🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement a Step-by-Step Media Protection Plan to Protect System Media Containing CUI (Paper & Digital) — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MP.L2-3.8.1

Step-by-step guidance to create a media protection plan that secures paper and digital system media containing CUI to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requirements.

April 04, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Protecting Controlled Unclassified Information (CUI) on both paper and digital system media is a foundational CMMC 2.0 / NIST SP 800-171 Rev.2 requirement — MP.L2-3.8.1 — and requires a documented, practical media protection plan that covers inventory, labeling, handling, storage, transport, sanitization, and incident response for media assets. This post gives a step-by-step implementation plan targeted at small businesses working to achieve Compliance Framework objectives, with specific technical controls, real-world examples, and best practices you can implement quickly.

Key objectives

Your media protection plan should clearly establish: (1) which media contain or may contain CUI; (2) rules for labeling, handling, and storing that media; (3) technical controls (encryption, access controls, device management); (4) approved sanitization and disposal processes aligned with NIST SP 800-88; (5) chain-of-custody and transport procedures; and (6) verification, training, and audit processes to demonstrate and sustain compliance. Frame the plan to support contract requirements, CMMC assessment, and internal risk management.

Step-by-step implementation plan

1) Scope, inventory, and classification

Start by scoping: identify systems, devices, physical locations, and paper stores that can hold CUI. Maintain a media inventory (spreadsheet or CMDB) that records asset type (USB, laptop drive, network share, printed reports), owner, CUI category, location, encryption status, and retention period. Example: a small engineering subcontractor lists 48 endpoints, 12 NAS volumes, and a locked filing cabinet in the project office that stores drawing prints. Tag each inventory item with a unique ID (barcode or asset tag) to enable chain-of-custody tracking for check-out/check-in workflows.

2) Write policy and assign roles

Create a concise Media Protection Plan document that defines scope, acceptable media use, labeling conventions (e.g., header/footer "CUI"), roles (Media Custodian, IT Admin, Facility Manager, Authorizing Official), and exceptions process. Include standardized forms: media checkout/transfer, destruction certificates, and sanitization attestations. For a small business, the IT lead can be Media Custodian and the COO or Contract Manager can be Authorizing Official — document the delegation. Publish policies to your internal portal and include retention and disposition schedules tied to contract clauses.

3) Labeling, handling, and physical controls for paper

For paper CUI, enforce mandatory labeling, locked storage (GSA-style or equivalent lockable cabinets), and shredding or contracted secure destruction. Use cross-cut shredders that meet industry standards or a bonded shredding vendor providing a Certificate of Destruction. Example: an attorney's office uses color-coded folders labeled "CUI" and a monthly locked-bin pick-up by a bonded service; employees must log documents placed in the bin. Train staff not to leave CUI on printers or desks and to use secure transmission (locked courier) when sending physical media offsite.

4) Technical controls for digital media (encryption, access control, endpoint management)

Require full-disk or file-level encryption for all devices that can store CUI: BitLocker with TPM or Azure AD integration for Windows (AES-256), FileVault2 for macOS, and LUKS2 for Linux. For removable drives, use hardware-encrypted USBs or centrally-managed encrypted containers (VeraCrypt, Microsoft RMS-protected containers, or Microsoft Purview sensitivity labels). Implement endpoint controls: block unauthorized USB mass storage via Group Policy or an EDR/MDM solution, apply DLP rules to detect and prevent CUI exfiltration (SFTP only, prevent upload to personal cloud), and centrally manage keys (HSM or cloud KMS with FIPS 140-2-compliant modules). Log all media mounts and transfers to a SIEM for audit trails.

5) Transport and chain-of-custody

Define approved transport methods. For digital media sent offsite, require encrypted containers and pre-approved couriers; for highly sensitive transfers, use two-person custody and tamper-evident seals. Maintain a transfer form capturing sender, recipient, media ID, contents summary, time, and signatures (electronic signatures accepted). Example: a small defense contractor shipping design files places data on an encrypted SED drive, records the transaction in the media log, seals the drive in a tamper-evident bag, and uses a bonded overnight courier with signature required.

6) Sanitization, decommissioning, and disposal

Follow NIST SP 800-88 Rev.1 guidelines: categorize sanitization into Clear (logical techniques), Purge (more robust, e.g., crypto-erase or degaussing for magnetic media), and Destroy (physical destruction). For SSDs and SEDs prefer crypto-erase or built-in secure erase commands; for HDDs use one of the approved purge methods or physical shredding when appropriate. Maintain sanitization certificates for disposals and update the media inventory to reflect status. For paper, document shredder serial numbers, certificates of destruction, and responsible staff names.

7) Training, verification, and audit

Train all personnel annually on media handling rules and run quarterly spot audits: check labeling, review logs, validate encryption status via automated inventory, and test sanitization reports. Integrate media events into incident response: lost media triggers immediate revocation of credentials, key rotation if crypto-erase is impractical, and notification to stakeholders based on breach thresholds. For CMMC readiness, keep audit trails and evidence packages (policies, inventories, training records, sanitization certificates) organized to present to assessors.

Risk of non-implementation and compliance tips

Failing to implement MP.L2-3.8.1 exposes organizations to data breaches, contract noncompliance, loss of CMMC certification, financial penalties, and damage to reputation. Small businesses are especially vulnerable because a single lost laptop or unshredded contract can expose CUI. Compliance tips: apply least privilege to media access, automate inventory and encryption checks with your MDM/endpoint management, use tamper-evident physical controls for paper, require documented chain-of-custody for all offsite transfers, and align sanitization with NIST SP 800-88. Keep a small set of vendor contracts (bonded shredders, encrypted drive suppliers) pre-vetted for faster operational response.

Summary: Implementing a media protection plan for CUI under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 is practical and achievable for small businesses when broken into clear steps: scope and inventory, policy and roles, technical and physical controls, approved transport and sanitization procedures, and continuous training and auditing. Build simple artifacts — inventory, labeling convention, media checkout forms, sanitization certificates — integrate encryption and endpoint controls, and run regular audits to create a defensible compliance posture that mitigates risk and supports successful CMMC assessment.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes