NIST Special Publication 800-171 is the backbone of CMMC Level 2. When NIST released the initial public draft of Revision 3 in May 2023, the cybersecurity compliance community took notice. The changes were more than cosmetic — Rev 3 restructures the entire control framework.
Structural Overhaul
Rev 2 organized its 110 security requirements into 14 families (Access Control, Audit and Accountability, etc.). Rev 3 reorganizes these into a structure that more closely mirrors NIST SP 800-53 Rev 5. The requirement numbering system changed entirely, which means every cross-reference in your existing SSP, POA&M, and evidence mapping will need updating.
Rev 3 also moved from 110 requirements to approximately 145 in the initial draft, though this number shifted through the comment period. New requirements were added in areas like supply chain risk management, system and information integrity, and planning.
Key Additions
Supply Chain Risk Management: Rev 3 added explicit supply chain controls, requiring organizations to develop supply chain risk management plans and assess the risk of acquiring systems from specific suppliers. This was largely absent from Rev 2.
Enhanced Logging: The audit requirements became more specific, with clearer expectations around centralized log management and automated alerting. Organizations running basic syslog without aggregation will need to invest in a SIEM or equivalent capability.
Withdrawal of Some Controls: A handful of Rev 2 requirements were withdrawn or absorbed into broader requirements. For example, some media protection controls were consolidated.
What This Means for CMMC
Here is the critical point: CMMC 2.0 is built on NIST SP 800-171 Rev 2, not Rev 3. The DoD has stated that the initial CMMC assessments will use Rev 2 as the baseline. A transition period will eventually move CMMC to Rev 3, but that timeline has not been finalized.
Contractors should focus on Rev 2 compliance now. Do not try to skip ahead to Rev 3 — you will waste effort mapping to a standard that is not yet required. However, keep Rev 3 on your radar. When the transition happens, you will need to perform a gap analysis between your Rev 2 implementation and the Rev 3 requirements. Organizations with strong, well-documented security programs will find this transition manageable. Those who built a paper-only compliance posture will struggle.
The best strategy is to implement real security controls against Rev 2, document them thoroughly, and build a program that can adapt to evolving requirements.
CMMCDocs.com