Skip to main content
Compliance

CUI Identification and Marking: A Practical Guide for Contractors

How to identify, mark, and handle Controlled Unclassified Information (CUI) in your organization. Includes marking examples, common CUI categories, and handling procedures.

CMMC Command Team
Compliance Engineering
Mar 6, 20268 min read

What Is CUI and Why Does It Matter?

Controlled Unclassified Information (CUI) is information that the government creates or possesses — or that an entity creates or possesses for the government — that requires safeguarding per law, regulation, or government-wide policy. It's not classified, but it's not public either.

For defense contractors, CUI is the trigger for CMMC Level 2. If you handle CUI, you need to protect it per NIST SP 800-171. The first step: knowing what CUI you actually have.

Common CUI Categories in Defense Contracting

Technical Data

  • Engineering drawings and specifications
  • Test and evaluation results
  • Manufacturing process documentation
  • Source code for defense-related software
  • Performance specifications
  • Technical manuals and maintenance procedures

Contract and Acquisition Data

  • Proposal information (pre-award)
  • Contract pricing data
  • Source selection information
  • Proprietary business information submitted under contract

Export-Controlled Information

  • ITAR-controlled technical data
  • EAR-controlled technology
  • Munitions list items and data

Other Common Categories

  • Vulnerability assessment results
  • Critical infrastructure information
  • Privacy data (PII of military personnel)
  • Law enforcement sensitive information

How to Identify CUI in Your Organization

Step 1: Contract Review

Start with your contracts. Look for:

  • DFARS 252.204-7012: The primary CUI protection clause
  • DFARS 252.204-7019/7020: NIST 800-171 assessment requirements
  • ITAR clauses: International Traffic in Arms Regulations
  • CUI marking requirements: Some contracts specify how CUI must be marked

Step 2: Data Flow Mapping

Trace where contract-related information flows:

  • Where do you receive technical data from the government or primes?
  • Where is it stored (file servers, cloud, email, workstations)?
  • Who accesses it and through what systems?
  • Where does it leave your organization (to subcontractors, deliverables)?

Step 3: System Inventory

Identify every system that touches CUI:

  • Email systems (CUI in attachments or body)
  • File storage (network drives, SharePoint, cloud storage)
  • Engineering tools (CAD software, PLM systems)
  • Communication tools (Teams, Slack — are CUI discussions happening here?)
  • Mobile devices (are engineers accessing CUI remotely?)
  • Backup systems (your backups contain CUI too)

CUI Marking Requirements

Document Marking

CUI documents should include:

  • Banner marking: "CUI" or "CONTROLLED" at the top and bottom of each page
  • Category marking: The specific CUI category (e.g., "CUI//SP-CTI" for Controlled Technical Information)
  • Distribution statement: Who can receive this document
  • Point of contact: Who to contact about the CUI designation

Example Banner Marking

CUI//SP-CTI
DISTRIBUTION STATEMENT D: Distribution authorized to DoD and U.S. DoD contractors only.

Email Marking

  • Subject line: Include "CUI" at the beginning
  • Body: Include CUI banner at top
  • Attachments: Mark each attachment individually

Digital File Marking

  • Include CUI designation in file metadata where possible
  • Use descriptive file names that indicate CUI status
  • Store in designated CUI folders/locations

Building Your CUI Boundary

The CUI boundary defines which systems, networks, and physical locations process CUI. This boundary is critical for your SSP and directly impacts your CMMC assessment scope.

Minimize Your Boundary

The smaller your CUI boundary, the fewer systems need full NIST 800-171 compliance:

  • Segment CUI systems from general business systems
  • Use a dedicated enclave for CUI processing when possible
  • Limit CUI access to personnel who genuinely need it
  • Consider virtual desktop infrastructure (VDI) for CUI access

Document the Boundary

Your SSP must clearly define:

  • Network diagrams showing CUI-processing systems
  • Physical locations where CUI is stored or accessed
  • Personnel authorized to access CUI
  • Data flow diagrams showing CUI movement

Common CUI Mistakes

1. CUI Sprawl

CUI ends up everywhere — personal laptops, personal email, unauthorized cloud storage. Implement technical controls to contain it.

2. Over-Classification

Not everything is CUI. Over-marking wastes resources and creates compliance fatigue. Only mark what's actually designated CUI by the government.

3. Ignoring Derived CUI

If you create a document using CUI source material, the derived document is also CUI. Many contractors miss this.

4. Forgetting Backups

Your backup systems contain CUI. They're in scope for NIST 800-171 controls.

5. No Destruction Procedures

When CUI is no longer needed, it must be destroyed per NIST 800-88. "Deleting" a file isn't sufficient — media must be sanitized or destroyed.

How CMMC Command Helps with CUI Management

  • Asset inventory: Track every system in your CUI boundary with scope designation
  • CUI evidence scanning: Automated detection of CUI markers in uploaded evidence files
  • SSP generation: Automatically generates CUI boundary documentation
  • Policy templates: Pre-built CUI handling policies mapped to NIST controls

Map your CUI boundary for free — start your assessment and document your CUI environment.

CUINIST 800-171DFARSData Classification

See where you stand on CMMC

Run through all 110 controls and get your SPRS score. Takes about 30 minutes. Free, no credit card.