Strengthening Third-Party and Supply Chain Risk Management Through CMMC

October 29, 2025
Strengthening Third-Party and Supply Chain Risk Management Through CMMC

In today’s interconnected digital landscape, organizations face increasing risks from third-party vendors and supply chain partners. Cyber threats targeting weak links in the supply chain can compromise sensitive data, disrupt operations, and damage reputations. The Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC) final rule, effective November 10, 2025, offers a transformative framework for mitigating these risks by embedding cybersecurity compliance into contractual obligations across the defense industrial base (DIB).

By aligning cybersecurity practices with NIST standards and enforcing them across all tiers of contractors and suppliers, CMMC empowers organizations to build robust third-party and supply chain risk management programs. It elevates cybersecurity from a recommended best practice to a contractual requirement—reshaping how defense contractors approach risk, compliance, and operational resilience.

CMMC as a Catalyst for Supply Chain Risk Management

One of the most impactful aspects of the CMMC final rule is its emphasis on subcontractor flow-down and monitoring. Prime contractors are now responsible not only for their own compliance but also for ensuring that their subcontractors meet the required CMMC level throughout the contract lifecycle. This shift compels organizations to establish the beginnings of a Supply Chain Risk Management (SCRM) or Third Party Risk Management (TPRM) programs that include:

  • Risk-based tiering of suppliers: Organizations must assess the sensitivity of data handled by each subcontractor and assign appropriate CMMC levels. For example, a supplier handling only FCI may be required to meet Level 1, while one managing CUI must meet Level 2 or higher.
  • Due diligence and onboarding protocols: Before awarding contracts, primes must verify that subcontractors have current CMMC status posted in the Supplier Performance Risk System (SPRS) and have submitted affirmations of compliance.
  • Ongoing monitoring and reassessment: Organizations must ensure that subcontractors maintain compliance throughout the contract period, including renewing certifications and converting conditional assessments to final status within 180 days.

This structured approach to vendor oversight aligns with best practices in SCRM or TPRM and helps organizations proactively manage cyber risks across their extended enterprise.

Enhancing Risk Management

CMMC also supports broader supply chain risk management by enforcing cybersecurity standards across all tiers of the supply chain.

Key benefits include:

  • Visibility into supplier security posture: By requiring affirmations and SPRS postings, CMMC provides transparency into each supplier’s cybersecurity maturity.
  • Standardization across the supply chain: CMMC’s uniform framework ensures that all suppliers adhere to consistent security practices, reducing fragmentation and gaps.
  • Accountability and enforcement: With contractual clauses like DFARS 252.204-7021, organizations can hold suppliers accountable for maintaining compliance, with remedies available for non-compliance.

Building a CMMC-Aligned Risk Management Program

To leverage CMMC for third-party and supply chain risk management, organizations should consider the following steps:

  1. Map supplier relationships and data flows: Identify which suppliers handle FCI or CUI and determine the appropriate CMMC level for each.
  2. Integrate CMMC into procurement processes: Update contracts to include CMMC clauses not just as part of flow-downs but to require SPRS documentation and affirmations from suppliers to further provide insights to their ongoing compliance.
  3. Develop monitoring mechanisms: Establish dashboards or workflows to track supplier compliance status, certification expirations, and their CMMC readiness.
  4. Train internal teams: Educate procurement, legal, and cybersecurity teams on CMMC requirements and their roles in enforcing them.
  5. Engage CMMC specialists: Partner with experts to navigate assessments, scope systems, and prepare for audits.

Additional SCRM Requirements are On the Horizon

CMMC is built on the foundation of NIST SP 800-171 Rev. 2, but future updates to CMMC will need to eventually incorporate the changes associated with NIST 800-171 Revision 3. This future version introduces formal SCRM controls that expand the framework’s reach and rigor.

In May 2024, NIST SP 800-171 Revision 3 was published, introducing significant updates—including the addition of a new control family focused on SCRM. These new requirements emphasize the need for organizations to establish processes for identifying and addressing weaknesses in supply chain elements and enforcing security requirements to mitigate supply chain-related risks. Specifically, control 03.17.03 directs organizations to define and apply security requirements to suppliers, tools, and services that impact system components or data. This evolution reflects growing concerns about supply chain vulnerabilities and aligns with broader federal initiatives to secure critical infrastructure and national defense assets. As CMMC evolves to incorporate Rev. 3, organizations will need to expand their risk management programs to include deeper oversight of third-party relationships and supply chain dependencies.

Recent amendments to Executive Orders 13694 and 14144 reflect a renewed federal focus on cybersecurity and supply chain risk management, particularly under the Trump administration's June 2025 Executive Order 14306. This order preserves key elements from Biden’s E.O. 14144 and Obama’s E.O. 13694, emphasizing secure software development, AI risk management, and post-quantum cryptography. It also mandates an update to NIST’s Secure Software Development Framework (SP 800-218) by December 2025.

Conclusion: A Strategic Imperative

CMMC is more than a compliance mandate—it’s a strategic opportunity to embed cybersecurity into the fabric of third-party and supply chain relationships. By aligning with CMMC, organizations can build resilient ecosystems that protect sensitive data, meet contractual obligations, and reduce exposure to cyber threats. As the rule becomes enforceable in DoD contracts, proactive adoption will position organizations not only for compliance but for long-term success in a risk-aware digital ecosystem.

If your organization is ready to strengthen its third-party and supply chain risk management capabilities, now is the time to act. CMMC provides the blueprint—what’s needed is the commitment to build and sustain a secure, compliant supply chain.

 

Prepare for CMMC with Confidence


Join us Deltek ProjectCon to hear from CMMC experts on how to stay ahead of evolving requirements


Register Today

 

 

Orginally published on October 29, 2024

 

About the Author

Matt Gilbert is a Principal in Baker Tilly’s risk advisory practice, where he leads the firm’s cybersecurity maturity model certification (CMMC) and government contractor IT risk services. With over two decades of experience—including 18 years at a global firm—Matt has conducted IT audits, cybersecurity assessments, and ERP risk reviews for clients ranging from large primes to small 8A contractors. He is a trusted advisor on NIST 800-171 and 800-53 compliance, internal audit, and IT risk management across the public and private sectors.