Reading view

There are new articles available, click to refresh the page.

CMMC DFARS clause explained: The KO’s checklist contractors never see

If you only read the contract clause, you’re missing the playbook.

As of Nov. 10, the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7021, also known as the “Cybersecurity Maturity Model Certification [CMMC] clause,” is now in effect. With implementation officially underway, contractors are under pressure to understand not only what 7021 demands of them, but also what contracting officers (KOs) are required to do behind the scenes. Those instructions, which are buried in DFARS subpart 204.75, tell KOs when to include 7021, when they cannot award, and what they must verify before exercising options or extending a period of performance.

Contractors often treat 7021 as a black box dropped into their contracts. Now that the clause is active across new awards, KOs are following explicit procedures you never see. Understanding those procedures gives you visibility into how requirements are determined, enforced and sustained over the life of your award.

Where 7021 really comes from — and what KOs must do

The CMMC clause doesn’t appear in your contracts out of nowhere. It’s part of a stack. At the top is 32 CFR Part 170, the Defense Department’s CMMC program policy (effective Dec. 2024). DFARS 204.75 translates that policy into concrete guidance for contracting officers: policy, procedures and instructions on when to use the clause. You see it in practice as DFARS 252.204-7021, paired with 252.204-7025. DFARS 204.7500-7501 set the scope and definitions. The point is that DFARS isn’t inventing anything new; it’s carrying out CMMC program policy and telling KOs how to enforce it.

The KO instructions are unambiguous. Under DFARS 204.7502, a KO shall insert the required CMMC level when the program office or requiring activity tells them to. The KO doesn’t decide the level, as that comes from the program office based on the data and mission, but they are responsible for putting it into your contract language. Just as clearly, KOs shall not award a contract, task order or delivery order to an offeror without a current CMMC status at the required level.

Two qualifiers matter. First, “CMMC status” doesn’t mean “in progress.” It means you’ve achieved the minimum required score for the assessment, and your status is recognized (self or third-party; final or — at Levels 2 and 3 — conditional). Second, “current” matters. Status is generally valid for three years, and you must maintain it for the life of the award.

To make sense of this, it helps to decode what “status” really means at each level:

  • Level 1: Only a final self-assessment counts and no plans of actions and milestones (POA&Ms) are allowed.
  • Level 2: Can be self- or certified third-party assessor organization (C3PAO)- assessed, in either final or conditional status.
  • Level 3: Always a government assessment — Defense Industrial Base Cybersecurity Assessment Center (DIBCAC) — which can be final or conditional.

KOs may award if your status is final or conditional at Level 2 or 3, provided it meets the required level in the solicitation and any open items are limited to those allowed by 32 CFR §170.21. But conditional status is time bound: 180 days from the status date. If you achieved conditional four months ago and bid today, you’ve only got about 60 days left to close those POA&Ms. There is no conditional path for Level 1.

The message is clear: While conditional paths exist, they are narrow and tightly limited.

The SPRS/UID reality check

Before a KO awards, extends or exercises an option, they verify your status in the Supplier Performance Risk System (SPRS) using your 10-character alphanumeric CMMC Unique Identifier (UID), which is tied to the specific system or enclave that was assessed. This binding matters. The government wants traceability from the contract to the exact enclave processing its data. If your UID points to System A, but CUI ends up in System B, you’ve created a mismatch with contractual — and potentially False Claims Act — implications. Keep your boundary, documentation and operational reality aligned to the UID you present.

This KO check isn’t one-and-done. KOs verify at initial award, again at option exercise or performance extensions, and again if you introduce a new UID mid-performance (for example, after a significant scope change requiring a new assessment). If your status isn’t current at any of those points, the instruction is simple: no award, or no option for extension.

When 7021 must be used — and when it isn’t

The rule is now active, placing us in the phased rollout period that runs through Nov.9, 2028. During this stage, DFARS 204.7504 requires KOs to insert 7021 whenever the program office identifies a CMMC level and no waiver applies. Waivers remain rare and are issued only at the contract level, not as carve-outs for individual contractors.

When the rollout ends on Nov. 10, 2028, the requirement broadens: 7021 must appear in any contract involving the processing, storage or transmission of federal contract information (FCI) or CUI, unless formally waived. Wherever 7021 is used, 7025 follows to ensure all offerors see the requirement before bidding.

What this means for the contractor

Contractors should assume that KOs are already verifying CMMC status in SPRS today, not at some future point. Here’s how the KO’s world translates into your action list:

  • Don’t “strategy-bet” on KO discretion: The KO isn’t picking your level. The program office is. The KO’s job is execution and verification under “shall” language.
  • Know your status category and the timeline: If you’re planning to bid with conditional Level 2, track the 180-day closeout window from your status date. Build that into proposal schedules and risk plans.
  • Engineer your scope and keep it stable: Your CMMC UID binds the assessment to the specific system that will handle DoD data. Avoid unnecessary “significant change” events mid-performance that would force a new assessment/UID, unless you’ve planned for it.
  • Keep status current through the entire period of performance (PoP): Treat the three-year validity like a maintenance interval. If your status expires during performance, you’ve put option exercises and extensions at risk.
  • Map data flows to the assessed system: Ensure your CUI boundary and your assessed enclave are the same in reality, not just on paper. Align your system security plan (SSP), network diagrams, asset inventory and boundary controls to the UID’s scope.
  • Bid packages should include UID clarity: Make it easy for the KO to verify SPRS entries. Label the UID, level, status (final or conditional), status date and expiration in your cover letter or compliance matrix.
  • Have a POA&M closure plan you can execute: If conditional, your plan should show who/what/when, procurement lead times and validation steps. Assume the government will ask for evidence of progress.
  • Prepare for options early: Six months before option exercise, review your status currency, any scope drift, and whether new UIDs have appeared. Give your KO a smooth verification path.

The KO’s lens

Now that 7021 is in effect and being applied to new awards, KOs are already following the same mandatory procedures across solicitations, evaluations and option exercises. From the KO’s perspective, 7021 is not subjective. It’s a procedure backed by “shall” language: Include the required level, verify status in SPRS by UID, and do not award or extend if the status isn’t current at the required level. Conditional Level 2/3 can win you work, but only within the 180-day window and only with allowable POA&M items per policy.

By understanding the KO’s checklist, contractors can predict how requirements will appear in your contracts, anticipate when status checks will occur, and avoid surprises that might otherwise cost you awards or option years.

Jacob Horne is the chief cybersecurity evangelist at Summit 7.

The post CMMC DFARS clause explained: The KO’s checklist contractors never see first appeared on Federal News Network.

© Federal News Network

cybersecurity maturity model certification

AI may not be the federal buzzword for 2026

Let’s start with the good news: artificial intelligence may NOT be the buzzword for 2026.

What will be the most talked about federal IT and/or acquisition topic for this year remains up for debate. While AI will definitely be part of the conversation, at least some experts believe other topics will emerge over the next 12 months. These range from the Defense Department’s push for “speed to capability” to resilient innovation to workforce transformation.

Federal News Network asked a panel of former federal technology and procurement executives for their opinions what federal IT and acquisition storylines they are following over the next 12 months. If you’re interested in previous years’ predictions, here is what experts said about 20232024 and 2025.

The panelists are:

  • Jonathan Alboum, federal chief technology officer for ServiceNow and former Agriculture Department CIO.
  • Melvin Brown, vice president and chief growth officer at CANI and a former deputy CIO at the Office of Personnel Management.
  • Matthew Cornelius, managing director of federal industry at Workday and former OMB and Senate staff member.
  • Kevin Cummins, a partner with the Franklin Square Group and former Senate staff member.
  • Michael Derrios, the new executive director of the Greg and Camille Baroni Center for Government Contracting at George Mason University and former State Department senior procurement executive.
  • Julie Dunne, a principal with Monument Advocacy and former commissioner of GSA’s Federal Acquisition Service.
  • Mike Hettinger, founding principal of Hettinger Strategy Group and former House staff member.
  • Nancy Sieger, a partner at Guidehouse’s Financial Services Sector and a former IRS CIO.

What are two IT or acquisition programs/initiatives that you are watching closely for signs of progress and why?

Brown: Whether AI acquisition governance becomes standard, templates, clauses, evaluation norms, 2026 is where agencies turn OMB AI memos into repeatable acquisition artifacts, through solicitation language, assurance evidence, testing/monitoring expectations and privacy and security gates. The 2025 memos are the anchor texts. I’m watching for signals such as common clause libraries, governmentwide “minimum vendor evidence” and how agencies operationalize “responsible AI” in source selections.

The Cybersecurity Maturity Model Certification (CMMC) phased rollout and how quickly it becomes a de facto barrier to entry. Because the rollout is phased over multiple years starting in November 2025, 2026 is the first full year where you can observe how often contracting officers insert the clause and how primes enforce flow-downs. The watch signals include protest activity, supply-chain impacts and whether smaller firms get crowded out or supported.

Hettinger: Related to the GSA OneGov initiative, there’s continuing pressure on the middleman, that is to say resellers and systems integrators to deliver more value for less. This theme emerged in early 2025, but it will continue to be front and center throughout 2026. How those facing the pressure respond to the government’s interests will tell us a lot about how IT acquisition is going to change in the coming years. I’ll be watching that closely.

Mike Hettinger is president and founding principal of Hettinger Strategy Group and former staff director of the House Oversight and Government Reform Subcommittee on Government Management.

The other place to watch more broadly is how the government is going to leverage AI. If 2025 was about putting the pieces in place to buy AI tools, 2026 is going to be about how agencies are able to leverage those tools to bring efficiency and effectiveness in a host of new areas.

Cornelius: The first is watching the Hill to see if the Senate can finally get the Strengthening Agency Management and Oversight of Software Assets (SAMOSA) Act passed and to the President’s desk. While a lot of great work has already happened — and will continue to happen — at GSA around OneGov, there is only so much they can do on their own. If Congress forces agencies to do the in-depth analysis and reporting required under SAMOSA, it will empower GSA, as well as OMB and Congress, to have the type of data and insights needed to drive OneGov beyond just cost savings to more enterprise transformation outcomes for their agency customers. This would generate value at an order of magnitude beyond what they have achieved thus far.

The second is the implementation of the recent executive order that created the Genesis Mission initiative. The mission is focused on ensuring that the Energy Department and the national labs can hire the right talent and marshal the right resources to help develop the next generation of biotechnology, quantum information science, advanced manufacturing and other critical capabilities empower America’s global leadership for the next few generations. Seeing how DOE and Office of Science and Technology Policy (OSTP) partner collaboratively with industry to execute this aspirational, but necessary, nationwide effort will be revelatory and insightful.

Cummins: Will Congress reverse its recent failure to reauthorize the Technology Modernization Fund (TMF)? President Donald Trump stood up the TMF during his first term and it saw a significant funding infusion by President Joe Biden. Watching the TMF just die with a whimper will make me pessimistic about reviving the longstanding bipartisan cooperation on modernizing federal IT that existed before the Department of Government Efficiency (DOGE).

I will be closely watching how well the recently-announced Tech Force comes together. Its goal of recruiting top engineers to serve in non-partisan roles focused on technology implementation sounds a lot like the U.S. Digital Service started by President Barack Obama, which then became the U.S. DOGE Service. I would like to see Tech Force building a better government with some of the enthusiasm that DOGE showed for cutting it.

Sieger: I’m watching intensely how agencies manage the IT talent exodus triggered by DOGE-mandated workforce reductions and return-to-office requirements. The unintended consequence we’re already observing is the disproportionate loss of mid-career technologists, the people who bridge legacy systems knowledge with modern cloud and AI capabilities.

Agencies are losing their most marketable IT talent first, while retention of personnel managing critical legacy infrastructure creates technical debt time bombs. At Guidehouse, we’re fielding unprecedented requests for cybersecurity, cloud architecture and data engineering services. The question heading into 2026 is whether agencies can rebuild sustainable IT operating models or whether they become permanently dependent on contractor support, fundamentally altering the government’s long-term technology capacity.

My prediction of the real risk is that mission-critical systems are losing institutional knowledge faster than documentation or modernization can compensate. Agencies need to watch and mitigate for increased system outages, security incidents, and failed modernization projects as this workforce disruption cascades through 2026.

Sticking with the above theme, it does bear watching how the new federal Tech Force hiring initiative succeeds. The federal Tech Force initiative signals a major shift in how the federal government sources and deploys modern technology talent. As agencies bring in highly skilled technologists focused on AI, cloud, cybersecurity and agile delivery, the expectations for speed, engineering rigor and product-centric outcomes will rise. This will reshape how agencies engage industry partners, favoring firms that can operate at comparable technical and cultural velocity.

The initiative also introduces private sector thinking into government programs, influencing requirements, architectures and vendor evaluations. This creates both opportunity and pressure. Organizations aligned to modern delivery models will gain advantage, while legacy approaches may struggle to adapt. Federal Tech Force serves as an early indicator of how workforce decisions are beginning to influence acquisition approaches and modernization priorities across government.

Dunne: Title 41 acquisition reform. The House Armed Services Committee and House Oversight Committee worked together to pass a 2026 defense authorization bill out of the House with civilian or governmentwide (Title 41) acquisition reform proposals. These reform proposals in the House NDAA bill included increasing various acquisition thresholds (micro-purchase and simplified acquisition thresholds and cost accounting standards) and language on advance payments to improve buying of cloud solutions. Unfortunately, these governmentwide provisions were left out of the final NDAA agreement, leaving in some cases different rules the civilian and defense sectors. I’m hopeful that Congress will try again on governmentwide acquisition reform.

Office of Centralized Acquisition Services (OCAS). GSA launched OCAS late this year to consolidate and streamline contracting for common goods and services in accordance with the March 2025 executive order (14240). Always a good exercise to think about how to best consolidate and streamline contracting vehicles. We’ve been here before and I think OCAS has a tough mission as agencies often want to do their own thing.  If given sufficient resources and leadership attention, perhaps it will be different this time.

FedRAMP 20x. Earlier this year, GSA’s FedRAMP program management office launched FedRAMP 20x to reform the process and bring efficiencies through automation and expand the availability of cloud service provider products for agencies. All great intentions, but as we move into the next phase of the effort and into FedRAMP moderate type solutions, I hope the focus remains on the security mission and the original intent to measure once, use many times for the benefit of agencies. Also, FedRAMP authorization expires in December 2027 – which is not that far away in congressional time.

Alboum: In the coming year, I’m paying close attention to how agencies manage AI efficiency and value as they move from pilots to production. As budgets tighten, agencies need a clearer picture of which models are delivering results, which aren’t, and where investments are being duplicated.

I’m also watching enterprise acquisition and software asset management efforts. The Strengthening Agency Management and Oversight of Software Assets (SAMOSA) Act has been floating around Congress for the last few years. I’m curious to see whether it will ultimately become law. Its provisions reflect widely acknowledged best practices for controlling software spending and align with the administration’s PMA objective to “consolidate and standardize systems, while eliminating duplicative ones.” How agencies manage their software portfolios will be a crucial test of whether efficiency goals are turning into lasting structural change, or just short-term fixes.

Derrios: I’ll be watching how GSA’s OneGov initiative shapes up will be important because contract consolidation without an equal focus on demand forecasting, standardization and potential requirements aggregation may not yield the intended results. There needs to be a strong focus on acquisition planning between GSA and their federal agency customers in addition to any movement of contracts.

In 2025, the administration revamped the FAR, which hadn’t been reviewed holistically in 40 years. So in 2026, what IT/acquisition topic(s) would you like to see the administration take on that has long been overlooked and/or underappreciated for the impact change and improvements could have, and why?

Cummins: Despite the recent Trump administration emphasis on commercialization, it is still too hard for innovative companies to break into the federal market. Sometimes agencies will move mountains to urgently acquire a new technology, like we have seen recently with some artificial intelligence and drones initiatives. But a commercial IT company generally has to partner with a reseller and get third-party accreditation (CMMC, FedRAMP, etc.) just to get access to a federal customer. Moving beyond the FAR rewrite, could the government give up some of the intellectual property and other requirements that make it difficult for commercial companies to bid as a prime or sell directly to an agency outside of an other transaction agreement (OTA)? It would also be helpful to see more FedRAMP waivers for low-risk cloud services.

Cornelius: It’s been almost 50 years since foundational law and policy set the parameters we still follow today around IT accessibility. During my time in the Senate, I drafted the provision in the 2023 omnibus appropriations bill that required GSA and federal agencies to perform comprehensive assessments of accessibility compliance across all IT and digital assets throughout the government. Now, with a couple years of analysis and with many thoughtful recommendations from GSA and OMB, it is time for Congress to make critical updates in law to improve the accessibility of any capabilities the government acquires or deploys. 2026 could be a year of rare bipartisan, bicameral collaboration on digital accessibility, which could then underpin the administration’s American by Design initiative and ensure important accessibility outcomes from all vendors serving government customers are delivered and maintained effectively.

Derrios: The federal budgeting process really needs a reboot. Static budgets do not align with multi-year missions where risks are continuous, technology changes at lightning speed, and world events impact aging cost estimates. And without a real “return on investment” mentality incorporated into the budgeting process, under-performing programs with high sunk-costs will continue to be supported. But taxpayers shouldn’t have to sit through a bad movie just because they already paid for the ticket.

Brown: I’m watching how agencies continue to move toward the implementation of zero trust and how the data layer becomes the budget fight. With federal guides emphasizing data security, the 2026 question becomes, do programs converge on fewer, interoperable controls, or do they keep buying overlapping tools? My watch signals include requirements that prioritize data tagging/classification, attribute-based access, encryption/key management and auditability as “must haves” in acquisitions.

Alboum: Over the past few years, the federal government has made significant investments in customer experience and service delivery. The question now is whether those gains can be sustained amid federal staffing reductions.

Jonathan Alboum is a former chief information officer at the Agriculture Department and now federal chief technology officer for ServiceNow.

This challenge is closely tied to the “America by Design” executive order, which calls for redesigned websites where people interact with the government. A beautiful, easy-to-use website is an excellent start. However, the public expects a great end-to-end experience across all channels, which aligns directly with the administration’s PMA objective to build digital services for “real people, not bureaucracy.”

So, I’ll be watching to see if we meet these expectations by investing in AI and other technologies to lock in previous gains and improve the way we serve the public. With the proper focus, I’m confident that we can positively impact the public’s perception and trust in government.

Hettinger: Set aside the know and historic challenges with the TMF, we really do need to figure out how to more effectively buy IT at a pace consistent with the need of agencies. Maybe some of that is addressed in the FAR changes, but those are only going to take us so far (no pun intended). If we think outside the box, maybe we can find a way to make real progress in IT funding and acquisition in a way that gets the right technology tools in the hands of the right people more quickly.

Dunne: I think follow through on the initiatives launched in 2025 will be important to focus on in 2026.  The formal rulemaking process for the RFO will launch in 2026 and will be an important part of that follow through. And now that we have a confirmed Office of Federal Procurement Policy administrator, I think 2026 will be an important year for industry engagement on topics like the RFO.

Sieger: If the administration could tackle one long-overlooked issue with transformative impact, it should be the modernization of security clearances are granted, maintained and reciprocally recognized for contractor personnel supporting federal IT initiatives.

The current clearance system regularly creates 6-to-12 month delays in staffing critical IT programs, particularly in cybersecurity and AI. Agencies lose qualified contractors to private sector opportunities during lengthy adjudication periods. The lack of true clearance reciprocity means contractors moving between agency projects often restart the process, wasting resources and creating knowledge gaps on programs.

This is a strategic vulnerability. Federal IT modernization depends on contractor expertise for specialized skills government cannot hire directly. When clearance processes take longer than typical IT project phases, agencies either compromise on talent quality or delay mission-critical initiatives. The opportunity cost is measured in delayed outcomes and increased cyber risk.

Implementing continuous vetting for contractor populations, establishing true cross-agency clearance reciprocity, and creating “clearance portability” would benefit emerging technology areas such as AI, quantum, advanced cybersecurity, where talent competition is fiercest. From Guidehouse’s perspective, we see clients are repeatedly unable to staff approved projects because cleared personnel aren’t available, not because talent doesn’t exist.

This reform would have cascading benefits: faster modernization, better talent retention, reduced costs and improved security through continuous monitoring rather than point-in-time investigations.

If 2025 has been all about cost savings and efficiencies, what do you think will emerge as the buzzword of 2026?

Brown: “Speed to capability” acquisition models spreading beyond DoD. The drone scaling example is a concrete indicator of a broader push. The watch signals for me are increased use of rapid pathways, shorter contract terms, modular contracting and more frequent recompetes to keep pace with technology change.

Cornelius: Governmentwide human resource transformation.

Julie Dunne, a former House Oversight and Reform Committee staff member for the Republicans, a former commissioner of the Federal Acquisition Service at the General Services Administration, and now a principal at Monument Advocacy.

Dunne: AI again. How the government uses it to facilitate delivery of citizen services and how AI tools will assist with the acquisition process, and AI-enabled cybersecurity attacks. I know that’s not one word, but it’s a huge risk to watch and only a matter of time before our adversaries find success in attacking federal systems with an AI-enabled cyberattack, and federal contractors will be on the hook to mitigate such risks.

Cummins: Fraud prevention. While combating waste, fraud and abuse is a perennial issue, the industrial scale fraud revealed in Minnesota highlights a danger from how Congress passed COVID pandemic-era spending packages without the same level of checks and balances that were put in place for earlier Obama-era stimulus spending. Federal government programs generally still have a lot of room for improvement when it comes to preventing improper payments, such as by using better identity and access management and other security tools. Stopping fraud is also one of the few remaining areas of bipartisan agreement among policymakers.

Hettinger: DOGE may be gone, or maybe it’s not really gone, but I don’t know that cost savings and efficiencies are going to be pushed to the backburner. This administration comes at everything — at least from an IT perspective — as believing it can be done better, faster and cheaper. I expect that to continue not just into 2026 but for the rest of this administration.

Derrios: I think there will have to be a focus on how government needs and requirements are defined and how the remaining workforce can upskill to use technology as a force multiplier. If you don’t focus on what you’re buying and whether it constitutes a legitimate mission support need, any cost savings gained in 2025 will not be sustainable long-term. Balancing speed-to-contract and innovative buying methodologies with real requirements rigor is critical. And how your federal workforce uses the tools in the toolbox to yield maximum outcomes while trying to do more with less is going to take focused leadership. To me, all of this culminates in one word for 2026, and that’s producing “value” for federal missions.

Sieger: Resilient innovation. While 2025 focused intensely on cost savings and efficiencies, particularly through DOGE-mandated cuts, 2026’s emerging buzzword will be “resilient innovation.” Agencies are recognizing the need to continue advancing technological capabilities while maintaining operational continuity under constrained resources and heightened uncertainty.

The efficiency drives of 2025 exposed real vulnerabilities. Agencies lost institutional knowledge, critical systems became more fragile, and the pace of modernization actually slowed in many cases as talent departed and budgets tightened. Leaders now recognize that efficiency without resilience creates brittleness—systems that work well under ideal conditions but fail catastrophically when stressed.

Resilient innovation captures the dual mandate facing federal IT in 2026: Continue modernizing and adopting transformative technologies like AI, but do so in ways that don’t create new single points of failure, vendor dependencies or operational risks. It’s about building systems and capabilities that can absorb shocks — whether from workforce turnover, budget cuts, cyber incidents or geopolitical disruption — while still moving forward.

Alboum: Looking ahead, governance will take the center stage across government. As AI, data and cybersecurity continue to scale, agencies will need stronger oversight, greater transparency and better coordination to manage complexity and maintain public trust. Governance won’t be a side conversation — it will be the foundation for everything that comes next.

Success will no longer be measured by how much AI is deployed, but by whether it is secure, compliant and delivering tangible mission value. The conversation will shift from “Do we have AI?” to “Is our AI safe, accurate and worth the investment?”

The post AI may not be the federal buzzword for 2026 first appeared on Federal News Network.

© Getty Images/Greggory DiSalvo

❌