ARTICLE
25 February 2026

Beyond The CMMC: New Cybersecurity Assessments For Government Contractors

WS
Winston & Strawn LLP

Contributor

Winston & Strawn LLP is an international law firm with 15 offices located throughout North America, Asia, and Europe. More information about the firm is available at www.winston.com.
The General Services Administration (GSA) recently announced changes to procedural guidance that may affect contractor eligibility for GSA contracts.
United States Technology

The General Services Administration (GSA) recently announced changes to procedural guidance that may affect contractor eligibility for GSA contracts. GSA issued the IT Security Procedural Guide: Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations Process CIO-IT Security-21-112, which set out a cybersecurity framework for protecting CUI that is similar to the Cybersecurity Maturity Model Certification (CMMC) for DoD contracts. The guidance sets forth both substantive cybersecurity requirements and an assessment process for those cybersecurity requirements, but differs from the CMMC in several important respects.

First, regarding substantive cybersecurity requirements, the guidance incorporates controls from NIST Special Publications 800-171 rev. 3, 800-172 rev. 3, and 800-53 rev. 5. This incorporates far more controls than the CMMC program, which is currently limited to controls from NIST SP 800-171 rev. 2. Second, unlike the CMMC Program, the guidance does not rigidly prescribe security controls. For example, the guidance explicitly contemplates a risk-based process wherein a contractor may seek certain deviations from substantive cybersecurity requirements, which the GSA can decide to accept. Third, the controls from NIST SP 800-53 rev. 5 only apply when personally identifiable information is in scope.

Regarding cybersecurity, the guidance sets forth a five-phase assessment process. Like the CMMC assessment process, the GSA's assessment process is complex and contains highly specific assessment requirements, such as certain deliverables due at the end of each stage in the assessment process. The chart below outlines the GSA assessment process:

Table 1: GSA's Five-Phase Assessment Process

Phase

Description

1. Prepare

Establish system scope, confirm information types, determine authorization path, and assess overall readiness.

Key Deliverables and Activities

  • FIPS‑199 categorization
  • Determine if 800‑171 or FedRAMP path applies
  • Kickoff meeting
  • System architecture briefing and readiness review (security capabilities, MFA, boundary, vulnerability management)

2. Document

Fully document system architecture, security/privacy requirements, and all SSPP content.

Key Deliverables and Activities

  • Complete SSPP using GSA template
  • Integrated inventory workbook
  • PTA/PIA (as applicable)
  • Architecture Review Checklist
  • SCRM Plan
  • Initial/complete SSPP approval by GSA

3. Assess

Conduct independent third-party assessment of implemented controls and generate required assessment artifacts. The independent third-party assessor must be either a FedRAMP-accredited 3PAO, or an assessment organization approved by the GSA OCISO prior to selection.

Key Deliverables and Activities

  • Security Assessment Plan (SAP)
  • Independent testing using GSA Test Case Workbook
  • Vulnerability, configuration, and web app scans
  • Security Assessment Report (SAR)
  • POA&M
  • Vulnerability deviation request sheet (if needed)

4. Authorize

GSA evaluates residual risk and determines whether the system may be used to process CUI.

Key Deliverables and Activities

  • Assemble full Security Approval Package
  • GSA review for consistency, completeness, and risk
  • ISSO/ISSM certification
  • CISO approval and issuance of Memorandum for Record (MFR)

5. Monitor

Ongoing monitoring and submission of recurring deliverables to ensure continued protection of CUI.

Key Deliverables and Activities

  • Quarterly vulnerability scan reports and POA&M updates
  • Annual SSPP and PTA/PIA updates
  • Annual penetration testing (recommended)
  • Triennial independent SAR

GSA's decision to expand its oversight over cybersecurity controls for its contractors is consistent with the federal government's increased scrutiny of cybersecurity in procurement. Announced four years ago in October 2021, the Civil Cyber-Frauds Initiative utilizes the False Claims Act to pursue cybersecurity-related fraud by government contractors and grant recipients, resulting in increased DOJ settlements on cybersecurity cases. Consequently, Cybersecurity False Claims Act cases have reached an all-time high.

To avoid these legal issues resulting from noncompliance, companies that either hold or sell on GSA contracts requiring access to CUI should begin reviewing their covered systems and assess how they will implement GSA's cybersecurity requirements. While the requirements overlap to some degree with CMMC, GSA's framework contains broader requirements than CMMC. Thus, even current defense contractors that have been planning for CMMC for years must evaluate the additional requirements imposed by the GSA's framework.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

[View Source]

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More