Federal Contractor Information (FCI) and Controlled Unclassified Information (CUI) are types of sensitive and regulated data provided by the U.S. federal government that are processed and stored on non-federal systems. To ensure the confidentiality of this regulated information, organizations are required to follow the guidelines set forth in NIST Special Publication (SP) 800-171, as defined by Executive Order 13556.
For Department of Defense (DoD) contractors and subcontractors, the Cybersecurity Maturity Model Certification (CMMC) adds an additional layer of verification. The CMMC program certifies that contractors have implemented proper security measures to safeguard FCI and CUI.
Effectively scoping your organization—identifying where FCI and CUI are handled—is critical to meeting compliance efficiently. Without proper scoping, compliance efforts can become unnecessarily complex and costly.
By tracking the flow of FCI and CUI, contractors can isolate the systems, applications, and teams that interact with sensitive data. This targeted approach makes it more feasible and cost-effective to implement data centric security, manage compliance, and achieve certification.
In this Complete Guide by SaltyCloud, we’ll explain the difference between FCI and CUI, the importance of enclaves, and provide a step-by-step scoping guide to help you on your compliance journey.
FCI is non-public information that is produced, used, or generated during the performance of a government contract.
Although FCI is not classified as critical or sensitive, it is still required to remain confidential to protect the integrity of government operations.
According to 48 CFR 52.204-21, FCI refers to “information not intended for public release, provided by or generated for the government under a contract to develop or deliver a product or service to the government.” It excludes publicly available information or transactional data, such as information required to process payments.
Examples of FCI include data such as contracts, subcontracts, emails, reports, notes, and other communication or documentation shared in the course of fulfilling a government contract.
Controlled Unclassified Information (CUI) refers to government-created or government-related information that requires safeguarding or specific dissemination controls under applicable laws, regulations, or government-wide policies.
Although CUI is not classified, its unauthorized disclosure could harm national security, government operations, or public interests.
According to 32 CFR 2002.4, CUI is “information that the government creates or possesses, or that an entity creates or possesses for or on behalf of the government, that a law, regulation, or government-wide policy requires or permits an agency to handle using safeguarding or dissemination controls.” It excludes classified information and information held by non-executive branch entities that did not originate from or is not possessed by an executive branch agency.
Examples of CUI include sensitive data like blueprints, technical manuals, financial records, or engineering drawings. The National Archives maintains a detailed list of CUI categories, including areas such as Critical Infrastructure, Privacy, Financial, and Tax data.
Controlled Unclassified Information (CUI) is more sensitive than Federal Contract Information (FCI) and requires stricter handling and safeguarding. While both are non-classified, CUI could harm national security or government interests if improperly disclosed, whereas FCI involves confidential but lower-risk data used in government contracts.
Properly scoping FCI and CUI ensures efficient and cost-effective compliance with security standards, including NIST 800-171 and NIST 800-172.
Scoping helps identify the sensitive data systems, sensitive data environment, and processes that handle sensitive data assets, ensuring that only these in-scope systems are measured against compliance requirements like NIST 800-171 and CMMC.
If done incorrectly, the entire network could be in scope, requiring comprehensive compliance efforts across all systems and users making it technically complex and prohibitively expensive.
A CUI enclave is a segmented environment designed to process sensitive data like FCI and CUI, adhering to specific security practices and subject to a CMMC assessment.
It is a physically or digitally separated part of an organization where systems, processes, and personnel that interact with FCI and CUI are isolated to comply with the security controls in NIST 800-171 and NIST 800-172. Unlike a completely isolated network, a CUI enclave can still interact with external systems, allowing access through methods like a remote desktop or web browser.
This structure ensures that only the in-scope environment is audited during a CMMC assessment.
Scoping looks different for every organization, depending on how sensitive and regulated data like FCI and CUI are handled. Use the following steps to guide you through the scoping process. We reference both the official CMMC Level 2 Scoping Guide and the ComplianceForge Unified Scoping Guide (USG).
The first step in the scoping process is to gain a clear understanding of which parts of your organization are involved in federal contracts and may handle FCI or CUI. This involves reviewing awarded contracts to determine where FCI or CUI is generated, processed, or stored. Contracts often contain clauses referencing FAR 52.204-21 (for FCI) or DFARS 252.204-7012 (for CUI), which specify safeguarding requirements.
To ensure accuracy, engage with key stakeholders like contract managers, legal teams, and business units responsible for federal work.
These teams can provide insight into which processes, systems, and personnel may be in-scope for compliance. By the end of this step, you’ll have a clear picture of which parts of the organization need further review in the scoping process.
In this step, you will start identifying all assets that could potentially be in scope for compliance. This includes People, Processes, Technology, Data, and Facilities (PPTDF), including any external service provider, that interact with FCI or CUI.
The goal here is to get a comprehensive overview of all possible components that may be involved, laying the groundwork for later scoping decisions.
You can use a combination of automated tools and manual methods to conduct this discovery:
As you gather information, begin developing a Data Flow Diagram (DFD) that visually maps where and how FCI and CUI move through your organization. The DFD should cover the full lifecycle of CUI, including how it is processed, stored, and transmitted:
The outcome of this step is a comprehensive list of all potential in-scope assets and their connections, giving you a complete view of the landscape before you classify and refine the scope.
After identifying potential in-scope assets in Step 2, the next step is to assess and classify these assets based on their interaction with FCI and CUI.
This process defines the assessment boundary and helps focus compliance efforts on the assets that require specific protections.
You can classify assets either manually or using automated tools, such as a GRC Assessment Platform like Isora GRC. Isora GRC can help you automate enrichment surveys that can be sent to end users and stakeholders to help classify assets, including those that may have direct or indirect connection. This classification process groups assets into the following categories based on their role in handling FCI and CUI:
Once the classification is done, use network segmentation and isolation techniques (such as CUI enclaves) to limit the scope to only those systems necessary for compliance. This helps streamline the assessment process by minimizing the scope to relevant assets.
While creating a full System Security Plan (SSP) is beyond the scope of this specific guide, it is important to mention that the SSP serves as a critical record of the scoping process.
The SSP consolidates all relevant details about the in-scope assets, data flows, and security measures, ensuring that your compliance efforts are well-documented and traceable.
Within the SSP, clearly outline the in-scope assets you identified in previous steps. This should include:
Your SSP should include network diagrams that show how in-scope assets are segmented from other systems. These diagrams offer a visual representation of:
ComplianceForge provides an example SSP template that can be useful as a reference for how to document in-scope assets, network diagrams, and assessment boundaries. This example can be found here and offers a clear framework for consolidating the scoping information gathered during this process.
The final step in the scoping process is to validate that the scope you’ve defined is accurate and complete before moving into any pre-assessment or formal assessment activities.
This step ensures that your scoping decisions are aligned with compliance requirements and that you are fully prepared to proceed.
Review the scoping decisions with internal stakeholders to ensure everything is correctly documented and that the assessment boundary captures only the necessary assets. This helps prevent unnecessary assets from being included in the compliance effort, keeping the scope focused and manageable.
With the scope validated, you can now organize the documentation that will support the pre-assessment process. This includes:
Scoping for FCI and CUI compliance is a foundational step in ensuring that your organization meets the requirements of NIST 800-171 and CMMC Level 2. By understanding the organization’s involvement in federal contracts and identifying sensitive data types like CUI and export controlled data, you can accurately define your scope. This includes classifying critical infrastructure information, ensuring security protection assets are properly categorized, and identifying out-of-scope systems to keep your focus streamlined.
Throughout this guide, we emphasize the importance of a comprehensive data flow analysis to understand how sensitive data types move through your organization and interact with internal assets and external service providers. Effective scoping reduces complexity by targeting only the necessary systems and ensuring compliance with regulatory frameworks.
To further streamline the scoping process, organizations may consider working with a Registered Provider Organization (RPO). An RPO can provide expert guidance, helping ensure that your scoping process is thorough and aligned with compliance requirements. With the aid of an RPO and the resources outlined in the CMMC Level 2 Scoping Guide and ComplianceForge USG, your organization will be well-prepared for pre-assessments and formal compliance evaluations, ensuring a smooth path to certification.
Dive into our research-backed resources–from product one pagers and whitepapers, to webinars and more–and unlock the transformative potential of powerfully simple GRC.
Learn MoreAll you need to know about the CMMC, its framework, compliance requirements, and practical tips for defense contractors.
Everything you need to know about the NIST 800-171 Basic Assessment and the steps you can take to build a compliance process.
This Complete Guide provides step-by-step instructions for scoping FCI and CUI to make NIST 800-171 and CMMC compliance more efficient and cost-effective.