The small defense contractor manufacturing precision components in a converted warehouse outside Raleigh has one thing in common with Lockheed Martin: they both touch controlled unclassified information that the People's Republic of China wants. The difference is that Lockheed has a security operations center. The small manufacturer has a firewall they haven't logged into since 2019.
This is the gap that Chinese cyber operations have systematically exploited for two decades. Not through novel zero days or sophisticated malware — through patience, persistence, and the reliable availability of soft targets in the defense supply chain. CMMC Level 2 is a necessary response to this reality. It is not a sufficient one.
This analysis maps China's five-layer attack infrastructure against the CMMC control framework, identifies the specific gaps that compliance does not close, and argues that detection capability — not just hardening — is the missing piece for small DIB manufacturers operating without dedicated security staff.