🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Secure Media Transport Policy for CUI: NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MP.L2-3.8.5 with Template and Procedures

Step‑by‑step guidance, a ready policy template, and practical procedures to meet NIST SP 800‑171 Rev.2 / CMMC 2.0 MP.L2‑3.8.5 for protecting and controlling CUI media during transport.

April 16, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Transporting Controlled Unclassified Information (CUI) outside of your organization's controlled areas introduces significant risk — MP.L2-3.8.5 (NIST SP 800‑171 Rev.2 / CMMC 2.0 Level 2) requires you to protect and control media during transport; this post gives practical, compliance‑focused steps, a ready policy template, and operational procedures a small business can implement immediately.

Control overview and key objectives

MP.L2-3.8.5 calls for controls that ensure media containing CUI (removable drives, printed documents, backup tapes, etc.) remain protected during physical and electronic transport. Key objectives are: identify and classify media containing CUI, apply appropriate encryption and tamper‑evidence for physical transport, maintain chain‑of‑custody and logging, restrict transport to authorized methods and personnel, and retain evidence for audits and incident investigation.

Practical implementation steps (Compliance Framework specific)

Start by updating your Compliance Framework artifacts: add a media transport control family mapped to MP.L2-3.8.5 in your System Security Plan (SSP) and Plan of Action & Milestones (POA&M). Technically, require AES‑256 encryption for data-at-rest on removable media using FIPS‑validated modules (or hardware Self‑Encrypting Drives with OPAL/SED support); for network-based transport enforce TLS 1.2+ with certificate validation or SFTP with key-based authentication. Define approved transport methods (e.g., government‑approved courier, locked USPS Registered Mail, or encrypted file transfer) and ban insecure options (unencrypted USB drives carried in checked luggage, untracked consumer courier services). Implement tamper‑evident packaging and require chain‑of‑custody records (who, when, purpose, receipt). Finally, log transport events in a central repository (SIEM or even a spreadsheet for very small shops) and retain evidence per contract requirements or organizational policy.

Small business real-world scenarios

Scenario A: A 12‑person engineering subcontractor must send a prototype SSD with CUI to a prime contractor. Practical controls: image the SSD and encrypt the image with AES‑256 before loading it onto a hardware‑encrypted USB with a tamper‑evident seal; create a chain‑of‑custody form signed by the shipper and receiver; use an approved secure courier with GPS tracking and require signature on delivery. Scenario B: A two‑person consulting shop must send CUI reports. Use encrypted PDF (AES‑256) delivered via the company SFTP server with one‑time download links and MFA for the recipient; retain access logs and require the recipient to confirm deletion after ingestion.

Compliance tips and best practices

Enforce least privilege: only authorized staff may package or sign for transported media and their authorization should be documented. Use two‑person integrity for high‑impact transfers (one prepares, another verifies). Maintain proof: keep shipping receipts, courier tracking, signed chain‑of‑custody, encryption logs, and checksum verification (SHA‑256) screenshots. Periodically test your transport process with mock transfers and audit the logs. Train personnel on marking CUI and using tamper‑evident packaging — human error is the most common failure point. Map each step to your SSP and evidence file so assessors can verify chain‑of‑evidence quickly.

Risk of not implementing MP.L2-3.8.5

Failing to adequately protect media in transit risks unauthorized disclosure, supply‑chain compromise, contract termination, loss of future government work, and significant remediation costs. A lost or intercepted external drive with unencrypted CUI can lead to a breach notification, investigation, and possible financial penalties or reputational damage that small businesses often cannot absorb. Additionally, inadequate processes will surface during audits or CMMC assessments as findings that block certification or contract award.

Policy template and sample procedures

Use this ready policy excerpt and procedure steps as a starting point — insert your organization name and align retention periods with contract terms:

Policy: "XYZ Company shall protect and control media containing CUI during transport in accordance with MP.L2‑3.8.5. Only authorized personnel may package, approve, and transfer CUI media. All removable media containing CUI must be encrypted with AES‑256 using a FIPS‑validated module or shipped using organization‑approved hardware‑encrypted devices. Physical shipments must use tamper‑evident packaging, an approved courier, and a signed chain‑of‑custody form. Electronic transfers of CUI must use SFTP or TLS 1.2+ with mutual authentication. All transport events shall be logged and retained per contract requirements for audit."

Procedures (step‑by‑step): 1) Identify media and classification: Verify media contains CUI and mark it per CUI markings. 2) Prepare media: Create an encrypted container or use a hardware‑encrypted device; record SHA‑256 checksum of the logical file/image. 3) Package: Place device in tamper‑evident bag, label with CUI markings, attach chain‑of‑custody form. 4) Approve: Manager with transport authorization signs the COU form and selects an approved carrier. 5) Ship: Use approved courier with tracking and signature required; monitor delivery. 6) Receipt: Receiver verifies tamper seals, validates checksum, signs COU, and reports completion to originator. 7) Log and retain: Upload COU, courier receipt, checksum verification, and encryption logs to the evidence library; retain per policy. 8) Incident: If tamper or loss is detected, follow incident response: notify security officer, suspend further shipments, and initiate breach assessment per IR controls."

Summary

Implementing MP.L2‑3.8.5 is a mix of policy, technical controls, and operational discipline: classify and encrypt media, standardize approved transport methods, require chain‑of‑custody and tamper evidence, log every transfer, and train staff. For small businesses, pragmatic choices (hardware‑encrypted drives, approved couriers, simple COU forms and SFTP) deliver strong protections without major cost. Map every control into your SSP and keep practical evidence handy to demonstrate compliance during audits and assessments.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes