🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Practical Data Flow Map to Control CUI Movement: NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AC.L2-3.1.3

Step-by-step guidance for creating and enforcing a data flow map that documents and controls CUI movement to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 AC.L2-3.1.3 requirements.

•
April 23, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Control AC.L2-3.1.3 in CMMC 2.0 / NIST SP 800-171 Rev.2 requires that Controlled Unclassified Information (CUI) movement is controlled in accordance with approved authorizations — the practical way to show that is a living data flow map that documents where CUI exists, how it travels, and what controls enforce those flows.

Why AC.L2-3.1.3 matters for your Compliance Framework program

At a high level, auditors and assessors need evidence that CUI is not free to roam: it must be identified, its permitted paths must be explicit, and technical and administrative controls must enforce those paths. A data flow map is the central piece of evidence that ties together inventory, network segmentation, access control, DLP, and the organization’s authorization decisions under the Compliance Framework (NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2).

Practical steps to build the data flow map

Discovery and classification

Start with discovery: scan repositories (file shares, SharePoint, G Suite/Workspace, Box, AWS S3, endpoints) with classification tools or manual review to identify files and locations containing CUI. Tag discovered items in a classification inventory (CSV or CMDB fields) with attributes: data type, owner, location, access group, retention, and handling constraints. For a small business, an initial scope might be a single project folder in SharePoint, an S3 bucket, and a handful of employee laptops—document them precisely.

Map construction: nodes, flows, and controls

Create the map in a diagram tool (draw.io, Lucidchart, Miro). Represent each node (user, device, cloud service, partner, printer) and each flow (protocol, port, direction). For each flow include: data classification (CUI), allowed protocols (HTTPS, SFTP), encryption requirements (TLS 1.2+), authentication (MFA required), and enforcement points (firewall, proxy, CASB, DLP). Example: "Engineering laptop → SharePoint (HTTPS port 443) — label enforced via Microsoft Purview DLP; access limited by Conditional Access to compliant devices."

Technical controls to enforce and limit CUI movement

Translate map items into enforceable controls. Network segmentation: put systems that process CUI in a protected VLAN/VPC with firewall ACLs that deny inbound/outbound by default and only permit required flows (example ACL: deny ip any any; then allow tcp from 10.10.10.0/24 to 10.20.20.0/24 eq 443). Use host-based controls: HIPS/EDR, local firewall rules, and MDM to restrict unmanaged devices. For cloud storage, enforce bucket policies or conditional access—example S3 policy conditions that allow access only from company VPC endpoint or source IP ranges, or SharePoint/OneDrive policies that block external sharing for sites labeled CUI.

Detection, monitoring, and validation

Implement DLP and monitoring to validate the map. Deploy DLP rules (Microsoft Purview DLP, Google DLP, or third-party) that detect CUI labels and block or quarantine exfiltration attempts via email, web upload, or removable media. Use a CASB to monitor SaaS behavior, NetFlow/flow logs and Zeek/Suricata for network flows, and centralized logging (Splunk/Elastic) for correlation. For small businesses, start with cloud-native logs (Azure AD sign-in logs, AWS CloudTrail, Office 365 audit logs) and set alerts for anomalous CUI access or transfers (large download from CUI repository, new external share link creation).

Governance, documentation, and evidence for assessors

Document the authorization model: who approved each permitted flow, the business justification, and compensating controls. Keep artifacts: the data flow diagram, the classification inventory, firewall rule sets, DLP policies, conditional access settings, and monitoring alerts with remediation steps. Include routine validation: quarterly reviews, vulnerability scans, and change-control tickets that show approval when a new flow is introduced. For a small business, a single spreadsheet tying each flow to an approval and two evidence items (config export + recent access log) is often sufficient for an assessor.

Real-world small-business scenarios and examples

Scenario 1: A subcontractor team uses Microsoft 365 to store CUI. Solution: label the SharePoint site as CUI, enforce a conditional access policy requiring compliant devices and MFA for access, and create a DLP rule that blocks external sharing of labeled documents. Scenario 2: Engineers use AWS S3 for project artifacts. Solution: restrict the S3 bucket with a policy allowing only the corporate VPC endpoint and enable S3 Object Lock if retention is required; instrument CloudTrail and S3 access logs with alerting for any GetObject from outside the VPC.

Risk of not implementing AC.L2-3.1.3

Failing to control CUI flows risks accidental or malicious exfiltration, regulatory fallout, and lost contracts. Practical consequences include immediate DFARS or contract noncompliance, suspension from DoD contracting, required breach notifications, and erosion of trust. Technically, unsegmented networks and permissive cloud sharing greatly increase attack surface: a compromised low-privilege machine can become a pivot point if CUI movement is not limited and monitored.

Compliance tips and best practices

Minimize CUI footprint: limit where CUI is stored and restrict copies. Use automated labeling (MIP, Google labels) paired with technical enforcement (DLP, CASB). Maintain a change log and POA&M for flows you can’t immediately remediate. Run periodic table-top and penetration tests to validate controls. For evidence readiness, export configurations (firewall rules, IAM policies), keep dated diagrams, and capture screenshot/video of policy tests showing blocked transfers.

Summary: a practical data flow map for AC.L2-3.1.3 is a living artifact that documents CUI nodes and permitted paths, ties each path to explicit authorizations and technical enforcement, and is validated through monitoring and periodic review; implementing it reduces risk, provides audit evidence, and is achievable for small businesses by focusing first on discovery, labeling, and enforcement at the boundary points (cloud controls, firewalls, DLP) and then expanding monitoring and governance over time.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes