Jackie Ramsey March 16, 2026 0

If you’re preparing for CMMC Level 2, your CMMC system boundary diagram is one of the fastest ways to show assessors you control where CUI lives, how it moves, and what’s in scope.

I like to think of the boundary diagram as the fence line on a property map. If the fence line is unclear, everything becomes an argument. If it’s clear, the conversation shifts to controls, evidence, and accountability.

Below is a reusable template you can copy, plus a worked example for a typical SMB using Microsoft 365, managed Windows endpoints, and a small on-prem network. This isn’t legal advice, and you should align everything with official CMMC and NIST guidance.

What a CMMC Level 2 boundary diagram must communicate (and what gets missed)

Simple vector diagram illustrating key components of a CMMC Level 2 system boundary, including in-scope cloud M365 services, Intune-managed endpoints, on-prem servers behind firewall, data flows, and trust boundaries.
Simple overview of in-scope vs out-of-scope components, created with AI.

At Level 2, I treat the boundary diagram as a scoping artifact first, and a network picture second. Assessors want to see in-scope components that store, process, or transmit CUI, plus anything that protects them (identity, logging, management). They also want to see out-of-scope systems that must stay separated.

The best baseline for scoping language is the DoD’s own guidance, so I keep it nearby while I draw: CMMC Level 2 Scoping Guide (PDF). When I’m mapping controls back to requirements, I also cross-check against NIST 800-171 references (a plain-English starting point helps): NIST SP 800-171 compliance guide.

Here’s what I make explicit on every diagram:

  • Where CUI is allowed (Microsoft 365 services, approved endpoints, on-prem servers).
  • Trust boundaries (Internet edge, VPN boundary, cloud tenant boundary, admin boundary).
  • External dependencies (Microsoft 365, any MSSP/SIEM, backup provider, ticketing tools).
  • Shared responsibility (what Microsoft does, what my client does, what my MSP does).
  • Data flows (solid arrows for CUI flow, dashed arrows for management/telemetry).

If your diagram doesn’t show how CUI moves, it’s a picture. If it shows flows and boundaries, it becomes audit evidence.

Reusable CMMC Level 2 system boundary diagram template (Microsoft 365 + endpoints + on-prem)

Clean, professional vector-style diagram depicting the CMMC Level 2 system boundary for a CUI environment, including Microsoft 365 services, Entra ID, endpoints, on-premises components, and labeled data flows.
Template-style boundary diagram layout you can model, created with AI.

When I build a template diagram for a client, I keep the shape library simple (boxes, arrows, a legend). You can do this in Visio, draw.io, Lucidchart, or even PowerPoint. The tool matters less than consistency.

Template sections (copy these headings into your diagram)

1) Title and boundary statement

  • Boundary box title: “CMMC Level 2 System Boundary (CUI Environment)”
  • Short note: “Only authorized users and managed devices may access CUI.”

2) In-scope (inside boundary)

  • Microsoft 365 tenant: Exchange Online, SharePoint/OneDrive, Teams (only if CUI is permitted there)
  • Entra ID (Azure AD): MFA, Conditional Access, admin roles
  • Endpoint management: Intune/MDM
  • Endpoint protection: EDR (for example, Microsoft Defender for Endpoint)
  • Windows endpoints: laptops/desktops used to access CUI
  • On-prem segment (if any): firewall, VPN gateway, AD (optional), file server or line-of-business app
  • Logging/SIEM: central log collection and alerting (cloud or on-prem)
  • Backup system: backup target and restore path

3) Out-of-scope (outside boundary)

  • Personal BYOD devices (blocked)
  • Non-CUI SaaS tools (marketing, scheduling, design tools)
  • Public Internet
  • Vendor systems that never touch CUI

4) Flows and legend

  • Solid arrow: “CUI flow”
  • Dashed arrow: “Management/telemetry”
  • Label common paths: HTTPS to M365, VPN tunnel to on-prem, auth to Entra ID, logs to SIEM, backups to repository

To keep labeling consistent, I use a simple naming convention:

Diagram labelTypeScopeExampleNotes to add
ID-1IdentityIn-scopeEntra IDMFA, Conditional Access, admin boundary
CLD-1Cloud serviceIn-scopeM365 SharePointCUI allowed sites only
EP-1..nEndpointIn-scopeWin11 Laptop (Managed)Intune, EDR, Device Hardening
OP-1On-premIn-scopeFile ServerCUI share, backups, patching
EXT-1External dependencyOut-of-scopeNon-CUI SaaSDocument separation controls

When Microsoft 365 is in scope, I document it as an external dependency with shared responsibility. If you’re evaluating government cloud options, this can influence design choices; here’s useful context: Microsoft 365 GCC High and CMMC.

Worked example you can copy (SMB using Microsoft 365 + managed endpoints + small on-prem)

Clean, professional vector-style diagram showing a small business CMMC Level 2 system boundary for a restaurant tech firm, integrating Microsoft 365 services, managed endpoints via Intune, on-premises network components, and external connections with clear flow legends.
Example boundary diagram for an SMB with M365, endpoints, and on-prem, created with AI.

I’ll use a common scenario I see when I’m acting as a Business Technology Partner for growing teams: Microsoft 365 for collaboration, Windows devices for work, plus a small on-prem network for a legacy app. Sometimes that “app” supports Restaurant POS Support or Kitchen Technology Solutions, so I’m careful about what touches CUI and what doesn’t.

Copyable example labels (paste into your diagram as-is)

Boundary box title: Example: SMB CMMC L2 Boundary (CUI Environment)

In-scope boxes (inside boundary):

  • CLD-1 Microsoft 365 Tenant (CUI): Exchange Online, SharePoint/OneDrive (CUI sites), Teams (CUI team/channel policy)
  • ID-1 Entra ID: MFA, Conditional Access, admin roles (separate admin accounts)
  • MGMT-1 Intune/MDM: compliance policy, app control, device baselines
  • SEC-1 EDR: endpoint telemetry, isolation, investigation workflow
  • EP-1 to EP-6 Windows 11 Endpoints (Managed): company-owned, encrypted, Device Hardening applied
  • OP-1 Firewall + VPN Gateway: remote access boundary, restrict to managed endpoints
  • OP-2 On-Prem AD (optional): if used, document trust with Entra ID
  • OP-3 File Server or LOB App: CUI storage or processing (if applicable)
  • LOG-1 SIEM/Log Platform: receives M365 audit logs, endpoint logs, firewall/VPN logs
  • BKP-1 Backup Repository: immutable or protected backups, tested restores

Out-of-scope boxes (outside boundary):

  • EXT-1 Public Internet
  • EXT-2 Personal Devices (BYOD): blocked from CUI access
  • EXT-3 Third-party SaaS (Non-CUI): HR/payroll, marketing, scheduling
  • EXT-4 Vendor/Managed Service Provider: shared responsibility statement, support channels

Arrows (label them):

  • EPs → CLD-1: “HTTPS CUI flow”
  • EPs → ID-1: “Auth (MFA/CA)”
  • EPs → OP-1: “VPN tunnel (CUI flow when accessing on-prem CUI)”
  • All components → LOG-1: “Telemetry/logging”
  • OP-3 → BKP-1: “Backups (encrypted, monitored)”

In practice, this diagram becomes the anchor for my Cybersecurity Services, Endpoint Security, and Cloud Management deliverables. It also supports Business Continuity & Security planning because it shows restore points, identity dependence, and remote access paths.

Conclusion

A clear CMMC system boundary diagram saves time, prevents scope fights, and tightens your SSP story. I recommend keeping it versioned, tied to your asset inventory, and updated after every Office 365 Migration, Cloud Infrastructure change, or Infrastructure Optimization project.

This post isn’t legal advice. For assessments, I align the diagram with official CMMC and NIST guidance, then document external dependencies and shared responsibility in plain language. If you want a second set of eyes as part of Technology Consulting, Managed IT for Small Business, or an IT Strategy for SMBs, I’m happy to help you build a Secure Cloud Architecture that stands up to scrutiny.


Discover more from Guide to Technology

Subscribe to get the latest posts sent to your email.

Category: 

Leave a Reply