In today’s interconnected digital world, safeguarding sensitive data and preventing unauthorized access is vital, especially for U.S. government agencies, contractors, and other information-sharing partners that compete for Department of Defense (DoD) contracts. While many organizations that work alongside the U.S. government have historically dedicated significant energy to protecting classified information, controlled unclassified information (CUI) also contains sensitive data that could pose risks to national security. To develop a standardized approach to CUI management and mitigate risks, the U.S. government created the CUI Program.
This article helps contractors and subcontractors understand CUI, how the CUI program helps secure data, and how they can use the DoD’s Cybersecurity Maturity Model Certification to ensure they protect CUI and demonstrate robust cyber hygiene to the DoD and other federal agencies.
Protect CUI across your third-party ecosystem with the world’s #1 TPRM solution: UpGuard's risk remediation software.
CUI refers to any type of unclassified data that the U.S. Government creates or possesses that requires safeguards and dissemination controls due to its sensitive nature. This classification includes a broad spectrum of information, ranging from personally identifiable information (PII) to proprietary business information. However, CUI excludes all information classified by Executive Order 13526 or the Atomic Energy Act. Agencies and contracted organizations may only access CUI for lawful government purposes, restricting the general public from interacting with CUI.
The U.S. Government uses the acronym CUI to refer to many different types of protected information. This spectrum includes the following types of data:
While there are many types of CUI, the term essentially encompasses any data that could pose significant risks to national security, public health, or critical government infrastructures if compromised.
CUI and classified information vary from each other in sensitivity and the handling requirements they necessitate. Classified information undergoes a formal classification process, determining its level of criticality (confidential, secret, and top secret) and the security protocols organizations must follow. In contrast, CUI lacks formal categorization.
While not included in the formal classification process associated with classified information, federal agencies still organize and distinguish CUI with visual cues called CUI markings.
CUI markings help federal agencies and other organizations quickly identify information sensitivity and the handling procedures necessary to protect the information. The U.S. Government uses four main categories of visual cues to mark CUI:
By incorporating these visual cues, federal agencies aim to ensure government personnel and outside organizations effectively identify, protect, and safeguard CUI throughout the document’s lifecycle. In addition to CUI markings, the U.S. Government also subjects CUI to further restrictions as a part of its formal CUI program.
On November 4, 2024, President Obama executed Executive Order 13556 to establish the CUI program and create standardized and straightforward government-wide policies for protecting controlled unclassified information. The CUI program simplifies how the Executive branch and its agencies handle and manage CUI, including distributing and managing security protocols and dissemination controls. Executive Order 13556 also designated the National Archives and Records Administration (NARA) as the CUI Executive Agent, granting the administration the authority to oversee the CUI program and the responsibility to publish periodic status reports and directives on the program’s implementation.
All Executive branch departments and agencies are required to implement the CUI program. The head of each department or agency is responsible for overseeing implementation throughout their department and serves as a program manager.
The CUI Registry is the government-wide repository for guidance regarding CUI policies, practices, and management. The registry can be found on the DoD’s official website. On the registry, organizations can view CUI protocols by category, including patent, tax, critical infrastructure, and more.
Shortly after being designated the CUI Executive, the NARA delegated oversight responsibilities to the Information Security Oversight Office (ISOO). ISOO issued 32 CFR Part 2022, “Controlled Unclassified Information,” to achieve its legal duties. This federal CUI policy ensures agencies comply with the CUI Program’s designating, safeguarding, marking, decontrolling, and disseminating rules. The policy applies to all Executive branch agencies that handle CUI and all organizations that interact with CUI while working with the U.S. Federal Government.
Organizations competing for government contracts, specifically DoD contracts, must demonstrate the ability to monitor and protect CUI. DoD Instruction 5200.48 presents basic requirements for ensuring effective CUI management in contractor relationships. These CUI requirements include the following:
To secure CUI across their internal systems and infrastructure and demonstrate compliance with DoDI 5200.48, contractors must develop robust cybersecurity protocols and adhere to the Cybersecurity Maturity Model Certification (CMMC) 2.0 framework.
The DoD’s CMMC framework includes cyber protection standards contractors and subcontractors can implement to ensure they comply with the department’s CUI guidelines. The CMMC contains five maturity levels that range from “basic cybersecurity hygiene” to “advanced.” The five levels of the CMMC include:
In order to achieve CMMC levels two through five, organizations will need to develop robust third-party risk management (TPRM) and attack surface management (ASM) programs, as required by NIST SP 800-171. Developing effective TPRM and ASM programs is the easiest way contractors can deploy critical cybersecurity techniques, like risk assessments and security questionnaires, communicated throughout CMMC levels four and five.
UpGuard’s comprehensive cybersecurity tools offer government contractors access to powerful TPRM and ASM solutions. These solutions make it easy and affordable for contractors to implement critical cybersecurity techniques, such as vendor due diligence, risk assessments, cybersecurity questionnaires, incident response plans, business continuity planning, and continuous security monitoring.
Here’s how UpGuard Vendor Risk helps contractors develop a comprehensive TPRM program:
Here’s how UpGuard Breach Risk helps contractors develop a comprehensive ASM program:
Together, Vendor Risk and Breach Risk form a complete cybersecurity solution your organization can utilize to help manage risks and protect data across its first and third-party ecosystems.
Get started with UpGuard and develop your comprehensive cybersecurity program today.