Skip to content

Scoping

Scoping is the single most consequential decision in your CMMC journey. Get it right and you assess only what needs assessing — a tight enclave with clear boundaries. Get it wrong and you either over-scope (making compliance unnecessarily expensive) or under-scope (which creates findings during the real assessment when the C3PAO discovers assets you missed).

The scope applies equally to self-assessments and C3PAO certification assessments. The security requirements are identical — the only difference is who does the assessing.

Before the assessment begins, you must define and document your CMMC Assessment Scope — the specific set of assets (people, systems, facilities) that will be evaluated. This is governed by 32 CFR § 170.19(c).

Planning ahead: If you ever plan to pursue Level 3, your Level 2 scoping decisions have consequences. Assets categorized as Contractor Risk Managed at Level 2 get treated as CUI Assets at Level 3 — meaning they face full assessment against all requirements. Think ahead.

Classified assets are never in scope for CMMC, even if they contain CUI.


Every asset in your environment gets placed into one of five categories. Four are in scope. One is out.

CategoryWhat It IsAssessment Treatment
CUI AssetsProcesses, stores, or transmits CUIAll 110 requirements — full assessment
Security Protection AssetsProvides security functions for the CUI environmentRelevant requirements only
Contractor Risk ManagedCan but isn’t intended to handle CUISSP review; limited check only if docs are weak
Specialized AssetsHandles CUI but can’t be fully secured (OT, IoT, GFE)SSP review; may qualify for Enduring Exception
Out-of-ScopeNo CUI, no security role, physically or logically separatedNot assessed — but be ready to justify

The categories aren’t just labels — they determine how much assessment scrutiny an asset receives and how much work you need to do to secure it. The difference between CUI Asset (all 110 requirements) and CRMA (SSP review) is enormous in terms of cost and effort.


TopicWhat It Covers
Defining Your BoundaryDrawing the line around your assessment scope
Separation TechniquesLogical and physical separation to reduce scope
External Service ProvidersWhen your vendors, CSPs, and MSPs fall inside your scope
Enclaves & Use CasesEnclave model, inherited controls, FCI+CUI scenarios, Security Protection Data