CMMC Level 2 assessments are live, and hardware-inventory completeness is where contractors fail the first walkthrough.
The Cybersecurity Maturity Model Certification 2.0 final rule went into effect December 2024. Defense contractors handling Controlled Unclassified Information are being assessed against the 110 NIST SP 800-171 Rev. 2 controls. The recurring early-finding pattern: contractors can produce policy documents and configuration baselines, but cannot produce current evidence that the hardware inventory matches what's actually on the network.
The two controls hardware completeness lives under
CMMC 2.0 Level 2 inherits the 110 practices of NIST SP 800-171 Rev. 2. Two of them are where device-discovery evidence matters most for first-time assessments:
CM.L2-3.4.1 — Authorized Hardware. Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles. The assessment objective requires that hardware currently in the system be reflected in the inventory.
CM.L2-3.4.2 — Baseline Configuration. Establish and enforce security configuration settings for information technology products employed in organizational systems. The control depends on knowing what hardware is in scope; if the inventory is incomplete, the baseline cannot be enforced.
Assessors are not asking for a perfect inventory in the abstract. They are asking for evidence that the inventory matches what is connected to the CUI environment today. The two ways contractors fail this in a first walkthrough are (a) a stale CMDB that doesn't reflect recent moves, adds, and changes, and (b) hardware in the CUI environment that was never inventoried because it was provisioned by a contractor, an integrator, or a building-systems vendor outside the IT acquisition path.
Switch-derived inventory matched against the contractor's baseline
CybrIQ provides a continuously updated inventory of every device connected to the managed switches in the CUI enclave. Identification comes from switch-side signals matched against a 750-million-device reference library. The output is structured to align with the contractor's existing baseline:
- Per-device record: identifier, vendor, model class, MAC, switch port, VLAN, last-seen timestamp, confidence score.
- Deviation alerts when a device appears that is not on the authorized-hardware list (CM.L2-3.4.1 objective).
- Audit-trail export: every detected device, every change to its state, every authorization-list deviation, exportable for the C3PAO walkthrough.
- Integration via syslog (RFC 5424) and REST with the contractor's existing SIEM, eMASS, or compliance evidence platform.
CMMC 2.0 controls CybrIQ supports compliance with
- CM.L2-3.4.1 — Authorized Hardware (NIST 800-171 3.4.1).
- CM.L2-3.4.2 — Baseline Configuration (NIST 800-171 3.4.2). Input data for the baseline.
- CM.L2-3.4.3 — Track, Review, Approve/Disapprove, and Audit Changes (NIST 800-171 3.4.3).
- SI.L2-3.14.6 — Monitor Communications for Attacks (NIST 800-171 3.14.6). Device-level signal contribution.
- SC.L2-3.13.6 — Network Communications by Exception. Visibility input for deny-by-default.
- DFARS 252.204-7012 — Safeguarding Covered Defense Information. Evidence layer for the safeguarding requirements.
Deployment posture for C3PAO walkthrough
CybrIQ is not a CMMC 2.0 Level 2 substitute. It supplies one of the evidence layers a contractor's System Security Plan (SSP) cites for hardware inventory and authorized-hardware control. The contractor maintains the SSP, the POA&M, and the C3PAO relationship; CybrIQ provides the device-discovery data the controls reference.
Sample audit-trail export (CSV) — the shape an SSP-attached evidence file actually takes. Per-device row format with CM.L2-3.4.1 / CM.L2-3.4.2 references, signed SHA-256 hash. Forward to your SSP author or C3PAO walkthrough lead.
Download sample CSV →Companion: NIST 800-53 control inheritance matrix (CSV) · See all on Takeaways.
Schedule a CMMC L2 briefing
A 30-minute session: we walk the authorized-hardware control objectives against your CUI enclave, the C3PAO assessment patterns we're seeing, and the gap your SSP cannot currently close.
Request briefing