🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step: Implementing CUI-Focused Risk Assessments with Templates and Tools — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - RA.L2-3.11.1

Practical, step-by-step guidance with templates and low-cost tools to implement NIST SP 800-171 / CMMC 2.0 RA.L2-3.11.1 CUI-focused risk assessments for small businesses.

April 11, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post walks through a practical, actionable implementation of RA.L2-3.11.1 (NIST SP 800-171 Rev. 2 / CMMC 2.0 Level 2) — the requirement to perform periodic risk assessments focused on Controlled Unclassified Information (CUI) — including templates you can adopt, tools to run scans and gather evidence, and small-business examples that show how to meet assessor expectations.

Step-by-step approach (high level)

Begin with a repeatable process: (1) identify and scope CUI and the systems that store/process/transmit it, (2) build an asset inventory that maps to CUI repositories, (3) identify threats and vulnerabilities (technical and non‑technical), (4) score likelihood and impact and compute risk ratings, (5) prioritize controls and document remediation in a POA&M, and (6) produce artifacts (risk register, scan reports, meeting notes) to demonstrate periodic assessments and management review. These steps align directly to RA.L2-3.11.1 expectations and must be repeated on a scheduled basis and after major changes.

1) Identify & scope CUI (templates and practical discovery)

Use a simple AssetInventory_CUI.csv (columns: AssetID, Hostname/CloudPath, Owner, CUI_Type, DataFlow, Location, RiskOwner, LastScanDate). For a small defense supplier example: scanning Microsoft 365 for folders that contain design drawings (.dwg, .pdf), shared links, and cloud buckets. Practical discovery tips: run an index search for likely CUI file extensions and keywords, use cloud provider APIs (AWS S3: aws s3api list-buckets && aws s3api list-objects --bucket ), check endpoint backup tools, and interrogate contract documents to tag required CUI categories. Document boundaries — include contractor laptops, third‑party file shares, dev/test environments, and SaaS apps storing CUI.</p>

2) Identify threats and vulnerabilities — tools and technical details

Combine automated scans with manual review. Network/host discovery: nmap -sV -p- 10.0.0.0/24 to find listening services; vulnerability scanning with OpenVAS or Nessus for CVE discovery; web app checks with OWASP ZAP. Use Shodan to find internet-exposed assets. Map each CVE to a CVSS v3 base score and capture the vector string. Example: an exposed VPN appliance with CVSS 9.8 should be treated as high risk to CUI. For small businesses, run authenticated scans where possible (credentialed Nessus/OpenVAS scans) to reveal missing patches and misconfigurations. Include non-technical threats: phishing susceptibility (use phishing simulation results), insider risk (access reviews), and supply chain vendor weaknesses.

3) Risk scoring, prioritization and templates

Adopt a simple risk formula: Risk = Likelihood (1-5) * Impact (1-5). Use CVSS thresholds to inform likelihood and impact (e.g., CVSS >=9 => Likelihood 5 / Impact 5 for internet‑exposed CUI systems). Provide a RiskRegister.xlsx with fields: RiskID, Description, AssetID, ThreatSource, Vulnerability/CVE, CVSS, Likelihood(1-5), Impact(1-5), RiskScore, Priority, ProposedMitigation, POA&M_ID, Status, ReviewDate. Example scoring: Likelihood 4 x Impact 5 = 20 (High). Prioritize remediation by risk score and business impact on CUI handling — patching high CVSS exposed systems, adding MFA to remote access, and isolating CUI stores on segmented VLANs/cloud subnets.

4) Documenting remediation, residual risk, and evidence for assessment

Produce a POA&M_Template.docx that ties each risk to a specific control action, owner, milestone, and estimated completion date. For CMMC assessors you'll need: the System Security Plan (SSP) updated with the assessment date and scope, the Risk Register, POA&M entries, raw scan reports (Nessus/OpenVAS), meeting minutes showing risk acceptance by leadership, and change logs showing applied mitigations. Schedule assessments at least annually and after major changes (new contracts, cloud migrations, breaches) — RA.L2-3.11.1 expects periodic evaluation and traceability from discovery to mitigation.

5) Compliance tips, best practices and small-business scenarios

Practical tips: (a) Start with the highest CUI impact systems — e.g., an engineering file server or a contractor-accessible SharePoint site — and implement segmentation + MFA immediately, (b) automate evidence collection where possible (store scan output in a versioned repository with timestamps), (c) use compensating controls when immediate remediation isn't feasible (temporary access restrictions, enhanced monitoring), and (d) adopt a patch SLA (72 hours for critical). Example scenario: a small subcontractor discovers CUI in a personal Google Drive shared with a subcontracted engineer — immediate steps: revoke sharing, copy CUI into an approved repository, add DLP rule to block outbound uploads, log the incident and add a POA&M item to enforce cloud usage policy and DLP deployment.

6) Tools (budget-conscious and enterprise options) and automation

Recommended low-cost stack: Nmap (discovery), OpenVAS (vuln scanning), OWASP ZAP (web), Google Workspace / Office 365 audit logs, Shodan, and a Google Sheet or Excel risk register. If budget allows: Nessus, Rapid7, Qualys for enterprise scanning; RiskLens / OpenFAIR for quantitative risk modeling; Cybersecurity posture management like Microsoft Defender for Cloud or AWS Security Hub for continuous findings. Automate recurring scans (cron or CI pipelines), ingest scan results into your risk register, and generate a periodic assessment report (monthly snapshot + annual formal assessment) to show ongoing oversight.

Risk of not implementing RA.L2-3.11.1: failing to perform focused, documented risk assessments can lead to undiscovered exposures of CUI, contract termination or loss of future DoD work, regulatory penalties, and reputational damage. Practically, an unassessed internet-exposed asset with CUI could be the vector for a breach that results in lost contracts and costly incident response. The compliance expectation is documented, periodic risk management with evidence — not just ad-hoc fixes.

In summary, implement RA.L2-3.11.1 by scoping CUI, using simple templates (AssetInventory_CUI.csv, RiskRegister.xlsx, POA&M_Template.docx), running technical scans with Nmap/OpenVAS/Nessus, scoring risks with a likelihood-impact matrix informed by CVSS, and documenting remediation and leadership review. For small businesses the emphasis should be on repeatability, prioritization, and producing clear artifacts for assessors: a living SSP, a dated risk register, scan outputs, and a POA&M showing tracked remediation and accepted residual risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes