🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.8

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.8

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.8 – Implement cryptographic mechanisms to prevent unauthorized disclosure of ā€œControlled Unclassified Informationā€ (CUI) during transmission unless otherwise protected by alternative physical safeguards.

Understanding the Requirement

This control requires SMBs to identify and apply cryptographic protections (or approved physical alternatives) to stop unauthorized disclosure of CUI while it is being transmitted. You must identify which cryptographic mechanisms are appropriate, identify any acceptable alternative physical safeguards, and then implement either the validated cryptography or those physical protections. Only cryptography validated through the NIST Cryptographic Module Validation Program (CMVP) is acceptable for protecting CUI in transit under this framework (NIST SP 800-171 REV.2 / CMMC 2.0 Level 2), unless an alternative physical safeguard is documented and in place.

Technical Implementation

  • Map data flows and label CUI. Start by inventorying where CUI is created, transmitted, and received (email, file transfer, web forms, APIs). Document every network path and pick the systems and people responsible for those flows so you can enforce protections.

  • Use CMVP-validated cryptographic modules. For any solution that encrypts CUI in transit (TLS, SFTP, VPN, IPsec), verify the underlying crypto module is listed by the NIST CMVP. For TLS, use the latest secure version and configure strong cipher suites that rely on validated modules; avoid deprecated algorithms and protocols.

  • Deploy secure transport protocols with secure configuration. Implement TLS with proper certificate management (trusted CAs, certificate pinning where appropriate), enforce HTTPS for web access, use SFTP or FTPS with validated modules for file transfers, and require VPNs that use validated crypto for remote administrative or site-to-site traffic.

  • Manage keys and certificates properly. Establish procedures for key generation, storage, rotation, revocation, and destruction. Protect private keys with hardware security modules (HSMs) or platform-provided key stores where possible, and document roles for key custodians and administrators.

  • Log, monitor, and enforce the policy. Create and enforce a transmission policy that mandates use of validated cryptography for CUI. Instrument systems to log failed connections, certificate errors, and anomalous transfer patterns; review logs regularly and escalate incidents to system/network administrators and security personnel.

  • Document alternative physical safeguards. If you choose non-cryptographic protections (e.g., air-gapped transfers, couriered encrypted media with tamper-evident seals), document why they are sufficient, how they prevent disclosure during transit, and the controls for handling and chain of custody.

Example in a Small or Medium Business

Acme Engineering handles CUI files sent between remote engineers and the central office. The IT manager catalogs each file type that contains CUI and identifies the common transfer methods: internal web portal, email attachments, and developer SFTP. For the web portal, Acme configures HTTPS using TLS with a CMVP-validated TLS library, sets HSTS, and disables weak ciphers. For file transfers, they deploy an SFTP server whose cryptographic module appears on the NIST CMVP list and require employee SFTP clients that are configured to use that validated module. They implement a certificate lifecycle process—issuing, rotating, and revoking certificates—and store private keys on company-managed systems with restricted access. Training for staff covers when to use the secure portal versus physical media, and the company documents an alternative physical safeguard procedure (encrypted USBs transported by two-person custody) for situations where network transfer is impractical. Finally, network administrators enable logging and periodic reviews to confirm that all CUI transfers use approved mechanisms and that any exceptions are documented and approved by security leadership.

Summary

To meet SC.L2-3.13.8 SMBs must identify CUI flows, select and deploy CMVP-validated cryptographic mechanisms (or documented physical alternatives), and operationalize those protections through strong configuration, key management, logging, and policy enforcement. Combined, these policy and technical measures ensure CUI is protected from unauthorized disclosure while in transit and that any deviations are controlled and auditable.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes