Marking Controlled Unclassified Information (CUI) across electronic files, removable media, and printed materials is a required procedural step under NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 (MP.L2-3.8.4) β and itβs a practical control that reduces accidental disclosure, supports downstream handling controls, and demonstrates contract compliance. This post gives small businesses concrete, deployable advice: what markings should say, how to apply them technically and operationally, and how to automate and enforce the practice without breaking dayβtoβday workflows.
What MP.L2-3.8.4 requires and the key objectives
MP.L2-3.8.4 expects organizations to mark CUI to indicate its presence and handling requirements. The key objectives are: (1) make CUI obvious to any user who sees a document or removable media, (2) link markings to handling rules (encryption, distribution limitations, storage locations), and (3) support auditability and enforcement through consistent markings. For small businesses, the practical goal is consistent, machine-readable and human-readable markings that integrate with existing tools (Office, PDF, SharePoint, endpoint protection, MDM).
Practical marking content and format β human and machine readable
Use a standard human-readable banner and a machine-readable metadata field. Example human banner/footer: "CONTROLLED UNCLASSIFIED INFORMATION (CUI) β Do not disseminate outside [Company Name] without authorization." Put the banner on the cover and every page for print/PDF and in the header/footer for Office docs. Add distribution notes when required (e.g., "NOFORN", "Law Enforcement"). For machine-readable metadata, use XMP/EXIF tags for PDFs, Office Custom Properties (e.g., "CUI_Level=Controlled Unclassified Information"), or Microsoft Purview Sensitivity Labels. This dual approach ensures a person sees the marking and automated systems can enforce policy.
Examples and step-by-step implementations
Example 1 β Word/Office: Create a company Word template (.dotx) with a header and footer that contains the CUI banner and a cover page template. Configure a custom Document Property "CUI" and values (e.g., "CUI//SP/Acquisition"). Distribute the template via Group Policy or Intune so users create properly marked documents by default. Example 2 β PDF stamping: for outbound PDFs, integrate a stamping step in the document workflow using open-source tools or Adobe Acrobat. A simple stamp pipeline using pdftk/ghostscript: stamp or watermark with the banner file, then set XMP metadata using exiftool: exiftool -Title="CUI" -Keywords="CUI; CUI-ACQ" file.pdf.
Example 3 β SharePoint / OneDrive: Use Microsoft Purview Sensitivity Labels to apply "CUI" labels automatically based on content inspection (keywords, regular expressions for DFARS numbers, or file types). Labels can apply encryption and add headers/footers. Example 4 β USBs and removable media: require BitLocker To Go (or vendor MDM-managed encryption) and physically label the device with a CUI sticker on one side and a unique asset tag linked to an asset register. Policy: "No unencrypted USB with CUI may leave site; any CUI on removable media must be inventoried and logged."
Technical details you can implement today
Automate metadata and stamping in CI/CD or file-handling pipelines. Use exiftool to write XMP metadata to PDFs and many file types: exiftool -XMP-dc:Subject="CUI" -XMP-dc:Description="CUI: Defense Acquisition" file.pdf. Use PowerShell to set Office custom properties via the Open XML SDK or by controlling Word automation for server-side processing. For endpoints, enforce BitLocker/BitLocker To Go and configure policy via Group Policy or Intune: require encryption, disallow write access for unencrypted removable media, and escrow recovery keys to Active Directory or Azure AD. For printed output, configure printers to add a header/footer for CUI-enabled printer drivers or use a secure print queue that overlays a CUI banner before the render stage.
Operational controls, training, and small-business scenarios
For a small defense subcontractor with 10β50 employees, practical steps are: (1) adopt a single CUI marking template and publish it in the company handbook, (2) deploy the Word template and PDF stamp scripts to a shared drive or via Intune, (3) require BitLocker To Go and label all USBs with a durable sticker and asset tag, and (4) train staff with short sessions and quick reference cards. Real-world scenario: an engineering report must be emailed to a prime contractor β your workflow: create from template, run an automated stamp script that appends the banner and XMP metadata, store the file in a labeled SharePoint folder with a Purview label that forces encryption in transit, and attach the file via the SharePoint link rather than direct email attachment.
Compliance tips, enforcement, and auditability
Best practices include: centrally manage templates and Purview labels, automate stamping and metadata injection in document repositories, log every time a CUI-labeled file is copied to removable media, and enforce removable-media encryption with endpoint DLP that blocks unencrypted writes. Maintain an asset register with USB serials and CUI content logs, and retain logging for your contract-required retention period. For audits, produce evidence that files carried CUI markings (file metadata and an automated stamp log) and demonstrate policy enforcement via endpoint logs (BitLocker keys, DLP alerts, MDM reports).
Risks of not marking CUI
Failing to mark CUI increases the likelihood of accidental disclosure, weakens automated enforcement (DLP, encryption, labeled repositories), and may lead to contract noncompliance, loss of contracts, or reporting obligations following a breach. From a security perspective, unlabeled CUI is more likely to be exfiltrated via removable media or misrouted by email. Regulatory consequences can include suspension from DoD contracting and financial penalties depending on contract clauses (e.g., DFARS). In short: lack of markings undermines your technical and procedural CUI controls.
Summary: Implementing MP.L2-3.8.4 starts with a simple policy and standard templates but must be backed by automation (metadata/XMP, Office templates, Purview labels), endpoint controls (BitLocker, DLP, MDM), and operational practices (asset tagging, training, logging). For small businesses, prioritize a single company-wide banner, automated stamping for PDFs, managed Office templates, enforce removable-media encryption, and keep auditable logs β these concrete steps will make CUI markings effective, enforceable, and demonstrable in audits.