Protect system media, both paper and digital
📖 What This Means
This practice requires organizations to safeguard both physical (paper) and digital media that contain Controlled Unclassified Information (CUI). It involves ensuring that media is properly labeled, stored securely, and transported safely. For digital media, this includes encryption and access controls. For paper media, it involves secure storage and disposal methods. The goal is to prevent unauthorized access, loss, or theft of sensitive information. For example, a company might encrypt USB drives containing CUI and store paper documents in locked cabinets accessible only to authorized personnel.
🎯 Why It Matters
Failure to protect system media can lead to data breaches, unauthorized access, and loss of sensitive information. For instance, in 2019, a contractor lost an unencrypted USB drive containing classified DoD data, leading to a significant security incident. Such breaches can result in hefty fines, reputational damage, and loss of contracts. From a DoD/CMMC perspective, this control is critical because it ensures that CUI remains secure throughout its lifecycle, mitigating risks associated with data exposure.
✅ How to Implement
- 1. Encrypt all cloud storage volumes containing CUI using AES-256 encryption.
- 2. Implement access controls to restrict who can read/write to cloud storage.
- 3. Regularly audit cloud storage access logs for unauthorized access.
- 4. Use cloud provider tools (e.g., AWS KMS, Azure Key Vault) for managing encryption keys.
- 5. Ensure backups are encrypted and stored securely.
- 6. Monitor and log all access attempts to cloud storage.
- 7. Train staff on cloud security best practices.
📋 Evidence Examples
Media Handling Policy
Encryption Configuration Screenshot
Access Log Report
Training Attendance Record
Sanitization Certificate
📝 SSP Guidance
Use this guidance when writing the System Security Plan (SSP) narrative for this control.
How to Write the SSP Narrative
For MP.L2-3.8.1 ("Protect system media, both paper and digital"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe how CUI on media is protected throughout its lifecycle, including encryption, access controls, marking, transport procedures, sanitization methods, and accountability tracking. Be specific -- name your actual products, settings, and responsible personnel.
Example SSP Narratives
"MP.L2-3.8.1 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to protect system media, both paper and digital. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."
"MP.L2-3.8.1 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to protect system media, both paper and digital. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."
"MP.L2-3.8.1 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."
System Boundary Considerations
- • Identify all removable media types within the CUI boundary
- • Document media storage locations (on-site, off-site)
- • Specify media sanitization and destruction methods
- • Ensure this control covers all systems within your defined CUI boundary where protect system media, both paper and digital applies
- • Document any systems where this control is not applicable and explain why
Key Documentation to Reference in SSP
- 📄 Media Protection Policy
- 📄 Media inventory database
- 📄 Certificates of destruction
- 📄 Transport chain-of-custody records
- 📄 Evidence artifacts specific to MP.L2-3.8.1
- 📄 POA&M entry if control is not fully implemented
What the Assessor Looks For
The assessor will check for CUI markings on media, verify encryption is enabled, review the media inventory for completeness, and examine destruction certificates.
💬 Self-Assessment Questions
Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.
Question 1: Are all media containing CUI properly labeled?
Question 2: Is digital media encrypted using AES-256 or equivalent?
Question 3: Are physical media stored in secure, locked cabinets?
Question 4: Are access logs regularly audited for unauthorized access?
Question 5: Have all staff received training on media handling procedures?
⚠️ Common Mistakes (What Auditors Flag)
1. Unencrypted digital media
2. Mislabeled media
3. Insecure storage of physical media
4. Lack of access logs
5. Missing training records
📚 Parent Policy
This practice is governed by the Media Protection Policy