Skip to main content
Scope FCI vs CUI | CMMC & NIST Readiness Scoping Guide
Scoping guide Operated by Federal Bid Partners LLC. Not affiliated with the U.S. Department of Defense.
Scope: FCI vs CUI
CMMC • NIST 800-171 • Evidence

Scoping is where readiness is won or lost.

Most compliance pain is not “missing controls.” It’s unclear boundaries: where regulated data lives, who touches it, and which systems and vendors are actually in scope. Clean scoping prevents rework and makes evidence defendable.

Disclaimer: Educational only. Requirements vary by solicitation, contract language, flowdowns, data types, and program updates. Always follow current official guidance and your contract requirements.

Plain-English definitions

Start here, then confirm via contract language

FCI (Federal Contract Information)

FCI is information provided by or generated for the Government under contract that is not intended for public release. In practice, FCI often appears in emails, portals, internal files, work orders, deliverables, and communications with a prime or agency.

  • Trigger is typically contractual: the work is “for the Government” and not public.
  • FCI scoping still matters: you must know where it lives and who touches it.

CUI (Controlled Unclassified Information)

CUI is information requiring safeguarding or dissemination controls per law, regulation, or policy. For contractors, the hard part is not the label—it’s identifying where CUI enters, where it flows, and how it is controlled.

  • CUI usually comes with stricter safeguarding expectations.
  • Scope should include systems, identities, endpoints, cloud apps, and vendors that touch it.
Practical reality: “We don’t have CUI” is rarely safe unless you have validated contract language, portals, attachments, shared drives, cloud apps, and prime flowdowns. Scoping is a verification exercise, not a guess.

Where teams get burned

Common scoping failures

Scope drift

Regulated data shows up in places nobody planned for.

  • CUI in email threads and shared mailboxes
  • CUI in shared drives, SharePoint, OneDrive, Teams, Slack exports
  • Endpoints: unmanaged laptops, phones, home devices
  • Vendors: IT support, MSPs, subcontractors, SaaS administrators

Evidence mismatch

Controls exist, but you cannot prove them cleanly.

  • Policies describe workflows you do not use (template mismatch)
  • Screenshots are not attributable (no date/system context)
  • Logs are enabled but not retained/reviewed on a schedule
  • Access reviews are informal and not documented

A defensible scoping sequence

A clean process that prevents rework
1
Identify entry points Contracts, primes, portals, email, file transfers—how regulated data arrives and leaves.
2
Map systems + users Devices, accounts, SaaS, vendors that touch the data. Define boundaries you can explain.
3
Set the controlled environment Separate CUI handling where possible (accounts, storage, admin roles, devices).
4
Validate with evidence Configs, access rules, retention settings, training records, procedures—prove it works.
Scope is “defensible” when you can explain the boundary and produce proof: where data flows, which identities touch it, which tools enforce access, and what records show ongoing operation (not a one-time screenshot).

What to document during scoping

Artifacts that make assessments smoother

Minimum scoping artifacts

  • Data flow diagram (how FCI/CUI enters, moves, exits)
  • System inventory (endpoints, servers, cloud services)
  • User/role inventory (who touches regulated data)
  • Vendor list + access paths (MSP, IT support, SaaS admins)

Evidence you will thank yourself for later

  • Access control screenshots/exports (groups, roles, MFA policies)
  • Device management exports (inventory, encryption, compliance status)
  • Log/retention settings + proof of review cadence
  • Offboarding records and access reviews
Simple rule: if an answer depends on “we plan to,” it’s usually a gap. Evidence is what exists today and can be produced quickly.
Want a clean scoping package and evidence map?
Federal Bid Partners can help you define defensible scope, map evidence to requirements, and build a remediation plan under client direction. This is consulting support—not legal advice or a government determination.

FAQ

Short answers, clear language
What is the difference between FCI and CUI?

FCI is contract-related information that is not public. CUI is controlled unclassified information requiring safeguarding and dissemination controls. Your solicitation, clauses, flowdowns, and data types determine what requirements apply.

Why does scoping matter so much?

Scoping determines what is “in scope” for controls and evidence. Over-scoping increases cost and complexity. Under-scoping creates gaps and assessment risk. Clean scoping makes readiness predictable.

What is a defensible scope boundary?

A boundary you can explain and prove: where the data enters, where it is stored/processed/transmitted, which identities and devices touch it, and what controls enforce that boundary.

Where should we start if we are unsure?

Start with entry points (contracts, portals, email, transfers), then map systems/users/vendors that touch regulated data. Build an evidence library as you go so you do not have to rebuild proof later.