🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Guide: Implementing Periodic Risk Assessments for CUI (NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - RA.L2-3.11.1)

Practical, step-by-step guidance for small businesses to implement periodic risk assessments for Controlled Unclassified Information (CUI) to meet NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 RA.L2-3.11.1 requirements.

•
April 20, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Periodic risk assessments for Controlled Unclassified Information (CUI) are a mandatory component of NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 (RA.L2-3.11.1): they require a repeatable process that identifies threats, vulnerabilities, and risk to CUI, documents findings, and drives remediation and continuous monitoring. This post gives a practical, compliance-focused, step-by-step implementation guide tailored for small businesses operating under a Compliance Framework, with concrete technical details, templates, timelines, and real-world examples you can apply immediately.

Why periodic risk assessments matter for CUI

Periodic risk assessments ensure you understand how changes (new systems, staff, suppliers, or threats) affect the confidentiality, integrity, and availability of CUI. The key objectives under a Compliance Framework are to: (1) identify and prioritize risks to CUI, (2) produce evidence for the System Security Plan (SSP) and Plan of Actions & Milestones (POA&M), and (3) inform security controls and resource allocation. Without periodic assessments you risk missing newly introduced exposures, failing to meet contractual requirements, and being unable to demonstrate due diligence to DoD primes or government customers.

Step-by-step implementation

1) Define scope and system boundary

Start by documenting the Compliance Framework scope: list all systems, networks, cloud services, endpoints, and business processes that store, process, or transmit CUI. Create a simple data flow diagram (DFD) that shows CUI at rest and in transit (for example: employee laptops → Microsoft 365 SharePoint → external contractor FTP). For small businesses, the scope is often limited to a handful of applications and endpoints; define a boundary and note any out-of-scope systems used for non-CUI work. Record the Authorizing Official and the Information System Security Officer (ISSO) or the individual responsible for the risk assessment.

2) Build an asset inventory and identify threats & vulnerabilities

Create an asset register that tags each item with owner, CUI relevance, and technical details (OS, open ports, patch level, cloud tenant ID). Use automated discovery tools (Nmap for network discovery, Nessus/OpenVAS for vulnerability scanning, Azure AD/Google Workspace admin consoles for SaaS inventories). For each asset, list threats (e.g., phishing, lateral movement, misconfigured S3 buckets) and map vulnerabilities (unpatched CVEs, weak MFA, default credentials). For small teams, a combination of weekly vulnerability scans and quarterly manual reviews is a cost-effective cadence.

3) Assess likelihood and impact — score your risks

Quantify risk with a simple formula: Risk = Likelihood x Impact. Use scales you can defend (e.g., Likelihood 1–10 or percentage; Impact $ or Confidentiality/Integrity/Availability scale 1–5). Example: an unpatched external RDP port might have Likelihood = 6/10 and Impact = 5/5 (exposure of CUI), producing a high-priority score. For better objectivity use CVSS base scores for vulnerability severity (>=7.0 = High) and correlate with business impact (loss of contract, regulatory fines, intellectual property loss). Document your scoring rubric in the SSP so assessors understand your methodology.

4) Prioritize remediation and create the POA&M

Convert prioritized risks into actionable tasks with owners, target dates, and evidence requirements. High-risk items get highest priority—e.g., patch public-facing servers within 7 days, disable legacy protocols, enforce MFA. For each POA&M entry include: vulnerability ID, risk score, mitigation action, residual risk, resources required, and verification checklist (patch notes, configuration screenshots). If you cannot fully mitigate immediately, implement compensating controls (network segmentation, multi-layer detection, heightened logging) and document why these reduce risk to acceptable residual levels.

5) Monitor, report, and reassess on a schedule

Periodic means repeatable and event-driven. Recommended schedule for small businesses under a Compliance Framework: monthly automated vulnerability scans, quarterly tabletop reviews and risk register updates, and an annual full risk assessment tied to your SSP review. Also trigger an assessment after major changes (new cloud service, merger, significant employee turnover, or known threat targeting your sector). Maintain artifacts: risk assessment report, updated risk register, POA&M entries, meeting minutes, scan outputs, and evidence of remediation to demonstrate compliance.

Real-world small-business example and tooling

Scenario: a small defense subcontractor with 20 employees stores CUI on Microsoft 365 and three developer laptops with local CUI caches. Implementation: (1) scope documents only the Microsoft tenant and the three laptops; (2) run monthly Microsoft Secure Score checks and enable Conditional Access (MFA + device compliance) as an immediate control; (3) run Nessus scans monthly for the laptops, restrict RDP at the perimeter, and apply Windows updates within 14 days; (4) create a POA&M in a spreadsheet (or a free ticketing system like GitLab issues) and update it weekly. Use screenshots of Azure Conditional Access policies, Microsoft Secure Score reports, and Nessus scan reports as artifacts during audits.

Compliance tips, best practices and technical specifics

Practical tips: (a) keep your SSP tightly aligned with your risk register and reference specific POA&M IDs in the SSP; (b) use CVSS >=7 as initial high severity cutoff and treat exposures with public exploit code as top priority; (c) automate evidence collection where possible (API pulls from Nessus, Azure, Google Workspace) to reduce manual effort; (d) implement baseline controls like MFA, endpoint detection and response (EDR), and centralized logging before deep assessments to lower total risk. For small budgets, consider managed MSSP or CAASM services and prioritize protecting CUI endpoints and cloud repositories. Record roles (e.g., Risk Assessor, Remediation Owner, ISSO) and sign-off dates — auditors expect named responsibility and timelines.

Risks of not implementing periodic risk assessments

Failing to perform periodic assessments exposes CUI to undetected vulnerabilities and evolving threats, increasing the chance of data exfiltration, contract non-compliance, loss of DoD business, and regulatory or financial penalties. Practically, one missed high-severity vulnerability (public-facing RDP or misconfigured cloud storage) can lead to a breach that compromises CUI, triggers incident response costs, and damages reputation—costs far exceeding the investment to run periodic assessments. Lack of documented assessments and POA&Ms is a common reason small businesses fail CMMC audits or lose subcontractor status.

In summary, implement periodic risk assessments by scoping CUI systems, building an asset inventory, identifying threats/vulnerabilities, quantifying risk with a documented rubric, prioritizing remediation in a POA&M, and maintaining a repeatable schedule with evidence collection. For small businesses under a Compliance Framework, focus on protecting the small set of CUI-bearing assets, automate scans and evidence collection where possible, and ensure your SSP and POA&M reflect the assessment outcomes—this combination will keep you compliant with RA.L2-3.11.1 and reduce real-world risk to your organization.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes