🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Checklist to Secure Controlled Unclassified Information at Home Offices and Satellite Locations — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PE.L2-3.10.6

Step-by-step checklist and practical guidance to secure Controlled Unclassified Information (CUI) at home offices and satellite locations in alignment with NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 PE.L2-3.10.6.

April 01, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to build a practical, auditable checklist to secure Controlled Unclassified Information (CUI) at home offices and satellite locations to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control PE.L2-3.10.6, with concrete implementation steps, technical specifics, and small-business scenarios.

What PE.L2-3.10.6 requires and key objectives

At a high level, PE.L2-3.10.6 is focused on preventing unauthorized physical access to CUI outside primary facilities — which includes home offices, remote workers, and satellite/coworking locations. The key objectives are: (1) ensure CUI is stored and processed only where approved controls exist, (2) provide defense-in-depth so physical weaknesses do not expose digital data, and (3) produce auditable evidence that controls were implemented and are monitored.

Implementation notes (Compliance Framework-specific)

For Compliance Framework alignment, treat each home/satellite location as a "facility" in your system security plan (SSP) and map controls to the requirement. Document baseline configurations, owner/responsible parties, and evidence types (photos of safes/locks, MDM/NAC logs, EDR alerts, training records). Where possible, incorporate evidence into your continuous monitoring feed so attestations are based on real telemetry rather than one-off checks.

Actionable checklist — physical controls and handling

Start with a physical-control checklist you can use during onboarding and audits. Items to include: locked storage (approved safe or lockable filing cabinet bolt‑anchored if in a shared space); secure printing policies (no unattended printed CUI); visible privacy practices (privacy films/screens for laptops used in public settings); cable locks for laptops; secure disposal (cross-cut shredder or secure pickup for printed CUI); and visitor restrictions in satellite offices (visitor sign-in, escorted access to CUI areas). For each item, note responsible person, verification method, and frequency (e.g., weekly spot-checks or quarterly audits).

Actionable checklist — technical controls

Technical controls should directly support physical protections: require whole-disk encryption (AES-256) on all endpoints storing or accessing CUI—BitLocker (Windows) with TPM 2.0 + secure boot, FileVault2 for macOS; enforce strong authentication with MFA for remote access and cloud portals; use enterprise VPNs with split-tunnel disabled for CUI flows or zero-trust access solutions; deploy an MDM/EDR solution to enforce device hygiene (patch levels, anti-malware, disk encryption status) and allow remote wipe. For small businesses, use vendor-managed offerings (e.g., Microsoft Intune + Defender, Jamf + endpoint protection) to reduce operational overhead and produce logs for assessments.

Device and network specifics

Require endpoints to have TPM-backed BitLocker encryption enabled, Secure Boot turned on, OS and agent auto-update configured, and antivirus with tamper protection. On the network side, use WPA3 for home Wi‑Fi where possible, require unique strong passwords, and recommend or enforce use of a separate SSID/VLAN for guest devices at satellite offices. If employees use personal routers, include approved configuration templates (admin password, firmware updates, disable UPnP) in the telework policy and require a periodic screenshot or MDM attestation as evidence.

Administrative controls, training, and contractual considerations

Administrative controls are often the weakest link but easiest to implement: add telework and satellite office language to your SSP and policies, sign addenda to subcontractor agreements requiring compliance, and maintain a CUI handling SOP that covers marking, storage, printing, transfer, and destruction. Train staff annually and at onboarding with scenarios focused on home-office risks (package theft, family members accessing devices, working in public spaces). Require employees to self-attest monthly that their home-office controls remain in place and capture those attestations as evidence.

Monitoring, evidence collection, and lifecycle management

Implement logging and evidence collection as part of the checklist: check MDM/EDR dashboards for device compliance daily, archive VPN and conditional access logs for 90 days, and record quarterly physical inspections (photos of locks/safes). Maintain an asset inventory that links device serial numbers to user, location, and CUI access level. For lifecycle: define processes for onboarding (checklist + configuration), change control (approved exceptions documented), and decommissioning (verified wipe and physical recovery or disposal of devices storing CUI).

Real-world small business scenarios and timelines

Example 1: A 20-person subcontractor with 5 remote workers — Week 1: inventory remote locations and devices; Week 2–4: enable BitLocker/FileVault, enroll devices in MDM, deploy VPN and MFA; Month 2: distribute safes or require locked cabinets for paper CUI and train staff; Month 3: begin weekly MDM compliance checks and quarterly physical checks. Example 2: Small team in a coworking satellite — implement access-controlled room booking, provide a lockable cabinet for CUI, require guests to be escorted, and ensure the coworking provider signs a non-disclosure and basic physical security addendum.

Risk of not implementing PE.L2-3.10.6 and compliance consequences

Failing to implement these controls increases risk of data leakage, loss of DoD contracts, and regulatory fines. A typical breach scenario: an unenforced home-office without encryption results in a stolen laptop containing CUI — this can lead to compromise of prime-contractor data, mandatory breach notification, damage to reputation, a lost contract, and adding deficiencies to your CMMC assessment. From a compliance perspective, lack of documented controls, evidence, or continuous monitoring will cause deficiencies under CMMC Level 2 and prevent certification.

Compliance tips and best practices

Keep evidence simple and automated where possible: screenshots of MDM compliance reports, VPN logs, photos of physical controls, signed policies stored in your compliance system. Use a POA&M to track exceptions and remediation dates. Prefer managed services with FedRAMP or DoD SRG-aligned offerings for cloud storage of CUI. Conduct at least one tabletop exercise per year that simulates loss of a CUI-bearing device in a home or satellite office and validate incident response and notification steps.

Summary: Treat each remote location as a mini-facility — document, apply layered physical and technical controls, automate evidence collection, train staff, and monitor continuously. Using the checklists and timelines above, a small business can create auditable controls that satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 PE.L2-3.10.6 and materially reduce the risk of CUI exposure at home offices and satellite locations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes