
What is a CUI Enclave?Ī CUI Enclave, also known as a security enclave, is a separate environment (physical, digital, or both) that is segmented from the rest of an organization and used specifically to process, store, and transmit FCI & CUI. On the other hand, when an organization properly scopes their network and creates a CUI enclave, the in-scope environment becomes much smaller and manageable, making compliance a lot more efficient and cost-effective. For certain organizations, this may not only be unimaginably expensive but also technically impossible. If scoping is done poorly, an organization’s entire network may be in-scope, meaning that everything and everyone under that network will need to comply with the security practices of NIST 800-171 & the CMMC. Scoping your FCI & CUI helps you understand what people, processes, and technologies surround your critical data. Or if you’re a higher education institution, the Department of Education (ED) has affirmed that data it provides to administer Title IV funds is considered CUI.įor more information, the National Archives provide access to the CUI Categories which covers the different categories (e.g., Critical Infrastructure, Financial, Privacy, Tax, etc.) which are considered CUI. That could include things like blueprints, technical manuals, or engineering drawings. For example, if you’re a DoD contractor, your contract might mention whether certain data exchanged or created as part of the contract is considered CUI.

In simpler terms, CUI is anything that an agency considers to be critical enough that, if lost, could be a risk to national security. However, CUI does not include classified information or information a non-executive branch entity possesses and maintains in its own systems that did not come from, or was not created or possessed by or for, an executive branch agency or an entity acting for an agency.” 4, “CUI is information the Government creates or possesses, or that an entity creates or possesses for or on behalf of the Government, that a law, regulation, or Government-wide policy requires or permits an agency to handle using safeguarding or dissemination controls. What is Controlled Unclassified Information (CUI)?Īs per. Some examples of FCI could include data like contracts, subcontracts, emails, notes, recordings, reports, charts, etc. In simpler terms, FCI is data that is generated during a contract with the Government that doesn’t fall into the stricter category of CUI but is still important enough that it shouldn’t be made publicly available. What is Federal Contract Information (FCI)?Īs per 48 CFR 52.204-21, “FCI means information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government, but not including information provided by the Government to the public (such as on public Web sites) or simple transactional information, such as necessary to process payments.”

Doing so ensures only the people, processes, and technologies that surround FCI & CUI are in scope, making compliance and certification more efficient and cost-effective. Part of meeting compliance and becoming certified involves understanding the scope of FCI & CUI in an environment and opting for an enclave approach. In the case of Department of Defense (DoD) contractors and subcontractors, the Cybersecurity Maturity Model Certification (CMMC) program was created to further verify, via a certification process, that FCI & CUI are in fact being adequately safeguarded. The National Institute of Standard and Technology (NIST) Special Publication (SP) 800-171, which outlines 110 security practices (also known as security controls), was created for this purpose. To protect the confidentiality of this data, the federal government requires organizations, as defined by Executive Order 13556, to safeguard FCI & CUI using a uniform set of requirements and information security controls designed to secure sensitive government information. How does Salt圜loud help with the CMMC?.Categorize your systems, applications, and services.

#Xlist cui location how to#
In this guide, we’ll explain what FCI & CUI are, the importance of scoping your organization and how to do it effectively, and why you need to take an enclave approach. As a contractor or research organization looking to comply with NIST 800-171 & the Cybersecurity Maturity Model Certification (CMMC), you need to identify where this data lives, who has access to it, and how it’s safeguarded. This guide is part of our 5-Step Guide to Prepare for the CMMC.įederal Contractor Information (FCI) and Controlled Unclassified Information (CUI) are types of data provided by the federal government which live on non-federal computer systems.
