🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure TLS and Mutual Authentication for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.15 Compliance

Step-by-step guidance to configure TLS and mutual (mTLS) authentication to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 SC.L2-3.13.15 requirements.

•
March 25, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides practical, actionable steps to configure Transport Layer Security (TLS) and mutual authentication (mTLS) to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control SC.L2-3.13.15, including examples, recommended configurations, testing commands, and compliance evidence you can implement in a small-business environment.

Understanding SC.L2-3.13.15 and key objectives

Control SC.L2-3.13.15 requires that organizations employ cryptographic mechanisms to protect the confidentiality of transmitted information — in practice this means using TLS to protect network sessions and, where appropriate, leveraging mutual authentication (certificate-based client authentication) for stronger assurance of both server and client identity. Your implementation goal is to ensure session confidentiality and integrity (TLS 1.2+ / TLS 1.3), validate endpoints reliably (server certs + CA chain checks), and, for higher assurance services (APIs, admin consoles, machine-to-machine communication), require client-side certificates (mTLS).

TLS baseline configuration (practical checklist)

Start with a secure baseline that meets NIST guidance (see NIST SP 800-52 Rev.2) and industry best practices: enable TLS 1.3 and TLS 1.2 only; disable SSLv2/3 and TLS 1.0/1.1; prefer AEAD ciphers and forward secrecy (ECDHE); use key lengths appropriate to your lifetime goals (RSA >= 2048 bits, 3072 recommended for long-term; ECC using P-256 or P-384); enable HSTS and OCSP stapling; require server certificates from a trusted CA and verify full chain. Example nginx snippet: ssl_protocols TLSv1.2 TLSv1.3; ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:...'; ssl_prefer_server_ciphers on;. For TLS 1.3 you will rely on the negotiated cipher suites (e.g., TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256).

Implementing mutual TLS (mTLS) for stronger assurance

mTLS requires the server to request and validate a client certificate during the TLS handshake. Use a dedicated CA (internal or managed) to issue client certificates and maintain a truststore on servers to validate these client certs. Example nginx config lines for mTLS: ssl_client_certificate /etc/ssl/certs/ca-client.pem; ssl_verify_client on; ssl_verify_depth 2;. On Apache: SSLVerifyClient require; SSLCACertificateFile /etc/ssl/certs/ca-client.pem. For clients, use PKCS#12 bundles or separate PEM files; curl example: curl --cert client.pem --key client.key --cacert ca.pem https://api.example.com. For testing mTLS with OpenSSL: openssl s_client -connect api.example.com:443 -cert client.crt -key client.key -CAfile ca.pem.

PKI, certificate lifecycle, and automation

Small businesses should choose either a managed public CA for server certs (ACME/Let's Encrypt, AWS ACM) and a private/internal CA for client certs or use an enterprise PKI (HashiCorp Vault, AWS Private CA, Step CA) to issue short-lived client certificates. Automate issuance and renewal: use Certbot/ACME for TLS server certs and an automated agent or API to distribute client certs (short lifetime, e.g., 90 days or less) to reduce compromise impact. Protect private keys with a KMS or HSM where possible; store client certs in secure vaults and rotate/revoke via CRL or OCSP. Example generation commands: openssl genrsa -out server.key 3072; openssl req -new -key server.key -out server.csr -subj "/CN=example.com".

Testing, monitoring, and evidence for compliance

Document and collect evidence: configuration files showing TLS and mTLS settings, certificate issuance records (CSRs, serials), logs of TLS handshakes and mTLS failures, and vulnerability/scan results. Test with OpenSSL and automated scanners: openssl s_client -connect example.com:443 -showcerts, openssl s_client -connect example.com:443 -CAfile ca.pem -cert client.pem -key client.key, and use ssllabs.com, sslscan, or nmap --script ssl-enum-ciphers to verify protocol and cipher restrictions. Configure SIEM or log collection to alert on TLS handshake failures or unusual client certificate rejections and run periodic certificate discovery and expiry monitoring. For compliance audits, include a System Security Plan (SSP) section detailing where TLS/mTLS is enforced and a configuration checklist mapping to SC.L2-3.13.15.

Real-world small business scenarios and implementation examples

Scenario A: A 10-person software shop exposing an internal CI API — protect the API with mTLS using an internal CA (HashiCorp Vault) that issues short-lived client certs to CI runners and developers; terminate TLS at nginx reverse proxies configured with mTLS (ssl_verify_client on). Scenario B: Managed web application — use ACM or Let's Encrypt for server certs, fronted by AWS ALB or Cloudflare for DDoS/TLS termination, while using mTLS for backend service-to-service traffic only inside the VPC or via service mesh (e.g., Istio) which can manage identities and certificate rotation. These approaches lower operational burden while meeting the control's cryptographic protection requirement.

Compliance tips, best practices, and common pitfalls

Tips: enforce least privilege for certificate issuance; maintain an auditable revocation process (CRL or OCSP) and test revocation behavior; automate renewal to avoid outages; document exceptions and compensating controls where legacy clients force weaker protocols (and plan migrations). Pitfalls: terminating TLS in an untrusted intermediary without preserving end-to-end encryption, storing private keys on developer laptops without encryption, and failing to monitor certificate expirations. Ensure you also address key management controls (secure generation, access control, and archival) to align with NIST cryptographic key management guidance.

Risk of not implementing: without strong TLS and mutual authentication you expose CUI and other sensitive data in transit to eavesdropping, man-in-the-middle attacks, and unauthorized access; lack of proper certificate management increases risk of impersonation and makes audit and incident response difficult, which can lead to noncompliance findings, contract penalties, and loss of trust.

Summary: To meet SC.L2-3.13.15, implement a TLS baseline (TLS 1.2+/1.3, strong ciphers, forward secrecy), deploy mTLS where strong endpoint assurance is required, automate certificate lifecycle management, and collect configuration and log evidence for audits; small businesses can balance managed services and lightweight PKI tools to achieve compliance while controlling operational cost and complexity.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes