🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Implementation Checklist to Protect CUI at Rest for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.16 (Code 191)

Practical, step-by-step checklist to encrypt and protect Controlled Unclassified Information (CUI) at rest to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requirements while minimizing operational friction for small businesses.

•
March 26, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Protecting Controlled Unclassified Information (CUI) at rest is mandatory under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (Control SC.L2-3.13.16), and this post gives a focused, step-by-step implementation checklist for small businesses working to meet that requirement without disrupting day-to-day operations.

Why this control matters (risk summary)

Data at rest — files, databases, backups, removable media and disk images — is a prime target for theft and accidental loss. Failing to encrypt and properly manage CUI at rest increases the risk of data breaches, contract suspension or termination, regulatory penalties, and reputational harm. For contractors subject to DFARS clauses or other federal agreements, inability to demonstrate compliant protection can result in lost contracts and financial liability.

Step-by-step implementation checklist (high level)

At a glance, implement the control in this order: (1) inventory & classify CUI, (2) select encryption solutions and scope (full-disk, file-level, DB/TDE, cloud SSE/CSE), (3) establish key management (KMS/HSM, rotation, backup), (4) apply access controls and least privilege, (5) secure backups and removable media, (6) enable logging/monitoring and test recovery, and (7) document policies and evidence for audit. The sections below expand each step with technical specifics and practical actions for small teams.

1. Inventory and classify CUI

Practical actions: run file discovery and DLP scans (e.g., open-source tools like Apache Tika + custom scripts, commercial DLP if budget allows) across endpoints, servers and cloud stores to locate CUI. Tag repositories (SharePoint sites, S3 buckets, NAS shares, SQL databases) with metadata indicating CUI presence and owner. For small businesses, start with a simple spreadsheet mapping assets, owner, CUI type and storage location, then prioritize high-risk assets (laptops, backups, cloud buckets) for immediate encryption.

2. Choose the right encryption approach for each asset type

Technical guidance: use full-disk encryption (FDE) for laptops/desktops (BitLocker on Windows with TPM+PIN, FileVault on macOS, LUKS2 with TPM integration on Linux); use file-level or application-level encryption for shared drives and collaborative documents; use Transparent Data Encryption (TDE) for databases (SQL Server TDE, Oracle TDE, PostgreSQL native pgcrypto or file-system level encryption where appropriate); and for cloud storage, prefer provider server-side encryption with customer-managed keys (e.g., AWS SSE-KMS, AWS SSE-C where appropriate, Azure Storage with CMK, GCP CMEK) or client-side encryption when you must retain full key control. Algorithms and profiles: use AES-256 GCM or AES-256 CBC with authenticated modes; ensure cryptographic libraries and modules are FIPS 140-2/3 validated if required by contractual clauses.

3. Implement robust key management

Key management is the control point. Use a centralized KMS or HSM (AWS KMS / CloudHSM, Azure Key Vault HSM, GCP KMS, or an on-premise HSM) to generate, store, and rotate keys. Enforce separation of duties: administrators should not have direct access to plaintext keys. Define and automate key rotation schedule (e.g., rotate data encryption keys annually and wrap them with regularly rotated master keys). Maintain encrypted backups of key material and document key lifecycle procedures. For small businesses, a cloud KMS with restricted IAM roles often provides the best balance of security and cost.

4. Access control, logging, and monitoring

Apply least privilege to decrypt operations: require explicit IAM roles for KMS decrypt, restrict encryption key usage by resource and service, and use conditional access (MFA, device compliance) for administrative actions. Enable detailed logging: KMS access logs, OS auditd/file access logs, cloud object access logs (S3 access logs, CloudTrail), and database audit logs. Forward logs to a centralized SIEM or log collector (Splunk, ELK/Opensearch, or cloud-native solutions) and configure alerts for unusual key usage or mass data exfiltration. Regularly test that encrypted resources are inaccessible without keys and that revoked keys prevent decryption.

5. Backups, removable media, and lifecycle controls

Encrypt backups and removable media with the same or stronger protections as production data; use transparent encryption for backup systems or apply client-side encryption before storage. For portable drives, use hardware-encrypted devices (FIPS-validated where required) or enforce BitLocker-to-Go with a corporate policy. Implement media sanitization workflows and maintain an inventory of devices. For cloud backups, ensure snapshot and backup stores are encrypted with CMKs and that key revocation procedures do not leave data unrecoverable without a documented key escrow process.

Real-world small business example and compliance tips

Example: A 20-person defense subcontractor stores CUI in employee laptops, an on-prem NAS, and an S3 bucket used for build artifacts. Implementation steps: deploy BitLocker with automatic MBAM/Intune escrow of recovery keys tied to company AD; enable S3 SSE-KMS with a company-managed CMK restricting decrypt to an IAM role used by CI runners; enable SQL Server TDE on the build database; configure CloudTrail and GuardDuty for anomalous access; and document the entire design in a System Security Plan (SSP). Tips: prioritize high-value assets first, use cloud-managed services where possible to offload HSM maintenance, schedule tabletop exercises for key compromise and recovery, and collect screenshots and logs as evidence for audits.

Risk of not implementing the requirement

Without properly protecting CUI at rest, organizations are exposed to data theft from lost devices, insider threat, ransomware that exfiltrates data before encryption, and accidental exposure from misconfigured cloud buckets. Noncompliance can trigger contract penalties, loss of facility clearance eligibility, and long remediation timelines that disrupt business operations and revenue streams.

Summary: Meet Control SC.L2-3.13.16 by systematically inventorying CUI, selecting suitable encryption approaches for each storage type, implementing centralized key management with separation of duties, enforcing least privilege and logging, protecting backups and removable media, and documenting controls for audits. For small businesses, pragmatic choices (cloud KMS, FDE on endpoints, TDE for databases) plus an evidence-backed SSP and routine testing will produce a defensible, maintainable posture that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requirements.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes