🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Train Contractors and Third Parties to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AT.L2-3.2.2 Requirements

Practical, step-by-step guidance for small businesses to train contractors and third parties to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 AT.L2-3.2.2 training requirements for handling Controlled Unclassified Information (CUI).

•
April 24, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control AT.L2-3.2.2 requires that organizations ensure contractors and third-party providers receive appropriate awareness and training about their responsibilities for protecting Controlled Unclassified Information (CUI); this post provides a practical implementation playbook for small businesses to design, deliver, document, and verify contractor training in a way that satisfies assessors and reduces real operational risk.

Implementation steps for Compliance Framework customers

Start by treating contractor training as a formal compliance task in your Compliance Framework: update vendor onboarding procedures, include training requirements in the Master Services Agreement (MSA) and Statements of Work (SOW), and add training completion as a gating item before granting CUI access. Operational steps: 1) inventory all contractors/third parties who could access CUI, 2) classify their access level (read-only, modify, admin), 3) map required learning objectives to each role, 4) require signed agreements (NDA, rules of behavior), and 5) provision accounts only after training proof is recorded in your LMS or tracking spreadsheet. Include these steps in the System Security Plan (SSP) and Supplier/Third-Party Risk Management (TPRM) artifacts so assessors can easily verify compliance.

Training curriculum and delivery

Define a concise curriculum focused on CUI handling and organizational controls: CUI definition and marking; permitted storage/transmission methods (e.g., approved encrypted cloud storage, SFTP with TLS 1.2+); approved removable media practices; incident reporting and contact points; secure remote access (VPN or zero-trust configuration); acceptable use and multi-factor authentication (MFA) expectations; and least-privilege principles. For delivery, use a small-business-friendly LMS (Moodle, TalentLMS, or a hosted SCORM-compliant platform) or cloud-managed tools (Microsoft 365 Learning Pathways, Google Workspace training modules) with SSO (SAML or OIDC). Require a short quiz (80% pass threshold) and record a timestamped completion artifact (certificate, LMS report). Refresh annual training and trigger ad-hoc re-training after incidents or when roles change.

Technical controls and evidence collection

Integrate training gates with technical provisioning: implement automated onboarding via SCIM/SAML to ensure accounts are not activated until LMS-completion claims are verified, and enforce MFA via your IdP (Okta, Azure AD). Log provisioning events, training completion metadata, and access grants in a centralized log store (SIEM or secure log archive) with retention aligned to your compliance policy (e.g., 3 years). For evidence, collect LMS completion records, signed NDAs, SOW/MSA clauses, screenshots of account provisioning with timestamps, and logs showing access attempts. Maintain these artifacts in your Compliance Framework evidence repository so assessors can trace contractor training to access events.

Real-world small-business scenarios

Example 1 — Small software shop subcontracting a developer: Add a clause in the subcontract requiring completion of your 60-minute CUI handling module and signature of a rules-of-behavior form before delivering code that touches CUI. Automate account creation in Git with access limited to specific repos and require MFA. Example 2 — MSP hosting client CUI: Require the MSP to provide SOC 2 Type II or equivalent evidence, complete your yearly CUI-handling briefing, and implement network segmentation so MSP technicians have distinct admin accounts limited by role. Example 3 — On-site maintenance or janitorial staff: Provide a short, in-person safety/physical-security briefing, require badge access rules, and ensure contractors do not bring personal devices into spaces where CUI is visible — document attendance with a signed log or photo of badge issuance.

Compliance tips and best practices

Use contract language that is specific and enforceable: "Contractor shall complete [Organization] CUI Handling Training within 7 days of start and prior to receiving credentials; completion records will be retained for a minimum of 3 years and provided upon request." Run security questionnaires (SIG Lite or custom) and score vendor responses; for higher-risk vendors request penetration test results, SOC reports, or ISAAs. Use tabletop exercises and simulated incidents (phishing tests, incident response drills) that include contractor roles so training is validated under realistic conditions. Keep remediation records (POA&Ms) for any gaps and schedule follow-ups tied to contract renewal dates.

Risks of not implementing AT.L2-3.2.2

Failing to adequately train contractors exposes CUI to accidental disclosure, misconfiguration, and delayed incident reporting. Risks include data exfiltration, regulatory penalties, loss of existing or future DoD contracts, reputational damage, and cascading supply-chain incidents when an untrained subcontractor is compromised. From an assessor perspective, lack of training artifacts (no LMS records, missing signed agreements) is a straightforward finding that can lead to nonconformance and require corrective actions before certification or contract award.

Practical checklist and next steps (summary)

Summary checklist: 1) Update MSA/SOW language to mandate training and evidence retention; 2) Enumerate contractors with CUI access and map role-based curricula; 3) Deploy or adopt an LMS and integrate with your IdP to gate provisioning; 4) Require quizzes and annual re-certification; 5) Collect LMS reports, NDAs, and provisioning logs in your Compliance Framework evidence store; 6) Conduct periodic tabletop and phishing exercises that include contractors; 7) Maintain POA&Ms for remediation. These actions create repeatable evidence for assessors and materially reduce operational risk from third parties handling CUI.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes