🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build DevSecOps Pipelines that Satisfy NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.2 Requirements

Practical step-by-step guidance for building DevSecOps pipelines that protect CUI in transit and meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 SC.L2-3.13.2 requirements.

•
March 31, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides hands-on, actionable guidance for small businesses and engineering teams to design and implement DevSecOps pipelines that meet the NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control SC.L2-3.13.2 (protecting Controlled Unclassified Information (CUI) during transmission using cryptographic controls), focusing on specific technical patterns you can deploy today and the compliance evidence you should capture for audit readiness under the Compliance Framework.

What SC.L2-3.13.2 means for DevSecOps pipelines

At a practical level, SC.L2-3.13.2 requires that any pipeline flows that carry CUI (source code, build artifacts containing secrets, configuration data, or telemetry that could expose CUI) must use approved cryptographic mechanisms to maintain confidentiality and integrity in transit. For a Compliance Framework implementation this maps to: encrypting pipeline traffic (including agent-to-server and artifact transfers), authenticating endpoints (mTLS or strong mutual authentication), enforcing current TLS versions and cipher suites, signing artifacts, and centralizing key management with auditable rotation and access controls.

Design principles to follow in your pipeline

Design around three core principles: (1) encrypt everything in transit using TLS 1.2+ (prefer 1.3) with strong cipher suites (e.g., AES-GCM or ChaCha20-Poly1305), (2) use mutual authentication for pipeline agents and registries (mTLS or short-lived cloud credentials via OIDC), and (3) centralize key management with an auditable KMS/HSM-backed service and enforce automated rotation. In Compliance Framework terms, document how each pipeline segment handles CUI, map each segment to evidence (logs, key policies, asset inventory), and include these mappings in your System Security Plan (SSP) and Control Implementation Summary.

Concrete implementation steps

Start by inventorying pipeline components that touch CUI: code repos, CI runners, artifact registries, deployment agents, and any remote logging or telemetry endpoints. Enforce TLS 1.3 or TLS 1.2 with strong ciphers on all endpoints and disable legacy protocols (SSL, TLS 1.0/1.1). For agent-server communication, prefer mTLS: generate certificates from an internal CA (or use cloud-managed mTLS) and deploy certificate rotation automatically via your configuration management (e.g., Ansible/Terraform). For cloud integrations, use OIDC-based short-lived tokens (GitHub Actions OIDC → AWS STS or Azure AD) rather than long-lived secrets, and grant least privilege IAM roles to the token-assumed identity.

Pipeline-specific technical examples

Example 1 (small business using GitHub Actions + AWS): Configure GitHub Actions OIDC to issue short-lived AWS STS credentials; use those credentials to call AWS KMS for envelope encryption of artifacts stored in an S3 bucket configured with bucket policies that deny non-TLS access. Sign build artifacts with cosign (sigstore) and verify signatures during deployments. Example 2 (on-prem / hybrid): Run GitLab runners behind a bastion, enable mTLS between runner and GitLab using a private CA, store secrets in HashiCorp Vault with Transit API for encryption-as-a-service, and use Vault Agent for automatic token injection and rotation. Example 3 (container supply chain): Enable registry TLS, enforce image signing with Notary/cosign, and verify image signatures in the deploy stage; use encrypted transport (HTTPS + mTLS) for registry pulls to prevent man-in-the-middle attacks.

Key management and cryptographic choices

Use a centralized KMS (cloud KMS or an HSM-backed appliance) and establish clear key policies: define key usage (envelope encryption / data keys vs. signing keys), rotation frequency (e.g., rotate wrapping keys annually, data keys more frequently or per-use), and access controls (restrict Decrypt/Sign to specific service roles). Where contractually required or explicitly called out by your Compliance Framework mapping, use FIPS-validated modules or cloud FIPS endpoints. Store audit logs of key usage (KMS access events), and integrate with SIEM for retention and alerting. For signing, prefer ECDSA/secp256r1 or RSA-3072+ with SHA-256 for signatures to align with current best practices.

Small-business cost-effective strategies

If you are a small shop with limited budget, you can meet requirements without large expense: leverage cloud-managed KMS and managed registries (AWS ECR, GCR, Azure ACR) that provide encryption at rest + TLS in transit; enable platform features like GitHub/GitLab OIDC and protected runners; adopt open-source tools like SOPS or Age for encrypted config files, HashiCorp Vault OSS for secrets if you can manage it, and cosign/sigstore for signing. Document these choices in your SSP, capture configuration exports and logs as evidence, and use automated Terraform/Ansible playbooks so auditors can see reproducible, version-controlled configuration.

Compliance evidence, automation, and best practices

Automate evidence collection: pipeline runs should produce authenticated logs, signed artifacts, and attestations (e.g., SBOM + signature). Use policy-as-code (OPA/Rego, Conftest) to enforce TLS versions, block use of plaintext protocols, and require signed artifacts before deploy. Capture key rotation records, CA certificate issuance logs, and KMS access logs in your audit trail. Maintain a compliance repo that maps pipeline jobs to specific SC.L2-3.13.2 requirements, stores SROs (System Responsibility Owner) and POA&Ms for any gaps, and produces an evidence bundle (Terraform state, KMS key IDs, signed build logs) for assessors.

Risks of not implementing SC.L2-3.13.2 in pipelines and closing thoughts

Failing to implement these controls exposes CUI to interception, tampering, and supply chain compromise—risks include loss of DoD contracts, regulatory penalties, and reputational damage. Technically, weaknesses such as unencrypted artifact transfer, long-lived credentials in repos, unsigned images, or non-mTLS runner communication create simple attack vectors for lateral movement and data exfiltration. The pragmatic mitigation is to prioritize pipeline encryption, short-lived credentials, artifact signing, central key management, and automated policy enforcement so compliance becomes part of your CI/CD flow rather than an afterthought.

Summary: Build your DevSecOps pipeline to meet SC.L2-3.13.2 by encrypting all in-transit communications with modern TLS/mTLS, centralizing keys in an auditable KMS/HSM, using short-lived credentials and OIDC, signing and verifying artifacts, and automating evidence capture and policy checks—these concrete steps align with the Compliance Framework and provide a clear, cost-effective path for small businesses to demonstrate compliance and reduce risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes