🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.11

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.11

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.11 – Employ FIPS-validated cryptography when used to protect the confidentiality of ā€œControlled Unclassified Informationā€ (CUI).

Understanding the Requirement

This control requires that when your organization encrypts CUI, the cryptographic implementations you rely on must be FIPS-validated rather than merely using a NIST-recommended algorithm. In practice that means selecting encryption products (disk encryption, VPNs, Wi‑Fi, backup solutions) whose crypto modules have passed FIPS validation so you have assurance the implementation was tested. The objective is straightforward: FIPS-validated cryptography is employed to protect the confidentiality of CUI under NIST SP 800-171 REV.2 / CMMC 2.0 Level 2.

Technical Implementation

  • Inventory CUI locations and flows. Start by identifying where CUI is created, stored, transmitted, and backed up (workstations, servers, removable drives, cloud storage, email, VPN). This inventory determines which systems must use FIPS-validated cryptography and drives scope for configuration and procurement.

  • Adopt FIPS-validated endpoint and disk encryption. Deploy solutions with documented FIPS validation such as Microsoft BitLocker (in FIPS mode) or Apple FileVault and ensure configuration uses the validated mode (e.g., AES with FIPS-approved modules, TPM + PIN). Enforce encryption by policy using Group Policy, Intune, or your MDM/endpoint management tool.

  • Verify FIPS status for network protection. Ensure VPN appliances, TLS libraries used by web services, and enterprise Wi‑Fi access points use FIPS-validated crypto modules (check vendor FIPS 140-2/140-3 certificates). Configure TLS to use FIPS-approved ciphers and disable non-validated implementations on appliances.

  • Encrypt backups and removable media with validated crypto. Require that backup software and external drives use FIPS-validated encryption; for cloud backups, verify the cloud provider’s encryption modules and obtain proof of FIPS validation or a compliance statement.

  • Maintain evidence and change control. Keep vendor FIPS certificate numbers, product documentation, and configuration baselines in your compliance folder. Document any exceptions with compensating controls and a risk acceptance approved by leadership.

  • Test, audit, and patch cryptographic components. Regularly test that FIPS modes are enforced (e.g., try to enable an unvalidated cipher and verify it’s blocked), include crypto validation checks in audits, and apply vendor patches that preserve FIPS validation or re-certify when major changes occur.

Example in a Small or Medium Business

A 75-person engineering firm handles CUI in project files and client reports on employee laptops and a central file server. IT starts by mapping where CUI resides and identifies that laptops, a Windows file server, an on-site VPN appliance, and nightly backup jobs touch CUI. They standardize on Microsoft BitLocker for Windows endpoints and enable the FIPS-validated crypto mode via Group Policy and Intune, requiring TPM + PIN on all laptops. The Windows file server is configured with BitLocker and access is limited to authorized accounts; backups are encrypted using the backup appliance’s FIPS-validated module and stored on encrypted removable media for transport. The firm verifies the VPN appliance’s FIPS 140-2 certificate with the vendor and updates the TLS configuration to only allow FIPS-approved cipher suites. IT documents the vendor validation numbers, records the configuration baseline, and adds periodic checks to their monthly IT checklist to ensure FIPS mode remains active after updates. When a contractor needs temporary access, the firm issues an encrypted, FIPS-protected container and logs the transfer to preserve the audit trail.

Summary

Meeting SC.L2-3.13.11 requires a combination of policy (identify CUI, mandate FIPS-validated products, document exceptions) and technical controls (deploy and enforce FIPS-validated disk, network, and backup encryption). For SMBs the practical path is: scope where CUI lives, standardize on known FIPS-validated solutions, enforce configurations with management tools, retain vendor validation evidence, and test routinely. Together these steps provide the assurance that cryptography protecting CUI is not just based on strong algorithms but on validated, tested implementations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes