If CUI can move by email, it can leak by email. That’s the hard truth I plan for when I build CMMC Level 2 secure email in Microsoft 365.
In this post, I’ll walk through an end-to-end approach using Microsoft Purview: classification with sensitivity labels, protection with encryption, prevention with DLP, monitoring with audit and alerts, plus retention and evidence collection for a CMMC Level 2 assessment. I’ll keep it operational, because assessors don’t certify intentions, they certify proof.
I’ll also frame this the way many of my clients operate: small teams, mixed workstations, and real-world constraints. That includes everything from Office users handling CUI to a separate environment supporting Restaurant POS Support and Kitchen Technology Solutions.
Start with the right tenant scope for CUI email (and document it)
Before I touch labels or DLP, I pin down where CUI is allowed to exist. That decision drives everything else: licensing, mail flow, and what counts as “in scope” for the assessment.
Most DoD contractors I support treat Microsoft 365 Government (GCC, or GCC High when required by contract flowdowns) as the cleanest path for CUI. In February 2026, the practical expectation I’m seeing is simple: if you’re serious about CUI in email, you need a government tenant plan, not “we’ll tighten commercial later.” This choice also affects your Secure Cloud Architecture and how you defend your Cloud Infrastructure.
Here’s what I document up front (and keep for evidence):
- Which tenant holds CUI mailboxes (GCC or GCC High), and why
- Whether you’re doing an Office 365 Migration from commercial, hybrid, or another provider
- The boundary diagram: Exchange Online, endpoints, mobile access, and any third-party gateway
- The external sharing posture, including exceptions (more on that below)
If CUI must travel to partners outside your enclave, I plan that as a controlled workflow, not an ad hoc habit. The moment “forward it to my Gmail” appears, I assume the control failed. For a practical discussion of cross-boundary sharing challenges, I reference guidance like how to share CUI outside GCC High and then decide whether I need a permitted solution or a hard block.
This is also where I align with leadership on Business Continuity & Security, because secure email that breaks operations will get bypassed.
Classify CUI with sensitivity labels, then enforce encryption by default
Email security gets easier when users don’t have to guess. My goal is to make CUI handling feel like using a “tamper-evident envelope.” The user can still send the message, but the protections are baked in.
In Microsoft Purview, I start with sensitivity labels and publish them to the right users. Then I attach protection settings so the label does real work (encryption, access rules, and usage rights where appropriate). Depending on your license, you may also use auto-labeling for common CUI patterns, although I treat that as an assist, not a replacement for training.
A configuration sequence that holds up well in audits:
- Define a label taxonomy (example: Public, Internal, CUI, CUI Export-Controlled if applicable).
- Create a “CUI” sensitivity label in Purview.
- Set the label to apply encryption (Purview Message Encryption or Microsoft Information Protection based on your tenant and licensing).
- Choose who can read externally (often “specific domains” or “authenticated recipients only,” not “anyone”).
- Publish the label with a label policy to scoped users and groups, including Outlook on the web and desktop.
- Add user prompts (tooltips, required justification to remove, or recommended labeling where supported).
For the encryption setup itself, Microsoft’s configuration steps can change between environments, so I stick to the official guidance and validate after every major update. The most reliable baseline is set up Microsoft Purview Message Encryption.
Gotcha: encryption alone isn’t “secure email.” If unmanaged devices can download CUI after decrypting, you still have a problem. I treat Endpoint Security and Device Hardening as part of the email control, not a separate project.
This is where I tie in IT Strategy for SMBs and Cloud Management choices. If you don’t control endpoints, you’re trusting the least reliable part of the system.
Stop CUI loss with DLP, endpoint controls, and sane exceptions
After labels and encryption, I add the guardrails: DLP policies for Exchange Online, plus endpoint controls where licensing and operations allow it. I keep DLP strict for true CUI signals, but I avoid “block everything” designs that cause shadow IT.
My baseline DLP approach:
- Detect CUI markers (keywords, templates, or exact data match when appropriate).
- Require a CUI label before sending externally, or block external sends without the label.
- Block obvious exfil paths (auto-forwarding to external domains, consumer file shares, personal email).
- Allow a controlled override only when the business truly needs it, and require justification plus an alert.
A short configuration checklist I use for CMMC Level 2 secure email:
- Exchange mail flow: disable or restrict external auto-forwarding, and alert on attempts.
- DLP in Exchange: policy tips in Outlook, block or restrict external recipients for CUI, log all matches.
- Endpoint DLP (if licensed): prevent copy to USB, print, or copy to unmanaged apps for labeled CUI.
- Conditional Access: require MFA, block legacy auth, and limit access from unmanaged devices when possible.
- Transport rules: tag headers when sensitivity labels apply, support downstream controls and journaling.
If your environment includes Data Center Technology (for example, legacy relays, scanners, or hybrid routing), I test those paths too. Hybrid mail connectors can become “quiet bypasses” if they aren’t included in DLP scope.
This is also where I bring in Technology Consulting as a Business Technology Partner, because DLP tuning takes iteration. The best results come from two to four weeks of monitoring, then tightening rules based on real hits, not guesses. That’s how I deliver Innovative IT Solutions without breaking daily work, especially for Managed IT for Small Business clients that can’t afford downtime.
Monitor, retain, and package evidence for a CMMC Level 2 assessment
Once controls are live, I set up monitoring so I can answer the assessor’s favorite question: “How do you know it’s working?”
At a minimum, I enable unified audit logging, create alert policies for risky events (DLP matches, unusual mailbox access, mass download), and standardize how I pull reports. Many teams also use Purview Compliance Manager to track progress and map controls, although the exact templates and scoring can vary by tenant. For a broader view of Microsoft security tools often used alongside Purview, I reference how Microsoft Security tools map to CMMC 2.0 needs and then align it with the client’s licensing reality.
Here’s a concise practice-to-configuration mapping I use for email handling:
| CMMC / NIST 800-171 area (summary) | Purview and M365 configuration to point to | What I show an assessor |
|---|---|---|
| Access control | Conditional Access, MFA, blocked legacy auth, mailbox permissions reviews | CA policy screenshots, sign-in logs, role assignment exports |
| Audit and accountability | Unified audit log, alert policies, DLP incident reports | Audit search exports, alert configuration, sample incident record |
| System and communications protection | Sensitivity labels, Purview Message Encryption, mail flow restrictions | Label settings, encryption templates, transport rule screenshots |
| Media protection (exfil paths) | Endpoint DLP (if available), USB/app controls, device compliance | Endpoint policy screenshots, test results, device compliance reports |
| Configuration management | Standard baselines, change control for DLP/labels | Policy version history, change tickets, admin audit events |
| Information integrity and retention | Retention policies/holds for CUI mail | Retention policy screenshots, hold confirmation, disposition settings |
Assessment evidence pack (what I retain every time)
When I build an evidence pack, I keep it simple and repeatable. I collect:
- Screenshots of sensitivity label settings (CUI label, encryption settings, external access constraints).
- Screenshot and export of label publishing policy (who gets it, which apps).
- Screenshots and exports of DLP policy for Exchange (rules, conditions, actions, overrides).
- A sample DLP incident showing detection, user prompt, and final action taken.
- Screenshot of Purview Message Encryption configuration and branding (if used).
- Unified audit log search exports for: label applied, DLP match, mailbox access, admin policy changes.
- Screenshots of alert policies and at least one alert example (sanitized).
- Evidence of MFA and Conditional Access (policies plus sign-in log samples).
- Evidence of Endpoint Security and Device Hardening baselines for devices allowed to access CUI mail.
- Retention evidence: screenshots of retention policies/holds applied to in-scope mailboxes.
That evidence package becomes my “audit-ready binder,” and it shortens assessment time.
Conclusion
Secure email for CUI isn’t one switch, it’s a chain. When I combine labels, encryption, DLP, monitoring, and retention in Microsoft Purview, I get CMMC Level 2 secure email that stands up in both daily use and assessment interviews. If you want help scoping your tenant, tuning DLP, or tightening endpoints without slowing teams down, I treat it as Infrastructure Optimization with real proof at the end.
Discover more from Guide to Technology
Subscribe to get the latest posts sent to your email.
