Cybersecurity Requirements for Controlled Unclassified Information

Controlled Unclassified Information (CUI) represents a distinct category of federal data that, while not classified, carries legal, regulatory, or policy-based handling restrictions. Organizations that handle CUI on behalf of federal agencies — including defense contractors, research institutions, and state/local government partners — must comply with specific cybersecurity frameworks that govern how that information is stored, transmitted, accessed, and protected. Non-compliance carries contract termination risk and potential False Claims Act liability. The Security Systems Listings directory indexes service providers operating within these compliance domains.

Definition and scope

CUI is defined and governed under Executive Order 13556 (2010), which established the CUI Program administered by the National Archives and Records Administration (NARA). The CUI Registry, maintained by NARA, categorizes over 100 distinct CUI categories spanning defense, privacy, law enforcement, and critical infrastructure data (NARA CUI Registry).

The cybersecurity requirements attached to CUI depend on the category and the type of federal contract or agreement under which the data is handled. The two primary regulatory instruments are:

  1. NIST SP 800-171Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations (NIST SP 800-171), which defines 110 security requirements across 14 control families.
  2. DFARS Clause 252.204-7012 — Applicable to Department of Defense (DoD) contractors, this clause mandates NIST SP 800-171 compliance and adequate security for covered defense information (DFARS 252.204-7012).

Scope boundaries matter: NIST SP 800-171 applies to CUI processed or stored on nonfederal systems. Federal agency internal systems fall under FISMA and NIST SP 800-53 (NIST SP 800-53 Rev 5), a distinct and generally more extensive framework.

How it works

Compliance with CUI cybersecurity requirements follows a structured sequence. Organizations typically move through four phases:

  1. CUI Identification — Categorize all information assets against the NARA CUI Registry to determine which data elements trigger handling requirements.
  2. System Boundary Definition — Define the systems, networks, and endpoints that process, store, or transmit CUI. This boundary determines the scope of the security assessment.
  3. Gap Analysis Against NIST SP 800-171 — Assess current controls against all 110 requirements. Organizations document their posture in a System Security Plan (SSP) and record deficiencies in a Plan of Action and Milestones (POA&M).
  4. Implementation and Assessment — Implement required controls and, for DoD contractors subject to the Cybersecurity Maturity Model Certification (CMMC) program, undergo third-party or government assessment. CMMC 2.0 aligns Level 2 (Advanced) directly with the 110 practices of NIST SP 800-171 (DoD CMMC Program).

CMMC 2.0, published by the Office of the Under Secretary of Defense for Acquisition and Sustainment, restructures the earlier five-level model into three levels. Level 1 covers 17 practices drawn from FAR 52.204-21 basic safeguarding requirements. Level 2 maps to NIST SP 800-171. Level 3 is reserved for programs with the highest sensitivity and incorporates a subset of NIST SP 800-172 practices.

The Security Systems Directory Purpose and Scope page describes how service providers in the assessment and compliance space are categorized within this reference network.

Common scenarios

CUI requirements arise across three dominant contracting environments:

A meaningful contrast exists between NIST SP 800-171 and NIST SP 800-53: SP 800-53 contains over 1,000 controls across 20 control families and is designed for federal agency systems; SP 800-171 distills that framework into 110 requirements tailored for nonfederal environments, omitting controls deemed the federal agency's responsibility rather than the contractor's.

Decision boundaries

Determining which CUI cybersecurity standard applies requires resolving three threshold questions:

  1. Is the contracting agency DoD or civilian? — DoD contracts invoke DFARS 252.204-7012 and the CMMC pathway; civilian contracts invoke FAR 52.204-21 and agency supplements without CMMC.
  2. Does the contract explicitly identify CUI or CDI? — Obligations are not implied; they must appear in contract clauses or data handling agreements. An organization receiving unmarked government information is not automatically in scope.
  3. What CUI category is present? — Categories such as Privacy CUI (covered by the Privacy Act), Law Enforcement Sensitive, or Export Controlled CUI carry additional overlay requirements beyond baseline NIST SP 800-171 controls.

Organizations seeking assessment services, compliance consultants, or managed security providers within this sector can reference the How to Use This Security Systems Resource page for guidance on navigating the service listings.

References

📜 3 regulatory citations referenced  ·  🔍 Monitored by ANA Regulatory Watch  ·  View update log