🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Encrypt CUI on USBs and Laptops: Step-by-Step Implementation for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MP.L2-3.8.6

Step-by-step guidance for small businesses to encrypt CUI on USB drives and laptops to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 MP.L2-3.8.6 requirements, including tools, configuration examples, and best practices.

β€’
April 08, 2026
β€’
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Encrypting Controlled Unclassified Information (CUI) at rest on portable media and laptops is a practical, high-impact control required by NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 (MP.L2-3.8.6); this post lays out step-by-step implementation guidance, real-world small-business scenarios, and concrete configuration advice so you can achieve compliance in a repeatable way.

Why this control matters and risks of non-compliance

MP.L2-3.8.6 requires that CUI remain protected when stored on removable media and mobile devices β€” the most common cause of data exposure is loss or theft of an unencrypted device. For a small engineering firm, a lost laptop or USB with program specifications can lead to contract termination, regulatory penalties, and reputational damage. Operationally, the absence of encryption increases risk of lateral compromise (if an attacker mounts the disk) and makes incident response and breach notification more likely and more costly.

High-level implementation approach for Compliance Framework

At a high level implement three parallel components: 1) policies and inventory (identify where CUI resides and who may carry it), 2) technical enforcement (full-disk and removable-media encryption), and 3) operational controls (key/recovery management, MDM, training, and sanitization). Map each step into your System Security Plan (SSP), and document any planned deviations in a Plan of Action and Milestones (POA&M) if full coverage cannot be achieved immediately.

Step-by-step technical implementation (laptops)

1) Inventory and classify endpoints: use an asset tracker or MDM to label devices that may process CUI. 2) Choose platform-native FDE where possible: BitLocker (Windows 10/11 Pro/Enterprise) with TPM+PIN or FileVault 2 (macOS) are accepted, widely supported options. 3) Configure and enforce via MDM: for Windows use Intune/Group Policy settings (RequireDeviceEncryption, Configure TPM startup PIN); for macOS use Jamf to enable FileVault and escrow keys to Jamf/SSO. Example PowerShell to enable BitLocker to fixed drives (run as admin): Enable-BitLocker -MountPoint "C:" -EncryptionMethod XtsAes256 -TpmProtector -UsedSpaceOnlyEncryption -SkipHardwareTest. Ensure encryption algorithm is AES-256 (XTS-AES-256) and pre-boot authentication required when policy dictates.

Step-by-step technical implementation (USBs and removable media)

Options: hardware-encrypted USBs (e.g., FIPS-certified drives), BitLocker To Go (Windows), FileVault-encrypted containers (macOS), or cross-platform solutions (VeraCrypt, enterprise file sync solutions). For small businesses: 1) Prefer hardware-encrypted USBs for shared removable use β€” they provide PIN access and built-in key storage. 2) If using BitLocker To Go, configure group policy to require encryption and prevent automatic unlocking. Use Intune policy "Require encryption for removable drives" and configure recovery key escrow to Azure AD. 3) For cross-platform teams, implement encrypted VeraCrypt containers with strong passphrases and an operational policy that prevents storing unencrypted copies elsewhere. Example Linux LUKS command for creating an encrypted partition: sudo cryptsetup luksFormat /dev/sdb1 --type luks2 --pbkdf argon2i --cipher aes-xts-plain64 --key-size 512.

Operational controls: key management, recovery, inventory, and sanitization

Key and recovery management make or break usability and compliance. Escrow recovery keys centrally (Azure AD for BitLocker, Jamf key escrow for FileVault, or a secured KMIP/HSM-backed vault for enterprise encryption). Define retention and access rules for recovery keys (who can retrieve, audit trail). Maintain an up-to-date inventory of USBs and removable media β€” tag physical devices and track assigned users. Establish secure sanitization processes per NIST SP 800-88 (cryptographic erasure or physical destruction for end-of-life drives) and require documented receipt when devices are returned or retired.

Small-business scenarios and real-world examples

Scenario A: A 12-person design shop uses laptops and occasional USBs to transfer CUI to subcontractors. Implement Intune to enforce BitLocker, require employees to store recovery keys in Azure AD, supply hardware-encrypted USBs for subcontractor handoffs, and include a brief training module on β€œnever send CUI on unencrypted email.” Scenario B: A consulting firm with mixed macOS/Windows clients uses VeraCrypt containers on shared USBs β€” accompany this with policy that forbids storing the container on cloud storage without encryption and require passphrase complexity and change cadence. Both scenarios should include periodic checks: MDM compliance reports and quarterly audits of inventory.

Compliance tips and best practices

Use FIPS-validated or vendor-certified crypto if your contract requires it; prefer full-disk encryption (FDE) with pre-boot authentication over file-only encryption for laptops. Enforce least privilege for device access, disable auto-run and automatic file sync of CUI to personal cloud accounts, and limit USB write access through MDM/NAC. Test your recovery workflow quarterly (can an authorized admin retrieve a recovery key and decrypt a device?) and incorporate encryption status checks into onboarding/offboarding checklists. Finally, document all choices in the SSP and reference MP.L2-3.8.6 in procedures and training materials.

In summary, meeting MP.L2-3.8.6 is straightforward with a disciplined program: classify assets, use platform-native FDE (BitLocker/FileVault/LUKS) or approved hardware-encrypted USBs, centralize recovery key escrow, enforce encryption through MDM, and operationalize inventory and sanitization procedures; doing so significantly reduces the risk of CUI loss and positions your small business for successful NIST/CMMC assessment.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes