🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Screening Policy for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.1: Templates and Implementation Guide

Step-by-step guidance and reusable policy language to build a compliant personnel screening policy for NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (PS.L2-3.9.1).

April 21, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Personnel screening is one of the simplest-to-state but hardest-to-operationalize controls: PS.L2-3.9.1 requires organizations handling Controlled Unclassified Information (CUI) to screen individuals before granting access, and a practical screening policy turns that requirement into repeatable HR + technical workflows, audit evidence, and actionable decisions. This post gives a Compliance Framework–specific implementation guide, ready-to-adapt policy clauses, small-business examples, technical integration tips, and the risks of not implementing the requirement.

Understanding PS.L2-3.9.1 in the Compliance Framework Context

At Level 2 this control focuses on screening employees, contractors, and third-party personnel for suitability and trustworthiness before they are authorized to access CUI. For Compliance Framework implementers, the objective is demonstrable, documented screening tied to access decisions: who was screened, what checks were performed, when, the adjudication outcome, and where records are stored. Screening is risk-based — more sensitive roles require deeper vetting — and must mesh with HR onboarding, contracting, and identity/access management (IAM) systems.

Policy Components and Template Clauses

Scope and Responsibilities

Include a clear scope and responsibility matrix in your policy. Example clause: "Scope: This policy applies to all employees, contractors, subcontractors, interns, and volunteers who will be granted access to CUI or systems containing CUI. Responsibilities: HR coordinates screening; Hiring Manager initiates; Security/Compliance adjudicates results; IT/IAM enforces access controls based on adjudication." Embed this in job postings and contract language to ensure consent and recordkeeping rights.

Screening Types and Minimum Requirements

Define the checks and thresholds. Example template table (to be implemented as policy text): "Minimum screening for all roles: identity verification (ID+SSN or equivalent), employment history verification (last 3 years), criminal records check (national and county where available). Enhanced screening for privileged or remote access roles: credit/financial history (if role involves financial responsibility), education verification, and reference checks. Re-screening: upon significant role change, every 3 years, or per contract requirement." Specify acceptable vendors, candidate consent process, and how to handle international hires.

Implementation Steps for a Small Business

Small businesses should adopt a pragmatic, risk-based workflow: 1) Draft the policy and approval authority (CISO or appointed owner). 2) Integrate checks into the HR applicant tracking system (ATS) and procurement process for vendors. 3) Use a reputable third-party background-check vendor with an API for automation to reduce manual effort. Real-world example: a 30-person defense subcontractor required identity verification and a criminal background check for any staff working on CUI — they configured their ATS to trigger the background-check API when the candidate accepted an offer, and configured the IAM tool to withhold CUI access until HR marked the candidate as "cleared" in the ATS.

Technical Controls and Operational Integration

Link screening outputs to technical access controls. Implement an "access gating" workflow: HR/Compliance adjudicates -> updates a secure attribute in the IAM directory (e.g., "CUI_Access=Approved") -> automated group membership and least-privilege permissions are granted. Use multifactor authentication (MFA) and device attestation as additional technical gates. Store screening artifacts (signed consent forms, vendor reports, adjudication notes) in an encrypted document repository with role-based access and audit logging. Retention: align with contract terms, but maintain a default retention policy (e.g., 3–7 years) and purge based on legal requirements.

Adjudication, Exceptions, and Recordkeeping

Define an adjudication process and an exceptions process. Adjudication criteria should be objective (e.g., disqualifying offenses for certain roles) and include a documented appeal or mitigation pathway (supervised access, restricted duties, periodic re-checks). Example exception: a candidate with a minor, non-recent offense may be approved for non-privileged CUI access with quarterly supervisory reviews. Maintain a log of adjudication decisions and link each decision to the user's IAM record so auditors can trace who made decisions, why, and what mitigations apply.

Risk of Not Implementing PS.L2-3.9.1 and Best Practices

Failing to implement screening increases insider risk, the likelihood of unauthorized exfiltration of CUI, and can lead to contract penalties or loss of DoD/business opportunities. Best practices: (1) Treat screening as an ongoing lifecycle, not a one-time checkbox; (2) Automate triggers between HR and IAM to prevent earlier-than-authorized access; (3) Protect screening data with encryption, access controls, and minimal retention; (4) Use role-based depth: more invasive checks only for high-risk positions; (5) Regularly test the process using tabletop exercises and internal audits.

Summary: Build a concise, auditable screening policy that defines scope, checks, adjudication, exceptions, recordkeeping, and IAM integration — and implement it with automation and vendor integrations to scale. For small businesses, start with a minimal set of verifiable checks, codify decision criteria, and tie the cleared/uncleared state directly to access provisioning. Properly implemented screening closes a critical compliance gap under PS.L2-3.9.1 and materially reduces insider and supply-chain risk while producing clear evidence for auditors and contracting officers.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 ECC Compliance App

ECC Compliance

Become compliant, provide compliance services, or verify partner compliance with Essential Cybersecurity Controls (ECC – 2 : 2024) requirements.