence Brief is published weekly by Agility Development Group.

Content is based on publicly available information from authoritative government, regulatory, and industry sources.

This brief does not constitute legal or compliance advice. Consult qualified compliance professionals for guidance specific to your environment.

🔒 Subscribe to this brief  —  agility-grp.com/cmmc_brief

Feedback or unsubscribe: info@agility-grp.com

Week of February 24, 2026  |  Issue No. 05  |  © 2026 Agility Development Group

Share the Post:

Join Our Newsletter

Name