N2CON TECHNOLOGY

CMMC Enclave Implementation Guide

An enclave is a segmented environment where Controlled Unclassified Information (CUI) is isolated from general business systems. Done well, it reduces compliance scope. Done poorly, it creates operational friction and hidden costs.

Note: This is general information and not legal advice.

Last reviewed: March 2026
On this page

Executive Summary

What it is
A segmented CUI processing environment, isolated from general business systems through network, identity, and data flow controls.
When enclaves make sense
  • CUI is limited to specific workflows or teams
  • You have existing infrastructure that can be segmented
  • Organization can support dual-mode operations
  • Cost of hardening entire environment exceeds enclave complexity
When enclaves do not make sense
  • CUI is pervasive across most workflows
  • Organization lacks maturity for dual-mode operations
  • Integration requirements make separation impractical
  • User resistance will undermine compliance
Cost tradeoffs
  • Enclave can reduce scope by 40-70% for some organizations
  • Hidden costs: user training, support overhead, workflow friction
  • Cloud-only enclaves often 20% lower cost than hybrid
  • Enclave is not a shortcut—it changes where controls apply, not the rigor required
Key decision
Hybrid (on-prem + cloud) vs. cloud-only depends on your current infrastructure, workforce distribution, and IT capabilities. Cloud-only is often simpler for organizations without existing on-prem CUI infrastructure.

Enclave Fundamentals

An enclave is an isolated environment for CUI processing. The isolation is enforced through network boundaries, identity controls, and data flow restrictions. The goal is to limit the scope of CMMC controls to a defined subset of your infrastructure rather than applying them across the entire organization.

Scope reduction is the primary benefit. If only 20% of your systems touch CUI, hardening that 20% is typically less expensive and disruptive than hardening everything. But scope reduction is not automatic—you must prove the boundary is real and maintained.

Operational complexity is the primary cost. Running two environments means two sets of procedures, two support paths, and users who must switch between modes. This friction is often underestimated.

Important: An enclave is not a compliance shortcut. The controls within the enclave must still meet NIST 800-171 requirements. What changes is where those controls apply, not the rigor required. You are trading breadth for depth: fewer systems to harden, but those systems must be fully compliant.

Enclave Models

Hybrid Enclave (On-Prem + Cloud)

A hybrid enclave combines on-premises CUI processing with cloud-based supporting services. The CUI processing environment lives on-prem, while identity, logging, or backup may be cloud-hosted.

When to choose hybrid:

  • Existing on-prem infrastructure that already handles sensitive workloads
  • Latency-sensitive workloads that benefit from local processing
  • Regulatory or contractual requirements for on-prem data residency
  • IT team with strong on-prem management capabilities

Challenges:

  • Maintaining clear separation between CUI and non-CUI systems
  • Network boundary management (firewalls, VLANs, routing)
  • Consistent identity and access management across environments
  • More complex disaster recovery and backup strategies

Cloud-Only Enclave

A cloud-only enclave hosts the entire CUI environment in cloud infrastructure. This is typically implemented using a dedicated cloud tenant or subscription with appropriate security controls.

When to choose cloud-only:

  • Cloud-native organization or distributed workforce
  • Limited IT staff or on-prem infrastructure
  • Need for rapid scaling or geographic flexibility
  • Preference for managed infrastructure services

Challenges:

  • Data egress costs and vendor lock-in considerations
  • Understanding and documenting shared responsibility
  • Selecting and configuring the right cloud service tier (e.g., Microsoft GCC High vs. commercial)
  • Proving boundary isolation in a shared cloud environment

Industry data suggests cloud-only enclaves can reduce implementation costs by approximately 20% compared to hybrid approaches, primarily through reduced infrastructure management overhead. However, this varies significantly based on your starting point and requirements.

Implementation Steps

  1. CUI inventory and workflow mapping. Before designing an enclave, you must know where CUI lives, how it flows, and who needs access. Map every system, application, and process that touches CUI. This inventory becomes your scope boundary definition.
  2. Select enclave model. Based on your inventory, current infrastructure, and organizational capabilities, choose between hybrid and cloud-only. Consider: existing investments, IT capabilities, workforce distribution, and growth plans.
  3. Design network boundaries. Define how the enclave connects to (and is isolated from) general business systems. Options include air-gapped networks (no connection), controlled access through firewalls and DMZs, or software-defined perimeters. Document the boundary architecture.
  4. Implement identity isolation. Decide whether to use separate identity realms (different Active Directory domains or Azure AD tenants) or scoped permissions within a shared identity system. Separate realms are simpler to prove but more complex to manage.
  5. Deploy technical controls. Within the enclave, implement encryption (at rest and in transit), Multi-Factor Authentication (MFA), logging and monitoring, endpoint protection, and backup/recovery. These controls must meet NIST 800-171 requirements.
  6. Document the SSP and boundary diagrams. Your System Security Plan (SSP) must clearly describe the enclave boundary, what is inside and outside, and how controls are applied. Include network diagrams, data flow diagrams, and identity architecture.
  7. Test and validate isolation. Verify that the boundary works as designed. Test: can a compromised non-CUI system reach enclave resources? Are access controls enforced? Is logging capturing all relevant events? Fix gaps before assessment.
  8. Train users on dual-mode workflows. Users must understand when they are working in the enclave vs. general systems, how to transfer data between environments (if allowed), and what behaviors are prohibited. Training is ongoing, not one-time.

Technical Architecture Patterns

Network Segmentation

Network segmentation isolates CUI systems from general business systems at the network layer. Common approaches:

  • VLANs: Virtual LANs separate traffic at layer 2. Simple to implement but require careful configuration of routing and firewall rules.
  • Microsegmentation: Software-defined segmentation that creates boundaries at the workload level. More granular but requires platform investment (e.g., VMware NSX, cloud security groups).
  • Physical isolation: Separate network infrastructure for the enclave. Strongest isolation but highest cost and complexity.

The right approach depends on your existing infrastructure and risk tolerance. Most organizations start with VLANs and firewall rules, then evolve toward microsegmentation as maturity increases.

Identity Models

Identity architecture determines how users authenticate to enclave resources.

  • Separate AD/Azure AD tenant: Completely separate identity realm for CUI access. Clearest boundary but requires managing two directories and user provisioning.
  • Scoped permissions in shared tenant: Single identity provider with conditional access and scoped permissions. Simpler user management but requires careful configuration to prove isolation.
  • Federated identity: External identity provider federated with enclave systems. Common when subcontractors need access.

Whichever model you choose, document how you prove that enclave access requires distinct authentication and authorization.

Endpoint Handling

How users physically access the enclave affects both security and usability.

  • Dedicated CUI workstations: Physical devices that only connect to the enclave. Strong security but requires hardware investment and physical workspace.
  • Virtual Desktop Infrastructure (VDI): Virtual desktops for enclave access from general-purpose devices. Flexible but requires VDI platform and careful configuration to prevent data leakage.
  • BYOD with conditional access: Personal devices with strict compliance requirements. Viable for cloud enclaves but requires robust Mobile Device Management (MDM) and conditional access policies.

Data Flow Controls

Controlling how data moves into and out of the enclave is critical for maintaining boundary integrity.

  • Data Loss Prevention (DLP): Monitor and block unauthorized data transfers. Configure rules to detect CUI patterns and enforce allowed transfer channels.
  • Encryption in transit: All data crossing enclave boundaries must be encrypted using FIPS-validated cryptography.
  • Controlled transfer points: Designated systems or processes for moving data between environments. Document these in your SSP and monitor for unauthorized transfers.

Cost Analysis

Enclave costs fall into three categories: implementation, operations, and hidden costs.

Implementation Costs

  • Infrastructure: Dedicated hardware or cloud resources for enclave systems
  • Network segmentation: Firewalls, VLAN configuration, or microsegmentation platform
  • Identity infrastructure: Separate AD domain or Azure AD tenant, or enhanced conditional access configuration
  • Consulting/design: Architecture design and implementation guidance

Operational Costs

  • Dual support paths: IT support for both enclave and general systems
  • Monitoring: Separate logging and monitoring infrastructure or scoped views
  • Backup and recovery: Dedicated backup systems or isolated backup targets
  • Assessment scope: While smaller, enclave assessments still require thorough preparation

Hidden Costs

  • User training: Initial and ongoing training for dual-mode workflows
  • Support overhead: More complex troubleshooting across environments
  • Workflow friction: Lost productivity from context-switching and transfer processes
  • Shadow IT risk: Users bypassing enclave for convenience

Enclave vs. Enterprise Rollout

The cost comparison depends on your scope. If CUI touches 20% of your systems:

  • Enclave: Higher per-system cost (full controls), but only 20% of systems
  • Enterprise: Lower per-system cost (some controls may be lighter), but 100% of systems

The break-even point varies. Organizations with CUI concentrated in specific workflows often find enclaves more cost-effective. Organizations with CUI spread across most operations often find enterprise rollout simpler.

Industry data suggests cloud-only enclaves can reduce costs by approximately 20% compared to hybrid approaches, primarily through reduced infrastructure management and simplified disaster recovery. However, cloud costs scale with usage, so high-transaction environments may not see the same benefit.

When NOT to Use an Enclave

An enclave is not always the right choice. Consider alternatives when:

  • CUI is pervasive. If more than 80% of your workflows involve CUI, the complexity of maintaining separation likely exceeds the benefit. You are essentially running two parallel organizations.
  • Organization lacks operational maturity. Running dual-mode operations requires disciplined processes. If your organization struggles with basic change management or access reviews, adding enclave complexity will create problems.
  • Integration requirements make separation impractical. Some workflows require tight integration between CUI and non-CUI systems. If your business processes cannot tolerate the friction of separation, an enclave will be circumvented.
  • User resistance will undermine compliance. If users view the enclave as an obstacle rather than a security control, they will find workarounds. Shadow CUI on general systems is worse than no enclave at all.

In these cases, consider a broader rollout with appropriate controls. The assessment scope is larger, but operational complexity is lower. See our CMMC Guide for enterprise rollout strategies.

Common Enclave Pitfalls

  • "Leaky" boundaries. The most common failure is accidental data paths that bypass the enclave. Email is a frequent culprit: users send CUI to their personal email "just this once" or CC non-CUI recipients. File sharing services, USB drives, and cloud storage are other common leak points. Audit your data flows regularly.
  • Users bypassing the enclave. When the enclave is inconvenient, users will find workarounds. Common patterns: storing CUI on personal devices, using non-approved collaboration tools, or photographing screens. Address this through training, monitoring, and making the enclave as usable as possible.
  • Insufficient logging of enclave access. Assessors want evidence that enclave access is monitored. If your logging stops at the firewall, you cannot prove who accessed what. Ensure authentication events, file access, and administrative actions within the enclave are logged and retained appropriately.
  • Treating the enclave as "set and forget." Enclave boundaries erode over time. New applications are added without boundary review. Network changes create unintended paths. User access accumulates. Schedule regular boundary reviews and access recertification.
  • Failing to document the boundary architecture. Your SSP must clearly describe what is in the enclave, what is outside, and how the boundary is enforced. Vague documentation like "CUI systems are isolated" will not satisfy assessors. Include specific network diagrams, firewall rules, and identity configurations.
  • Underestimating user training needs. Users need to understand not just how to access the enclave, but why the boundary matters. Training should cover: what counts as CUI, how to recognize when they should be in the enclave, prohibited actions, and how to report suspected violations.

Related: CMMC Assessment Guide for what auditors actually examine.

Common Questions

Can we use the same MFA for enclave and general systems?

You can use the same Multi-Factor Authentication (MFA) provider, but credentials and sessions should be scoped separately. The goal is to prove that enclave access requires a distinct authentication event with appropriate controls. Many organizations use the same identity platform (such as Microsoft Entra ID) but enforce conditional access policies that require step-up authentication or device compliance checks when accessing CUI systems.

How do users access both environments?

Common approaches include dedicated CUI workstations, Virtual Desktop Infrastructure (VDI) sessions for enclave access, or dual-boot configurations. The key principle is that the access method must maintain boundary integrity. Users should not be able to copy/paste between environments or transfer files without going through controlled channels. Document the access workflow and train users on the boundaries.

What about printing from the enclave?

Printing from CUI environments requires careful controls. Options include: dedicated printers within the enclave with physical access controls, print-to-PDF workflows with controlled output, or simply prohibiting hard-copy output. If printing is allowed, you need controls for print queue management, output collection, and disposal. Many organizations find that prohibiting enclave printing simplifies compliance significantly.

Can we use Microsoft 365 for CUI?

Microsoft 365 Government Community Cloud (GCC) High and DoD environments are designed for CUI workloads. Commercial Microsoft 365 is generally not suitable. The key requirements are: data residency in approved regions, appropriate security controls, and a clear shared responsibility understanding. Even with GCC High, you must configure controls correctly and document your implementation.

Do we need separate backup systems?

Backups of CUI systems must meet the same control requirements as production systems. This typically means separate backup infrastructure or logically isolated backup targets. If you use a shared backup platform, you must prove that CUI backups cannot be accessed from non-CUI systems and that backup operators with CUI access are appropriately cleared and trained.

How do we handle software updates in the enclave?

Enclave systems still need security updates. Common patterns include: a dedicated WSUS/patch management server within the enclave, offline update media with integrity verification, or carefully controlled connections to approved update sources through a DMZ. The update process must be documented, and you should maintain evidence that updates are tested before deployment and tracked in your change management system.

Can subcontractors access our enclave?

Yes, but subcontractor access requires the same controls as employee access: appropriate agreements (flow-down clauses), identity verification, need-to-know justification, and access logging. Many organizations create separate accounts or even separate authentication realms for subcontractors. You remain responsible for monitoring their activity and ensuring they follow your security policies.

What evidence do auditors want for enclave isolation?

Expect to provide: network diagrams showing boundary controls, firewall rules and access control lists, configuration exports proving isolation, data flow diagrams, identity system configuration showing separate authentication realms or scoped access, and evidence that the boundary is monitored and logged. Be prepared to demonstrate that a compromise of general systems cannot easily spread to the enclave.

Is an enclave required for CMMC compliance?

No. An enclave is one approach to reducing compliance scope, not a requirement. If CUI touches most of your systems, an enclave may add more complexity than value. The decision should be based on your workflow analysis: where does CUI live, who needs access, and what is the most practical way to control it while maintaining business operations.

How do we handle email with an enclave?

Email is a common boundary leak point. Options include: a separate email domain or tenant for CUI communications, encryption (S/MIME or similar) for CUI content, or prohibiting CUI via email entirely and using secure file transfer instead. Whichever approach you choose, document it clearly and train users on the rules.

Related CMMC resources

Deep-dive guides for specific CMMC topics.

Need help designing your enclave?

We can help you choose the right model, design the architecture, and implement controls that pass assessment.

Contact N2CON