{
  "title": "How to Implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MP.L2-3.8.2: Step-by-Step Guide to Limiting CUI Access on System Media to Authorized Users",
  "date": "2026-04-19",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-implement-nist-sp-800-171-rev2-cmmc-20-level-2-control-mpl2-382-step-by-step-guide-to-limiting-cui-access-on-system-media-to-authorized-users.jpg",
  "content": {
    "full_html": "<p>This post shows practical, actionable steps to implement NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control MP.L2-3.8.2 — limiting access to Controlled Unclassified Information (CUI) on system media to authorized users — with real-world examples, technical knobs to turn, and compliance evidence your assessor will expect.</p>\n\n<h2>Control overview and Compliance Framework mapping</h2>\n<p>MP.L2-3.8.2 requires organizations subject to the Compliance Framework to ensure only authorized users can access CUI stored on any system media (disk drives, SSDs, removable media, mobile device storage, backups). Key objectives are: identify and inventory media containing CUI; apply access control (logical and physical); protect data at rest (encryption, ACLs); control removable media; and sanitize or destroy media before disposal. For small businesses, demonstrating these controls with policies, configuration evidence, and logs is critical for a successful CMMC/NIST assessment.</p>\n\n<h2>Step-by-step implementation</h2>\n\n<h3>1) Inventory and classify system media (practical start)</h3>\n<p>Begin with a comprehensive media inventory: list all endpoint disks (internal/SSD), NAS shares, SAN LUNs, removable USBs, tape backups, smartphones/tablets, and cloud storage buckets that may contain CUI. Use automated discovery where possible (SCCM/Intune/BigFix, storage management tools) and maintain a spreadsheet or CMDB with fields: media ID, owner, location, media type, CUI flag, encryption status, and retention/disposition method. Example: a 10‑person engineering firm can run an Intune device inventory report, export volumes and bitlocker status, and annotate which project folders contain CUI — this becomes primary evidence for scope definition.</p>\n\n<h3>2) Implement least-privilege access controls and ACLs</h3>\n<p>Map job roles to access needs and implement role-based access control (RBAC). On Windows, use Active Directory groups and apply ACLs at the file-system and share level (icacls /save and /restore for evidence). On Linux, use POSIX ACLs or directory ACL tools (setfacl/getfacl). For cloud-hosted storage, configure IAM policies (AWS S3 bucket policies, Azure RBAC) to limit access to specific principals and require MFA for privileged roles. Small-business example: create AD groups like CUI-Design and CUI-Contracting, assign group-owned folders, and document group membership changes via HR ticketing for traceability.</p>\n\n<h3>3) Protect CUI at rest with cryptography and key management</h3>\n<p>Encrypt all system media containing CUI. For endpoints use full-disk encryption (BitLocker with TPM+PIN on Windows, FileVault2 on macOS, LUKS2 with TPM2 integration on Linux). For removable media and backups, use container encryption (VeraCrypt, 7‑Zip AES-256), or hardware-encrypted USBs validated to FIPS 140-2/3. Configure cryptographic settings to use strong algorithms (AES-256) and secure modes, and ensure keys are managed centrally — protect recovery keys in a secure store (Azure Key Vault, AWS KMS, or an internal HSM), not written on sticky notes. Example technical commands: enable BitLocker via Group Policy and verify with manage-bde -status; for Linux, cryptsetup luksFormat /dev/sdb1 --type luks2 followed by cryptsetup luksOpen and systemd-cryptsetup integration. Record the encryption configuration exports and recovery key locations as assessment artifacts.</p>\n\n<h3>4) Control removable media, mobile devices, and backup media</h3>\n<p>Establish a removable media policy that forbids unapproved USBs and requires encryption and asset tagging for approved devices. Implement MDM to enforce encryption on mobile devices and prevent unauthorized file transfers (Intune, Jamf). For backups, ensure tapes/disks are encrypted and stored in access-controlled facilities; document chain-of-custody and retention. Small-business scenario: require all consultants to use company‑issued encrypted USB sticks with device IDs logged; block mass storage classes via endpoint DLP/EDR so personal USBs cannot be mounted. Keep logs or ticket approvals for any exception.</p>\n\n<h3>5) Media sanitization and disposition procedures</h3>\n<p>Define and implement sanitization procedures per NIST SP 800-88 (Clear, Purge, Destroy). Maintain SOPs showing when to Clear (software overwrite), Purge (crypto-erase or firmware-based purge), and Destroy (degauss or physical shredding). For SSDs, avoid single-pass overwrites; prefer vendor-supplied secure erase or cryptographic erase. Document each sanitization event with serial numbers, method used, operator, and date; retain certificates of destruction from vendors where applicable. Example: when decommissioning laptops, run vendor secure-erase tools, record serial numbers and BitLocker key escrow deletion, and upload the sanitization log to your CMDB.</p>\n\n<h3>6) Monitoring, logging, training, and evidence collection</h3>\n<p>Enable detailed logging: file access audits (Windows Event IDs 4663/4670), VPN and storage access logs, DLP alerts for CUI patterns, and backup access logs. Correlate logs in a SIEM (Splunk, Elastic, Sentinel) and retain them per policy. Provide user training and documented SOPs on handling CUI and media procedures; keep training completion records. For assessors, collect artifacts: media inventory, ACL exports, Group Policy objects enabling BitLocker, encryption status reports, sanitization logs, DLP policy screenshots, incident/detection logs, and training records. Regularly run internal audits or tabletop exercises to validate processes and produce a remediation plan for gaps.</p>\n\n<h2>Risks of not implementing MP.L2-3.8.2</h2>\n<p>Failure to limit CUI access on system media exposes your organization to data exfiltration, contract loss, regulatory penalties, and reputational damage. Practical risks include lost or stolen unencrypted USB drives with CUI, inadvertent sharing of backups, insider threats accessing improperly provisioned accounts, and failed audits leading to decertification or loss of DoD contracts. Financially, the direct costs of breach response plus indirect costs (lost business, remediation, legal) often exceed the cost of implementing the controls described here.</p>\n\n<h2>Compliance tips and best practices</h2>\n<p>Maintain a small set of well-documented controls rather than many half-implemented ones. Automate inventory and enforcement where possible (MDM, GPOs, cloud IAM). Use standardized evidence packages for assessors: inventory CSV, exported ACLs, encryption configuration snapshots, sanitization logs, SIEM reports showing enforcement, and signed SOPs. Rotate and escrow keys, perform periodic access reviews, and apply principle of least privilege combined with separation of duties. For small businesses with limited budget, prioritize: (1) encryption of all endpoints and backups, (2) a simple RBAC model with group-based ACLs, and (3) documented sanitization and disposal process with proof.</p>\n\n<p>In summary, meeting MP.L2-3.8.2 requires a mix of inventory and classification, technical controls (RBAC/ACLs, encryption, MDM), procedural controls (media policies, sanitization SOPs), and evidence collection (logs, configuration snapshots, training records). Implement these pragmatic steps, focus on automation and documentation, and you’ll have both a defensible security posture and the artifacts needed for Compliance Framework assessments.</p>",
    "plain_text": "This post shows practical, actionable steps to implement NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control MP.L2-3.8.2 — limiting access to Controlled Unclassified Information (CUI) on system media to authorized users — with real-world examples, technical knobs to turn, and compliance evidence your assessor will expect.\n\nControl overview and Compliance Framework mapping\nMP.L2-3.8.2 requires organizations subject to the Compliance Framework to ensure only authorized users can access CUI stored on any system media (disk drives, SSDs, removable media, mobile device storage, backups). Key objectives are: identify and inventory media containing CUI; apply access control (logical and physical); protect data at rest (encryption, ACLs); control removable media; and sanitize or destroy media before disposal. For small businesses, demonstrating these controls with policies, configuration evidence, and logs is critical for a successful CMMC/NIST assessment.\n\nStep-by-step implementation\n\n1) Inventory and classify system media (practical start)\nBegin with a comprehensive media inventory: list all endpoint disks (internal/SSD), NAS shares, SAN LUNs, removable USBs, tape backups, smartphones/tablets, and cloud storage buckets that may contain CUI. Use automated discovery where possible (SCCM/Intune/BigFix, storage management tools) and maintain a spreadsheet or CMDB with fields: media ID, owner, location, media type, CUI flag, encryption status, and retention/disposition method. Example: a 10‑person engineering firm can run an Intune device inventory report, export volumes and bitlocker status, and annotate which project folders contain CUI — this becomes primary evidence for scope definition.\n\n2) Implement least-privilege access controls and ACLs\nMap job roles to access needs and implement role-based access control (RBAC). On Windows, use Active Directory groups and apply ACLs at the file-system and share level (icacls /save and /restore for evidence). On Linux, use POSIX ACLs or directory ACL tools (setfacl/getfacl). For cloud-hosted storage, configure IAM policies (AWS S3 bucket policies, Azure RBAC) to limit access to specific principals and require MFA for privileged roles. Small-business example: create AD groups like CUI-Design and CUI-Contracting, assign group-owned folders, and document group membership changes via HR ticketing for traceability.\n\n3) Protect CUI at rest with cryptography and key management\nEncrypt all system media containing CUI. For endpoints use full-disk encryption (BitLocker with TPM+PIN on Windows, FileVault2 on macOS, LUKS2 with TPM2 integration on Linux). For removable media and backups, use container encryption (VeraCrypt, 7‑Zip AES-256), or hardware-encrypted USBs validated to FIPS 140-2/3. Configure cryptographic settings to use strong algorithms (AES-256) and secure modes, and ensure keys are managed centrally — protect recovery keys in a secure store (Azure Key Vault, AWS KMS, or an internal HSM), not written on sticky notes. Example technical commands: enable BitLocker via Group Policy and verify with manage-bde -status; for Linux, cryptsetup luksFormat /dev/sdb1 --type luks2 followed by cryptsetup luksOpen and systemd-cryptsetup integration. Record the encryption configuration exports and recovery key locations as assessment artifacts.\n\n4) Control removable media, mobile devices, and backup media\nEstablish a removable media policy that forbids unapproved USBs and requires encryption and asset tagging for approved devices. Implement MDM to enforce encryption on mobile devices and prevent unauthorized file transfers (Intune, Jamf). For backups, ensure tapes/disks are encrypted and stored in access-controlled facilities; document chain-of-custody and retention. Small-business scenario: require all consultants to use company‑issued encrypted USB sticks with device IDs logged; block mass storage classes via endpoint DLP/EDR so personal USBs cannot be mounted. Keep logs or ticket approvals for any exception.\n\n5) Media sanitization and disposition procedures\nDefine and implement sanitization procedures per NIST SP 800-88 (Clear, Purge, Destroy). Maintain SOPs showing when to Clear (software overwrite), Purge (crypto-erase or firmware-based purge), and Destroy (degauss or physical shredding). For SSDs, avoid single-pass overwrites; prefer vendor-supplied secure erase or cryptographic erase. Document each sanitization event with serial numbers, method used, operator, and date; retain certificates of destruction from vendors where applicable. Example: when decommissioning laptops, run vendor secure-erase tools, record serial numbers and BitLocker key escrow deletion, and upload the sanitization log to your CMDB.\n\n6) Monitoring, logging, training, and evidence collection\nEnable detailed logging: file access audits (Windows Event IDs 4663/4670), VPN and storage access logs, DLP alerts for CUI patterns, and backup access logs. Correlate logs in a SIEM (Splunk, Elastic, Sentinel) and retain them per policy. Provide user training and documented SOPs on handling CUI and media procedures; keep training completion records. For assessors, collect artifacts: media inventory, ACL exports, Group Policy objects enabling BitLocker, encryption status reports, sanitization logs, DLP policy screenshots, incident/detection logs, and training records. Regularly run internal audits or tabletop exercises to validate processes and produce a remediation plan for gaps.\n\nRisks of not implementing MP.L2-3.8.2\nFailure to limit CUI access on system media exposes your organization to data exfiltration, contract loss, regulatory penalties, and reputational damage. Practical risks include lost or stolen unencrypted USB drives with CUI, inadvertent sharing of backups, insider threats accessing improperly provisioned accounts, and failed audits leading to decertification or loss of DoD contracts. Financially, the direct costs of breach response plus indirect costs (lost business, remediation, legal) often exceed the cost of implementing the controls described here.\n\nCompliance tips and best practices\nMaintain a small set of well-documented controls rather than many half-implemented ones. Automate inventory and enforcement where possible (MDM, GPOs, cloud IAM). Use standardized evidence packages for assessors: inventory CSV, exported ACLs, encryption configuration snapshots, sanitization logs, SIEM reports showing enforcement, and signed SOPs. Rotate and escrow keys, perform periodic access reviews, and apply principle of least privilege combined with separation of duties. For small businesses with limited budget, prioritize: (1) encryption of all endpoints and backups, (2) a simple RBAC model with group-based ACLs, and (3) documented sanitization and disposal process with proof.\n\nIn summary, meeting MP.L2-3.8.2 requires a mix of inventory and classification, technical controls (RBAC/ACLs, encryption, MDM), procedural controls (media policies, sanitization SOPs), and evidence collection (logs, configuration snapshots, training records). Implement these pragmatic steps, focus on automation and documentation, and you’ll have both a defensible security posture and the artifacts needed for Compliance Framework assessments."
  },
  "metadata": {
    "description": "Practical, step-by-step guidance for small businesses to meet MP.L2-3.8.2 by ensuring only authorized users can access CUI stored on system media, including encryption, access controls, sanitization, and evidence for assessors.",
    "permalink": "/how-to-implement-nist-sp-800-171-rev2-cmmc-20-level-2-control-mpl2-382-step-by-step-guide-to-limiting-cui-access-on-system-media-to-authorized-users.json",
    "categories": [],
    "tags": []
  }
}