🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Protect System Media Containing CUI: Implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MP.L2-3.8.1 with a Step-by-Step Plan for Paper and Digital Records

Practical, step-by-step guidance for small businesses to protect paper and digital media containing CUI and meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 MP.L2-3.8.1 requirements.

•
March 26, 2026
•
6 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Protecting system media that contain Controlled Unclassified Information (CUI) is a foundational compliance requirement under NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2, specifically control MP.L2-3.8.1; this post gives a practical, small-business-focused, step-by-step plan to secure both paper and digital records, reduce risk, and produce auditable evidence of implementation for the Compliance Framework.

What MP.L2-3.8.1 requires and an implementation overview

MP.L2-3.8.1 requires organizations to protect CUI stored on system media (including paper, removable storage, and fixed drives) at creation, use, transport, and disposal. For Compliance Framework implementations, that means (1) inventory and classification, (2) physical and logical access controls, (3) encryption and sanitization, (4) documented handling and chain-of-custody processes, and (5) training and audits. Below I outline concrete steps you can take, with technical specifics where relevant.

Step-by-step plan for paper records

Start with a clear, repeatable workflow for all paper CUI. The following ordered steps turn requirements into action:

  1. Inventory & classify: Create a simple ledger (spreadsheet or CMDB entry) that lists each paper record type, owner, location, retention period, and CUI marking. Example: "Project X - drawings - CUI - locked cabinet #2 - retention 7 years."
  2. Marking & labeling: Use the CUI markings required by your contract/Compliance Framework. Apply a header/footer label "CUI//SP" or contract-specific label on top of every page; do not bury CUI markings only in cover sheets.
  3. Physical storage: Store CUI in GSA-approved locked file cabinets or safes (or simple lockable metal cabinets for small businesses); cabinets should be bolted or in a secure room with controlled access. Maintain a key log or electronic badge access log.
  4. Access control & least privilege: Limit access lists to named personnel. Use sign-in/out logs for physical removal of records. Require supervisors to approve temporary removal and set a maximum checkout duration.
  5. Transport & courier: Use tamper-evident envelopes and a documented chain-of-custody form when transporting off-site. For higher-value shipments, use bonded couriers and require delivery confirmation (signature and date/time).
  6. Disposal/sanitization: Use cross-cut (DIN P-4 or better) shredders for paper CUI, or contract a chain-of-custody destruction service and obtain a certificate of destruction. Record destruction events in your inventory ledger.
  7. Training & auditing: Train staff on marking, handling, and disposal. Run quarterly mini-audits to reconcile the inventory ledger against physical storage.

Step-by-step plan for digital records

Digital media needs both procedural and technical controls. Follow this ordered plan for files, removable media, and storage devices:

  1. Inventory & classification: Extend the same ledger to include logical assets (servers, endpoints, USBs, external drives, VMs). Tag each entry with location, owner, CUI-sensitivity level, and retention.
  2. Access control: Implement RBAC (role-based access control) and least privilege for file stores. Use Active Directory/LDAP groups or cloud IAM to grant access; avoid ad-hoc sharing. Enforce MFA for all accounts that can access CUI.
  3. Encryption at rest and in transit: For endpoints and servers use FIPS 140-2/3 validated implementations where required — e.g., BitLocker (with TPM + PIN) for Windows, FileVault2 for macOS, LUKS with strong cipher for Linux. For removable media use hardware-encrypted USBs or use VeraCrypt containers with AES-256 if hardware devices are not available. Ensure TLS 1.2+ (preferably TLS 1.3) for data in transit and VPNs with strong ciphers for remote access.
  4. Key management: Use an enterprise KMS or platform-native key management (Azure Key Vault, AWS KMS) and avoid storing plaintext keys on the same media. Rotate keys per policy and maintain key owner and recovery procedures. For SMBs without KMS, use platform disk encryption with keys escrowed via a secure admin process and documented key custody.
  5. Removable media controls: Disable autorun, implement Device Control via endpoint management (Windows Group Policy or MDM), and whitelist only approved encrypted drives. Block or log unauthorized USB access and consider USB port locks for high-risk workstations.
  6. Sanitization and disposal: Follow NIST SP 800-88 Rev.1 media sanitization guidance — options are Clear, Purge, or Destroy depending on risk and media type. For HDDs use disk wipe (DoD 5220.22-M or better) or cryptographic erase if full-disk encryption used; for SSDs prefer cryptographic erase (sanitize operation) or physical destruction because overwrites are unreliable on flash. For hardware like SEDs, use the manufacturer's secure erase (PSID) and record the operation in the ledger. Always record certificates of destruction or sanitization logs.
  7. Backups: Encrypt backups both in transit and at rest. For cloud backups ensure the CSP meets compliance (FedRAMP Moderate for many CUI types) and sign a written agreement about CUI handling. Test restore processes annually to ensure encrypted backups are recoverable.
  8. Logging & monitoring: Enable host and file-access logging (SIEM or cloud-native logging) for CUI repositories. Set alerts for unusual access patterns and integrate with your incident response plan for timely action on lost/stolen media.

Controls, chain-of-custody, and incident handling

For both paper and digital media implement a documented chain-of-custody process that includes who handled the media, timestamps, transport method, and confirmation of receipt. Maintain tamper-evident seals for shipped paper packages and use hashed manifests (e.g., SHA-256 checksums) for digital media shipped physically. If media is lost or suspected compromised, trigger your incident response plan immediately, revoke access, rotate keys if necessary, and notify affected contracting officers per contractual and regulatory timelines.

Small-business real-world examples

Example 1 — Small engineering subcontractor: Implemented a simple CSV-backed inventory, purchased two hardware-encrypted USBs for field engineers, enforced BitLocker with TPM on all laptops, and locked CAD printouts in a single cabinet. They used a bonded courier for delivery of physical prints and required certificates of destruction for obsolete drawings. This low-cost approach met MP.L2-3.8.1 evidence requirements for a prime contractor audit.

Example 2 — Medical billing company handling CUI-like PHI under a Compliance Framework: They switched to encrypted cloud storage with strict IAM policies, enforced MDM on mobile devices, disabled external media, and used scheduled automated purges of aged records per retention policy. For paper insurance forms they adopted locked shredders and a monthly third-party destruction certificate.

Risks of not implementing MP.L2-3.8.1

Failing to protect system media containing CUI increases risk of data breaches, contract termination, monetary penalties, and reputational damage. For contractors, exposure can trigger DFARS reporting requirements and loss of DoD work; for civilian agencies it can mean non-compliance findings that block future bidding. Technically, unsecured media also elevates ransomware and insider threat risk because unencrypted drives or improperly disposed SSDs can be trivially harvested and exfiltrated.

Compliance tips and best practices

Practical tips: maintain a single authoritative inventory, use platform-native full-disk encryption with TPM where possible, adopt MDM and DLP for endpoints, whitelist removable media, document sanitization actions against NIST SP 800-88, require certificates of destruction from vendors, and bake CUI handling into onboarding and termination workflows. Automate as much as you can (inventory scans, patching, encryption enforcement) and maintain periodic evidence (audit logs, training records) for the Compliance Framework assessors.

In summary, MP.L2-3.8.1 is operationally straightforward but demands disciplined processes: inventory, label, restrict, encrypt, transport securely, and sanitize before disposal. Small businesses can meet these requirements with affordable tools (BitLocker/FileVault, hardware-encrypted USBs, cross-cut shredders, documented chain-of-custody) combined with documented policies, staff training, and periodic audits — all of which provide both security and the compliance evidence assessors require.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes