🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement Encryption, Safes, and Physical Locks for Digital and Paper Media: NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MP.L2-3.8.1 Compliance Checklist

Practical, step-by-step guidance for meeting MP.L2-3.8.1 (restricting physical access to digital and paper media) under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2, including encryption, safes, locks, handling, and auditing.

March 29, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides actionable, small-business–focused guidance to implement MP.L2-3.8.1 from NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 — restricting physical access to digital and paper media by using encryption, safes, locks, handling procedures, and monitoring so you can protect CUI, demonstrate compliance, and minimize risk.

Control overview, requirements, and key objectives

MP.L2-3.8.1 requires organizations to restrict physical access to media containing Controlled Unclassified Information (CUI). The goal is simple: ensure only authorized personnel can access digital storage and paper documents, and that controls provide evidence to auditors. Key objectives are (1) encrypting digital media so that unauthorized access is impractical if physical controls fail, (2) storing paper and removable media in appropriate locked containers, and (3) maintaining handling, transport, and audit mechanisms that demonstrate consistent enforcement.

Encryption for digital media — implementation notes

Algorithms, product choices, and configurations

Use full-disk or file-level encryption based on risk and operational needs. For workstations and laptops, deploy full-disk encryption (FDE): Microsoft BitLocker (Windows), FileVault 2 (macOS), or LUKS2 for Linux. For removable USB drives, use solutions that offer FIPS-validated crypto modules where required: AES-256 in GCM or XTS modes is a proven choice. Ensure endpoint protections integrate with enterprise management tools (Intune, Jamf, or enterprise MDM) so encryption is enforced centrally and recoverable.

Key management, recovery, and tamper resistance

Implement centralized key management and recovery procedures: use hardware security modules (HSMs) or cloud KMS (Azure Key Vault, AWS KMS) for server-side keys and escrow full-disk recovery keys in a controlled vault. On laptops, require TPM+PIN or TPM+startup key to mitigate offline attacks. Maintain an offline, printed/engraved recovery key copy stored in a locked safe (see below) accessible under a documented two-person procedure. Document key rotation intervals (e.g., annually or after a suspected compromise) and log key issuance and recovery events to support audits.

Safes, locked storage, and physical locks for paper and removable media

For paper CUI and removable media, choose security containers that protect against theft and fire. Look for safes with a recognized burglary rating and a fire rating appropriate for paper (many resources reference “Class 350°F for 1 hour” for protecting paper — check vendor specs). Bolt safes or cabinets to the structure; unsecured safes can be carried off. For locks, prefer ANSI/BHMA Grade 1 or Grade 2 mechanisms for high-value assets — mechanical high-security locks (Medeco, ASSA ABLOY) or audited electronic locks with access logs. For small businesses, an electronic safe with audit trail and dual-authentication (code + badge) is a practical compromise: it provides evidence to auditors while being manageable operationally.

Transport, handling, and media sanitization

Create procedures for check-out/check-in, transport, and destruction. For transporting CUI, always encrypt digital media and use tamper-evident bags or sealed containers for paper. Maintain a chain-of-custody log — who moved the media, when, and why — and require escorts or signed receipts if media leaves controlled areas. For end-of-life, follow NIST SP 800-88 Rev.1 guidance: cryptographic erasure for encrypted devices (where supported) or physical destruction/shredding for paper and non-erasable media. Document each destruction action and keep disposal receipts for compliance evidence.

Operational controls, monitoring, and a small-business scenario

Operationalize controls with simple, auditable processes: role-based access lists for media rooms and safes, monthly physical inventories, visitor escort policies, CCTV covering storage areas, and mandatory staff training on media handling. Example (small business): A 12-person Department of Defense subcontractor deploys BitLocker enforced via Intune, stores laptop recovery keys in Azure Key Vault, and prints one-time recovery keys to paper which are sealed in a safe bolted to the office floor. Only two executives have electronic safe codes, and a monthly log is signed to document inspections. Removable drives must be company-issued encrypted drives; employees cannot use personal USBs for CUI.

Compliance tips, best practices, and auditing

Practical compliance tips: maintain a media inventory database referencing physical location and custodian; bake encryption and key-recovery proof into change/configuration baselines; test recovery drills quarterly; collect artifacts auditors expect (policy, access rosters, logs, inventory, sanitization certificates); and if using third-party storage or couriers, include security clauses and evidence of their controls. For proof of cryptographic compliance, capture screenshots or logs showing FDE enforced, TPM status, and key escrow being active. Use a simple POA&M (Plan of Action & Milestones) to track remediations and approvals.

Risk of not implementing these controls

Failing to restrict physical access to media exposes organizations to data breaches, loss of CUI, contract termination, financial penalties, and reputational damage. For small businesses, a single misplaced laptop or unsecured binder can trigger a multi-million dollar incident response and lost business opportunities. Beyond monetary costs, non-compliance can disqualify you from future DoD contracts and create long-term trust issues with prime contractors.

Summary: To meet MP.L2-3.8.1 you need a layered approach — enforce strong encryption with centralized key management, use appropriate safes and high-quality locks for paper and removable media, establish clear handling and transport procedures, and keep auditable logs and inventories. Start with an inventory of your media, deploy FDE and a key escrow system, procure rated storage, and codify processes into trainable procedures; these steps will deliver both security and demonstrable compliance for NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 audits.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes