🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Conduct Background Checks and Document Results for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.1 Compliance

Step-by-step guidance on performing and recording background checks to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (PS.L2-3.9.1), with practical templates and small-business examples.

March 28, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control PS.L2-3.9.1 requires organizations to screen individuals prior to authorizing access to Controlled Unclassified Information (CUI) and to document the results — for a small business this means implementing repeatable, legally compliant background-check processes, secure evidence retention, and auditable adjudication that map directly to your compliance artifacts.

What PS.L2-3.9.1 requires (practical interpretation)

This control focuses on personnel screening tied to access to CUI: before you grant an individual access, you must perform appropriate background screening and retain documentation showing the check occurred and the adjudicated result. For Compliance Framework implementers this is evidence the assessor will look for: a written policy, proof of checks for each person with CUI access, signed consent forms, the vendor report (redacted for PII where appropriate), and a decision record (adjudication) that drove the access decision.

Practical implementation steps

1) Define scope and roles

Start by mapping roles that require CUI access — developers working on CUI systems, program managers, IT administrators with CUI-environment privileges, contractors and subcontractors. Create a role-to-screening matrix in your Compliance Framework documentation that lists each role, required screening level, and frequency (initial only, initial + periodic recheck, or continuous monitoring). For small businesses, keep the matrix simple: e.g., Level A (CUI access) = criminal national & county check + SSN trace; Level B (privileged admin) = Level A + credit and fingerprint if contract requires; Level C (non-CUI staff) = identity proofing only.

2) Determine background-check depth and methods

Typical checks include identity verification (government ID + SSN trace), national criminal database search, county-level criminal records search in candidate’s counties of residence and employment, employment/education verification when relevant, and when required by contract — fingerprint-based checks. Use a risk-based approach: escalate from a “name-and-SSN trace + multi-county criminal check” for most CUI roles to fingerprint or federal checks for roles with high privilege or special contract clauses. Document exactly which checks were ordered and why in the candidate’s personnel record.

3) Vendor selection and legal considerations

Select a vendor with FCRA-compliant processes, DoD contract experience (if you bid on DFARS), and secure data handling (SOC 2 Type II or equivalent). For small businesses, vendors like Sterling, Checkr, HireRight or local accredited firms can be used — confirm they support the searches you need (county, national, and fingerprint-based). Obtain candidate consent via a written form and make sure your process respects state ban-the-box and consumer-report laws; retain consent forms with the personnel record.

Documenting, storing, and presenting evidence

Create a standardized evidence package that each screened person’s file will contain: consent form, vendor order receipt, raw report (redacted copy stored), an adjudication form showing the reviewer, date, and access decision, and an IT provisioning ticket tying the check to the account or access grant. Store these files in a secure HR/evidence repository — encrypted at rest (AES-256) and in transit (TLS 1.2+). Limit access with RBAC so only HR/compliance/legal roles can view PII. Keep an audit log that records who accessed or exported the background-check file; feed logs to your SIEM for retention and tamper detection. When producing evidence for an assessor, export a redacted PDF with the adjudication memo and a hashed identifier that maps back to the full file in your protected archive.

Real-world small-business scenarios

Scenario A — 25-person firm pursuing a DoD subcontract: The firm maps 6 roles as CUI-access and buys county + national checks for these 6 hires via a single vendor account. HR documents consent and vendor order IDs in the firm’s GRC (governance, risk and compliance) tool and creates an “access ticket” in the help desk that remains closed until adjudication. When an assessor asks for evidence, HR exports redacted reports, the adjudication memo, and the provisioning ticket showing when accounts were created.

Scenario B — Remote-first startup with part-time contractors: The startup minimizes PII by performing identity verification and an SSN trace plus a criminal multi-state search for contractors working on CUI, then uses continuous monitoring (monthly alerting) for privileged contractors. If an alert occurs the company has a documented escalation path: immediate access revocation, HR notification, and expedited adjudication within 72 hours — all actions recorded in the personnel file and the access-control system.

Risks of not implementing PS.L2-3.9.1 — why this matters

Failing to conduct and document background checks increases insider risk, raises the probability of credential misuse, and threatens CUI confidentiality. For a small business, the practical fallout includes failed CMMC assessments, loss of DoD contracts, costly incident response, reputational damage, and potential regulatory fines. Moreover, absent clear documentation you cannot demonstrate due diligence during an incident investigation, which prolongs response and recovery and may trigger contract termination.

Compliance tips and best practices

Keep these actions actionable: 1) Formalize a written background-check policy that maps to PS.L2-3.9.1 and your Compliance Framework artifacts. 2) Use role-based check templates so the checks ordered are consistent and repeatable. 3) Implement a single source of truth (HRIS, GRC or ticketing system) that links the background-check order to the access provisioning ticket and to the contract ID. 4) Maintain an adjudication matrix (Clear / Conditional / Deny) with documented mitigation and re-check timelines. 5) Minimize and redact PII in exported evidence, encrypt personnel files, and retain records per contract: a common practical retention is “contract life plus 3 years” (confirm your contract and legal counsel). 6) Train HR and hiring managers on FCRA and state law requirements and maintain a cadence of periodic rechecks or continuous monitoring for high-risk roles.

In summary, build a simple repeatable workflow: identify roles, define the screening level, use an FCRA-compliant vendor, capture consent, securely store the raw report and an adjudication memo, tie the decision to access provisioning, and retain auditable evidence. For small businesses this approach keeps costs manageable, minimizes legal exposure, and produces the specific artifacts assessors look for when validating compliance with PS.L2-3.9.1 under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes