CUI Categories and Examples
Note: This is general information and not legal advice.
On this page
Executive Summary
- Scope determines which systems need CMMC controls.
- Over-scoping increases cost and operational burden.
- Under-scoping creates assessment risk and potential contract issues.
- When in doubt, assume it applies until you can confirm otherwise.
- The government designates CUI. You identify and protect it.
- Reduces compliance burden by limiting scope to actual CUI.
- Enables enclave strategies when only part of the business touches CUI.
- Creates defensible evidence for assessors.
What Counts as CUI
CUI is defined in 32 CFR Part 2002 as information that requires safeguarding or dissemination controls under federal law, regulation, or government-wide policy. It is not classified, but it is not public either.
The key distinction: the government decides what is CUI. As a contractor, you identify and protect information the government has designated, rather than making your own designations.
CUI vs FCI
Two categories of controlled information appear in DoD contracts:
- CUI (Controlled Unclassified Information): Requires protection under NIST SP 800-171. Identified by specific categories in the CUI Registry.
- FCI (Federal Contract Information): Information not intended for public release but not meeting CUI criteria. Requires basic safeguarding under FAR 52.204-21.
Your contract clauses tell you which applies. DFARS 252.204-7012 indicates CUI. FAR 52.204-21 indicates FCI.
How to Identify CUI in Your Environment
- Check contract clauses: DFARS 252.204-7012 is the primary indicator.
- Look for markings: Documents marked "CUI" or with category-specific banners.
- Review CDRLs: Contract Data Requirements Lists often specify CUI deliverables.
- Check DD Form 254: For classified contracts, this form identifies CUI categories.
- Ask your contracting officer: When uncertain, get written clarification.
DoD CUI Registry Categories
The CUI Registry maintained by the National Archives defines all authorized categories. Below are the major categories with practical examples of what each covers in defense contracting contexts.
Critical Infrastructure
Information about systems whose disruption would impact national security, economic security, or public health and safety.
- Power grid operations data shared with defense facilities
- Telecommunications infrastructure maps for military installations
- Water system schematics for bases or critical government facilities
Defense
Military plans, capabilities, and operations information not otherwise classified.
- Technical specifications for weapons systems components
- Military base access procedures and perimeter security details
- Logistics data for troop movements or supply chains
Export Control
Technical data subject to ITAR (International Traffic in Arms Regulations) or EAR (Export Administration Regulations).
- Engineering drawings with ITAR-controlled dimensions and materials
- Software source code for defense applications with export restrictions
- Performance data for missile or aircraft systems
Financial
Financial information requiring protection under law or regulation.
- Cost accounting data submitted under government contracts
- Bid and proposal financial details on sensitive programs
- Audit reports with sensitive findings
Immigration
Information related to immigration status, benefits, or enforcement.
- Employee visa documentation for cleared personnel
- Citizenship verification records for security clearances
- Immigration case files handled by government contractors
Intelligence
Intelligence-related information not meeting classification thresholds.
- Open-source intelligence collection methodologies
- Intelligence community contracting requirements
- Threat indicator data shared with defense contractors
International Agreements
Information related to treaties, alliances, and international partnerships.
- NATO interoperability requirements for defense systems
- Coalition sharing agreements and restrictions
- Foreign military sales documentation
Law Enforcement
Information related to law enforcement investigations or operations.
- Background investigation data for security clearances
- Incident reports involving government facilities
- Investigative support materials provided to contractors
Legal
Legal information protected by privilege or statute.
- Attorney-client privileged communications on government matters
- Litigation materials involving government contracts
- Legal opinions on classified program operations
Nuclear
Nuclear-related information not meeting Restricted Data or Formerly Restricted Data classification.
- Nuclear facility security plans for contractor-operated sites
- Radiological emergency response procedures
- Nuclear materials tracking and inventory data
Patent
Patent application information requiring protection.
- Patent applications for defense-related inventions under secrecy orders
- Invention disclosures with national security implications
- Patent search results on sensitive technologies
Privacy
Personally identifiable information (PII) requiring protection under the Privacy Act.
- Employee personnel records for government contract work
- Security clearance application data (SF-86 content)
- Medical records for employees in government programs
Procurement and Acquisition
Acquisition-sensitive information that could affect contract competition.
- Source selection information and evaluation criteria
- Pre-award cost estimates and independent government cost estimates
- Contract negotiation strategies and pricing data
Proprietary Business Information
Commercial or financial information that is privileged or confidential.
- Company trade secrets shared with government under contract
- Proprietary manufacturing processes for defense components
- Competitive pricing and cost structures
Statistical
Statistical data protected from disclosure under law.
- Census-style data collected under government contracts
- Statistical analysis with privacy-protected source data
- Survey results with confidentiality guarantees
Tax
Tax information protected under internal revenue laws.
- Tax return data for government contractors under audit
- Tax identification information in payroll systems
- Tax compliance documentation for government programs
Transportation
Transportation security information requiring protection.
- Shipping routes for sensitive government cargo
- Transportation security plans for hazardous materials
- Logistics schedules for defense supply chains
CUI Marking Requirements
Proper marking is both a compliance requirement and a practical tool for scoping. If documents are not marked, you cannot reliably identify CUI in your environment.
Banner Markings
CUI documents must include banners at the top and bottom of each page:
- Header: "CUI" or "CUI//[Category]" (e.g., "CUI//SP-SSEL" for Procurement Sensitive)
- Footer: Same designation as header, plus handling instructions when required
- Format: Banners should be clearly visible, typically in a designated font and size
Portion Markings
Within documents, individual portions (paragraphs, sections, figures) containing CUI should be marked:
- Format: "(CUI)" or "(CUI//Category)" at the beginning of each controlled portion
- Purpose: Allows partial document sharing when only some content is controlled
- Example: "(CUI) This paragraph contains controlled technical specifications..."
Common Marking Mistakes
- Missing banners: CUI content without top/bottom designations
- Inconsistent categories: Using wrong or outdated category codes
- Over-marking: Marking entire documents as CUI when only portions qualify
- Legacy markings: Failing to update from old FOUO or other deprecated markings
- Email markings: Not marking email chains where CUI content appears in replies
Scoping Methodology
Scoping is the process of identifying where CUI lives, how it flows, and who touches it. Get this right and your compliance effort scales to actual risk. Get it wrong and you either over-spend or face assessment gaps.
Data Discovery Approach
- Contract inventory: List all contracts with DFARS 252.204-7012 or similar clauses.
- Document review: Sample files from file shares, SharePoint, and email for CUI markings.
- System scan: Search for "CUI" in file names, content, and metadata.
- Interviews: Talk to program managers about what data they receive from and send to the government.
System and Workflow Mapping
For each CUI category you identify, map:
- Systems: Where CUI is stored (file servers, SharePoint, databases, SaaS tools)
- Endpoints: Devices that access CUI (workstations, laptops, mobile devices)
- Networks: Network segments that carry CUI traffic
- Applications: Software that processes CUI (ERP, PLM, CAD, email)
- People: Roles and individuals with CUI access
Third-Party and Subcontractor CUI
Extend your scope to include:
- Subcontractors who receive CUI from you
- Vendors with access to systems containing CUI
- Cloud service providers hosting CUI data
- Joint ventures and teaming partners
Document flow-down requirements in subcontracts and verify compliance through vendor risk management processes.
Documenting Your CUI Inventory
Create a CUI inventory that includes:
- CUI categories present in your environment
- Systems, applications, and storage locations
- Contracts generating each CUI type
- Access controls and user populations
- Data flows and sharing relationships
- Retention requirements and disposition schedules
This inventory becomes part of your System Security Plan and evidence base for assessments.
Common CUI Scoping Mistakes
Assuming "We Do Not Have CUI" Without Checking
Many organizations assume CUI only applies to classified contracts. In reality, CUI appears in a wide range of DoD work including logistics, professional services, IT support, and construction. Check contract clauses, not just clearance levels.
Missing CUI in Email, File Shares, and Cloud Storage
CUI rarely stays in one place. An engineer receives a CUI drawing, emails it to a colleague, saves it to a personal SharePoint, and shares it via a collaboration tool. Your scope must cover the entire data lifecycle, not just designated repositories.
Not Tracking CUI Shared with Vendors
When you share CUI with subcontractors or vendors, your compliance responsibility does not end. You must verify they have appropriate controls and flow-down requirements in place. Untracked vendor CUI is a common audit finding.
Over-Scoping (Treating Everything as CUI)
Some organizations respond to CUI uncertainty by treating all government contract data as CUI. This increases compliance cost and operational burden unnecessarily. Take time to categorize correctly and scope controls to actual requirements.
See our Enclave Guide for strategies to limit scope when only part of your environment touches CUI.
Common Questions
Is email with contract details CUI?
It depends on the content. Routine contract administration emails may not be CUI. But emails containing technical specifications, pricing on classified programs, or information marked as CUI by the government should be treated as CUI. When in doubt, check the contract clauses and any markings on the source material.
What about proposals and pricing information?
Proprietary Business Information (CUI category) can cover bid and proposal data, but not all proposals qualify. Source selection information and proposal details on classified or controlled programs are more likely to be CUI. The determining factor is whether the government has designated the information as requiring protection under a specific category.
Do drawings and schematics count as CUI?
Technical drawings may fall under several categories depending on content: Export Control (ITAR/EAR technical data), Defense (military specifications), or Proprietary Business Information. Check the drawing markings and contract requirements. Drawings marked with distribution statements or export control warnings should be treated as CUI.
How do I handle legacy documents with unclear markings?
Start by checking the contract that generated the documents. If the contract included DFARS 252.204-7012 or similar clauses, the documents are likely CUI. Create a crosswalk mapping legacy markings to current CUI categories. When unable to determine status, treat documents as CUI until you can confirm otherwise.
Can I store CUI in cloud services?
Yes, but the cloud environment must meet security requirements equivalent to NIST SP 800-171. This typically means FedRAMP Moderate authorization at minimum, plus any additional requirements from your contract. Document your cloud architecture, data flows, and shared responsibility model as part of your evidence.
What if a subcontractor refuses to handle CUI properly?
This is a vendor risk and contract compliance issue. You remain responsible for CUI protection throughout the supply chain. Options include: finding a different subcontractor, limiting what CUI you share with them, or requiring they achieve CMMC certification before handling CUI on your contracts. Document your due diligence.
Is internal financial data CUI?
General internal financial data is not CUI. However, financial information related to government contracts, cost accounting data submitted to the government, or financial data on classified programs may fall under the Financial or Proprietary Business Information categories. Context matters.
How often should I review my CUI scope?
At minimum, review CUI scope annually and whenever you win or lose significant contracts. Also review when contract requirements change, when you add new systems or tools, and when you onboard new subcontractors. Treat CUI scoping as an ongoing process, not a one-time exercise.
What is the difference between CUI and FCI?
CUI (Controlled Unclassified Information) requires safeguarding under specific government designations and categories. FCI (Federal Contract Information) is information not intended for public release but not meeting CUI criteria. FCI generally requires basic safeguarding under FAR 52.204-21, while CUI requires the more comprehensive NIST SP 800-171 controls.
Who decides if something is CUI?
The government agency that owns or created the information makes the CUI designation. As a contractor, you do not create new CUI designations. You identify information the government has designated as CUI and apply appropriate protections. If uncertain, ask your contracting officer for clarification.
Related resources
Deep-dive guides for CMMC and data protection.
Sources & References
Need help scoping CUI?
We can help you identify, categorize, and protect CUI across your environment.
Contact N2CON