September 10, 2025
Today, the Department of Defense (DoD) published the final Cybersecurity Maturity Model Certification (CMMC) rule. This is a major step toward strengthening cybersecurity across the defense industrial base (DIB). This rule, now part of the Defense Federal Acquisition Regulation Supplement (DFARS), outlines mandatory cybersecurity requirements for contractors and subcontractors handling Controlled Unclassified Information (CUI) and Federal Contract Information (FCI). The CMMC Final Rule goes into effect 60 days after its publication in the Federal Register.
The final rule expands on existing cybersecurity requirements for government contractors. In fact, defense contractors have been required to comply with cybersecurity regulations since at least 2017.
The revised CMMC framework includes three certification levels:
All levels require an annual affirmation of continuous compliance in the Supplier Performance Risk System (SPRS).
The rule introduces a three-year phased rollout:
All contractors must:
Failure to comply with CMMC requirements can result in:
Importantly, misrepresenting CMMC status or cybersecurity compliance may expose contractors to False Claims Act (FCA) liability. The FCA imposes significant penalties for submitting false claims to the government or for using false records to seek payment from the government. Having a third-party assessor (C3PAO or DIBCAC) verify cybersecurity compliance may help contractors mitigate FCA exposure, so long as the contractors provide accurate and complete information to the third-party assessors.
Since the introduction of DOJ’s Civil Cyber Fraud Initiative, enforcement of cybersecurity compliance has grown significantly. In 2025 so far, there have already been 3 notable settlements.
In March 2025, the government settled the landmark case against Morsecorp, Inc. brought by one of our clients. The $4.6 million settlement resolved allegations that Morsecorp. made false representations concerning its compliance with required cybersecurity controls for safeguarding sensitive government information. It was the first major False Claims Act settlement with a member of the defense industrial base based on the failure to implement the required cybersecurity controls.
In May 2025, Raytheon Company, its parent RTX Corporation, and successor Nightwing Group agreed to pay $8.4 million to resolve allegations under the False Claims Act for failing to comply with cybersecurity requirements in 29 Department of Defense contracts.
In July 2025, biotech company Illumina, paid $9.8 million to settle allegations that it sold its genomic sequencing systems to government agencies without having an adequate security program.
The Whistleblower Law Collaborative, based in Boston, represents individuals nationwide in bringing cases under the False Claims Act and other whistleblower programs. One of our recent successes was the $4.6 million settlement with MORSECORP, Inc. It was the first major False Claims Act cybersecurity settlement with a defense contractor.
If you know a government contractor has falsely certified compliance with its cybersecurity requirements, or failed to report a cybersecurity breach, contact us for a confidential consultation. Our attorneys include several former federal prosecutors with experience safeguarding sensitive military, intelligence, and healthcare data and a Lawdragon 500 Leading Global Cyber Lawyer.