What Are CUI and CDI? (And Why Should You Care?)

Dec 20, 2017 | Cyber Security, IT News

With the year-end deadline rapidly approaching for meeting updated federal cybersecurity standards, it’s important to know what’s involved.

What we’re talking about is safeguarding Controlled Unclassified Information (CUI). This type of information regularly moves through or resides on the internal networks or information systems of most federal contractors. Simply put, the government wants to strengthen security to keep that information secure.

What Exactly Is CUI?

What Are CUI and CDI? (And Why Should You Care?)To fully safeguard this information, you need to understand what qualifies as CUI. In short, this is sensitive government information that needs protecting, but isn’t actually classified.

The National Archives and Records Administration provides a lengthy definition of what constitutes CUI. The government terminology boils down to this: CUI is a broad category of information the government creates or possesses — or that an entity creates or possesses on behalf of the government, which includes federal contractors — that needs to be safeguarded.

The National Archives oversees efforts to establish consistent practices and procedures for safeguarding, disseminating, controlling and marking CUI across executive branch departments and agencies. It’s an effort to implement a single standard for handling the sensitive information, rather than the patchwork of programs that previously existed at hundreds of different federal jurisdictions.

“The CUI Program establishes one government-wide system for unclassified information requiring safeguarding and disseminating controls,” said Archivist of the United States David S. Ferriero.

What About CDI?

You also may come across the term CDI. That’s because the Department of Defense (DoD) has its own coordinating rules for cybersecurity, and it uses the term Covered Defense Information (CDI).

DoD uses the term CDI almost interchangeably with CUI. In its final rule on the matter, DoD confirmed this. They stated the definitions they use are intended to be consistent with those of the National Archives’ definition of what constitutes CUI.

If you’re confused about what all these definitions mean, we can help you find answers about how your business could be impacted. Our support staff will help you understand whether the information you work with meets these federal definitions.

What Are CUI and CDI? (And Why Should You Care?)Why Should You Be Worried About This?

If you handle this type of government information, you need to comply with the regulations outlined in the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations.

The deadline for implementing these updated cybersecurity systems is Dec. 31, so there’s no time to waste. We understand the importance of network security and data protection, and we’ll help you protect the federal information you need for your business’ critical operations.

Contact us with your questions, so we can help you maintain the government contacts your business needs to succeed.

Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Let V2 Systems take care of your IT while you take care of business.

More From V2 Systems

Access Creep Is a Business Risk: How Over-Permissioned Users Create Exposure

Access creep happens when users accumulate permissions over time and keep access they no longer need. For small businesses and government contractors, this creates unnecessary cybersecurity, compliance, and operational risk. This blog explains how over-permissioned users increase exposure and what organizations can do to strengthen access controls, reduce privilege misuse, and improve audit readiness.

Why Identity-Based Attacks Dominate Cybersecurity in 2026

Identity has become the new cybersecurity perimeter. In 2026, attackers are increasingly using stolen credentials, MFA fatigue tactics, and identity misuse to gain access to business systems. This blog explains why identity-based attacks are dominating the threat landscape and what small businesses and government contractors can do to strengthen access controls, improve MFA, and reduce exposure.

The Audit Readiness Problem Government Contractors Can’t Afford to Ignore

Many government contractors are not failing audits because they lack tools. They are failing because documentation is incomplete, evidence is disorganized, and readiness starts too late. This blog explains the most common gaps and how to fix them before an audit begins.

You Can’t Secure What You Can’t See: Why Asset Visibility Is a Cybersecurity Requirement

Asset visibility is one of the most overlooked parts of cybersecurity. In this blog, we explain why businesses need clear visibility into hardware, software, users, and cloud assets to reduce risk, strengthen operations, and support compliance.

When One Suspicious Alert Prevented a Much Bigger Disaster

A former client narrowly avoided a much larger cybersecurity incident after suspicious Microsoft 365 activity revealed an unauthorized intrusion. In this blog, we break down what happened, how phishing may have played a role, why MFA still matters, and what businesses should do next to reduce risk and respond quickly.

Free
Small Business Cybersecurity Checklist

cybersecurity checklist graphic