Skip to main content

Contractual Ingestion & LOB Strategy

CMMC compliance obligations do not begin at the time of an assessment — they begin at contract award. The moment a contract containing DFARS 252.204-7012 is executed, the organization is legally bound to protect Covered Defense Information (CDI) under the requirements of NIST SP 800-171. That obligation exists regardless of whether the organization has completed a CMMC assessment, updated its System Security Plan, or even identified which systems will touch the new CUI. The assessment merely verifies what the contract already requires.

This creates a business process problem that is predominantly organizational rather than technical. A contract is awarded to a program or business development team. The CUI handling obligation that comes with it is owned by IT and security. Without a formal contract intake process that connects these two functions, new awards silently expand the CUI scope, add systems to the assessment boundary, and create potential compliance gaps from day one. Organizations that treat CMMC as a one-time project rather than an ongoing contract management discipline accumulate risk with every new award.

DFARS 252.204-7012 — The Triggering Clause

DFARS 252.204-7012, formally titled Safeguarding Covered Defense Information and Cyber Incident Reporting, is the primary contractual mechanism through which DoD imposes CUI protection requirements on defense contractors. When this clause appears in a contract, the contractor is obligated to implement adequate security across all systems that process, store, or transmit Covered Defense Information — including email, file shares, collaboration platforms, and any cloud services.

The clause is broad. It does not require that the prime contractor handle classified information. CDI includes Controlled Technical Information (CTI), export-controlled data, and any information that meets the definition of CUI under the National Archives CUI Registry. It applies at the time of award, not at the time of assessment.

Key DFARS 7012 Obligations

ObligationRequirementTimeline
Adequate securityImplement all controls in NIST SP 800-171At time of award
Cyber incident reportingReport to DoD via dibnet.dod.milWithin 72 hours of discovery
Media preservationPreserve images of compromised systems and relevant data90 days from incident
Cloud service useUse only cloud services meeting FedRAMP Moderate equivalencyAt time of award
Subcontractor flow-downFlow 7012 to all subcontractors that will handle CDIAt subcontract award

The 72-hour cyber incident reporting requirement is operationally significant. It requires that the organization have a documented incident response process capable of identifying an incident, scoping the affected CDI, and submitting a report to DoD — all within three days. This is not achievable without pre-existing detection capabilities, a clear process owner, and pre-registered access to dibnet.dod.mil.

The cloud service requirement has direct platform implications. Any cloud service used to process, store, or transmit CDI must meet FedRAMP Moderate equivalency. Microsoft 365 GCC High satisfies this requirement. Standard commercial Microsoft 365 (E3/E5 commercial tenant) does not meet this bar for DoD CUI without additional compensating controls and documented risk acceptance.


Identifying CMMC-Triggering Contracts

Not every DoD contract triggers a CMMC obligation. The obligation attaches when a contract involves CUI — specifically when the contract includes DFARS 252.204-7012 or, for newer solicitations, DFARS 252.204-7021 (the CMMC clause itself).

Starting in FY2025, DoD began including DFARS 252.204-7021 in solicitations for contracts requiring CMMC Level 2 certification. This clause goes further than 7012: it requires the contractor to have achieved a CMMC Level 2 certification (issued by a C3PAO) at the time of contract award, not merely self-attest to NIST SP 800-171 compliance via SPRS. Organizations that currently self-attest should identify contracts that include 7021 and treat them as driving a certification requirement rather than a self-assessment.

CUI Categories Common in the DIB

CUI CategoryAbbreviationCommon Trigger
Controlled Technical InformationCTIEngineering drawings, specifications, test results
Export ControlledEXPTITAR/EAR-controlled data, hardware/software designs
Contractor Bid or Proposal InformationCBPIBid packages, pricing, teaming agreements
For Official Use OnlyFOUOProgram documentation, government correspondence
Privacy / Personally Identifiable InformationPIIPersonnel records, background check data

Contract Review Checklist

Use this checklist when a new contract award or modification is received:

  • Does the contract include DFARS 252.204-7012?
  • Does the contract include DFARS 252.204-7021 (CMMC clause)?
  • Does the Statement of Work reference CUI, CDI, CTI, or ITAR/EAR-controlled information?
  • Does the contract include government-furnished information (GFI) or government-furnished equipment (GFE)?
  • Does the contract require access to government networks, systems, or portals?
  • Does the contract involve export-controlled technology, software, or hardware?
  • Will performance of the contract require sharing information with subcontractors?

A "yes" to any of these questions should trigger the full contract intake process described in the next section.


Contract Intake Process

The Business Process Gap

The organizational dynamic at most defense contractors works against compliance. Business development or program management receives a contract award. The award notice goes into a contracts management system. The IT and security team — who own the assessment boundary, the SSP, and the CMMC compliance posture — may never see the contract unless there is a formal intake process that connects the two functions.

This gap produces predictable failures: new systems stand up to support a contract before they are evaluated for CUI scope; CUI arrives via email before the data flow diagram is updated; subcontractors receive CDI before any flow-down review occurs. By the time the compliance team becomes aware, the boundary has already expanded and the exposure has occurred.

A formal contract intake workflow closes this gap. It does not need to be elaborate — it needs to be mandatory.

Intake Workflow

Step 1 Contract award or modification received
→ Contracts team reviews for DFARS 252.204-7012 and 252.204-7021

Step 2 If 7012 or 7021 is present
→ Security / IT team notified within 5 business days of award

Step 3 Security intake review
→ What CUI categories will be received?
→ From whom will CUI be received (contracting officer, subcontractors, GFI)?
→ Via what mechanism (SAFE, encrypted email, portal, physical media)?
→ What systems will process or store the CUI?

Step 4 Data flow update
→ Add the new CUI flow to the SSP data flow diagram
→ Label source, destination, data type, and transport mechanism

Step 5 Asset scope review
→ Are any new endpoints, servers, or cloud workloads entering scope?
→ If yes, add to the asset inventory and apply baseline configuration

Step 6 Subcontractor review
→ Will any CUI be shared with subcontractors?
→ If yes, initiate subcontractor flow-down process (see below)

Step 7 SSP update
→ Document the new contract, CUI categories received, and any boundary changes
→ Update the SSP revision history
→ Notify the ISSO / compliance lead

This workflow should be documented as a written procedure and referenced in the SSP under the Configuration Management and Planning control families. Assessors will ask how scope expansions are detected and managed — a documented intake process with evidence of execution (intake tickets, notification emails, SSP revision log) is the expected answer.


Subcontractor Flow-Down

DFARS 252.204-7012 places an affirmative obligation on prime contractors: if CUI or CDI will be shared with a subcontractor, the prime must flow the clause down to the subcontract as a binding obligation. The subcontractor must then meet the same NIST SP 800-171 requirements as the prime. The prime is responsible for this requirement — a subcontractor's non-compliance does not absolve the prime during a DoD assessment or incident investigation.

As CMMC certification requirements expand, some subcontracts may require that the sub hold a CMMC Level 2 certification rather than self-attest. Primes should review subcontract terms proactively, particularly where DFARS 252.204-7021 is present in the prime contract.

Subcontractor Management Checklist

  • Include DFARS 252.204-7012 language verbatim in all subcontracts where CDI will be shared
  • Require each sub to provide their current SPRS score or CMMC Level 2 certification letter before CUI is shared
  • Limit CUI shared with subs to the minimum necessary for performance (need-to-know)
  • Document the approved data sharing mechanism and prohibit sharing outside that mechanism
  • Review sub compliance posture at least annually, or upon contract renewal

Approved Sharing Mechanisms

Sharing CUI with subcontractors who are not on GCC High requires deliberate handling. A sub operating on a commercial Microsoft 365 tenant does not meet the FedRAMP Moderate equivalency bar for DoD CUI. The following mechanisms are approved for sharing CDI with external parties:

MechanismUse CaseNotes
SAFE (DoD Safe Access File Exchange)File transfer of CDI to external partiesFree, DoD-hosted, does not require sub to be on GCC High
Encrypted email with MIP sensitivity labelsLow-volume document exchangeRequires recipient capability to decrypt; confirm before use
Entra External Identities (B2B guest)Structured collaboration on GCC High SharePointGuest user governed by your Conditional Access and DLP policies
Physical media (encrypted, tracked)Large file transfers or offline environmentsChain of custody required; encryption mandatory

Do not share CUI via consumer OneDrive, consumer Dropbox, unencrypted email, or cross-tenant sharing to a standard commercial Microsoft 365 tenant. These channels do not meet the DFARS cloud service equivalency requirement and produce a material compliance gap.


Line of Business CUI Recognition Training

Technical controls protect CUI only if the people handling it recognize that it is CUI. An employee who does not know that a set of engineering drawings received from a contracting officer constitutes CTI will not apply a sensitivity label, will not know to restrict forwarding, and may share the file through an unapproved channel. The technical architecture cannot compensate for unrecognized CUI.

What CUI Looks Like

CUI is marked using the standard format defined by the National Archives CUI Registry:

  • CUI — baseline marking, no additional category specified
  • CUI//SP-CTI — Controlled Technical Information (specified CUI)
  • CUI//SP-EXPT — Export Controlled (specified CUI)
  • CUI//FOUO — For Official Use Only (basic CUI)

Markings appear in document headers and footers, in email subject lines (when the sender follows marking requirements), and in filename prefixes on some programs. Personnel should be trained to recognize these patterns.

Unmarked CUI

A document does not need a marking to be CUI. The obligation attaches based on the nature of the information and the contract context, not the presence of a label. The applicable test is:

Would a reasonable government official expect this information to be protected based on its content and the circumstances under which it was shared?

If the answer is yes, treat it as CUI regardless of whether a marking is present. Technical drawings received from a program office under a CDI-bearing contract are CTI whether or not they carry a banner. Bid and proposal information generated in support of a government contract is CBPI whether or not the document is labeled.

Employees should be trained to apply this "reasonable expectation" test when they receive information that could be government-related, and to contact the organization's CUI Program Manager (or designated security point of contact) when they receive information they are uncertain how to classify.

Training Requirements

Training is not optional

CMMC requires that all personnel who handle CUI receive CUI awareness training. Personnel who work with CUI in a specific role (program manager, system administrator, contracts officer) must also receive role-based training. Undocumented training is treated as no training by assessors. Maintain training completion records tied to individual employees, contract scope, and date of completion.

Training records should capture:

  • Employee name and role
  • Training course name and version
  • Date of completion
  • CUI categories covered
  • Whether training was role-based or general awareness

Records must be retained and producible for assessors. A spreadsheet or LMS export is acceptable. Verbal attestation is not.


Contract Flow-Downs — Compliance Control Mapping

The following CMMC Level 2 practices are directly addressed by a mature contract intake and CUI recognition program.

CMMC PracticeDomainRequirementContract Intake Artifact
AT.L2-3.2.1Awareness and TrainingProvide awareness training on organizational policies, threats, and CUI handlingTraining completion records by employee and contract
AT.L2-3.2.2Awareness and TrainingEnsure personnel with CUI access receive role-based trainingRole-based training records for contracts, IT, and program staff
IR.L2-3.6.1Incident ResponseEstablish an operational incident-handling capabilityDocumented 72-hour reporting process; dibnet.dod.mil registration
IR.L2-3.6.2Incident ResponseTrack, document, and report incidentsIncident log; DFARS 7012 reporting procedure
CM.L2-3.4.2Configuration ManagementEstablish and maintain baseline configurationsNew systems added to baseline upon contract scope expansion
CA.L2-3.12.4Security AssessmentDevelop, document, and periodically update SSPsSSP updated with each new CUI contract; revision history maintained
MP.L2-3.8.1Media ProtectionProtect system media containing CUIApproved sharing mechanisms documented; unapproved channels prohibited
SC.L2-3.13.11System and CommunicationsEmploy FIPS-validated cryptographyEncryption requirement enforced for all external CUI transfer mechanisms

📩 Don't Miss the Next Solution

Join the list to see the real-time solutions I'm delivering to my GCC High clients.