{
  "title": "How to Create a Backup Data Classification and Handling Plan to Protect CUI — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MP.L2-3.8.9",
  "date": "2026-04-24",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-create-a-backup-data-classification-and-handling-plan-to-protect-cui-nist-sp-800-171-rev2-cmmc-20-level-2-control-mpl2-389.jpg",
  "content": {
    "full_html": "<p>Controlled Unclassified Information (CUI) in backups is a common compliance gap for organizations subject to NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2; MP.L2-3.8.9 requires that backup data be classified and handled to preserve confidentiality and integrity — this post gives a practical, step-by-step plan to implement that control for a small business working under a Compliance Framework.</p>\n\n<h2>What MP.L2-3.8.9 requires (high level)</h2>\n<p>MP.L2-3.8.9 sits in the Media Protection family: you must ensure backup media and copies containing CUI are identified, labeled, protected, and handled according to the risk and contractual obligations. In practice that means discovering where CUI appears in backups, applying protection controls (encryption, access control, immutability where appropriate), documenting handling procedures, and retaining proof of adherence for assessment or audit.</p>\n\n<h3>Key objectives</h3>\n<p>The core objectives for Compliance Framework alignment are: 1) reliably identify backup data that contains CUI, 2) protect confidentiality, integrity, and availability of that backup data using technical and operational controls, 3) define retention/handling/destruction policies consistent with contract requirements, and 4) maintain auditable evidence (logs, test results, procedures) that demonstrate compliance.</p>\n\n<h2>Practical implementation steps — inventory and classification</h2>\n<p>Start by building an inventory of backup systems (onsite image backups, cloud snapshots, archive buckets, removable media). Use data discovery tools or file tagging rules (DLP regular expressions, filename patterns, or content scanning) to flag files containing CUI fields (SSNs, contract numbers, DFARS markers). For a small business: run a weekly scanning job against backup sets (or source data prior to backup) that outputs a CSV of flagged objects with metadata (file path, size, backup job ID, timestamp). Tag the affected backups in your backup system — most enterprise tools (Veeam, Commvault, Rubrik) and cloud services (AWS S3 object tags, Azure Blob metadata) support metadata tagging to mark items as CUI.</p>\n\n<h2>Practical implementation steps — protection controls</h2>\n<p>Apply layered protections. Encryption at rest: enable AES-256 encryption for disk images and object stores; for cloud, use customer-managed keys (CMKs) in KMS/HSM (AWS KMS CMKs, Azure Key Vault with HSM) so you can produce key rotation and access audit logs. In transit: require TLS 1.2+ for backup transfers and use VPN or Direct Connect for offsite transfers. Access control: apply least-privilege IAM policies to backup systems and keys, require MFA for key administrators, and segregate duties so backup operators cannot decrypt or export CUI without another approver. For immutability/integrity: enable immutable snapshots or Write Once Read Many (WORM) where available (S3 Object Lock with compliance mode, Veeam immutability repository), and store SHA-256 hashes of backup images in a tamper-evident log; for physical media, use tamper-evident seals and store manifests signed (digitally or physically) by two people.</p>\n\n<h2>Practical implementation steps — retention, labeling, and handling procedures</h2>\n<p>Create a handling playbook that maps backup types to labels and retention classes (e.g., CUI-Short: 90 days; CUI-Contract: 7 years — adjust per contract). Require labeling at the source and in the backup metadata so restores and exports carry the CUI tag. Define procedures for movement (who may move backups offsite), for media reuse/sanitization (NIST SP 800-88 sanitization guidance), and for disposal (certificate of destruction). For small businesses that use cloud backups: include contractual flow-downs that require cloud providers to restrict access to keys and provide monthly key access logs; if using rotating external drives, encrypt with AES-256, log drive serial numbers, and keep chain-of-custody forms for each rotation.</p>\n\n<h2>Testing, monitoring, and evidence for assessments</h2>\n<p>Test restore procedures quarterly or per your RTO/RPO requirements; a backup is only useful if you can recover reliably. Maintain evidence: scheduled backup job logs, verification reports that include checksums (SHA-256), encryption key usage logs from KMS, IAM policy screenshots, immutable repository settings, and signed restore test reports describing what was restored and by whom. For a CMMC assessment, common artifacts include policy documents, the backup inventory, tagging screenshots, sample chain-of-custody forms, recent restore test results, and SIEM logs showing access to backup storage and KMS key usage.</p>\n\n<h2>Risks of not implementing MP.L2-3.8.9 and best practices</h2>\n<p>Failing to classify and handle backup CUI increases risk of data breaches, unauthorized disclosure, contract penalties, and lost bidding opportunities. Real-world examples: a subcontractor that backed up design documents to an unencrypted public bucket caused CUI exposure and lost its DoD contract; another small business failed an CMMC assessment because it couldn't show restore tests or key access controls. Best practices: adopt least-privilege access, require CMKs with rotation and audit trails, schedule regular restore tests, use immutable backups for critical CUI, train staff on handling procedures, and include backup handling clauses in vendor SLAs. Maintain a risk register and map each backup type to a mitigation strategy (encryption, immutability, offline copy) with owner and review cadence.</p>\n\n<p>Implementing MP.L2-3.8.9 is operationally straightforward but requires disciplined processes: inventory and tag CUI in backups, force technical controls (AES-256/KMS, TLS1.2+, IAM), document procedures and retention, run restore tests and record evidence, and train staff. For small businesses, prioritize quick wins (enable server-side encryption and object tagging, schedule restore drills, and create a simple chain-of-custody log) and expand to immutability and HSM-backed key management as your risk profile and contract requirements demand. Meeting these steps will materially reduce compliance risk and provide the demonstrable evidence assessors expect.</p>",
    "plain_text": "Controlled Unclassified Information (CUI) in backups is a common compliance gap for organizations subject to NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2; MP.L2-3.8.9 requires that backup data be classified and handled to preserve confidentiality and integrity — this post gives a practical, step-by-step plan to implement that control for a small business working under a Compliance Framework.\n\nWhat MP.L2-3.8.9 requires (high level)\nMP.L2-3.8.9 sits in the Media Protection family: you must ensure backup media and copies containing CUI are identified, labeled, protected, and handled according to the risk and contractual obligations. In practice that means discovering where CUI appears in backups, applying protection controls (encryption, access control, immutability where appropriate), documenting handling procedures, and retaining proof of adherence for assessment or audit.\n\nKey objectives\nThe core objectives for Compliance Framework alignment are: 1) reliably identify backup data that contains CUI, 2) protect confidentiality, integrity, and availability of that backup data using technical and operational controls, 3) define retention/handling/destruction policies consistent with contract requirements, and 4) maintain auditable evidence (logs, test results, procedures) that demonstrate compliance.\n\nPractical implementation steps — inventory and classification\nStart by building an inventory of backup systems (onsite image backups, cloud snapshots, archive buckets, removable media). Use data discovery tools or file tagging rules (DLP regular expressions, filename patterns, or content scanning) to flag files containing CUI fields (SSNs, contract numbers, DFARS markers). For a small business: run a weekly scanning job against backup sets (or source data prior to backup) that outputs a CSV of flagged objects with metadata (file path, size, backup job ID, timestamp). Tag the affected backups in your backup system — most enterprise tools (Veeam, Commvault, Rubrik) and cloud services (AWS S3 object tags, Azure Blob metadata) support metadata tagging to mark items as CUI.\n\nPractical implementation steps — protection controls\nApply layered protections. Encryption at rest: enable AES-256 encryption for disk images and object stores; for cloud, use customer-managed keys (CMKs) in KMS/HSM (AWS KMS CMKs, Azure Key Vault with HSM) so you can produce key rotation and access audit logs. In transit: require TLS 1.2+ for backup transfers and use VPN or Direct Connect for offsite transfers. Access control: apply least-privilege IAM policies to backup systems and keys, require MFA for key administrators, and segregate duties so backup operators cannot decrypt or export CUI without another approver. For immutability/integrity: enable immutable snapshots or Write Once Read Many (WORM) where available (S3 Object Lock with compliance mode, Veeam immutability repository), and store SHA-256 hashes of backup images in a tamper-evident log; for physical media, use tamper-evident seals and store manifests signed (digitally or physically) by two people.\n\nPractical implementation steps — retention, labeling, and handling procedures\nCreate a handling playbook that maps backup types to labels and retention classes (e.g., CUI-Short: 90 days; CUI-Contract: 7 years — adjust per contract). Require labeling at the source and in the backup metadata so restores and exports carry the CUI tag. Define procedures for movement (who may move backups offsite), for media reuse/sanitization (NIST SP 800-88 sanitization guidance), and for disposal (certificate of destruction). For small businesses that use cloud backups: include contractual flow-downs that require cloud providers to restrict access to keys and provide monthly key access logs; if using rotating external drives, encrypt with AES-256, log drive serial numbers, and keep chain-of-custody forms for each rotation.\n\nTesting, monitoring, and evidence for assessments\nTest restore procedures quarterly or per your RTO/RPO requirements; a backup is only useful if you can recover reliably. Maintain evidence: scheduled backup job logs, verification reports that include checksums (SHA-256), encryption key usage logs from KMS, IAM policy screenshots, immutable repository settings, and signed restore test reports describing what was restored and by whom. For a CMMC assessment, common artifacts include policy documents, the backup inventory, tagging screenshots, sample chain-of-custody forms, recent restore test results, and SIEM logs showing access to backup storage and KMS key usage.\n\nRisks of not implementing MP.L2-3.8.9 and best practices\nFailing to classify and handle backup CUI increases risk of data breaches, unauthorized disclosure, contract penalties, and lost bidding opportunities. Real-world examples: a subcontractor that backed up design documents to an unencrypted public bucket caused CUI exposure and lost its DoD contract; another small business failed an CMMC assessment because it couldn't show restore tests or key access controls. Best practices: adopt least-privilege access, require CMKs with rotation and audit trails, schedule regular restore tests, use immutable backups for critical CUI, train staff on handling procedures, and include backup handling clauses in vendor SLAs. Maintain a risk register and map each backup type to a mitigation strategy (encryption, immutability, offline copy) with owner and review cadence.\n\nImplementing MP.L2-3.8.9 is operationally straightforward but requires disciplined processes: inventory and tag CUI in backups, force technical controls (AES-256/KMS, TLS1.2+, IAM), document procedures and retention, run restore tests and record evidence, and train staff. For small businesses, prioritize quick wins (enable server-side encryption and object tagging, schedule restore drills, and create a simple chain-of-custody log) and expand to immutability and HSM-backed key management as your risk profile and contract requirements demand. Meeting these steps will materially reduce compliance risk and provide the demonstrable evidence assessors expect."
  },
  "metadata": {
    "description": "Step-by-step guidance to build a backup data classification and handling plan to protect Controlled Unclassified Information (CUI) and meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 MP.L2-3.8.9 requirements.",
    "permalink": "/how-to-create-a-backup-data-classification-and-handling-plan-to-protect-cui-nist-sp-800-171-rev2-cmmc-20-level-2-control-mpl2-389.json",
    "categories": [],
    "tags": []
  }
}