🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement a Step-by-Step Screening Process for CUI Access: NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.1

Practical, step-by-step guidance for implementing personnel screening to control access to Controlled Unclassified Information (CUI) and meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 PS.L2-3.9.1 requirements.

•
April 01, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

PS.L2-3.9.1 of CMMC 2.0 / NIST SP 800-171 Rev.2 requires organizations to screen individuals prior to authorizing access to systems that process, store, or transmit Controlled Unclassified Information (CUI); for small businesses this is both a legal and practical security imperative—this post gives a step-by-step, implementable screening process that aligns to the Compliance Framework and includes technical controls, real-world examples, adjudication guidance, and tips to reduce operational friction while maintaining defensible compliance.

Why a formal screening process matters for CUI (risk and compliance)

Failing to properly screen personnel increases insider risk, negligent disclosure, and the chance of credential compromise that can lead to CUI exfiltration—results include contract termination, fines under DFARS and DoD requirements, damage to reputation, and remediation costs. From a compliance perspective, PS.L2-3.9.1 isn't just paperwork: auditors expect documented policies, evidence of checks performed prior to granting access, and technical enforcement (e.g., IAM controls) tied to the screening process in your System Security Plan (SSP) and supporting artifacts.

Step-by-step practical implementation for small businesses

1) Define protected roles and CUI boundaries: Start by mapping where CUI resides (servers, SharePoint, SaaS) and create role definitions that explicitly state the minimum privileges needed. 2) Establish a Personnel Screening Policy: Document required checks (e.g., identity verification, criminal background, employment history, references, education/licensure where relevant), the timeframe for checks (e.g., completed before access or within 10 business days), adjudication criteria, and retention rules for results. 3) Integrate HR, Security, and IT workflows: Use a single onboarding ticket in your HRIS or ITSM (e.g., Workday+Jira Service Desk) that triggers background checks and conditional access provisioning approvals tied to the role.

Technical enforcement and identity controls

Provision access only after receiving a “clear” screening outcome and use IAM to enforce it: implement group-based access in Active Directory/Azure AD with automated provisioning (SCIM) that only places an account into CUI-access groups once HR signals “screening complete.” Require MFA (TOTP or FIDO2) for all CUI accounts, enforce device compliance via MDM (e.g., Intune), and protect privileged functions with a PAM solution (CyberArk, BeyondTrust, or open-source alternates). Log all provisioning events to your SIEM for audit trails (Splunk/Elastic) and retain records according to policy.

Background checks, identity proofing, and what to include

For small contractors, practical checks generally include: government-issued ID verification, Social Security verification, criminal history search, employment verification, reference checks, and role-specific checks (e.g., professional license validation). Use reputable vendors (HireRight, Sterling, local certified providers) and document the vendor contract. For remote hires, add identity-proofing steps (video verification, knowledge-based verification) and require company-managed endpoint onboarding to ensure the device meets baseline security before granting CUI access.

Adjudication, exceptions, and ongoing monitoring

Create an adjudication matrix that describes disqualifying and mitigating factors (e.g., recent convictions may require a period of cleared time or managerial approval with documented mitigation). Every approval/exception must be documented (who authorized, why, compensating controls). Re-screen on role change or annually depending on risk: implement periodic revalidation (e.g., annual attestation and a 3-year full background re-check for sensitive roles) and continual monitoring using HR feeds and SIEM alerts for anomalous behavior tied to CUI access accounts.

Real-world small business scenario

Example: A 25-person engineering subcontractor handles CUI drawings in SharePoint Online. Implementation steps used: (a) classify which SharePoint sites contain CUI, (b) create a “CUI-Access” AD group, (c) require HR to initiate a background check order and attach results to the onboarding ticket, (d) only after a “clear” status does the IT admin add the new hire to the CUI-Access group via an automated flow in Azure AD (Power Automate + Graph API), and (e) conditional access blocks access from unmanaged devices. The company documents this in its SSP and keeps screening artifacts in an encrypted HR records store with strict access controls.

Compliance tips and best practices

Keep these pragmatic tips: (1) codify the screening process in policy and the SSP so auditors can trace requirements to practice; (2) automate provisioning to eliminate human delays that lead to shadow access; (3) separate CUI access accounts from everyday accounts—use dedicated accounts or roles for CUI handling; (4) encrypt screening data at rest and control who can view background check results; (5) maintain an auditable ticket trail for every access grant and revocation; and (6) include screening and CUI handling in your employee security training and signoffs (NDA and AUP).

Implementing PS.L2-3.9.1 is achievable for small businesses by combining documented policy, a pragmatic set of background checks appropriate to the role, automated IAM controls to enforce “no check, no access,” and periodic revalidation. The risk of not doing so—insider incidents, contract loss, and regulatory penalties—makes this a priority: treat screening as the frontline of CUI defense, integrate it into HR/IT workflows, and document everything in the SSP and POA&M to demonstrate ongoing compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes