🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement Background Screening for CUI Access: NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.1 Step-by-Step

Practical, step-by-step guidance for small businesses to implement background screening that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control PS.L2-3.9.1 for CUI access.

•
April 05, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 include Personnel Security controls that require organizations to screen individuals prior to authorizing access to Controlled Unclassified Information (CUI); implementing PS.L2-3.9.1 means creating a repeatable, auditable background screening program that ties into hiring, access provisioning, and ongoing monitoring.

Why background screening is required and what’s at stake

The core requirement for PS.L2-3.9.1 is simple: verify that people given access to CUI meet your organization’s trust criteria before they get access. The risk of not screening is direct and immediate—insider threats, unauthorized disclosure of CUI, contract noncompliance, financial penalties, lost contracts, and reputational damage. For a small business supporting DoD contracts, a single avoidable data leak can end a multi-year relationship and trigger corrective actions during an audit.

Step-by-step implementation for Compliance Framework

1) Define scope and policy: document which job roles, contractor types, and third-party users require screening for CUI access. Map those roles to specific access levels (e.g., read-only, create, admin). 2) Determine screening depth: for each role decide the screening package (identity verification, SSN trace, county & national criminal checks, employment/education verification, sanctions/exclusions checks such as SAM/OIG). 3) Produce a written PS.L2-3.9.1 procedure that includes decision points, who authorizes access, and retention requirements for screening records.

Practical vendor selection and candidate workflow

4) Choose an FCRA-compliant background check vendor that supports the packages you need and has API integration options; for small businesses popular vendors include Checkr, Sterling, Accurate Background, and local county-aggregator services. 5) Create candidate consent and disclosure forms (FCRA-compliant for U.S. applicants). 6) Implement a workflow: HR triggers check on conditional offer, vendor returns results to HR, HR reviews against documented criteria, hiring manager authorizes access provisioning, IAM receives provisioning signal. Example: a 25-employee subcontractor (small business) can get baseline packages done in 3–7 business days and will typically pay $50–$200 per candidate depending on depth and international checks.

Technical integration and data security

7) Automate provisioning: integrate background check results with your IAM/HR systems via API or SCIM so that access is created only after a pass result and authorized stamp. Use SSO providers (Okta, Azure AD) to manage accounts and group membership. 8) Protect screening data as PII/CUI: store results in an encrypted HR database (AES-256 at rest), transmit via TLS 1.2+, and use a KMS (AWS KMS/Azure Key Vault) to manage keys. Limit access to results with RBAC and log all accesses in your SIEM (forward audit records to Splunk/Elastic/CloudWatch with immutable retention for audits). 9) Implement entitlement checks in your access workflows (least privilege, time-limited roles, just-in-time elevation) so that revoked or failed screenings automatically prevent or remove CUI access.

Handling contractors, remote workers, and visitors

Contractors and remote staff are common in small businesses. Treat third-party individuals identically in the policy: require contractual clauses that mandate screening, use vendor attestations if the subcontractor performs their own screening, and require evidence. For short-term visitors needing temporary CUI access, implement time-bound accounts, screen for basic identity and sanctions lists, and use session recording or privileged access management (PAM) tools to limit risk.

Compliance tips, evidence, and best practices

Document every decision: keep checklists that show the package run, the reviewer, the authorization, and the date access was granted. Implement an adverse-action process compliant with FCRA and state laws—if you deny access based on a report, give required notices and an appeal window. Regularly (annually or per contract requirement) re-evaluate individuals with ongoing access and tie re-checks to role changes. Keep retention and destruction policies for screening records aligned with contract terms and applicable law; consider keeping audit records and supporting evidence for the length of contract plus a reasonable margin to support audits.

Consequences and risk if you don’t implement PS.L2-3.9.1

Failing to implement this control puts your organization at high risk of insider compromise and regulatory noncompliance. In practice that means increased probability of a data breach involving CUI, failed audits, potential corrective action plans from prime contractors or government agencies, and loss of eligibility for contracts. Beyond compliance, uncontrolled personnel risk translates into direct technical risks—unauthorized credential use, privilege escalation, and lateral movement inside networks that contain CUI.

In summary, implement PS.L2-3.9.1 by: writing a clear policy, selecting the right screening packages, using FCRA-compliant vendors, automating HR→IAM workflows, securing screening data, documenting decisions, and re-checking as required. For small businesses, focus on pragmatic automation (API or SCIM), least-privilege access gating, and auditable evidence—doing so will meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 expectations and materially reduce the risk of CUI compromise.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes