Skip to main content
  • blog
  • A Guide to the DFARS Clauses Behind CMMC & How They’ve Changed in 2026

A Guide to the DFARS Clauses Behind CMMC & How They’ve Changed in 2026

  • April 02, 2026
Author

Anna Fitzgerald

Senior Content Marketing Manager

Reviewer

Rob Gutierrez

Senior Cybersecurity and Compliance Manager, CISA, CCSK, CMMC RP

With Phase 1 of the CMMC rollout underway and Phase 2 fast approaching, if you're continuing to delay CMMC readiness, then you’re not only behind the curve. You still fundamentally misunderstand the CMMC program and its relationship to existing regulations. 

CMMC is designed to verify compliance with security requirements from FAR clause 52.204-21 (now 52.240-93) and DFARS clause 252.204-7012, which have been in effect since 2016 and 2017. It does not alter or replace them with new security requirements. 

So if you haven’t yet implemented the appropriate measures to protect sensitive defense information entrusted to you by the Department of Defense or prime contractors, then you’re not just months behind the first CMMC deadline. You’re years behind. 

To close the readiness gap, let’s cover what DFARs is, how it relates to the CMMC program, and how it’s been changed under the Revolutionary FAR Overhaul as of February 1, 2026.

Recommended reading

Why is CMMC Important? Benefits of CMMC Certification

What is the Defense Federal Acquisition Regulation Supplement (DFARS)?

The Defense Federal Acquisition Regulation Supplement (DFARS) is a set of rules issued by the Department of Defense (DoD) that implements and supplements the Federal Acquisition Regulation (FAR). While FAR provides the primary set of rules governing all federal procurement, DFARS defines the requirements for contractors working with the Department of Defense (DoD) specifically and covers everything from procurement and logistics to safeguarding sensitive data.

The DFARS provides requirements and guidelines specifically tailored to the DoD and its contractors that are not comprehensively covered by the FAR. For example, DFARS focuses on national security, classified information, intellectual property rights in the defense sector, and cybersecurity requirements, among other areas.

DFARS’s cybersecurity requirements have focused particularly on contractors that process Controlled Unclassified Information (CUI). These requirements, along with FAR 52.204-21 (now 52.240-93), have formed the foundation of the CMMC program. 

Recommended reading

What Are CMMC Requirements?

FAR, DFARS, and CMMC: How are these rules related?

To understand how FAR, DFARS, and CMMC are intertwined, we have to go back in time. In 2016, the DoD partnered with the General Services Administration (GSA) and National Aeronautics and Space Administration (NASA) to release the FAR 52.204-21, Basic Safeguarding of Covered Contractor Information Systems, in response to increases in cyber threats aimed at the Defense Industrial Base (DIB). 

Soon after, DFARS clause 252.204-7012 was released, requiring defense contractors and subcontractors to provide adequate security for all covered defense information. Later, they clarified that “adequate security” meant contractors must implement all 110 NIST 800-171 Revision 2 requirements prior to contract award. 

However, neither FAR clause 52.204-21 nor DFARS clause 252.204-7012 required the DoD to verify a contractor's implementation of those security requirements prior to contract award. So by signing a defense contract, vendors were essentially self-attesting that they met those security requirements. 

This turned out to be an issue. In 2020, the DoD reviewed the DIB and found widespread noncompliance with the FAR and DFARS requirements. In fact, many contractors had Plans of Action and Milestones that wouldn’t have brought them into full compliance with NIST 800-171 until 2099.

To replace this self-attestation model of security, the DoD introduced the DFARS Interim Rule in 2020 to verify contractor implementation of cybersecurity requirements and enhance the protection of unclassified information within the DoD supply chain. The DFARS Interim Rule, formally known as the Defense Federal Acquisition Regulation Supplement: Assessing Contractor Implementation of Cybersecurity Requirements, introduced three new DFARS clauses (7019, 7020 and 7021) to increase compliance with DFARS 7012.

Together, these became known as the DFARS 70 series. 

4 clauses in dfars 70 series

This series, along with FAR 52.204-21, underwent notable changes as part of a massive regulation effort known as the Revolutionary FAR Overhaul. Let’s cover these changes below. 

Recommended reading

DFARS 7012 vs CMMC: Key Differences & Overlaps Explained

DFARS in 2026: Updates under the Revolutionary FAR Overhaul

On February 1, 2026, significant regulatory changes took effect as part of the Revolutionary FAR Overhaul (RFO), a massive deregulation effort launched by the Office of Federal Procurement Policy in August 2025. The RFO became the first comprehensive rewrite of federal acquisition regulations in over 40 years. 

These changes were implemented through class deviations issued by the Department of Defense. Most notably, the DoW Class Deviation 2026-O0025, Revolutionary FAR Overhaul Part 40 and DFARS Part 240 consolidated and moved cybersecurity, supply chain, and information security requirements into a new Part 240. This affected how the FAR and DFARS requirements related to CMMC are organized and referenced. 

Here’s what defense contractors need to know.

Key changes effective February 1, 2026:

  • FAR 52.204-21 has been renumbered to FAR 52.240-93 under the new FAR Part 40 (Information Security and Supply Chain Security). The requirements themselves remain unchanged. Contractors handling Federal Contract Information (FCI) must still implement the 15 basic safeguarding controls.
  • DFARS 252.204-7019 has been eliminated. The standalone requirement to perform a "Basic”  NIST SP 800-171 Self-Assessment previously mandated by this clause no longer exists as a separate DFARS provision. However, most contractors handling CUI must still complete either self- or third-party assessments against NIST 800-171 and have their scores submitted in SPRS as part of the CMMC program under DFARS 252.204-7021.
  • DFARS 252.204-7020 has been renumbered to DFARS 252.240-7997 under the new DFARS Part 240. This revised clause removes all references to "Basic" assessments and now defines only Medium and High assessments, both of which are government-performed.
  • DFARS 252.204-7012 and DFARS 252.204-7021 remain unchanged. The foundational safeguarding, incident reporting, and CMMC certification requirements are unchanged, and remain in full effect.

What these DFARS changes means for contractors

The RFO consolidates cybersecurity assessment requirements around the CMMC framework. While DFARS 7019 and 7020 no longer exist in their previous form, contractors are not relieved of assessment obligations. Instead, assessment requirements are now primarily fulfilled through CMMC certification under DFARS 252.204-7021.

The underlying cybersecurity obligations have not changed. So if you handle CUI, that means:

  • You must still implement all 110 NIST 800-171 R2 requirements.
  • You must still maintain a System Security Plan. 
  • You must still report cyber incidents within 72 hours. 
  • You must still perform NIST 800-171 self-assessments if CMMC Level 2 (Self) is specified in contract (or complete a third-party assessment).
  • You must still have assessment scores submitted in the Supplier Performance Risk System (SPRS) (either by yourself or your C3PAO via eMASS).

During the transition period, you may see both old and new clause numbers referenced in contracts. Solicitations issued after February 1, 2026 will use the new numbering (FAR 52.240-93 and DFARS 252.240-7997), while older contracts will still reference the legacy clause numbers (FAR 52.240-21 and DFARS 252.240-7020). Contractors should update internal compliance documentation, proposal templates, and training materials to reflect both numbering systems during this transition.

Let's take a closer look at the four DFARS clauses that historically formed the DFARS 70 series and how they relate to current CMMC requirements.

Recommended reading

How to Meet CMMC Level 2 Compliance Requirements + Checklist

DFARS 7012

Note: This clause remains unchanged by the February 2026 regulatory updates.

First introduced in 2016 and in effect by December 2017, DFARS clause 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting, remains the foundational cybersecurity clause for defense contractors that handle CUI and lays the groundwork for CMMC.

If you are currently working on behalf of the DoD as a prime or subcontractor, then your contract includes DFARS 7012 requirements. 

These requirements are to:

1. Safeguard covered defense information: Contractors must implement all 110 NIST 800-117 Revision 2 requirements to safeguard CUI and develop and maintain a System Security Plan (SSP) that outlines how they meet each requirement.

2. Report cyber incidents: Contractors must report cyber incidents that affect covered defense information or that affect the contractor’s ability to provide operationally critical support to the DoD within 72 hours. They must also preserve logs and relevant data for 90 days.

There are two other requirements related to cyber incident reporting:

  • Submit malicious software: If the reported cyber incident involves malicious software, contractors must submit the software to the DoD Cyber Crime Center (DC3).
  • Facilitate damage assessment: If DoD reviews the cyber indecent report and decides to conduct a damage assessment, the contractor must provide any requested media and damage assessment information.

3. Flowdown requirements to subcontractors: These DFARS 7012 requirements must be passed to subcontractors that handle CUI.

While these requirements have been in effect for years, many defense contractors did not implement them despite enforcement mechanisms built into DFARS 7012. For example, while this DFARS clause did not require the DoD to verify a contractor's implementation of security requirements prior to contract award, if the DoD found out that a contractor wasn’t meeting those requirements due to a reported cyber incident or a whistleblower reporting non-compliance, they could sue the contractor for making false claims. They could also withhold progress payments, forgo remaining contract options, or terminate the contract in part or in whole. 

Despite the significant business and legal risk of not complying, many companies within the DIB failed to comply with DFARS 7012 and implement NIST 800-171 R2 requirements. DFARS 7019, 7020, and 7021 were introduced in 2020 to improve compliance with DFARS 7012 and NIST 800-171 across the DIB. 

How this affects contractors as of February 1, 2026:

DFARS 252.204-7012 remains unchanged by the Revolutionary FAR Overhaul. The clause continues to require contractors to:

  • implement NIST SP 800-171 requirements,
  • maintain an SSP documenting implementation,
  • report cyber incidents within 72 hours, 
  • and flow down requirements to subcontractors handling CUI.

However, contractors should be aware of an important alignment issue addressed by an earlier class deviation in 2024.

As codified at 48 CFR 252.204-7012, the clause references contractors having to implement "the most current version" of NIST SP 800-171 at the time of solicitation. Currently, that would be Revision 3, which was released in May 2024. Yet CMMC Level 2 assessments are pinned to NIST SP 800-171 Revision 2.

That’s because the DoD issued Class Deviation 2024-O0013 in May 2024 to resolve this mismatch. It directs contractors to implement NIST SP 800-171 Revision 2 (not Revision 3) when DFARS 252.204-7012 appears in contracts. This ensures alignment between DFARS 7012 obligations and CMMC assessment criteria.

Recommended reading

NIST 800-171 Rev 2 vs Rev 3: What Changed and What It Means for CMMC

DFARS 7019

Note: As of February 1, 2026, DFARS clause 252.204-7019 has been eliminated under the Revolutionary FAR Overhaul. This section is retained for historical context and to help contractors understand the evolution of DFARS cybersecurity requirements.

DFARS clause 252.204-7019, Notice of NIST SP 800-171 DoD Assessment Requirements, amended DFARS 7012 to include a new requirement. This required contractors to perform a Basic self-assessment using the NIST SP 800-171 DoD Assessment Methodology and submit their score to the Supplier Performance Risk System (SPRS) prior to contract award.

How is the SPRS score calculated? The DoD Assessment Methodology assigns each NIST 800-171 requirement a score of one (1), three (3), or five (5) points. So organizations start with the lowest score possible, -203, and earn between one and five points for each requirement they meet for a maximum score of 110. If an organization does not meet all NIST 800-171 requirements and gets a score below 110, they must create a Plan of Action and Milestones (POA&M) to explain how they’ll fill those security gaps. 

During an assessment, an Organization Seeking Certification (OSC) can POA&M their scores to no lower than 88 in order to pass their audit. However, they must remediate all POA&Ms within 180 days and get to a final score of 110 to get CMMC authorized.

Note that both the DoD and prime contractors will likely consider companies with lower scores a higher security risk and opt to work with companies with the highest scores and least risk. 

These requirements strengthened DFARS 7012 in two key ways: 

  • By providing a metric (the SPRS score) for the DoD to assess that contractors actually implemented NIST 800-171 requirements.
  • By requiring assessments and SPRS scores to be updated at least every three years to remain eligible for new contract awards.

How this affects contractors as of February 1, 2026:

With the elimination of DFARS 7019, there is no longer a standalone requirement to conduct Basic self-assessments outside of the CMMC framework. However, contractors pursuing CMMC Level 2 (Self) certification must still complete self-assessments against NIST 800-171 and post their scores to SPRS as part of the CMMC program under DFARS 252.204-7021.

The SPRS remains an active system of record, and CMMC Level 2 assessments (both self and third-party) use the same scoring methodology described above.

In short, contractors should not interpret the elimination of DFARS 7019 as eliminating assessment and reporting obligations. These obligations have simply been consolidated under the CMMC framework.

Recommended reading

SPRS Scoring: How to Get a Current CMMC Status and Stay Eligible for DoD Contracts

DFARS 7020 (now 7997)

Note: As of February 1, 2026, DFARS clause 252.204-7020 has been renumbered to DFARS 252.240-7997 and substantively modified as part of the Revolutionary FAR Overhaul.

DFARS clause 252.204-7020, NIST SP 800-171 DoD Assessment Requirements, built off DFARS 7019. While DFARS 7019 was the “notice” of NIST SP 800-171 DoD Assessment Requirements, DFARS 7020 is the actual requirements themselves. 

In addition to the requirements detailed above, DFARS 7020 formalizes the contractor’s responsibility to flow down requirements to subcontractors by requiring them to confirm subs have valid SPRS scores before awarding them subcontracts.

It also gives the DoD the right to conduct or renew a Medium or High NIST 800-171 DoD Assessment in order to validate the results of a contractor’s “Basic” self-assessment and ensure the contractor has properly implemented NIST 800-171 requirements. The DoD can exercise this right based on the criticality of the program or the sensitivity of information being handled by the contractor. In that case, the contractor must provide the DoD with access to its facilities, systems, and personnel for the assessment. 

These requirements strengthen DFARS 7012 in key ways:

  • By providing the DoD with an additional verification mechanism to ensure contractors are actually implementing NIST 800-171.
  • By providing a metric (the SPRS score) for the contractors to assess that subcontractors actually implemented NIST 800-171 requirements.
  • By requiring assessments and SPRS scores to be updated annually or every three years to remain eligible for new contract awards.

How this affects contractors as of February 1, 2026:

As of February 1, 2026, this clause has been renumbered to DFARS 252.240-7997 ( DFARS 7997 for short) and the requirement for “Basic” self-assessments has been removed. That’s because this requirement has been consolidated under CMMC Level 2. 

The new clause text still defines Medium and High assessments, both of which are government-performed using NIST SP 800-171A assessment procedures.

  • Medium Assessment: A government-led review using NIST SP 800-171A that includes examination of evidence and results in a confidence-based score.
  • High Assessment: A more comprehensive government-led assessment using NIST SP 800-171A, including detailed review of the System Security Plan, validation of implemented controls, and direct engagement with contractor personnel.

That’s because even if a contractor has achieved CMMC status through a self-assessment, the DoD retains the authority under 252.240-7997 to conduct Medium or High assessments to validate cybersecurity claims.

If you work on behalf of the DoD as a prime or subcontractor with contracts issued under the new Part 240 framework, your contract may include DFARS 252.240-7997 requirements.

Recommended reading

CMMC Level 2 Gap Analysis: How to Prepare for Your Assessment

DFARS 7021

Note: This clause remains unchanged by the February 2026 regulatory updates.

DFARS clause 252.204-7021, Cybersecurity Maturity Model Certification Requirements, formally requires CMMC certification as a condition for contract award. When this clause goes into effect, contractors will need to:

  • Obtain the CMMC level specified in the contract.
  • Maintain that certification throughout the contract period.
  • Flow down the applicable CMMC level to any subcontractors handling FCI, CUI, Security Protection Data (SPD), and/or Covered Defense Information (CDI).
  • Ensure subcontractors have the appropriate CMMC level prior to awarding a contract.

By enforcing independent validation of the implementation of cybersecurity requirements, the DFARS 7021 clause officially shifts DIB cybersecurity from a self-attestation model under previous FAR and DFARS regulations to a verification-based model of security. This is the vision for the CMMC program. 

How this affects contractors as of February 1, 2026:

With the elimination of DFARS 7019 and the restructuring of 7020, CMMC under DFARS 7021 has become the primary framework for cybersecurity compliance in the DIB. 

DFARS 7021—eg. CMMC requirements—are now actively being enforced in contracts. The phased rollout began on November 10, 2025, with the implementation of the 48 CFR CMMC Acquisition rule. 

For contractors, this means the following CMMC level and assessment requirements may be in their solicitations and contracts now (or very soon):

  • CMMC Level 1: Contracts handling FCI must implement and self-assess the 15 basic safeguarding controls from FAR 52.240-93 (formerly 52.204-21) with results and affirmations submitted to SPRS annually.
  • CMMC Level 2 (Self-Assessment): A select few contractors handling Basic CUI (approximately 5% of the DIB) must implement and self-assess the 110 NIST 800-171 R2 requirements with results and affirmations submitted to SPRS every three years.
  • CMMC Level 2 (C3PAO): Most contractors handling CUI (approximately 93% of the DIB) must implement NIST 800-171 and complete a third-party assessment by a certified C3PAO. This becomes the default for CUI contracts starting November 10, 2026, but DoD contracting officials have the discretion to include this requirement in contracts now and many primes have been requesting proof of Level 2 (C3PAO) readiness or certification for months. 

Recommended reading

Which Prime Contractors Have Begun Enforcing CMMC in Their Supply Chains?

DFARS compliance checklist​ for 2026

In order to maintain eligibility for DoD contracts, contractors must meet the requirements of DFARS 7012 and 7021, while understanding the historical context of 7019 and 7020 (now 252.240-7997). We've created a high-level checklist organized by urgency to help you prioritize compliance efforts based on the current CMMC enforcement timeline.

DFARS compliance checklist​

Get a high-level overview of the steps you need to complete to comply with DFARS and CMMc requirements.

How Secureframe can help you achieve and maintain DFARS and CMMC compliance

Achieving CMMC compliance is complex and resource-intensive for defense contractors, particularly those facing Level 2 (C3PAO) requirements on tight timelines. The challenge isn't just understanding the requirements. It's building a defensible scope, standing up a compliant infrastructure, and keeping evidence and documentation current as your environment evolves.

Secureframe Defense addresses these challenges with automation purpose-built for the Defense Industrial Base. The platform combines automated cloud provisioning, guided implementation workflows, and assessment-ready documentation that stays synchronized with your actual environment.

With CMMC enforcement now active and Phase 2 approaching in November 2026, defense contractors can't afford to waste time on manual compliance processes or stitching together outsourced services and point solutions.

Learn how Secureframe Defense is helping organizations get ready in as little as 4-8 weeks by visiting secureframe.com/cmmc or requesting a demo.

This post was originally published in June 2025 and has been updated for accuracy and comprehensiveness.

One platform. Complete CMMC readiness.

Request a demo

FAQs

What does DFARS stand for?

DFARS stands for Defense Federal Acquisition Regulation Supplement. It adds DoD-specific requirements to the government-wide Federal Acquisition Regulation.

What is FAR and DFAR?

FAR (Federal Acquisition Regulation) is the primary set of rules governing all federal procurement, while DFARS is a DoD-specific supplement that includes requirements related to national security and defense-specific priorities—like cybersecurity. In short:

  • FAR = Government-wide rules.
  • DFARS = DoD-specific rules, including cybersecurity and CMMC-related clauses.

What is DFARS compliance?

DFARS compliance means adhering to the security and reporting requirements defined in DFARS, particularly those related to protecting Controlled Unclassified Information (CUI), such as NIST SP 800-171 implementation and cyber incident reporting.

Who needs to be DFARS compliant?

Any contractor or subcontractor that processes, stores, or transmits CUI on behalf of the DoD must comply with applicable DFARS clauses.

What is DFARS 252.204-7012​?

DFARS clause 252.204-7012 requires DoD contractors to implement NIST SP 800-171 security controls, report cyber incidents, and ensure subcontractors do the same. It is a foundational clause for CMMC.

What happened to DFARS 7019 and 7020?

As of February 1, 2026, DFARS 252.204-7019 was eliminated and DFARS 252.204-7020 was renumbered to 252.240-7997 as part of the Revolutionary FAR Overhaul. The standalone "Basic Self-Assessment" requirement previously mandated by these clauses has been removed. Assessment obligations are now primarily fulfilled through the CMMC framework under DFARS 252.204-7021.

Has the Revolutionary FAR Overhaul changed my cybersecurity obligations?

No. The February 2026 regulatory changes reorganized and renumbered FAR and DFARS clauses but did not change the underlying cybersecurity requirements. If you handle CUI, you must still implement all 110 NIST 800-171 requirements, maintain a System Security Plan, report cyber incidents within 72 hours, and obtain appropriate CMMC certification when required. The changes consolidate assessment requirements around the CMMC framework rather than maintaining parallel compliance pathways.

Do I still need to submit scores to SPRS?

Yes, but the context has changed. With the elimination of the standalone DFARS 7019 Basic self-assessment requirement, SPRS submissions are now primarily tied to CMMC Level 2 self-assessments under DFARS 252.204-7021. The SPRS remains the system of record for cybersecurity assessment scores.

How do I know which clause numbers apply to my contract?

Contracts and solicitations issued before February 1, 2026 will reference the old clause numbers (FAR 52.204-21, DFARS 252.204-7019, DFARS 252.204-7020). Contracts issued after February 1, 2026 under the class deviations will reference the new numbers (FAR 52.240-93, DFARS 252.240-7997). During this transition period, contractors should be familiar with both numbering systems. The underlying requirements remain the same regardless of which numbering system is used.

Anna Fitzgerald

Senior Content Marketing Manager

Anna Fitzgerald is a digital and product marketing professional with nearly a decade of experience delivering high-quality content across highly regulated and technical industries, including healthcare, web development, and cybersecurity compliance. At Secureframe, she specializes in translating complex regulatory frameworks—such as CMMC, FedRAMP, NIST, and SOC 2—into practical resources that help organizations of all sizes and maturity levels meet evolving compliance requirements and improve their overall risk management strategy.

Rob Gutierrez

Senior Cybersecurity and Compliance Manager, CISA, CCSK, CMMC RP

Rob Gutierrez is an information security leader with nearly a decade of experience in GRC, IT audit, cybersecurity, FedRAMP, cloud, and supply chain assessments. As a former auditor and security consultant, Rob performed and managed CMMC, FedRAMP, FISMA, and other security and regulatory audits. At Secureframe, he’s helped hundreds of customers achieve compliance with federal and commercial frameworks, including NIST 800-171, NIST 800-53, FedRAMP, CMMC, SOC 2, and ISO 27001.