Properly labeling both physical and digital media that contain Controlled Unclassified Information (CUI) is a simple, high-impact control required under NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 (MP.L2-3.8.4); this post gives small businesses practical, implementable steps — policy text, technical examples, and everyday scenarios — to put a consistent, auditable labeling program into production.
Implementation overview (Compliance Framework-specific)
Start by incorporating labeling into your Compliance Framework as a formal practice: define scope (what types of CUI and which media), assign ownership (who authorizes and who applies labels), and document enforcement (periodic checks, audit trail requirements). Your policy should state that all CUI at rest, in transit, and in use must be labeled; it should map to MP.L2-3.8.4 and reference related controls (access control, encryption, and sanitization). For small organizations, a single concise Standard Operating Procedure (SOP) that ties labeling to asset inventory and handling workflows will satisfy both management and auditors.
How to label physical media — practical steps
For physical media (printed documents, USB drives, CDs, external drives, and paper files), require visible banners and asset tags: use header/footer banners on each printed page (e.g., "CUI // CONTROLLED — Do not release without authorization") and affix durable labels to removable media that include at minimum: classification (CUI), data owner/contact, date, and handling instruction (e.g., "Encrypt in Transit"). Use tamper-evident bags for transport, log transfers on a chain-of-custody form, and apply an asset tag/ID that links to your inventory system. Sample text for label printing: "CUI — Controlled Technical Information; Owner: Acme Eng; Contact: sec@acme.local; Do not remove."
How to label digital media — technical implementation
Digital labeling must be both human-readable and machine-enforceable. Implement both: (1) visible markings in the file (header/footer on documents, visible watermark on PDFs and images), and (2) metadata tags that security tooling can read. Use Office/SharePoint/Microsoft Purview Sensitivity Labels for Word/Excel/PPT and apply them automatically via policy or by user selection. For PDFs/images, embed XMP/PDF metadata (exiftool -Title="CUI // Controlled" file.pdf). For files stored in S3 or object storage, apply object tags: aws s3api put-object-tagging --bucket my-bucket --key path/file.pdf --tagging 'TagSet=[{Key=CUI,Value=Controlled}]'. In Windows and Linux filesystems, leverage extended attributes (setfattr -n user.cui -v "Controlled" file) or an internal database that maps file paths to CUI status. Combine labeling with encryption (e.g., BitLocker, VeraCrypt containers, or S3 bucket SSE+ACLs) so labeled files are protected at rest and in transit.
Automation and logging — technical examples
Automate whenever possible: deploy an Information Protection scanner (Azure Information Protection scanner, AWS Macie + Lambda tagging) to find unlabeled CUI and either tag or quarantine it. Use DLP rules to apply labels on file creation (for example, Microsoft 365 sensitivity labels via auto-labeling based on regex patterns or taxonomy). Log label application events to your SIEM (e.g., send events via syslog or CloudWatch when a label is applied/changed) and retain those logs per contract. Example script snippets: Linux: setfattr -n user.CUI -v "CUI:Controlled;Owner:acct" /data/project/spec.pdf; AWS: aws s3api put-object-tagging --bucket my-bucket --key "folder/spec.pdf" --tagging 'TagSet=[{Key=CUI,Value=Controlled},{Key=Owner,Value=Eng}]'.
Small business scenarios and real-world examples
Example 1 — Small engineering subcontractor: When receiving CUI drawings, the subcontractor stamps the first page with "CUI // CONTROLLED" and uploads the file to SharePoint where a sensitivity label is automatically applied by policy. The USBs used to move files between the shop floor and office are labeled with a printed tag and encrypted container; transfer requests are logged in a simple chain-of-custody spreadsheet tied to the asset tag. Example 2 — Small SaaS company handling CUI in support tickets: implement automatic labeling on ticket attachments via a cloud DLP rule that tags S3 objects as CUI and triggers an alert if the object is shared outside approved accounts.
Compliance tips, best practices, and the risk of non-implementation
Best practices: keep a short controlled vocabulary for labels (e.g., "CUI:Controlled", "CUI:FOUO"), enforce labeling at creation (not as an afterthought), train staff with quick reference cards, and audit monthly using automated scans and spot-checks. Maintain disposition procedures that align with NIST SP 800-88 for sanitization—media must be sanitized or destroyed and marked as such in the inventory. The risks of not labeling consistently include inadvertent disclosure, loss of DoD or federal contracts, financial penalties, and reputational damage. Non-labeled CUI is hard to discover in forensics and increases the likelihood of data breaches and failed audits.
Summary
Labeling CUI on both physical and digital media is a relatively low-cost control with outsized compliance and security benefits: adopt a clear policy mapped to MP.L2-3.8.4, use visible banners and durable physical tags, embed machine-readable metadata and sensitivity labels for digital assets, automate detection and logging, and train users to follow simple SOPs. For small businesses, focus on consistent, repeatable processes and automate enforcement where possible — auditors look for policy, evidence of application, and a working chain-of-custody; deliver those and you will meet the labeling requirement while significantly reducing the risk of CUI exposure.