🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Encrypt and Manage Keys for Backup CUI to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MP.L2-3.8.9: Practical Key Management Steps

Step-by-step guidance to encrypt Controlled Unclassified Information (CUI) backups and manage cryptographic keys to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 MP.L2-3.8.9 requirements for small to midsize organizations.

•
April 24, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Meeting MP.L2-3.8.9 under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 means you must encrypt backup copies of Controlled Unclassified Information (CUI) and control the keys used to encrypt them — this post gives concrete, actionable steps for small businesses and compliance teams to design, implement, test, and document a robust backup encryption and key management practice aligned with the Compliance Framework.

Why MP.L2-3.8.9 Matters for Backup CUI

MP.L2-3.8.9 targets the confidentiality and integrity of CUI stored in backup media — if backups are not encrypted and key controls are weak, a lost or stolen tape, compromised cloud bucket, or misconfigured snapshot can expose CUI and trigger regulatory penalties, contract loss, and reputational damage. For small organizations, a single uncontrolled backup can be the most vulnerable data leakage vector; enforcing encryption and proper key management reduces attack surface and supports auditability required by the Compliance Framework.

Practical Key Management Steps (High-level)

Implement envelope encryption for backups: generate a unique data encryption key (DEK) per backup object, encrypt the backup with a strong authenticated cipher such as AES-256-GCM, then encrypt (wrap) the DEK with a Key Encryption Key (KEK) stored and protected in a hardware-backed key store (HSM or cloud KMS). Maintain key metadata, versions, and access controls; automate rotation, logging, and recovery testing. These patterns satisfy the Compliance Framework by providing cryptographic protection plus administrative controls over key lifecycle.

Classify CUI and Define Key Boundaries

Start by classifying which backups contain CUI: full system images, database dumps, email archives, or configuration exports. Create a map that links each backup location (on-prem tapes, NAS shares, cloud object storage, managed backup services) to a key domain (e.g., "CUI-prod-keys"). For a small business, an example mapping could be: production database backups -> KEK in cloud KMS (CMK); file server backups -> HSM-backed keys on-site; test/DEV backups -> separate KEK with lower privileges. This boundary mapping drives permissions, retention, and recovery processes.

Encryption Primitives, HSMs, and Implementation Options

Use industry-accepted primitives: AES-256-GCM or AES-256-CBC+HMAC-SHA256 (authenticated encryption preferred). Use envelope encryption: for each backup, create a random 256-bit DEK (CTR/GCM mode), encrypt the backup stream/file with that DEK, then call your KMS/HSM to encrypt (wrap) the DEK under a KEK. Prefer FIPS 140-2/140-3 validated HSMs or cloud KMS services (AWS KMS + CloudHSM for BYOK, Azure Key Vault with HSM, Google Cloud KMS with Cloud HSM). If you operate Veeam, Rubrik, or Bacula, configure native support for client-side encryption or integrate with KMS to perform key wrapping; if using object storage like S3, prefer client-side encryption or use server-side encryption with KMS-managed CMKs and strict bucket policies.

Key Lifecycle: Generation, Rotation, Backup, and Destruction

Define a documented lifecycle: generation (via HSM/KMS APIs or FIPS-certified tools), distribution (never export plain KEK), rotation (rotate KEKs on a scheduled cadence — e.g., annually or after personnel changes/incident), and destruction (secure deletion of old KEKs only after re-encryption of backups as required). DEKs should be ephemeral — one DEK per backup — and never stored unwrapped. When rotating a KEK, implement a re-wrapping procedure: keep old KEK(s) available to unwrap legacy DEKs until all corresponding backups have been re-encrypted or their retention period expires. Automate rotation and tagging in your backup pipeline to avoid manual errors (cron jobs, Lambda functions, or orchestration workflows in HashiCorp Vault or cloud KMS SDKs).

Access Controls, Logging, and Separation of Duties

Enforce least privilege and separation of duties: administrators who manage backup jobs should not automatically have KEK unwrapping authority. Use role-based access (IAM roles, Vault policies) with MFA for key custodians. Enable detailed audit logging in KMS/HSM (key usage, wrap/unwrap operations) and forward logs to a central SIEM for retention and alerting. Implement an emergency "break-glass" procedure with multi-party authorization (e.g., 2-of-3 custodians) and keep emergency access workflows documented and tested. For small businesses, a practical setup is: Backup Operator role can create backups and submit DEKs for wrapping, while Key Custodian role can authorize unwrap/restore operations through an approver flow tracked in the ticketing system.

Small Business Scenario and Operational Playbook

Example: A 15-person manufacturing subcontractor uses a single PostgreSQL instance and Windows file servers holding CUI. Implementation: (1) Classify which backup sets contain CUI; (2) Use client-side envelope encryption — a backup script generates a DEK per backup, encrypts files with AES-256-GCM; (3) The script calls AWS KMS CMK (policy limited to the backup server's IAM role and two key custodians) to wrap the DEK; (4) Encrypted backup objects are stored in S3 with bucket policies and versioning enabled; (5) KMS logs are shipped to CloudWatch and a lightweight SIEM (e.g., Splunk or OSS alternatives) and alert on unwrap attempts; (6) Quarterly restore drills validate that wrapped DEKs can be unwrapped and backups decrypted. Tools: use HashiCorp Vault for on-prem key storage, AWS KMS for cloud backups, and open-source scripts to implement envelope encryption, with documented SOPs for key rotation and incident response.

Risks, Compliance Tips, and Summary

If you fail to encrypt backups or manage keys properly, risks include unauthorized disclosure of CUI, inability to prove compliance during an audit, data loss if key material is accidentally destroyed, and exposure to ransomware where attackers can target backup copies. Compliance tips: document policies and procedures, require FIPS-validated crypto for high-assurance environments, enforce automated key rotation and testing, and maintain separation of duties with logged approvals for key restores. In summary, align your backup encryption design with the Compliance Framework by using envelope encryption, HSM/KMS-backed KEKs, automated lifecycle controls, strict access policies, and routine restore tests — these steps provide the technical and administrative evidence auditors require for MP.L2-3.8.9 while keeping recovery practical for small businesses.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes