🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PE.L2-3.10.1

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PE.L2-3.10.1

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PE.L2-3.10.1 – Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals.

Understanding the Requirement

This control (from NIST SP 800-171 REV.2 / CMMC 2.0 Level 2) requires that an organization identify who is authorized to enter its facilities and specific sensitive areas, and ensure only those authorized people can access information systems, equipment, and operating environments that contain or process Controlled Unclassified Information (CUI). In practice that means classifying facility areas as sensitive or non-sensitive, keeping servers, network devices, CUI-containing media, and CUI paperwork in locked rooms or containers, and using administrative and technical controls (badges, keys, visitor procedures, and reviewed access lists) so only approved personnel can reach those assets.

Technical Implementation

  • Map and classify physical areas and assets. Create a simple inventory of offices, server rooms, closets, printers that may handle CUI, and label areas as non-sensitive, sensitive, or restricted. This inventory drives what controls are required and who should have access.
  • Deploy access control on sensitive entry points. Install locks or electronic readers (smart cards, prox badges, or keypad+PIN) on server rooms, network closets, and dedicated CUI workspaces. Configure badge access rules so only authorized job roles or named users can open those doors; set schedules if appropriate.
  • Establish a formal authorization and review process. Maintain an access roster tied to HR/job roles and a documented approval workflow for granting physical access. Review and reconcile the roster at least quarterly and immediately remove access for terminated or role-changed staff.
  • Protect portable media and paperwork. Store hard drives, backup media, and CUI paperwork in locked cabinets/containers when not in use. Enforce a check-in/check-out process and log custody changes for sensitive media.
  • Control shared devices and output. Place printers, fax machines, and multi‑function devices that may print CUI in secured areas or require badge release for print jobs (pull-print). Position these devices where unauthorized visitors cannot retrieve outputs.
  • Implement visitor, escort, and key management procedures. Require visitor sign-in, issue temporary badges, enforce escorts in sensitive areas, and keep issuance/return logs for physical keys. Use key control practices (limited distribution, inventory, regular audits) and consider rekeying after lost keys.
  • Use monitoring and alerts for critical areas. Add CCTV, door contact sensors, and basic alarm notifications for server rooms and CUI storage. Even simple cloud-managed cameras and door sensors can provide evidence and alert on unauthorized entry for SMBs.

Example in a Small or Medium Business

Acme Tech is a 40-person subcontractor working on DoD projects that produce CUI. They classify their lobby and open office as non-sensitive, and their server room, two engineering labs, and the records closet as sensitive. The company installs a smart-card reader on the main entrance and on the server room door; all employees get smart cards tied to their personnel record. Only members of IT and authorized engineers have server-room access, granted through HR-approved access requests and logged in the access roster. Printers that handle CUI are moved into the engineering lab and require badge release for print jobs; paper copies are stored in a locked cabinet when not actively used. Visitors must sign in at reception, receive a temporary badge, and be escorted in sensitive areas; a receptionist checks the visitor log daily. When an engineer leaves the company, HR notifies IT and security, the smart-card is deactivated the same day, and the access roster is updated. Quarterly audits reconcile physical access lists with current employees and spot-check the locks and cameras to ensure everything functions as expected.

Summary

Combining clear policy (area classification, authorization workflows, visitor and key procedures) with practical technical measures (locks, badge readers, locked storage for CUI, printer controls, and basic monitoring) lets SMBs reliably limit physical access to only authorized individuals. These controls reduce the risk of unauthorized access to systems and CUI, and when paired with periodic review and fast offboarding, create a simple, maintainable physical security posture that meets the intent of PE.L2-3.10.1.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes