The Pentagon Just Made Cybersecurity a Gating Requirement for Defense Funding. Most Small Businesses Aren't Ready.

March 13, 2026 · 7 min read

Arthur Griffin

More than 220,000 companies and subcontractors work within the Defense Industrial Base. As of November 2025, every one of them faces a new contractual obligation that did not exist a year ago: prove your cybersecurity posture meets the Department of Defense's Cybersecurity Maturity Model Certification — CMMC 2.0 — or lose access to defense contracts, SBIR awards, and research funding.

The timing is pointed. Congress just reauthorized the SBIR/STTR programs through 2031, reopening billions in annual small business innovation funding after a five-month lapse. The Pentagon's own APFIT program is channeling up to $1 billion toward defense startups. But alongside all that new money comes a compliance requirement that many small businesses — especially first-time SBIR applicants and university research labs — have never encountered and are not prepared to meet.

CMMC is not a suggestion. It is a contract clause, codified under 32 CFR Part 170 and enforced through DFARS 252.204-7021. Beginning November 2026, DoD will start inserting Level 2 certification requirements into applicable solicitations. Companies that cannot demonstrate compliance will not be eligible to bid.

What CMMC Actually Requires

The framework has three levels, each mapping to a different tier of information sensitivity.

Level 1 (Foundational) covers Federal Contract Information — the basic data generated in the course of performing a government contract. It requires 17 cybersecurity practices drawn from FAR 52.204-21, things like access control, identification procedures, and media protection. Compliance is self-assessed annually, with a senior leader signing an affirmation that the company meets the requirements. For companies already handling FCI responsibly, Level 1 is straightforward.

Level 2 (Advanced) is where the real compliance burden lives. It applies to any company handling Controlled Unclassified Information — technical data, engineering drawings, test results, operational plans, and the kind of research output that SBIR performers routinely generate. Level 2 requires full implementation of all 110 security controls in NIST SP 800-171, covering everything from multi-factor authentication and encrypted communications to incident response plans and continuous monitoring. For some contracts, self-assessment suffices. For others — and this is the critical change arriving in November 2026 — the DoD will require third-party assessment by a Certified Third-Party Assessment Organization (C3PAO).

Level 3 (Expert) adds 24 controls from NIST SP 800-172 and requires government-led assessment. It applies to programs involving the most sensitive CUI and, for now, affects a relatively small number of contractors. But DoD has discretion to expand Level 3 requirements, and the programs it covers tend to be the ones generating the most innovative — and most sensitive — research.

The scoring system is not pass-fail in the binary sense. Contractors must achieve a minimum of 88 out of 110 points — 80 percent compliance. But any unmet controls must be documented in a Plan of Action and Milestones (POA&M) that specifies remediation timelines. At Level 1, POA&Ms are not permitted at all — you either meet all 17 controls or you do not.

Why This Hits SBIR Winners Especially Hard

A five-person biotech startup that just won a Phase I SBIR from the Army does not typically have a Chief Information Security Officer, a System Security Plan, or an incident response team. It has a lab, a prototype, and a shared Google Drive. Under CMMC 2.0, that company now needs to demonstrate compliance with up to 110 security controls before it can move to Phase II — or before the contracting officer will even include it in the next solicitation.

The cost estimates are sobering. Industry analyses peg annual compliance costs for small businesses at $20,000 to $40,000 — and that is for companies with relatively clean environments. Organizations with multiple information systems, remote workers, or cloud environments that touch CUI can easily exceed $100,000. Third-party C3PAO assessments add another $30,000 to $100,000, depending on scope and complexity.

For context, a typical DoD SBIR Phase I award is $275,000 over six to twelve months. Spending $40,000 to $100,000 on cybersecurity compliance before you even submit the proposal changes the economics of participation entirely. And the reauthorization's new Strategic Breakthrough Awards — offering up to $30 million for mature technologies — will almost certainly require Level 2 or higher certification, given the sensitivity of the research they fund.

University research labs face a parallel challenge. Principal investigators running DoD-funded research through university IT infrastructure must navigate institutional compliance frameworks that may or may not satisfy CMMC requirements. Many universities are still working through their NIST 800-171 implementations. A lab that receives CUI as part of a defense research contract inherits the full compliance burden — and the False Claims Act liability if the university's self-assessment proves inaccurate.

The False Claims Act Problem

This is the part of CMMC 2.0 that should keep compliance officers awake. Every self-assessment under the framework requires a senior leader to affirm the company's compliance score in the Supplier Performance Risk System (SPRS). That affirmation is a representation to the federal government. If the score is inaccurate — whether through negligence, misunderstanding, or deliberate misstatement — the company is exposed to False Claims Act liability.

The Department of Justice has already signaled its intent to pursue cybersecurity fraud. In October 2021, DOJ launched the Civil Cyber-Fraud Initiative specifically to use the False Claims Act against contractors who misrepresent their cybersecurity posture. Since then, DOJ has secured settlements and judgments in multiple cases involving contractors who certified NIST 800-171 compliance but could not demonstrate it.

The penalties are not theoretical. False Claims Act violations carry treble damages plus per-claim penalties currently exceeding $13,000 per false claim. For a company that certified compliance across multiple contracts, the exposure multiplies rapidly. And whistleblower provisions incentivize current and former employees to report noncompliance — the whistleblower receives 15 to 30 percent of any recovery.

For small businesses accustomed to self-certifying compliance through checkbox attestations, CMMC 2.0 transforms that checkbox into a legal assertion with real consequences. The days of aspirational compliance are over.

The Implementation Timeline

Phase 1 is already active. Since November 2025, DoD has been inserting Level 1 and Level 2 self-assessment requirements into new contracts. Companies bidding on current solicitations should already be encountering the DFARS clause.

Phase 2 begins in November 2026, when Level 2 third-party assessments start appearing in applicable contracts. Level 3 government-led assessments will also begin rolling into select programs.

Phase 3, expected to run through 2028, expands the reach of third-party assessments across a broader set of contracts. By the time the phase-in is complete, virtually every DoD contract involving CUI will require certified compliance.

The pipeline for C3PAO assessments is already strained. The CMMC Accreditation Body (known as the Cyber AB) has certified a limited number of assessment organizations, and demand is growing faster than supply. Companies that wait until they see the clause in a solicitation to begin their compliance journey will find themselves at the back of a long line — potentially missing proposal deadlines because they cannot demonstrate certification in time.

What Defense-Funded Researchers Should Do Now

First, determine your CMMC level. If your contract involves only FCI, Level 1 may suffice. If you handle any CUI — and most SBIR Phase II performers do — you need Level 2. If you are unsure, look at your contract's Distribution Statement or ask your Contracting Officer's Representative. The single biggest mistake companies make is assuming they do not handle CUI when they do.

Second, conduct a gap assessment against NIST 800-171. The 110 controls are publicly available. Map your current security posture against each one. Document what you have, what you lack, and what needs remediation. This gap assessment is the foundation of your System Security Plan and your POA&M.

Third, budget for compliance. Factor CMMC costs into your overhead rates and indirect cost proposals. The Defense Contract Audit Agency recognizes cybersecurity compliance as an allowable cost — build it into your rate structure so the government shares the burden rather than your margin absorbing it.

Fourth, engage a C3PAO early if you anticipate needing third-party assessment. The assessment pipeline has capacity constraints, and scheduling lead times of three to six months are common. If you know your next Phase II proposal will require Level 2 certification, start the process now.

Fifth, separate CUI from everything else. Many small businesses can simplify their compliance posture dramatically by isolating CUI-handling systems into a defined enclave — a specific set of computers, networks, and storage that meets NIST 800-171, rather than trying to bring the entire corporate IT environment into compliance. Cloud-based solutions like Microsoft GCC High and AWS GovCloud are purpose-built for this.

The Bigger Picture

CMMC 2.0 is part of a broader pattern in federal funding: the compliance burden on recipients is expanding dramatically, even as Congress works to increase the funding itself. The SBIR reauthorization through 2031 opens new pathways for small businesses. The Strategic Breakthrough Awards create a new category of high-value defense innovation funding. But every one of those pathways now runs through a cybersecurity compliance gate that did not exist two years ago.

The companies that will thrive in this environment are the ones treating cybersecurity not as an obstacle to funding but as competitive infrastructure — the same way they treat SAM.gov registration or DCAA-compliant accounting systems. CMMC compliance is becoming table stakes for defense innovation, and the organizations that invest in it early will have a structural advantage over those scrambling to catch up when the clause appears in their next solicitation.

For anyone navigating these requirements alongside new SBIR opportunities, tools like Granted can help identify which defense funding programs are reopening post-reauthorization and how to align your proposals with agency priorities — so the cybersecurity compliance investment pays off faster.

Get AI Grants Delivered Weekly

New funding opportunities, deadline alerts, and grant writing tips every Tuesday.

Browse all DARPA grants

More DARPA Articles

Not sure which grants to apply for?

Use our free grant finder to search active federal funding opportunities by agency, eligibility, and deadline.

Find Grants

Ready to write your next grant?

Draft your proposal with Granted AI. Win a grant in 12 months or get a full refund.

Backed by the Granted Guarantee