Skip to main content
NetStable
Level 2 SC.L2-3.13.16

Protect the confidentiality of CUI at rest

πŸ“– What This Means

This practice requires ensuring that Controlled Unclassified Information (CUI) stored on devices or systems is kept confidential and secure. This means encrypting the data so that even if someone gains unauthorized access to the storage medium, they cannot read or use the information. Think of it like locking a safeβ€”only authorized individuals with the key can open it. For example, encrypting files on a laptop or database ensures that if the device is stolen, the data remains protected. Another example is encrypting backups stored on external drives to prevent unauthorized access if the drive is lost or stolen. The goal is to prevent data breaches and unauthorized disclosure of sensitive information.

🎯 Why It Matters

Failure to protect CUI at rest can lead to severe consequences, including data breaches, financial losses, and reputational damage. For instance, in 2019, a defense contractor faced a breach exposing sensitive military data due to unencrypted storage devices. Such incidents can cost millions in fines, litigation, and lost contracts. From a DoD perspective, protecting CUI at rest is critical to maintaining national security and ensuring that sensitive information does not fall into the wrong hands. CMMC emphasizes this control to mitigate risks associated with unauthorized access to stored data, ensuring compliance with federal regulations and safeguarding defense-related information.

βœ… How to Implement

  1. Enable encryption for all storage services (e.g., AWS S3, Azure Blob Storage, Google Cloud Storage).
  2. Use managed encryption keys or bring your own key (BYOK) for granular control.
  3. Configure access controls to restrict who can view or modify encrypted data.
  4. Enable logging and monitoring for encryption-related activities.
  5. Test encryption settings periodically to ensure they are functioning correctly.
⏱️
Estimated Effort
Implementation typically takes 1-2 days for cloud environments and 2-3 days for on-premise setups, depending on the complexity of the infrastructure. Intermediate technical skills are required.

πŸ“‹ Evidence Examples

Encryption policy document

Format: PDF
Frequency: Annually or when updated.
Contents: Detailed description of encryption standards and procedures.
Collection: Download from internal documentation repository.

Encryption configuration screenshots

Format: PNG
Frequency: During initial setup and after major changes.
Contents: Screenshots of enabled encryption settings in cloud or on-premise systems.
Collection: Capture using system management tools.

Encryption key management logs

Format: CSV
Frequency: Monthly.
Contents: Logs showing key creation, rotation, and usage.
Collection: Export from key management system.

Encryption test results

Format: PDF
Frequency: Quarterly.
Contents: Documentation of encryption functionality tests.
Collection: Perform tests and record results.

Employee training records

Format: Excel
Frequency: Annually.
Contents: List of employees trained on encryption policies.
Collection: Export from HR system.

πŸ“ SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For SC.L2-3.13.16 ("Protect the confidentiality of CUI at rest"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your network security architecture, including segmentation, encryption standards, VPN configuration, session management, key management, and monitoring capabilities. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"SC.L2-3.13.16 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to protect the confidentiality of cui at rest. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"SC.L2-3.13.16 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to protect the confidentiality of cui at rest. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"SC.L2-3.13.16 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • β€’ Document network architecture with CUI boundary clearly marked
  • β€’ Identify all encryption mechanisms (at rest and in transit)
  • β€’ Specify network monitoring and IDS/IPS deployment
  • β€’ Ensure this control covers all systems within your defined CUI boundary where protect the confidentiality of cui at rest applies
  • β€’ Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • πŸ“„ System and Communications Protection Policy
  • πŸ“„ Network architecture diagram
  • πŸ“„ Firewall rule documentation
  • πŸ“„ Encryption configuration documentation
  • πŸ“„ Evidence artifacts specific to SC.L2-3.13.16
  • πŸ“„ POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will review network diagrams for proper segmentation, test encryption settings, verify VPN split tunneling is disabled, and check FIPS 140-2 validation of cryptographic modules.

πŸ’¬ Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Is all CUI stored on your systems encrypted?

βœ… YES β†’ Proceed to Q2.
❌ NO β†’ GAP: Enable encryption for all CUI storage systems within 1 week.
Remediation:
Use tools like BitLocker or AWS KMS to encrypt data.

Question 2: Are encryption keys securely managed and stored?

βœ… YES β†’ Proceed to Q3.
❌ NO β†’ GAP: Implement a key management solution within 2 weeks.
Remediation:
Use Azure Key Vault or a hardware security module.

Question 3: Are encryption settings periodically tested?

βœ… YES β†’ Proceed to Q4.
❌ NO β†’ GAP: Schedule encryption tests within 1 month.
Remediation:
Perform quarterly tests and document results.

Question 4: Are employees trained on encryption policies?

βœ… YES β†’ Proceed to Q5.
❌ NO β†’ GAP: Conduct training sessions within 2 weeks.
Remediation:
Use internal training materials or external courses.

Question 5: Are encryption logs monitored and reviewed?

βœ… YES β†’ Compliance confirmed.
❌ NO β†’ GAP: Set up log monitoring within 1 week.
Remediation:
Use SIEM tools like Splunk or ELK Stack.

⚠️ Common Mistakes (What Auditors Flag)

1. Not encrypting backups.

Why this happens: Overlooking secondary storage systems.
How to avoid: Apply encryption to all backups and test regularly.

2. Using weak encryption algorithms.

Why this happens: Lack of awareness about FIPS 140-2 standards.
How to avoid: Ensure compliance with FIPS 140-2 for all encryption.

3. Failing to rotate encryption keys.

Why this happens: Key management processes are not formalized.
How to avoid: Implement automated key rotation policies.

4. Inconsistent encryption across hybrid environments.

Why this happens: Lack of centralized key management.
How to avoid: Use unified key management solutions for hybrid setups.

5. Not documenting encryption configurations.

Why this happens: Focusing solely on implementation, not documentation.
How to avoid: Maintain detailed records of all encryption settings.

πŸ“š Parent Policy

This practice is governed by the System and Communications Protection Policy

View SC Policy β†’

πŸ“š Related Controls