Scoping is where readiness is won or lost.
Most compliance pain is not “missing controls.” It’s unclear boundaries: where regulated data lives, who touches it, and which systems and vendors are actually in scope. Clean scoping prevents rework and makes evidence defendable.
Disclaimer: Educational only. Requirements vary by solicitation, contract language, flowdowns, data types, and program updates. Always follow current official guidance and your contract requirements.
Plain-English definitions
FCI (Federal Contract Information)
FCI is information provided by or generated for the Government under contract that is not intended for public release. In practice, FCI often appears in emails, portals, internal files, work orders, deliverables, and communications with a prime or agency.
- Trigger is typically contractual: the work is “for the Government” and not public.
- FCI scoping still matters: you must know where it lives and who touches it.
CUI (Controlled Unclassified Information)
CUI is information requiring safeguarding or dissemination controls per law, regulation, or policy. For contractors, the hard part is not the label—it’s identifying where CUI enters, where it flows, and how it is controlled.
- CUI usually comes with stricter safeguarding expectations.
- Scope should include systems, identities, endpoints, cloud apps, and vendors that touch it.
Where teams get burned
Scope drift
Regulated data shows up in places nobody planned for.
- CUI in email threads and shared mailboxes
- CUI in shared drives, SharePoint, OneDrive, Teams, Slack exports
- Endpoints: unmanaged laptops, phones, home devices
- Vendors: IT support, MSPs, subcontractors, SaaS administrators
Evidence mismatch
Controls exist, but you cannot prove them cleanly.
- Policies describe workflows you do not use (template mismatch)
- Screenshots are not attributable (no date/system context)
- Logs are enabled but not retained/reviewed on a schedule
- Access reviews are informal and not documented
A defensible scoping sequence
What to document during scoping
Minimum scoping artifacts
- Data flow diagram (how FCI/CUI enters, moves, exits)
- System inventory (endpoints, servers, cloud services)
- User/role inventory (who touches regulated data)
- Vendor list + access paths (MSP, IT support, SaaS admins)
Evidence you will thank yourself for later
- Access control screenshots/exports (groups, roles, MFA policies)
- Device management exports (inventory, encryption, compliance status)
- Log/retention settings + proof of review cadence
- Offboarding records and access reviews
FAQ
What is the difference between FCI and CUI?
FCI is contract-related information that is not public. CUI is controlled unclassified information requiring safeguarding and dissemination controls. Your solicitation, clauses, flowdowns, and data types determine what requirements apply.
Why does scoping matter so much?
Scoping determines what is “in scope” for controls and evidence. Over-scoping increases cost and complexity. Under-scoping creates gaps and assessment risk. Clean scoping makes readiness predictable.
What is a defensible scope boundary?
A boundary you can explain and prove: where the data enters, where it is stored/processed/transmitted, which identities and devices touch it, and what controls enforce that boundary.
Where should we start if we are unsure?
Start with entry points (contracts, portals, email, transfers), then map systems/users/vendors that touch regulated data. Build an evidence library as you go so you do not have to rebuild proof later.