Templates Government Contracts CMMC 2.0 Compliance Attestation (Level 1/2)

CMMC 2.0 Compliance Attestation (Level 1/2)

Ready to Edit

CMMC 2.0 Compliance Attestation

Contractor Information

Field Entry
Legal Business Name [________________________________]
CAGE Code [________________]
UEI [________________]
DUNS Number [________________]
Primary NAICS Code(s) [________________]
Principal Office Address [________________________________]
City, State, ZIP [________________________________]
Point of Contact Name [________________________________]
POC Title [________________________________]
POC Email [________________________________]
POC Phone [________________________________]

Contract/Proposal Identification

Field Entry
Solicitation Number [________________________________]
Contract Number (if awarded) [________________________________]
Contract Line Item Number(s) (CLINs) requiring CMMC [________________________________]
Contracting Officer [________________________________]
Program/Contract Title [________________________________]
Estimated Contract Value [________________________________]

CMMC Level Required

Select the applicable CMMC level for this contract/proposal:

Level 1 (Federal Contract Information – FCI)

  • 17 foundational NIST SP 800-171 Rev. 2 controls
  • Compliance method: Annual self-assessment
  • No C3PAO assessment required

Level 2 (Controlled Unclassified Information – CUI)

  • 110 NIST SP 800-171 Rev. 2 controls
  • Compliance method: C3PAO certified assessment OR self-attestation (permitted at this level)
  • Assessment validity: 3 years

Level 3 (High-Value CUI/National Security)

  • 110 NIST SP 800-171 Rev. 2 controls + 24 NIST SP 800-172 advanced controls
  • Compliance method: DIBCAC (Defense Industrial Base Cybersecurity Assessment Center) assessment only
  • Assessment validity: 3 years

SPRS Score Current Status

Metric Value
Current NIST SP 800-171 Assessment Score [____] / 110
Assessment Date [__/__/____]
Assessment Method ☐ Self-Assessment ☐ C3PAO Assessment ☐ DIBCAC Assessment
Assessed By (name of C3PAO or assessor) [________________________________]
Assessment Report Identifier [________________________________]

Senior Official Acknowledgment

By signing this attestation, the undersigned Senior Agency Official (SAO) certifies and acknowledges:

The undersigned individual, identified below as the Senior Agency Official for this organization, has reviewed and verified the accuracy of this CMMC 2.0 Compliance Attestation.

Senior Agency Official Information:

Field Entry
Name [________________________________]
Title [________________________________]
Organization [________________________________]
Email [________________________________]
Phone [________________________________]

Truthful Affirmation

Under penalty of perjury, I affirm that:

  1. The statements and representations contained in this attestation are true, accurate, and complete to the best of my knowledge and belief.

  2. I am authorized to make this attestation on behalf of the contractor organization.

  3. The contractor organization understands that false, incomplete, or inaccurate statements or omissions in this attestation may result in:
    - Suspension or debarment from federal contracting
    - Liability under the False Claims Act (31 U.S.C. § 3729 et seq.)
    - Criminal prosecution under 18 U.S.C. § 1001 (false statements to federal agencies)
    - Contract termination and potential damages

  4. The cybersecurity controls identified in this attestation have been implemented and are maintained in accordance with NIST SP 800-171 Rev. 2 and DFARS cybersecurity requirements.

  5. Any subcontractors and suppliers have been notified of CMMC requirements and must maintain compliance at the level specified in this attestation or higher.


Scope of Assessment

Covered Contractor Information System (CCIS) Boundary

Description of systems and networks subject to this attestation:

[________________________________________________________________________________________________________________________________________________________________]

Date CCIS was established/last modified: [__/__/____]

CUI Handling Enclaves

The following enclaves handle Controlled Unclassified Information (CUI):

Enclave Name Location Primary Function CUI Classification(s)
[____________________] [____________________] [____________________] [____________________]
[____________________] [____________________] [____________________] [____________________]
[____________________] [____________________] [____________________] [____________________]

FCI Handling

☐ The contractor handles Federal Contract Information (FCI) as follows:

[________________________________________________________________________________________________________________________________________________________________]

FCI storage location(s): [________________________________]

Cloud Service Providers (CSPs)

☐ Yes, cloud services are used to support CCIS

CSP Name Service Type FedRAMP Authorization P-ATO Date
[____________________] [____________________] ☐ Moderate ☐ High [__/__/____]
[____________________] [____________________] ☐ Moderate ☐ High [__/__/____]

Note: Per DFARS 252.204-7012, any CSP handling CUI or FCI must maintain FedRAMP Moderate or equivalent authorization.


Level 1 (FCI) – 17 Foundational Controls

The following 17 NIST SP 800-171 Rev. 2 controls have been implemented and are maintained in compliance:

Access Control (AC) – 4 Controls

AC.L1-3.1.1 Authorize access to CUI (Access Control Policy)

AC.L1-3.1.2 Enforce access authorization per least privilege (Access Control Implementation)

AC.L1-3.1.20 Revoke access permissions (Access Control – Privilege Revocation)

AC.L1-3.1.22 Review system access for compliance (Access Control – Review & Audit)

Identification and Authentication (IA) – 2 Controls

IA.L1-3.5.1 Authenticate users/devices (Authentication Implementation)

IA.L1-3.5.2 Use multi-factor authentication where feasible (MFA – Recommended at FCI Level)

Media Protection (MP) – 1 Control

MP.L1-3.8.3 Sanitize media before disposal (Media Sanitization)

Physical Protection (PE) – 5 Controls

PE.L1-3.10.1 Control physical access to facilities (Physical Access Control)

PE.L1-3.10.3 Protect electronic equipment from damage/theft (Physical Security – Equipment)

PE.L1-3.10.4 Protect information in transit (Physical Security – Information)

PE.L1-3.10.5 Control physical access at the perimeter (Perimeter Physical Security)

System & Communications Protection (SC) – 2 Controls

SC.L1-3.13.1 Implement boundary protection (Network Boundary Protection)

SC.L1-3.13.5 Protect information in transit (Communications Protection)

System & Information Integrity (SI) – 3 Controls

SI.L1-3.14.1 Implement malware protections (Malware Detection & Prevention)

SI.L1-3.14.2 Monitor system behavior (System Monitoring)

SI.L1-3.14.4 Update/patch systems timely (Software/Firmware Updates)

SI.L1-3.14.5 Maintain system media inventory (Media Management)


Level 2 (CUI) – 110 Controls Summary

The following 110 NIST SP 800-171 Rev. 2 controls are implemented and maintained. Compliance status by control family:

Control Family Total Controls Compliant Partial Non-Compliant POA&M Required
AC – Access Control 22 [____] [____] [____]
AT – Awareness & Training 7 [____] [____] [____]
AU – Audit & Accountability 13 [____] [____] [____]
CM – Configuration Management 7 [____] [____] [____]
IA – Identification & Authentication 6 [____] [____] [____]
IR – Incident Response 8 [____] [____] [____]
MA – Maintenance 4 [____] [____] [____]
MP – Media Protection 3 [____] [____] [____]
PE – Physical Protection 8 [____] [____] [____]
PS – Personnel Security 7 [____] [____] [____]
PM – Program Management 3 [____] [____] [____]
RA – Risk Assessment 4 [____] [____] [____]
SA – System & Services Acquisition 15 [____] [____] [____]
SC – System & Communications Protection 20 [____] [____] [____]
SI – System & Information Integrity 12 [____] [____] [____]
TOTAL 110 [____] [____] [____]

Plans of Action & Milestones (POA&Ms)

Any Level 2 controls not fully implemented must be addressed via a POA&M with a maximum remediation timeline of 180 calendar days.

Non-Compliant Control Inventory

Control ID Family Control Title Remediation Target Date Responsible Party Status
[__________] [____] [____________________] [__/__/____] [____________________] ☐ Open ☐ In Progress
[__________] [____] [____________________] [__/__/____] [____________________] ☐ Open ☐ In Progress
[__________] [____] [____________________] [__/__/____] [____________________] ☐ Open ☐ In Progress

Attached: ☐ Detailed POA&M document (separate file)


System Security Plan (SSP) Status

Field Entry
Current SSP Revision Version [____]
SSP Last Updated [__/__/____]
SSP Covers Period Through [__/__/____]
SSP Maintained By [________________________________]
SSP Review Frequency ☐ Annually ☐ Semi-Annually ☐ Quarterly ☐ Continuous
Next Scheduled Review [__/__/____]

SSP includes:

☐ System description and CCIS boundary documentation

☐ Inventory of information systems and hardware

☐ Network architecture diagram(s)

☐ NIST SP 800-171 control implementation narrative for each control

☐ Risk assessment findings and mitigations

☐ Incident response plan

☐ Continuous monitoring procedures


Incident Reporting Commitment

The contractor commits to:

  1. Notification Requirement: Notify the Contracting Officer and Cybersecurity Incident Notification Center (CINC) within 72 hours of discovery of any incident involving compromise, loss, or suspected compromise of CUI or FCI per DFARS 252.204-7012.

  2. Incident Response: Maintain and implement an Incident Response Plan (IRP) that includes:
    - Incident detection and classification procedures
    - Escalation and notification protocols
    - Forensic preservation and evidence handling
    - Recovery and remediation timelines
    - Lessons learned / continuous improvement

  3. Reporting Contact:

Field Entry
Incident Response POC [________________________________]
Emergency Email [________________________________]
Emergency Phone (24/7) [________________________________]
  1. Post-Incident Activities: Provide incident reports within 30 days of detection, including root cause analysis, impact assessment, and corrective actions.

Subcontractor Flow-Down Plan

DFARS 252.204-7021 requires flow-down of CMMC requirements to all subcontractors handling CUI or FCI.

Subcontractor Management

Subcontractor Name CAGE/UEI CMMC Level Required Subcontract Value Compliance Verified Target Assessment Date
[____________________] [__________] ☐ L1 ☐ L2 ☐ L3 [____________________] ☐ Yes ☐ No [__/__/____]
[____________________] [__________] ☐ L1 ☐ L2 ☐ L3 [____________________] ☐ Yes ☐ No [__/__/____]
[____________________] [__________] ☐ L1 ☐ L2 ☐ L3 [____________________] ☐ Yes ☐ No [__/__/____]

Key Commitments:

☐ No subcontract will be issued below the CMMC level specified above.

☐ Subcontracts include flowdown of DFARS 252.204-7012, 7019, 7020, and 7021 clauses.

☐ Subcontractors must maintain independent compliance documentation and pass subcontractor assessments.

☐ Subcontractor compliance is verified quarterly or upon significant system changes.

Subcontractor Oversight POC: [________________________________]


Supply Chain Risk Management (SCRM)

Federal Acquisition Regulation (FAR) § 889 Part B Compliance

The contractor certifies that:

  1. ☐ It does not use or support the use of products or services supplied by Huawei Technologies Company, ZTE Corporation, Kaspersky Lab, or their subsidiaries/affiliates.

  2. ☐ It has reviewed supply chain for prohibited Chinese telecommunications equipment and does not install, maintain, or use such equipment in the CCIS.

  3. ☐ It will not knowingly use vendors that fail to comply with § 889 Part B restrictions.

Software Bill of Materials (SBOM) & Third-Party Risk

☐ The contractor maintains a current Software Bill of Materials (SBOM) identifying all third-party and open-source components in the CCIS.

☐ Third-party software is evaluated for known vulnerabilities and licensing compliance.

☐ Supply chain risks are assessed annually and documented in the System Security Plan.


Affirmation and Signature Block

Final Certification

I, the undersigned Senior Agency Official, certify under penalty of perjury (18 U.S.C. § 1001) that:

  • All information contained in this CMMC 2.0 Compliance Attestation is true and accurate.
  • The contractor organization has implemented and maintains the cybersecurity controls stated herein.
  • All subcontractors have been notified of CMMC requirements and are in compliance or on an approved remediation schedule.
  • The organization understands the legal consequences of false attestation.
Field Entry
Senior Official Name (Print) [________________________________]
Title [________________________________]
Authorized Signature [________________________________]
Date Signed [__/__/____]
Organization Name [________________________________]

Witness (Optional but Recommended):

Field Entry
Witness Name (Print) [________________________________]
Title [________________________________]
Signature [________________________________]
Date [__/__/____]

Attachments Checklist

All referenced documents must be available for review by the Contracting Officer, Defense Counterintelligence and Security Agency (DCSA), or authorized assessors.

System Security Plan (SSP) – Current version with all NIST SP 800-171 Rev. 2 controls mapped

Plan of Action & Milestones (POA&M) – If applicable; all non-compliant controls with remediation dates

Risk Assessment Report – Current organizational risk assessment or system-specific risk analysis

Incident Response Plan (IRP) – Procedures for detection, reporting, and remediation

Information Security Training Records – Personnel training completion documentation (AT controls)

Audit/Compliance Evidence – System logs, configuration baselines, access control lists, or assessment reports

Cloud Service Provider Documentation – FedRAMP Authorizations and Shared Responsibility Matrices (if CSPs are used)

Supply Chain Risk Assessment – Third-party software inventory, vulnerability assessments, and § 889 Part B certification

Subcontractor Attestations – Flow-down compliance documentation from subcontractors

Continuous Monitoring Plan – Schedule and procedures for ongoing compliance verification


Notes & Guidance

Definitions

CCIS (Covered Contractor Information System): The information system(s) used to process, store, or transmit CUI or FCI per the contract.

CUI (Controlled Unclassified Information): Unclassified information that requires safeguarding or dissemination controls per Executive Order 13556.

FCI (Federal Contract Information): Unclassified information related to the contract that is not intended for public release.

POA&M (Plan of Action & Milestone): A documented plan to remediate non-compliant controls within 180 days.

CMMC Level: The cybersecurity maturity level required by contract (Level 1, 2, or 3).

C3PAO: Certified Third-Party Assessor Organization authorized to conduct CMMC assessments.

DIBCAC: Defense Industrial Base Cybersecurity Assessment Center; conducts Level 3 assessments.

Important Notes

  1. Truthfulness: This attestation is legally binding. False statements subject the organization to criminal prosecution and civil penalties.

  2. Ongoing Compliance: CMMC compliance is not a one-time certification. Organizations must maintain continuous compliance and update this attestation as systems and controls evolve.

  3. Assessment Validity: Successful C3PAO or DIBCAC assessments are valid for 3 years. Self-assessments (Level 1) must be renewed annually.

  4. No Retroactive Exemptions: CMMC effective date is December 16, 2024. All affected contracts subject to this attestation must demonstrate compliance by that date or as specified in the contract.

  5. Subcontractor Responsibility: The prime contractor is responsible for ensuring subcontractor compliance. Non-compliant subcontractors create risk for the prime contractor and may result in contract termination.


Sources and References

Regulatory Authority

DFARS Clauses

  • DFARS 252.204-7012 – Safeguarding Covered Unclassified Information and Cyber Incident Reporting (72-hour notification)
  • DFARS 252.204-7019 – Notification of CMMC Requirement
  • DFARS 252.204-7020 – CMMC Compliance or Applicability – Waiver Request
  • DFARS 252.204-7021 – Cybersecurity Maturity Model Certification Requirements (subcontractor flow-down)

Resources


Document Control: This attestation should be retained for the duration of the contract plus 3 years. Updates are required upon significant system changes, subcontractor changes, or expiration of valid assessments.

Ezel AI
Hi! Need help customizing this document? I can tailor every section to your specific case in minutes.
AI Legal Assistant
Ezel AI
Hi! Need help customizing this document? I can tailor every section to your specific case in minutes.

Insert Image

Insert Table

Watch Ezel in action (sample case)

All changes saved
Save
Export
Export as DOCX
Export as PDF
Generating PDF...
cmmc_compliance_attestation_universal.pdf
Ready to export as PDF or Word
AI is editing...
Chat
Review

Customize this document with Ezel

  • Deep Legal Knowledge
    Understands case law, statutes, and legal doctrine.
  • Court-Ready Formatting
    Proper captions, certificates of service, and local rule compliance.
  • AI-Powered Editing on Your Timeline
    Edit as many times as you need. Tailor every section to your specific case.
  • Export as PDF & Word
    Download your finished document in professional PDF or DOCX format, ready to file or send.
Secure checkout via Stripe
Need to customize this document?

About This Template

Government contracting is its own body of law, with federal acquisition regulations and state procurement rules that override standard commercial contract practices. Bid protests, proposals, and compliance submissions have tight deadlines measured in days, not months. The paperwork has to be exact, because a misfiled bid or a missed page limit can disqualify a contractor from a multi-million dollar opportunity.

Important Notice

This template is provided for informational purposes. It is not legal advice. We recommend having an attorney review any legal document before signing, especially for high-value or complex matters.

Last updated: April 2026