Many organizations in the Defense Industrial Base (DIB) may not realize that scoping before a CMMC 2.0 assessment can be the most important step in the CMMC compliance journey. Establishing a scope without careful thinking can result in paying more for your assessment, investing more than you need to invest in preparing for CMMC, and more.
Scoping is not just a preliminary checklist. A scope that is too small can result in failing an assessment. If the scope is too large, organizations experience wasted money and time.
Here are three steps to make sure you define your scope well.
1. Identify Your Asset Categories
You cannot protect what you haven't identified. Under CMMC (specifically following the logic of Scoping Guidance for Level 2), you need to categorize every single thing that touches Controlled Unclassified Information (CUI).
We categorize these into four distinct buckets:
The logic is simple: follow the data. Map the flow of CUI from the moment it hits your environment until the moment it leaves. If a machine even looks at a CUI file, it’s in the cage.
2. The Power of Segregation and Separation
If your guest Wi-Fi can talk to your engineering server where the blueprints live, your entire building is in scope. That is a recipe for a very expensive, very painful assessment.
You need to lean heavily into segmentation. By using VLANs, physical separation, and robust firewalls, you can create a "CUI Enclave." Think of it as a vault within a bank. By isolating the assets that handle sensitive defense data from the rest of your corporate environment (like HR or general accounting), you shrink the "Assessment Boundary."
Why does this matter? Because every asset inside that boundary must be assessed against all 110 practices of NIST SP 800-171. If you can move 50 workstations out of scope through proper segregation, you’ve just saved yourself hundreds of hours of evidence collection.
3. Vet Your External Service Providers (ESPs)
Many organizations use cloud storage, managed IT services (MSPs), or security providers (MSSPs). It is important to remember that you can outsource the work, but you cannot outsource the accountability.
When you use an External Service Provider to handle CUI or provide security services, they become part of your scope.
Before you sign Scope of Work document with a vendor, ask for their SOC 2 reports, their shared responsibility matrix, and their own CMMC status. If they can’t provide clear evidence of how they protect your data, they are a liability to your certification.
Scoping can be where the battle is won or lost. It requires a focused, clinical look at your infrastructure.
At Smithers, we understand that as an authorized C3PAO, our job is to ensure that when we step into the room for your assessment, the boundaries are clear and the evidence is solid. Start with these three steps, and you’ll be miles ahead of the competition.
Smithers understands that setting the scope for a CMMC 2.0 assessment can be intimidating. Contact us today to ask us questions.