Scope, Defined.
In CMMC, "scope" is the technical answer to a deceptively simple question: where does the regulated information live, and who touches it?
Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) don't sit still. They flow into your organization through email, portals, and printed documents. They get stored on shared drives, in project management tools, on laptops and phones. They get processed by employees in offices, in the field, and at home. They get transmitted to subcontractors, design partners, suppliers, and back to the government.
That definition is short, but it's also the entire game. Every CMMC requirement that gets levied on a contractor applies only inside scope. A laptop that's in scope must meet 15 specific practices at Level 1 (or 110 practices at Level 2). The same laptop, if not in scope, has no CMMC requirements at all. The line between "in" and "out" is the difference between a defensible compliance program and either crushing overspend or a False Claims Act finding.
The Three Pillars: People, Processes, Technology.
Every scope determination breaks into three categories. If you can name what's in each, you've drawn the boundary correctly.
The verbs that matter — the ones that pull a person, process, or piece of technology into scope — are these three:
If any of those three verbs apply — even occasionally, even in transit — the asset is in scope. This is the part that catches primes off guard. A laptop that "only views" FCI from a portal is still processing it. A printer that "only prints" drawings is storing them in memory. An email server that "only forwards" award documents is transmitting them. There is no light-touch category.
Why Scope Matters — In Both Directions.
Scope errors are expensive whether you draw the line too wide or too narrow. Most primes pick one direction by default and pay for it without realizing.
The right answer is rarely "scope everything in" or "scope everything out." It's a precise, defensible map of where regulated information actually moves — informed by your specific contract, your specific subs, and your specific systems.
What Primes Get Wrong Most Often.
In our experience working with Pacific defense primes — Hawaii, Guam, and CNMI — the same scope mistakes show up again and again:
So What Do You Actually Do?
The path to a defensible scope determination has four parts, in order:
One. Identify what regulated information your contract actually contains. Read the contract clauses. FAR 52.204-21 means FCI is in play. DFARS 252.204-7012 with NIST SP 800-171 controls means CUI. The clauses tell you what level the contract is at.
Two. Trace where that information goes. Every entry point, every storage location, every person who reads it, every sub who receives a downstream copy, every system that touches it in transit. This is the hardest step and the one most often done by guess.
Three. Document your scope boundary. A scope map is a defensible artifact: it shows what's in, what's out, and the reasoning behind every line. If a DIBCAC reviewer arrives, this document is what you hand them first.
Four. Operationalize it. Train people inside scope. Configure systems inside scope. Flow appropriate clauses to subs inside scope. Re-verify every time something changes.
Each part has details that aren't worth covering in a free primer — partly because the details depend on your specific contract type, your specific subs, and your specific systems, and partly because doing this correctly is what separates a defensible compliance program from a hopeful one.
PCC builds defensible scope maps for Pacific primes — so your boundary holds up under audit.
We trace your contract's information flow end to end, identify every system and sub in scope, document the boundary with the rationale behind every line, and give you a maintainable artifact you can defend in front of any reviewer. Built for Pacific defense primes — Hawaii, Guam, CNMI — by people who actually live here and understand how the work gets done. No mainland enterprise consulting bills.