Employ FIPS-validated cryptography when used to protect CUI
📖 What This Means
This control requires using government-approved encryption methods (FIPS-validated) whenever you're protecting sensitive defense information (CUI). Think of it like using certified locks instead of cheap padlocks for important documents. For example: 1) When sending contract details to a DoD partner, your email system must use FIPS-approved encryption. 2) When storing blueprints on a server, the hard drive encryption must meet FIPS standards. It doesn't mean everything must be encrypted - just that when you choose to encrypt CUI, you must use these certified methods.
🎯 Why It Matters
Weak encryption can expose defense secrets to foreign adversaries. In 2020, a defense contractor's unencrypted drone footage was intercepted, revealing sensitive surveillance capabilities (DoD reported 137 similar incidents that year). FIPS validation ensures encryption can withstand sophisticated attacks. Without it: 1) Stolen data becomes readable (average breach cost: $4.24M) 2) Contracts may be terminated 3) Future bids become ineligible. The DoD mandates this because adversaries specifically target weak crypto in supply chains.
✅ How to Implement
- 1. In AWS: Enable 'FIPS endpoints' in account settings and use FIPS-validated EC2 instances (like m5.xlarge with Nitro)
- 2. For Azure: Select 'FIPS 140-2 Level 1' compliance in virtual machine creation and use Azure Key Vault with HSM-backed keys
- 3. In GCP: Use 'Shielded VMs' with FIPS-enabled images and Cloud KMS with FIPS 140-2 Level 3 validation
- 4. Configure all storage services (S3, Blob Storage) to use FIPS-validated AES-256 encryption
- 5. Enable TLS 1.2+ with FIPS-approved cipher suites (TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384)
- 6. Document all FIPS-enabled services in your system security plan
📋 Evidence Examples
FIPS Validation Certificates
Cryptographic Configuration Screenshots
Encryption Inventory Spreadsheet
TLS Configuration Test Results
📝 SSP Guidance
Use this guidance when writing the System Security Plan (SSP) narrative for this control.
How to Write the SSP Narrative
For SC.L2-3.13.11 ("Employ FIPS-validated cryptography when used to protect CUI"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your network security architecture, including segmentation, encryption standards, VPN configuration, session management, key management, and monitoring capabilities. Be specific -- name your actual products, settings, and responsible personnel.
Example SSP Narratives
"SC.L2-3.13.11 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to employ fips-validated cryptography when used to protect cui. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."
"SC.L2-3.13.11 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to employ fips-validated cryptography when used to protect cui. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."
"SC.L2-3.13.11 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."
System Boundary Considerations
- • Document network architecture with CUI boundary clearly marked
- • Identify all encryption mechanisms (at rest and in transit)
- • Specify network monitoring and IDS/IPS deployment
- • Ensure this control covers all systems within your defined CUI boundary where employ fips-validated cryptography when used to protect cui applies
- • Document any systems where this control is not applicable and explain why
Key Documentation to Reference in SSP
- 📄 System and Communications Protection Policy
- 📄 Network architecture diagram
- 📄 Firewall rule documentation
- 📄 Encryption configuration documentation
- 📄 Evidence artifacts specific to SC.L2-3.13.11
- 📄 POA&M entry if control is not fully implemented
What the Assessor Looks For
The assessor will review network diagrams for proper segmentation, test encryption settings, verify VPN split tunneling is disabled, and check FIPS 140-2 validation of cryptographic modules.
💬 Self-Assessment Questions
Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.
Question 1: Do we maintain an inventory of all cryptographic modules used for CUI?
Question 2: Are all identified modules FIPS 140-2 validated (check NIST CMVP list)?
Question 3: Are FIPS modes actively enabled in OS/application configurations?
Question 4: Do we test encryption configurations quarterly?
⚠️ Common Mistakes (What Auditors Flag)
1. Assuming cloud providers' default encryption is FIPS-compliant
2. Overlooking third-party applications' crypto modules
3. Incomplete documentation of FIPS modes
4. Not testing after patches/updates
📚 Parent Policy
This practice is governed by the System and Communications Protection Policy