🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.1

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.1

β€’
January 06, 2026
β€’
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.1 – Screen individuals prior to authorizing access to organizational systems containing Controlled Unclassified Information

Understanding the Requirement

Personnel security screening requires that organizations evaluate an individual's trustworthiness before granting access to systems that store or process Controlled Unclassified Information (CUI). The objective is straightforward: ensure that anyone who can reach CUI has been vetted so the organization reduces insider risk. For SMBs this means creating a repeatable vetting step in hiring and role-assignment workflows and documenting that the screening occurred prior to system access.

Technical Implementation

  • Define a clear vetting policy tied to roles that require CUI access. Document what checks are required (e.g., federal background checks, identity verification, employment history, and reference checks), who authorizes them, and retention periods for background check records. Keep the policy concise and integrated with HR hiring procedures.

  • Maintain an accurate inventory of systems and data classified as CUI and map roles that need access. Only users whose job duties require CUI access should be eligible for the vetting process and subsequent account provisioning. Use role-based access control (RBAC) to limit assignment of CUI privileges.

  • Incorporate vetting gates into onboarding workflows. Require HR to complete the specified background check and confirm clearance before IT or system administrators create accounts, assign CUI roles, or issue credentials. Use a documented checklist that must be signed off by HR and an information security owner.

  • Implement technical controls that prevent access until vetting is complete. For example, automate account provisioning with a manual approval step in your identity management system or disable CUI groups until the user’s vetting status is marked as "cleared." Enforce multi-factor authentication (MFA) and least-privilege by default.

  • Keep auditable records and periodic re-screening. Store background check confirmations, approval dates, and vetting levels in a secure HR record system or encrypted repository. Schedule re-screening or trigger reviews for role changes, promotions, or after incidents. Ensure records meet contract and retention requirements for CUI handling.

    </ul>

    Example in a Small or Medium Business

    Acme Engineering, a 60-person firm, wins a Department of Defense subcontract that involves receiving CUI. HR updates the hiring checklist to require a federal background check and identity verification for anyone assigned to the contract. Before any new hire or existing employee is given access to the contractor network or project folders, HR uploads the background check clearance to a secure HR record and notifies the security lead. The security lead then instructs the system administrator to create an account in the identity management system and add the user to the CUI-access group; the identity system requires a manager approval flag before group membership activates. The system administrator configures MFA and limits permissions to only the project resources needed for the person's role. For contractors and temporary staff, Acme requires proof of equivalent vetting from the staffing firm and logs that proof before provisioning. When an employee moves off the project or leaves the company, HR revokes the CUI group membership immediately and archives the vetting records according to the firm's retention policy. Periodic audits by the security lead verify that all active CUI accounts have supporting vetting documentation.

    Summary

    Screening individuals before granting access to systems that contain CUI combines straightforward HR policy with simple technical gates: define vetting requirements, tie them to roles, prevent provisioning until approval, and maintain auditable records. For SMBs, integrating screening into onboarding, using RBAC and automated approval steps, and keeping documented proof of checks provides a practical, repeatable way to meet PS.L2-3.9.1 while minimizing operational disruption and reducing insider risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes