What I Consistently Observe Across Organizations Beginning CMMC
Across multiple organizations I’ve worked with, the initial phase of the cybersecurity Maturity Model Certification journey tends to follow a predictable pattern:
A gap assessment is completed, policies are drafted or updated, a score is submitted into the supplier Performance Risk System, and teams begin preparing for a future assessment.
At that point, progress often slows—not due to lack of effort, but due to a fundamental realization:
CMMC is not a compliance exercise. It is an operational model.
The requirement is not simply to establish controls, but to ensure those controls are consistently enforced, continuously monitored, and demonstrable at any point in time.
1. Control Familiarity vs. Control Maturity
One of the most common gaps I encounter is the assumption that familiarity with controls equates to implementation.
Organizations review requirements from
NIST SP 800-171 and conclude they are compliant. However, when examined more closely, key questions remain unanswered:
- Which specific systems enforce this control?
- Is the control applied consistently across all relevant environments?
- Who is accountable for its maintenance and validation?
- What objective evidence demonstrates ongoing effectiveness?
In governance terms, a control that cannot be clearly mapped, owned, and evidenced cannot be considered fully implemented.
2. Translating Controls into Operational Reality
CMMC controls are intentionally written at a high level. The complexity arises in translating those requirements into real-world technical environments. In practice, this translation is where most control gaps emerge. Take, for example, account lockout requirements:
An organization may assert that lockout thresholds are configured. Yet deeper analysis often reveals:
- Inconsistent enforcement across systems (cloud platforms, VPN, endpoints)
- Administrative or helpdesk bypass mechanisms
- Lack of standardized configuration baselines
From an assessment standpoint, this inconsistency introduces risk and may result in a control being evaluated as not met.
The issue is rarely the absence of capability—it is the absence of uniform implementation and validation.
3. Control Ownership as a Governance Function
A recurring root cause across environments is the lack of defined control ownership.
In many cases:
- IT teams deploy and manage tools
- Compliance teams document requirements
- Security teams assume controls are functioning as intended
However, without clearly assigned ownership, controls degrade over time.
Effective governance requires:
- A technical owner responsible for implementation and maintenance
- A business owner accountable for risk acceptance and oversight
- A validation function to periodically verify control effectiveness
When ownership is formalized, organizations typically see rapid improvement in both control maturity and audit readiness.
4. Evidence as an Output of Operations
Another common challenge is the treatment of evidence as a separate, end-stage activity.
Organizations often attempt to compile artifacts immediately prior to an assessment. This approach is neither efficient nor sustainable.
In well-governed environments:
- Evidence is generated organically through normal operations
- Logs are routinely reviewed and retained
- Access reviews are conducted and documented
- Configuration changes are tracked through formal processes
In other words, evidence is not created for the audit—it is produced by the operation itself.
When evidence is difficult to obtain, it is often an indicator that the control is not functioning as intended.
5. The Risk of Partial Implementation
One of the most critical misconceptions is that partial implementation is acceptable. From an assessment perspective, it is not.
Consider multi-factor authentication: an organization may deploy MFA across primary systems, yet omit enforcement on VPN access, legacy platforms, or service accounts.
Despite significant progress, this inconsistency results in a control that is not fully satisfied. CMMC does not evaluate intent or progress—it evaluates completeness and consistency.
6. Prioritizing High-Impact Control Areas
Certain control families consistently present higher implementation challenges and carry greater risk:
- Identity and access management (including MFA enforcement)
- Network boundary definition and segmentation
- Encryption and validation of cryptographic mechanisms
- Logging, monitoring, and review processes
These areas have a direct impact on both an organization’s, supplier Performance Risk System score and its readiness for an independent assessment conducted by a C3PAO.
Addressing these domains early significantly reduces downstream remediation effort.
7. From Project Mindset to Operational Discipline
Organizations that struggle with CMMC typically approach it as a finite project. Organizations that succeed treat it as an ongoing operational discipline. This distinction is critical.
A sustainable approach includes:
- Continuous monitoring of control effectiveness
- Periodic internal validation aligned with assessment objectives
- Ongoing training and awareness across teams
- Adaptation of controls as systems and risks evolve
Under this model, readiness is not an event—it is a steady state.
Conclusion: Operationalizing Compliance
From a governance perspective, the transition required by CMMC is not primarily technical—it is structural and operational.
Success is not determined by the existence of controls, but by the organization’s ability to:
- Integrate those controls into daily operations
- Maintain consistent enforcement
- Produce clear, objective evidence of effectiveness
Your submission to the Supplier Performance Risk System may reflect your intended posture. Your assessment by a
C3PAO under Cybersecurity Maturity Model Certification will reflect your actual operational reality.
Those two should align, but often do not without deliberate effort.

Sofia Nabiha Herradi
CMMC & AI Governance | NIST 800-171 | L.L.B. (Bachelor of Laws) CISM.CISA.CMMC-CCP
Helping organizations operationalize compliance and prepare for real-world assessments.
