🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PE.L2-3.10.6

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PE.L2-3.10.6

January 06, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PE.L2-3.10.6 – Enforce safeguarding measures for “Controlled Unclassified Information” (CUI) at alternate work sites.

Understanding the Requirement

This control requires that an organization define and enforce protections for CUI whenever work occurs outside the main facility—such as at employee homes, government locations, or client sites—and ensure those protections are effective. Under the NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 framework, the two clear objectives are to (1) establish safeguarding measures for alternate worksites and (2) make sure those measures are actually enforced so CUI remains protected when it leaves your physical office.

Technical Implementation

  • Issue and enforce company-managed, encrypted devices. Require that employees handling CUI use only company-provisioned laptops or tablets with full-disk encryption (e.g., BitLocker for Windows, FileVault for macOS). Configure disk encryption via a device management solution so keys and recovery options are centrally controlled.
  • Deploy endpoint management & patching. Use an MDM/endpoint management tool (Microsoft Intune, Jamf, or a lightweight RMM) to push security baselines, enforce local firewall policies, deploy software updates, and install approved security agents. Ensure devices check in regularly and apply critical patches automatically.
  • Require secure network access (VPN or ZTNA) and MFA. Mandate VPN or a zero trust network access gateway for any access to internal systems containing CUI. Combine with multi-factor authentication for all accounts that access CUI resources to reduce credential risk on home or public networks.
  • Control data egress and printing. Restrict printing of CUI at alternate sites by disabling local print drivers on managed devices or using policy to allow printing only to company-managed, audited printers. Block or control removable media and cloud-sync services for devices that handle CUI.
  • Monitoring and remote response capability. Ensure logging is enabled and that devices send telemetry when connected to VPN. Maintain the ability to remotely lock or wipe lost/stolen devices and to run basic endpoint investigations (antivirus scans, process review) when devices connect to your network.
  • Policy, training, and physical controls. Publish a clear remote-work policy for CUI handling: approved devices, workspace privacy, secure storage, and incident reporting. Train employees annually and require acknowledgment. For particularly sensitive CUI, require dedicated workspaces (e.g., lockable file cabinets) or prohibit remote handling entirely.

Example in a Small or Medium Business

A 45-person engineering firm that handles CUI allows staff to work from home up to two days a week. The firm issues company-controlled laptops only and configures each with full-disk encryption and an approved security baseline via Microsoft Intune. When employees sign in, a conditional access policy forces them to connect to the corporate VPN and require MFA before accessing network shares or collaboration tools containing CUI. Intune manages Windows and third-party updates on a scheduled cadence and enforces local firewall and browser hardening. The firm also disables local printing for users who will access CUI and provides a documented exception process for cases that require printed outputs; exceptions require manager approval and in-office retrieval. All remote devices report endpoint telemetry to a central logging service when on VPN, and the IT admin can remotely wipe a device or place it under quarantine if suspicious activity is detected. Employees complete an annual remote-work training that explains how to secure a home workspace, who to contact for incidents, and the physical controls required for any printed CUI.

Summary

Combining clear policy with practical technical controls lets SMBs meet PE.L2-3.10.6: define the safeguarding measures (device encryption, managed endpoints, VPN/MFA, printing and media controls, and training) and enforce them through device management, logging, and remote response capabilities. These steps ensure that CUI remains protected when work moves beyond the office while keeping implementation realistic and maintainable for small and medium organizations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes